Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device and medium

A technology for identity authentication and terminal identity, which is applied in user identity/authority verification, secure communication devices, digital transmission systems, etc., and can solve the problems of weak security of identity authentication methods.

Active Publication Date: 2019-02-19
上海银基信息安全技术股份有限公司
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an identity authentication method, device and medium, which solves the problem that the security of the identity authentication method in the prior art is relatively weak, so as to effectively protect user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device and medium
  • Identity authentication method and device and medium
  • Identity authentication method and device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It is a flow chart of the identity authentication method provided by Embodiment 1 of the present invention. The technical solution of this embodiment is applicable to the situation where the vehicle terminal verifies the identity of the terminal. The method can be executed by the identity authentication device provided in the embodiment of the present invention, and the device can be implemented in the form of software and / or hardware, and configured to be applied in a processor. The method specifically includes the following steps:

[0030] S101. Receive the digital key sent by the terminal, where the digital key includes vehicle information and terminal identity information.

[0031] If the terminal wants to control the vehicle through the digital key, it usually needs to send the digital key to the vehicle so that the vehicle can verify it. The digital key in this embodiment includes vehicle terminal information and terminal identity information, wherein ...

Embodiment 2

[0047] image 3 It is a structural block diagram of the identity authentication device provided by Embodiment 2 of the present invention. The device is used to execute the identity authentication method provided by any of the above embodiments, and the device may be implemented by software or hardware. The unit includes:

[0048] The car end receiving module 11 is used to receive the digital key, and the digital key includes car end information and terminal identity information;

[0049] Car end calculation module 12, for calculating the hash value of described car end information and terminal identity information;

[0050] The vehicle-side output module 13 is configured to output permission control information if the hash value is in the white list.

[0051] Among them, the car-side information includes car-side identity information and random numbers, and the digital key is the master digital key or the shared digital key.

[0052] The calculation module at the vehicle e...

Embodiment 3

[0058] Figure 4 It is a flow chart of the identity authentication method provided by Embodiment 3 of the present invention. The technical solution of this embodiment is applicable to the situation that the vehicle terminal verifies the identity of the terminal, and is applied to the terminal of the vehicle-machine system composed of the server, the terminal and the vehicle. The method can be executed by the identity authentication device provided in the embodiment of the present invention, and the device can be implemented in the form of software and / or hardware, and configured to be applied in a processor. The method specifically includes the following steps:

[0059] S201. Send a digital key to the vehicle terminal, where the digital key includes vehicle terminal information and terminal identity information.

[0060] If the terminal wants to control the vehicle through the digital key, it usually needs to send the digital key to the vehicle so that the vehicle can verify...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identity authentication method and device and a medium. The method is applied to a vehicle of a system composed of a server, a terminal and the vehicle, and comprises the following steps: receiving a digital key sent by the terminal, wherein the digital key comprises vehicle end information and terminal identity information; calculating harsh values ofthe vehicle end information and the terminal identity information; and if the harsh value is in a white list, outputting allowable control information. The problem that the identity authentication method in the prior art is relatively low in security is solved, and a technical effect of effectively protecting user information is achieved.

Description

technical field [0001] The embodiments of the present invention relate to the field of vehicle control, in particular to an identity authentication method, device and medium. Background technique [0002] With the rapid development of science and technology, technologies such as car sharing and driverless driving have brought great convenience to our lives. However, technologies such as car sharing and driverless driving are all based on the Internet of Vehicles. While intelligence brings us convenience, it also faces system security issues brought about by smart cars. The Internet of Vehicles takes "two ends and one cloud" as the main body, supplemented by roadbed facilities, including intelligent networked vehicles, mobile smart terminals, and Internet of Vehicles service platforms, etc., involving vehicle-cloud communication, vehicle-vehicle communication, vehicle-human communication, In the five communication scenarios of vehicle-road communication and in-vehicle commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3236H04L63/0876H04L63/101H04L67/12Y04S40/20
Inventor 李飞吕晓建仇兆峰韩毅单宏寅
Owner 上海银基信息安全技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products