Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificate switching method and device

A certificate and communication device technology, applied in security devices, secure communication devices, user identity/authority verification, etc., can solve problems such as inability to verify the validity of certificates and inability to communicate

Active Publication Date: 2021-10-01
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this application provides a certificate switching method and device, which can solve the problem that the sender and the receiver cannot communicate because they cannot verify the legitimacy of the other party's certificate when the sender and the receiver use certificates issued by different PKI systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate switching method and device
  • Certificate switching method and device
  • Certificate switching method and device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0126] It can be understood that the information included in the above first request is different, therefore, the process for the server to obtain the second certificate according to the first request is different. The process for the server to obtain the second certificate according to the first request can refer to the following example 1, example 2 and example 3:

[0127] Example 1, when the first request includes the information of the second network, the first public key and the registration certificate of the OBU, the server determines the first AA in the second network according to the information of the second network, and sends the first certificate to the first AA Request information, and receive first certificate response information from the first AA.

[0128] Wherein, the first certificate request information may be used to request the second certificate, the first certificate request information may include the first public key and the registration certificate of...

example 2

[0130] Example 2, when the first request includes the information of the second network, the first public key and the second public key, the server determines the first EA and the second AA in the second network according to the information of the second network, and the server sends the first The EA sends the second certificate request information and receives the second certificate response information from the first EA, and the server sends the third certificate request information to the second AA and receives the third certificate response information from the second AA.

[0131] Wherein, the second certificate request information may be used to request the registration certificate of the OBU, and the second certificate request information may include the identifier of the OBU and the second public key. The second certificate response information may include the registration certificate of the OBU. The third certificate request information may be used to request the secon...

example 3

[0133] Example 3, when the first request includes the information of the second network and the registration certificate of the OBU, the server stores or presets a public key seed, and the server determines the third AA in the second network according to the information of the second network, and according to the key Derivation algorithm (for example, butterfly key expansion mechanism (butterfly key expansion, BKE)) and the public key seed to obtain the public key of the second certificate, the server sends the fourth certificate request information to the third AA, and receives the request information from the third AA The fourth certificate response message.

[0134] Wherein, the fourth certificate request information may be used to request the second certificate, and the fourth certificate request information may include the registration certificate of the OBU and the public key of the second certificate. The fourth certificate response information may include the second ce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a certificate switching method and device, relates to the field of wireless communication, and can solve the problem that when a sender and a receiver use certificates issued by different public key infrastructure systems, the sender and the receiver cannot communicate due to the fact that the legality of the certificates of the sender and the receiver cannot be verified. The method comprises the steps: a vehicle-mounted unit acquiring first information, the first information being used by the vehicle-mounted unit to determine to switch a first certificate to a trusted certificate in a second network, the first certificate being a trusted certificate in a first network; the vehicle-mounted unit obtains a second certificate according to the first information, and the second certificate is a trusted certificate in the second network; and the vehicle-mounted unit uses the second certificate to communicate with a road side unit and / or other vehicle-mounted units.

Description

technical field [0001] The present application relates to the field of wireless communication, in particular to a certificate switching method and device. Background technique [0002] With the deep integration of the information and communication technology (ICT) industry, the automobile industry and the transportation industry, the vehicle to everything (V2X) has gradually become one of the fields with the most industrial potential in the field of the Internet of Things. Currently, the definition of the Internet of Vehicles can be: with the help of a new generation of information and communication technology, the realization of all-round network connection and mutual communication between devices in the Internet of Vehicles, for example, between devices in the car, between cars and cars, between cars and roads, and between cars All-round network connection and mutual communication can be carried out between people, vehicles and service platforms. The Internet of Vehicles ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04W12/069
CPCH04L9/3263H04L9/0825H04L9/32H04W12/069H04L9/08
Inventor 朱锦涛聂永丰
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products