CN108055240A - A kind of user authentication method of shared automobile - Google Patents

A kind of user authentication method of shared automobile Download PDF

Info

Publication number
CN108055240A
CN108055240A CN201711128050.8A CN201711128050A CN108055240A CN 108055240 A CN108055240 A CN 108055240A CN 201711128050 A CN201711128050 A CN 201711128050A CN 108055240 A CN108055240 A CN 108055240A
Authority
CN
China
Prior art keywords
server
user
enterprise
message
sig
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711128050.8A
Other languages
Chinese (zh)
Other versions
CN108055240B (en
Inventor
曹光宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai International Automobile City (group) Co Ltd
Original Assignee
Shanghai International Automobile City (group) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai International Automobile City (group) Co Ltd filed Critical Shanghai International Automobile City (group) Co Ltd
Priority to CN201711128050.8A priority Critical patent/CN108055240B/en
Publication of CN108055240A publication Critical patent/CN108055240A/en
Application granted granted Critical
Publication of CN108055240B publication Critical patent/CN108055240B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Electromagnetism (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Accounting & Taxation (AREA)
  • Medical Informatics (AREA)
  • Power Engineering (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of user authentication methods of shared automobile, the shared automobile Quick Response Code that this method passes through another enterprise B of client scan by the user of a shared Automobile Enterprises A, enterprise A creates temporary identity for the user, and it is provided to enterprise B, make user that the shared automobile can be used and do not have to reveal user information to enterprise B, after automobile use, signed by the tripartite to transaction record, ensure the integrality and verifiability of transaction record.

Description

A kind of user authentication method of shared automobile
【Technical field】
The invention belongs to shared automobile and information security field more particularly to a kind of user authentication methods of shared automobile.
【Background technology】
In recent years, with the fast development of shared economy, shared trip becomes a huge market.Shared bicycle It is that the most common type shares trip mode on the market now, in this manner, user is usually required in shared bicycle enterprise In registered, such as registered using its cell-phone number, then identifier of the cell-phone number as user identity.Then user is paying signature Jin Hou, it is possible to the APP of bicycle enterprise is shared by the user's identity logs, is used by the Quick Response Code with scanning car shared Bicycle.
After shared bicycle, more and more enterprises have carried out the business model of shared automobile, share the use of automobile Mode and shared bicycle are essentially identical.For a user, if it is desired to more convenient trip, it is necessary to register more families and share vapour Vehicle enterprise, and pay more parts of cash pledges.But compared to shared bicycle for, since the difference of hardware cost, delay penalty etc. are asked Topic shares the cash pledge higher that automobile needs, therefore few users are ready that registering more families simultaneously shares Automobile Enterprises.Therefore, it is real In the application of border, user wishes can be in the case where only registering an enterprise, it becomes possible to use the shared automobile of different enterprises.
The mode to solve the above problems is shared user between each enterprise.But, on the one hand, most enterprises It is not intended to competitive enterprise and gets the user information of oneself, such as user mobile phone number described above, on the other hand, due to phase Legal provisions are closed, when using the shared automobile of other, once going wrong, vehicle owner allows for tracing user's True identity.In order to solve the contradiction of these two aspects, it is necessary to a kind of new shared user vehicle verification method.
【The content of the invention】
In order to solve the above problem of the prior art, the present invention proposes a kind of user authentication method of shared automobile.
The technical solution adopted by the present invention is as follows:
A kind of user authentication method of shared automobile, this method use the shared vapour of enterprise B for the registered user of enterprise A Vehicle opens the step of sharing automobile including user and user terminates to use the step of sharing automobile;Wherein, user opens altogether The step of enjoying automobile is as follows:
(1.1) user starts the client of enterprise A on its mobile terminal, after logging in the client using its User ID, By the client scan and read the Quick Response Code on shared body of a motor car;
(1.2) 2 D code information of reading and the User ID are sent to the server A of enterprise A by the client;
(1.3) after the server A receives the 2 D code information, it is being total to for enterprise B to identify the 2 D code information Enjoy automobile Quick Response Code;
(1.4) server A creates an interim ID, i.e. ID=Hash (IDA‖UserID‖E);Wherein, Hash is One hash function, ‖ represent concatenation operation, IDAIt is the identifier of enterprise A, UserID is the User ID, and E is the two dimension Code information;
(1.5) ID of generation and the 2 D code information are sent to the server B of enterprise B by the server A;
(1.6) for server B after above- mentioned information is obtained, remote opening shares automobile accordingly, and the user is allowed to use;
The step of user terminates using shared automobile is as follows:
(2.1) after user's vehicle, the shared automobile generation transaction record T, and the transaction record T is sent to The server B;
(2.2) then the server B generates message M using the digital signature of its private key generation transaction record1, i.e. M1= { T, SigB(T) }, wherein SigB() is the function being digitally signed using the private key of server B;
(2.3) server B is by message M1Server A is sent to, server A is tested using the digital certificate of server B Demonstrate,prove message M1Whether the digital signature of middle server B is correct, if incorrect, server A sends refuse information to server B, otherwise server A is by message M1It is transmitted to the mobile terminal of user;
(2.4) mobile terminal is receiving message M1Afterwards, it is this transaction one temporary private of generation PrivateKey, i.e. PrivateKey=IDA‖ UserID ‖ E ‖ PW, wherein PW are password of the user when enterprise A is registered, and are made With the temporary private to M1In transaction record T be digitally signed, obtain digital signature result Siguser(T), and by the number Result of signing Siguser(T) it is sent to server A;
(2.5) server A generates the temporary private, and generates corresponding public key, server A according to the temporary private Receiving the Siguser(T) after, public key verifications Sig is useduser(T) it is whether correct, if incorrect, server A hair Refuse information is sent to the mobile terminal, otherwise server A continues subsequent step;
(2.6) server A generation message M2, i.e. M2={ Siguser(T),SigA(Siguser(T)) }, wherein SigA() is to make The function being digitally signed with the private key of server A, and server A is by message M2It is sent to server B.
(2.7) server A and server B preserve message M simultaneously1With message M2
Further, server A, server B and mobile terminal all use identical Digital Signature Algorithm.
Further, the server A and server B have the digital certificate and public private key pair of its own..
Further, if server B receives the refuse information of server A, server B regenerates and transmission disappears Cease M1;If server B continuous several times receive the refuse information, server B records this abnormal conditions, and asks custodian Member's intervention.
Further, in the step 2.4, mobile terminal is digitally signed again after the user approval, if user is not Agree to signature, then the mobile terminal refuses signature to server A report user, and server A records this refusal situation, by follow-up Administrative staff handled.
Further, in step 2.5, if mobile terminal receives refuse information, it can regenerate and send number If signature as a result, and server A continuous several times verification it is incorrect, server A records this abnormal conditions, by follow-up management Personnel are handled.
Further, the mobile terminal is smart mobile phone or Intelligent flat.
Further, the Hash functions are SHA256.
Further, the User ID is the user account that the user is registered in enterprise A.
Further, the User ID is the cell-phone number or identification card number of user.
Beneficial effects of the present invention include:User can use other enterprises after a shared Automobile Enterprises registration Shared automobile, while do not reveal own user information again, in subsequent need, the user can also be traced, is in addition also ensured The verifiabilities of customer transaction data.
【Description of the drawings】
Attached drawing described herein be for providing a further understanding of the present invention, forming the part of the application, but It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is the basic block diagram of present system.
【Specific embodiment】
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and say It is bright to be only used for explaining the present invention but not as a limitation of the invention.
Referring to attached drawing 1, it illustrates the basic system structure that the method for the present invention is run, whole system includes at least two The server that enterprise's (enterprise A and enterprise B) and each enterprise are possessed, i.e. server A and server B.The enterprise A tools There are one or multiple registered users, each user hold the mobile terminal of oneself, such as smart mobile phone, Intelligent flat etc..Institute The client that enterprise A is mounted on mobile terminal is stated, by the camera on the client and mobile terminal, can scan and read Quick Response Code on shared body of a motor car.Own if shared automobile belongs to enterprise A, user can directly pass through the client Normal flow is using the shared automobile, this flow has been those skilled in the known art, and details are not described herein.Institute of the present invention It is concerned with belonging to enterprise B institute sometimes when the shared automobile, how the registered user of enterprise A is made by the client of enterprise A Automobile is shared with this.
Based on above-mentioned basic system structure, the method for the present invention is described in detail below.
The step of method of the present invention can be divided into two parts, and user opens shared automobile and user terminate to use The step of shared automobile.
It is as follows that user opens the step of shared automobile:
(1.1) user starts the client of enterprise A on its mobile terminal, after logging in the client using its User ID, By the client scan and read the Quick Response Code on shared body of a motor car.
The shared automobile, which belongs to enterprise B, to be owned, therefore is also enterprise B letter related to the shared automobile in its Quick Response Code Breath, client does not identify the Quick Response Code specifically, and simply reads the Quick Response Code according to the coding rule of Quick Response Code.
The User ID is the user account that the user is registered in enterprise A, such as the cell-phone number of individual subscriber can be used Or identification card number is as User ID;In addition also need to set its password PW during user's registration, therefore server A needs are deposited simultaneously Store up the User ID of registered user and password PW.
(1.2) 2 D code information of reading and the User ID are sent to the server A of enterprise A by the client.
The server A is the server that enterprise A is used to manage shared automobile, and client and the server A of enterprise A carry out Communication, since client does not identify Quick Response Code specifically, all Quick Response Codes read are all sent to server A and are identified.
(1.3) after the server A receives the 2 D code information, it is being total to for enterprise B to identify the 2 D code information Enjoy automobile Quick Response Code.
The 2 D code information that server A receives can also be the Quick Response Code that enterprise A is possessed, but the present invention only focuses on The situation for the Quick Response Code that itself and nonbusiness A are possessed.
(1.4) server A creates an interim ID, i.e. ID=Hash (IDA‖UserID‖E)。
Wherein, Hash is a hash function, and hash function well known to any one in this field may be employed, such as SHA256.‖ represents concatenation operation, i.e., character string or binary string is connected.IDAIt is the identifier of enterprise A, UserID is The User ID, E are the 2 D code informations.
(1.5) ID of generation and the 2 D code information are sent to the server B of enterprise B by the server A.
Server B can identify specifically after server A receives ID and 2 D code information from 2 D code information Shared automobile, and it is known that some registered user of enterprise A is needed using the shared automobile, server B stores ID works For the registered user, this uses the identifier for sharing automobile.Since the ID is a cryptographic Hash, enterprise B can not The user information of enterprise A is obtained from ID, but if subsequently occurring disputing on, it is necessary to when verifying particular user ID, enterprise A also may be used To prove that the ID is strictly to be calculated based on the User ID, thus in the case where not revealing user information, it is ensured that Verifiability.
(1.6) server B is after above- mentioned information is obtained, it is possible to which remote opening shares automobile accordingly, allows the user It uses.
Above-mentioned steps show that user opens the process that enterprise B shares automobile, after user has used the shared automobile, The step of it needs to carry out knot expense and transaction record, therefore user terminates using shared automobile is as follows:
(2.1) after user's vehicle, the shared automobile generation transaction record T, and the transaction record T is sent to The server B.
Transaction record can include distance travelled, expense etc. information, and the specific information content depends on setting for enterprise B It puts.
(2.2) then the server B generates message M using the digital signature of its private key generation transaction record1, i.e. M1= { T, SigB(T) }, wherein SigB() is the function being digitally signed using the private key of server B.
Usually, each enterprise all has the digital certificate of its own and public private key pair corresponding with digital certificate, So as to which private key is used to be digitally signed.SigBThe specific Digital Signature Algorithm present invention used is not limited, can root It is selected according to concrete condition.
(2.3) server B is by message M1Server A is sent to, server A is tested using the digital certificate of server B Demonstrate,prove message M1Whether the digital signature of middle server B is correct, if incorrect, server A sends refuse information to server B, otherwise server A is by message M1It is transmitted to the mobile terminal of user.
If server B receives refuse information, needs regenerate and send message M1If server B quilt Continuous refusal repeatedly (number can be preset), has then been likely to occur serious system mistake, server B records the exception at this time Situation, and administrative staff is asked to intervene.
(2.4) mobile terminal is receiving message M1Afterwards, it is this transaction one temporary private of generation PrivateKey, i.e. PrivateKey=IDA‖ UserID ‖ E ‖ PW, wherein PW are password of the user when enterprise A is registered, and are made With the temporary private to M1In transaction record T be digitally signed, obtain digital signature result Siguser(T), and by the number Result of signing Siguser(T) it is sent to server A.
It should be noted that mobile terminal is only after the user approval, above-mentioned digital signature can be just carried out, to represent use Accreditation of the family for transaction record, if user refuses signature, mobile terminal refuses signature to server A report user, from And server A records this refusal situation, is handled by subsequent administrative staff.
The Digital Signature Algorithm that mobile terminal uses can also use the well known digital signature of any one in this field to calculate Method, it is preferred that it should use identical Digital Signature Algorithm with server B.Since mobile terminal is using interim private Key is signed, and for such user every time using shared automobile, the private key of signature is all different, greatly strengthens security.
(2.5) all information of above-mentioned temporary private are formed since server A also recalls that, server A can also give birth to Corresponding public key is generated into the temporary private, and according to the temporary private, server A is receiving the Siguser(T) Afterwards, using public key verifications Siguser(T) whether correct, if incorrect, server A sends refuse information to the movement Terminal, otherwise server A continue subsequent step.
With foregoing similar, mobile terminal can regenerate and send digital signature result after refuse information is received, And if server A continuous several times verify incorrect (number can be preset), server A records this abnormal conditions, by Follow-up management personnel are handled.
(2.6) server A generation message M2, i.e. M2={ Siguser(T),SigA(Siguser(T)) }, wherein SigA() is to make The function being digitally signed with the private key of server A, and server A is by message M2It is sent to server B.
(2.7) server A and server B preserve message M simultaneously1With message M2, checked in this, as subsequent charging and account Foundation.
By above-mentioned steps, transaction record substantially obtains tripartite's signature simultaneously, and is stored in enterprise A and enterprise On the server of B, this so that subsequent charge is more convenient reliable, and in whole process, enterprise B can not obtain additional letter Breath, can also be signed retrospect transaction record when there is dispute by tripartite.
The above is only the better embodiment of the present invention, therefore all constructions according to described in present patent application scope, The equivalent change or modification that feature and principle are done, is included in the range of present patent application.

Claims (10)

1. a kind of user authentication method of shared automobile, which is characterized in that this method uses enterprise for the registered user of enterprise A The shared automobile of B opens the step of sharing automobile including user and user terminates to use the step of sharing automobile;Wherein, use It is as follows that the step of shared automobile, is opened at family:
(1.1) user starts the client of enterprise A on its mobile terminal, after logging in the client using its User ID, passes through The client scan simultaneously reads the Quick Response Code on shared body of a motor car;
(1.2) 2 D code information of reading and the User ID are sent to the server A of enterprise A by the client;
(1.3) after the server A receives the 2 D code information, it is the shared vapour of enterprise B to identify the 2 D code information Vehicle Quick Response Code;
(1.4) server A creates an interim ID, i.e. ID=Hash (IDA‖UserID‖E);Wherein, Hash is one Hash function, ‖ represent concatenation operation, IDAIt is the identifier of enterprise A, UserID is the User ID, and E is the Quick Response Code letter Breath;
(1.5) ID of generation and the 2 D code information are sent to the server B of enterprise B by the server A;
(1.6) for server B after above- mentioned information is obtained, remote opening shares automobile accordingly, and the user is allowed to use;
The step of user terminates using shared automobile is as follows:
(2.1) after user's vehicle, the shared automobile generation transaction record T, and the transaction record T is sent to described Server B;
(2.2) then the server B generates message M using the digital signature of its private key generation transaction record1, i.e. M1=T, SigB(T) }, wherein SigB() is the function being digitally signed using the private key of server B;
(2.3) server B is by message M1Server A is sent to, server A uses the digital certificate authentication message of server B M1Whether the digital signature of middle server B is correct, if incorrect, server A sends refuse information to server B, otherwise Server A is by message M1It is transmitted to the mobile terminal of user;
(2.4) mobile terminal is receiving message M1Afterwards, it is this transaction one temporary private PrivateKey of generation, i.e., PrivateKey=IDA‖ UserID ‖ E ‖ PW, wherein PW are password of the user when enterprise A is registered, and use the temporary private To M1In transaction record T be digitally signed, obtain digital signature result Siguser(T), and by the digital signature result Siguser(T) it is sent to server A;
(2.5) server A generates the temporary private, and generates corresponding public key according to the temporary private, and server A is connecing Receive the Siguser(T) after, public key verifications Sig is useduser(T) whether correct, if incorrect, server A transmission is refused Exhausted message continues subsequent step to the mobile terminal, otherwise server A;
(2.6) server A generation message M2, i.e. M2={ Siguser(T),SigA(Siguser(T)) }, wherein SigA() is using clothes The function that the private key of business device A is digitally signed, and server A is by message M2It is sent to server B.
(2.7) server A and server B preserve message M simultaneously1With message M2
2. according to the method described in claim 1, it is characterized in that, server A, server B and mobile terminal are all using identical Digital Signature Algorithm.
3. according to the method described in claim 2, it is characterized in that, the server A and server B have the number of its own Certificate and public private key pair.
4. according to the method described in claim 1-3 any one, which is characterized in that if server B receives server A Refuse information, then server B regenerate and send message M1;If server B continuous several times receive the refuse information, take Business device B records this abnormal conditions, and administrative staff is asked to intervene.
5. according to the method described in any of claim 1 to 4, which is characterized in that in the step 2.4, mobile terminal with Family is digitally signed again after agreeing to, if user disagrees signature, which refuses label to server A report user Name, server A record this refusal situation, are handled by subsequent administrative staff.
6. according to the method described in claim 1-5 any one, which is characterized in that in step 2.5, if mobile terminal connects Receive refuse information, can regenerate and send digital signature result, and if server A continuous several times verification it is incorrect, Server A records this abnormal conditions, and by follow-up management, personnel are handled.
7. according to the method described in claim 1, it is characterized in that, the mobile terminal is smart mobile phone or Intelligent flat.
8. according to the method described in claim 1, it is characterized in that, the Hash functions are SHA256.
9. according to the method described in claim 1, it is characterized in that, the User ID is the use that the user is registered in enterprise A Family account.
10. according to the method described in claim 9, it is characterized in that, the User ID is the cell-phone number or identification card number of user.
CN201711128050.8A 2017-11-15 2017-11-15 A kind of user authentication method of shared automobile Expired - Fee Related CN108055240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711128050.8A CN108055240B (en) 2017-11-15 2017-11-15 A kind of user authentication method of shared automobile

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711128050.8A CN108055240B (en) 2017-11-15 2017-11-15 A kind of user authentication method of shared automobile

Publications (2)

Publication Number Publication Date
CN108055240A true CN108055240A (en) 2018-05-18
CN108055240B CN108055240B (en) 2019-05-14

Family

ID=62119103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711128050.8A Expired - Fee Related CN108055240B (en) 2017-11-15 2017-11-15 A kind of user authentication method of shared automobile

Country Status (1)

Country Link
CN (1) CN108055240B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876375A (en) * 2018-06-29 2018-11-23 全链通有限公司 Block chain real name participatory approaches and system
CN109088870A (en) * 2018-08-14 2018-12-25 国网甘肃省电力公司电力科学研究院 A kind of method of new energy plant stand generator unit acquisition terminal secure accessing platform
CN111402578A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Shared vehicle monitoring method and device based on track monitoring and computer equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102867244A (en) * 2012-08-30 2013-01-09 江苏乐买到网络科技有限公司 Logistics information system
CN106549913A (en) * 2015-09-18 2017-03-29 陕西重型汽车有限公司 Intelligent touch screen onboard system based on car networking
US20170127246A1 (en) * 2015-10-28 2017-05-04 Leauto Intelligent Technology (Beijing) Co. Ltd Method for Sharing Travelling Information, Vehicle Platform and Intelligent Traffic System
CN106651376A (en) * 2015-11-02 2017-05-10 重庆果趣电子商务有限公司 Electronic commerce information security processing method
CN106921652A (en) * 2017-01-22 2017-07-04 斑马信息科技有限公司 Internet vehicle platform interactive system and internet vehicle platform exchange method
US20170234691A1 (en) * 2012-06-21 2017-08-17 Cellepathy Inc. Interface selection in navigation guidance systems
CN107330760A (en) * 2017-06-29 2017-11-07 苏州见真物联科技有限公司 A kind of cross-platform sharing bicycle management method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170234691A1 (en) * 2012-06-21 2017-08-17 Cellepathy Inc. Interface selection in navigation guidance systems
CN102867244A (en) * 2012-08-30 2013-01-09 江苏乐买到网络科技有限公司 Logistics information system
CN106549913A (en) * 2015-09-18 2017-03-29 陕西重型汽车有限公司 Intelligent touch screen onboard system based on car networking
US20170127246A1 (en) * 2015-10-28 2017-05-04 Leauto Intelligent Technology (Beijing) Co. Ltd Method for Sharing Travelling Information, Vehicle Platform and Intelligent Traffic System
CN106651376A (en) * 2015-11-02 2017-05-10 重庆果趣电子商务有限公司 Electronic commerce information security processing method
CN106921652A (en) * 2017-01-22 2017-07-04 斑马信息科技有限公司 Internet vehicle platform interactive system and internet vehicle platform exchange method
CN107330760A (en) * 2017-06-29 2017-11-07 苏州见真物联科技有限公司 A kind of cross-platform sharing bicycle management method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876375A (en) * 2018-06-29 2018-11-23 全链通有限公司 Block chain real name participatory approaches and system
CN108876375B (en) * 2018-06-29 2020-09-08 全链通有限公司 Block chain real name participation method and system
CN109088870A (en) * 2018-08-14 2018-12-25 国网甘肃省电力公司电力科学研究院 A kind of method of new energy plant stand generator unit acquisition terminal secure accessing platform
CN109088870B (en) * 2018-08-14 2021-05-04 国网甘肃省电力公司电力科学研究院 Method for safely accessing acquisition terminal of power generation unit of new energy plant station to platform
CN111402578A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Shared vehicle monitoring method and device based on track monitoring and computer equipment

Also Published As

Publication number Publication date
CN108055240B (en) 2019-05-14

Similar Documents

Publication Publication Date Title
CN108270571B (en) Internet of Things identity authorization system and its method based on block chain
CN110060037B (en) Distributed digital identity system based on block chain
US11100743B1 (en) Blockchain-based election system
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
CN112789823B (en) Block chain-based competitive election network system and competitive election method
CN108881167A (en) A kind of intelligent contract of finite field block catenary system
TW201741922A (en) Biological feature based safety certification method and device
CN110490610B (en) Community management system based on block chain
CN106785146A (en) The charging method and system of the electric automobile charging pile with bluetooth
US20190222418A1 (en) Systems and Methods for Key Exchange in Blockchain
CN107689097B (en) Synchronizing Passwords based on frequency hopping generate and verify system and its application
CN105554018B (en) Genuine cyber identification verification method
CN108055240B (en) A kind of user authentication method of shared automobile
CN104125230B (en) A kind of short message certification service system and authentication method
CN111242248B (en) Personnel information monitoring method, device and computer storage medium
CN109670968A (en) Processing method, device, equipment and the computer storage medium of insurance data
CN106059760B (en) A kind of cryptographic system from user terminal crypto module calling system private key
CN110494878A (en) It is remitted money by telecom operators via the digital properties of telephone number
CN110163998A (en) A kind of intelligent door lock application method of intelligent door lock system and offline authentication
CN110060403A (en) The more ticket electronic voting methods of a people and system based on block chain
CN110969531A (en) Borrowing deposit verification and online checking method and system
CN109300199A (en) Attendance checking system and Work attendance method based on block chain
CN109711945A (en) A kind of vehicle sharing method and relevant apparatus
CN106696749A (en) Charging method and system for electric automobile charging pile with Zigbee
CN108650279A (en) Network information security acquisition method and network trading method and network safety system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190514

Termination date: 20191115

CF01 Termination of patent right due to non-payment of annual fee