Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method and system

A security authentication and security module technology, applied in the field of information security, can solve problems such as user economic losses, poor user experience, and hidden safety hazards, and achieve the effects of reducing the risk of economic losses, ensuring transaction security, and improving security

Active Publication Date: 2021-08-27
FEITIAN TECHNOLOGIES
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, the electronic non-parking toll collection system is not perfect, and there are potential safety hazards in the transaction process, which often bring economic losses to users; at the same time, there is a defect that resources are wasted due to a module in the vehicle unit being locked. It is necessary to frequently replace a certain module in the vehicle unit, or even replace the entire vehicle unit, and the user experience is not good
Therefore, the industry urgently needs to propose a technical solution that can overcome the potential safety hazards and resource waste defects in the prior art.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and system
  • Security authentication method and system
  • Security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] This embodiment provides a safety authentication method, which is applied to a safety authentication system including a roadside unit and a vehicle-mounted unit, where the roadside unit includes a roadside main control module, and the vehicle-mounted unit includes a vehicle-mounted main control module and a vehicle-mounted security module, such as figure 1 As shown, the methods specifically include:

[0060] Step S0: the vehicle-mounted main control module receives the message of performing authentication from the roadside main control module;

[0061] Step S1: The vehicle-mounted main control module obtains the first random number ciphertext from the vehicle-mounted security module, and obtains the second random number ciphertext from the roadside main control module;

[0062] Step S2: The on-board main control module judges whether the first random number ciphertext is consistent with the second random number ciphertext, and if so, sends a notification of successful a...

Embodiment 2

[0095] This embodiment provides a security authentication method, which is applied to the vehicle-mounted security module in the vehicle-mounted unit of Embodiment 1, such as figure 2 As shown, the method provided in this embodiment specifically includes:

[0096] Step H1: The on-board security module is waiting to receive data. When receiving the command to obtain random numbers from the on-board main control module, execute step H2; when receiving the instruction to read files from the on-board main control module, perform step H3; when receiving When the first encrypted instruction is from the vehicle-mounted main control module, step H4 is performed;

[0097] Step H2: The on-board security module generates a random number, and sends the random number to the on-board main control module;

[0098]For example, the random number instruction received from the vehicle-mounted main control module is 00 84 00 00 08, and the data 84 on the second byte is obtained as the identific...

Embodiment 3

[0109] This embodiment provides a security authentication method, which is applied to the roadside security module in the roadside unit in Embodiment 1. The method provided in this embodiment specifically includes:

[0110] Step W1: The roadside security module receives the random number and dispersion factor sent by the roadside main control module, generates a second subkey according to the dispersion factor and the master key stored by itself, and encrypts the random number with the second subkey to obtain The second random number ciphertext is used to send the second random number ciphertext to the roadside main control module.

[0111] Optionally, the above-mentioned roadside safety module receives the random number and dispersion factor sent by the roadside main control module, specifically: the roadside safety module receives the second encryption instruction sent by the roadside main control module, and the second encryption instruction Obtain random numbers and disper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security authentication method and system, a roadside security module and a vehicle-mounted security module. The invention relates to the divisional application of an invention patent with the application number of 201810128774.0. The application date of the parent case is February 8, 2018. The invention discloses a security authentication method and system, and belongs to the technical field of information security. The security authentication method disclosed by the invention comprises the following steps: when a vehicle-mounted main control module receives an authentication execution message from a roadside main control module, acquiring a first random number ciphertext from a vehicle-mounted security module, acquiring a second random number ciphertext from the roadside main control module, judging whether the first random number ciphertext is consistent with the second random number ciphertext or not, if yes, sending an authentication success notification to the roadside main control module, otherwise, sending an authentication failure notification to the roadside main control module; and when the roadside main control module receives the notification of authentication failure, updating the number of times of authentication failure, judging whether the updated number of times of authentication failure exceeds a preset number of times, if yes, taking that the authentication fails, and if not, sending a message for executing authentication to the vehicle-mounted main control module again. According to the scheme provided by the invention, on the premise of ensuring transaction security, resource waste is effectively avoided, and practicability is improved.

Description

[0001] This application is a divisional application for an invention patent titled: a safety authentication method and system, a roadside safety module, and a vehicle-mounted safety module, and the application number is: 201810128774.0. technical field [0002] The present invention relates to the technical field of information security, in particular to a security authentication method and system. Background technique [0003] Electronic toll collection system (ETC, Electronic Toll Collection) is an intelligent traffic toll system, including the roadside unit (RSU: Road Side Unit) and the on-board unit (OBU: On Board Unit) on the vehicle; the roadside unit and the vehicle The units exchange data through wireless communication to complete non-stop charging transactions. [0004] In the prior art, the electronic non-parking toll collection system is not perfect, and there are potential safety hazards in the transaction process, which often bring economic losses to users; at t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40G06Q20/14G07B15/06H04L9/08
CPCH04L9/0869G06Q20/14G06Q20/3829G06Q20/401G07B15/063
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES