WO2021036212A1 - 一种身份验证方法及装置 - Google Patents

一种身份验证方法及装置 Download PDF

Info

Publication number
WO2021036212A1
WO2021036212A1 PCT/CN2020/076661 CN2020076661W WO2021036212A1 WO 2021036212 A1 WO2021036212 A1 WO 2021036212A1 CN 2020076661 W CN2020076661 W CN 2020076661W WO 2021036212 A1 WO2021036212 A1 WO 2021036212A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification information
verification
identity
information
random number
Prior art date
Application number
PCT/CN2020/076661
Other languages
English (en)
French (fr)
Inventor
杨艳江
魏卓
吴双
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20856842.8A priority Critical patent/EP3879753A4/en
Priority to JP2021540450A priority patent/JP7367032B2/ja
Publication of WO2021036212A1 publication Critical patent/WO2021036212A1/zh
Priority to US17/360,360 priority patent/US11979413B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/108Source integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/005Moving wireless networks

Definitions

  • This application relates to the field of communication technology, and in particular to an identity verification method and device.
  • ADAS advanced driver-assistance systems
  • sensors such as cameras, Millimeter wave radar, ultrasonic radar or optical radar (LiDAR), etc., these sensors are all on-board equipment.
  • LiDAR optical radar
  • the embodiments of the present application provide an identity verification method and device, which are used to verify the vehicle-mounted equipment and improve the safety of the vehicle-mounted equipment.
  • a first identity verification method includes: a first device sends a first random number to a second device, wherein the first vehicle carries the first device and the first set, and the second device Belonging to the first set, the first set further includes a third device, and the first device communicates with the third device through the second device; the first device receives information from the second device The first message, the first message includes first verification information, the first verification information is used to verify the identity of the second device, and the first verification information is based on the identity information of the second device And the first random number; the first device determines that the identity verification of the second device is successful according to the first verification information and the first random number.
  • the method of the first aspect may be executed by a first device, and the first device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
  • the communication device is an in-vehicle device.
  • the first set includes the second device and the third device, and the first device verifies the second device.
  • the third device for example, the second device can verify. All vehicle-mounted devices can perform identity verification, and for each level of vehicle-mounted devices, the number of devices that need to be verified is relatively small, which helps to reduce the burden on devices.
  • the first device determines that the identity verification of the second device is successful according to the first verification information and the first random number, including :
  • the first device determines that the identity verification of the second device is successful.
  • the first device can generate the verification information in the same way as the second device generates the first verification information, for example, it is called the second verification information
  • the identity information of the second device may also be carried in the first message, and the first device may also generate the second verification information in the same manner as the second device generates the first verification information.
  • the first device can compare whether the second verification information is consistent with the first verification information. If the second verification information is consistent with the first verification information, the first device has successfully verified the identity of the second device, or in other words, the first device determines the first verification information.
  • the identity verification of the second device is successful, or if the second verification information is inconsistent with the first verification information, the first device's identity verification to the second device is unsuccessful, or in other words, the first device determines that the identity verification of the second device fails.
  • the first device and the second device use the same method to generate verification information, and the first device performs verification. If the second device is maliciously replaced, the first verification information generated by the second device may have a problem, and it will be The second verification information is inconsistent. Therefore, in this way, it can be determined whether the identity of the second device is successfully verified.
  • the first message further includes fourth verification information, and the fourth verification information is used to indicate whether the identity verification of the third device is successful
  • the first device generates second verification information based on the identity information of the second device and the first random number, including: the first device generates second verification information based on the identity information of the second device, the fourth verification Information and the first random number to generate the second verification information.
  • the second device also generates the first verification information based on the identity information of the second device, the fourth verification information, and the first random number. Then the first device also generates the first verification information based on the identity information of the second device, the fourth verification information, and the first random number. Random numbers are used to generate the second verification information, and the elements used to generate the first verification information and the second verification information are the same, so that the accuracy of the comparison between the first verification information and the second verification information can be guaranteed.
  • the first message further includes third verification information generated by the third device, wherein the third verification information is the first Obtained by the three devices based on the identity information of the third device.
  • the first message may also include N third verification information.
  • the N third verification information may be generated by N third devices included in the first set.
  • the three devices may be all or part of the third devices included in the first set, and N is a positive integer.
  • the second device may also send the third verification information generated by all the third devices included in the first set to the first device, then N third verification information is sent to the first device.
  • the device includes all third devices in the first set. In this way, the first device can obtain more information, and when the identity verification of the third device is required, the identity verification of any third device included in the first set can be performed.
  • the third device is one of the N third devices, and the third device may be the third device for which the second device has successfully authenticated, or it may be the second device. The third device that failed the authentication.
  • the second device may also send the third verification information generated by the third device that failed the verification of the second device to the first device, then N third devices It may include all the third devices or part of the third devices in the first set.
  • the first message only needs to carry the third verification information generated by the third device that fails the verification of the second device, and does not need to carry the third verification information generated by all the third devices in the first set, which helps to save signaling overhead.
  • the third device is one of N third devices, and the third device is a third device whose identity verification by the second device fails.
  • the first message further includes fourth verification information, and the fourth verification information is used to indicate whether the identity verification of the third device is successful
  • the method further includes: when the fourth verification information indicates that the identity verification of the third device fails, the first device according to the The third verification information is verified to determine whether the identity of the third device is successfully verified.
  • the first device determines that the identity verification of the second device is successful, the fourth verification information indicates that the identity verification of the third device is unsuccessful, and the first message includes the third verification information corresponding to the third device, then the first device The third verification information may be verified to determine whether the identity of the third device is successfully verified.
  • the first device can also implement overall verification. That is, in addition to verifying whether the identity of the second device is successfully verified, the first device can also verify whether the identity of the third device is successful. The verification is successful, thereby making the verification of the third device more reliable.
  • the first message further includes fourth verification information, and the fourth verification information is used to indicate that the identity verification of the third device fails,
  • the method also includes:
  • the first device performs verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the first message may also not include N pieces of third verification information. If the fourth verification information indicates that the identity verification of the third device included in the first set is unsuccessful, the first device may send the second message to the second device. The second message is used to request to obtain verification information corresponding to at least one third device. After the second device receives the second message from the first device, it can send N pieces of third verification information to the master authentication node. For example, the second device can send a third message to the first device, and the third message includes N pieces of third verification information. Three verification information. Wherein, the N third verification information may include the third verification information generated by all the third devices in the first set, or the N third verification information may also include the third verification information generated by some third devices in the first set. Three verification information.
  • the first device can request the third verification information again when the third device needs to be verified, and the first message does not need to include the third verification information.
  • the first device successfully authenticates the second device, and the fourth verification information indicates that the third device included in the first set is successfully authenticated, the first device does not need to request the third verification information, which is helpful To save signaling overhead.
  • the first device determines that the identity verification of the second device fails, and the method further includes:
  • the first device performs verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the first message may not include N pieces of third verification information. If the first device determines that the identity verification of the second device fails, the first device may not trust the verification result of the second device. Therefore, the first device may send a second message to the second device, and the second message is used to request to obtain verification information corresponding to at least one third device. After the second device receives the second message from the first device, it can send N pieces of third verification information to the master authentication node. For example, the second device can send a third message to the first device, and the third message includes N pieces of third verification information. Three verification information. Wherein, the N third verification information may include the third verification information generated by all the third devices in the first set, or the N third verification information may also include the third verification information generated by some third devices in the first set.
  • the first device can request the third verification information again when the third device needs to be verified, and the first message does not need to include the third verification information.
  • the first device successfully authenticates the second device and the fourth verification information indicates that the third device included in the first set is successfully authenticated, the first device does not need to request the third verification information, which is helpful To save signaling overhead.
  • the first message further includes fourth verification information
  • the fourth verification information is Obtained by aggregating a plurality of third verification information from a plurality of the third devices; the method further includes: the first device performs verification according to the fourth verification information to determine the status of the plurality of third devices Whether the identity verification is successful.
  • the second device may aggregate multiple third verification information from multiple third devices to obtain fourth verification information, and send the fourth verification information to the first device.
  • an aggregation method is to combine multiple third verification information.
  • the information is XORed to obtain the fourth verification information.
  • other aggregation methods are also possible.
  • the fourth verification information obtained in this way has a small amount of information compared to multiple third verification information, and the second device only needs to send the fourth verification information without sending multiple third verification information, which is helpful for saving Signaling overhead.
  • the method further includes:
  • the first device sends a second message to the second device, and the second message is used to request to obtain a plurality of Verification information corresponding to the third device;
  • the first device performs verification according to the plurality of third verification information to determine whether the identity of each of the plurality of third devices is successfully verified.
  • the fourth verification information is obtained by aggregating multiple third verification information, if the first device determines that the identity verification of multiple third devices has failed according to the fourth verification information, it is only considered that there are multiple third devices in general.
  • the identity verification of the third device fails, but which of the plurality of third devices fails the identity verification, and the first device is still unable to determine. Therefore, the first device can request multiple third verification information generated by multiple third devices, so that the first device can verify the multiple third verification information in turn, so as to determine which third device is the identity verification. failure. In this way, the third device that failed the identity verification can be located more accurately.
  • a second identity verification method includes: a second device sends a second random number to a third device, wherein the first vehicle carries the first device and the first set, and the second device and the The third device belongs to the first set, and the first device communicates with the third device through the second device; the second device receives third verification information from the third device, and the The third verification information is generated based on the identity information of the third device and the second random number; the second device determines the third device based on the second random number and the third verification information The authentication of is successful.
  • the method of the second aspect may be executed by a second device, and the second device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
  • the communication device is an in-vehicle device.
  • the first set includes the second device and the third device.
  • the first device can perform identity verification on the second device, and the second device can perform identity verification on the third device.
  • the embodiment of the present application Provides a mechanism for level verification. Devices at one level only need to verify the devices at the next level. Through the progressive verification methods, the identity verification results are more reliable. Moreover, in this way, all levels of vehicle-mounted devices can be authenticated, and for each level of vehicle-mounted devices, the number of devices that need to be verified is relatively small, which helps to reduce the burden on the devices.
  • the second device determines that the identity verification of the third device is successful according to the second random number and the third verification information, including : The second device generates fifth verification information according to the second random number and the identity information of the third device; the second device determines according to the fifth verification information and the third verification information The identity verification of the third device is successful.
  • the second device can generate the verification information in the same way as the third device generates the third verification information, for example, it is called the fifth verification information
  • the third device may also send the identity information of the third device to the second device in advance, and the second device may also generate the fifth verification information in the same manner as the third device generates the third verification information.
  • the third verification information and the fifth verification information it can be determined whether the identity of the third device is successfully verified.
  • the second device and the third device use the same method to generate verification information, and the second device performs verification. If the third device is a successful identity verification device, the third verification information generated by the third device should be the same as that generated by the second device.
  • the fifth verification information of is consistent, and if the third device is maliciously replaced, the third verification information generated by the third device may have a problem, and it will be inconsistent with the fifth verification information. Therefore, in this way, it can be determined whether the identity of the third device is successfully verified.
  • the second device determines that the identity verification of the third device is successful according to the fifth verification information and the third verification information, including : The second device determines whether the fifth verification information is consistent with the third verification information; when the fifth verification information is consistent with the third verification information, the first device determines the third verification information The authentication of the device is successful.
  • the second device can compare whether the third verification information is consistent with the fifth verification information. If the third verification information is consistent with the fifth verification information, the second device has successfully verified the identity of the third device, or in other words, the second device determines the first The identity verification of the three devices succeeds, or if the third verification information and the fifth verification information are inconsistent, the identity verification of the third device by the second device is unsuccessful, or in other words, the second device determines that the identity verification of the third device fails.
  • the second device and the third device use the same method to generate verification information, and the second device performs verification. If the third device is maliciously replaced, the third verification information generated by the third device may have problems, and it will be The fifth verification information is inconsistent. Therefore, in this way, it can be determined whether the identity of the third device is successfully verified.
  • the second device determines that the identity verification of the third device is successful according to the fifth verification information and the third verification information, including:
  • the second device aggregates a plurality of the fifth verification information to obtain sixth verification information, and aggregates a plurality of the third verification information to obtain seventh verification information;
  • the second device determines whether the sixth verification information and the seventh verification information are consistent
  • the second device determines that the identity verification of multiple third devices is successful.
  • the second device can aggregate multiple fifth verification information to obtain sixth verification information, and aggregate multiple third verification information to obtain seventh verification information.
  • the verification information and the seventh verification information can determine whether the identities of multiple third devices are successfully verified. In this way, the second device does not need to compare the fifth verification information and the third verification information one by one, and only needs to compare the identity of multiple third devices to determine whether the identity verification is successful. This reduces the comparison process and reduces The burden of the second device also improves the execution efficiency of the second device.
  • the method further includes: the second device according to the identity information of the second device and the first random number from the first device Generate first verification information; the second device sends a first message to the first device, the first message includes the first verification information, and the first verification information is used to verify the second The identity of the device is verified.
  • the first device In addition to verifying the third device for the second device, the first device also needs to verify the identity of the second device. Therefore, the second device can generate the first verification information according to the identity information of the second device and the first random number. After the first device obtains the first verification information, it can verify whether the identity of the second device is successfully verified according to the first verification information. It is equivalent to that the first device verifies the identity of the second device, and the second device verifies the identity of the third device, forming a hierarchical verification mechanism.
  • the first message further includes the third verification information
  • the third verification information is the third verification that the second device fails to verify.
  • Information, or, the third verification information is third verification information that the second device is successfully verified.
  • the first message may also include N third verification information.
  • the N third verification information may be generated by N third devices included in the first set.
  • the three devices may be all or part of the third devices included in the first set, and N is a positive integer.
  • the second device may also send the third verification information generated by all the third devices included in the first set to the first device, then N third verification information is sent to the first device.
  • the device includes all third devices in the first set. In this way, the first device can obtain more information, and when the identity verification of the third device is required, the identity verification of any third device included in the first set can be performed.
  • the third device is one of the N third devices, and the third device may be the third device for which the second device has successfully authenticated, or it may be the second device. The third device that failed the authentication.
  • the second device may also send the third verification information generated by the third device that failed the verification of the second device to the first device, then N third devices It may include all the third devices or part of the third devices in the first set.
  • the first message only needs to carry the third verification information generated by the third device that failed the verification of the second device, and does not need to carry the third verification information generated by all the third devices in the first set, which helps to save signaling overhead.
  • the third device whose second device is successfully verified, it is possible that the first device does not need to be verified again, so the impact on the verification reliability is not large.
  • the third device is one of N third devices, and the third device is a third device whose identity verification by the second device fails.
  • the length of the second random number is the same as the length of the first random number and the content is different, or the second random number is The first random number and the third random number are spliced together, or, the second random number is the same as the first random number.
  • the second random number may be determined based on the first random number.
  • determining the second random number according to the first random number may mean that the length of the second random number is determined according to the first random number.
  • the length of the second random number can be the same as the first random number.
  • the content of the second random number can be the same as the first random number, that is, the first random number and the second random number are the same random number.
  • the content of the second random number may also be different from the first random number, that is, the second random number and the first random number are two random numbers with the same length but different contents.
  • the secondary authentication node selects the third random number.
  • the second random number can be a random number obtained by concatenating the first random number and the third random number (or called splicing).
  • the length of the second random number is The sum of the length of the first random number and the length of the third random number.
  • the first random number and the third random number are cascaded, for example, after the first digit of the third random number is spliced to the last digit of the first random number, the second random number is obtained, or the first digit of the first random number is spliced to the first random number. After the last digit of the three random numbers, the second random number is obtained.
  • the second random number can also be obtained in other ways.
  • the length of the second random number is different from the length of the first random number, and the second random number is not obtained by concatenating the first random number and the third random number. and many more.
  • a third identity verification method includes: a second device sends a first random number to a third device, wherein the first vehicle carries a first set, and the first set includes the second device And the third device, the first vehicle also carries a first device, and the first device communicates with the third device through the second device; the second device receives information from the third device The third verification information, the third verification information is generated based on the first random number and the identity information of the third device; the second device obtains the fourth verification information based on the third verification information, so The fourth verification information is used to verify whether the identity of the third device is successfully verified; the second device sends the fourth verification information to the first device.
  • the method of the third aspect may be executed by a third device, and the third device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
  • the communication device is an in-vehicle device.
  • the first set includes a second device and a third device.
  • the second device can process the third verification information generated by the third device to obtain the fourth verification information.
  • the information verifies whether the identity of the third device is successfully verified.
  • the second device obtains the fourth verification information according to the third verification information, which is equivalent to A plurality of third verification information obtains one fourth verification information, which reduces the number of verification information and helps to save signaling overhead.
  • the second device does not need to verify the third device, and the first device only needs to verify, which reduces the burden on the second device.
  • the method further includes: the second device generates first verification information according to the identity information of the second device and the first random number The first verification information is used to verify whether the identity of the second device is successfully verified; the second device sends the first verification information to the first device.
  • the second device may also send the first verification information for verifying the identity of the second device to the first device.
  • the first device can also verify the identity of the second device, so that each device carried by the first vehicle can be verified, which improves the device carried by the first vehicle. Security.
  • the number of the third device is multiple, and correspondingly, the number of the third verification information is multiple, and the second The device obtaining fourth verification information according to the third verification information includes: the second device aggregates a plurality of the third verification information to obtain the fourth verification information.
  • the second device may aggregate multiple third verification information from multiple third devices to obtain fourth verification information, and send the fourth verification information to the first device.
  • an aggregation method is to combine multiple third verification information.
  • the information is XORed to obtain the fourth verification information.
  • other aggregation methods are also possible.
  • the fourth verification information obtained in this way has a small amount of information compared to multiple third verification information, and the second device only needs to send the fourth verification information without sending multiple third verification information, which is helpful for saving Signaling overhead.
  • the method further includes: the second device receiving a second message from the first device, the second message being used to request to obtain Multiple pieces of verification information corresponding to the third device; the second device sends a third message to the first device, and the third message includes multiple pieces of the third verification information.
  • the fourth verification information is obtained by aggregating multiple third verification information, if the first device determines that the identity verification of multiple third devices has failed according to the fourth verification information, it is only considered that there are multiple third devices in general.
  • a communication device is provided, for example, the communication device is the first device as described above.
  • the communication device is configured to execute the foregoing first aspect or any possible implementation of the first aspect method.
  • the communication device may include a module for executing the method in the first aspect or any possible implementation of the first aspect, for example, including a processing module and a transceiver module.
  • the transceiver module may refer to a functional module, which can complete the function of receiving information as well as the function of sending information.
  • the transceiver module may be a collective term for the sending module and the receiving module.
  • the sending module is used to complete the function of sending information
  • the receiving module is used to complete the function of receiving information.
  • the communication device is a vehicle-mounted device. among them,
  • the transceiver module is configured to send a first random number to a second device, where the first vehicle carries the first device and the first set, the second device belongs to the first set, and the first set It further includes a third device, and the first device communicates with the third device through the second device;
  • the transceiver module is further configured to receive a first message from the second device, the first message including first verification information, and the first verification information is used to verify the identity of the second device, The first verification information is generated based on the identity information of the second device and the first random number;
  • the processing module is configured to determine that the identity verification of the second device is successful according to the first verification information and the first random number.
  • the processing module is configured to determine the identity of the second device according to the first verification information and the first random number in the following manner Successful verification:
  • the first message further includes fourth verification information, and the fourth verification information is used to indicate whether the identity verification of the third device is successful
  • the processing module is used to generate second verification information according to the identity information of the second device and the first random number in the following manner:
  • the second verification information is generated according to the identity information of the second device, the fourth verification information, and the first random number.
  • the first message further includes third verification information generated by the third device, wherein the third verification information is the first Obtained by the three devices based on the identity information of the third device.
  • the first message further includes fourth verification information
  • the fourth verification information is used to indicate whether the identity verification of the third device is successful
  • the processing module is further configured to, after determining that the identity verification of the second device succeeds, when the fourth verification information indicates that the identity verification of the third device fails, perform according to the third verification information Verification to determine whether the identity of the third device is successfully verified.
  • the first message further includes fourth verification information
  • the transceiver module is further configured to send a second message to the second device when the fourth verification information is used to indicate that the identity verification of the third device is unsuccessful, and the second message is used to request to obtain Verification information corresponding to the third device;
  • the transceiver module is further configured to receive a third message from the second device, the third message including third verification information corresponding to the third device;
  • the processing module is further configured to perform verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the transceiver module is further configured to send a second message to the second device when the processing module determines that the identity verification of the second device fails, and the second message is used to request to obtain the third device Corresponding verification information;
  • the transceiver module is further configured to receive a third message from the second device, the third message including third verification information corresponding to the third device;
  • the processing module is further configured to perform verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the first message further includes fourth verification information
  • the fourth verification information is Obtained by aggregating a plurality of third verification information from a plurality of the third devices; the processing module is further configured to perform verification according to the fourth verification information to determine whether the identities of the plurality of third devices are verified success.
  • the transceiver module is further configured to send a second message to the second device when the processing module determines that the identity verification of a plurality of the third devices fails according to the fourth verification information, and the second message Used to request multiple verification information corresponding to the third device;
  • the transceiver module is further configured to receive a third message from the second device, the third message including a plurality of the third verification information;
  • the processing module is further configured to perform verification according to a plurality of the third verification information to determine whether the identity of each of the plurality of third devices is successfully verified.
  • a communication device is provided, for example, the communication device is the second device as described above.
  • the communication device is configured to execute the foregoing second aspect or any possible implementation of the second aspect.
  • the communication device may include a module for executing the second aspect or the method in any possible implementation manner of the second aspect, for example, including a processing module and a transceiver module.
  • the transceiver module may refer to a functional module, which can complete the function of receiving information as well as the function of sending information.
  • the transceiver module may be a collective term for the sending module and the receiving module.
  • the sending module is used to complete the function of sending information
  • the receiving module is used to complete the function of receiving information.
  • the communication device is a vehicle-mounted device. among them,
  • the transceiver module is configured to send a second random number to a third device, where the first vehicle carries the first device and the first set, the second device and the third device belong to the first set, so The first device communicates with the third device through the second device;
  • the transceiver module is further configured to receive third verification information from the third device, where the third verification information is generated based on the identity information of the third device and the second random number;
  • the processing module is configured to determine that the identity verification of the third device is successful according to the second random number and the third verification information.
  • the processing module is configured to determine the identity of the third device according to the second random number and the third verification information in the following manner Successful verification:
  • the fifth verification information and the third verification information it is determined that the identity verification of the third device is successful.
  • the processing module is configured to determine the identity of the third device according to the fifth verification information and the third verification information in the following manner Successful verification:
  • the processing module is configured to determine that the identity verification of the third device is successful according to the fifth verification information and the third verification information in the following manner:
  • the processing module is further configured to generate first verification information according to the identity information of the second device and the first random number from the first device;
  • the transceiver module is further configured to send a first message to the first device, the first message including the first verification information, wherein the first verification information is used to verify the identity of the second device authenticating.
  • the first message further includes the third verification information
  • the third verification information is the third verification that the second device fails to verify Information, or, the third verification information is third verification information that the second device is successfully verified.
  • the length of the second random number is the same as the length of the first random number and the content is different, or the second random number is The first random number and the third random number are spliced together, or, the second random number is the same as the first random number.
  • a communication device is provided, for example, the communication device is the second device as described above.
  • the communication device is configured to execute the foregoing third aspect or the method in any possible implementation manner of the third aspect.
  • the communication device may include a module for executing the third aspect or the method in any possible implementation manner of the third aspect, for example, including a processing module and a transceiver module.
  • the transceiver module may refer to a functional module, which can complete the function of receiving information as well as the function of sending information.
  • the transceiver module may be a collective term for the sending module and the receiving module.
  • the sending module is used to complete the function of sending information
  • the receiving module is used to complete the function of receiving information.
  • the communication device is a vehicle-mounted device. among them,
  • the transceiver module is configured to send a first random number to a third device, wherein the first vehicle carries a first set, the first set includes the second device and the third device, and the first vehicle It also carries a first device, and the first device communicates with the third device through the second device;
  • the transceiver module is further configured to receive third verification information from the third device, where the third verification information is generated based on the first random number and the identity information of the third device;
  • the processing module is configured to obtain fourth verification information according to the third verification information, where the fourth verification information is used to verify whether the identity of the third device is successfully verified;
  • the transceiver module is further configured to send the fourth verification information to the first device.
  • the transceiver module is further configured to generate first verification information based on the identity information of the second device and the first random number, where the first verification information is used to verify whether the identity of the second device is successfully verified;
  • the processing module is further configured to send the first verification information to the first device.
  • the number of the third device is multiple, and correspondingly, the number of the third verification information is multiple, and the processing module It is used to obtain fourth verification information according to the third verification information in the following manner:
  • the transceiver module is further configured to:
  • a third message is sent to the first device, where the third message includes a plurality of the third verification information.
  • a communication device is provided.
  • the communication device is, for example, the first device as described above.
  • the communication device includes a processor and a transceiver, and the processor and the transceiver are used to implement the foregoing first aspect or the methods described in various possible designs of the first aspect.
  • the communication device is a chip provided in a communication device.
  • the transceiver is realized by, for example, an antenna, a feeder, a codec in the communication device, or if the communication device is a chip set in the communication device, the transceiver is, for example, a communication interface in the chip. Connect with the radio frequency transceiving component in the communication equipment, so as to realize the sending and receiving of information through the radio frequency transceiving component.
  • the communication device is a vehicle-mounted device. among them,
  • the transceiver is configured to send a first random number to a second device, where the first vehicle carries the first device and the first set, the second device belongs to the first set, and the first set It further includes a third device, and the first device communicates with the third device through the second device;
  • the transceiver is further configured to receive a first message from the second device, the first message including first verification information, and the first verification information is used to verify the identity of the second device, The first verification information is generated based on the identity information of the second device and the first random number;
  • the processor is configured to determine that the identity verification of the second device is successful according to the first verification information and the first random number.
  • the processor is configured to determine the identity verification of the second device according to the first verification information and the first random number in the following manner success:
  • the first message further includes fourth verification information, and the fourth verification information is used to indicate whether the identity verification of the third device is successful
  • the processor is configured to generate second verification information according to the identity information of the second device and the first random number in the following manner:
  • the second verification information is generated according to the identity information of the second device, the fourth verification information, and the first random number.
  • the first message further includes third verification information generated by the third device, wherein the third verification information is the first Obtained by the three devices based on the identity information of the third device.
  • the first message further includes fourth verification information
  • the fourth verification information is used to indicate whether the identity verification of the third device is successful
  • the processor is further configured to, after determining that the identity verification of the second device succeeds, when the fourth verification information indicates that the identity verification of the third device fails, perform according to the third verification information Verification to determine whether the identity of the third device is successfully verified.
  • the first message further includes fourth verification information
  • the transceiver is further configured to send a second message to the second device when the fourth verification information is used to indicate that the identity verification of the third device is unsuccessful, and the second message is used to request to obtain Verification information corresponding to the third device;
  • the transceiver is further configured to receive a third message from the second device, where the third message includes third verification information corresponding to the third device;
  • the processor is further configured to perform verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the transceiver is further configured to send a second message to the second device when the processing module determines that the identity verification of the second device fails, and the second message is used to request to obtain the third device Corresponding verification information;
  • the transceiver is further configured to receive a third message from the second device, where the third message includes third verification information corresponding to the third device;
  • the processor is further configured to perform verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the first message further includes fourth verification information
  • the fourth verification information is Obtained by aggregating a plurality of third verification information from a plurality of the third devices; the processor is further configured to perform verification according to the fourth verification information to determine whether the identities of the plurality of third devices are verified success.
  • the transceiver is further configured to send a second message to the second device when the processing module determines that the identity verification of a plurality of the third devices fails according to the fourth verification information, and the second message Used to request multiple verification information corresponding to the third device;
  • the transceiver is further configured to receive a third message from the second device, where the third message includes a plurality of the third verification information;
  • the processor is further configured to perform verification according to a plurality of the third verification information to determine whether the identity of each of the plurality of third devices is successfully verified.
  • a communication device is provided.
  • the communication device is, for example, the second device as described above.
  • the communication device includes a processor and a transceiver, and the processor and the transceiver are used to implement the foregoing second aspect or the methods described in various possible designs of the second aspect.
  • the communication device is a chip provided in a communication device.
  • the transceiver is realized by, for example, an antenna, a feeder, a codec in the communication device, or if the communication device is a chip set in the communication device, the transceiver is, for example, a communication interface in the chip. Connect with the radio frequency transceiving component in the communication equipment, so as to realize the sending and receiving of information through the radio frequency transceiving component.
  • the communication device is a vehicle-mounted device. among them,
  • the transceiver is configured to send a second random number to a third device, where the first vehicle carries the first device and the first set, the second device and the third device belong to the first set, so The first device communicates with the third device through the second device;
  • the transceiver is further configured to receive third verification information from the third device, where the third verification information is generated based on the identity information of the third device and the second random number;
  • the processor is configured to determine that the identity verification of the third device is successful according to the second random number and the third verification information.
  • the processor is configured to determine the identity verification of the third device according to the second random number and the third verification information in the following manner success:
  • the fifth verification information and the third verification information it is determined that the identity verification of the third device is successful.
  • the processor is configured to determine the identity verification of the third device according to the fifth verification information and the third verification information in the following manner success:
  • the processor is configured to determine that the identity verification of the third device is successful according to the fifth verification information and the third verification information in the following manner:
  • the processor is further configured to generate first verification information according to the identity information of the second device and the first random number from the first device;
  • the transceiver is further configured to send a first message to the first device, the first message including the first verification information, wherein the first verification information is used to verify the identity of the second device authenticating.
  • the first message further includes the third verification information
  • the third verification information is the third verification that the second device fails to verify Information
  • the third verification information is third verification information that the second device is successfully verified.
  • the length of the second random number is the same as the length of the first random number and the content is different, or the second random number is The first random number and the third random number are spliced together, or, the second random number is the same as the first random number.
  • a communication device is provided.
  • the communication device is, for example, the second device as described above.
  • the communication device includes a processor and a transceiver, and the processor and the transceiver are used to implement the methods described in the third aspect or various possible designs of the third aspect.
  • the communication device is a chip provided in a communication device.
  • the transceiver is realized by, for example, an antenna, a feeder, a codec in the communication device, or if the communication device is a chip set in the communication device, the transceiver is, for example, a communication interface in the chip.
  • the communication device is a vehicle-mounted device. among them,
  • the transceiver is configured to send a first random number to a third device, where the first vehicle carries a first set, the first set includes the second device and the third device, and the first vehicle It also carries a first device, and the first device communicates with the third device through the second device;
  • the transceiver is further configured to receive third verification information from the third device, where the third verification information is generated based on the first random number and the identity information of the third device;
  • the processor is configured to obtain fourth verification information according to the third verification information, where the fourth verification information is used to verify whether the identity of the third device is successfully verified;
  • the transceiver is also configured to send the fourth verification information to the first device.
  • the transceiver is further configured to generate first verification information according to the identity information of the second device and the first random number, where the first verification information is used to verify whether the identity of the second device is successfully verified;
  • the processor is further configured to send the first verification information to the first device.
  • the number of the third device is multiple, and correspondingly, the number of the third verification information is multiple, and the processor uses Yu obtains the fourth verification information according to the third verification information in the following manner:
  • the transceiver is further used for:
  • a third message is sent to the first device, where the third message includes a plurality of the third verification information.
  • a communication device may be the first device in the above method design.
  • the communication device is a chip provided in a communication device.
  • the communication device is an in-vehicle device.
  • the communication device includes: a memory for storing computer executable program codes; and a processor, which is coupled with the memory.
  • the program code stored in the memory includes instructions, and when the processor executes the instructions, the communication device is caused to execute the foregoing first aspect or the method in any one of the possible implementation manners of the first aspect.
  • the communication device may also include a communication interface, and the communication interface may be a transceiver in the communication device, for example, implemented by the antenna, feeder, and codec in the communication device, or if the communication device is a set In a chip in a communication device, the communication interface may be an input/output interface of the chip, such as input/output pins.
  • the communication interface may be a transceiver in the communication device, for example, implemented by the antenna, feeder, and codec in the communication device, or if the communication device is a set In a chip in a communication device, the communication interface may be an input/output interface of the chip, such as input/output pins.
  • a communication device is provided.
  • the communication device may be the second device in the above method design.
  • the communication device is a chip provided in a communication device.
  • the communication device is an in-vehicle device.
  • the communication device includes: a memory for storing computer executable program codes; and a processor, which is coupled with the memory.
  • the program code stored in the memory includes instructions, and when the processor executes the instructions, the communication device is caused to execute the foregoing second aspect or the method in any one of the possible implementation manners of the second aspect.
  • the communication device may also include a communication interface, and the communication interface may be a transceiver in the communication device, for example, implemented by the antenna, feeder, and codec in the communication device, or if the communication device is a set In the chip of the communication device, the communication interface may be the input/output interface of the chip, such as input/output pins.
  • the communication interface may be a transceiver in the communication device, for example, implemented by the antenna, feeder, and codec in the communication device, or if the communication device is a set In the chip of the communication device, the communication interface may be the input/output interface of the chip, such as input/output pins.
  • a communication device is provided.
  • the communication device may be the third device in the above method design.
  • the communication device is a chip provided in a communication device.
  • the communication device is an in-vehicle device.
  • the communication device includes: a memory for storing computer executable program codes; and a processor, which is coupled with the memory.
  • the program code stored in the memory includes instructions, and when the processor executes the instructions, the communication device is caused to execute the foregoing third aspect or the method in any one of the possible implementation manners of the third aspect.
  • the communication device may also include a communication interface, and the communication interface may be a transceiver in the communication device, for example, implemented by the antenna, feeder, and codec in the communication device, or if the communication device is a set In a chip in a communication device, the communication interface may be an input/output interface of the chip, such as input/output pins.
  • the communication interface may be a transceiver in the communication device, for example, implemented by the antenna, feeder, and codec in the communication device, or if the communication device is a set In a chip in a communication device, the communication interface may be an input/output interface of the chip, such as input/output pins.
  • a first communication system which includes the communication device according to the fourth aspect, the communication device according to the seventh or fourth aspect, or the communication device according to the tenth aspect, and includes the fifth aspect The communication device, the communication device according to the eighth aspect, or the communication device according to the eleventh aspect.
  • a second communication system which includes the communication device according to the fourth aspect, the communication device according to the seventh and fourth aspects, or the communication device according to the tenth aspect, and includes the sixth aspect The communication device, the communication device according to the ninth aspect, or the communication device according to the twelfth aspect.
  • the first type of communication system and the second type of communication system may be the same communication system, or they may be different communication systems.
  • a computer storage medium is provided.
  • the computer-readable storage medium is used to store a computer program.
  • the computer program runs on a computer, the computer executes the first aspect or the first aspect described above. The method described in any one of the possible implementations.
  • a computer storage medium is provided.
  • the computer-readable storage medium is used to store a computer program.
  • the computer program runs on a computer, the computer executes the above-mentioned second aspect or the first aspect.
  • a computer storage medium is provided, the computer-readable storage medium is used to store a computer program, and when the computer program runs on a computer, the computer executes the third aspect or the third aspect described above.
  • a computer program product containing instructions is provided, the computer program product is used to store a computer program, and when the computer program runs on a computer, the computer executes the first aspect or the first aspect.
  • a computer program product containing instructions is provided, the computer program product is used to store a computer program, and when the computer program runs on a computer, the computer executes the second aspect or the first aspect.
  • a computer program product containing instructions is provided.
  • the computer program product is used to store a computer program.
  • the computer program runs on a computer, the computer executes the third aspect or the third aspect.
  • device 1 can consider that the identity of device 2 is legal, and if the identity verification of device 1 to device 2 is unsuccessful (or, the identity verification Failure), then device 1 can consider that the identity of device 2 is illegal.
  • the first device may consider the identity of the second device to be legal, and if the identity verification of the second device by the first device is unsuccessful (or, the identity verification fails) , The first device can consider the identity of the second device to be illegal.
  • the embodiment of the present application provides a level verification mechanism, which can verify each device carried by the vehicle, and the level verification can ensure as high verification reliability as possible. And for each level of devices, the number of devices that need to be verified is small, which helps to reduce the burden on the equipment.
  • FIG. 1 is a schematic diagram of a network architecture applied by an embodiment of this application
  • Figure 2 is a flowchart of the first identity verification method provided by an embodiment of the application.
  • FIG. 3 is a flowchart of an example of the first identity verification method provided by an embodiment of the application.
  • FIG. 4 is a flowchart of an example of the first identity verification method provided by an embodiment of the application.
  • FIG. 5 is a flowchart of an example of the first identity verification method provided by an embodiment of the application.
  • FIG. 6 is a flowchart of a method for performing identity authentication on a master authentication node according to an embodiment of the application
  • FIG. 7 is a flowchart of a second identity verification method provided by an embodiment of the application.
  • FIG. 8 is a flowchart of an example of a second identity verification method provided by an embodiment of this application.
  • FIG. 9 is a schematic block diagram of a first type of first device provided by an embodiment of this application.
  • FIG. 10 is another schematic block diagram of the first device of the first type according to an embodiment of this application.
  • FIG. 11 is a schematic block diagram of a first type of second device according to an embodiment of this application.
  • FIG. 12 is another schematic block diagram of the first type of second device according to an embodiment of this application.
  • FIG. 13 is a schematic block diagram of a second type of second device provided by an embodiment of this application.
  • FIG. 14 is another schematic block diagram of a second type of second device according to an embodiment of this application.
  • FIG. 15 is a schematic block diagram of a communication device provided by an embodiment of the application.
  • FIG. 16 is another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 17 is still another schematic block diagram of the communication device provided by an embodiment of the application.
  • Vehicle-mounted equipment equipment placed or installed on the vehicle can be regarded as vehicle-mounted equipment.
  • vehicle-mounted equipment For example, for vehicles that can perform autonomous driving functions, they generally rely on ADAS systems to provide information to make driving decisions.
  • ADAS includes many sensors, such as cameras, millimeter wave radar, ultrasonic radar, or LiDAR, etc., which can all be considered as vehicle-mounted devices.
  • the in-vehicle network of a car may include multiple electronic control units (ECUs), and these ECUs can all be considered as on-board equipment.
  • an on-board equipment is an on-board unit (OBU), which is generally installed on a vehicle.
  • OBU on-board unit
  • ETC electronic toll collection
  • RSU roadside unit
  • OBU can communicate with RSU, for example, it can communicate through microwave.
  • the OBU and RSU can use microwave to communicate.
  • the OBU uses dedicated short-range communications (DSRC) technology to establish a microwave communication link with the RSU, which can realize vehicle identification or electronic Deduction and other processes.
  • DSRC dedicated short-range communications
  • various terminal devices described below if they are located on a vehicle (for example, placed in a vehicle or installed in a vehicle), they can all be regarded as vehicle-mounted terminal devices, or called vehicle-mounted devices.
  • Terminal devices include devices that provide users with voice and/or data connectivity. For example, they may include handheld devices with a wireless connection function or processing devices connected to a wireless modem.
  • the terminal device can communicate with the core network via a radio access network (RAN), and exchange voice and/or data with the RAN.
  • RAN radio access network
  • the terminal equipment may include user equipment (UE), wireless terminal equipment, mobile terminal equipment, device-to-device communication (device-to-device, D2D) terminal equipment, V2X terminal equipment, machine-to-machine/machine-type communication ( machine-to-machine/machine-type communications, M2M/MTC) terminal equipment, Internet of things (IoT) terminal equipment, subscriber unit (subscriber unit), subscriber station (subscriber station), mobile station (mobile station) , Remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user agent (user agent), or user equipment (user device) and so on.
  • IoT Internet of things
  • it may include mobile phones (or “cellular” phones), computers with mobile terminal equipment, portable, pocket-sized, hand-held, mobile devices with built-in computers, and so on.
  • PCS personal communication service
  • PCS cordless phones
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
  • RFID radio frequency identification
  • GPS global positioning system
  • laser scanners and other information sensing equipment.
  • the in-vehicle device placed or installed on the vehicle may also include a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • At least one means one or more, and “plurality” means two or more.
  • “And/or” describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
  • "The following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • at least one item (a) of a, b, or c can mean: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • first and second are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or order of multiple objects. Importance.
  • first message and the second message are only for distinguishing different messages, but do not indicate the difference in priority, sending order, or importance of the two messages.
  • ADAS advanced driver-assistance systems
  • sensors such as cameras, Millimeter wave radar, ultrasonic radar or optical radar (LiDAR), etc., these sensors are all on-board equipment.
  • LiDAR optical radar
  • ADAS sensors are generally located outside the car and are more likely to be stolen or replaced. Even the on-board equipment located in the car may be replaced during maintenance or repair.
  • Fake in-vehicle equipment will affect the performance of the vehicle and may even affect driving safety. From the perspective of information security, fake and inferior in-vehicle equipment will introduce system weaknesses and risks. Therefore, it is very important to ensure the authenticity and regularity of on-board equipment. However, there is currently no more reliable method for the verification of on-board equipment.
  • the first set includes the second device and the third device, and the first device verifies the second device.
  • the third device for example, the second device can verify. All vehicle-mounted devices can perform identity verification, and for each level of vehicle-mounted devices, the number of devices that need to be verified is relatively small, which helps to reduce the burden on devices.
  • FIG. 1 is a network architecture applied in the embodiment of this application.
  • Figure 1 shows all the on-board equipment or part of the on-board equipment included in a vehicle. These vehicle-mounted devices can be divided into several domains. Each domain includes one or more vehicle-mounted devices. Each domain has a domain manager (DM). For example, ADAS sensors form a domain, and its domain management The member is a mobile data center (mobile data center, MDC). In addition, Figure 1 also includes 4 domain administrators, DM1, DM2, DM3, and DM4. These 4 domain administrators correspond to 4 domains. The vehicle-mounted devices in these 4 domains are all ECUs. The devices in the domain communicate with the gateway (gateway) through the DM.
  • DM domain manager
  • the domain administrator can be considered as a secondary node, and the domain administrators are all connected to the gateway, and the gateway can be considered as the primary node.
  • the secondary node may be referred to as the secondary authentication node
  • the primary node may be referred to as the primary authentication node.
  • the domain can also be called a collection.
  • a vehicle it can generally include one primary authentication node and one or more secondary authentication nodes.
  • a set in addition to the secondary authentication node, it may also include one or more vehicle-mounted devices.
  • the device type of the domain administrator may be the same as the type of a device in the domain, or the device type of the domain administrator and the type of the device in the domain are both different.
  • FIG. 1 takes the gateway as the main-level node as an example. In fact, the main-level node is not limited to the gateway, and may also be other vehicle-mounted devices.
  • the in-vehicle device When dividing the in-vehicle device into multiple domains, there may be various dividing factors. For example, it can be divided according to the functions completed by the on-board equipment. For example, there are several vehicle-mounted devices used to coordinate to complete a certain function (for example, power function), and these vehicle-mounted devices can be divided into one domain. Or you can divide different domains according to other factors. Regarding the domain administrator, for example, a vehicle-mounted device in the domain is randomly selected as the domain administrator, or a vehicle-mounted device with an overall management function in the domain may also be selected as the domain administrator.
  • the embodiment of the present application provides a first identity verification method. Please refer to FIG. 2 which is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 1 is taken as an example.
  • the method can be executed by three communication devices (or, three communication devices), which are, for example, the first communication device, the second communication device, and the third communication device.
  • the first communication device, the second communication device, or the third communication device may be a vehicle-mounted device or a communication device (such as a chip system) capable of supporting the vehicle-mounted device to implement the functions required by the method, and of course, may also be other communication devices.
  • the first communication device, the second communication device, and the third communication device there are no restrictions on the implementation of the first communication device, the second communication device, and the third communication device.
  • the three communication devices can be implemented in the same form, for example, all can be implemented in the form of equipment, or the three communication devices can be implemented in the same form.
  • the device can also be implemented in different forms, for example, the first communication device is implemented in the form of equipment, the second communication device is implemented in the form of a chip system, and the third communication device is implemented in the form of equipment, and so on.
  • the method is executed by the first device, the second device, and the third device as an example, that is, it is assumed that the first communication device is the first device, the second communication device is the second device, and the second communication device is the second device.
  • the third communication device is an example of the third device.
  • the first device described below may be the master authentication node in the network architecture shown in FIG. 1 (for example, the gateway in FIG. 1 )
  • the second device described below may be a secondary authentication node in the network architecture shown in FIG. 1 (for example, the DM or MDC in FIG. 1)
  • the third device described below may be the secondary authentication node shown in FIG.
  • the devices in the domain of the network architecture.
  • the primary authentication node sends a first random number to the secondary authentication node, and the secondary authentication node receives the first random number from the primary authentication node.
  • the first device and the second device are carried in a first vehicle, and the first vehicle may carry the first device and at least one set, and each set in the at least one set may include one or more devices.
  • Each of these sets may include a device as a secondary authentication node.
  • the first set is a set of at least one set
  • the first set includes the second device and the third device
  • the second device is the secondary authentication node in the first set.
  • the number of third devices may be one or more.
  • the first device may communicate with the third device included in the first set through the second device.
  • both the primary authentication node and the secondary authentication node are carried in the first vehicle.
  • the first vehicle also carries at least one set (or, referred to as at least one domain).
  • the authentication node (that is, the second device) is a secondary authentication node in the first set carried by the first vehicle, that is, the second device belongs to one set of at least one set, for example, referred to as the first set.
  • the first set also includes a third device (that is, an intra-domain device), and the third device included in the first set communicates with the first device through the second device.
  • the master authentication node can select a random number with a suitable length, for example, called the first random number, and the first random number can be represented by r.
  • the primary authentication node can send r to the secondary authentication node.
  • r can be used for subsequent authentication by the primary authentication node to the secondary authentication node.
  • the length of r can be determined according to the required authentication strength. For example, if the required authentication strength is 128 bits, the length of r can be 128 bits. Generally speaking, the stronger the authentication strength, the longer the length of r. However, the longer the length of r, the higher the complexity of the authentication process, so the length of r can be selected appropriately. Or the length of r can also be stipulated by agreement, etc., and there is no specific restriction.
  • the first vehicle includes multiple sets, and each set includes one secondary authentication node, then the first vehicle includes multiple secondary authentication nodes. Then the primary authentication node may send the first random number to all or part of the secondary authentication nodes included in the first vehicle. After different secondary authentication nodes receive the first random number, the operation modes can be similar. Therefore, the embodiment shown in FIG. 2 only takes the secondary authentication nodes included in the first set as an example.
  • the secondary authentication node sends a second random number to the devices in the domain in the first set, and the domain devices in the first set receive the second random number from the secondary authentication node.
  • the secondary authentication node can select a random number of suitable length, for example, called the second random number, and the second random number can be represented by r'.
  • the secondary authentication node can send r'to the devices in the domain in the first set.
  • the secondary authentication node can send r'by broadcast or multicast, and all the devices in the domain in the first set can receive r from the secondary authentication node. ', or, the secondary authentication node can also send r'in unicast mode.
  • the secondary authentication node can send r'to all the devices in the first set respectively, or the secondary authentication node can also only send r'
  • the devices in this part of the domain are, for example, devices in the domain that need to be authenticated. r'can be used to authenticate the devices in the domain by the secondary authentication node.
  • r'can be determined based on r.
  • determining r'according to r may mean that the length of r'is determined according to r.
  • the length of r'can be the same as r.
  • the content of r'can be the same as r, that is, r and r'are the same random number, or the content of r'can also be different from r, that is , R'and r are two random numbers with the same length but different contents.
  • r'to be determined based on r
  • part or all of the content of r'can be determined based on r.
  • the secondary authentication node selects a random number r", for example, r" is called the third random number.
  • the second random number r'can be a random number obtained by concatenating r and r" (or called splicing), and the length of r'is the sum of the length of r and the length of r".
  • Concatenate r and r for example, after splicing the first bit of r" to the last bit of r, get r', or concatenate the first bit of r to the last bit of r" to get r'.
  • r is 101010
  • R" is 11110011
  • r'can be 10101011110011
  • r'can also be 11110011101010.
  • the secondary authentication node may also determine r'according to other methods.
  • the determined r' may also have nothing to do with r, which is not specifically limited.
  • the device in the first domain obtains third verification information according to the identity information of the device in the first domain.
  • the device in the first domain is, for example, a device in the domain in the first set, that is, a third device.
  • the first set may include one intra-domain device or multiple intra-domain devices. If the first set includes a device in the domain, the device in the domain is the device in the first domain; or, if the first set includes multiple devices in the domain, for the device in the domain that receives the second random number in the first set, The processing methods after receiving the second random number are all similar, so only devices in the first domain are used for illustration here.
  • the identity information of the device in the domain includes, for example, the serial number of the device in the domain, or the identity number (ID) of the device in the domain, or may include other information that can uniquely identify the identity of the device in the domain.
  • the device in the first domain may obtain the third verification information according to the second random number, or according to the identity information of the device in the first domain Obtain the third verification information, or according to the second random number and the identity information of the device in the first domain Obtain the third verification information.
  • the third verification information may be a MAC value.
  • the devices in the first domain can be based on r'and Obtain the third verification information, for example, the third verification information is represented by s ij ,
  • the third verification information may also be a digital signature.
  • the devices in the domain in the first set store the private key in asymmetric encryption, and the devices in the first domain can The stored private key encrypts the second random number to obtain the third verification information, or the identity information of the device in the first domain according to the stored private key Encrypt to obtain the third verification information, or pair the second random number and the identity information of the device in the first domain according to the stored private key Encryption is performed to obtain the third verification information.
  • the private keys stored by the devices in the domain in the first set here can all be referred to as the first private key. If the first set includes multiple devices in the domain, the first private keys stored by the devices in different domains may be the same or different. .
  • the secondary authentication node generates fifth verification information according to the second random number and the identity information of the device in the first domain.
  • the first set includes one or more devices in the domain.
  • the secondary authentication node can send r'to all devices in the first set.
  • the secondary authentication node can use the second random number And the identity information of each domain device in the first set, respectively generating fifth verification information for each domain device in the first set.
  • the secondary authentication node can also only send r'to some of the devices in the first set.
  • This part of the devices in the domain is, for example, devices in the domain that need to perform identity verification.
  • the secondary authentication node can be According to the second random number and the identity information of the part of the domain device in the first set, the fifth verification information is generated for each domain device of the part of the domain device respectively.
  • the secondary authentication node can obtain at least one piece of fifth verification information according to the second random number and the identity information of at least one device in the domain.
  • the embodiment shown in FIG. 2 only takes the device in the first domain as an example.
  • the secondary authentication node may obtain the fifth verification information according to the second random number, or according to the identity information of the device in the first domain Obtain the fifth verification information, or according to the second random number and the identity information of the device in the first domain Obtain the fifth verification information.
  • the fifth verification information may be a MAC value.
  • the secondary authentication node can be based on r'and Obtain the fifth verification information, for example, the fifth verification information is represented by s′ ij ,
  • the fifth verification information may also be a digital signature.
  • the secondary authentication node stores the public key in asymmetric encryption, and the secondary authentication node can use the stored public key pair
  • the second random number is encrypted to obtain the fifth verification information, or the identity information of the device in the first domain according to the stored public key Encrypt to obtain the fifth verification information, or pair the second random number and the identity information of the device in the first domain according to the stored public key Encryption is performed to obtain the fifth verification information.
  • the public key stored by the secondary authentication node may be referred to as the first public key, and the first public key and the first private key may be a pair of asymmetric keys.
  • the secondary authentication node may obtain at least one fifth verification information according to the second random number and the identity information of at least one device in the domain. After obtaining the at least one fifth verification information, if the number of the at least one fifth verification information is greater than 1, then As an optional manner, the secondary authentication node may also aggregate at least one piece of fifth verification information to obtain sixth verification information.
  • the at least one fifth verification information obtained by the secondary authentication node is respectively represented as s′ i1 , s′ i2 , s′ i3 ,..., then the secondary authentication node aggregates at least one fifth verification information. Yes, Where s′′ ij represents the sixth verification information, Represents exclusive OR operation.
  • the secondary authentication node may also use other methods to aggregate at least one fifth verification information.
  • S203 may be executed before S204, or S203 may be executed after S204, or S203 and S204 may be executed simultaneously.
  • S205 The device in the first domain sends third verification information to the secondary authentication node, and the secondary authentication node receives the third verification information from the device in the first domain.
  • the secondary authentication node may send r'to all the devices in the domain in the first set, then in S205, it may be that all the devices in the domain in the first set send the third verification information to the secondary authentication node.
  • the secondary authentication node may also only send r'to some of the devices in the first set.
  • the devices in this part of the first set may send the third verification information to the secondary.
  • Authentication node In short, the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in the first set, and FIG. 2 only takes the device in the first domain as an example.
  • the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in the first set. After obtaining the at least one piece of third verification information, if the number of at least one piece of third verification information is greater than 1, it will be regarded as one In an optional manner, the secondary authentication node may also aggregate at least one piece of third verification information to obtain seventh verification information. For example, at least one piece of third verification information obtained by the secondary authentication node is respectively denoted as s i1 , s i2 , s i3 ,..., then the secondary authentication node aggregates at least one piece of third verification information.
  • One aggregation method may be: Where s′′′ ij represents the seventh verification information, Represents exclusive OR operation.
  • the secondary authentication node may also use other methods to aggregate at least one piece of third verification information. It should be noted that the manner in which the secondary authentication node aggregates at least one third verification information and the manner in which at least one fifth verification information is aggregated should be the same. For example, the secondary authentication node uses the XOR operation described above In this way, at least one third verification information is aggregated, and the secondary authentication node also needs to aggregate at least one fifth verification information by using the exclusive OR operation described above.
  • the secondary authentication node determines whether the identity of the device in the first domain is successfully verified according to the second random number and the third verification information.
  • the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in S205. Then, in S206, the secondary authentication node can perform verification based on the second random number and at least one piece of third verification information to determine at least Whether the identity verification of a device in a domain is successful. Because the verification process of the secondary authentication node is similar for each device in the domain, Figure 2 only takes the device in the first domain as an example.
  • the secondary authentication node has generated fifth verification information based on the second random number and the identity information of the device in the first domain. Then, in S206, the secondary authentication node can perform verification based on the fifth verification information and the third verification information. To determine whether the authentication of the device in the first domain is successful. In the various embodiments of the present application, for example, if the identity verification of the device 1 to the device 2 is successful, then the device 1 can consider the identity of the device 2 to be legal, and if the identity verification of the device 1 to the device 2 is unsuccessful (or, the identity If the verification fails), then the device 1 can consider the identity of the device 2 to be illegal.
  • the secondary authentication node can consider the identity of the device in the first domain to be legal, and if the secondary authentication node fails to verify the identity of the device in the first domain (or, the identity If the verification fails), the secondary authentication node may consider the identity of the device in the first domain to be illegal. For example, the secondary authentication node may compare the fifth verification information with the third verification information to determine whether the two are consistent. If the two are consistent, the secondary authentication node determines that the identity verification of the device in the first domain is successful, and if the two are inconsistent, the secondary authentication node determines that the identity verification of the device in the first domain has failed.
  • the secondary authentication node can compare s'ij and s ij to determine whether the two are consistent. If s'ij and s ij are the same, the secondary authentication node determines that the identity verification of the device in the first domain is successful, or if s'ij and s ij are different, the secondary authentication node determines that the identity verification of the device in the first domain fails. In this way, the secondary authentication node can respectively determine whether the identity of at least one device in the domain in the first set is successfully verified, and the determination granularity is finer.
  • the secondary authentication node can aggregate at least one third verification information to obtain the seventh verification information, and aggregate at least one fifth verification information to obtain the sixth verification information. Then, the secondary authentication node can aggregate at least one third verification information to obtain the sixth verification information. The second random number is verified with the third verification information.
  • the secondary verification node compares the sixth verification information with the seventh verification information to determine whether the sixth verification information and the seventh verification information are consistent. If the verification information is consistent with the seventh verification information, the secondary verification node determines that the identity verification of the at least one device in the domain is successful, or, if the sixth verification information and the seventh verification information are inconsistent, the secondary verification node determines the at least one The authentication of devices in the domain failed. In this way, the secondary authentication node only needs to determine whether the sixth verification information and the seventh verification information are consistent, and there is no need to separately determine whether the identity verification is successful for each device in the domain, which can reduce the workload of the secondary authentication node.
  • the secondary authentication node sends a first message to the primary authentication node, and the primary authentication node receives the first message from the secondary authentication node, where the first message includes the first verification information.
  • the first verification information can be used to verify the identity of the secondary authentication node.
  • the secondary authentication node may generate the first verification information according to the first random number and the identity information of the secondary authentication node.
  • the identity information of the secondary authentication node for example, includes the serial number of the secondary authentication node, or includes the identity number (ID) of the secondary authentication node, or may include other information that can uniquely identify the identity of the secondary authentication node.
  • the first verification information may also indicate that the identity verification of the devices in the domain included in the first set is successful or unsuccessful. Therefore, when generating the first verification information, the value of a tag (tag) can also be added. For example, the value of the tag can be "success" or "unsuccessful (or failure)".
  • the first verification information is used to indicate that the identity verification of the devices in the domain included in the first set is successful, and if the tag used to generate the first verification information is If the value is "unsuccessful", the first verification information is used to indicate that the identity verification of the devices in the domain included in the first set is unsuccessful.
  • the first verification information may indicate whether the identity verification of the devices in the domain included in the first set is successful.
  • the first set includes only one device in the domain in addition to the secondary authentication node, the first verification information may indicate whether the identity verification of the device in the domain is successful; or, the first set includes multiple devices in the domain in addition to the secondary authentication node , The first verification information may indicate whether the identity verification of the devices in the multiple domains is successful.
  • the secondary authentication node compares the fifth verification information corresponding to each of the at least one device in the domain with the third verification information corresponding to each of the devices in the domain to determine whether the identity of each of the at least one device in the domain is successfully verified. Then, if the secondary authentication node determines that the identity of at least one device in the domain is successfully verified, that is, the secondary authentication node compares the fifth verification information corresponding to each of the devices in the domain with the third verification information, and compares If the results are consistent, the secondary authentication node may generate the first verification information, and the first verification information at this time may indicate that the identity verification of the devices in the domain included in the first set is successful.
  • the secondary authentication node determines that at least one of the devices in the domain has only one device in the domain failed the identity verification, that is, the secondary authentication node will verify the fifth verification information and the third verification corresponding to each of the devices in the at least one domain. Information is compared. If at least one of the comparison results is inconsistent, the secondary authentication node can generate first verification information. At this time, the first verification information can indicate that the identity verification of the devices in the domain included in the first set is unsuccessful (or identity verification). failure).
  • the fifth verification information is s′ ij and the third verification information is s ij .
  • the secondary authentication node compares s ij and s′ ij in turn .
  • the secondary authentication node compares whether s i1 and s′ i1 are consistent, and compares s i2 with Whether s′ i2 is consistent, compare whether s i3 and s′ i3 are consistent, and so on.
  • the secondary node If it is determined ij of s and s 'ij of the comparison results are consistent, e.g., I1 s and s' are consistent i1, 'consistent i2, s i3 and s' s and I2 consistent s i3, and so on, the secondary node generates first authentication One verification information, the first verification information indicates that the identity verification of the devices in the domain included in the first set is successful.
  • the secondary authentication The node generates first verification information, and the first verification information indicates that the identity verification of the devices in the domain included in the first set is unsuccessful.
  • the secondary authentication node compares the sixth verification information with the seventh verification information to determine whether the identity verification of at least one device in the domain is successful, then if the secondary verification node determines that the identity of at least one device in the domain is verified successfully, In other words, the secondary authentication node compares the sixth verification information with the seventh verification information, and the result of the comparison is that the sixth verification information is consistent with the seventh verification information, and the secondary authentication node can generate the first verification information.
  • a piece of verification information indicates that the identity verification of the devices in the domain included in the first set is successful.
  • the secondary authentication node may generate the first verification information, and the first verification information at this time indicates that the identity verification of the devices in the domain included in the first set is unsuccessful (or the identity verification fails).
  • s'” ij represents the seventh verification information
  • s” ij represents the sixth verification information.
  • the secondary authentication node compares s'” ij and s” ij to determine whether the two are consistent. If the two are consistent, the secondary authentication node can generate first verification information, which is used to indicate that the identity verification of the devices in the domain included in the first set is successful, or if the two are inconsistent, the secondary authentication node can also generate the first verification information. Verification information. The first verification information at this time is used to indicate that the identity verification of the devices in the domain included in the first set is unsuccessful.
  • the first verification information may be a MAC value.
  • the secondary authentication node can be based on r,
  • tag occupies 1 bit, if the value of this bit is "1”, it means “success”, if the value of this bit is "0”, it means "unsuccessful", or the tag can also pass Other ways to express "success" or "unsuccess”.
  • the first verification information may also be a digital signature.
  • the secondary authentication node stores the private key in asymmetric encryption, and the secondary authentication node can use the stored private key pair r, Encrypt with tag to obtain the first verification information.
  • the private key stored by the secondary authentication node here may be called the first private key.
  • the primary authentication node determines whether the identity of the secondary authentication node is successfully verified according to the first verification information and the first random number.
  • the primary authentication node After the primary authentication node receives the first verification information, it can determine whether the identity of the secondary authentication node is successfully verified according to the first verification information and the first random number. Equivalently, the secondary authentication node can verify the devices in the domain, and the primary authentication node can verify the secondary authentication node, thereby forming a hierarchical verification mechanism. For example, if the primary authentication node successfully authenticates the secondary authentication node, then the primary authentication node can consider the identity of the secondary authentication node to be legal, and if the primary authentication node fails to verify the identity of the secondary authentication node (or, the identity verification fails) , The primary authentication node can think that the identity of the secondary authentication node is illegal.
  • the primary authentication node can generate the verification information in the same way as the secondary authentication node generates the first verification information, for example, it is called the second verification information
  • the identity information of the secondary authentication node may also be carried in the first message, and the primary authentication node may also generate the second verification information in the same manner as the secondary authentication node generates the first verification information.
  • the primary authentication node may generate the second authentication information according to the identity information of the secondary authentication node and the first random number. The primary authentication node can compare whether the second verification information is consistent with the first verification information.
  • the primary verification node has successfully verified the identity of the secondary verification node, or in other words, the primary verification node determines the secondary verification information.
  • the identity verification of the authentication node succeeds, or, if the second verification information is inconsistent with the first verification information, the primary authentication node fails the identity verification of the secondary authentication node, in other words, the primary authentication node determines that the identity verification of the secondary authentication node fails.
  • the secondary authentication node may send fourth authentication information in addition to the first authentication information to the primary authentication node. Indicate "success", or, if the secondary authentication node fails to verify the identity of the devices in the domain included in the first set, the secondary authentication node may send fourth verification information in addition to the first verification information to the primary authentication node, The fourth verification information indicates "unsuccessful".
  • the master authentication node when it generates the second verification information, it may also consider adding a tag.
  • the second authentication information is also a MAC value, or the first authentication information
  • the public key of the master authentication node may be referred to as the second public key
  • the second public key and the second private key may be a pair of asymmetric keys.
  • the verification results of the master authentication node can include several types, which are introduced separately below.
  • the primary authentication node determines that the identity verification of the secondary authentication node is successful, and the secondary authentication node determines that the identity verification of at least one device in the domain is successful.
  • the primary authentication node determines that the first verification information is consistent with the second verification information, and the fourth verification information is used to indicate that the identity verification of the devices in the domain other than the secondary authentication node included in the first set is successful .
  • the authentication process can end. At this time, it is considered that the identities of the secondary authentication node and at least one device in the domain in the first set are verified successfully.
  • the primary authentication node determines that the identity verification of the secondary authentication node is successful, and the secondary authentication node determines that the identity verification of at least one device in the domain has failed.
  • the primary authentication node determines that the first verification information is consistent with the second verification information, and the fourth verification information is used to indicate that the identity verification of the devices in the domain other than the secondary authentication node included in the first set is not success.
  • the primary authentication node can directly determine that the identity verification of the secondary authentication node is successful, and that the identity verification of at least one device in the domain has failed, but the primary authentication node cannot determine which of the at least one device in the domain is the identity of the device. verification failed.
  • the primary authentication node may also further verify the identity of at least one device in the domain in the first set.
  • the first message also includes the third verification information of N devices in the domain.
  • the N devices in the domain may be one or more of the at least one device in the domain, and N is positive. Integer.
  • the secondary authentication node may also send the third verification information of at least one device in the domain to the main authentication node, and the N devices in the domain include at least one device in the domain. All the devices in the domain.
  • the device in the first domain is one of N devices in the domain, and the device in the first domain may be a device in the domain whose identity verification by the secondary authentication node succeeds, or it may be a device in the domain whose identity verification by the secondary authentication node fails.
  • This method is more suitable for the case where the secondary authentication node verifies the identity of each of the devices in at least one domain in turn, and the secondary authentication node fails to verify the identity of at least one device in the domain, or this method can be applied to ,
  • the secondary authentication node verifies the identity of at least one device in the domain according to the sixth verification information and the seventh verification information.
  • the secondary authentication node may not be able to locate which device in the domain failed the identity verification, and the secondary authentication node can The third verification information of at least one device in the domain is all sent to the main authentication node, and the main authentication node is further verified.
  • the fourth verification information is used to indicate that the identity verification of the devices in the domain other than the secondary authentication node included in the first set is unsuccessful, it indicates that the secondary authentication node has performed the verification of one or more of the at least one device in the domain.
  • the secondary authentication node may only send the third verification information corresponding to the devices in the domain that failed to be authenticated to the primary authentication node.
  • the N devices in the domain include at least one of the devices in the domain.
  • the device in the first domain is one of N devices in the domain, and the device in the first domain may be a device in the domain whose identity verification by the secondary authentication node fails. This method is more suitable for a situation where the secondary authentication node sequentially verifies the identity of each of the at least one device in the domain, and the secondary authentication node fails to verify the identity of some of the devices in the at least one domain.
  • the primary authentication node determines that the identity verification of the secondary authentication node is successful, the first verification information is used to indicate that the identity verification of the devices in the domain included in the first set is unsuccessful, and the first message includes N pieces of third verification information, then the primary The authentication node may sequentially verify each of the N third verification information to determine which device in the domain failed the identity verification.
  • the first message may not include N pieces of third verification information. If the master authentication node determines that the first verification information is consistent with the second verification information, and the fourth verification information is used to indicate the identity of the devices in the domain included in the first set If the verification is unsuccessful, the primary authentication node may send a second message to the secondary authentication node, and the second message is used to request to obtain verification information corresponding to at least one device in the domain. After the secondary authentication node receives the second message from the primary authentication node, it can send N pieces of third verification information to the primary authentication node. For example, the secondary authentication node can send a third message to the primary authentication node. The third message includes the Nth Three verification information.
  • the N pieces of third verification information may include the third verification information of all the devices in the domain of the at least one device in the domain, or N
  • the third verification information may also include third verification information of at least one device in the domain that has failed verification by the secondary authentication node.
  • the N pieces of third verification information may include the third verification information of all the devices in the domain of the at least one device in the domain.
  • the second message is used to request to obtain verification information corresponding to at least one device in the domain
  • the N pieces of third verification information may include the third verification information of all the devices in the domain of the at least one device in the domain.
  • the master authentication node may generate N pieces of eighth verification information, and verify the N pieces of third verification information through the N pieces of eighth verification information. For example, if the eighth verification information corresponding to a device in a domain is consistent with the third verification information, the master authentication node considers that the identity verification of the device in the domain is successful, otherwise, it considers that the identity verification of the device in the domain has failed. For example, if the master authentication node successfully authenticates a device in a domain, the master authentication node can consider the identity of the device in the domain to be legal, and if the master authentication node fails to verify the identity of a device in the domain (or, the identity verification fails) , The master authentication node can think that the identity of the device in the domain is illegal.
  • the master authentication node may obtain N eighth verification information according to the second random number, or obtain N eighth verification information according to the identity information of the N devices in the domain, or according to the second random number and the identity information of the N devices in the domain Obtain N eighth verification information.
  • the eighth verification information may be a MAC value.
  • the master authentication node can obtain the eighth verification information according to r'and the identity information of the devices in the N domains.
  • the eighth verification information may also be a digital signature.
  • the main authentication node stores the public key in asymmetric encryption, and the main authentication node can use the stored public key pair
  • the second random number is encrypted to obtain N eighth verification information, or the identity information of the N devices in the domain is encrypted according to the stored public key, and N eighth verification information is obtained, or the N eighth verification information is obtained according to the stored public key.
  • the second random number and the identity information of the N devices in the domain are encrypted to obtain N eighth verification information.
  • the public key stored by the master authentication node here may be the first public key.
  • the way that the master authentication node generates the eighth verification information and the way the devices in the domain generate the third verification information need to be consistent.
  • the third verification information is a MAC value
  • the eighth verification information is also a MAC value, or third verification.
  • the information is generated by the device in the domain according to the private key, so the eighth verification information needs to be generated by the master authentication node according to the public key.
  • the master authentication node can determine the identity verification of the device in the N domains by separately verifying the identity of the device in the N domain, so that the device in the domain that fails the identity verification can be processed accordingly, and the device in the domain that has been successfully authenticated can continue to be normal jobs. In this way, devices in the domain that have failed authentication can be effectively located, and the impact on devices in the domain that have succeeded in authentication can also be reduced.
  • the primary authentication node determines that the identity verification of the secondary authentication node has failed, and the secondary authentication node determines that the identity verification of at least one device in the domain is successful.
  • the primary authentication node determines that the first verification information and the second verification information are inconsistent, and the fourth verification information is used to indicate that the identity verification of the devices in the domain other than the secondary authentication node included in the first set is successful .
  • the primary authentication node may directly determine that the identity verification of the secondary authentication node has failed, and the primary authentication node may consider the first verification information to be unreliable.
  • the primary authentication node can directly determine that the identity verification of the secondary authentication node has failed, but because the first verification information is unreliable, the primary authentication node cannot determine whether the identity verification of at least one device in the domain is successful. Or, in this case, if the primary authentication node determines that the identity verification of the secondary authentication node fails, it may further verify the identity of at least one device in the domain in the first set.
  • the first message also includes third verification information of N devices in the domain.
  • the N devices in the domain may be the at least one device in the domain, and N is a positive integer.
  • the secondary authentication node in addition to sending the first verification information to the primary authentication node, can also send at least one third verification information of at least one device in the domain to the primary authentication node, because the secondary authentication node has an identity of at least one device in the domain. The verification is successful. Therefore, the secondary authentication node may send at least one piece of third verification information of at least one device in the domain to the primary authentication node, that is, the N devices in the domain include all the devices in the domain of the at least one device in the domain.
  • the primary authentication node determines that the identity verification of the secondary authentication node has failed, and the first message includes N pieces of third authentication information, the primary authentication node can verify each of the N pieces of third authentication information in turn to determine N Whether the identities of devices in this domain are successfully verified.
  • the first message may not include the N pieces of third verification information. If the master authentication node determines that the first verification information and the second verification information are inconsistent, that is, the identity verification of the second device by the first device is unsuccessful. Then the primary authentication node may send a second message to the secondary authentication node, and the second message is used to request to obtain verification information corresponding to at least one device in the domain. After the secondary authentication node receives the second message from the primary authentication node, it can send N pieces of third verification information to the primary authentication node. For example, the secondary authentication node can send a third message to the primary authentication node. The third message includes the Nth Three verification information. Here, the N pieces of third verification information may include the third verification information of all in-domain devices among at least one in-domain device.
  • the master authentication node may generate N pieces of eighth verification information, and verify the N pieces of third verification information through the N pieces of eighth verification information. For example, if the eighth verification information corresponding to a device in a domain is consistent with the third verification information, the master authentication node considers that the identity verification of the device in the domain is successful, otherwise, it considers that the identity verification of the device in the domain has failed. For example, the master authentication node may obtain N eighth verification information according to the second random number, or obtain N eighth verification information according to the identity information of the N devices in the domain, or according to the second random number and the identity information of the N devices in the domain Obtain N eighth verification information. Regarding the manner in which the master authentication node verifies the third verification information according to the eighth verification information, refer to the introduction of point 2 above.
  • the master authentication node can determine the identity verification of the device in the N domains by separately verifying the identity of the device in the N domain, so that the device in the domain that fails the identity verification can be processed accordingly, and the device in the domain that has been successfully authenticated can continue to be normal jobs. In this way, even when the secondary authentication node is unreliable, the primary authentication node can effectively locate the devices in the domain that have failed the identity verification, and can reduce the impact on the devices in the domain that have successfully authenticated.
  • the primary authentication node determines that the identity verification of the secondary authentication node has failed, and the secondary authentication node determines that the identity verification of at least one device in the domain has failed.
  • the master authentication node determines that the first verification information is inconsistent with the second verification information, and the fourth verification information is used to indicate that the identity verification of the devices in the domain included in the first set is unsuccessful.
  • the primary authentication node may directly determine that the identity verification of the secondary authentication node has failed, and the primary authentication node may consider the first verification information to be unreliable.
  • the primary authentication node can directly determine that the identity verification of the secondary authentication node has failed, but because the first verification information is unreliable, the primary authentication node cannot determine whether the identity verification of at least one device in the domain is successful. Or, in this case, if the primary authentication node determines that the identity verification of the secondary authentication node has failed, it may further verify the identity of at least one device in the domain in the first set.
  • the first message also includes the third verification information of N devices in the domain.
  • the N devices in the domain may be one or more of the at least one device in the domain, and N is positive. Integer.
  • the secondary authentication node may also send the third verification information of at least one device in the domain to the main authentication node, and the N devices in the domain include at least one device in the domain. All the devices in the domain.
  • This method is more suitable for the case where the secondary authentication node verifies the identity of each of the devices in at least one domain in turn, and the secondary authentication node fails to verify the identity of at least one device in the domain, or this method can be applied to ,
  • the secondary authentication node verifies the identity of at least one device in the domain according to the sixth verification information and the seventh verification information. If the verification fails, the secondary authentication node may not be able to locate which device in the domain failed the identity verification, and the secondary authentication node can The third verification information of at least one device in the domain is all sent to the main authentication node, and the main authentication node is further verified.
  • the fourth verification information is used to indicate that the identity verification of the devices in the domain included in the first set is unsuccessful, it indicates that the secondary authentication node fails to verify the identity of one or more of the at least one device in the domain.
  • the authentication node may simply send the third verification information corresponding to the device in the domain whose identity verification is unsuccessful to the primary authentication node.
  • the N devices in the domain include at least one of the devices in the domain that is unsuccessfully verified by the secondary authentication node. This method is more suitable for a situation where the secondary authentication node sequentially verifies the identity of each of the at least one device in the domain, and the secondary authentication node fails to verify the identity of some of the devices in the at least one domain.
  • the primary authentication node determines that the identity verification of the secondary authentication node is successful, the first verification information is used to indicate that the identity verification of the devices in the domain included in the first set is unsuccessful, and the first message includes N pieces of third verification information, then the primary The authentication node may sequentially verify each of the N third verification information to determine which device in the domain failed the identity verification.
  • the first message may not include N pieces of third verification information. If the primary verification node determines that the first verification information is inconsistent with the second verification information, the primary verification node may send a second message to the secondary verification node. Obtain verification information corresponding to at least one device in the domain upon request. After the secondary authentication node receives the second message from the primary authentication node, it can send N pieces of third verification information to the primary authentication node. For example, the secondary authentication node can send a third message to the primary authentication node. The third message includes the Nth Three verification information.
  • the N pieces of third verification information may include the third verification information of all the devices in the domain of the at least one device in the domain, or N
  • the third verification information may also include third verification information of at least one device in the domain that has failed verification by the secondary authentication node.
  • the N pieces of third verification information may include the third verification information of all the devices in the domain of the at least one device in the domain.
  • the second message is used to request to obtain verification information corresponding to at least one device in the domain
  • the N pieces of third verification information may include the third verification information of all the devices in the domain of the at least one device in the domain.
  • the master authentication node may generate N pieces of eighth verification information, and verify the N pieces of third verification information through the N pieces of eighth verification information. For example, if the eighth verification information corresponding to a device in a domain is consistent with the third verification information, the master authentication node considers that the identity verification of the device in the domain is successful, otherwise, it considers that the identity verification of the device in the domain has failed. For example, the master authentication node may obtain N eighth verification information according to the second random number, or obtain N eighth verification information according to the identity information of the N devices in the domain, or according to the second random number and the identity information of the N devices in the domain Obtain N eighth verification information. Regarding the manner in which the master authentication node verifies the third verification information according to the eighth verification information, refer to the introduction of point 2 above.
  • the embodiment of this application is equivalent to adopting a hierarchical verification method.
  • the first device can verify the second device, and the third device can be verified by the second device, for example, so that all levels of vehicle equipment can be identified. Verification, the level of verification also adds serious reliability.
  • the technical solution of the embodiment of this application is adopted, for each level of vehicle-mounted devices, the number of devices that need to be verified is relatively small, such as the first device verification
  • the second device is sufficient, and there is no need to verify the third device one by one, which helps to reduce the burden on the equipment.
  • the first device may consider that the verification of the second device to the third device has failed, or the first device may further verify the third device, which is equivalent to performing multiple verifications. verification. In this way, the safety of vehicle-mounted equipment can be improved, and regular vehicle-mounted equipment can be prevented from being replaced by fake and inferior vehicle-mounted equipment.
  • FIG. 3 is the flow of the first implementation manner of the first identity verification method provided in this embodiment of the application.
  • the process shown in FIG. 3 takes as an example that the secondary authentication node does not aggregate at least one third verification information, does not aggregate at least one fifth verification information, and the first message does not include the third verification information of N devices in the domain.
  • the master authentication node selects the first random number r.
  • the primary authentication node sends a first random number r to the secondary authentication node, and the secondary authentication node receives the first random number r from the primary authentication node.
  • the secondary authentication node selects the second random number r'.
  • the secondary authentication node sends a second random number r'to the devices in the domain in the first set, and the domain devices in the first set receive the second random number r'from the secondary authentication node.
  • the device j in the domain obtains the third verification information s ij according to the identity information of the device j in the domain, for example
  • the secondary authentication node obtains fifth verification information s′ ij according to the identity information of the device j in the domain, for example
  • S305 may be executed before S306, or S305 may be executed after S306, or S305 and S306 may be executed simultaneously.
  • S307 The device j in the domain sends s ij to the secondary authentication node, and the secondary authentication node receives s ij from the device j in the domain.
  • the secondary authentication node may send r'to all the devices in the domain in the first set, then in S307, it may be that all the devices in the domain in the first set send the third verification information to the secondary authentication node. Or, in S304, the secondary authentication node may also only send r'to some of the devices in the first set. Then, in S307, the devices in this part of the first set may send the third verification information to the secondary Authentication node. In short, the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in the first set. FIG. 3 only takes the device j in the domain as an example.
  • the secondary authentication node compares s ij with s'ij to determine whether the identity of the device j in the domain is successfully verified.
  • the secondary authentication node If s ij and s′ ij are consistent, the secondary authentication node considers that the identity verification of device j in the domain is successful, or if s ij and s′ ij are inconsistent, the secondary authentication node considers that the identity verification of device j in the domain has failed.
  • the secondary authentication node may receive at least one piece of third verification information from at least one device in the domain in S307, then in S308, the secondary authentication node may perform verification according to the second random number and at least one piece of third verification information to determine at least Whether the identity verification of a device in a domain is successful. If the identities of at least one of the devices in the domain are all successfully verified, S309 is executed, or if the identity verification of one or more of the devices in the at least one domain fails, then S310 is executed.
  • the secondary authentication node determines that the identity of at least one device in the domain is successfully verified, that is, the secondary authentication node compares the fifth verification information corresponding to each of the devices in the domain with the third verification information, and the result of the comparison is Are consistent, the secondary authentication node can generate
  • the master authentication node verifies si . If the si verification fails, it is considered that the identity verification of the secondary authentication node has failed, or if the si verification succeeds, but It is considered that the authentication of the device in the domain has failed, or if the s i authentication is successful, and It is considered that the identities of the secondary authentication node and the devices in the domain have been successfully verified.
  • FIG. 4 is the flow of the second implementation of the first identity verification method provided in this embodiment of the application.
  • the process shown in FIG. 4 takes as an example that the secondary authentication node does not aggregate at least one third verification information, does not aggregate at least one fifth verification information, and the first message includes the third verification information of N devices in the domain.
  • the master authentication node selects the first random number r.
  • the primary authentication node sends a first random number r to the secondary authentication node, and the secondary authentication node receives the first random number r from the primary authentication node.
  • the secondary authentication node selects the second random number r'.
  • r' is obtained by concatenating r and the third random number.
  • the secondary authentication node sends a second random number r'to the devices in the domain in the first set, and the domain devices in the first set receive the second random number r'from the secondary authentication node.
  • the device j in the domain obtains the third verification information s ij according to the identity information of the device j in the domain, for example
  • the secondary authentication node obtains fifth verification information s′ ij according to the identity information of the device j in the domain, for example
  • S405 may be executed before S406, or S405 may be executed after S406, or S405 and S406 may be executed simultaneously.
  • S407 The device j in the domain sends s ij to the secondary authentication node, and the secondary authentication node receives s ij from the device j in the domain.
  • the secondary authentication node may send r'to all the devices in the domain in the first set. Then, in S407, it may be that all the devices in the domain in the first set send the third verification information to the secondary authentication node. Or, in S404, the secondary authentication node may also only send r'to some of the devices in the first set. Then, in S407, the devices in this part of the first set may send the third verification information to the secondary Authentication node. In short, the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in the first set, and FIG. 4 only takes the device j in the domain as an example.
  • the secondary authentication node compares s ij with s'ij to determine whether the identity of the device j in the domain is successfully verified.
  • the secondary authentication node If s ij and s′ ij are consistent, the secondary authentication node considers that the identity verification of device j in the domain is successful, or if s ij and s′ ij are inconsistent, the secondary authentication node considers that the identity verification of device j in the domain has failed.
  • the secondary authentication node may receive at least one piece of third verification information from at least one device in the domain in S407, then in S408, the secondary authentication node may perform verification based on the second random number and at least one piece of third verification information to determine at least Whether the identity verification of a device in a domain is successful. If the identities of at least one of the devices in the domain are all successfully verified, S409 is executed, or if the identity verification of one or more of the devices in the at least one domain fails, then S410 is executed.
  • the secondary authentication node determines that the identity of at least one device in the domain is successfully verified, that is, the secondary authentication node compares the fifth verification information corresponding to each of the devices in the domain with the third verification information, and the result of the comparison is Are consistent, the secondary authentication node can generate
  • the secondary authentication node sends a first message to the primary authentication node, where the first message includes first verification information s i , And include
  • ⁇ s ij ⁇ j ⁇ ERR represents the third verification information of the devices in the N domains.
  • the devices in the N domains may include at least one of the devices in the domain that is not successfully verified by the secondary authentication node. and Represents the identity information of devices in N domains. Therefore, the first message may include the identity information of the devices in the N domains and the third verification information.
  • S411 The master authentication node verifies si . If the s i verification fails, it is considered that the identity verification of the secondary authentication node has failed; or, if the s i verification is successful, but Then verify the s ij one by one, if the verification of a certain s ij fails, it is determined that the authentication of the device in the domain corresponding to the s ij has failed, otherwise it is determined that the authentication of the device in the domain corresponding to the s ij is successful; or, if the s i verification is successful And It is considered that the identities of the secondary authentication node and the devices in the domain have been successfully verified.
  • FIG. 5 Please refer to FIG. 5 for the flow of the third implementation manner of the first identity verification method provided in this embodiment of the application.
  • the process shown in FIG. 5 takes as an example that the secondary authentication node aggregates at least one third verification information, aggregates at least one fifth verification information, and the first message includes the third verification information of N devices in the domain.
  • the master authentication node selects the first random number r.
  • the primary authentication node sends a first random number r to the secondary authentication node, and the secondary authentication node receives the first random number r from the primary authentication node.
  • the secondary authentication node selects a second random number r'.
  • r' is obtained by concatenating r and the third random number.
  • the secondary authentication node sends a second random number r'to the devices in the domain in the first set, and the domain devices in the first set receive the second random number r'from the secondary authentication node.
  • the device j in the domain obtains the third verification information s ij according to the identity information of the device j in the domain, for example
  • the secondary authentication node obtains fifth verification information s′ ij according to the identity information of the device j in the domain, for example
  • the secondary authentication node may obtain at least one fifth verification information according to the second random number and the identity information of at least one device in the domain. Then, after obtaining the at least one fifth verification information, the secondary authentication node may aggregate the at least one fifth verification information, Obtain the sixth verification information.
  • the at least one fifth verification information obtained by the secondary authentication node is represented as s′ i1 , s′ i2 , s′ i3 , ..., then the secondary authentication node aggregates at least one fifth verification information, and an aggregation method can be Yes, Where s′′ ij represents the sixth verification information, Represents exclusive OR operation.
  • S505 may be executed before S506, or S505 may be executed after S506, or S505 and S506 may be executed simultaneously.
  • S507 The device j in the domain sends s ij to the secondary authentication node, and the secondary authentication node receives s ij from the device j in the domain.
  • the secondary authentication node may send r'to all the devices in the domain in the first set, then in S507, it may be that all the devices in the domain in the first set send the third verification information to the secondary authentication node. Or, in S504, the secondary authentication node may also only send r'to some of the devices in the first set. Then, in S507, the devices in this part of the first set may send the third verification information to the secondary Authentication node. In short, the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in the first set.
  • FIG. 5 only takes the device j in the domain as an example.
  • the secondary authentication node may receive at least one piece of third verification information from at least one device in the domain in the first set. Then, after obtaining the at least one piece of third verification information, the secondary authentication node may aggregate the at least one piece of third verification information to obtain the first Seven verification information.
  • at least one piece of third verification information obtained by the secondary authentication node is respectively denoted as s i1 , s i2 , s i3 ,..., then the secondary authentication node aggregates at least one piece of third verification information.
  • One aggregation method may be: Where s′′′ ij represents the seventh verification information, Represents exclusive OR operation.
  • the secondary authentication node compares s" ij with s"" ij to determine whether the identity of at least one device in the domain is successfully verified.
  • the secondary authentication node If s" ij and s'" ij are consistent, the secondary authentication node considers that at least one device in the domain has been successfully authenticated, or if s" ij and s'" ij are inconsistent, the secondary authentication node considers the identity of at least one device in the domain to verify the identity failure.
  • S509 determines that the identities of at least one of the devices in the domain are successfully verified, S509 is executed, or if the secondary authentication node determines that one or more of the devices in the domain have failed the identity verification of one or more devices in the domain, S510 is executed.
  • the secondary authentication node sends a first message to the primary authentication node, where the first message includes the first verification information s i , And include
  • ⁇ s ij ⁇ represents the third verification information of the devices in the N domains.
  • the devices in the N domains may include all the devices in the domain of at least one device in the domain. and Represents the identity information of devices in N domains. Therefore, the first message may include the identity information of the devices in the N domains and the third verification information.
  • the master authentication node verifies si . If the s i verification fails, it is considered that the identity verification of the secondary authentication node has failed; or, if the s i verification is successful, but Then verify the s ij one by one, if the verification of a certain s ij fails, it is determined that the authentication of the device in the domain corresponding to the s ij has failed, otherwise it is determined that the authentication of the device in the domain corresponding to the s ij is successful; or, if the s i verification is successful And It is considered that the identities of the secondary authentication node and the devices in the domain have been successfully verified.
  • the master authentication node can determine which device in the domain failed the identity verification by separately verifying the identity of the N devices in the domain, so that the device in the domain that failed the identity verification can be processed accordingly, and the identity verification The devices in the successful domain can continue to work normally. In this way, even when the secondary authentication node is unreliable, the primary authentication node can effectively locate the devices in the domain that have failed authentication, and can reduce the impact on devices in the domain that have successfully authenticated.
  • the master authentication node is considered to be trustworthy, and there is no need to verify the authenticity or regularity of the master authentication node.
  • the master authentication node can be further authenticated to further improve security.
  • the main authentication node can be authenticated by means of a cloud server, or the main authentication node can also be authenticated by means of a mobile phone of the vehicle owner.
  • the resources and capabilities of the master authentication node are good, so an asymmetric key mechanism (such as a digital signature) can be used to authenticate the master authentication node.
  • FIG. 6 can complete the authentication of the main authentication node by the external authentication node (for example, a cloud server or a mobile phone of the vehicle owner).
  • S601 The authentication node outside the vehicle sends a third random number to the main authentication node, and the main authentication node receives the third random number from the authentication node outside the vehicle.
  • the authentication node outside the vehicle can select a random number with a suitable length, for example, it is called a third random number, and the third random number can be represented by c.
  • the authentication node outside the vehicle can send c to the main authentication node.
  • c can be used for the authentication of the main authentication node by the authentication node outside the vehicle.
  • the length of c can be determined according to the required authentication strength. For example, if the required authentication strength is 128 bits, the length of c can be 128 bits. Generally speaking, the stronger the authentication strength, the longer the length of c. However, the longer the length of c, the higher the complexity of the authentication process, so the length of c can be selected appropriately. Or the length of c can also be stipulated by agreement, etc., and there is no specific restriction.
  • the master authentication node encrypts c by using the private key of the master authentication node to obtain a digital signature.
  • the master authentication node After the master authentication node receives c, it can use the private key to encrypt c to obtain the encrypted c, which is the digital signature.
  • the outside authentication node uses asymmetric encryption to verify the main authentication node as an example. In fact, it is not limited to this. The outside authentication node may also use other methods to verify the main authentication node. authenticating.
  • S603 The main authentication node sends the digital signature to the out-of-vehicle authentication node, and the out-of-vehicle authentication node receives the digital signature from the main authentication node.
  • S604 The authentication point outside the vehicle verifies the identity of the main authentication node according to the digital signature.
  • the external authentication node stores the public key of the main authentication node, and the external authentication node can use the public key of the main authentication node to verify the digital signature. If the verification is passed, the external authentication node considers the identity verification of the main authentication node If it succeeds, if the verification fails, the outside verification node considers that the identity verification of the master verification node has failed.
  • Fig. 6 illustrates a method for verifying the master authentication node, and the embodiment of the present application does not limit the use of other methods to verify the master authentication node.
  • the embodiment of this application is equivalent to adopting a hierarchical verification method.
  • the first device can verify the second device, and the third device can be verified by the second device, for example, so that all levels of vehicle equipment can be identified. Verification, the level of verification also adds serious reliability.
  • the technical solution of the embodiment of this application is adopted, for each level of vehicle-mounted devices, the number of devices that need to be verified is relatively small, such as the first device verification
  • the second device is sufficient, and there is no need to verify the third device one by one, which helps to reduce the burden on the equipment.
  • the first device may consider that the verification of the second device to the third device has failed, or the first device may further verify the third device, which is equivalent to performing multiple verifications. verification. In this way, the safety of vehicle-mounted equipment can be improved, and regular vehicle-mounted equipment can be prevented from being replaced by fake and inferior vehicle-mounted equipment.
  • an embodiment of the present application provides a second identity verification method.
  • FIG. 7, is a flowchart of this method.
  • the application of this method to the network architecture shown in FIG. 1 is taken as an example.
  • the method may be executed by three communication devices (or, three communication devices), and the three communication devices are, for example, the first communication device, the second communication device, and the third communication device.
  • the first communication device, the second communication device, or the third communication device may be a vehicle-mounted device or a communication device (such as a chip system) capable of supporting the vehicle-mounted device to implement the functions required by the method, and of course, may also be other communication devices.
  • the three communication devices can be implemented in the same form, for example, all can be implemented in the form of equipment, or the three communication devices can be implemented in the same form.
  • the device can also be implemented in different forms, for example, the first communication device is implemented in the form of equipment, the second communication device is implemented in the form of a chip system, and the third communication device is implemented in the form of equipment, and so on.
  • the method is executed by the first device, the second device, and the third device as an example, that is, it is assumed that the first communication device is the first device, the second communication device is the second device, and the second communication device is the second device.
  • the third communication device is an example of the third device.
  • the first device described below may be the master authentication node in the network architecture shown in FIG. 1 (for example, the gateway in FIG. 1 )
  • the second device described below may be a secondary authentication node in the network architecture shown in FIG. 1 (for example, the DM or MDC in FIG. 1)
  • the third device described below may be the secondary authentication node shown in FIG.
  • the devices in the domain of the network architecture.
  • the primary authentication node sends a first random number to the secondary authentication node, and the secondary authentication node receives the first random number from the primary authentication node.
  • the first device and the second device are carried in a first vehicle, and the first vehicle may carry the first device and at least one set, and each set in the at least one set may include one or more devices.
  • Each of these sets may include a device as a secondary authentication node.
  • the first set is a set of at least one set
  • the first set includes the second device and the third device
  • the second device is the secondary authentication node in the first set.
  • the number of third devices may be one or more.
  • the first device may communicate with the third device included in the first set through the second device.
  • both the primary authentication node and the secondary authentication node are carried in the first vehicle.
  • the first vehicle also carries at least one set (or, referred to as at least one domain).
  • the authentication node (that is, the second device) is a secondary authentication node in the first set carried by the first vehicle, that is, the second device belongs to one set of at least one set, for example, referred to as the first set.
  • the first set also includes a third device (that is, an intra-domain device), and the third device included in the first set communicates with the first device through the second device.
  • the master authentication node can select a random number with a suitable length, for example, called the first random number, and the first random number can be represented by r.
  • the primary authentication node can send r to the secondary authentication node.
  • r can be used for subsequent authentication of the primary authentication node to the secondary authentication node, and can also be used for the primary authentication node to authenticate the devices in the domain in the first set.
  • S201 in the embodiment shown in FIG. 2.
  • the first vehicle includes multiple sets, and each set includes one secondary authentication node, then the first vehicle includes multiple secondary authentication nodes. Then the primary authentication node may send the first random number to all or part of the secondary authentication nodes included in the first vehicle. After different secondary authentication nodes receive the first random number, the operation modes can be similar. Therefore, the embodiment shown in FIG. 7 only takes the secondary authentication nodes included in the first set as an example.
  • the secondary authentication node sends a first random number to the devices in the domain in the first set, and the domain devices in the first set receive the first random number from the secondary authentication node.
  • the secondary authentication node may directly forward the first random number to the devices in the domain in the first set.
  • the secondary authentication node can use broadcast or multicast to send r, and all devices in the domain in the first set can receive r from the secondary authentication node, or the secondary authentication node can also use unicast to send r, such as secondary authentication.
  • the authentication node can respectively send r to all the devices in the domain in the first set, or the secondary authentication node can also only send r to some of the devices in the first set. This part of the devices in the domain is, for example, in the domain that needs to be authenticated. equipment. r can be used to authenticate the devices in the domain by the secondary authentication node.
  • S703 The device in the first domain obtains third verification information according to the identity information of the device in the first domain.
  • the device in the first domain is, for example, a device in the first set.
  • the first set may include one intra-domain device or multiple intra-domain devices. If the first set includes a device in the domain, the device in the domain is the device in the first domain; or, if the first set includes multiple devices in the domain, for the devices in the domain that received the first random number in the first set, the device in the domain is The processing methods after the first random number are all similar, so only devices in the first domain are used for illustration here.
  • the identity information of the device in the domain includes, for example, the serial number of the device in the domain, or the identity number of the device in the domain, or may include other information that can uniquely identify the identity of the device in the domain.
  • the device in the first domain may obtain the third verification information according to the first random number, or according to the identity information of the device in the first domain Obtain the third verification information, or according to the first random number and the identity information of the device in the first domain Obtain the third verification information.
  • the third verification information may be a MAC value.
  • devices in the first domain can be based on r and Obtain the third verification information, for example, the third verification information is represented by s ij ,
  • the third verification information may also be a digital signature.
  • the devices in the domain in the first set store the private key in asymmetric encryption, and the devices in the first domain can The stored private key encrypts the first random number to obtain the third verification information, or the identity information of the device in the first domain according to the stored private key Encryption to obtain the third verification information, or pair the first random number and the identity information of the device in the first domain according to the stored private key Encryption is performed to obtain the third verification information.
  • the private key stored by the devices in the domain in the first set may be referred to as the first private key.
  • the secondary authentication node generates first verification information according to the first random number and the identity information of the secondary authentication node.
  • the secondary authentication node may obtain the first verification information according to the first random number, or according to the identity information of the secondary authentication node Obtain the first verification information, or according to the first random number and the identity information of the secondary verification node Obtain the first verification information.
  • the first verification information may be a MAC value.
  • the secondary authentication node can be based on r and Obtain the first verification information, for example, the first verification information is represented by si
  • the first verification information may also be a digital signature.
  • the secondary authentication node stores the private key in asymmetric encryption, and the secondary authentication node can use the stored private key pair
  • the first random number is encrypted to obtain the first verification information, or the identity information of the secondary authentication node according to the stored private key Encrypt to obtain the first verification information, or pair the first random number and the identity information of the secondary authentication node according to the stored private key Encryption is performed to obtain the first verification information.
  • the private key stored by the secondary authentication node may be referred to as the second private key.
  • the second private key and the second public key may be a pair of asymmetric keys, and the second public key is stored in the primary authentication node.
  • S703 may be executed before S704, or S703 may be executed after S704, or S703 and S704 may be executed simultaneously.
  • S705 The device in the first domain sends third verification information to the secondary authentication node, and the secondary authentication node receives the third verification information from the device in the first domain.
  • the secondary authentication node may send r to all the devices in the domain in the first set. Then, in S705, it may be that all the devices in the domain in the first set send the third verification information to the secondary authentication node. Or, in S702, the secondary authentication node may also only send r to some of the devices in the first set. Then, in S705, this part of the devices in the first set may send the third verification information to the second authentication. node.
  • the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in the first set, and FIG. 7 only takes the device in the first domain as an example.
  • the secondary authentication node can receive at least one piece of third authentication information from at least one device in the domain in the first set. Then, if the number of the third authentication information is greater than 1, after obtaining at least one piece of third authentication information, the secondary authentication node At least one piece of third verification information can be aggregated to obtain fourth verification information.
  • at least one piece of third verification information obtained by the secondary authentication node is respectively denoted as s i1 , s i2 , s i3 ,..., then the secondary authentication node aggregates at least one piece of third verification information.
  • One aggregation method may be: Where s′ ij represents the fourth verification information, Represents exclusive OR operation.
  • the secondary authentication node may also use other methods to aggregate at least one piece of third verification information.
  • the secondary authentication node sends a first message to the primary authentication node, and the primary authentication node receives the first message from the secondary authentication node, where the first message includes the first verification information.
  • the first verification information is used to verify whether the identity of the secondary authentication node is successfully verified.
  • the first message may also include the identity information of the secondary authentication node, so that the primary authentication node can clarify which secondary authentication node the first message comes from.
  • the secondary authentication node may also send fourth verification information to the primary authentication node, that is, the first message may also include the fourth verification information.
  • the fourth verification information may be used to verify whether the identity of at least one device in the domain in the first set is successfully verified.
  • the primary authentication node determines whether the identity of the secondary authentication node is successfully verified according to the first verification information.
  • the primary authentication node may generate second verification information and compare the second verification information with the first verification information. If the second verification information is consistent with the first verification information, the primary verification node determines that the identity verification of the secondary verification node is successful If the second verification information is inconsistent with the first verification information, the primary authentication node determines that the identity verification of the secondary authentication node fails. For example, if the primary authentication node successfully authenticates the secondary authentication node, then the primary authentication node can consider the identity of the secondary authentication node to be legal, and if the primary authentication node fails to verify the identity of the secondary authentication node (or, the identity verification fails) , The primary authentication node can think that the identity of the secondary authentication node is illegal.
  • the primary authentication node may obtain the second authentication information according to the first random number, or obtain the second authentication information according to the identity information of the secondary authentication node, or obtain the second authentication information according to the first random number and the identity information of the secondary authentication node.
  • the second verification information may be a MAC value.
  • the master authentication node can be based on r and Obtain the second verification information, for example, the second verification information is represented by s′ i ,
  • the second verification information may also be a digital signature.
  • the main authentication node stores the public key in asymmetric encryption, and the main authentication node can use the stored public key pair
  • the first random number is encrypted to obtain the second verification information
  • the identity information of the secondary authentication node is encrypted according to the stored public key to obtain the second verification information
  • the first random number and the second verification information are obtained according to the stored public key.
  • the identity information of the authentication node is encrypted to obtain the second verification information.
  • the public key stored by the master authentication node may be referred to as the second public key
  • the second public key and the second private key may be a pair of asymmetric keys.
  • the master authentication node may also perform verification according to the fourth verification information to determine whether the identity of at least one device in the domain is successfully verified. For example, the master authentication node may generate fifth verification information and compare the fifth verification information with the fourth verification information. If the fifth verification information is consistent with the fourth verification information, the master verification node determines the identity verification of at least one device in the domain. Success, if the fifth verification information and the fourth verification information are inconsistent, the master authentication node confirms that the identity verification of at least one device in the domain has failed. For example, the master authentication node may first generate at least one sub-verification information, and by aggregating the at least one sub-verification information, the fifth verification information can be obtained. This process will be introduced below.
  • the master authentication node can obtain the sub-verification information according to the first random number, or according to the identity information of the devices in the domain Obtain sub-authentication information, or according to the first random number and the identity information of the device in the domain Obtain sub-authentication information.
  • the sub-authentication information may be a MAC value.
  • the master authentication node can be based on r and Obtain the sub-verification information, for example, use s′′ ij to represent the sub-verification information,
  • the sub-verification information can also be a digital signature.
  • the main authentication node stores the public key in asymmetric encryption, and the main authentication node can pair the first authentication information according to the stored public key.
  • the random number is encrypted to obtain sub-authentication information, or the identity information of the device in the domain according to the stored public key Encryption to obtain sub-authentication information, or pair the first random number and the identity information of the device in the domain according to the stored public key Encryption to obtain sub-authentication information.
  • the public key stored by the master authentication node may be referred to as the first public key, and the first public key and the first private key may be a pair of asymmetric keys.
  • the master authentication node may aggregate the at least one sub-verification information to obtain the fifth verification information.
  • at least one sub-verification information obtained by the secondary authentication node is respectively represented as s" i1 , s" i2 , s" i3 ,..., then the primary authentication node aggregates at least one sub-verification information.
  • One way of aggregation may be: Where s′′′ ij represents the fifth verification information, Represents exclusive OR operation.
  • the secondary authentication node may also use other methods to aggregate at least one sub-authentication information.
  • the way that the primary authentication node aggregates at least one sub-verification information and the way that the secondary authentication node aggregates at least one third authentication information should be the same.
  • the secondary authentication node uses the XOR described above.
  • the method of operation aggregates at least one third verification information, and the master authentication node also needs to use the XOR operation described above to aggregate at least one sub-verification information.
  • the verification results can also include several types, which are described below.
  • the primary authentication node determines that the identity verification of the secondary authentication node is successful, and that the identity verification of at least one device in the domain is successful.
  • the master authentication node determines that the second verification information is consistent with the first verification information, and that the fifth verification information is consistent with the fourth verification information.
  • the verification process can end. At this time, it is considered that the identities of the secondary authentication node and at least one device in the domain in the first set are verified successfully.
  • the primary authentication node determines that the identity verification of the secondary authentication node is successful, and determines that the identity verification of at least one device in the domain has failed.
  • the master authentication node determines that the second verification information is consistent with the first verification information, and that the fifth verification information is inconsistent with the fourth verification information.
  • the primary authentication node can directly determine that the identity verification of the secondary authentication node is successful, and that the identity verification of at least one device in the domain has failed, but the primary authentication node cannot determine which of the at least one device in the domain is the identity of the device. verification failed.
  • the primary authentication node may also further verify the identity of at least one device in the domain in the first set.
  • the first message may also include third verification information of at least one device in the domain. That is, in addition to sending the fourth verification information to the primary authentication node, the secondary authentication node may also send the third verification information of at least one device in the domain to the primary authentication node.
  • the master authentication node may sequentially verify each of the at least one third verification information to determine which device in the domain failed the identity verification.
  • the first message may not include at least one piece of third verification information.
  • the primary authentication node may send a second message to the secondary authentication node. Obtain verification information corresponding to at least one device in the domain upon request.
  • the secondary authentication node receives the second message from the primary authentication node, it can send at least one piece of third verification information to the primary authentication node.
  • the secondary authentication node can send a third message to the primary authentication node, and the third message includes at least one Three verification information.
  • the master authentication node may generate at least one sixth verification information, and verify the at least one third verification information through the at least one sixth verification information. For example, if the sixth verification information corresponding to a device in a domain is consistent with the third verification information, the master authentication node considers that the identity verification of the device in the domain is successful; otherwise, it considers that the identity verification of the device in the domain has failed. For example, if the master authentication node successfully authenticates a device in a domain, the master authentication node can consider the identity of the device in the domain to be legal, and if the master authentication node fails to verify the identity of a device in the domain (or, the identity verification fails) , The master authentication node can think that the identity of the device in the domain is illegal.
  • the master authentication node may obtain at least one piece of sixth verification information based on the first random number, or obtain at least one piece of sixth verification information based on the identity information of at least one device in the domain, or based on the first random number and the identity information of at least one device in the domain At least one piece of sixth verification information is obtained.
  • the sixth verification information may be a MAC value.
  • the master authentication node may obtain at least one piece of sixth verification information according to r and the identity information of at least one device in the domain.
  • the sixth verification information may also be a digital signature.
  • the way that the master authentication node generates the sixth verification information and the way the devices in the domain generate the third verification information need to be consistent.
  • the third verification information is a MAC value
  • the sixth verification information is also a MAC value, or third verification.
  • the information is generated by the device in the domain based on the private key, and the sixth verification information needs to be generated by the master authentication node based on the public key.
  • the master authentication node can determine the identity verification of at least one device in the domain by separately verifying the identity of at least one device in the domain, so that the device in the domain that fails the identity verification can be processed accordingly, and the device in the domain that has been successfully authenticated can continue to be normal jobs. In this way, devices in the domain that have failed authentication can be effectively located, and the impact on devices in the domain that have succeeded in authentication can also be reduced.
  • the primary authentication node determines that the identity verification of the secondary authentication node has failed, and determines that the identity verification of at least one device in the domain is successful.
  • the master authentication node determines that the second verification information is consistent with the first verification information, and that the fifth verification information is inconsistent with the fourth verification information.
  • the primary authentication node can directly determine that the identity verification of the secondary authentication node has failed. Since the identity of at least one device in the domain is verified by the primary authentication node, it is considered reliable. Then the verification process can end.
  • the primary authentication node determines that the identity verification of the secondary authentication node has failed, and determines that the identity verification of at least one device in the domain has failed.
  • the master authentication node determines that the second verification information is consistent with the first verification information, and that the fifth verification information is inconsistent with the fourth verification information.
  • the primary authentication node can directly determine that the identity verification of the secondary authentication node is successful, and that the identity verification of at least one device in the domain has failed, but the primary authentication node cannot determine which of the at least one device in the domain is the identity of the device. verification failed.
  • the primary authentication node may also further verify the identity of at least one device in the domain in the first set.
  • the verification method please refer to the introduction of point 2 above.
  • the master authentication node can determine the identity verification of at least one device in the domain by separately verifying the identity of at least one device in the domain, so that the device in the domain that fails the identity verification can be processed accordingly, and the device in the domain that has been successfully authenticated can continue to be normal jobs. In this way, even when the secondary authentication node is unreliable, the primary authentication node can effectively locate the devices in the domain that have failed the identity verification, and can reduce the impact on the devices in the domain that have successfully authenticated.
  • FIG. 8 is a flow of an implementation manner of the second identity verification method provided in this embodiment of the application.
  • the process shown in FIG. 8 takes as an example that the secondary authentication node does not aggregate at least one third verification information, does not aggregate at least one fifth verification information, and the first message does not include the third verification information of N devices in the domain.
  • the master authentication node selects the first random number r.
  • the primary authentication node sends a first random number r to the secondary authentication node, and the secondary authentication node receives the first random number r from the primary authentication node.
  • the secondary authentication node sends a first random number r to the devices in the domain in the first set, and the domain devices in the first set receive the first random number r from the secondary authentication node.
  • the device j in the domain obtains the third verification information s ij according to the identity information of the device j in the domain, for example
  • the secondary authentication node generates first verification information s′ i according to r and the identity information of the secondary authentication node.
  • S806 The device j in the domain sends s ij to the secondary authentication node, and the secondary authentication node receives s ij from the device j in the domain.
  • the secondary authentication node may send r to all the devices in the domain in the first set, then in S806, it may be that all the devices in the domain in the first set send the third verification information to the secondary authentication node. Or, in S803, the secondary authentication node can also only send r to some of the devices in the first set. Then, in S806, this part of the devices in the first set may send the third verification information to the secondary authentication. node.
  • the secondary authentication node can receive at least one piece of third verification information from at least one device in the domain in the first set, and FIG. 8 only takes the device j in the domain as an example.
  • the secondary authentication node may receive at least one piece of third verification information from at least one device in the domain in the first set. Then, after obtaining the at least one piece of third verification information, the secondary authentication node may aggregate the at least one piece of third verification information to obtain the first Four verification information. For example, at least one piece of third verification information obtained by the secondary authentication node is respectively denoted as s i1 , s i2 , s i3 ,..., then the secondary authentication node aggregates at least one piece of third verification information.
  • One aggregation method may be: Where s′′ ij represents the fourth verification information, Represents exclusive OR operation.
  • the secondary authentication node may also use other methods to aggregate at least one piece of third verification information.
  • the secondary authentication node sends to the primary authentication node
  • the primary authentication node receives from the secondary authentication node
  • the primary authentication node verifies s i and s" ij . If the s i verification fails, the identity verification of the secondary authentication node is considered to be a failure; otherwise, the identity verification of the secondary authentication node is considered to be successful; if s" ij is successfully verified, it is considered that at least one The authentication of the devices in the domain is successful, otherwise the authentication of at least one device in the domain is deemed to have failed.
  • the primary authentication node may send a second message to the secondary authentication node, and the second message is used to request to obtain verification information corresponding to at least one device in the domain.
  • the secondary authentication node After the secondary authentication node receives the second message from the primary authentication node, it can send at least one piece of third verification information to the primary authentication node.
  • the secondary authentication node can send a third message to the primary authentication node, and the third message includes at least one Three verification information.
  • the master authentication node may sequentially verify s ij to further determine whether the authentication of the identity of at least one device in the domain is successful.
  • the overall verification can be performed by the primary authentication node, and the secondary authentication node does not need to perform verification work, which reduces the burden of the secondary authentication node. If the primary authentication node verifies that the identity verification of at least one device in the domain has failed, the primary authentication node may further request the secondary authentication node to obtain the information of at least one device in the domain for further verification, and if the primary authentication node verifies that the authentication of at least one device in the domain is If the identity verification is successful, the primary authentication node may not need to request information of at least one device in the domain from the secondary authentication node, which can minimize information interaction and save transmission overhead.
  • FIG. 9 is a schematic block diagram of a communication device 900 according to an embodiment of the application.
  • the communication device 900 is the first device 900, for example.
  • the first device 900 includes a processing module 910 and a transceiver module 920, and the processing module 910 and the transceiver module 920 may be logical function modules.
  • the processing module 910 may be used to perform all operations other than the transceiving operation performed by the first device in the embodiment shown in FIG. 2, such as S208, and/or other processes used to support the technology described herein.
  • the transceiver module 920 can be used to perform all the transceiver operations performed by the first device in the embodiment shown in FIG. 2, such as S201 and S207 in the embodiment shown in FIG. Other processes of technology.
  • the transceiver module 920 is configured to send a first random number to a second device, where the first vehicle carries the first device and the first set, the second device belongs to the first set, and the first set
  • the set also includes a third device, and the first device 900 communicates with the third device through the second device;
  • the transceiver module 920 is further configured to receive a first message from the second device, the first message including first verification information, and the first verification information is used to verify the identity of the second device, so The first verification information is generated based on the identity information of the second device and the first random number;
  • the processing module 910 is configured to determine that the identity verification of the second device is successful according to the first verification information and the first random number.
  • the first device may consider the identity of the second device to be legal, and if the identity verification of the second device by the first device is unsuccessful (or, the identity verification fails) , The first device can consider the identity of the second device to be illegal.
  • the processing module 910 is configured to determine that the identity verification of the second device is successful according to the first verification information and the first random number in the following manner:
  • the first message further includes fourth verification information, where the fourth verification information is used to indicate whether the identity verification of the third device is successful; the processing module 910 is configured to: Generate second verification information according to the identity information of the second device and the first random number:
  • the second verification information is generated according to the identity information of the second device, the fourth verification information, and the first random number.
  • the first message further includes third verification information generated by the third device, wherein the third verification information is the third verification information obtained by the third device according to the third device.
  • the identity information is obtained.
  • the first message further includes fourth verification information, and the fourth verification information is used to indicate whether the identity verification of the third device is successful; the processing module 910 is also used to After it is determined that the identity verification of the second device is successful, when the fourth verification information indicates that the identity verification of the third device fails, verification is performed according to the third verification information to determine the identity of the third device Whether the identity verification is successful.
  • the first device can consider the identity of the third device to be legal, and if the identity verification of the third device by the first device is unsuccessful (or, the identity verification fails) , The first device can consider the identity of the third device to be illegal.
  • the processing module 910 is also used for the processing module 910, configured to determine that the identity verification of the second device fails according to the first verification information and the first random number.
  • the first message further includes fourth verification information
  • the transceiver module 920 is further configured to send a second message to the second device after the fourth verification information is used to indicate that the identity verification of the third device is unsuccessful, and the second message is used to request to obtain Verification information corresponding to the third device;
  • the transceiver module 920 is further configured to receive a third message from the second device, where the third message includes the third verification information corresponding to the third device;
  • the processing module 910 is further configured to perform verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the transceiver module 920 is further configured to send a second message to the second device after the processing module 910 determines that the identity verification of the second device fails, and the second message is used to request to obtain information corresponding to the third device. verify message;
  • the transceiver module 920 is further configured to receive a third message from the second device, where the third message includes the third verification information corresponding to the third device;
  • the processing module 910 is further configured to perform verification according to the third verification information to determine whether the identity of the third device is successfully verified.
  • the number of the third devices is multiple
  • the first message further includes fourth verification information
  • the fourth verification information is obtained from multiple third devices.
  • a plurality of third verification information are aggregated; the processing module 910 is further configured to perform verification according to the fourth verification information to determine whether the identities of the plurality of third devices are successfully verified.
  • the transceiver module 920 is further configured to send a second message to the second device when the processing module 910 determines that the identity verification of multiple third devices fails according to the fourth verification information, where the second message is used for Request to obtain multiple verification information corresponding to the third device;
  • the transceiver module 920 is further configured to receive a third message from the second device, where the third message includes multiple pieces of third verification information;
  • the processing module 910 is further configured to perform verification according to the plurality of third verification information to determine whether the identity of each of the plurality of third devices is successfully verified.
  • processing module 910 in the embodiment of the present application may be implemented by a processor or a processor-related circuit component
  • transceiver module 920 may be implemented by a transceiver or a transceiver-related circuit component.
  • an embodiment of the present application also provides a communication device 1000.
  • the communication device 1000 is, for example, the first device 1000.
  • the first device 1000 includes a processor 1010, a memory 1020, and a transceiver 1030.
  • the memory 1020 stores instructions or programs
  • the processor 1010 is configured to execute the instructions or programs stored in the memory 1020.
  • the processor 1010 is used to perform the operations performed by the processing module 910 in the foregoing embodiment
  • the transceiver 1030 is used to perform the operations performed by the transceiver module 920 in the foregoing embodiment.
  • first device 900 or the first device 1000 according to the embodiment of the present application may correspond to the first device in the embodiment shown in FIG. 2, and the operation of each module in the first device 900 or the first device 1000 And/or functions are to implement the corresponding processes in the embodiment shown in FIG. 2 respectively.
  • the first device 900 or the first device 1000 according to the embodiment of the present application may correspond to the first device in the embodiment shown in FIG. And/or the functions are respectively to implement the corresponding process in the embodiment shown in FIG. 7.
  • I will not repeat them here.
  • FIG. 11 is a schematic block diagram of a communication device 1100 according to an embodiment of the application.
  • the communication device 1100 is, for example, the second device 1100.
  • the second device 1100 includes a processing module 1110 and a transceiver module 1120, and the processing module 1110 and the transceiver module 1120 may be logical function modules.
  • the processing module 1110 can be used to perform all the operations performed by the second device in the embodiment shown in FIG. 2 except for receiving and sending operations, such as S204 and S206, and/or for supporting the technology described herein. Other processes.
  • the transceiver module 1120 can be used to perform all the transceiver operations performed by the second device in the embodiment shown in FIG. 2, such as S201, S202, S205, and S207 in the embodiment shown in FIG. 2, and/or for supporting Other processes of the technique described in this article.
  • the processing module 1110 may be used to perform all operations other than the transceiving operation performed by the first device in the embodiment shown in FIG. 7, such as S707, and/or other processes used to support the technology described herein .
  • the transceiver module 1120 may be used to perform all the transceiver operations performed by the first device in the embodiment shown in FIG. 7, such as S701 and S706, and/or other processes used to support the technology described herein.
  • the transceiver module 1120 is configured to send a second random number to a third device, where the first vehicle carries the first device and the first set, the second device 1100 and the third device belong to the first set, so The first device communicates with the third device through the second device 1100;
  • the transceiver module 1120 is further configured to receive third verification information from the third device, where the third verification information is generated based on the identity information of the third device and the second random number;
  • the processing module 1110 is configured to determine that the identity verification of the third device is successful according to the second random number and the third verification information.
  • the second device can consider the identity of the third device to be legal, and if the identity verification of the third device by the second device is unsuccessful (or, the identity verification fails) , The second device can consider the identity of the third device to be illegal.
  • the processing module 1110 is configured to determine whether the identity of the third device is successfully verified according to the second random number and the third verification information in the following manner:
  • the fifth verification information and the third verification information it is determined that the identity verification of the third device is successful.
  • the processing module 1110 is configured to determine that the identity verification of the third device is successful according to the fifth verification information and the third verification information in the following manner:
  • processing The module 1110 is configured to determine that the identity verification of the third device is successful according to the fifth verification information and the third verification information in the following manner:
  • the processing module 1110 is further configured to generate first verification information according to the identity information of the second device 1100 and the first random number from the first device;
  • the transceiver module 1120 is further configured to send a first message to the first device, the first message including the first verification information, wherein the first verification information indicates that the identity verification of the third device is successful .
  • the first message further includes the third verification information
  • the third verification information is the third verification information that the second device 1100 fails to verify, or the third verification information The third verification information that is successfully verified for the second device 1100.
  • the length of the second random number is the same as the length of the first random number and the content is different, or the second random number is a combination of the first random number and the third random number. Obtained after splicing random numbers, or, the second random number is the same as the first random number.
  • processing module 1110 in the embodiment of the present application may be implemented by a processor or a processor-related circuit component
  • transceiver module 1120 may be implemented by a transceiver or a transceiver-related circuit component.
  • an embodiment of the present application also provides a communication device 1200.
  • the communication device 1200 is, for example, the second device 1200.
  • the second device 1200 includes a processor 1210, a memory 1220, and a transceiver 1230.
  • the memory 1220 stores instructions or programs
  • the processor 1210 is configured to execute the instructions or programs stored in the memory 1220.
  • the processor 1210 is used to perform the operations performed by the processing module 1110 in the foregoing embodiment
  • the transceiver 1230 is used to perform the operations performed by the transceiver module 1120 in the foregoing embodiment.
  • the second device 1100 or the second device 1200 may correspond to the second device in the embodiment shown in FIG. 2, and the operation of each module in the second device 1100 or the second device 1200
  • the and/or functions are to implement the corresponding process in the embodiment shown in FIG. 2 respectively, and for the sake of brevity, details are not described herein again.
  • FIG. 13 is a schematic block diagram of a communication device 1300 according to an embodiment of the application.
  • the communication device 1300 is, for example, the second device 1300.
  • the second device 1300 includes a processing module 1310 and a transceiver module 1320, and the processing module 1310 and the transceiver module 1320 may be logical function modules.
  • the processing module 1310 may be used to perform all operations other than the transceiving operation performed by the second device in the embodiment shown in FIG. 7, such as S704, and/or other processes used to support the technology described herein .
  • the transceiver module 1320 may be used to perform all the transceiver operations performed by the second device in the embodiment shown in FIG. 7, such as S701, S702, S705, and S706 in the embodiment shown in FIG. 7, and/or to support Other processes of the technique described in this article.
  • the transceiver module 1320 is configured to send a first random number to a third device, where the first vehicle carries a first set, and the first set includes the second device 1300 and the third device, and the first vehicle It also carries a first device, and the first device communicates with the third device through the second device 1300;
  • the transceiver module 1320 is further configured to receive third verification information from the third device, where the third verification information is generated based on the first random number and the identity information of the third device;
  • the processing module 1310 is configured to obtain fourth verification information according to the third verification information, where the fourth verification information is used to verify whether the identity of the third device is successfully verified;
  • the transceiver module 1320 is further configured to send the fourth verification information to the first device.
  • the first device may consider the identity of the second device to be legal, and if the identity verification of the second device by the first device is unsuccessful (or, the identity verification fails) , The first device can consider the identity of the second device to be illegal.
  • the first device can consider the identity of the third device to be legal, and if the identity verification of the third device by the first device is unsuccessful (or, the identity verification fails) , The first device can consider the identity of the third device to be illegal.
  • the processing module 1310 is further configured to generate first verification information according to the identity information of the second device 1300 and the first random number, where the first verification information is used to verify whether the identity of the second device 1300 is successfully verified;
  • the transceiver module 1320 is further configured to send the first verification information to the first device.
  • the number of the third device is multiple, and correspondingly, the number of the third verification information is multiple, and the processing module 1310 is configured to use the following method according to the third verification information.
  • the verification information obtains the fourth verification information:
  • the transceiver module 1320 is further used for:
  • a third message is sent to the first device, where the third message includes a plurality of the third verification information.
  • processing module 1310 in the embodiment of the present application may be implemented by a processor or a processor-related circuit component
  • transceiver module 1320 may be implemented by a transceiver or a transceiver-related circuit component.
  • an embodiment of the present application also provides a communication device 1400.
  • the communication device 1400 is, for example, the first device 1400.
  • the first device 1400 includes a processor 1410, a memory 1420, and a transceiver 1430.
  • the memory 1420 stores instructions or programs
  • the processor 1410 is configured to execute instructions or programs stored in the memory 1420.
  • the processor 1410 is used to perform the operations performed by the processing module 1310 in the foregoing embodiment
  • the transceiver 1430 is used to perform the operations performed by the transceiver module 1320 in the foregoing embodiment.
  • the second device 1300 or the second device 1400 may correspond to the second device in the embodiment shown in FIG. 7, and the operations of the second device 1300 or each module in the second device 1400 The and/or functions are to implement the corresponding process in the embodiment shown in FIG. 7 respectively, and for the sake of brevity, details are not described herein again.
  • the embodiments of the present application also provide a communication device, which may be a vehicle-mounted device, a roadside device, or a circuit.
  • the communication device may be used to perform the actions performed by the first device or the second device in the method embodiment shown in FIG. 2 or the method embodiment shown in FIG. 7.
  • FIG. 15 shows a schematic structural diagram of a simplified communication device.
  • the communication device includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, and to control the communication device, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signal and radio frequency signal and the processing of radio frequency signal.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of communication devices may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 15 only one memory and processor are shown in FIG. 15. In an actual communication device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the antenna and radio frequency circuit with the transceiver function may be regarded as the transceiver unit of the communication device, and the processor with the processing function may be regarded as the processing unit of the communication device.
  • the communication device includes a transceiving unit 1510 and a processing unit 1520.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the processing unit may also be called a processor, a processing board, a processing module, a processing device, and so on.
  • the device for implementing the receiving function in the transceiving unit 1510 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiving unit 1510 can be regarded as the sending unit, that is, the transceiving unit 1510 includes a receiving unit and a sending unit.
  • the transceiver unit may sometimes be called a transceiver, transceiver, or transceiver circuit.
  • the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • transceiving unit 1510 is used to perform the sending operation and receiving operation of the first device in the method embodiment shown in FIG. 2, and the processing unit 1520 is used to perform the first device side in the method embodiment shown in FIG. Operations other than sending and receiving operations.
  • the transceiving unit 1510 is used to perform the transceiving steps of the first device in the embodiment shown in FIG. 2, such as S201 and S207, and/or other processes used to support the technology described herein .
  • the processing unit 1520 is configured to perform other operations of the first device in the embodiment shown in FIG. 2 except for the transceiving operation, such as S208 in the embodiment shown in FIG. 2, and/or to support the operations described herein Other processes of technology.
  • the transceiving unit 1510 is configured to perform the sending and receiving operations of the second device in the method embodiment shown in FIG. 2, and the processing unit 1520 is configured to perform the second device in the method embodiment shown in FIG. Other operations.
  • the transceiving unit 1510 is used to perform the transceiving steps of the second device in the embodiment shown in FIG. 2, such as S201, S202, S205, and S207, and/or to support the procedures described herein.
  • the processing unit 1520 is configured to perform other operations of the second device in the embodiment shown in FIG. 2 in addition to the receiving and sending operations, such as S204 and S206, and/or other processes for supporting the technology described herein.
  • the transceiving unit 1510 is configured to perform the sending operation and the receiving operation on the first device side in the method embodiment shown in FIG. 7, and the processing unit 1520 is configured to execute the method embodiment shown in FIG. 7 except for the first device side. Operations other than sending and receiving operations.
  • the transceiving unit 1510 is used to perform the transceiving steps of the first device in the embodiment shown in FIG. 7, such as S701 and S706, and/or other processes used to support the technology described herein .
  • the processing unit 1520 is configured to perform other operations of the vehicle-mounted device in the embodiment shown in FIG. 7 in addition to the transceiving operations, such as S707, and/or other processes for supporting the technology described herein.
  • the transceiving unit 1510 is configured to perform the sending operation and the receiving operation on the second device side in the method embodiment shown in FIG. 7, and the processing unit 1520 is configured to perform the method embodiment shown in FIG. 7 except for the second device side. Operations other than sending and receiving operations.
  • the transceiving unit 1510 is used to perform the transceiving steps of the second device in the embodiment shown in FIG. 7, such as S701, S702, S705, and S706, and/or to support the steps described herein.
  • the processing unit 1520 is configured to perform other operations of the second device in the embodiment shown in FIG. 7 in addition to the receiving and sending operations, such as S704, and/or other processes for supporting the technology described herein.
  • the chip When the communication device is a chip, the chip includes a transceiver unit and a processing unit.
  • the transceiver unit may be an input/output circuit or a communication interface;
  • the processing unit is a processor, microprocessor, or integrated circuit integrated on the chip.
  • the communication device in the embodiment of the present application may also refer to the device shown in FIG. 16.
  • the device can perform functions similar to the processor 1610 in FIG. 16.
  • the device includes a processor 1610, a data sending processor 1620, and a data receiving processor 1630.
  • the processing module 910 in the foregoing embodiment may be the processor 1610 in FIG. 16 and complete corresponding functions; the transceiving module 920 in the foregoing embodiment may be the sending data processor 1620 in FIG. 16 and/or receiving data The processor 1630.
  • the processing module 1110 in the foregoing embodiment may be the processor 1610 in FIG. 16 and perform corresponding functions; the transceiver module 1120 in the foregoing embodiment may be the sending data processor 1620 in FIG.
  • the processing module 1310 in the foregoing embodiment may be the processor 1610 in FIG. 16 and perform corresponding functions; the transceiver module 1320 in the foregoing embodiment may be the sending data processor 1620 in FIG. 16, and/or Receive data processor 1630.
  • channel encoder and the channel decoder are shown in FIG. 16, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
  • Fig. 17 shows another form of this embodiment.
  • the processing device 1700 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
  • the communication device in this embodiment can be used as the modulation subsystem therein.
  • the modulation subsystem may include a processor 1703 and an interface 1704.
  • the processor 1703 completes the function of the aforementioned processing module 910
  • the interface 1704 completes the function of the aforementioned transceiver module 920.
  • the processor 1703 completes the function of the aforementioned processing module 1110
  • the interface 1704 completes the function of the aforementioned transceiver module 1120.
  • the processor 1703 completes the function of the aforementioned processing module 1310
  • the interface 1704 completes the function of the aforementioned transceiver module 1320.
  • the modulation subsystem includes a memory 1706, a processor 1703, and a program stored in the memory 1706 and running on the processor.
  • the processor 1703 executes the program to implement the method shown in FIG. 2 above. Example or the method on the side of the first device or the second device in the method embodiment shown in FIG. 7.
  • the memory 1706 can be non-volatile or volatile, and its location can be located inside the modulation subsystem or in the processing device 1700, as long as the memory 1706 can be connected to the processor. 1703 is fine.
  • the embodiment of the present application also provides a first communication system.
  • the communication system may include at least one first device related to the embodiment shown in FIG. 2 and a second device related to the embodiment shown in FIG. 2 described above.
  • the first device is, for example, the first device 900 in FIG. 9 or the first device 1000 in FIG. 10
  • the second device is, for example, the second device 1100 in FIG. 11 or the second device 1200 in FIG.
  • the first device may be used to perform all operations performed by the first device in the embodiment shown in FIG. 2, such as S201, S207, and S208 in the embodiment shown in FIG.
  • the second device can be used to perform all operations performed by the second device in the embodiment shown in FIG. 2, such as S201, S202, S204, S205, S206, and S207 in the embodiment shown in FIG. 2, and/or use To support other processes of the technology described in this article.
  • the embodiment of the present application also provides a second communication system.
  • the communication system may include at least one first device involved in the embodiment shown in FIG. 7 and a second device involved in the embodiment shown in FIG. 7 described above.
  • the first device is, for example, the first device 900 in FIG. 9 or the first device 1000 in FIG. 10
  • the second device is, for example, the second device 1300 in FIG. 13 or the second device 1400 in FIG.
  • the first device is used to perform all operations performed by the first device in the embodiment shown in FIG. 7, such as S701, S706, and S707 in the embodiment shown in FIG. Other processes of the described technology.
  • the second device can be used to perform all operations performed by the second device in the embodiment shown in FIG. 7, such as S701, S702, S704, S705, and S706 in the embodiment shown in FIG. 7, and/or to support Other processes of the technique described in this article.
  • the first communication system and the second communication system may be the same communication system, or they may be different communication systems.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 2 provided by the foregoing method embodiment. The process related to the first device in the illustrated embodiment.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 2 provided by the foregoing method embodiment. The process related to the second device in the illustrated embodiment.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 7 provided by the foregoing method embodiment. The process related to the first device in the illustrated embodiment.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is used to store a computer program, and when the computer program is executed by a computer, the computer can implement the method shown in FIG. 7 provided by the foregoing method embodiment. The process related to the second device in the illustrated embodiment.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can execute the first device in the method embodiment shown in FIG. 2 Side approach.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can execute the second device in the method embodiment shown in FIG. 2 Side approach.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, when the computer program is executed by a computer, the computer can execute the first device in the method embodiment shown in FIG. 7 Side approach.
  • the embodiment of the present application also provides a computer program product, the computer program product is used to store a computer program, and when the computer program is executed by a computer, the computer can execute the second device in the method embodiment shown in FIG. 7 Side approach.
  • processors mentioned in the embodiments of this application may be a central processing unit (CPU), or may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), and application-specific integrated circuits (central processing unit, CPU).
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • non-volatile memory may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • non-volatile memory can be ROM, programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable read-only memory (electrically EPROM). , EEPROM) or flash memory.
  • Volatile memory can be RAM, which acts as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
  • the memory storage module
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请涉及一种身份验证方法及装置,可以应用于车联网,例如V2X、LTE-V、V2V等。第一装置向第二装置发送第一随机数,其中,第一车辆承载所述第一装置和第一集合,所述第二装置属于所述第一集合,所述第一集合还包括第三装置,所述第一装置通过所述第二装置与所述第三装置通信。第一装置接收来自第二装置的第一消息,第一消息包括第一验证信息,第一验证信息用于对第二装置的身份进行验证,第一验证信息是根据第二装置的身份信息和第一随机数生成的。第一装置根据第一验证信息和第一随机数,确定第二装置的身份验证成功。采用了层级验证的方式,对各级车载设备都能够进行身份验证。

Description

一种身份验证方法及装置
相关申请的交叉引用
本申请要求在2019年08月31日提交国家知识产权局、申请号为201910819653.5、申请名称为“一种身份验证方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种身份验证方法及装置。
背景技术
一辆车内会有多个车载设备,例如能够执行自动驾驶的车辆,一般依赖高级驾驶员辅助系统(advanced driver-assistance systems,ADAS)提供信息进行驾驶决策,而ADAS包括很多传感器,例如照相机、毫米波雷达、超声波雷达或光学雷达(LiDAR)等,这些传感器都是车载设备。显而易见地,这些车载设备对车辆功能及驾驶安全的重要性不言而喻。
但是,由于有些车载设备的价格较高,因此维修人员或其他的恶意人士为了获利,有可能会使用伪劣的车载设备替换掉正规的车载设备。伪劣的车载设备会影响车辆的性能,甚至可能影响驾驶安全性,因此保证车载设备的真实性和正规性至关重要。
但对于车载设备的验证,目前尚无较为可靠的方式。
发明内容
本申请实施例提供一种身份验证方法及装置,用于对车载设备进行验证,提高车载设备的安全性。
第一方面,提供第一种身份验证方法,该方法包括:第一装置向第二装置发送第一随机数,其中,第一车辆承载所述第一装置和第一集合,所述第二装置属于所述第一集合,所述第一集合还包括第三装置,所述第一装置通过所述第二装置与所述第三装置通信;所述第一装置接收来自所述第二装置的第一消息,所述第一消息包括第一验证信息,所述第一验证信息用于对所述第二装置的身份进行验证,所述第一验证信息是根据所述第二装置的身份信息和所述第一随机数生成的;所述第一装置根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功。
该第一方面的方法可由第一装置执行,第一装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,通信设备为车载装置。
本申请实施例中,第一集合包括第二装置和第三装置,而第一装置对第二装置进行验证即可,至于第三装置,例如可以由第二装置来验证,这样,对各级车载设备都能够进行身份验证,而且对于每一层级的车载设备,需要验证的设备的数量也相对较少,有助于减轻设备的负担。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一装置根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功,包括:
所述第一装置根据所述第二装置的身份信息和所述第一随机数生成第二验证信息;
所述第一装置确定所述第一验证信息和所述第二验证信息是否一致;
当所述第一验证信息和所述第二验证信息一致时,所述第一装置确定所述第二装置的身份验证成功。
例如对于第一装置来说,第二装置的身份信息是已知的,则第一装置可以按照与第二装置生成第一验证信息的相同的方式来生成验证信息,例如称为第二验证信息,或者,第二装置的身份信息也可以携带在第一消息中,则第一装置也可以按照与第二装置生成第一验证信息的相同的方式来生成第二验证信息。第一装置可以比较第二验证信息和第一验证信息是否一致,如果第二验证信息和第一验证信息一致,则第一装置对第二装置的身份验证成功,或者说,第一装置确定第二装置的身份验证成功,或者,如果第二验证信息和第一验证信息不一致,则第一装置对第二装置的身份验证不成功,或者说,第一装置确定第二装置的身份验证失败。第一装置和第二装置采用相同的方式生成验证信息,由第一装置来进行验证,如果第二装置被恶意替换,那么第二装置生成的第一验证信息可能就会有问题,就会与第二验证信息不一致。因此通过这种方式可以确定第二装置的身份是否验证成功。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述第一装置根据所述第二装置的身份信息和所述第一随机数生成第二验证信息,包括:所述第一装置根据所述第二装置的身份信息、所述第四验证信息和所述第一随机数,生成所述第二验证信息。
例如,第二装置也是根据第二装置的身份信息、第四验证信息和第一随机数,生成第一验证信息,那么第一装置也根据第二装置的身份信息、第四验证信息和第一随机数,生成第二验证信息,生成第一验证信息和第二验证信息所使用的元素相同,这样才能保证将第一验证信息和第二验证信息进行比较的准确性。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一消息还包括所述第三装置所生成的第三验证信息,其中,所述第三验证信息是所述第三装置根据所述第三装置的身份信息获得的。
例如,第一消息除了包括第一验证信息之外,还可以包括N个第三验证信息,这N个第三验证信息可以是第一集合所包括的N个第三装置生成的,N个第三装置可以是第一集合所包括的全部的第三装置或部分第三装置,N为正整数。例如,第二装置除了将第一验证信息发送给第一装置之外,还可以将第一集合所包括的所有第三装置生成的第三验证信息均发送给第一装置,则N个第三装置就包括第一集合中的全部第三装置。这样使得第一装置能够获得较多的信息,在需要对第三装置进行身份验证时,能够对第一集合所包括的任意的第三装置进行身份验证。在这种情况下,所述的第三装置是N个第三装置中的一个,所述的第三装置可以是第二装置进行身份验证成功的第三装置,或者也可以是第二装置进行身份验证失败的第三装置。
或者,第二装置除了将第一验证信息发送给第一装置之外,还可以将第二装置验证失败的第三装置所生成的第三验证信息发送给第一装置,则N个第三装置可以包括第一集合中的全部第三装置或部分第三装置。第一消息只需要携带第二装置验证失败的第三装置生成的第三验证信息,无需携带第一集合中的所有的第三装置生成的第三验证信息,有助于 节省信令开销。而且对于第二装置验证成功的第三装置,可能第一装置也无需再进行验证,因此对于验证可靠性的影响也不大。在这种情况下,所述的第三装置是N个第三装置中的一个,所述的第三装置是第二装置进行身份验证失败的第三装置。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;在所述第一装置确定所述第二装置的身份验证成功之后,还包括:当所述第四验证信息指示对所述第三装置的身份验证失败时,所述第一装置根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
如果第一装置确定第二装置的身份验证成功,第四验证信息指示对第三装置的身份验证不成功,且第一消息包括所述的第三装置对应的第三验证信息,则第一装置可以对所述的第三验证信息进行验证,以确定所述的第三装置的身份是否验证成功。本申请实施例除了可以实现层级验证之外,第一装置还可以实现总体的验证,即,第一装置除了可以验证第二装置的身份是否验证成功之外,还可以验证第三装置的身份是否验证成功,从而使得对第三装置的验证更为可靠。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证失败,所述方法还包括:
所述第一装置向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
所述第一装置接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
所述第一装置根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
第一消息也可以不包括N个第三验证信息,如果第四验证信息指示对第一集合包括的第三装置的身份验证不成功,则第一装置可以向第二装置发送第二消息,第二消息用于请求获得至少一个第三装置对应的验证信息。第二装置接收来自第一装置的第二消息后,就可以将N个第三验证信息发送给主认证节点,例如第二装置可以向第一装置发送第三消息,第三消息包括N个第三验证信息。其中,N个第三验证信息可以包括第一集合中的全部的第三装置生成的第三验证信息,或者,N个第三验证信息也可以包括第一集合中的部分第三装置生成的第三验证信息。通过这种方式,第一装置可以在需要对第三装置进行验证时再请求获得第三验证信息,而第一消息不必包含第三验证信息。这样,如果第一装置对第二装置的身份验证成功,且第四验证信息指示对第一集合包括的第三装置的身份验证成功,则第一装置就无需请求获得第三验证信息,有助于节省信令开销。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一装置确定所述第二装置的身份验证失败,所述方法还包括:
所述第一装置向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
所述第一装置接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
所述第一装置根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
第一消息也可以不包括N个第三验证信息,如果第一装置确定第二装置的身份验证失败,那么第一装置可能并不信任第二装置的验证结果。因此,第一装置可以向第二装置发送第二消息,第二消息用于请求获得至少一个第三装置对应的验证信息。第二装置接收来自第一装置的第二消息后,就可以将N个第三验证信息发送给主认证节点,例如第二装置可以向第一装置发送第三消息,第三消息包括N个第三验证信息。其中,N个第三验证信息可以包括第一集合中的全部的第三装置生成的第三验证信息,或者,N个第三验证信息也可以包括第一集合中的部分第三装置生成的第三验证信息。通过这种方式,第一装置可以在需要对第三装置进行验证时再请求获得第三验证信息,而第一消息不必包含第三验证信息。这样,如果第一装置对第二装置的身份验证成功,且第四验证信息指示对第一集合包括的第三装置的身份验证成功,则第一装置就无需请求获得第三验证信息,有助于节省信令开销。
结合第一方面,在第一方面的一种可能的实施方式中,所述第三装置的个数为多个,所述第一消息还包括第四验证信息,所述第四验证信息是将来自多个所述第三装置的多个第三验证信息聚合得到的;所述方法还包括:所述第一装置根据所述第四验证信息进行验证,以确定多个所述第三装置的身份是否验证成功。
第二装置可以将来自多个第三装置的多个第三验证信息进行聚合,得到第四验证信息,将第四验证信息发送给第一装置,例如一种聚合方式为将多个第三验证信息进行异或,得到第四验证信息,当然也可能有其它的聚合方式。通过这种方式得到的第四验证信息,相对于多个第三验证信息来说信息量较小,第二装置发送第四验证信息即可,无需发送多个第三验证信息,有助于节省信令开销。
结合第一方面,在第一方面的一种可能的实施方式中,所述方法还包括:
当根据所述第四验证信息确定多个所述第三装置的身份验证失败时,所述第一装置向所述第二装置发送第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
所述第一装置接收来自所述第二装置的第三消息,所述第三消息包括多个所述第三验证信息;
所述第一装置根据多个所述第三验证信息进行验证,以确定多个所述第三装置中的每个所述第三装置的身份是否验证成功。
由于第四验证信息是对多个第三验证信息进行聚合得到的,因此第一装置如果根据第四验证信息确定多个第三装置的身份验证失败,则只是总体认为多个第三装置中有第三装置的身份验证失败,但多个第三装置中究竟是哪些第三装置的身份验证失败,第一装置尚无法确定。因此,第一装置可以请求获得多个第三装置生成的多个第三验证信息,这样第一装置可以依次对多个第三验证信息进行验证,从而可以确定究竟是哪些第三装置的身份验证失败。通过这种方式,可以更为准确地定位身份验证失败的第三装置。
第二方面,提供第二种身份验证方法,该方法包括:第二装置向第三装置发送第二随机数,其中,第一车辆承载第一装置和第一集合,所述第二装置和所述第三装置属于所述第一集合,所述第一装置通过所述第二装置与所述第三装置通信;所述第二装置接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第三装置的身份信息和所述第二随机数生成的;所述第二装置根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功。
该第二方面的方法可由第二装置执行,第二装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,通信设备为车载装置。
本申请实施例中,第一集合包括第二装置和第三装置,第一装置可以对第二装置进行身份验证,第二装置可以对第三装置进行身份验证,也就是说,本申请实施例提供了一种层级验证的机制,一个层级的装置只需验证下一个层级的装置,通过层层递进的验证方式,使得身份验证的结果更为可靠。而且这种方式,对各级车载设备都能够进行身份验证,且对于每一层级的车载设备,需要验证的设备的数量也相对较少,有助于减轻设备的负担。
结合第二方面,在第二方面的一种可能的实施方式中,所述第二装置根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功,包括:所述第二装置根据所述第二随机数和所述第三装置的身份信息,生成第五验证信息;所述第二装置根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功。
例如对于第二装置来说,第三装置的身份信息是已知的,则第二装置可以按照与第三装置生成第三验证信息的相同的方式来生成验证信息,例如称为第五验证信息,或者,第三装置也可以事先将第三装置的身份信息发送给第二装置,则第二装置也可以按照与第三装置生成第三验证信息的相同的方式来生成第五验证信息。通过第三验证信息和第五验证信息就可以确定第三装置的身份是否验证成功。第二装置和第三装置采用相同的方式生成验证信息,由第二装置来进行验证,如果第三装置是身份验证成功的装置,则第三装置生成的第三验证信息应该和第二装置生成的第五验证信息是一致的,而如果第三装置被恶意替换,那么第三装置生成的第三验证信息可能就会有问题,就会与第五验证信息不一致。因此通过这种方式可以确定第三装置的身份是否验证成功。
结合第二方面,在第二方面的一种可能的实施方式中,所述第二装置根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功,包括:所述第二装置确定所述第五验证信息和所述第三验证信息是否一致;当所述第五验证信息和所述第三验证信息一致时,所述第一装置确定所述第三装置的身份验证成功。
第二装置可以比较第三验证信息和第五验证信息是否一致,如果第三验证信息和第五验证信息一致,则第二装置对第三装置的身份验证成功,或者说,第二装置确定第三装置的身份验证成功,或者,如果第三验证信息和第五验证信息不一致,则第二装置对第三装置的身份验证不成功,或者说,第二装置确定第三装置的身份验证失败。第二装置和第三装置采用相同的方式生成验证信息,由第二装置来进行验证,如果第三装置被恶意替换,那么第三装置生成的第三验证信息可能就会有问题,就会与第五验证信息不一致。因此通过这种方式可以确定第三装置的身份是否验证成功。
结合第二方面,在第二方面的一种可能的实施方式中,所述第三装置的个数为多个,则所述第五验证信息的个数为多个,以及所述第三验证信息的个数为多个,所述第二装置根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功,包括:
所述第二装置将多个所述第五验证信息进行聚合,得到第六验证信息,以及,将多个所述第三验证信息进行聚合,得到第七验证信息;
所述第二装置确定所述第六验证信息和所述第七验证信息是否一致;
当所述第六验证信息和所述第七验证信息一致时,所述第二装置确定多个所述第三装置的身份验证成功。
如果第三装置的个数大于1,那么第二装置可以将多个第五验证信息进行聚合得到第 六验证信息,以及将多个第三验证信息进行聚合得到第七验证信息,通过比较第六验证信息和第七验证信息就可以确定多个第三装置的身份是否验证成功。通过这种方式,第二装置无需一一比较第五验证信息和第三验证信息,只需通过一次比较总体确定多个第三装置的身份是否验证成功即可,减少了比较的过程,减轻了第二装置的负担,也提高了第二装置的执行效率。
结合第二方面,在第二方面的一种可能的实施方式中,所述方法还包括:所述第二装置根据所述第二装置的身份信息和来自所述第一装置的第一随机数生成第一验证信息;所述第二装置向所述第一装置发送第一消息,所述第一消息包括所述第一验证信息,其中,所述第一验证信息用于对所述第二装置的身份进行验证。
第二装置除了要验证第三装置之外,第一装置还需要对第二装置的身份进行验证。因此第二装置可以根据第二装置的身份信息和第一随机数生成第一验证信息,第一装置得到第一验证信息后就可以根据第一验证信息来验证第二装置的身份是否验证成功。相当于,第一装置对第二装置的身份进行验证,第二装置对第三装置的身份进行验证,形成了层级验证的机制。
结合第二方面,在第二方面的一种可能的实施方式中,所述第一消息还包括所述第三验证信息,所述第三验证信息为所述第二装置验证失败的第三验证信息,或,所述第三验证信息为所述第二装置验证成功的第三验证信息。
例如,第一消息除了包括第一验证信息之外,还可以包括N个第三验证信息,这N个第三验证信息可以是第一集合所包括的N个第三装置生成的,N个第三装置可以是第一集合所包括的全部的第三装置或部分第三装置,N为正整数。例如,第二装置除了将第一验证信息发送给第一装置之外,还可以将第一集合所包括的所有第三装置生成的第三验证信息均发送给第一装置,则N个第三装置就包括第一集合中的全部第三装置。这样使得第一装置能够获得较多的信息,在需要对第三装置进行身份验证时,能够对第一集合所包括的任意的第三装置进行身份验证。在这种情况下,所述的第三装置是N个第三装置中的一个,所述的第三装置可以是第二装置进行身份验证成功的第三装置,或者也可以是第二装置进行身份验证失败的第三装置。
或者,第二装置除了将第一验证信息发送给第一装置之外,还可以将第二装置验证失败的第三装置所生成的第三验证信息发送给第一装置,则N个第三装置可以包括第一集合中的全部第三装置或部分第三装置。第一消息只需要携带第二装置验证失败的第三装置生成的第三验证信息,无需携带第一集合中的所有的第三装置生成的第三验证信息,有助于节省信令开销。而且对于第二装置验证成功的第三装置,可能第一装置也无需再进行验证,因此对于验证可靠性的影响也不大。在这种情况下,所述的第三装置是N个第三装置中的一个,所述的第三装置是第二装置进行身份验证失败的第三装置。
结合第二方面,在第二方面的一种可能的实施方式中,所述第二随机数的长度与所述第一随机数的长度相同且内容不同,或,所述第二随机数是将所述第一随机数和第三随机数拼接后得到的,或,所述第二随机数与所述第一随机数相同。
例如,第二随机数可以根据第一随机数确定。作为第二随机数根据第一随机数确定的一种方式,第二随机数根据第一随机数确定可以是指,第二随机数的长度根据第一随机数来确定。例如第二随机数的长度可以与第一随机数相同,在这种情况下,第二随机数的内容可以跟第一随机数相同,即,第一随机数和第二随机数是同一个随机数,或者,第二随 机数的内容也可以跟第一随机数不同,即,第二随机数和第一随机数是两个长度相同但内容不同的随机数。
作为第二随机数根据第一随机数确定的另一种方式,第二随机数的部分内容或全部内容可以根据第一随机数确定。例如,次认证节点选择了第三随机数,第二随机数可以是将第一随机数和第三随机数进行级联(或者称为拼接)后得到的随机数,第二随机数的长度就是第一随机数的长度和第三随机数的长度之和。将第一随机数和第三随机数进行级联,例如将第三随机数的首位拼接到第一随机数的末位之后,得到第二随机数,或者将第一随机数的首位拼接到第三随机数的末位之后,得到第二随机数。
或者,第二随机数也可以通过其他方式得到,例如第二随机数的长度与第一随机数的长度不同,第二随机数也不是将第一随机数和第三随机数拼接后得到的,等等。
第三方面,提供第三种身份验证方法,该方法包括:第二装置向第三装置发送第一随机数,其中,第一车辆承载第一集合,所述第一集合包括所述第二装置和所述第三装置,所述第一车辆还承载第一装置,所述第一装置通过所述第二装置与所述第三装置通信;所述第二装置接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第一随机数和所述第三装置的身份信息生成的;所述第二装置根据所述第三验证信息得到第四验证信息,所述第四验证信息用于验证所述第三装置的身份是否验证成功;所述第二装置将所述第四验证信息发送给所述第一装置。
该第三方面的方法可由第三装置执行,第三装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,通信设备为车载装置。
本申请实施例中,第一集合包括第二装置和第三装置,第二装置可以将第三装置生成的第三验证信息进行处理,得到第四验证信息,由第一装置来根据第四验证信息验证第三装置的身份是否验证成功。相对于由第三装置直接将第三验证信息发送给第一装置来说,例如第三验证信息的个数大于1,则由第二装置根据第三验证信息得到第四验证信息,相当于根据多个第三验证信息得到了一个第四验证信息,减少了验证信息的个数,有助于节省信令开销。而且第二装置无需对第三装置进行验证,由第一装置进行验证即可,减轻了第二装置的负担。
结合第三方面,在第三方面的一种可能的实施方式中,所述方法还包括:所述第二装置根据所述第二装置的身份信息和所述第一随机数生成第一验证信息,所述第一验证信息用于验证所述第二装置的身份是否验证成功;所述第二装置将所述第一验证信息发送给所述第一装置。
第二装置除了将用于验证第三装置的身份的第四验证信息发送给第一装置之外,第二装置还可以将用于验证第二装置的身份的第一验证信息发送给第一装置,则第一装置除了对第三装置进行身份验证之外,还可以对第二装置进行身份验证,这样可以使得第一车辆所承载的各个装置都能够得到验证,提高第一车辆所承载的装置的安全性。
结合第三方面,在第三方面的一种可能的实施方式中,所述第三装置的个数为多个,相应的,所述第三验证信息的个数为多个,所述第二装置根据所述第三验证信息得到第四验证信息,包括:所述第二装置将多个所述第三验证信息进行聚合,得到所述第四验证信息。
第二装置可以将来自多个第三装置的多个第三验证信息进行聚合,得到第四验证信息,将第四验证信息发送给第一装置,例如一种聚合方式为将多个第三验证信息进行异或,得 到第四验证信息,当然也可能有其它的聚合方式。通过这种方式得到的第四验证信息,相对于多个第三验证信息来说信息量较小,第二装置发送第四验证信息即可,无需发送多个第三验证信息,有助于节省信令开销。
结合第三方面,在第三方面的一种可能的实施方式中,所述方法还包括:所述第二装置接收来自所述第一装置的第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;所述第二装置向所述第一装置发送第三消息,所述第三消息包括多个所述第三验证信息。
由于第四验证信息是对多个第三验证信息进行聚合得到的,因此第一装置如果根据第四验证信息确定多个第三装置的身份验证失败,则只是总体认为多个第三装置中有第三装置的身份验证设备,但多个第三装置中究竟是哪些第三装置的身份验证设备,第一装置尚无法确定。因此,第一装置可以请求获得多个第三装置生成的多个第三验证信息,这样第一装置可以依次对多个第三验证信息进行验证,从而可以确定究竟是哪些第三装置的身份验证失败。通过这种方式,可以更为准确地定位身份验证失败的第三装置。
第四方面,提供一种通信装置,例如该通信装置为如前所述的第一装置。所述通信装置用于执行上述第一方面或第一方面的任一可能的实现方式中的方法。具体地,所述通信装置可以包括用于执行第一方面或第一方面的任一可能的实现方式中的方法的模块,例如包括处理模块和收发模块。其中,收发模块可以是指一个功能模块,该功能模块既能完成接收信息的功能也能完成发送信息的功能。或者,收发模块可以是发送模块和接收模块的统称,发送模块用于完成发送信息的功能,接收模块用于完成接收信息的功能。示例性地,所述通信装置为车载装置。其中,
所述收发模块,用于向第二装置发送第一随机数,其中,第一车辆承载所述第一装置和第一集合,所述第二装置属于所述第一集合,所述第一集合还包括第三装置,所述第一装置通过所述第二装置与所述第三装置通信;
所述收发模块,还用于接收来自所述第二装置的第一消息,所述第一消息包括第一验证信息,所述第一验证信息用于对所述第二装置的身份进行验证,所述第一验证信息是根据所述第二装置的身份信息和所述第一随机数生成的;
所述处理模块,用于根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功。
结合第四方面,在第四方面的一种可能的实施方式中,所述处理模块用于通过如下方式根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功:
根据所述第二装置的身份信息和所述第一随机数生成第二验证信息;
确定所述第一验证信息和所述第二验证信息是否一致;
当所述第一验证信息和所述第二验证信息一致时,确定所述第二装置的身份验证成功。
结合第四方面,在第四方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述处理模块用于通过如下方式根据所述第二装置的身份信息和所述第一随机数生成第二验证信息:
根据所述第二装置的身份信息、所述第四验证信息和所述第一随机数,生成所述第二验证信息。
结合第四方面,在第四方面的一种可能的实施方式中,所述第一消息还包括所述第三装置所生成的第三验证信息,其中,所述第三验证信息是所述第三装置根据所述第三装置 的身份信息获得的。
结合第四方面,在第四方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述处理模块,还用于在确定所述第二装置的身份验证成功之后,当所述第四验证信息指示对所述第三装置的身份验证失败时,根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
结合第四方面,在第四方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,
所述收发模块,还用于当所述第四验证信息用于指示对所述第三装置的身份验证不成功,向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
所述收发模块,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
所述处理模块,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
结合第四方面,在第四方面的一种可能的实施方式中,
所述收发模块,还用于当所述处理模块确定所述第二装置的身份验证失败时,向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
所述收发模块,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
所述处理模块,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
结合第四方面,在第四方面的一种可能的实施方式中,所述第三装置的个数为多个,所述第一消息还包括第四验证信息,所述第四验证信息是将来自多个所述第三装置的多个第三验证信息聚合得到的;所述处理模块,还用于根据所述第四验证信息进行验证,以确定多个所述第三装置的身份是否验证成功。
结合第四方面,在第四方面的一种可能的实施方式中,
所述收发模块,还用于当所述处理模块根据所述第四验证信息确定多个所述第三装置的身份验证失败时,向所述第二装置发送第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
所述收发模块,还用于接收来自所述第二装置的第三消息,所述第三消息包括多个所述第三验证信息;
所述处理模块,还用于根据多个所述第三验证信息进行验证,以确定多个所述第三装置中的每个所述第三装置的身份是否验证成功。
关于第四方面或第四方面的各种可能的实施方式所带来的技术效果,可参考对于第一方面或第一方面的各种可能的实施方式的技术效果的介绍。
第五方面,提供一种通信装置,例如该通信装置为如前所述的第二装置。所述通信装置用于执行上述第二方面或第二方面的任一可能的实现方式中的方法。具体地,所述通信装置可以包括用于执行第二方面或第二方面的任一可能的实现方式中的方法的模块,例如包括处理模块和收发模块。其中,收发模块可以是指一个功能模块,该功能模块既能完成 接收信息的功能也能完成发送信息的功能。或者,收发模块可以是发送模块和接收模块的统称,发送模块用于完成发送信息的功能,接收模块用于完成接收信息的功能。示例性地,所述通信装置为车载装置。其中,
所述收发模块,用于向第三装置发送第二随机数,其中,第一车辆承载第一装置和第一集合,所述第二装置和所述第三装置属于所述第一集合,所述第一装置通过所述第二装置与所述第三装置通信;
所述收发模块,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第三装置的身份信息和所述第二随机数生成的;
所述处理模块,用于根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功。
结合第五方面,在第五方面的一种可能的实施方式中,所述处理模块用于通过如下方式根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功:
根据所述第二随机数和所述第三装置的身份信息,生成第五验证信息;
根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功。
结合第五方面,在第五方面的一种可能的实施方式中,所述处理模块用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
确定所述第五验证信息和所述第三验证信息是否一致;
当所述第五验证信息和所述第三验证信息一致时,确定所述第三装置的身份验证成功。
结合第五方面,在第五方面的一种可能的实施方式中,所述第三装置的个数为多个,则所述第五验证信息的个数为多个,以及所述第三验证信息的个数为多个,所述处理模块用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
将多个所述第五验证信息进行聚合,得到第六验证信息,以及,将多个所述第三验证信息进行聚合,得到第七验证信息;
确定所述第六验证信息和所述第七验证信息是否一致;
当所述第六验证信息和所述第七验证信息一致时,确定多个所述第三装置的身份验证成功。
结合第五方面,在第五方面的一种可能的实施方式中,
所述处理模块,还用于根据所述第二装置的身份信息和来自所述第一装置的第一随机数生成第一验证信息;
所述收发模块,还用于向所述第一装置发送第一消息,所述第一消息包括所述第一验证信息,其中,所述第一验证信息用于对所述第二装置的身份进行验证。
结合第五方面,在第五方面的一种可能的实施方式中,所述第一消息还包括所述第三验证信息,所述第三验证信息为所述第二装置验证失败的第三验证信息,或,所述第三验证信息为所述第二装置验证成功的第三验证信息。
结合第五方面,在第五方面的一种可能的实施方式中,所述第二随机数的长度与所述第一随机数的长度相同且内容不同,或,所述第二随机数是将所述第一随机数和第三随机数拼接后得到的,或,所述第二随机数与所述第一随机数相同。
关于第五方面或第五方面的各种可能的实施方式所带来的技术效果,可参考对于第二方面或第二方面的各种可能的实施方式的技术效果的介绍。
第六方面,提供一种通信装置,例如该通信装置为如前所述的第二装置。所述通信装置用于执行上述第三方面或第三方面的任一可能的实现方式中的方法。具体地,所述通信装置可以包括用于执行第三方面或第三方面的任一可能的实现方式中的方法的模块,例如包括处理模块和收发模块。其中,收发模块可以是指一个功能模块,该功能模块既能完成接收信息的功能也能完成发送信息的功能。或者,收发模块可以是发送模块和接收模块的统称,发送模块用于完成发送信息的功能,接收模块用于完成接收信息的功能。示例性地,所述通信装置为车载装置。其中,
所述收发模块,用于向第三装置发送第一随机数,其中,第一车辆承载第一集合,所述第一集合包括所述第二装置和所述第三装置,所述第一车辆还承载第一装置,所述第一装置通过所述第二装置与所述第三装置通信;
所述收发模块,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第一随机数和所述第三装置的身份信息生成的;
所述处理模块,用于根据所述第三验证信息得到第四验证信息,所述第四验证信息用于验证所述第三装置的身份是否验证成功;
所述收发模块,还用于将所述第四验证信息发送给所述第一装置。
结合第六方面,在第六方面的一种可能的实施方式中,
所述收发模块,还用于根据所述第二装置的身份信息和所述第一随机数生成第一验证信息,所述第一验证信息用于验证所述第二装置的身份是否验证成功;
所述处理模块,还用于将所述第一验证信息发送给所述第一装置。
结合第六方面,在第六方面的一种可能的实施方式中,所述第三装置的个数为多个,相应的,所述第三验证信息的个数为多个,所述处理模块用于通过如下方式根据所述第三验证信息得到第四验证信息:
将多个所述第三验证信息进行聚合,得到所述第四验证信息。
结合第六方面,在第六方面的一种可能的实施方式中,所述收发模块还用于:
接收来自所述第一装置的第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
向所述第一装置发送第三消息,所述第三消息包括多个所述第三验证信息。
关于第六方面或第六方面的各种可能的实施方式所带来的技术效果,可参考对于第三方面或第三方面的各种可能的实施方式的技术效果的介绍。
第七方面,提供一种通信装置,该通信装置例如为如前所述的第一装置。该通信装置包括处理器和收发器,处理器和收发器用于实现上述第一方面或第一方面的各种可能的设计所描述的方法。示例性地,所述通信装置为设置在通信设备中的芯片。其中,收发器例如通过通信设备中的天线、馈线和编解码器等实现,或者,如果所述通信装置为设置在通信设备中的芯片,那么收发器例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。示例性的,所述通信设备为车载装置。其中,
所述收发器,用于向第二装置发送第一随机数,其中,第一车辆承载所述第一装置和第一集合,所述第二装置属于所述第一集合,所述第一集合还包括第三装置,所述第一装置通过所述第二装置与所述第三装置通信;
所述收发器,还用于接收来自所述第二装置的第一消息,所述第一消息包括第一验证 信息,所述第一验证信息用于对所述第二装置的身份进行验证,所述第一验证信息是根据所述第二装置的身份信息和所述第一随机数生成的;
所述处理器,用于根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功。
结合第七方面,在第七方面的一种可能的实施方式中,所述处理器用于通过如下方式根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功:
根据所述第二装置的身份信息和所述第一随机数生成第二验证信息;
确定所述第一验证信息和所述第二验证信息是否一致;
当所述第一验证信息和所述第二验证信息一致时,确定所述第二装置的身份验证成功。
结合第七方面,在第七方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述处理器用于通过如下方式根据所述第二装置的身份信息和所述第一随机数生成第二验证信息:
根据所述第二装置的身份信息、所述第四验证信息和所述第一随机数,生成所述第二验证信息。
结合第七方面,在第七方面的一种可能的实施方式中,所述第一消息还包括所述第三装置所生成的第三验证信息,其中,所述第三验证信息是所述第三装置根据所述第三装置的身份信息获得的。
结合第七方面,在第七方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述处理器,还用于在确定所述第二装置的身份验证成功之后,当所述第四验证信息指示对所述第三装置的身份验证失败时,根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
结合第七方面,在第七方面的一种可能的实施方式中,所述第一消息还包括第四验证信息,
所述收发器,还用于当所述第四验证信息用于指示对所述第三装置的身份验证不成功,向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
所述收发器,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
所述处理器,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
结合第七方面,在第七方面的一种可能的实施方式中,
所述收发器,还用于当所述处理模块确定所述第二装置的身份验证失败时,向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
所述收发器,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
所述处理器,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
结合第七方面,在第七方面的一种可能的实施方式中,所述第三装置的个数为多个,所述第一消息还包括第四验证信息,所述第四验证信息是将来自多个所述第三装置的多个第三验证信息聚合得到的;所述处理器,还用于根据所述第四验证信息进行验证,以确定 多个所述第三装置的身份是否验证成功。
结合第七方面,在第七方面的一种可能的实施方式中,
所述收发器,还用于当所述处理模块根据所述第四验证信息确定多个所述第三装置的身份验证失败时,向所述第二装置发送第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
所述收发器,还用于接收来自所述第二装置的第三消息,所述第三消息包括多个所述第三验证信息;
所述处理器,还用于根据多个所述第三验证信息进行验证,以确定多个所述第三装置中的每个所述第三装置的身份是否验证成功。
关于第七方面或第七方面的各种可能的实施方式所带来的技术效果,可参考对于第一方面或第一方面的各种可能的实施方式的技术效果的介绍。
第八方面,提供一种通信装置,该通信装置例如为如前所述的第二装置。该通信装置包括处理器和收发器,处理器和收发器用于实现上述第二方面或第二方面的各种可能的设计所描述的方法。示例性地,所述通信装置为设置在通信设备中的芯片。其中,收发器例如通过通信设备中的天线、馈线和编解码器等实现,或者,如果所述通信装置为设置在通信设备中的芯片,那么收发器例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。示例性的,所述通信设备为车载装置。其中,
所述收发器,用于向第三装置发送第二随机数,其中,第一车辆承载第一装置和第一集合,所述第二装置和所述第三装置属于所述第一集合,所述第一装置通过所述第二装置与所述第三装置通信;
所述收发器,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第三装置的身份信息和所述第二随机数生成的;
所述处理器,用于根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功。
结合第八方面,在第八方面的一种可能的实施方式中,所述处理器用于通过如下方式根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功:
根据所述第二随机数和所述第三装置的身份信息,生成第五验证信息;
根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功。
结合第八方面,在第八方面的一种可能的实施方式中,所述处理器用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
确定所述第五验证信息和所述第三验证信息是否一致;
当所述第五验证信息和所述第三验证信息一致时,确定所述第三装置的身份验证成功。
结合第八方面,在第八方面的一种可能的实施方式中,所述第三装置的个数为多个,则所述第五验证信息的个数为多个,以及所述第三验证信息的个数为多个,所述处理器用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
将多个所述第五验证信息进行聚合,得到第六验证信息,以及,将多个所述第三验证信息进行聚合,得到第七验证信息;
确定所述第六验证信息和所述第七验证信息是否一致;
当所述第六验证信息和所述第七验证信息一致时,确定多个所述第三装置的身份验证成功。
结合第八方面,在第八方面的一种可能的实施方式中,
所述处理器,还用于根据所述第二装置的身份信息和来自所述第一装置的第一随机数生成第一验证信息;
所述收发器,还用于向所述第一装置发送第一消息,所述第一消息包括所述第一验证信息,其中,所述第一验证信息用于对所述第二装置的身份进行验证。
结合第八方面,在第八方面的一种可能的实施方式中,所述第一消息还包括所述第三验证信息,所述第三验证信息为所述第二装置验证失败的第三验证信息,或,所述第三验证信息为所述第二装置验证成功的第三验证信息。
结合第八方面,在第八方面的一种可能的实施方式中,所述第二随机数的长度与所述第一随机数的长度相同且内容不同,或,所述第二随机数是将所述第一随机数和第三随机数拼接后得到的,或,所述第二随机数与所述第一随机数相同。
关于第八方面或第八方面的各种可能的实施方式所带来的技术效果,可参考对于第二方面或第二方面的各种可能的实施方式的技术效果的介绍。
第九方面,提供一种通信装置,该通信装置例如为如前所述的第二装置。该通信装置包括处理器和收发器,处理器和收发器用于实现上述第三方面或第三方面的各种可能的设计所描述的方法。示例性地,所述通信装置为设置在通信设备中的芯片。其中,收发器例如通过通信设备中的天线、馈线和编解码器等实现,或者,如果所述通信装置为设置在通信设备中的芯片,那么收发器例如为芯片中的通信接口,该通信接口与通信设备中的射频收发组件连接,以通过射频收发组件实现信息的收发。示例性的,所述通信设备为车载装置。其中,
所述收发器,用于向第三装置发送第一随机数,其中,第一车辆承载第一集合,所述第一集合包括所述第二装置和所述第三装置,所述第一车辆还承载第一装置,所述第一装置通过所述第二装置与所述第三装置通信;
所述收发器,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第一随机数和所述第三装置的身份信息生成的;
所述处理器,用于根据所述第三验证信息得到第四验证信息,所述第四验证信息用于验证所述第三装置的身份是否验证成功;
所述收发器,还用于将所述第四验证信息发送给所述第一装置。
结合第九方面,在第九方面的一种可能的实施方式中,
所述收发器,还用于根据所述第二装置的身份信息和所述第一随机数生成第一验证信息,所述第一验证信息用于验证所述第二装置的身份是否验证成功;
所述处理器,还用于将所述第一验证信息发送给所述第一装置。
结合第九方面,在第九方面的一种可能的实施方式中,所述第三装置的个数为多个,相应的,所述第三验证信息的个数为多个,所述处理器用于通过如下方式根据所述第三验证信息得到第四验证信息:
将多个所述第三验证信息进行聚合,得到所述第四验证信息。
结合第九方面,在第九方面的一种可能的实施方式中,所述收发器还用于:
接收来自所述第一装置的第二消息,所述第二消息用于请求获得多个所述第三装置对 应的验证信息;
向所述第一装置发送第三消息,所述第三消息包括多个所述第三验证信息。
关于第九方面或第九方面的各种可能的实施方式所带来的技术效果,可参考对于第三方面或第三方面的各种可能的实施方式的技术效果的介绍。
第十方面,提供一种通信装置。该通信装置可以为上述方法设计中的第一装置。示例性地,所述通信装置为设置在通信设备中的芯片。示例性地,通信设备为车载装置。该通信装置包括:存储器,用于存储计算机可执行程序代码;以及处理器,处理器与存储器耦合。其中存储器所存储的程序代码包括指令,当处理器执行所述指令时,使该通信装置执行上述第一方面或第一方面的任意一种可能的实施方式中的方法。
其中,该通信装置还可以包括通信接口,该通信接口可以是该通信装置中的收发器,例如通过所述通信装置中的天线、馈线和编解码器等实现,或者,如果该通信装置为设置在通信设备中的芯片,则通信接口可以是该芯片的输入/输出接口,例如输入/输出管脚等。
第十一方面,提供一种通信装置。该通信装置可以为上述方法设计中的第二装置。示例性地,所述通信装置为设置在通信设备中的芯片。示例性地,通信设备为车载装置。该通信装置包括:存储器,用于存储计算机可执行程序代码;以及处理器,处理器与存储器耦合。其中存储器所存储的程序代码包括指令,当处理器执行所述指令时,使该通信装置执行上述第二方面或第二方面的任意一种可能的实施方式中的方法。
其中,该通信装置还可以包括通信接口,该通信接口可以是该通信装置中的收发器,例如通过所述通信装置中的天线、馈线和编解码器等实现,或者,如果该通信装置为设置在该通信设备中的芯片,则通信接口可以是该芯片的输入/输出接口,例如输入/输出管脚等。
第十二方面,提供一种通信装置。该通信装置可以为上述方法设计中的第三装置。示例性地,所述通信装置为设置在通信设备中的芯片。示例性地,通信设备为车载装置。该通信装置包括:存储器,用于存储计算机可执行程序代码;以及处理器,处理器与存储器耦合。其中存储器所存储的程序代码包括指令,当处理器执行所述指令时,使该通信装置执行上述第三方面或第三方面的任意一种可能的实施方式中的方法。
其中,该通信装置还可以包括通信接口,该通信接口可以是该通信装置中的收发器,例如通过所述通信装置中的天线、馈线和编解码器等实现,或者,如果该通信装置为设置在通信设备中的芯片,则通信接口可以是该芯片的输入/输出接口,例如输入/输出管脚等。
第十三方面,提供第一种通信系统,该通信系统包括第四方面所述的通信装置、第七四方面所述的通信装置或第十方面所述的通信装置,以及,包括第五方面所述的通信装置、第八方面所述的通信装置或第十一方面所述的通信装置。
第十四方面,提供第二种通信系统,该通信系统包括第四方面所述的通信装置、第七四方面所述的通信装置或第十方面所述的通信装置,以及,包括第六方面所述的通信装置、第九方面所述的通信装置或第十二方面所述的通信装置。
第一种通信系统和第二种通信系统可以是同一通信系统,或者也可以是不同的通信系统。
第十五方面,提供一种计算机存储介质,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述第一方面或第一方面的任意一种可能的实施方式中所述的方法。
第十六方面,提供一种计算机存储介质,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述第二方面或第一方面的任意一种可能的实施方式中所述的方法。
第十七方面,提供一种计算机存储介质,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述第三方面或第三方面的任意一种可能的实施方式中所述的方法。
第十八方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述第一方面或第一方面的任意一种可能的实施方式中所述的方法。
第十九方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述第二方面或第而方面的任意一种可能的实施方式中所述的方法。
第二十方面,提供一种包含指令的计算机程序产品,所述计算机程序产品用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述第三方面或第三方面的任意一种可能的实施方式中所述的方法。
在如上提供的各个方面中,例如,设备1对设备2的身份验证成功,则设备1可以认为设备2的身份是合法的,而如果设备1对设备2的身份验证不成功(或,身份验证失败),则设备1可以认为设备2的身份是不合法的。例如,第一装置对第二装置的身份验证成功,那么第一装置可以认为第二装置的身份是合法的,而如果第一装置对第二装置的身份验证不成功(或,身份验证失败),则第一装置可以认为第二装置的身份是不合法的。
本申请实施例提供了层级验证机制,对车辆所承载的各个装置都能进行验证,层级验证能够尽量保证较高的验证可靠性。且对于每一层级的装置来说,需要验证的装置的个数较少,有助于减轻设备的负担。
附图说明
图1为本申请实施例应用的一种网络架构的示意图;
图2为本申请实施例提供的第一种身份验证方法的流程图;
图3为本申请实施例提供的第一种身份验证方法的一种示例的流程图;
图4为本申请实施例提供的第一种身份验证方法的一种示例的流程图;
图5为本申请实施例提供的第一种身份验证方法的一种示例的流程图;
图6为本申请实施例提供的对主认证节点进行身份认证的一种方法的流程图;
图7为本申请实施例提供的第二种身份验证方法的流程图;
图8为本申请实施例提供的第二种身份验证方法的一种示例的流程图;
图9为本申请实施例提供的第一种第一装置的示意性框图;
图10为本申请实施例提供的第一种第一装置的另一示意性框图;
图11为本申请实施例提供的第一种第二装置的示意性框图;
图12为本申请实施例提供的第一种第二装置的另一示意性框图;
图13为本申请实施例提供的第二种第二装置的示意性框图;
图14为本申请实施例提供的第二种第二装置的另一示意性框图;
图15为本申请实施例提供的通信装置的示意性框图;
图16为本申请实施例提供的通信装置的另一示意性框图;
图17为本申请实施例提供的通信装置的再一示意性框图。
具体实施方式
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。
1)车载设备,放置或安装在车辆上的设备都可以认为是车载设备。例如对于能够执行自动驾驶功能的车辆来说,一般依赖ADAS系统提供信息进行驾驶决策,而ADAS包括很多传感器,例如照相机、毫米波雷达、超声波雷达或LiDAR等,这些传感器都可以认为是车载设备。例如,一辆车的车内网络可以包括多个电子控制单元(electronic control unit,ECU),这些ECU都可以认为是车载设备。
例如,一种车载设备为车载单元(on board unit,OBU),一般安装在车辆上,在电子不停车收费系统(electronic toll collection,ETC)系统中,路边架设路侧单元(road side unit,RSU),OBU可以与RSU进行通信,例如可以通过微波来通信。在车辆通过RSU时,OBU和RSU之间可以使用微波进行通信。在ETC系统中,OBU采用专用短距离通信(dedicated short range communications,DSRC)技术,与RSU建立微波通信链路,在车辆行进的途中,在不停车的情况下,可以实现车辆的身份识别或电子扣费等过程。
或者,如下介绍的各种终端设备,如果位于车辆上(例如放置在车辆内或安装在车辆内),都可以认为是车载终端设备,或者称为车载设备。
终端设备,包括向用户提供语音和/或数据连通性的设备,例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。该终端设备可以经无线接入网(radio access network,RAN)与核心网进行通信,与RAN交换语音和/或数据。该终端设备可以包括用户设备(user equipment,UE)、无线终端设备、移动终端设备、设备到设备通信(device-to-device,D2D)终端设备、V2X终端设备、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)终端设备、物联网(internet of things,IoT)终端设备、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、远程站(remote station)、接入点(access point,AP)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、或用户装备(user device)等。例如,可以包括移动电话(或称为“蜂窝”电话),具有移动终端设备的计算机,便携式、袖珍式、手持式、计算机内置的移动装置等。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、等设备。还包括受限设备,例如功耗较低的设备,或存储能力有限的设备,或计算能力有限的设备等。例如包括条码、射频识别(radio frequency identification,RFID)、传感器、全球定位系统(global positioning system,GPS)、激光扫描器等信息传感设备。
作为示例而非限定,在本申请实施例中,放置或安装在车辆上的车载设备还可以包括可穿戴设备。可穿戴设备也可以称为穿戴式智能设备或智能穿戴式设备等,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设 备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能头盔、智能首饰等。
2)本申请实施例中的术语“系统”和“网络”可被互换使用。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。
以及,除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。例如,第一消息和第二消息,只是为了区分不同的消息,而并不是表示这两种消息的优先级、发送顺序或者重要程度等的不同。
如上介绍了本申请实施例涉及的一些概念,下面介绍本申请实施例的技术特征。
一辆车内会有多个车载设备,例如能够执行自动驾驶的车辆,一般依赖高级驾驶员辅助系统(advanced driver-assistance systems,ADAS)提供信息进行驾驶决策,而ADAS包括很多传感器,例如照相机、毫米波雷达、超声波雷达或光学雷达(LiDAR)等,这些传感器都是车载设备。显而易见地,这些车载设备对车辆功能及驾驶安全的重要性不言而喻。
但是,正规的ADAS传感器和ECU等车载设备,由于质量好,价格高,则维修人员为了获利,有动机使用假冒的低质量的设备来替换这些车载设备。或者,为了利润,非法商人也有动机去售卖伪劣的车载设备而获利。例如,ADAS传感器一般都位于车外,较容易被盗或被替换。而即使位于车内的车载设备,在维护或维修时也可能遭到替换。
伪劣的车载设备会影响车辆的性能,甚至可能影响驾驶安全性。从信息安全的角度来讲,伪劣的车载设备更会引入系统弱点和风险。因此,保证车载设备的真实性和正规性至关重要。但对于车载设备的验证,目前尚无较为可靠的方式。
鉴于此,提供本申请实施例的技术方案。本申请实施例中,第一集合包括第二装置和第三装置,而第一装置对第二装置进行验证即可,至于第三装置,例如可以由第二装置来验证,这样,对各级车载设备都能够进行身份验证,而且对于每一层级的车载设备,需要验证的设备的数量也相对较少,有助于减轻设备的负担。
下面介绍本申请实施例所应用的网络架构。请参考图1,为本申请实施例所应用的一种网络架构。
图1所示的,是一个车辆所包括的全部的车载设备或部分的车载设备。这些车载设备可以被分成若干个域(domain),每个域包括一个或多个车载设备,每个域有一个域管理员(domain manager,DM),例如,ADAS传感器构成一个域,其域管理员是移动数据中心(mobile data center,MDC)。另外图1中还包括DM1、DM2、DM3和DM4这4个域管理员,这4个域管理员对应于4个域,这4个域中的车载设备均以ECU为例。域内的设备通过DM与网关(gateway)通信。在本申请实施例中,可以认为域管理员是次级节点,域管理员都与网关连接,可以认为网关是主级节点。例如可以将次级节点称为次认证节点, 可以将主级节点称为主认证节点。或者,域也可以称为集合。对于一个车辆来说,一般可以包括一个主认证节点,以及包括一个或多个次认证节点。对于一个集合(或者一个域)来说,除了次认证节点之外,还可以包括一个或多个车载设备。
域管理员的设备类型可以和域内的一种设备的类型相同,或者,域管理员的设备类型和域内的设备的类型均不相同。另外,图1是以网关作为主级节点为例,实际上主级节点不限于网关,还可以是其他车载设备。
在将车载设备划分为多个域时,划分因素可能有多种。例如可以根据车载设备所完成的功能来进行划分。例如有几个车载设备用于协同完成某种功能(例如,动力功能),就可以将这几个车载设备划分为一个域。或者也可以按照其他因素来划分不同的域。而关于域管理员,例如随机选择域内的一个车载设备作为域管理员,或者也可以选择域内的有统筹管理功能的一个车载设备作为域管理员。
接下来结合附图介绍本申请实施例提供的技术方案。
本申请实施例提供第一种身份验证方法,请参见图2,为该方法的流程图。在下文的介绍过程中,以该方法应用于图1所示的网络架构为例。另外,该方法可由三个通信装置(或者说,三种通信装置)执行,这三个通信装置例如为第一通信装置、第二通信装置和第三通信装置。其中,第一通信装置、第二通信装置或第三通信装置,可以是车载装置或能够支持车载装置实现该方法所需的功能的通信装置(例如芯片系统),当然还可以是其他通信装置。且对于第一通信装置、第二通信装置和第三通信装置的实现方式均不做限制,例如这三个通信装置可以实现为相同的形式,例如均通过设备的形式实现,或者这三个通信装置也可以实现为不同的形式,例如第一通信装置通过设备的形式实现,第二通信装置通过芯片系统的方式实现,第三通信装置通过设备的形式实现,等等。
为了便于介绍,在下文中,以该方法由第一装置、第二装置和第三装置执行为例,也就是说,以第一通信装置是第一装置、第二通信装置是第二装置、第三通信装置是第三装置为例。因为本实施例是以应用在图1所示的网络架构为例,因此,下文中所述的第一装置可以是图1所示的网络架构中的主认证节点(例如为图1中的网关),下文中所述的第二装置可以是图1所示的网络架构中的次认证节点(例如为图1中的DM或MDC),下文中所述的第三装置可以是图1所示的网络架构中的域内的设备。为了便于理解,在下文的介绍过程中,以第一装置是主认证节点、第二装置是次认证节点、第三装置是域内设备为例。
S201、主认证节点向次认证节点发送第一随机数,次认证节点接收来自主认证节点的所述第一随机数。
其中,第一装置和第二装置承载在第一车辆中,第一车辆可以承载第一装置和至少一个集合,至少一个集合中的每个集合可以包括一个或多个装置。其中的每个集合中,可以包括一个作为次认证节点的装置。例如第一集合是至少一个集合中的一个集合,第一集合包括第二装置和第三装置,第二装置就是第一集合中的次认证节点。在第一集合中,第三装置的个数可以是一个或多个。第一装置可以通过第二装置与第一集合所包括的第三装置通信。例如图1中,主认证节点和次认证节点都承载在第一车辆中,除了主认证节点之外,第一车辆还承载至少一个集合(或,称为至少一个域),这里所述的次认证节点(也就是第二装置)是第一车辆承载的第一集合中的次认证节点,也就是说,第二装置属于至少一个集合中的一个集合,例如称为第一集合。第一集合除了包括第二装置,还包括第三装置 (也就是域内设备),则第一集合所包括的第三装置通过第二装置与第一装置进行通信。
主认证节点可以选择合适长度的随机数,例如称为第一随机数,第一随机数可以用r表示。主认证节点可以将r发送给次认证节点。r可以用于主认证节点后续对次认证节点的认证。其中,r的长度可以根据所需要的认证强度确定,例如所需要的认证强度是128比特(bit),那么r的长度就可以是128比特。一般来说,认证强度越强,则r的长度越长。但r的长度越长,所带来的认证过程的复杂度也较高,因此对于r的长度可以适当选取。或者r的长度也可以通过协议规定等,具体的不做限制。
其中,如果第一车辆包括了多个集合,每个集合包括一个次认证节点,则第一车辆就包括多个次认证节点。那么主认证节点可以将第一随机数发送给第一车辆包括的全部的次认证节点或部分次认证节点。不同的次认证节点接收第一随机数之后,操作方式都可以是类似的,因此图2所示的实施例只以第一集合所包括的次认证节点为例。
S202、次认证节点向第一集合内的域内设备发送第二随机数,第一集合内的域内设备接收来自次认证节点的第二随机数。
次认证节点可以选择合适长度的随机数,例如称为第二随机数,第二随机数可以用r’表示。次认证节点可以将r’发送给第一集合内的域内设备,例如次认证节点可以采用广播或组播的方式发送r’,则第一集合内的域内设备都可以接收来自次认证节点的r’,或者,次认证节点也可以采用单播的方式发送r’,例如次认证节点可以分别将r’发送给第一集合内的所有的域内设备,或者次认证节点也可以只将r’发送给第一集合内的部分域内设备,这部分域内设备例如是需要进行身份验证的域内设备。r’可以用于次认证节点对域内设备的认证。
例如,r’可以根据r确定。作为r’根据r确定的一种方式,r’根据r确定可以是指,r’的长度根据r来确定。例如r’的长度可以与r相同,在这种情况下,r’的内容可以跟r相同,即,r和r’是同一个随机数,或者,r’的内容也可以跟r不同,即,r’和r是两个长度相同但内容不同的随机数。
作为r’根据r确定的另一种方式,r’的部分内容或全部内容可以根据r确定。例如,次认证节点选择了随机数r”,例如将r”称为第三随机数。那么第二随机数r’就可以是将r和r”进行级联(或者称为拼接)后得到的随机数,r’的长度就是r的长度和r”的长度之和。将r和r”进行级联,例如将r”的首位拼接到r的末位之后,得到r’,或者将r的首位拼接到r”的末位之后,得到r’。例如,r为101010,r”为11110011,则r’可以是10101011110011,或者r’也可以是11110011101010。
或者,次认证节点也可以根据其他方式来确定r’,例如所确定的r’也可以与r无关,具体的不做限制。
S203、第一域内设备根据第一域内设备的身份信息获得第三验证信息。
第一域内设备例如是第一集合内的一个域内设备,也就是一个第三装置。第一集合可以包括一个域内设备或多个域内设备。如果第一集合包括一个域内设备,则该域内设备就是第一域内设备;或者,如果第一集合包括多个域内设备,则对于第一集合内接收了第二随机数的域内设备来说,在接收第二随机数之后的处理方式都是类似的,因此这里只以第一域内设备进行举例说明。域内设备的身份信息,例如包括域内设备的序列号,或者包括域内设备的身份号(ID),或者可以包括其他的能够唯一标识域内设备的身份的信息。
例如,第一域内设备可以根据第二随机数获得第三验证信息,或者根据第一域内设备 的身份信息
Figure PCTCN2020076661-appb-000001
获得第三验证信息,或者根据第二随机数和第一域内设备的身份信息
Figure PCTCN2020076661-appb-000002
获得第三验证信息。
作为第三验证信息的一种实现方式,第三验证信息可以是MAC值。例如第一域内设备可以根据r’和
Figure PCTCN2020076661-appb-000003
得到第三验证信息,例如将第三验证信息用s ij表示,
Figure PCTCN2020076661-appb-000004
或者,作为第三验证信息的另一种实现方式,第三验证信息也可以是数字签名,例如第一集合内的域内设备存储着非对称加密中的私钥,则第一域内设备可以根据所存储的私钥对第二随机数进行加密,获得第三验证信息,或者根据所存储的私钥对第一域内设备的身份信息
Figure PCTCN2020076661-appb-000005
进行加密,获得第三验证信息,或者根据所存储的私钥对第二随机数和第一域内设备的身份信息
Figure PCTCN2020076661-appb-000006
进行加密,获得第三验证信息。这里的第一集合内的域内设备所存储的私钥均可以称为第一私钥,如果第一集合包括多个域内设备,不同的域内设备存储的第一私钥可以相同,或者也可以不同。
S204、次认证节点根据第二随机数和第一域内设备的身份信息,生成第五验证信息。
其中,第一集合包括一个或多个域内设备,在S202中,次认证节点可以将r’发送给第一集合内的全部域内设备,那么在S204中,次认证节点就可以根据第二随机数和第一集合内的每个域内设备的身份信息,分别针对第一集合内的每个域内设备生成第五验证信息。或者,在S202中,次认证节点也可以只将r’发送给第一集合内的部分域内设备,这部分域内设备例如是需要进行身份验证的域内设备,那么在S204中,次认证节点就可以根据第二随机数和第一集合内的这部分域内设备的身份信息,分别针对这部分域内设备的每个域内设备生成第五验证信息。总之,次认证节点可以根据第二随机数和至少一个域内设备的身份信息得到至少一个第五验证信息,图2所示的实施例只以其中的第一域内设备为例。
例如,次认证节点可以根据第二随机数获得第五验证信息,或者根据第一域内设备的身份信息
Figure PCTCN2020076661-appb-000007
获得第五验证信息,或者根据第二随机数和第一域内设备的身份信息
Figure PCTCN2020076661-appb-000008
获得第五验证信息。
作为第五验证信息的一种实现方式,第五验证信息可以是MAC值。例如次认证节点可以根据r’和
Figure PCTCN2020076661-appb-000009
得到第五验证信息,例如将第五验证信息用s′ ij表示,
Figure PCTCN2020076661-appb-000010
或者,作为第五验证信息的另一种实现方式,第五验证信息也可以是数字签名,例如次认证节点存储着非对称加密中的公钥,则次认证节点可以根据所存储的公钥对第二随机数进行加密,获得第五验证信息,或者根据所存储的公钥对第一域内设备的身份信息
Figure PCTCN2020076661-appb-000011
进行加密,获得第五验证信息,或者根据所存储的公钥对第二随机数和第一域内设备的身份信息
Figure PCTCN2020076661-appb-000012
进行加密,获得第五验证信息。这里的次认证节点存储的公钥可以称为第一公钥,第一公钥和第一私钥可以是一对非对称密钥。
次认证节点可以根据第二随机数和至少一个域内设备的身份信息得到至少一个第五 验证信息,那么在得到至少一个第五验证信息后,如果至少一个第五验证信息的个数大于1,则作为一种可选的方式,次认证节点还可以将至少一个第五验证信息进行聚合,得到第六验证信息。例如,次认证节点得到的至少一个第五验证信息分别表示为s′ i1,s′ i2,s′ i3,……,则次认证节点将至少一个第五验证信息进行聚合,一种聚合方式可以是,
Figure PCTCN2020076661-appb-000013
Figure PCTCN2020076661-appb-000014
其中s″ ij表示第六验证信息,
Figure PCTCN2020076661-appb-000015
表示异或运算。或者,次认证节点也可以采用其他方式将至少一个第五验证信息进行聚合。
其中,S203可以在S204之前执行,或者S203在S204之后执行,或者S203和S204同步执行。
S205、第一域内设备向次认证节点发送第三验证信息,次认证节点接收来自第一域内设备的第三验证信息。
接收了r’的域内设备都可以获得第三验证信息。在S202中,次认证节点可以将r’发送给第一集合内的全部域内设备,那么在S205中,可以是第一集合内的全部域内设备都将第三验证信息发送给次认证节点。或者,在S202中,次认证节点也可以只将r’发送给第一集合内的部分域内设备,那么在S205中,可以是第一集合内的这部分域内设备将第三验证信息发送给次认证节点。总之,次认证节点是可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,图2只是以其中的第一域内设备为例。
次认证节点可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,那么在得到至少一个第三验证信息后,如果至少一个第三验证信息的个数大于1,则作为一种可选的方式,次认证节点还可以将至少一个第三验证信息进行聚合,得到第七验证信息。例如,次认证节点得到的至少一个第三验证信息分别表示为s i1,s i2,s i3,……,则次认证节点将至少一个第三验证信息进行聚合,一种聚合方式可以是,
Figure PCTCN2020076661-appb-000016
其中s″′ ij表示第七验证信息,
Figure PCTCN2020076661-appb-000017
表示异或运算。或者,次认证节点也可以采用其他方式将至少一个第三验证信息进行聚合。需要注意的是,次认证节点对至少一个第三验证信息进行聚合的方式,和对至少一个第五验证信息进行聚合的方式,应该是一致的,例如次认证节点采用如上介绍的异或运算的方式将至少一个第三验证信息进行聚合,那么次认证节点也需要采用如上介绍的异或运算的方式将至少一个第五验证信息进行聚合。
S206、次认证节点根据第二随机数和第三验证信息,以确定第一域内设备的身份是否验证成功。
其中,次认证节点在S205中可以接收来自至少一个域内设备的至少一个第三验证信息,那么在S206中,次认证节点可以根据第二随机数和至少一个第三验证信息进行验证,以确定至少一个域内设备的身份是否验证成功。因为对于每个域内设备来说,次认证节点的验证过程都是类似的,因此图2只是以其中的第一域内设备为例。
在S204中,次认证节点已经根据第二随机数和第一域内设备的身份信息生成了第五验证信息,那么在S206中,次认证节点可以根据第五验证信息和第三验证信息进行验证, 以确定第一域内设备的身份是否验证成功。在本申请的各个实施例中,例如,设备1对设备2的身份验证成功,则设备1可以认为设备2的身份是合法的,而如果设备1对设备2的身份验证不成功(或,身份验证失败),则设备1可以认为设备2的身份是不合法的。例如,次认证节点对第一域内设备的身份验证成功,那么次认证节点可以认为第一域内设备的身份是合法的,而如果次认证节点对第一域内设备的身份验证不成功(或,身份验证失败),则次认证节点可以认为第一域内设备的身份是不合法的。例如,次认证节点可以将第五验证信息和第三验证信息进行比对,以确定二者是否一致。如果二者一致,则次认证节点确定第一域内设备的身份验证成功,而如果二者不一致,则次认证节点确定第一域内设备的身份验证失败。例如第五验证信息为s′ ij,第三验证信息为s ij,则次认证节点可以将s′ ij和s ij进行比较,确定二者是否一致。如果s′ ij和s ij相同,则次认证节点确定第一域内设备的身份验证成功,或者,如果s′ ij和s ij不同,则次认证节点确定第一域内设备的身份验证失败。通过这种方式,次认证节点可以分别确定第一集合内的至少一个域内设备的身份是否验证成功,确定的粒度较细。
或者,在前文介绍了,次认证节点可以将至少一个第三验证信息进行聚合,得到第七验证信息,以及将至少一个第五验证信息进行聚合,得到第六验证信息,那么,次认证节点根据第二随机数和第三验证信息进行验证,也可以是,次认证节点将第六验证信息和第七验证信息进行比对,以确定第六验证信息和第七验证信息是否一致,如果第六验证信息和第七验证信息一致,则次认证节点确定所述的至少一个域内设备的身份验证成功,或者,如果第六验证信息和第七验证信息不一致,则次认证节点确定所述的至少一个域内设备的身份验证失败。在这种方式下,次认证节点只需确定第六验证信息和第七验证信息是否一致即可,无需针对每个域内设备都分别确定身份是否验证成功,可以减少次认证节点的工作量。
S207、次认证节点向主认证节点发送第一消息,主认证节点接收来自次认证节点的所述第一消息,所述第一消息包括第一验证信息。第一验证信息可以用于对次认证节点的身份进行验证。
例如,次认证节点可以根据第一随机数和次认证节点的身份信息生成第一验证信息。次认证节点的身份信息,例如包括次认证节点的序列号,或者包括次认证节点的身份号(ID),或者可以包括其他的能够唯一标识次认证节点的身份的信息。另外,作为一种可选的方式,第一验证信息还可以指示对第一集合包括的域内设备的身份验证成功或不成功。因此,在生成第一验证信息时,还可以加入标签(tag)的值,例如tag的值可以是“成功”或“不成功(或失败)”。如果用于生成第一验证信息的tag的值为“成功”,则第一验证信息用于指示对第一集合包括的域内设备的身份验证成功,而如果用于生成第一验证信息的tag的值为“不成功”,则第一验证信息用于指示对第一集合包括的域内设备的身份验证不成功。
第一验证信息可以指示对第一集合包括的域内设备的身份验证是否成功。例如,第一集合除了次认证节点之外只包括一个域内设备,则第一验证信息可以指示对该域内设备的 身份验证是否成功;或者,第一集合除了次认证节点之外包括多个域内设备,则第一验证信息可以指示对这多个域内设备的身份验证是否成功。
如果次认证节点是通过分别将至少一个域内设备中的每个域内设备对应的第五验证信息和第三验证信息进行比较,以确定至少一个域内设备中的每个域内设备的身份是否验证成功,那么,如果次认证节点确定至少一个域内设备的身份均验证成功,也就是说,次认证节点将至少一个域内设备中的每个域内设备对应的第五验证信息和第三验证信息进行比较,比较的结果均一致,则次认证节点可以生成第一验证信息,此时的第一验证信息可以指示对第一集合包括的域内设备的身份验证成功。或者,如果次认证节点确定至少一个域内设备中只要有一个域内设备的身份验证失败,也就是说,次认证节点将至少一个域内设备中的每个域内设备对应的第五验证信息和第三验证信息进行比较,至少有一个比较的结果不一致,则次认证节点可以生成第一验证信息,此时的第一验证信息可以指示对第一集合包括的域内设备的身份验证不成功(或者说身份验证失败)。
例如,第五验证信息为s′ ij,第三验证信息为s ij,次认证节点依次比较s ij和s′ ij,例如,次认证节点比较s i1和s′ i1是否一致,比较s i2和s′ i2是否一致,比较s i3和s′ i3是否一致,以此类推。如果确定s ij和s′ ij的比较结果均一致,例如,s i1和s′ i1一致,s i2和s′ i2一致,s i3和s′ i3一致,以此类推,则次认证节点生成第一验证信息,第一验证信息指示对第一集合包括的域内设备的身份验证成功。或者,如果确定s ij和s′ ij的比较结果中有至少一个比较结果不一致,例如,s i1和s′ i1一致,s i2和s′ i2一致,s i3和s′ i3不一致,则次认证节点生成第一验证信息,第一验证信息指示对第一集合包括的域内设备的身份验证不成功。
或者,如果次认证节点是通过将第六验证信息和第七验证信息进行比较,以确定至少一个域内设备的身份是否验证成功,那么,如果次认证节点确定至少一个域内设备的身份均验证成功,也就是说,次认证节点将第六验证信息和第七验证信息进行比较,比较的结果为第六验证信息和第七验证信息一致,则次认证节点可以生成第一验证信息,此时的第一验证信息指示对第一集合包括的域内设备的身份验证成功。或者,如果次认证节点确定至少一个域内设备的身份验证失败,也就是说,次认证节点将第六验证信息和第七验证信息进行比较,比较的结果为第六验证信息和第七验证信息不一致,则次认证节点可以生成第一验证信息,此时的第一验证信息指示对第一集合包括的域内设备的身份验证不成功(或者说身份验证失败)。
例如,s′″ ij表示第七验证信息,s″ ij表示第六验证信息,次认证节点比较s′″ ij和s″ ij,确定二者是否一致。如果二者一致,则次认证节点可以生成第一验证信息,第一验证信息用于指示对第一集合包括的域内设备的身份验证成功,或者,如果二者不一致,次认证节点也可以生成第一验证信息,此时的第一验证信息用于指示对第一集合包括的域内设备的身份验证不成功。
作为第一验证信息的一种实现方式,第一验证信息可以是MAC值。例如,次认证节点可以根据r、
Figure PCTCN2020076661-appb-000018
和tag生成第一验证信息,例如
Figure PCTCN2020076661-appb-000019
tag=“成功”或“不成功(或失败)”,s i表示第一验证信息。例如,tag占用1比特(bit),如果这1比特的取 值为“1”则表示“成功”,如果这1比特的取值为“0”则表示“不成功”,或者tag也可以通过其他方式来表示“成功”或“不成功”。
或者,作为第一验证信息的另一种实现方式,第一验证信息也可以是数字签名,例如次认证节点存储着非对称加密中的私钥,则次认证节点可以根据所存储的私钥对r、
Figure PCTCN2020076661-appb-000020
和tag进行加密,获得第一验证信息。这里的次认证节点存储的私钥可以称为第一私钥。
S208、主认证节点根据第一验证信息和第一随机数,确定次认证节点的身份是否验证成功。
主认证节点接收第一验证信息后,可以根据第一验证信息和第一随机数来确定次认证节点的身份是否验证成功。相当于,次认证节点可以对域内设备进行验证,而主认证节点可以对次认证节点进行验证,由此形成层级验证机制。例如,主认证节点对次认证节点的身份验证成功,那么主认证节点可以认为次认证节点的身份是合法的,而如果主认证节点对次认证节点的身份验证不成功(或,身份验证失败),则主认证节点可以认为次认证节点的身份是不合法的。
例如对于主认证节点来说,次认证节点的身份信息是已知的,则主认证节点可以按照与次认证节点生成第一验证信息的相同的方式来生成验证信息,例如称为第二验证信息,或者,次认证节点的身份信息也可以携带在第一消息中,则主认证节点也可以按照与次认证节点生成第一验证信息的相同的方式来生成第二验证信息。例如,主认证节点可以根据次认证节点的身份信息和第一随机数生成第二验证信息。主认证节点可以比较第二验证信息和第一验证信息是否一致,如果第二验证信息和第一验证信息一致,则主认证节点对次认证节点的身份验证成功,或者说,主认证节点确定次认证节点的身份验证成功,或者,如果第二验证信息和第一验证信息不一致,则主认证节点对次认证节点的身份验证不成功,或者说,主认证节点确定次认证节点的身份验证失败。
作为一种可选的方式,第一消息还可以携带第四验证信息,例如第四验证信息为tag,tag=“成功”或“不成功(或失败)”。也就是说,如果次认证节点对第一集合包括的域内设备的身份验证成功,则次认证节点除了向主认证节点发送第一验证信息之外,还可以发送第四验证信息,第四验证信息指示“成功”,或者,如果次认证节点对第一集合包括的域内设备的身份验证不成功,则次认证节点除了向主认证节点发送第一验证信息之外,还可以发送第四验证信息,第四验证信息指示“不成功”。
那么,主认证节点在生成第二验证信息时,还可以考虑加入tag。当然前提是,次认证节点在生成第二验证信息时,也加入了tag。例如,如果第四验证信息指示“成功”,则主认证节点可以根据次认证节点的身份信息、r以及tag=“成功”,生成第二验证信息。或者,如果第四验证信息指示“不成功”,则主认证节点可以根据次认证节点的身份信息、r以及tag=“不成功”,生成第二验证信息。主认证节点生成第二验证信息的方式和次认证节点生成第一验证信息的方式需要是一致的,例如第一验证信息为MAC值,则第二验证信息也是MAC值,或者,第一验证信息是次认证节点根据私钥生成的,则第二验证信息就需要是主认证节点根据公钥生成的。这里的主认证节点的公钥可以称为第二公钥,第二公钥和第二私钥可以是一对非对称密钥。
主认证节点的验证结果可以包括几种,下面分别介绍。
1、主认证节点确定次认证节点的身份验证成功,且次认证节点确定至少一个域内设 备的身份验证成功。
也就是说,主认证节点确定第一验证信息和第二验证信息一致,且第四验证信息用于指示对第一集合包括的除了所述次认证节点之外的其他的域内设备的身份验证成功。
在这种情况下,只要主认证节点确定第一验证信息和第二验证信息一致,则认证过程可以结束。此时,认为次认证节点和第一集合内的至少一个域内设备的身份都是验证成功的。
2、主认证节点确定次认证节点的身份验证成功,且次认证节点确定至少一个域内设备的身份验证失败。
也就是说,主认证节点确定第一验证信息和第二验证信息一致,且第四验证信息用于指示对第一集合包括的除了所述次认证节点之外的其他的域内设备的身份验证不成功。在这种情况下,主认证节点可以直接确定次认证节点的身份验证成功,以及确定至少一个域内设备的身份验证失败,但主认证节点无法确定究竟是至少一个域内设备中的哪些域内设备的身份验证失败。
或者,主认证节点除了确定次认证节点的身份验证成功之外,也可以进一步对第一集合内的至少一个域内设备的身份进行验证。
例如,第一消息除了包括第一验证信息之外,还包括N个域内设备的第三验证信息,这N个域内设备可以是所述的至少一个域内设备中的一个或多个,N为正整数。例如,次认证节点除了将第一验证信息发送给主认证节点之外,还可以将至少一个域内设备的第三验证信息均发送给主认证节点,则N个域内设备就包括至少一个域内设备中的全部的域内设备。例如第一域内设备是N个域内设备中的一个,则第一域内设备可以是次认证节点进行身份验证成功的域内设备,也可以是次认证节点进行身份验证失败的域内设备。这种方式较为适用于次认证节点是依次验证至少一个域内设备中的每个域内设备的身份、且次认证节点对至少一个域内设备的身份验证均失败的情况,或者,这种方式可以适用于,次认证节点是根据第六验证信息和第七验证信息验证至少一个域内设备的身份,如果验证失败,则次认证节点可能无法定位究竟是哪个域内设备的身份验证失败,则次认证节点可以将至少一个域内设备的第三验证信息均发送给主认证节点,由主认证节点进一步验证。
或者,如果第四验证信息用于指示对第一集合包括的除了所述次认证节点之外的其他的域内设备的身份验证不成功,则表明次认证节点对至少一个域内设备中的一个或多个域内设备的身份验证不成功,则次认证节点可以只是将身份验证不成功的域内设备对应的第三验证信息发送给主认证节点,此时N个域内设备就包括至少一个域内设备中被次认证节点验证不成功的域内设备。例如第一域内设备是N个域内设备中的一个,则第一域内设备可以是次认证节点进行身份验证失败的域内设备。这种方式较为适用于次认证节点是依次验证至少一个域内设备中的每个域内设备的身份、且次认证节点对至少一个域内设备中的部分域内设备的身份验证失败的情况。
那么,如果主认证节点确定次认证节点的身份验证成功,第一验证信息用于指示对第一集合包括的域内设备的身份验证不成功,且第一消息包括N个第三验证信息,则主认证节点可以依次对N个第三验证信息中的每个进行验证,以确定究竟是哪个域内设备的身份验证失败。
或者,第一消息也可以不包括N个第三验证信息,如果主认证节点确定第一验证信息和第二验证信息一致,且第四验证信息用于指示对第一集合包括的域内设备的身份验证不 成功,则主认证节点可以向次认证节点发送第二消息,第二消息用于请求获得至少一个域内设备对应的验证信息。次认证节点接收来自主认证节点的第二消息后,就可以将N个第三验证信息发送给主认证节点,例如次认证节点可以向主认证节点发送第三消息,第三消息包括N个第三验证信息。其中,如果次认证节点是依次验证至少一个域内设备中的每个域内设备的身份,那么N个第三验证信息可以包括至少一个域内设备中的全部的域内设备的第三验证信息,或者,N个第三验证信息也可以包括至少一个域内设备中被次认证节点验证失败的域内设备的第三验证信息。或者,如果次认证节点是根据第六验证信息和第七验证信息对至少一个域内设备总体进行验证,那么N个第三验证信息可以包括至少一个域内设备中的全部的域内设备的第三验证信息。或者,第二消息是用于请求获得至少一个域内设备对应的验证信息,则N个第三验证信息可以包括至少一个域内设备中的全部的域内设备的第三验证信息。
例如,主认证节点可以生成N个第八验证信息,通过N个第八验证信息来对N个第三验证信息进行验证。例如,对应于一个域内设备的第八验证信息和第三验证信息一致,则主认证节点认为该域内设备的身份验证成功,否则认为该域内设备的身份验证失败。例如,主认证节点对一个域内设备的身份验证成功,那么主认证节点可以认为该域内设备的身份是合法的,而如果主认证节点对一个域内设备的身份验证不成功(或,身份验证失败),则主认证节点可以认为该域内设备的身份是不合法的。例如,主认证节点可以根据第二随机数获得N个第八验证信息,或者根据N个域内设备的身份信息获得N个第八验证信息,或者根据第二随机数和N个域内设备的身份信息获得N个第八验证信息。
作为第八验证信息的一种实现方式,第八验证信息可以是MAC值。例如主认证节点可以根据r’和N个域内设备的身份信息得到第八验证信息。
或者,作为第八验证信息的另一种实现方式,第八验证信息也可以是数字签名,例如主认证节点存储着非对称加密中的公钥,则主认证节点可以根据所存储的公钥对第二随机数进行加密,获得N个第八验证信息,或者根据所存储的公钥对N个域内设备的身份信息进行加密,获得N个第八验证信息,或者根据所存储的公钥对第二随机数和N个域内设备的身份信息进行加密,获得N个第八验证信息。这里的主认证节点存储的公钥可以是第一公钥。
其中,主认证节点生成第八验证信息的方式和域内设备生成第三验证信息的方式需要是一致的,例如第三验证信息为MAC值,则第八验证信息也是MAC值,或者,第三验证信息是域内设备根据私钥生成的,则第八验证信息就需要是主认证节点根据公钥生成的。
主认证节点通过对N个域内设备分别进行身份验证,可以确定究竟是哪个域内设备的身份验证失败,从而可以对身份验证失败的域内设备进行相应的处理,而身份验证成功的域内设备可以继续正常工作。通过这种方式,可以有效定位身份验证失败的域内设备,也可以减少对身份验证成功的域内设备的影响。
3、主认证节点确定次认证节点的身份验证失败,且次认证节点确定至少一个域内设备的身份验证成功。
也就是说,主认证节点确定第一验证信息和第二验证信息不一致,且第四验证信息用于指示对第一集合包括的除了所述次认证节点之外的其他的域内设备的身份验证成功。在这种情况下,主认证节点可以直接确定次认证节点的身份验证失败,以及主认证节点可以认为第一验证信息不可靠。
在这种情况下,主认证节点可以直接确定次认证节点的身份验证失败,但由于第一验证信息不可靠,则主认证节点无法确定至少一个域内设备的身份是否验证成功。或者,在这种情况下,主认证节点如果确定次认证节点的身份验证失败,则可以进一步对第一集合内的至少一个域内设备的身份进行验证。
例如,第一消息除了包括第一验证信息之外,还包括N个域内设备的第三验证信息,这N个域内设备可以是所述的至少一个域内设备,N为正整数。例如,次认证节点除了将第一验证信息发送给主认证节点之外,还可以将至少一个域内设备的至少一个第三验证信息发送给主认证节点,因为次认证节点对至少一个域内设备的身份验证是成功的,因此次认证节点可以将至少一个域内设备的至少一个第三验证信息均发送给主认证节点,也就是说,N个域内设备就包括至少一个域内设备中的全部的域内设备。
那么,如果主认证节点确定次认证节点的身份验证失败,且第一消息包括N个第三验证信息,则主认证节点可以依次对N个第三验证信息中的每个进行验证,以确定N个域内设备的身份是否验证成功。
或者,第一消息也可以不包括N个第三验证信息,如果主认证节点确定第一验证信息和第二验证信息不一致,也就是第一装置对第二装置的身份验证不成功。则主认证节点可以向次认证节点发送第二消息,第二消息用于请求获得至少一个域内设备对应的验证信息。次认证节点接收来自主认证节点的第二消息后,就可以将N个第三验证信息发送给主认证节点,例如次认证节点可以向主认证节点发送第三消息,第三消息包括N个第三验证信息。在这里,N个第三验证信息可以包括至少一个域内设备中的全部的域内设备的第三验证信息。
例如,主认证节点可以生成N个第八验证信息,通过N个第八验证信息来对N个第三验证信息进行验证。例如,对应于一个域内设备的第八验证信息和第三验证信息一致,则主认证节点认为该域内设备的身份验证成功,否则认为该域内设备的身份验证失败。例如,主认证节点可以根据第二随机数获得N个第八验证信息,或者根据N个域内设备的身份信息获得N个第八验证信息,或者根据第二随机数和N个域内设备的身份信息获得N个第八验证信息。关于主认证节点根据第八验证信息对第三验证信息进行验证的方式,可参考上文中第2点的介绍。
主认证节点通过对N个域内设备分别进行身份验证,可以确定究竟是哪个域内设备的身份验证失败,从而可以对身份验证失败的域内设备进行相应的处理,而身份验证成功的域内设备可以继续正常工作。通过这种方式,即使在次认证节点不可靠的情况下,主认证节点也可以有效定位身份验证失败的域内设备,且能减少对身份验证成功的域内设备的影响。
4、主认证节点确定次认证节点的身份验证失败,且次认证节点确定至少一个域内设备的身份验证失败。
也就是说,主认证节点确定第一验证信息和第二验证信息不一致,且第四验证信息用于指示对第一集合包括的域内设备的身份验证不成功。在这种情况下,主认证节点可以直接确定次认证节点的身份验证失败,以及主认证节点可以认为第一验证信息不可靠。
在这种情况下,主认证节点可以直接确定次认证节点的身份验证失败,但由于第一验证信息不可靠,则主认证节点无法确定至少一个域内设备的身份是否验证成功。或者,在这种情况下,主认证节点如果确定次认证节点的身份验证失败,则可以进一步对第一集合 内的至少一个域内设备的身份进行验证。
例如,第一消息除了包括第一验证信息之外,还包括N个域内设备的第三验证信息,这N个域内设备可以是所述的至少一个域内设备中的一个或多个,N为正整数。例如,次认证节点除了将第一验证信息发送给主认证节点之外,还可以将至少一个域内设备的第三验证信息均发送给主认证节点,则N个域内设备就包括至少一个域内设备中的全部的域内设备。这种方式较为适用于次认证节点是依次验证至少一个域内设备中的每个域内设备的身份、且次认证节点对至少一个域内设备的身份验证均失败的情况,或者,这种方式可以适用于,次认证节点是根据第六验证信息和第七验证信息验证至少一个域内设备的身份,如果验证失败,则次认证节点可能无法定位究竟是哪个域内设备的身份验证失败,则次认证节点可以将至少一个域内设备的第三验证信息均发送给主认证节点,由主认证节点进一步验证。
或者,如果第四验证信息用于指示对第一集合包括的域内设备的身份验证不成功,则表明次认证节点对至少一个域内设备中的一个或多个域内设备的身份验证不成功,则次认证节点可以只是将身份验证不成功的域内设备对应的第三验证信息发送给主认证节点,此时N个域内设备就包括至少一个域内设备中被次认证节点验证不成功的域内设备。这种方式较为适用于次认证节点是依次验证至少一个域内设备中的每个域内设备的身份、且次认证节点对至少一个域内设备中的部分域内设备的身份验证失败的情况。
那么,如果主认证节点确定次认证节点的身份验证成功,第一验证信息用于指示对第一集合包括的域内设备的身份验证不成功,且第一消息包括N个第三验证信息,则主认证节点可以依次对N个第三验证信息中的每个进行验证,以确定究竟是哪个域内设备的身份验证失败。
或者,第一消息也可以不包括N个第三验证信息,如果主认证节点确定第一验证信息和第二验证信息不一致,则主认证节点可以向次认证节点发送第二消息,第二消息用于请求获得至少一个域内设备对应的验证信息。次认证节点接收来自主认证节点的第二消息后,就可以将N个第三验证信息发送给主认证节点,例如次认证节点可以向主认证节点发送第三消息,第三消息包括N个第三验证信息。其中,如果次认证节点是依次验证至少一个域内设备中的每个域内设备的身份,那么N个第三验证信息可以包括至少一个域内设备中的全部的域内设备的第三验证信息,或者,N个第三验证信息也可以包括至少一个域内设备中被次认证节点验证失败的域内设备的第三验证信息。或者,如果次认证节点是根据第六验证信息和第七验证信息对至少一个域内设备总体进行验证,那么N个第三验证信息可以包括至少一个域内设备中的全部的域内设备的第三验证信息。或者,第二消息是用于请求获得至少一个域内设备对应的验证信息,则N个第三验证信息可以包括至少一个域内设备中的全部的域内设备的第三验证信息。
例如,主认证节点可以生成N个第八验证信息,通过N个第八验证信息来对N个第三验证信息进行验证。例如,对应于一个域内设备的第八验证信息和第三验证信息一致,则主认证节点认为该域内设备的身份验证成功,否则认为该域内设备的身份验证失败。例如,主认证节点可以根据第二随机数获得N个第八验证信息,或者根据N个域内设备的身份信息获得N个第八验证信息,或者根据第二随机数和N个域内设备的身份信息获得N个第八验证信息。关于主认证节点根据第八验证信息对第三验证信息进行验证的方式,可参考上文中第2点的介绍。
本申请实施例相当于采用了层级验证的方式,第一装置可以对第二装置进行验证,二对于第三装置,例如可以通过第二装置来验证,这样,对各级车载设备都能够进行身份验证,层级验证方式也增加了严重的可靠性。且相对于由一个设备对其他所有设备进行验证的方案来说,采用本申请实施例的技术方案,对于每一层级的车载设备,需要验证的设备的数量也相对较少,例如第一装置验证第二装置即可,无需对第三装置也逐一验证,有助于减轻设备的负担。例如,第一装置对第二装置的验证失败,则第一装置可以认为第二装置对第三装置的验证均失败,或者第一装置也可以进一步对第三装置进行验证,相当于可以进行多重验证。通过这种方式,可以提高车载设备的安全性,防止正规的车载设备被伪劣的车载设备所替换。
为了更好地理解图2所示的实施例所介绍的技术方案,下面对图2所示的实施例所涉及的一些子方案进行举例介绍。
请参考图3,为本申请实施例提供的第一种身份验证方法的第一种实施方式的流程。图3所示的流程以次认证节点不将至少一个第三验证信息进行聚合、不将至少一个第五验证信息进行聚合、且第一消息不包括N个域内设备的第三验证信息为例。
S301、主认证节点选择第一随机数r。
关于第一随机数r的选择方式,可参考图2所示的实施例中的S201的介绍。
S302、主认证节点向次认证节点发送第一随机数r,次认证节点接收来自主认证节点的第一随机数r。
S303、次认证节点选择第二随机数r’。
关于第二随机数r’的选择方式,可参考图2所示的实施例中的S202的介绍。例如图3所示的流程中,r’和r的内容不同,但长度相同。
S304、次认证节点向第一集合内的域内设备发送第二随机数r’,第一集合内的域内设备接收来自次认证节点的第二随机数r’。
图3中,只以第一集合内的域内设备j为例。
S305、域内设备j根据域内设备j的身份信息获得第三验证信息s ij,例如
Figure PCTCN2020076661-appb-000021
Figure PCTCN2020076661-appb-000022
S306、次认证节点根据域内设备j的身份信息获得第五验证信息s′ ij,例如
Figure PCTCN2020076661-appb-000023
Figure PCTCN2020076661-appb-000024
其中,S305可以在S306之前执行,或者S305在S306之后执行,或者S305和S306同步执行。
S307、域内设备j向次认证节点发送s ij,次认证节点接收来自域内设备j的s ij
接收了r’的域内设备都可以获得第三验证信息。在S304中,次认证节点可以将r’发送给第一集合内的全部域内设备,那么在S307中,可以是第一集合内的全部域内设备都将第三验证信息发送给次认证节点。或者,在S304中,次认证节点也可以只将r’发送给第一集合内的部分域内设备,那么在S307中,可以是第一集合内的这部分域内设备将第三验证信息发送给次认证节点。总之,次认证节点是可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,图3只是以其中的域内设备j为例。
S308、次认证节点比较s ij和s′ ij,以确定域内设备j的身份是否验证成功。
如果s ij和s′ ij一致,则次认证节点认为域内设备j的身份验证成功,或者,如果s ij和s′ ij不一致,则次认证节点认为域内设备j的身份验证失败。
其中,次认证节点在S307中可以接收来自至少一个域内设备的至少一个第三验证信息,那么在S308中,次认证节点可以根据第二随机数和至少一个第三验证信息进行验证,以确定至少一个域内设备的身份是否验证成功。如果至少一个域内设备的身份均验证成功,则执行S309,或者,如果至少一个域内设备中有一个或多个域内设备的身份验证失败,则执行S310。
S309、次认证节点向主认证节点发送第一消息,第一消息包括第一验证信息s i
Figure PCTCN2020076661-appb-000025
其中,例如tag占用1个比特,tag=“1”就表示“成功”,tag=“0”就表示“不成功(或失败)”。
如果次认证节点确定至少一个域内设备的身份均验证成功,也就是说,次认证节点将至少一个域内设备中的每个域内设备对应的第五验证信息和第三验证信息进行比较,比较的结果均一致,则次认证节点可以生成
Figure PCTCN2020076661-appb-000026
S310、次认证节点向主认证节点发送第一消息,第一消息包括第一验证信息s i
Figure PCTCN2020076661-appb-000027
其中,例如tag占用1个比特,tag=“1”就表示“成功”,tag=“0”就表示“不成功(或失败)”。
S311、主认证节点验证s i。如果s i验证失败,则认为次认证节点的身份验证失败,或者,如果s i验证成功,但
Figure PCTCN2020076661-appb-000028
则认为域内设备的身份验证失败,或者,如果s i验证成功,且
Figure PCTCN2020076661-appb-000029
则认为次认证节点和域内设备的身份均验证成功。
关于图3所示的流程中的步骤的一些具体实施细节,均可参考图2所示的实施例的相关描述。
请参考图4,为本申请实施例提供的第一种身份验证方法的第二种实施方式的流程。图4所示的流程以次认证节点不将至少一个第三验证信息进行聚合、不将至少一个第五验证信息进行聚合、且第一消息包括N个域内设备的第三验证信息为例。
S401、主认证节点选择第一随机数r。
关于第一随机数r的选择方式,可参考图2所示的实施例中的S201的介绍。
S402、主认证节点向次认证节点发送第一随机数r,次认证节点接收来自主认证节点的第一随机数r。
S403、次认证节点选择第二随机数r’。
关于第二随机数r’的选择方式,可参考图2所示的实施例中的S202的介绍。例如图4所示的流程中,r’是r和第三随机数级联后得到的。
S404、次认证节点向第一集合内的域内设备发送第二随机数r’,第一集合内的域内设备接收来自次认证节点的第二随机数r’。
图4中,只以第一集合内的域内设备j为例。
S405、域内设备j根据域内设备j的身份信息获得第三验证信息s ij,例如
Figure PCTCN2020076661-appb-000030
Figure PCTCN2020076661-appb-000031
S406、次认证节点根据域内设备j的身份信息获得第五验证信息s′ ij,例如
Figure PCTCN2020076661-appb-000032
Figure PCTCN2020076661-appb-000033
其中,S405可以在S406之前执行,或者S405在S406之后执行,或者S405和S406同步执行。
S407、域内设备j向次认证节点发送s ij,次认证节点接收来自域内设备j的s ij
接收了r’的域内设备都可以获得第三验证信息。在S404中,次认证节点可以将r’发送给第一集合内的全部域内设备,那么在S407中,可以是第一集合内的全部域内设备都将第三验证信息发送给次认证节点。或者,在S404中,次认证节点也可以只将r’发送给第一集合内的部分域内设备,那么在S407中,可以是第一集合内的这部分域内设备将第三验证信息发送给次认证节点。总之,次认证节点是可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,图4只是以其中的域内设备j为例。
S408、次认证节点比较s ij和s′ ij,以确定域内设备j的身份是否验证成功。
如果s ij和s′ ij一致,则次认证节点认为域内设备j的身份验证成功,或者,如果s ij和s′ ij不一致,则次认证节点认为域内设备j的身份验证失败。
其中,次认证节点在S407中可以接收来自至少一个域内设备的至少一个第三验证信息,那么在S408中,次认证节点可以根据第二随机数和至少一个第三验证信息进行验证,以确定至少一个域内设备的身份是否验证成功。如果至少一个域内设备的身份均验证成功,则执行S409,或者,如果至少一个域内设备中有一个或多个域内设备的身份验证失败,则执行S410。
S409、次认证节点向主认证节点发送第一消息,第一消息包括第一验证信息s i
Figure PCTCN2020076661-appb-000034
其中,例如tag占用1个比特,tag=“1”就表示“成功”,tag=“0”就表示“不成功(或失败)”。
如果次认证节点确定至少一个域内设备的身份均验证成功,也就是说,次认证节点将至少一个域内设备中的每个域内设备对应的第五验证信息和第三验证信息进行比较,比较的结果均一致,则次认证节点可以生成
Figure PCTCN2020076661-appb-000035
S410、次认证节点向主认证节点发送第一消息,第一消息包括第一验证信息s i
Figure PCTCN2020076661-appb-000036
以及包括
Figure PCTCN2020076661-appb-000037
其中,例如tag占用1个比特,tag=“1”就表示“成功”,tag=“0”就表示“不成功(或失败)”。{s ij} j∈ERR就表示N个域内设备的第三验证信息,在这种情况下,N个域内设备可以包括至少一个域内设备中被次认证节点验证不成功的域内设备。而
Figure PCTCN2020076661-appb-000038
表示N个域内设备的身份信息。因此,第一消息可以包括N个域内设备的身份信息以及第三验 证信息。
S411、主认证节点验证s i。如果s i验证失败,则认为次认证节点的身份验证失败;或者,如果s i验证成功,但
Figure PCTCN2020076661-appb-000039
则逐一验证s ij,如果对某个s ij验证失败,则确定该s ij对应的域内设备的身份验证失败,否则确定该s ij对应的域内设备的身份验证成功;或者,如果s i验证成功,且
Figure PCTCN2020076661-appb-000040
则认为次认证节点和域内设备的身份均验证成功。
关于图4所示的流程中的步骤的一些具体实施细节,均可参考图2所示的实施例的相关描述。
请参考图5,为本申请实施例提供的第一种身份验证方法的第三种实施方式的流程。图5所示的流程以次认证节点将至少一个第三验证信息进行聚合、将至少一个第五验证信息进行聚合、且第一消息包括N个域内设备的第三验证信息为例。
S501、主认证节点选择第一随机数r。
关于第一随机数r的选择方式,可参考图2所示的实施例中的S201的介绍。
S502、主认证节点向次认证节点发送第一随机数r,次认证节点接收来自主认证节点的第一随机数r。
S503、次认证节点选择第二随机数r’。
关于第二随机数r’的选择方式,可参考图2所示的实施例中的S202的介绍。例如图5所示的流程中,r’是r和第三随机数级联后得到的。
S504、次认证节点向第一集合内的域内设备发送第二随机数r’,第一集合内的域内设备接收来自次认证节点的第二随机数r’。
图5中,只以第一集合内的域内设备j为例。
S505、域内设备j根据域内设备j的身份信息获得第三验证信息s ij,例如
Figure PCTCN2020076661-appb-000041
Figure PCTCN2020076661-appb-000042
S506、次认证节点根据域内设备j的身份信息获得第五验证信息s′ ij,例如
Figure PCTCN2020076661-appb-000043
Figure PCTCN2020076661-appb-000044
次认证节点可以根据第二随机数和至少一个域内设备的身份信息得到至少一个第五验证信息,那么在得到至少一个第五验证信息后,次认证节点可以将至少一个第五验证信息进行聚合,得到第六验证信息。例如,次认证节点得到的至少一个第五验证信息分别表示为s′ i1,s′ i2,s′ i3,……,则次认证节点将至少一个第五验证信息进行聚合,一种聚合方式可以是,
Figure PCTCN2020076661-appb-000045
其中s″ ij表示第六验证信息,
Figure PCTCN2020076661-appb-000046
表示异或运算。
其中,S505可以在S506之前执行,或者S505在S506之后执行,或者S505和S506同步执行。
S507、域内设备j向次认证节点发送s ij,次认证节点接收来自域内设备j的s ij
接收了r’的域内设备都可以获得第三验证信息。在S504中,次认证节点可以将r’发送给第一集合内的全部域内设备,那么在S507中,可以是第一集合内的全部域内设备都将 第三验证信息发送给次认证节点。或者,在S504中,次认证节点也可以只将r’发送给第一集合内的部分域内设备,那么在S507中,可以是第一集合内的这部分域内设备将第三验证信息发送给次认证节点。总之,次认证节点是可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,图5只是以其中的域内设备j为例。
次认证节点可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,那么在得到至少一个第三验证信息后,次认证节点可以将至少一个第三验证信息进行聚合,得到第七验证信息。例如,次认证节点得到的至少一个第三验证信息分别表示为s i1,s i2,s i3,……,则次认证节点将至少一个第三验证信息进行聚合,一种聚合方式可以是,
Figure PCTCN2020076661-appb-000047
其中s″′ ij表示第七验证信息,
Figure PCTCN2020076661-appb-000048
表示异或运算。
S508、次认证节点比较s″ ij和s′″ ij,以确定至少一个域内设备的身份是否验证成功。
如果s″ ij和s′″ ij一致,则次认证节点认为至少一个域内设备的身份验证成功,或者,如果s″ ij和s′″ ij不一致,则次认证节点认为至少一个域内设备的身份验证失败。
次认证节点如果确定至少一个域内设备的身份均验证成功,则执行S509,或者,次认证节点如果确定至少一个域内设备中有一个或多个域内设备的身份验证失败,则执行S510。
S509、次认证节点向主认证节点发送第一消息,第一消息包括第一验证信息s i
Figure PCTCN2020076661-appb-000049
其中,例如tag占用1个比特,tag=“1”就表示“成功”,tag=“0”就表示“不成功(或失败)”。
S510、次认证节点向主认证节点发送第一消息,第一消息包括第一验证信息s i
Figure PCTCN2020076661-appb-000050
以及包括
Figure PCTCN2020076661-appb-000051
其中,例如tag占用1个比特,tag=“1”就表示“成功”,tag=“0”就表示“不成功(或失败)”。{s ij}就表示N个域内设备的第三验证信息,在这种情况下,N个域内设备可以包括至少一个域内设备中的全部域内设备。而
Figure PCTCN2020076661-appb-000052
表示N个域内设备的身份信息。因此,第一消息可以包括N个域内设备的身份信息以及第三验证信息。
S511、主认证节点验证s i。如果s i验证失败,则认为次认证节点的身份验证失败;或者,如果s i验证成功,但
Figure PCTCN2020076661-appb-000053
则逐一验证s ij,如果对某个s ij验证失败,则确定该s ij对应的域内设备的身份验证失败,否则确定该s ij对应的域内设备的身份验证成功;或者,如果s i验证成功,且
Figure PCTCN2020076661-appb-000054
则认为次认证节点和域内设备的身份均验证成功。
关于图5所示的流程中的步骤的一些具体实施细节,均可参考图2所示的实施例的相关描述。
在本申请实施例中,主认证节点通过对N个域内设备分别进行身份验证,可以确定究竟是哪个域内设备的身份验证失败,从而可以对身份验证失败的域内设备进行相应的处理,而身份验证成功的域内设备可以继续正常工作。通过这种方式,即使在次认证节点不可靠 的情况下,主认证节点也可以有效定位身份验证失败的域内设备,且能减少对身份验证成功的域内设备的影响。
另外值得指出的是,在图2所示的实施例的介绍过程中,认为主认证节点是值得信任的,无需验证主认证节点的真实性或正规性。实际上也可以进一步对主认证节点进行认证,以进一步提高安全性。有很多方法可以实现对主认证节点的认证。例如可以借助于云服务器认证主认证节点,或者,借助于车主的手机等设备也可以认证主认证节点。一般来说,主认证节点的资源和能力等都较好,因此可以使用非对称密钥的机制(例如数字签名)来对主认证节点进行认证。例如请参考图6,图6所示的实施例可以完成车外认证节点(例如云服务器或车主的手机等设备)对主认证节点的认证。
S601、车外认证节点向主认证节点发送第三随机数,主认证节点接收来自车外认证节点的第三随机数。
车外认证节点可以选择合适长度的随机数,例如称为第三随机数,第三随机数可以用c表示。车外认证节点可以将c发送给主认证节点。c可以用于车外认证节点对主认证节点的认证。其中,c的长度可以根据所需要的认证强度确定,例如所需要的认证强度是128比特,那么c的长度就可以是128比特。一般来说,认证强度越强,则c的长度越长。但c的长度越长,所带来的认证过程的复杂度也较高,因此对于c的长度可以适当选取。或者c的长度也可以通过协议规定等,具体的不做限制。
S602、主认证节点利用主认证节点的私钥对c进行加密,得到数字签名。
主认证节点接收c后,可以利用私钥对c进行加密,得到加密后的c,也就是数字签名。在图6所示的实施例中,以车外认证节点采用非对称加密方式对主认证节点进行验证为例,实际上不限于此,车外认证节点也可以采用其他的方式来对主认证节点进行验证。
S603、主认证节点将所述数字签名发送给车外认证节点,车外认证节点接收来自主认证节点的数字签名。
S604、车外认证点根据所述数字签名对主认证节点的身份进行验证。
例如,车外认证节点存储有主认证节点的公钥,车外认证节点可以利用主认证节点的公钥对该数字签名进行验证,如果验证通过,则车外认证节点认为主认证节点的身份验证成功,如果验证不通过,则车外认证节点认为主认证节点的身份验证失败。
图6介绍了一种对主认证节点进行验证的方式,本申请实施例并不限制对主认证节点可以采用其他的方式来验证。
本申请实施例相当于采用了层级验证的方式,第一装置可以对第二装置进行验证,二对于第三装置,例如可以通过第二装置来验证,这样,对各级车载设备都能够进行身份验证,层级验证方式也增加了严重的可靠性。且相对于由一个设备对其他所有设备进行验证的方案来说,采用本申请实施例的技术方案,对于每一层级的车载设备,需要验证的设备的数量也相对较少,例如第一装置验证第二装置即可,无需对第三装置也逐一验证,有助于减轻设备的负担。例如,第一装置对第二装置的验证失败,则第一装置可以认为第二装置对第三装置的验证均失败,或者第一装置也可以进一步对第三装置进行验证,相当于可以进行多重验证。通过这种方式,可以提高车载设备的安全性,防止正规的车载设备被伪劣的车载设备所替换。
为了解决相同的技术问题,本申请实施例提供第二种身份验证方法,请参见图7,为该方法的流程图。在下文的介绍过程中,以该方法应用于图1所示的网络架构为例。另外, 该方法可由三个通信装置(或者说,三种通信装置)执行,这三个通信装置例如为第一通信装置、第二通信装置和第三通信装置。其中,第一通信装置、第二通信装置或第三通信装置,可以是车载装置或能够支持车载装置实现该方法所需的功能的通信装置(例如芯片系统),当然还可以是其他通信装置。且对于第一通信装置、第二通信装置和第三通信装置的实现方式均不做限制,例如这三个通信装置可以实现为相同的形式,例如均通过设备的形式实现,或者这三个通信装置也可以实现为不同的形式,例如第一通信装置通过设备的形式实现,第二通信装置通过芯片系统的方式实现,第三通信装置通过设备的形式实现,等等。
为了便于介绍,在下文中,以该方法由第一装置、第二装置和第三装置执行为例,也就是说,以第一通信装置是第一装置、第二通信装置是第二装置、第三通信装置是第三装置为例。因为本实施例是以应用在图1所示的网络架构为例,因此,下文中所述的第一装置可以是图1所示的网络架构中的主认证节点(例如为图1中的网关),下文中所述的第二装置可以是图1所示的网络架构中的次认证节点(例如为图1中的DM或MDC),下文中所述的第三装置可以是图1所示的网络架构中的域内的设备。为了便于理解,在下文的介绍过程中,以第一装置是主认证节点、第二装置是次认证节点、第三装置是域内设备为例。
S701、主认证节点向次认证节点发送第一随机数,次认证节点接收来自主认证节点的所述第一随机数。
其中,第一装置和第二装置承载在第一车辆中,第一车辆可以承载第一装置和至少一个集合,至少一个集合中的每个集合可以包括一个或多个装置。其中的每个集合中,可以包括一个作为次认证节点的装置。例如第一集合是至少一个集合中的一个集合,第一集合包括第二装置和第三装置,第二装置就是第一集合中的次认证节点。在第一集合中,第三装置的个数可以是一个或多个。第一装置可以通过第二装置与第一集合所包括的第三装置通信。例如图1中,主认证节点和次认证节点都承载在第一车辆中,除了主认证节点之外,第一车辆还承载至少一个集合(或,称为至少一个域),这里所述的次认证节点(也就是第二装置)是第一车辆承载的第一集合中的次认证节点,也就是说,第二装置属于至少一个集合中的一个集合,例如称为第一集合。第一集合除了包括第二装置,还包括第三装置(也就是域内设备),则第一集合所包括的第三装置通过第二装置与第一装置进行通信。
主认证节点可以选择合适长度的随机数,例如称为第一随机数,第一随机数可以用r表示。主认证节点可以将r发送给次认证节点。r可以用于主认证节点后续对次认证节点的认证,也可以用于主认证节点对第一集合内的域内设备的认证。关于r的长度的确定方式,可参考图2所示的实施例中的S201。
其中,如果第一车辆包括了多个集合,每个集合包括一个次认证节点,则第一车辆就包括多个次认证节点。那么主认证节点可以将第一随机数发送给第一车辆包括的全部的次认证节点或部分次认证节点。不同的次认证节点接收第一随机数之后,操作方式都可以是类似的,因此图7所示的实施例只以第一集合所包括的次认证节点为例。
S702、次认证节点向第一集合内的域内设备发送第一随机数,第一集合内的域内设备接收来自次认证节点的第一随机数。
次认证节点接收第一随机数后,可以直接将第一随机数转发给第一集合内的域内设备。例如次认证节点可以采用广播或组播的方式发送r,则第一集合内的域内设备都可以接收 来自次认证节点的r,或者,次认证节点也可以采用单播的方式发送r,例如次认证节点可以分别将r发送给第一集合内的所有的域内设备,或者次认证节点也可以只将r发送给第一集合内的部分域内设备,这部分域内设备例如是需要进行身份验证的域内设备。r可以用于次认证节点对域内设备的认证。
S703、第一域内设备根据第一域内设备的身份信息获得第三验证信息。
第一域内设备例如是第一集合内的一个域内设备。第一集合可以包括一个域内设备或多个域内设备。如果第一集合包括一个域内设备,则该域内设备就是第一域内设备;或者,如果第一集合包括多个域内设备,对于第一集合内接收了第一随机数的域内设备来说,在接收第一随机数之后的处理方式都是类似的,因此这里只以第一域内设备进行举例说明。域内设备的身份信息,例如包括域内设备的序列号,或者包括域内设备的身份号,或者可以包括其他的能够唯一标识域内设备的身份的信息。
例如,第一域内设备可以根据第一随机数获得第三验证信息,或者根据第一域内设备的身份信息
Figure PCTCN2020076661-appb-000055
获得第三验证信息,或者根据第一随机数和第一域内设备的身份信息
Figure PCTCN2020076661-appb-000056
获得第三验证信息。
作为第三验证信息的一种实现方式,第三验证信息可以是MAC值。例如第一域内设备可以根据r和
Figure PCTCN2020076661-appb-000057
得到第三验证信息,例如将第三验证信息用s ij表示,
Figure PCTCN2020076661-appb-000058
或者,作为第三验证信息的另一种实现方式,第三验证信息也可以是数字签名,例如第一集合内的域内设备存储着非对称加密中的私钥,则第一域内设备可以根据所存储的私钥对第一随机数进行加密,获得第三验证信息,或者根据所存储的私钥对第一域内设备的身份信息
Figure PCTCN2020076661-appb-000059
进行加密,获得第三验证信息,或者根据所存储的私钥对第一随机数和第一域内设备的身份信息
Figure PCTCN2020076661-appb-000060
进行加密,获得第三验证信息。这里的第一集合内的域内设备所存储的私钥可以称为第一私钥。
S704、次认证节点根据第一随机数和次认证节点的身份信息,生成第一验证信息。
例如,次认证节点可以根据第一随机数获得第一验证信息,或者根据次认证节点的身份信息
Figure PCTCN2020076661-appb-000061
获得第一验证信息,或者根据第一随机数和次认证节点的身份信息
Figure PCTCN2020076661-appb-000062
获得第一验证信息。
作为第一验证信息的一种实现方式,第一验证信息可以是MAC值。例如次认证节点可以根据r和
Figure PCTCN2020076661-appb-000063
得到第一验证信息,例如将第一验证信息用s i表示,
Figure PCTCN2020076661-appb-000064
或者,作为第一验证信息的另一种实现方式,第一验证信息也可以是数字签名,例如次认证节点存储着非对称加密中的私钥,则次认证节点可以根据所存储的私钥对第一随机数进行加密,获得第一验证信息,或者根据所存储的私钥对次认证节点的身份信息
Figure PCTCN2020076661-appb-000065
进行加密,获得第一验证信息,或者根据所存储的私钥对第一随机数和次认证节点的身份信息
Figure PCTCN2020076661-appb-000066
进行加密,获得第一验证信息。这里的次认证节点存储的私钥可以称为第二私钥,第二私钥和第二公钥可以是一对非对称密钥,第二公钥存储在主认证节点中。
其中,S703可以在S704之前执行,或者S703在S704之后执行,或者S703和S704 同步执行。
S705、第一域内设备向次认证节点发送第三验证信息,次认证节点接收来自第一域内设备的第三验证信息。
接收了r的域内设备都可以获得第三验证信息。在S702中,次认证节点可以将r发送给第一集合内的全部域内设备,那么在S705中,可以是第一集合内的全部域内设备都将第三验证信息发送给次认证节点。或者,在S702中,次认证节点也可以只将r发送给第一集合内的部分域内设备,那么在S705中,可以是第一集合内的这部分域内设备将第三验证信息发送给次认证节点。总之,次认证节点是可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,图7只是以其中的第一域内设备为例。
次认证节点可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,那么,如果第三验证信息的个数大于1,则在得到至少一个第三验证信息后,次认证节点可以将至少一个第三验证信息进行聚合,得到第四验证信息。例如,次认证节点得到的至少一个第三验证信息分别表示为s i1,s i2,s i3,……,则次认证节点将至少一个第三验证信息进行聚合,一种聚合方式可以是,
Figure PCTCN2020076661-appb-000067
其中s′ ij表示第四验证信息,
Figure PCTCN2020076661-appb-000068
表示异或运算。或者,次认证节点也可以采用其他方式将至少一个第三验证信息进行聚合。
S706、次认证节点向主认证节点发送第一消息,主认证节点接收来自次认证节点的所述第一消息,所述第一消息包括第一验证信息。第一验证信息用于验证次认证节点的身份是否验证成功。
例如,由于一个车辆内可能有多个次认证节点,因此第一消息还可以包括所述的次认证节点的身份信息,以使得主认证节点能够明确第一消息究竟来自哪个次认证节点。
作为一种可选的方式,次认证节点除了向主认证节点发送第一验证信息之外,还可以向主认证节点发送第四验证信息,也就是说,第一消息还可以包括第四验证信息,第四验证信息可以用于验证第一集合内的至少一个域内设备的身份是否验证成功。
S707、主认证节点根据第一验证信息,确定次认证节点的身份是否验证成功。
例如,主认证节点可以生成第二验证信息,将第二验证信息与第一验证信息进行比对,如果第二验证信息和第一验证信息一致,则主认证节点确定次认证节点的身份验证成功,如果第二验证信息和第一验证信息不一致,则主认证节点确定次认证节点的身份验证失败。例如,主认证节点对次认证节点的身份验证成功,那么主认证节点可以认为次认证节点的身份是合法的,而如果主认证节点对次认证节点的身份验证不成功(或,身份验证失败),则主认证节点可以认为次认证节点的身份是不合法的。
例如,主认证节点可以根据第一随机数获得第二验证信息,或者根据次认证节点的身份信息获得第二验证信息,或者根据第一随机数和次认证节点的身份信息获得第二验证信息。
作为第二验证信息的一种实现方式,第二验证信息可以是MAC值。例如主认证节点可以根据r和
Figure PCTCN2020076661-appb-000069
得到第二验证信息,例如将第二验证信息用s′ i表示,
Figure PCTCN2020076661-appb-000070
或者,作为第二验证信息的另一种实现方式,第二验证信息也可以是数字签名,例如主认证节点存储着非对称加密中的公钥,则主认证节点可以根据所存储的公钥对第一随机 数进行加密,获得第二验证信息,或者根据所存储的公钥对次认证节点的身份信息进行加密,获得第二验证信息,或者根据所存储的公钥对第一随机数和次认证节点的身份信息进行加密,获得第二验证信息。这里的主认证节点存储的公钥可以称为第二公钥,第二公钥和第二私钥可以是一对非对称密钥。
另外,如果第一消息还包括第四验证信息,那么主认证节点还可以根据第四验证信息进行验证,以确定至少一个域内设备的身份是否验证成功。例如,主认证节点可以生成第五验证信息,将第五验证信息与第四验证信息进行比对,如果第五验证信息和第四验证信息一致,则主认证节点确定至少一个域内设备的身份验证成功,如果第五验证信息和第四验证信息不一致,则主认证节点确至少一个域内设备的身份验证失败。例如,主认证节点可以先生成至少一个子验证信息,通过将至少一个子验证信息进行聚合,可以得到第五验证信息,下面对此过程进行介绍。
例如,主认证节点可以根据第一随机数获得子验证信息,或者根据域内设备的身份信息
Figure PCTCN2020076661-appb-000071
获得子验证信息,或者根据第一随机数和域内设备的身份信息
Figure PCTCN2020076661-appb-000072
获得子验证信息。
作为子验证信息的一种实现方式,子验证信息可以是MAC值。例如主认证节点可以根据r和
Figure PCTCN2020076661-appb-000073
得到子验证信息,例如将子验证信息用s″ ij表示,
Figure PCTCN2020076661-appb-000074
或者,作为子验证信息的另一种实现方式,子验证信息也可以是数字签名,例如主认证节点存储着非对称加密中的公钥,则主认证节点可以根据所存储的公钥对第一随机数进行加密,获得子验证信息,或者根据所存储的公钥对域内设备的身份信息
Figure PCTCN2020076661-appb-000075
进行加密,获得子验证信息,或者根据所存储的公钥对第一随机数和域内设备的身份信息
Figure PCTCN2020076661-appb-000076
进行加密,获得子验证信息。这里的主认证节点所存储的公钥可以称为第一公钥,第一公钥和第一私钥可以是一对非对称密钥。
主认证节点在得到至少一个子验证信息后,如果至少一个子验证信息的个数大于1,则主认证节点可以将至少一个子验证信息进行聚合,得到第五验证信息。例如,次认证节点得到的至少一个子验证信息分别表示为s″ i1,s″ i2,s″ i3,……,则主认证节点将至少一个子验证信息进行聚合,一种聚合方式可以是,
Figure PCTCN2020076661-appb-000077
其中s″′ ij表示第五验证信息,
Figure PCTCN2020076661-appb-000078
表示异或运算。或者,次认证节点也可以采用其他方式将至少一个子验证信息进行聚合。需要注意的是,主认证节点对至少一个子验证信息进行聚合的方式,和次认证节点对至少一个第三验证信息进行聚合的方式,应该是一致的,例如次认证节点采用如上介绍的异或运算的方式将至少一个第三验证信息进行聚合,那么主认证节点也需要采用如上介绍的异或运算的方式将至少一个子验证信息进行聚合。
如果主认证节点根据第一验证信息对次认证节点的身份进行验证,以及根据第四验证信息对至少一个域内设备的身份进行验证,则验证结果也可以包括几种,下面分别介绍。
1、主认证节点确定次认证节点的身份验证成功,且确定至少一个域内设备的身份验证成功。
也就是说,主认证节点确定第二验证信息和第一验证信息一致,以及确定第五验证信息和第四验证信息一致。
在这种情况下,验证过程可以结束。此时,认为次认证节点和第一集合内的至少一个域内设备的身份都是验证成功的。
2、主认证节点确定次认证节点的身份验证成功,且确定至少一个域内设备的身份验证失败。
也就是说,主认证节点确定第二验证信息和第一验证信息一致,以及确定第五验证信息和第四验证信息不一致。在这种情况下,主认证节点可以直接确定次认证节点的身份验证成功,以及确定至少一个域内设备的身份验证失败,但主认证节点无法确定究竟是至少一个域内设备中的哪些域内设备的身份验证失败。
或者,主认证节点除了确定次认证节点的身份验证成功之外,也可以进一步对第一集合内的至少一个域内设备的身份进行验证。
例如,第一消息还可以包括至少一个域内设备的第三验证信息。也就是说,次认证节点除了将第四验证信息发送给主认证节点之外,还可以将至少一个域内设备的第三验证信息均发送给主认证节点。
那么,如果主认证节点确定第五验证信息和第四验证信息不一致,则主认证节点可以依次对至少一个第三验证信息中的每个进行验证,以确定究竟是哪个域内设备的身份验证失败。
或者,第一消息也可以不包括至少一个第三验证信息,如果主认证节点确定第五验证信息和第四验证信息不一致,则主认证节点可以向次认证节点发送第二消息,第二消息用于请求获得至少一个域内设备对应的验证信息。次认证节点接收来自主认证节点的第二消息后,就可以将至少一个第三验证信息发送给主认证节点,例如次认证节点可以向主认证节点发送第三消息,第三消息包括至少一个第三验证信息。
例如,主认证节点可以生成至少一个第六验证信息,通过至少一个第六验证信息来对至少一个第三验证信息进行验证。例如,对应于一个域内设备的第六验证信息和第三验证信息一致,则主认证节点认为该域内设备的身份验证成功,否则认为该域内设备的身份验证失败。例如,主认证节点对一个域内设备的身份验证成功,那么主认证节点可以认为该域内设备的身份是合法的,而如果主认证节点对一个域内设备的身份验证不成功(或,身份验证失败),则主认证节点可以认为该域内设备的身份是不合法的。例如,主认证节点可以根据第一随机数获得至少一个第六验证信息,或者根据至少一个域内设备的身份信息获得至少一个第六验证信息,或者根据第一随机数和至少一个域内设备的身份信息获得至少一个第六验证信息。
作为第六验证信息的一种实现方式,第六验证信息可以是MAC值。例如主认证节点可以根据r和至少一个域内设备的身份信息得到至少一个第六验证信息。或者,作为第六验证信息的另一种实现方式,第六验证信息也可以是数字签名。
其中,主认证节点生成第六验证信息的方式和域内设备生成第三验证信息的方式需要是一致的,例如第三验证信息为MAC值,则第六验证信息也是MAC值,或者,第三验证信息是域内设备根据私钥生成的,则第六验证信息就需要是主认证节点根据公钥生成的。
主认证节点通过对至少一个域内设备分别进行身份验证,可以确定究竟是哪个域内设备的身份验证失败,从而可以对身份验证失败的域内设备进行相应的处理,而身份验证成 功的域内设备可以继续正常工作。通过这种方式,可以有效定位身份验证失败的域内设备,也可以减少对身份验证成功的域内设备的影响。
3、主认证节点确定次认证节点的身份验证失败,且确定至少一个域内设备的身份验证成功。
也就是说,主认证节点确定第二验证信息和第一验证信息一致,以及确定第五验证信息和第四验证信息不一致。在这种情况下,主认证节点可以直接确定次认证节点的身份验证失败,由于至少一个域内设备的身份是主认证节点验证的,因此认为是可靠的。则验证过程可以结束。
4、主认证节点确定次认证节点的身份验证失败,且确定至少一个域内设备的身份验证失败。
也就是说,主认证节点确定第二验证信息和第一验证信息一致,以及确定第五验证信息和第四验证信息不一致。在这种情况下,主认证节点可以直接确定次认证节点的身份验证成功,以及确定至少一个域内设备的身份验证失败,但主认证节点无法确定究竟是至少一个域内设备中的哪些域内设备的身份验证失败。
或者,主认证节点除了确定次认证节点的身份验证成功之外,也可以进一步对第一集合内的至少一个域内设备的身份进行验证。关于验证方式,可参考前面第2点的介绍。
主认证节点通过对至少一个域内设备分别进行身份验证,可以确定究竟是哪个域内设备的身份验证失败,从而可以对身份验证失败的域内设备进行相应的处理,而身份验证成功的域内设备可以继续正常工作。通过这种方式,即使在次认证节点不可靠的情况下,主认证节点也可以有效定位身份验证失败的域内设备,且能减少对身份验证成功的域内设备的影响。
为了更好地理解图7所示的实施例所介绍的技术方案,下面对图7所示的实施例进行举例介绍。
请参考图8,为本申请实施例提供的第二种身份验证方法的一种实施方式的流程。图8所示的流程以次认证节点不将至少一个第三验证信息进行聚合、不将至少一个第五验证信息进行聚合、且第一消息不包括N个域内设备的第三验证信息为例。
S801、主认证节点选择第一随机数r。
关于第一随机数r的选择方式,可参考图7所示的实施例中的S701的介绍。
S802、主认证节点向次认证节点发送第一随机数r,次认证节点接收来自主认证节点的第一随机数r。
S803、次认证节点向第一集合内的域内设备发送第一随机数r,第一集合内的域内设备接收来自次认证节点的第一随机数r。
图8中,只以第一集合内的域内设备j为例。
S804、域内设备j根据域内设备j的身份信息获得第三验证信息s ij,例如
Figure PCTCN2020076661-appb-000079
Figure PCTCN2020076661-appb-000080
S805、次认证节点根据r和次认证节点的身份信息生成第一验证信息s′ i
S806、域内设备j向次认证节点发送s ij,次认证节点接收来自域内设备j的s ij
接收了r的域内设备都可以获得第三验证信息。在S803中,次认证节点可以将r发送给第一集合内的全部域内设备,那么在S806中,可以是第一集合内的全部域内设备都将 第三验证信息发送给次认证节点。或者,在S803中,次认证节点也可以只将r发送给第一集合内的部分域内设备,那么在S806中,可以是第一集合内的这部分域内设备将第三验证信息发送给次认证节点。总之,次认证节点是可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,图8只是以其中的域内设备j为例。
次认证节点可以接收来自第一集合内的至少一个域内设备的至少一个第三验证信息,那么在得到至少一个第三验证信息后,次认证节点可以将至少一个第三验证信息进行聚合,得到第四验证信息。例如,次认证节点得到的至少一个第三验证信息分别表示为s i1,s i2,s i3,……,则次认证节点将至少一个第三验证信息进行聚合,一种聚合方式可以是,
Figure PCTCN2020076661-appb-000081
其中s″ ij表示第四验证信息,
Figure PCTCN2020076661-appb-000082
表示异或运算。或者,次认证节点也可以采用其他方式将至少一个第三验证信息进行聚合。
S807、次认证节点向主认证节点发送
Figure PCTCN2020076661-appb-000083
主认证节点接收来自次认证节点的
Figure PCTCN2020076661-appb-000084
S808、主认证节点验证s i和s″ ij,如果s i验证失败,则认为次认证节点的身份验证失败,否则认为次认证节点的身份验证成功;如果s″ ij验证成功,则认为至少一个域内设备的身份验证成功,否则认为至少一个域内设备的身份验证失败。
其中,如果主认证节点认为至少一个域内设备的身份验证失败,则主认证节点可以向次认证节点发送第二消息,第二消息用于请求获得至少一个域内设备对应的验证信息。次认证节点接收来自主认证节点的第二消息后,就可以将至少一个第三验证信息发送给主认证节点,例如次认证节点可以向主认证节点发送第三消息,第三消息包括至少一个第三验证信息。则主认证节点可以依次验证s ij,以进一步确定至少一个域内设备的身份是否验证成功。
关于图8所示的流程中的步骤的一些具体实施细节,均可参考图7所示的实施例的相关描述。
在本申请实施例中,可以由主认证节点进行整体验证,无需次认证节点进行验证工作,减轻了次认证节点的负担。如果主认证节点验证确定至少一个域内设备的身份验证失败,则主认证节点可以进一步向次认证节点请求获得至少一个域内设备的信息,以进一步验证,而如果主认证节点验证确定至少一个域内设备的身份验证成功,则主认证节点可以无需向次认证节点请求至少一个域内设备的信息,这样可以尽量减少信息的交互,节省传输开销。
下面结合附图介绍本申请实施例中用来实现上述方法的装置。因此,上文中的内容均可以用于后续实施例中,重复的内容不再赘述。
图9为本申请实施例提供的通信设备900的示意性框图。示例性地,通信设备900例如为第一装置900。第一装置900包括处理模块910和收发模块920,处理模块910和收发模块920可以是逻辑功能模块。其中,处理模块910可以用于执行图2所示的实施例中由第一装置所执行的除了收发操作之外的全部操作,例如S208,和/或用于支持本文所描述的技术的其它过程。收发模块920可以用于执行图2所示的实施例中由第一装置所执行 的全部收发操作,例如图2所示的实施例中的S201和S207,和/或用于支持本文所描述的技术的其它过程。
例如,收发模块920,用于向第二装置发送第一随机数,其中,第一车辆承载所述第一装置和第一集合,所述第二装置属于所述第一集合,所述第一集合还包括第三装置,第一装置900通过所述第二装置与所述第三装置通信;
收发模块920,还用于接收来自所述第二装置的第一消息,所述第一消息包括第一验证信息,所述第一验证信息用于对所述第二装置的身份进行验证,所述第一验证信息是根据所述第二装置的身份信息和所述第一随机数生成的;
处理模块910,用于根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功。
例如,第一装置对第二装置的身份验证成功,那么第一装置可以认为第二装置的身份是合法的,而如果第一装置对第二装置的身份验证不成功(或,身份验证失败),则第一装置可以认为第二装置的身份是不合法的。
作为一种可选的实施方式,处理模块910用于通过如下方式根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功:
根据所述第二装置的身份信息和所述第一随机数生成第二验证信息;
确定所述第一验证信息和所述第二验证信息是否一致;
当所述第一验证信息和所述第二验证信息一致时,确定所述第二装置的身份验证成功。
作为一种可选的实施方式,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;处理模块910用于通过如下方式根据所述第二装置的身份信息和所述第一随机数生成第二验证信息:
根据所述第二装置的身份信息、所述第四验证信息和所述第一随机数,生成所述第二验证信息。
作为一种可选的实施方式,所述第一消息还包括所述第三装置所生成的第三验证信息,其中,所述第三验证信息是所述第三装置根据所述第三装置的身份信息获得的。
作为一种可选的实施方式,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;处理模块910,还用于在确定所述第二装置的身份验证成功之后,当所述第四验证信息指示对所述第三装置的身份验证失败时,根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
例如,第一装置对第三装置的身份验证成功,那么第一装置可以认为第三装置的身份是合法的,而如果第一装置对第三装置的身份验证不成功(或,身份验证失败),则第一装置可以认为第三装置的身份是不合法的。
作为一种可选的实施方式,处理模块910,还用于处理模块910,用于根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证失败。
作为一种可选的实施方式,所述第一消息还包括第四验证信息,
收发模块920,还用于在所述第四验证信息用于指示对所述第三装置的身份验证不成功之后,向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
收发模块920,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的所述第三验证信息;
处理模块910,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
作为一种可选的实施方式,
收发模块920,还用于在处理模块910确定所述第二装置的身份验证失败之后,向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
收发模块920,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的所述第三验证信息;
处理模块910,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
作为一种可选的实施方式,所述第三装置的个数为多个,所述第一消息还包括第四验证信息,所述第四验证信息是将来自多个所述第三装置的多个第三验证信息聚合得到的;处理模块910,还用于根据所述第四验证信息进行验证,以确定多个所述第三装置的身份是否验证成功。
作为一种可选的实施方式,
收发模块920,还用于当处理模块910根据所述第四验证信息确定多个所述第三装置的身份验证失败时,向所述第二装置发送第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
收发模块920,还用于接收来自所述第二装置的第三消息,所述第三消息包括多个所述第三验证信息;
处理模块910,还用于根据多个所述第三验证信息进行验证,以确定多个所述第三装置中的每个所述第三装置的身份是否验证成功。
应理解,本申请实施例中的处理模块910可以由处理器或处理器相关电路组件实现,收发模块920可以由收发器或收发器相关电路组件实现。
如图10所示,本申请实施例还提供一种通信设备1000。示例性地,通信设备1000例如为第一装置1000。第一装置1000包括处理器1010,存储器1020与收发器1030,其中,存储器1020中存储指令或程序,处理器1010用于执行存储器1020中存储的指令或程序。存储器1020中存储的指令或程序被执行时,该处理器1010用于执行上述实施例中处理模块910执行的操作,收发器1030用于执行上述实施例中收发模块920执行的操作。
应理解,根据本申请实施例的第一装置900或第一装置1000可对应于图2所示的实施例中的第一装置,并且第一装置900或第一装置1000中的各个模块的操作和/或功能分别为了实现图2所示的实施例中的相应流程。或者,根据本申请实施例的第一装置900或第一装置1000可对应于图7所示的实施例中的第一装置,并且第一装置900或第一装置1000中的各个模块的操作和/或功能分别为了实现图7所示的实施例中的相应流程。为了简洁,在此不再赘述。
图11为本申请实施例提供的通信设备1100的示意性框图。示例性地,通信设备1100例如为第二装置1100。第二装置1100包括处理模块1110和收发模块1120,处理模块1110和收发模块1120可以是逻辑功能模块。
其中,处理模块1110可以用于执行图2所示的实施例中由第二装置所执行的除了收发操作之外的全部操作,例如S204和S206,和/或用于支持本文所描述的技术的其它过程。收发模块1120可以用于执行图2所示的实施例中由第二装置所执行的全部收发操作,例如 图2所示的实施例中的S201、S202、S205和S207,和/或用于支持本文所描述的技术的其它过程。
或者,处理模块1110可以用于执行图7所示的实施例中由第一装置所执行的除了收发操作之外的全部操作,例如S707,和/或用于支持本文所描述的技术的其它过程。收发模块1120可以用于执行图7所示的实施例中由第一装置所执行的全部收发操作,例如S701和S706,和/或用于支持本文所描述的技术的其它过程。
例如,收发模块1120,用于向第三装置发送第二随机数,其中,第一车辆承载第一装置和第一集合,第二装置1100和所述第三装置属于所述第一集合,所述第一装置通过第二装置1100与所述第三装置通信;
收发模块1120,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第三装置的身份信息和所述第二随机数生成的;
处理模块1110,用于根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功。
例如,第二装置对第三装置的身份验证成功,那么第二装置可以认为第三装置的身份是合法的,而如果第二装置对第三装置的身份验证不成功(或,身份验证失败),则第二装置可以认为第三装置的身份是不合法的。
作为一种可选的实施方式,处理模块1110用于通过如下方式根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份是否验证成功:
根据所述第二随机数和所述第三装置的身份信息,生成第五验证信息;
根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功。
作为一种可选的实施方式,处理模块1110用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
确定所述第五验证信息和所述第三验证信息是否一致;
当所述第五验证信息和所述第三验证信息一致时,确定所述第三装置的身份验证成功。
作为一种可选的实施方式,所述第三装置的个数为多个,则所述第五验证信息的个数为多个,以及所述第三验证信息的个数为多个,处理模块1110用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
将多个所述第五验证信息进行聚合,得到第六验证信息,以及,将多个所述第三验证信息进行聚合,得到第七验证信息;
确定所述第六验证信息和所述第七验证信息是否一致;
当所述第六验证信息和所述第七验证信息一致时,确定多个所述第三装置的身份验证成功。
作为一种可选的实施方式,
处理模块1110,还用于根据第二装置1100的身份信息和来自所述第一装置的第一随机数生成第一验证信息;
收发模块1120,还用于向所述第一装置发送第一消息,所述第一消息包括所述第一验证信息,其中,所述第一验证信息指示对所述第三装置的身份验证成功。
作为一种可选的实施方式,所述第一消息还包括所述第三验证信息,所述第三验证信息为第二装置1100验证失败的第三验证信息,或,所述第三验证信息为第二装置1100验证成功的第三验证信息。
作为一种可选的实施方式,所述第二随机数的长度与所述第一随机数的长度相同且内容不同,或,所述第二随机数是将所述第一随机数和第三随机数拼接后得到的,或,所述第二随机数与所述第一随机数相同。
应理解,本申请实施例中的处理模块1110可以由处理器或处理器相关电路组件实现,收发模块1120可以由收发器或收发器相关电路组件实现。
如图12所示,本申请实施例还提供一种通信设备1200。示例性地,通信设备1200例如为第二装置1200。第二装置1200包括处理器1210,存储器1220与收发器1230,其中,存储器1220中存储指令或程序,处理器1210用于执行存储器1220中存储的指令或程序。存储器1220中存储的指令或程序被执行时,该处理器1210用于执行上述实施例中处理模块1110执行的操作,收发器1230用于执行上述实施例中收发模块1120执行的操作。
应理解,根据本申请实施例的第二装置1100或第二装置1200可对应于图2所示的实施例中的第二装置,并且第二装置1100或第二装置1200中的各个模块的操作和/或功能分别为了实现图2所示的实施例中的相应流程,为了简洁,在此不再赘述。
图13为本申请实施例提供的通信设备1300的示意性框图。示例性地,通信设备1300例如为第二装置1300。第二装置1300包括处理模块1310和收发模块1320,处理模块1310和收发模块1320可以是逻辑功能模块。其中,处理模块1310可以用于执行图7所示的实施例中由第二装置所执行的除了收发操作之外的全部操作,例如S704,和/或用于支持本文所描述的技术的其它过程。收发模块1320可以用于执行图7所示的实施例中由第二装置所执行的全部收发操作,例如图7所示的实施例中的S701、S702、S705和S706,和/或用于支持本文所描述的技术的其它过程。
例如,收发模块1320,用于向第三装置发送第一随机数,其中,第一车辆承载第一集合,所述第一集合包括第二装置1300和所述第三装置,所述第一车辆还承载第一装置,所述第一装置通过第二装置1300与所述第三装置通信;
收发模块1320,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第一随机数和所述第三装置的身份信息生成的;
处理模块1310,用于根据所述第三验证信息得到第四验证信息,所述第四验证信息用于验证所述第三装置的身份是否验证成功;
收发模块1320,还用于将所述第四验证信息发送给所述第一装置。
例如,第一装置对第二装置的身份验证成功,那么第一装置可以认为第二装置的身份是合法的,而如果第一装置对第二装置的身份验证不成功(或,身份验证失败),则第一装置可以认为第二装置的身份是不合法的。
例如,第一装置对第三装置的身份验证成功,那么第一装置可以认为第三装置的身份是合法的,而如果第一装置对第三装置的身份验证不成功(或,身份验证失败),则第一装置可以认为第三装置的身份是不合法的。
作为一种可选的实施方式,
处理模块1310,还用于根据第二装置1300的身份信息和所述第一随机数生成第一验证信息,所述第一验证信息用于验证第二装置1300的身份是否验证成功;
收发模块1320,还用于将所述第一验证信息发送给所述第一装置。
作为一种可选的实施方式,所述第三装置的个数为多个,相应的,所述第三验证信息的个数为多个,处理模块1310用于通过如下方式根据所述第三验证信息得到第四验证信 息:
将多个所述第三验证信息进行聚合,得到所述第四验证信息。
作为一种可选的实施方式,收发模块1320还用于:
接收来自所述第一装置的第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
向所述第一装置发送第三消息,所述第三消息包括多个所述第三验证信息。
应理解,本申请实施例中的处理模块1310可以由处理器或处理器相关电路组件实现,收发模块1320可以由收发器或收发器相关电路组件实现。
如图14所示,本申请实施例还提供一种通信设备1400。示例性地,通信设备1400例如为第一装置1400。第一装置1400包括处理器1410,存储器1420与收发器1430,其中,存储器1420中存储指令或程序,处理器1410用于执行存储器1420中存储的指令或程序。存储器1420中存储的指令或程序被执行时,该处理器1410用于执行上述实施例中处理模块1310执行的操作,收发器1430用于执行上述实施例中收发模块1320执行的操作。
应理解,根据本申请实施例的第二装置1300或第二装置1400可对应于图7所示的实施例中的第二装置,并且第二装置1300或第二装置1400中的各个模块的操作和/或功能分别为了实现图7所示的实施例中的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供一种通信装置,该通信装置可以是车载装置、路侧装置、或电路等。该通信装置可以用于执行上述图2所示的方法实施例或图7所示的方法实施例中由第一装置或第二装置所执行的动作。
当该通信装置为第一装置或第二装置时,图15示出了一种简化的通信装置的结构示意图。如图15所示,通信装置包括处理器、存储器、射频电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对通信装置进行控制,执行软件程序,处理软件程序的数据等。存储器主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的通信装置可以不具有输入输出装置。
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到通信装置时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图15中仅示出了一个存储器和处理器。在实际的通信装置产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。
在本申请实施例中,可以将具有收发功能的天线和射频电路视为通信装置的收发单元,将具有处理功能的处理器视为通信装置的处理单元。如图15所示,通信装置包括收发单元1510和处理单元1520。收发单元也可以称为收发器、收发机、收发装置等。处理单元也可以称为处理器,处理单板,处理模块、处理装置等。可选的,可以将收发单元1510中用于实现接收功能的器件视为接收单元,将收发单元1510中用于实现发送功能的器件视为发送单元,即收发单元1510包括接收单元和发送单元。收发单元有时也可以称为收 发机、收发器、或收发电路等。接收单元有时也可以称为接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。
应理解,收发单元1510用于执行上述图2所示的方法实施例中第一装置的发送操作和接收操作,处理单元1520用于执行上述图2所示的方法实施例中第一装置侧了收发操作之外的其他操作。
例如,在一种实现方式中,收发单元1510用于执行图2所示的实施例中的第一装置的收发步骤,例如S201和S207,和/或用于支持本文所描述的技术的其它过程。处理单元1520,用于执行图2所示的实施例中的第一装置除了收发操作之外的其他操作,例如图2所示的实施例中的S208,和/或用于支持本文所描述的技术的其它过程。
或者,收发单元1510用于执行上述图2所示的方法实施例中第二装置的发送操作和接收操作,处理单元1520用于执行上述图2所示的方法实施例中第二装置除了收发操作之外的其他操作。
例如,在一种实现方式中,收发单元1510用于执行图2所示的实施例中的第二装置的收发步骤,例如S201、S202、S205和S207,和/或用于支持本文所描述的技术的其它过程。处理单元1520,用于执行图2所示的实施例中的第二装置除了收发操作之外的其他操作,例如S204和S206,和/或用于支持本文所描述的技术的其它过程。
或者,收发单元1510用于执行上述图7所示的方法实施例中第一装置侧的发送操作和接收操作,处理单元1520用于执行上述图7所示的方法实施例中第一装置侧除了收发操作之外的其他操作。
例如,在一种实现方式中,收发单元1510用于执行图7所示的实施例中的第一装置的收发步骤,例如S701和S706,和/或用于支持本文所描述的技术的其它过程。处理单元1520,用于执行图7所示的实施例中的车载装置除了收发操作之外的其他操作,例如S707,和/或用于支持本文所描述的技术的其它过程。
或者,收发单元1510用于执行上述图7所示的方法实施例中第二装置侧的发送操作和接收操作,处理单元1520用于执行上述图7所示的方法实施例中第二装置侧除了收发操作之外的其他操作。
例如,在一种实现方式中,收发单元1510用于执行图7所示的实施例中的第二装置的收发步骤,例如S701、S702、S705和S706,和/或用于支持本文所描述的技术的其它过程。处理单元1520,用于执行图7所示的实施例中的第二装置除了收发操作之外的其他操作,例如S704,和/或用于支持本文所描述的技术的其它过程。
当该通信装置为芯片时,该芯片包括收发单元和处理单元。其中,收发单元可以是输入输出电路、通信接口;处理单元为该芯片上集成的处理器或者微处理器或者集成电路。
本申请实施例中的通信装置还可以参照图16所示的设备。作为一个例子,该设备可以完成类似于图16中处理器1610的功能。在图16中,该设备包括处理器1610,发送数据处理器1620,接收数据处理器1630。上述实施例中的处理模块910可以是图16中的该处理器1610,并完成相应的功能;上述实施例中的收发模块920可以是图16中的发送数据处理器1620,和/或接收数据处理器1630。或者,上述实施例中的处理模块1110可以是图16中的该处理器1610,并完成相应的功能;上述实施例中的收发模块1120可以是图16中的发送数据处理器1620,和/或接收数据处理器1630。或者,上述实施例中的处理模块1310可以是图16中的该处理器1610,并完成相应的功能;上述实施例中的收发模块1320 可以是图16中的发送数据处理器1620,和/或接收数据处理器1630。
虽然图16中示出了信道编码器、信道解码器,但是可以理解这些模块并不对本实施例构成限制性说明,仅是示意性的。
图17示出本实施例的另一种形式。处理装置1700中包括调制子系统、中央处理子系统、周边子系统等模块。本实施例中的通信装置可以作为其中的调制子系统。具体的,该调制子系统可以包括处理器1703,接口1704。其中,处理器1703完成上述处理模块910的功能,接口1704完成上述收发模块920的功能。或者,处理器1703完成上述处理模块1110的功能,接口1704完成上述收发模块1120的功能。或者,处理器1703完成上述处理模块1310的功能,接口1704完成上述收发模块1320的功能。作为另一种变形,该调制子系统包括存储器1706、处理器1703及存储在存储器1706上并可在处理器上运行的程序,该处理器1703执行该程序时实现上述图2所示的方法实施例或图7所示的方法实施例中第一装置或第二装置侧的方法。需要注意的是,所述存储器1706可以是非易失性的,也可以是易失性的,其位置可以位于调制子系统内部,也可以位于处理装置1700中,只要该存储器1706可以连接到处理器1703即可。
本申请实施例还提供第一种通信系统。该通信系统可以包括至少一个上述的图2所示的实施例所涉及的第一装置,以及包括上述的图2所示的实施例所涉及的第二装置。第一装置例如为图9中的第一装置900或图10中的第一装置1000,第二装置例如为图11中的第二装置1100或图12中的第二装置1200等。例如,第一装置可用于执行图2所示的实施例中由第一装置所执行的全部操作,例如图2所示的实施例中的S201、S207和S208,和/或用于支持本文所描述的技术的其它过程。第二装置可用于执行图2所示的实施例中由第二装置所执行的全部操作,例如图2所示的实施例中的S201、S202、S204、S205、S206和S207,和/或用于支持本文所描述的技术的其它过程。
本申请实施例还提供第二种通信系统。该通信系统可以包括至少一个上述的图7所示的实施例所涉及的第一装置,以及包括上述的图7所示的实施例所涉及的第二装置。第一装置例如为图9中的第一装置900或图10中的第一装置1000,第二装置例如为图13中的第二装置1300或图14中的第二装置1400等。例如,第一装置用于执行图7所示的实施例中由第一装置所执行的全部操作,例如图7所示的实施例中的S701、S706和S707,和/或用于支持本文所描述的技术的其它过程。第二装置可用于执行图7所示的实施例中由第二装置所执行的全部操作,例如图7所示的实施例中的S701、S702、S704、S705和S706,和/或用于支持本文所描述的技术的其它过程。
第一种通信系统和第二种通信系统可以是同一个通信系统,或者也可以是不同的通信系统。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图2所示的实施例中与第一装置相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图2所示的实施例中与第二装置相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的 图7所示的实施例中与第一装置相关的流程。
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以实现上述方法实施例提供的图7所示的实施例中与第二装置相关的流程。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以执行上述图2所示的方法实施例中第一装置侧的方法。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以执行上述图2所示的方法实施例中第二装置侧的方法。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以执行上述图7所示的方法实施例中第一装置侧的方法。
本申请实施例还提供一种计算机程序产品,所述计算机程序产品用于存储计算机程序,所述计算机程序被计算机执行时,所述计算机可以执行上述图7所示的方法实施例中第二装置侧的方法。
应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是ROM、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是RAM,其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)集成在处理器中。
应注意,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可 以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请实施例的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请实施例揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应所述以权利要求的保护范围为准。

Claims (42)

  1. 一种身份验证方法,其特征在于,包括:
    第一装置向第二装置发送第一随机数,其中,第一车辆承载所述第一装置和第一集合,所述第二装置属于所述第一集合,所述第一集合还包括第三装置,所述第一装置通过所述第二装置与所述第三装置通信;
    所述第一装置接收来自所述第二装置的第一消息,所述第一消息包括第一验证信息,所述第一验证信息用于对所述第二装置的身份进行验证,所述第一验证信息是根据所述第二装置的身份信息和所述第一随机数生成的;
    所述第一装置根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功。
  2. 根据权利要求1所述的方法,其特征在于,所述第一装置根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功,包括:
    所述第一装置根据所述第二装置的身份信息和所述第一随机数生成第二验证信息;
    所述第一装置确定所述第一验证信息和所述第二验证信息是否一致;
    当所述第一验证信息和所述第二验证信息一致时,所述第一装置确定所述第二装置的身份验证成功。
  3. 根据权利要求2所述的方法,其特征在于,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述第一装置根据所述第二装置的身份信息和所述第一随机数生成第二验证信息,包括:
    所述第一装置根据所述第二装置的身份信息、所述第四验证信息和所述第一随机数,生成所述第二验证信息。
  4. 根据权利要求1~3任一项所述的方法,其特征在于,所述第一消息还包括所述第三装置所生成的第三验证信息,其中,所述第三验证信息是所述第三装置根据所述第三装置的身份信息获得的。
  5. 根据权利要求4所述的方法,其特征在于,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;在所述第一装置确定所述第二装置的身份验证成功之后,还包括:
    当所述第四验证信息指示对所述第三装置的身份验证失败时,所述第一装置根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
  6. 根据权利要求1~3任一项所述的方法,其特征在于,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证不成功,所述方法还包括:
    所述第一装置向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
    所述第一装置接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
    所述第一装置根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
  7. 根据权利要求1~3任一项所述的方法,其特征在于,所述第一装置确定所述第二装置的身份验证失败,所述方法还包括:
    所述第一装置向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
    所述第一装置接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
    所述第一装置根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
  8. 根据权利要求1或2所述的方法,其特征在于,所述第三装置的个数为多个,所述第一消息还包括第四验证信息,所述第四验证信息是将来自多个所述第三装置的多个第三验证信息聚合得到的;所述方法还包括:
    所述第一装置根据所述第四验证信息进行验证,以确定多个所述第三装置的身份是否验证成功。
  9. 根据权利要求8所述的方法,其特征在于,所述方法还包括:
    当根据所述第四验证信息确定多个所述第三装置的身份验证失败时,所述第一装置向所述第二装置发送第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
    所述第一装置接收来自所述第二装置的第三消息,所述第三消息包括多个所述第三验证信息;
    所述第一装置根据多个所述第三验证信息进行验证,以确定多个所述第三装置中的每个所述第三装置的身份是否验证成功。
  10. 一种身份验证方法,其特征在于,包括:
    第二装置向第三装置发送第二随机数,其中,第一车辆承载第一装置和第一集合,所述第二装置和所述第三装置属于所述第一集合,所述第一装置通过所述第二装置与所述第三装置通信;
    所述第二装置接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第三装置的身份信息和所述第二随机数生成的;
    所述第二装置根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功。
  11. 根据权利要求10所述的方法,其特征在于,所述第二装置根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功,包括:
    所述第二装置根据所述第二随机数和所述第三装置的身份信息,生成第五验证信息;
    所述第二装置根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功。
  12. 根据权利要求11所述的方法,其特征在于,所述第二装置根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功,包括:
    所述第二装置确定所述第五验证信息和所述第三验证信息是否一致;
    当所述第五验证信息和所述第三验证信息一致时,所述第一装置确定所述第三装置的身份验证成功。
  13. 根据权利要求11所述的方法,其特征在于,所述第三装置的个数为多个,则所述第五验证信息的个数为多个,以及所述第三验证信息的个数为多个,所述第二装置根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功,包括:
    所述第二装置将多个所述第五验证信息进行聚合,得到第六验证信息,以及,将多个所述第三验证信息进行聚合,得到第七验证信息;
    所述第二装置确定所述第六验证信息和所述第七验证信息是否一致;
    当所述第六验证信息和所述第七验证信息一致时,所述第二装置确定多个所述第三装置的身份验证成功。
  14. 根据权利要求10~13任一项所述的方法,其特征在于,所述方法还包括:
    所述第二装置根据所述第二装置的身份信息和来自所述第一装置的第一随机数生成第一验证信息;
    所述第二装置向所述第一装置发送第一消息,所述第一消息包括所述第一验证信息,其中,所述第一验证信息用于对所述第二装置的身份进行验证。
  15. 根据权利要求14所述的方法,其特征在于,所述第一消息还包括所述第三验证信息,所述第三验证信息为所述第二装置验证失败的第三验证信息,或,所述第三验证信息为所述第二装置验证成功的第三验证信息。
  16. 根据权利要求14或15所述的方法,其特征在于,所述第二随机数的长度与所述第一随机数的长度相同且内容不同,或,所述第二随机数是将所述第一随机数和第三随机数拼接后得到的,或,所述第二随机数与所述第一随机数相同。
  17. 一种身份验证方法,其特征在于,包括:
    第二装置向第三装置发送第一随机数,其中,第一车辆承载第一集合,所述第一集合包括所述第二装置和所述第三装置,所述第一车辆还承载第一装置,所述第一装置通过所述第二装置与所述第三装置通信;
    所述第二装置接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第一随机数和所述第三装置的身份信息生成的;
    所述第二装置根据所述第三验证信息得到第四验证信息,所述第四验证信息用于验证所述第三装置的身份是否验证成功;
    所述第二装置将所述第四验证信息发送给所述第一装置。
  18. 根据权利要求17所述的方法,其特征在于,所述方法还包括:
    所述第二装置根据所述第二装置的身份信息和所述第一随机数生成第一验证信息,所述第一验证信息用于验证所述第二装置的身份是否验证成功;
    所述第二装置将所述第一验证信息发送给所述第一装置。
  19. 根据权利要求17或18所述的方法,其特征在于,所述第三装置的个数为多个,相应的,所述第三验证信息的个数为多个,所述第二装置根据所述第三验证信息得到第四验证信息,包括:
    所述第二装置将多个所述第三验证信息进行聚合,得到所述第四验证信息。
  20. 根据权利要求19所述的方法,其特征在于,所述方法还包括:
    所述第二装置接收来自所述第一装置的第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
    所述第二装置向所述第一装置发送第三消息,所述第三消息包括多个所述第三验证信息。
  21. 一种通信装置,其特征在于,包括:
    收发模块,用于向第二装置发送第一随机数,其中,第一车辆承载所述通信装置和第 一集合,所述第二装置属于所述第一集合,所述第一集合还包括第三装置,所述通信装置通过所述第二装置与所述第三装置通信;
    所述收发模块,还用于接收来自所述第二装置的第一消息,所述第一消息包括第一验证信息,所述第一验证信息用于对所述第二装置的身份进行验证,所述第一验证信息是根据所述第二装置的身份信息和所述第一随机数生成的;
    处理模块,用于根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功。
  22. 根据权利要求21所述的通信装置,其特征在于,所述处理模块用于通过如下方式根据所述第一验证信息和所述第一随机数,确定所述第二装置的身份验证成功,包括:
    根据所述第二装置的身份信息和所述第一随机数生成第二验证信息;
    确定所述第一验证信息和所述第二验证信息是否一致;
    当所述第一验证信息和所述第二验证信息一致时,确定所述第二装置的身份验证成功。
  23. 根据权利要求22所述的通信装置,其特征在于,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述处理模块用于通过如下方式根据所述第二装置的身份信息和所述第一随机数生成第二验证信息:
    根据所述第二装置的身份信息、所述第四验证信息和所述第一随机数,生成所述第二验证信息。
  24. 根据权利要求21~23任一项所述的通信装置,其特征在于,所述第一消息还包括所述第三装置所生成的第三验证信息,其中,所述第三验证信息是所述第三装置根据所述第三装置的身份信息获得的。
  25. 根据权利要求24所述的通信装置,其特征在于,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证是否成功;所述处理模块,还用于确定所述第二装置的身份验证成功之后,当所述第四验证信息指示对所述第三装置的身份验证失败时,根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
  26. 根据权利要求21~23任一项所述的通信装置,其特征在于,所述第一消息还包括第四验证信息,所述第四验证信息用于指示对所述第三装置的身份验证不成功,
    所述收发模块,还用于向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
    所述收发模块,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
    所述处理模块,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份是否验证成功。
  27. 根据权利要求21~23任一项所述的通信装置,其特征在于,所述处理模块确定所述第二装置的身份验证不成功,
    所述收发模块,还用于向所述第二装置发送第二消息,所述第二消息用于请求获得所述第三装置对应的验证信息;
    所述收发模块,还用于接收来自所述第二装置的第三消息,所述第三消息包括所述第三装置对应的第三验证信息;
    所述处理模块,还用于根据所述第三验证信息进行验证,以确定所述第三装置的身份 是否验证成功。
  28. 根据权利要求21或22所述的通信装置,其特征在于,所述第三装置的个数为多个,所述第一消息还包括第四验证信息,所述第四验证信息是将来自多个所述第三装置的多个第三验证信息聚合得到的;所述处理模块,还用于根据所述第四验证信息进行验证,以确定多个所述第三装置的身份是否验证成功。
  29. 根据权利要求28所述的通信装置,其特征在于,
    所述收发模块,还用于当所述处理模块根据所述第四验证信息确定多个所述第三装置的身份验证失败时,向所述第二装置发送第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
    所述收发模块,还用于接收来自所述第二装置的第三消息,所述第三消息包括多个所述第三验证信息;
    所述处理模块,还用于根据多个所述第三验证信息进行验证,以确定多个所述第三装置中的每个所述第三装置的身份是否验证成功。
  30. 一种通信装置,其特征在于,包括:
    收发模块,用于向第三装置发送第二随机数,其中,第一车辆承载第一装置和第一集合,所述通信装置和所述第三装置属于所述第一集合,所述第一装置通过所述通信装置与所述第三装置通信;
    所述收发模块,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第三装置的身份信息和所述第二随机数生成的;
    处理模块,用于根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功。
  31. 根据权利要求30所述的通信装置,其特征在于,所述处理模块用于通过如下方式根据所述第二随机数和所述第三验证信息,确定所述第三装置的身份验证成功:
    根据所述第二随机数和所述第三装置的身份信息,生成第五验证信息;
    根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功。
  32. 根据权利要求31所述的通信装置,其特征在于,所述处理模块用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
    确定所述第五验证信息和所述第三验证信息是否一致;
    当所述第五验证信息和所述第三验证信息一致时,确定所述第三装置的身份验证成功。
  33. 根据权利要求31所述的通信装置,其特征在于,所述第三装置的个数为多个,则所述第五验证信息的个数为多个,以及所述第三验证信息的个数为多个,所述处理模块用于通过如下方式根据所述第五验证信息和所述第三验证信息,确定所述第三装置的身份验证成功:
    将多个所述第五验证信息进行聚合,得到第六验证信息,以及,将多个所述第三验证信息进行聚合,得到第七验证信息;
    确定所述第六验证信息和所述第七验证信息是否一致;
    当所述第六验证信息和所述第七验证信息一致时,确定多个所述第三装置的身份验证成功。
  34. 根据权利要求30~33任一项所述的通信装置,其特征在于,
    所述处理模块,还用于根据所述第二装置的身份信息和来自所述第一装置的第一随机 数生成第一验证信息;
    所述收发模块,还用于向所述第一装置发送第一消息,所述第一消息包括所述第一验证信息,其中,所述第一验证信息用于对所述第二装置的身份进行验证。
  35. 根据权利要求34所述的通信装置,其特征在于,所述第一消息还包括所述第三验证信息,所述第三验证信息为所述第二装置验证失败的第三验证信息,或,所述第三验证信息为所述第二装置验证成功的第三验证信息。
  36. 根据权利要求34或35所述的通信装置,其特征在于,所述第二随机数的长度与所述第一随机数的长度相同且内容不同,或,所述第二随机数是将所述第一随机数和第三随机数拼接后得到的,或,所述第二随机数与所述第一随机数相同。
  37. 一种通信装置,其特征在于,包括:
    收发模块,用于向第三装置发送第一随机数,其中,第一车辆承载第一集合,所述第一集合包括所述第二装置和所述第三装置,所述第一车辆还承载第一装置,所述第一装置通过所述第二装置与所述第三装置通信;
    所述收发模块,还用于接收来自所述第三装置的第三验证信息,所述第三验证信息是根据所述第一随机数和所述第三装置的身份信息生成的;
    所述处理模块,用于根据所述第三验证信息得到第四验证信息,所述第四验证信息用于验证所述第三装置的身份是否验证成功;
    所述收发模块,还用于将所述第四验证信息发送给所述第一装置。
  38. 根据权利要求37所述的通信装置,其特征在于,
    所述处理模块,还用于根据所述第二装置的身份信息和所述第一随机数生成第一验证信息,所述第一验证信息用于验证所述第二装置的身份是否验证成功;
    所述收发模块,还用于将所述第一验证信息发送给所述第一装置。
  39. 根据权利要求37或38所述的通信装置,其特征在于,所述第三装置的个数为多个,相应的,所述第三验证信息的个数为多个,所述处理模块用于通过如下方式根据所述第三验证信息得到第四验证信息:
    将多个所述第三验证信息进行聚合,得到所述第四验证信息。
  40. 根据权利要求39所述的通信装置,其特征在于,所述收发模块还用于:
    接收来自所述第一装置的第二消息,所述第二消息用于请求获得多个所述第三装置对应的验证信息;
    向所述第一装置发送第三消息,所述第三消息包括多个所述第三验证信息。
  41. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1~9中任意一项所述的方法,或使得所述计算机执行如权利要求10~16中任意一项所述的方法,或使得所述计算机执行如权利要求17~20中任意一项所述的方法。
  42. 一种通信系统,其特征在于,该通信系统包括如权利要求21~29中任一项所述的通信装置,以及包括如权利要求30~36中任一项所述的通信装置;或者,该通信系统包括如权利要求21~29中任一项所述的通信装置,以及包括如权利要求37~40中任一项所述的通信装置。
PCT/CN2020/076661 2019-08-31 2020-02-25 一种身份验证方法及装置 WO2021036212A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP20856842.8A EP3879753A4 (en) 2019-08-31 2020-02-25 IDENTITY VERIFICATION METHOD AND APPARATUS
JP2021540450A JP7367032B2 (ja) 2019-08-31 2020-02-25 識別確認方法および装置
US17/360,360 US11979413B2 (en) 2019-08-31 2021-06-28 Identity verification method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910819653.5 2019-08-31
CN201910819653.5A CN112448816B (zh) 2019-08-31 2019-08-31 一种身份验证方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/360,360 Continuation US11979413B2 (en) 2019-08-31 2021-06-28 Identity verification method and apparatus

Publications (1)

Publication Number Publication Date
WO2021036212A1 true WO2021036212A1 (zh) 2021-03-04

Family

ID=74684994

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/076661 WO2021036212A1 (zh) 2019-08-31 2020-02-25 一种身份验证方法及装置

Country Status (5)

Country Link
US (1) US11979413B2 (zh)
EP (1) EP3879753A4 (zh)
JP (1) JP7367032B2 (zh)
CN (1) CN112448816B (zh)
WO (1) WO2021036212A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113271565B (zh) * 2021-05-14 2022-12-27 阿波罗智联(北京)科技有限公司 车辆的通信方法、装置、存储介质及程序产品
US20230094360A1 (en) * 2021-09-29 2023-03-30 Continental Automotive Systems, Inc. Method and electronic vehicle system for processing v2x messages
CN115766115A (zh) * 2022-10-28 2023-03-07 支付宝(杭州)信息技术有限公司 一种身份验证方法、装置、存储介质及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015092754A1 (en) * 2013-12-19 2015-06-25 Minda Corporation Limited Improved ignition switch cum steering lock
CN107071774A (zh) * 2017-03-23 2017-08-18 郭明 一种基于身份短群签名的vanet接入认证方法
CN108123805A (zh) * 2017-12-15 2018-06-05 上海汽车集团股份有限公司 车载ecu间通讯安全认证方法
CN108390757A (zh) * 2018-03-27 2018-08-10 深圳市图灵奇点智能科技有限公司 通信数据处理方法、装置、电子设备、程序和介质

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008097202A1 (en) * 2007-02-09 2008-08-14 Agency For Science, Technology And Research A method and system for tamper proofing a system of interconnected electronic devices
WO2009063947A1 (ja) 2007-11-16 2009-05-22 Fujitsu Ten Limited 認証方法、認証システム、車載装置および認証装置
US9280653B2 (en) 2011-10-28 2016-03-08 GM Global Technology Operations LLC Security access method for automotive electronic control units
WO2013161371A1 (ja) * 2012-04-27 2013-10-31 日本電気株式会社 プログラム提供装置、システム、プログラム提供方法およびプログラム
RU2659489C1 (ru) * 2014-06-16 2018-07-02 Рикох Компани, Лтд. Сетевая система, способ управления связью и носитель данных
FR3030987B1 (fr) * 2014-12-23 2018-03-23 Valeo Comfort And Driving Assistance Procede de reconnaissance automatique entre un appareil mobile et un vehicule automobile aptes a fonctionner selon le protocole ble
JP6345157B2 (ja) * 2015-06-29 2018-06-20 クラリオン株式会社 車載情報通信システム及び認証方法
JP6217728B2 (ja) * 2015-10-19 2017-10-25 トヨタ自動車株式会社 車両システムおよび認証方法
JP6260066B2 (ja) * 2016-01-18 2018-01-17 Kddi株式会社 車載コンピュータシステム及び車両
US20190028448A1 (en) 2016-02-22 2019-01-24 Continental Automotive Systems, Inc, Method to establish and update keys for secure in-vehicle network communication
JP6260067B1 (ja) 2016-08-09 2018-01-17 Kddi株式会社 管理システム、鍵生成装置、車載コンピュータ、管理方法、及びコンピュータプログラム
JP6721266B2 (ja) 2017-04-14 2020-07-08 三菱電機株式会社 鍵管理システム、通信機器および鍵共有方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015092754A1 (en) * 2013-12-19 2015-06-25 Minda Corporation Limited Improved ignition switch cum steering lock
CN107071774A (zh) * 2017-03-23 2017-08-18 郭明 一种基于身份短群签名的vanet接入认证方法
CN108123805A (zh) * 2017-12-15 2018-06-05 上海汽车集团股份有限公司 车载ecu间通讯安全认证方法
CN108390757A (zh) * 2018-03-27 2018-08-10 深圳市图灵奇点智能科技有限公司 通信数据处理方法、装置、电子设备、程序和介质

Also Published As

Publication number Publication date
CN112448816A (zh) 2021-03-05
CN112448816B (zh) 2021-10-19
US20210329008A1 (en) 2021-10-21
JP7367032B2 (ja) 2023-10-23
US11979413B2 (en) 2024-05-07
EP3879753A1 (en) 2021-09-15
EP3879753A4 (en) 2022-03-09
JP2022517238A (ja) 2022-03-07

Similar Documents

Publication Publication Date Title
WO2021036212A1 (zh) 一种身份验证方法及装置
US20210176596A1 (en) Peer-to-peer geolocation system
US11392685B2 (en) Device authentication method and apparatus
US9756036B2 (en) Mechanisms for certificate revocation status verification on constrained devices
US20160364787A1 (en) System, apparatus and method for multi-owner transfer of ownership of a device
US11356251B2 (en) Secure vehicle communication with privacy-preserving features
KR20120055683A (ko) 표현들의 소유권을 유도, 통신 및/또는 검증하기 위한 방법들 및 장치
JP2019180042A (ja) 通信装置と通信装置のためのコンピュータプログラム
US11588622B2 (en) Securing outside-vehicle communication using IBC
WO2021082471A1 (zh) 一种通信方法及装置
JP6447949B1 (ja) 認証システム、認証サーバ、認証方法及び認証プログラム
WO2022179675A1 (en) Method and apparatus for link operation of multi-link device
US20180262488A1 (en) Method and system for providing secure communication
CN114172923A (zh) 数据传输方法、通信系统及通信装置
US9917693B2 (en) Providing security assurance information
CN115795430A (zh) 认证方法和安全装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20856842

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020856842

Country of ref document: EP

Effective date: 20210608

ENP Entry into the national phase

Ref document number: 2021540450

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE