A vehicle system reverse authentication management device and management method
A management device and vehicle system technology, which is applied in the field of vehicle system reverse authentication management device and management, can solve the problems of poor security, easy copying of vehicle identity information, management lag, etc., and achieve the effect of improving safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] Such as figure 1 As shown, a management device for reverse authentication of a vehicle system includes a server, a switch, and more than one sub-processing unit; the server is connected to each of the sub-processing units through the switch it belongs to. Such as figure 2 As shown, the sub-processing unit includes an identification device, an acquisition device, a processing device, and a voice alarm device; the identification device is installed in the cab, and includes a first safe storage module that supports an encryption algorithm, and the first safe storage module stores The information includes an independent authentication key KEY', an application key KEY, and identification information Ci, and the first secure storage module can generate a random number R; the acquisition device includes a second secure storage module that supports an encryption algorithm, and the first secure storage module The independent authentication key KEY' and the application key KEY ...
Embodiment 2
[0050] Such as image 3 As shown, a management method using the management device of the reverse authentication of the vehicle system is composed of the following specific steps:
[0051] Step 1: Activation of the identification device: the acquisition device sends activation information for activating the identification device in real time; the identification device is in an activated state after receiving the activation information;
[0052] Step 2: If Figure 4 As shown, blacklist verification: consists of the following sub-steps:
[0053] Step 2-1: The identification device in the activated state sends the independent authentication key KEY', identification information Ci and random number R stored in the first secure storage module to the acquisition device;
[0054] Step 2-2: the collection device forwards the received identification information Ci to the processing device;
[0055] Step 2-3: The processing device judges whether the identification information Ci is bl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


