Identity authentication method, device and medium

An identity authentication and terminal identity technology, applied in the direction of user identity/authority verification, secure communication devices, digital transmission systems, etc., can solve the problems of weak security of identity authentication methods, and achieve easy identity authentication, prevent leakage, and high security. Effect

Active Publication Date: 2021-04-27
上海银基信息安全技术股份有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an identity authentication method, device and medium, which solves the problem that the security of the identity authentication method in the prior art is relatively weak, so as to effectively protect user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and medium
  • Identity authentication method, device and medium
  • Identity authentication method, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It is a flow chart of the identity authentication method provided by Embodiment 1 of the present invention. The technical solution of this embodiment is applicable to the situation where the vehicle terminal verifies the identity of the terminal. The method can be executed by the identity authentication device provided in the embodiment of the present invention, and the device can be implemented in the form of software and / or hardware, and configured to be applied in a processor. The method specifically includes the following steps:

[0030] S101. Receive the digital key sent by the terminal, where the digital key includes vehicle information and terminal identity information.

[0031] If the terminal wants to control the vehicle through the digital key, it usually needs to send the digital key to the vehicle so that the vehicle can verify it. The digital key in this embodiment includes vehicle terminal information and terminal identity information, wherein ...

Embodiment 2

[0047] image 3 It is a structural block diagram of the identity authentication device provided by Embodiment 2 of the present invention. The device is used to execute the identity authentication method provided by any of the above embodiments, and the device may be implemented by software or hardware. The unit includes:

[0048] The car end receiving module 11 is used to receive the digital key, and the digital key includes car end information and terminal identity information;

[0049] Car end calculation module 12, for calculating the hash value of described car end information and terminal identity information;

[0050] The vehicle-side output module 13 is configured to output permission control information if the hash value is in the white list.

[0051] Among them, the car-side information includes car-side identity information and random numbers, and the digital key is the master digital key or the shared digital key.

[0052] The calculation module at the vehicle e...

Embodiment 3

[0058] Figure 4 It is a flow chart of the identity authentication method provided by Embodiment 3 of the present invention. The technical solution of this embodiment is applicable to the situation that the vehicle terminal verifies the identity of the terminal, and is applied to the terminal of the vehicle-machine system composed of the server, the terminal and the vehicle. The method can be executed by the identity authentication device provided in the embodiment of the present invention, and the device can be implemented in the form of software and / or hardware, and configured to be applied in a processor. The method specifically includes the following steps:

[0059] S201. Send a digital key to the vehicle terminal, where the digital key includes vehicle terminal information and terminal identity information.

[0060] If the terminal wants to control the vehicle through the digital key, it usually needs to send the digital key to the vehicle so that the vehicle can verify...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the present invention disclose an identity authentication method, device and medium. The method is applied to a vehicle in a system composed of a server, a terminal and a vehicle, including: receiving a digital key sent by the terminal, where the digital key includes vehicle terminal information and terminal identity information; calculate the hash value of the vehicle terminal information and the terminal identity information; if the hash value is in the white list, output the permission control information. The problem that the security of the identity authentication method in the prior art is relatively weak is solved, and the technical effect of effectively protecting user information is achieved.

Description

technical field [0001] The embodiments of the present invention relate to the field of vehicle control, in particular to an identity authentication method, device and medium. Background technique [0002] With the rapid development of science and technology, technologies such as car sharing and driverless driving have brought great convenience to our lives. However, technologies such as car sharing and driverless driving are all based on the Internet of Vehicles. While intelligence brings us convenience, it also faces system security issues brought about by smart cars. The Internet of Vehicles takes "two ends and one cloud" as the main body, supplemented by roadbed facilities, including intelligent networked vehicles, mobile smart terminals, and Internet of Vehicles service platforms, etc., involving vehicle-cloud communication, vehicle-vehicle communication, vehicle-human communication, In the five communication scenarios of vehicle-road communication and in-vehicle commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3236H04L63/0876H04L63/101H04L67/12Y04S40/20
Inventor 李飞吕晓建仇兆峰韩毅单宏寅
Owner 上海银基信息安全技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products