Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method of electric automobile

An electric vehicle and access authentication technology, which is applied to electrical components, transmission systems, etc., can solve problems such as inability to support efficient access authentication and high computing costs

Active Publication Date: 2016-03-30
STATE GRID CORP OF CHINA +2
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of these methods require bilinear pairing operations, and the signatures must be verified one by one. The calculation cost is high, and efficient access authentication cannot be supported.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method of electric automobile
  • Access authentication method of electric automobile
  • Access authentication method of electric automobile

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] The invention of this example is an access authentication method for an electric vehicle, the method comprising the following steps:

[0074] Given the initial registration process of electric vehicles (EV) and charging stations (CS) in the data center (DC), that is, system establishment, such as figure 1 Shown:

[0075] (1) DC is a trusted third party, which plays the role of private key generation center and runs identity aggregation signing

[0076] The initialization algorithm in the name is responsible for the management of the private key:

[0077] ·DC generates system parameters params and master secret key msk;

[0078] ·DC keeps msk secretly;

[0079] ·DC announces params, and its identity information ID DC bound.

[0080] (2) The EV needs to register with the data center initially, and the process is as follows:

[0081] EV submits its own identity information ID to DC EV ;

[0082] ·DC inspection ID EV The legitimacy of the DC runs the private key ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access authentication method of electric automobiles. The method comprises the following steps that: access authentication systems of the electric automobiles are established; access authentication between the electric automobiles and a charging station is carried out; and the charging station carries out batch signature authentication on the electric automobiles. According to the invention, identity aggregate signatures are introduced into identity validity inspection of the electric automobiles, and bidirectional authentication and session key negotiation are designed between the electric automobiles and the access authentication systems, so that the reasonable usage of the information resources in the station is ensured, and the safety of the whole network system is fundamentally ensured. The batch signature authentication mechanism enables the charging station to verify a plurality of electric automobile terminal signatures in the aggregate manner, the calculation load is lightened, and the performance is improved. The typical identity aggregate signature system is composed of five algorithms: system initialization, private key generation, signing, aggregation and aggregate verification, user identity information can be used to replace a public key thereof, the problem of high certificate cost is solved, and by compressing the plurality signatures into one, the high-efficiency verification is carried out.

Description

Technical field: [0001] The invention relates to an access authentication method of an electric vehicle, and more particularly relates to an access authentication method of an electric vehicle based on an identity aggregation signature. Background technique: [0002] As an important part of the smart grid, electric vehicles have received great attention due to their characteristics of mobile energy storage, energy saving, environmental protection, and cost reduction, and are predicted to be the future of the world's automobile industry. However, severe security challenges also follow, especially the operation service platform relying on the Internet of Things technology makes electric vehicles face a more complex network environment, and are vulnerable to various adversary attacks, such as information tampering and message theft. , replay attacks, forgery attacks, etc., resulting in immeasurable economic losses, seriously restricting the long-term development and application...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 刘贺张波赵婷李焕梁潇王宇飞李怡康
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products