Unlock instant, AI-driven research and patent intelligence for your innovation.

Automobile electronic identification and V2X authentication combined method

A technology for automotive electronic identification and vehicle identification, which is applied in the field of combining automotive electronic identification and V2X authentication, and can solve problems such as tampering, potential safety hazards, forgery, etc.

Active Publication Date: 2021-04-30
ZTE INTELLIGENT IOT TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The safety certification process of the existing technology is complicated, different certification processes are used for the on-board units that require privacy protection and non-privacy protection, and the certification system architecture is different, and those that require privacy protection The vehicle-mounted unit adopts the KPI (Public Key Infrastructure) certification system architecture, and the non-privacy-protected vehicle-mounted unit adopts the IBC (Identity-Based Cryptograph) certification system framework. The identity authentication system and method of vehicle-road coordination, although the authentication method integrates the existing KPI system and IBC technology, makes the authentication based on IBC technology as a whole, uses the security module embedded in the device to generate a public-private key pair, and uses the private key Sign the car electronic identification card number, and then apply to the CA certification body
Although the authentication process has been simplified to a certain extent, the overall authentication process is still cumbersome and prone to security risks, such as:
[0005] 1. The device uses its own generated key to sign KH1, which is not credible;
[0006]Second, the KH2 read by the radio frequency reading and writing device has the risk of tampering during transmission to the vehicle-mounted unit. To sign, there is a possibility of forgery, that is, use KH1 to replace KH2 and then sign
[0007] To sum up, the CA authentication request of the vehicle-mounted unit in the prior art is untrustworthy, and the security certificate of the obtained V2X device does not have the uniqueness of security verification , and the overall certification process is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automobile electronic identification and V2X authentication combined method
  • Automobile electronic identification and V2X authentication combined method
  • Automobile electronic identification and V2X authentication combined method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention. As used herein, the term "and / or" includes any and all combinations of one or more of the ass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of V2X authentication, and discloses an automobile electronic identifier and V2X authentication combined method. The method comprises the steps of S1, obtaining a unique vehicle identifier; S2, applying for a registration certificate of the vehicle-mounted unit by using the unique vehicle identifier; S3, applying for a security certificate corresponding to the V2X device by using the registration certificate. According to the invention, the automobile electronic identifier is used as the unique identifier of the vehicle-mounted unit for applying for the security certificate, so that the credibility and reliability of the V2X data are ensured, the overall application process is simple, and the vehicle network equipment has a safe and reliable communication mode.

Description

technical field [0001] The invention relates to the technical field of V2X authentication, in particular to a method for combining automotive electronic identification and V2X authentication. Background technique [0002] Vehicle-road coordination is the latest development direction of intelligent transportation system, which adopts advanced wireless communication and new-generation Internet technologies. In the V2X business, the secure communication of the V2X communication system is handled by the application layer, which is responsible for certificate application, certificate storage, secret key management, message signature and signature verification and other functions. [0003] In V2X business, V2X devices exchange data information through Uu port or PC5 interface to realize important data exchange in various application scenarios. Communication security is very important. Only safe and reliable data information can achieve safe, efficient, and improved performance. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/40H04L29/06H04L9/32H04L29/08
CPCH04W4/40H04L63/0823H04L63/0807H04L9/3263H04L9/3247H04L67/12
Inventor 宋菲
Owner ZTE INTELLIGENT IOT TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More