WO2021082471A1 - 一种通信方法及装置 - Google Patents

一种通信方法及装置 Download PDF

Info

Publication number
WO2021082471A1
WO2021082471A1 PCT/CN2020/096902 CN2020096902W WO2021082471A1 WO 2021082471 A1 WO2021082471 A1 WO 2021082471A1 CN 2020096902 W CN2020096902 W CN 2020096902W WO 2021082471 A1 WO2021082471 A1 WO 2021082471A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification information
message
pieces
information
address
Prior art date
Application number
PCT/CN2020/096902
Other languages
English (en)
French (fr)
Inventor
潘凯
陈璟
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to JP2022525045A priority Critical patent/JP7481065B2/ja
Priority to EP20882061.3A priority patent/EP4044645A4/en
Priority to KR1020227017563A priority patent/KR20220088478A/ko
Publication of WO2021082471A1 publication Critical patent/WO2021082471A1/zh
Priority to US17/731,931 priority patent/US20220256344A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/75Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Definitions

  • This application relates to the field of communication technology, and in particular to a communication method and device.
  • V2X vehicle-to-everything
  • ADAS advanced driver-assistance systems
  • V2X message In order to ensure the safety of automatic driving of the vehicle, it is necessary to ensure that the message (also called V2X message) between the vehicle and any device is authentic and credible.
  • the certificate technology based on public key infrastructure (PKI) verifies the authenticity of V2X messages. That is, for a certain V2X message, if the vehicle-mounted device as the receiver successfully verifies the signature of the V2X message and the used certificate, then the V2X message is considered to be authentic.
  • the certificate is issued by a certificate authority (CA) to the vehicle-mounted device.
  • CA certificate authority
  • the PKI will issue multiple certificates to the vehicle-mounted device for the vehicle-mounted device to randomly select and use.
  • the certificate randomly selected and used by the in-vehicle device is called an anonymous certificate.
  • one way for the CA to issue an anonymous certificate to the vehicle-mounted device is that the CA directly sends the anonymous certificate to the vehicle-mounted device based on the request of the vehicle-mounted device.
  • This method can be regarded as a synchronization method.
  • Another method is that the CA feeds back the download address of the anonymous certificate to the vehicle-mounted device based on the request of the vehicle-mounted device, and the vehicle-mounted device then obtains the anonymous certificate based on the download address.
  • This method is called asynchronous compared to the synchronous method. In the synchronous mode, if there are many vehicle-mounted devices and multiple vehicle-mounted devices request an anonymous certificate from the CA at the same time, then the CA needs to issue more anonymous certificates at one time, which requires higher CA performance and is limited by the performance of the CA.
  • Some vehicle-mounted devices It takes a long time to receive the anonymous certificate, and the time delay is long.
  • the CA does not need to immediately issue an anonymous certificate to the vehicle-mounted device, compared to the synchronous mode, the delay is longer and the efficiency of the issuance of the anonymous certificate is lower. It can be seen that the current verification of on-board equipment requires a long time delay and low efficiency.
  • the embodiments of the present application provide a communication method and device, which are used to verify a vehicle, improve the verification efficiency, and thereby improve the safety of automatic driving of the vehicle.
  • a first communication method includes: a first device receives a first message from a second device, the first message is used to request to obtain M pieces of verification information from the first device, the Verification information is used to verify information, and the M is a positive integer; the first device sends a second message to the second device, and the second message includes N pieces of verification information among the M pieces of verification information , The N is an integer.
  • the method of the first aspect may be executed by a first device, and the first device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
  • the communication device is a certificate authority, or the communication device may be a device that provides verification information, such as a certificate.
  • a second communication method includes: a second device sends a first message to a first device, where the first message is used to request to obtain M pieces of verification information from the second device, and the M Each of the pieces of verification information is used to sign the message when the second device sends the message, and the M is a positive integer; the second device receives the second message from the first device , The second message includes N pieces of verification information in the M pieces of verification information, and the N is an integer.
  • the method of the second aspect may be executed by a second device, and the second device may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
  • the communication device is an in-vehicle device, or the communication device may be a vehicle in which the in-vehicle device is installed.
  • the verification information may be information provided by the first device and used to verify the identity of the second device
  • the second message sent by the first device to the second device may include M N pieces of authentication information in the authentication information, that is, the first device can provide all or part of the authentication information among the M pieces of authentication information to the second device, so that when there are more second devices, the first device will send the second device to the second device.
  • Sending part of the verification information can ensure that the second device has the verification information available, and the remaining verification information except for the part of the verification information can be subsequently provided to the second device, that is, the remaining verification information can be obtained when the second device needs to be used.
  • the first device does not need to provide more verification information at one time, which reduces the performance requirements for the first device, and because some verification information is currently available, there is no need to obtain available verification information, thereby improving the verification of the second device. s efficiency.
  • the number of messages for requesting verification information received by the first device meets different conditions, and the second messages are also different, specifically any of the following:
  • the number of messages for requesting verification information received by the first device is less than a first threshold, and the M is equal to the N.
  • the first device can send all the verification information to the second device, and the time delay for each second device to obtain the verification information is shorter, that is, the efficiency of obtaining the verification information is higher. .
  • the number of messages for requesting verification information received by the first device is greater than or equal to the first threshold
  • the second message further includes a first address and/or time information
  • the first address Is the download address of the MN pieces of verification information other than the N pieces of verification information in the M pieces of verification information, and the N is equal to 0, and the time information is the acquisition time of the MN pieces of verification information.
  • the first device can send the first address to the second device, and the second device can obtain the verification information through the first address when needed, that is, the first device does not need to be immediately
  • the verification information it can be considered that there is no need for the first device to provide more verification information at one time, which reduces the performance requirements of the first device.
  • the second message may also include time information, and the time information may indicate the moment when the first device prepares MN pieces of verification information, that is, the moment when the MN pieces of verification information determined by the first device can be sent, so that the second device according to the time Information requests to obtain verification information, so as to avoid requesting verification information too early and failing to obtain verification information, or requesting verification information too late, resulting in a long time delay and low efficiency in obtaining verification information.
  • the number of first request messages received by the first device is greater than a second threshold
  • the second message further includes a first address and/or time information
  • the first address is the M pieces of verification information
  • the time information is the acquisition time of the MN pieces of verification information.
  • the first device when there are more second devices, can send part of the verification information and the first address to the second device, or the first device can send part of the verification information and time information to the second device, Alternatively, the first device may send part of the verification information and the first address and time information to the second device.
  • the first address is the download address of the remaining verification information except for part of the verification information
  • the time information can indicate the time when the second device obtains the remaining verification information, so that the first device does not need to provide more verification information at a time, and It can ensure that each second device currently has available partial verification information, which reduces the performance requirements of the first device; at the same time, the second device can obtain the remaining verification information except part of the verification information through the first address when needed. , In order to maximize the efficiency of obtaining verification information.
  • the second message may also include time information, which may indicate the moment when the first device prepares the MN verification information, that is, the first device determines the sending moment of the MN verification information, so that the second device requests verification based on the time information.
  • time information may indicate the moment when the first device prepares the MN verification information, that is, the first device determines the sending moment of the MN verification information, so that the second device requests verification based on the time information.
  • Information to avoid requesting the verification information too early and failing to obtain the verification information in time, or requesting the verification information too late, resulting in a long time delay and low efficiency of obtaining the verification information.
  • the first message includes a first identifier
  • the second message includes the M pieces of verification information
  • the first identifier indicates the first message The priority of is higher than the first priority
  • the second device may be an ambulance or there is currently no verification information available for the second vehicle, in this case, it can be considered that the second device needs verification information first.
  • the first message may carry the first identifier to characterize the second device. The priority of the verification information is higher, and the corresponding first device can send all the verification information to the second device.
  • the first device can identify whether the priority of the second device to obtain the verification information is true. Specifically, the first device determines whether the first identifier is consistent with the identifiers corresponding to the M pieces of verification information; the first device is determining that the first identifier is inconsistent with the identifiers corresponding to the M pieces of verification information When, the first device determines that the N is less than the M.
  • the first device can verify the first message to ensure that the information reported by the second device The first identification is true, and this solution can avoid providing verification information for the second device preferentially according to the first message, which may cause unfairness to other second devices.
  • the second device when the second device acquires the remaining verification information except for part of the verification information, the second device sends a third message to the third device, and the third message is used to request Download the MN pieces of verification information from the first address;
  • the second device receives a fourth message from the third device, where the fourth message includes the M-N pieces of verification information.
  • the third device may be the first device or another device that provides verification information for the second device.
  • the first address may correspond to the first device or other devices.
  • the second message may include the first address and/or time information. For example, if the second message includes time information, the third device is the first device by default, that is, the first address corresponds to the first device; for example, if the second message includes the first address , Then the third device can be another device, so that the first device does not need to store much verification information, which reduces the storage capacity requirements of the first device.
  • the second device sending the third message to the third device may include the second device determining to download the MN pieces of verification information from the first address according to the time information The first moment; the second device sends the third message to the third device at the first moment.
  • the time information may indicate that the first device can determine the sending moment of the MN verification information, that is, the moment of preparing the MN verification information, so that the second device sends the third message according to the time information to avoid sending the third message prematurely.
  • the MN verification information cannot be obtained in time, or the third message is sent too late, resulting in a long time delay, and the efficiency of obtaining MN verification information is low.
  • a communication method includes a fourth device receiving a first message from a second device, where the first message is used to request to obtain M pieces of verification information from the first device, and the verification information is When verifying information, the M is a positive integer; the fourth device determines whether to add a first identifier to the first message according to the identity of the second device, and the first identifier indicates the first The priority of the message is higher than the first priority; the priority of the first message is higher than the first priority, and the fourth device sends the first message carrying the first identifier to the first device .
  • the method of the third aspect may be executed by a fourth device, which may be a communication device or a communication device capable of supporting the communication device to implement the functions required by the method, such as a chip system.
  • the communication device is an agent platform, or the communication device may be a device that sends the first message on behalf of the first device.
  • the fourth device can send the first message from the second device so that the second device does not need to add the first identifier. Whether the first identifier is added to the first message can be determined by the fourth device, so that the second device can In order to obtain the verification information first, adding the first identifier to the first message may cause unfairness to other second devices.
  • the fourth device serves as an intermediate unit for the interaction between the second device and the first device, which can also avoid the problem of incompatibility between multiple first devices and multiple second devices due to different implementations. For example, the interfaces of multiple first devices may be different, which requires each second device to meet the interface design of multiple first devices. Obviously, the interface design of the second device is required to be more complicated.
  • a communication device has the function of realizing the behavior in the method embodiment of the first aspect.
  • the function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the communication device includes: a receiving unit, configured to receive a first message from a second device, the first message being used to request to obtain M pieces of verification information from the communication device, and the verification The information is used to verify the information, and the M is a positive integer; the sending unit is used to send a second message to the second device, and the second message includes N pieces of verification information among the M pieces of verification information, The N is an integer.
  • a communication device in a fifth aspect, is provided, and the beneficial effects can be referred to the description of the second aspect and will not be repeated here.
  • the communication device has the function of realizing the behavior in the method example of the second aspect described above.
  • the function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the communication device includes: a sending unit, configured to send a first message to a first device, the first message being used to request to obtain M pieces of verification information from the first device, and the M Each of the pieces of verification information is used to sign the message when the communication device sends the message, and the M is a positive integer; the receiving unit is used to receive the second message from the first device, The second message includes N pieces of verification information in the M pieces of verification information, and the N is an integer.
  • a communication device in a sixth aspect, is provided, and the beneficial effects can be referred to the description of the third aspect and will not be repeated here.
  • the communication device has the function of realizing the behavior in the method example of the third aspect described above.
  • the function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the communication device includes: a receiving unit, configured to receive a first message from a second device, the first message being used to request to obtain M pieces of verification information from the first device, the verification information Used to verify information, the M is a positive integer; the processing unit is used to determine whether to add a first identifier to the first message according to the identity identifier of the second device, the first identifier indicating the first message The priority of the message is higher than the first priority; the sending unit is configured to send the first message carrying the first identifier to the first device when the priority of the first message is higher than the first priority. news.
  • These modules can perform the corresponding functions in the method example of the third aspect. For details, please refer to the detailed description in the method example, which will not be repeated here.
  • a communication device may be the first device in the foregoing method embodiment, or a chip provided in the first device.
  • the communication device includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store a computer program or instruction
  • the processor is coupled with the memory and a communication interface, and when the processor executes the computer program or instruction, the communication device is caused to execute the method executed by the first device in the above method embodiment .
  • a communication device may be the second device in the foregoing method embodiment, or a chip set in the second device.
  • the communication device includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store a computer program or instruction
  • the processor is coupled with the memory and a communication interface, and when the processor executes the computer program or instruction, the communication device is caused to execute the method executed by the second device in the above method embodiment .
  • a communication device may be the fourth device in the foregoing method embodiment, or a chip set in the fourth device.
  • the communication device includes a communication interface, a processor, and optionally, a memory.
  • the memory is used to store computer programs or instructions
  • the processor is coupled with the memory and a communication interface.
  • the communication device is caused to execute the method executed by the fourth device in the above method embodiment. .
  • the communication interface of the communication device described in the seventh, eighth, and ninth aspects is used to communicate with other devices, and the communication interface may be a transceiver in the communication device, for example, through the communication device Or, if the communication device is a chip set in a communication device, the communication interface may be the input/output interface of the chip, such as input/output pins.
  • the present application provides a chip system including a processor, which is used to implement the functions of the first device in the methods of the foregoing aspects or to implement the functions of the second device in the methods of the foregoing aspects. , Or used to implement the function of the fourth device in the methods of the foregoing aspects.
  • the chip system further includes a memory for storing program instructions and/or data.
  • the chip system can be composed of chips, and can also include chips and other discrete devices.
  • the present application provides a communication system that includes the communication device described in the first aspect and the communication device described in the second aspect; or includes the communication device described in the first aspect and the second aspect
  • the communication device, and the communication device described in the third aspect or include the communication device described in the first aspect, and the communication device described in the third aspect.
  • the communication device of the third aspect may also implement the functions of the communication device as described in the second aspect.
  • a computer program product comprising: computer program code, which when the computer program code is running, causes the methods executed by the first device in the above aspects to be executed, or Cause the method executed by the second device in the foregoing aspects to be executed; or cause the method executed by the fourth device in the foregoing aspects to be executed.
  • this application provides a computer-readable storage medium that stores a computer program, and when the computer program is run, it implements the method executed by the first device in each of the above aspects; or Implement the method executed by the second device in the foregoing aspects; or implement the method executed by the fourth device in the foregoing aspects.
  • the verification information may be information provided by the first device and used to verify the identity of the second device, and the second message sent by the first device to the second device may include N of the M verification information.
  • Verification information that is, the first device can provide all the verification information or part of the verification information in the M verification information to the second device, so that when there are more second devices, the first device sends part of the verification information to the second device. It is ensured that the second device has verification information available, and the remaining verification information except for part of the verification information can be subsequently provided to the second device, that is, the remaining verification information can be obtained when the second device needs to be used.
  • the first device does not need to provide more verification information at one time, thereby reducing the performance requirements of the first device, and because some verification information is currently available, there is no need to obtain available verification information, which can improve the verification of the second device. s efficiency.
  • FIG. 1 is a schematic diagram of a network architecture applied by an embodiment of this application
  • FIG. 2 is a flowchart of a communication method provided by an embodiment of the application
  • FIG. 3 is a flowchart of an example of a communication method provided by an embodiment of the application.
  • FIG. 4 is a flowchart of an example of a communication method provided by an embodiment of this application.
  • FIG. 5 is a flowchart of an example of a communication method provided by an embodiment of this application.
  • FIG. 6 is a flowchart of an example of a communication method provided by an embodiment of the application.
  • FIG. 7 is a schematic block diagram of a first device provided by an embodiment of this application.
  • FIG. 8 is another schematic block diagram of the first device provided by an embodiment of this application.
  • FIG. 9 is a schematic block diagram of a second device provided by an embodiment of this application.
  • FIG. 10 is another schematic block diagram of a second device provided by an embodiment of this application.
  • FIG. 11 is a schematic block diagram of a fourth device provided by an embodiment of this application.
  • FIG. 12 is another schematic block diagram of a fourth device provided by an embodiment of this application.
  • FIG. 13 is still another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 14 is still another schematic block diagram of a communication device provided by an embodiment of this application.
  • FIG. 15 is still another schematic block diagram of a communication device provided by an embodiment of this application.
  • Fig. 1 is an example of the communication system.
  • the communication system may include a CA and multiple vehicles communicating with the CA.
  • Fig. 1 uses two vehicles as an example.
  • the vehicle may be equipped with communication equipment, such as a vehicle-mounted device, where the vehicle-mounted device can be considered as a device placed or installed on the vehicle.
  • a vehicle can be equipped with one vehicle-mounted device or multiple vehicle-mounted devices.
  • ADAS includes many sensors, such as cameras, millimeter wave radars, and ultrasonic radars. These sensors can be considered as vehicle-mounted devices.
  • the following various terminal devices located on the vehicle may also be considered as in-vehicle devices.
  • the terminal device includes a device that provides voice and/or data connectivity to the user.
  • a device that provides voice and/or data connectivity to the user.
  • it may include a handheld device with a wireless connection function or a processing device connected to a wireless modem.
  • the terminal device may communicate with the core network via a radio access network (RAN), and exchange voice and/or data with the RAN.
  • RAN radio access network
  • the terminal device may include user equipment (UE), wireless terminal devices, mobile terminal devices, device-to-device communication (device-to-device, D2D) terminal devices, V2X terminal devices, machine-to-machine/machine-type communication ( machine-to-machine/machine-type communications, M2M/MTC) terminal devices, Internet of things (IoT) terminal devices, subscriber units, subscriber stations, mobile stations , Remote station (remote station), access point (access point, AP), remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user agent (user agent), aircraft (such as UAV, hot air balloon, civil aviation passenger plane, etc.) or user device, etc.
  • UE user equipment
  • D2D device-to-device communication
  • V2X terminal devices machine-to-machine/machine-type communication
  • M2M/MTC machine-to-machine/machine-type communications
  • M2M/MTC Internet of things
  • IoT Internet of things
  • a mobile phone or called a "cellular" phone
  • a computer with a mobile terminal device, a portable, pocket-sized, handheld, and a mobile device with a built-in computer, and so on.
  • PCS personal communication service
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistants
  • restricted devices such as devices with low power consumption, or devices with limited storage capabilities, or devices with limited computing capabilities. Examples include barcodes, radio frequency identification (RFID), sensors, global positioning system (GPS), laser scanners and other information sensing equipment.
  • RFID radio frequency identification
  • GPS global positioning system
  • laser scanners and other information sensing equipment.
  • the in-vehicle device placed or installed on the vehicle may also include a wearable device.
  • Wearable devices can also be called wearable smart devices or smart wearable devices, etc. It is a general term for using wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes Wait.
  • a wearable device is a portable device that is directly worn on the body or integrated into the user's clothes or accessories. Wearable devices are not only a kind of hardware device, but also realize powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, complete or partial functions that can be achieved without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, and need to cooperate with other devices such as smart phones.
  • Use such as all kinds of smart bracelets, smart helmets, smart jewelry, etc. for physical sign monitoring.
  • the vehicle can communicate with other devices through the on-board device.
  • one type of vehicle-mounted device is an on-board unit (OBU).
  • OBU electronic toll collection
  • RSU roadside unit
  • the OBU and RSU can communicate with each other.
  • the OBU adopts dedicated short-range communications (DSRC) technology to establish a communication link with the RSU, and can realize vehicle identification or electronic deduction when the vehicle is traveling without stopping. Fees and other processes.
  • DSRC dedicated short-range communications
  • vehicle A in automatic driving, vehicle A can communicate with vehicle B to ensure the safety of automatic driving of the vehicle, and it is necessary to ensure that the V2X message between vehicle A and vehicle B is authentic and authentic.
  • One way to verify the authenticity of V2X messages is to verify the authenticity of V2X messages based on PKI certificate technology. That is, for a certain V2X message, if the vehicle-mounted device as the receiver successfully verifies the signature of the V2X message and the certificate used, the V2X message is considered to be authentic.
  • the certificate here is issued by the CA to the vehicle-mounted device.
  • PKI will issue multiple certificates to the vehicle-mounted device for the vehicle-mounted device to randomly select and use. In this article, the certificate randomly selected and used by the vehicle-mounted device may also be referred to as an anonymous certificate.
  • one way for the CA to issue an anonymous certificate to the vehicle-mounted device is that the CA directly sends the anonymous certificate to the vehicle-mounted device based on the request of the vehicle-mounted device.
  • This method can be regarded as a synchronization method.
  • Another method is that the CA feeds back the download address of the anonymous certificate to the vehicle-mounted device based on the request of the vehicle-mounted device, and the vehicle-mounted device then obtains the anonymous certificate based on the download address.
  • This method is called asynchronous compared to the synchronous method. If there are many vehicle-mounted devices, multiple vehicle-mounted devices request anonymous certificates from the CA at the same time. For the synchronization method, the CA needs to issue more anonymous certificates at one time, which requires higher performance of the CA.
  • the verification information may be information provided by the first device and used to verify the identity of the second device
  • the second message sent by the first device to the second device may include N verifications out of the M verification information.
  • Information that is, the first device can provide all or part of the verification information in the M verification information to the second device, so that when there are more second devices, the first device sends part of the verification information to the second device, which can guarantee
  • the second device has verification information available, and the remaining verification information except for part of the verification information can be subsequently provided to the second device, that is, the remaining verification information can be obtained when the second device needs to be used.
  • the first device does not need to provide more verification information at a time, which can reduce the performance requirements of the first device, and because there is currently some verification information available, there is no need to obtain available verification information, which can better improve the performance of the second device.
  • the efficiency of the verification is not required to provide more verification information at a time, which can reduce the performance requirements of the first device, and because there is currently some verification information available, there is no need to obtain available verification information, which can better improve the performance of the second device. The efficiency of the verification.
  • the embodiment of the present application provides a communication method. Please refer to FIG. 2 which is a flowchart of the method.
  • the application of this method to the network architecture shown in FIG. 1 is taken as an example.
  • the method can be executed by two communication devices, for example, the first device and the second device.
  • the first device may be a certificate authority or a communication device (such as a chip system) capable of supporting the function required by the certificate authority to implement the method, and of course it may also be other communication devices.
  • the second device may be a vehicle-mounted device or a communication device (such as a chip system) capable of supporting the vehicle-mounted device to implement the functions required by the method, and there are no restrictions on the implementation of the first device and the second device, such as these two communications
  • the devices can be implemented in the same form, for example, both are implemented in the form of equipment, or the two communication devices can also be implemented in different forms, for example, the first device is implemented in the form of equipment, and the second device is implemented in the form of a chip system. and many more.
  • FIG. 1 takes as an example that two second devices are included, and the two second devices are on-vehicle devices. Both of the two second devices can communicate with the first device, and the two second devices can communicate with each other.
  • the method is executed by the first device and the second device as an example.
  • the first device may be a certificate authority or another device that provides an anonymous certificate for the second device.
  • the first device provides an anonymous certificate for the second device, and the second device can use the anonymous certificate to sign the information to be sent.
  • the anonymous certificate can be used to sign the message, so that the third device receives the message and verifies the validity of the signature and the anonymous certificate in the message to determine whether the message is authentic Credible.
  • the anonymous certificate can also be regarded as verification information.
  • the verification information may also include information such as the public key necessary for the second device to sign the message to be sent.
  • the second device may be carried in a vehicle, or the second device may be a vehicle that carries a vehicle unit, or another device that carries a vehicle-mounted unit.
  • the embodiment of the present application does not limit the implementation form of the second device.
  • the third device that communicates with the second device may also be carried in the vehicle, or the third device may be a vehicle carrying a vehicle unit, or another device carrying an on-board unit.
  • the embodiment of the present application does not limit the implementation form of the third device.
  • the first device is a certification authority and the second device is an on-board unit as an example.
  • the vehicle-mounted unit sends a first message to the certificate authority, and the certificate authority receives the first message from the vehicle-mounted unit.
  • the first message is used to request to obtain M pieces of verification information from the certificate authority, and the verification information is used to verify the information.
  • the first message may be a message used to request verification information from a certificate authority, such as an anonymous certificate.
  • the certificate authority can provide multiple anonymous certificates for each of the multiple on-board units.
  • the on-board unit can send a first message to the certificate authority.
  • the vehicle-mounted unit needs to send information to another vehicle-mounted unit, and an anonymous certificate may be required to sign the information to be sent, for example, the first information, then the vehicle-mounted unit may send the first message to the certificate authority. If the vehicle-mounted unit obtains the anonymous certificate from the certificate authority, the first information can be signed by the anonymous certificate, and the signed first information can be sent to another vehicle-mounted unit.
  • the other vehicle-mounted unit receives the first information, and verifies the first information, thereby determining that the first information sent by the vehicle-mounted unit is authentic and authentic.
  • the M pieces of verification information may be M anonymous certificates, and M is a positive integer, that is, M is an integer greater than or equal to 1.
  • the M anonymous certificates may be all anonymous certificates issued by a certificate authority for the vehicle-mounted unit.
  • the certificate authority sends a second message to the vehicle-mounted unit, and the vehicle-mounted unit receives the second message from the certificate authority, where the second message includes N pieces of verification information among the M pieces of verification information.
  • the second message can be regarded as a response message to the first message.
  • the certificate authority can select a suitable amount of verification information when receiving the second message, for example, it is called N verification information.
  • the certificate authority selects N pieces of verification information to send to the vehicle-mounted unit.
  • the N pieces of verification information may be all of the M pieces of verification information, or may be part of the M pieces of verification information.
  • N may be determined according to the number of messages for requesting verification information received by the certificate authority.
  • the number of messages for requesting verification information received by the certificate authority is less than the first threshold, and M is equal to N.
  • the first threshold may be a possible value determined according to the length of time required for the last vehicle-mounted unit among the plurality of vehicle-mounted units to obtain the anonymous certificate.
  • the first threshold may be 1500, or 1800, or other possible values.
  • the time required for the last on-board unit to obtain the anonymous certificate among multiple on-board units may be greater than or equal to 1 minute.
  • the certificate authority can store the first threshold.
  • the number of messages for requesting verification information received by the certificate authority is less than the first threshold. It can be considered that the number of vehicle-mounted units is small, that is, multiple vehicle-mounted units send the first message to the certificate authority, but the certificate authority receives the first message from each vehicle-mounted unit.
  • the number of first messages is less than the first threshold.
  • the certificate authority can determine that the number of on-board units is small, so in order to allow each on-board unit to obtain verification information faster, the certificate authority can determine that the value of N is equal to M, that is, the certificate authority can set each on-board unit at one time. All the M pieces of verification information are sent to each corresponding vehicle-mounted unit, and the efficiency of issuing verification information is high. At the same time, the time delay for each vehicle-mounted unit to obtain the verification information is relatively short, which can ensure that each vehicle-mounted unit has available verification information in time.
  • the certificate authority receives the first message, and the certificate authority sends all the verification information to the vehicle-mounted unit.
  • the number of messages for requesting verification information received by the certificate authority is greater than or equal to the first threshold
  • the second message further includes the first address and/or time information
  • the first address is the M verification information except for Download addresses of MN pieces of verification information other than the N pieces of verification information
  • N is equal to 0
  • the time information is the acquisition time of the MN pieces of verification information.
  • the number of messages for requesting verification information received by the certificate authority is greater than or equal to the first threshold, and it can be considered that the number of vehicle-mounted units is larger.
  • the certificate authority can determine not to directly send verification information to each on-board unit, but to send each on-board unit the address for downloading the verification information, for example, the first address, that is, the value of N is 0, and the second message Including the first address.
  • the certificate authority receives the first message, and the certificate authority sends a download address for downloading all the verification information to the vehicle-mounted unit.
  • the exemplary manner may be that the number of messages for requesting verification information received by the certificate authority is less than or equal to the first threshold.
  • another exemplary manner may be The number of messages used to request verification information received by the certificate authority is greater than the first threshold, which is not limited in this embodiment of the application.
  • the first address can correspond to the first device, for example, the certificate authority, that is, the verification information of each vehicle-mounted unit can be stored in the first device, and each vehicle-mounted unit can download the required verification information from the first device when the verification information is needed. Verification information.
  • the first address may correspond to other devices other than the first device, such as the third device, which can be considered as another certificate authority.
  • the third device stores the verification information of each vehicle-mounted unit. When each vehicle-mounted unit needs verification information, it can Download the required verification information from the third device.
  • the second message includes time information.
  • the time information may indicate the moment when the certificate authority prepares M-N pieces of verification information, that is, the moment when the certificate authority can send M-N pieces of verification information. Therefore, the vehicle-mounted unit requests to obtain MN verification information according to the time information, so as to avoid prematurely requesting MN verification information and failing to obtain MN verification information. For example, the certificate authority has not obtained all MN verification information. At this time, the vehicle-mounted unit MN verification information is requested, naturally, MN verification information cannot be obtained. It can also avoid requesting to obtain M-N pieces of verification information too late, resulting in a long time delay and low efficiency in obtaining verification information. It should be understood that when the second message includes time information, the first address corresponds to the first device by default.
  • the second message includes the first address and time information.
  • the first address may correspond to the first device or the third device.
  • the second message including the time information can prevent the vehicle-mounted unit from requesting the verification information too early and possibly failing to obtain the verification information or requesting the verification information too late, resulting in a long time delay and low efficiency in obtaining the verification information.
  • the number of the first request messages received by the certificate authority is greater than the second threshold
  • the second message further includes the first address and/or time information
  • the first address is the number of verification information divided by N in the M verification information.
  • the download addresses of the MN verification information outside, N is an integer greater than or equal to 1 and less than M
  • the time information is the acquisition time of the MN verification information.
  • the second threshold may also be a possible value determined according to the length of time required for the last vehicle-mounted unit among the multiple vehicle-mounted units to obtain the anonymous certificate.
  • the second threshold may also be 1500, or 1800, or other possible values.
  • the second threshold may be greater than the first threshold, and the certificate authority may store the second threshold.
  • the number of messages for requesting verification information received by the certificate authority is greater than the second threshold, and it can be considered that the number of vehicle-mounted units is greater.
  • the certificate authority can determine that N is an integer greater than or equal to 1 and less than M, that is, the certificate authority can determine to send part of the verification information to the on-board unit, that is, N pieces of verification information, and inform the on-board unit to obtain the remaining verification information.
  • the certificate authority here can determine that N is an integer greater than or equal to 1 and less than M. It can also be considered that when the number of messages used to request verification information received by the certificate authority is greater than the second threshold, the default N is greater than Or an integer equal to 1 and less than M. In this way, the certificate authority does not need to provide more verification information at one time, which reduces the performance requirements of the certificate authority and can ensure that each on-board unit can currently have some available verification information; at the same time, the second device can pass the first address when needed. Obtain MN verification information to maximize the efficiency of obtaining verification information.
  • the certificate authority receives the first message, the certificate authority sends part of the verification information to the vehicle-mounted unit, and sends all the verification information for downloading except for part of the verification information. The download address of the remaining verification information.
  • the second message may also include time information.
  • the time information may indicate the moment when the certificate authority is ready to prepare M-N pieces of verification information, that is, the moment when the certificate authority can send M-N pieces of verification information. Therefore, the vehicle-mounted unit requests MN verification information according to the time information, which can prevent the vehicle-mounted unit from requesting the verification information too early and may not be able to obtain the verification information or requesting the verification information too late, resulting in a long time delay, and the efficiency of obtaining verification information is relatively high. low. It should be understood that when the second message includes time information, the vehicle-mounted unit obtains M-N pieces of verification information from the first device by default.
  • the second message may also include the first address and time information.
  • the first address can correspond to the first device or the third device. In this way, there is no need for the first device to store much verification information, which reduces the requirement on the storage capacity of the first device.
  • the second message including the time information can prevent the vehicle-mounted unit from requesting the verification information too early and possibly failing to obtain the verification information or requesting the verification information too late, resulting in a long time delay and low efficiency in obtaining the verification information.
  • the certificate authority can receive the first message, and any one of the three exemplary implementation manners described above can be used to send the vehicle to the vehicle.
  • the unit sends the verification information, that is, defines the certificate authority to send all the verification information to the vehicle-mounted unit, or defines the certificate authority to send the download address for downloading all the verification information to the vehicle-mounted unit, or defines the certificate authority to send all the verification information to the vehicle-mounted unit Part of the verification information, and the download address used to download all the verification information except for the rest of the verification information.
  • the certificate authority receives the first message, and determines which of the three exemplary implementation manners to adopt according to its own load situation, that is, the number of received messages for requesting verification information Kind.
  • the above-mentioned time information may be the first time, and the on-board unit sends a third message to the first device or the third device based on the first time. This eliminates the need for the on-board unit to calculate the first time based on the time information, which reduces the number of on-board units. The amount of calculation.
  • the above time information may be the first time length, and the vehicle-mounted unit may determine the first time based on the first time length and the current time, so as to send the third message to the first device or the third device at the first time, so that the first device is not required Calculating the first moment reduces the calculation amount of the first device.
  • the vehicle-mounted unit may send a third message to the first device or the third device, and the third message is used to request to download M-N verification information from the first address.
  • the first device or the third device receives the third message, and responds to the third message, and sends a fourth message to the vehicle-mounted unit.
  • the fourth message includes M-N pieces of verification information.
  • the second message includes the first address. If the first address corresponds to the first device, then the on-board unit receives the second message and can send a third message to the first device; if the first address corresponds to the third device, then the on-board unit receives the second message and can send it to the third device The third news.
  • the vehicle-mounted unit determines the first moment when the M-N pieces of verification information are requested according to the time information, and sends the third message to the first device or the third device at the first moment. For example, if the second message only contains time information, the second device may send a third message to the first device, so that the first device sends a fourth message to the second device.
  • the second message includes the first address and time information. Then, the vehicle-mounted unit determines the first moment when the M-N verification information is requested to be obtained according to the time information, and sends a third message to the first device or the third device at the first moment. For example, if the first address corresponds to the first device, then the on-board unit receives the second message and can send a third message to the first device; if the first address corresponds to the third device, then the on-board unit receives the second message and can send the third message to the third device. The device sends a third message.
  • the vehicle in which the on-board unit is located may be a special vehicle, such as an ambulance or a police car, which is different from a normal vehicle, or the on-board unit does not currently have valid verification information available, but verification information is needed.
  • the vehicle-mounted unit needs priority verification information.
  • the first message sent by the vehicle-mounted unit to the certificate authority may carry an identifier indicating the priority of obtaining the verification information, for example, the first identifier.
  • the certificate authority may determine to issue verification information for the vehicle-mounted unit first.
  • the priority of obtaining verification information for ordinary vehicles can be pre-defined as the first priority.
  • the priority indicated by the first identifier is higher than the first priority, it can be considered that the on-board unit has priority for obtaining verification information.
  • the level is higher.
  • the priority indicated by the first identifier here is higher than the first priority, which is relatively speaking.
  • the first priority may also be predefined
  • the first priority is the priority of the police car to obtain the verification information
  • the first identifier may refer to the priority of the ambulance to obtain the verification information. This is just to illustrate that the first priority and the priority indicated by the first identifier are relative, and there is no restriction on the type of vehicle.
  • the certificate authority can send all the verification information to the vehicle-mounted unit, which corresponds to the first exemplary implementation manner described above.
  • the on-board unit can obtain verification information in a timely manner, and to ensure that the on-board unit performs business in a timely manner. For example, it is possible to prevent special vehicles from having to wait all the time, so that verification information can be obtained in time to ensure that special vehicle services are given priority in emergency situations.
  • the on-board unit is not actually a device that needs to obtain verification information first, but the first message reported by the on-board unit still carries the first identifier.
  • the certificate authority After receiving the first message, if it is determined that the first message includes the first message With an identification, the certificate authority can verify the authenticity of the first identification in the first message, that is, verify the first message.
  • the certificate authority may compare the first identifier in the first message with the identifier corresponding to the M pieces of verification information to be provided for the on-board unit.
  • the identifier corresponding to the M pieces of verification information corresponds to the on-board unit, if the first identifier is When the identifiers corresponding to the M pieces of verification information are the same, it can be determined that the on-board unit really needs to obtain the verification information first.
  • the certificate authority can send all the verification information to the on-board unit, that is, N is equal to M; and if the first identifier is inconsistent with the identifiers corresponding to the M pieces of verification information, the certificate authority vehicle-mounted unit does not actually need to obtain the verification information first, and the certificate authority can determine that N is less than M, that is, the certificate authority can first Providing part of the verification information to the vehicle-mounted unit can reduce the performance requirements of the certificate authority.
  • the certificate authority verifies the authenticity of the first identifier in the first message, which can also avoid preferentially providing verification information for the vehicle-mounted unit based on the first identifier, which may cause unfairness to other vehicle-mounted units.
  • N is less than M, or it may be considered that when the first identifier is inconsistent with the identifiers corresponding to the M pieces of verification information, N is less than M, and the certificate authority may not necessarily perform the determination operation.
  • the first identifier may be added by a device other than the vehicle-mounted unit, for example, a fourth device. Since the vehicle-mounted unit adds the first identifier when sending the first message, the vehicle-mounted unit still adds the first identifier even if it does not need to obtain verification information first. For this reason, the embodiment of the present application provides another scenario, that is, a fourth device is added.
  • the fourth device can be considered as an agent platform.
  • the vehicle-mounted unit can send the first message to the fourth device, and the fourth device sends the first message to the fourth device. Forward to the certificate authority.
  • the agent platform can manage multiple certificate authorities, and each vehicle-mounted unit can exchange information with each certificate authority through the agent platform.
  • the addition of the agent platform can avoid the uncertainty of the certificate authority and simplify the complexity of the interface implementation of the vehicle-mounted unit. For example, if there are multiple certificate authorities, the interfaces of some of the certificate authorities may be different. This makes the interface of the vehicle-mounted unit that exchanges information with these multiple certificate authorities must meet the interfaces of these multiple certificate authorities. ; Or, the format of the messages sent by some of the multiple certificate authorities is different, etc., which makes the vehicle-mounted unit that exchanges information with these multiple certificate authorities must be able to support different message formats to parse from these multiple certificates
  • the message received by the organization that is, the requirements for the interface of the on-board unit or the supported message format are relatively high.
  • the agent platform may receive the first message from the vehicle-mounted unit, and process the first message, for example, convert the format of the first message into a format that can be parsed by a certain certificate authority, and then send the first message to the certificate authority. It should be understood that the agent platform receives the second message from a certain certificate authority, and can process the second message, for example, convert the format of the second message into a format that can be parsed by the vehicle-mounted unit, and then send the second message to the vehicle-mounted unit . It should be understood that the agent platform can act as a bridge between multiple vehicle-mounted units and multiple certificate authorities, so as to avoid the complexity of the vehicle-mounted unit's interface implementation due to the uncertainty of the certificate authority.
  • the second device in the embodiment of the present application may also be the fourth device, that is, the second device may be a vehicle-mounted unit, a vehicle, or an agent platform that can manage multiple vehicle-mounted units or multiple A vehicle, to achieve information interaction with the certificate authority, such as obtaining an anonymous certificate from the certificate authority.
  • the fourth device Based on whether the first message includes the first identifier or does not include the first identifier, the fourth device forwards the first message to the certificate authority differently.
  • the fourth device may store information that characterizes whether the on-board unit needs to obtain verification information preferentially, such as the identity of the on-board unit or information that characterizes the identity of the on-board unit.
  • the identity of the vehicle-mounted unit is, for example, the license plate number of the vehicle where the vehicle-mounted unit is located. If the license plate number indicates that the vehicle is an ambulance, the vehicle-mounted unit needs to obtain verification information first.
  • the information that characterizes the identity of the on-board unit is information that characterizes that the on-board unit currently has no available verification information, so the on-board unit needs to obtain the verification information first.
  • the information that characterizes whether the on-board unit needs to obtain the verification information first is the identity of the on-board unit as an example.
  • the fourth device can determine whether the first identification is authentic. For example, the first identification is also the identification identification of the on-board unit, then the fourth device can compare the first identification with the stored identification identification of the on-board unit, and if the two are consistent, then the fourth The device determines that the first message is authentic, and transparently transmits the first message to the certificate authority.
  • the fourth device can determine that the first message is not authentic, and the fourth device can remove the first identifier in the first message, which will not include the first identifier of the first identifier. A message is sent to the certificate authority. In this way, it can be avoided that the in-vehicle unit adds the first identifier to the first message in order to obtain the verification information first, which may cause unfairness to other in-vehicle units.
  • the fourth device may add the first identifier to the first message according to whether the on-board unit needs to obtain the verification information first. If the vehicle-mounted unit does need to obtain limited verification information, the fourth device adds a first identifier to the first message, and sends the first message with the first identifier added to the certificate authority. If the vehicle-mounted unit does not need to obtain the verification information in priority, the fourth device transparently transmits the first message to the certificate authority. In this way, each on-board unit does not need to add the first identifier, which reduces the complexity of the implementation of each on-board unit, and reduces the requirements for equipment vendors that provide each on-board unit.
  • FIG. 3 is the flow of the first implementation manner of the communication method provided by the embodiment of this application.
  • the process shown in FIG. 3 takes the vehicle-mounted unit and the certificate authority as the device that executes the communication method as an example, and takes the method in which the certificate authority sends part of the verification information to the vehicle-mounted unit by default and obtains the remaining verification information as an example.
  • the vehicle-mounted unit sends a first message to the certificate authority.
  • the certificate authority sends a second message to the vehicle-mounted unit, where the second message includes N pieces of verification information among the M pieces of verification information, and the second message also includes the first address and/or time information, and N is greater than or equal to 1. And an integer less than M.
  • the first address corresponds to the certificate authority as an example.
  • the vehicle-mounted unit sends a third message to the certificate authority, where the third message is used to request to download M-N pieces of verification information from the first address.
  • the vehicle-mounted unit receives a fourth message from the certificate authority, where the fourth message includes M-N pieces of verification information.
  • FIG. 4 is the flow of the second implementation manner of the communication method provided by the embodiment of this application.
  • the flow shown in FIG. 4 takes the vehicle-mounted unit and the certificate authority as the device that executes the communication method, and takes the manner in which the certificate authority determines the verification information to be sent to the vehicle-mounted unit according to the size of the amount of verification information obtained by the received request as an example.
  • the vehicle-mounted unit sends a first message to the certificate authority.
  • the certificate authority determines whether the number of received messages for requesting verification information is greater than a first preset threshold.
  • the number of messages for requesting to obtain verification information is less than or equal to the first preset threshold, and the certificate authority sends a second message to the vehicle-mounted unit.
  • the second message includes N verification information of the M verification information.
  • the number of messages for requesting to obtain verification information is greater than the first preset threshold, and the certificate authority sends a second message to the vehicle-mounted unit.
  • the second message includes the first address and/or time information, and the first address is M downloads. The address of the verification information.
  • the first address corresponds to the certificate authority as an example.
  • the first preset threshold may be determined based on the number of requests for verification information currently received by the certificate authority or the number of requests for verification information that has not yet been processed, and the first preset threshold may be the above-mentioned first threshold.
  • a threshold may also be the above-mentioned second threshold, or may be other possible values besides the first threshold and the second threshold, which is not limited in the embodiment of the present application.
  • FIG. 5 is the flow of the third implementation manner of the communication method provided by the embodiment of this application.
  • the flow shown in Fig. 5 takes the device for executing the communication method as an example of an on-board unit and a certificate authority, and takes the certificate authority to determine the way in which the verification information is sent to the on-board unit according to the size of the amount of verification information obtained by the received request, and the first The message includes the first identifier as an example.
  • the vehicle-mounted unit sends a first message to the certificate authority, where the first message includes a first identifier.
  • the certificate authority determines whether the number of received messages for requesting to obtain verification information is greater than a first preset threshold.
  • S503 The number of messages for requesting to obtain verification information is less than or equal to a first preset threshold, and the certificate authority sends a second message to the vehicle-mounted unit, where the second message includes N pieces of verification information among the M pieces of verification information.
  • the number of messages for requesting to obtain verification information is greater than the first preset threshold, and the certificate authority sends a second message to the vehicle-mounted unit.
  • the second message includes N verification information out of the M verification information, and the second message It also includes a first address and/or time information.
  • the first address is an address for downloading M pieces of verification information, and N is an integer greater than or equal to 1 and less than M.
  • the first address corresponds to the certificate authority as an example.
  • the first preset threshold may be determined based on the number of requests for verification information currently received by the certificate authority or the number of requests for verification information that has not yet been processed, and the first preset threshold may be the above-mentioned first threshold.
  • a threshold may also be the above-mentioned second threshold, or may be other possible values besides the first threshold and the second threshold, which is not limited in the embodiment of the present application.
  • FIG. 6 is the flow of the third implementation manner of the communication method provided by the embodiment of this application.
  • the process shown in Fig. 6 takes the example that the device implementing the communication method is a vehicle-mounted unit, a certificate authority, and an agent platform.
  • the vehicle-mounted unit sends a first message to the agent platform.
  • the agent platform determines whether to add a first identifier to the first message.
  • the agent platform sends a first message to the certificate authority, where the first message includes the first identifier.
  • the certificate authority determines whether the number of received messages for requesting to obtain verification information is greater than a first preset threshold.
  • the number of messages for requesting to obtain verification information is less than or equal to the first preset threshold, and the certificate authority sends a second message to the agency platform, where the second message includes N pieces of verification information among the M pieces of verification information.
  • the agent platform sends the second message to the vehicle-mounted unit.
  • the number of messages for requesting to obtain verification information is greater than the first preset threshold, and the certificate authority sends a second message to the agency platform, where the second message includes N verification information out of the M verification information, and the second message It also includes a first address and/or time information.
  • the first address is an address for downloading M pieces of verification information, and N is an integer greater than or equal to 1 and less than M.
  • the agent platform sends the second message to the vehicle-mounted unit.
  • the first address corresponds to the certificate authority as an example.
  • step S605 and step S607 is not limited.
  • the agent platform may decide to add the first identifier to the first message, and the vehicle-mounted unit does not need to implement this operation, which simplifies the logic of the vehicle-mounted unit.
  • the first device can send part of the verification information to the second device, first ensuring that the second device has the verification information available, and the remaining verification information except for the part of the verification information can be subsequently provided to the second device, that is When the second device needs to be used, the remaining verification information can be obtained.
  • the first device does not need to provide more verification information at one time, which reduces the performance requirements for the first device, and because some verification information is currently available, there is no need to obtain available verification information, thereby improving the verification of the second device. s efficiency.
  • the fourth device may send the first message from the second device, so that the second device may not add the first identifier, and whether the first identifier is added to the first message can be determined by the fourth device.
  • the second device adds the first identifier to the first message, which may cause unfairness to other second devices.
  • the fourth device serves as an intermediate unit for the interaction between the second device and the first device, which can also avoid the problem of incompatibility between multiple first devices and multiple second devices due to different implementations.
  • the methods provided by the embodiments of the present application are introduced from the perspective of the first device, the second device, and the interaction between the first device and the second device.
  • the first device and the second device may include a hardware structure and/or a software module, and the foregoing may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • Each function. Whether a certain function of the above-mentioned functions is executed by a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraint conditions of the technical solution.
  • FIG. 7 is a schematic block diagram of a communication device 700 according to an embodiment of the application.
  • the communication device 700 can execute the behaviors and functions of the first device in the foregoing method embodiments, and in order to avoid repetition, details are not described herein again.
  • the communication device 700 may be the first device 700, or may be a chip applied in the first device 700.
  • the communication device 700 may include a receiving unit 710 and a sending unit 720, and may also include a processing unit 730.
  • the receiving unit 710, the sending unit 720, and the processing unit 730 may be logical function modules, respectively.
  • the processing unit 730 is configured to perform all operations performed by the first device in the embodiments shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG.
  • the receiving unit 710 and the sending unit 720 can be used to perform all the receiving or sending operations performed by the first device in the embodiments shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6, for example, the one shown in FIG. S201 and S202 in the embodiment, and/or other processes used to support the technology described herein.
  • the receiving unit 710 and the sending unit 720 may send and receive data under the control of the processing unit 730, specifically:
  • the receiving unit 710 is configured to receive a first message from a second device, the first message is used to request to obtain M pieces of verification information from the communication device, the verification information is used to verify information, and the M Is a positive integer;
  • the sending unit 720 is configured to send a second message to the second device, where the second message includes N pieces of verification information in the M pieces of verification information, and the N is an integer.
  • processing unit 730 may be used to determine:
  • the number of messages for requesting verification information received by the receiving unit 710 is less than a first threshold, and the M is equal to the N; or,
  • the number of messages for requesting verification information received by the receiving unit 710 is greater than or equal to the first threshold, and the second message further includes a first address and/or time information, and the first address is the M
  • the number of first request messages received by the receiving unit 710 is greater than a second threshold, the second message further includes a first address and/or time information, and the first address is the M pieces of verification information except for the Download addresses of MN pieces of verification information other than the N pieces of verification information, where N is an integer greater than or equal to 1 and less than the M, and the time information is the acquisition time of the MN pieces of verification information.
  • the first message includes a first identifier
  • the second message includes the M pieces of verification information
  • the first identifier indicates that the priority of the first message is higher than First priority
  • processing unit 730 may be used to:
  • processing unit 730 in the embodiment of the present application may be implemented by a processor or processor-related circuit components, and the receiving unit 710 and the sending unit 720 may be implemented by a transceiver or transceiver-related circuit components.
  • an embodiment of the present application also provides a communication device 800.
  • the communication device 800 is, for example, the first device 800.
  • the first device 800 includes a processor 810, a memory 820, and a transceiver 830.
  • the memory 820 stores instructions or programs
  • the processor 810 is configured to execute the instructions or programs stored in the memory 820.
  • the processor 810 is used to perform the operations performed by the processing unit 730 in the foregoing embodiment
  • the transceiver 830 is used to perform the operations performed by the receiving unit 710 and the sending unit 720 in the foregoing embodiment .
  • first device 700 or the first device 800 may correspond to the first device in the embodiment shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6, and the first device
  • the operations and/or functions of each module in 700 or the first device 800 are to implement the corresponding processes in the embodiments shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6, respectively.
  • I will not repeat them here.
  • the communication device 800 shown in FIG. 8 may be a chip or a circuit, for example, a chip or a circuit that may be provided in a certification authority. Further, the communication device 800 may also include a bus system.
  • the processor 810, the memory 820, and the transceiver 830 are connected by a bus system.
  • the processor 810 is used to execute instructions stored in the memory 820 to control the transceiver 830 to receive signals and to control the transceiver 830 to send signals to complete the communication of this application.
  • the transceiver 830 may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.
  • the memory 820 may be integrated in the processor 810, or may be provided separately from the processor 810.
  • the function of the transceiver 830 may be implemented by a transceiver circuit or a dedicated transceiver chip.
  • the processor 810 may be implemented by a dedicated processing chip, a processing circuit, a processor, or a general-purpose chip.
  • connection medium among the foregoing processor 810, memory 820, and transceiver 830 is not limited in the embodiment of the present application.
  • the processor 810, the memory 820, and the transceiver 830 are connected by a bus in FIG. 8.
  • the bus is represented by a thick line in FIG. 8.
  • the connection modes between other components are only for schematic illustration. It is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 8, but it does not mean that there is only one bus or one type of bus.
  • FIG. 9 is a schematic block diagram of a communication device 900 according to an embodiment of the application.
  • the communication device 900 can execute the behaviors and functions of the second device in the foregoing method embodiments, and in order to avoid repetition, details are not described herein again.
  • the communication device 900 may be the second device 900, or may be a chip applied in the second device 900.
  • the communication device 900 is, for example, the second device 900.
  • the second device 900 includes a sending unit 910, a receiving unit 920, and a processing unit 930.
  • the sending unit 910, the receiving unit 920, and the processing unit 930 may be logical function modules, respectively.
  • the processing unit 930 may be used to perform all the operations performed by the second device in the embodiments shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. Other processes that support the technology described in this article.
  • the sending unit 910 and the receiving unit 920 may be used to perform all receiving or sending operations performed by the second device in the embodiments shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6, and/or for supporting Other processes of the technique described in this article.
  • the sending unit 910 is configured to send a first message to a first device, where the first message is used to request to obtain M pieces of verification information from the first device, and each piece of verification information in the M pieces of verification information is used for When the communication device sends a message, sign the message, and the M is a positive integer;
  • the receiving unit 920 is configured to receive a second message from the first device, where the second message includes N pieces of verification information in the M pieces of verification information, where N is an integer.
  • the M is equal to the N; or,
  • the second message further includes a first address and/or time information, and the first address is a download address of MN pieces of verification information other than the N pieces of verification information among the M pieces of verification information, and the N is equal to 0, and the time information is the acquisition time of the MN verification information; or,
  • the second message further includes a first address and/or time information, and the first address is a download address of MN verification information in addition to the N verification information in the M verification information, and the N Is an integer greater than or equal to 1 and less than the M, and the time information is the acquisition time of the MN pieces of verification information.
  • the first message includes a first identifier
  • the second message includes the M pieces of verification information
  • the first identifier indicates that the priority of the first message is higher than First priority
  • the sending unit 910 is further configured to send a third message to a third device, where the third message is used to request to download the M-N pieces of verification information from the first address;
  • the receiving unit is further configured to receive a fourth message from the third device, where the fourth message includes the M-N pieces of verification information.
  • the processing unit 930 may be further configured to determine, according to the time information, the first moment when the M-N pieces of verification information are downloaded from the first address;
  • the sending unit 910 is further configured to send the third message to the third device at the first moment under the control of the processing unit 930.
  • processing unit 930 in the embodiment of the present application may be implemented by a processor or processor-related circuit components, and the sending unit 910 and the receiving unit 920 may be implemented by a transceiver or transceiver-related circuit components.
  • an embodiment of the present application also provides a communication device 1000.
  • the communication device 1000 is, for example, the second device 1000.
  • the second device 1000 includes a processor 1010, a memory 1020, and a transceiver 1030.
  • the memory 1020 stores instructions or programs
  • the processor 1010 is configured to execute the instructions or programs stored in the memory 1020.
  • the processor 1010 is used to perform the operations performed by the processing unit 930 in the foregoing embodiment
  • the transceiver 1030 is used to perform the operations performed by the sending unit 910 and the receiving unit 920 in the foregoing embodiment .
  • the second device 900 or the second device 1000 may correspond to the second device in the embodiment shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6, and the second device
  • the operations and/or functions of each module in 900 or the second device 1000 are to implement the corresponding processes in the embodiments shown in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6, respectively.
  • I will not repeat them here.
  • the communication device 1000 shown in FIG. 10 may be a chip or a circuit, for example, a chip or a circuit that may be provided in a certification authority. Further, the communication device 1000 may also include a bus system.
  • the processor 1010, the memory 1020, and the transceiver 1030 are connected by a bus system.
  • the processor 1010 is used to execute the instructions stored in the memory 1020 to control the transceiver 1030 to receive signals and to control the transceiver 1030 to send signals to complete the communication of this application.
  • the transceiver 1030 may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.
  • the memory 1020 may be integrated in the processor 1010, or may be provided separately from the processor 1010.
  • the function of the transceiver 1030 may be implemented by a transceiver circuit or a dedicated transceiver chip.
  • the processor 1010 may be implemented by a dedicated processing chip, a processing circuit, a processor, or a general-purpose chip.
  • connection medium among the foregoing processor 1010, memory 1020, and transceiver 1030 is not limited in the embodiment of the present application.
  • the processor 1010, the memory 1020, and the transceiver 1030 are connected by a bus.
  • the bus is represented by a thick line in FIG. 10, and the connection mode between other components is only for schematic illustration. It is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used to represent in FIG. 10, but it does not mean that there is only one bus or one type of bus.
  • FIG. 11 is a schematic block diagram of a communication device 1100 according to an embodiment of the application.
  • the communication device 1100 can execute the behaviors and functions of the fourth device in the foregoing method embodiments, and in order to avoid repetition, details are not described herein again.
  • the communication device 1100 may be the fourth device 1100, or may be a chip applied in the fourth device 1100.
  • the communication device 1100 is, for example, the fourth device 1100.
  • the fourth device 1100 includes a sending unit 1110, a receiving unit 1120, and a processing unit 1130.
  • the sending unit 1110, the receiving unit 1120, and the processing unit 1130 may be logical function modules, respectively.
  • the processing unit 1130 may be used to perform all operations performed by the fourth device in the embodiment shown in FIG. 6 except for the transceiving operation, and/or to support other processes of the technology described herein.
  • the sending unit 1110 and the receiving unit 1120 may be used to perform all receiving or sending operations performed by the fourth device in the embodiment shown in FIG. 6, and/or other processes used to support the technology described herein.
  • the receiving unit 1120 is configured to receive a first message from the second device, the first message is used to request to obtain M pieces of verification information from the first device, the verification information is used to verify the information, and the M is positive. Integer
  • the processing unit 1130 is configured to determine whether to add a first identifier to the first message according to the identity identifier of the second device, the first identifier indicating that the priority of the first message is higher than the first priority;
  • the sending unit 1110 is configured to send the first message carrying the first identifier to the first device when the priority of the first message is higher than the first priority.
  • processing unit 1130 in the embodiment of the present application may be implemented by a processor or processor-related circuit components, and the sending unit 1110 and the receiving unit 1120 may be implemented by a transceiver or transceiver-related circuit components.
  • an embodiment of the present application also provides a communication device 1200.
  • the communication device 1200 is, for example, the fourth device 1200.
  • the fourth device 1200 includes a processor 1210, a memory 1220, and a transceiver 1230.
  • the memory 1220 stores instructions or programs
  • the processor 1210 is configured to execute the instructions or programs stored in the memory 1220.
  • the processor 1210 is used to perform the operations performed by the processing unit 1130 in the above-mentioned embodiment
  • the transceiver 1230 is used to perform the operations performed by the sending unit 1110 and the receiving unit 1120 in the above-mentioned embodiment .
  • the fourth device 1100 or the fourth device 1200 may correspond to the fourth device in the embodiment shown in FIG. 6, and the operation of each module in the fourth device 1100 or the fourth device 1200 And/or functions are to implement the corresponding process in the embodiment shown in FIG. 6 respectively.
  • I will not repeat them here.
  • the communication device 1200 shown in FIG. 12 may be a chip or a circuit, for example, a chip or a circuit that may be provided in an agent platform. Further, the communication device 1200 may also include a bus system.
  • the processor 1210, the memory 1220, and the transceiver 1230 are connected by a bus system.
  • the processor 1210 is used to execute the instructions stored in the memory 1220 to control the transceiver 1230 to receive signals and to control the transceiver 1230 to send signals to complete the communication of this application.
  • the transceiver 1230 may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.
  • the memory 1220 may be integrated in the processor 1210, or may be provided separately from the processor 1210.
  • the function of the transceiver 1230 may be implemented by a transceiver circuit or a dedicated transceiver chip.
  • the processor 1210 may be implemented by a dedicated processing chip, a processing circuit, a processor, or a general-purpose chip.
  • connection medium among the foregoing processor 1210, memory 1220, and transceiver 1230 is not limited in the embodiment of the present application.
  • the processor 1210, the memory 1220, and the transceiver 1230 are connected by a bus.
  • the bus is represented by a thick line in FIG. 12, and the connection modes between other components are only for schematic illustration. It is not limited.
  • the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 12 to represent it, but it does not mean that there is only one bus or one type of bus.
  • the processor 810, the processor 1010, and the processor 1210 may all be general-purpose processors, digital signal processors, application specific integrated circuits, field programmable gate arrays or other programmable logic devices, discrete gates, or transistors.
  • Logic devices and discrete hardware components can implement or execute the methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the memory 820, the memory 1020, and the memory 1220 may all be non-volatile memories, such as hard disk drives (HDD) or solid-state drives (solid-state drives, SSD), etc., and may also be volatile Volatile memory (volatile memory), such as random-access memory (RAM).
  • the memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this.
  • the memory in the embodiments of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
  • the communication device in the above embodiment may be an on-board unit, a vehicle, or a certification authority, or a circuit, or a chip applied in the on-board unit or other combination devices or components with the above-mentioned on-board functions.
  • the transceiver unit may be a transceiver, which may include an antenna and a radio frequency circuit, etc.
  • the processing module may be a processor, such as a central processing unit (CPU).
  • the transceiver unit may be a radio frequency unit
  • the processing module may be a processor.
  • the transceiver unit may be an input/output interface of the chip system
  • the processing module may be a processor of the chip system.
  • the embodiment of the present application also provides a communication device.
  • the communication device may be a vehicle-mounted device or a circuit.
  • the communication device may be used to perform the actions performed by the first device in the foregoing method embodiments.
  • FIG. 13 shows a simplified structural diagram of a vehicle-mounted device. It is easy to understand and easy to illustrate.
  • the vehicle-mounted device uses the vehicle-mounted unit as an example.
  • the vehicle-mounted unit includes a processor, a memory, a radio frequency circuit, an antenna, and an input and output device.
  • the processor is mainly used to process the communication protocol and communication data, control the vehicle-mounted unit, execute the software program, and process the data of the software program.
  • the memory is mainly used to store software programs and data.
  • the radio frequency circuit is mainly used for the conversion of baseband signal and radio frequency signal and the processing of radio frequency signal.
  • the antenna is mainly used to send and receive radio frequency signals in the form of electromagnetic waves.
  • Input and output devices such as touch screens, display screens, keyboards, etc., are mainly used to receive data input by users and output data to users. It should be noted that some types of equipment may not have input and output devices.
  • the processor When data needs to be sent, the processor performs baseband processing on the data to be sent, and then outputs the baseband signal to the radio frequency circuit.
  • the radio frequency circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal to the outside in the form of electromagnetic waves through the antenna.
  • the radio frequency circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, and the processor converts the baseband signal into data and processes the data.
  • FIG. 13 only one memory and processor are shown in FIG. 13. In an actual device product, there may be one or more processors and one or more memories.
  • the memory may also be referred to as a storage medium or storage device.
  • the memory may be set independently of the processor, or may be integrated with the processor, which is not limited in the embodiment of the present application.
  • the antenna and radio frequency circuit with the transceiver function can be regarded as the transceiver unit of the device, and the processor with the processing function can be regarded as the processing unit of the device.
  • the device includes a transceiver unit 1310 and a processing unit 1320.
  • the transceiving unit may also be referred to as a transceiver, a transceiver, a transceiving device, and so on.
  • the processing unit 1320 may also be called a processor, a processing board, a processing module, a processing device, and so on.
  • the device for implementing the receiving function in the transceiver unit 1310 can be regarded as the receiving unit, and the device for implementing the sending function in the transceiver unit 1310 as the sending unit, that is, the transceiver unit 1310 includes a receiving unit and a sending unit.
  • the transceiving unit 1310 may also be referred to as a transceiver, a transceiver, or a transceiving circuit or the like.
  • the receiving unit may sometimes be called a receiver, a receiver, or a receiving circuit.
  • the transmitting unit may sometimes be called a transmitter, a transmitter, or a transmitting circuit.
  • transceiving unit 1310 is used to perform the sending operation and the receiving operation on the first device side in the foregoing method embodiment
  • processing unit 1320 is used to perform other operations except the transceiving operation on the first device in the foregoing method embodiment.
  • the transceiving unit 1310 may be used to perform S201 and S202 in the embodiment shown in FIG. 2 and/or other processes used to support the technology described herein.
  • the transceiver unit 1310 may be used to perform S301, S302, S303, S304 in the embodiment shown in FIG. 3 and/or other processes used to support the technology described herein.
  • the transceiver unit 1310 may be used to execute S401, S403, S404 in the embodiment shown in FIG. 4 and/or other processes used to support the technology described herein.
  • the transceiver unit 1310 may be used to execute S501, S503, S504 in the embodiment shown in FIG. 5 and/or other processes used to support the technology described herein.
  • the transceiver unit 1310 may be used to execute S601, S606, and S608 in the embodiment shown in FIG. 6 and/or other processes used to support the technology described herein.
  • the transceiving unit 1310 may also be used to perform the sending and receiving operations on the fourth device side in the foregoing method embodiment, and the processing unit 1320 is used to perform other than the transceiving operations on the fourth device in the foregoing method embodiment. Other operations.
  • the transceiver unit 1310 may be used to perform S601, S603, S605, S606, S607, S608 in the embodiment shown in FIG. 6 and/or other processes used to support the technology described herein. .
  • the device may include a transceiver unit and a processing unit.
  • the transceiving unit may be an input/output circuit and/or a communication interface;
  • the processing unit is an integrated processor or a microprocessor or an integrated circuit.
  • the device can perform functions similar to the processing unit 1320 in FIG. 13.
  • the device includes a processor 1410, a data sending processor 1420, and a data receiving processor 1430.
  • the processing unit 730, the processing unit 930, or the processing unit 1130 in the foregoing embodiment may be the processor 1410 in FIG. 14 and perform corresponding functions.
  • the processing unit 730, the processing unit 930, or the processing unit 1130 in the foregoing embodiment may be the sending data processor 1420 and/or the receiving data processor 1430 in FIG. 14.
  • the channel encoder and the channel decoder are shown in FIG. 14, it can be understood that these modules do not constitute a restrictive description of this embodiment, and are only illustrative.
  • the communication device 1500 includes modules such as a modulation subsystem, a central processing subsystem, and a peripheral subsystem.
  • the communication device in this embodiment can be used as the modulation subsystem therein.
  • the modulation subsystem may include a processor 1503 and an interface 1504.
  • the processor 1503 completes the functions of the aforementioned processing unit 730, processing unit 930, or processing unit 1130, and the interface 1504 completes the aforementioned receiving unit 710 and sending unit 720; or the sending unit 910 and the receiving unit 920; or the sending unit 1110 and the receiving unit 1120.
  • the modulation subsystem includes a memory 1506, a processor 1503, and a program stored in the memory 1506 and running on the processor.
  • the processor 1503 implements the first device in the foregoing method embodiment when the program is executed. Or the method of the second device or the fourth device. It should be noted that the memory 1506 can be non-volatile or volatile, and its location can be located inside the modulation subsystem or in the processing device 1500, as long as the memory 1506 can be connected to the The processor 1503 is fine.
  • the embodiments of the present application also provide a communication system.
  • the communication system includes a first device and a second device, or may further include more first devices and multiple second devices.
  • the communication system includes a first device and a fourth device, or may also include more first devices and multiple fourth devices.
  • the communication system includes a first device, a second device, and a fourth device, or may also include more first devices, multiple second devices, and multiple fourth devices.
  • the first device and the second device are respectively used to implement the functions of the above-mentioned related equipment of FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. 6.
  • the fourth device is used to implement the functions of the above-mentioned related equipment in FIG. 6.
  • the embodiment of the present application also provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the first device and the second device in FIG. 2, FIG. 3, FIG. 4, FIG. 5, and FIG. The method executed by the device; or when it runs on the computer, the computer executes the method executed by the fourth device in FIG. 6.
  • the embodiment of the present application also provides a computer program product, including instructions, which when run on a computer, cause the computer to execute the first device and the second device in Figure 2, Figure 3, Figure 4, Figure 5, and Figure 6 ⁇ method; or when it runs on a computer, the computer executes the method performed by the fourth device in FIG. 6.
  • the embodiment of the present application provides a chip system, which includes a processor and may also include a memory, which is used to implement the functions of the first device and the second device in the foregoing method; or is used to implement the first device and the second device in the foregoing method. Functions of the second device and the fourth device.
  • the chip system can be composed of chips, or it can include chips and other discrete devices.
  • At least one means one or more
  • plural means two or more.
  • And/or describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
  • the following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • At least one of a, b, or c can mean: a, b, c, a-b, a-c, b-c or a-b-c, where a, b, and c can be single or multiple.
  • first and second are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or order of multiple objects. Importance.
  • first message and the second message are only for distinguishing different messages, but do not indicate the difference in priority, sending order, or importance of the two messages.
  • processors mentioned in the embodiments of this application may be a CPU, or other general-purpose processors, digital signal processors (digital signal processors, DSP), application specific integrated circuits (ASICs), ready-made Field programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory mentioned in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM, DR RAM
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component
  • the memory storage module
  • the size of the sequence number of the above-mentioned processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not correspond to the embodiments of the present application.
  • the implementation process constitutes any limitation.
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种通信方法及装置,属于传感器技术领域,用于对车辆进行验证,提高验证效率。该通信方法包括第二装置向第一装置发送第一消息,该第一消息用于请求从第一装置获取M个验证信息,从而第二装置接收来自第一装置的第二消息,该第二消息包括M个验证信息中的N个验证信息,N小于或等于M的整数。该通信方法可以用于辅助驾驶和自动驾驶中的目标探测和跟踪,能够提高车辆自动驾驶的安全性。

Description

一种通信方法及装置
相关申请的交叉引用
本申请要求在2019年10月30日提交中国专利局、申请号为201911044660.9、申请名称为“一种通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种通信方法及装置。
背景技术
车与任何设备(vehicle-to-everything,V2X)的系统是车联网中的一个关键技术。在V2X技术中,车辆可以通过设置的多个车载装置,依赖高级驾驶员辅助系统(advanced driver-assistance systems,ADAS)提供信息实现自动驾驶。
为保证车辆自动驾驶的安全性,需保证车到任何设备之间的消息(也称为V2X消息)是真实可信的。目前基于公钥基础设施(public key infrastructure,PKI)的证书技术对V2X消息的真实性进行检验。即对于某条V2X消息,如果作为接收方的车载装置成功验证该V2X消息的签名以及所使用的证书,那么认为该V2X消息是真实可信的。该证书是证书机构(certificate authority,CA)向车载装置签发的,为了保护车载装置的隐私,PKI会向车载装置签发多个证书,以供车载装置随机选取使用。供车载装置随机选取使用的证书被称为匿名证书。
目前CA向车载装置签发匿名证书的一种方式是CA基于车载装置的请求直接向车载装置发送匿名证书,这种方式可以认为是同步方式。另一种方式是CA基于车载装置的请求向车载装置反馈匿名证书的下载地址,车载装置之后基于下载地址获取匿名证书,这种方式相对同步方式而言称为异步方式。同步方式下,如果车载装置较多,多个车载装置同时向CA请求匿名证书,那么CA一次需要签发的匿名证书较多,对CA的性能要求较高,受CA性能的限制,有的车载装置需要等待较长时间才能接收到匿名证书,时延较长。异步方式下,由于CA不需要立即向车载装置签发匿名证书,所以相对同步方式而言,时延较长,匿名证书的签发效率较低。可见,目前对车载设进行验证的时延较长,效率较低。
发明内容
本申请实施例提供一种通信方法及装置,用于对车辆进行验证,提高验证效率,进而提高车辆自动驾驶的安全性。
第一方面,提供第一种通信方法,该方法包括:第一装置接收来自第二装置的第一消息,所述第一消息用于请求从所述第一装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;所述第一装置向所述第二装置发送第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
该第一方面的方法可由第一装置执行,第一装置可以是通信设备或能够支持通信设备 实现该方法所需的功能的通信装置,例如芯片系统。示例性地,通信设备为证书机构,或者,通信设备可以是提供验证信息,例如证书的设备。
第二方面,提供第二种通信方法,该方法包括:第二装置向第一装置发送第一消息,所述第一消息用于请求从所述第二装置获取M个验证信息,所述M个验证信息中的每个验证信息用于所述第二装置发送消息时,对所述消息进行签名,所述M为正整数;所述第二装置接收来自所述第一装置的第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
该第二方面的方法可由第二装置执行,第二装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,通信设备为车载装置,或者,通信设备可以是安装车载装置的车辆。
在第一方面与第二方面的实施例中,验证信息可以是由第一装置提供,且用来验证第二装置身份的信息,第一装置向第二装置发送的第二消息可以包括M个验证信息中的N个验证信息,即第一装置可以向第二装置提供M个验证信息中全部验证信息或部分验证信息,从而在第二装置较多的情况下,第一装置向第二装置发送部分验证信息,可以保证第二装置有验证信息可用,而除部分验证信息之外的剩余验证信息可以后续提供给第二装置,即在第二装置需要使用时,可以获取剩余验证信息。这样不需要第一装置一次提供较多的验证信息,降低了对第一装置的性能要求,且由于当前有部分验证信息可用,不需要获取可用的验证信息,从而提高了对第二装置进行验证的效率。
在上述第一方面与第二方面的实施例中,第一装置接收的用于请求验证信息的消息的数量满足的条件不同,第二消息也有所不同,具体为下述任一种:
示例性的,所述第一装置接收的用于请求验证信息的消息的数量小于第一阈值,所述M等于所述N。采用这种方案,即第二装置较少的情况下,第一装置可以向第二装置发送全部的验证信息,各个第二装置获取验证信息的时延较短,即获取验证信息的效率较高。
示例性的,所述第一装置接收的用于请求验证信息的消息的数量大于或等于所述第一阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,且所述N等于0,所述时间信息为所述M-N个验证信息的获取时间。
采用这种方案,即第二装置较多的情况下,第一装置可以向第二装置发送第一地址,第二装置在需要时可以通过第一地址获取验证信息,即第一装置不需要立即向第二装置发送验证信息,可以认为不需要第一装置一次提供较多的验证信息,降低了对第一装置的性能要求。
例如,第二消息还可以包括时间信息,该时间信息可以指示第一装置准备M-N个验证信息的时刻,也就是第一装置确定的M-N个验证信息可以发送的时刻,从而第二装置根据该时间信息请求获取验证信息,以避免过早的请求获取验证信息而不能获取验证信息,或者过晚请求获取验证信息而导致时延较长,获取验证信息的效率较低。
示例性的,所述第一装置接收的第一请求消息的数量大于第二阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,所述N为大于或等于1且小于所述M的整数,所述时间信息为所述M-N个验证信息的获取时间。
采用这种方案,即第二装置更多的情况下,第一装置可以向第二装置发送部分验证信 息以及第一地址,或者,第一装置可以向第二装置发送部分验证信息以及时间信息,又或者,第一装置可以向第二装置发送部分验证信息以及第一地址和时间信息。其中,第一地址是除部分验证信息之外的剩余验证信息的下载地址,时间信息可以指示第二装置获取该剩余验证信息的时刻,这样不需要第一装置一次提供较多的验证信息,且可以保证各个第二装置当前可以有可用的部分验证信息,降低了对第一装置的性能要求;同时,第二装置在需要时可以通过第一地址再获取除部分验证信息之外的剩余验证信息,以尽量提高获取验证信息的效率。
第二消息还可以包括时间信息,该时间信息可以指示第一装置准备M-N个验证信息的时刻,也就是第一装置确定M-N个验证信息的发送时刻,从而第二装置根据该时间信息请求获取验证信息,以避免过早的请求获取验证信息而不能及时获取验证信息,或者过晚请求获取验证信息而导致时延较长,获取验证信息的效率较低。
在上述第一方面与第二方面的实施例中,所述第一消息包括第一标识,所述第二消息包括所述M个验证信息,其中,所述第一标识指示所述第一消息的优先级高于第一优先级。
由于第二装置可能是救护车或者第二车辆当前没有可用的验证信息,这种情况下,可以认为第二装置优先需要验证信息,此时第一消息可以携带第一标识,以表征第二装置需要验证信息的优先级较高,对应的第一装置可以将全部的验证信息发送给第二装置。采用该技术方案,可以尽量保证第二装置可以及时获取验证信息,保证第二装置及时进行业务。
在上述第一方面的实施例中,第一装置可以识别第二装置获取验证信息的优先级是否是真实的。具体的,所述第一装置确定所述第一标识与所述M个验证信息对应的标识是否一致;所述第一装置在确定所述第一标识与所述M个验证信息对应的标识不一致时,所述第一装置确定所述N小于所述M。
由于第二装置实际上并非是需要优先获取验证信息的装置,但是第二装置上报的第一消息还是携带第一标识,因此第一装置可以对第一消息进行验证,以保证第二装置上报的第一标识是真实的,采用这种方案可以避免根据第一消息优先为第二装置提供验证信息,导致对其他第二装置造成不公平。
在上述第二方面的实施例中,所述第二装置获取除部分验证信息之外的剩余验证信息时,所述第二装置向第三装置发送第三消息,所述第三消息用于请求从所述第一地址下载所述M-N个验证信息;
所述第二装置接收来自所述第三装置的第四消息,所述第四消息包括所述M-N个验证信息。
例如第三装置可以是第一装置,也可以是为第二装置提供验证信息其他装置,相应的,第一地址可以对应第一装置,也可以对应其他装置。第二消息可以包括第一地址和/或时间信息,例如如果第二消息包括时间信息,第三装置默认是第一装置,即第一地址对应第一装置;例如如果第二消息包括第一地址,那么第三装置可以是其他装置,从而第一装置不需要存储较多的验证信息,降低了对第一装置的存储容量的要求。
在上述第二方面的实施例中,所述第二装置向第三装置发送第三消息,可以包括所述第二装置根据所述时间信息确定从所述第一地址下载所述M-N个验证信息的第一时刻;所述第二装置在所述第一时刻向所述第三装置发送所述第三消息。
其中,时间信息可以指示第一装置可以确定M-N个验证信息的发送时刻,也就是准备M-N个验证信息的时刻,从而第二装置根据该时间信息发送第三消息,以避免过早的发送 第三消息而不能及时获取M-N个验证信息,或者过晚发送第三消息而导致时延较长,获取M-N个验证信息的效率较低。
第三方面,提供了一种通信方法,该方法包括第四装置接收来自第二装置的第一消息,所述第一消息用于请求从第一装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;所述第四装置根据所述第二装置的身份标识确定是否为所述第一消息添加第一标识,所述第一标识指示所述第一消息的优先级高于第一优先级;所述第一消息的优先级高于所述第一优先级,所述第四装置向第一装置发送携带所述第一标识的所述第一消息。
该第三方面的方法可由第四装置执行,第四装置可以是通信设备或能够支持通信设备实现该方法所需的功能的通信装置,例如芯片系统。示例性地,通信设备为代理平台,或者,通信设备可以是代理第一装置发送第一消息的设备。
在该方案中,第四装置可以将来自第二装置的第一消息,从而第二装置可以不添加第一标识,第一消息中是否添加第一标识可以由第四装置,这样可以第二装置为了优先获取验证信息,而为第一消息添加第一标识,可能导致对其他第二装置造成的不公平。另外,第四装置充当第二装置和第一装置交互的中间单元,也可以避免多个第一装置和多个第二装置由于实现不一样导致无法兼容的问题。例如多个第一装置的接口可能不一样,这就需要各个第二装置需要满足多个第一装置的接口设计,显然需要第二装置的接口设计较为复杂。
第四方面,提供了一种通信装置,有益效果可以参见第一方面描述,在此不再赘述,该通信装置具有实现上述第一方面方法实施例中的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,所述通信装置包括:接收单元,用于接收来自第二装置的第一消息,所述第一消息用于请求从所述通信装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;发送单元,用于向所述第二装置发送第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。这些模块可以执行上述第一方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处事不再赘述。
关于第四方面或第四方面的各种可能的实施方式所带来的技术效果,可参考对于第一方面或第一方面的各种可能的实施方式的技术效果的介绍。
第五方面,提供一种通信装置,有益效果可以参见第二方面的描述此处不再赘述。所述通信装置具有实现上述第二方面的方法实例中行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,所述通信装置包括:发送单元,用于向第一装置发送第一消息,所述第一消息用于请求从所述第一装置获取M个验证信息,所述M个验证信息中的每个验证信息用于所述通信装置发送消息时,对所述消息进行签名,所述M为正整数;接收单元,用于接收来自所述第一装置的第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。这些模块可以执行上述第二方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
关于第五方面或第五方面的各种可能的实施方式所带来的技术效果,可参考对于第二方面或第二方面的各种可能的实施方式的技术效果的介绍。
第六方面,提供一种通信装置,有益效果可以参见第三方面的描述此处不再赘述。所述通信装置具有实现上述第三方面的方法实例中行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,所述通信装置包括:接收单元,用于接收来自第二装置的第一消息,所述第一消息用于请求从第一装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;处理单元,用于根据所述第二装置的身份标识确定是否为第一消息添加第一标识,所述第一标识指示所述第一消息的优先级高于第一优先级;发送单元,用于在所述第一消息的优先级高于所述第一优先级时,向第一装置发送携带所述第一标识的所述第一消息。这些模块可以执行上述第三方面方法示例中的相应功能,具体参见方法示例中的详细描述,此处不做赘述。
关于第六方面或第六方面的各种可能的实施方式所带来的技术效果,可参考对于第三方面或第三方面的各种可能的实施方式的技术效果的介绍。
第七方面,提供了一种通信装置,该通信装置可以为上述方法实施例中的第一装置,或者为设置在第一装置中的芯片。该通信装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使通信装置执行上述方法实施例中由第一装置所执行的方法。
第八方面,提供了一种通信装置,该通信装置可以为上述方法实施例中的第二装置,或者为设置在第二装置中的芯片。该通信装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使通信装置执行上述方法实施例中由第二装置所执行的方法。
第九方面,提供了一种通信装置,该通信装置可以为上述方法实施例中的第四装置,或者为设置在第四装置中的芯片。该通信装置包括通信接口以及处理器,可选的,还包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、通信接口耦合,当处理器执行所述计算机程序或指令时,使通信装置执行上述方法实施例中由第四装置所执行的方法。
应理解,第七方面、第八方面和第九方面中所述的通信装置的通信接口用于与其他装置通信,该通信接口可以是该通信装置中的收发器,例如通过所述通信装置中的天线、馈线和编解码器等实现,或者,如果该通信装置为设置在通信设备中的芯片,则通信接口可以是该芯片的输入/输出接口,例如输入/输出管脚等。
第十方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于实现上述各方面的方法中第一装置的功能、或用于实现上述各方面的方法中第二装置的功能、或用于实现上述各方面的方法中第四装置的功能。在一种可能的设计中,所述芯片系统还包括存储器,用于保存程序指令和/或数据。该芯片系统,可以由芯片构成,也可以包括芯片和其他分立器件。
第十一方面,本申请提供了一种通信系统,该通信系统包括第一方面所述的通信装和第二方面所述的通信装置;或包括第一方面所述的通信装置、第二方面所述的通信装置,以及第三方面所述的通信装置;或包括第一方面所述的通信装置,以及第三方面所述的通信装置。在一种可能的设计中,第三方面的通信装置还可以实现如上述第二方面所述的通 信装置的功能。
第十二方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码并运行时,使得上述各方面中由第一装置执行的方法被执行,或使得上述各方面中由第二装置执行的方法被执行;或使得上述各方面中由第四装置执行的方法被执行。
第十三方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质存储有计算机程序,当该计算机程序被运行时,实现上述各方面中由第一装置执行的方法;或实现上述各方面中由第二装置执行的方法;或实现上述各方面中由第四装置执行的方法。
在本申请实施例中,验证信息可以是由第一装置提供,且用来验证第二装置身份的信息,第一装置向第二装置发送的第二消息可以包括M个验证信息中的N个验证信息,即第一装置可以向第二装置提供M个验证信息中全部验证信息或部分验证信息,从而在第二装置较多的情况下,第一装置向第二装置发送部分验证信息,可以保证第二装置有验证信息可用,而除部分验证信息之外的剩余验证信息可以后续提供给第二装置,即在第二装置需要使用时,可以获取剩余验证信息。这样不需要第一装置一次提供较多的验证信息,从而降低对第一装置的性能要求,且由于当前有部分验证信息可用,不需要获取可用的验证信息,从而可提高对第二装置进行验证的效率。
附图说明
图1为本申请实施例应用的一种网络架构的示意图;
图2为本申请实施例提供的通信方法的流程图;
图3为本申请实施例提供的通信方法的一种示例的流程图;
图4为本申请实施例提供的通信方法的一种示例的流程图;
图5为本申请实施例提供的通信方法的一种示例的流程图;
图6为本申请实施例提供的通信方法的一种示例的流程图;
图7为本申请实施例提供的第一装置的一种示意框图;
图8为本申请实施例提供的第一装置的另一种示意框图;
图9为本申请实施例提供的第二装置的一种示意框图;
图10为本申请实施例提供的第二装置的另一种示意框图;
图11为本申请实施例提供的第四装置的一种示意框图;
图12为本申请实施例提供的第四装置的另一种示意框图;
图13为本申请实施例提供的通信装置的再一种示意框图;
图14为本申请实施例提供的通信装置的再一种示意框图;
图15为本申请实施例提供的通信装置的再一种示意框图。
具体实施方式
为了使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施例作进一步地详细描述。
下文所描述的本发明实施例的技术方案可以应用于不同的车辆通信系统。图1是该通信系统的一种示例,该通信系统可以包括CA和与CA通信的多个车辆,图1以包括2个 车辆为例。车辆可以安装通信设备,例如车载装置,这里的车载装置可以认为是放置或安装在车辆上的设备。一个车辆可以安装一个车载装置,也可以安装多个车载装置。例如对于能够执行自动驾驶功能的车辆来说,一般依赖ADAS系统提供信息进行驾驶决策,而ADAS包括很多传感器,例如照相机、毫米波雷达、超声波雷达等,这些传感器都可以认为是车载装置。或者,位于车辆上的如下各种终端装置也可以认为是车载装置。
终端装置,包括向用户提供语音和/或数据连通性的设备,例如可以包括具有无线连接功能的手持式设备、或连接到无线调制解调器的处理设备。该终端装置可以经无线接入网(radio access network,RAN)与核心网进行通信,与RAN交换语音和/或数据。该终端装置可以包括用户设备(user equipment,UE)、无线终端装置、移动终端装置、设备到设备通信(device-to-device,D2D)终端装置、V2X终端装置、机器到机器/机器类通信(machine-to-machine/machine-type communications,M2M/MTC)终端装置、物联网(internet of things,IoT)终端装置、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、远程站(remote station)、接入点(access point,AP)、远程终端(remote terminal)、接入终端(access terminal)、用户终端(user terminal)、用户代理(user agent)、飞行器(如无人机、热气球、民航客机等)或用户装备(user device)等。例如,可以包括移动电话(或称为“蜂窝”电话),具有移动终端装置的计算机,便携式、袖珍式、手持式、计算机内置的移动装置等。例如,个人通信业务(personal communication service,PCS)电话、无绳电话、会话发起协议(session initiation protocol,SIP)话机、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、等设备。还包括受限设备,例如功耗较低的设备,或存储能力有限的设备,或计算能力有限的设备等。例如包括条码、射频识别(radio frequency identification,RFID)、传感器、全球定位系统(global positioning system,GPS)、激光扫描器等信息传感设备。
作为示例而非限定,在本申请实施例中,放置或安装在车辆上的车载装置还可以包括可穿戴设备。可穿戴设备也可以称为穿戴式智能设备或智能穿戴式设备等,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能头盔、智能首饰等。
车辆可以通过车载装置与其他设备进行通信。例如,一种车载装置为车载单元(on board unit,OBU)。在电子不停车收费系统(electronic toll collection,ETC)系统中,车辆通过路边架设路侧单元(road side unit,RSU)时,OBU和RSU之间可以进行通信。在ETC系统中,OBU采用专用短距离通信(dedicated short range communications,DSRC)技术,与RSU建立通信链路,在车辆行进的途中,在不停车的情况下,可以实现车辆的身份识别或电子扣费等过程。
又例如,在自动驾驶中,车辆A可以和车辆B进行通信,保证车辆自动驾驶的安全性,需要保证车辆A和车辆B之间的V2X消息是真实可信的。一种验证V2X消息的真实性的方法是基于PKI的证书技术对V2X消息的真实进行检验。也就是对于某条V2X消息,如果作为接收方的车载装置成功验证该V2X消息的签名以及所使用的证书,那么认为该V2X 消息是真实的。这里的证书是CA向车载装置签发的,为了保护车载装置的隐私,PKI会向车载装置签发多个证书,以供车载装置随机选取使用。在本文中,供车载装置随机选取使用的证书也可以称为匿名证书。
目前CA向车载装置签发匿名证书的一种方式是CA基于车载装置的请求直接向车载装置发送匿名证书,这种方式可以认为是同步方式。另一种方式是CA基于车载装置的请求向车载装置反馈匿名证书的下载地址,车载装置之后基于下载地址获取匿名证书,这种方式相对同步方式而言称为异步方式。如果车载装置较多,多个车载装置同时向CA请求匿名证书,对于同步方式而言,需要CA一次签发的匿名证书较多,这样对CA的性能要求较高。例如当前存在较多的车载装置,受CA性能的限制,这多个车载装置中有的车载装置需要等待较长时间才能接收到匿名证书,这就使得排在后面的车载装置在一段时间内可能没有匿名证书可用,即排在后面的车载装置获取匿名证书的时延较长,效率较低。对于异步方式而言,CA不需要立即向车载装置签发匿名证书,但是车载装置需要根据下载地址获取验证信息,时延较长,匿名证书的签发效率还是较低。可见,目前对车载设进行验证的时延较长,效率较低。
鉴于此,提供本申请实施例的技术方案。本申请实施例中,验证信息可以是由第一装置提供,且用来验证第二装置身份的信息,第一装置向第二装置发送的第二消息可以包括M个验证信息中的N个验证信息,即第一装置可以向第二装置提供M个验证信息中全部验证信息或部分验证信息,从而在第二装置较多的情况下,第一装置向第二装置发送部分验证信息,可以保证第二装置有验证信息可用,而除部分验证信息之外的剩余验证信息可以后续提供给第二装置,即在第二装置需要使用时,可以获取剩余验证信息。这样不需要第一装置一次提供较多的验证信息,可以降低对第一装置的性能要求,且由于当前有部分验证信息可用,不需要获取可用的验证信息,从而可以较好提高对第二装置进行验证的效率。
下面结合附图介绍本申请实施例提供的技术方案。
本申请实施例提供一种通信方法,请参见图2,为该方法的流程图。在下文的介绍过程中,以该方法应用于图1所示的网络架构为例。另外,该方法可由两个通信装置执行,这两个通信装置例如为第一装置和第二装置。其中,第一装置可以是证书机构或能够支持证书机构实现该方法所需的功能的通信装置(例如芯片系统),当然还可以是其他通信装置。第二装置可以是车载装置或能够支持车载装置实现该方法所需的功能的通信装置(例如芯片系统),且对于第一装置和第二装置的实现方式均不做限制,例如这两个通信装置可以实现为相同的形式,例如均通过设备的形式实现,或者这两个通信装置也可以实现为不同的形式,例如第一装置通过设备的形式实现,第二置通过芯片系统的方式实现,等等。图1以包括两个第二装置,且这两个第二装置是车载装置为例,这两个第二装置均可以与第一装置进行通信,且这两个第二装置相互可以进行通信。
为了便于介绍,在下文的介绍中,以该方法由第一装置和第二装置执行为例。第一装置可以是证书机构,也可以是为第二装置提供匿名证书的其他装置。第一装置为第二装置提供匿名证书,第二装置可以使用该匿名证书为要发送的信息进行签名。例如第二装置向第三装置发送消息时,可以使用匿名证书为该消息进行签名,从而第三装置接收该消息,验证该消息中的签名和匿名证书的合法性,以确定该消息是否是真实可信的。应理解,从这个角度,匿名证书也可以认为是验证信息,应理解,验证信息还可以包括第二装置对要 发送的消息进行签名所必须的公钥等信息。
第二装置可以承载在车辆中,或者第二装置可以是承载车辆单元的车辆,或者承载车载单元的其他装置,本申请实施例对第二装置的实现形式不作限制。与第二装置通信的第三装置也可以承载在车辆中,或者第三装置可以是承载车辆单元的车辆,或者承载车载单元的其他装置,本申请实施例对第三装置的实现形式不作限制。在下文的介绍中,以第一装置是证书机构,第二装置是车载单元为例。
S201、车载单元向证书机构发送第一消息,证书机构接收来自车载单元的第一消息,该第一消息用于请求从证书机构获取M个验证信息,该验证信息用于对信息进行验证。
其中,第一消息可以是用于向证书机构请求获取验证信息,例如匿名证书的消息。证书机构可以为多个车载单元中的每个车载单元提供多个匿名证书。当车载单元需要使用匿名证书时,车载单元可以向证书机构发送第一消息。示例性的,该车载单元需要向另一个车载单元发送信息,可能需要匿名证书对要发送的信息,例如第一信息进行签名,那么该车载单元可以向证书机构发送第一消息。该车载单元如果获取了来自证书机构的匿名证书,可以通过该匿名证书对第一信息进行签名,并将签名后的第一信息发送给另一车载单元。另一车载单元接收第一信息,对第一信息进行验证,从而确定该车载单元发送的第一信息是真实可信的。应理解,M个验证信息可以是M个匿名证书,M为正整数,即M为大于或等于1的整数。这M个匿名证书可以是证书机构为该车载单元签发的全部匿名证书。
S202、证书机构向车载单元发送第二消息,车载单元接收来自证书机构的第二消息,该第二消息包括M个验证信息中的N个验证信息。
该第二消息可以认为是第一消息的响应消息,证书机构接收第二消息,可以选择合适数量的验证信息,例如称为N个验证信息。证书机构选择N个验证信息发送给车载单元,这N个验证信息可以是M个验证信息中的全部验证信息,可以是M个验证信息中的部分验证信息。
作为N确定的一种方式,N可以根据证书机构接收的用于请求验证信息的消息的数量确定。
示例性的,证书机构接收的用于请求验证信息的消息的数量小于第一阈值,M等于N。
第一阈值可以是根据多个车载单元中最后一个车载单元获取匿名证书所需要的时长确定的可能的值。例如,第一阈值可以是1500,或者1800,又或者是其他可能的值,对应的,多个车载单元中最后获取匿名证书的车载单元需要的时长可能大于或等于1分钟。证书机构可以存储第一阈值。证书机构接收的用于请求验证信息的消息的数量小于第一阈值,可以认为车载单元的数量较少,也就是多个车载单元分别向证书机构发送第一消息,但是证书机构接收来自各个车载单元的第一消息的数量小于第一阈值。这种情况下,证书机构可以确定车载单元的数量较少,那么为了让各个车载单元较快地获取验证信息,证书机构可以确定N的取值等于M,即证书机构可以一次性将各个车载单元的M个验证信息全部发送给对应的各个车载单元,签发验证信息的效率较高,同时各个车载单元获取验证信息的时延较短,可以保证各个车载单元及时地有可用的验证信息。
应理解,这种示例性的方式可以认为证书机构接收第一消息,证书机构向车载单元发送全部的验证信息。
又一示例性的,证书机构接收的用于请求验证信息的消息的数量大于或等于第一阈值,第二消息还包括第一地址和/或时间信息,第一地址为M个验证信息中除N个验证信息之 外的M-N个验证信息的下载地址,且N等于0,时间信息为所述M-N个验证信息的获取时间。
证书机构接收的用于请求验证信息的消息的数量大于或等于第一阈值,可以认为车载单元的数量较多。这种情况下,如果证书机构一次性将各个车载单元的M个验证信息全部发送给对应的各个车载单元,显然对证书机构的性能要求较高。为此,证书机构可以确定不直接向各个车载单元发送验证信息,而是向各个车载单元发送用于下载验证信息的地址,例如为第一地址,也就是N的取值为0,第二消息包括第一地址。采用该方案,可以降低对证书机构的性能要求。
应理解,这种示例性的方式可以认为证书机构接收第一消息,证书机构向车载单元发送用于下载全部的验证信息的下载地址。
需要说明的是,上述两种示例性的方式,示例性的方式可以是证书机构接收的用于请求验证信息的消息的数量小于或等于第一阈值,相对而言,又一示例性的方式可以是证书机构接收的用于请求验证信息的消息的数量大于第一阈值,对此,本申请实施例不作限制。
需要说明的是,第一地址可以对应第一装置,例如该证书机构,即各个车载单元的验证信息可以保存在第一装置,各个车载单元在需要验证信息时,可以从第一装置下载所需要的验证信息。或者,第一地址可以对应除第一装置的其他装置,例如第三装置,可以认为是其他证书机构,该第三装置存储有各个车载单元的验证信息,各个车载单元在需要验证信息时,可以从第三装置下载所需要的验证信息。
作为一种可替换的实现方式,第二消息包括时间信息。该时间信息可以指示证书机构准备M-N个验证信息的时刻,也就是证书机构可以发送M-N个验证信息的时刻。从而车载单元根据该时间信息请求获取M-N个验证信息,以避免过早的请求M-N个获取验证信息而不能获取M-N个验证信息,例如证书机构还没有得到全部的M-N个验证信息,此时车载单元请求获取M-N个验证信息,自然无法获取到M-N个验证信息。也可以避免过晚请求获取M-N个验证信息而导致时延较长,获取验证信息的效率较低。应理解,当第二消息包括时间信息,默认第一地址对应第一装置。
作为另一种可替换的实现方式,第二消息包括第一地址和时间信息,当第二消息包括第一地址和时间信息,第一地址可以对应第一装置,也可以对应第三装置。采用这种方式,不需要第一装置存储较多的验证信息,降低了对第一装置的存储容量的要求。同时第二消息包括时间信息可以避免车载单元过早请求获取验证信息可能无法获取到验证信息或过晚请求获取验证信息而导致时延较长,获取验证信息的效率较低。
再一示例性的,证书机构接收的第一请求消息的数量大于第二阈值,第二消息还包括第一地址和/或时间信息,第一地址为M个验证信息中除N个验证信息之外的M-N个验证信息的下载地址,N为大于或等于1且小于M的整数,时间信息为M-N个验证信息的获取时间。
与第一阈值类似,第二阈值也可以是根据多个车载单元中最后一个车载单元获取匿名证书所需要的时长确定的可能的值。例如,第二阈值也可以是1500,或者1800,又或者是其他可能的值。第二阈值可以大于第一阈值,证书机构可以存储第二阈值。证书机构接收的用于请求验证信息的消息的数量大于第二阈值,可以认为车载单元的数量更多。这种情况下,证书机构可以确定N为大于或等于1且小于M的整数,也就是证书机构可以确定向车载单元发送部分验证信息,即N个验证信息,并告知车载单元获取剩余验证信息, 即获取M-N个验证信息的方式。需要说明的是,这里的证书机构可以确定N为大于或等于1且小于M的整数,也可以认为,证书机构接收的用于请求验证信息的消息的数量大于第二阈值时,默认N为大于或等于1且小于M的整数。这样不需要证书机构一次提供较多的验证信息,降低了对证书机构的性能要求且可以保证各个车载单元当前可以有可用的部分验证信息;同时,第二装置在需要时可以通过第一地址再获取M-N个验证信息,以尽量提高获取验证信息的效率。
应理解,这种示例性的方式可以认为证书机构接收第一消息,证书机构向车载单元发送全部的验证信息中的部分验证信息,以及发送用于下载全部的验证信息中除部分验证信息之外的剩余验证信息的下载地址。
作为证书机构告知车载单元获取M-N个验证信息一种方式,第二消息还可以包括时间信息。如上述该时间信息可以指示证书机构准备好M-N个验证信息的时刻,也就是证书机构可以发送M-N个验证信息的时刻。从而车载单元根据该时间信息请求获取M-N个验证信息,可以避免车载单元过早请求获取验证信息可能无法获取到验证信息或过晚请求获取验证信息而导致时延较长,获取验证信息的效率较低。应理解,当第二消息包括时间信息,默认车载单元从第一装置获取M-N个验证信息。
作为证书机构告知车载单元获取M-N个验证信息另一种方式,第二消息还可以包括第一地址和时间信息。第一地址可以对应第一装置,也可以对应第三装置。采用这种方式,不需要第一装置存储较多的验证信息,降低了对第一装置的存储容量的要求。同时第二消息包括时间信息可以避免车载单元过早请求获取验证信息可能无法获取到验证信息或过晚请求获取验证信息而导致时延较长,获取验证信息的效率较低。
需要说明的是,上述分别列举了三种示例性的实现方式,应理解,可能的实现方式中,证书机构接收第一消息,可以采用上述三种示例性的实现方式中的任意一种向车载单元发送验证信息,即定义证书机构向车载单元发送全部的验证信息,或者定义证书机构向车载单元发送用于下载全部的验证信息的下载地址,或者定义证书机构向车载单元发送全部的验证信息中的部分验证信息,以及发送用于下载全部的验证信息中除部分验证信息之外的剩余验证信息的下载地址。应理解,另一可能的实现方式中,证书机构接收第一消息,根据自身的负载情况,即所接收的用于请求验证信息的消息的数量确定采用三种示例性的实现方式中的哪一种。
需要说明的是,上述时间信息可以是第一时刻,车载单元基于第一时刻向第一装置或第三装置发送第三消息,这样不需要车载单元根据时间信息计算第一时刻,减少了车载单元的计算量。或者,上述时间信息可以是第一时长,车载单元可以基于第一时长和当前时刻确定第一时刻,从而在第一时刻向第一装置或第三装置发送第三消息,这样不需要第一装置计算第一时刻,减少了第一装置的计算量。
当车载单元需要获取验证信息时,可以向第一装置或第三装置发送第三消息,该第三消息用于请求从第一地址下载M-N个验证信息。第一装置或第三装置接收第三消息,并响应第三消息,向车载单元发送第四消息,该第四消息包括M-N个验证信息。
示例性的,第二消息包括第一地址。如果第一地址对应第一装置,那么车载单元接收第二消息,可以向第一装置发送第三消息;如果第一地址对应第三装置,那么车载单元接收第二消息,可以向第三装置发送第三消息。
示例性的,第二消息包括时间信息,那么车载单元根据该时间信息确定请求获取M-N 个验证信息的第一时刻,在第一时刻向第一装置或第三装置发送第三消息。例如,如果第二消息仅包含时间信息,则第二装置可以向第一装置发送第三消息,从而第一装置向第二装置发送第四消息。
示例性的,第二消息包括第一地址和时间信息。那么车载单元根据该时间信息确定请求获取M-N个验证信息的第一时刻,在第一时刻向第一装置或第三装置发送第三消息。例如,如果第一地址对应第一装置,那么车载单元接收第二消息,可以向第一装置发送第三消息;如果第一地址对应第三装置,那么车载单元接收第二消息,可以向第三装置发送第三消息。
在一种可能的场景中,例如车载单元所在的车辆可能是特殊车辆,例如救护车或者警车等,区别于普通车辆的车辆,或者车载单元当前没有可用的有效验证信息,但是又需要使用验证信息,这种情况下,可以认为车载单元需要优先验证信息。为此,车载单元向证书机构发送的第一消息可以携带指示获取验证信息优先级的标识,例如第一标识。当第一消息包括第一标识,则证书机构可以确定优先为车载单元签发验证信息。一种可能的实现方式中,可以预定义普通车辆获取验证信息的优先级是第一优先级,如果第一标识指示的优先级高于第一优先级,则可以认为车载单元获取验证信息的优先级较高。应理解,这里的第一标识指示的优先级高于第一优先级,是相对而言的,例如存在多个车辆,这多个车辆均为特殊车辆,那么第一优先级也可以是预先定义的某种特殊车辆的优先级,例如第一优先级为警车获取验证信息的优先级,第一标识可以指救护车获取验证信息的优先级。这里只是为了说明第一优先级和第一标识指示的优先级是相对的,并不对车辆的类型作限制。
如果第一消息包括第一标识,证书机构可以将全部的验证信息发送给车载单元,即对应上述第一种示例性的实现方式。采用该技术方案,可以尽量保证车载单元可以及时获取验证信息,保证车载单元及时进行业务。例如,可以使得特殊车辆不需要一直等待,从而可以及时获取验证信息,保证在紧急情况下,特殊车辆的业务优先进行。
有时,车载单元实际上并非是需要优先获取验证信息的装置,但是车载单元上报的第一消息还是携带第一标识,那么对于证书机构而言,接收第一消息后,若确定第一消息包括第一标识,证书机构可以对第一消息中的第一标识的真实性进行验证,也就是验证第一消息。示例性的,证书机构可以比较第一消息中的第一标识和要为车载单元提供的M个验证信息对应的标识,由于M个验证信息对应的标识与车载单元对应,所以如果第一标识与这M个验证信息对应的标识一致时,可以确定车载单元确实是需要优先获取验证信息,此时证书机构为了让车载单元较快地获取验证信息,可以向车载单元发送全部的验证信息,也就是N与M相等;而如果第一标识与这M个验证信息对应的标识不一致,那么证书机构车载单元实际上并非需要优先获取验证信息,那么证书机构可以确定N小于M,也就是证书机构可以先向车载单元提供部分验证信息,可以降低对证书机构的性能要求。同时,证书机构验证第一消息中的第一标识的真实性,也可以避免基于第一标识优先为车载单元提供验证信息,导致对其他车载单元造成不公平。需要说明的是,上述证书机构可以确定N小于M,也可以认为第一标识与这M个验证信息对应的标识不一致时,N小于M,证书机构不一定执行确定操作。
在另一种场景中,第一标识可以是除车载单元之外的其他装置,例如第四装置添加的。由于车载单元发送第一消息时,自己添加第一标识,那么车载单元即使不需要优先获取验证信息,还是会添加第一标识。为此,本申请实施例提供了另一种场景,即增加了第四装 置,该第四装置可以认为是代理平台,车载单元可以向第四装置发送第一消息,第四装置将第一消息转发给证书机构。代理平台可以管理多个证书机构,各个车载单元可以通过代理平台与各个证书机构进行信息交互。代理平台的增设可以避免证书机构的不确定性,简化车载单元在接口实现的复杂度。例如,存在多个证书机构,这多个证书机构中的部分证书机构的接口可能不一样,这就使得与这多个证书机构进行信息交互的车载单元的接口必须满足这多个证书机构的接口;或者,这多个证书机构中的部分证书机构发送消息的格式不同等,这就使得与这多个证书机构进行信息交互的车载单元必须能够支持不同的消息格式,以解析从这多个证书机构接收的消息;即对车载单元的接口或者支持的消息格式的要求较高。代理平台可以接收来自车载单元的第一消息,并对第一消息进行处理,例如将第一消息的格式转化为某个证书机构可以解析的格式,再将第一消息发送给该证书机构。应理解,代理平台接收来自某个证书机构的第二消息,可以对第二消息进行处理,例如将第二消息的格式转化为该车载单元可以解析的格式,再将第二消息发送给车载单元。应理解,代理平台可以在多个车载单元和多个证书机构之间充当桥梁,避免由于证书机构的不确定性,可能导致的车载单元在接口实现较为复杂。
应理解,本申请实施例中的第二装置也可以是第四装置,即第二装置可以是车载单元,也可以是车辆,还可以是代理平台,该代理平台可以管理多个车载单元或者多个车辆,与证书机构实现信息交互,例如从证书机构获取匿名证书。
基于第一消息包括第一标识或者不包括第一标识,第四装置在向证书机构转发第一消息有所不同。
示例性的,如果第一消息包括第一标识,即车载单元发送第一消息时,为第一消息添加了第一标识,第四装置接收第一消息,可以确定第一标识的真实性。例如,第四装置可以存储表征车载单元是否需要优先获取验证信息的信息,例如车载单元的身份标识或者表征车载单元的身份的信息。车载单元的身份标识,例如为车载单元所在车辆的车牌号,如车牌号表示车辆为救护车,那么该车载单元需要优先获取验证信息。表征车载单元的身份的信息,例如为表征车载单元当前没有可用的验证信息的信息,那么该车载单元需要优先获取验证信息。为了便于描述,在本申请实施例中,以表征车载单元是否需要优先获取验证信息的信息为车载单元的身份标识为例。第四装置可以确定第一标识是否是真实的,例如第一标识也是车载单元的身份标识,那么第四装置可以对比第一标识与存储的车载单元的身份标识,如果二者一致,那么第四装置确定第一消息是真实的,将第一消息透传给证书机构。如果第一标识与存储的车载单元的身份标识不一致,那么第四装置可以确定第一消息不是真实的,第四装置可以将第一消息中的第一标识去掉,将不包括第一标识的第一消息发送给证书机构。这样可以避免由于车载单元为了优先获取验证信息,而为第一消息添加第一标识,可能导致对其他车载单元造成的不公平。
示例性的,如果第一消息不包括第一标识,那么第四装置可以根据车载单元是否需要优先获取验证信息,为第一消息添加第一标识。如果车载单元确实是需要有限获取验证信息,那么第四装置为第一消息添加第一标识,将添加第一标识后的第一消息发送给证书机构。如果车载单元不需要优先获取验证信息,那么第四装置将第一消息透传给证书机构。这种方式,不需要各个车载单元添加第一标识,降低了对各个车载单元的实现的复杂度,且降低了对提供各个车载单元的设备商的要求。
为了更好地理解上述2所示的实施例所介绍的技术方案,下面就图2所示的实施例所 涉及的一些子方案分别进行举例介绍。
请参考图3,为本申请实施例提供的通信方法的第一种实施方式的流程。图3所示的流程以执行该通信方法的装置是车载单元和证书机构为例,且以证书机构默认向车载单元发送部分验证信息以及获取剩余验证信息的方式为例。
S301、车载单元向证书机构发送第一消息。
关于第一消息的介绍,可参考图2所示的实施例中的S201的介绍。
S302、证书机构向车载单元发送第二消息,该第二消息包括M个验证信息中的N个验证信息,且该第二消息还包括第一地址和/或时间信息,N为大于或等于1且小于M的整数。
关于第一地址和/或时间信息的介绍可以参考图2所述的实施例中的S202的介绍。图3所示的流程中,以第一地址对应该证书机构为例。
S303、车载单元向证书机构发送第三消息,该第三消息用于请求从第一地址下载M-N个验证信息。
S304、车载单元接收来自证书机构的第四消息,该第四消息包括M-N个验证信息。
关于图3所示的流程中的步骤的一些具体实施细节,均可参考图2所示的实施例的相关描述。
请参考图4,为本申请实施例提供的通信方法的第二种实施方式的流程。图4所示的流程以执行该通信方法的装置是车载单元和证书机构为例,且以证书机构根据接收的请求获取验证信息的数量的大小确定向车载单元发送验证信息的方式为例。
S401、车载单元向证书机构发送第一消息。
关于第一消息的介绍,可参考图2所示的实施例中的S201的介绍。
S402、证书机构确定接收的用于请求获取验证信息的消息的数量是否大于第一预设阈值。
S403、用于请求获取验证信息的消息的数量小于或等于第一预设阈值,证书机构向车载单元发送第二消息,该第二消息包括M个验证信息中的N个验证信息。
S404、用于请求获取验证信息的消息的数量大于第一预设阈值,证书机构向车载单元发送第二消息,该第二消息包括第一地址和/或时间信息,第一地址为下载M个验证信息的地址。
关于第一地址和/或时间信息的介绍可以参考图2所述的实施例中的S202的介绍。图3所示的流程中,以第一地址对应该证书机构为例。
应理解,第一预设阈值可以是基于证书机构当前接收的用于请求获取验证信息的数量或者当前还未处理的用于请求获取验证信息的数量确定,第一预设阈值可以是上述的第一阈值,也可以是上述的第二阈值,或者也可以是除第一阈值和第二阈值之外其他可能的值,对此,本申请实施例不作限制。
关于图4所示的流程中的步骤的一些具体实施细节,均可参考图2所示的实施例的相关描述。
请参考图5,为本申请实施例提供的通信方法的第三种实施方式的流程。图5所示的流程以执行该通信方法的装置是车载单元和证书机构为例,且以证书机构根据接收的请求获取验证信息的数量的大小确定向车载单元发送验证信息的方式,以及第一消息包括第一标识为例。
S501、车载单元向证书机构发送第一消息,该第一消息包括第一标识。
关于第一消息的介绍,可参考图2所示的实施例中的S201的介绍。
S502、证书机构确定接收的用于请求获取验证信息的消息的数量是否大于第一预设阈值。
S503、用于请求获取验证信息的消息的数量小于或等于第一预设阈值,证书机构向车载单元发送第二消息,该第二消息包括M个验证信息中的N个验证信息。
S504、用于请求获取验证信息的消息的数量大于第一预设阈值,证书机构向车载单元发送第二消息,该第二消息包括M个验证信息中的N个验证信息,且该第二消息还包括第一地址和/或时间信息,第一地址为下载M个验证信息的地址,N为大于或等于1且小于M的整数。
关于第一地址和/或时间信息的介绍可以参考图2所述的实施例中的S202的介绍。图3所示的流程中,以第一地址对应该证书机构为例。
应理解,第一预设阈值可以是基于证书机构当前接收的用于请求获取验证信息的数量或者当前还未处理的用于请求获取验证信息的数量确定,第一预设阈值可以是上述的第一阈值,也可以是上述的第二阈值,或者也可以是除第一阈值和第二阈值之外其他可能的值,对此,本申请实施例不作限制。
关于图5所示的流程中的步骤的一些具体实施细节,均可参考图2所示的实施例的相关描述。
请参考图6,为本申请实施例提供的通信方法的第三种实施方式的流程。图6所示的流程以执行该通信方法的装置是车载单元和证书机构,以及代理平台为例。
S601、车载单元向代理平台发送第一消息。
关于第一消息的介绍,可参考图2所示的实施例中的S201的介绍。
S602、代理平台确定是否为第一消息添加第一标识。
关于第一消息的介绍,可参考图2所示的实施例中的S202的介绍。
S603、代理平台向证书机构发送第一消息,该第一消息包括第一标识。
S604、证书机构确定接收的用于请求获取验证信息的消息的数量是否大于第一预设阈值。
S605、用于请求获取验证信息的消息的数量小于或等于第一预设阈值,证书机构向代理平台发送第二消息,该第二消息包括M个验证信息中的N个验证信息。
S606、代理平台向车载单元发送该第二消息。
S607、用于请求获取验证信息的消息的数量大于第一预设阈值,证书机构向代理平台发送第二消息,该第二消息包括M个验证信息中的N个验证信息,且该第二消息还包括第一地址和/或时间信息,第一地址为下载M个验证信息的地址,N为大于或等于1且小于M的整数。
S608、代理平台向车载单元发送该第二消息。
关于第一地址和/或时间信息的介绍可以参考图2所述的实施例中的S202的介绍。图6所示的流程中,以第一地址对应该证书机构为例。
应理解,步骤S605和步骤S607的执行顺序不作限制。
代理平台可以决定为第一消息添加第一标识,车载单元无需实现该操作,简化车载单元的逻辑。
在本申请实施例中,第一装置可以向第二装置发送部分验证信息,首先保证第二装置有验证信息可用,而除部分验证信息之外的剩余验证信息可以后续提供给第二装置,即在第二装置需要使用时,可以获取剩余验证信息。这样不需要第一装置一次提供较多的验证信息,降低了对第一装置的性能要求,且由于当前有部分验证信息可用,不需要获取可用的验证信息,从而提高了对第二装置进行验证的效率。
另外,本申请实施例中第四装置可以将来自第二装置的第一消息,从而第二装置可以不添加第一标识,第一消息中是否添加第一标识可以由第四装置,这样可以第二装置为了优先获取验证信息,而为第一消息添加第一标识,可能导致对其他第二装置造成的不公平。另外,第四装置充当第二装置和第一装置交互的中间单元,也可以避免多个第一装置和多个第二装置由于实现不一样导致无法兼容的问题。
上述本申请提供的实施例中,分别从第一装置、第二装置、以及第一装置和第二装置之间交互的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,第一装置和第二装置可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。
下面结合附图介绍本申请实施例中用来实现上述方法的装置。因此,上文中的内容均可以用于后续实施例中,重复的内容不再赘述。
图7为本申请实施例提供的通信设备700的示意性框图。通信装置700能够执行上述方法实施例中第一装置的行为和功能,为了避免重复,此处不再详述。通信装置700可以为第一装置700,也可以为应用于第一装置700中的芯片。通信装置700可以包括接收单元710和发送单元720,还可以包括处理单元730。接收单元710、发送单元720和处理单元730分别可以是逻辑功能模块。其中,处理单元730用于执行如图2、图3、图4、图5和图6所示的实施例中由第一装置所执行的除了收发操作之外的全部操作,和/或用于支持本文所描述的技术的其它过程。接收单元710和发送单元720可以用于执行图2、图3、图4、图5和图6所示的实施例中由第一装置所执行的全部接收或发送操作,例如图2所示的实施例中的S201和S202,和/或用于支持本文所描述的技术的其它过程。
例如,所述接收单元710和发送单元720可以在所述处理单元730的控制下收发数据,具体的:
所述接收单元710用于接收来自第二装置的第一消息,所述第一消息用于请求从所述通信装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;
所述发送单元720用于向所述第二装置发送第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
作为一种可选的实施方式,处理单元730可以用于确定:
所述接收单元710接收的用于请求验证信息的消息的数量小于第一阈值,所述M等于所述N;或者,
所述接收单元710接收的用于请求验证信息的消息的数量大于或等于所述第一阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,且所述N等于0,所述时间信息为所述M-N个验证信息的获取时间;或者,
所述接收单元710接收的第一请求消息的数量大于第二阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,所述N为大于或等于1且小于所述M的整数,所述时间信息为所述M-N个验证信息的获取时间。
作为一种可选的实施方式,所述第一消息包括第一标识,所述第二消息包括所述M个验证信息,其中,所述第一标识指示所述第一消息的优先级高于第一优先级。
作为一种可选的实施方式,所述处理单元730可以用于:
确定所述第一标识与所述M个验证信息对应的标识是否一致;
在确定所述第一标识与所述M个验证信息对应的标识不一致时,确定所述N小于所述M。
应理解,本申请实施例中的处理单元730可以由处理器或处理器相关电路组件实现,接收单元710和发送单元720可以由收发器或收发器相关电路组件实现。
如图8所示,本申请实施例还提供一种通信装置800。示例性地,通信装置800例如为第一装置800。第一装置800包括处理器810,存储器820与收发器830,其中,存储器820中存储指令或程序,处理器810用于执行存储器820中存储的指令或程序。存储器820中存储的指令或程序被执行时,该处理器810用于执行上述实施例中处理单元730执行的操作,收发器830用于执行上述实施例中接收单元710和发送单元720执行的操作。
应理解,根据本申请实施例的第一装置700或第一装置800可对应于图2、图3、图4、图5和图6所示的实施例中的第一装置,并且第一装置700或第一装置800中的各个模块的操作和/或功能分别为了实现图2、图3、图4、图5和图6所示的实施例中的相应流程。为了简洁,在此不再赘述。
应理解,图8所示的通信装置800可以是芯片或电路,例如可设置在证书机构内的芯片或电路。进一步地,该通信装置800还可以包括总线系统。
其中,处理器810、存储器820、收发器830通过总线系统相连,处理器810用于执行该存储器820存储的指令,以控制收发器830接收信号,并控制收发器830发送信号,完成本申请通信方法中第一装置的步骤。其中,收发器830可以为相同或不同的物理实体。为相同的物理实体时,可以统称为收发器。所述存储器820可以集成在所述处理器810中,也可以与所述处理器810分开设置。
作为一种实现方式,收发器830的功能可以考虑通过收发电路或者收发专用芯片实现。处理器810可以考虑通过专用处理芯片、处理电路、处理器或者通用芯片实现。
本申请实施例中不限定上述处理器810、存储器820、收发器830之间的具体连接介质。本申请实施例在图8中以处理器810、存储器820、收发器830之间通过总线连接,总线在图8中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图8中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
图9为本申请实施例提供的通信装置900的示意性框图。通信装置900能够执行上述方法实施例中第二装置的行为和功能,为了避免重复,此处不再详述。示例性的,通信装置900可以为第二装置900,也可以为应用于第二装置900中的芯片。通信装置900例如为第二装置900。第二装置900包括发送单元910、接收单元920和处理单元930。发送单元910、接收单元920和处理单元930分别可以是逻辑功能模块。
其中,处理单元930可以用于执行图2、图3、图4、图5和图6所示的实施例中由第二装置所执行的除了收发操作之外的全部操作,和/或用于支持本文所描述的技术的其它过程。发送单元910和接收单元920可以用于执行图2、图3、图4、图5和图6所示的实施例中由第二装置所执行的全部接收或发送操作,和/或用于支持本文所描述的技术的其它过程。
例如,发送单元910用于向第一装置发送第一消息,所述第一消息用于请求从所述第一装置获取M个验证信息,所述M个验证信息中的每个验证信息用于所述通信装置发送消息时,对所述消息进行签名,所述M为正整数;
接收单元920用于接收来自所述第一装置的第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
作为一种可选的实施方式,所述M等于所述N;或者,
所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,且所述N等于0,所述时间信息为所述M-N个验证信息的获取时间;或者,
所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,所述N为大于或等于1且小于所述M的整数,所述时间信息为所述M-N个验证信息的获取时间。
作为一种可选的实施方式,所述第一消息包括第一标识,所述第二消息包括所述M个验证信息,其中,所述第一标识指示所述第一消息的优先级高于第一优先级。
作为一种可选的实施方式,所述发送单元910还用于向第三装置发送第三消息,所述第三消息用于请求从所述第一地址下载所述M-N个验证信息;
所述接收单元还用于接收来自所述第三装置的第四消息,所述第四消息包括所述M-N个验证信息。
作为一种可选的实施方式,所述处理单元930还可以用于根据所述时间信息确定从所述第一地址下载所述M-N个验证信息的第一时刻;
所述发送单元910还用于在所述处理单元930的控制下在所述第一时刻向所述第三装置发送所述第三消息。
应理解,本申请实施例中的处理单元930可以由处理器或处理器相关电路组件实现,发送单元910和接收单元920可以由收发器或收发器相关电路组件实现。
如图10所示,本申请实施例还提供一种通信装置1000。示例性地,通信装置1000例如为第二装置1000。第二装置1000包括处理器1010,存储器1020与收发器1030,其中,存储器1020中存储指令或程序,处理器1010用于执行存储器1020中存储的指令或程序。存储器1020中存储的指令或程序被执行时,该处理器1010用于执行上述实施例中处理单元930执行的操作,收发器1030用于执行上述实施例中发送单元910和接收单元920执行的操作。
应理解,根据本申请实施例的第二装置900或第二装置1000可对应于图2、图3、图4、图5和图6所示的实施例中的第二装置,并且第二装置900或第二装置1000中的各个模块的操作和/或功能分别为了实现图2、图3、图4、图5和图6所示的实施例中的相应流程。为了简洁,在此不再赘述。
应理解,图10所示的通信装置1000可以是芯片或电路,例如可设置在证书机构内的 芯片或电路。进一步地,该通信装置1000还可以包括总线系统。
其中,处理器1010、存储器1020、收发器1030通过总线系统相连,处理器1010用于执行该存储器1020存储的指令,以控制收发器1030接收信号,并控制收发器1030发送信号,完成本申请通信方法中第二装置的步骤。其中,收发器1030可以为相同或不同的物理实体。为相同的物理实体时,可以统称为收发器。所述存储器1020可以集成在所述处理器1010中,也可以与所述处理器1010分开设置。
作为一种实现方式,收发器1030的功能可以考虑通过收发电路或者收发专用芯片实现。处理器1010可以考虑通过专用处理芯片、处理电路、处理器或者通用芯片实现。
本申请实施例中不限定上述处理器1010、存储器1020、收发器1030之间的具体连接介质。本申请实施例在图10中以处理器1010、存储器1020、收发器1030之间通过总线连接,总线在图10中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
图11为本申请实施例提供的通信装置1100的示意性框图。通信装置1100能够执行上述方法实施例中第四装置的行为和功能,为了避免重复,此处不再详述。示例性的,通信装置1100可以为第四装置1100,也可以为应用于第四装置1100中的芯片。通信装置1100例如为第四装置1100。第四装置1100包括发送单元1110、接收单元1120和处理单元1130。发送单元1110、接收单元1120和处理单元1130分别可以是逻辑功能模块。
其中,处理单元1130可以用于执行图6所示的实施例中由第四装置所执行的除了收发操作之外的全部操作,和/或用于支持本文所描述的技术的其它过程。发送单元1110和接收单元1120可以用于执行图6所示的实施例中由第四装置所执行的全部接收或发送操作,和/或用于支持本文所描述的技术的其它过程。
例如接收单元1120用于接收来自第二装置的第一消息,所述第一消息用于请求从第一装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;
处理单元1130用于根据所述第二装置的身份标识确定是否为所述第一消息添加第一标识,所述第一标识指示所述第一消息的优先级高于第一优先级;
发送单元1110用于在所述第一消息的优先级高于所述第一优先级时,向第一装置发送携带所述第一标识的所述第一消息。
应理解,本申请实施例中的处理单元1130可以由处理器或处理器相关电路组件实现,发送单元1110和接收单元1120可以由收发器或收发器相关电路组件实现。
如图12所示,本申请实施例还提供一种通信装置1200。示例性地,通信装置1200例如为第四装置1200。第四装置1200包括处理器1210,存储器1220与收发器1230,其中,存储器1220中存储指令或程序,处理器1210用于执行存储器1220中存储的指令或程序。存储器1220中存储的指令或程序被执行时,该处理器1210用于执行上述实施例中处理单元1130执行的操作,收发器1230用于执行上述实施例中发送单元1110和接收单元1120执行的操作。
应理解,根据本申请实施例的第四装置1100或第四装置1200可对应于图6所示的实施例中的第四装置,并且第四装置1100或第四装置1200中的各个模块的操作和/或功能分别为了实现图6所示的实施例中的相应流程。为了简洁,在此不再赘述。
应理解,图12所示的通信装置1200可以是芯片或电路,例如可设置在代理平台内的 芯片或电路。进一步地,该通信装置1200还可以包括总线系统。
其中,处理器1210、存储器1220、收发器1230通过总线系统相连,处理器1210用于执行该存储器1220存储的指令,以控制收发器1230接收信号,并控制收发器1230发送信号,完成本申请通信方法中第二装置的步骤。其中,收发器1230可以为相同或不同的物理实体。为相同的物理实体时,可以统称为收发器。所述存储器1220可以集成在所述处理器1210中,也可以与所述处理器1210分开设置。
作为一种实现方式,收发器1230的功能可以考虑通过收发电路或者收发专用芯片实现。处理器1210可以考虑通过专用处理芯片、处理电路、处理器或者通用芯片实现。
本申请实施例中不限定上述处理器1210、存储器1220、收发器1230之间的具体连接介质。本申请实施例在图12中以处理器1210、存储器1220、收发器1230之间通过总线连接,总线在图12中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图12中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
在本申请实施例中,处理器810、处理器1010和处理器1210均可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。
在本申请实施例中,存储器820、存储器1020和存储器1220均可以是非易失性存储器,比如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM)。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
需要说明的是,上述实施例中的通信装置可以是车载单元、车辆,或者证书机构,也可以是电路,也可以是应用于车载单元中的芯片或者其他具有上述车载功能的组合器件、部件等。当通信装置是车载单元时收发单元可以是收发器,可以包括天线和射频电路等,处理模块可以是处理器,例如:中央处理单元(central processing unit,CPU)。当通信装置是具有上述终端设备功能的部件时,收发单元可以是射频单元,处理模块可以是处理器。当通信装置是芯片系统时,收发单元可以是芯片系统的输入输出接口、处理模块可以是芯片系统的处理器。
本申请实施例还提供一种通信装置,该通信装置可以是车载装置也可以是电路。该通信装置可以用于执行上述方法实施例中由第一装置所执行的动作。
图13示出了一种简化的车载装置的结构示意图。便于理解和图示方便,图13中,该车载装置以车载单元作为例子。如图13所示,车载单元包括处理器、存储器、射频电路、天线以及输入输出装置。处理器主要用于对通信协议以及通信数据进行处理,以及对该车载单元进行控制,执行软件程序,处理软件程序的数据等。存储器主要用于存储软件程序和数据。射频电路主要用于基带信号与射频信号的转换以及对射频信号的处理。天线主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于 接收用户输入的数据以及对用户输出数据。需要说明的是,有些种类的设备可以不具有输入输出装置。
当需要发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至射频电路,射频电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到该设备时,射频电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。为便于说明,图13中仅示出了一个存储器和处理器。在实际的设备产品中,可以存在一个或多个处理器和一个或多个存储器。存储器也可以称为存储介质或者存储设备等。存储器可以是独立于处理器设置,也可以是与处理器集成在一起,本申请实施例对此不做限制。
在本申请实施例中,可以将具有收发功能的天线和射频电路视为该装置的收发单元,将具有处理功能的处理器视为该装置的处理单元。如图13所示,该装置包括收发单元1310和处理单元1320。收发单元也可以称为收发器、收发机、收发装置等。处理单元1320也可以称为处理器,处理单板,处理模块、处理装置等。可选的,可以将收发单元1310中用于实现接收功能的器件视为接收单元,将收发单元1310中用于实现发送功能的器件视为发送单元,即收发单元1310包括接收单元和发送单元。收发单元1310有时也可以称为收发机、收发器、或收发电路等。接收单元有时也可以称为接收机、接收器、或接收电路等。发送单元有时也可以称为发射机、发射器或者发射电路等。
应理解,收发单元1310用于执行上述方法实施例中第一装置侧的发送操作和接收操作,处理单元1320用于执行上述方法实施例中第一装置上除了收发操作之外的其他操作。
例如,在一种实现方式中,收发单元1310可以用于执行图2所示的实施例中的S201、S202和/或用于支持本文所描述的技术的其它过程。
又例如,在一种实现方式中,收发单元1310可以用于执行图3所示的实施例中的S301、S302、S303、S304和/或用于支持本文所描述的技术的其它过程。
又例如,在一种实现方式中,收发单元1310可以用于执行图4所示的实施例中的S401、S403、S404和/或用于支持本文所描述的技术的其它过程。
又例如,在一种实现方式中,收发单元1310可以用于执行图5所示的实施例中的S501、S503、S504和/或用于支持本文所描述的技术的其它过程。
又例如,在一种实现方式中,收发单元1310可以用于执行图6所示的实施例中的S601、S606、S608和/或用于支持本文所描述的技术的其它过程。
或者,应理解,收发单元1310也可以用于执行上述方法实施例中第四设备侧的发送操作和接收操作,处理单元1320用于执行上述方法实施例中第四设备上除了收发操作之外的其他操作。
例如,在一种实现方式中,收发单元1310可以用于执行图6所示的实施例中的S601、S603、S605、S606、S607、S608和/或用于支持本文所描述的技术的其它过程。
当该通信装置为芯片类的装置或者电路时,该装置可以包括收发单元和处理单元。其中,所述收发单元可以是输入输出电路和/或通信接口;处理单元为集成的处理器或者微处理器或者集成电路。
本实施例中,可以参照图14所示的装置。作为一个例子,该装置可以完成类似于图13中处理单元1320的功能。在图14中,该装置包括处理器1410,发送数据处理器1420,接收数据处理器1430。上述实施例中的处理单元730、处理单元930或处理单元1130可以 是图14中的该处理器1410,并完成相应的功能。上述实施例中的处理单元730、处理单元930或处理单元1130可以是图14中的发送数据处理器1420,和/或接收数据处理器1430。虽然图14中示出了信道编码器、信道解码器,但是可以理解这些模块并不对本实施例构成限制性说明,仅是示意性的。
图15示出本实施例的另一种形式。通信装置1500中包括调制子系统、中央处理子系统、周边子系统等模块。本实施例中的通信装置可以作为其中的调制子系统。具体的,该调制子系统可以包括处理器1503,接口1504。其中处理器1503完成上述处理单元730、处理单元930或处理单元1130的功能,接口1504完成上述接收单元710和发送单元720;或者发送单元910和接收单元920;或者发送单元1110和接收单元1120的功能。作为另一种变形,该调制子系统包括存储器1506、处理器1503及存储在存储器1506上并可在处理器上运行的程序,该处理器1503执行该程序时实现上述方法实施例中第一装置或第二装置或第四装置的方法。需要注意的是,所述存储器1506可以是非易失性的,也可以是易失性的,其位置可以位于调制子系统内部,也可以位于处理装置1500中,只要该存储器1506可以连接到所述处理器1503即可。
本申请实施例还提供一种通信系统,具体的,通信系统包括第一装置和第二装置,或者还可以包括更多个第一装置和多个第二装置。或者通信系统包括第一装置和第四装置,或者还可以包括更多个第一装置和多个第四装置。或者通信系统包括第一装置、第二装置和第四装置,或者还可以包括更多个第一装置、多个第二装置和多个第四装置。
所述第一装置、第二装置分别用于实现上述图2、图3、图4、图5和图6相关设备的功能。具体请参考上述方法实施例中的相关描述,这里不再赘述。所述第四装置用于实现上述图6相关设备的功能。具体请参考上述方法实施例中的相关描述,这里不再赘述。
本申请实施例中还提供一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行图2、图3、图4、图5和图6中第一装置和第二装置执行的方法;或者当其在计算机上运行时,使得计算机执行图6中第四装置执行的方法。
本申请实施例中还提供一种计算机程序产品,包括指令,当其在计算机上运行时,使得计算机执行图2、图3、图4、图5和图6中第一装置和第二装置执行的方法;或者当其在计算机上运行时,使得计算机执行图6中第四装置执行的方法。
本申请实施例提供了一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现前述方法中第一装置和第二装置的功能;或者用于实现前述方法中第一装置、第二装置和第四装置的功能。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
应理解,本申请实施例中的术语“系统”和“网络”可被互换使用。“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c或a-b-c,其中a,b,c可以是单个,也可以是多个。
以及,除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词是用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。例如,第一消息和第二消息,只是为了区分不同的消息,而并不是表示这两种消息的优先级、发送顺 序或者重要程度等的不同。
应理解,本申请实施例中提及的处理器可以是CPU,还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
还应理解,本申请实施例中提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)集成在处理器中。
应注意,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各 个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请实施例的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请实施例揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应所述以权利要求的保护范围为准。

Claims (22)

  1. 一种通信方法,其特征在于,包括:
    第一装置接收来自第二装置的第一消息,所述第一消息用于请求从所述第一装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;
    所述第一装置向所述第二装置发送第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
  2. 如权利要求1所述的方法,其特征在于,
    所述第一装置接收所述第一消息的数量小于第一阈值,所述M等于所述N;或者,
    所述第一装置接收所述第一消息的数量大于或等于所述第一阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,且所述N等于0,所述时间信息为所述M-N个验证信息的获取时间;或者,
    所述第一装置接收所述第一请求消息的数量大于第二阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,所述N为大于或等于1且小于所述M的整数,所述时间信息为所述M-N个验证信息的获取时间;
    所述第二阈值大于所述第一阈值。
  3. 如权利要求1或2所述的方法,其特征在于,所述第一消息包括第一标识,所述第二消息包括所述M个验证信息,其中,所述第一标识指示所述第一消息的优先级高于第一优先级。
  4. 如权利要求3所述的方法,其特征在于,所述方法还包括:
    所述第一装置确定所述第一标识与所述M个验证信息对应的标识是否一致;
    所述第一装置在确定所述第一标识与所述M个验证信息对应的标识不一致时,所述第一装置确定所述N小于所述M。
  5. 一种通信方法,其特征在于,包括:
    第二装置向第一装置发送第一消息,所述第一消息用于请求从所述第一装置获取M个验证信息,所述M个验证信息中的每个验证信息用于所述第二装置发送消息时,对所述消息进行签名,所述M为正整数;
    所述第二装置接收来自所述第一装置的第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
  6. 如权利要求5所述的方法,其特征在于,
    所述M等于所述N;或者,
    所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,且所述N等于0,所述时间信息为所述M-N个验证信息的获取时间;或者,
    所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,所述N为大于或等于1且小于所述M的整数,所述时间信息为所述M-N个验证信息的获取时间。
  7. 如权利要求5或6所述的方法,其特征在于,所述第一消息包括第一标识,所述 第二消息包括所述M个验证信息,其中,所述第一标识指示所述第一消息的优先级高于第一优先级。
  8. 如权利要求6-7任一所述的方法,其特征在于,所述方法还包括:
    所述第二装置向第三装置发送第三消息,所述第三消息用于请求从所述第一地址下载所述M-N个验证信息;
    所述第二装置接收来自所述第三装置的第四消息,所述第四消息包括所述M-N个验证信息。
  9. 如权利要求8所述的方法,其特征在于,所述第二装置向第三装置发送第三消息,包括:
    所述第二装置根据所述时间信息确定从所述第一地址下载所述M-N个验证信息的第一时刻;
    所述第二装置在所述第一时刻向所述第三装置发送所述第三消息。
  10. 一种通信方法,其特征在于,包括:
    第四装置接收来自第二装置的第一消息,所述第一消息用于请求从第一装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;
    所述第四装置根据所述第二装置的身份标识确定是否为所述第一消息添加第一标识,所述第一标识指示所述第一消息的优先级高于第一优先级;
    所述第一消息的优先级高于所述第一优先级,所述第四装置向第一装置发送携带所述第一标识的所述第一消息。
  11. 一种通信装置,其特征在于,包括:
    接收单元,用于接收来自第二装置的第一消息,所述第一消息用于请求从所述通信装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;
    发送单元,用于向所述第二装置发送第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
  12. 如权利要求11所述的通信装置,其特征在于,
    所述通信装置接收的用于请求验证信息的消息的数量小于第一阈值,所述M等于所述N;或者,
    所述通信装置接收的用于请求验证信息的消息的数量大于或等于所述第一阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,且所述N等于0,所述时间信息为所述M-N个验证信息的获取时间;或者,
    所述通信装置接收的第一请求消息的数量大于第二阈值,所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,所述N为大于或等于1且小于所述M的整数,所述时间信息为所述M-N个验证信息的获取时间。
  13. 如权利要求11或12所述的通信装置,其特征在于,所述第一消息包括第一标识,所述第二消息包括所述M个验证信息,其中,所述第一标识指示所述第一消息的优先级高于第一优先级。
  14. 如权利要求13所述的通信装置,其特征在于,所述通信装置还包括处理单元,用于:
    确定所述第一标识与所述M个验证信息对应的标识是否一致;
    在确定所述第一标识与所述M个验证信息对应的标识不一致时,确定所述N小于所述M。
  15. 一种通信装置,其特征在于,包括:
    发送单元,用于向第一装置发送第一消息,所述第一消息用于请求从所述第一装置获取M个验证信息,所述M个验证信息中的每个验证信息用于所述通信装置发送消息时,对所述消息进行签名,所述M为正整数;
    接收单元,用于接收来自所述第一装置的第二消息,所述第二消息包括所述M个验证信息中的N个验证信息,所述N为整数。
  16. 如权利要求15所述的通信装置,其特征在于,
    所述M等于所述N;或者,
    所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,且所述N等于0,所述时间信息为所述M-N个验证信息的获取时间;或者,
    所述第二消息还包括第一地址和/或时间信息,所述第一地址为所述M个验证信息中除所述N个验证信息之外的M-N个验证信息的下载地址,所述N为大于或等于1且小于所述M的整数,所述时间信息为所述M-N个验证信息的获取时间。
  17. 如权利要求15或16所述的通信装置,其特征在于,所述第一消息包括第一标识,所述第二消息包括所述M个验证信息,其中,所述第一标识指示所述第一消息的优先级高于第一优先级。
  18. 如权利要求16-17任一所述的通信装置,其特征在于,
    所述发送单元还用于向第三装置发送第三消息,所述第三消息用于请求从所述第一地址下载所述M-N个验证信息;
    所述接收单元还用于接收来自所述第三装置的第四消息,所述第四消息包括所述M-N个验证信息。
  19. 如权利要求18所述的通信装置,其特征在于,所述通信装置还包括处理单元,用于根据所述时间信息确定从所述第一地址下载所述M-N个验证信息的第一时刻;
    所述发送单元还用于在所述处理单元的控制下在所述第一时刻向所述第三装置发送所述第三消息。
  20. 一种通信装置,其特征在于,包括:
    接收单元,用于接收来自第二装置的第一消息,所述第一消息用于请求从第一装置获取M个验证信息,所述验证信息用于对信息进行验证,所述M为正整数;
    处理单元,用于根据所述第二装置的身份标识确定是否为所述第一消息添加第一标识,所述第一标识指示所述第一消息的优先级高于第一优先级;
    发送单元,用于在所述第一消息的优先级高于所述第一优先级时,向第一装置发送携带所述第一标识的所述第一消息。
  21. 一种通信装置,其特征在于,所述通信装置包括处理器,所述处理器与存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的所述计算机程序,使得所述装置实现如权利要求1~4或5~9或10中任一项所述的方法。
  22. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机 程序,所述计算机程序当被计算机执行时,使所述计算机执行如权利要求1~4或5~9或10中任一项所述的方法。
PCT/CN2020/096902 2019-10-30 2020-06-18 一种通信方法及装置 WO2021082471A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2022525045A JP7481065B2 (ja) 2019-10-30 2020-06-18 通信方法および装置
EP20882061.3A EP4044645A4 (en) 2019-10-30 2020-06-18 COMMUNICATION METHOD AND DEVICE
KR1020227017563A KR20220088478A (ko) 2019-10-30 2020-06-18 통신 방법 및 장치
US17/731,931 US20220256344A1 (en) 2019-10-30 2022-04-28 Communication Method and Apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911044660.9A CN112822677B (zh) 2019-10-30 2019-10-30 一种通信方法及装置
CN201911044660.9 2019-10-30

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/731,931 Continuation US20220256344A1 (en) 2019-10-30 2022-04-28 Communication Method and Apparatus

Publications (1)

Publication Number Publication Date
WO2021082471A1 true WO2021082471A1 (zh) 2021-05-06

Family

ID=75714854

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/096902 WO2021082471A1 (zh) 2019-10-30 2020-06-18 一种通信方法及装置

Country Status (6)

Country Link
US (1) US20220256344A1 (zh)
EP (1) EP4044645A4 (zh)
JP (1) JP7481065B2 (zh)
KR (1) KR20220088478A (zh)
CN (1) CN112822677B (zh)
WO (1) WO2021082471A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2022079490A (ja) * 2021-05-14 2022-05-26 阿波▲羅▼智▲聯▼(北京)科技有限公司 車両の通信方法、装置、記憶媒体及びプログラム

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113705517A (zh) * 2021-09-03 2021-11-26 杨宏伟 识别带有视觉标识的第二车辆的方法、车辆自动驾驶方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973760A (zh) * 2013-02-06 2014-08-06 电信科学技术研究院 一种消息证书的申请方法、设备及系统
CN106161337A (zh) * 2014-10-22 2016-11-23 现代自动车株式会社 检测针对车辆和任意物通信的不当行为的方法和系统
WO2018182198A1 (ko) * 2017-03-29 2018-10-04 엘지전자(주) V2x 통신 장치 및 그의 데이터 통신 방법
CN108668258A (zh) * 2018-05-09 2018-10-16 中国信息通信研究院 V2x通信快速身份认证系统及方法
CN110235402A (zh) * 2017-01-31 2019-09-13 高通股份有限公司 车联网反馈信道设计

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004297333A (ja) * 2003-03-26 2004-10-21 Ntt Comware West Corp デジタル証明書の認定システム、デジタル証明書の認定サーバ、pkiトークン、デジタル証明書の認定方法、及びプログラム
CN104219309B (zh) * 2014-09-04 2018-02-16 江苏大学 车联网中基于证书的车辆身份认证方法
JP6717183B2 (ja) * 2016-12-14 2020-07-01 株式会社オートネットワーク技術研究所 路車間通信システム、路側通信装置、車載通信装置及び路車間通信方法
US10476679B2 (en) * 2017-11-14 2019-11-12 INTEGRITY Security Services, Inc. Systems, methods, and devices for multi-stage provisioning and multi-tenant operation for a security credential management system
WO2019152994A1 (en) * 2018-02-05 2019-08-08 Lg Electronics, Inc. Cryptographic methods and systems using blinded activation codes for digital certificate revocation
US10439825B1 (en) * 2018-11-13 2019-10-08 INTEGRITY Security Services, Inc. Providing quality of service for certificate management systems
CN109688111A (zh) * 2018-12-04 2019-04-26 国汽(北京)智能网联汽车研究院有限公司 一种适应v2x通信的车辆身份认证系统和方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973760A (zh) * 2013-02-06 2014-08-06 电信科学技术研究院 一种消息证书的申请方法、设备及系统
CN106161337A (zh) * 2014-10-22 2016-11-23 现代自动车株式会社 检测针对车辆和任意物通信的不当行为的方法和系统
CN110235402A (zh) * 2017-01-31 2019-09-13 高通股份有限公司 车联网反馈信道设计
WO2018182198A1 (ko) * 2017-03-29 2018-10-04 엘지전자(주) V2x 통신 장치 및 그의 데이터 통신 방법
CN108668258A (zh) * 2018-05-09 2018-10-16 中国信息通信研究院 V2x通信快速身份认证系统及方法

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "Optimized certificate-based security solution for PC5 LTE-V2X communication", 3GPP DRAFT; S3-161767_OPTIMIZED CERTIFICATE-BASED SECURITY SOLUTION FOR PC5 LTE-V2X COMMUNICATION, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. Santa Cruz de Tenerife (Spain); 20161107 - 2016111, 6 November 2016 (2016-11-06), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051185842 *
INTEL CORPORATION: "Rel 14 – Authorisation and Security for V2X Communication", 3GPP DRAFT; S3-160546-V2X-AUTHORIZATION, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. Del Cabo, Mexico; 20160509 - 20160514, 8 May 2016 (2016-05-08), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051099236 *
M. GROVES CESG: "Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI); rfc6507.txt", INTERNET ENGINEERING TASK FORCE (IETF), REQUEST FOR COMMENTS: 6507, CATEGORY: INFORMATIONAL, 2 February 2012 (2012-02-02), pages 1 - 17, XP015081405, Retrieved from the Internet <URL:https://www.rfc-editor.org/rfc/pdfrfc/rfc6507.txt.pdf> *
See also references of EP4044645A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2022079490A (ja) * 2021-05-14 2022-05-26 阿波▲羅▼智▲聯▼(北京)科技有限公司 車両の通信方法、装置、記憶媒体及びプログラム

Also Published As

Publication number Publication date
EP4044645A4 (en) 2022-12-21
US20220256344A1 (en) 2022-08-11
CN112822677B (zh) 2022-07-29
EP4044645A1 (en) 2022-08-17
CN112822677A (zh) 2021-05-18
JP2023500095A (ja) 2023-01-04
JP7481065B2 (ja) 2024-05-10
KR20220088478A (ko) 2022-06-27

Similar Documents

Publication Publication Date Title
US9021049B2 (en) Method and apparatus for augmenting smartphone-centric in-car infotainment system using vehicle Wi-Fi/DSRC
US20220256344A1 (en) Communication Method and Apparatus
US20230034681A1 (en) Positioning processing method and apparatus, base station, terminal device, and storage medium
US20210334353A1 (en) Device authentication method and apparatus
CN110944053A (zh) 移动设备之间的动态路由映射
WO2022048489A1 (zh) 用于电子设备的超宽带定位的方法以及超宽带终端设备
WO2021138914A1 (zh) 传输数据的指示方法、装置、通信设备及存储介质
WO2021036212A1 (zh) 一种身份验证方法及装置
US20230156424A1 (en) Electronic device for controlling wireless communication connection and operating method thereof
US20240086674A1 (en) Connection and service discovery for fine ranging applications
KR20150099234A (ko) 푸시 메시지 전송 제어 방법 및 장치
EP3031195B1 (en) Secure storage synchronization
CN115336296A (zh) 定位辅助终端设备的确定方法、装置
WO2021092841A1 (zh) 下行控制信息传输方法及装置、通信设备及存储介质
CN110650453B (zh) 一种通信方法及装置
CN114301788A (zh) 一种切片管理方法、装置及通信设备
JP5896451B2 (ja) 車載型通信装置、通信システム、通信方法、及びプログラム
EP4008142B1 (en) Electronic device for receiving paging message and operation method thereof
US20230318750A1 (en) Method for processing harq-ack feedback, communication device and non-transitory computer-readable storage medium
CN116326018A (zh) 一种通信方法、装置及系统
CN115551117A (zh) 一种pdn连接方法和通信系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20882061

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022525045

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2020882061

Country of ref document: EP

Effective date: 20220511

ENP Entry into the national phase

Ref document number: 20227017563

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE