Message generation and authentication methods and equipment in Internet-of-vehicles system

A technology of Internet of Vehicles and vehicle equipment, applied in the field of communication, can solve problems such as lack of clear technical solutions and inability to obtain private information

Active Publication Date: 2016-01-13
DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in order to protect user privacy, that is, to prevent the vehicle from being tracked by listening to the message broadcast by the vehicle (such as a special vehicle), the message certificate should use anonymous technology so that th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message generation and authentication methods and equipment in Internet-of-vehicles system
  • Message generation and authentication methods and equipment in Internet-of-vehicles system
  • Message generation and authentication methods and equipment in Internet-of-vehicles system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0195] Embodiment 1. This embodiment is mainly used to describe the issuance process of the encrypted public key certificate of BCC, as follows:

[0196]1. BCC generates a key pair for asymmetric encryption and decryption: [BCC-Public-Key, BCC-Private-Key], where BCC-Public-Key is the public key used for encryption, and BCC-Private-Key is the The private key used for decryption; BCC generates a key pair [BCC-Public-Key-S, BCC-Private-Key-S] for applying for a certificate, where BCC-Public-Key-S is the public key used to verify the digital signature key, BCC-Private-Key-S is the private key used for digital signature.

[0197] 2. BCC keeps the privacy of its private key BCC-Private-Key and BCC-Private-Key-S, and uses BCC-Public-Key and BCC-Public-Key-S to apply for an encrypted public key certificate from CA, that is, The encryption public key certificate contains the encryption public key used for data encryption.

[0198] 3. CA issues to BCC an encrypted public key certific...

Embodiment 2

[0200] Embodiment 2. This embodiment is mainly used to describe the publishing process of the encrypted public key of BCC, as follows:

[0201] 1. BCC generates a key pair [BCC-Public-Key-S, BCC-Private-Key-S] for applying for a signed public key certificate, where BCC-Public-Key-S is the public key used to verify the digital signature , BCC-Private-Key-S is the private key used for digital signature.

[0202] 2. BCC keeps the privacy of its private key BCC-Private-Key-S, and uses BCC-Public-Key-S to apply for a signed public key certificate from CA.

[0203] 3. CA issues a signed public key certificate to BCC: BCC-SCert.

[0204] 4. BCC uses the signature message to correctly write the encrypted public key BCC-Public-Key into the OBU, and endows the encrypted public key with an identifier BCC-EPK that uniquely identifies the encrypted public key. BCC may write multiple different encryption public keys into OBU, and stipulate how to use these encryption public keys.

Embodiment 3

[0205] Embodiment 3. This embodiment is mainly used to describe the issuance process of the signature public key certificate of the OBU, as follows:

[0206] 1. OBU-X generates a key pair for digital signature: [OBUX-Public-Key, OBUX-Private-Key], where OBUX-Public-Key is the public key used to verify the digital signature, and OBUX-Private-Key is the private key used for digital signatures.

[0207] 2. OBU-X keeps the privacy of its private key OBUX-Private-Key, and uses OBUX-Public-Key to apply for a signed public key certificate from CA.

[0208] 3. CA issues a signed public key certificate to OBU-X: OBUX-SCert.

[0209] 4. BCC saves OBUX-SCert, so OBU-X does not need to carry the signature public key certificate used to verify the digital signature in its broadcast message, but only provides the identification of the signature public key certificate.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses message generation and authentication methods and equipment in an Internet-of-vehicles system. The message generation method comprises the steps as follows: an OBU (On-Board Unit) uses a private key corresponding to a signed public key in a signed public key certificate applied by the OBU to digitally sign first information including message plaintext to obtain a digital signature value; the OBU uses an acquired encrypted public key of a BCC (Background Control Center) to encrypt second information of the digital signature value to obtain a message ciphertext; and the OBU generates a message needing broadcasting according to third information including the message ciphertext, and sends the generated message. As the OBU uses the acquired encrypted public key of the BCC to encrypt the second information of the digital signature value to obtain the message ciphertext, a private key corresponding to the encrypted public key is needed to decrypt the message ciphertext. Therefore, other OBUs cannot decrypt the message ciphertext when receiving the message, and the private information of a vehicle where the message sending OBU is located is protected.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for generating and verifying messages in a vehicle networking system. Background technique [0002] The main application purpose of Internet of Vehicles technology is to reduce the occurrence of traffic accidents. The Internet of Vehicles system is mainly composed of on-board equipment (On-BoardUnit, OBU) installed on the vehicle, roadside equipment (RoadSideUnit, RSU) installed on the roadside, and background control center (BackgroundControlCentre, BCC). Dedicated Short Range Communication (DSRC) technology is used between OBUs and between OBUs and RSUs. In the Internet of Vehicles system, the on-board equipment monitors the vehicle's location and driving information and broadcasts the information to surrounding vehicles, and the vehicle will also receive information from other vehicles. OBU will analyze the driving information of the vehicle and ot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04W12/03H04W12/041H04W12/069
Inventor 周巍
Owner DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products