CN110113745A - Verification method, server, mobile unit and the storage medium of mobile unit - Google Patents

Verification method, server, mobile unit and the storage medium of mobile unit Download PDF

Info

Publication number
CN110113745A
CN110113745A CN201910359819.XA CN201910359819A CN110113745A CN 110113745 A CN110113745 A CN 110113745A CN 201910359819 A CN201910359819 A CN 201910359819A CN 110113745 A CN110113745 A CN 110113745A
Authority
CN
China
Prior art keywords
mobile unit
public key
summary info
encryption
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910359819.XA
Other languages
Chinese (zh)
Inventor
杨进
胡超
罗勇
褚维戈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE NEW ENERGY AUTOMOBILE Co Ltd
Original Assignee
ZTE NEW ENERGY AUTOMOBILE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE NEW ENERGY AUTOMOBILE Co Ltd filed Critical ZTE NEW ENERGY AUTOMOBILE Co Ltd
Priority to CN201910359819.XA priority Critical patent/CN110113745A/en
Publication of CN110113745A publication Critical patent/CN110113745A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention discloses a kind of verification methods of mobile unit: sending public key to mobile unit, so that mobile unit obtains cipher-text information according to public key encryption mobile unit public key, mobile unit mark and abstract ciphertext, abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and the first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;When receiving the cipher-text information of mobile unit transmission, cipher-text information is decrypted using private key, obtains mobile unit mark, mobile unit public key and abstract ciphertext;The first summary info is obtained according to mobile unit public key decryptions abstract ciphertext;The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;In the second summary info and consistent the first summary info, determine that mobile unit is verified.The invention also discloses a kind of server, wireless charging device, mobile unit and computer readable storage mediums.The present invention improves the safety to mobile unit certification.

Description

Verification method, server, mobile unit and the storage medium of mobile unit
Technical field
The present invention relates to field of communication technology more particularly to a kind of verification method of mobile unit, server, vehicle-mounted set Standby, wireless charging device and computer readable storage medium.
Background technique
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging The legitimate interests of operator need to carry out effective authentication to wireless charging mobile unit into parking lot, non-to prevent Method Vehicular charging.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, it can effective prevention device It distorts.But there are certain drawbacks for common digital signature identification mode: being inconvenient to update public key pair, and stores fixed public key There is a problem of that safety is not high, even generation dynamic public key pair, but transmission is also easily by midway while ciphertext and public key It intercepts and captures, these all threaten the safety to mobile unit certification.
Summary of the invention
The main purpose of the present invention is to provide a kind of verification method of mobile unit, server, mobile unit, wireless chargings Electric equipment and computer readable storage medium improve the safety to mobile unit certification.
To achieve the above object, the present invention provides a kind of verification method of mobile unit, the authentication of the mobile unit Method the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to the public key encryption mobile unit public key, vehicle-mounted Device identification and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption It arrives, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained To mobile unit mark, the mobile unit public key and the abstract ciphertext;
The abstract ciphertext according to the mobile unit public key decryptions obtains first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, determine that the mobile unit is verified.
Optionally, described that second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm Step includes:
Are obtained by second and is plucked for the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm Want information, wherein the mobile unit is by preset Encryption Algorithm to the mobile unit public key and the mobile unit mark Know encryption and obtains first summary info.
Optionally, described when second summary info is consistent with first summary info, determine described vehicle-mounted set Include: for the step of being verified
When second summary info is consistent with first summary info, generates random code and calculate the random code Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, determine that the mobile unit is verified.
Optionally, the verification method of the mobile unit further include:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit It charges.
Optionally, the mobile unit verification method the following steps are included:
Mobile unit receives the public key that verifying end is sent;
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext, it is described Abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info is calculated by preset encryption Method obtains mobile unit mark encryption;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key The mobile unit public key, mobile unit mark and the abstract ciphertext are obtained, and according to the mobile unit public key It decrypts the abstract ciphertext and obtains first summary info, the mobile unit is identified by preset Encryption Algorithm and is encrypted The second summary info is obtained, and when second summary info is consistent with first summary info, determines described vehicle-mounted set It is standby to be verified.
Optionally, the ciphertext that identifies and make a summary according to the public key encryption mobile unit public key, mobile unit obtains close The step of literary information includes:
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext;
Wherein, the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, the first abstract letter Breath obtains the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm, and in the verifying The cipher-text information is decrypted using private key and obtains the mobile unit public key, mobile unit mark and the abstract ciphertext in end When, verifying end ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info, and passes through Preset Encryption Algorithm obtains the second summary info to the mobile unit public key and mobile unit mark encryption.
Optionally, the verification method of the mobile unit further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
To achieve the above object, the present invention also provides a kind of server, the server includes:
The server includes memory, processor and is stored on the memory and can run on the processor Mobile unit proving program, realize when the proving program of the mobile unit is executed by the processor and vehicle-mounted set as above-mentioned The step of standby verification method.
To achieve the above object, the present invention also provides a kind of wireless charging device, the wireless charging device includes:
The wireless charging device includes memory, processor and is stored on the memory and can be in the processor The proving program of the mobile unit of upper operation is realized when the proving program of the mobile unit is executed by the processor as above-mentioned The step of verification method of mobile unit.
To achieve the above object, the present invention also provides a kind of mobile unit, the mobile unit includes:
The mobile unit includes memory, processor and is stored on the memory and can transport on the processor The proving program of capable mobile unit is realized when the proving program of the mobile unit is executed by the processor as above-mentioned vehicle-mounted The step of verification method of equipment.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storages It is stored with the proving program of mobile unit on medium, realizes when the proving program of the mobile unit is executed by processor as above-mentioned The step of verification method of mobile unit.
Verification method, server, wireless charging device, mobile unit and the computer of mobile unit provided by the invention Readable storage medium storing program for executing sends public key to mobile unit, so that the mobile unit is according to first summary info of public key encryption It identifies to obtain cipher-text information with mobile unit, first summary info is by preset Encryption Algorithm to the mobile unit mark Know encryption to obtain;When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, Obtain the mobile unit mark and first summary info;Mobile unit mark is added by preset Encryption Algorithm It is close to obtain the second summary info;When second summary info is consistent with first summary info, then determine described vehicle-mounted Device authentication passes through.In this way, by realizing that the mobile unit identity verification to mobile unit, vehicle-mounted hashing algorithm are verified, and The multiple-authentications such as the encryption of terminal and vehicle equipment information transmission, improve the safety to mobile unit certification.
Detailed description of the invention
Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the verification method first embodiment of mobile unit of the present invention;
Fig. 3 is the flow diagram of the verification method second embodiment of mobile unit of the present invention;
Fig. 4 is the flow diagram of the verification method 3rd embodiment of mobile unit of the present invention;
Fig. 5 is the flow diagram of the verification method fourth embodiment of mobile unit of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of verification method of mobile unit, by realizing that the mobile unit mark to mobile unit is tested The multiple-authentications such as the encryption of card, vehicle-mounted hashing algorithm verifying and terminal and vehicle equipment information transmission, improve and set to vehicle-mounted The safety of standby certification.
As shown in Figure 1, Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
The terminal of that embodiment of the invention can be server or wireless charging device, be also possible to mobile unit.
As shown in Figure 1, the terminal may include: processor 1001, such as cpu central processing unit (central Processing unit), memory 1002, communication bus 1003.Wherein, communication bus 1003 is for realizing each in the terminal Connection communication between building block.Memory 1002 can be high-speed RAM random access memory (random-access Memory), it is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1002 can The storage device that can also be independently of aforementioned processor 1001 of choosing.
It will be understood by those skilled in the art that the structure of terminal shown in Fig. 1 was not constituted to end of the embodiment of the present invention The restriction at end may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
As shown in Figure 1, as the verifying that in a kind of memory 1002 of computer storage medium may include mobile unit Program.
In terminal shown in Fig. 1, processor 1001 can be used for calling the mobile unit stored in memory 1002 Proving program, and execute following operation:
Public key is sent to mobile unit, so that the mobile unit is according to the public key encryption mobile unit public key, vehicle-mounted Device identification and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption It arrives, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained To mobile unit mark, the mobile unit public key and the abstract ciphertext;
The abstract ciphertext according to the mobile unit public key decryptions obtains first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, determine that the mobile unit is verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
Are obtained by second and is plucked for the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm Want information, wherein the mobile unit is by preset Encryption Algorithm to the mobile unit public key and the mobile unit mark Know encryption and obtains first summary info.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
When second summary info is consistent with first summary info, generates random code and calculate the random code Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, determine that the mobile unit is verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit It charges.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
Mobile unit receives the public key that verifying end is sent;
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext, it is described Abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info is calculated by preset encryption Method obtains mobile unit mark encryption;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key The mobile unit public key, mobile unit mark and the abstract ciphertext are obtained, and according to the mobile unit public key It decrypts the abstract ciphertext and obtains first summary info, the mobile unit is identified by preset Encryption Algorithm and is encrypted The second summary info is obtained, and when second summary info is consistent with first summary info, determines described vehicle-mounted set It is standby to be verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext;
Wherein, the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, the first abstract letter Breath obtains the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm, and in the verifying The cipher-text information is decrypted using private key and obtains the mobile unit public key, mobile unit mark and the abstract ciphertext in end When, verifying end ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info, and passes through Preset Encryption Algorithm obtains the second summary info to the mobile unit public key and mobile unit mark encryption.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold The following operation of row:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
Referring to Fig. 2, in one embodiment, the verification method of the mobile unit includes:
Step S10, public key is sent to mobile unit, so that the mobile unit is public according to the public key encryption mobile unit Key, mobile unit mark and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is plucked according to mobile unit private key encryption first Information is wanted to obtain, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm.
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging The legitimate interests of operator need to carry out effective authentication to the vehicle to wireless charging for entering parking lot to prevent illegal vehicle Charging.General verifying end is the legitimacy of the digital certificates sent by the mobile unit in verifying vehicle, judges vehicle-mounted set Whether standby corresponding vehicle has wireless charging permission.
Generally, it can be divided into three classes according to verifying end whether there is or not configuration cloud network management and Third Party Authentication center CA system Mobile unit verifies scene system, and one kind is not configure cloud network management and Third Party Authentication center CA service system, vehicle-mounted to set It is standby to need to complete certification in local proxy server system;Second class is configured with cloud network management and recognizes without configuring third party Center CA server system is demonstrate,proved, mobile unit needs to complete certification in NM server system beyond the clouds;Third class is configured with Cloud network management and Third Party Authentication center CA, mobile unit needs are completed to recognize in Third Party Authentication center CA server system Card.These three scene systems are similar for the cryptographic authentication process of automobile wireless charging onboard system.Electric car without In line charge electric system, vehicle to be charged can regard user as, verifying end mainly authenticate to wireless charging mobile unit whether It is legal, i.e., it whether is to arrange standard charging equipment that manufacturer provides and operator's authorization.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, can effectively be taken precautions against and be set It is standby to distort.Other authentication modes such as bio-identification, USBkey etc., can not effectively prevention device be tampered.Common number label There are certain drawbacks for name authentication mode: being inconvenient to update key pair, and stores fixed key and safety is reduced;Or Dynamic key pair is generated, but ciphertext is easily intercepted and captured halfway with public key simultaneous transmission, and loses the meaning of encryption.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted Cipher-text information is sent to terminal.The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit of mobile unit Mark.
The abstract ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, institute Stating the first summary info is that mobile unit obtains mobile unit mark encryption by preset Encryption Algorithm, the predetermined encryption Algorithm is hashing algorithm, and first summary info is that mobile unit mark progress hash operations are calculated mobile unit Hashed value, the hash operations can be HASH256 operation.
Mobile unit can be in the public key for receiving terminal, according to the public key encryption mobile unit public key, vehicle-mounted Device identification and abstract ciphertext obtain cipher-text information;It is also possible to combine mobile unit public key, mobile unit mark in advance and plucks It wants ciphertext to obtain the cipher-text information of unencryption, and in the public key for receiving terminal, uses the public key encryption cipher-text information.
Optionally, mobile unit has ATECC108 chip, and mobile unit can be private by mobile unit public key, mobile unit The write-in ATECC108 chip such as key, mobile unit mark, the cipher-text information of unencryption, the first summary info, abstract ciphertext carries out It saves.
Step S20, when receiving the cipher-text information that the mobile unit is sent, the ciphertext is decrypted using private key Information obtains the mobile unit mark, the mobile unit public key and the abstract ciphertext.
Terminal utilizes the public key when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission Corresponding private key decrypts cipher-text information, and extracts from the cipher-text information after decryption the mobile unit public key of mobile unit, plucks Ciphertext and mobile unit is wanted to identify.
Optionally, terminal can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit mark Know.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate that the mobile unit is Illegality equipment, which, which is identified as, hits code, and terminal directly determines that mobile unit verifying does not pass through.
Step S30, ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info.
Terminal is made a summary close after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions Text, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore vehicle-mounted set can be used Standby public key decryptions).
If terminal can not decrypt abstract ciphertext using the mobile unit public key, illustrating that the abstract ciphertext is not is using the vehicle The corresponding mobile unit private key encryption of equipment public key is carried, which is that illegality equipment is generated and sent, and at this moment, is determined The corresponding mobile unit verifying of the abstract ciphertext does not pass through.
Step S40, the second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm.
Step S50, when second summary info is consistent with first summary info, determine that the mobile unit is tested Card passes through.
When terminal obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract letter is calculated Breath, and the first summary info obtained after the second summary info being calculated and decryption abstract ciphertext is compared, in institute State the second summary info it is consistent with first summary info when, then determine that the mobile unit is verified, i.e., this vehicle-mounted sets It is standby legal;In second summary info and inconsistent first summary info, then the mobile unit verifying is determined not Pass through.It should be noted that hashing algorithm used by legal mobile unit is identical as terminal, i.e., terminal with it is legal vehicle-mounted Equipment uses same set of preset Encryption Algorithm.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is terminal It is generated according to mobile unit mark, and summary info is both generated using identical mobile unit mark, therefore, if terminal The second summary info and the first summary info generated is inconsistent, illustrates hashing algorithm used by the mobile unit and terminal not Together and/or the mobile unit of the mobile unit is identified as pseudo-code.
In this way, by realize to the mobile unit identity verification of mobile unit, vehicle-mounted hashing algorithm verifying and terminal with The multiple-authentications such as the encryption of vehicle equipment information transmission improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks The case where public-private key pair of terminal, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead in terminal authentication vehicle It carries after device identification, the first summary info pass through, the case where mobile unit that can still have current authentication is illegality equipment.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit. Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined Do not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judge whether to adopt with verifying terminal With same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with verifying terminal, when intercepting and capturing The cipher-text information of legitimate device can still pass through the problem of one-time authentication, further improve the safety to mobile unit certification Property.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle Carry out wireless charging safety, prevent illegal vehicle to charge.
In a second embodiment, as shown in figure 3, on the basis of above-mentioned embodiment shown in Fig. 2, the mobile unit is tested Card method further include:
Step S11, public key is sent to mobile unit, so that the mobile unit is public according to the public key encryption mobile unit Key, mobile unit mark and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is plucked according to mobile unit private key encryption first Information is wanted to obtain, first summary info is by preset Encryption Algorithm to the mobile unit public key and the mobile unit Mark encryption obtains.
Step S41, the mobile unit public key and mobile unit mark are encrypted by preset Encryption Algorithm To the second summary info.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted Cipher-text information is sent to terminal.The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit of mobile unit Mark.
The abstract ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, institute Stating the first summary info is the numerical value that mobile unit identifies mobile unit public key and mobile unit by preset Encryption Algorithm Combination is encrypted to obtain, and the preset Encryption Algorithm is hashing algorithm, i.e., first information abstract is that mobile unit is based on vehicle The combinations of values for carrying device identification and mobile unit key composition carries out the hashed value that hash operations are calculated, wherein described Hash operations can be HASH256 operation.
Terminal utilizes the public key when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission Corresponding private key decrypts cipher-text information, and extracts from the cipher-text information after decryption the mobile unit public key of mobile unit, plucks Ciphertext and mobile unit is wanted to identify.
Terminal is made a summary close after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions Text, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore vehicle-mounted set can be used Standby public key decryptions).If terminal can not decrypt abstract ciphertext using the mobile unit public key, illustrate the abstract ciphertext not and be using The corresponding mobile unit private key encryption of the mobile unit public key, which is that illegality equipment is generated and sent, at this moment, Determine that the corresponding mobile unit verifying of the abstract ciphertext does not pass through.
Terminal is public according to mobile unit mark and mobile unit after mobile unit public key and the mobile unit mark of extraction The combinations of values of key carries out hash operations and is calculated the second summary info, and by the second summary info being calculated and decryption The first summary info obtained after abstract ciphertext is compared, consistent with first summary info in second summary info When, then determine that the mobile unit is verified, i.e., the mobile unit is legal;It is plucked in second summary info and described first When wanting information inconsistent, then determine that the mobile unit verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit Standby public key calculates as one of hash factor and generates summary info, and the difficulty of hash operations is cracked by increasing illegality equipment, into One step improves the safety to mobile unit certification.Also, since different vehicle-mounted set can be generated in different mobile units Standby public key-mobile unit private key pair, using the mobile unit public key of mobile unit as one of hash factor, than terminal with it is vehicle-mounted Equipment is higher as the solution security of one of the hash factor using the fixed numbers made an appointment, and is less prone to illegal User passes through verifying.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit. Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined Do not pass through.
In this way, further improving the safety to mobile unit certification.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle Carry out wireless charging safety, prevent illegal vehicle to charge.
In the third embodiment, as shown in figure 4, the verification method of the mobile unit includes:
Step S60, mobile unit receives the public key that verifying end is sent.
Step S70, it is identified according to the public key encryption mobile unit public key, mobile unit and abstract ciphertext obtains ciphertext letter Breath, the abstract ciphertext are obtained according to the first summary info of mobile unit private key encryption, and first summary info passes through default Encryption Algorithm to the mobile unit mark encryption obtain.
Step S80, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption Cipher-text information obtains the mobile unit public key, mobile unit mark and the abstract ciphertext, and according to described vehicle-mounted Abstract ciphertext described in equipment public key decryptions obtains first summary info, by preset Encryption Algorithm to the mobile unit Mark encryption obtains the second summary info, and when second summary info is consistent with first summary info, determines institute Mobile unit is stated to be verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has There is the wireless charging device of charging permission.
Verifying end generates the public key and private key of verifying end using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit Mobile unit public key and mobile unit private key are generated using another set of elliptic curve encryption algorithm (ECC algorithm).
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add Cipher-text information after close is sent to verifying end.
The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit mark of mobile unit.It is described to pluck Wanting ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, first summary info Mobile unit mark encryption is obtained by preset Encryption Algorithm for mobile unit, the predetermined encryption algorithm is that hash is calculated Method, first summary info is that mobile unit is identified the hashed value for carrying out hash operations and being calculated by mobile unit, described Hash operations can be HASH256 operation.
Mobile unit can be in the public key for receiving verifying end, according to the public key encryption mobile unit public key, vehicle It carries device identification and abstract ciphertext obtains cipher-text information;Be also possible to combine in advance mobile unit public key, mobile unit mark and Abstract ciphertext obtains the cipher-text information of unencryption, and in the public key for receiving verifying end, uses the public key encryption cipher-text information.
Verifying end utilizes this when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent The corresponding private key of public key decrypts cipher-text information, and the mobile unit public affairs of mobile unit are extracted from the cipher-text information after decryption Key, abstract ciphertext and mobile unit mark.
Optionally, verifying end can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit Mark.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate the mobile unit For illegality equipment, which, which is identified as, hits code, and verifying end directly determines that mobile unit verifying does not pass through.
Verifying end is made a summary after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions Ciphertext, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore be can be used vehicle-mounted Equipment public key decryptions).
If verifying end can not decrypt abstract ciphertext using the mobile unit public key, illustrating that the abstract ciphertext is not is to use this The corresponding mobile unit private key encryption of mobile unit public key, which is that illegality equipment is generated and sent, and at this moment, is sentenced Determine the corresponding mobile unit verifying of the abstract ciphertext not pass through.
When verifying end obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract is calculated Information, and the first summary info obtained after the second summary info being calculated and decryption abstract ciphertext is compared, When second summary info is consistent with first summary info, then determine that the mobile unit is verified, i.e., this is vehicle-mounted Equipment is legal;In second summary info and inconsistent first summary info, then the mobile unit verifying is determined Do not pass through.It should be noted that hashing algorithm used by legal mobile unit is identical as verifying end.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is verifying End is generated according to mobile unit mark, and both generates summary info using identical mobile unit mark, therefore, if testing The second summary info and the first summary info for demonstrate,proving end generation are inconsistent, illustrate hashing algorithm used by the mobile unit and test The mobile unit of card end difference and/or the mobile unit is identified as pseudo-code.
In this way, by realizing the mobile unit identity verification to mobile unit, vehicle-mounted hashing algorithm verifying and verifying end The multiple-authentications such as the encryption transmitted with vehicle equipment information improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks The case where public-private key pair of verifying end, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead to test in verifying end After card mobile unit mark, the first summary info pass through, the mobile unit that can still have current authentication is the feelings of illegality equipment Condition.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission, And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested Card does not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judged whether and authentication end Using same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with authentication end, when cutting The problem of one-time authentication can still be passed through by having obtained the cipher-text information of legitimate device further improves to mobile unit certification Safety.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission Electric equipment carries out wireless charging.
In the fourth embodiment, as shown in figure 5, on the basis of the embodiment of above-mentioned Fig. 4, the authentication of the mobile unit Method further include:
Step S71, it is identified according to the public key encryption mobile unit public key, mobile unit and abstract ciphertext obtains ciphertext letter Breath, the abstract ciphertext are obtained according to the first summary info of mobile unit private key encryption, and first summary info passes through default Encryption Algorithm to the mobile unit public key and the mobile unit mark encryption obtain.
Step S81, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption Cipher-text information obtains the mobile unit public key, mobile unit mark and the abstract ciphertext, and according to described vehicle-mounted Abstract ciphertext described in equipment public key decryptions obtains first summary info, by preset Encryption Algorithm to the mobile unit Public key and mobile unit mark encryption obtain the second summary info, and in second summary info and first abstract When information is consistent, determine that the mobile unit is verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has There is the wireless charging device of charging permission.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add Cipher-text information after close is sent to verifying end.
The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit mark of mobile unit.It is described to pluck Wanting ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, first summary info Mobile unit mark encryption is obtained by preset Encryption Algorithm for mobile unit, the predetermined encryption algorithm is that hash is calculated Method, first summary info is that mobile unit is identified the hashed value for carrying out hash operations and being calculated by mobile unit, described Hash operations can be HASH256 operation.
Verifying end utilizes this when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent The corresponding private key of public key decrypts cipher-text information, and abstract ciphertext, the vehicle of mobile unit are extracted from the cipher-text information after decryption Carry device identification and mobile unit public key.
Verifying end is made a summary after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions Ciphertext, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore be can be used vehicle-mounted Equipment public key decryptions).
Verifying end carries out hash operations according to the combinations of values of mobile unit mark and mobile unit public key and is calculated the Two summary infos, and the first summary info obtained after the second summary info being calculated and decryption abstract ciphertext is compared It is right, when second summary info is consistent with first summary info, then determine that the mobile unit is verified, i.e., should Mobile unit is legal;In second summary info and inconsistent first summary info, then the mobile unit is determined Verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit Standby public key calculates as one of hash factor and generates summary info, and the difficulty of hash operations is cracked by increasing illegality equipment, into One step improves the safety to mobile unit certification.Also, since different vehicle-mounted set can be generated in different mobile units Standby public key-mobile unit private key pair, using the mobile unit public key of mobile unit as one of hash factor, than verifying end and vehicle It is higher as the solution security of one of the hash factor using the fixed numbers made an appointment to carry equipment, is less prone to non- Method user passes through verifying.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission, And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested Card does not pass through.
In this way, further improving the safety to mobile unit certification.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission Electric equipment carries out wireless charging.
In addition, the present invention also proposes a kind of server, the server includes memory, processor and is stored in memory The proving program of mobile unit that is upper and can running on a processor, the processor execute the proving program of the mobile unit The step of verification method of mobile unit Shi Shixian as described above in Example.
In addition, the present invention also proposes a kind of wireless charging device, the wireless charging device include memory, processor and On a memory and the proving program of mobile unit that can run on a processor, the processor execution is described vehicle-mounted to be set for storage The step of realizing the verification method of mobile unit as described above in Example when standby proving program.
In addition, the present invention also proposes that a kind of mobile unit, the mobile unit include memory, processor and be stored in On reservoir and the proving program of mobile unit that can run on a processor, the processor execute the verifying of the mobile unit The step of verification method of mobile unit as described above in Example is realized when program.
In addition, the present invention also proposes that a kind of computer readable storage medium, the computer readable storage medium include vehicle The proving program of equipment is carried, the proving program of the mobile unit realizes vehicle as described above in Example when being executed by processor The step of carrying the verification method of equipment.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be TV Machine, mobile phone, computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (11)

1. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to the public key encryption mobile unit public key, mobile unit Mark and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, First summary info obtains mobile unit mark encryption by preset Encryption Algorithm;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, obtains institute State mobile unit mark, the mobile unit public key and the abstract ciphertext;
The abstract ciphertext according to the mobile unit public key decryptions obtains first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, determine that the mobile unit is verified.
2. the verification method of mobile unit as described in claim 1, which is characterized in that described to pass through preset Encryption Algorithm pair The mobile unit mark encrypts the step of obtaining the second summary info and includes:
The second abstract letter is obtained to the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm Breath, wherein the mobile unit adds the mobile unit public key and mobile unit mark by preset Encryption Algorithm It is close to obtain first summary info.
3. the verification method of mobile unit as claimed in claim 1 or 2, which is characterized in that described in the second abstract letter When ceasing consistent with first summary info, determine that the step of mobile unit is verified includes:
When second summary info is consistent with first summary info, generates random code and calculate dissipating for the random code Train value is as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates the second hash according to the random code Value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, determine that the mobile unit is verified.
4. the verification method of mobile unit as described in claim 1, which is characterized in that the verification method of the mobile unit is also Include:
When determining that the mobile unit is verified, control wireless charging device carries out the corresponding vehicle of the mobile unit Charging.
5. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Mobile unit receives the public key that verifying end is sent;
Cipher-text information, the abstract are obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext Ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info passes through preset Encryption Algorithm pair The mobile unit mark encryption obtains;
The cipher-text information is sent to the verifying end, the cipher-text information is decrypted using private key for the verifying end and obtains The mobile unit public key, mobile unit mark and the abstract ciphertext, and according to the mobile unit public key decryptions The abstract ciphertext obtains first summary info, is obtained by preset Encryption Algorithm to mobile unit mark encryption Second summary info, and when second summary info is consistent with first summary info, determine that the mobile unit is tested Card passes through.
6. the verification method of mobile unit as claimed in claim 5, which is characterized in that described vehicle-mounted according to the public key encryption Equipment public key, mobile unit mark and abstract ciphertext the step of obtaining cipher-text information include:
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext;
Wherein, the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info is logical It crosses preset Encryption Algorithm to obtain the mobile unit public key and mobile unit mark encryption, and in the verifying end benefit When obtaining the mobile unit public key, mobile unit mark and the abstract ciphertext with the private key decryption cipher-text information, Verifying end ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info, and by default Encryption Algorithm to the mobile unit public key and the mobile unit mark encryption obtain the second summary info.
7. such as the verification method of mobile unit described in claim 5 or 6, which is characterized in that the authentication of the mobile unit Method further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hashed value, institute Verifying end is stated when second summary info is consistent with first summary info, generates the random code and will be described random Code is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to then determine described vehicle-mounted when second hashed value is consistent with the first hashed value Device authentication passes through, and first hashed value is that the verifying end is calculated according to the random code.
8. a kind of server, which is characterized in that the server is associated with wireless charging device, and the server includes storage Device, processor and the proving program for being stored in the mobile unit that can be run on the memory and on the processor, it is described The proving program of mobile unit realizes mobile unit according to any one of claims 1 to 4 when being executed by the processor Verification method the step of.
9. a kind of wireless charging device, which is characterized in that the wireless charging device includes memory, processor and is stored in institute State the proving program for the mobile unit that can be run on memory and on the processor, the proving program quilt of the mobile unit The step of processor realizes the verification method of mobile unit according to any one of claims 1 to 4 when executing.
10. a kind of mobile unit, which is characterized in that the mobile unit includes memory, processor and is stored in the storage On device and the proving program of mobile unit that can run on the processor, the proving program of the mobile unit is by the place The step of managing the verification method that the mobile unit as described in any one of claim 5 to 7 is realized when device executes.
11. a kind of computer readable storage medium, which is characterized in that be stored with vehicle-mounted set on the computer readable storage medium It realizes when the proving program of standby proving program, the mobile unit is executed by processor such as any one of claims 1 to 7 institute The step of verification method for the mobile unit stated.
CN201910359819.XA 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit Pending CN110113745A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910359819.XA CN110113745A (en) 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910359819.XA CN110113745A (en) 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit

Publications (1)

Publication Number Publication Date
CN110113745A true CN110113745A (en) 2019-08-09

Family

ID=67487787

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910359819.XA Pending CN110113745A (en) 2019-04-29 2019-04-29 Verification method, server, mobile unit and the storage medium of mobile unit

Country Status (1)

Country Link
CN (1) CN110113745A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572418A (en) * 2019-10-25 2019-12-13 国机智骏科技有限公司 Vehicle identity authentication method and device, computer equipment and storage medium
CN110691098A (en) * 2019-10-29 2020-01-14 北京龙德时代技术服务有限公司 Civil explosion information multiple encryption communication method
CN111586680A (en) * 2020-05-15 2020-08-25 中国南方电网有限责任公司 Power grid end-to-end communication encryption system and method, communication equipment and storage medium
WO2021143178A1 (en) * 2020-01-14 2021-07-22 华为技术有限公司 Vehicle-mounted sensor authentication method, apparatus, and system
CN113158261A (en) * 2021-04-28 2021-07-23 武汉嘟嘟有位科技有限公司 Method and device for programming equipment codes in batch and computer equipment
CN113347613A (en) * 2021-04-15 2021-09-03 奇瑞商用车(安徽)有限公司 Safe communication method and system based on Bluetooth digital key
CN114374519A (en) * 2021-12-09 2022-04-19 深圳太极数智技术有限公司 Data transmission method, system and equipment
CN115001864A (en) * 2022-07-27 2022-09-02 深圳市西昊智能家具有限公司 Communication authentication method and device for intelligent furniture, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302379A (en) * 2015-06-26 2017-01-04 比亚迪股份有限公司 The authentication method of vehicle mounted electrical apparatus, system and its apparatus
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
CN106713237A (en) * 2015-11-16 2017-05-24 厦门雅迅网络股份有限公司 Encryption method of vehicle-mounted terminal and center platform communication
CN108599961A (en) * 2018-05-08 2018-09-28 济南浪潮高新科技投资发展有限公司 A kind of communication means, car-mounted terminal, automobile services platform and system
CN109495498A (en) * 2018-12-12 2019-03-19 北京车联天下信息技术有限公司 The ca authentication method, apparatus and car networking information management system of vehicle arrangement

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302379A (en) * 2015-06-26 2017-01-04 比亚迪股份有限公司 The authentication method of vehicle mounted electrical apparatus, system and its apparatus
CN106713237A (en) * 2015-11-16 2017-05-24 厦门雅迅网络股份有限公司 Encryption method of vehicle-mounted terminal and center platform communication
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
CN108599961A (en) * 2018-05-08 2018-09-28 济南浪潮高新科技投资发展有限公司 A kind of communication means, car-mounted terminal, automobile services platform and system
CN109495498A (en) * 2018-12-12 2019-03-19 北京车联天下信息技术有限公司 The ca authentication method, apparatus and car networking information management system of vehicle arrangement

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572418A (en) * 2019-10-25 2019-12-13 国机智骏科技有限公司 Vehicle identity authentication method and device, computer equipment and storage medium
CN110572418B (en) * 2019-10-25 2022-08-19 国机智骏汽车有限公司 Vehicle identity authentication method and device, computer equipment and storage medium
CN110691098A (en) * 2019-10-29 2020-01-14 北京龙德时代技术服务有限公司 Civil explosion information multiple encryption communication method
WO2021143178A1 (en) * 2020-01-14 2021-07-22 华为技术有限公司 Vehicle-mounted sensor authentication method, apparatus, and system
CN111586680A (en) * 2020-05-15 2020-08-25 中国南方电网有限责任公司 Power grid end-to-end communication encryption system and method, communication equipment and storage medium
CN113347613A (en) * 2021-04-15 2021-09-03 奇瑞商用车(安徽)有限公司 Safe communication method and system based on Bluetooth digital key
CN113347613B (en) * 2021-04-15 2024-01-30 奇瑞商用车(安徽)有限公司 Bluetooth digital key-based secure communication method and system
CN113158261A (en) * 2021-04-28 2021-07-23 武汉嘟嘟有位科技有限公司 Method and device for programming equipment codes in batch and computer equipment
CN113158261B (en) * 2021-04-28 2022-12-06 武汉嘟嘟有位科技有限公司 Method and device for programming equipment codes in batch and computer equipment
CN114374519A (en) * 2021-12-09 2022-04-19 深圳太极数智技术有限公司 Data transmission method, system and equipment
CN115001864A (en) * 2022-07-27 2022-09-02 深圳市西昊智能家具有限公司 Communication authentication method and device for intelligent furniture, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110113745A (en) Verification method, server, mobile unit and the storage medium of mobile unit
CN110061849A (en) Verification method, server, mobile unit and the storage medium of mobile unit
CN109862040A (en) A kind of safety certifying method and Verification System
CN106850680B (en) Intelligent identity authentication method and device for rail transit equipment
CN108650220B (en) Method and equipment for issuing and acquiring mobile terminal certificate and automobile end chip certificate
CN110391913B (en) Vehicle binding method and device
CN107493273A (en) Identity identifying method, system and computer-readable recording medium
CN108616360B (en) User identity verification and registration method and device
CN105847247A (en) Authentication system and working method thereof
CN107277033B (en) Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced
CN108141444B (en) Improved authentication method and authentication device
JP2012530311A5 (en)
CN107733636B (en) Authentication method and authentication system
CN109245885A (en) Cryptographic key negotiation method, equipment, storage medium and system
CN109492358A (en) A kind of open interface uniform authentication method
CN104660412A (en) Password-less security authentication method and system for mobile equipment
CN104935441A (en) Authentication method and relevant devices and systems
CN110020869B (en) Method, device and system for generating block chain authorization information
CN106022081A (en) Card reading method for identity-card card-reading terminal, and terminal and system for identity-card card-reading
CN104506527A (en) Multidimensional information pointer platform and data access method thereof
CN107609878B (en) Security authentication method and system for shared automobile
CN114553441A (en) Electronic contract signing method and system
CN114499999A (en) Identity authentication method, device, platform, vehicle, equipment and medium
CN106027254A (en) Secret key use method for identity card reading terminal in identity card authentication system
CN103281188B (en) A kind of back up the method and system of private key in electronic signature token

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190809