CN110113745A - Verification method, server, mobile unit and the storage medium of mobile unit - Google Patents
Verification method, server, mobile unit and the storage medium of mobile unit Download PDFInfo
- Publication number
- CN110113745A CN110113745A CN201910359819.XA CN201910359819A CN110113745A CN 110113745 A CN110113745 A CN 110113745A CN 201910359819 A CN201910359819 A CN 201910359819A CN 110113745 A CN110113745 A CN 110113745A
- Authority
- CN
- China
- Prior art keywords
- mobile unit
- public key
- summary info
- encryption
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000012795 verification Methods 0.000 title claims abstract description 44
- 238000003860 storage Methods 0.000 title claims abstract description 19
- 238000007600 charging Methods 0.000 claims abstract description 65
- 230000005540 biological transmission Effects 0.000 abstract description 12
- 238000004891 communication Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000000605 extraction Methods 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
The invention discloses a kind of verification methods of mobile unit: sending public key to mobile unit, so that mobile unit obtains cipher-text information according to public key encryption mobile unit public key, mobile unit mark and abstract ciphertext, abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and the first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;When receiving the cipher-text information of mobile unit transmission, cipher-text information is decrypted using private key, obtains mobile unit mark, mobile unit public key and abstract ciphertext;The first summary info is obtained according to mobile unit public key decryptions abstract ciphertext;The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;In the second summary info and consistent the first summary info, determine that mobile unit is verified.The invention also discloses a kind of server, wireless charging device, mobile unit and computer readable storage mediums.The present invention improves the safety to mobile unit certification.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of verification method of mobile unit, server, vehicle-mounted set
Standby, wireless charging device and computer readable storage medium.
Background technique
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging
The legitimate interests of operator need to carry out effective authentication to wireless charging mobile unit into parking lot, non-to prevent
Method Vehicular charging.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, it can effective prevention device
It distorts.But there are certain drawbacks for common digital signature identification mode: being inconvenient to update public key pair, and stores fixed public key
There is a problem of that safety is not high, even generation dynamic public key pair, but transmission is also easily by midway while ciphertext and public key
It intercepts and captures, these all threaten the safety to mobile unit certification.
Summary of the invention
The main purpose of the present invention is to provide a kind of verification method of mobile unit, server, mobile unit, wireless chargings
Electric equipment and computer readable storage medium improve the safety to mobile unit certification.
To achieve the above object, the present invention provides a kind of verification method of mobile unit, the authentication of the mobile unit
Method the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to the public key encryption mobile unit public key, vehicle-mounted
Device identification and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption
It arrives, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained
To mobile unit mark, the mobile unit public key and the abstract ciphertext;
The abstract ciphertext according to the mobile unit public key decryptions obtains first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, determine that the mobile unit is verified.
Optionally, described that second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm
Step includes:
Are obtained by second and is plucked for the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm
Want information, wherein the mobile unit is by preset Encryption Algorithm to the mobile unit public key and the mobile unit mark
Know encryption and obtains first summary info.
Optionally, described when second summary info is consistent with first summary info, determine described vehicle-mounted set
Include: for the step of being verified
When second summary info is consistent with first summary info, generates random code and calculate the random code
Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code
Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, determine that the mobile unit is verified.
Optionally, the verification method of the mobile unit further include:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit
It charges.
Optionally, the mobile unit verification method the following steps are included:
Mobile unit receives the public key that verifying end is sent;
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext, it is described
Abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info is calculated by preset encryption
Method obtains mobile unit mark encryption;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key
The mobile unit public key, mobile unit mark and the abstract ciphertext are obtained, and according to the mobile unit public key
It decrypts the abstract ciphertext and obtains first summary info, the mobile unit is identified by preset Encryption Algorithm and is encrypted
The second summary info is obtained, and when second summary info is consistent with first summary info, determines described vehicle-mounted set
It is standby to be verified.
Optionally, the ciphertext that identifies and make a summary according to the public key encryption mobile unit public key, mobile unit obtains close
The step of literary information includes:
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext;
Wherein, the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, the first abstract letter
Breath obtains the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm, and in the verifying
The cipher-text information is decrypted using private key and obtains the mobile unit public key, mobile unit mark and the abstract ciphertext in end
When, verifying end ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info, and passes through
Preset Encryption Algorithm obtains the second summary info to the mobile unit public key and mobile unit mark encryption.
Optionally, the verification method of the mobile unit further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash
Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info
It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement
Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
To achieve the above object, the present invention also provides a kind of server, the server includes:
The server includes memory, processor and is stored on the memory and can run on the processor
Mobile unit proving program, realize when the proving program of the mobile unit is executed by the processor and vehicle-mounted set as above-mentioned
The step of standby verification method.
To achieve the above object, the present invention also provides a kind of wireless charging device, the wireless charging device includes:
The wireless charging device includes memory, processor and is stored on the memory and can be in the processor
The proving program of the mobile unit of upper operation is realized when the proving program of the mobile unit is executed by the processor as above-mentioned
The step of verification method of mobile unit.
To achieve the above object, the present invention also provides a kind of mobile unit, the mobile unit includes:
The mobile unit includes memory, processor and is stored on the memory and can transport on the processor
The proving program of capable mobile unit is realized when the proving program of the mobile unit is executed by the processor as above-mentioned vehicle-mounted
The step of verification method of equipment.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storages
It is stored with the proving program of mobile unit on medium, realizes when the proving program of the mobile unit is executed by processor as above-mentioned
The step of verification method of mobile unit.
Verification method, server, wireless charging device, mobile unit and the computer of mobile unit provided by the invention
Readable storage medium storing program for executing sends public key to mobile unit, so that the mobile unit is according to first summary info of public key encryption
It identifies to obtain cipher-text information with mobile unit, first summary info is by preset Encryption Algorithm to the mobile unit mark
Know encryption to obtain;When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key,
Obtain the mobile unit mark and first summary info;Mobile unit mark is added by preset Encryption Algorithm
It is close to obtain the second summary info;When second summary info is consistent with first summary info, then determine described vehicle-mounted
Device authentication passes through.In this way, by realizing that the mobile unit identity verification to mobile unit, vehicle-mounted hashing algorithm are verified, and
The multiple-authentications such as the encryption of terminal and vehicle equipment information transmission, improve the safety to mobile unit certification.
Detailed description of the invention
Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of the verification method first embodiment of mobile unit of the present invention;
Fig. 3 is the flow diagram of the verification method second embodiment of mobile unit of the present invention;
Fig. 4 is the flow diagram of the verification method 3rd embodiment of mobile unit of the present invention;
Fig. 5 is the flow diagram of the verification method fourth embodiment of mobile unit of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of verification method of mobile unit, by realizing that the mobile unit mark to mobile unit is tested
The multiple-authentications such as the encryption of card, vehicle-mounted hashing algorithm verifying and terminal and vehicle equipment information transmission, improve and set to vehicle-mounted
The safety of standby certification.
As shown in Figure 1, Fig. 1 is the hardware running environment schematic diagram for the embodiment terminal that the embodiment of the present invention is related to;
The terminal of that embodiment of the invention can be server or wireless charging device, be also possible to mobile unit.
As shown in Figure 1, the terminal may include: processor 1001, such as cpu central processing unit (central
Processing unit), memory 1002, communication bus 1003.Wherein, communication bus 1003 is for realizing each in the terminal
Connection communication between building block.Memory 1002 can be high-speed RAM random access memory (random-access
Memory), it is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1002 can
The storage device that can also be independently of aforementioned processor 1001 of choosing.
It will be understood by those skilled in the art that the structure of terminal shown in Fig. 1 was not constituted to end of the embodiment of the present invention
The restriction at end may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
As shown in Figure 1, as the verifying that in a kind of memory 1002 of computer storage medium may include mobile unit
Program.
In terminal shown in Fig. 1, processor 1001 can be used for calling the mobile unit stored in memory 1002
Proving program, and execute following operation:
Public key is sent to mobile unit, so that the mobile unit is according to the public key encryption mobile unit public key, vehicle-mounted
Device identification and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption
It arrives, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, is obtained
To mobile unit mark, the mobile unit public key and the abstract ciphertext;
The abstract ciphertext according to the mobile unit public key decryptions obtains first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, determine that the mobile unit is verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
Are obtained by second and is plucked for the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm
Want information, wherein the mobile unit is by preset Encryption Algorithm to the mobile unit public key and the mobile unit mark
Know encryption and obtains first summary info.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
When second summary info is consistent with first summary info, generates random code and calculate the random code
Hashed value as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates second according to the random code
Hashed value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, determine that the mobile unit is verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
When determining that the mobile unit is verified, wireless charging device is controlled to the corresponding vehicle of the mobile unit
It charges.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
Mobile unit receives the public key that verifying end is sent;
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext, it is described
Abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info is calculated by preset encryption
Method obtains mobile unit mark encryption;
The cipher-text information is sent to the verifying end, so that the verifying end decrypts the cipher-text information using private key
The mobile unit public key, mobile unit mark and the abstract ciphertext are obtained, and according to the mobile unit public key
It decrypts the abstract ciphertext and obtains first summary info, the mobile unit is identified by preset Encryption Algorithm and is encrypted
The second summary info is obtained, and when second summary info is consistent with first summary info, determines described vehicle-mounted set
It is standby to be verified.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext;
Wherein, the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, the first abstract letter
Breath obtains the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm, and in the verifying
The cipher-text information is decrypted using private key and obtains the mobile unit public key, mobile unit mark and the abstract ciphertext in end
When, verifying end ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info, and passes through
Preset Encryption Algorithm obtains the second summary info to the mobile unit public key and mobile unit mark encryption.
Further, processor 1001 can call the proving program of the mobile unit stored in memory 1002, also hold
The following operation of row:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hash
Value, the verifying end generate the random code and by institute when second summary info is consistent with first summary info
It states random code and is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to when second hashed value is consistent with the first hashed value, then described in judgement
Mobile unit is verified, and first hashed value is that the verifying end is calculated according to the random code.
Referring to Fig. 2, in one embodiment, the verification method of the mobile unit includes:
Step S10, public key is sent to mobile unit, so that the mobile unit is public according to the public key encryption mobile unit
Key, mobile unit mark and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is plucked according to mobile unit private key encryption first
Information is wanted to obtain, first summary info obtains mobile unit mark encryption by preset Encryption Algorithm.
Under electric car wireless charging application environment, parking lot is standardization electric car charging business, maintenance charging
The legitimate interests of operator need to carry out effective authentication to the vehicle to wireless charging for entering parking lot to prevent illegal vehicle
Charging.General verifying end is the legitimacy of the digital certificates sent by the mobile unit in verifying vehicle, judges vehicle-mounted set
Whether standby corresponding vehicle has wireless charging permission.
Generally, it can be divided into three classes according to verifying end whether there is or not configuration cloud network management and Third Party Authentication center CA system
Mobile unit verifies scene system, and one kind is not configure cloud network management and Third Party Authentication center CA service system, vehicle-mounted to set
It is standby to need to complete certification in local proxy server system;Second class is configured with cloud network management and recognizes without configuring third party
Center CA server system is demonstrate,proved, mobile unit needs to complete certification in NM server system beyond the clouds;Third class is configured with
Cloud network management and Third Party Authentication center CA, mobile unit needs are completed to recognize in Third Party Authentication center CA server system
Card.These three scene systems are similar for the cryptographic authentication process of automobile wireless charging onboard system.Electric car without
In line charge electric system, vehicle to be charged can regard user as, verifying end mainly authenticate to wireless charging mobile unit whether
It is legal, i.e., it whether is to arrange standard charging equipment that manufacturer provides and operator's authorization.
Mobile unit and the direct interactive authentication of server are realized by digital signature identification technology, can effectively be taken precautions against and be set
It is standby to distort.Other authentication modes such as bio-identification, USBkey etc., can not effectively prevention device be tampered.Common number label
There are certain drawbacks for name authentication mode: being inconvenient to update key pair, and stores fixed key and safety is reduced;Or
Dynamic key pair is generated, but ciphertext is easily intercepted and captured halfway with public key simultaneous transmission, and loses the meaning of encryption.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile
Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses
Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit
Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted
Cipher-text information is sent to terminal.The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit of mobile unit
Mark.
The abstract ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, institute
Stating the first summary info is that mobile unit obtains mobile unit mark encryption by preset Encryption Algorithm, the predetermined encryption
Algorithm is hashing algorithm, and first summary info is that mobile unit mark progress hash operations are calculated mobile unit
Hashed value, the hash operations can be HASH256 operation.
Mobile unit can be in the public key for receiving terminal, according to the public key encryption mobile unit public key, vehicle-mounted
Device identification and abstract ciphertext obtain cipher-text information;It is also possible to combine mobile unit public key, mobile unit mark in advance and plucks
It wants ciphertext to obtain the cipher-text information of unencryption, and in the public key for receiving terminal, uses the public key encryption cipher-text information.
Optionally, mobile unit has ATECC108 chip, and mobile unit can be private by mobile unit public key, mobile unit
The write-in ATECC108 chip such as key, mobile unit mark, the cipher-text information of unencryption, the first summary info, abstract ciphertext carries out
It saves.
Step S20, when receiving the cipher-text information that the mobile unit is sent, the ciphertext is decrypted using private key
Information obtains the mobile unit mark, the mobile unit public key and the abstract ciphertext.
Terminal utilizes the public key when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission
Corresponding private key decrypts cipher-text information, and extracts from the cipher-text information after decryption the mobile unit public key of mobile unit, plucks
Ciphertext and mobile unit is wanted to identify.
Optionally, terminal can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit mark
Know.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate that the mobile unit is
Illegality equipment, which, which is identified as, hits code, and terminal directly determines that mobile unit verifying does not pass through.
Step S30, ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info.
Terminal is made a summary close after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions
Text, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore vehicle-mounted set can be used
Standby public key decryptions).
If terminal can not decrypt abstract ciphertext using the mobile unit public key, illustrating that the abstract ciphertext is not is using the vehicle
The corresponding mobile unit private key encryption of equipment public key is carried, which is that illegality equipment is generated and sent, and at this moment, is determined
The corresponding mobile unit verifying of the abstract ciphertext does not pass through.
Step S40, the second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm.
Step S50, when second summary info is consistent with first summary info, determine that the mobile unit is tested
Card passes through.
When terminal obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract letter is calculated
Breath, and the first summary info obtained after the second summary info being calculated and decryption abstract ciphertext is compared, in institute
State the second summary info it is consistent with first summary info when, then determine that the mobile unit is verified, i.e., this vehicle-mounted sets
It is standby legal;In second summary info and inconsistent first summary info, then the mobile unit verifying is determined not
Pass through.It should be noted that hashing algorithm used by legal mobile unit is identical as terminal, i.e., terminal with it is legal vehicle-mounted
Equipment uses same set of preset Encryption Algorithm.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is terminal
It is generated according to mobile unit mark, and summary info is both generated using identical mobile unit mark, therefore, if terminal
The second summary info and the first summary info generated is inconsistent, illustrates hashing algorithm used by the mobile unit and terminal not
Together and/or the mobile unit of the mobile unit is identified as pseudo-code.
In this way, by realize to the mobile unit identity verification of mobile unit, vehicle-mounted hashing algorithm verifying and terminal with
The multiple-authentications such as the encryption of vehicle equipment information transmission improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks
The case where public-private key pair of terminal, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead in terminal authentication vehicle
It carries after device identification, the first summary info pass through, the case where mobile unit that can still have current authentication is illegality equipment.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter
When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually
End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with
Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit.
Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will
Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted
Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined
Do not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately
The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judge whether to adopt with verifying terminal
With same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with verifying terminal, when intercepting and capturing
The cipher-text information of legitimate device can still pass through the problem of one-time authentication, further improve the safety to mobile unit certification
Property.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified
The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle
Carry out wireless charging safety, prevent illegal vehicle to charge.
In a second embodiment, as shown in figure 3, on the basis of above-mentioned embodiment shown in Fig. 2, the mobile unit is tested
Card method further include:
Step S11, public key is sent to mobile unit, so that the mobile unit is public according to the public key encryption mobile unit
Key, mobile unit mark and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is plucked according to mobile unit private key encryption first
Information is wanted to obtain, first summary info is by preset Encryption Algorithm to the mobile unit public key and the mobile unit
Mark encryption obtains.
Step S41, the mobile unit public key and mobile unit mark are encrypted by preset Encryption Algorithm
To the second summary info.
In the present embodiment, embodiment terminal can be server, be also possible to that wireless charging can be carried out to new-energy automobile
Wireless charging device.When embodiment terminal is server, server can pass through network communication and wireless charging device connection.
Terminal generates the public key and private key of terminal using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit uses
Another set of elliptic curve encryption algorithm (ECC algorithm) generates mobile unit public key and mobile unit private key.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, terminal sends the public affairs of terminal to mobile unit
Key.Mobile unit is after receiving the public key of terminal, using the cipher-text information of the public key encryption mobile unit, and will be encrypted
Cipher-text information is sent to terminal.The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit of mobile unit
Mark.
The abstract ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, institute
Stating the first summary info is the numerical value that mobile unit identifies mobile unit public key and mobile unit by preset Encryption Algorithm
Combination is encrypted to obtain, and the preset Encryption Algorithm is hashing algorithm, i.e., first information abstract is that mobile unit is based on vehicle
The combinations of values for carrying device identification and mobile unit key composition carries out the hashed value that hash operations are calculated, wherein described
Hash operations can be HASH256 operation.
Terminal utilizes the public key when receiving the cipher-text information after the public key encryption of using terminal of mobile unit transmission
Corresponding private key decrypts cipher-text information, and extracts from the cipher-text information after decryption the mobile unit public key of mobile unit, plucks
Ciphertext and mobile unit is wanted to identify.
Terminal is made a summary close after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions
Text, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore vehicle-mounted set can be used
Standby public key decryptions).If terminal can not decrypt abstract ciphertext using the mobile unit public key, illustrate the abstract ciphertext not and be using
The corresponding mobile unit private key encryption of the mobile unit public key, which is that illegality equipment is generated and sent, at this moment,
Determine that the corresponding mobile unit verifying of the abstract ciphertext does not pass through.
Terminal is public according to mobile unit mark and mobile unit after mobile unit public key and the mobile unit mark of extraction
The combinations of values of key carries out hash operations and is calculated the second summary info, and by the second summary info being calculated and decryption
The first summary info obtained after abstract ciphertext is compared, consistent with first summary info in second summary info
When, then determine that the mobile unit is verified, i.e., the mobile unit is legal;It is plucked in second summary info and described first
When wanting information inconsistent, then determine that the mobile unit verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit
Standby public key calculates as one of hash factor and generates summary info, and the difficulty of hash operations is cracked by increasing illegality equipment, into
One step improves the safety to mobile unit certification.Also, since different vehicle-mounted set can be generated in different mobile units
Standby public key-mobile unit private key pair, using the mobile unit public key of mobile unit as one of hash factor, than terminal with it is vehicle-mounted
Equipment is higher as the solution security of one of the hash factor using the fixed numbers made an appointment, and is less prone to illegal
User passes through verifying.
Optionally, terminal obtains the second summary info, and is verifying second summary info and the first abstract letter
When ceasing consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that eventually
End has random code generating mechanism, can generate at random immediately one include multidigit English alphabet and/or Arabic numerals with
Machine character string.
Random code can be sent to the mobile unit currently verified by terminal, to carry out secondary verifying to mobile unit.
Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving terminal transmission, and will
Second hashed value is sent to terminal.
Terminal calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
To the first hashed value be compared, when second hashed value is consistent with first hashed value, then determine described vehicle-mounted
Device authentication passes through;In second hashed value and inconsistent first hashed value, then the mobile unit verifying is determined
Do not pass through.
In this way, further improving the safety to mobile unit certification.
Terminal can authorize the corresponding vehicle of the mobile unit with wireless charging when determining that the mobile unit is verified
The permission of electricity, and control wireless charging device and charge to the corresponding vehicle of the mobile unit.In this way, can be improved to vehicle
Carry out wireless charging safety, prevent illegal vehicle to charge.
In the third embodiment, as shown in figure 4, the verification method of the mobile unit includes:
Step S60, mobile unit receives the public key that verifying end is sent.
Step S70, it is identified according to the public key encryption mobile unit public key, mobile unit and abstract ciphertext obtains ciphertext letter
Breath, the abstract ciphertext are obtained according to the first summary info of mobile unit private key encryption, and first summary info passes through default
Encryption Algorithm to the mobile unit mark encryption obtain.
Step S80, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption
Cipher-text information obtains the mobile unit public key, mobile unit mark and the abstract ciphertext, and according to described vehicle-mounted
Abstract ciphertext described in equipment public key decryptions obtains first summary info, by preset Encryption Algorithm to the mobile unit
Mark encryption obtains the second summary info, and when second summary info is consistent with first summary info, determines institute
Mobile unit is stated to be verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit
Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has
There is the wireless charging device of charging permission.
Verifying end generates the public key and private key of verifying end using a set of elliptic curve encryption algorithm (ECC algorithm);Mobile unit
Mobile unit public key and mobile unit private key are generated using another set of elliptic curve encryption algorithm (ECC algorithm).
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit
Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add
Cipher-text information after close is sent to verifying end.
The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit mark of mobile unit.It is described to pluck
Wanting ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, first summary info
Mobile unit mark encryption is obtained by preset Encryption Algorithm for mobile unit, the predetermined encryption algorithm is that hash is calculated
Method, first summary info is that mobile unit is identified the hashed value for carrying out hash operations and being calculated by mobile unit, described
Hash operations can be HASH256 operation.
Mobile unit can be in the public key for receiving verifying end, according to the public key encryption mobile unit public key, vehicle
It carries device identification and abstract ciphertext obtains cipher-text information;Be also possible to combine in advance mobile unit public key, mobile unit mark and
Abstract ciphertext obtains the cipher-text information of unencryption, and in the public key for receiving verifying end, uses the public key encryption cipher-text information.
Verifying end utilizes this when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent
The corresponding private key of public key decrypts cipher-text information, and the mobile unit public affairs of mobile unit are extracted from the cipher-text information after decryption
Key, abstract ciphertext and mobile unit mark.
Optionally, verifying end can be inquired first in database when obtaining mobile unit mark with the presence or absence of the mobile unit
Mark.When inquired in the database less than corresponding mobile unit mark is identified with the mobile unit, then illustrate the mobile unit
For illegality equipment, which, which is identified as, hits code, and verifying end directly determines that mobile unit verifying does not pass through.
Verifying end is made a summary after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions
Ciphertext, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore be can be used vehicle-mounted
Equipment public key decryptions).
If verifying end can not decrypt abstract ciphertext using the mobile unit public key, illustrating that the abstract ciphertext is not is to use this
The corresponding mobile unit private key encryption of mobile unit public key, which is that illegality equipment is generated and sent, and at this moment, is sentenced
Determine the corresponding mobile unit verifying of the abstract ciphertext not pass through.
When verifying end obtains mobile unit mark, mobile unit is identified into progress hash operations, the second abstract is calculated
Information, and the first summary info obtained after the second summary info being calculated and decryption abstract ciphertext is compared,
When second summary info is consistent with first summary info, then determine that the mobile unit is verified, i.e., this is vehicle-mounted
Equipment is legal;In second summary info and inconsistent first summary info, then the mobile unit verifying is determined
Do not pass through.It should be noted that hashing algorithm used by legal mobile unit is identical as verifying end.
Since the first summary info is mobile unit according to mobile unit mark generation, and the second summary info is verifying
End is generated according to mobile unit mark, and both generates summary info using identical mobile unit mark, therefore, if testing
The second summary info and the first summary info for demonstrate,proving end generation are inconsistent, illustrate hashing algorithm used by the mobile unit and test
The mobile unit of card end difference and/or the mobile unit is identified as pseudo-code.
In this way, by realizing the mobile unit identity verification to mobile unit, vehicle-mounted hashing algorithm verifying and verifying end
The multiple-authentications such as the encryption transmitted with vehicle equipment information improve the safety to mobile unit certification.
Wireless charging device is repeatedly connected in mobile unit, and after sending cipher-text information, in fact it could happen that illegal user cracks
The case where public-private key pair of verifying end, intercepting and capturing obtain the cipher-text information of legal mobile unit, this will lead to test in verifying end
After card mobile unit mark, the first summary info pass through, the mobile unit that can still have current authentication is the feelings of illegality equipment
Condition.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract
When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that
Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals
Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit
Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission,
And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle
Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested
Card does not pass through.
In this way, generating random code pair by the mobile unit after one random code of generation passes through for one-time authentication at random immediately
The hashed value answered, and verified, real-time verification can be carried out to the hashing algorithm of mobile unit, judged whether and authentication end
Using same set of hashing algorithm, even if solve illegality equipment and do not have hashing algorithm identical with authentication end, when cutting
The problem of one-time authentication can still be passed through by having obtained the cipher-text information of legitimate device further improves to mobile unit certification
Safety.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end
The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission
Electric equipment carries out wireless charging.
In the fourth embodiment, as shown in figure 5, on the basis of the embodiment of above-mentioned Fig. 4, the authentication of the mobile unit
Method further include:
Step S71, it is identified according to the public key encryption mobile unit public key, mobile unit and abstract ciphertext obtains ciphertext letter
Breath, the abstract ciphertext are obtained according to the first summary info of mobile unit private key encryption, and first summary info passes through default
Encryption Algorithm to the mobile unit public key and the mobile unit mark encryption obtain.
Step S81, the cipher-text information is sent to the verifying end, so that the verifying end is using described in private key decryption
Cipher-text information obtains the mobile unit public key, mobile unit mark and the abstract ciphertext, and according to described vehicle-mounted
Abstract ciphertext described in equipment public key decryptions obtains first summary info, by preset Encryption Algorithm to the mobile unit
Public key and mobile unit mark encryption obtain the second summary info, and in second summary info and first abstract
When information is consistent, determine that the mobile unit is verified.
In the present embodiment, embodiment terminal can be mobile unit.Verifying end can be the corresponding vehicle of verifying mobile unit
Whether the server of the charging permission with wireless charging device, be also possible to whether the corresponding vehicle of verifying mobile unit has
There is the wireless charging device of charging permission.
Optionally, after vehicle to be charged enters parking stall, the mobile unit of vehicle to be charged can be corresponding with the parking stall
Wireless charging device establishes network connection.After mobile unit is successfully joined network, verifying end sends verifying end to mobile unit
Public key.Mobile unit is after receiving the public key of verifying end, using the cipher-text information of the public key encryption mobile unit, and will add
Cipher-text information after close is sent to verifying end.
The cipher-text information includes mobile unit public key, abstract ciphertext and the mobile unit mark of mobile unit.It is described to pluck
Wanting ciphertext is that mobile unit is obtained according to the first summary info of mobile unit private key encryption.Optionally, first summary info
Mobile unit mark encryption is obtained by preset Encryption Algorithm for mobile unit, the predetermined encryption algorithm is that hash is calculated
Method, first summary info is that mobile unit is identified the hashed value for carrying out hash operations and being calculated by mobile unit, described
Hash operations can be HASH256 operation.
Verifying end utilizes this when receiving the cipher-text information after the public key encryption using verifying end that mobile unit is sent
The corresponding private key of public key decrypts cipher-text information, and abstract ciphertext, the vehicle of mobile unit are extracted from the cipher-text information after decryption
Carry device identification and mobile unit public key.
Verifying end is made a summary after extraction obtains mobile unit public key and abstract ciphertext using the mobile unit public key decryptions
Ciphertext, obtaining the first summary info, (the abstract ciphertext is mobile unit using mobile unit private key encryption, therefore be can be used vehicle-mounted
Equipment public key decryptions).
Verifying end carries out hash operations according to the combinations of values of mobile unit mark and mobile unit public key and is calculated the
Two summary infos, and the first summary info obtained after the second summary info being calculated and decryption abstract ciphertext is compared
It is right, when second summary info is consistent with first summary info, then determine that the mobile unit is verified, i.e., should
Mobile unit is legal;In second summary info and inconsistent first summary info, then the mobile unit is determined
Verifying does not pass through.
Since the factor of hash operations is more complicated, hash operations are more difficult to crack, in this way, by setting the vehicle-mounted of mobile unit
Standby public key calculates as one of hash factor and generates summary info, and the difficulty of hash operations is cracked by increasing illegality equipment, into
One step improves the safety to mobile unit certification.Also, since different vehicle-mounted set can be generated in different mobile units
Standby public key-mobile unit private key pair, using the mobile unit public key of mobile unit as one of hash factor, than verifying end and vehicle
It is higher as the solution security of one of the hash factor using the fixed numbers made an appointment to carry equipment, is less prone to non-
Method user passes through verifying.
Optionally, verifying end obtains the second summary info, and is verifying second summary info and first abstract
When information is consistent, random code is generated, and hash operations are carried out according to the random code and obtain the first hashed value.It should be noted that
Verifying end has random code generating mechanism, and can generate one at random immediately includes multidigit English alphabet and/or Arabic numerals
Random string.
Random code can be sent to the mobile unit currently verified by verifying end, to carry out secondary test to mobile unit
Card.Mobile unit carries out hash operation to the random code and obtains the second hashed value after the random code for receiving verifying end transmission,
And the second hashed value is sent to verifying end.
Verifying end calculates the second hashed value and local terminal when receiving second hashed value that the mobile unit is sent
The first obtained hashed value is compared, and when second hashed value is consistent with first hashed value, then determines the vehicle
Device authentication is carried to pass through;In second hashed value and inconsistent first hashed value, then determine that the mobile unit is tested
Card does not pass through.
In this way, further improving the safety to mobile unit certification.
When determining that the mobile unit is verified, can authorize the corresponding vehicle of the mobile unit has wirelessly verifying end
The permission of charging, mobile unit can notify vehicle to carry out passing through wireless charging after the confirmation message for obtaining wireless charging permission
Electric equipment carries out wireless charging.
In addition, the present invention also proposes a kind of server, the server includes memory, processor and is stored in memory
The proving program of mobile unit that is upper and can running on a processor, the processor execute the proving program of the mobile unit
The step of verification method of mobile unit Shi Shixian as described above in Example.
In addition, the present invention also proposes a kind of wireless charging device, the wireless charging device include memory, processor and
On a memory and the proving program of mobile unit that can run on a processor, the processor execution is described vehicle-mounted to be set for storage
The step of realizing the verification method of mobile unit as described above in Example when standby proving program.
In addition, the present invention also proposes that a kind of mobile unit, the mobile unit include memory, processor and be stored in
On reservoir and the proving program of mobile unit that can run on a processor, the processor execute the verifying of the mobile unit
The step of verification method of mobile unit as described above in Example is realized when program.
In addition, the present invention also proposes that a kind of computer readable storage medium, the computer readable storage medium include vehicle
The proving program of equipment is carried, the proving program of the mobile unit realizes vehicle as described above in Example when being executed by processor
The step of carrying the verification method of equipment.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be TV
Machine, mobile phone, computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (11)
1. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Public key is sent to mobile unit, so that the mobile unit is according to the public key encryption mobile unit public key, mobile unit
Mark and abstract ciphertext obtain cipher-text information, and the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption,
First summary info obtains mobile unit mark encryption by preset Encryption Algorithm;
When receiving the cipher-text information that the mobile unit is sent, the cipher-text information is decrypted using private key, obtains institute
State mobile unit mark, the mobile unit public key and the abstract ciphertext;
The abstract ciphertext according to the mobile unit public key decryptions obtains first summary info;
The second summary info is obtained to mobile unit mark encryption by preset Encryption Algorithm;
When second summary info is consistent with first summary info, determine that the mobile unit is verified.
2. the verification method of mobile unit as described in claim 1, which is characterized in that described to pass through preset Encryption Algorithm pair
The mobile unit mark encrypts the step of obtaining the second summary info and includes:
The second abstract letter is obtained to the mobile unit public key and mobile unit mark encryption by preset Encryption Algorithm
Breath, wherein the mobile unit adds the mobile unit public key and mobile unit mark by preset Encryption Algorithm
It is close to obtain first summary info.
3. the verification method of mobile unit as claimed in claim 1 or 2, which is characterized in that described in the second abstract letter
When ceasing consistent with first summary info, determine that the step of mobile unit is verified includes:
When second summary info is consistent with first summary info, generates random code and calculate dissipating for the random code
Train value is as the first hashed value;
The random code is sent to the mobile unit, so that the mobile unit calculates the second hash according to the random code
Value;
Receive second hashed value that the mobile unit is sent;
When second hashed value is consistent with first hashed value, determine that the mobile unit is verified.
4. the verification method of mobile unit as described in claim 1, which is characterized in that the verification method of the mobile unit is also
Include:
When determining that the mobile unit is verified, control wireless charging device carries out the corresponding vehicle of the mobile unit
Charging.
5. a kind of verification method of mobile unit, which is characterized in that the verification method of the mobile unit the following steps are included:
Mobile unit receives the public key that verifying end is sent;
Cipher-text information, the abstract are obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext
Ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info passes through preset Encryption Algorithm pair
The mobile unit mark encryption obtains;
The cipher-text information is sent to the verifying end, the cipher-text information is decrypted using private key for the verifying end and obtains
The mobile unit public key, mobile unit mark and the abstract ciphertext, and according to the mobile unit public key decryptions
The abstract ciphertext obtains first summary info, is obtained by preset Encryption Algorithm to mobile unit mark encryption
Second summary info, and when second summary info is consistent with first summary info, determine that the mobile unit is tested
Card passes through.
6. the verification method of mobile unit as claimed in claim 5, which is characterized in that described vehicle-mounted according to the public key encryption
Equipment public key, mobile unit mark and abstract ciphertext the step of obtaining cipher-text information include:
Cipher-text information is obtained according to the public key encryption mobile unit public key, mobile unit mark and abstract ciphertext;
Wherein, the abstract ciphertext is obtained according to the first summary info of mobile unit private key encryption, and first summary info is logical
It crosses preset Encryption Algorithm to obtain the mobile unit public key and mobile unit mark encryption, and in the verifying end benefit
When obtaining the mobile unit public key, mobile unit mark and the abstract ciphertext with the private key decryption cipher-text information,
Verifying end ciphertext of making a summary according to the mobile unit public key decryptions obtains first summary info, and by default
Encryption Algorithm to the mobile unit public key and the mobile unit mark encryption obtain the second summary info.
7. such as the verification method of mobile unit described in claim 5 or 6, which is characterized in that the authentication of the mobile unit
Method further include:
When receiving the random code that the verifying end is sent, the hashed value of the random code is calculated as the second hashed value, institute
Verifying end is stated when second summary info is consistent with first summary info, generates the random code and will be described random
Code is sent to the mobile unit;
Second hashed value is sent to the verifying end;
Wherein, the verifying end is arranged to then determine described vehicle-mounted when second hashed value is consistent with the first hashed value
Device authentication passes through, and first hashed value is that the verifying end is calculated according to the random code.
8. a kind of server, which is characterized in that the server is associated with wireless charging device, and the server includes storage
Device, processor and the proving program for being stored in the mobile unit that can be run on the memory and on the processor, it is described
The proving program of mobile unit realizes mobile unit according to any one of claims 1 to 4 when being executed by the processor
Verification method the step of.
9. a kind of wireless charging device, which is characterized in that the wireless charging device includes memory, processor and is stored in institute
State the proving program for the mobile unit that can be run on memory and on the processor, the proving program quilt of the mobile unit
The step of processor realizes the verification method of mobile unit according to any one of claims 1 to 4 when executing.
10. a kind of mobile unit, which is characterized in that the mobile unit includes memory, processor and is stored in the storage
On device and the proving program of mobile unit that can run on the processor, the proving program of the mobile unit is by the place
The step of managing the verification method that the mobile unit as described in any one of claim 5 to 7 is realized when device executes.
11. a kind of computer readable storage medium, which is characterized in that be stored with vehicle-mounted set on the computer readable storage medium
It realizes when the proving program of standby proving program, the mobile unit is executed by processor such as any one of claims 1 to 7 institute
The step of verification method for the mobile unit stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910359819.XA CN110113745A (en) | 2019-04-29 | 2019-04-29 | Verification method, server, mobile unit and the storage medium of mobile unit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910359819.XA CN110113745A (en) | 2019-04-29 | 2019-04-29 | Verification method, server, mobile unit and the storage medium of mobile unit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110113745A true CN110113745A (en) | 2019-08-09 |
Family
ID=67487787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910359819.XA Pending CN110113745A (en) | 2019-04-29 | 2019-04-29 | Verification method, server, mobile unit and the storage medium of mobile unit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113745A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110572418A (en) * | 2019-10-25 | 2019-12-13 | 国机智骏科技有限公司 | Vehicle identity authentication method and device, computer equipment and storage medium |
CN110691098A (en) * | 2019-10-29 | 2020-01-14 | 北京龙德时代技术服务有限公司 | Civil explosion information multiple encryption communication method |
CN111586680A (en) * | 2020-05-15 | 2020-08-25 | 中国南方电网有限责任公司 | Power grid end-to-end communication encryption system and method, communication equipment and storage medium |
WO2021143178A1 (en) * | 2020-01-14 | 2021-07-22 | 华为技术有限公司 | Vehicle-mounted sensor authentication method, apparatus, and system |
CN113158261A (en) * | 2021-04-28 | 2021-07-23 | 武汉嘟嘟有位科技有限公司 | Method and device for programming equipment codes in batch and computer equipment |
CN113347613A (en) * | 2021-04-15 | 2021-09-03 | 奇瑞商用车(安徽)有限公司 | Safe communication method and system based on Bluetooth digital key |
CN114374519A (en) * | 2021-12-09 | 2022-04-19 | 深圳太极数智技术有限公司 | Data transmission method, system and equipment |
CN115001864A (en) * | 2022-07-27 | 2022-09-02 | 深圳市西昊智能家具有限公司 | Communication authentication method and device for intelligent furniture, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106302379A (en) * | 2015-06-26 | 2017-01-04 | 比亚迪股份有限公司 | The authentication method of vehicle mounted electrical apparatus, system and its apparatus |
CN106656481A (en) * | 2016-10-28 | 2017-05-10 | 美的智慧家居科技有限公司 | Identity authentication method, apparatus and system |
CN106713237A (en) * | 2015-11-16 | 2017-05-24 | 厦门雅迅网络股份有限公司 | Encryption method of vehicle-mounted terminal and center platform communication |
CN108599961A (en) * | 2018-05-08 | 2018-09-28 | 济南浪潮高新科技投资发展有限公司 | A kind of communication means, car-mounted terminal, automobile services platform and system |
CN109495498A (en) * | 2018-12-12 | 2019-03-19 | 北京车联天下信息技术有限公司 | The ca authentication method, apparatus and car networking information management system of vehicle arrangement |
-
2019
- 2019-04-29 CN CN201910359819.XA patent/CN110113745A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106302379A (en) * | 2015-06-26 | 2017-01-04 | 比亚迪股份有限公司 | The authentication method of vehicle mounted electrical apparatus, system and its apparatus |
CN106713237A (en) * | 2015-11-16 | 2017-05-24 | 厦门雅迅网络股份有限公司 | Encryption method of vehicle-mounted terminal and center platform communication |
CN106656481A (en) * | 2016-10-28 | 2017-05-10 | 美的智慧家居科技有限公司 | Identity authentication method, apparatus and system |
CN108599961A (en) * | 2018-05-08 | 2018-09-28 | 济南浪潮高新科技投资发展有限公司 | A kind of communication means, car-mounted terminal, automobile services platform and system |
CN109495498A (en) * | 2018-12-12 | 2019-03-19 | 北京车联天下信息技术有限公司 | The ca authentication method, apparatus and car networking information management system of vehicle arrangement |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110572418A (en) * | 2019-10-25 | 2019-12-13 | 国机智骏科技有限公司 | Vehicle identity authentication method and device, computer equipment and storage medium |
CN110572418B (en) * | 2019-10-25 | 2022-08-19 | 国机智骏汽车有限公司 | Vehicle identity authentication method and device, computer equipment and storage medium |
CN110691098A (en) * | 2019-10-29 | 2020-01-14 | 北京龙德时代技术服务有限公司 | Civil explosion information multiple encryption communication method |
WO2021143178A1 (en) * | 2020-01-14 | 2021-07-22 | 华为技术有限公司 | Vehicle-mounted sensor authentication method, apparatus, and system |
CN111586680A (en) * | 2020-05-15 | 2020-08-25 | 中国南方电网有限责任公司 | Power grid end-to-end communication encryption system and method, communication equipment and storage medium |
CN113347613A (en) * | 2021-04-15 | 2021-09-03 | 奇瑞商用车(安徽)有限公司 | Safe communication method and system based on Bluetooth digital key |
CN113347613B (en) * | 2021-04-15 | 2024-01-30 | 奇瑞商用车(安徽)有限公司 | Bluetooth digital key-based secure communication method and system |
CN113158261A (en) * | 2021-04-28 | 2021-07-23 | 武汉嘟嘟有位科技有限公司 | Method and device for programming equipment codes in batch and computer equipment |
CN113158261B (en) * | 2021-04-28 | 2022-12-06 | 武汉嘟嘟有位科技有限公司 | Method and device for programming equipment codes in batch and computer equipment |
CN114374519A (en) * | 2021-12-09 | 2022-04-19 | 深圳太极数智技术有限公司 | Data transmission method, system and equipment |
CN115001864A (en) * | 2022-07-27 | 2022-09-02 | 深圳市西昊智能家具有限公司 | Communication authentication method and device for intelligent furniture, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110113745A (en) | Verification method, server, mobile unit and the storage medium of mobile unit | |
CN110061849A (en) | Verification method, server, mobile unit and the storage medium of mobile unit | |
CN109862040A (en) | A kind of safety certifying method and Verification System | |
CN106850680B (en) | Intelligent identity authentication method and device for rail transit equipment | |
CN108650220B (en) | Method and equipment for issuing and acquiring mobile terminal certificate and automobile end chip certificate | |
CN110391913B (en) | Vehicle binding method and device | |
CN107493273A (en) | Identity identifying method, system and computer-readable recording medium | |
CN108616360B (en) | User identity verification and registration method and device | |
CN105847247A (en) | Authentication system and working method thereof | |
CN107277033B (en) | Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced | |
CN108141444B (en) | Improved authentication method and authentication device | |
JP2012530311A5 (en) | ||
CN107733636B (en) | Authentication method and authentication system | |
CN109245885A (en) | Cryptographic key negotiation method, equipment, storage medium and system | |
CN109492358A (en) | A kind of open interface uniform authentication method | |
CN104660412A (en) | Password-less security authentication method and system for mobile equipment | |
CN104935441A (en) | Authentication method and relevant devices and systems | |
CN110020869B (en) | Method, device and system for generating block chain authorization information | |
CN106022081A (en) | Card reading method for identity-card card-reading terminal, and terminal and system for identity-card card-reading | |
CN104506527A (en) | Multidimensional information pointer platform and data access method thereof | |
CN107609878B (en) | Security authentication method and system for shared automobile | |
CN114553441A (en) | Electronic contract signing method and system | |
CN114499999A (en) | Identity authentication method, device, platform, vehicle, equipment and medium | |
CN106027254A (en) | Secret key use method for identity card reading terminal in identity card authentication system | |
CN103281188B (en) | A kind of back up the method and system of private key in electronic signature token |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190809 |