CN112862994A - ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system - Google Patents

ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system Download PDF

Info

Publication number
CN112862994A
CN112862994A CN202110169080.3A CN202110169080A CN112862994A CN 112862994 A CN112862994 A CN 112862994A CN 202110169080 A CN202110169080 A CN 202110169080A CN 112862994 A CN112862994 A CN 112862994A
Authority
CN
China
Prior art keywords
authentication
vehicle
equipment
terminal
tamper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110169080.3A
Other languages
Chinese (zh)
Inventor
陈明
李长龙
李木犀
吴淼
许传斌
宁矣
刘毅
高铭霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FAW Group Corp
Original Assignee
FAW Group Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FAW Group Corp filed Critical FAW Group Corp
Priority to CN202110169080.3A priority Critical patent/CN112862994A/en
Publication of CN112862994A publication Critical patent/CN112862994A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/06Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/48Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication

Abstract

The application discloses ETC anti-dismantling authentication method, ETC, vehicle-mounted equipment terminal and system, and the method comprises the following steps: the ETC equipment sends an anti-dismantling authentication request message to the vehicle-mounted equipment terminal; the ETC equipment receives an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message; and the ETC equipment authenticates the authentication response message according to the secondary encryption algorithm. This scheme is protected ETC equipment through the method of soft preventing tearing open, avoids the user to walk around the hardware and prevents tearing open protection dismouting ETC equipment to improve the validity and the authenticity of ETC equipment, and avoid causing physical damage to ETC equipment.

Description

ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system
Technical Field
The embodiment of the application relates to the field of vehicle ETC, in particular to an ETC anti-dismantling authentication method, an ETC, a vehicle-mounted equipment terminal and a system.
Background
The Electronic Toll Collection (ETC) anti-disassembly mounted on the vehicle aims to ensure that ETC equipment on the vehicle is originally installed and is not illegally disassembled and assembled on other vehicles. In the prior art, the ETC is hard to prevent the method of tearing open is that, a prevent-tear switch is set up behind every ETC equipment, and this switch is oppressed by windshield when the vehicle is installing ETC equipment, and in case of dismantling privately, this switch can bounce automatically so to lead to ETC out of service. However, hard tamper-evident methods can destroy the tamper-evident protection by way of a blade or tape sticking to the switch.
Disclosure of Invention
The application provides an ETC prevents tearing open authentication method, ETC, mobile unit terminal and system, can protect ETC equipment through the method of soft preventing tearing open, avoids the user to walk around the hardware and prevent tearing open protection dismouting ETC equipment to improve the validity and the authenticity of ETC equipment, and avoid causing physical damage to ETC equipment.
In a first aspect, an embodiment of the present application provides an ETC anti-tamper authentication method, including:
the ETC equipment sends an anti-dismantling authentication request message to the vehicle-mounted equipment terminal;
the ETC equipment receives an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message;
and the ETC equipment authenticates the authentication response message according to the secondary encryption algorithm.
In a second aspect, an embodiment of the present application further provides an ETC tamper-proof authentication method, where the method includes:
the vehicle-mounted equipment terminal receives an anti-dismantling authentication request message sent by ETC equipment;
the vehicle-mounted equipment terminal calculates the anti-dismantling authentication request message according to a secondary encryption algorithm to generate ciphertext data;
the vehicle-mounted equipment terminal generates an authentication response message according to the ciphertext data;
and the vehicle-mounted equipment terminal sends the authentication response message to the ETC equipment for authentication.
In a third aspect, an embodiment of the present application further provides an ETC, including: the ETC anti-tamper authentication method provided by the embodiment of the application is realized when the processor executes the computer program.
In a fourth aspect, an embodiment of the present application further provides an on-board device terminal, including: the ETC anti-tamper authentication method provided by the embodiment of the application is realized when the processor executes the computer program.
In a fifth aspect, an embodiment of the present application further provides an ETC anti-tamper authentication device, where the device includes: the system comprises a sending module, a receiving module and an authentication module;
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending an anti-dismantling authentication request message to a vehicle-mounted equipment terminal;
the receiving module is used for receiving an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message;
and the authentication module is used for authenticating the authentication response message according to the secondary encryption algorithm.
In a sixth aspect, an embodiment of the present application further provides an ETC anti-tamper authentication device, where the device includes: the device comprises a receiving module, a generating module and a sending module;
the receiving module is used for receiving an anti-tamper authentication request message sent by the ETC equipment;
the generation module is used for calculating the anti-dismantling authentication request message according to a secondary encryption algorithm to generate ciphertext data and generating an authentication response message according to the ciphertext data;
and the sending module is used for sending the authentication response message to the ETC equipment for authentication.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium on which a computer program is stored, which, when executed by a processor, implements a function provided by an ETC device or a function provided by an in-vehicle device terminal as in the embodiment of the present application.
In an eighth aspect, an embodiment of the present application provides an ETC tamper-evident authentication system, including: according to the ETC equipment and the vehicle-mounted equipment terminal in the embodiment of the application, the ETC equipment is used for executing the ETC anti-dismantling authentication method provided by the embodiment of the application, and the vehicle-mounted equipment terminal is used for executing the ETC anti-dismantling authentication method provided by the embodiment of the application.
The embodiment of the application provides an ETC anti-dismantling authentication method, an ETC, a vehicle-mounted equipment terminal and a system, wherein the method comprises the following steps: the ETC equipment sends an anti-dismantling authentication request message to the vehicle-mounted equipment terminal; the ETC equipment receives an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message; and the ETC equipment authenticates the authentication response message according to the secondary encryption algorithm. This scheme is protected ETC equipment through the method of soft preventing tearing open, avoids the user to walk around the hardware and prevents tearing open protection dismouting ETC equipment to improve the validity and the authenticity of ETC equipment, and avoid causing physical damage to ETC equipment.
Drawings
Fig. 1 is a flowchart of an ETC tamper-proof authentication method in an embodiment of the present application;
fig. 2 is a flowchart of another ETC tamper-proof authentication method in an embodiment of the present application;
fig. 3 is a schematic structural diagram of an ETC tamper-proof authentication device in an embodiment of the present application;
fig. 4 is a schematic structural diagram of another ETC tamper-proof authentication device in an embodiment of the present application;
fig. 5 is a schematic structural diagram of yet another ETC tamper-proof authentication device in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal device in an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
In addition, in the embodiments of the present application, the words "optionally" or "exemplarily" are used for indicating as examples, illustrations or explanations. Any embodiment or design described herein as "optionally" or "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the words "optionally" or "exemplarily" etc. is intended to present the relevant concepts in a concrete fashion.
Fig. 1 is a flowchart of an ETC tamper-proof authentication method that may be performed by an ETC device to protect the ETC device through a soft tamper-proof method, as shown in fig. 1, where the method may include, but is not limited to, the following steps:
s101, the ETC equipment sends an anti-tamper authentication request message to the vehicle-mounted equipment terminal.
The ETC equipment in the embodiment of the application does not need to be provided with a power module, can get electricity from a vehicle provided with the ETC equipment, independently charges in the working process, and transmits charging information and the like to a vehicle-mounted equipment terminal (T-box). And after the ETC equipment is awakened from the sleep state, the ETC equipment can enter an anti-dismantling authentication process. For example, the ETC device generates a 128-bit random number, and transmits the 128-bit random number to the in-vehicle device terminal in the form of a tamper-proof authentication request message.
And S102, the ETC equipment receives an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message.
The Authentication response Message received by the ETC device in this step may carry an Authentication Code (MAC) generated by the vehicle-mounted device terminal.
And S103, the ETC equipment authenticates the authentication response message according to the secondary encryption algorithm.
Exemplarily, the authentication method in this step may include that the ETC device performs encryption calculation on the random number by using a secondary encryption algorithm to obtain ciphertext data, and then compares the ciphertext data with an authentication code carried in the authentication response message, and if the ciphertext data and the authentication code are in agreement, the ETC device determines that the authentication of the authentication response message passes; if the ciphertext data generated by the ETC device is inconsistent with the authentication code, the ETC device can send a message that the authentication fails to pass to the vehicle-mounted device terminal, and the vehicle-mounted device terminal prompts a vehicle owner. Simultaneously, the ETC device can lock the ETC function, ETC related services are not carried out any more, and the services can be provided again only after the ETC device is reactivated through legal channels such as a 4S store.
The embodiment of the application provides an ETC anti-disassembly authentication method, which comprises the following steps: the ETC equipment sends an anti-dismantling authentication request message to the vehicle-mounted equipment terminal; the ETC equipment receives an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message; and the ETC equipment authenticates the authentication response message according to the secondary encryption algorithm. This scheme is protected ETC equipment through the method of soft preventing tearing open, avoids the user to walk around the hardware and prevents tearing open protection dismouting ETC equipment to improve the validity and the authenticity of ETC equipment, and avoid causing physical damage to ETC equipment.
In an example, in step S103, an implementation manner of the ETC device obtaining the ciphertext data through the twice encryption algorithm may include: the ETC device performs a hash operation on the generated random number by using a national secret hash algorithm (SM3) to obtain a hash value of the random number, and further performs an encryption calculation on the hash value by using a national secret symmetric encryption algorithm (for example, SM4) and a preset key to generate ciphertext data.
Further, in the foregoing process, an implementation manner of the ETC device obtaining the preset key may include: in a vehicle power-on situation, the diagnosis device is connected with the vehicle-mounted device terminal and the ETC device, the key generation function of the vehicle-mounted device terminal is activated by the ETC device, the vehicle-mounted device terminal generates a group of 4-byte random numbers and feeds the random numbers back to the diagnosis device, the random numbers are sent to the ETC device by the diagnosis device, and the ETC device generates a preset key through a built-in key algorithm (for example, a Key Derivation Function (KDF)) and the received random numbers.
Fig. 2 is an ETC tamper-proof authentication method provided in an embodiment of the present application, where the method may be executed by a vehicle-mounted terminal device, and as shown in fig. 2, the method may include:
s201, the vehicle-mounted equipment terminal receives the anti-dismantling authentication request message sent by the ETC equipment.
In this step, the tamper-proof authentication request message received by the vehicle-mounted device terminal carries a random number generated by the ETC device.
S202, the vehicle-mounted equipment terminal calculates the anti-dismantling authentication request message according to a secondary encryption algorithm to generate ciphertext data.
For example, the implementation manner of the secondary encryption algorithm in this step may include that the vehicle-mounted device terminal calculates the random number in the tamper-resistant authentication request message according to a national secret hashing algorithm (SM3) to obtain a hash value of the random number, and then encrypts the hash value by using a national secret symmetric encryption algorithm (for example, SM4) and a preset key to generate ciphertext data.
The implementation manner of acquiring the preset key by the vehicle-mounted device terminal may include: in the case where the vehicle is powered on, the diagnostic device establishes a diagnostic service connection with the on-vehicle device terminal, the ETC device, activates a key generation function of the on-vehicle device terminal by the ETC device, generates a set of 4-byte random numbers by the on-vehicle device terminal, and generates a preset key by a built-in key algorithm (e.g., a Key Derivation Function (KDF)) and the generated random numbers.
After the preset key is generated, the in-vehicle device terminal may securely store the random number for later key management. Of course, after the preset key is generated by the vehicle-mounted device terminal and the ETC device, a message that the preset key is successfully injected can be fed back to the diagnosis device, and then the vehicle is powered off.
It can be understood that, in the case that a new vehicle-mounted device terminal needs to be replaced, the preset key needs to be updated, and then after the vehicle-mounted device terminal is replaced, the vehicle is powered on, and the above procedure may be executed again to update the preset key.
And S203, the vehicle-mounted equipment terminal generates an authentication response message according to the ciphertext data.
For example, the implementation manner of this step may include that the vehicle-mounted device terminal intercepts a high-order field in the ciphertext data generated in step S202, for example, assuming that the generated ciphertext data is a 128-bit authentication code, performs high-order interception on the authentication code to obtain a 64-bit authentication code, and fills the intercepted authentication code in a message form to construct an authentication response message.
And S204, the vehicle-mounted equipment terminal sends the authentication response message to the ETC equipment for authentication.
The embodiment of the application provides an ETC anti-disassembly authentication method, which can be applied to a vehicle-mounted equipment terminal and comprises the following steps: the vehicle-mounted equipment terminal receives an anti-dismantling authentication request message sent by ETC equipment; the vehicle-mounted equipment terminal calculates the anti-dismantling authentication request message according to a secondary encryption algorithm to generate ciphertext data; the vehicle-mounted equipment terminal generates an authentication response message according to the ciphertext data; and the vehicle-mounted equipment terminal sends the authentication response message to the ETC equipment for authentication. This scheme is protected ETC equipment through the method of soft preventing tearing open, avoids the user to walk around the hardware and prevents tearing open protection dismouting ETC equipment to improve the validity and the authenticity of ETC equipment, and avoid causing physical damage to ETC equipment.
Fig. 3 is a tamper-proof ETC authentication device according to an embodiment of the present disclosure, and as shown in fig. 3, the device may include: a sending module 301, a receiving module 302 and an authentication module 303;
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending an anti-dismantling authentication request message to a vehicle-mounted equipment terminal;
the receiving module is used for receiving an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message;
and the authentication module is used for authenticating the authentication response message according to the secondary encryption algorithm.
As shown in fig. 4, in one example, the apparatus may further include a generating module 304;
a generation module for generating a random number;
and the sending module can be used for sending the random number to the vehicle-mounted equipment terminal in a mode of the tamper-proof authentication request message.
Exemplarily, the authentication module is configured to perform encryption calculation on the random number by using a secondary encryption algorithm to obtain ciphertext data; comparing the ciphertext data with the authentication code carried in the authentication response message; and if the authentication code is consistent with the ciphertext data, determining that the authentication response message passes the authentication.
Optionally, the authentication module may include a computing unit;
the computing unit is used for carrying out Hash operation on the random number by adopting a national secret Hash algorithm to obtain a Hash value of the random number; and carrying out encryption calculation on the hash value by adopting a national password symmetric encryption algorithm and a preset key to generate ciphertext data.
In one example, the receiving module may be configured to obtain a random number sent by the diagnostic device;
the generation module may be configured to generate a preset key according to a key algorithm and a random number.
The ETC anti-tamper authentication device provided by the embodiment of the application can execute the ETC anti-tamper authentication method provided by the embodiment of the application in FIG. 1, and has corresponding functional modules and beneficial effects of the execution method.
Fig. 5 is a tamper-proof ETC authentication device according to an embodiment of the present application, and as shown in fig. 5, the device may include: a receiving module 501, a generating module 502 and a sending module 503;
the receiving module is used for receiving an anti-tamper authentication request message sent by the ETC equipment;
the generation module is used for calculating the anti-dismantling authentication request message according to a secondary encryption algorithm to generate ciphertext data and generating an authentication response message according to the ciphertext data;
and the sending module is used for sending the authentication response message to the ETC equipment for authentication.
In one example, the generating module may be configured to intercept a high-order field in the ciphertext data as an authentication code, and construct the authentication code as an authentication response packet.
The ETC anti-tamper authentication device provided by the embodiment of the application can execute the ETC anti-tamper authentication method provided by the embodiment of the application in FIG. 2, and has corresponding functional modules and beneficial effects of the execution method.
Fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application, as shown in fig. 6, the terminal device includes a processor 601, a memory 602, an input device 603, and an output device 604; the number of processors 601 in the device may be one or more, and one processor 601 is taken as an example in fig. 6; the processor 601, the memory 602, the input device 603 and the output device 604 of the apparatus may be connected by a bus or other means, and fig. 6 illustrates the connection by a bus as an example.
The memory 602 is used as a computer-readable storage medium, and can be used to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the ETC tamper-proof authentication method in fig. 1 and fig. 2 in the embodiments of the present application (for example, the transmitting module 301, the receiving module 302, and the authentication module 303 in the ETC tamper-proof authentication apparatus, or the receiving module 501, the generating module 502, and the transmitting module 503). The processor 601 executes various functional applications and data processing of the electronic device by running software programs, instructions and modules stored in the memory 602, that is, the ETC tamper-proof authentication method described above is implemented.
The memory 602 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the cloud server, and the like. Further, the memory 602 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 602 may further include memory located remotely from the processor 601, which may be connected to the device/terminal/server via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 603 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the apparatus. The output device 604 may include a display device such as a display screen.
The embodiment of the application further provides an ETC anti-tamper authentication system, which may include an ETC device and an on-board device terminal, where the ETC device is configured to execute the ETC anti-tamper authentication method provided in the embodiment shown in fig. 1, and the on-board device terminal is configured to execute the ETC anti-tamper authentication method provided in the embodiment shown in fig. 2.
Embodiments of the present application further provide a storage medium containing computer-executable instructions, which, when executed by a vehicle controller, may implement the functions of the ETC device or the functions of the vehicle-mounted device terminal in the above-described embodiments.
From the above description of the embodiments, it is obvious for those skilled in the art that the present application can be implemented by software and necessary general hardware, and certainly can be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods described in the embodiments of the present application.
It should be noted that, in the foregoing embodiment, the components involved are merely divided according to the functional logic, but are not limited to the above division manner as long as the corresponding functions can be achieved, and are not used to limit the scope of the present application.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.

Claims (10)

1. An ETC tamper-evident authentication method, comprising:
the ETC equipment of the ETC sends an anti-dismantling authentication request message to a vehicle-mounted equipment terminal;
the ETC equipment receives an authentication response message sent by the vehicle-mounted equipment terminal according to the anti-dismantling authentication request message;
and the ETC equipment authenticates the authentication response message according to a secondary encryption algorithm.
2. The method according to claim 1, wherein the ETC device sends a tamper-proof authentication request message to the on-board device terminal, including:
the ETC equipment generates a random number and sends the random number to the vehicle-mounted equipment terminal in a mode of anti-dismantling authentication request messages.
3. The method according to claim 2, wherein the ETC device authenticates the authentication response message according to a quadratic encryption algorithm, comprising:
the ETC equipment carries out encryption calculation on the random number by adopting a secondary encryption algorithm to obtain ciphertext data;
the ETC equipment compares the ciphertext data with an authentication code carried in the authentication response message;
and if the authentication code is consistent with the ciphertext data, the ETC equipment determines that the authentication response message passes the authentication.
4. The method according to claim 3, wherein the ETC device performs encryption calculation on the random number by adopting a quadratic encryption algorithm to obtain ciphertext data, and the method comprises the following steps:
the ETC equipment carries out Hash operation on the random number by adopting a national secret Hash algorithm to obtain a Hash value of the random number;
and the ETC equipment adopts a national secret symmetric encryption algorithm and a preset key to carry out encryption calculation on the hash value to generate ciphertext data.
5. The method according to claim 4, wherein the ETC device obtaining the preset key comprises:
the ETC equipment acquires a random number sent by the diagnosis equipment;
the ETC generates the preset key according to a key algorithm and the random number.
6. An ETC tamper-evident authentication method, comprising:
the method comprises the steps that a vehicle-mounted equipment terminal receives an anti-dismantling authentication request message sent by ETC equipment of an electronic toll collection system;
the vehicle-mounted equipment terminal calculates the anti-dismantling authentication request message according to a secondary encryption algorithm to generate ciphertext data;
the vehicle-mounted equipment terminal generates an authentication response message according to the ciphertext data;
and the vehicle-mounted equipment terminal sends the authentication response message to the ETC equipment for authentication.
7. The method according to claim 6, wherein the step of generating an authentication response message by the vehicle-mounted device terminal according to the ciphertext data comprises:
and the vehicle-mounted equipment terminal intercepts the high-order field in the ciphertext data as an authentication code, and constructs the authentication code as an authentication response message.
8. An ETC, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the ETC tamper-proof authentication method according to any one of claims 1 to 5 when executing the computer program.
9. An in-vehicle device terminal, characterized by comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the ETC tamper-proof authentication method according to any one of claims 6 to 7 when executing the computer program.
10. An ETC tamper-evident authentication system, comprising: an electronic toll collection system ETC device for performing the ETC tamper-proof authentication method according to any one of claims 1 to 5, and an on-vehicle device terminal for performing the ETC tamper-proof authentication method according to any one of claims 6 to 7.
CN202110169080.3A 2021-02-07 2021-02-07 ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system Pending CN112862994A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110169080.3A CN112862994A (en) 2021-02-07 2021-02-07 ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110169080.3A CN112862994A (en) 2021-02-07 2021-02-07 ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system

Publications (1)

Publication Number Publication Date
CN112862994A true CN112862994A (en) 2021-05-28

Family

ID=75989070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110169080.3A Pending CN112862994A (en) 2021-02-07 2021-02-07 ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system

Country Status (1)

Country Link
CN (1) CN112862994A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225324A (en) * 2022-06-15 2022-10-21 中国第一汽车股份有限公司 ETC anti-disassembly safety testing method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
WO2015036773A2 (en) * 2013-09-13 2015-03-19 Vodafone Ip Licensing Limited Methods and systems for operating a secure mobile device
CN107104982A (en) * 2017-05-26 2017-08-29 福州大学 Have traitor tracing function in mobile electron medical treatment can search for encryption system
CN109104271A (en) * 2017-06-20 2018-12-28 山东量子科学技术研究院有限公司 A kind of methods, devices and systems of digital signature
CN111968256A (en) * 2020-08-20 2020-11-20 中国第一汽车股份有限公司 Electronic tag anti-dismounting method and device, vehicle and storage medium
WO2021005474A1 (en) * 2019-07-11 2021-01-14 nChain Holdings Limited Computer-implemented system and method for facilitating transactions associated with a blockchain using a network identifier for participating entities

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
WO2015036773A2 (en) * 2013-09-13 2015-03-19 Vodafone Ip Licensing Limited Methods and systems for operating a secure mobile device
CN107104982A (en) * 2017-05-26 2017-08-29 福州大学 Have traitor tracing function in mobile electron medical treatment can search for encryption system
CN109104271A (en) * 2017-06-20 2018-12-28 山东量子科学技术研究院有限公司 A kind of methods, devices and systems of digital signature
WO2021005474A1 (en) * 2019-07-11 2021-01-14 nChain Holdings Limited Computer-implemented system and method for facilitating transactions associated with a blockchain using a network identifier for participating entities
CN111968256A (en) * 2020-08-20 2020-11-20 中国第一汽车股份有限公司 Electronic tag anti-dismounting method and device, vehicle and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘鸿: "护理服务机器人生理参数健康监视系统开发", 《中国优秀硕士学位论文全文数据库医药卫生科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225324A (en) * 2022-06-15 2022-10-21 中国第一汽车股份有限公司 ETC anti-disassembly safety testing method and device

Similar Documents

Publication Publication Date Title
US20210051000A1 (en) Vehicle-mounted device upgrade method and related device
US20220276855A1 (en) Method and apparatus for processing upgrade package of vehicle
US20170180330A1 (en) Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium
EP3926500B1 (en) Device upgrade method and related device
CN115776385A (en) Secure communication between onboard electronic control units
CN110621014B (en) Vehicle-mounted equipment, program upgrading method thereof and server
CN108306727A (en) For encrypting, decrypting and the method and apparatus of certification
CN113099443A (en) Equipment authentication method, device, equipment and system
CN114637987B (en) Security chip firmware downloading method and system based on platform verification
EP3982587A1 (en) Authentication method, device, and system
CN111246474B (en) Base station authentication method and device
CN104053149A (en) Method and system for realizing security mechanism of vehicle networking equipment
CN112887282A (en) Identity authentication method, device and system and electronic equipment
CN113114699A (en) Vehicle terminal identity certificate application method
CN111968256A (en) Electronic tag anti-dismounting method and device, vehicle and storage medium
CN113066209A (en) Method and device for safe off-line use of digital key and storage medium
US20190026478A1 (en) Vehicle secure communication method and apparatus, vehicle multimedia system, and vehicle
CN113452517A (en) Key updating method, device, system, storage medium and terminal
CN112422595B (en) Vehicle-mounted system safety protection method and device
CN112862994A (en) ETC anti-disassembly authentication method, ETC, vehicle-mounted equipment terminal and system
WO2020018187A1 (en) Network device, method for security and computer readable storage medium
CN113442870A (en) Method and device for deactivating vehicle-mounted unit, storage medium and terminal
CN113453223B (en) Key updating method, system, device, storage medium and terminal
CN114071463B (en) Batch authentication method of vehicle-mounted self-organizing network based on bilinear mapping
CN114173327A (en) Authentication method and terminal based on 5G industry private network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210528