CN110061849A - Verification method, server, mobile unit and the storage medium of mobile unit - Google Patents

Verification method, server, mobile unit and the storage medium of mobile unit Download PDF

Info

Publication number
CN110061849A
CN110061849A CN201910336508.1A CN201910336508A CN110061849A CN 110061849 A CN110061849 A CN 110061849A CN 201910336508 A CN201910336508 A CN 201910336508A CN 110061849 A CN110061849 A CN 110061849A
Authority
CN
China
Prior art keywords
mobile unit
summary info
cipher
text information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910336508.1A
Other languages
Chinese (zh)
Inventor
杨进
胡超
罗勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE NEW ENERGY AUTOMOBILE Co Ltd
Original Assignee
ZTE NEW ENERGY AUTOMOBILE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE NEW ENERGY AUTOMOBILE Co Ltd filed Critical ZTE NEW ENERGY AUTOMOBILE Co Ltd
Priority to CN201910336508.1A priority Critical patent/CN110061849A/en
Publication of CN110061849A publication Critical patent/CN110061849A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/65Monitoring or controlling charging stations involving identification of vehicles or their battery types
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/14Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Transportation (AREA)
  • Mechanical Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of verification methods of mobile unit, the following steps are included: sending public key to mobile unit, so that the mobile unit identifies to obtain cipher-text information according to first summary info of public key encryption and mobile unit, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, obtains the mobile unit mark and first summary info;The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;When second summary info is consistent with first summary info, then determine that the mobile unit is verified.The invention also discloses a kind of server, wireless charging device, mobile unit and computer readable storage mediums.The present invention improves the safety to mobile unit certification.

Description

Verification method, server, mobile unit and the storage medium of mobile unit
Technical field
The present invention relates to field of communication technology more particularly to a kind of verification method of mobile unit, server, vehicle-mounted set Standby, wireless charging device and computer readable storage medium.
Background technique
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging The legitimate interests of operator need to carry out effective authentication to wireless charging mobile unit into parking lot, non-to prevent Method Vehicular charging.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, it can effective prevention device It distorts.But there are certain drawbacks for common digital signature identification mode: being inconvenient to update key pair, and stores fixed key There is a problem of that safety is not high, even generation dynamic key pair, but transmission is also easily by midway while ciphertext and public key It intercepts and captures, these all threaten the safety to mobile unit certification.
Summary of the invention
The main purpose of the present invention is to provide a kind of verification method of mobile unit, server, mobile unit, wireless chargings Electric equipment and computer readable storage medium improve the safety to mobile unit certification.
To achieve the above object, the present invention provides a kind of verification method of mobile unit, the authentication of the mobile unit Method the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to first summary info of public key encryption and vehicle-mounted Device identification obtains cipher-text information, and first summary info identifies the mobile unit by preset Encryption Algorithm and encrypts It obtains;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained To mobile unit mark and first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, then determine that the mobile unit verifying is logical It crosses.
Optionally, described that second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm Step includes:
The second abstract is obtained to mobile unit key and mobile unit mark encryption by preset Encryption Algorithm Information, wherein first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key.
Optionally, described to decrypt the cipher-text information using private key, it obtains the mobile unit mark and described first and plucks The step of wanting information include:
The cipher-text information is decrypted using private key, obtains the mobile unit mark, the mobile unit key and described First summary info, the cipher-text information first summary info according to the public key encryption, the mobile unit key and The mobile unit identifies to obtain.
Optionally, described when second summary info is consistent with first summary info, then determine described vehicle-mounted Device authentication by the step of include:
When second summary info is consistent with first summary info, generates random code and calculate the random code Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, then determine that the mobile unit is verified.
Optionally, the verification method of the mobile unit further include:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit It charges.
Optionally, the mobile unit verification method the following steps are included:
Mobile unit receives the public key that verifying end is sent;
It is identified to obtain cipher-text information, the first abstract letter according to first summary info of public key encryption and mobile unit Breath obtains mobile unit mark encryption by preset Encryption Algorithm;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key The mobile unit mark and first summary info are obtained, and by preset Encryption Algorithm to the mobile unit mark Know encryption and obtain the second summary info, and when second summary info is consistent with first summary info, then determines institute Mobile unit is stated to be verified.
Optionally, described to identify to obtain the step of cipher-text information according to first summary info of public key encryption and mobile unit Suddenly include:
It identifies to obtain cipher-text information according to first summary info of public key encryption, mobile unit public key and mobile unit;
Wherein, first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key, and in the verifying end When receiving the cipher-text information, the verifying end using private key decrypt the cipher-text information obtain the mobile unit key, Mobile unit mark and first summary info, and by preset Encryption Algorithm to the mobile unit key with The mobile unit encrypts to obtain the second summary info.
Optionally, the verification method of the mobile unit further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
To achieve the above object, the present invention also provides a kind of server, the server includes:
The server includes memory, processor and is stored on the memory and can run on the processor Mobile unit proving program, realize when the proving program of the mobile unit is executed by the processor and vehicle-mounted set as above-mentioned The step of standby verification method.
To achieve the above object, the present invention also provides a kind of wireless charging device, the wireless charging device includes:
The wireless charging device includes memory, processor and is stored on the memory and can be in the processor The proving program of the mobile unit of upper operation is realized when the proving program of the mobile unit is executed by the processor as above-mentioned The step of verification method of mobile unit.
To achieve the above object, the present invention also provides a kind of mobile unit, the mobile unit includes:
The mobile unit includes memory, processor and is stored on the memory and can transport on the processor The proving program of capable mobile unit is realized when the proving program of the mobile unit is executed by the processor as above-mentioned vehicle-mounted The step of verification method of equipment.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storages It is stored with the proving program of mobile unit on medium, realizes when the proving program of the mobile unit is executed by processor as above-mentioned The step of verification method of mobile unit.
Verification method, server and the computer readable storage medium of mobile unit provided by the invention, set to vehicle-mounted Preparation send public key, so that the mobile unit identifies to obtain ciphertext according to first summary info of public key encryption and mobile unit Information, first summary info obtain mobile unit mark encryption by preset Encryption Algorithm;Receiving When stating the cipher-text information of mobile unit transmission, the cipher-text information is decrypted using private key, obtains the mobile unit mark With first summary info;The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm; When second summary info is consistent with first summary info, then determine that the mobile unit is verified.In this way, mentioning The high safety to mobile unit certification.
Detailed description of the invention
Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the verification method first embodiment of mobile unit of the present invention;
Fig. 3 is the flow diagram of the verification method second embodiment of mobile unit of the present invention;
Fig. 4 is the flow diagram of the verification method 3rd embodiment of mobile unit of the present invention;
Fig. 5 is the flow diagram of the verification method fourth embodiment of mobile unit of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of verification method of mobile unit, improves the safety to mobile unit certification.
As shown in Figure 1, Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
The terminal of that embodiment of the invention can be server, wireless charging device, be also possible to mobile unit.
As shown in Figure 1, the terminal may include: processor 1001, such as cpu central processing unit (central Processing unit), memory 1002, communication bus 1003.Wherein, communication bus 1003 is for realizing each in the terminal Connection communication between building block.Memory 1002 can be high-speed RAM random access memory (random-access Memory), it is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1002 can The storage device that can also be independently of aforementioned processor 1001 of choosing.
It will be understood by those skilled in the art that the structure of terminal shown in Fig. 1 was not constituted to end of the embodiment of the present invention The restriction at end may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
As shown in Figure 1, as the verifying that in a kind of memory 1002 of computer storage medium may include mobile unit Program.
In terminal shown in Fig. 1, processor 1001 can be used for calling the mobile unit stored in memory 1002 Proving program, and execute following operation:
Public key is sent to mobile unit, so that the mobile unit is according to first summary info of public key encryption and vehicle-mounted Device identification obtains cipher-text information, and first summary info identifies the mobile unit by preset Encryption Algorithm and encrypts It obtains;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained To mobile unit mark and first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, then determine that the mobile unit verifying is logical It crosses.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
The second abstract is obtained to mobile unit key and mobile unit mark encryption by preset Encryption Algorithm Information, wherein first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
The cipher-text information is decrypted using private key, obtains the mobile unit mark, the mobile unit key and described First summary info, the cipher-text information first summary info according to the public key encryption, the mobile unit key and The mobile unit identifies to obtain.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
When second summary info is consistent with first summary info, generates random code and calculate the random code Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, then determine that the mobile unit is verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit It charges.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
Mobile unit receives the public key that verifying end is sent;
It is identified to obtain cipher-text information, the first abstract letter according to first summary info of public key encryption and mobile unit Breath obtains mobile unit mark encryption by preset Encryption Algorithm;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key The mobile unit mark and first summary info are obtained, and by preset Encryption Algorithm to the mobile unit mark Know encryption and obtain the second summary info, and when second summary info is consistent with first summary info, then determines institute Mobile unit is stated to be verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
It identifies to obtain cipher-text information according to first summary info of public key encryption, mobile unit public key and mobile unit;
Wherein, first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key, and in the verifying end When receiving the cipher-text information, the verifying end using private key decrypt the cipher-text information obtain the mobile unit key, Mobile unit mark and first summary info, and by preset Encryption Algorithm to the mobile unit key with The mobile unit encrypts to obtain the second summary info.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
Referring to Fig. 2, in one embodiment, the verification method of the mobile unit includes:
Step S10, public key is sent to mobile unit, is made a summary and is believed according to the public key encryption first for the mobile unit Breath and mobile unit identify to obtain cipher-text information, and first summary info is by preset Encryption Algorithm to the mobile unit Mark encryption obtains.
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging The legitimate interests of operator need to carry out effective authentication to the vehicle to wireless charging for entering parking lot to prevent illegal vehicle Charging.General verifying end is the legitimacy of the digital certificates sent by the mobile unit in verifying vehicle, judges vehicle-mounted set Whether standby corresponding vehicle has wireless charging permission.
Generally, it can be divided into three classes according to verifying end whether there is or not configuration cloud network management and Third Party Authentication center CA system Mobile unit verifies scene system, and one kind is not configure cloud network management and Third Party Authentication center CA service system, vehicle-mounted to set It is standby to need to complete certification in local proxy server system;Second class is configured with cloud network management and recognizes without configuring third party Center CA server system is demonstrate,proved, mobile unit needs to complete certification in NM server system beyond the clouds;Third class is configured with Cloud network management and Third Party Authentication center CA, mobile unit needs are completed to recognize in Third Party Authentication center CA server system Card.These three scene systems are similar for the cryptographic authentication process of automobile wireless charging onboard system.Electric car without In line charge electric system, vehicle to be charged can regard user as, in certification mainly certification to wireless charging mobile unit whether It is legal, i.e., it whether is to arrange standard charging equipment that manufacturer provides and operator's authorization.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, can effectively be taken precautions against and be set It is standby to distort.Other authentication modes such as bio-identification, USBkey etc., can not effectively prevention device be tampered.Common number label There are certain drawbacks for name authentication mode: being inconvenient to update key pair, and stores fixed key and safety is reduced;Or Dynamic key pair is generated, but ciphertext is easily intercepted and captured halfway with public key simultaneous transmission, and loses the meaning of encryption.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted Cipher-text information is sent to terminal.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described default Encryption Algorithm is hashing algorithm, and first summary info is that mobile unit calculates mobile unit mark progress hash operations The hashed value arrived, the hash operations can be HASH256 operation.
It should be noted that the mobile unit is identified as globally unique 9 byte mobile unit mark ID, i.e., each vehicle Carrying equipment has unique corresponding mobile unit mark.
It should be understood that mobile unit can be in the public key for receiving terminal, the first summary info of recombinant and Mobile unit identifies to obtain cipher-text information, and is based on public key encryption cipher-text information;Mobile unit is also possible to combine first in advance Summary info and mobile unit identify to obtain cipher-text information, after receiving the public key of terminal, direct encrypted cipher text information.
Optionally, mobile unit has ATECC108 chip, and mobile unit can be private by mobile unit public key, mobile unit The write-in ATECC108 chip such as key, mobile unit mark, the cipher-text information of unencryption, the first summary info is saved.
Step S20, when receiving the cipher-text information that the mobile unit is sent, the ciphertext is decrypted using private key Information obtains the mobile unit mark and first summary info.
Terminal utilizes the public key when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission Corresponding private key decrypts cipher-text information, and the first summary info and vehicle of mobile unit are extracted from the cipher-text information after decryption Carry device identification.
Optionally, terminal can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit mark Know.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate that the mobile unit is Illegality equipment, which, which is identified as, hits code, and terminal directly determines that mobile unit verifying does not pass through.
Step S30, the second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm.
Step S40, when second summary info is consistent with first summary info, then determine the mobile unit It is verified.
When terminal obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract letter is calculated Breath, and the first summary info in the second summary info and cipher-text information that are calculated is compared, it is plucked described second When wanting information consistent with first summary info, then determine that the mobile unit is verified, i.e., the mobile unit is legal;? When second summary info and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.It needs Illustrate, hashing algorithm used by legal mobile unit is identical as terminal, i.e. terminal and legal mobile unit uses Same set of preset Encryption Algorithm.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is terminal It is generated according to mobile unit mark, and summary info is both generated using identical mobile unit mark, therefore, if terminal The second summary info and the first summary info generated is inconsistent, illustrates hashing algorithm used by the mobile unit and terminal not Together and/or the mobile unit of the mobile unit is identified as pseudo-code.
In this way, by realize to the mobile unit identity verification of mobile unit, vehicle-mounted hashing algorithm verifying and terminal with The multiple-authentications such as the encryption of vehicle equipment information transmission improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks The case where public-private key pair of terminal, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead in terminal authentication vehicle It carries after device identification, the first summary info pass through, the case where mobile unit that can still have current authentication is illegality equipment.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit. Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined Do not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judge whether to adopt with verifying terminal With same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with verifying terminal, when intercepting and capturing The cipher-text information of legitimate device can still pass through the problem of one-time authentication, further improve the safety to mobile unit certification Property.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle Carry out wireless charging safety, prevent illegal vehicle to charge.
In a second embodiment, as shown in figure 3, on the basis of above-mentioned embodiment shown in Fig. 2, the mobile unit is tested Card method further include:
Step S11, public key is sent to mobile unit, is made a summary and is believed according to the public key encryption first for the mobile unit Breath and mobile unit identify to obtain cipher-text information, and first summary info is by preset Encryption Algorithm to mobile unit key It is obtained with mobile unit mark encryption.
Step S31, obtain the mobile unit key, and by preset Encryption Algorithm to the mobile unit key with The mobile unit mark encryption obtains the second summary info.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted Cipher-text information is sent to terminal.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described first Summary info is that mobile unit is carried out based on hash operations by the combinations of values of mobile unit mark and mobile unit key composition Obtained hashed value, wherein the hash operations can be HASH256 operation, and the mobile unit key is mobile unit Public key or mobile unit private key.
Optionally, when the mobile unit key is mobile unit private key, the cipher-text information further includes mobile unit Private key.Terminal utilizes the public key pair when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission The private key decryption cipher-text information answered, and extract from the cipher-text information after decryption the first summary info, vehicle-mounted of mobile unit Device identification and mobile unit private key.Terminal carries out hash fortune according to the combinations of values of mobile unit mark and mobile unit private key Calculation is calculated the second summary info, and by the first summary info in the second summary info and cipher-text information that are calculated into Row compares, and when second summary info is consistent with first summary info, then determines that the mobile unit is verified, I.e. the mobile unit is legal;In second summary info and inconsistent first summary info, then determine described vehicle-mounted Device authentication does not pass through.
Optionally, when the mobile unit key is mobile unit public key, the cipher-text information may include vehicle-mounted sets Standby public key, can not also include mobile unit public key.When cipher-text information includes mobile unit public key, terminal receive it is vehicle-mounted When cipher-text information after the public key encryption for the using terminal that equipment is sent, cipher-text information is decrypted using the corresponding private key of the public key, And it is public that the first summary info of mobile unit, mobile unit mark and mobile unit are extracted from the cipher-text information after decryption Key;When cipher-text information does not include mobile unit public key, terminal directly can obtain mobile unit public key to mobile unit.Terminal root Hash operations are carried out according to the combinations of values of mobile unit mark and mobile unit public key, the second summary info is calculated, and will meter Obtained the first summary info in the second summary info and cipher-text information is compared, in second summary info and institute State the first summary info it is consistent when, then determine that the mobile unit is verified, i.e., the mobile unit is legal;It is plucked described second When wanting information and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit Standby public key or mobile unit private key calculate as one of hash factor and generate summary info, are cracked by increasing illegality equipment The difficulty of hash operations further improves the safety to mobile unit certification.Also, since different mobile units can be with Different mobile unit public key-mobile unit private keys pair is generated, using the mobile unit public key or mobile unit of mobile unit Private key is used as the hash factor as one of hash factor, than the fixed numbers that terminal and mobile unit have been made an appointment using one One of solution security it is higher, be less prone to illegal user and pass through verifying.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit. Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined Do not pass through.
In this way, further improving the safety to mobile unit certification.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle Carry out wireless charging safety, prevent illegal vehicle to charge.
In the third embodiment, as shown in figure 4, the verification method of the mobile unit includes:
Step S50, mobile unit receives the public key that verifying end is sent.
Step S60, identify to obtain cipher-text information according to first summary info of public key encryption and mobile unit, described One summary info obtains mobile unit mark encryption by preset Encryption Algorithm.
Step S70, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption Cipher-text information obtains the mobile unit mark and first summary info, and by preset Encryption Algorithm to the vehicle It carries device identification to encrypt to obtain the second summary info, and when second summary info is consistent with first summary info, Then determine that the mobile unit is verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has There is the wireless charging device of charging permission.
Verifying end generates the public key and private key of verifying end using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit Mobile unit public key and mobile unit private key are generated using another set of elliptic curve encryption algorithm (ECC algorithm).
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add Cipher-text information after close is sent to verifying end.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described first Summary info is that mobile unit is identified and carries out the hashed value that is calculated of hash operations by mobile unit, and the hash operations can be with It is HASH256 operation.
Verifying end utilizes this when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent The corresponding private key of public key decrypts cipher-text information, and the first summary info of mobile unit is extracted from the cipher-text information after decryption It is identified with mobile unit.
Optionally, verifying end can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit Mark.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate the mobile unit For illegality equipment, which, which is identified as, hits code, and verifying end directly determines that mobile unit verifying does not pass through.
When verifying end obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract is calculated Information, and the first summary info in the second summary info and cipher-text information that are calculated is compared, described second When summary info is consistent with first summary info, then determine that the mobile unit is verified, i.e., the mobile unit is legal; In second summary info and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.It needs It is noted that hashing algorithm used by legal mobile unit is identical as verifying end.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is verifying End is generated according to mobile unit mark, and both generates summary info using identical mobile unit mark, therefore, if testing The second summary info and the first summary info for demonstrate,proving end generation are inconsistent, illustrate hashing algorithm used by the mobile unit and test The mobile unit of card end difference and/or the mobile unit is identified as pseudo-code.
In this way, by realizing the mobile unit identity verification to mobile unit, vehicle-mounted hashing algorithm verifying and verifying end The multiple-authentications such as the encryption transmitted with vehicle equipment information improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks The case where public-private key pair of verifying end, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead to test in verifying end After card mobile unit mark, the first summary info pass through, the mobile unit that can still have current authentication is the feelings of illegality equipment Condition.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission, And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested Card does not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judged whether and authentication end Using same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with authentication end, when cutting The problem of one-time authentication can still be passed through by having obtained the cipher-text information of legitimate device further improves to mobile unit certification Safety.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission Electric equipment carries out wireless charging.
In the fourth embodiment, as shown in figure 5, on the basis of the embodiment of above-mentioned Fig. 4, the authentication of the mobile unit Method further include:
Step S61, identify to obtain cipher-text information according to first summary info of public key encryption and mobile unit, described One summary info obtains mobile unit key and mobile unit mark encryption by preset Encryption Algorithm.
Step S71, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption Cipher-text information obtains the mobile unit mark and first summary info, and obtains the mobile unit key, and lead to It crosses preset Encryption Algorithm the mobile unit key and mobile unit mark are encrypted and obtain the second summary info, and When second summary info is consistent with first summary info, then determine that the mobile unit is verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has There is the wireless charging device of charging permission.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add Cipher-text information after close is sent to verifying end.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described first Summary info is that mobile unit is carried out based on hash operations by the combinations of values of mobile unit mark and mobile unit key composition Obtained hashed value, wherein the hash operations can be HASH256 operation, and the mobile unit key is mobile unit Public key or mobile unit private key.
Optionally, when the mobile unit key is mobile unit private key, the cipher-text information further includes mobile unit Private key.Verifying end utilizes the public affairs when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent The corresponding private key of key decrypts cipher-text information, and extract from the cipher-text information after decryption mobile unit the first summary info, Mobile unit mark and mobile unit private key.Verifying end is carried out according to the combinations of values of mobile unit mark and mobile unit private key The second summary info is calculated in hash operations, and first in the second summary info and cipher-text information that are calculated is made a summary Information is compared, and when second summary info is consistent with first summary info, then determines that the mobile unit is tested Card passes through, i.e., the mobile unit is legal;In second summary info and inconsistent first summary info, then institute is determined Mobile unit verifying is stated not pass through.
Optionally, when the mobile unit key is mobile unit public key, the cipher-text information may include vehicle-mounted sets Standby public key, can not also include mobile unit public key.When cipher-text information includes mobile unit public key, verifying end is receiving vehicle When cipher-text information after carrying the public key encryption using verifying end that equipment is sent, the public key corresponding private key decryption ciphertext letter is utilized It ceases, and extracts the first summary info, mobile unit mark and the mobile unit of mobile unit from the cipher-text information after decryption Public key;When cipher-text information does not include mobile unit public key, verifying end directly can obtain mobile unit public key to mobile unit.It tests Card end carries out hash operations according to the combinations of values of mobile unit mark and mobile unit public key and the second summary info is calculated, And the first summary info in the second summary info and cipher-text information that are calculated is compared, in the second abstract letter When ceasing consistent with first summary info, then determine that the mobile unit is verified, i.e., the mobile unit is legal;Described When the second summary info and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit Standby public key or mobile unit private key calculate as one of hash factor and generate summary info, are cracked by increasing illegality equipment The difficulty of hash operations further improves the safety to mobile unit certification.Also, since different mobile units can be with Different mobile unit public key-mobile unit private keys pair is generated, using the mobile unit public key or mobile unit of mobile unit The fixed numbers that private key has been made an appointment as hash one of factor, than verifying end and mobile unit using one as hash because The solution security of one of son is higher, is less prone to illegal user and passes through verifying.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission, And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested Card does not pass through.
In this way, further improving the safety to mobile unit certification.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission Electric equipment carries out wireless charging.
In addition, the present invention also proposes a kind of server, the server includes memory, processor and is stored in memory The proving program of mobile unit that is upper and can running on a processor, the processor execute the proving program of the mobile unit The step of verification method of mobile unit Shi Shixian as described above in Example.
In addition, the present invention also proposes a kind of wireless charging device, the wireless charging device include memory, processor and On a memory and the proving program of mobile unit that can run on a processor, the processor execution is described vehicle-mounted to be set for storage The step of realizing the verification method of mobile unit as described above in Example when standby proving program.
In addition, the present invention also proposes that a kind of mobile unit, the mobile unit include memory, processor and be stored in On reservoir and the proving program of mobile unit that can run on a processor, the processor execute the verifying of the mobile unit The step of verification method of mobile unit as described above in Example is realized when program.
In addition, the present invention also proposes that a kind of computer readable storage medium, the computer readable storage medium include vehicle The proving program of equipment is carried, the proving program of the mobile unit realizes vehicle as described above in Example when being executed by processor The step of carrying the verification method of equipment.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be TV Machine, mobile phone, computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (12)

1. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to first summary info of public key encryption and mobile unit Mark obtains cipher-text information, and first summary info encrypts mobile unit mark by preset Encryption Algorithm It arrives;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, obtains institute State mobile unit mark and first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, then determine that the mobile unit is verified.
2. the verification method of mobile unit as described in claim 1, which is characterized in that described to pass through preset Encryption Algorithm pair The mobile unit mark encrypts the step of obtaining the second summary info and includes:
The second summary info is obtained to mobile unit key and mobile unit mark encryption by preset Encryption Algorithm, Wherein, first summary info identifies the mobile unit key and the mobile unit by preset Encryption Algorithm Encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key.
3. the verification method of mobile unit as claimed in claim 2, which is characterized in that described to decrypt the ciphertext using private key Information, obtaining the mobile unit mark with the step of first summary info includes:
The cipher-text information is decrypted using private key, obtains the mobile unit mark, the mobile unit key and described first Summary info, the cipher-text information first summary info according to the public key encryption, the mobile unit key and described Mobile unit identifies to obtain.
4. the verification method of mobile unit as claimed in any one of claims 1-3, which is characterized in that described described second When summary info is consistent with first summary info, then determine that the step of mobile unit is verified includes:
When second summary info is consistent with first summary info, generates random code and calculate dissipating for the random code Train value is as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates the second hash according to the random code Value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, then determine that the mobile unit is verified.
5. the verification method of mobile unit as described in claim 1, which is characterized in that the verification method of the mobile unit is also Include:
When determining that the mobile unit is verified, control wireless charging device carries out the corresponding vehicle of the mobile unit Charging.
6. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Mobile unit receives the public key that verifying end is sent;
It is identified to obtain cipher-text information according to first summary info of public key encryption and mobile unit, first summary info is logical Preset Encryption Algorithm is crossed to obtain mobile unit mark encryption;
The cipher-text information is sent to the verifying end, the cipher-text information is decrypted using private key for the verifying end and obtains The mobile unit mark and first summary info, and mobile unit mark is added by preset Encryption Algorithm It is close to obtain the second summary info, and when second summary info is consistent with first summary info, then determine the vehicle Device authentication is carried to pass through.
7. the verification method of mobile unit as claimed in claim 6, which is characterized in that described according to the public key encryption first Summary info and mobile unit identify the step of obtaining cipher-text information and include:
It identifies to obtain cipher-text information according to first summary info of public key encryption, mobile unit public key and mobile unit;
Wherein, first summary info is by preset Encryption Algorithm to the mobile unit key and the mobile unit mark Know encryption to obtain, the mobile unit key is mobile unit public key or mobile unit private key, and is received in the verifying end When to the cipher-text information, the verifying end decrypts the cipher-text information using private key and obtains the mobile unit key, described Mobile unit mark and first summary info, and by preset Encryption Algorithm to the mobile unit key and described Mobile unit encrypts to obtain the second summary info.
8. the verification method of mobile unit as claimed in claims 6 or 7, which is characterized in that the authentication of the mobile unit Method further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hashed value, institute Verifying end is stated when second summary info is consistent with first summary info, generates the random code and will be described random Code is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to then determine described vehicle-mounted when second hashed value is consistent with the first hashed value Device authentication passes through, and first hashed value is that the verifying end is calculated according to the random code.
9. a kind of server, which is characterized in that the server is associated with wireless charging device, and the server includes storage Device, processor and the proving program for being stored in the mobile unit that can be run on the memory and on the processor, it is described The mobile unit as described in any one of claims 1 to 5 is realized when the proving program of mobile unit is executed by the processor Verification method the step of.
10. a kind of wireless charging device, which is characterized in that the wireless charging device includes memory, processor and is stored in On the memory and the proving program of mobile unit that can run on the processor, the proving program of the mobile unit The step of verification method of the mobile unit as described in any one of claims 1 to 5 is realized when being executed by the processor.
11. a kind of mobile unit, which is characterized in that the mobile unit includes memory, processor and is stored in the storage On device and the proving program of mobile unit that can run on the processor, the proving program of the mobile unit is by the place The step of managing the verification method that the mobile unit as described in any one of claim 6 to 8 is realized when device executes.
12. a kind of computer readable storage medium, which is characterized in that be stored with vehicle-mounted set on the computer readable storage medium It realizes when the proving program of standby proving program, the mobile unit is executed by processor such as any one of claims 1 to 8 institute The step of verification method for the mobile unit stated.
CN201910336508.1A 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit Pending CN110061849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910336508.1A CN110061849A (en) 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910336508.1A CN110061849A (en) 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit

Publications (1)

Publication Number Publication Date
CN110061849A true CN110061849A (en) 2019-07-26

Family

ID=67320631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910336508.1A Pending CN110061849A (en) 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit

Country Status (1)

Country Link
CN (1) CN110061849A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545173A (en) * 2019-07-29 2019-12-06 大众问问(北京)信息科技有限公司 method and device for safety verification and request sending
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered
CN111565182A (en) * 2020-04-29 2020-08-21 深圳市元征科技股份有限公司 Vehicle diagnosis method and device and storage medium
CN112866987A (en) * 2019-11-08 2021-05-28 佛山市云米电器科技有限公司 Networking verification method, equipment and computer readable storage medium
CN112987581A (en) * 2019-12-16 2021-06-18 华为技术有限公司 Control method for intelligent household equipment, medium and terminal thereof
CN113492705A (en) * 2021-07-14 2021-10-12 福建星云电子股份有限公司 Noninductive charging method for charging pile
CN113589722A (en) * 2021-07-21 2021-11-02 上汽通用五菱汽车股份有限公司 Vehicle control encryption method, system, device and computer readable storage medium
CN114095190A (en) * 2020-08-03 2022-02-25 北京无限感测科技有限公司 Charging data protection method, device, special case processing terminal and storage medium
CN114650155A (en) * 2020-12-18 2022-06-21 北京万集科技股份有限公司 Method and system for issuing vehicle-mounted unit, storage medium, and electronic device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090259839A1 (en) * 2007-07-12 2009-10-15 Nhn Corporation Security authentication system and method
US20120204027A1 (en) * 2011-02-09 2012-08-09 Samsung Electronics Co. Ltd. Authentication method and apparatus in a communication system
CN103517273A (en) * 2013-10-09 2014-01-15 中国联合网络通信集团有限公司 Authentication method, managing platform and Internet-of-Things equipment
CN104518529A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 Authentication method for vehicle-mounted charging device, and corresponding device
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
CN106713237A (en) * 2015-11-16 2017-05-24 厦门雅迅网络股份有限公司 Encryption method of vehicle-mounted terminal and center platform communication
CN108076062A (en) * 2017-12-22 2018-05-25 深圳市汇川技术股份有限公司 Internet of things equipment safe communication system, method, networked devices and server
CN109484236A (en) * 2018-11-30 2019-03-19 深圳市元征科技股份有限公司 A kind of method, system, terminal device and the mobile unit of vehicle safety charging

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090259839A1 (en) * 2007-07-12 2009-10-15 Nhn Corporation Security authentication system and method
US20120204027A1 (en) * 2011-02-09 2012-08-09 Samsung Electronics Co. Ltd. Authentication method and apparatus in a communication system
CN104518529A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 Authentication method for vehicle-mounted charging device, and corresponding device
CN103517273A (en) * 2013-10-09 2014-01-15 中国联合网络通信集团有限公司 Authentication method, managing platform and Internet-of-Things equipment
CN106713237A (en) * 2015-11-16 2017-05-24 厦门雅迅网络股份有限公司 Encryption method of vehicle-mounted terminal and center platform communication
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
CN108076062A (en) * 2017-12-22 2018-05-25 深圳市汇川技术股份有限公司 Internet of things equipment safe communication system, method, networked devices and server
CN109484236A (en) * 2018-11-30 2019-03-19 深圳市元征科技股份有限公司 A kind of method, system, terminal device and the mobile unit of vehicle safety charging

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545173A (en) * 2019-07-29 2019-12-06 大众问问(北京)信息科技有限公司 method and device for safety verification and request sending
CN112866987A (en) * 2019-11-08 2021-05-28 佛山市云米电器科技有限公司 Networking verification method, equipment and computer readable storage medium
CN112866987B (en) * 2019-11-08 2023-08-04 佛山市云米电器科技有限公司 Networking verification method, networking verification device and computer readable storage medium
CN112987581A (en) * 2019-12-16 2021-06-18 华为技术有限公司 Control method for intelligent household equipment, medium and terminal thereof
CN111222180A (en) * 2020-02-27 2020-06-02 山东浪潮通软信息科技有限公司 Method, system, device and medium for judging whether accounting document is tampered
CN111565182A (en) * 2020-04-29 2020-08-21 深圳市元征科技股份有限公司 Vehicle diagnosis method and device and storage medium
CN111565182B (en) * 2020-04-29 2022-08-19 深圳市元征科技股份有限公司 Vehicle diagnosis method and device and storage medium
CN114095190A (en) * 2020-08-03 2022-02-25 北京无限感测科技有限公司 Charging data protection method, device, special case processing terminal and storage medium
CN114650155A (en) * 2020-12-18 2022-06-21 北京万集科技股份有限公司 Method and system for issuing vehicle-mounted unit, storage medium, and electronic device
CN113492705A (en) * 2021-07-14 2021-10-12 福建星云电子股份有限公司 Noninductive charging method for charging pile
CN113492705B (en) * 2021-07-14 2023-01-10 福建星云电子股份有限公司 Noninductive charging method for charging pile
CN113589722A (en) * 2021-07-21 2021-11-02 上汽通用五菱汽车股份有限公司 Vehicle control encryption method, system, device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN110061849A (en) Verification method, server, mobile unit and the storage medium of mobile unit
CN110113745A (en) Verification method, server, mobile unit and the storage medium of mobile unit
CN103812871B (en) Development method and system based on mobile terminal application program security application
CN109862040A (en) A kind of safety certifying method and Verification System
CN106850680B (en) Intelligent identity authentication method and device for rail transit equipment
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN107493273A (en) Identity identifying method, system and computer-readable recording medium
CN105847247A (en) Authentication system and working method thereof
CN103269271B (en) A kind of back up the method and system of private key in electronic signature token
CN103067402A (en) Method and system for digital certificate generation
CN109492358A (en) A kind of open interface uniform authentication method
CN103078742A (en) Generation method and system of digital certificate
CN106713279A (en) Video terminal identity authentication system
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN104935441A (en) Authentication method and relevant devices and systems
CN107483415A (en) A kind of mutual authentication method of shared electricity consumption interactive system
CN109245885A (en) Cryptographic key negotiation method, equipment, storage medium and system
CN106850207A (en) Identity identifying method and system without CA
CN113204760B (en) Method and system for establishing secure channel for software cryptographic module
CN106027251A (en) Identity card reading terminal and cloud authentication platform data transmission method and system
CN116232593B (en) Multi-password module sensitive data classification and protection method, equipment and system
CN106027473A (en) Identity card reading terminal and cloud authentication platform data transmission method and system
CN109688111A (en) A kind of vehicle identification Verification System and method adapting to V2X communication
CN111541660B (en) Identity authentication method for remote vehicle control
CN106027461A (en) Secret key use method for cloud authentication platform in identity card authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190726

RJ01 Rejection of invention patent application after publication