CN113946876A - Service authentication method and system - Google Patents

Service authentication method and system Download PDF

Info

Publication number
CN113946876A
CN113946876A CN202010680795.0A CN202010680795A CN113946876A CN 113946876 A CN113946876 A CN 113946876A CN 202010680795 A CN202010680795 A CN 202010680795A CN 113946876 A CN113946876 A CN 113946876A
Authority
CN
China
Prior art keywords
authentication
processing unit
information processing
vehicle
authentication server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010680795.0A
Other languages
Chinese (zh)
Inventor
霍灵瑜
周丽
袁瑞萍
张海军
田志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wuzi University
Original Assignee
Beijing Wuzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wuzi University filed Critical Beijing Wuzi University
Priority to CN202010680795.0A priority Critical patent/CN113946876A/en
Publication of CN113946876A publication Critical patent/CN113946876A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/06Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)

Abstract

The embodiment of the invention provides a service authentication method and a system, wherein the method comprises the following steps: acquiring charging information M sent by a vehicle information processing unit of a certain vehicle through a roadside information processing unit; extracting a data summary H of the charging information M by using a HASH function HASH, and encrypting the M information by using a symmetric key to obtain a ciphertext C; encrypting the data abstract H and the symmetric key by using a private key of a roadside information processing unit to obtain a digital signature; and after the ciphertext C and the digital signature are sent to an issuer authentication server of the IC card for authentication, the vehicle is charged and deducted for the toll. The technical scheme has the following beneficial effects: because the technical means of asymmetric secondary encryption is adopted, the authentication safety of the road side information processing unit and the vehicle information processing unit in the electronic toll collection system is greatly improved.

Description

Service authentication method and system
Technical Field
The invention relates to the technical field of vehicle passing charge authentication, in particular to a service authentication method and system.
Background
At present, highway electronic toll collection systems are built in many provinces and cities of China. The electronic toll collection system realizes charging transaction by the way of wireless communication (5.8GHz frequency band radio frequency signal) through the road side information processing unit and the vehicle information processing unit. In the electronic toll collection system, a vehicle information processing unit is placed on a vehicle, a roadside information processing unit is erected on the roadside, and when the vehicle passes through the roadside information processing unit at a high speed, the vehicle information processing unit and the roadside information processing unit realize identification of authenticity, acquisition of vehicle types, calculation of rates and deduction of tolls in a wireless communication mode.
The electronic tag is used as an on-vehicle wireless communication device, and vehicle information, user information and the like are written in the electronic tag at the time of release so as to facilitate identification and charging of the road side information processing unit. After the electronic tag is issued and activated, normal transaction can be carried out on the lane of the electronic toll collection system and the roadside information processing unit equipment, safety authentication is firstly carried out during transaction, and if the authentication is successful, the toll collection transaction can be carried out.
At present, all safety authentication modes used for lane passing are completed by authentication modes such as a point of sale terminal safety Access Module (PSAM) card in lane roadside information processing unit equipment, and the like, and the existing authentication modes have the defects of low authentication safety and the like.
Disclosure of Invention
The embodiment of the invention provides a service authentication method and a service authentication system, which are used for improving the authentication safety of a road side information processing unit and a vehicle information processing unit in an electronic toll collection system.
In one aspect, an embodiment of the present invention provides a service authentication method, where the method includes:
acquiring charging information M sent by a vehicle information processing unit of a certain vehicle through a roadside information processing unit;
extracting a data summary H of the charging information M by using a HASH function HASH, and encrypting the M information by using a symmetric key to obtain a ciphertext C;
encrypting the data abstract H and the symmetric key by using a private key of a roadside information processing unit to obtain a digital signature;
and after the ciphertext C and the digital signature are sent to an issuer authentication server of the IC card for authentication, the vehicle is charged and deducted for the toll.
In another aspect, an embodiment of the present invention provides a service authentication system, where the system includes: roadside information processing unit, vehicle information processing unit, authentication server, wherein:
the roadside information processing unit is used for acquiring the charging information M sent by the vehicle information processing unit of a certain vehicle; extracting a data summary H of the charging information M by using a HASH function HASH, and encrypting the M information by using a symmetric key to obtain a ciphertext C; encrypting the data abstract H and the symmetric key by using a private key of the roadside information processing unit to obtain a digital signature; sending the ciphertext C and the digital signature to an issuer authentication server of the IC card for authentication;
and the authentication server receives the ciphertext C and the digital signature, and after passing the authentication, the vehicle is charged and deducted for the toll.
The technical scheme has the following beneficial effects: because the technical means of asymmetric secondary encryption is adopted, the authentication safety of the road side information processing unit and the vehicle information processing unit in the electronic toll collection system is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a service authentication method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a service authentication system according to an embodiment of the present invention;
fig. 3 is a schematic view of a service authentication scenario in an application example of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a flowchart of a service authentication method according to an embodiment of the present invention is shown, where the method includes:
101. acquiring charging information M sent by a vehicle information processing unit of a certain vehicle through a roadside information processing unit;
102. extracting a data summary H of the charging information M by using a HASH function HASH, and encrypting the M information by using a symmetric key to obtain a ciphertext C;
103. encrypting the data abstract H and the symmetric key by using a private key of a roadside information processing unit to obtain a digital signature;
104. and after the ciphertext C and the digital signature are sent to an issuer authentication server of the IC card for authentication, the vehicle is charged and deducted for the toll.
Preferably, the issuing of the ciphertext C and the digital signature to the issuer authentication server of the IC card is authenticated by the authentication server, and the authentication includes:
after the issuer authentication server of the IC card receives the ciphertext C and the digital signature, firstly, a public key of the roadside information processing unit is used for carrying out digital signature verification on the digital signature, the symmetric key and the digital abstract H are read out, and then the ciphertext C is decrypted by using the symmetric key to obtain M';
extracting a digital abstract from the M 'by using the HASH function HASH to obtain a digital abstract H';
and judging whether the digital abstract H' is the same as the data abstract H, and if so, proving that the information is not tampered and the authentication is passed.
Preferably, an elliptic curve cryptosystem or an RSA algorithm is used for encryption, decryption and digital signature; compared with other public key cryptosystems, the elliptic curve cryptosystem not only has short secret key, but also has high encryption and decryption speed, and no effective deciphering method is found up to now. Therefore, the technology can be developed and used in a large amount, and is applied to industries needing information security, particularly the authentication of a road side information processing unit and a vehicle information processing unit in an electronic toll collection system, so that the development of the electronic toll collection system is accelerated, the authentication security is greatly improved, and the cost is reduced.
An encryption unit is arranged in the roadside information processing unit; the encryption unit includes: a PCI crypto card, or encryption engine; the encrypting the data digest H and the symmetric key by using the private key of the roadside information processing unit includes: encrypting the data digest H and the symmetric key by using a private key of the encryption unit;
a decryption unit is arranged in the authentication server; the decryption unit includes: a PCI crypto card, or a decryption machine; the decrypting the ciphertext C using the symmetric key comprises: and decrypting the ciphertext C by using the symmetric key in the decryption unit.
Preferably, the method further comprises:
deploying an issuer authentication server of the IC card based on a MapReduce mode to perform load balancing of authentication; the authentication server is divided into the following steps in sequence according to the levels: a central level authentication server, a provincial level authentication server and a county and city level authentication server. Through the setting, the load balance of the authentication server can be carried out, and the failure rate is reduced.
Preferably, the method further comprises:
and acquiring toll station exits with the vehicle passage records larger than a preset probability value according to the historical passage record data of the vehicle, and accounting the toll of the vehicle in advance so as to directly deduct the toll when the vehicle actually passes through the toll station exits larger than the preset probability value. Through the prediction calculation (historical data) in advance, the passing time of the vehicle can be reduced, and the passing efficiency is greatly improved.
Preferably, the charging information M includes: information of starting point site, starting point time, information of end point site, end point time, money amount and bank information.
Corresponding to the above method embodiment, as shown in fig. 2, a schematic structural diagram of a service authentication system according to an embodiment of the present invention is shown, where the system includes: roadside information processing unit 22, vehicle information processing unit 21, authentication server 23, wherein:
the roadside information processing unit 22 is used for acquiring the charging information M sent by the vehicle information processing unit 21 of a certain vehicle; extracting a data summary H of the charging information M by using a HASH function HASH, and encrypting the M information by using a symmetric key to obtain a ciphertext C; encrypting the data digest H and the symmetric key by using a private key of the roadside information processing unit 22 to obtain a digital signature; the ciphertext C and the digital signature are sent to an issuer authentication server 23 of the IC card for authentication;
and the authentication server 23 receives the ciphertext C and the digital signature, and after passing the authentication, charges and deducts the toll of the vehicle.
As shown in fig. 3, a schematic diagram of a service authentication scenario for an application example of the present invention,
preferably, after receiving the ciphertext C and the digital signature, the authentication server is specifically configured to perform digital signature verification on the digital signature by using a public key of the roadside information processing unit, read the symmetric key and the digital digest H, and then decrypt the ciphertext C by using the symmetric key to obtain M'; extracting a digital abstract from the M 'by using the HASH function HASH to obtain a digital abstract H'; and judging whether the digital abstract H' is the same as the data abstract H, and if so, proving that the information is not tampered and the authentication is passed.
Preferably, an elliptic curve cryptosystem or an RSA algorithm is used for encryption, decryption and digital signature;
an encryption unit is arranged in the roadside information processing unit; the encryption unit includes: a PCI crypto card, or encryption engine; the encrypting the data digest H and the symmetric key by using the private key of the roadside information processing unit includes: encrypting the data digest H and the symmetric key by using a private key of the encryption unit;
a decryption unit is arranged in the authentication server; the decryption unit includes: a PCI crypto card, or a decryption machine; the decrypting the ciphertext C using the symmetric key comprises: and decrypting the ciphertext C by using the symmetric key in the decryption unit.
Preferably, the authentication server is deployed based on a MapReduce manner to perform load balancing of authentication; the authentication server is divided into the following steps in sequence according to the levels: a central level authentication server, a provincial level authentication server and a county and city level authentication server.
Preferably, the method further comprises:
the authentication server is further used for acquiring toll station exits with the vehicle passing records larger than the preset probability value according to the historical passing record data of the vehicle, and accounting the passing fee of the vehicle in advance so as to directly deduct the fee when the vehicle actually passes through the toll station exits larger than the preset probability value.
Preferably, the charging information M includes: information of starting point site, starting point time, information of end point site, end point time, money amount and bank information.
The technical scheme has the following beneficial effects: because the technical means of asymmetric secondary encryption is adopted, the authentication safety of the road side information processing unit and the vehicle information processing unit in the electronic toll collection system is greatly improved.
The vehicle information processing unit in the embodiment of the present invention may be an on-board unit, or may be a driving recorder or other information processing devices. The roadside information processing unit may be a roadside unit, or may be a toll gate recorder or other information processing equipment. The information processing may be any combination of one or more of the collection, transmission, storage, modification, editing, reading, etc. of data or information in a particular situation. The third party may be an issuer, or a bank, an owner, or a road manager. The arrears can be formed by vehicle passing business, parking lot, refueling, various automobile rear service businesses, various expansion value-added businesses (such as shopping, beauty treatment and food), and the like. The IC card can be an electronic toll collection card of a vehicle, or an IC card formed by mixing the electronic toll collection card of the vehicle and various special applications, such as integration with a transportation management certificate, and integration with various membership cards, such as an oil-filling membership card, a parking membership card, or other integration related to consumption.
It should be understood that the specific order or hierarchy of steps in the processes disclosed is an example of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged without departing from the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not intended to be limited to the specific order or hierarchy presented.
In the foregoing detailed description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, invention lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby expressly incorporated into the detailed description, with each claim standing on its own as a separate preferred embodiment of the invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. To those skilled in the art; various modifications to these embodiments will be readily apparent, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term "comprising" as "comprising" is interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean a "non-exclusive or".
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (12)

1. A method for service authentication, the method comprising:
acquiring charging information M sent by a vehicle information processing unit of a certain vehicle through a roadside information processing unit;
extracting a data summary H of the charging information M by using a HASH function HASH, and encrypting the M information by using a symmetric key to obtain a ciphertext C;
encrypting the data abstract H and the symmetric key by using a private key of a roadside information processing unit to obtain a digital signature;
and after the ciphertext C and the digital signature are sent to an issuer authentication server of the IC card for authentication, the vehicle is charged and deducted for the toll.
2. The business authentication method of claim 1, wherein the authentication of the issuer authentication server that sends the ciphertext C and the digital signature to the IC card, comprises:
after the issuer authentication server of the IC card receives the ciphertext C and the digital signature, firstly, a public key of the roadside information processing unit is used for carrying out digital signature verification on the digital signature, the symmetric key and the digital abstract H are read out, and then the ciphertext C is decrypted by using the symmetric key to obtain M';
extracting a digital abstract from the M 'by using the HASH function HASH to obtain a digital abstract H';
and judging whether the digital abstract H' is the same as the data abstract H, and if so, proving that the information is not tampered and the authentication is passed.
3. The service authentication method according to claim 2, wherein an elliptic curve cryptosystem or an RSA algorithm is used for encryption, decryption, and digital signature;
an encryption unit is arranged in the roadside information processing unit; the encryption unit includes: a PCI crypto card, or encryption engine; the encrypting the data digest H and the symmetric key by using the private key of the roadside information processing unit includes: encrypting the data digest H and the symmetric key by using a private key of the encryption unit;
a decryption unit is arranged in the authentication server; the decryption unit includes: a PCI crypto card, or a decryption machine; the decrypting the ciphertext C using the symmetric key comprises: and decrypting the ciphertext C by using the symmetric key in the decryption unit.
4. The service authentication method of claim 1, wherein the method further comprises:
deploying an issuer authentication server of the IC card based on a MapReduce mode to perform load balancing of authentication; the authentication server is divided into the following steps in sequence according to the levels: a central level authentication server, a provincial level authentication server and a county and city level authentication server.
5. The service authentication method of claim 1, wherein the method further comprises:
and acquiring toll station exits with the vehicle passage records larger than a preset probability value according to the historical passage record data of the vehicle, and accounting the toll of the vehicle in advance so as to directly deduct the toll when the vehicle actually passes through the toll station exits larger than the preset probability value.
6. The service authentication method as claimed in claim 1, wherein the charging information M includes: information of starting point site, starting point time, information of end point site, end point time, money amount and bank information.
7. A service authentication system, the system comprising: roadside information processing unit, vehicle information processing unit, authentication server, wherein:
the roadside information processing unit is used for acquiring the charging information M sent by the vehicle information processing unit of a certain vehicle; extracting a data summary H of the charging information M by using a HASH function HASH, and encrypting the M information by using a symmetric key to obtain a ciphertext C; encrypting the data abstract H and the symmetric key by using a private key of the roadside information processing unit to obtain a digital signature; sending the ciphertext C and the digital signature to an issuer authentication server of the IC card for authentication;
and the authentication server receives the ciphertext C and the digital signature, and after passing the authentication, the vehicle is charged and deducted for the toll.
8. The service authentication system of claim 7,
the authentication server is specifically configured to, after receiving the ciphertext C and the digital signature, first perform digital signature verification on the digital signature by using a public key of the roadside information processing unit, read out the symmetric key and the digital digest H, and then decrypt the ciphertext C by using the symmetric key to obtain M'; extracting a digital abstract from the M 'by using the HASH function HASH to obtain a digital abstract H'; and judging whether the digital abstract H' is the same as the data abstract H, and if so, proving that the information is not tampered and the authentication is passed.
9. The transaction certification system according to claim 8, wherein the encryption, decryption and digital signature are performed using elliptic curve cryptosystem or RSA algorithm;
an encryption unit is arranged in the roadside information processing unit; the encryption unit includes: a PCI crypto card, or encryption engine; the encrypting the data digest H and the symmetric key by using the private key of the roadside information processing unit includes: encrypting the data digest H and the symmetric key by using a private key of the encryption unit;
a decryption unit is arranged in the authentication server; the decryption unit includes: a PCI crypto card, or a decryption machine; the decrypting the ciphertext C using the symmetric key comprises: and decrypting the ciphertext C by using the symmetric key in the decryption unit.
10. The service authentication system of claim 7,
the authentication server is deployed based on a MapReduce mode to carry out load balancing of authentication; the authentication server is divided into the following steps in sequence according to the levels: a central level authentication server, a provincial level authentication server and a county and city level authentication server.
11. The service authentication system of claim 7,
the authentication server is further used for acquiring toll station exits with the vehicle passing records larger than the preset probability value according to the historical passing record data of the vehicle, and accounting the passing fee of the vehicle in advance so as to directly deduct the fee when the vehicle actually passes through the toll station exits larger than the preset probability value.
12. The service authentication system as claimed in claim 7, wherein said charging information M includes: information of starting point site, starting point time, information of end point site, end point time, money amount and bank information.
CN202010680795.0A 2020-07-15 2020-07-15 Service authentication method and system Pending CN113946876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010680795.0A CN113946876A (en) 2020-07-15 2020-07-15 Service authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010680795.0A CN113946876A (en) 2020-07-15 2020-07-15 Service authentication method and system

Publications (1)

Publication Number Publication Date
CN113946876A true CN113946876A (en) 2022-01-18

Family

ID=79326225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010680795.0A Pending CN113946876A (en) 2020-07-15 2020-07-15 Service authentication method and system

Country Status (1)

Country Link
CN (1) CN113946876A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114339680A (en) * 2022-03-07 2022-04-12 高新兴智联科技有限公司 V2X system and safety authentication method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114339680A (en) * 2022-03-07 2022-04-12 高新兴智联科技有限公司 V2X system and safety authentication method
CN114339680B (en) * 2022-03-07 2022-06-07 高新兴智联科技有限公司 V2X system and safety authentication method

Similar Documents

Publication Publication Date Title
JP3156562B2 (en) Vehicle communication device and traveling vehicle monitoring system
CN103150771B (en) Track PSAM card and the using method thereof of charge is freely flowed for city road and bridge
CN108305338A (en) A kind of non-stop charging method and system
CN103152174A (en) Data processing method, device and parking lot management system applied to parking lot
CN110599611A (en) ETC lane control passing method and equipment
CN110769410B (en) Method, application module, system and terminal for activating a vehicle-mounted unit device
CN111724494B (en) Traffic information processing method and device, electronic equipment and storage medium
CN104077814A (en) Electronic no-parking charging system, device, authentication method and trading method
CN103198527A (en) Method of vehicular unit-roadside unit free flow inspection model transaction
CN105139197A (en) Business processing unit and vehicle-mounted unit
CN113946876A (en) Service authentication method and system
CN114386963A (en) Vehicle-mounted payment device, method and system
CN103198526A (en) Concurrent operation method for road side unit to process multiple on board units
CN112907769B (en) Vehicle-mounted unit management method and system based on preinstalled and step-by-step information writing
CN112150281B (en) Digital currency transaction method, device and system
WO2020215678A1 (en) Electronic identification toll collection system compatible with etc highway toll collection
WO2022011599A1 (en) Method and system for service authentication
CN113487756A (en) Application implementation method and system of ETC vehicle digital currency hard wallet
CN110266498B (en) Safe payment system and method for non-stop automobile
CN109615717A (en) Charging method, system, device and the electronic equipment of road toll
JP2004110147A (en) Automatic payment system
JP2004348321A (en) Radio settlement system
KR20240051589A (en) Toll payment terminal for vehicle and control method thereof
CN113920603B (en) Activation method and device
US20240144270A1 (en) V2x-based electronic toll collection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination