Mutual trust cluster cooperative verification method for Internet of vehicles anonymous authentication
An anonymous authentication and collaborative verification technology, which is applied in the field of security authentication and privacy protection of vehicle ad hoc networks, can solve the problem of large vehicle space
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The present invention is realized in the following ways. First, relevant information is added to the puzzle design according to the real-time driving situation of the vehicle, so as to limit attackers from constructing hash puzzles in advance. Second, in the certificate issuance stage, the mutual trust cluster collaborative verification is used to integrate computing resources between legal vehicles, which improves the efficiency of certificate verification.
[0046] 1. Puzzle Design
[0047] The classic hash puzzle consists of two parts, namely the message and the puzzle. The value of the answer is evaluated by the length of the binary string obtained after hash mapping with all zeros. That is, it is assumed that
[0048]
[0049] Based on the one-way nature of the hash operation, the possibility of using the construction method to generate a puzzle that meets this condition is negligible, that is, it is assumed that the vehicle can only rely on parameter traversal ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com