Security authentication method and system
A security authentication and security module technology, applied in the field of information security, can solve problems such as user economic losses, poor user experience, and hidden safety hazards, and achieve the effects of reducing the risk of economic losses, ensuring transaction security, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] This embodiment provides a safety authentication method, which is applied to a safety authentication system including a roadside unit and a vehicle-mounted unit, where the roadside unit includes a roadside main control module, and the vehicle-mounted unit includes a vehicle-mounted main control module and a vehicle-mounted security module, such as figure 1 As shown, the methods specifically include:
[0060] Step S0: the vehicle-mounted main control module receives the message of performing authentication from the roadside main control module;
[0061] Step S1: The vehicle-mounted main control module obtains the first random number ciphertext from the vehicle-mounted security module, and obtains the second random number ciphertext from the roadside main control module;
[0062] Step S2: The on-board main control module judges whether the first random number ciphertext is consistent with the second random number ciphertext, and if so, sends a notification of successful a...
Embodiment 2
[0095] This embodiment provides a security authentication method, which is applied to the vehicle-mounted security module in the vehicle-mounted unit of Embodiment 1, such as figure 2 As shown, the method provided in this embodiment specifically includes:
[0096] Step H1: The on-board security module is waiting to receive data. When receiving the command to obtain random numbers from the on-board main control module, execute step H2; when receiving the instruction to read files from the on-board main control module, perform step H3; when receiving When the first encrypted instruction is from the vehicle-mounted main control module, step H4 is performed;
[0097] Step H2: The on-board security module generates a random number, and sends the random number to the on-board main control module;
[0098]For example, the random number instruction received from the vehicle-mounted main control module is 00 84 00 00 08, and the data 84 on the second byte is obtained as the identific...
Embodiment 3
[0109] This embodiment provides a security authentication method, which is applied to the roadside security module in the roadside unit in Embodiment 1. The method provided in this embodiment specifically includes:
[0110] Step W1: The roadside security module receives the random number and dispersion factor sent by the roadside main control module, generates a second subkey according to the dispersion factor and the master key stored by itself, and encrypts the random number with the second subkey to obtain The second random number ciphertext is used to send the second random number ciphertext to the roadside main control module.
[0111] Optionally, the above-mentioned roadside safety module receives the random number and dispersion factor sent by the roadside main control module, specifically: the roadside safety module receives the second encryption instruction sent by the roadside main control module, and the second encryption instruction Obtain random numbers and disper...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


