Free stream trading system and free stream trading method for guaranteeing information security of on-board tag

A technology of information security and on-board tags, which is applied in transmission systems, electrical components, instruments, etc., can solve problems such as illegal use of on-board tags, and achieve the effect of ensuring information security

Inactive Publication Date: 2015-03-04
ZTE INTELLIGENT IOT TECH
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The problem to be solved by the invention is the illegal use of vehicle tags in free flow applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Free stream trading system and free stream trading method for guaranteeing information security of on-board tag
  • Free stream trading system and free stream trading method for guaranteeing information security of on-board tag
  • Free stream trading system and free stream trading method for guaranteeing information security of on-board tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The invention provides a free flow transaction system and method for ensuring the security of vehicle label information.

[0043] like figure 1 As shown, a free flow transaction method to ensure the security of vehicle label information includes the following steps:

[0044] S1. The roadside unit RSU2 allocates a dedicated uplink window to the on-board unit OBU1;

[0045] S2. OBU1 and RSU2 two-way authentication and transaction;

[0046] S3. RSU2 releases the link with OBU1.

[0047] S1 includes the following steps:

[0048] S11. If the OBU1 is used for the first time, the OBU security module 12 on the OBU1 uses the OBU key 11 to encrypt the identification information containing the OBU1 unique identifier OBUID and a group of random numbers to generate ciphertext;

[0049] S12.RSU2 sends broadcast signaling;

[0050] S13. After receiving the broadcast instruction from the RSU2, the OBU1 uploads the dedicated window request signaling carrying the ciphertext to the R...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a free stream trading method for guaranteeing the information security of an on-board tag. The free stream trading method comprises the following steps: S1, distributing a special upstream window to an on-board unit (OBU) by a road side unit (RSU); S2, carrying out bidirectional authentication and trading by the OBU and the RSU; S3, releasing links by the RSU and the OBU. A free stream trading system for guaranteeing the information security of the on-board tag comprises the RSU configured with an RSU secret key and the OBU configured with an OBU secret key; the RSU comprises an RSU security module, and the OBU comprises an OBU security module. The free stream trading system has the advantages and benefits that the information security of the on-board tag is effectively guaranteed in a free stream application, and thus the OBU is not illegally accessed to steal user information.

Description

technical field [0001] The invention relates to the technical field of information security in a multi-lane free flow non-stop charging system. More specifically, the identity OBUID reported by the vehicle tag is encrypted through software encryption and identity authentication. The reader needs to be authorized to recognize the correct tag identity and continue to interact with the tag to prevent The method by which tags are illegally identified and used. Background technique [0002] With the advancement of ETC national networking, ETC applications are becoming more and more accepted by people. More and more car owners begin to use ETC vehicle tags to experience the convenient travel experience brought by ETC. According to statistics, by 2015, ETC users will exceed 20 million. With the expansion of the scale of ETC, the expansion and application of ETC has become a hot spot that people pay attention to. ETC is mainly positioned in high-speed traffic. How to use existin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07B15/06H04L29/06
CPCG07B15/063H04L63/06H04L63/08
Inventor 陈冬
Owner ZTE INTELLIGENT IOT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products