Unlock instant, AI-driven research and patent intelligence for your innovation.

Credible authentication method and system for mobile terminal equipment based on Internet of Vehicles

A technology for mobile terminals and Internet of Vehicles, which is applied in transmission systems, digital transmission systems, climate sustainability, etc., and can solve problems such as the difficulty of mobile device certification.

Active Publication Date: 2021-03-12
广西南宁市卓创信息技术有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem that mobile device authentication is difficult in the Internet of Vehicles system, the present invention proposes a trusted authentication method and system for mobile terminal devices based on Internet of Vehicles, which separates the mobile terminal and the server layer by using blockchain nodes to prevent Illegal wiretapping and attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible authentication method and system for mobile terminal equipment based on Internet of Vehicles
  • Credible authentication method and system for mobile terminal equipment based on Internet of Vehicles

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0064] Such as figure 1 As shown, a mobile terminal-based trusted authentication system model includes the following contents.

[0065] Step 1: Model parameter initialization work.

[0066] Including the Internet of Vehicles system, the need for on-board equipment or mobile terminals ID , shared key K , the maximum delay allowed for transmission t max , and true ID Corresponding network transport flag tag and other information, as well as the server-side and mobile terminal time stamps for initial synchronization to ensure the consistency of time stamps.

[0067] Step 2: The cloud server in the Internet of Vehicles system builds a blockchain node layer based on the current system load, and provides the blockchain node layer with external Internet access functions, thereby hiding the service layer and cloud server nodes in the bottom layer of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credible authentication method and system for mobile terminal equipment based on Internet of Vehicles, and the method provides a safe and reliable credible authentication method for an Internet of Vehicles mobile terminal user in a complex network environment on the basis of an encryption algorithm. Due to the fact that a mobile terminal user has good portability, the situation that the user receives or sends messages through a mobile terminal to control a vehicle becomes a trend. Moreover, the manufacturing of the mobile terminal equipment is not provided by an Internet of Vehicles service provider, the mobile terminal software provided by the service provider also has the risk of third-party attack, and the data in a communication channel is also likely to be tampered, so that the security of the mobile terminal equipment cannot be guaranteed, especially on the aspect of equipment authentication. Therefore, the invention provides a solution for credible authentication of the mobile terminal equipment based on the Internet of Vehicles, a credible encryption authentication channel is established between the mobile terminal equipment and a server, safe information transmission of the credible mobile terminal is realized, and finally, the security of the whole Internet of Vehicles system is guaranteed.

Description

technical field [0001] The invention relates to a trusted authentication method and system for mobile terminal equipment based on Internet of Vehicles. Background technique [0002] With the popularization of mobile communication technology, more and more users rely on mobile terminal applications for information interaction, especially in the field of Internet of Vehicles. Users can use mobile terminal equipment to view vehicle information and status in real time, and send instructions to operate the vehicle in real time. However, mobile terminals are third-party devices, and IoV service providers cannot accurately identify whether the device is trustworthy, whether the client software has suffered illegal intrusion, and whether the device information has been tampered with. Therefore, how to effectively provide a credible authentication for the Internet of Vehicles has become one of the key issues in solving the security of the Internet of Vehicles. [0003] Although the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08H04L29/08
CPCH04L9/302H04L9/085H04L9/0869H04L67/12H04L9/50Y02D30/70
Inventor 程文志欧嵬刘志壮张文昭吴耿潘晴云
Owner 广西南宁市卓创信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More