Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed key management system applied to urban rail transit

A technology of urban rail transit and key management system, applied in the direction of public key, transmission system, digital transmission system, etc. Aggressive behavior, the effect of reducing losses

Active Publication Date: 2020-11-27
BEIJING JIAOTONG UNIV
View PDF10 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this kind of authentication method has too much trust in the authentication center, which also has potential security risks that cannot be ignored.
[0005] In the existing technology, the centralized certification system has given too many rights to the central organization, but the responsibilities and obligations required by the central organization may not be fulfilled
The third-party certification agency cannot make all the operation records public, and users cannot achieve complete trust in the agency
This simple identification method cannot prevent identity masquerading. When the attacker forges the same identity, the receiver cannot distinguish the behavior, so there are certain security risks.
[0009] 2) Centralized key management is sensitive to single point of failure
This method can effectively solve the security problems caused by masquerading, but the key management scheme of the protocol uses a unified key management server to manage the keys, which brings other security risks
[0011] Centralized key management is used as a traditional management mode in various fields including rail transit, but in this mode, a single point of failure or attack on the central server will have a serious impact
Under the centralized key management mode, if the key management server is attacked and the key is leaked, all keys in the entire system will be exposed to the attacker’s view, so the security of the entire system will face a huge threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed key management system applied to urban rail transit
  • Distributed key management system applied to urban rail transit
  • Distributed key management system applied to urban rail transit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0035] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0036] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the description.

[0037]In all examples shown and discussed herein, any specific values ​​should be construed as exemplary only, and not as limitations. Therefore, other instances of the exemplary embodiment may have diff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed key management system applied to urban rail transit. The system comprises a block chain network composed of a plurality of block chain nodes and a plurality of train operation control subsystems, each train operation control subsystem is configured to be connected with one block chain node; for the train operation control subsystems connected with the block chain nodes, the block chain nodes connected with the train operation control subsystems realize communication with other external train operation control subsystems and realize signature and authentication of communication data packets among the train operation control subsystems. According to the invention, a distributed secret key management mechanism of the urban rail transit is realized, and the safety and the anti-attack capability of an urban rail transit control system are improved.

Description

technical field [0001] The invention relates to the technical field of electrified transportation, and more specifically, to a distributed key management system applied to urban rail transit. Background technique [0002] The urban rail transit system is a public transportation tool with large capacity and high density, and its safety and efficiency directly meet the travel needs of the majority of passengers. In order to ensure the safe and efficient operation of the urban rail transit system, the train operation control system (or train control system for short) came into being. The train operation control system can ensure the operation efficiency and safety of the train. It determines the speed and direction of the safe travel of the train, ensures the safe driving interval between the trains, and improves the train operation under the premise of ensuring the safety of the train. efficiency. The traditional train operation control system is implemented based on track c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/30H04L29/06G06Q40/04
CPCH04L9/0894H04L9/0819H04L9/3247H04L9/30H04L63/0442H04L63/1441G06Q40/04H04L9/50
Inventor 朱力熊寒唐涛赵红礼
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products