Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method and system for certificating vehicle identity

A vehicle identity and vehicle technology, applied in user identity/authority verification, security devices, electrical components, etc., can solve problems such as not handling vehicle service request messages that fail authentication, key escrow, and private key information leakage

Inactive Publication Date: 2014-12-17
JIANGSU UNIV
View PDF1 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the technical solution provided by the prior art, when authenticating the identity of the vehicle, the RSU can calculate the private keys of all the vehicles according to the false identities of all the vehicles included in the received service request message. When the RSU is attacked, all the vehicles in the same group The private key information of all vehicles included will be leaked, which is prone to key escrow problems; and, RSU does not process the service request messages of vehicles that fail the certification, so this scheme lacks the revocation of the vehicles that fail the certification. consider

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for certificating vehicle identity
  • A method and system for certificating vehicle identity
  • A method and system for certificating vehicle identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] An embodiment of the present invention provides a method for authenticating a vehicle. see figure 1 , where the method includes:

[0071] 101: The proxy vehicle obtains the private key of the proxy vehicle, and uses the private key of the proxy vehicle to sign the first random number to obtain the signature information of the first random number;

[0072] 102: The agent vehicle sends authentication information to the RSU (Road Side Unit, roadside unit). The authentication information includes the identity information of the agent vehicle and the verification code of the identity information; the identity information of the agent vehicle includes the false identity mark of the agent vehicle, the The public key, the signature information of the first random number and the current timestamp of sending the authentication information;

[0073] 103: The RSU receives the authentication information sent by the agent vehicle, and authenticates the agent vehicle according to th...

Embodiment 2

[0100] An embodiment of the present invention provides a method for authenticating a vehicle. see figure 2 , where the method includes:

[0101] 201: The proxy vehicle obtains the private key of the proxy vehicle;

[0102] The proxy vehicle is any vehicle within the communication range of the roadside unit RSU. When authenticating the identity of the vehicle, the RSU randomly selects any vehicle within the communication range of the RSU as the proxy vehicle, and performs identity authentication on the proxy vehicle. When the RSU passes the identity authentication of the proxy vehicle, the proxy vehicle builds a group.

[0103] Among them, the private key sk of the proxy vehicle i Including the first private key and the second private key, the first private key is sk i 1 , the second private key is sk i 2 , the first private key and the second private key of the proxy vehicle form the private key of the proxy vehicle, namely sk i =(sk i 1 ,sk i 2 ).

[0104] Where...

Embodiment 3

[0140] An embodiment of the present invention provides a method for authenticating a vehicle. see image 3 , where the method includes:

[0141] 301: The proxy vehicle sends fifth information to other vehicles within the communication range of the RSU, the fifth information includes a request message M for building a vehicle group 1 and the request message M of the agent vehicle to construct the vehicle group 1 The signature information Sig SKi (M 1 );

[0142] Among them, the request message M for constructing a group 1 Including the pseudo-identification PID of the agent vehicle i , the public key PK of the proxy vehicle i , the construction request identifier CGR and the current timestamp T of sending the fifth information 3 . Proxy vehicle according to the private key SK of proxy vehicle i Request message M for building a vehicle group 1 Sign and get the signature information Sig SKi (M 1 ).

[0143] 302: Vehicles within the communication range of the RSU rec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and system for certificating a vehicle identity, and belongs to the field of mobile communication. The method includes: a road side unit RSU certificates an agent vehicle and acquires a session key of the agent vehicle when the certification is passed; the agent vehicle constitutes a vehicle group, and receives second information sent by vehicles within the RSU communication scope; the second information is sent to the RSU after encrypted using the session key of the agent vehicle, so that the RSU certificates the vehicles in the RSU communication scope in a batch according to the second information; and the RSU sends a false identity identification of the vehicle which does not pass the certification within the RSU communication scope to the vehicles in the RSU communication scope. The system includes: an acquiring module, a sending module, a certification module, a generating module and an encryption module. The present invention acquires a private key of the agent vehicle through the agent vehicle, which avoids the problem of secret key hosting; moreover, the RSU sends the false identity identification of the vehicle which does not pass the certification to the vehicles in the RSU communication scope, which considers revocation for illegal vehicles.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and system for authenticating vehicle identity. Background technique [0002] In VANET (Vehicle Ad Hoc Networks, Vehicle Ad Hoc Networks), an RSU (Road Side Unit, Road Side Unit) is set at intervals on the roadside. When the vehicle enters the communication range of the RSU, the RSU needs to monitor the vehicle. Authentication. The vehicle can communicate with the RSU only after the RSU has passed the identity authentication of the vehicle. [0003] At present, a method for authenticating the vehicle identity is provided, which may be as follows: the service provider of the RSU receives a service request message sent by a vehicle within the communication range of the RSU within a preset time, and the service request message carries the false identity of the vehicle. First, the RSU verifies the timeliness of the service request message, and when the verification is p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L9/32H04W84/18
Inventor 王良民李晓君袁效鹏辛燕陈向益李致远周从华
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products