Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure access method and device

A technology for secure access and security parameters, applied in security devices, electrical components, wireless communications, etc., and can solve problems such as low confidentiality of shared keys, untrusted node access for vehicles, user privacy, and security threats.

Active Publication Date: 2021-04-30
HUAWEI TECH CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the second node accesses the first node, it usually first determines the shared key used by both parties for communication encryption, but in the existing access process, the confidentiality of the generated shared key is low
It is not difficult to see that such an access method is likely to lead to data leakage and threaten user privacy and security.
For communication systems, especially for in-vehicle communication systems, this situation is likely to cause the vehicle to be accessed by untrusted nodes, causing the vehicle to communicate with untrusted attackers, endangering the personal safety of drivers and passengers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method and device
  • Secure access method and device
  • Secure access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] Embodiments of the present application are described below with reference to the drawings in the embodiments of the present application. It should be noted that, in this application, words such as "exemplary" or "for example" are used as examples, illustrations or illustrations. Any embodiment or design described herein as "exemplary" or "for example" is not to be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete manner.

[0101] The "at least one" mentioned in the embodiments of the present application refers to one or more, and the "multiple" refers to two or more. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one item (piece) of a, b, or c may represent: a, b, c, (a and b), (a and c), (b and c), or (a and b a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a secure access method and device, applied to the fields of communication technology and network connection vehicles, and the method comprises the steps: receiving a first message from a second node, the first message comprising a first cipher text, and the first cipher text being obtained according to a security parameter and a first secret key negotiation parameter; decrypting the first cipher text according to the security parameter to obtain a first key negotiation parameter; determining a first shared key according to the first key negotiation parameter and a key negotiation algorithm; and obtaining first identity authentication information according to the first shared key and the PSK between the first node and the second node, wherein the first identity authentication information is used for authenticating the identity of the first node. Through the embodiment of the invention, the node can be prevented from being successfully associated with an attacker with an incredible identity. The scheme can be further used for improving the ADAS capability of an automatic driving or advanced driving assistance system, and can be applied to the fields of Internet of Vehicles V2X, inter-vehicle communication long-term evolution technology LTE-V, vehicle-to-vehicle V2V and the like.

Description

technical field [0001] This application relates to the field of communication technology and networked vehicles, especially to the field of short-distance communication technology, such as cockpit domain communication. In particular, it relates to a secure access method and device. Background technique [0002] Today, with the rapid development of informatization, mobile terminals, mobile phones, tablets or other portable intelligent terminals are our indispensable and important personal intelligent tools. While enjoying the convenience brought by informatization, we are also facing security vulnerabilities and Threat of privacy breach. Taking smart cars as an example, with the wide application of vehicle communication, wireless communication has also brought a series of safety hazards to the car. For example, through the existing distance communication technology, hackers may invade the vehicle information system, obtain vehicle information, and even remotely control the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/50H04W12/041H04W12/069
CPCH04W12/069H04W12/50H04W12/041H04W12/03H04W12/047H04L9/0863H04L9/0844H04L9/14H04L9/40H04L63/083H04L67/12H04W4/40
Inventor 李泳王勇陈璟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products