Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

134 results about "Relay attack" patented technology

A relay attack in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle attack, an attacker intercepts and manipulates communications between two parties initiated by one of the parties. In a classic relay attack, communication with both parties is initiated by the attacker who then merely relays messages between the two parties without manipulating them or even necessarily reading them.

Method for safety communication of ECUs (Electronic Control Unit) in CAN (controller area network) bus

The invention discloses a method for safety communication of ECUs (Electronic Control Unit) in a CAN (controller area network) bus, which comprises the steps that: 1, a system model is established; 2, an GECU (Gateway Electronic Control Unit) loads a session key into a safety storage of the GECU; 3, the GECU carries out session key distribution on each ECU in the CAN bus; 4, a receiver ECUr carries out authentication on an encrypted data frame sent by a sender ECUs; 5, the GECU updates an encryption key and an authentication key which are used for communication, wherein update is mainly divided into two stages of in-vehicle ECU key update and key update when a connection of external equipment is released; and 6, when a vehicle is connected with the external equipment, designing an additional authentication and key distribution method so as to ensure legality of the accessed external equipment. According to the method disclosed by the invention, calculation cost can be obviously reduced, and a load of the CAN bus is reduced; and optimization is carried out for a key distribution protocol in the in-vehicle CAN bus, a key update problem generated when the external equipment is connected and released is considered, a counter is used for generating a random number to change a parameter for key generation, and a relay attack is effectively prevented.
Owner:JIANGSU UNIV

Vehicle-inside one-time-one-password communication method based on ECU identity concealment

The invention discloses a vehicle-inside one-time-one-password communication method based on ECU identity concealment. The method comprises the following steps: 1) creating a system model; 2) prior to the one-time-one-ciphering by ECU, registering information in the gateway database; 3) using the operation behaviors to the vehicle by the intelligent ECU as the media to generate a coupling effect between vehicle mounted power supply systems so that the vehicle mounted power supply voltage change possess the Markov characteristics and that a true random number is generated to serve as the session key; 4) updating in a fixed time the session key between the ECUs in need of communication so as to prevent replay attacks; and 5) according to the obtained session key, using the attributes of the ECU in the database, creating one-time-one-ciphering data communications based on the ECU ciphered text attributes to ensure the secure communications of ECU inside the vehicle. According to the invention, through the utilization of the stochastic behavior of the power supply voltage inside the vehicle to generate a session key, it is possible to effectively avoid the problem with the tampering and the forgery of information. Through the combination of the vehicle speed unit with the steering wheel, the 500ms cycle dynamic state generates the vehicle speed and serves as the session key for the ECU in order to prevent relay attacks.
Owner:东台城东科技创业园管理有限公司

Safety exchange method for MMS specification application layer

The invention discloses a safety exchange method for an MMS specification application layer. When an intelligent substation device uses MMS message communication, the MMS application layer safety reinforcing exchange method enables both MMS protocol communication sides to perform identity authentication at the application through carrying out safety improvement on the MMS application layer and controls the access authority of an MMS client through using role-based access based on the authentication. The safety exchange method for the MMS specification application layer includes steps that 1) starting an MMS association authorization function, and extending authorization data structure; 2) through extending the authorization data structure, using a public encryption algorithm to carry out identity authorization on the association process of the MMS application layer, and at the same time, performing relay attack protection; 3) using a role-based access control technology to construct the access control relationship between the MMS client and MMS service, after passing the association authentication, allowing an MMS server to use a configured access control relation table to carry out fine-grained access control on the MMS client, if the MMS client meets the demand, allowing the MMS client to access the corresponding service, otherwise, refusing to provide service.
Owner:CHINA SOUTHERN POWER GRID COMPANY

Link security certification method, device and system in wireless relay network

The invention discloses a link security certification method, a device and a system in a wireless relay network. The method comprises the following steps that: a multi-hop relay base station or an access relay station receives a first management message sent by a mobile station; the first management message carries a first message authentication code, and a first message authentication code key counting value and a first message authentication code grouping number counting value which are contained in the context of a first authentication key stored by the mobile station per se; the first message authentication code is verified according to a second authentication key, a second authentication key mark, the first message authentication code key counting value and the first message authentication code grouping number counting value, wherein the second authentication key and the second authentication key mark are contained in the context of a second authentication key; and whether the access link between the mobile station and the access relay station is secure or not is determined according to the verification results. When the technical scheme of the invention is adopted, the relay attack in the wireless relay network can be effectively prevented.
Owner:HUAWEI TECH CO LTD

System and method of non-contact IC card for defending relay attack

The invention discloses a system and method of a non-contact IC card for defending a relay attack, and relates to the field of information security. The system comprises the non-contact IC card and a card reader. The card reader sends three-time magnetic field intensity information to the non-contact IC card and records sending time, the non-contact IC card detects actual magnetic field intensity of the card reader for three times, and the actual magnetic field intensity is compared with the received corresponding magnetic field intensity to judge whether the non-contact IC card is under attack or not; meanwhile, the card reader calculates the received time difference of the non-contact IC card returning to a normal instruction, the time difference is compared with a corresponding magnetic field intensity change time difference to judge whether the non-contact IC card is under the attack or not, and when the non-contact IC card is under the attack, the non-contact IC card sends out an abnormal instruction, and the card reader stops communicating and sends out an alerting signal. According to the system and method, the non-contact IC card can be effectively prevented from being subjected to the relay attack, safety of the non-contact IC card is guaranteed, and the system is wide in application range, low in cost and convenient to use.
Owner:湖北警官学院

Authentication method and equipment, electronic equipment and storage medium

InactiveCN110223425AThe certification result is accurateAuthentication results are safeIndividual entry/exit registersSecurity arrangementComputer engineeringElectronic equipment
The embodiments of the invention relate to the field of authentication, and disclose an authentication method and equipment, electronic equipment and a storage medium. In the authentication method andequipment, the electronic equipment and the storage medium, the authentication method includes the steps that a first distance is acquired, and the first distance is a distance between first equipment and equipment which directly transmits a first authentication request to the first equipment, wherein the first authentication request is originally generated and sent by second equipment; a seconddistance is acquired, and the second distance is a distance between the second equipment and equipment which directly transmits a second authentication request to the second equipment, wherein the second authentication request is originally generated and sent by the first equipment; and according to the first distance and the second distance, whether the authentication is successful or not is determined. Bidirectional positioning is carried out through the first equipment and the second equipment, the first distance is compared with the second distance, according to the comparison result, whether the authentication is successful or not is determined, the security of the first equipment is ensured, and the relay attack is effectively prevented.
Owner:上海银基信息安全技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products