CN108337119A - A kind of information exchange and security authentication systems of In-vehicle networking - Google Patents
A kind of information exchange and security authentication systems of In-vehicle networking Download PDFInfo
- Publication number
- CN108337119A CN108337119A CN201810100663.9A CN201810100663A CN108337119A CN 108337119 A CN108337119 A CN 108337119A CN 201810100663 A CN201810100663 A CN 201810100663A CN 108337119 A CN108337119 A CN 108337119A
- Authority
- CN
- China
- Prior art keywords
- key
- center
- information
- module
- cloud computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/044—Network management architectures or arrangements comprising hierarchical management structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of information exchange of In-vehicle networking and security authentication systems, it includes that vehicle-mounted cloud network establishes module, vehicle-mounted cloud network verification management module and vehicle-mounted data transmission module, wherein vehicle-mounted cloud network establishes module, for establishing cloud network computer center, the cloud network computer center is used for the data management and certification of lower region cloud computing center, and the lower region cloud computing center is responsible for mobile unit end on the move and handles the data of these equipment ends;The cloud network computer center further includes the security authentication center being authenticated for the information of lower region cloud computing center, and the present invention improves the safety of the information communication of In-vehicle networking.
Description
Technical field
The present invention relates to car information Web security fields, and in particular to the information security field of In-vehicle networking.
Background technology
Currently, with the development of society, the ownership of Chinese automobile is in explosive growth, and with the hair of information technology
Exhibition, for a large amount of high-tech Technology application on automobile, the safety problem of intelligent automobile is increasingly becoming a severe problem.Vehicle
Message spoofing on data/address bus is related to by disguising as being intended to that vehicle is caused to operate in such a way that vehicle operators are undesirable
The module of disparate modules and message is placed into bus.This invasion module can be transmitted in message to bus, and receiving module
These message are handled in the case where not knowing the true source of these message.The consequence that vehicle handles spoofed message can
It can be very serious.
Accordingly, it is desired to provide a kind of for detecting the spoofed message in In-vehicle networking and preventing the non-of these spoofed messages
It is expected that the device of consequence, just seems especially eager and important.
Invention content
In view of the drawbacks described above of the prior art, technical problem to be solved by the invention is to provide a kind of safe
The information exchange and security authentication systems of In-vehicle networking.
Technical solution of the present invention is as follows:
A kind of information exchange and security authentication systems of In-vehicle networking comprising vehicle-mounted cloud network establishes module, vehicle-mounted cloud
Network verification management module and vehicle-mounted data transmission module, wherein vehicle-mounted cloud network establishes module, by establishing based on cloud network
Calculation machine center, the cloud network computer center are used for the data management and certification of lower region cloud computing center, the lower layer
Region cloud computing center is responsible for mobile unit end on the move and handles the data of these equipment ends;The cloud network calculates
Machine center further includes the security authentication center being authenticated for the information of lower region cloud computing center, in the safety certification
Pericardium includes authenticating user identification module M1, user behavior detecting module M2, relationship map module M3, data safety forwarding module M4
And token generation module M5;The safety certification that the authenticating user identification module M1 is used to send out lower region cloud computing center
Request is verified, and generates identity feature code for lower region cloud computing center, and wherein identity feature code is lower region cloud
Role, permission build when calculating center is registered according to lower region cloud computing center;The user behavior detecting module M2 is used
After being proved to be successful to lower region cloud computing center operation behavior carry out data statistics;The relationship map module M3 is used
The correspondence of the behavior property and attribute of the user of certification is passed through in storage;The data safety forwarding module M4 is for turning
The safety certification request of layer region cloud computing center is given to the cloud network computer center;The token generation module M5 is used
In generating token to the user after being verified, user accesses the cloud network computer center according to token;Wherein vehicle-mounted cloud
Network verification management module provides master key for a private cipher key generator to be arranged for cloud network computer center;Cloud net
Network computer center first verifies that the first key that lower region cloud computing center is sent, and is obtained after being verified to initial key
The data of lower region cloud computing center, the key generator of lower region cloud computing center generate second key and are sent to
Mobile unit;Vehicle-mounted data transmission module is used for the Cryptography Principles of mobile unit end identity-based, is generated in conjunction with the second key
The vehicle-mounted data of oneself and roadside data are transmitted back to lower region cloud meter by one third key by the third key
Calculation center, mobile unit end include board units, roadside communication unit, wireless security module and Wireless MESH network, the vehicle
It is connected between carrier unit and by the Wireless MESH network between board units and roadside communication unit;The vehicle-mounted list
Member obtains other board units and roadside communication unit hair in preset first distance range by the Wireless MESH network
The road safety information sent, the wireless security module are used to that the attack information from MESH network to be analyzed and be intercepted,
There are the database of storage attack information, the letter for being stored in the information and date library to sending in the wireless security module
Breath field is matched, and attack information is shown to be if successful match, is started blocking module and is intercepted, if matching is unsuccessful
It stores into the storage database of board units, and these data compress, third key is then added, sent out by channel
Give lower region cloud center;The board units also analyze acquired road safety information;When there are roads for determination
When the security risk of road, security alarm information is sent to corresponding board units, and notify other in first distance range
Board units;The roadside communication unit is obtained the board units preset within the scope of second distance by Wireless MESH network and sent out
The road safety information sent, and acquired road safety information is analyzed;When by analyzing determination, there are road safeties
When risk, security alarm information is sent to corresponding board units, and notify other vehicle-mounted lists within the scope of the second distance
Member;The first key or the generating process of the second key or third key are as follows:Give a security parameter, private cipher key life
It grows up to be a useful person and generates a master key mk and one group of parameter params, private cipher key generator is distributed to all systems and terminal user
params;In the mark TC for receiving cloud network computer center, using TC as input, by running private key extraction algorithm,
Generate a private cipher key K associated with TCTC;In the mark IS of information storage in receiving region cloud, using IS as defeated
Enter, by running private key extraction algorithm, PKG generates a private cipher key K related to ISIS;Receiving lower region cloud computing
When the service identifiers A at center, using SerA as input, by run private key extraction algorithm, PKG will generate one it is related to SerA
Private cipher key KSerA;In the mark EU for receiving vehicle-mounted user, using EU as input, by running private key extraction algorithm,
PKG will generate one and the relevant private cipher key K of EUEU。
Further, the cloud network computer center includes cloud computing service below:(1) infrastructure services:For
All application programs and service provision requirements disposed in system, the main task of the information management in intelligent grid, including letter
Breath is collected, the task including information processing and information storage is performed in this layer of service;(2) software service SaaS:It is being
The deployment of system top;(3) platform service PaaS:PaaS provides tool and the library of exploitation cloud computing application program and service;(4) number
According to service DaaS.
Advantageous effect:The present invention provides a kind of information exchange of In-vehicle networking and security authentication systems comprising vehicle-mounted
Cloud network establishes module, vehicle-mounted cloud network verification management module and vehicle-mounted data transmission module, vehicle-mounted cloud network and establishes module
For establishing cloud network computer center, the cloud network computer center is used for the data management of lower region cloud computing center
And certification, the lower region cloud computing center are responsible for mobile unit end on the move and handle the number of these equipment ends
According to;By multi-zone supervision and certification, one is that of avoiding data volume in mobile unit high-speed mobile causes single layer of service device very much greatly
Collapse be managed respectively second is that calculating center is arranged by subregion, realize efficiently management, avoid being attacked at one and make
The problem of at periods of network disruption;One private cipher key generator of setting provides master key for cloud network computer center;Cloud network
Computer center first verifies that the first key that lower region cloud computing center is sent, under being obtained after being verified to initial key
The data of layer region cloud computing center, the key generator of lower region cloud computing center generate second key and are sent to vehicle
Carry equipment;The Cryptography Principles of mobile unit end identity-based generate a third key in conjunction with the second key, pass through described the
The vehicle-mounted data of oneself and roadside data are transmitted back to lower region cloud computing center by three keys, be exactly based on it is above this three
A key realizes the safety verification between mobile unit and lower region cloud computing center, cloud network computer center, avoids
The case where password just attacks whole network at hacker's decoding one occurs, and has carried out bidirectional safe guarantee;Through the invention wireless
Security module realizes the equipment safety protection at the board units end to being easiest to attack,.It is objective in verification process through the invention
Family end provides random number and private key by E-token dynamic password card dynamic, and encryption and signature use symmetric key, mitigate client and calculate
Pressure, and improve the safety of certification.In terms of improving authentication efficiency, wherein using the cipher mode of elliptic curve, both improved
Efficiency, guaranteed safety.Another advantage is that hierarchical identity certification is realized, for mainly facing lower region
Cloud computing center, mobile unit end realize safety certification, prevent the decoding of one-sided password from just invading by password authentification back and forth
In-vehicle networking and upper layer network cloud center.The present invention is just because of the effect between the above indivisible step so that this
Invention substantially increases the safety of safety certification.
Description of the drawings
Fig. 1 is the system structure diagram that the present invention provides preferred embodiment.
Specific implementation mode
The invention will be further described with reference to the accompanying drawings and examples:
As shown in Figure 1, the information exchange and security authentication systems of a kind of In-vehicle networking comprising vehicle-mounted cloud network establishes mould
Block, vehicle-mounted cloud network verification management module and vehicle-mounted data transmission module, wherein vehicle-mounted cloud network establishes module, for establishing
Cloud network computer center, the cloud network computer center are used for the data management and certification of lower region cloud computing center,
The lower region cloud computing center is responsible for mobile unit end on the move and handles the data of these equipment ends;The cloud
Network Computer Centre further includes the security authentication center being authenticated for the information of lower region cloud computing center, the peace
Full authentication center includes authenticating user identification module M1, user behavior detecting module M2, relationship map module M3, data safety turn
Send out module M4 and token generation module M5;What the authenticating user identification module M1 was used to send out lower region cloud computing center
Safety certification request is verified, and generates identity feature code for lower region cloud computing center, under wherein identity feature code is
Role, permission build when layer region cloud computing center is registered according to lower region cloud computing center;The user behavior detecting
Module M2 be used for lower region cloud computing center is proved to be successful after operation behavior carry out data statistics;The relationship map
Module M3 is used to store the correspondence of the behavior property and attribute for the user for having passed through certification;The data safety forwarding module
M4 is used to forward the safety certification request of lower region cloud computing center to the cloud network computer center;The token generates
Module M5 is used to generate token to the user after being verified, and user accesses the cloud network computer center according to token;This
Invention uses Encryption Algorithm and signature based on elliptic curve, the symmetric cryptography mode based on elliptic curve to have computation burden
Small, the speed of service is fast, safe feature.Due to be frequently encrypted, decrypt in the safety certification process of the present invention
Operation enables the encryption system of elliptic curve adequately to embody its high feature of encryption efficiency.Wherein vehicle-mounted cloud network
Verification management module provides master key for a private cipher key generator to be arranged for cloud network computer center;Cloud network meter
Calculation machine center first verifies that the first key that lower region cloud computing center is sent, and lower layer is obtained after being verified to initial key
The data of region cloud computing center, the key generator of lower region cloud computing center generate second key be sent to it is vehicle-mounted
Equipment;Vehicle-mounted data transmission module is used for the Cryptography Principles of mobile unit end identity-based, and one is generated in conjunction with the second key
The vehicle-mounted data of oneself and roadside data are transmitted back in lower region cloud computing by third key by the third key
The heart, mobile unit end include board units, roadside communication unit, wireless security module and Wireless MESH network, the vehicle-mounted list
It is connected between member and by the Wireless MESH network between board units and roadside communication unit;The board units lead to
Cross that the Wireless MESH network obtains other board units in preset first distance range and roadside communication unit sends
Road safety information, the wireless security module are described for the attack information from MESH network to be analyzed and intercepted
There are the database of storage attack information, the information word for being stored in the information and date library to sending in wireless security module
Duan Jinhang is matched, and attack information is shown to be if successful match, is started blocking module and is intercepted, and is stored if matching is unsuccessful
Into in the storage database of board units, and these data compress, third key is then added, is sent to by channel
Lower region cloud center;The board units also analyze acquired road safety information;When there are road peaces for determination
When full blast danger, security alarm information is sent to corresponding board units, and notify in first distance range other are vehicle-mounted
Unit;The roadside communication unit is obtained by Wireless MESH network and presets what the board units within the scope of second distance were sent
Road safety information, and acquired road safety information is analyzed;When by analyzing determination, there are road safety risks
When, security alarm information is sent to corresponding board units, and notify other board units within the scope of the second distance;Institute
It states first key or the generating process of the second key or third key is as follows:Give a security parameter, private cipher key generator
A master key mk and one group of parameter params is generated, private cipher key generator is distributed to all systems and terminal user
params;In the mark TC for receiving cloud network computer center, using TC as input, by running private key extraction algorithm,
Generate a private cipher key K associated with TCTC;In the mark IS of information storage in receiving region cloud, using IS as defeated
Enter, by running private key extraction algorithm, PKG generates a private cipher key K related to ISIS;Receiving lower region cloud computing
When the service identifiers A at center, using SerA as input, by run private key extraction algorithm, PKG will generate one it is related to SerA
Private cipher key KSerA;In the mark EU for receiving vehicle-mounted user, using EU as input, by running private key extraction algorithm,
PKG will generate one and the relevant private cipher key K of EUEU。
Preferably, the cloud network computer center includes cloud computing service below:(1) infrastructure services:To be
All application programs and service provision requirements disposed in system, the main task of the information management in intelligent grid, including information
It collects, the task including information processing and information storage is performed in this layer of service;(2) software service SaaS:In system
Top is disposed;(3) platform service PaaS:PaaS provides tool and the library of exploitation cloud computing application program and service;(4) data
Service DaaS.
Advantage:The present invention provides a kind of information communicating methods of In-vehicle networking comprising establishes the step of vehicle-mounted cloud network
Suddenly the step of management of computing, is carried out to vehicle-mounted cloud network and the step of be transmitted to vehicle-mounted data, wherein establishing vehicle-mounted cloud
The step of network is:Cloud network computer center is established, the cloud network computer center is used for lower region cloud computing center
Data management and certification, the lower region cloud computing center be responsible for mobile unit end on the move and handle these set
The data at standby end;By multi-zone supervision and certification, one is that of avoiding data volume in mobile unit high-speed mobile causes list very much greatly
The collapse of stratum server is managed respectively second is that calculating center is arranged by subregion, is realized efficiently management, is avoided at one
The problem of periods of network disruption is caused by attack;Wherein include to the step of vehicle-mounted cloud network progress management of computing:One private is set
There is key generator to provide master key for cloud network computer center;Cloud network computer center first verifies that lower region cloud meter
The first key that calculation center is sent obtains the data of lower region cloud computing center, area of lower layer after being verified to initial key
The key generator of domain cloud computing center generates second key and is sent to mobile unit;Vehicle-mounted data end is transmitted
Step includes:The Cryptography Principles of mobile unit end identity-based generate a third key, by described in conjunction with the second key
The vehicle-mounted data of oneself and roadside data are transmitted back to lower region cloud computing center by third key, be exactly based on it is above this
Three keys, realize the safety verification between mobile unit and lower region cloud computing center, cloud network computer center, keep away
Exempt from the case where password just attacks whole network at hacker's decoding one to occur, carries out bidirectional safe guarantee;Nothing through the invention
Line security module realizes the equipment safety protection at the board units end to being easiest to attack,.Through the invention in verification process
Client provides random number and private key by E-token dynamic password card dynamic, and encryption and signature use symmetric key, mitigate client meter
Pressure is calculated, and improves the safety of certification.In terms of improving authentication efficiency, wherein using the cipher mode of elliptic curve, both carried
High efficiency, guaranteed safety.Another advantage is that hierarchical identity certification is realized, for mainly facing area of lower layer
Domain cloud computing center, mobile unit end realize safety certification, prevent the decoding of one-sided password from just invading by password authentification back and forth
In-vehicle networking and upper layer network cloud center are entered.The present invention is just because of the effect between the above indivisible step so that
The present invention substantially increases the safety of safety certification.
The preferred embodiment of the present invention has been described in detail above.It should be appreciated that those skilled in the art without
It needs creative work according to the present invention can conceive and makes many modifications and variations.Therefore, all technologies in the art
Personnel are available by logical analysis, reasoning, or a limited experiment on the basis of existing technology under this invention's idea
Technical solution, all should be in the protection domain being defined in the patent claims.
Claims (2)
1. the information exchange and security authentication systems of a kind of In-vehicle networking, which is characterized in that including vehicle-mounted cloud network establish module,
Vehicle-mounted cloud network verification management module and vehicle-mounted data transmission module, wherein vehicle-mounted cloud network establishes module, for establishing cloud
Network Computer Centre, the cloud network computer center are used for the data management and certification of lower region cloud computing center, institute
Lower region cloud computing center is stated to be responsible for mobile unit end on the move and handle the data of these equipment ends;The cloud net
Network computer center further includes the security authentication center being authenticated for the information of lower region cloud computing center, the safety
Authentication center includes authenticating user identification module M1, user behavior detecting module M2, relationship map module M3, data safety forwarding
Module M4 and token generation module M5;The peace that the authenticating user identification module M1 is used to send out lower region cloud computing center
Full certification request is verified, and generates identity feature code for lower region cloud computing center, and wherein identity feature code is lower layer
Role, permission build when the cloud computing center registration of region according to lower region cloud computing center;The user behavior detects mould
Block M2 be used for lower region cloud computing center is proved to be successful after operation behavior carry out data statistics;The relationship map mould
Block M3 is used to store the correspondence of the behavior property and attribute for the user for having passed through certification;The data safety forwarding module M4
For forwarding the safety certification request of lower region cloud computing center to the cloud network computer center;The token generates mould
Block M5 is used to generate token to the user after being verified, and user accesses the cloud network computer center according to token;Wherein
Vehicle-mounted cloud network verification management module, for be arranged a private cipher key generator be cloud network computer center provide lead it is close
Key;Cloud network computer center first verifies that the first key that lower region cloud computing center is sent, and is verified to initial key logical
Later obtain the data of lower region cloud computing center, the key generator of lower region cloud computing center generate one it is second close
Key is sent to mobile unit;Vehicle-mounted data transmission module is used for the Cryptography Principles of mobile unit end identity-based, in conjunction with second
Key generates a third key, and the vehicle-mounted data of oneself and roadside data are transmitted back to lower layer by the third key
Region cloud computing center, mobile unit end include board units, roadside communication unit, wireless security module and Wireless MESH net
Network is connected between the board units and between board units and roadside communication unit by the Wireless MESH network;Institute
Board units are stated, other board units in preset first distance range are obtained by the Wireless MESH network and roadside is logical
Believe the road safety information that unit is sent, the wireless security module is for analyzing the attack information from MESH network
And intercept, there is the database of storage attack information in the wireless security module, in the information and date library to sending
The information field of storage is matched, and attack information is shown to be if successful match, is started blocking module and is intercepted, if matching
It is unsuccessful, it stores into the storage database of board units, and these data compress, third key is then added, leads to
It crosses channel and is sent to lower region cloud center;The board units also analyze acquired road safety information;When true
When there is road safety risk surely, security alarm information is sent to corresponding board units, and notify first distance range
Other interior board units;The roadside communication unit obtains the vehicle preset within the scope of second distance by Wireless MESH network
The road safety information that carrier unit is sent, and acquired road safety information is analyzed;When by analyzing determining presence
When road safety risk, security alarm information is sent to corresponding board units, and notify its within the scope of the second distance
His board units;The first key or the generating process of the second key or third key are as follows:A security parameter is given, it is private
There is key generator to generate a master key mk and one group of parameter params, private cipher key generator is to all system and terminal
User distributes params;In the mark TC for receiving cloud network computer center, using TC as input, carried by running private key
Algorithm is taken, a private cipher key K associated with TC is generatedTC;In the mark IS of information storage in receiving region cloud, by IS
As input, by running private key extraction algorithm, PKG generates a private cipher key K related to ISIS;Receiving lower region
When the service identifiers A of cloud computing center, using SerA as input, by run private key extraction algorithm, PKG will generate one and
The relevant private cipher key K of SerASerA;In the mark EU for receiving vehicle-mounted user, using EU as input, carried by running private key
Take algorithm, PKG that will generate one and the relevant private cipher key K of EUEU。
2. the information exchange and security authentication systems of In-vehicle networking according to claim 1, which is characterized in that the cloud net
Network computer center includes cloud computing service below:(1) infrastructure services:For all application programs for being disposed in system and
Service provision requirements, the main task of the information management in intelligent grid, including information is collected, information processing and information storage exist
Interior task is performed in this layer of service;(2) software service SaaS:It is disposed in system head;(3) platform service PaaS:
PaaS provides tool and the library of exploitation cloud computing application program and service;(4) data service DaaS.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810100663.9A CN108337119A (en) | 2018-02-01 | 2018-02-01 | A kind of information exchange and security authentication systems of In-vehicle networking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810100663.9A CN108337119A (en) | 2018-02-01 | 2018-02-01 | A kind of information exchange and security authentication systems of In-vehicle networking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108337119A true CN108337119A (en) | 2018-07-27 |
Family
ID=62927860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810100663.9A Pending CN108337119A (en) | 2018-02-01 | 2018-02-01 | A kind of information exchange and security authentication systems of In-vehicle networking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108337119A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191112A (en) * | 2019-05-22 | 2019-08-30 | 北京百度网讯科技有限公司 | Auth method, device, mobile unit and server |
CN110867071A (en) * | 2019-11-28 | 2020-03-06 | 的卢技术有限公司 | Road lamp camera-based curve overtaking safety auxiliary method and system |
CN113905376A (en) * | 2020-06-18 | 2022-01-07 | 车主邦(北京)科技有限公司 | Charging authentication method, server, system, medium and computer device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103780393A (en) * | 2014-01-15 | 2014-05-07 | 重庆邮电大学 | Virtual-desktop security certification system and method facing multiple security levels |
CN106101253A (en) * | 2016-07-04 | 2016-11-09 | 宁波芯路通讯科技有限公司 | In-vehicle networking communication system |
-
2018
- 2018-02-01 CN CN201810100663.9A patent/CN108337119A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103780393A (en) * | 2014-01-15 | 2014-05-07 | 重庆邮电大学 | Virtual-desktop security certification system and method facing multiple security levels |
CN106101253A (en) * | 2016-07-04 | 2016-11-09 | 宁波芯路通讯科技有限公司 | In-vehicle networking communication system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191112A (en) * | 2019-05-22 | 2019-08-30 | 北京百度网讯科技有限公司 | Auth method, device, mobile unit and server |
CN110867071A (en) * | 2019-11-28 | 2020-03-06 | 的卢技术有限公司 | Road lamp camera-based curve overtaking safety auxiliary method and system |
CN110867071B (en) * | 2019-11-28 | 2022-06-14 | 的卢技术有限公司 | Road lamp camera-based curve overtaking safety auxiliary method and system |
CN113905376A (en) * | 2020-06-18 | 2022-01-07 | 车主邦(北京)科技有限公司 | Charging authentication method, server, system, medium and computer device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Javaid et al. | A scalable protocol for driving trust management in internet of vehicles with blockchain | |
Shah et al. | Authentication of IoT device and IoT server using secure vaults | |
CN108964919B (en) | Lightweight anonymous authentication method with privacy protection based on Internet of vehicles | |
CN110069918B (en) | Efficient double-factor cross-domain authentication method based on block chain technology | |
Zhao et al. | A novel mutual authentication scheme for Internet of Things | |
CN105553666B (en) | Intelligent power terminal safety authentication system and method | |
CN111435913B (en) | Identity authentication method and device for terminal of Internet of things and storage medium | |
CN113301022B (en) | Internet of things equipment identity security authentication method based on block chain and fog calculation | |
CN111416715B (en) | Quantum secret communication identity authentication system and method based on secret sharing | |
CN111404664B (en) | Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices | |
Jaidhar | Enhanced mutual authentication scheme for cloud architecture | |
Le et al. | An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography | |
EP1759479A1 (en) | A network security enforcement system | |
Vasudev et al. | An efficient authentication and secure vehicle-to-vehicle communications in an IoV | |
CN101552676B (en) | Host module legitimacy verification method, system and device using a card module | |
CN108337119A (en) | A kind of information exchange and security authentication systems of In-vehicle networking | |
CN113595985A (en) | Internet of things security cloud platform implementation method based on state cryptographic algorithm security chip | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN108989020B (en) | Unmanned aerial vehicle ad hoc network Sybil attack defense method and system | |
CN104796255A (en) | A safety certification method, device and system for a client end | |
Feiri et al. | Efficient and secure storage of private keys for pseudonymous vehicular communication | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN108366371A (en) | A kind of information communicating method of In-vehicle networking | |
CN107786978B (en) | NFC authentication system based on quantum encryption | |
CN113612616A (en) | Vehicle communication method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180727 |