Authentication method for remote vehicle control

A technology of identity authentication and vehicle control, applied in the field of identity authentication of remote vehicle control, can solve problems such as denial of service attacks, data delays, etc., and achieve the effect of reliable identity authentication and ensuring security

Active Publication Date: 2022-08-09
SECZONE TECH CO LTD +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because of its open communication environment, wireless communication allows any attacker to accept wireless signals, further analyze and monitor communication data through protocol, or cause data delay and denial of service attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for remote vehicle control
  • Authentication method for remote vehicle control
  • Authentication method for remote vehicle control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to explain the content, structural characteristics, the purpose and effect of the realization of the invention in detail, the following combines the implementation method and the attachment is described in detail.

[0040] See figure 1 and Figure 4 The present invention disclose a method of identity authentication for remote vehicle control, including the following steps:

[0041] S101, T -BOX management server 60 generates the first random challenge information and uses the pre -stored AES password to encrypt the first random challenge information and the obtained car information data.

[0042] S102, T -BOX management server 60 sends the encrypted first random challenge information and car information data to T -BOX 70.

[0043] S103, T -BOX 70 Decryage the first random challenge information and car information data through the pre -stored AES password, and match the car information data with the pre -stored car information data.

[0044] S104, if the matching is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method for remote vehicle control. The first random challenge information and car information data are sent to T-BOX; T-BOX decrypts the first random challenge information and car information data through AES password, and matches the car information data with the pre-stored car information data; if the matching is successful, T-BOX The BOX generates the TK key and the second random challenge information, encrypts the TK key and the second random challenge information together with the first random challenge information, and sends it to the T-BOX management server; Perform HMAC operation on the challenge information and send the operation result to T-BOX; T-BOX performs HMAC operation on the TK key and the second random challenge information and compares the operation result with the received operation result; if the comparison result is the same , the identity authentication of the T-BOX management server is passed.

Description

Technical field [0001] The invention involves the field of remote vehicle control technology, especially a method for identity authentication for remote vehicle control. Background technique [0002] With the development of information technology, the Internet of Vehicle has brought huge convenience while also bringing unprecedented safety challenges to cars and drivers. Especially in the current increasing information, the use of smart terminal devices to implement remote vehicle control has become more intense, and it has also driven corresponding technical services to become a reality. However, remote vehicles controlled by wireless network as a carrier have received great restrictions on the network itself. Compared with cable communication technology, wireless communication technology brings us great convenience, and also makes us face more severe security challenges. Due to its open communication environment, wireless communication allows any attacker to accept wireless sig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08H04L9/32H04L67/12
CPCH04L63/0435H04L63/0876H04L63/0807H04L63/0823H04L63/083H04L9/0643H04L9/0825H04L9/0869H04L9/3228H04L9/3268H04L9/3247H04L67/12
Inventor 万振华张海春
Owner SECZONE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products