Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and equipment, electronic equipment and storage medium

An authentication method and equipment technology, applied in the field of authentication, can solve the problems that the safety of vehicles and items in the vehicle cannot be guaranteed, and the PEPS system cannot resist relay attacks, so as to improve accuracy and security, and prevent relay attacks Effect

Inactive Publication Date: 2019-09-10
上海银基信息安全技术股份有限公司
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventors have found that there are at least the following problems in the prior art: the current PEPS system on the market cannot resist relay attacks (Relay Attacks)
Due to the relaying of one or more relaying devices, when the distance between the key and the vehicle is very far (exceeding the preset distance), the electronic control unit of the vehicle will receive a message sent by a relaying device that corresponds to the vehicle The data of the signal strength required for authentication, and then the relay device can open the door, so that the safety of the vehicle and the contents of the vehicle cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and equipment, electronic equipment and storage medium
  • Authentication method and equipment, electronic equipment and storage medium
  • Authentication method and equipment, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized.

[0024] The terms "first", "second" and the like in the description and drawings of the present invention are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention relate to the field of authentication, and disclose an authentication method and equipment, electronic equipment and a storage medium. In the authentication method andequipment, the electronic equipment and the storage medium, the authentication method includes the steps that a first distance is acquired, and the first distance is a distance between first equipment and equipment which directly transmits a first authentication request to the first equipment, wherein the first authentication request is originally generated and sent by second equipment; a seconddistance is acquired, and the second distance is a distance between the second equipment and equipment which directly transmits a second authentication request to the second equipment, wherein the second authentication request is originally generated and sent by the first equipment; and according to the first distance and the second distance, whether the authentication is successful or not is determined. Bidirectional positioning is carried out through the first equipment and the second equipment, the first distance is compared with the second distance, according to the comparison result, whether the authentication is successful or not is determined, the security of the first equipment is ensured, and the relay attack is effectively prevented.

Description

technical field [0001] The embodiments of the present invention relate to the field of authentication, and in particular to an authentication method, authentication equipment, electronic equipment, and storage media. Background technique [0002] In recent years, a keyless entry and start (Passive Entry Passive Start, PEPS) system has been widely used. The PEPS system means that when the distance between the key carried by the user and the vehicle meets the preset distance, the vehicle will be automatically unlocked without the user actively performing an unlocking operation. [0003] The inventors have found at least the following problems in the prior art: the current PEPS systems on the market cannot defend against relay attacks (Relay Attacks). When a vehicle equipped with the PEPS system encounters a relay attack, any data sent by the vehicle's electronic control unit to the key will be forwarded to the key via one or more relay devices; at the same time, the data sent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04W12/00H04W12/06H04W12/63
CPCG07C9/00658H04W12/06G07C2209/64H04W12/63
Inventor 余晓飞徐前刘恒健仇兆峰韩毅单宏寅
Owner 上海银基信息安全技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products