Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

TSP server access control method

An access control and server technology, applied in the field of Internet of Vehicles, can solve problems such as system security risks and vulnerability to intrusion attacks, and achieve the effect of improving security

Pending Publication Date: 2022-05-10
惠州华阳通用智慧车载系统开发有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current access audit strategy of the TSP server is relatively simple, and it is easy to be invaded and attacked, thus causing a large security risk to the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TSP server access control method
  • TSP server access control method
  • TSP server access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings. The accompanying drawings are only for reference and description, and do not constitute a limitation to the protection scope of the present invention.

[0045] Embodiments of the present invention provide a TSP server access control method, including:

[0046] Such as figure 1 As shown, the present embodiment provides a TSP server access control method, including:

[0047] Step 1. Receive an access request from a connected device.

[0048] In this embodiment, the connection device communicates with the TSP server through a data network (such as 4G, 5G, etc.).

[0049] The connection device may be a legally registered vehicle terminal device, or a hijacked vehicle terminal device.

[0050] Step 2. Verify the legitimacy of the access ID.

[0051] Before using the TSP service, the user of the connected device needs to register to become a registe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a TSP server access control method. The method comprises the following steps: step 1, receiving an access request of connection equipment; 2, verifying the legality of the access ID; step 3, according to the category of the access ID, judging whether a TSP access directory initiated by the connection equipment is legal, if so, executing the next step, otherwise, refusing an access request of the connection equipment; step 4, calculating the trust value of the access of the connection device; step 5, acquiring a preset number of historical trust values of the connection equipment; step 6, calculating a comprehensive trust value according to the historical trust value and the trust value of the access; and step 7, determining an access control strategy according to the comprehensive trust value. According to the invention, the security of TSP server access is improved.

Description

technical field [0001] The invention relates to the technical field of Internet of Vehicles, in particular to a TSP server access control method. Background technique [0002] At present, cars are developing from a traditional independent entity to an interconnected car network. In the IoV industry chain, the TSP (Telematics Service Provider, car remote service provider) server occupies a core position, connecting content providers on the top, and connecting cars, vehicle equipment manufacturers, and network operators on the bottom. With the continuous development of the Internet of Vehicles, there will be more and more TSP servers, and its role will become more and more important, and the number of visits will also increase accordingly. [0003] However, the access auditing strategy of the TSP server is relatively simple at present, and it is easy to be invaded and attacked, thus causing great security risks to the system. Therefore, there is an urgent need for a secure a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L67/12
CPCH04L63/08H04L63/10H04L63/20H04L67/12
Inventor 蒋才科
Owner 惠州华阳通用智慧车载系统开发有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More