[go: up one dir, main page]

CN1571335A - A source authentication method applied in multicast communication system - Google Patents

A source authentication method applied in multicast communication system Download PDF

Info

Publication number
CN1571335A
CN1571335A CN 200410037399 CN200410037399A CN1571335A CN 1571335 A CN1571335 A CN 1571335A CN 200410037399 CN200410037399 CN 200410037399 CN 200410037399 A CN200410037399 A CN 200410037399A CN 1571335 A CN1571335 A CN 1571335A
Authority
CN
China
Prior art keywords
authentication
user
multicast
source
authentication center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200410037399
Other languages
Chinese (zh)
Other versions
CN100393034C (en
Inventor
吴威
李肖坚
沈玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CNB2004100373997A priority Critical patent/CN100393034C/en
Publication of CN1571335A publication Critical patent/CN1571335A/en
Application granted granted Critical
Publication of CN100393034C publication Critical patent/CN100393034C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种应用于组播通信系统中的源认证方法,属于计算机安全技术领域。本发明的技术方案为:对每一个参与组播通信的成员提供一个身份凭证,用来在组播客户和认证中心之间进行双向认证,确定通信各方的传输密钥和客户公私钥;在组播信息传输时,采用基于事件序列的源认证方案对传输的信息进行签名认证,保证组播信息的发送者即为其声明的发送者。本发明的技术方案具有成本低、扩展性好、快速认证、抗丢失性好等特点,能够有效提高组播应用场景下低端接收者的效率。

Figure 200410037399

The invention discloses a source authentication method applied in a multicast communication system, belonging to the technical field of computer security. The technical solution of the present invention is: provide an identity credential for each member participating in the multicast communication, which is used to carry out two-way authentication between the multicast client and the authentication center, and determine the transmission key and the client public and private key of the communication parties; When the multicast information is transmitted, the source authentication scheme based on the event sequence is used to perform signature authentication on the transmitted information to ensure that the sender of the multicast information is the sender of its statement. The technical solution of the invention has the characteristics of low cost, good scalability, fast authentication, good loss resistance, etc., and can effectively improve the efficiency of low-end receivers in the multicast application scenario.

Figure 200410037399

Description

A kind of source authentication method that is applied in the multicast communication system
Technical field
The present invention relates to a kind of source authentication method that is applied in the multicast communication system, it belongs to the computer security technique field.
Background technology
Existing cast communication system is a kind of communication system of opening, is characterized in: information source determines that the stay of two nights is clearly and not concrete, at any one time promptly, participate in the main frame of certain multi-cast system information source being arranged necessarily, but stay of two nights quantity is normally unfixed, even is the zero stay of two nights; And multicast communication system does not provide data source to differentiate service mechanism, makes any main frame to send data to any multicast group.This just means that any main frame all can mix the multicast packet of information source main frame or pretend to be information source host groups multicast data, and this is extremely serious problem in the present multicast communication system security of multicast.Therefore,, need carry out the source monitoring, the information that the multicast member of having discerned sends is tackled, filtered multicast for multicast is carried out effective monitoring.If there is not the authentication (checking) of multicast source, it is lead-pipe cinch that the assailant of malice sends data to multicast group, and this group of recipients is differentiated the data of having to accept the assailant owing to having no way of.
In the unicast communication system, use pure symmetric cryptography mechanism that the authentication of packet just can be provided, promptly sender and recipient share a cipher key calculation message authentication code.When the information with message authentication code arrived, the recipient verifies correctly can be confirmed to be this message that is produced by the sender.But in multicast communication system, re-using the authentication of symmetric cryptography mechanism is not very safe just.Because according to the characteristics of multicast communication system,, then probably pretend to be sender's spurious information to send to other recipient if each recipient knows this key.In addition, because authentication has higher requirement to data in multicast environment, promptly need there be packet loss, sender not to know under the situation of recipient's state, efficiently authentication data packet.This makes that it is impracticable still using symmetric cryptography mechanism to carry out the source authentication in multicast environment.
By using asymmetric encryption mechanism can realize the source authentication of multi-cast system, make each recipient only needn't produce authentication information and realize authentication multicast source by checking the authentication information that it receives.Usually, asymmetric mechanism is to use the unsymmetrical key technology to produce, as digital signature.But because asymmetric encryption techniques expensive makes this method can only be used for the data flow of low speed, and to require sender and recipient be powerful work station.
Using symmetric cryptography mechanism still is that asymmetric encryption mechanism authenticates information source and is not absolute.The pure symmetric key technique of using authenticates information source as only using the symmetric key message authentication code, also can not reach the source authentication of multicast at present.Therefore, cost is low, authentication speed fast, the anti-good multicast source authentication mechanism that can satisfy the demands of losing property to provide one, is the problem that needs emphasis to solve in the security of multicast service.
Summary of the invention
In view of the foregoing, the purpose of this invention is to provide a kind of source authentication method that is applied in the multicast communication system, make the information source that in multicast environment, can confirm multicast information.
For achieving the above object, the present invention is by the following technical solutions: a kind of source authentication method that is applied in the multicast communication system, it may further comprise the steps: 1, provide an identity documents to each member who participates in cast communication, be used between multicast client and authentication center, carrying out two-way authentication, determine the transmission security key and the public and private key of client of communication parties; 2, when multicast information transmits, adopt source certificate scheme that information transmitted is carried out signature authentication based on sequence of events.
In described mutual authentication process, licensed group communication member at first registers his mandate identity recognition number to authentication center, and use similar Diffie-Hellmen algorithm to generate password and pay authentication center's preservation, for preventing Replay Attack, the present invention has designed Passive Defence and active defensive measure, and the causality of authentication message and order are designed to the synchronous and event sequence consistency of logical timer.In each bar message, message sends message " random number chain " the cochain sign that a disposable random value is replied as transmission to the recipient is set; And, realize the ageing of message by setting time stamp and time limit, solve consistent problem of the discrete relatively time of at every turn replying.
Source authentication method based on sequence of events is only the part in the receiving terminal packet to be authenticated separately, and other bag then relies on these bags that authenticated and obtains authentication.This carries the authentication information of next bag to be certified with regard to the bag that requires to have authenticated, and these have authenticated chain of subsequent authentication information appended in bag formation all linked with one another so.This chain is to construct in the sequence (order or backward) that transmitting terminal sends according to packet, so at receiving terminal, according to the authentication sequence authentication data packet in this chain.
The present invention adopts the beneficial effect of above-mentioned source authentication method to be:
1, adopt bidirectional identity authentication, make authentication center in the authentication client identity, the client can authenticate authentication center equally, can resist man-in-the-middle attack effectively.Simultaneously, use the random number chain, can be good at the opposing playback again and wait attack.
2, the required cost of minimizing source authentication.Out of order phenomenon takes place through regular meeting in uncertain and other reason owing to the Network Transmission path, promptly causes the packet sequence of receiving at receiving terminal inconsistent with the packet sequence of transmitting terminal transmission.If carry out the source authentication to each bag is all independent, so the communication cost, assessing the cost will be very high.The source certificate scheme based on sequence of events that the present invention uses has well solved this problem, characteristics such as have that cost is low, favorable expandability, rapid authentication, anti-losing property are good.
Description of drawings:
The flow chart of Fig. 1 authentication center during for bidirectional identity authentication of the present invention
Fig. 2 is two-way chain schematic diagram
Fig. 3 is the pack arrangement of a list
Fig. 4 sends the flow chart of multicast packet for the multicast user
Fig. 5 is the flow chart of multicast user's receiving multicast data
Embodiment
The source authentication method that is applied in the multicast communication system disclosed by the invention is the source authentication method based on the unsymmetrical key technology, and more integrated existing technological means, as: Diffie-Hellman Diffie-Hellman, one-way Hash algorithm, RSA public key algorithm etc.
Below in conjunction with accompanying drawing and example the present invention is elaborated.
The source authentication method that is applied in the multicast communication system provided by the invention comprises two steps:
1, for each member who participates in cast communication provides an identity recognition number, in the cast communication process, at first carries out the two-way authentication of identity between multicast client and the authentication center;
2, when multicast information transmits, adopt source certificate scheme that information transmitted is carried out signature authentication based on sequence of events.
When bidirectional identity authentication, licensed group communication member A registers his mandate identity recognition number IDa to the S of authentication center; And use the Diffie-Hellmen algorithm to generate the authority Ya payment authentication center preservation of group communication member authentication, algorithm is as follows substantially:
X a<p,X s<p.
Y a = a X a mod ( p ) . . . . . . [ A . 0.1 ]
Y s = a X , mod ( p ) . . . . . . [ A . 0.2 ]
K as = ( Y a ) X s mod ( p ) = ( Y s ) X a mod ( p ) . . . . . . [ A . 0.3 ]
Known prime number p and primitive root integer a ∈ Z*p thereof.Xa, Xs are random numbers, are generated Xa at random and are calculated the authority of Ya as group communication member's authentication by the group communication member, pay authentication center in advance and preserve, change up to this user next time.When each authen session, authentication center all provides Xs randomly, and calculates Ys and send to group communication member A and generate conversation key K as.
Although Xa is relative with Ya constant, because each authen session, authentication center all specifies Xs randomly, and then changes Ys randomly, and final order conversation key K as becomes disposable random key, increases the difficulty of competitor analysis key.
Ageing (Ts) of authentication message realizes that by time stamp (Time-stamp) and time limit (Life-time) discrete relatively at every turn replying is that interaction message is formed in twos, and causality and event sequence need have only and mutual exclusion character.Before and after adopting, the present invention adds same disposable random value (Nonce) formation " random number chain (N respectively in the message in twos a) ", solve " event sequence consistency " problem that verification process runs in distributed environment.
In each bar message, message sends a disposable random value (N is set a) message " random number chain " the cochain sign of replying for the recipient as transmission.And, realize the ageing (T of message by setting time stamp and time limit s), solve consistent problem of the discrete relatively time of at every turn replying.
That is to say that disposable random value (Na) links whole protocol procedures as the chain of messages sign.Timeliness value (Ts) and " random number chain " sign of preventing " Mitnick " attack, message then are used for taking precautions against " Replay Attack ".
The structure of every message is identical in the mutual authentication process.For the sake of clarity, the one-way Hash value of every message all is expressed as H (mi), and form is as follows:
M i . P → Q : { m i , { H ( m i ) } K p - 1 } K p , i = 1,2,3,4 ;
Therefore, its message sequence can be described as:
M 1 . A → S : { T a , N a , S , X 1 , { H ( m 1 ) } K a - 1 } K s ; M wherein 1=(T a, N a, S, X 1), X 1=ID a
M 2 . S → A : { N a , N s , A , X 2 { H ( m 2 ) } K s - 1 } K a ; M wherein 2=(N a, N s, A, X 2), X 2 = ( Y s , { N ′ s , T s } K as ) .
M 3 . A → S : { N s , N ′ a , S , X 3 , { H ( m 3 ) } K a - 1 } K s ; M wherein 3=(N s, N ' a, S, X 3), X 3 = { N ′ s , N ′ ′ a , mgroup } K as
M 4 . S → A : { N ′ a , A , X 4 { H ( m 4 ) } K a - 1 } K a ; M wherein 4=(N ' a, A, X 4), X 4 = { N ′ ′ a , warrant } K as ,
warrant=(type,iv,K mgroup)。
Wherein, mgroup represents the multicast group address applied for, and Kmgroup represents the communications key of multicast group.When user and authentication center authenticated, the program flow diagram of authentication center as shown in Figure 1.Detailed process is as follows:
(1), receives the client public key that the user sends to authentication center.
(2), authentication center sends the PKI of authentication center to the user.
(3), receive the user authentication request that the user sends to authentication center, wherein the content format of user authentication request has comprised user time and has stabbed T shown in the M1 in the top message sequence in the message a, random value N a, identity recognition number ID a, adopt one-way Hash algorithms to generate an one-way Hash value these contents, the user uses user's private key to sign, and at last these contents is reinstated the public key encryption of authentication center together with user's signature one, finally forms user authentication request.
(4), authentication center deciphers user authentication request with the private key of authentication center, and verifies and extract user's identity recognition number ID by user's signature a, check whether the user exists error logging, if there is error logging, then finishes this authentication, does not carry out cast communication; If there is not error logging, then generate an X randomly s, and calculate Y s, then according to the Y that keeps in advance aCalculate the key K of this session As, and generate two random number N sAnd N s'.
(5), authentication center sends authentication request response to the user, the content format of authentication request response has comprised the time stamp T of authentication center in the message shown in the M2 in the top message sequence s, random value N sAnd N s' and the Y that generates of authentication center s, N wherein s', T s, and Y sWill be by the key K of session AsEncrypt, the ciphertext of generation will with random value N sAnd the user's random value N that had before received aAdopt the one-way Hash algorithm to generate an one-way Hash value, the private key that re-uses authentication center is signed to this one-way Hash value, at last with the ciphertext and the random value N that generate sAnd the user's random value N that had before received aReinstate user's public key encryption together with user's signature one, finally form the authentication request response.
(6), receive the user authentication response that the client sends to authentication center, the content format of user authentication response has comprised the random value N that the user generates in the message shown in the M3 in the top message sequence a' and N a", the user reduces the N that the authentication request response of authentication center draws sAnd N s' and the multicast group address mgroup that adds of user applies, wherein N s', N a" and the mgroup session key K that will generate by the user AsEncrypt, the ciphertext of generation will with random value N a' and the random value N of authentication center that before received sAdopt the one-way Hash algorithm to generate an one-way Hash value, the private key that re-uses the user is signed to this one-way Hash value, at last with the ciphertext and the random value N that generate a', N sReinstate the public key encryption of authentication center together with user's signature one, finally form user authentication response.
(7), the random number N that oneself generates is judged by authentication center sAnd N s' with the user authentication response that receives in the N that provides sAnd N s' whether identical, if inconsistent, then finish this authentication, do not accept user's request, and in error logging, add this user's record; If consistent, by this authentication, authentication center can be according to the multicast group address of user applies, and information such as the transmission security key of cast communication send to the user, and message format is shown in the M4 in the top message sequence.The multicast user just can carry out cast communication after authenticating the transmission security key that has obtained cast communication.
After authentication, the cast communication member can obtain the information such as transmission security key of cast communication, and the PKI with oneself has sent to authentication center simultaneously, authenticates so that carry out the source during cast communication.
When the multicast user communicated, transmitting terminal at first divided into groups packet based on the source certificate scheme employing of sequence of events, and the group head bag of each grouping is signed separately, and the HASH value of packet constitutes two-way HASH chain before and after comprising in the group.Two-way HASH chain is that two HASH chains that direction is different are arranged on the packet of each grouping, and the HASH value that chain is previous bag is attached to back one and wraps, and another chain is that the HASH value of a back bag is attached to previous wrapping.When using that wherein a chain can't authenticate, use the HSAH chain of other direction can obtain authentication.Because the rapidity of HASH value verification and anti-the losing property of two-way chain, this method have rapid authentication and anti-advantage of losing.As shown in Figure 2.
When packet loss, wait for the arrival of next packet group head bag, again according to from after forward HASH chain obtain authentication.If " isolated island " situation of generation, the bag bidirection chain that promptly receives all breaks, and at this moment waits for " some list " arrival reauthentication.
The point list derives from the thinking of using the personnel that check that call the roll in the life.The implication of calling the roll is that a register had been arranged before seeing some, comprises these people's basic document in this register, checks when preparing against point to the someone.Point list technology herein adopts this thought to be used for anti-the losing property of raising source authentication.
The HASH value of some packets put together be stored in the bag, when needs authenticate, from this bag, take out the HASH value of certain bag that needs authentication respectively, compare, get final product access authentication by calculating.The prerequisite of this method is that the packet of depositing a plurality of HASH values should at first obtain identity validation, as using digital signature etc.The pack arrangement of some list as shown in Figure 3.
When carrying out cast communication, at first after the data of a grouping of buffer memory, the packet of establishing protective ESA authentication information sends each packet to this group membership to transmitting terminal then.The structure of this packet specifically comprises in each bag as shown in Figure 2:
The information Mi of i packet;
The HASH value H ' i of i packet, it is that the information Mi+1 of a back packet and it comprise the HASH value of H ' i+1, i.e. H ' i=H (Mi+1+H ' i+1);
The HASH value Hi of i packet, it is that the information Mi-1 of previous packet and it comprise the HASH value of Hi-1, i.e. Hi=H (Mi-1+Hi-1);
Each start of packet bag also comprises:
(noncei), K is a group key to the UMAC value Ui=UHAC of i packet for (Mi, Hi, H ' i), K, and nonce is a random number;
In i packet to the signature of UMAC: Sig (Ui), and with the random value noncei that goes up this bag.
Fig. 4 sends the flow chart of multicast packet for multicast user in the cast communication process.Transmitting terminal mainly is to generate packet according to the method described above, sends each packet to this group membership then.
Fig. 5 is the flow chart of multicast user's receiving multicast data in the cast communication process.When receiving terminal received the initiation parameter signature packets, at first whether signature verification was correct, obtained the required parameter of various authentications then.
When what receive is when organizing the head bag, at first checks the random value noncei of this bag, is used for taking precautions against and forges and Replay Attack.Judge whether the noncei sequence number is up-to-date, see that more whether noncei is the part in this single continuous chain: according to the noncej that has authenticated that received in the past, (whether j<i) calculates noncej=Fi-jnoncei.If, can think that then noncei is the random value of i bag, if not, illustrate that then noncei is personation or the repeating transmission of packet random value in the past, abandons.Confirm can directly to calculate nonce ' i=F ' (noncei) behind the noncei, calculate again UMAC (whether (Mi, Hi, H ' i), K noncei), conform to the UMAC value of calculating with sender's public key verifications signature, if, then prove Mi and Hi, H ' i is correct.
When what receive is when bag in the group, checks the random value in wrapping, to prevent Replay Attack.After security inspection passes through, judge whether i-1 packet existence and certified, if, directly verify the correctness of i bag with the H ' i-1 in the i-1 bag, if not, then buffer memory should wrap, and waited for the arrival of next start of packet bag, used the positive sequence chain to verify unverified bag one by one then.If backward chain and positive sequence chain all can not authenticate, the then arrival of holding point list, reauthentication.
Characteristics such as technical scheme of the present invention has that cost is low, favorable expandability, rapid authentication, anti-losing property are good can guarantee cast communication safety, low side recipient's efficient under the raising multicast application scene effectively.

Claims (6)

1, a kind of source authentication method that is applied in the multicast communication system, it is characterized in that: this method may further comprise the steps:
(1), for each member who participates in cast communication provides an identity documents, before cast communication, at first the cast communication member is carried out authentication;
(2), when multicast information transmits, adopt source certificate scheme that information transmitted is carried out signature authentication based on sequence of events.
2, a kind of source authentication method that is applied in the multicast communication system according to claim 1, its feature also is: the authentication in the described step (1) is a bidirectional identity authentication, when authentication center authenticated cast communication member identity, cast communication the member authenticated authentication center equally.
3, a kind of source authentication method that is applied in the multicast communication system according to claim 2, its feature also is: the bidirectional identity authentication process in the described step (1) has been used the random number chain, determines the transmission security key and the public and private key of client of communication parties.
4, a kind of source authentication method that is applied in the multicast communication system according to claim 3, its feature also is: described bidirectional identity authentication may further comprise the steps:
(1), authentication center receives the client public key that the user sends to authentication center;
(2), authentication center sends the PKI of authentication center to the user;
(3), authentication center receives the user authentication request that the user sends to authentication center;
(4), authentication center deciphers user authentication request with the private key of authentication center, and verifies and extract user's identity recognition number ID by user's signature a, check whether the user exists error logging, if there is error logging, then finishes this authentication, does not carry out cast communication; If there is not error logging, then generate an X randomly s, and calculate Y s, then according to the Y that keeps in advance aCalculate the key K of this session Ss, and generate two random number N sAnd N s';
(5), authentication center sends the authentication request response to the user;
(6), receive the user authentication response that the client sends to authentication center;
(7), the random number N that oneself generates is judged by authentication center sAnd N s' with the user authentication response that receives in the N that provides sAnd N s' whether identical, if inconsistent, then finish this authentication, do not accept user's request, and in error logging, add this user's record; If consistent, by this authentication, authentication center can be according to the multicast group address of user applies, and information such as the transmission security key of cast communication send to the user; The multicast user just can carry out cast communication after authenticating the transmission security key that has obtained cast communication.
5, according to claim 1 or 2 or 3 or 4 described a kind of source authentication methods that are applied in the multicast communication system, its feature also is: the source certificate scheme based on sequence of events that adopts in the described step (2) is that packet is divided into groups, only the group head bag of each grouping is signed separately, the interior Bao Ze of group constitutes two-way HASH chain by the HASH value in the packet of front and back and authenticates.
6, a kind of source authentication method that is applied in the multicast communication system according to claim 5, its feature also is: the source certificate scheme based on sequence of events that adopts in the described step (2) all interrupts producing " isolated island " situation to the communication data packet forward-backward algorithm HASH chain that takes place, and adopts the method for " some list " to authenticate.
CNB2004100373997A 2004-04-30 2004-04-30 A Source Authentication Method Applied in Multicast Communication System Expired - Fee Related CN100393034C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100373997A CN100393034C (en) 2004-04-30 2004-04-30 A Source Authentication Method Applied in Multicast Communication System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100373997A CN100393034C (en) 2004-04-30 2004-04-30 A Source Authentication Method Applied in Multicast Communication System

Publications (2)

Publication Number Publication Date
CN1571335A true CN1571335A (en) 2005-01-26
CN100393034C CN100393034C (en) 2008-06-04

Family

ID=34481652

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100373997A Expired - Fee Related CN100393034C (en) 2004-04-30 2004-04-30 A Source Authentication Method Applied in Multicast Communication System

Country Status (1)

Country Link
CN (1) CN100393034C (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009003383A1 (en) * 2007-06-30 2009-01-08 Huawei Technologies Co., Ltd. Multicast method, network device and multicast system
CN101938741A (en) * 2009-06-30 2011-01-05 大唐移动通信设备有限公司 Method, system and device for mutual authentication
CN103618610A (en) * 2013-12-06 2014-03-05 上海千贯节能科技有限公司 Information safety algorithm based on energy information gateway in smart power grid
CN104636681A (en) * 2014-12-19 2015-05-20 中国印钞造币总公司 Security transmission method and device for banknote storage data
CN105278327A (en) * 2014-07-07 2016-01-27 基岩自动化平台公司 Industrial control system redundant communications/control modules authentication
CN110376990A (en) * 2014-07-07 2019-10-25 基岩自动化平台公司 Operator action certification in industrial control system
US10613567B2 (en) 2013-08-06 2020-04-07 Bedrock Automation Platforms Inc. Secure power supply for an industrial control system
US10628361B2 (en) 2011-12-30 2020-04-21 Bedrock Automation Platforms Inc. Switch fabric having a serial communications interface and a parallel communications interface
US10824711B2 (en) 2013-08-06 2020-11-03 Bedrock Automation Platforms Inc. Secure industrial control system
US10834094B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Operator action authentication in an industrial control system
US10834820B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Industrial control system cable
US10832861B2 (en) 2011-12-30 2020-11-10 Bedrock Automation Platforms Inc. Electromagnetic connector for an industrial control system
US10848012B2 (en) 2011-12-30 2020-11-24 Bedrock Automation Platforms Inc. Electromagnetic connectors for an industrial control system
US10896145B2 (en) 2011-12-30 2021-01-19 Bedrock Automation Platforms Inc. Communications control system with a serial communications interface and a parallel communications interface
US11055246B2 (en) 2011-12-30 2021-07-06 Bedrock Automation Platforms Inc. Input-output module with multi-channel switching capability
US11144630B2 (en) 2011-12-30 2021-10-12 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US11314854B2 (en) 2011-12-30 2022-04-26 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
CN115766271A (en) * 2022-11-30 2023-03-07 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A network isolation device based on backward hash chain source authentication
US11967839B2 (en) 2011-12-30 2024-04-23 Analog Devices, Inc. Electromagnetic connector for an industrial control system
US11966349B2 (en) 2011-12-30 2024-04-23 Analog Devices, Inc. Electromagnetic connector for for an industrial control system
US11977622B2 (en) 2013-08-06 2024-05-07 Analog Devices, Inc. Authentication between industrial elements in an industrial control system
US12061685B2 (en) 2011-12-30 2024-08-13 Analog Devices, Inc. Image capture devices for a secure industrial control system
US12120819B2 (en) 2014-07-07 2024-10-15 Analog Devices, Inc. Industrial control system cable

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5708714A (en) * 1994-07-29 1998-01-13 Canon Kabushiki Kaisha Method for sharing secret information and performing certification in a communication system that has a plurality of information processing apparatuses
CN1252961C (en) * 2001-07-09 2006-04-19 中兴通讯股份有限公司 Method for authenticating group broadcast service
CN100341305C (en) * 2002-11-26 2007-10-03 华为技术有限公司 Multicast Control Method Based on 802.1X Protocol

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009003383A1 (en) * 2007-06-30 2009-01-08 Huawei Technologies Co., Ltd. Multicast method, network device and multicast system
CN101938741A (en) * 2009-06-30 2011-01-05 大唐移动通信设备有限公司 Method, system and device for mutual authentication
US11899604B2 (en) 2011-12-30 2024-02-13 Bedrock Automation Platforms Inc. Input/output module with multi-channel switching capability
US11314854B2 (en) 2011-12-30 2022-04-26 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US12061685B2 (en) 2011-12-30 2024-08-13 Analog Devices, Inc. Image capture devices for a secure industrial control system
US12019575B2 (en) 2011-12-30 2024-06-25 Analog Devices, Inc. Switch fabric having a serial communications interface and a parallel communications interface
US11966349B2 (en) 2011-12-30 2024-04-23 Analog Devices, Inc. Electromagnetic connector for for an industrial control system
US11967839B2 (en) 2011-12-30 2024-04-23 Analog Devices, Inc. Electromagnetic connector for an industrial control system
US11688549B2 (en) 2011-12-30 2023-06-27 Bedrock Automation Platforms Inc. Electromagnetic connector for an industrial control system
US10628361B2 (en) 2011-12-30 2020-04-21 Bedrock Automation Platforms Inc. Switch fabric having a serial communications interface and a parallel communications interface
US11658519B2 (en) 2011-12-30 2023-05-23 Bedrock Automation Platforms Inc. Electromagnetic connector for an Industrial Control System
US11055246B2 (en) 2011-12-30 2021-07-06 Bedrock Automation Platforms Inc. Input-output module with multi-channel switching capability
US11144630B2 (en) 2011-12-30 2021-10-12 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US11093427B2 (en) 2011-12-30 2021-08-17 Bedrock Automation Platforms Inc. Switch fabric having a serial communications interface and a parallel communications interface
US10832861B2 (en) 2011-12-30 2020-11-10 Bedrock Automation Platforms Inc. Electromagnetic connector for an industrial control system
US10848012B2 (en) 2011-12-30 2020-11-24 Bedrock Automation Platforms Inc. Electromagnetic connectors for an industrial control system
US10896145B2 (en) 2011-12-30 2021-01-19 Bedrock Automation Platforms Inc. Communications control system with a serial communications interface and a parallel communications interface
US10834094B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Operator action authentication in an industrial control system
US11700691B2 (en) 2013-08-06 2023-07-11 Bedrock Automation Platforms Inc. Industrial control system cable
US10834820B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Industrial control system cable
US12212577B2 (en) 2013-08-06 2025-01-28 Analog Devices, Inc. Operator action authentication in an industrial control system
US10824711B2 (en) 2013-08-06 2020-11-03 Bedrock Automation Platforms Inc. Secure industrial control system
US12164621B2 (en) 2013-08-06 2024-12-10 Analog Devices, Inc. Secure industrial control system
US11429710B2 (en) 2013-08-06 2022-08-30 Bedrock Automation Platforms, Inc. Secure industrial control system
US11537157B2 (en) 2013-08-06 2022-12-27 Bedrock Automation Platforms, Inc. Secure power supply for an industrial control system
US12032675B2 (en) 2013-08-06 2024-07-09 Analog Devices, Inc. Secure industrial control system
US11977622B2 (en) 2013-08-06 2024-05-07 Analog Devices, Inc. Authentication between industrial elements in an industrial control system
US10613567B2 (en) 2013-08-06 2020-04-07 Bedrock Automation Platforms Inc. Secure power supply for an industrial control system
US20210195742A1 (en) 2013-08-06 2021-06-24 Bedrock Automation Platforms Inc. Industrial control system cable
US11722495B2 (en) 2013-08-06 2023-08-08 Bedrock Automation Platforms Inc. Operator action authentication in an industrial control system
US11960312B2 (en) 2013-08-06 2024-04-16 Analog Devices, Inc. Secure power supply for an industrial control system
CN103618610A (en) * 2013-12-06 2014-03-05 上海千贯节能科技有限公司 Information safety algorithm based on energy information gateway in smart power grid
CN103618610B (en) * 2013-12-06 2018-09-28 上海上塔软件开发有限公司 A kind of information security algorithm based on energy information gateway in intelligent grid
CN105278327B (en) * 2014-07-07 2020-03-17 基岩自动化平台公司 Industrial control system redundant communication/control module authentication
CN110376990A (en) * 2014-07-07 2019-10-25 基岩自动化平台公司 Operator action certification in industrial control system
CN110376990B (en) * 2014-07-07 2022-07-15 基岩自动化平台公司 Safe industrial control system
CN105278327A (en) * 2014-07-07 2016-01-27 基岩自动化平台公司 Industrial control system redundant communications/control modules authentication
US12120819B2 (en) 2014-07-07 2024-10-15 Analog Devices, Inc. Industrial control system cable
CN104636681B (en) * 2014-12-19 2020-05-26 中国印钞造币总公司 Safe transmission method and device for banknote storage data
CN104636681A (en) * 2014-12-19 2015-05-20 中国印钞造币总公司 Security transmission method and device for banknote storage data
CN115766271A (en) * 2022-11-30 2023-03-07 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A network isolation device based on backward hash chain source authentication

Also Published As

Publication number Publication date
CN100393034C (en) 2008-06-04

Similar Documents

Publication Publication Date Title
CN1571335A (en) A source authentication method applied in multicast communication system
US11722305B2 (en) Password based threshold token generation
CN109347809B (en) Application virtualization secure communication method oriented to autonomous controllable environment
US8386790B2 (en) Method of using ECDSA with winternitz one time signature
US8447036B2 (en) Multi-party key agreement method using bilinear map and system therefor
CN111371730A (en) Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scene
US20100268943A1 (en) Method and System for Source Authentication in Group Communications
WO2008043289A1 (en) A key sharing method and corresponding system
CN101442522B (en) Identification authentication method for communication entity based on combined public key
Toorani et al. An elliptic curve-based signcryption scheme with forward secrecy
CN103415011B (en) Vehicular ad hoc network based on intelligent card security authentication method
CN110020524B (en) A Two-way Authentication Method Based on Smart Card
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN120200750B (en) Secure communication system and method for vehicle-mounted ad hoc networks based on NTRU lattice cryptography
Khan et al. Secure authentication and key management protocols for mobile multihop WiMAX networks
WO2023036348A1 (en) Encrypted communication method and apparatus, device, and storage medium
CN119011115A (en) Secure communication method and secure communication system based on Internet of things
CN115987519A (en) Blockchain intelligent collaborative authentication method for multi-user joint management
CN103051457A (en) Method for establishing safety communication of network groups
CN112055330A (en) V2X Internet of vehicles safety communication system and method based on 5G
CN1770681A (en) A method for securely distributing session keys in a wireless environment
CN114598533A (en) A blockchain side chain cross-chain identity trusted authentication and data encryption transmission method
CN1571407A (en) A safety authentication method based on media gateway control protocol
CN103200563B (en) A kind of subliminal channel anonymous communication method based on authentication code
Bergadano et al. Chained stream authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080604