CN110061849A - Verification method, server, mobile unit and the storage medium of mobile unit - Google Patents
Verification method, server, mobile unit and the storage medium of mobile unit Download PDFInfo
- Publication number
- CN110061849A CN110061849A CN201910336508.1A CN201910336508A CN110061849A CN 110061849 A CN110061849 A CN 110061849A CN 201910336508 A CN201910336508 A CN 201910336508A CN 110061849 A CN110061849 A CN 110061849A
- Authority
- CN
- China
- Prior art keywords
- mobile unit
- summary info
- cipher
- text information
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/65—Monitoring or controlling charging stations involving identification of vehicles or their battery types
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/70—Energy storage systems for electromobility, e.g. batteries
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/7072—Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/12—Electric charging stations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/16—Information or communication technologies improving the operation of electric vehicles
- Y02T90/167—Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S30/00—Systems supporting specific end-user applications in the sector of transportation
- Y04S30/10—Systems supporting the interoperability of electric or hybrid vehicles
- Y04S30/14—Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Transportation (AREA)
- Mechanical Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of verification methods of mobile unit, the following steps are included: sending public key to mobile unit, so that the mobile unit identifies to obtain cipher-text information according to first summary info of public key encryption and mobile unit, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, obtains the mobile unit mark and first summary info;The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;When second summary info is consistent with first summary info, then determine that the mobile unit is verified.The invention also discloses a kind of server, wireless charging device, mobile unit and computer readable storage mediums.The present invention improves the safety to mobile unit certification.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of verification method of mobile unit, server, vehicle-mounted set
Standby, wireless charging device and computer readable storage medium.
Background technique
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging
The legitimate interests of operator need to carry out effective authentication to wireless charging mobile unit into parking lot, non-to prevent
Method Vehicular charging.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, it can effective prevention device
It distorts.But there are certain drawbacks for common digital signature identification mode: being inconvenient to update key pair, and stores fixed key
There is a problem of that safety is not high, even generation dynamic key pair, but transmission is also easily by midway while ciphertext and public key
It intercepts and captures, these all threaten the safety to mobile unit certification.
Summary of the invention
The main purpose of the present invention is to provide a kind of verification method of mobile unit, server, mobile unit, wireless chargings
Electric equipment and computer readable storage medium improve the safety to mobile unit certification.
To achieve the above object, the present invention provides a kind of verification method of mobile unit, the authentication of the mobile unit
Method the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to first summary info of public key encryption and vehicle-mounted
Device identification obtains cipher-text information, and first summary info identifies the mobile unit by preset Encryption Algorithm and encrypts
It obtains;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained
To mobile unit mark and first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, then determine that the mobile unit verifying is logical
It crosses.
Optionally, described that second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm
Step includes:
The second abstract is obtained to mobile unit key and mobile unit mark encryption by preset Encryption Algorithm
Information, wherein first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm
Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key.
Optionally, described to decrypt the cipher-text information using private key, it obtains the mobile unit mark and described first and plucks
The step of wanting information include:
The cipher-text information is decrypted using private key, obtains the mobile unit mark, the mobile unit key and described
First summary info, the cipher-text information first summary info according to the public key encryption, the mobile unit key and
The mobile unit identifies to obtain.
Optionally, described when second summary info is consistent with first summary info, then determine described vehicle-mounted
Device authentication by the step of include:
When second summary info is consistent with first summary info, generates random code and calculate the random code
Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code
Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, then determine that the mobile unit is verified.
Optionally, the verification method of the mobile unit further include:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit
It charges.
Optionally, the mobile unit verification method the following steps are included:
Mobile unit receives the public key that verifying end is sent;
It is identified to obtain cipher-text information, the first abstract letter according to first summary info of public key encryption and mobile unit
Breath obtains mobile unit mark encryption by preset Encryption Algorithm;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key
The mobile unit mark and first summary info are obtained, and by preset Encryption Algorithm to the mobile unit mark
Know encryption and obtain the second summary info, and when second summary info is consistent with first summary info, then determines institute
Mobile unit is stated to be verified.
Optionally, described to identify to obtain the step of cipher-text information according to first summary info of public key encryption and mobile unit
Suddenly include:
It identifies to obtain cipher-text information according to first summary info of public key encryption, mobile unit public key and mobile unit;
Wherein, first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm
Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key, and in the verifying end
When receiving the cipher-text information, the verifying end using private key decrypt the cipher-text information obtain the mobile unit key,
Mobile unit mark and first summary info, and by preset Encryption Algorithm to the mobile unit key with
The mobile unit encrypts to obtain the second summary info.
Optionally, the verification method of the mobile unit further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash
Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info
It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement
Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
To achieve the above object, the present invention also provides a kind of server, the server includes:
The server includes memory, processor and is stored on the memory and can run on the processor
Mobile unit proving program, realize when the proving program of the mobile unit is executed by the processor and vehicle-mounted set as above-mentioned
The step of standby verification method.
To achieve the above object, the present invention also provides a kind of wireless charging device, the wireless charging device includes:
The wireless charging device includes memory, processor and is stored on the memory and can be in the processor
The proving program of the mobile unit of upper operation is realized when the proving program of the mobile unit is executed by the processor as above-mentioned
The step of verification method of mobile unit.
To achieve the above object, the present invention also provides a kind of mobile unit, the mobile unit includes:
The mobile unit includes memory, processor and is stored on the memory and can transport on the processor
The proving program of capable mobile unit is realized when the proving program of the mobile unit is executed by the processor as above-mentioned vehicle-mounted
The step of verification method of equipment.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storages
It is stored with the proving program of mobile unit on medium, realizes when the proving program of the mobile unit is executed by processor as above-mentioned
The step of verification method of mobile unit.
Verification method, server and the computer readable storage medium of mobile unit provided by the invention, set to vehicle-mounted
Preparation send public key, so that the mobile unit identifies to obtain ciphertext according to first summary info of public key encryption and mobile unit
Information, first summary info obtain mobile unit mark encryption by preset Encryption Algorithm;Receiving
When stating the cipher-text information of mobile unit transmission, the cipher-text information is decrypted using private key, obtains the mobile unit mark
With first summary info;The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, then determine that the mobile unit is verified.In this way, mentioning
The high safety to mobile unit certification.
Detailed description of the invention
Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the verification method first embodiment of mobile unit of the present invention;
Fig. 3 is the flow diagram of the verification method second embodiment of mobile unit of the present invention;
Fig. 4 is the flow diagram of the verification method 3rd embodiment of mobile unit of the present invention;
Fig. 5 is the flow diagram of the verification method fourth embodiment of mobile unit of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of verification method of mobile unit, improves the safety to mobile unit certification.
As shown in Figure 1, Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
The terminal of that embodiment of the invention can be server, wireless charging device, be also possible to mobile unit.
As shown in Figure 1, the terminal may include: processor 1001, such as cpu central processing unit (central
Processing unit), memory 1002, communication bus 1003.Wherein, communication bus 1003 is for realizing each in the terminal
Connection communication between building block.Memory 1002 can be high-speed RAM random access memory (random-access
Memory), it is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1002 can
The storage device that can also be independently of aforementioned processor 1001 of choosing.
It will be understood by those skilled in the art that the structure of terminal shown in Fig. 1 was not constituted to end of the embodiment of the present invention
The restriction at end may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
As shown in Figure 1, as the verifying that in a kind of memory 1002 of computer storage medium may include mobile unit
Program.
In terminal shown in Fig. 1, processor 1001 can be used for calling the mobile unit stored in memory 1002
Proving program, and execute following operation:
Public key is sent to mobile unit, so that the mobile unit is according to first summary info of public key encryption and vehicle-mounted
Device identification obtains cipher-text information, and first summary info identifies the mobile unit by preset Encryption Algorithm and encrypts
It obtains;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained
To mobile unit mark and first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, then determine that the mobile unit verifying is logical
It crosses.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
The second abstract is obtained to mobile unit key and mobile unit mark encryption by preset Encryption Algorithm
Information, wherein first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm
Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
The cipher-text information is decrypted using private key, obtains the mobile unit mark, the mobile unit key and described
First summary info, the cipher-text information first summary info according to the public key encryption, the mobile unit key and
The mobile unit identifies to obtain.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
When second summary info is consistent with first summary info, generates random code and calculate the random code
Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code
Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, then determine that the mobile unit is verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit
It charges.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
Mobile unit receives the public key that verifying end is sent;
It is identified to obtain cipher-text information, the first abstract letter according to first summary info of public key encryption and mobile unit
Breath obtains mobile unit mark encryption by preset Encryption Algorithm;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key
The mobile unit mark and first summary info are obtained, and by preset Encryption Algorithm to the mobile unit mark
Know encryption and obtain the second summary info, and when second summary info is consistent with first summary info, then determines institute
Mobile unit is stated to be verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
It identifies to obtain cipher-text information according to first summary info of public key encryption, mobile unit public key and mobile unit;
Wherein, first summary info to the mobile unit key and described vehicle-mounted is set by preset Encryption Algorithm
Standby mark encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key, and in the verifying end
When receiving the cipher-text information, the verifying end using private key decrypt the cipher-text information obtain the mobile unit key,
Mobile unit mark and first summary info, and by preset Encryption Algorithm to the mobile unit key with
The mobile unit encrypts to obtain the second summary info.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash
Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info
It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement
Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
Referring to Fig. 2, in one embodiment, the verification method of the mobile unit includes:
Step S10, public key is sent to mobile unit, is made a summary and is believed according to the public key encryption first for the mobile unit
Breath and mobile unit identify to obtain cipher-text information, and first summary info is by preset Encryption Algorithm to the mobile unit
Mark encryption obtains.
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging
The legitimate interests of operator need to carry out effective authentication to the vehicle to wireless charging for entering parking lot to prevent illegal vehicle
Charging.General verifying end is the legitimacy of the digital certificates sent by the mobile unit in verifying vehicle, judges vehicle-mounted set
Whether standby corresponding vehicle has wireless charging permission.
Generally, it can be divided into three classes according to verifying end whether there is or not configuration cloud network management and Third Party Authentication center CA system
Mobile unit verifies scene system, and one kind is not configure cloud network management and Third Party Authentication center CA service system, vehicle-mounted to set
It is standby to need to complete certification in local proxy server system;Second class is configured with cloud network management and recognizes without configuring third party
Center CA server system is demonstrate,proved, mobile unit needs to complete certification in NM server system beyond the clouds;Third class is configured with
Cloud network management and Third Party Authentication center CA, mobile unit needs are completed to recognize in Third Party Authentication center CA server system
Card.These three scene systems are similar for the cryptographic authentication process of automobile wireless charging onboard system.Electric car without
In line charge electric system, vehicle to be charged can regard user as, in certification mainly certification to wireless charging mobile unit whether
It is legal, i.e., it whether is to arrange standard charging equipment that manufacturer provides and operator's authorization.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, can effectively be taken precautions against and be set
It is standby to distort.Other authentication modes such as bio-identification, USBkey etc., can not effectively prevention device be tampered.Common number label
There are certain drawbacks for name authentication mode: being inconvenient to update key pair, and stores fixed key and safety is reduced;Or
Dynamic key pair is generated, but ciphertext is easily intercepted and captured halfway with public key simultaneous transmission, and loses the meaning of encryption.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile
Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses
Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit
Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted
Cipher-text information is sent to terminal.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described default
Encryption Algorithm is hashing algorithm, and first summary info is that mobile unit calculates mobile unit mark progress hash operations
The hashed value arrived, the hash operations can be HASH256 operation.
It should be noted that the mobile unit is identified as globally unique 9 byte mobile unit mark ID, i.e., each vehicle
Carrying equipment has unique corresponding mobile unit mark.
It should be understood that mobile unit can be in the public key for receiving terminal, the first summary info of recombinant and
Mobile unit identifies to obtain cipher-text information, and is based on public key encryption cipher-text information;Mobile unit is also possible to combine first in advance
Summary info and mobile unit identify to obtain cipher-text information, after receiving the public key of terminal, direct encrypted cipher text information.
Optionally, mobile unit has ATECC108 chip, and mobile unit can be private by mobile unit public key, mobile unit
The write-in ATECC108 chip such as key, mobile unit mark, the cipher-text information of unencryption, the first summary info is saved.
Step S20, when receiving the cipher-text information that the mobile unit is sent, the ciphertext is decrypted using private key
Information obtains the mobile unit mark and first summary info.
Terminal utilizes the public key when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission
Corresponding private key decrypts cipher-text information, and the first summary info and vehicle of mobile unit are extracted from the cipher-text information after decryption
Carry device identification.
Optionally, terminal can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit mark
Know.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate that the mobile unit is
Illegality equipment, which, which is identified as, hits code, and terminal directly determines that mobile unit verifying does not pass through.
Step S30, the second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm.
Step S40, when second summary info is consistent with first summary info, then determine the mobile unit
It is verified.
When terminal obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract letter is calculated
Breath, and the first summary info in the second summary info and cipher-text information that are calculated is compared, it is plucked described second
When wanting information consistent with first summary info, then determine that the mobile unit is verified, i.e., the mobile unit is legal;?
When second summary info and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.It needs
Illustrate, hashing algorithm used by legal mobile unit is identical as terminal, i.e. terminal and legal mobile unit uses
Same set of preset Encryption Algorithm.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is terminal
It is generated according to mobile unit mark, and summary info is both generated using identical mobile unit mark, therefore, if terminal
The second summary info and the first summary info generated is inconsistent, illustrates hashing algorithm used by the mobile unit and terminal not
Together and/or the mobile unit of the mobile unit is identified as pseudo-code.
In this way, by realize to the mobile unit identity verification of mobile unit, vehicle-mounted hashing algorithm verifying and terminal with
The multiple-authentications such as the encryption of vehicle equipment information transmission improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks
The case where public-private key pair of terminal, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead in terminal authentication vehicle
It carries after device identification, the first summary info pass through, the case where mobile unit that can still have current authentication is illegality equipment.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter
When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually
End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with
Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit.
Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will
Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted
Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined
Do not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately
The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judge whether to adopt with verifying terminal
With same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with verifying terminal, when intercepting and capturing
The cipher-text information of legitimate device can still pass through the problem of one-time authentication, further improve the safety to mobile unit certification
Property.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified
The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle
Carry out wireless charging safety, prevent illegal vehicle to charge.
In a second embodiment, as shown in figure 3, on the basis of above-mentioned embodiment shown in Fig. 2, the mobile unit is tested
Card method further include:
Step S11, public key is sent to mobile unit, is made a summary and is believed according to the public key encryption first for the mobile unit
Breath and mobile unit identify to obtain cipher-text information, and first summary info is by preset Encryption Algorithm to mobile unit key
It is obtained with mobile unit mark encryption.
Step S31, obtain the mobile unit key, and by preset Encryption Algorithm to the mobile unit key with
The mobile unit mark encryption obtains the second summary info.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile
Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses
Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit
Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted
Cipher-text information is sent to terminal.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described first
Summary info is that mobile unit is carried out based on hash operations by the combinations of values of mobile unit mark and mobile unit key composition
Obtained hashed value, wherein the hash operations can be HASH256 operation, and the mobile unit key is mobile unit
Public key or mobile unit private key.
Optionally, when the mobile unit key is mobile unit private key, the cipher-text information further includes mobile unit
Private key.Terminal utilizes the public key pair when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission
The private key decryption cipher-text information answered, and extract from the cipher-text information after decryption the first summary info, vehicle-mounted of mobile unit
Device identification and mobile unit private key.Terminal carries out hash fortune according to the combinations of values of mobile unit mark and mobile unit private key
Calculation is calculated the second summary info, and by the first summary info in the second summary info and cipher-text information that are calculated into
Row compares, and when second summary info is consistent with first summary info, then determines that the mobile unit is verified,
I.e. the mobile unit is legal;In second summary info and inconsistent first summary info, then determine described vehicle-mounted
Device authentication does not pass through.
Optionally, when the mobile unit key is mobile unit public key, the cipher-text information may include vehicle-mounted sets
Standby public key, can not also include mobile unit public key.When cipher-text information includes mobile unit public key, terminal receive it is vehicle-mounted
When cipher-text information after the public key encryption for the using terminal that equipment is sent, cipher-text information is decrypted using the corresponding private key of the public key,
And it is public that the first summary info of mobile unit, mobile unit mark and mobile unit are extracted from the cipher-text information after decryption
Key;When cipher-text information does not include mobile unit public key, terminal directly can obtain mobile unit public key to mobile unit.Terminal root
Hash operations are carried out according to the combinations of values of mobile unit mark and mobile unit public key, the second summary info is calculated, and will meter
Obtained the first summary info in the second summary info and cipher-text information is compared, in second summary info and institute
State the first summary info it is consistent when, then determine that the mobile unit is verified, i.e., the mobile unit is legal;It is plucked described second
When wanting information and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit
Standby public key or mobile unit private key calculate as one of hash factor and generate summary info, are cracked by increasing illegality equipment
The difficulty of hash operations further improves the safety to mobile unit certification.Also, since different mobile units can be with
Different mobile unit public key-mobile unit private keys pair is generated, using the mobile unit public key or mobile unit of mobile unit
Private key is used as the hash factor as one of hash factor, than the fixed numbers that terminal and mobile unit have been made an appointment using one
One of solution security it is higher, be less prone to illegal user and pass through verifying.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter
When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually
End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with
Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit.
Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will
Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted
Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined
Do not pass through.
In this way, further improving the safety to mobile unit certification.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified
The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle
Carry out wireless charging safety, prevent illegal vehicle to charge.
In the third embodiment, as shown in figure 4, the verification method of the mobile unit includes:
Step S50, mobile unit receives the public key that verifying end is sent.
Step S60, identify to obtain cipher-text information according to first summary info of public key encryption and mobile unit, described
One summary info obtains mobile unit mark encryption by preset Encryption Algorithm.
Step S70, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption
Cipher-text information obtains the mobile unit mark and first summary info, and by preset Encryption Algorithm to the vehicle
It carries device identification to encrypt to obtain the second summary info, and when second summary info is consistent with first summary info,
Then determine that the mobile unit is verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit
Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has
There is the wireless charging device of charging permission.
Verifying end generates the public key and private key of verifying end using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit
Mobile unit public key and mobile unit private key are generated using another set of elliptic curve encryption algorithm (ECC algorithm).
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit
Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add
Cipher-text information after close is sent to verifying end.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described first
Summary info is that mobile unit is identified and carries out the hashed value that is calculated of hash operations by mobile unit, and the hash operations can be with
It is HASH256 operation.
Verifying end utilizes this when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent
The corresponding private key of public key decrypts cipher-text information, and the first summary info of mobile unit is extracted from the cipher-text information after decryption
It is identified with mobile unit.
Optionally, verifying end can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit
Mark.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate the mobile unit
For illegality equipment, which, which is identified as, hits code, and verifying end directly determines that mobile unit verifying does not pass through.
When verifying end obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract is calculated
Information, and the first summary info in the second summary info and cipher-text information that are calculated is compared, described second
When summary info is consistent with first summary info, then determine that the mobile unit is verified, i.e., the mobile unit is legal;
In second summary info and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.It needs
It is noted that hashing algorithm used by legal mobile unit is identical as verifying end.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is verifying
End is generated according to mobile unit mark, and both generates summary info using identical mobile unit mark, therefore, if testing
The second summary info and the first summary info for demonstrate,proving end generation are inconsistent, illustrate hashing algorithm used by the mobile unit and test
The mobile unit of card end difference and/or the mobile unit is identified as pseudo-code.
In this way, by realizing the mobile unit identity verification to mobile unit, vehicle-mounted hashing algorithm verifying and verifying end
The multiple-authentications such as the encryption transmitted with vehicle equipment information improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks
The case where public-private key pair of verifying end, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead to test in verifying end
After card mobile unit mark, the first summary info pass through, the mobile unit that can still have current authentication is the feelings of illegality equipment
Condition.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract
When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that
Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals
Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit
Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission,
And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle
Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested
Card does not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately
The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judged whether and authentication end
Using same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with authentication end, when cutting
The problem of one-time authentication can still be passed through by having obtained the cipher-text information of legitimate device further improves to mobile unit certification
Safety.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end
The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission
Electric equipment carries out wireless charging.
In the fourth embodiment, as shown in figure 5, on the basis of the embodiment of above-mentioned Fig. 4, the authentication of the mobile unit
Method further include:
Step S61, identify to obtain cipher-text information according to first summary info of public key encryption and mobile unit, described
One summary info obtains mobile unit key and mobile unit mark encryption by preset Encryption Algorithm.
Step S71, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption
Cipher-text information obtains the mobile unit mark and first summary info, and obtains the mobile unit key, and lead to
It crosses preset Encryption Algorithm the mobile unit key and mobile unit mark are encrypted and obtain the second summary info, and
When second summary info is consistent with first summary info, then determine that the mobile unit is verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit
Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has
There is the wireless charging device of charging permission.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit
Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add
Cipher-text information after close is sent to verifying end.
The cipher-text information includes the first summary info and mobile unit mark of mobile unit, optionally, described first
Summary info is that mobile unit is carried out based on hash operations by the combinations of values of mobile unit mark and mobile unit key composition
Obtained hashed value, wherein the hash operations can be HASH256 operation, and the mobile unit key is mobile unit
Public key or mobile unit private key.
Optionally, when the mobile unit key is mobile unit private key, the cipher-text information further includes mobile unit
Private key.Verifying end utilizes the public affairs when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent
The corresponding private key of key decrypts cipher-text information, and extract from the cipher-text information after decryption mobile unit the first summary info,
Mobile unit mark and mobile unit private key.Verifying end is carried out according to the combinations of values of mobile unit mark and mobile unit private key
The second summary info is calculated in hash operations, and first in the second summary info and cipher-text information that are calculated is made a summary
Information is compared, and when second summary info is consistent with first summary info, then determines that the mobile unit is tested
Card passes through, i.e., the mobile unit is legal;In second summary info and inconsistent first summary info, then institute is determined
Mobile unit verifying is stated not pass through.
Optionally, when the mobile unit key is mobile unit public key, the cipher-text information may include vehicle-mounted sets
Standby public key, can not also include mobile unit public key.When cipher-text information includes mobile unit public key, verifying end is receiving vehicle
When cipher-text information after carrying the public key encryption using verifying end that equipment is sent, the public key corresponding private key decryption ciphertext letter is utilized
It ceases, and extracts the first summary info, mobile unit mark and the mobile unit of mobile unit from the cipher-text information after decryption
Public key;When cipher-text information does not include mobile unit public key, verifying end directly can obtain mobile unit public key to mobile unit.It tests
Card end carries out hash operations according to the combinations of values of mobile unit mark and mobile unit public key and the second summary info is calculated,
And the first summary info in the second summary info and cipher-text information that are calculated is compared, in the second abstract letter
When ceasing consistent with first summary info, then determine that the mobile unit is verified, i.e., the mobile unit is legal;Described
When the second summary info and inconsistent first summary info, then determine that the mobile unit verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit
Standby public key or mobile unit private key calculate as one of hash factor and generate summary info, are cracked by increasing illegality equipment
The difficulty of hash operations further improves the safety to mobile unit certification.Also, since different mobile units can be with
Different mobile unit public key-mobile unit private keys pair is generated, using the mobile unit public key or mobile unit of mobile unit
The fixed numbers that private key has been made an appointment as hash one of factor, than verifying end and mobile unit using one as hash because
The solution security of one of son is higher, is less prone to illegal user and passes through verifying.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract
When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that
Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals
Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit
Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission,
And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle
Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested
Card does not pass through.
In this way, further improving the safety to mobile unit certification.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end
The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission
Electric equipment carries out wireless charging.
In addition, the present invention also proposes a kind of server, the server includes memory, processor and is stored in memory
The proving program of mobile unit that is upper and can running on a processor, the processor execute the proving program of the mobile unit
The step of verification method of mobile unit Shi Shixian as described above in Example.
In addition, the present invention also proposes a kind of wireless charging device, the wireless charging device include memory, processor and
On a memory and the proving program of mobile unit that can run on a processor, the processor execution is described vehicle-mounted to be set for storage
The step of realizing the verification method of mobile unit as described above in Example when standby proving program.
In addition, the present invention also proposes that a kind of mobile unit, the mobile unit include memory, processor and be stored in
On reservoir and the proving program of mobile unit that can run on a processor, the processor execute the verifying of the mobile unit
The step of verification method of mobile unit as described above in Example is realized when program.
In addition, the present invention also proposes that a kind of computer readable storage medium, the computer readable storage medium include vehicle
The proving program of equipment is carried, the proving program of the mobile unit realizes vehicle as described above in Example when being executed by processor
The step of carrying the verification method of equipment.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be TV
Machine, mobile phone, computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (12)
1. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to first summary info of public key encryption and mobile unit
Mark obtains cipher-text information, and first summary info encrypts mobile unit mark by preset Encryption Algorithm
It arrives;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, obtains institute
State mobile unit mark and first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, then determine that the mobile unit is verified.
2. the verification method of mobile unit as described in claim 1, which is characterized in that described to pass through preset Encryption Algorithm pair
The mobile unit mark encrypts the step of obtaining the second summary info and includes:
The second summary info is obtained to mobile unit key and mobile unit mark encryption by preset Encryption Algorithm,
Wherein, first summary info identifies the mobile unit key and the mobile unit by preset Encryption Algorithm
Encryption obtains, and the mobile unit key is mobile unit public key or mobile unit private key.
3. the verification method of mobile unit as claimed in claim 2, which is characterized in that described to decrypt the ciphertext using private key
Information, obtaining the mobile unit mark with the step of first summary info includes:
The cipher-text information is decrypted using private key, obtains the mobile unit mark, the mobile unit key and described first
Summary info, the cipher-text information first summary info according to the public key encryption, the mobile unit key and described
Mobile unit identifies to obtain.
4. the verification method of mobile unit as claimed in any one of claims 1-3, which is characterized in that described described second
When summary info is consistent with first summary info, then determine that the step of mobile unit is verified includes:
When second summary info is consistent with first summary info, generates random code and calculate dissipating for the random code
Train value is as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates the second hash according to the random code
Value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, then determine that the mobile unit is verified.
5. the verification method of mobile unit as described in claim 1, which is characterized in that the verification method of the mobile unit is also
Include:
When determining that the mobile unit is verified, control wireless charging device carries out the corresponding vehicle of the mobile unit
Charging.
6. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Mobile unit receives the public key that verifying end is sent;
It is identified to obtain cipher-text information according to first summary info of public key encryption and mobile unit, first summary info is logical
Preset Encryption Algorithm is crossed to obtain mobile unit mark encryption;
The cipher-text information is sent to the verifying end, the cipher-text information is decrypted using private key for the verifying end and obtains
The mobile unit mark and first summary info, and mobile unit mark is added by preset Encryption Algorithm
It is close to obtain the second summary info, and when second summary info is consistent with first summary info, then determine the vehicle
Device authentication is carried to pass through.
7. the verification method of mobile unit as claimed in claim 6, which is characterized in that described according to the public key encryption first
Summary info and mobile unit identify the step of obtaining cipher-text information and include:
It identifies to obtain cipher-text information according to first summary info of public key encryption, mobile unit public key and mobile unit;
Wherein, first summary info is by preset Encryption Algorithm to the mobile unit key and the mobile unit mark
Know encryption to obtain, the mobile unit key is mobile unit public key or mobile unit private key, and is received in the verifying end
When to the cipher-text information, the verifying end decrypts the cipher-text information using private key and obtains the mobile unit key, described
Mobile unit mark and first summary info, and by preset Encryption Algorithm to the mobile unit key and described
Mobile unit encrypts to obtain the second summary info.
8. the verification method of mobile unit as claimed in claims 6 or 7, which is characterized in that the authentication of the mobile unit
Method further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hashed value, institute
Verifying end is stated when second summary info is consistent with first summary info, generates the random code and will be described random
Code is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to then determine described vehicle-mounted when second hashed value is consistent with the first hashed value
Device authentication passes through, and first hashed value is that the verifying end is calculated according to the random code.
9. a kind of server, which is characterized in that the server is associated with wireless charging device, and the server includes storage
Device, processor and the proving program for being stored in the mobile unit that can be run on the memory and on the processor, it is described
The mobile unit as described in any one of claims 1 to 5 is realized when the proving program of mobile unit is executed by the processor
Verification method the step of.
10. a kind of wireless charging device, which is characterized in that the wireless charging device includes memory, processor and is stored in
On the memory and the proving program of mobile unit that can run on the processor, the proving program of the mobile unit
The step of verification method of the mobile unit as described in any one of claims 1 to 5 is realized when being executed by the processor.
11. a kind of mobile unit, which is characterized in that the mobile unit includes memory, processor and is stored in the storage
On device and the proving program of mobile unit that can run on the processor, the proving program of the mobile unit is by the place
The step of managing the verification method that the mobile unit as described in any one of claim 6 to 8 is realized when device executes.
12. a kind of computer readable storage medium, which is characterized in that be stored with vehicle-mounted set on the computer readable storage medium
It realizes when the proving program of standby proving program, the mobile unit is executed by processor such as any one of claims 1 to 8 institute
The step of verification method for the mobile unit stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910336508.1A CN110061849A (en) | 2019-04-29 | 2019-04-29 | Verification method, server, mobile unit and the storage medium of mobile unit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910336508.1A CN110061849A (en) | 2019-04-29 | 2019-04-29 | Verification method, server, mobile unit and the storage medium of mobile unit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110061849A true CN110061849A (en) | 2019-07-26 |
Family
ID=67320631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910336508.1A Pending CN110061849A (en) | 2019-04-29 | 2019-04-29 | Verification method, server, mobile unit and the storage medium of mobile unit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110061849A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110545173A (en) * | 2019-07-29 | 2019-12-06 | 大众问问(北京)信息科技有限公司 | method and device for safety verification and request sending |
CN111222180A (en) * | 2020-02-27 | 2020-06-02 | 山东浪潮通软信息科技有限公司 | Method, system, device and medium for judging whether accounting document is tampered |
CN111565182A (en) * | 2020-04-29 | 2020-08-21 | 深圳市元征科技股份有限公司 | Vehicle diagnosis method and device and storage medium |
CN112866987A (en) * | 2019-11-08 | 2021-05-28 | 佛山市云米电器科技有限公司 | Networking verification method, equipment and computer readable storage medium |
CN112987581A (en) * | 2019-12-16 | 2021-06-18 | 华为技术有限公司 | Control method for intelligent household equipment, medium and terminal thereof |
CN113492705A (en) * | 2021-07-14 | 2021-10-12 | 福建星云电子股份有限公司 | Noninductive charging method for charging pile |
CN113589722A (en) * | 2021-07-21 | 2021-11-02 | 上汽通用五菱汽车股份有限公司 | Vehicle control encryption method, system, device and computer readable storage medium |
CN114095190A (en) * | 2020-08-03 | 2022-02-25 | 北京无限感测科技有限公司 | Charging data protection method, device, special case processing terminal and storage medium |
CN114650155A (en) * | 2020-12-18 | 2022-06-21 | 北京万集科技股份有限公司 | Method and system for issuing vehicle-mounted unit, storage medium, and electronic device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090259839A1 (en) * | 2007-07-12 | 2009-10-15 | Nhn Corporation | Security authentication system and method |
US20120204027A1 (en) * | 2011-02-09 | 2012-08-09 | Samsung Electronics Co. Ltd. | Authentication method and apparatus in a communication system |
CN103517273A (en) * | 2013-10-09 | 2014-01-15 | 中国联合网络通信集团有限公司 | Authentication method, managing platform and Internet-of-Things equipment |
CN104518529A (en) * | 2013-09-27 | 2015-04-15 | 中兴通讯股份有限公司 | Authentication method for vehicle-mounted charging device, and corresponding device |
CN106656481A (en) * | 2016-10-28 | 2017-05-10 | 美的智慧家居科技有限公司 | Identity authentication method, apparatus and system |
CN106713237A (en) * | 2015-11-16 | 2017-05-24 | 厦门雅迅网络股份有限公司 | Encryption method of vehicle-mounted terminal and center platform communication |
CN108076062A (en) * | 2017-12-22 | 2018-05-25 | 深圳市汇川技术股份有限公司 | Internet of things equipment safe communication system, method, networked devices and server |
CN109484236A (en) * | 2018-11-30 | 2019-03-19 | 深圳市元征科技股份有限公司 | A kind of method, system, terminal device and the mobile unit of vehicle safety charging |
-
2019
- 2019-04-29 CN CN201910336508.1A patent/CN110061849A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090259839A1 (en) * | 2007-07-12 | 2009-10-15 | Nhn Corporation | Security authentication system and method |
US20120204027A1 (en) * | 2011-02-09 | 2012-08-09 | Samsung Electronics Co. Ltd. | Authentication method and apparatus in a communication system |
CN104518529A (en) * | 2013-09-27 | 2015-04-15 | 中兴通讯股份有限公司 | Authentication method for vehicle-mounted charging device, and corresponding device |
CN103517273A (en) * | 2013-10-09 | 2014-01-15 | 中国联合网络通信集团有限公司 | Authentication method, managing platform and Internet-of-Things equipment |
CN106713237A (en) * | 2015-11-16 | 2017-05-24 | 厦门雅迅网络股份有限公司 | Encryption method of vehicle-mounted terminal and center platform communication |
CN106656481A (en) * | 2016-10-28 | 2017-05-10 | 美的智慧家居科技有限公司 | Identity authentication method, apparatus and system |
CN108076062A (en) * | 2017-12-22 | 2018-05-25 | 深圳市汇川技术股份有限公司 | Internet of things equipment safe communication system, method, networked devices and server |
CN109484236A (en) * | 2018-11-30 | 2019-03-19 | 深圳市元征科技股份有限公司 | A kind of method, system, terminal device and the mobile unit of vehicle safety charging |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110545173A (en) * | 2019-07-29 | 2019-12-06 | 大众问问(北京)信息科技有限公司 | method and device for safety verification and request sending |
CN112866987A (en) * | 2019-11-08 | 2021-05-28 | 佛山市云米电器科技有限公司 | Networking verification method, equipment and computer readable storage medium |
CN112866987B (en) * | 2019-11-08 | 2023-08-04 | 佛山市云米电器科技有限公司 | Networking verification method, networking verification device and computer readable storage medium |
CN112987581A (en) * | 2019-12-16 | 2021-06-18 | 华为技术有限公司 | Control method for intelligent household equipment, medium and terminal thereof |
CN111222180A (en) * | 2020-02-27 | 2020-06-02 | 山东浪潮通软信息科技有限公司 | Method, system, device and medium for judging whether accounting document is tampered |
CN111565182A (en) * | 2020-04-29 | 2020-08-21 | 深圳市元征科技股份有限公司 | Vehicle diagnosis method and device and storage medium |
CN111565182B (en) * | 2020-04-29 | 2022-08-19 | 深圳市元征科技股份有限公司 | Vehicle diagnosis method and device and storage medium |
CN114095190A (en) * | 2020-08-03 | 2022-02-25 | 北京无限感测科技有限公司 | Charging data protection method, device, special case processing terminal and storage medium |
CN114650155A (en) * | 2020-12-18 | 2022-06-21 | 北京万集科技股份有限公司 | Method and system for issuing vehicle-mounted unit, storage medium, and electronic device |
CN113492705A (en) * | 2021-07-14 | 2021-10-12 | 福建星云电子股份有限公司 | Noninductive charging method for charging pile |
CN113492705B (en) * | 2021-07-14 | 2023-01-10 | 福建星云电子股份有限公司 | Noninductive charging method for charging pile |
CN113589722A (en) * | 2021-07-21 | 2021-11-02 | 上汽通用五菱汽车股份有限公司 | Vehicle control encryption method, system, device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110061849A (en) | Verification method, server, mobile unit and the storage medium of mobile unit | |
CN110113745A (en) | Verification method, server, mobile unit and the storage medium of mobile unit | |
CN103812871B (en) | Development method and system based on mobile terminal application program security application | |
CN109862040A (en) | A kind of safety certifying method and Verification System | |
CN106850680B (en) | Intelligent identity authentication method and device for rail transit equipment | |
CN108650220B (en) | Method and equipment for issuing and acquiring mobile terminal certificate and automobile end chip certificate | |
CN104735065B (en) | A kind of data processing method, electronic equipment and server | |
CN107493273A (en) | Identity identifying method, system and computer-readable recording medium | |
CN105847247A (en) | Authentication system and working method thereof | |
CN105635147A (en) | Vehicle-mounted-special-equipment-system-based secure data transmission method and system | |
CN103269271B (en) | A kind of back up the method and system of private key in electronic signature token | |
CN106850207B (en) | CA-free identity authentication method and system | |
CN103067402A (en) | Method and system for digital certificate generation | |
CN109492358A (en) | A kind of open interface uniform authentication method | |
CN106713279A (en) | Video terminal identity authentication system | |
CN103078742A (en) | Generation method and system of digital certificate | |
CN105447715A (en) | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party | |
CN116232593B (en) | Multi-password module sensitive data classification and protection method, equipment and system | |
CN107483415A (en) | A kind of mutual authentication method of shared electricity consumption interactive system | |
CN109245885A (en) | Cryptographic key negotiation method, equipment, storage medium and system | |
CN113204760B (en) | Method and system for establishing secure channel for software cryptographic module | |
CN106027251A (en) | Identity card reading terminal and cloud authentication platform data transmission method and system | |
CN114696998B (en) | Identity authentication method, device and system | |
CN106027473A (en) | Identity card reading terminal and cloud authentication platform data transmission method and system | |
CN111541660B (en) | Identity authentication method for remote vehicle control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190726 |
|
RJ01 | Rejection of invention patent application after publication |