CN108055240A - A kind of user authentication method of shared automobile - Google Patents
A kind of user authentication method of shared automobile Download PDFInfo
- Publication number
- CN108055240A CN108055240A CN201711128050.8A CN201711128050A CN108055240A CN 108055240 A CN108055240 A CN 108055240A CN 201711128050 A CN201711128050 A CN 201711128050A CN 108055240 A CN108055240 A CN 108055240A
- Authority
- CN
- China
- Prior art keywords
- server
- user
- enterprise
- message
- sig
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Electromagnetism (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Accounting & Taxation (AREA)
- Medical Informatics (AREA)
- Power Engineering (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of user authentication methods of shared automobile, the shared automobile Quick Response Code that this method passes through another enterprise B of client scan by the user of a shared Automobile Enterprises A, enterprise A creates temporary identity for the user, and it is provided to enterprise B, make user that the shared automobile can be used and do not have to reveal user information to enterprise B, after automobile use, signed by the tripartite to transaction record, ensure the integrality and verifiability of transaction record.
Description
【Technical field】
The invention belongs to shared automobile and information security field more particularly to a kind of user authentication methods of shared automobile.
【Background technology】
In recent years, with the fast development of shared economy, shared trip becomes a huge market.Shared bicycle
It is that the most common type shares trip mode on the market now, in this manner, user is usually required in shared bicycle enterprise
In registered, such as registered using its cell-phone number, then identifier of the cell-phone number as user identity.Then user is paying signature
Jin Hou, it is possible to the APP of bicycle enterprise is shared by the user's identity logs, is used by the Quick Response Code with scanning car shared
Bicycle.
After shared bicycle, more and more enterprises have carried out the business model of shared automobile, share the use of automobile
Mode and shared bicycle are essentially identical.For a user, if it is desired to more convenient trip, it is necessary to register more families and share vapour
Vehicle enterprise, and pay more parts of cash pledges.But compared to shared bicycle for, since the difference of hardware cost, delay penalty etc. are asked
Topic shares the cash pledge higher that automobile needs, therefore few users are ready that registering more families simultaneously shares Automobile Enterprises.Therefore, it is real
In the application of border, user wishes can be in the case where only registering an enterprise, it becomes possible to use the shared automobile of different enterprises.
The mode to solve the above problems is shared user between each enterprise.But, on the one hand, most enterprises
It is not intended to competitive enterprise and gets the user information of oneself, such as user mobile phone number described above, on the other hand, due to phase
Legal provisions are closed, when using the shared automobile of other, once going wrong, vehicle owner allows for tracing user's
True identity.In order to solve the contradiction of these two aspects, it is necessary to a kind of new shared user vehicle verification method.
【The content of the invention】
In order to solve the above problem of the prior art, the present invention proposes a kind of user authentication method of shared automobile.
The technical solution adopted by the present invention is as follows:
A kind of user authentication method of shared automobile, this method use the shared vapour of enterprise B for the registered user of enterprise A
Vehicle opens the step of sharing automobile including user and user terminates to use the step of sharing automobile;Wherein, user opens altogether
The step of enjoying automobile is as follows:
(1.1) user starts the client of enterprise A on its mobile terminal, after logging in the client using its User ID,
By the client scan and read the Quick Response Code on shared body of a motor car;
(1.2) 2 D code information of reading and the User ID are sent to the server A of enterprise A by the client;
(1.3) after the server A receives the 2 D code information, it is being total to for enterprise B to identify the 2 D code information
Enjoy automobile Quick Response Code;
(1.4) server A creates an interim ID, i.e. ID=Hash (IDA‖UserID‖E);Wherein, Hash is
One hash function, ‖ represent concatenation operation, IDAIt is the identifier of enterprise A, UserID is the User ID, and E is the two dimension
Code information;
(1.5) ID of generation and the 2 D code information are sent to the server B of enterprise B by the server A;
(1.6) for server B after above- mentioned information is obtained, remote opening shares automobile accordingly, and the user is allowed to use;
The step of user terminates using shared automobile is as follows:
(2.1) after user's vehicle, the shared automobile generation transaction record T, and the transaction record T is sent to
The server B;
(2.2) then the server B generates message M using the digital signature of its private key generation transaction record1, i.e. M1=
{ T, SigB(T) }, wherein SigB() is the function being digitally signed using the private key of server B;
(2.3) server B is by message M1Server A is sent to, server A is tested using the digital certificate of server B
Demonstrate,prove message M1Whether the digital signature of middle server B is correct, if incorrect, server A sends refuse information to server
B, otherwise server A is by message M1It is transmitted to the mobile terminal of user;
(2.4) mobile terminal is receiving message M1Afterwards, it is this transaction one temporary private of generation
PrivateKey, i.e. PrivateKey=IDA‖ UserID ‖ E ‖ PW, wherein PW are password of the user when enterprise A is registered, and are made
With the temporary private to M1In transaction record T be digitally signed, obtain digital signature result Siguser(T), and by the number
Result of signing Siguser(T) it is sent to server A;
(2.5) server A generates the temporary private, and generates corresponding public key, server A according to the temporary private
Receiving the Siguser(T) after, public key verifications Sig is useduser(T) it is whether correct, if incorrect, server A hair
Refuse information is sent to the mobile terminal, otherwise server A continues subsequent step;
(2.6) server A generation message M2, i.e. M2={ Siguser(T),SigA(Siguser(T)) }, wherein SigA() is to make
The function being digitally signed with the private key of server A, and server A is by message M2It is sent to server B.
(2.7) server A and server B preserve message M simultaneously1With message M2。
Further, server A, server B and mobile terminal all use identical Digital Signature Algorithm.
Further, the server A and server B have the digital certificate and public private key pair of its own..
Further, if server B receives the refuse information of server A, server B regenerates and transmission disappears
Cease M1;If server B continuous several times receive the refuse information, server B records this abnormal conditions, and asks custodian
Member's intervention.
Further, in the step 2.4, mobile terminal is digitally signed again after the user approval, if user is not
Agree to signature, then the mobile terminal refuses signature to server A report user, and server A records this refusal situation, by follow-up
Administrative staff handled.
Further, in step 2.5, if mobile terminal receives refuse information, it can regenerate and send number
If signature as a result, and server A continuous several times verification it is incorrect, server A records this abnormal conditions, by follow-up management
Personnel are handled.
Further, the mobile terminal is smart mobile phone or Intelligent flat.
Further, the Hash functions are SHA256.
Further, the User ID is the user account that the user is registered in enterprise A.
Further, the User ID is the cell-phone number or identification card number of user.
Beneficial effects of the present invention include:User can use other enterprises after a shared Automobile Enterprises registration
Shared automobile, while do not reveal own user information again, in subsequent need, the user can also be traced, is in addition also ensured
The verifiabilities of customer transaction data.
【Description of the drawings】
Attached drawing described herein be for providing a further understanding of the present invention, forming the part of the application, but
It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is the basic block diagram of present system.
【Specific embodiment】
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and say
It is bright to be only used for explaining the present invention but not as a limitation of the invention.
Referring to attached drawing 1, it illustrates the basic system structure that the method for the present invention is run, whole system includes at least two
The server that enterprise's (enterprise A and enterprise B) and each enterprise are possessed, i.e. server A and server B.The enterprise A tools
There are one or multiple registered users, each user hold the mobile terminal of oneself, such as smart mobile phone, Intelligent flat etc..Institute
The client that enterprise A is mounted on mobile terminal is stated, by the camera on the client and mobile terminal, can scan and read
Quick Response Code on shared body of a motor car.Own if shared automobile belongs to enterprise A, user can directly pass through the client
Normal flow is using the shared automobile, this flow has been those skilled in the known art, and details are not described herein.Institute of the present invention
It is concerned with belonging to enterprise B institute sometimes when the shared automobile, how the registered user of enterprise A is made by the client of enterprise A
Automobile is shared with this.
Based on above-mentioned basic system structure, the method for the present invention is described in detail below.
The step of method of the present invention can be divided into two parts, and user opens shared automobile and user terminate to use
The step of shared automobile.
It is as follows that user opens the step of shared automobile:
(1.1) user starts the client of enterprise A on its mobile terminal, after logging in the client using its User ID,
By the client scan and read the Quick Response Code on shared body of a motor car.
The shared automobile, which belongs to enterprise B, to be owned, therefore is also enterprise B letter related to the shared automobile in its Quick Response Code
Breath, client does not identify the Quick Response Code specifically, and simply reads the Quick Response Code according to the coding rule of Quick Response Code.
The User ID is the user account that the user is registered in enterprise A, such as the cell-phone number of individual subscriber can be used
Or identification card number is as User ID;In addition also need to set its password PW during user's registration, therefore server A needs are deposited simultaneously
Store up the User ID of registered user and password PW.
(1.2) 2 D code information of reading and the User ID are sent to the server A of enterprise A by the client.
The server A is the server that enterprise A is used to manage shared automobile, and client and the server A of enterprise A carry out
Communication, since client does not identify Quick Response Code specifically, all Quick Response Codes read are all sent to server A and are identified.
(1.3) after the server A receives the 2 D code information, it is being total to for enterprise B to identify the 2 D code information
Enjoy automobile Quick Response Code.
The 2 D code information that server A receives can also be the Quick Response Code that enterprise A is possessed, but the present invention only focuses on
The situation for the Quick Response Code that itself and nonbusiness A are possessed.
(1.4) server A creates an interim ID, i.e. ID=Hash (IDA‖UserID‖E)。
Wherein, Hash is a hash function, and hash function well known to any one in this field may be employed, such as
SHA256.‖ represents concatenation operation, i.e., character string or binary string is connected.IDAIt is the identifier of enterprise A, UserID is
The User ID, E are the 2 D code informations.
(1.5) ID of generation and the 2 D code information are sent to the server B of enterprise B by the server A.
Server B can identify specifically after server A receives ID and 2 D code information from 2 D code information
Shared automobile, and it is known that some registered user of enterprise A is needed using the shared automobile, server B stores ID works
For the registered user, this uses the identifier for sharing automobile.Since the ID is a cryptographic Hash, enterprise B can not
The user information of enterprise A is obtained from ID, but if subsequently occurring disputing on, it is necessary to when verifying particular user ID, enterprise A also may be used
To prove that the ID is strictly to be calculated based on the User ID, thus in the case where not revealing user information, it is ensured that
Verifiability.
(1.6) server B is after above- mentioned information is obtained, it is possible to which remote opening shares automobile accordingly, allows the user
It uses.
Above-mentioned steps show that user opens the process that enterprise B shares automobile, after user has used the shared automobile,
The step of it needs to carry out knot expense and transaction record, therefore user terminates using shared automobile is as follows:
(2.1) after user's vehicle, the shared automobile generation transaction record T, and the transaction record T is sent to
The server B.
Transaction record can include distance travelled, expense etc. information, and the specific information content depends on setting for enterprise B
It puts.
(2.2) then the server B generates message M using the digital signature of its private key generation transaction record1, i.e. M1=
{ T, SigB(T) }, wherein SigB() is the function being digitally signed using the private key of server B.
Usually, each enterprise all has the digital certificate of its own and public private key pair corresponding with digital certificate,
So as to which private key is used to be digitally signed.SigBThe specific Digital Signature Algorithm present invention used is not limited, can root
It is selected according to concrete condition.
(2.3) server B is by message M1Server A is sent to, server A is tested using the digital certificate of server B
Demonstrate,prove message M1Whether the digital signature of middle server B is correct, if incorrect, server A sends refuse information to server
B, otherwise server A is by message M1It is transmitted to the mobile terminal of user.
If server B receives refuse information, needs regenerate and send message M1If server B quilt
Continuous refusal repeatedly (number can be preset), has then been likely to occur serious system mistake, server B records the exception at this time
Situation, and administrative staff is asked to intervene.
(2.4) mobile terminal is receiving message M1Afterwards, it is this transaction one temporary private of generation
PrivateKey, i.e. PrivateKey=IDA‖ UserID ‖ E ‖ PW, wherein PW are password of the user when enterprise A is registered, and are made
With the temporary private to M1In transaction record T be digitally signed, obtain digital signature result Siguser(T), and by the number
Result of signing Siguser(T) it is sent to server A.
It should be noted that mobile terminal is only after the user approval, above-mentioned digital signature can be just carried out, to represent use
Accreditation of the family for transaction record, if user refuses signature, mobile terminal refuses signature to server A report user, from
And server A records this refusal situation, is handled by subsequent administrative staff.
The Digital Signature Algorithm that mobile terminal uses can also use the well known digital signature of any one in this field to calculate
Method, it is preferred that it should use identical Digital Signature Algorithm with server B.Since mobile terminal is using interim private
Key is signed, and for such user every time using shared automobile, the private key of signature is all different, greatly strengthens security.
(2.5) all information of above-mentioned temporary private are formed since server A also recalls that, server A can also give birth to
Corresponding public key is generated into the temporary private, and according to the temporary private, server A is receiving the Siguser(T)
Afterwards, using public key verifications Siguser(T) whether correct, if incorrect, server A sends refuse information to the movement
Terminal, otherwise server A continue subsequent step.
With foregoing similar, mobile terminal can regenerate and send digital signature result after refuse information is received,
And if server A continuous several times verify incorrect (number can be preset), server A records this abnormal conditions, by
Follow-up management personnel are handled.
(2.6) server A generation message M2, i.e. M2={ Siguser(T),SigA(Siguser(T)) }, wherein SigA() is to make
The function being digitally signed with the private key of server A, and server A is by message M2It is sent to server B.
(2.7) server A and server B preserve message M simultaneously1With message M2, checked in this, as subsequent charging and account
Foundation.
By above-mentioned steps, transaction record substantially obtains tripartite's signature simultaneously, and is stored in enterprise A and enterprise
On the server of B, this so that subsequent charge is more convenient reliable, and in whole process, enterprise B can not obtain additional letter
Breath, can also be signed retrospect transaction record when there is dispute by tripartite.
The above is only the better embodiment of the present invention, therefore all constructions according to described in present patent application scope,
The equivalent change or modification that feature and principle are done, is included in the range of present patent application.
Claims (10)
1. a kind of user authentication method of shared automobile, which is characterized in that this method uses enterprise for the registered user of enterprise A
The shared automobile of B opens the step of sharing automobile including user and user terminates to use the step of sharing automobile;Wherein, use
It is as follows that the step of shared automobile, is opened at family:
(1.1) user starts the client of enterprise A on its mobile terminal, after logging in the client using its User ID, passes through
The client scan simultaneously reads the Quick Response Code on shared body of a motor car;
(1.2) 2 D code information of reading and the User ID are sent to the server A of enterprise A by the client;
(1.3) after the server A receives the 2 D code information, it is the shared vapour of enterprise B to identify the 2 D code information
Vehicle Quick Response Code;
(1.4) server A creates an interim ID, i.e. ID=Hash (IDA‖UserID‖E);Wherein, Hash is one
Hash function, ‖ represent concatenation operation, IDAIt is the identifier of enterprise A, UserID is the User ID, and E is the Quick Response Code letter
Breath;
(1.5) ID of generation and the 2 D code information are sent to the server B of enterprise B by the server A;
(1.6) for server B after above- mentioned information is obtained, remote opening shares automobile accordingly, and the user is allowed to use;
The step of user terminates using shared automobile is as follows:
(2.1) after user's vehicle, the shared automobile generation transaction record T, and the transaction record T is sent to described
Server B;
(2.2) then the server B generates message M using the digital signature of its private key generation transaction record1, i.e. M1=T,
SigB(T) }, wherein SigB() is the function being digitally signed using the private key of server B;
(2.3) server B is by message M1Server A is sent to, server A uses the digital certificate authentication message of server B
M1Whether the digital signature of middle server B is correct, if incorrect, server A sends refuse information to server B, otherwise
Server A is by message M1It is transmitted to the mobile terminal of user;
(2.4) mobile terminal is receiving message M1Afterwards, it is this transaction one temporary private PrivateKey of generation, i.e.,
PrivateKey=IDA‖ UserID ‖ E ‖ PW, wherein PW are password of the user when enterprise A is registered, and use the temporary private
To M1In transaction record T be digitally signed, obtain digital signature result Siguser(T), and by the digital signature result
Siguser(T) it is sent to server A;
(2.5) server A generates the temporary private, and generates corresponding public key according to the temporary private, and server A is connecing
Receive the Siguser(T) after, public key verifications Sig is useduser(T) whether correct, if incorrect, server A transmission is refused
Exhausted message continues subsequent step to the mobile terminal, otherwise server A;
(2.6) server A generation message M2, i.e. M2={ Siguser(T),SigA(Siguser(T)) }, wherein SigA() is using clothes
The function that the private key of business device A is digitally signed, and server A is by message M2It is sent to server B.
(2.7) server A and server B preserve message M simultaneously1With message M2。
2. according to the method described in claim 1, it is characterized in that, server A, server B and mobile terminal are all using identical
Digital Signature Algorithm.
3. according to the method described in claim 2, it is characterized in that, the server A and server B have the number of its own
Certificate and public private key pair.
4. according to the method described in claim 1-3 any one, which is characterized in that if server B receives server A
Refuse information, then server B regenerate and send message M1;If server B continuous several times receive the refuse information, take
Business device B records this abnormal conditions, and administrative staff is asked to intervene.
5. according to the method described in any of claim 1 to 4, which is characterized in that in the step 2.4, mobile terminal with
Family is digitally signed again after agreeing to, if user disagrees signature, which refuses label to server A report user
Name, server A record this refusal situation, are handled by subsequent administrative staff.
6. according to the method described in claim 1-5 any one, which is characterized in that in step 2.5, if mobile terminal connects
Receive refuse information, can regenerate and send digital signature result, and if server A continuous several times verification it is incorrect,
Server A records this abnormal conditions, and by follow-up management, personnel are handled.
7. according to the method described in claim 1, it is characterized in that, the mobile terminal is smart mobile phone or Intelligent flat.
8. according to the method described in claim 1, it is characterized in that, the Hash functions are SHA256.
9. according to the method described in claim 1, it is characterized in that, the User ID is the use that the user is registered in enterprise A
Family account.
10. according to the method described in claim 9, it is characterized in that, the User ID is the cell-phone number or identification card number of user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711128050.8A CN108055240B (en) | 2017-11-15 | 2017-11-15 | A kind of user authentication method of shared automobile |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711128050.8A CN108055240B (en) | 2017-11-15 | 2017-11-15 | A kind of user authentication method of shared automobile |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108055240A true CN108055240A (en) | 2018-05-18 |
CN108055240B CN108055240B (en) | 2019-05-14 |
Family
ID=62119103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711128050.8A Expired - Fee Related CN108055240B (en) | 2017-11-15 | 2017-11-15 | A kind of user authentication method of shared automobile |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108055240B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108876375A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | Block chain real name participatory approaches and system |
CN109088870A (en) * | 2018-08-14 | 2018-12-25 | 国网甘肃省电力公司电力科学研究院 | A kind of method of new energy plant stand generator unit acquisition terminal secure accessing platform |
CN111402578A (en) * | 2020-02-28 | 2020-07-10 | 平安国际智慧城市科技股份有限公司 | Shared vehicle monitoring method and device based on track monitoring and computer equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102867244A (en) * | 2012-08-30 | 2013-01-09 | 江苏乐买到网络科技有限公司 | Logistics information system |
CN106549913A (en) * | 2015-09-18 | 2017-03-29 | 陕西重型汽车有限公司 | Intelligent touch screen onboard system based on car networking |
US20170127246A1 (en) * | 2015-10-28 | 2017-05-04 | Leauto Intelligent Technology (Beijing) Co. Ltd | Method for Sharing Travelling Information, Vehicle Platform and Intelligent Traffic System |
CN106651376A (en) * | 2015-11-02 | 2017-05-10 | 重庆果趣电子商务有限公司 | Electronic commerce information security processing method |
CN106921652A (en) * | 2017-01-22 | 2017-07-04 | 斑马信息科技有限公司 | Internet vehicle platform interactive system and internet vehicle platform exchange method |
US20170234691A1 (en) * | 2012-06-21 | 2017-08-17 | Cellepathy Inc. | Interface selection in navigation guidance systems |
CN107330760A (en) * | 2017-06-29 | 2017-11-07 | 苏州见真物联科技有限公司 | A kind of cross-platform sharing bicycle management method |
-
2017
- 2017-11-15 CN CN201711128050.8A patent/CN108055240B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170234691A1 (en) * | 2012-06-21 | 2017-08-17 | Cellepathy Inc. | Interface selection in navigation guidance systems |
CN102867244A (en) * | 2012-08-30 | 2013-01-09 | 江苏乐买到网络科技有限公司 | Logistics information system |
CN106549913A (en) * | 2015-09-18 | 2017-03-29 | 陕西重型汽车有限公司 | Intelligent touch screen onboard system based on car networking |
US20170127246A1 (en) * | 2015-10-28 | 2017-05-04 | Leauto Intelligent Technology (Beijing) Co. Ltd | Method for Sharing Travelling Information, Vehicle Platform and Intelligent Traffic System |
CN106651376A (en) * | 2015-11-02 | 2017-05-10 | 重庆果趣电子商务有限公司 | Electronic commerce information security processing method |
CN106921652A (en) * | 2017-01-22 | 2017-07-04 | 斑马信息科技有限公司 | Internet vehicle platform interactive system and internet vehicle platform exchange method |
CN107330760A (en) * | 2017-06-29 | 2017-11-07 | 苏州见真物联科技有限公司 | A kind of cross-platform sharing bicycle management method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108876375A (en) * | 2018-06-29 | 2018-11-23 | 全链通有限公司 | Block chain real name participatory approaches and system |
CN108876375B (en) * | 2018-06-29 | 2020-09-08 | 全链通有限公司 | Block chain real name participation method and system |
CN109088870A (en) * | 2018-08-14 | 2018-12-25 | 国网甘肃省电力公司电力科学研究院 | A kind of method of new energy plant stand generator unit acquisition terminal secure accessing platform |
CN109088870B (en) * | 2018-08-14 | 2021-05-04 | 国网甘肃省电力公司电力科学研究院 | Method for safely accessing acquisition terminal of power generation unit of new energy plant station to platform |
CN111402578A (en) * | 2020-02-28 | 2020-07-10 | 平安国际智慧城市科技股份有限公司 | Shared vehicle monitoring method and device based on track monitoring and computer equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108055240B (en) | 2019-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
CN110060037B (en) | Distributed digital identity system based on block chain | |
US11100743B1 (en) | Blockchain-based election system | |
CN109272606B (en) | Intelligent lock supervision equipment and method based on block chain and storage medium | |
CN112789823B (en) | Block chain-based competitive election network system and competitive election method | |
CN108881167A (en) | A kind of intelligent contract of finite field block catenary system | |
TW201741922A (en) | Biological feature based safety certification method and device | |
CN110490610B (en) | Community management system based on block chain | |
CN106785146A (en) | The charging method and system of the electric automobile charging pile with bluetooth | |
US20190222418A1 (en) | Systems and Methods for Key Exchange in Blockchain | |
CN107689097B (en) | Synchronizing Passwords based on frequency hopping generate and verify system and its application | |
CN105554018B (en) | Genuine cyber identification verification method | |
CN108055240B (en) | A kind of user authentication method of shared automobile | |
CN104125230B (en) | A kind of short message certification service system and authentication method | |
CN111242248B (en) | Personnel information monitoring method, device and computer storage medium | |
CN109670968A (en) | Processing method, device, equipment and the computer storage medium of insurance data | |
CN106059760B (en) | A kind of cryptographic system from user terminal crypto module calling system private key | |
CN110494878A (en) | It is remitted money by telecom operators via the digital properties of telephone number | |
CN110163998A (en) | A kind of intelligent door lock application method of intelligent door lock system and offline authentication | |
CN110060403A (en) | The more ticket electronic voting methods of a people and system based on block chain | |
CN110969531A (en) | Borrowing deposit verification and online checking method and system | |
CN109300199A (en) | Attendance checking system and Work attendance method based on block chain | |
CN109711945A (en) | A kind of vehicle sharing method and relevant apparatus | |
CN106696749A (en) | Charging method and system for electric automobile charging pile with Zigbee | |
CN108650279A (en) | Network information security acquisition method and network trading method and network safety system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190514 Termination date: 20191115 |
|
CF01 | Termination of patent right due to non-payment of annual fee |