CN113795008A - V2X signature verification method and device, electronic equipment and readable storage medium - Google Patents

V2X signature verification method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN113795008A
CN113795008A CN202110338299.1A CN202110338299A CN113795008A CN 113795008 A CN113795008 A CN 113795008A CN 202110338299 A CN202110338299 A CN 202110338299A CN 113795008 A CN113795008 A CN 113795008A
Authority
CN
China
Prior art keywords
message
signature verification
security chip
load
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110338299.1A
Other languages
Chinese (zh)
Other versions
CN113795008B (en
Inventor
林云龙
游奕航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202110338299.1A priority Critical patent/CN113795008B/en
Publication of CN113795008A publication Critical patent/CN113795008A/en
Priority to PCT/CN2022/071406 priority patent/WO2022206107A1/en
Application granted granted Critical
Publication of CN113795008B publication Critical patent/CN113795008B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/08Load balancing or load distribution

Abstract

The application is applicable to the technical field of terminals, and provides a V2X signature verification method, a device, electronic equipment and a readable storage medium, wherein the V2X signature verification method comprises the following steps: and acquiring the signature verification load state of the security chip. And when the signature verification load state is a high load, sending a first V2X message which is subsequently received and accords with a preset filtering rule to the security chip for signature verification. After the V2X message is filtered, the number of V2X messages needing to be checked by the security chip is reduced, the check pressure of the security chip is reduced, and the processing efficiency of the V2X message is improved.

Description

V2X signature verification method and device, electronic equipment and readable storage medium
Technical Field
The application relates to the field of terminals, in particular to a V2X signature verification method and device, electronic equipment and a readable storage medium.
Background
The Vehicle-to-event (V2X) is a Vehicle-mounted application for interconnecting vehicles and the outside world. When the two V2X devices directly perform V2X communication, the communication can be performed based on a PC5 communication interface, and the PC5 communication interface is implemented by broadcasting Device-to-Device (D2D) messages. In this communication system, information security is achieved by means of certificate signing by a digital Certificate Authority (CA).
In the prior art, all received V2X messages are subjected to certificate verification through a security chip, and only V2X messages passing the verification can be processed continuously.
However, when the V2X message received in a short time is too large, the security chip has a large signature verification pressure, and the signature verification efficiency is reduced, resulting in a reduction in the processing efficiency of the V2X message.
Disclosure of Invention
The embodiment of the application provides a V2X signature checking method, a device, electronic equipment and a readable storage medium, which can solve the problem that when a V2X message received in a short time is too large, the signature checking pressure of a security chip is large, the signature checking efficiency is reduced, and the processing efficiency of the V2X message is reduced.
In a first aspect, an embodiment of the present application provides a V2X signature verification method, which is applied to an electronic device, where a security chip is disposed in the electronic device, and the method includes: and acquiring the signature verification load state of the security chip. And when the signature verification load state is a high load, sending a first V2X message which is subsequently received and accords with a preset filtering rule to the security chip for signature verification.
The V2X signature verification method provided by the application can be applied to electronic Equipment capable of receiving and sending V2X messages, such as vehicle-mounted Equipment (On Board Equipment, OBE), smart phones with V2X functions, tablet computers, wearable Equipment, customized terminals and the like.
In the first aspect, after the verification load state of the electronic device is determined to be a high load, only the first V2X message which meets the preset filtering rule in the subsequently received V2X messages is sent to the security chip for verification. The number of the V2X messages for signature verification is reduced, the signature verification pressure of the security chip is reduced, the signature verification efficiency is improved, and the processing efficiency of the V2X messages is also improved.
In some embodiments, obtaining the tag verification load status of the security chip includes: and receiving the signature verification load information from the security chip. And when the signature verification load information indicates that the signature verification load of the security chip is greater than the first load threshold value, determining that the signature verification load state is a high load.
In some embodiments, obtaining the tag verification load status of the security chip includes: and acquiring the signature verification time of the security chip for verifying the V2X message. And when the signature verification duration is greater than the first signature verification time threshold, determining that the signature verification load state is a high load.
In some embodiments, obtaining the signature verification duration for the security chip to verify the V2X message includes: a first timestamp is obtained when the V2X message is sent to the secure chip. And receiving the signature verification result of the V2X message returned by the security chip, and acquiring a second time stamp when the signature verification result of the V2X message is received. The signature verification duration is the time difference between the first time stamp and the second time stamp.
In some embodiments, the determining the first V2X message meeting the preset filtering rule includes: the priority level of at least one V2X message received with the same sender identification is obtained. A V2X message of the at least one V2X message with a priority level above the first priority threshold is determined to be a first V2X message.
In some embodiments, the method further comprises: when N second V2X messages with the same priority are included in the received multiple first V2X messages, M second V2X messages are sent to the security chip, and M is smaller than N.
In some embodiments, the determining the first V2X message meeting the preset filtering rule further includes: the priority level and sender distance of receipt of at least one V2X message is determined. And determining that the V2X message with the distance of the sender larger than a preset distance threshold and the priority level higher than a second priority threshold in at least one V2X message is a first V2X message. And, the V2X message with the sender distance less than or equal to the distance threshold is the first V2X message.
In some embodiments, the determining the first V2X message meeting the preset filtering rule includes: and determining that the non-high-risk message received in the at least one V2X message is the first V2X message, the identification of the sender of the non-high-risk message is different from the identification of the sender of the high-risk message, and the high-risk message is the V2X message which fails to pass the verification of the security chip.
In some embodiments, the method further comprises: when the signature verification load state is low load, all subsequent received V2X messages are sent to the security chip for signature verification.
In some embodiments, acquiring the signature verification load state when the security chip verifies the received V2X message includes: and receiving the signature verification load information from the security chip. And when the signature verification load information indicates that the signature verification load of the security chip is smaller than the second load threshold value, determining that the signature verification load state is a low load.
In some embodiments, acquiring the signature verification load state when the security chip verifies the received V2X message includes: and acquiring the signature verification time of the security chip for verifying the V2X message. And when the signature verification duration is less than the second signature verification time threshold, determining that the signature verification load state is a low load.
In a second aspect, an embodiment of the present application provides a V2X signature verification device, including: and the acquisition module is used for acquiring the label checking load state of the security chip. And the sending module is used for sending a first V2X message which is subsequently received and accords with a preset filtering rule to the security chip for signature verification when the signature verification load state is a high load.
In some embodiments, the obtaining module is specifically configured to receive the signature verification load information from the security chip. And when the signature verification load information indicates that the signature verification load of the security chip is greater than the first load threshold value, determining that the signature verification load state is a high load.
In some embodiments, the obtaining module is specifically configured to obtain a signature verification duration for verifying the V2X message by the security chip. And when the signature verification duration is greater than the first signature verification time threshold, determining that the signature verification load state is a high load.
In some embodiments, the obtaining module is specifically configured to obtain the first timestamp when the V2X message is sent to the secure chip. And receiving the signature verification result of the V2X message returned by the security chip, and acquiring a second time stamp when the signature verification result of the V2X message is received. The signature verification duration is the time difference between the first time stamp and the second time stamp.
In some embodiments, the sending module is specifically configured to obtain a priority level of at least one V2X message received with the same sender identifier. A V2X message of the at least one V2X message with a priority level above the first priority threshold is determined to be a first V2X message.
In some embodiments, the sending module is further configured to send M second V2X messages to the security chip when the received plurality of first V2X messages includes N second V2X messages with the same priority, where M is smaller than N.
In some embodiments, the sending module is further configured to determine a priority level and a sender distance at which the at least one V2X message is received. And determining that the V2X message with the distance of the sender larger than a preset distance threshold and the priority level higher than a second priority threshold in at least one V2X message is a first V2X message. And, the V2X message with the sender distance less than or equal to the distance threshold is the first V2X message.
In some embodiments, the sending module is further configured to determine that a non-high-risk message of the at least one V2X message received is a first V2X message, a sender identifier of the non-high-risk message is different from a sender identifier of the high-risk message, and the high-risk message is a V2X message that fails in the security chip check-sign.
In some embodiments, the sending module is further configured to send all subsequent received V2X messages to the security chip for signature verification when the signature verification load status is a low load status.
In some embodiments, the obtaining module is further configured to receive the signature verification load information from the security chip. And when the signature verification load information indicates that the signature verification load of the security chip is smaller than the second load threshold value, determining that the signature verification load state is a low load.
In some embodiments, the obtaining module is further configured to obtain a signature verification duration for verifying the V2X message by the security chip. And when the signature verification duration is less than the second signature verification time threshold, determining that the signature verification load state is a low load.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, a secure chip, and a computer program stored in the memory and executable on the processor, and the processor implements the method provided in the first aspect through the secure chip when executing the computer program.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, where a computer program is stored, and when executed by a processor, the computer program implements the method provided in the first aspect.
In a fifth aspect, the present application provides a computer program product, which when run on a terminal device, causes the terminal device to execute the method provided in the first aspect.
In a sixth aspect, an embodiment of the present application provides a chip system, where the chip system includes a memory and a processor, and the processor executes a computer program stored in the memory to implement the method provided in the first aspect.
In a seventh aspect, an embodiment of the present application provides a chip system, where the chip system includes a processor, the processor is coupled with the computer-readable storage medium provided in the fourth aspect, and the processor executes a computer program stored in the computer-readable storage medium to implement the method provided in the first aspect.
It is to be understood that, the beneficial effects of the second to seventh aspects may be referred to the relevant description of the first aspect, and are not repeated herein.
Drawings
Fig. 1 is a schematic application scenario diagram of a V2X signature verification method provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of an electronic device for performing V2X message verification according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a V2X security chip signature provided in an embodiment of the present application;
fig. 4 is a schematic flow chart of a V2X signature verification method according to an embodiment of the present application;
FIG. 5 is a schematic flow chart of another V2X signature verification method provided in the embodiments of the present application;
FIG. 6 is a schematic flow chart of another V2X signature verification method provided in the embodiments of the present application;
fig. 7 is a schematic structural diagram of a V2X signature verification device according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
Fig. 1 shows an application scenario diagram of a V2X signature verification method.
For ease of illustration, the vehicles are separated in fig. 1 into a vehicle 11 that receives the V2X message and a vehicle 12 that sends the V2X message. It should be noted that the vehicle 11 receiving the V2X message and the vehicle 12 transmitting the V2X message both have the function of transmitting and receiving the V2X message. In certain situations, the vehicle 11 receiving the V2X message and the vehicle 12 sending the V2X message may transition. For example, a vehicle that originally transmitted a V2X message receives a V2X message or a vehicle that originally received a V2X message transmits a V2X message, etc.
In fig. 1, a plurality of vehicles 12 transmitting V2X messages broadcast V2X messages, and vehicles 11 receiving V2X messages receive the broadcast V2X messages. After receiving the V2X message, the V2X message is signed by a security chip provided in the electronic equipment in the vehicle. The V2X message is processed only after the V2X message has been checked for success.
When the number of vehicles 12 sending V2X messages is too large, the number of V2X messages received by the vehicle 11 receiving V2X messages is large, the pressure of the security chip to perform V2X message signature verification is increased, the signature verification efficiency is reduced, and the processing efficiency of V2X messages is reduced.
To this end, the present application provides a V2X signature verification method, comprising: the electronic device verifies the received V2X message through the security chip. And when the signature checking load state of the electronic equipment is determined to be high load, the electronic equipment checks the signature of part of V2X messages in the received V2X messages according to a preset filtering rule.
In the application, after the signature load state of the electronic equipment is determined to be high load, the received V2X message is filtered through a preset filtering rule. The security chip only needs to check and sign part of the received V2X message. The number of the V2X messages for signature verification is reduced, the signature verification pressure of the security chip is reduced, the signature verification efficiency is improved, and the processing efficiency of the V2X messages is also improved.
Fig. 2 shows an architecture diagram of an electronic device for V2X message signing.
Referring to fig. 2, the access layer, the security chip and the application layer are included, the access layer may receive a V2X message from another device and send the message to the security chip for signature verification, and the security chip sends a V2X message to the application layer for processing after the signature verification passes. Since V2X message communication in the present application can be implemented based on a direct link (PC5) communication interface, the access layer can also be correspondingly an access layer adapted to a PC5 communication interface, and the security chip can be used for verifying a signature by means of a certificate signature of a digital Certificate Authority (CA).
The security chip may include Internet Protocol (IP) address information of an application layer and an access layer, a Data Service Management Platform (DSMP), an adaptation layer, security services, and the like.
Fig. 3 shows a flow diagram of V2X security chip verification, where the security chip may support a V2X application security subsystem, and the V2X application security subsystem may be located in a functional entity that provides communication security for V2X applications in an application service system of an on-board device, a road side device, and a V2X application facilitator. The V2X application may be located in a functional entity that needs V2X application communication security in an application service system of an on-board device, a roadside device, or a V2X application service provider, such as an on-board application of a V2X vehicle, an application or an application service corresponding to a V2X roadside station, or the like. The V2X security management entity may be a functional entity for performing security configuration and security data provisioning on the V2X application security subsystem, for example, a registration, authorization, key provisioning, and certificate issuance functional entity. The V2X application security service is located in the V2X application security subsystem, and interacts with the V2X application to complete operations such as message signing, verification, encryption, decryption, etc., and interacts with the V2X security management entity to complete operations such as key writing, certificate application and writing, etc. The secure environment may then be used to store important secure data, such as CA certificates, public and private keys, encryption and decryption keys, and the like. And important safety calculation services such as digital signature, data encryption and decryption and the like are provided for the safety service entity.
Fig. 4 shows a schematic flow chart of the V2X signature verification method provided by the present application, which may be applied to the electronic device described above by way of example and not limitation.
And S101, receiving a V2X message.
In some embodiments, the electronic device is located in a vehicle, and the V2X message received by the electronic device is from surrounding vehicles and V2X devices that sent V2X messages. Among them, the V2X device includes an Electronic Toll Collection (ETC) device having a V2X function, a traffic light having a V2X function, and the like.
And S102, receiving the signature verification load information from the security chip.
In some embodiments, the security chip is configured to perform signature verification on the V2X message received by the access layer, and the signature verification load information of the security chip may be the number of V2X messages that are subjected to signature verification per second. For example, referring to FIG. 1, each vehicle 12 sending a V2X message broadcasts a V2X message at a frequency of 10Hz, i.e., 10V 2X messages per second. When the number of vehicles 12 sending V2X messages is 200, the vehicle 11 receiving the V2X message receives 2000V 2X messages per second, and accordingly, the security chip is required to check every second for 2000V 2X messages. In this case, the signature verification load information is 2000 pieces/second.
And S103, when the signature verification load information indicates that the signature verification load of the security chip is greater than the first load threshold value, executing S104, otherwise executing S111.
In some embodiments, the signature verification load information may indicate that the signature verification load status of the security chip is high load or low load. When the signature verification load information indicates that the signature verification load of the security chip is greater than the first load threshold value, the current signature verification load state of the security chip can be determined to be a high load. The first load threshold may be determined according to a maximum signature load of the security chip, for example, if the maximum signature load of the security chip is 2000 bars/second, the first load threshold may be 80% of the maximum signature load, that is, 1600 bars/second. And when the signature verification load information indicates that the signature verification load of the security chip is smaller than the second load threshold value, determining that the current signature verification load state of the security chip is a low load. The second load threshold may be equal to the first load threshold. For example, the second load threshold may be 80% of the maximum signature load, i.e. 1600 bars/second, and the second load threshold may also be 70% of the maximum signature load.
In some further embodiments, in order to determine the high load more accurately, a time limit of the first load threshold may be further set, and when the signature verification load is greater than the first load threshold and exceeds a preset time limit, the current signature verification load state of the security chip is determined to be the high load. For example, when the signature verification load is greater than 1800 bars/second and the duration is greater than 1 second, the current signature verification load state of the security chip is determined to be high load. Similarly, when determining a low load, it may be determined according to a preset time limit.
S104, acquiring the characteristic information of each received V2X message, wherein the characteristic information comprises sender identification, priority level and sender distance.
In some embodiments, the sender identification and priority level may be obtained from a structural header field of the V2X message, and the sender identification may be a layer-2identity document (L2 ID) of the sender.
The Priority level may be a proximity communication Packet Priority (PPPP), and for example, the Priority of the V2X message may be determined with reference to the PPPP shown in table 1.
TABLE 1
Figure BDA0002997975730000061
In some embodiments, in the structural header area of the V2X message, the signal strength of the V2X message sent by the sender is also included. The Signal Strength may be represented by Reference Signal Receiving Power (RSRP) or Received Signal Strength Indication (RSSI). The sender distance can be calculated from the signal strength when the V2X message is sent and the signal strength when the V2X message is received.
After determining that the signature verification load state of the security chip is high load and acquiring the sender identification, the priority level and the sender distance of the received V2X message, one of S105, S107 and S109 may be performed to reduce the signature verification pressure of the security chip.
And S105, sending the V2X message meeting the first filtering rule to the security chip for signature verification.
In some embodiments, the V2X message that conforms to the first filtering rule is a first V2X message, and the first filtering rule may include: the sender identification of the V2X message is the same and the priority level of the V2X message is above the first priority threshold. For example, if multiple V2X messages exist in the received V2X message and the senders L2ID of the messages are the same, the high-priority V2X messages in the messages can be sent to the security chip for signature verification, and the low-priority V2X messages are discarded and not processed. As an example, the first priority threshold may be 7, and the high priority V2X messages may be safety-related V2X messages, such as PPPP priority 2, 3, 4, and 5V 2X messages. While low priority V2X messages may be V2X messages of level 7 and below in PPPP priority. The low prioritized V2X message may be a service class or application message. For example, it may be a message showing a nearby parking lot, showing a nearby dining merchant, etc. After discarding the V2X messages which do not conform to the first filtering rule, the number of V2X messages sent to the security chip for signature verification is reduced, and the signature verification pressure of the security chip can be reduced.
And S106, sending the V2X message meeting the second filtering rule to the security chip to reduce the frequency of signature verification.
In some embodiments, S106 is further configured to filter the first V2X message based on S105, where the second filtering rule includes: when N second V2X messages with the same priority are included in the received multiple first V2X messages, M second V2X messages are sent to the security chip, and M is smaller than N.
After filtering the V2X messages with low priority in the same L2ID, if the signing pressure of the security chip is still high, the number of transmissions of the V2X messages with the same priority (i.e., the second V2X message) in the first V2X message to the security chip may be reduced, for example, if the number N of the first V2X messages is 100 after filtering the V2X messages with low priority in the same L2ID, M (e.g., 10, 20, or 50) messages may be transmitted to the security chip as the second V2X messages.
Here, when the number of transmissions is reduced, the frequency of transmitting the V2X message may be used as a unit. As an example, if the transmission frequency of the first V2X message to the security chip is 10 times/sec, the transmission frequency of the second V2X message to the security chip may be reduced to M/N, for example, when M/N is equal to 1/5, the transmission frequency of the second V2X message to the security chip is reduced to 10 times/sec 1/5-2 times/sec. By reducing the frequency of the message signature verification of the V2X messages with the same priority, the signature verification times of the security chip can be effectively reduced, and the signature verification pressure of the security chip is further reduced.
And S107, executing S108 when the long-distance V2X message is received, otherwise executing S111.
And S108, sending the V2X message meeting the third filtering rule to the security chip for signature verification.
In some embodiments, the V2X message that conforms to the third filtering rule is the first V2X message. The third filtering rule may include: the V2X message and the V2X message in the V2X message, in which the sender distance is greater than the preset distance threshold and the priority level is higher than the second priority threshold, and the sender distance is less than or equal to the distance threshold are the first V2X message. Among them, the V2X message whose sender distance is greater than the preset distance threshold may also be referred to as a distant V2X message.
It should be noted that, after determining that a long-distance V2X message is received, the sending identifier of the long-distance V2X message may be identified as a long-distance identifier. When the V2X message is subsequently received, it can be determined whether it is a distant V2X message according to whether L2ID of the received V2X message has a distant identity.
When L2ID of the V2X message is different from the long-distance V2X message, indicating that the V2X message is not a long-distance V2X message, i.e., the sender distance is less than or equal to the distance threshold, the V2X message needs to be checked.
When the L2ID of the V2X message is the same as the long-distance V2X message, it is determined that the vehicle corresponding to the sender is far away from the vehicle corresponding to the electronic device, and the potential safety hazard is low, so that only the high-priority V2X message sent by the vehicle can be sent to the security chip for signature verification, and the low-priority V2X message can be discarded. In this embodiment, the priority may be a PPPP priority, and the second priority threshold may be the same as or different from the first priority threshold, which is not limited in this application. Because the low-priority V2X messages sent by the remote vehicles are abandoned, the number of V2X messages for the signature verification of the safety chip is reduced, and the signature verification pressure of the safety chip can be reduced.
It should be noted that, after a L2ID is identified from a long distance, if the V2X message sent by the sender is received again, the distance of the sender can also be verified. If the sender distance is less than or equal to the distance threshold, the long range flag of L2ID may be cleared to more accurately filter the received V2X message.
And S109, executing S110 when the high-risk V2X message is received, otherwise executing S111.
And S110, sending the V2X message meeting the fourth filtering rule to the security chip for signature verification.
In some embodiments, the V2X message that conforms to the fourth filtering rule is the first V2X message. The fourth filtering rule includes: the V2X message is a non-high risk message. Wherein the sender identification of the non-high-risk message is different from the sender identification of the high-risk message, and the high-risk message is a V2X message which does not pass the verification of the security chip.
If a piece of V2X is not verified at the security chip, the security chip may identify L2ID of the V2X message as high risk and report to the access stratum. When the L2ID of a subsequently received V2X message is L2ID, which identifies a high risk, the V2X message may be filtered without a check-signature.
By way of example, the high-risk V2X message may be a dummy message, such as a presence of a malicious off-standard message on a channel, a V2X message sent by an unauthorized device, and so forth. These false messages fail to pass the signature verification in the secure chip. And then, all the false messages corresponding to the L2ID are abandoned, and the high-risk messages are not checked, so that the check pressure of the security chip is reduced.
And S111, sending all the received V2X messages to the security chip for signature verification.
In some embodiments, in the above flow, when the V2X message does not need to be filtered, the received V2X message may be directly sent to the security chip for signature verification.
Optionally, after filtering the received V2X message, when the signature load status of the security chip becomes low load, the filtering of the received V2X message may be stopped, and all the received V2X messages may be sent to the security chip for signature verification. For example, signature verification load information may be received from the security chip. And when the signature verification load information indicates that the signature verification load of the security chip is smaller than the second load threshold value, determining that the signature verification load state of the electronic equipment is a low load. Referring to S103, the second load threshold may be equal to the first load threshold, the second load threshold may be 80% of the maximum signature load, i.e., 1600 bars/sec, and the second load threshold may also be 70% of the maximum signature load.
In this embodiment, the signature verification load of the security chip is used as a judgment parameter of the signature verification load state of the security chip, and the signature verification load of the security chip can directly and accurately reflect the signature verification load state of the security chip, so that the judgment result is reliable and the misjudgment probability is low.
Fig. 5 shows a schematic flow chart of another V2X signature verification method provided by the present application, which may be applied to the electronic device described above by way of example and not limitation.
And S201, receiving the V2X message.
S202, obtaining the signature verification duration of each V2X message when the electronic equipment verifies the received V2X message through the security chip.
And S203, when the signature verification duration is greater than the first signature verification time threshold, executing S204, otherwise executing S211.
In some embodiments, the V2X message may be transmitted in a manner that the access stratum receives the V2X message, then the access stratum transmits the V2X message to the security chip for verification, and after the verification of the security chip is completed, the V2X message is transmitted to the application layer.
When the access layer sends the V2X message to the security chip for signature verification, the access layer can record the timestamp for sending the V2X message and simultaneously transmit the timestamp to the security chip, after the security chip verifies and signs the V2X message, when the access layer sends the V2X message to the application layer, the application layer records the timestamp when receiving the V2X message, and the time difference between the two timestamps represents the time for signature verification, namely the time for signature verification. When the signature verification duration is greater than the first signature verification time threshold, it can be confirmed that the signature verification efficiency of the security chip is reduced, and the V2X message sent to the signature verification chip needs to be filtered.
S204, acquiring the characteristic information of each received V2X message, wherein the characteristic information comprises sender identification, priority level and sender distance.
S205, sending the V2X message meeting the first filtering rule to the security chip for signature verification.
S206, sending the V2X message meeting the second filtering rule to the security chip to reduce the frequency of signature verification.
And S207, when the long-distance V2X message is received, executing S208, otherwise executing S211.
And S208, sending the V2X message meeting the third filtering rule to the security chip for signature verification.
And S209, when the high-risk V2X message is received, executing S210, otherwise executing S211.
And S210, sending the V2X message meeting the fourth filtering rule to the security chip for signature verification.
S211, all the received V2X messages are sent to the security chip for signature verification.
In the above method, the implementation manners of S201 and S101, S204 to S211, and S104 to S111 are the same, and are not described herein again.
In this embodiment, the signature verification duration is adopted as the load information of the security chip, the signature verification load state of the security chip can be judged when the signature verification load of the security chip cannot be directly acquired, and the application range is wide.
Fig. 6 is a schematic diagram illustrating another V2X signature verification method provided by the present application, which may be applied to the electronic device described above by way of example and not limitation.
In the method shown in fig. 6, the security chip sends the signature verification load information to the access layer and the application layer, and the access layer and the application layer may determine the signature verification load state of the security chip according to the signature verification load information. If the load is high, the access layer can filter autonomously or the application layer can instruct the access layer to filter the received V2X message so as to reduce the signature verification pressure of the security chip. Or, the application layer may also determine the tag verification load state of the security chip according to the obtained tag verification duration, and if the load is high, instruct the access layer to filter the received V2X message. The method of filtering the V2X message may refer to the methods in S105 to S110, which are not described herein.
In this embodiment, through the linkage between security chip, access layer and the application layer, the great scene of discernment security chip pressure that can be more accurate, and then filters the V2X message that receives, reduces security chip's the pressure of checking a signature.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Corresponding to the V2X signature verification method described in the foregoing embodiments, fig. 7 shows a structural block diagram of the V2X signature verification device provided in the embodiments of the present application, and for convenience of description, only the parts related to the embodiments of the present application are shown.
Referring to fig. 7, the V2X signature verification device includes:
an obtaining module 301, configured to obtain a signature verification load state of the security chip.
A sending module 302, configured to send a first V2X message that is subsequently received and meets a preset filtering rule to the security chip for signature verification when the signature verification load status is a high load.
In some embodiments, the obtaining module 301 is specifically configured to receive the signature verification load information from the security chip. And when the signature verification load information indicates that the signature verification load of the security chip is greater than the first load threshold value, determining that the signature verification load state is a high load.
In some embodiments, the obtaining module 301 is specifically configured to obtain a signature verification duration for verifying the V2X message by the security chip. And when the signature verification duration is greater than the first signature verification time threshold, determining that the signature verification load state is a high load.
In some embodiments, the obtaining module 301 is specifically configured to obtain a first timestamp when sending the V2X message to the secure chip. And receiving the signature verification result of the V2X message returned by the security chip, and acquiring a second time stamp when the signature verification result of the V2X message is received. The signature verification duration is the time difference between the first time stamp and the second time stamp.
In some embodiments, the sending module 302 is specifically configured to obtain a priority level of at least one V2X message with the same sender identifier received. A V2X message of the at least one V2X message with a priority level above the first priority threshold is determined to be a first V2X message.
In some embodiments, the sending module 302 is further configured to send M second V2X messages to the security chip when the received plurality of first V2X messages includes N second V2X messages with the same priority, where M is smaller than N.
In some embodiments, the sending module 302 is further configured to determine a priority level and a sender distance at which at least one V2X message is received. And determining that the V2X message with the distance of the sender larger than a preset distance threshold and the priority level higher than a second priority threshold in at least one V2X message is a first V2X message. And, the V2X message with the sender distance less than or equal to the distance threshold is the first V2X message.
In some embodiments, the sending module 302 is further configured to determine that a non-high-risk message of the at least one V2X message received is a first V2X message, the sender identifier of the non-high-risk message is different from the sender identifier of the high-risk message, and the high-risk message is a V2X message that fails in the security chip check-sign.
In some embodiments, the sending module 302 is further configured to send all subsequent received V2X messages to the security chip for signature verification when the signature verification load status is a low load.
In some embodiments, the obtaining module 301 is further configured to receive the signature verification load information from the security chip. And when the signature verification load information indicates that the signature verification load of the security chip is smaller than the second load threshold value, determining that the signature verification load state is a low load.
In some embodiments, the obtaining module 301 is further configured to obtain a signature verification duration for verifying the V2X message by the security chip. And when the signature verification duration is less than the second signature verification time threshold, determining that the signature verification load state is a low load.
It should be noted that, because the contents of information interaction, execution process, and the like between the modules are based on the same concept as that of the embodiment of the method of the present application, specific functions and technical effects thereof may be specifically referred to a part of the embodiment of the method, and details are not described here.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 8, the electronic apparatus 4 of this embodiment includes: at least one processor 401 (only one processor is shown in fig. 8), a memory 402, a secure chip 404, and a computer program 403 stored in the memory 402 and executable on the at least one processor 401. The steps in the above-described method embodiments are implemented by the secure chip 404 when the processor 401 executes the computer program 403.
The electronic device 4 may be a mobile phone, a desktop computer, a notebook, a palm computer, a cloud server, or other electronic devices. The electronic device may include, but is not limited to, a processor 401, a memory 402. Those skilled in the art will appreciate that fig. 8 is merely an example of the electronic device 4, and does not constitute a limitation of the electronic device 4, and may include more or less components than those shown, or combine some of the components, or different components, such as an input-output device, a network access device, etc.
The Processor 401 may be a Central Processing Unit (CPU), and the Processor 401 may be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 402 may be an internal storage unit of the electronic device 4 in some embodiments, such as a hard disk or a memory of the electronic device 4. The memory 402 may also be an external storage device of the electronic device 4 in other embodiments, such as a plug-in hard disk provided on the electronic device 4, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and so on. Further, the memory 402 may also include both internal storage units of the electronic device 4 and external storage devices. The memory 402 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of a computer program. The memory 402 may also be used to temporarily store data that has been output or is to be output.
The secure chip 404 is a chip that can provide the V2X application security service, and the secure chip 404 may be a separate chip or a structure that is integrated in another chip and can implement the function of the secure chip. V2X application security services may include signing, verification, encryption, decryption, key writing, or certificate writing. The specific form of the security chip is not limited in this application.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or apparatus capable of carrying computer program code to an electronic device, a recording medium, computer Memory, Read-Only Memory (ROM), Random-Access Memory (RAM), an electrical carrier signal, a telecommunications signal, and a software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
An embodiment of the present application provides a chip system, where the chip system includes a memory and a processor, and the processor executes a computer program stored in the memory to implement the steps in the foregoing method embodiments.
An embodiment of the present application provides a chip system, where the chip system includes a processor, the processor is coupled to a computer-readable storage medium, and the processor executes a computer program stored in the computer-readable storage medium to implement the steps in the above-mentioned method embodiments.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed method, apparatus and electronic device may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Finally, it should be noted that: the above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (14)

1. A V2X signature verification method is applied to electronic equipment, wherein a security chip is arranged in the electronic equipment, and the method is characterized by comprising the following steps:
acquiring the signature verification load state of the security chip;
and when the signature verification load state is a high load, sending a first V2X message which is subsequently received and accords with a preset filtering rule to the security chip for signature verification.
2. The method of claim 1, wherein obtaining the signature verification load status of the security chip comprises:
receiving label checking load information from a security chip;
when the signature verification load information indicates that the signature verification load of the security chip is greater than a first load threshold value, determining that the signature verification load state is a high load.
3. The method of claim 1, wherein obtaining the signature verification load status of the security chip comprises:
acquiring the signature verification duration of the security chip for verifying the V2X message;
and when the signature verification duration is greater than a first signature verification time threshold, determining that the signature verification load state is a high load.
4. The method according to claim 3, wherein the obtaining of the signature verification duration for the secure chip to verify the V2X message comprises:
acquiring a first timestamp when the V2X message is sent to the security chip;
receiving the signature verification result of the V2X message returned by the security chip, and acquiring a second timestamp when the signature verification result of the V2X message is received;
the signature verification duration is a time difference between the first timestamp and the second timestamp.
5. The method according to any one of claims 1 to 4, wherein determining the mode of the first V2X message meeting the preset filtering rule comprises:
acquiring the priority level of at least one V2X message with the same identification of the received sender;
determining a V2X message of the at least one V2X message having a priority level above a first priority threshold to be the first V2X message.
6. The method of claim 5, further comprising:
when N second V2X messages with the same priority are included in the received multiple first V2X messages, M second V2X messages are sent to the security chip, and M is smaller than N.
7. The method according to any one of claims 1 to 4, wherein the determining the first V2X message meeting the preset filtering rule further comprises:
determining a priority level and sender distance of receipt of at least one V2X message;
determining that the V2X message of the at least one V2X message for which the sender distance is greater than a preset distance threshold and the priority level is above a second priority threshold is the first V2X message; and the combination of (a) and (b),
the V2X message with the sender distance less than or equal to the distance threshold is the first V2X message.
8. The method according to any one of claims 1 to 4, wherein determining the mode of the first V2X message meeting the preset filtering rule comprises:
determining that a non-high-risk message of the received at least one V2X message is the first V2X message, wherein the sender identification of the non-high-risk message is different from the sender identification of a high-risk message, and the high-risk message is a V2X message which does not pass the verification of the security chip.
9. The method according to any one of claims 1-8, further comprising:
and when the signature verification load state is a low load, sending all subsequent received V2X messages to the security chip for signature verification.
10. The method of claim 9, wherein obtaining the signature verification load status of the security chip comprises:
receiving label checking load information from a security chip;
when the signature verification load information indicates that the signature verification load of the security chip is smaller than a second load threshold value, determining that the signature verification load state is a low load.
11. The method of claim 9, wherein obtaining the signature verification load status of the security chip comprises:
acquiring the signature verification duration of the security chip for verifying the V2X message;
and when the signature verification duration is smaller than a second signature verification time threshold, determining that the signature verification load state is a low load.
12. A V2X signature verification device, comprising:
the acquisition module is used for acquiring the label checking load state of the security chip;
and the sending module is used for sending a first V2X message which is subsequently received and accords with a preset filtering rule to the security chip for signature verification when the signature verification load state is a high load.
13. An electronic device comprising a memory, a processor, a secure chip, and a computer program stored in the memory and executable on the processor, wherein the processor, when executing the computer program, implements the method of any of claims 1 to 11 via the secure chip.
14. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 11.
CN202110338299.1A 2021-03-29 2021-03-29 V2X signature verification method and device, electronic equipment and readable storage medium Active CN113795008B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110338299.1A CN113795008B (en) 2021-03-29 2021-03-29 V2X signature verification method and device, electronic equipment and readable storage medium
PCT/CN2022/071406 WO2022206107A1 (en) 2021-03-29 2022-01-11 V2x signature verification method and apparatus, electronic device, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110338299.1A CN113795008B (en) 2021-03-29 2021-03-29 V2X signature verification method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN113795008A true CN113795008A (en) 2021-12-14
CN113795008B CN113795008B (en) 2022-08-02

Family

ID=78876876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110338299.1A Active CN113795008B (en) 2021-03-29 2021-03-29 V2X signature verification method and device, electronic equipment and readable storage medium

Country Status (2)

Country Link
CN (1) CN113795008B (en)
WO (1) WO2022206107A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114567445A (en) * 2022-02-28 2022-05-31 苏州国芯科技股份有限公司 Signature verification data transmission method, device, equipment and medium
WO2022206107A1 (en) * 2021-03-29 2022-10-06 荣耀终端有限公司 V2x signature verification method and apparatus, electronic device, and readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015028194A1 (en) * 2013-08-26 2015-03-05 Continental Teves Ag & Co. Ohg Filter method for adapting a computing load
US20180069800A1 (en) * 2015-04-17 2018-03-08 Continental Teves Ag & Co. Ohg Method for determining a channel load and method for adjusting a preprocessing in a vehicle-to-x communication, vehicle-to-x communication system and computer-readable storage medium
CN108668258A (en) * 2018-05-09 2018-10-16 中国信息通信研究院 V2X communicates quick identity authorization system and method
CN110572266A (en) * 2018-06-06 2019-12-13 黑莓有限公司 Method and system for reducing processing load of V2X receiver by using certificate
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium
CN111885065A (en) * 2020-07-24 2020-11-03 重庆邮电大学 Vehicle-mounted terminal message preprocessing system based on V2X
CN111901126A (en) * 2020-08-05 2020-11-06 深圳旺富达讯息技术有限公司 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer
CN111919421A (en) * 2018-04-09 2020-11-10 黑莓有限公司 Method and system for reduced V2X receiver processing load using network-based application layer message processing
CN112367642A (en) * 2020-10-30 2021-02-12 东风汽车集团有限公司 Vehicle-mounted network load balancing method based on TBOX and mobile phone

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102016217099B4 (en) * 2016-09-08 2019-12-24 Continental Teves Ag & Co. Ohg Process for processing vehicle-to-X messages
US10491405B2 (en) * 2016-10-04 2019-11-26 Denso International America, Inc. Cryptographic security verification of incoming messages
CN112399347B (en) * 2019-07-31 2022-04-05 华为技术有限公司 Message processing method and device
TWI719617B (en) * 2019-09-02 2021-02-21 啟碁科技股份有限公司 Distance-based packet filtering method and system thereof
CN113795008B (en) * 2021-03-29 2022-08-02 荣耀终端有限公司 V2X signature verification method and device, electronic equipment and readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015028194A1 (en) * 2013-08-26 2015-03-05 Continental Teves Ag & Co. Ohg Filter method for adapting a computing load
US20180069800A1 (en) * 2015-04-17 2018-03-08 Continental Teves Ag & Co. Ohg Method for determining a channel load and method for adjusting a preprocessing in a vehicle-to-x communication, vehicle-to-x communication system and computer-readable storage medium
CN111919421A (en) * 2018-04-09 2020-11-10 黑莓有限公司 Method and system for reduced V2X receiver processing load using network-based application layer message processing
CN108668258A (en) * 2018-05-09 2018-10-16 中国信息通信研究院 V2X communicates quick identity authorization system and method
CN110572266A (en) * 2018-06-06 2019-12-13 黑莓有限公司 Method and system for reducing processing load of V2X receiver by using certificate
CN111182497A (en) * 2019-12-27 2020-05-19 国家计算机网络与信息安全管理中心 V2X anonymous authentication method, device and storage medium
CN111885065A (en) * 2020-07-24 2020-11-03 重庆邮电大学 Vehicle-mounted terminal message preprocessing system based on V2X
CN111901126A (en) * 2020-08-05 2020-11-06 深圳旺富达讯息技术有限公司 Method for avoiding time consumption of decryption and signature verification module based on V2X protocol stack network layer
CN112367642A (en) * 2020-10-30 2021-02-12 东风汽车集团有限公司 Vehicle-mounted network load balancing method based on TBOX and mobile phone

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022206107A1 (en) * 2021-03-29 2022-10-06 荣耀终端有限公司 V2x signature verification method and apparatus, electronic device, and readable storage medium
CN114567445A (en) * 2022-02-28 2022-05-31 苏州国芯科技股份有限公司 Signature verification data transmission method, device, equipment and medium

Also Published As

Publication number Publication date
CN113795008B (en) 2022-08-02
WO2022206107A1 (en) 2022-10-06

Similar Documents

Publication Publication Date Title
US8050811B2 (en) Method for controlling the distribution of vehicle-related data
CN101369896B (en) Method of authenticating a short message service (SMS) message
US8819418B2 (en) Communication system, vehicle-mounted terminal, roadside device
EP2942921B1 (en) System and method for filtering digital certificates
CN105391681B (en) Communication system, communication device, vehicle, and communication method
CN113795008B (en) V2X signature verification method and device, electronic equipment and readable storage medium
CN107682859B (en) Message processing method and related equipment
CN110149611B (en) Identity verification method, equipment, system and computer readable medium
CN111224781B (en) Method and apparatus for managing registration credentials in a security credential management system
CN112435028B (en) Block chain-based Internet of things data sharing method and device
CN112217795B (en) Method and device for managing communication security of intelligent electric meter
CN108141758A (en) Connectionless data transmission
CN111107546A (en) Target object verification method and system, storage medium and electronic device
CN112152791B (en) Certificate updating method and related equipment
CN114093201A (en) Flight equipment management method, device, equipment and storage medium
CN101827094B (en) Method for sending down digital certificate, device and system
CN114025328B (en) Vehicle verification method, control function entity and vehicle
JP2016119543A (en) Radio communication device, server, mobile station, and method related thereto
CN112003867B (en) Communication method of vehicle-mounted T-BOX and cloud server and related equipment
CN115766023A (en) Encryption algorithm-based vehicle cross-functional domain secret key and certificate dynamic updating system
CN110519708B (en) Point-to-multipoint communication method and device based on PC5 interface
CN113709849A (en) Network access method and device of equipment to be accessed to network, storage medium and electronic device
CN112102617A (en) Multifunctional road indication and information acquisition intelligent management system
CN112804102A (en) Equipment binding method and device and terminal
CN111428279A (en) Explicit certificate generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant