Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method and device and electronic equipment

A security authentication and verification terminal technology, applied in the field of devices and electronic equipment, and security authentication methods, can solve problems such as incompatibility with LIN bus, CAN bus communication scenarios, and high data transmission rate requirements, so as to reduce encryption and decryption behavior and improve delay Experience and reduce the effect of the interactive process

Active Publication Date: 2020-07-17
GEELY AUTOMOBILE INST NINGBO CO LTD +1
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing security authentication mechanism requires multiple two-way interactive key negotiations, and has high requirements for the bus data transmission rate of NFC-Reader and NFC-Controlle, which is difficult to be compatible with the communication scenarios of LIN bus and CAN bus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and device and electronic equipment
  • Security authentication method and device and electronic equipment
  • Security authentication method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046]It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrated...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method and apparatus, and an electronic device. The method comprises the steps of sending a verification request to a verification terminal; receivinga first data packet and obtaining third preset data, fourth preset data, second time data, a control instruction and fifth preset data, wherein the first data packet is determined by the verificationend in response to the verification request; generating a key according to the third preset data, the fourth preset data, the second time data and the first data packet; encrypting the control instruction and fifth preset data according to the key to generate first encrypted data; sending the first encrypted data to a verification end, so that the verification end sends the control instruction and fifth preset data to an execution end, and the execution end executes the control instruction according to the following method: judging whether the fifth preset data is the same as the built-in preset data or not; and if so, executing the control instruction. According to the invention, the interaction process can be reduced, the time delay experience is improved, and the risk of malicious power consumption caused by NFC-Key encryption and decryption behaviors triggered by fake messages of the card reader is reduced.

Description

technical field [0001] The invention relates to the technical field of information security authentication, in particular to a security authentication method, device and electronic equipment. Background technique [0002] NFC (Near Field Communication, Near Field Communication) key is a basic application of the Internet of Vehicles, responsible for key functions such as car door opening and closing, engine starting, etc. The security authentication of the requesting end usually requires the participation of four types of components, namely, the requesting end (marked as NFC-Key), the car-side NFC card reader (marked as NFC-Reader), the car-side NFC controller (marked as NFC-Controlle), Body controller (denoted as Central-Controller). [0003] The NFC-Key and NFC-Reader exchange information, and the NFC-Controlle is responsible for mutual security authentication with the NFC-Key, and finally transmits the sensitive information of the requesting end to the Central-Controller ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/40H04W4/80H04W12/00H04W12/04H04W12/06
CPCH04W4/40H04W4/80H04W12/009H04W12/06H04W12/47H04W12/03H04W12/041Y02D30/70H04W12/122H04W12/108H04W12/069H04W12/033Y04S40/20H04L63/0428
Inventor 潘蓝兰赵小磊郑士岑
Owner GEELY AUTOMOBILE INST NINGBO CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products