Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device

An identity authentication and authentication module technology, applied in the field of identity authentication, can solve the problems of ineffective resistance to relay attacks, high cost, and inability to resist attacks

Active Publication Date: 2018-04-27
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the relay attack method, the attacker does not modify the communication content between the remote control key and the car, but uses a man-in-the-middle method to make the car and the remote control key think that they are within a certain area, even if the remote control key and the car The use of complex cryptographic algorithms cannot resist the attack
[0007] Since the relay attacker uses the signal amplifier to enhance the signal energy, the method of obtaining the position parameters of the remote control key from the signal strength and signal direction cannot effectively resist the relay attack
The speed of electromagnetic waves is 3×10 8 m / s, so confirming the relay attack from the perspective of ToA requires a timer with high precision, and the cost is also high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] see Figure 5 , the figure shows a method of identity authentication, which is suitable for the first authentication object, and the specific steps are as follows:

[0086] Step 501. Determine the signal strength of the received response signal sent by the second authentication object and the signal-to-noise ratio corresponding to the signal strength, and the response signal is used to respond to the search signal sent by the first authentication object;

[0087] The above-mentioned response signal may be a UHF response signal. Of course, it should be noted that the frequency of the response signal is not limited in this embodiment.

[0088] The above-mentioned first authentication object can be a car, and the corresponding second authentication object can be a remote control key (or called a remote control car key). Of course, it can be understood that the above-mentioned first authentication object and second authentication object can also be other products.

[0089]...

Embodiment 2

[0102] see Figure 6 , the figure shows a method of identity authentication, which is applicable to the second authentication object, and the specific steps are as follows:

[0103] Step 601. Receive a search signal sent by the first authentication object;

[0104] The above-mentioned first authentication object can be a car, and the corresponding second authentication object can be a remote control key (or called a remote control car key). Of course, it can be understood that the above-mentioned first authentication object and second authentication object can also be other products.

[0105] Step 602: Send a response signal for responding to the search signal to the first authentication object, so that the first authentication object performs a search on the first authentication object according to the signal strength and signal-to-noise ratio of the response signal and the standard signal strength and standard signal-to-noise ratio. 2. The authentication object performs ide...

Embodiment 3

[0114] In this embodiment, taking the first authentication object as a car and the second authentication object as a remote control key as an example, the applicable scenario is the keyless entry of a car.

[0115] see Figure 7 , the car shown in the figure (taking an ordinary car as an example, assuming that the length is 4m and the width is 1.7m) is equipped with an antenna A with signal receiving and sending functions 1 and antenna A 2 , it should be noted that the above-mentioned antenna A is not limited in this embodiment 1 and antenna A 2 specific installation location. Example: Antenna A 1 and antenna A 2 Used to send LF search signal (or called low frequency search signal) and UHF test signal (or called UHF test signal), and receive UHF response signal (or called UHF response signal) and respond according to the received UHF The strength of the signal determines the distance between the remote key and the car.

[0116] Assume that the original remote control ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide an identity authentication method and device. The method comprises the steps of determining signal intensity of a received response signal sent by a second authentication object and a signal to noise ratio corresponding to the signal intensity, wherein the response signal is used for responding to a search signal sent by a first authentication object; and authenticating the identity of the second authentication object according to the signal intensity of the response signal and the signal to noise ratio and standard signal intensity as well as standard signal to noise ratio. If the signal intensity of a response signal received by the first authentication object (such as a car) is greater than the standard signal intensity, but the signal to noise ratiothereof is less than the standard signal to noise ratio, the first authentication object receives relay attack, then authentication of the second authentication object by the first authentication object fails, so as to prevent relay attack in identity authentication.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an identity authentication method and device. Background technique [0002] The car keyless entry system (Passive Keyless Entry and Drive System, PKED) allows users to remotely unlock, lock and start the engine when it is inconvenient to take out the key. Common PKED systems such as figure 1 As shown, it is composed of a remote control key and a body control module. The remote key and the body control module perform information interaction, and then the MCU (Microcontroller Unit, micro control unit) performs information processing and authentication, and finally the body control module controls the opening and closing of the car door. The start of the engine. [0003] The specific information interaction between the remote control key and the vehicle body is as follows: figure 2 As shown, the vehicle periodically transmits LF (Low Frequency, low frequency) search signa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/122
CPCH04L63/08H04L63/1416H04W12/06
Inventor 李笑如左敏庄小君
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products