WO2022110201A1 - 一种汽车电子标识传输方法、车载设备与读写器 - Google Patents
一种汽车电子标识传输方法、车载设备与读写器 Download PDFInfo
- Publication number
- WO2022110201A1 WO2022110201A1 PCT/CN2020/132914 CN2020132914W WO2022110201A1 WO 2022110201 A1 WO2022110201 A1 WO 2022110201A1 CN 2020132914 W CN2020132914 W CN 2020132914W WO 2022110201 A1 WO2022110201 A1 WO 2022110201A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- reader
- information
- vehicle
- writer
- read
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 148
- 230000005540 biological transmission Effects 0.000 title claims abstract description 29
- 238000012795 verification Methods 0.000 claims abstract description 153
- 230000004044 response Effects 0.000 claims abstract description 121
- 230000008569 process Effects 0.000 claims description 79
- 238000012545 processing Methods 0.000 claims description 60
- 238000004891 communication Methods 0.000 claims description 39
- 238000004590 computer program Methods 0.000 claims description 21
- 230000003993 interaction Effects 0.000 abstract description 10
- 238000013461 design Methods 0.000 description 34
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000000969 carrier Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Definitions
- the present application relates to the technical field of Internet of Vehicles, and in particular, to a method for transmitting an electronic identification of an automobile, a vehicle-mounted device and a reader/writer.
- Electronic registration identification of the motor vehicle is an extension of the Internet of Things passive radio frequency identification (Radio Frequency Identification, RFID) in the field of smart transportation.
- ERI can specifically be vehicle information such as license plate numbers stored in electronic tags.
- the electronic label is a chip that can be attached to the vehicle.
- the electronic label can also be called the car electronic ID card, the car digital standard source, commonly known as "electronic license plate”. Readers placed in other transportation infrastructures interact with the electronic tags to obtain the electronic identification of vehicles stored in the electronic tags, thereby realizing automatic, non-contact, non-stop vehicle identification and monitoring.
- the reader set in these places emits ultra-high frequency electromagnetic waves to the electronic tag, and the electronic tag will receive the ultra-high frequency electromagnetic wave.
- the chip starts to work, and after the chip verifies the identity of the reader, the required information is sent back to the reader, and the reader sends the information back to the command center.
- the electronic tag needs to be authenticated before returning the information required by the reader to the reader, and after the authentication is passed, a secure channel is established with the reader.
- the reader/writer requests a random number from the electronic tag, and performs a cryptographic operation on the obtained random number and the read password for the electronic tag to obtain the access command opening authority information; the reader/writer sends the access command to the electronic tag to open the authority information.
- the electronic tag performs a cryptographic operation on the received access command opening authority information according to the read password for the reader, and if the random number can be obtained, it is determined that the reader has the authority to read the vehicle information stored in the electronic tag,
- the electronic tag can accept the read command of the reader. It can be seen that before the reader reads the vehicle information stored in the electronic tag, it needs to establish a secure channel through multiple rounds of interaction. The number of interactive messages is too large and the overhead is high.
- the present application provides an automobile electronic identification transmission method, on-board equipment and a reader, which are used to improve the security of automobile electronic identification transmission, reduce the number of rounds of information interaction, and save costs.
- an embodiment of the present application provides a method for transmitting an electronic identification of an automobile.
- the in-vehicle device receives a read request message from the reader, and the read request message is used to request to read the electronic identification of the vehicle stored in the in-vehicle device.
- After the in-vehicle device receives the read request message it verifies the reader through the read request message, and after confirming that the verification is passed, encrypts the vehicle electronic identification; then, the in-vehicle device sends a read response message to the reader,
- the read response message contains the encrypted vehicle electronic identification.
- the electronic identification of the car is stored in the vehicle-mounted device, and the computing power of the vehicle-mounted device is superior to that of the existing electronic tag, and the reader is verified to determine that the reader has the authority to read the electronic identification of the vehicle stored in the vehicle-mounted device.
- the car electronic identification is encrypted and sent to the reader through the read response message.
- the in-vehicle device may encrypt the automotive electronic identification in the following manner: the in-vehicle device encrypts the automotive electronic identification according to the read password corresponding to the unique identification UID of the automotive electronic identification The identification is subjected to first encryption processing to obtain first encrypted information; the in-vehicle device determines verification information, and the verification information includes the UID; the in-vehicle device uses the public key of the reader to encrypt the first encryption The information and the verification information are subjected to a second encryption process.
- the in-vehicle device firstly encrypts the car electronic identification according to the reading password corresponding to the UID of the car electronic identification to obtain the first encrypted information, and then uses the public key of the reader to carry out the first encryption information and verification information.
- the second encryption process after two encryption processes, improves the security of the process of transmitting the electronic identification of the vehicle.
- the read request message includes at least one item of first location information or first time information, and the first location indicated by the first location information is for the reader to send the read The position where the message is requested, and the first time indicated by the first time information is the time when the reader sends the read request message;
- the in-vehicle device verifies the reader through the read request message, including: the in-vehicle device determining the first position indicated by the first location information and the in-vehicle device receiving the read request message The distance between the positions at which the in-vehicle device is located is less than the first distance threshold; or the in-vehicle device determines the time between the first time indicated by the first time information and the time when the in-vehicle device receives the read request message The time difference value is less than the first time threshold.
- the read request message can also carry at least one of the first location information or the first time information, and the in-vehicle device can determine the relationship with the reader by judging the location and time when it receives the read request message. The distance between them and the transmission time of the read request message, so as to determine whether the reader is within the range that has the authority to read the electronic vehicle identification, thereby preventing the malicious acquisition of the electronic identification of the vehicle.
- the verification information further includes: at least one item of the first location information or the first time information.
- the verification information includes at least one of the first position information or the first time information, so that after decrypting the verification information, the reader can judge the received information according to the first position information or the first time information. Whether the read response message corresponds to the read request message sent by the reader, so as to prevent the malicious acquisition of the vehicle electronic identification.
- the verification information further includes: at least one item of second location information or second time information, wherein the second location indicated by the second location information is the information on the vehicle-mounted device.
- the position at which the electronic vehicle identification is encrypted, and the second time indicated by the second time information is the time when the vehicle electronic identification is encrypted by the vehicle-mounted device.
- the verification information includes at least one of the second position information or the second time information, so that after decrypting the verification information, the reader can determine whether there is a Within the scope of the authority to read the car electronic identification, the security of the transmission of the automobile electronic identification is improved.
- the verification information further includes a pseudonym certificate identifier of the in-vehicle device.
- the pseudonym certificate identifier of the vehicle-mounted device is used as a part of the verification information, and the pseudonym certificate identifier used by the vehicle-mounted device can be bound with the first encrypted information, thereby preventing the middleman from maliciously obtaining the first encrypted information from the read response message and using it.
- the pseudonymous certificate of the middleman is replayed, which will damage the interests of the victim, such as preventing the middleman from impersonating the victim to commit traffic violations or using the victim's information to pay road tolls, etc., to further improve security.
- the read response message is a message that has been signed based on the pseudonym certificate of the in-vehicle device.
- the in-vehicle device uses the pseudonym certificate of the in-vehicle device to sign the read response message, preventing the middleman from maliciously obtaining the car's electronic identity.
- the in-vehicle device verifies the reader through the read request message in the following manner:
- the in-vehicle device determines the public key of the superior certificate of the application certificate corresponding to the signature of the read request message, and decrypts the application certificate by using the public key of the superior certificate to obtain a first abstract, and the in-vehicle device according to the Apply the content of the certificate to obtain a second digest, and compare whether the first digest is the same as the second digest; and the in-vehicle device determines the upper-level public key of the signature of the read request message, and uses the upper-level public key pair
- the signature is decrypted to obtain a third digest, the in-vehicle device calculates and obtains a fourth digest according to the signature content, and compares whether the third digest is the same as the fourth digest;
- the in-vehicle device determines that the verification of the reader is passed by: the in-vehicle device determines that the first abstract is the same as the second abstract, and the in-vehicle device determines that the third abstract is the same as the first abstract.
- the four abstracts are the same.
- the in-vehicle device After the in-vehicle device receives the read request message, the in-vehicle device first verifies that the application certificate corresponding to the signature of the read request message is legal, and then confirms that the signature of the read request message is correct, and then determines that the verification of the reader is passed.
- the verification process of the reader is completed in one round of information exchange for transmitting the read request message and the read response message, thereby reducing the number of information exchange rounds and improving the efficiency.
- an embodiment of the present application provides a method for transmitting an electronic identification of an automobile.
- the reader/writer sends a read request message to the in-vehicle device, the read request message is used for requesting to read the automotive electronic identification stored in the in-vehicle device, and the read request message includes a message for the in-vehicle device to verify the read and write.
- the reader/writer receives the read response message sent by the on-board equipment, and the read response message contains the encrypted electronic identification of the vehicle; the reader/writer verifies the on-board equipment through the read response message, After it is determined that the verification is passed, the encrypted automobile electronic identification is decrypted to obtain the automobile electronic identification.
- the reader/writer After the reader/writer sends a read request message to the vehicle-mounted device, it receives a read response message sent by the vehicle-mounted device, and the read response message includes the encrypted vehicle electronic identifier.
- the reader After the reader passes the verification of the vehicle equipment, it decrypts and obtains the vehicle electronic identification, that is to say, in an information exchange process, the reader completes the steps of verifying the vehicle equipment and obtaining the vehicle electronic identification, reducing the number of rounds of information interaction. times, to reduce overhead.
- the reader/writer decrypts the encrypted automotive electronic identification in the following manner to obtain the automotive electronic identification: the reader/writer uses the reader's private key pair to The encrypted automotive electronic identification is subjected to a first decryption process to obtain first encryption information and verification information; the verification information includes the unique identification UID of the automotive electronic identification; the reader corresponds to the UID The second decryption process is performed on the first encrypted information to obtain the vehicle electronic identification.
- the reader first uses the reader's private key to perform the first decryption process on the encrypted automotive electronic identification, and then uses the read password corresponding to the UID to perform the second decryption processing to obtain the automotive electronic identification, which ensures the automotive electronic identification.
- the identification can only be decrypted by the authorized reader, so as to prevent the middleman from maliciously obtaining the electronic identification of the car.
- the read request message includes at least one item of first location information or first time information, and the first location indicated by the first location information is for the reader to send the The position where the read request message is located, and the first time indicated by the first time information is the time when the reader/writer sends the read request message.
- the read request message includes at least one of the first location information or the first time information, so that the vehicle-mounted device knows the location and time when the reader sends the read request message, and then judges whether the reader Within the scope of having the right to read the electronic vehicle identification, to prevent malicious acquisition of the electronic identification of the vehicle.
- the verification information further includes: at least one item of second location information or second time information; the reader encrypts the first encryption according to the read password corresponding to the UID. Before the information is subjected to the second decryption process, the reader determines that the distance between the second location indicated by the second location information and the first location indicated by the first location information is less than a second distance threshold; or The reader/writer determines that a time difference between the second time indicated by the second time information and the first time indicated by the first time information is less than a second time threshold.
- the reader can verify the position information and the time information to determine whether the reader receives the electronic identification of the car is read or written.
- the device sends a read request message for the obtained car electronic identification, which further prevents other middlemen from maliciously obtaining the car electronic identification and replaying it in a different place, resulting in damage to the interests of the victim.
- the verification information further includes: at least one item of second location information or second time information;
- the reader/writer Before the reader/writer performs the second decryption process on the first encrypted information according to the read password corresponding to the UID, the reader/writer determines that the second position indicated by the second position information is the same as the read password.
- the distance between the positions where the writer performs the first decryption is smaller than a first distance threshold; or the reader determines that the distance between the second time indicated by the second time information and the first time The time difference is less than the first time threshold.
- the verification information also includes the second position information or the second time information, and the reader determines through the second position and the second time that when the reader receives the read response message, it is in a state authorized to read the electronic identification of the vehicle.
- the middleman prevent the middleman from maliciously obtaining the electronic identification of the car and replaying it in another place.
- the verification information further includes a pseudonym certificate identifier; before the reader performs the second decryption process on the first encrypted information according to the read password corresponding to the UID, the read/write The device determines that the pseudonym certificate identifier contained in the verification information is the same as the pseudonym certificate identifier corresponding to the signature of the read response message.
- the reader can only perform the second decryption process on the first encrypted information to obtain the car electronic identification after confirming that the pseudonymous certificate identification contained in the verification information is the same as the pseudonymous certificate identification corresponding to the signature of the read response message, preventing the middleman Maliciously obtain the first encrypted information from the read response message and use the middleman's pseudonymous certificate to replay it, resulting in damage to the interests of the victim, such as preventing the middleman from impersonating the victim to commit traffic violations or using the victim's information to pay road tolls.
- the read request message is a message that has been signed based on the application certificate of the reader/writer.
- the reader uses the reader's application certificate to sign the read request message, which improves the security of the transmission process of the vehicle electronic identification.
- the reader/writer may verify the in-vehicle device in the following manner: the reader/writer determines the public key of the superior certificate of the pseudonym certificate corresponding to the signature of the read response message, and uses the superior certificate
- the public key decrypts the pseudonym certificate to obtain a fifth digest
- the reader/writer calculates and obtains a sixth digest according to the content of the pseudonym certificate, and compares whether the fifth digest is the same as the sixth digest
- the reader/writer determines the upper-level public key of the signature of the read response message, and uses the upper-level public key to decrypt the signature to obtain a seventh digest.
- the reader/writer may determine that the verification of the in-vehicle device is passed in the following manner: the reader/writer determines that the fifth digest is the same as the sixth digest, and the reader/writer determines that the seventh digest is the same as the sixth digest.
- the eighth abstract is the same.
- the reader After receiving the read response message, the reader first verifies that the pseudonym application certificate corresponding to the signature of the read response message is legal, and then confirms that the signature of the read response message is correct, and then confirms that the verification of the on-board equipment is passed.
- the verification process of the on-board equipment is completed in the round of information exchange of the transmission of the read request message and the read response message, which reduces the rounds of information exchange and improves the efficiency.
- an embodiment of the present application provides a communication apparatus, including a unit for performing each step in any of the above aspects.
- an embodiment of the present application provides an in-vehicle device, comprising at least one processing element and at least one storage element, wherein the at least one storage element is used to store programs and data, and the at least one processing element is used to execute the above-mentioned item of the present application. method on the one hand.
- an embodiment of the present application provides a reader/writer, including at least one processing element and at least one storage element, wherein the at least one storage element is used to store programs and data, and the at least one processing element is used to execute the above application.
- the method provided by the second aspect is used to execute the above application.
- an embodiment of the present application provides a communication system, including a vehicle-mounted device and a reader/writer, wherein the vehicle-mounted device has a function of executing the method provided in the first aspect of the present application, and the reader/writer has the function of executing the method provided by the first aspect of the present application.
- the function of the method provided by the second aspect is not limited to a vehicle-mounted device and a reader/writer.
- the embodiments of the present application further provide a computer program, which, when the computer program runs on a computer, causes the computer to execute the method provided in any of the foregoing aspects.
- an embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a computer, the computer is made to perform any of the above aspects provided method.
- an embodiment of the present application further provides a chip, where the chip is configured to read a computer program stored in a memory, and execute the method provided in any one of the foregoing aspects.
- an embodiment of the present application further provides a chip system, where the chip system includes a processor for supporting a computer device to implement the method provided in any one of the foregoing aspects.
- the chip system further includes a memory for storing necessary programs and data of the computer device.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- Figure 1 is a schematic diagram of a car networking scenario
- FIG. 2 is a flowchart of a method for transmitting an electronic identification of an automobile provided by an embodiment of the present application
- FIG. 3 is a flow chart of a first example of transmission of automotive electronic identification provided by an embodiment of the present application
- FIG. 4 is a flow chart of a second example of automobile electronic identification transmission provided by the embodiment of the present application.
- FIG. 5 is a flowchart of a third example of vehicle electronic identification transmission provided by the embodiment of the present application.
- FIG. 6 is a flow chart of a fourth example of automobile electronic identification transmission provided by the embodiment of the present application.
- FIG. 7 is a schematic structural diagram of a communication device according to an embodiment of the present application.
- FIG. 8 is a schematic structural diagram of a vehicle-mounted device provided by an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a reader/writer provided by an embodiment of the present application.
- Radio Frequency Identification is an automatic identification technology that enables non-contact two-way data communication through radio frequency.
- the reader uses radio frequency to read and write the data stored in the electronic tag, so as to achieve the purpose of identifying the target and exchanging data.
- the contactless coupling of the radio frequency signal is realized between the electronic tag and the reader through the coupling element.
- the energy transmission and data exchange are realized according to the time sequence relationship.
- Electronic tags also known as radio frequency tags, transponders, and data carriers, are composed of coupling elements and chips. Each electronic tag has a unique electronic code. High-capacity electronic tags have storage space for data writing.
- the electronic tag is attached to the object to identify the target object, and the electronic tag stores the unique identity document (UID) of the electronic tag and the information of the target object identified by the electronic tag.
- UID unique identity document
- the information of the target object identified by the electronic tag is the electronic identification of the car, including the vehicle information of the vehicle, specifically the vehicle number plate, the vehicle license information, and the like.
- Readers also known as readers, scanners, and communicators, are devices that read or write electronic tags and can be designed as handheld or fixed.
- the reader can be installed at the bayonet, important intersection or roadside unit, and obtain the vehicle information of the passing vehicle by interacting with the electronic tag attached to the passing vehicle.
- the public key and the private key are the key pair in the encryption algorithm. Among them, the public key is disclosed to the outside world for encryption by the outside world; the private key is locally reserved for decryption.
- the in-vehicle device is a device with communication capability.
- an in-vehicle device is an in-vehicle telematics box (Telematics Box, T-Box), which is generally installed on the vehicle, and a roadside unit (RSU) is erected on the side of the road, and a reader is installed in the RSU.
- -Box can communicate with the reader.
- T-Box adopts dedicated short range communications (DSRC) technology to establish a microwave communication link with the reader.
- DSRC dedicated short range communications
- each vehicle is attached with a corresponding electronic label
- the electronic label stores the UID of the electronic label and the corresponding automotive electronic label of each vehicle. logo.
- the IoV scenario shown in Figure 1 includes a vehicle and a reader equipped with electronic tags.
- the reader sends a read request message to the electronic tag installed on the vehicle; the electronic tag authenticates the reader, which can be one-way authentication or two-way authentication. .
- the electronic tag After the electronic tag passes the authentication of the reader, the electronic tag generates a random number and sends the random number to the reader; the read password corresponding to the electronic tag determined by the reader is used as a password for the read password and random number.
- the learning operation obtains the access command opening permission information, and the reader/writer sends the access command opening permission information to the electronic tag.
- the electronic tag determines the read password corresponding to the reader, decrypts the access command opening permission information, and obtains a random number; if it is determined that the random number obtained by decryption is the same as the random number sent by the electronic tag to the reader, the electronic tag and The reader establishes a secure channel, which means that the reader has the authority to read or write the electronic identification of the car stored in the electronic tag, and the electronic tag sends the electronic identification of the car that the reader wants to read to the reader.
- the reader needs to perform multiple rounds of information interaction with the electronic tag before reading the electronic identification of the vehicle stored in the electronic tag, which is expensive.
- an embodiment of the present application provides a method for transmitting an electronic identification of a vehicle, which integrates an electronic label into an in-vehicle device.
- the electronic label may be integrated into the in-vehicle device as a virtual module, and the in-vehicle device is installed on the vehicle and used for
- the equipment for information processing and information interaction can be, for example, an on-board telematics processor (Telematics Box, T-Box).
- FIG. 2 shows a vehicle electronic identification transmission method provided by an embodiment of the present application, and the method includes the following steps:
- the reader/writer sends a read request message to the in-vehicle device, where the read request message is used to request to read the automotive electronic identification stored in the in-vehicle device.
- the reader/writer sends a read request message to the vehicle-mounted device when detecting that the vehicle-mounted device has entered the detection range of the reader/writer; or, the reader-writer periodically broadcasts the read request message.
- the reader and the in-vehicle device can interact through a short-distance direct connection communication interface.
- the reader can establish a sidelink connection with the in-vehicle device, and send a read request message to the in-vehicle device through the PC5 interface.
- the read request message may include a reader/writer identifier to indicate the reader/writer identity.
- the read request message may also include at least one item of first location information or first time information, wherein the first location indicated by the first location information is the location where the reader/writer is located when sending the read request message, The first time indicated by the first time information is the time when the reader/writer sends the read request message.
- the reader/writer before the reader/writer sends the read request message to the vehicle-mounted device, the reader/writer can use the reader/writer's application certificate to sign the initial read request message to obtain the read request message, so as to ensure the read request message. Messages are not tampered with by attackers, improving the security of data transmission.
- S202 The in-vehicle device verifies the reader through the read request message.
- the vehicle-mounted device performs the following verification on the reader:
- the in-vehicle device can look up whether there is a reader in the read request message in the locally stored legal reader identifier set that is allowed to read the electronic identifier of the vehicle. The identifier of the writer. If the identifier of the reader in the read request message exists in the set of legal reader identifiers, the vehicle-mounted device will pass the verification of the reader, otherwise, the vehicle-mounted device will fail the verification of the reader.
- the server can also store the legal reader identification set corresponding to the in-vehicle device, and the in-vehicle device can send the reader identification in the read request message to the server.
- the server searches for the reader identifier sent by the vehicle-mounted device in the legal reader-writer identifier set corresponding to the vehicle-mounted device. If there is a reader-writer identifier sent by the vehicle-mounted device in the legal reader-writer identifier set, the server sends a read-write device to the vehicle-mounted device.
- the in-vehicle device passes the verification of the reader; otherwise, the server sends a notification message that the reader is illegal to the in-vehicle device, and the in-vehicle device fails to verify the reader.
- the in-vehicle device verifies whether the application certificate used by the reader is legal.
- the application certificate used by the reader/writer is the application certificate corresponding to the signature of the read request message. Therefore, in the verification process, the in-vehicle device can verify whether the application certificate corresponding to the signature of the read request message is legal, which may specifically include the following steps:
- the in-vehicle device determines the public key of the superior certificate of the application certificate corresponding to the signature of the read request message, and uses the public key of the superior certificate to decrypt the application certificate to obtain the first digest;
- the in-vehicle device calculates and obtains the second abstract according to the content of the application certificate
- the on-board device compares whether the first digest and the second digest are the same; if the first digest is the same as the second digest, the on-board device determines that the application certificate corresponding to the signature of the read request message is legal, and the on-board device verifies the reader and passes; otherwise, the on-board device It is determined that the application certificate corresponding to the signature of the read request message is invalid, and the in-vehicle device fails to verify the reader.
- the in-vehicle device verifies whether the signature of the read request message is correct.
- the in-vehicle device determines the superior public key of the signature of the read request message, and uses the superior public key to decrypt the signature of the read request message to obtain a third digest;
- the in-vehicle device calculates and obtains the fourth digest according to the signature content
- the on-board device compares whether the third digest is the same as the fourth digest; if the third digest is the same as the fourth digest, the on-board device determines that the signature of the read request message is correct, and the on-board device verifies the reader and passes; otherwise, the on-board device determines the read request message The signature is incorrect, and the on-board device does not pass the verification of the reader.
- the vehicle-mounted device if the read request message includes at least one of the first location information or the first time information, the vehicle-mounted device also needs to perform the following verifications when verifying the reader:
- the in-vehicle device determines that the distance between the first position indicated by the first location information and the position where the in-vehicle device is located when it receives the read request message is less than the first distance threshold, which indicates that the distance between the vehicle to which the in-vehicle device belongs and the reader The distance is less than the first distance threshold, that is to say, the distance between the on-board device and the reader is within the allowable range of detection, and the reader has permission to read the car electronic identification stored in the on-board device; or
- the in-vehicle device determines that the time difference between the first time indicated by the first time information and the time when the in-vehicle device receives the read request message is smaller than the first time threshold, which means that the time between the in-vehicle device receiving the read request message and the time when the in-vehicle device receives the read request message is different from that of the reader.
- the time difference between the times when the read request message is sent is less than the first time threshold, that is, the read request message received by the in-vehicle device is within the valid time range, and the reader has the right to read the electronic identification of the car stored in the in-vehicle device .
- the in-vehicle device can determine that the received read request message is a reader that is within the detection allowable range with the in-vehicle device, and the read request message sent within the valid time range can prevent the reader in a different place from maliciously obtaining the car.
- Electronic identification leading to the disclosure of vehicle information or endangering the interests of vehicle owners.
- the vehicle electronic identification is encrypted by the vehicle-mounted device according to the following methods:
- the in-vehicle device performs a first encryption process on the vehicle electronic identification according to the read password corresponding to the UID of the vehicle electronic identification to obtain first encrypted information.
- the first encryption process may be a cryptographic operation, such as an XOR operation.
- the vehicle-mounted device After acquiring the first encrypted information, the vehicle-mounted device determines the verification information, and performs a second encryption process on the first encrypted information and the verification information.
- the verification information includes the UID of the vehicle electronic identification.
- the verification information may also include at least one of the following:
- the pseudonym certificate of the in-vehicle device is a certificate that the in-vehicle device can use to temporarily identify the identity in communication.
- At least one item of first location information or first time information At least one item of first location information or first time information.
- the verification information may further include at least one item of first position information or first time information.
- At least one item of second location information or second time information At least one item of second location information or second time information.
- the second position indicated by the second location information is the position where the vehicle-mounted device performs encryption processing on the vehicle electronic identification
- the second time indicated by the second time information is the time at which the vehicle-mounted device performs encryption processing on the vehicle electronic identification.
- the reader/writer when the reader/writer acquires at least one of the second position information or the second time information in the read response message, it can determine whether the reader/writer is within the range allowed by the vehicle-mounted device to read the vehicle electronic identification, and further. Improve the security of vehicle electronic identification transmission.
- the in-vehicle device sends a read response message to the reader/writer, where the read response message includes the encrypted vehicle electronic identification.
- the on-board device before sending the read response message to the reader, uses the pseudonym certificate of the on-board device to sign the initial read response message to obtain the read response message to ensure that the read response message is not attacked. tampering, improve the security of data transmission.
- S205 The reader/writer verifies the in-vehicle device by reading the response message.
- the reader/writer performs the following verifications on the in-vehicle device:
- the in-vehicle device when the in-vehicle device signs the initial read response message and obtains the read response message, the in-vehicle device uses the pseudonym certificate of the in-vehicle device to sign the initial read response message. Therefore, in the verification process, the reader/writer can verify whether the pseudonym certificate corresponding to the signature of the received read response message is legal, which may specifically include the following steps:
- the reader/writer determines the public key of the superior certificate of the pseudonym certificate corresponding to the signature of the read response message, and uses the public key of the superior certificate to decrypt the pseudonym certificate to obtain a fifth digest;
- the reader/writer calculates the sixth digest according to the content of the pseudonym certificate
- the reader/writer compares whether the fifth digest is the same as the sixth digest; if the fifth digest is the same as the sixth digest, the reader/writer determines that the pseudonym certificate corresponding to the signature of the read response message is legal, and the reader/writer passes the verification of the on-board device; otherwise The reader/writer determines that the pseudonym certificate corresponding to the signature of the read response message is invalid, and the reader/writer fails to verify the in-vehicle device.
- the reader/writer determines the superior public key of the signature of the read response message, and uses the superior public key to decrypt the signature of the read response message to obtain the seventh digest;
- the reader/writer calculates and obtains the eighth digest according to the content of the signature of the read response message
- the reader/writer compares whether the seventh digest is the same as the eighth digest; if the seventh digest is the same as the eighth digest, the reader/writer determines that the signature of the read response message is correct, and the reader/writer passes the verification of the on-board device; otherwise, the read/write The reader determines that the signature of the read response message is incorrect, and the reader fails to verify the in-vehicle device.
- S206 The reader determines that the verification of the vehicle-mounted device has passed, and decrypts the encrypted vehicle electronic identification to obtain the vehicle electronic identification.
- the reader/writer uses the reader/writer's private key to perform a first decryption process on the encrypted vehicle electronic identification to obtain the first encryption information and verification information. According to the different contents contained in the verification information, The reader/writer performs different processing after obtaining the first encrypted information and the verification information, as follows:
- the verification information includes the UID of the automotive electronic identification, then the reader determines the reading password corresponding to the UID according to the UID of the automotive electronic identification, and performs the second decryption process on the first encrypted information according to the determined reading password to obtain the automotive electronic identification. logo.
- the second decryption process may be a cryptographic operation, such as an XOR operation.
- the verification information includes the UID of the electronic vehicle identification and at least one item of third location information or third time information.
- the third location information in the verification information is the location information in the read request message received by the vehicle-mounted device
- the third time information is the time information in the read request message received by the vehicle-mounted device, such as , when the read response information sent by the vehicle-mounted device is in response to the read request message sent by the reader in S201, if the read request message includes at least one of the first location information or the first time information, then the third location information
- the third time information is the same as the first position information
- the third time information is the same as the first time information; therefore, in order to determine that the automotive electronic identification received by the reader is the automotive electronic identification requested by the read request message sent by the reader, verify the information When it contains at least one of the third position information or the third time information, the reader needs to perform the following steps:
- the reader/writer determines whether the distance between the third position indicated by the third position information and the first position indicated by the first position information in the read request message sent by the reader/writer is less than the second distance threshold; or the reader/writer Determine whether the time difference between the third time indicated by the third time information and the first time indicated by the first time information in the read request message sent by the reader is smaller than the second time threshold.
- the reader/writer determines that the distance between the third position and the first position is less than the second distance threshold, or the reader/writer determines that the time difference between the third time and the first time is less than the second time threshold, it means that the reader receives
- the received read response message is the message sent by the vehicle-mounted device in response to the read request message sent by the reader.
- the reader has the authority to read the vehicle electronic identification, then the reader determines the corresponding UID according to the UID of the vehicle electronic identification.
- the password is read, and the second decryption process is performed on the first encrypted information according to the determined read password to obtain the vehicle electronic identification.
- the third location indicated by the third location information in the verification information is the location where the vehicle-mounted device performs encryption processing on the vehicle electronic identification
- the third time indicated by the third time information is The time when the in-vehicle device encrypts the electronic identification of the car.
- the reader/writer determines whether the distance between the third position indicated by the third position information and the position where the reader/writer performs the first decryption is smaller than the first distance threshold; Whether the time difference between the indicated third time and the first time indicated by the first time information in the read request message sent by the reader is smaller than the first time threshold.
- the reader/writer determines that the distance between the third position and the position where the reader/writer performs the first decryption is smaller than the first distance threshold, or determines that the time difference between the third time and the first time is smaller than the first time
- the time threshold indicates that the reader is within the range allowed by the on-board equipment to read the electronic identification of the car, then the reader determines the read password corresponding to the UID according to the UID of the electronic identification of the car, and encrypts the first encryption according to the determined read password.
- the information is subjected to a second decryption process to obtain an electronic vehicle identification.
- the reader can also determine whether the third position and the position where the reader receives the read response message are smaller than the first distance threshold, so as to determine whether the reader is in the vehicle-mounted device to allow reading of the vehicle electronic identification. In the range.
- the reader will determine that the pseudonym certificate identification contained in the verification information is the same as the pseudonym certificate identification corresponding to the signature of the read response message, and the reader will The UID of the vehicle electronic identification is determined, and the read password corresponding to the UID is determined, and the second decryption process is performed on the first encrypted information according to the determined read password to obtain the vehicle electronic identification.
- the pseudonym certificate identifier used by the in-vehicle device can be bound to the first encrypted information, thereby preventing the middleman from maliciously obtaining the first encrypted information from the read response message and replaying it using the middleman's pseudonym certificate, resulting in the victim's interests being affected. damages, such as preventing middlemen from impersonating victims for traffic violations or using victim information to pay for road tolls.
- the reader/writer can locally store the correspondence between the UID of the vehicle electronic identification and the read password. After the reader obtains the UID of the vehicle electronic identification through the first decryption process, the reader searches for the vehicle electronic identification in the local storage. the read password corresponding to the identified UID, and perform the second decryption process on the first encrypted information according to the found read password; or
- the UID of the vehicle electronic identification that the reader has permission to read and its corresponding reading can be stored in the server. password.
- the reader/writer After obtaining the UID of the electronic vehicle identification through the first decryption process, the reader/writer sends the identification of the reader and the UID of the electronic identification of the vehicle to the server.
- the server determines the UID of the automotive electronic identification that the reader has permission to read and its corresponding read password according to the reader identification, and searches for the reading password corresponding to the UID of the automotive electronic identification sent by the reader.
- the server returns the found read password to the reader, and the reader can perform a second decryption process on the first encrypted information according to the received read password.
- the vehicle-mounted device After receiving the read request message sent by the reader and used for requesting to read the automobile electronic identification, the vehicle-mounted device verifies the reader through the read request message; After the verification of the reader is passed, the electronic identification of the car is encrypted, and the encrypted electronic identification of the automobile is sent to the reader through the read response message. Since the vehicle electronic identification is stored in the vehicle-mounted device in the embodiment of the present application, the reader is verified by using the computing power of the vehicle-mounted device which is superior to the existing electronic tag, and it is determined that the reader has the authority to read the vehicle electronic identification stored in the vehicle-mounted device. Afterwards, the car electronic identification is encrypted and sent to the reader through a read response message. Compared with the existing method of establishing a secure channel between the electronic tag and the reader, the number of rounds of information exchange is reduced and the cost is saved.
- the present application also provides some examples of automobile electronic identification transmission. Each example will be described in detail below with reference to FIGS. 3-5 .
- Example 1 Referring to Figure 3, the method for transmitting an automotive electronic identification provided by this example includes the following steps:
- the reader/writer sends a read request message to the in-vehicle device through the PC5 interface, and the read request message includes the reader/writer identifier.
- the read request message is a message signed by the reader/writer using the reader/writer's application certificate.
- the in-vehicle device determines that the locally stored legal reader identifier set includes the reader identifier, determines that the application certificate corresponding to the signature of the read request message is legal, and determines that the signature of the read request message is correct.
- the vehicle-mounted device performs a first encryption process on the vehicle electronic identifier according to the read password corresponding to the UID of the vehicle electronic identifier to obtain first encrypted information.
- the in-vehicle device uses the UID of the vehicle electronic identification as the verification information, and uses the public key of the reader/writer to perform second encryption processing on the first encrypted information and the verification information.
- the vehicle-mounted device encapsulates the encrypted vehicle electronic identification in the read response message.
- S306 The in-vehicle device sends the read response message to the reader through the PC5 interface.
- the read response message is a message that is signed by the in-vehicle device using the pseudonym certificate of the in-vehicle device.
- S307 The reader/writer verifies that the pseudonym certificate corresponding to the signature of the read response message is legal, and determines that the signature of the read response message is correct.
- the reader/writer performs a first decryption process on the encrypted vehicle electronic identification using the reader/writer's private key to obtain first encrypted information and verification information.
- the reader/writer determines a corresponding read password according to the UID of the vehicle electronic identification in the verification information, and performs second decryption processing on the first encrypted information according to the determined read password to obtain the vehicle electronic identification.
- the in-vehicle device and the reader can complete the identity verification of each other and the transmission of the vehicle's electronic identification in the process of one round of information exchange. times, thereby reducing the overhead of vehicle electronic identification transmission.
- Example 2 Referring to Figure 4, the method for transmitting an automotive electronic identification provided by this example includes the following steps:
- S401 The reader/writer sends a read request message to the in-vehicle device through the PC5 interface.
- the read request message is a message signed by the reader/writer using the reader/writer's application certificate.
- S402 The in-vehicle device verifies that the application certificate corresponding to the signature of the read request message is legal, and determines that the signature of the read request message is correct.
- the in-vehicle device performs a first encryption process on the vehicle electronic identifier according to the read password corresponding to the UID of the vehicle electronic identifier to obtain first encrypted information.
- the vehicle-mounted device uses the UID of the vehicle electronic identifier and the pseudonymous certificate identifier of the vehicle-mounted device as verification information, and uses the public key of the reader/writer to perform second encryption processing on the first encrypted information and the verification information.
- S405 The vehicle-mounted device encapsulates the encrypted vehicle electronic identification in the read response message.
- S406 The in-vehicle device sends a read response message to the reader through the PC5 interface.
- the read response message is a message that is signed by the in-vehicle device using the pseudonym certificate of the in-vehicle device.
- S407 The reader/writer verifies that the pseudonym certificate corresponding to the signature of the read response message is legal, and determines that the signature of the read response message is correct.
- the reader/writer performs a first decryption process on the encrypted vehicle electronic identification using the reader/writer's private key to obtain first encrypted information and verification information.
- S409 The reader/writer determines that the pseudonym certificate identifier in the verification information is the same as the pseudonym certificate identifier corresponding to the signature of the read response message.
- the reader/writer determines a corresponding read password according to the UID of the vehicle electronic identifier in the verification information, and performs second decryption processing on the first encrypted information according to the determined read password to obtain the vehicle electronic identifier.
- the vehicle-mounted device uses the UID of the vehicle's electronic identity and the pseudonymous certificate identifier of the vehicle-mounted device as verification information, and can bind the pseudonymous certificate identifier used by the vehicle-mounted device to the first encrypted information.
- the pseudonym certificate ID in the verification information is the same as the pseudonym certificate ID corresponding to the signature of the read response message, so as to prevent the middleman from maliciously obtaining the first encrypted information from the read response message and using the middleman's pseudonym certificate for replay. It will cause harm to the interests of victims, such as preventing middlemen from impersonating victims to commit traffic violations or using victim information to pay road tolls.
- Example 3 Referring to Figure 5, the method for transmitting an automotive electronic identification provided by this example includes the following steps:
- the reader/writer sends a read request message to the in-vehicle device through the PC5 interface, where the read request message includes first location information and first time information.
- the read request message is a message signed by the reader/writer using the reader/writer's application certificate.
- S502 The in-vehicle device verifies that the application certificate corresponding to the signature of the read request message is legal, and determines that the signature of the read request message is correct.
- the in-vehicle device determines that the distance between the first position indicated by the first location information and the position where the in-vehicle device is located when the read request message is received is smaller than the first distance threshold, and determines the first time indicated by the first time information The time difference from the time when the in-vehicle device receives the read request message is less than the first time threshold.
- the vehicle-mounted device performs a first encryption process on the vehicle electronic identifier according to the read password corresponding to the UID of the vehicle electronic identifier to obtain first encrypted information.
- the vehicle-mounted device uses the UID of the vehicle's electronic identifier, the pseudonymous certificate identifier of the vehicle-mounted device, the first location information, and the first time information as verification information, and uses the reader's public key to perform second encryption on the first encrypted information and the verification information deal with.
- S506 The vehicle-mounted device encapsulates the encrypted vehicle electronic identification in the initial read response message.
- S507 The in-vehicle device sends a read response message to the reader through the PC5 interface.
- the read response message is a message that is signed by the in-vehicle device using the pseudonym certificate of the in-vehicle device.
- S508 The reader/writer verifies that the pseudonym certificate corresponding to the signature of the read response message is legal, and determines that the signature of the read response message is correct.
- the reader/writer performs a first decryption process on the encrypted vehicle electronic identification using the reader/writer's private key to obtain first encrypted information and verification information.
- the reader/writer determines that the distance between the first position indicated by the first position information in the verification information and the first position indicated by the first position information included in the read request message is less than the second distance threshold, and determines that the verification information contains The time difference between the first time indicated by the first time information of the read request message and the first time indicated by the first time information included in the read request message is smaller than the second time threshold.
- the reader/writer determines that the pseudonym certificate identifier in the verification information is the same as the pseudonym certificate identifier corresponding to the signature of the read response message.
- the reader/writer determines a corresponding read password according to the UID of the vehicle electronic identifier in the verification information, and performs second decryption processing on the first encrypted information according to the determined read password to obtain the vehicle electronic identifier.
- the vehicle-mounted device uses the UID of the vehicle's electronic identification, the pseudonymous certificate identification of the vehicle-mounted device, the first location information and the first time information as verification information, and can use the pseudonymous certificate identification, the first location information and the first time of the vehicle-mounted device as the verification information.
- the information is bound to the first encrypted information; after receiving the read response message sent by the in-vehicle device, the reader needs to determine whether the pseudonym certificate identifier in the verification information is the same as the pseudonym certificate identifier corresponding to the signature of the read response message, and determine whether the first Whether the first position indicated by the position information is the same as the current position of the reader, and whether the first time indicated by the first time information is the same as the time when the read request message sent by the reader is judged; thereby preventing the middleman from reading the response message Maliciously obtains the first encrypted information and uses the middleman's pseudonymous certificate to replay it, resulting in damage to the interests of the victim, such as preventing the middleman from impersonating the victim to commit traffic violations or using the victim's information to pay for road tolls.
- Example 4 Referring to Figure 6, the method for transmitting an automotive electronic identification provided by this example includes the following steps:
- the reader/writer sends a read request message to the in-vehicle device through the PC5 interface, where the read request message includes first location information and first time information.
- the read request message is a message signed by the reader/writer using the reader/writer's application certificate.
- S602 The in-vehicle device verifies that the application certificate corresponding to the signature of the read request message is legal, and determines that the signature of the read request message is correct.
- the in-vehicle device determines that the distance between the first position indicated by the first location information and the position where the in-vehicle device is located when the read request message is received is smaller than the first distance threshold, and determines the first time indicated by the first time information The time difference from the time when the in-vehicle device receives the read request message is less than the first time threshold.
- the vehicle-mounted device performs a first encryption process on the vehicle electronic identifier according to the read password corresponding to the UID of the vehicle electronic identifier to obtain first encrypted information.
- the in-vehicle device uses the UID, second location information, and second time information of the vehicle electronic identification as verification information, and uses the public key of the reader to perform second encryption processing on the first encrypted information and the verification information.
- the second position indicated by the second position information is the position where the vehicle-mounted device performs encryption processing on the vehicle electronic identification
- the second time indicated by the second time information is the time at which the vehicle-mounted device performs encryption processing on the vehicle electronic identification .
- the vehicle-mounted device encapsulates the encrypted vehicle electronic identification in the initial read response message.
- S607 The in-vehicle device sends a read response message to the reader through the PC5 interface.
- the read response message is a message that is signed by the in-vehicle device using the pseudonym certificate of the in-vehicle device.
- S608 The reader/writer verifies that the pseudonym certificate corresponding to the signature of the read response message is legal, and determines that the signature of the read response message is correct.
- S609 The reader/writer performs a first decryption process on the encrypted electronic identification of the vehicle by using the private key of the reader/writer to obtain first encrypted information and verification information.
- S610 The reader/writer determines that the distance between the second location indicated by the second location information in the verification information and the location where the reader/writer performs the first decryption process is smaller than the first distance threshold, and determines that the second time information indicates The time difference between the second time and the first time indicated by the first time information is less than the first time threshold.
- the reader/writer determines a corresponding read password according to the UID of the vehicle electronic identifier in the verification information, and performs second decryption processing on the first encrypted information according to the determined read password to obtain the vehicle electronic identifier.
- the present application also provides a communication device, the structure of which is shown in FIG. 7 , including a communication unit 701 and a processing unit 702 .
- the communication apparatus 700 may be applied to the vehicle-mounted device or the reader/writer in the method for transmitting the electronic identification of the vehicle shown in FIG. 2 to FIG. 6 .
- the functions of each unit in the communication device 700 will be introduced below.
- the communication unit 701 is used for receiving and sending data.
- the communication unit 701 may also be referred to as a physical interface, a communication module, a communication interface, and an input/output interface.
- the in-vehicle device or the reader can be connected to a network cable or cable through the communication unit, thereby establishing a physical connection with other devices.
- the communication unit 701 may be a short-distance direct connection communication interface (PC5), and the in-vehicle device or the reader/writer may transmit and receive data through the PC5 interface.
- PC5 short-distance direct connection communication interface
- the processing unit 702 is configured to receive a read request message from the reader through the communication unit 701, where the read request message is used to request to read the automotive electronic identification stored in the in-vehicle device; The reader is verified, and after it is determined that the verification is passed, the vehicle electronic identification is encrypted; and a read response message is sent to the reader through the communication unit 701, and the read response message includes the encrypted of the automotive electronic identification.
- processing unit 702 is specifically configured to:
- the read password corresponding to the unique identification UID of the vehicle electronic identification perform a first encryption process on the vehicle electronic identification to obtain first encrypted information
- the verification information includes the UID
- a second encryption process is performed on the first encrypted information and the verification information using the public key of the reader/writer.
- the read request message includes at least one item of first location information or first time information, and the first location indicated by the first location information is for the reader to send the read The location where the message is requested, the first time indicated by the first time information is the time when the reader sends the read request message; the verification information also includes the first location information or the at least one item of the first time information;
- the processing unit 702 is further configured to:
- the distance between the first location indicated by the first location information and the location where the vehicle-mounted device is located when the read request message is received is smaller than the first distance or a time difference between the first time indicated by the first time information and the time when the in-vehicle device receives the read request message is determined to be less than a first time threshold.
- At least one of the first location information or the first time information is provided.
- the verification information further includes: at least one item of second location information or second time information, wherein the second location indicated by the second location information is the information that the in-vehicle device has on the vehicle.
- the position at which the electronic vehicle identification is encrypted, and the second time indicated by the second time information is the time when the vehicle electronic identification is encrypted by the vehicle-mounted device.
- the verification information further includes: a pseudonym certificate identifier of the in-vehicle device.
- the read response message is a message that has been signed based on the pseudonym certificate of the vehicle-mounted device.
- processing unit 702 when the processing unit 702 is configured to verify the reader by using the read request message, it is specifically configured to:
- the processing unit 702 is configured to determine that when the verification of the reader is passed, it is specifically configured to: determine that the first digest is the same as the second digest, and determine that the third digest is the same as the fourth digest .
- the following describes the functions of the processing unit 702 when the communication device 700 is applied to a reader/writer.
- the processing unit 702 is configured to send a read request message through the communication unit 701, where the read request message is used for requesting to read the vehicle electronic identification stored in the vehicle-mounted device, and the read request message includes information for the
- the in-vehicle device verifies the information of the reader; receives a read response message sent by the in-vehicle device through the communication unit 701, and the read response message contains the encrypted vehicle electronic identification; and through the read response
- the message verifies the in-vehicle device, and after it is determined that the verification is passed, the encrypted automotive electronic identification is decrypted to obtain the automotive electronic identification.
- processing unit 702 is specifically configured to:
- the verification information includes the unique identification UID corresponding to the automotive electronic identification ;
- a second decryption process is performed on the first encrypted information to obtain the vehicle electronic identification.
- the read request message includes at least one item of first location information or first time information, and the first location indicated by the first location information is for the reader to send the The position where the read request message is located, and the first time indicated by the first time information is the time when the reader/writer sends the read request message.
- the verification information further includes: at least one of second location information or second time information;
- the processing unit 702 is further configured to:
- the second location indicated by the second location information and the first location indicated by the first location information are smaller than a second distance threshold; or, it is determined that the time difference between the second time indicated by the second time information and the first time indicated by the first time information is smaller than the second time threshold.
- the verification information further includes: at least one of second location information or second time information;
- the processing unit 702 is further configured to:
- the reader Before the reader performs the second decryption process on the first encrypted information according to the read password corresponding to the UID, it is determined that the second position indicated by the second position information is the same as the second position indicated by the reader.
- the distance between the positions of the first decryption is less than the first distance threshold; or, it is determined that the time difference between the second time indicated by the second time information and the first time is less than the first time threshold.
- the verification information further includes a pseudonym certificate identifier; the processing unit 702 is further configured to:
- the pseudonym certificate identifier included in the verification information is the same as the pseudonym certificate identifier corresponding to the signature of the read response message.
- the read request message is a message that has been signed based on the application certificate of the reader/writer.
- processing unit 702 when the processing unit 702 is used to verify the in-vehicle device, it is specifically used to:
- the processing unit 702 is configured to determine that when the verification of the in-vehicle device is passed, the processing unit 702 is specifically configured to: determine that the fifth digest is the same as the sixth digest, and determine that the seventh digest is the same as the eighth digest.
- the present application also provides an in-vehicle device 800, which can implement the functions of the in-vehicle device in the method for transmitting an automotive electronic identity shown in FIG. 2 to FIG. 6 .
- the in-vehicle device 800 includes: a transceiver 801 , a processor 802 and a memory 803 .
- the transceiver 801 , the processor 802 and the memory 803 are connected to each other.
- the transceiver 801 , the processor 802 and the memory 803 are connected to each other through a bus 804 .
- the bus 804 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus or the like.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 8, but it does not mean that there is only one bus or one type of bus.
- the transceiver 801 is used for receiving and sending data, and realizing communication interaction with other devices.
- the processor 802 is configured to receive a read request message from the reader through the transceiver 801, where the read request message is used to request to read the automotive electronic identification stored in the in-vehicle device; through the read request The message verifies the reader, and after confirming that the verification is passed, encrypts the vehicle electronic identification; and sends a read response message to the reader through the transceiver 801, where the read response message contains The encrypted vehicle electronic identification.
- the processor 802 is specifically configured to:
- the read password corresponding to the unique identification UID of the vehicle electronic identification perform a first encryption process on the vehicle electronic identification to obtain first encrypted information
- the verification information includes the UID
- a second encryption process is performed on the first encrypted information and the verification information using the public key of the reader/writer.
- the read request message includes at least one item of first location information or first time information, and the first location indicated by the first location information is for the reader to send the read The location where the message is requested, the first time indicated by the first time information is the time when the reader sends the read request message; the verification information also includes the first location information or the at least one item of the first time information;
- the processor 802 is further configured to:
- the distance between the first location indicated by the first location information and the location where the vehicle-mounted device is located when the read request message is received is smaller than the first distance or a time difference between the first time indicated by the first time information and the time when the in-vehicle device receives the read request message is determined to be less than a first time threshold.
- At least one of the first location information or the first time information is provided.
- the verification information further includes: at least one item of second location information or second time information, wherein the second location indicated by the second location information is the information that the in-vehicle device has on the vehicle.
- the position at which the electronic vehicle identification is encrypted, and the second time indicated by the second time information is the time when the vehicle electronic identification is encrypted by the vehicle-mounted device.
- the verification information further includes: a pseudonym certificate identifier of the in-vehicle device.
- the read response message is a message that has been signed based on the pseudonym certificate of the vehicle-mounted device.
- processor 802 when the processor 802 is configured to verify the reader through the read request message, it is specifically configured to:
- the processor 802 is configured to determine that when the verification of the reader is passed, it is specifically configured to: determine that the first digest is the same as the second digest, and determine that the third digest is the same as the fourth digest .
- the present application also provides a reader/writer 900, the reader/writer 900 can implement the functions of the reader/writer in the method for transmitting an electronic identification of an automobile shown in FIG. 2-FIG. 6 .
- the reader/writer 900 includes a transceiver 901 , a processor 902 and a memory 903 .
- the transceiver 901 , the processor 902 and the memory 903 are connected to each other.
- the transceiver 901 , the processor 902 and the memory 903 are connected to each other through a bus 904 .
- the bus 904 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus or the like.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.
- the transceiver 901 is used for receiving and sending data, and realizing communication interaction with other devices.
- the processor 902 is configured to send a read request message through the transceiver 901, where the read request message is used to request to read the automotive electronic identification stored in the in-vehicle device, and the read request message includes a message for The in-vehicle device verifies the information of the reader/writer; receives a read response message sent by the in-vehicle device through the transceiver 901, the read response message includes the encrypted vehicle electronic identifier; and through the The in-vehicle device is verified by reading the response message, and after it is determined that the verification is passed, the encrypted automotive electronic identification is decrypted to obtain the automotive electronic identification.
- the processor 902 is specifically configured to:
- the verification information includes the unique identification UID corresponding to the automotive electronic identification ;
- a second decryption process is performed on the first encrypted information to obtain the vehicle electronic identification.
- the read request message includes at least one item of first location information or first time information; the first location indicated by the first location information is for the reader to send the The position where the read request message is located, and the first time indicated by the first time information is the time when the reader/writer sends the read request message.
- the verification information further includes: at least one of second location information or second time information;
- the processor 902 is further configured to:
- the second location indicated by the second location information and the first location indicated by the first location information are smaller than a second distance threshold; or, it is determined that the time difference between the second time indicated by the second time information and the first time indicated by the first time information is smaller than the second time threshold.
- the verification information further includes: at least one of second location information or second time information;
- the processor 902 is further configured to:
- the reader Before the reader performs the second decryption process on the first encrypted information according to the read password corresponding to the UID, it is determined that the second position indicated by the second position information is the same as the second position indicated by the reader.
- the distance between the positions of the first decryption is less than the first distance threshold; or, it is determined that the time difference between the second time indicated by the second time information and the first time is less than the first time threshold.
- the verification information further includes a pseudonym certificate identifier; the processor 902 is further configured to:
- the pseudonym certificate identifier included in the verification information is the same as the pseudonym certificate identifier corresponding to the signature of the read response message.
- the read request message is a message that has been signed based on the application certificate of the reader/writer.
- processor 902 when the processor 902 is used to verify the in-vehicle device, it is specifically used to:
- the processor 902 is configured to determine that when the verification of the in-vehicle device is passed, the processor 902 is specifically configured to: determine that the fifth digest is the same as the sixth digest, and determine that the seventh digest is the same as the eighth digest.
- the memory in FIGS. 8 and 9 of the present application may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
- RAM Static RAM
- DRAM Dynamic RAM
- SDRAM Synchronous DRAM
- SDRAM double data rate synchronous dynamic random access memory
- Double Data Rate SDRAM DDR SDRAM
- enhanced SDRAM ESDRAM
- synchronous link dynamic random access memory Synchlink DRAM, SLDRAM
- Direct Rambus RAM Direct Rambus RAM
- the embodiments of the present application also provide a computer program, when the computer program runs on a computer, the computer is made to execute the method for transmitting an electronic vehicle identification provided by the embodiments shown in FIG. 2 to FIG. 6 . .
- the embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a computer, the computer executes the steps shown in FIGS. 2 to 6 .
- the vehicle electronic identification transmission method provided by the illustrated embodiment.
- the storage medium may be any available medium that the computer can access.
- computer readable media may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage media or other magnetic storage devices, or be capable of carrying or storing instructions or data structures in the form of desired program code and any other medium that can be accessed by a computer.
- an embodiment of the present application further provides a chip, which is used to read a computer program stored in a memory to implement the vehicle electronic identification transmission method provided by the embodiments shown in FIG. 2 to FIG. 6 .
- an embodiment of the present application provides a chip system
- the chip system includes a processor, and is used to support a computer device to realize the functions involved in the vehicle-mounted device or the reader/writer in the embodiments shown in FIG. 2 to FIG. 6 .
- the chip system further includes a memory for storing necessary programs and data of the computer device.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
- computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
- These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
- the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
本申请实施例提供了一种汽车电子标识传输方法、车载设备与读写器。在该方法中,车载设备接收来自读写器的读请求消息,该读请求消息用于请求读取车载设备中存储的汽车电子标识。车载设备收到读请求消息后,通过读请求消息对读写器进行验证,确定验证通过后,对汽车电子标识进行加密处理;然后,车载设备向读写器发送读响应消息,读响应消息中包含加密后的汽车电子标识。通过该方案,利用车载设备优于现有电子标签的计算能力,对读写器进行验证,确定读写器有权限读取车载设备存储的汽车电子标识后,加密汽车电子标识并通过读响应消息发送给读写器,相比现有方式,减少信息交互的轮次,节省开销,同时提高汽车电子标识传输的安全性。
Description
本申请涉及车联网技术领域,具体涉及一种汽车电子标识传输方法、车载设备与读写器。
汽车电子标识(electronic registration identification of the motor vehicle,ERI)是物联网无源射频识别(Radio Frequency Identification,RFID)在智慧交通领域的延伸,ERI具体可以为存储在电子标签中的车牌号码等车辆信息。其中电子标签为可以附着于车辆上的芯片,电子标签也可以称为汽车电子身份证、汽车数字化标准信源,俗称“电子车牌”。置于其他交通基础设施中的读写器通过与电子标签交互获取电子标签中存储的汽车电子标识,从而实现自动、非接触、不停车的车辆识别和监控。
安装了电子标签的车辆在经过卡口、重要路口,或是安装有路侧单元的地方时,这些地方设置的读写器向电子标签发射超高频电磁波,电子标签将接收到的超高频电磁波转换为电能,启动芯片工作,芯片验证读写器身份等信息之后,将所要求的信息发回给读写器,再由读写器将这些信息发回指挥中心。
实际使用中,电子标签在向读写器返回读写器要求的信息之前,需要进行鉴权,并在鉴权通过后,与读写器建立安全通道。具体的,读写器向电子标签请求随机数,并将获取到的随机数与针对电子标签的读口令进行密码学运算得到访问命令开启权限信息;读写器向电子标签发送访问命令开启权限信息,电子标签根据针对读写器的读口令对接收到的访问命令开启权限信息进行密码学运算,若能够得到所述随机数,则确定读写器有权限读取电子标签中存储的车辆信息,电子标签可以接受读写器的读命令。可见,读写器在读取电子标签存储的车辆信息之前,需要通过多轮次的交互以建立安全通道,交互消息数量过多,开销较大。
发明内容
本申请提供了一种汽车电子标识传输方法、车载设备与读写器,用以提高汽车电子标识传输的安全性,同时减少信息交互的轮次,节省开销。
第一方面,本申请实施例提供一种汽车电子标识传输方法。车载设备接收来自读写器的读请求消息,该读请求消息用于请求读取车载设备中存储的汽车电子标识。车载设备收到读请求消息后,通过读请求消息对所述读写器进行验证,确定验证通过后,对所述汽车电子标识进行加密处理;然后,车载设备向读写器发送读响应消息,读响应消息中包含加密后的汽车电子标识。
在以上方法中,将汽车电子标识存储在车载设备中,利用车载设备优于现有电子标签的计算能力,对读写器进行验证,确定读写器有权限读取车载设备存储的汽车电子标识后,加密汽车电子标识并通过读响应消息发送给读写器,相比现有电子标签与读写器建立安全通道的方式,减少信息交互的轮次,节省开销,同时提高汽车电子标识传输的安全性。
在一个可能的设计中,所述车载设备可以通过以下方式对所述汽车电子标识进行加密处理:所述车载设备根据所述汽车电子标识的唯一身份标识UID对应的读口令,对所述汽车电子标识进行第一加密处理,得到第一加密信息;所述车载设备确定验证信息,所述验证信息中包括所述UID;所述车载设备使用所述读写器的公钥对所述第一加密信息和所述验证信息进行第二加密处理。
通过该设计,车载设备首先根据汽车电子标识的UID对应的读口令对汽车电子标识进行第一加密处理,得到第一加密信息,再使用读写器的公钥对第一加密信息和验证信息进行第二加密处理,经过两次加密处理,提升传输汽车电子标识过程的安全性。
在一个可能的设计中,所述读请求消息包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间;
所述车载设备通过所述读请求消息对所述读写器进行验证,包括:所述车载设备确定所述第一位置信息所指示的第一位置与所述车载设备接收到所述读请求消息时所处的位置之间的距离小于第一距离阈值;或者所述车载设备确定所述第一时间信息所指示的第一时间与所述车载设备接收到所述读请求消息的时间之间的时间差值小于第一时间阈值。
通过该设计,读请求消息中还可以携带第一位置信息或第一时间信息中的至少一项,车载设备可以通过判断接收到读请求消息时自身所处的位置以及时间确定与读写器之间的距离,以及读请求消息传输的时间,从而确定读写器是否在有权限读取汽车电子标识的范围内,进而防止恶意获取汽车电子标识的情况。
在一个可能的设计中,所述验证信息还包括:所述第一位置信息或所述第一时间信息中的至少一项。
通过该设计,验证信息中包括第一位置信息或第一时间信息中的至少一项,从而使读写器在解密得到验证信息后,能够根据第一位置信息或第一时间信息判断接收到的读响应消息是否对应与读写器发送的读请求消息,从而防止恶意获取汽车电子标识的情况。
在一个可能的设计中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项,其中,所述第二位置信息所指示的第二位置为所述车载设备对所述汽车电子标识进行加密处理时所处的位置,所述第二时间信息所指示的第二时间为所述车载设备对所述汽车电子标识进行加密处理的时间。
通过该设计,验证信息中包括第二位置信息或第二时间信息中的至少一项,从而使读写器在解密得到验证信息后,能够根据第二位置信息或第二时间信息判断是否在有权限读取汽车电子标识的范围内,提升汽车电子标识传输的安全性。
在一个可能的设计中,所述验证信息还包括所述车载设备的假名证书标识。
通过该设计,将车载设备的假名证书标识作为验证信息的一部分,能够将车载设备使用的假名证书标识与第一加密信息绑定,从而防止中间人从读响应消息中恶意获取第一加密信息并使用中间人的假名证书进行重放,导致受害者利益受损,如防止中间人假冒受害者进行交通违规行为或使用受害者信息支付道路费用等,进一步提高安全性。
在一个可能的设计中,所述读响应消息为经过基于所述车载设备的假名证书进行签名处理后的消息。
通过该设计,车载设备使用车载设备的假名证书对读响应消息进行签名处理,防止中间人恶意获取汽车电子标识。
在一个可能的设计中,所述车载设备根据以下方式通过所述读请求消息对所述读写器进行验证:
所述车载设备确定所述读请求消息的签名对应的应用证书的上级证书公钥,使用所述上级证书公钥对所述应用证书进行解密处理,得到第一摘要,所述车载设备根据所述应用证书的内容计算得到第二摘要,比较所述第一摘要与所述第二摘要是否相同;以及所述车载设备确定所述读请求消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第三摘要,所述车载设备根据所述签名内容计算得到第四摘要,比较所述第三摘要与所述第四摘要是否相同;
所述车载设备通过以下方式确定对所述读写器验证通过:所述车载设备确定所述第一摘要与所述第二摘要相同,以及所述车载设备确定所述第三摘要与所述第四摘要相同。
通过该设计,车载设备在接收到读请求消息后,车载设备首先验证读请求消息的签名对应的应用证书合法,再确定读请求消息的签名正确,进而确定对读写器验证通过,相比于现有的汽车标识传输方法,在传输读请求消息和读响应消息的一轮次信息交互中即完成对读写器的验证过程,减少信息交互轮次,提高效率。
第二方面,本申请实施例提供了一种汽车电子标识传输方法。读写器向车载设备发送读请求消息,该读请求消息用于请求读取所述车载设备中存储的汽车电子标识,并且所述读请求消息中包括用于所述车载设备验证所述读写器的信息;然后,读写器接收所述车载设备发送的读响应消息,该读响应消息中包含加密后的汽车电子标识;读写器通过所述读响应消息对所述车载设备进行验证,确定验证通过后,对加密后的所述汽车电子标识进行解密处理,获取汽车电子标识。
在以上方法中,读写器向车载设备发送读请求消息后,接收车载设备发送的读响应消息,在读响应消息中包含加密后的汽车电子标识。读写器对车载设备进行验证通过后,解密获取汽车电子标识,也就是说,在一次信息交互过程中,读写器完成对车载设备的验证以及获取汽车电子标识的步骤,减少信息交互的轮次,减少开销。
在一个可能的设计中,所述读写器通过以下方式对加密后的所述汽车电子标识进行解密处理,得到所述汽车电子标识:所述读写器使用所述读写器的私钥对加密后的所述汽车电子标识进行第一解密处理,得到第一加密信息和验证信息;所述验证信息中包括所述汽车电子标识的唯一身份标识UID;所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理,得到所述汽车电子标识。
通过该设计,读写器先使用读写器的私钥对加密后的汽车电子标识进行第一解密处理,再使用UID对应的读口令进行第二解密处理,获取汽车电子标识,保证了汽车电子标识只能由具有权限的读写器进行解密,从而防止中间人恶意获取汽车电子标识。
在一个可能的设计中,所述读请求消息中包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间。
通过该设计,读请求消息中包括第一位置信息或第一时间信息中的至少一项,从而使车载设备获知读写器发送读请求消息时所处的位置以及时间,进而判断读写器是否在有权限读取汽车电子标识的范围内,进而防止恶意获取汽车电子标识的情况。
在一个可能的设计中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;在所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理 之前,所述读写器确定所述第二位置信息所指示的第二位置与所述第一位置信息所指示的第一位置之间的距离小于第二距离阈值;或者所述读写器确定所述第二时间信息所指示的第二时间与所述第一时间信息所指示的第一时间之间的时间差值小于第二时间阈值。
通过该设计,验证信息中还包含第二位置信息或第二时间信息中的至少一项时,读写器通过对位置信息和时间信息进行验证,确定读写器接收到汽车电子标识是读写器发送读请求消息用于获取的汽车电子标识,进一步防止其它中间人恶意获取汽车电子标识并在异地重放,导致受害者利益受损。
在一个可能的设计中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;
所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,所述读写器确定所述第二位置信息所指示的第二位置与所述读写器执行所述第一解密时所处的位置之间的距离小于第一距离阈值;或者所述读写器确定所述第二时间信息所指示的第二时间与所述第一时间之间的时间差值小于第一时间阈值。
通过该设计,验证信息中还包括第二位置信息或第二时间信息,读写器通过第二位置和第二时间确定读写器接收到读响应消息时,处于有权限读取汽车电子标识的范围内,防止中间人恶意获取汽车电子标识并在异地重放。
在一个可能的设计中,所述验证信息还包括假名证书标识;在所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,所述读写器确定所述验证信息包含的假名证书标识与所述读响应消息的签名对应的假名证书标识相同。
通过该设计,读写器在确定验证信息包含的假名证书标识与所述读响应消息的签名对应的假名证书标识相同后,才能对第一加密信息进行第二解密处理获取汽车电子标识,防止中间人从读响应消息中恶意获取第一加密信息并使用中间人的假名证书进行重放,导致受害者利益受损,如防止中间人假冒受害者进行交通违规行为或使用受害者信息支付道路费用等。
在一个可能的设计中,所述读请求消息为经过基于所述读写器的应用证书进行签名处理后的消息。
通过该设计,读写器使用读写器的应用证书对读请求消息进行签名处理,提高汽车电子标识传输过程的安全性。
在一个可能的设计中,读写器可以通过以下方式对所述车载设备进行验证:所述读写器确定所述读响应消息的签名对应的假名证书的上级证书公钥,使用所述上级证书公钥对所述假名证书进行解密处理,得到第五摘要,所述读写器根据所述假名证书的内容计算得到第六摘要,比较所述第五摘要与所述第六摘要是否相同;以及所述读写器确定所述读响应消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第七摘要,所述读写器根据所述签名内容计算得到第八摘要,比较所述第七摘要与所述第八摘要是否相同;
读写器可以通过以下方式确定对所述车载设备验证通过:所述读写器确定所述第五摘要与所述第六摘要相同,以及所述读写器确定所述第七摘要与所述第八摘要相同。
通过该设计,读写器在接收到读响应消息后,首先验证读响应消息的签名对应的假名应用证书合法,再确定读响应消息的签名正确,进而确定对车载设备验证通过,相比于现有的汽车标识传输方法,在传输读请求消息和读响应消息的一轮次信息交互中即完成对车 载设备的验证过程,减少信息交互轮次,提高效率。
第三方面,本申请实施例提供一种通信装置,包括用于执行以上任一方面中各个步骤的单元。
第四方面,本申请实施例提供一种车载设备,包括至少一个处理元件和至少一个存储元件,其中该至少一个存储元件用于存储程序和数据,该至少一个处理元件用于执行本申请以上第一方面提供的方法。
第五方面,本申请实施例提供一种读写器,包括至少一个处理元件和至少一个存储元件,其中该至少一个存储元件用于存储程序和数据,该至少一个处理元件用于执行本申请以上第二方面提供的方法。
第六方面,本申请实施例提供一种通信系统,包括车载设备和读写器,其中,所述车载设备具有执行本申请第一方面提供的方法的功能,所述读写器具有执行本申请第二方面提供的方法的功能。
第七方面,本申请实施例还提供一种计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述任一方面提供的方法。
第八方面,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机程序,当所述计算机程序被计算机执行时,使得所述计算机执行上述任一方面提供的方法。
第九方面,本申请实施例还提供一种芯片,所述芯片用于读取存储器中存储的计算机程序,执行上述任一方面提供的方法。
第十方面,本申请实施例还提供一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现上述任一方面提供的方法。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器用于保存该计算机装置必要的程序和数据。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
图1为一种车联网场景示意图;
图2为本申请实施例提供的一种汽车电子标识传输方法的流程图;
图3为本申请实施例提供的第一种汽车电子标识传输实例的流程图;
图4为本申请实施例提供的第二种汽车电子标识传输实例的流程图;
图5为本申请实施例提供的第三种汽车电子标识传输实例的流程图;
图6为本申请实施例提供的第四种汽车电子标识传输实例的流程图;
图7为本申请实施例提供的一种通信装置的结构示意图;
图8为本申请实施例提供的一种车载设备的结构示意图;
图9为本申请实施例提供的一种读写器的结构示意图。
为了方便理解本申请实施例,下面介绍与本申请实施例相关的术语:
1)射频识别技术(Radio Frequency Identification,RFID),是一种自动识别技术,能够通过无线射频方式进行非接触双向数据通信。例如:读写器利用无线射频方式对电子标 签中存储的数据进行读写,从而达到识别目标和数据交换的目的。
电子标签与读写器之间通过耦合元件实现射频信号的无接触耦合,在耦合通道内,根据时序关系实现能量的传递和数据交换。
电子标签又称为射频标签、应答器、数据载体,由耦合元件及芯片组成,每个电子标签具有唯一的电子编码,高容量电子标签具有可供数据写入的存储空间。电子标签附着在物体上以标识目标对象,电子标签内存有电子标签的唯一身份标识(Unique Identity document,UID)以及电子标签所标识的目标对象的信息。例如,当电子标签附着在车辆上时,电子标签所标识的目标对象的信息为汽车电子标识,包含该车辆的车辆信息,具体可以为车辆号牌、车证信息等。
读写器又称为阅读器、扫描器、通信器,为对电子标签进行读取或写入操作的设备,可设计为手持式或固定式。如读写器可以安装于卡口、重要路口或路侧单元,通过与过往车辆上附着的电子标签交互获取过往车辆的车辆信息。
2)公钥和私钥,为加密算法中的密钥对。其中,公钥向外界公开,用于外界进行加密;私钥本地保留,用于解密。
3)车载设备,放置或安装在车辆上的,用于进行信息处理和信息交互的设备。本申请实施例中车载设备为具有通信能力的设备。例如,一种车载设备为车载远程信息处理器(Telematics Box,T-Box),一般安装在车辆上,路边架设路侧单元(road side unit,RSU),RSU中安装有读写器,T-Box可以与读写器进行通信,例如T-Box采用专用短距离通信(dedicated short range communications,DSRC)技术,与读写器建立微波通信链路,在车辆行进的途中,在不停车的情况下,实现车辆的身份识别等过程。
需要说明的是,本申请中所涉及的多个,是指两个或两个以上。至少一个,是指一个或一个以上。
另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。
本申请实施例提供的技术方案可以应用于如图1所示的车联网场景,每个车辆上均附着有对应的电子标签,电子标签中存储有电子标签的UID以及每个车辆对应的汽车电子标识。图1中所示的车联网场景包括安装有电子标签的车辆和读写器。
车辆在行驶进入到读写器的检测范围内时,读写器向车辆上安装的电子标签发送读请求消息;电子标签对读写器进行鉴权,具体可以为单向鉴权或双向鉴权。电子标签对读写器鉴权通过后,电子标签生成一个随机数,并将该随机数发送给读写器;读写器确定的电子标签对应的读口令,对该读口令和随机数做密码学运算得到访问命令开启权限信息,读写器将访问命令开启权限信息发送给电子标签。
电子标签确定读写器对应的读口令,对访问命令开启权限信息进行解密处理,得到随机数;若确定解密处理得到的随机数与电子标签发送给读写器的随机数相同,则电子标签与读写器建立安全通道,代表读写器有权限对电子标签中存储的汽车电子标识进行读取或写入,则电子标签将读写器想要读取的汽车电子标识发送给读写器。
根据上述内容可知,读写器在读取电子标签存储的汽车电子标识之前,需要与电子标签进行多轮次的信息交互,开销较大。
基于上述问题,本申请实施例提供一种汽车电子标识传输方法,将电子标签融合到车载设备中,具体可以将电子标签作为虚拟模块融合到车载设备中,车载设备为车辆上安装的用于进行信息处理和信息交互的设备,例如可以为车载远程信息处理器(Telematics Box,T-Box)。
图2中示出了本申请实施例提供的一种汽车电子标识传输方法,该方法包括以下步骤:
S201:读写器向车载设备发送读请求消息,读请求消息用于请求读取车载设备中存储的汽车电子标识。
一种可选的实施方式中,读写器在检测到车载设备进入到读写器的检测范围时,向车载设备发送读请求消息;或者,读写器周期性广播读请求消息。
可选的,读写器与车载设备可以通过短距离直连通信接口进行交互,如读写器可以与车载设备建立sidelink连接,并通过PC5接口向车载设备发送读请求消息。
可选的,读请求消息中可以包含读写器标识,用于指示读写器身份。另外,读请求消息中还可以包括第一位置信息或第一时间信息中的至少一项,其中,第一位置信息所指示的第一位置为读写器发送读请求消息时所处的位置,第一时间信息所指示的第一时间为读写器发送读请求消息时的时间。通过该设计,读写器可以将发送读请求消息时自身的位置信息和时间信息通过读请求消息发送给车载设备,从而使车载设备获取更多的读写器信息,以判断读写器是否具有读取汽车电子标识的权限,进一步提高安全性。
一种可能的实施方式中,读写器在向车载设备发送读请求消息之前,读写器可以使用读写器的应用证书对初始读请求消息进行签名处理后得到读请求消息,以确保读请求消息不被攻击者篡改,提高数据传输的安全性。
S202:车载设备通过读请求消息对读写器进行验证。
一种可能的实施方式中,车载设备对读写器进行以下验证:
1)车载设备验证读写器是否合法。
在车载设备接收到的读请求消息中包括读写器标识的情况下,车载设备可以在本地存储的允许读取汽车电子标识的合法读写器标识集合中,查找是否存在读请求消息中的读写器标识,若合法读写器标识集合中存在读请求消息中的读写器标识,则车载设备对读写器验证通过,否则,车载设备对读写器验证不通过。
由于允许读取汽车电子标识的合法读写器数量可能较多,还可以由服务器存储车载设备对应的合法读写器标识集合,车载设备可以将读请求消息中的读写器标识发送给服务器,服务器在该车载设备对应的合法读写器标识集合中查找车载设备发送的读写器标识,若该合法读写器标识集合中存在车载设备发送的读写器标识,则服务器向车载设备发送读写器合法的通知消息,车载设备对读写器验证通过;否则,服务器向车载设备发送读写器非法的通知消息,车载设备对读写器验证不通过。
2)车载设备验证读写器使用的应用证书是否合法。
根据上述对读请求消息的介绍可知,在读写器对初始读请求消息进行签名处理得到读请求消息的情况下,读写器使用的应用证书为读请求消息的签名对应的应用证书。因此,在验证过程中,车载设备可以验证读请求消息的签名对应的应用证书是否合法,具体可以包括以下步骤:
车载设备确定读请求消息的签名对应的应用证书的上级证书公钥,并使用上级证书公钥对应用证书进行解密处理,得到第一摘要;
车载设备根据应用证书的内容计算得到第二摘要;
车载设备比较第一摘要与第二摘要是否相同;若第一摘要与第二摘要相同,则车载设备确定读请求消息的签名对应的应用证书合法,车载设备对读写器验证通过;否则车载设备确定读请求消息的签名对应的应用证书不合法,车载设备对读写器验证不通过。
3)车载设备验证读请求消息的签名是否正确。
具体可以包括以下步骤:
车载设备确定读请求消息的签名的上级公钥,使用该上级公钥对读请求消息的签名进行解密处理,得到第三摘要;
车载设备根据签名内容计算得到第四摘要;
车载设备比较第三摘要与第四摘要是否相同;若第三摘要与第四摘要相同,则车载设备确定读请求消息的签名正确,车载设备对读写器验证通过;否则车载设备确定读请求消息的签名不正确,车载设备对读写器验证不通过。
一种可选的实施方式中,若读请求消息中包括第一位置信息或第一时间信息中的至少一项,则车载设备在对读写器进行验证时,还需要进行以下验证:
车载设备确定第一位置信息所指示的第一位置与车载设备接收到读请求消息时所处的位置之间的距离小于第一距离阈值,这表示车载设备所属的车辆与读写器之间的距离小于第一距离阈值,也就是说,车载设备与读写器之间的距离在检测允许的范围内,读写器有权限读取车载设备存储的汽车电子标识;或者
车载设备确定第一时间信息所指示的第一时间与车载设备接收到读请求消息的时间之间的时间差值小于第一时间阈值,这表示车载设备接收到读请求消息的时间与读写器发送读请求消息的时间之间的时间差值小于第一时间阈值,也就说,车载设备接收到的读请求消息在有效时间范围内,读写器有权限读取车载设备存储的汽车电子标识。
通过以上设计,车载设备能够确定接收到的读请求消息是与车载设备处于检测允许范围内的读写器,在有效时间范围内发送的读请求消息,可以防止处于异地的读写器恶意获取汽车电子标识,导致车辆信息泄露或危害车主利益。
S203:车载设备确定对读写器验证通过后,对汽车电子标识进行加密处理。
一种可选的实施方式中,车载设备根据下列方式对汽车电子标识进行加密处理:
车载设备根据汽车电子标识的UID对应的读口令对汽车电子标识进行第一加密处理,得到第一加密信息。可选的,第一加密处理可以为密码学运算,例如异或运算。
车载设备获取到第一加密信息后,确定验证信息,并对第一加密信息和验证信息进行第二加密处理。具体的,验证信息包含汽车电子标识的UID。
一种可选的实施方式中,验证信息中还可以包括以下内容中的至少一项:
1)车载设备的假名证书标识。
车载设备的假名证书为车载设备在通信中可以用于暂时标识身份的证书。
2)第一位置信息或第一时间信息中的至少一项。
若车载设备接收到的读请求消息中包含第一位置信息或第一时间信息中的至少一项,则验证信息中还可以包含第一位置信息或第一时间信息中的至少一项。
3)第二位置信息或第二时间信息中的至少一项。
第二位置信息所指示的第二位置为车载设备对汽车电子标识进行加密处理时所处的 位置,第二时间信息所指示的第二时间为车载设备对汽车电子标识进行加密处理的时间。可以理解的是,车载设备在接收到读写器发送的读请求消息后,车载设备对读写器进行验证、对汽车电子标识进行加密处理以及车载设备向读写器发送读响应消息等步骤之间的时间间隔均较短,因此,可以将车载设备对汽车电子标识进行加密处理时所处的位置以及时间作为车载设备向读写器发送读响应消息时所处的位置以及时间。从而使得读写器在获取到读响应消息中的第二位置信息或第二时间信息中的至少一项时,能够判断读写器是否在车载设备允许的读取汽车电子标识的范围内,进一步提高汽车电子标识传输的安全性。
S204:车载设备向读写器发送读响应消息,该读响应消息中包含加密后的汽车电子标识。
一种可选的实施方式中,车载设备在向读写器发送读响应消息之前,使用车载设备的假名证书对初始读响应消息进行签名处理,得到读响应消息,以确保读响应消息不被攻击者篡改,提高数据传输的安全性。
S205:读写器通过读响应消息对车载设备进行验证。
一种可选的实施方式中,读写器对车载设备进行以下验证:
1)读写器验证车载设备的假名证书是否合法。
具体实施中,在车载设备对初始读响应消息进行签名处理,得到读响应消息的情况下,车载设备使用车载设备的假名证书对初始读响应消息进行签名处理。因此,在验证过程中,读写器可以验证接收到的读响应消息的签名对应的假名证书是否合法,具体可以包括以下步骤:
读写器确定读响应消息的签名对应的假名证书的上级证书公钥,并使用该上级证书公钥对假名证书进行解密处理,得到第五摘要;
读写器根据假名证书的内容计算得到第六摘要;
读写器比较第五摘要与第六摘要是否相同;若第五摘要与第六摘要相同,则读写器确定读响应消息的签名对应的假名证书合法,读写器对车载设备验证通过;否则读写器确定读响应消息的签名对应的假名证书不合法,读写器对车载设备验证不通过。
2)读写器验证读响应消息的签名是否正确。
具体可以包括以下步骤:
读写器确定读响应消息的签名的上级公钥,使用该上级公钥对读响应消息的签名进行解密处理,得到第七摘要;
读写器根据读响应消息的签名的内容计算得到第八摘要;
读写器比较第七摘要与所述第八摘要是否相同;若第七摘要与第八摘要相同,则读写器确定读响应消息的签名正确,读写器对车载设备验证通过;否则读写器确定读响应消息的签名不正确,读写器对车载设备验证不通过。
S206:读写器确定对车载设备验证通过,对加密后的汽车电子标识进行解密处理,获取汽车电子标识。
一种可选的实施方式中,读写器使用读写器的私钥对加密后的汽车电子标识进行第一解密处理,得到第一加密信息和验证信息,根据验证信息中包含的内容不同,读写器在获取到第一加密信息和验证信息后执行的处理不同,具体如下:
1)验证信息中包括汽车电子标识的UID,则读写器根据汽车电子标识的UID,确定UID对应的读口令,根据确定出的读口令对第一加密信息进行第二解密处理,得到汽车电 子标识。
可选的,第二解密处理可以为密码学运算,例如异或运算。
2)验证信息中包括汽车电子标识的UID以及第三位置信息或第三时间信息中的至少一项。
一种可选的实施方式中,验证信息中的第三位置信息为车载设备接收到的读请求消息中的位置信息,第三时间信息为车载设备接收到的读请求消息中的时间信息,例如,车载设备发送的读响应信息是响应于S201中读写器发送的读请求消息时,若该读请求消息中包括第一位置信息或第一时间信息中的至少一项,则第三位置信息与第一位置信息相同,第三时间信息与第一时间信息相同;因此,为确定读写器接收到的汽车电子标识是该读写器发送的读请求消息请求的汽车电子标识,在验证信息中包含第三位置信息或第三时间信息中的至少一项时,读写器需要执行下列步骤:
读写器判断第三位置信息所指示的第三位置与读写器发送的读请求消息中的第一位置信息所指示的第一位置之间的距离是否小于第二距离阈值;或者读写器判断第三时间信息所指示的第三时间与读写器发送的读请求消息中的第一时间信息所指示的第一时间之间的时间差值是否小于第二时间阈值。
读写器确定第三位置与第一位置之间的距离小于第二距离阈值,或者读写器确定第三时间与第一时间之间的时间差值小于第二时间阈值,表示读写器接收到的读响应消息是车载设备响应于该读写器发送的读请求消息后发送的消息,读写器有权限读取汽车电子标识,则读写器根据汽车电子标识的UID,确定UID对应的读口令,并根据确定出的读口令对第一加密信息进行第二解密处理,得到汽车电子标识。
另一种可选的实施方式中,验证信息中第三位置信息所指示的第三位置为车载设备对汽车电子标识进行加密处理时所处的位置,第三时间信息所指示的第三时间为车载设备对汽车电子标识进行加密处理的时间。这种情况下,读写器需要执行下列步骤:
读写器判断第三位置信息所指示的第三位置与读写器执行所述第一解密时所处的位置之间的距离是否小于第一距离阈值;或者读写器判断第三时间信息所指示的第三时间与读写器发送的读请求消息中的第一时间信息所指示的第一时间之间的时间差值是否小于第一时间阈值。
读写器确定第三位置与读写器执行所述第一解密时所处的位置之间的距离小于第一距离阈值,或者确定第三时间与第一时间之间的时间差值小于第一时间阈值,表示读写器处于车载设备允许的读取汽车电子标识的范围内,则读写器根据汽车电子标识的UID,确定UID对应的读口令,并根据确定出的读口令对第一加密信息进行第二解密处理,得到汽车电子标识。
需要说明的是,读写器还可以判断第三位置与读写器接收读响应消息时所处的位置是否小于第一距离阈值,以判断读写器是否处于车载设备允许的读取汽车电子标识的范围内。
通过以上设计,能够防止中间人恶意获取第一加密信息并在异地重放,导致受害者利益受损,如防止中间人在不同的城市重放第一加密信息,假冒受害者进行交通违规行为或使用受害者信息支付道路费用等。
3)若验证信息中包括汽车电子标识的UID以及车载设备的假名证书标识,则读写器确定验证信息包含的假名证书标识与读响应消息的签名对应的假名证书标识相同后,读写器根据汽车电子标识的UID,确定UID对应的读口令,并根据确定出的读口令对第一加密 信息进行第二解密处理,得到汽车电子标识。
通过以上设计,能够将车载设备使用的假名证书标识与第一加密信息绑定,从而防止中间人从读响应消息中恶意获取第一加密信息并使用中间人的假名证书进行重放,导致受害者利益受损,如防止中间人假冒受害者进行交通违规行为或使用受害者信息支付道路费用等。
需要说明的是,读写器可以在本地存储汽车电子标识的UID与读口令的对应关系,读写器在通过第一解密处理获取到汽车电子标识的UID后,在本地存储中查找该汽车电子标识的UID对应的读口令,并根据查找到的读口令对第一加密信息进行第二解密处理;或者
由于汽车电子标识的UID与读口令的对应关系可能数量较多,读写器在本地维护困难,则可以在服务器中存储该读写器有权限读取的汽车电子标识的UID及其对应的读口令。读写器在通过第一解密处理获取到汽车电子标识的UID后,将读写器标识以及汽车电子标识的UID发送给服务器。服务器根据读写器标识确定读写器有权限读取的汽车电子标识的UID及其对应的读口令,并查找读写器发送的汽车电子标识的UID对应的读口令。服务器将查找到的读口令返回给读写器,读写器可以根据接收到的读口令对第一加密信息进行第二解密处理。
本申请实施例提供的汽车电子标识传输方法,车载设备在接收到读写器发送的用于请求读取汽车电子标识的读请求消息后,通过读请求消息对读写器进行验证;车载设备确定对读写器验证通过后,对汽车电子标识进行加密,并通过读响应消息将加密后的汽车电子标识发送给读写器。由于本申请实施例将汽车电子标识存储在车载设备中,利用车载设备优于现有电子标签的计算能力,对读写器进行验证,确定读写器有权限读取车载设备存储的汽车电子标识后,加密汽车电子标识并通过读响应消息发送给读写器,相比现有电子标签与读写器建立安全通道的方式,减少信息交互的轮次,节省开销。
基于以上实施例,本申请还提供一些汽车电子标识传输实例。下面结合图3-图5对每个实例进行详细说明。
实例一:参考图3所示,本实例提供的汽车电子标识传输方法包括以下步骤:
S301:读写器通过PC5接口向车载设备发送读请求消息,读请求消息中包含读写器标识。
其中,读请求消息为读写器使用读写器的应用证书进行签名处理后的消息。
S302:车载设备确定本地存储的合法读写器标识集合中包括读写器标识,确定读请求消息的签名对应的应用证书合法,以及确定读请求消息的签名正确。
具体过程可以参考图2所示的实施例中的S202中的具体描述,此处不再赘述。
S303:车载设备根据汽车电子标识的UID对应的读口令,对汽车电子标识进行第一加密处理,得到第一加密信息。
S304:车载设备将汽车电子标识的UID作为验证信息,使用读写器的公钥对第一加密信息和验证信息进行第二加密处理。
S305:车载设备将加密后的汽车电子标识封装在读响应消息中。
S306:车载设备通过PC5接口将读响应消息发送给读写器。
其中,读响应消息为车载设备使用车载设备的假名证书进行签名处理后的消息。
S307:读写器验证读响应消息的签名对应的假名证书合法,以及确定读响应消息的签 名正确。
具体过程可以参考图2所示的实施例中的S205中的具体描述,此处不再赘述。
S308:读写器使用读写器的私钥对加密后的汽车电子标识进行第一解密处理,得到第一加密信息和验证信息。
S309:读写器根据验证信息中的汽车电子标识的UID确定对应的读口令,根据确定出的读口令对第一加密信息进行第二解密处理,得到汽车电子标识。
通过本实例,车载设备与读写器可以在一轮信息交互的过程中,完成对对方的身份验证以及汽车电子标识的传输,在保证汽车电子标识传输的机密性的同时,减少信息交互的轮次,进而减小汽车电子标识传输的开销。
实例二:参考图4所示,本实例提供的汽车电子标识传输方法包括以下步骤:
S401:读写器通过PC5接口向车载设备发送读请求消息。
其中,读请求消息为读写器使用读写器的应用证书进行签名处理后的消息。
S402:车载设备验证读请求消息的签名对应的应用证书合法,以及确定读请求消息的签名正确。
具体过程可以参考图2所示的实施例中的S202中的具体描述,此处不再赘述。
S403:车载设备根据汽车电子标识的UID对应的读口令,对汽车电子标识进行第一加密处理,得到第一加密信息。
S404:车载设备将汽车电子标识的UID以及车载设备的假名证书标识作为验证信息,使用读写器的公钥对第一加密信息和验证信息进行第二加密处理。
S405:车载设备将加密后的汽车电子标识封装在读响应消息中。
S406:车载设备通过PC5接口将读响应消息发送给读写器。
其中,读响应消息为车载设备使用车载设备的假名证书进行签名处理后的消息。
S407:读写器验证读响应消息的签名对应的假名证书合法,以及确定读响应消息的签名正确。
具体过程可以参考图2所示的实施例中的S205中的具体描述,此处不再赘述。
S408:读写器使用读写器的私钥对加密后的汽车电子标识进行第一解密处理,得到第一加密信息和验证信息。
S409:读写器确定验证信息中的假名证书标识与读响应消息的签名对应的假名证书标识相同。
S410:读写器根据验证信息中的汽车电子标识的UID确定对应的读口令,并根据确定出的读口令对第一加密信息进行第二解密处理,得到汽车电子标识。
通过本实例,车载设备将汽车电子标识的UID以及车载设备的假名证书标识作为验证信息,能够将车载设备使用的假名证书标识与第一加密信息绑定,读写器在接收到车载设备发送的读响应消息后,需要判断验证信息中的假名证书标识与读响应消息的签名对应的假名证书标识是否相同,从而防止中间人从读响应消息中恶意获取第一加密信息并使用中间人的假名证书进行重放,导致受害者利益受损,如防止中间人假冒受害者进行交通违规行为或使用受害者信息支付道路费用等。
实例三:参考图5所示,本实例提供的汽车电子标识传输方法包括以下步骤:
S501:读写器通过PC5接口向车载设备发送读请求消息,读请求消息中包含第一位置信息以及第一时间信息。
其中,读请求消息为读写器使用读写器的应用证书进行签名处理后的消息。
S502:车载设备验证读请求消息的签名对应的应用证书合法,以及确定读请求消息的签名正确。
具体过程可以参考图2所示的实施例中的S202中的具体描述,此处不再赘述。
S503:车载设备确定第一位置信息所指示的第一位置与车载设备接收到读请求消息时所处的位置之间的距离小于第一距离阈值,以及确定第一时间信息所指示的第一时间与车载设备接收到读请求消息的时间之间的时间差值小于第一时间阈值。
S504:车载设备根据汽车电子标识的UID对应的读口令,对汽车电子标识进行第一加密处理,得到第一加密信息。
S505:车载设备将汽车电子标识的UID、车载设备的假名证书标识、第一位置信息以及第一时间信息作为验证信息,使用读写器的公钥对第一加密信息和验证信息进行第二加密处理。
S506:车载设备将加密后的汽车电子标识封装在初始读响应消息中。
S507:车载设备通过PC5接口将读响应消息发送给读写器。
其中,读响应消息为车载设备使用车载设备的假名证书进行签名处理后的消息。
S508:读写器验证读响应消息的签名对应的假名证书合法,以及确定读响应消息的签名正确。
具体过程可以参考图2所示的实施例中的S205中的具体描述,此处不再赘述。
S509:读写器使用读写器的私钥对加密后的汽车电子标识进行第一解密处理,得到第一加密信息和验证信息。
S510:读写器确定验证信息中的第一位置信息指示的第一位置与读请求消息中包含的第一位置信息指示的第一位置之间的距离小于第二距离阈值,以及确定验证信息中的第一时间信息指示的第一时间与读请求消息中包含的第一时间信息指示的第一时间之间的时间差值小于第二时间阈值。
S511:读写器确定验证信息中的假名证书标识与读响应消息的签名对应的假名证书标识相同。
S512:读写器根据验证信息中的汽车电子标识的UID确定对应的读口令,并根据确定出的读口令对第一加密信息进行第二解密处理,得到汽车电子标识。
通过本实例,车载设备将汽车电子标识的UID、车载设备的假名证书标识、第一位置信息以及第一时间信息作为验证信息,能够将车载设备的假名证书标识、第一位置信息以及第一时间信息与第一加密信息绑定;读写器在接收到车载设备发送的读响应消息后,需要判断验证信息中的假名证书标识与读响应消息的签名对应的假名证书标识是否相同,并判断第一位置信息指示的第一位置是否与读写器当前位置相同,以及判断第一时间信息指示的第一时间是否与读写器发送的读请求消息时的时间相同;从而防止中间人从读响应消息中恶意获取第一加密信息并使用中间人的假名证书进行重放,导致受害者利益受损,如防止中间人假冒受害者进行交通违规行为或使用受害者信息支付道路费用等。
实例四:参考图6所示,本实例提供的汽车电子标识传输方法包括以下步骤:
S601:读写器通过PC5接口向车载设备发送读请求消息,读请求消息中包含第一位置信息以及第一时间信息。
其中,读请求消息为读写器使用读写器的应用证书进行签名处理后的消息。
S602:车载设备验证读请求消息的签名对应的应用证书合法,以及确定读请求消息的签名正确。
具体过程可以参考图2所示的实施例中的S202中的具体描述,此处不再赘述。
S603:车载设备确定第一位置信息所指示的第一位置与车载设备接收到读请求消息时所处的位置之间的距离小于第一距离阈值,以及确定第一时间信息所指示的第一时间与车载设备接收到读请求消息的时间之间的时间差值小于第一时间阈值。
S604:车载设备根据汽车电子标识的UID对应的读口令,对汽车电子标识进行第一加密处理,得到第一加密信息。
S605:车载设备将汽车电子标识的UID、第二位置信息以及第二时间信息作为验证信息,使用读写器的公钥对第一加密信息和验证信息进行第二加密处理。
其中,第二位置信息所指示的第二位置为车载设备对汽车电子标识进行加密处理时所处的位置,第二时间信息所指示的第二时间为车载设备对汽车电子标识进行加密处理的时间。
S606:车载设备将加密后的汽车电子标识封装在初始读响应消息中。
S607:车载设备通过PC5接口将读响应消息发送给读写器。
其中,读响应消息为车载设备使用车载设备的假名证书进行签名处理后的消息。
S608:读写器验证读响应消息的签名对应的假名证书合法,以及确定读响应消息的签名正确。
具体过程可以参考图2所示的实施例中的S205中的具体描述,此处不再赘述。
S609:读写器使用读写器的私钥对加密后的汽车电子标识进行第一解密处理,得到第一加密信息和验证信息。
S610:读写器确定验证信息中的第二位置信息指示的第二位置与读写器执行第一解密处理时所处的位置之间的距离小于第一距离阈值,以及确定第二时间信息指示的第二时间与第一时间信息所指示的第一时间之间的时间差值小于第一时间阈值。
S611:读写器根据验证信息中的汽车电子标识的UID确定对应的读口令,并根据确定出的读口令对第一加密信息进行第二解密处理,得到汽车电子标识。
基于相同的技术构思,本申请还提供了一种通信装置,该装置的结构如图7所示,包括通信单元701和处理单元702。所述通信装置700可以应用于图2-图6所示的汽车电子标识传输方法中的车载设备或读写器。下面对通信装置700中的各个单元的功能进行介绍。
所述通信单元701,用于接收和发送数据。
所述通信装置700应用于车载设备或读写器时,所述通信单元701又可以称为物理接口、通信模块、通信接口、输入输出接口。车载设备或读写器可以通过该通信单元连接网线或电缆,进而与其他设备建立物理连接。例如,所述通信单元701可以为短距离直连通信接口(PC5),车载设备或读写器可以通过PC5接口进行数据的发送和接收。
下面对所述通信装置700应用于车载设备时,所述处理单元702的功能进行介绍:
处理单元702,用于通过所述通信单元701接收来自读写器的读请求消息,所述读请 求消息用于请求读取所述车载设备中存储的汽车电子标识;通过所述读请求消息对所述读写器进行验证,确定验证通过后,对所述汽车电子标识进行加密处理;以及通过所述通信单元701向所述读写器发送读响应消息,所述读响应消息中包含加密后的所述汽车电子标识。
在一种实施方式中,所述处理单元702,具体用于:
根据所述汽车电子标识的唯一身份标识UID对应的读口令,对所述汽车电子标识进行第一加密处理,得到第一加密信息;
确定验证信息,所述验证信息中包括所述UID;
使用所述读写器的公钥对所述第一加密信息和所述验证信息进行第二加密处理。
在一种实施方式中,所述读请求消息包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间;所述验证信息还包含所述第一位置信息或所述第一时间信息中的至少一项;
所述处理单元702,还用于:
在对所述汽车电子标识进行加密处理之前,确定所述第一位置信息所指示的第一位置与所述车载设备接收到所述读请求消息时所处的位置之间的距离小于第一距离阈值;或者,确定所述第一时间信息所指示的第一时间与所述车载设备接收到所述读请求消息的时间之间的时间差值小于第一时间阈值。
在一种实施方式中,所述第一位置信息或所述第一时间信息中的至少一项。
在一种实施方式中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项,其中,所述第二位置信息所指示的第二位置为所述车载设备对所述汽车电子标识进行加密处理时所处的位置,所述第二时间信息所指示的第二时间为所述车载设备对所述汽车电子标识进行加密处理的时间。
在一种实施方式中,所述验证信息还包括:所述车载设备的假名证书标识。
在一种实施方式中,所述读响应消息为经过基于所述车载设备的假名证书进行签名处理后的消息。
在一种实施方式中,所述处理单元702用于通过所述读请求消息对所述读写器进行验证时,具体用于:
确定所述读请求消息的签名对应的应用证书的上级证书公钥,使用所述上级证书公钥对所述应用证书进行解密处理,得到第一摘要,根据所述应用证书的内容计算得到第二摘要,比较所述第一摘要与所述第二摘要是否相同;以及
确定所述读请求消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第三摘要,根据所述签名内容计算得到第四摘要,比较所述第三摘要与所述第四摘要是否相同;
所述处理单元702用于确定对所述读写器验证通过时,具体用于:确定所述第一摘要与所述第二摘要相同,以及确定所述第三摘要与所述第四摘要相同。
下面对所述通信装置700应用于读写器时,所述处理单元702的功能进行介绍。
处理单元702,用于通过所述通信单元701发送读请求消息,所述读请求消息用于请求读取所述车载设备中存储的汽车电子标识,并且所述读请求消息中包括用于所述车载设 备验证所述读写器的信息;通过所述通信单元701接收所述车载设备发送的读响应消息,所述读响应消息中包含加密后的所述汽车电子标识;以及通过所述读响应消息对所述车载设备进行验证,确定验证通过后,对加密后的所述汽车电子标识进行解密处理,获取所述汽车电子标识。
在一种实施方式中,所述处理单元702,具体用于:
使用所述读写器的私钥对加密后的所述汽车电子标识进行第一解密处理,得到第一加密信息和验证信息;所述验证信息中包括所述汽车电子标识对应的唯一身份标识UID;
根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理,得到所述汽车电子标识。
在一种实施方式中,所述读请求消息中包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间。
在一种实施方式中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;
所述处理单元702,还用于:
在根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述第二位置信息所指示的第二位置与所述第一位置信息所指示的第一位置之间的距离小于第二距离阈值;或者,确定所述第二时间信息所指示的第二时间与所述第一时间信息所指示的第一时间之间的时间差值小于第二时间阈值。
在一种实施方式中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;
所述处理单元702,还用于:
在所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述第二位置信息所指示的第二位置与所述读写器执行所述第一解密时所处的位置之间的距离小于第一距离阈值;或者,确定所述第二时间信息所指示的第二时间与所述第一时间之间的时间差值小于第一时间阈值。
在一种实施方式中,所述验证信息还包括假名证书标识;所述处理单元702,还用于:
在根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述验证信息包含的假名证书标识与所述读响应消息的签名对应的假名证书标识相同。
在一种实施方式中,所述读请求消息为经过基于所述读写器的应用证书进行签名处理后的消息。
在一种实施方式中,所述处理单元702用于对所述车载设备进行验证时,具体用于:
确定所述读响应消息的签名对应的假名证书的上级证书公钥,使用所述上级证书公钥对所述假名证书进行解密处理,得到第五摘要,根据所述假名证书的内容计算得到第六摘要,比较所述第五摘要与所述第六摘要是否相同;以及
确定所述读响应消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第七摘要,根据所述签名内容计算得到第八摘要,比较所述第七摘要与所述第八摘要是否相同;
所述处理单元702用于确定对所述车载设备验证通过时,具体用于:确定所述第五摘要与所述第六摘要相同,以及确定所述第七摘要与所述第八摘要相同。
基于相同的技术构思,本申请还提供了一种车载设备800,所述车载设备800可以实现图2-图6所示的汽车电子标识传输方法中车载设备的功能。参阅图8所示,所述车载设备800包括:收发器801、处理器802以及存储器803。其中,所述收发器801、所述处理器802以及所述存储器803之间相互连接。
可选的,所述收发器801、所述处理器802以及所述存储器803之间通过总线804相互连接。所述总线804可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图8中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
所述收发器801,用于接收和发送数据,实现与其他设备之间的通信交互。
所述处理器802,用于通过所述收发器801接收来自读写器的读请求消息,所述读请求消息用于请求读取所述车载设备中存储的汽车电子标识;通过所述读请求消息对所述读写器进行验证,确定验证通过后,对所述汽车电子标识进行加密处理;以及通过所述收发器801向所述读写器发送读响应消息,所述读响应消息中包含加密后的所述汽车电子标识。
可选的,所述处理器802,具体用于:
根据所述汽车电子标识的唯一身份标识UID对应的读口令,对所述汽车电子标识进行第一加密处理,得到第一加密信息;
确定验证信息,所述验证信息中包括所述UID;
使用所述读写器的公钥对所述第一加密信息和所述验证信息进行第二加密处理。
在一种实施方式中,所述读请求消息包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间;所述验证信息还包含所述第一位置信息或所述第一时间信息中的至少一项;
所述处理器802,还用于:
在对所述汽车电子标识进行加密处理之前,确定所述第一位置信息所指示的第一位置与所述车载设备接收到所述读请求消息时所处的位置之间的距离小于第一距离阈值;或者,确定所述第一时间信息所指示的第一时间与所述车载设备接收到所述读请求消息的时间之间的时间差值小于第一时间阈值。
在一种实施方式中,所述第一位置信息或所述第一时间信息中的至少一项。
在一种实施方式中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项,其中,所述第二位置信息所指示的第二位置为所述车载设备对所述汽车电子标识进行加密处理时所处的位置,所述第二时间信息所指示的第二时间为所述车载设备对所述汽车电子标识进行加密处理的时间。
在一种实施方式中,所述验证信息还包括:所述车载设备的假名证书标识。
在一种实施方式中,所述读响应消息为经过基于所述车载设备的假名证书进行签名处理后的消息。
在一种实施方式中,所述处理器802用于通过所述读请求消息对所述读写器进行验证时,具体用于:
确定所述读请求消息的签名对应的应用证书的上级证书公钥,使用所述上级证书公钥对所述应用证书进行解密处理,得到第一摘要,根据所述应用证书的内容计算得到第二摘 要,比较所述第一摘要与所述第二摘要是否相同;以及
确定所述读请求消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第三摘要,根据所述签名内容计算得到第四摘要,比较所述第三摘要与所述第四摘要是否相同;
所述处理器802用于确定对所述读写器验证通过时,具体用于:确定所述第一摘要与所述第二摘要相同,以及确定所述第三摘要与所述第四摘要相同。
基于相同的技术构思,本申请还提供了一种读写器900,所述读写器900可以实现图2-图6所示的汽车电子标识传输方法中读写器的功能。参阅图9所示,所述读写器900包括:收发器901、处理器902以及存储器903。其中,所述收发器901、所述处理器902以及所述存储器903之间相互连接。
可选的,所述收发器901、所述处理器902以及所述存储器903之间通过总线904相互连接。所述总线904可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
所述收发器901,用于接收和发送数据,实现与其他设备之间的通信交互。
所述处理器902,用于通过所述收发器901发送读请求消息,所述读请求消息用于请求读取所述车载设备中存储的汽车电子标识,并且所述读请求消息中包括用于所述车载设备验证所述读写器的信息;通过所述收发器901接收所述车载设备发送的读响应消息,所述读响应消息中包含加密后的所述汽车电子标识;以及通过所述读响应消息对所述车载设备进行验证,确定验证通过后,对加密后的所述汽车电子标识进行解密处理,获取所述汽车电子标识。
在一种实施方式中,所述处理器902,具体用于:
使用所述读写器的私钥对加密后的所述汽车电子标识进行第一解密处理,得到第一加密信息和验证信息;所述验证信息中包括所述汽车电子标识对应的唯一身份标识UID;
根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理,得到所述汽车电子标识。
在一种实施方式中,所述读请求消息中包括第一位置信息或第一时间信息中的至少一项;所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间。
在一种实施方式中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;
所述处理器902,还用于:
在根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述第二位置信息所指示的第二位置与所述第一位置信息所指示的第一位置之间的距离小于第二距离阈值;或者,确定所述第二时间信息所指示的第二时间与所述第一时间信息所指示的第一时间之间的时间差值小于第二时间阈值。
在一种实施方式中,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;
所述处理器902,还用于:
在所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述第二位置信息所指示的第二位置与所述读写器执行所述第一解密时所处的位置之间的距离小于第一距离阈值;或者,确定所述第二时间信息所指示的第二时间与所述第一时间之间的时间差值小于第一时间阈值。
在一种实施方式中,所述验证信息还包括假名证书标识;所述处理器902,还用于:
在根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述验证信息包含的假名证书标识与所述读响应消息的签名对应的假名证书标识相同。
在一种实施方式中,所述读请求消息为经过基于所述读写器的应用证书进行签名处理后的消息。
在一种实施方式中,所述处理器902用于对所述车载设备进行验证时,具体用于:
确定所述读响应消息的签名对应的假名证书的上级证书公钥,使用所述上级证书公钥对所述假名证书进行解密处理,得到第五摘要,根据所述假名证书的内容计算得到第六摘要,比较所述第五摘要与所述第六摘要是否相同;以及
确定所述读响应消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第七摘要,根据所述签名内容计算得到第八摘要,比较所述第七摘要与所述第八摘要是否相同;
所述处理器902用于确定对所述车载设备验证通过时,具体用于:确定所述第五摘要与所述第六摘要相同,以及确定所述第七摘要与所述第八摘要相同。
可以理解,本申请图8和图9中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
基于以上实施例,本申请实施例还提供了一种计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行图2-图6所示的实施例提供的汽车电子标识传输方法。
基于以上实施例,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,所述计算机程序被计算机执行时,使得计算机执行图2-图6所示的实施例提供的汽车电子标识传输方法。其中,存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。
基于以上实施例,本申请实施例还提供了一种芯片,所述芯片用于读取存储器中存储的计算机程序,实现图2-图6所示的实施例提供的汽车电子标识传输方法。
基于以上实施例,本申请实施例提供了一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现图2-图6所示的实施例中车载设备或读写器所涉及的功能。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器用于保存该计算机装置必要的程序和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的保护范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
Claims (38)
- 一种汽车电子标识传输方法,其特征在于,该方法包括:车载设备接收来自读写器的读请求消息,所述读请求消息用于请求读取所述车载设备中存储的汽车电子标识;所述车载设备通过所述读请求消息对所述读写器进行验证,确定验证通过后,对所述汽车电子标识进行加密处理;所述车载设备向所述读写器发送读响应消息,所述读响应消息中包含加密后的所述汽车电子标识。
- 如权利要求1所述的方法,其特征在于,所述车载设备对所述汽车电子标识进行加密处理,包括:所述车载设备根据所述汽车电子标识的唯一身份标识UID对应的读口令,对所述汽车电子标识进行第一加密处理,得到第一加密信息;所述车载设备确定验证信息,所述验证信息中包括所述UID;所述车载设备使用所述读写器的公钥对所述第一加密信息和所述验证信息进行第二加密处理。
- 如权利要求1或2所述的方法,其特征在于,所述读请求消息包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间;所述车载设备通过所述读请求消息对所述读写器进行验证,包括:所述车载设备确定所述第一位置信息所指示的第一位置与所述车载设备接收到所述读请求消息时所处的位置之间的距离小于第一距离阈值;或者所述车载设备确定所述第一时间信息所指示的第一时间与所述车载设备接收到所述读请求消息的时间之间的时间差值小于第一时间阈值。
- 如权利要求3所述的方法,其特征在于,所述验证信息还包括:所述第一位置信息或所述第一时间信息中的至少一项。
- 如权利要求2或3任一项所述的方法,其特征在于,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项,其中,所述第二位置信息所指示的第二位置为所述车载设备对所述汽车电子标识进行加密处理时所处的位置,所述第二时间信息所指示的第二时间为所述车载设备对所述汽车电子标识进行加密处理的时间。
- 如权利要求2至5任一项所述的方法,其特征在于,所述验证信息还包括:所述车载设备的假名证书标识。
- 如权利要求1至6任一项所述的方法,其特征在于,所述读响应消息为经过基于所述车载设备的假名证书进行签名处理后的消息。
- 如权利要求1至7任一项所述的方法,其特征在于,所述车载设备通过所述读请求消息对所述读写器进行验证,包括:所述车载设备确定所述读请求消息的签名对应的应用证书的上级证书公钥,使用所述上级证书公钥对所述应用证书进行解密处理,得到第一摘要,所述车载设备根据所述应用证书的内容计算得到第二摘要,比较所述第一摘要与所述第二摘要是否相同;以及所述车载设备确定所述读请求消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第三摘要,所述车载设备根据所述签名内容计算得到第四摘要,比较所述第三摘要与所述第四摘要是否相同;所述车载设备确定对所述读写器验证通过,包括:所述车载设备确定所述第一摘要与所述第二摘要相同,以及所述车载设备确定所述第三摘要与所述第四摘要相同。
- 一种汽车电子标识传输方法,其特征在于,该方法包括:读写器向车载设备发送读请求消息,所述读请求消息用于请求读取所述车载设备中存储的汽车电子标识,并且所述读请求消息中包括用于所述车载设备验证所述读写器的信息;所述读写器接收所述车载设备发送的读响应消息,所述读响应消息中包含加密后的所述汽车电子标识;所述读写器通过所述读响应消息对所述车载设备进行验证,确定验证通过后,对加密后的所述汽车电子标识进行解密处理,获取所述汽车电子标识。
- 如权利要求9所述的方法,其特征在于,所述读写器对加密后的所述汽车电子标识进行解密处理,得到所述汽车电子标识,包括:所述读写器使用所述读写器的私钥对加密后的所述汽车电子标识进行第一解密处理,得到第一加密信息和验证信息;所述验证信息中包括所述汽车电子标识的唯一身份标识UID;所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理,得到所述汽车电子标识。
- 如权利要求9或10所述的方法,其特征在于,所述读请求消息中包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间。
- 如权利要求11所述的方法,其特征在于,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;在所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,还包括:所述读写器确定所述第二位置信息所指示的第二位置与所述第一位置信息所指示的第一位置之间的距离小于第二距离阈值;或者所述读写器确定所述第二时间信息所指示的第二时间与所述第一时间信息所指示的第一时间之间的时间差值小于第二时间阈值。
- 如权利要求11所述的方法,其特征在于,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;在所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,还包括:所述读写器确定所述第二位置信息所指示的第二位置与所述读写器执行所述第一解密时所处的位置之间的距离小于第一距离阈值;或者所述读写器确定所述第二时间信息所指示的第二时间与所述第一时间之间的时间差 值小于第一时间阈值。
- 如权利要求10至13任一项所述的方法,其特征在于,所述验证信息还包括假名证书标识;在所述读写器根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,还包括:所述读写器确定所述验证信息包含的假名证书标识与所述读响应消息的签名对应的假名证书标识相同。
- 如权利要求9至14任一项所述的方法,其特征在于,所述读请求消息为经过基于所述读写器的应用证书进行签名处理后的消息。
- 如权利要求9至15任一项所述的方法,其特征在于,所述读写器对所述车载设备进行验证,包括:所述读写器确定所述读响应消息的签名对应的假名证书的上级证书公钥,使用所述上级证书公钥对所述假名证书进行解密处理,得到第五摘要,所述读写器根据所述假名证书的内容计算得到第六摘要,比较所述第五摘要与所述第六摘要是否相同;以及所述读写器确定所述读响应消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第七摘要,所述读写器根据所述签名内容计算得到第八摘要,比较所述第七摘要与所述第八摘要是否相同;所述读写器确定对所述车载设备验证通过,包括:所述读写器确定所述第五摘要与所述第六摘要相同,以及所述读写器确定所述第七摘要与所述第八摘要相同。
- 一种车载设备,其特征在于,包括:通信单元,用于接收和发送数据;处理单元,用于通过所述通信单元接收来自读写器的读请求消息,所述读请求消息用于请求读取所述车载设备中存储的汽车电子标识;通过所述读请求消息对所述读写器进行验证,确定验证通过后,对所述汽车电子标识进行加密处理;以及通过所述通信单元向所述读写器发送读响应消息,所述读响应消息中包含加密后的所述汽车电子标识。
- 如权利要求17所述的车载设备,其特征在于,所述处理单元,具体用于:根据所述汽车电子标识的唯一身份标识UID对应的读口令,对所述汽车电子标识进行第一加密处理,得到第一加密信息;确定验证信息,所述验证信息中包括所述UID;使用所述读写器的公钥对所述第一加密信息和所述验证信息进行第二加密处理。
- 如权利要求17或18所述的车载设备,其特征在于,所述读请求消息包括第一位置信息或第一时间信息中的至少一项,所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间;所述处理单元,具体用于:确定所述第一位置信息所指示的第一位置与所述车载设备接收到所述读请求消息时所处的位置之间的距离小于第一距离阈值;或者,确定所述第一时间信息所指示的第一时间与所述车载设备接收到所述读请求消息的 时间之间的时间差值小于第一时间阈值。
- 如权利要求19所述的车载设备,其特征在于,所述验证信息还包括:所述第一位置信息或所述第一时间信息中的至少一项。
- 如权利要求18或19所述的车载设备,其特征在于,所述验证信息还包括:第三位置信息或第三时间信息中的至少一项,其中,所述第三位置信息所指示的第三位置为所述车载设备对所述汽车电子标识进行加密处理时所处的位置,所述第三时间信息所指示的第三时间为所述车载设备对所述汽车电子标识进行加密处理的时间。
- 如权利要求18至21任一项所述的车载设备,其特征在于,所述验证信息还包括:所述车载设备的假名证书标识。
- 如权利要求17至22任一项所述的车载设备,其特征在于,所述读响应消息为经过基于所述车载设备的假名证书进行签名处理后的消息。
- 如权利要求19至23任一项所述的车载设备,其特征在于,所述处理单元用于对所述读写器进行验证时,具体用于:确定所述读请求消息的签名对应的应用证书的上级证书公钥,使用所述上级证书公钥对所述应用证书进行解密处理,得到第一摘要,根据所述应用证书的内容计算得到第二摘要,比较所述第一摘要与所述第二摘要是否相同;以及确定所述读请求消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第三摘要,根据所述签名内容计算得到第四摘要,比较所述第三摘要与所述第四摘要是否相同;所述处理单元用于确定对所述读写器验证通过时,具体用于:确定所述第一摘要与所述第二摘要相同,以及确定所述第三摘要与所述第四摘要相同。
- 一种读写器,其特征在于,包括:通信单元,用于接收和发送数据;处理单元,用于通过所述通信单元发送读请求消息,所述读请求消息用于请求读取所述车载设备中存储的汽车电子标识,并且所述读请求消息中包括用于所述车载设备验证所述读写器的信息;通过所述通信单元接收所述车载设备发送的读响应消息,所述读响应消息中包含加密后的所述汽车电子标识;以及通过所述读响应消息对所述车载设备进行验证,确定验证通过后,对加密后的所述汽车电子标识进行解密处理,获取所述汽车电子标识。
- 如权利要求25所述的读写器,其特征在于,所述处理单元,具体用于:使用所述读写器的私钥对加密后的所述汽车电子标识进行第一解密处理,得到第一加密信息和验证信息;所述验证信息中包括所述汽车电子标识的唯一身份标识UID;根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理,得到所述汽车电子标识。
- 如权利要求25或26所述的读写器,其特征在于,所述读请求消息中包括第一位置信息或第一时间信息中的至少一项;所述第一位置信息所指示的第一位置为所述读写器发送所述读请求消息时所处的位置,所述第一时间信息所指示的第一时间为所述读写器发送所述读请求消息的时间。
- 如权利要求27所述的读写器,其特征在于,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;所述处理单元,还用于:在根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述第二位置信息所指示的第二位置与所述第一位置信息所指示的第一位置之间的距离小于第二距离阈值;或者,确定所述第二时间信息所指示的第二时间与所述第一时间信息所指示的第一时间之间的时间差值小于第二时间阈值。
- 如权利要求27所述的读写器,其特征在于,所述验证信息还包括:第二位置信息或第二时间信息中的至少一项;所述处理单元,还用于:根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述第二位置信息所指示的第二位置与所述读写器执行所述第一解密时所处的位置之间的距离小于第一距离阈值;或者,确定所述第二时间信息所指示的第二时间与所述第一时间之间的时间差值小于第一时间阈值。
- 如权利要求26至29任一项所述的读写器,其特征在于,所述验证信息还包括假名证书标识;所述处理单元,还用于:在根据所述UID对应的读口令,对所述第一加密信息进行第二解密处理之前,确定所述验证信息包含的假名证书标识与所述读响应消息的签名对应的假名证书标识相同。
- 如权利要求25至30任一项所述的读写器,其特征在于,所述读请求消息为经过基于所述读写器的应用证书进行签名处理后的消息。
- 如权利要求25至31任一项所述的读写器,其特征在于,所述处理单元用于对所述车载设备进行验证时,具体用于:确定所述读响应消息的签名对应的假名证书的上级证书公钥,使用所述上级证书公钥对所述假名证书进行解密处理,得到第五摘要,根据所述假名证书的内容计算得到第六摘要,比较所述第五摘要与所述第六摘要是否相同;以及确定所述读响应消息的签名的上级公钥,使用所述上级公钥对所述签名进行解密处理,得到第七摘要,根据所述签名内容计算得到第八摘要,比较所述第七摘要与所述第八摘要是否相同;所述处理单元用于确定对所述车载设备验证通过时,具体用于:确定所述第五摘要与所述第六摘要相同,以及确定所述第七摘要与所述第八摘要相同。
- 一种车载设备,其特征在于,包括:处理器和通信接口;其中,所述处理器通过所述通信接口与存储器耦合,所述处理器用于执行所述存储器中的程序代码,以实现如权利要求1-8中任一项所述的方法。
- 一种读写器,其特征在于,包括:处理器和通信接口;其中,所述处理器通过所述通信接口与存储器耦合,所述处理器用于执行所述存储器中的程序代码,以实现如权利要求9-16中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在被处理器运行时,使得车载设备执行如权利要求1-8任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在被处理器运行时,使得读写器执行如权利要求9-16任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在处理器上运行时, 使得车载设备执行如权利要求1-8任一项所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在处理器上运行时,使得读写器执行如权利要求9-16任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/132914 WO2022110201A1 (zh) | 2020-11-30 | 2020-11-30 | 一种汽车电子标识传输方法、车载设备与读写器 |
EP20963089.6A EP4236397A4 (en) | 2020-11-30 | 2020-11-30 | AUTOMOBILE ELECTRONIC IDENTIFIER TRANSMISSION METHOD, ON-BOARD DEVICE AND READ-WRITE DEVICE |
CN202080004715.8A CN112640501B (zh) | 2020-11-30 | 2020-11-30 | 一种汽车电子标识传输方法、车载设备与读写器 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/132914 WO2022110201A1 (zh) | 2020-11-30 | 2020-11-30 | 一种汽车电子标识传输方法、车载设备与读写器 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022110201A1 true WO2022110201A1 (zh) | 2022-06-02 |
Family
ID=75291145
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/132914 WO2022110201A1 (zh) | 2020-11-30 | 2020-11-30 | 一种汽车电子标识传输方法、车载设备与读写器 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4236397A4 (zh) |
CN (1) | CN112640501B (zh) |
WO (1) | WO2022110201A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118119042A (zh) * | 2022-11-30 | 2024-05-31 | 比亚迪股份有限公司 | 一种数据读取方法及相关装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1523130A2 (en) * | 2003-10-08 | 2005-04-13 | Matsushita Electric Industrial Co., Ltd. | Road-vehicle communication system, and roadside apparatus, mobile apparatus which are used for the same |
CN107256578A (zh) * | 2017-04-12 | 2017-10-17 | 深圳市微付充科技有限公司 | 一种闸机支付方法、etc终端、终端附件及移动终端 |
CN209642651U (zh) * | 2019-06-17 | 2019-11-15 | 江苏本能科技有限公司 | 具有兼容协议的射频识别车载装置 |
CN111145553A (zh) * | 2018-11-02 | 2020-05-12 | 上海瑞章物联网技术有限公司 | 一种车辆识别系统 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI372356B (en) * | 2008-06-18 | 2012-09-11 | Mstar Semiconductor Inc | Rfid tag and managing method thereof |
US10454913B2 (en) * | 2014-07-24 | 2019-10-22 | Hewlett Packard Enterprise Development Lp | Device authentication agent |
CN107615703B (zh) * | 2015-03-27 | 2021-08-06 | 沃纳冯布劳恩高等研究中心 | 基于挑战响应机制将受保护存储器访问嵌入rfid认证过程 |
DE102015015502A1 (de) * | 2015-11-30 | 2017-06-01 | Giesecke & Devrient Gmbh | Verfahren und Vorrichtung für die sichere Speicherung elektronischer Identifikationsdokumente auf einem mobilen Endgerät |
CN105426799B (zh) * | 2015-12-21 | 2018-02-13 | 天津中兴智联科技有限公司 | 一种基于安全模块的超高频阅读器及其安全认证方法 |
CN106846506B (zh) * | 2017-01-25 | 2021-08-10 | 腾讯科技(深圳)有限公司 | 一种基于信息标识码进行信息验证的方法及系统 |
CN107147498B (zh) * | 2017-05-15 | 2020-06-02 | 吉林大学 | 用于rfid认证过程中的认证方法和传递信息的加密方法 |
CN110060361B (zh) * | 2019-04-25 | 2022-01-25 | 重庆市城投金卡信息产业(集团)股份有限公司 | 基于rfid的车辆消费支付方法及其系统 |
-
2020
- 2020-11-30 WO PCT/CN2020/132914 patent/WO2022110201A1/zh unknown
- 2020-11-30 CN CN202080004715.8A patent/CN112640501B/zh active Active
- 2020-11-30 EP EP20963089.6A patent/EP4236397A4/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1523130A2 (en) * | 2003-10-08 | 2005-04-13 | Matsushita Electric Industrial Co., Ltd. | Road-vehicle communication system, and roadside apparatus, mobile apparatus which are used for the same |
CN107256578A (zh) * | 2017-04-12 | 2017-10-17 | 深圳市微付充科技有限公司 | 一种闸机支付方法、etc终端、终端附件及移动终端 |
CN111145553A (zh) * | 2018-11-02 | 2020-05-12 | 上海瑞章物联网技术有限公司 | 一种车辆识别系统 |
CN209642651U (zh) * | 2019-06-17 | 2019-11-15 | 江苏本能科技有限公司 | 具有兼容协议的射频识别车载装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4236397A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP4236397A4 (en) | 2023-12-27 |
CN112640501B (zh) | 2022-04-29 |
CN112640501A (zh) | 2021-04-09 |
EP4236397A1 (en) | 2023-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9542630B2 (en) | Method of securely reading data from a transponder | |
EP3118776B1 (en) | Security authentication method for hiding ultra high frequency electronic tag identifier | |
US11863976B2 (en) | Secure vehicular services communication | |
US20110068894A1 (en) | Method for authenticating an rfid tag | |
US20210359845A1 (en) | Improved vehicle communication | |
US11869254B2 (en) | Method and apparatus to recognize transported passengers and goods | |
US11863688B2 (en) | Secure emergency vehicular communication | |
CN103210398A (zh) | 读取rfid令牌、rfid卡和电子设备的方法 | |
CN113168771A (zh) | 车道偏离设备、系统和方法 | |
WO2022110201A1 (zh) | 一种汽车电子标识传输方法、车载设备与读写器 | |
CN103793742A (zh) | 一种交通电子车牌的电子标签安全认证和信息加密的技术 | |
CN108833097B (zh) | 一种基于密钥分配中心的车联网rfid安全认证方法 | |
CN113379412A (zh) | 可读写电子标签、基于该标签的支付方法和装置 | |
CN106408673A (zh) | 一种应用于路径识别系统的车载单元及安全方法 | |
CN112561006B (zh) | 电子车牌管理方法、射频识别读写器、节点、设备及介质 | |
KR20160069253A (ko) | 근거리 통신 시스템 및 그의 보안처리방법 | |
KR101619290B1 (ko) | 문서 위조 방지를 위한 방법, 서버 및 태그 | |
KR20070086508A (ko) | 통신망을 통한 권한 부여 및 이용 | |
CN104680225A (zh) | RFID(840-845MHz)汽车电子标识的安全认证和AES加密 | |
Ramos | Autonomous Vehicle Cybersecurity Standards and Regulations-Towards a Unified Framework: Proposes a unified framework for autonomous vehicle cybersecurity standards and regulations | |
JP2002095050A (ja) | 情報伝送システム、無線通信装置および移動体 | |
CN114095190A (zh) | 收费数据保护方法、装置、特情处理终端及存储介质 | |
CN112187893A (zh) | 车辆安全交互方法、装置、车辆和存储介质 | |
JP2024512289A (ja) | ビークルツーエブリシング(v2x)メッセージ内のプレーンテキストおよび暗号文の認証 | |
KR20110097574A (ko) | 비접촉형 스마트카드의 복제 방지 및 데이터 변조 방지 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20963089 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2020963089 Country of ref document: EP Effective date: 20230526 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |