Unlock instant, AI-driven research and patent intelligence for your innovation.

Data communication method and system based on secondary authentication of adjacent nodes

A secondary authentication and adjacent node technology, applied in the field of communication security, can solve the problems of not being able to guarantee the security of data transmission and single authentication method

Active Publication Date: 2022-07-22
广州万协通信息技术有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above identity authentication method uses the cloud to authenticate with the roadside section and the vehicle side respectively. It belongs to a single-point two-way authentication mode. This authentication method is relatively simple and cannot guarantee the security of data transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data communication method and system based on secondary authentication of adjacent nodes
  • Data communication method and system based on secondary authentication of adjacent nodes
  • Data communication method and system based on secondary authentication of adjacent nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The embodiments of the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that, the specific embodiments described herein are only used to explain the embodiments of the present invention, but are not intended to limit the embodiments of the present invention. In addition, it should be noted that, for the convenience of description, the drawings only show some but not all structures related to the embodiments of the present invention.

[0044] figure 1 A flowchart of a data communication method based on secondary authentication of adjacent nodes provided by an embodiment of the present invention, an embodiment of the present application specifically includes the following steps:

[0045] Step S101: During the data transmission process between the terminal device and the server, if the terminal device determines that the transmission data is secondary authentication data, it se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data communication method and system based on secondary authentication of adjacent nodes, and the method comprises the steps: transmitting an identification obtaining request to a server if terminal equipment determines that transmission data is secondary authentication data; the server determines current adjacent node information of the terminal equipment and sends the adjacent node information to the terminal equipment; the terminal equipment determines a corresponding auxiliary encryption key according to the adjacent node information, establishes a data transmission link with the adjacent node, encrypts the transmission data through the auxiliary encryption key, and sends the transmission data to the adjacent node; and the adjacent node carries out decryption through the stored auxiliary decryption key, encrypts the decrypted data through the stored encryption key when data transmission is carried out with the server, and sends the encrypted data to the server. According to the scheme, the security of data transmission is improved, and the leakage of privacy data of a user is avoided.

Description

technical field [0001] The embodiments of the present application relate to the technical field of communication security, and in particular, to a data communication method and system based on secondary authentication of adjacent nodes. Background technique [0002] With the popularization of the network and the development of hardware devices, there are more and more applications for realizing networked communication among various devices to realize various complex functions. For example, in vehicle networking communication, vehicle equipment interacts with data from the server. How to ensure secure communication between devices is an important issue that needs to be solved at present. [0003] In the related art, the patent document CN111479244A discloses a V2I vehicle networking identity authentication system and method, including a cloud, at least one roadside terminal and at least one vehicle terminal; the cloud includes a traffic management cloud server, a certificate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/08H04L63/0428H04L2209/84Y02D30/70
Inventor 张奇惠王立峰刘家明
Owner 广州万协通信息技术有限公司