CN103198527A - Method of vehicular unit-roadside unit free flow inspection model transaction - Google Patents

Method of vehicular unit-roadside unit free flow inspection model transaction Download PDF

Info

Publication number
CN103198527A
CN103198527A CN2013100409589A CN201310040958A CN103198527A CN 103198527 A CN103198527 A CN 103198527A CN 2013100409589 A CN2013100409589 A CN 2013100409589A CN 201310040958 A CN201310040958 A CN 201310040958A CN 103198527 A CN103198527 A CN 103198527A
Authority
CN
China
Prior art keywords
board units
roadside unit
information
obu
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100409589A
Other languages
Chinese (zh)
Other versions
CN103198527B (en
Inventor
曾致远
郑欣
黎育红
杨亦兵
杨峰
朱振强
杨文丽
阎冰洁
李波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN ROAD BRIDGE COLLECT FEES MANAGE CENTER
Huazhong University of Science and Technology
Original Assignee
WUHAN ROAD BRIDGE COLLECT FEES MANAGE CENTER
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN ROAD BRIDGE COLLECT FEES MANAGE CENTER, Huazhong University of Science and Technology filed Critical WUHAN ROAD BRIDGE COLLECT FEES MANAGE CENTER
Priority to CN201310040958.9A priority Critical patent/CN103198527B/en
Publication of CN103198527A publication Critical patent/CN103198527A/en
Application granted granted Critical
Publication of CN103198527B publication Critical patent/CN103198527B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method of vehicular unit-roadside unit free flow inspection model transaction. The method sequentially includes a process of negotiating communication parameters of one another at the same time and allocation by a roadside unit among a plurality of vehicular units, a process of transmission and read of an inspection data information frame, and a process of sending a recording report. The method is good in compatibility and expansibility, and can satisfy the concurrent processing of a plurality of offshore banking units (OBU) for city road and bridge free flow inspection charging.

Description

Board units-roadside unit freely flows inspection pattern method of commerce
Technical field
The present invention relates in the municipal intelligent traffic application freely to flow the OBU-RSU that electronic inspection uses based on city road and bridge and freely flow the pattern technology scheme of checking.
Background technology
At present, freely to flow toll collection technique be one of state-of-the-art toll on the road and bridge's technology in the world city road and bridge.It is a kind of swift electron Fare Collection System that any charge roadblock is not set.This Fare Collection System is quite ripe in some developed countries, but because the application market of the China difference very big with external application market existence, so directly use international existing mature technology can have certain risk; This Fare Collection System also is in conceptual phase at home, and application case is not arranged as yet.
E-payment system (Electronic Toll Collection is called for short ETC) is the automatic fare collection system that is used for highway, bridge and tunnel of making great efforts in the world to develop and promote, and the bridge and the tunnel that are particularly suitable for highway or heavy traffic adopt.In E-payment system, vehicle need install that to have the uniquely identified electronic tag (be OBU, On Board Unit, board units), and in the track of charge station or the portal frame of highway trackside read write line that read-write corresponding electronic tag is installed (be RSU, Road Side Unit, roadside unit) and driveway controller.
The DSRC(Dedicated Short Range Communications of present China Electronics Fare Collection System, Dedicated Short Range Communications) charge of the RSU-OBU among standard GB/T20851-2007 " electronic charging Dedicated Short Range Communications, " transaction is mainly used in the highway electric charge of some provinces and cities, the charge function ratio is limitation, processing speed is slower, extendability is relatively poor, bring inconvenience for inspection work in the city, therefore can't satisfy the practical application request of city toll on the road and bridge's vehicle auditing.
Summary of the invention
Technical matters to be solved by this invention is: provide a kind of board units-roadside unit freely to flow inspection pattern method of commerce, compatibility of the present invention, favorable expandability can satisfy the concurrent processing that city road and bridge freely flow the many OBU of inspection charge.
The technical solution adopted in the present invention is: board units-roadside unit freely flows inspection pattern method of commerce, the process that comprises consult simultaneously between that roadside unit is initiated and a plurality of board units to communicate with one another parameter and configuration successively, transmission and the process of reading of inspection data information frame, and the process of transmitting of record report.
The process of parameter and configuration of consulting between that described method, roadside unit are initiated and a plurality of board units to communicate with one another may further comprise the steps:
S11) roadside unit sends the beacon service table to board units;
S12) board units sends the dedicated window request to roadside unit;
S13) after roadside unit carries out the dedicated window distribution to a plurality of board units, and send dedicated window distribution control frame respectively to board units;
S14) board units sends the vehicle service table to roadside unit.
Described method, step S11 specifically comprises: roadside unit reads board units type, the roadside unit trade mode of key version number and support; Splice above data then and generate the beacon service table, board units type, roadside unit trade mode that the beacon service table carries key version number and support are sent to board units.
Described method, step S14 specifically may further comprise the steps:
S141) board units reads key version number in the beacon service table and the board units type of support, and the roadside unit trade mode, selects corresponding trade mode and key version number is deposited in the board units buffer memory;
S142) board units read system information data from its embedded-type security control module write in the board units buffer memory;
S143) board units generates the required partial information of follow-up inspection information data frame, comprise and from the embedded-type security control module, read board units disassembly status and board units type, write the content VST of vehicle service table third part, and write in the board units buffer memory;
S144) board units splices the information of step S141~S143 successively, generates complete vehicle service table and is sent to roadside unit.
Described method, transmission and the process that reads of inspection data information frame may further comprise the steps:
S21) roadside unit is received after the vehicle service table, generates inspection information downlink frame, sends to board units;
S22) board units sends inspection information uplink frame to roadside unit.
Described method, step S21 specifically comprises:
S211) roadside unit is differentiated with random number and random number sequence number by its terminal security access module generation information, the corresponding different random number sequence of each board units number and corresponding random number;
S212) the roadside unit concatenation information is differentiated with random number and random number sequence number, generates inspection information downlink frame and also sends to board units.
Described method, step S22 specifically comprises: board units reads corresponding encryption key according to key version number, then information is differentiated and be encrypted the generation authentication code with random number, and number write in the inspection information uplink frame together authentication code and random number sequence and send, roadside unit number is differentiated each board units successively by different random number sequences again.
Described method, the process of transmitting of record report specifically comprises: roadside unit is received after the inspection information uplink frame, finish the information of board units is differentiated, and the relative recording in the roadside unit is sent TCP report to driveway controller, if it is illegal, then carry out scene prompting and inspection, send the release isl frame simultaneously to board units.
The present invention takes into full account domestic city road and bridge vehicle auditing characteristics, Successful Practice experience in conjunction with external electronic toll system, set up and a kind ofly freely flow OBU-RSU that electronic charging uses based on city road and bridge and freely flow and check the pattern technology scheme, it has following technical advantage and characteristics:
(1) different application model that the encoding mechanism of beacon service table (BST) and vehicle service table (VST) application layer content exchange is compatible simultaneously comprises charge trade mode and inspection pattern, has compatible type and extendability preferably.
(2) adopt the frame folding, designed special service primitive, accelerated the exchange hour under the OBU-RSU inspection pattern, more effectively driving vehicle is carried out inspection work;
(3) adopted RSU to handle the concurrent operations mechanism of a plurality of OBU, can carry out concurrent inspection to a plurality of OBU of multilane simultaneously and handle, the inspection processing power is strong, better meets city road and bridge freely to flow the application demand of inspection pattern.
Description of drawings
Fig. 1 is that OBU-RSU freely flows inspection pattern transaction flow figure.
Embodiment
Integrated use of the present invention intelligent transportation electronic toll system, Dedicated Short Range Communications, technology, information security technology, ETC use Trading Model concept and computer software technology, belong to the municipal intelligent traffic application.The present invention is basic important breakthrough, other practical application request at present city road and bridge vehicle auditing present situation and domestic intelligent transportation field, propose a kind of brand-new OBU-RSU and freely flow inspection pattern technology scheme, the present invention designs and adopts the frame folding, RSU handles concurrent behaviour's mechanism and the unilateral authentication technology of a plurality of OBU, designed special-purpose service primitive, be used for realizing that OBU-RSU checks function safely and fast, being mainly used in city road and bridge freely flows electronic charging inspection application model, comprise that having designed the special-purpose electronic charging of freely flowing checks mode service primitive, the encoding mechanism of beacon service table (BST) and vehicle service table (VST) application layer content exchange, detailed inspection pattern transaction flow regulation etc., not only greatly shortened the exchange hour of OBU-RSU under the inspection pattern, its serviceability and Transaction Success rate have been improved, and have extendability preferably, can be widely used in other intelligent transportation fields.
The present invention adopts the concurrent processing pattern of the many dedicated window of Dedicated Short Range Communications,, and in conjunction with TDES(Triple DES, triple DES) unilateral authentication agreement, frame folding, and design safety authentication module PSAM(Purchase Secure Access Module, point of sales terminal secure access module) and ESAM(Embedded Secure Access Module, the embedded-type security control module) special instruction realizes that roadside unit is to the processing of inspection fast and safely of a plurality of board units.
A kind of OBU-RSU that freely flows electronic charging based on city road and bridge of the present invention freely flows inspection pattern method of commerce, adopt frame folding and RSU to handle the concurrent operations mechanism of a plurality of OBU, encoding mechanism and the special-purpose inspection mode service primitive that freely flows of beacon service table (BST) and vehicle service table (VST) application layer content exchange have been designed, not only greatly shorten the exchange hour of OBU-RSU inspection pattern, and improved its serviceability.
Described OBU-RSU freely flows beacon service table (BST) in the inspection pattern technology scheme and the encoding mechanism of vehicle service table (VST) application layer content exchange, the newly-increased OBU type that is used for sign RSU trade mode and can supports, the different application model of compatibility comprises charge trade mode and inspection pattern simultaneously.
The special-purpose inspection mode service primitive that freely flows that described OBU-RSU freely flows in the inspection pattern technology scheme designs, comprise INITIALISATION_request(BST), Private window response(PrWRq), Private window allocation(PrWA), INITIALISATION_response(VST), inspection information downlink frame GetSecure.request, OBU inspection information is returned uplink frame GetSecure.response, discharge link downlink frame Event_Report.request, stipulated the detailed frame format of each service primitive, guaranteeing that city road and bridge freely flows checks the fast and reliable that application model OBU-RSU concludes the business, and better meets city road and bridge freely to flow the application demand of inspection pattern.
The present invention is based on city road and bridge freely flows the OBU-RSU inspection pattern technology scheme that inspection uses and specifically comprises following content:
1. different application model that the encoding mechanism of beacon service table (BST) and vehicle service table (VST) application layer content exchange is compatible simultaneously, comprise charge trade mode and inspection pattern, new field RSUTransactionMode is used for the trade mode of sign RSU and the OBU type of support, and specific design sees the following form:
Table 1RSUTransact ionMode formal definition
Figure BDA00002807700000031
Figure BDA00002807700000041
The difference of category-A electronic tag, category-B and C electron-like label:
(1) basic model (category-A): monolithic active electronic label.
(2) compatible type (category-B): double-disk electronic tag (with GB GB/T20851-2007).
(3) extended pattern (C class): the double-disk electronic tag, IC-card inserts the amount of money is filled in the ESAM card of OBE, carries out as seen, deducts dealing money from the ESAM card.
2. adopt frame folding and RSU to tackle the concurrent processing mechanism of a plurality of OBU, designed special-purpose service primitive and inspection transaction flow, see Fig. 1, better meeting city road and bridge freely flows the application demand of inspection pattern, and detailed frame format is described below:
(1) INITIALISATION_request(BST) (27 byte)
■ direction: RSU → OBU
The ■ function: a plurality of OBU in the polling communication zone, and with its negotiation communication parameter and application parameter.
The operation that ■ need carry out: RSU reads the key version number of its storage, OBU type and the RSU trade mode of support generates BST.
The transaction data that ■ sends: whether OBU carries out interface prompt under the OBU type of key version number, support and RSU trade mode, the inspection pattern, RSU Beacon ID(beacon ID, comprise byte of manufacturer's coding, section number 2 bytes, day 1 byte of wire size).
Concrete frame format sees table:
Figure BDA00002807700000042
Figure BDA00002807700000051
(2) Private Window Response(PrWRq) (10 byte)
■ direction: OBU → RSU
■ function: request dedicated uplink window.
The operation that ■ need carry out: OBU reads OBU MAC(Media Access Control from the ESAM card, media interviews control) address (using ESAM order---READ BINARY), section among the Rsu BeaconID number (from BST, reading), judge number whether the same with section that last Successful Transaction is received, if would not do not do response.
The transaction data that ■ sends: comprise OBU MAC Address (4 byte), AntID(days wire sizes, i.e. last byte of Rsu BeaconID)
Concrete frame format sees table:
Figure BDA00002807700000062
(3) Private Window Allocation(PrWA) (10 byte)
■ direction: RSU → OBU
■ function: distribute the dedicated uplink window.
The operation that ■ need carry out: RSU reads AntID from PrWRq, judge at first whether this AntID is last byte of the BeaconID of self, as not being then not do response, if then read the OBU MAC ID in the PrWRq frame, sends the response message frame.
The transaction data that ■ sends: OBU MAC Address (4 byte), AntID(days wire sizes, i.e. last byte of Rsu BeaconID)
Concrete frame format sees table:
Figure BDA00002807700000063
(4) INITIALISATION_response(VST) (30 byte)
■ direction: OBU → RSU
■ function: OBU is, and PrWA replys, and judges whether AntID is the sky wire size of receiving that RSU sent last time, if not then not doing response.If then set up communication link, with RSU negotiation communication parameter and application parameter, and information such as retrieval system file data.
The operation that ■ need carry out:
OBU selects corresponding trade mode and key version number is deposited in the OBU buffer memory;
Be used for after OBU activates, OBU produces information about power and OBU MAC ID check information and writes the OBU buffer memory;
Use the proprietary order of ESAM---READ OBUINFO2, be used for after OBU activates, reading fixedly from ESAM, transaction data (contract sequence number, OBUMAC) writes in the OBU buffer memory;
Use the proprietary order of ESAM---READ DYNAMICINFO2, be used for generating the dynamic data of ESAM card required when sending VST, comprise disassembly status and the OBU type of OBU.
OBU splices above data and generates complete VST and be sent to RSU.
The transaction data that ■ sends:
OBU generation information about power and OBU MAC ID check information, OBU software version number (2 bytes);
Contract sequence number (8 byte), OBU MAC Address (4 byte) (above information belongs to the fix information in the ESAM card);
The disassembly status of OBU and OBU type (1 byte) (above information belongs to the multidate information in the ESAM card).
Concrete frame format sees table:
Figure BDA00002807700000071
Figure BDA00002807700000081
(5) inspection information downlink frame GetSecure.request(25 byte)
■ direction: RSU → OBU
■ function: RSU carries random number randRSUforAuthen and the random number sequence randRSUforAuthenIndex that differentiates for OBU information.
The operation that ■ need carry out:
The proprietary instruction of PSAM---EXPAND GET CHALLENGE(charge trade mode and inspection trade mode), generation information is differentiated with random number randRSUforAuthen and random number sequence randRSUforAuthenIndex;
RSU splicing random number randRSUforAuthen and random number sequence randRSUforAuthenIndex generate GetSecure.rq, send to OBU.
The transaction data that ■ sends: be used for random number randRSUforAuthen (8 byte) and random number sequence randRSUforAuthenIndex(1 byte that OBU information is differentiated), AntID(days wire sizes, i.e. last byte of Rsu BeaconID)
Concrete frame format sees table:
(6) OBU inspection information is returned uplink frame GetSecure.response(24 byte)
■ direction: OBU → RSU
The ■ function: the information that realizes the OBU of RSU is differentiated.
The operation that ■ need carry out: use ESAM card specific command---GET AUTHENTICATION: version number reads according to key
Corresponding encryption key carries out TDES with random number randRSUforAuthen and encrypts generation Authenticator.
The transaction data that ■ sends: message authentication code Authenticator(8 byte), random number sequence randRSUforAuthenIndex.
Concrete frame format sees table:
Figure BDA00002807700000092
Figure BDA00002807700000101
(7) Event_Report.request(14 byte)
■ direction: RSU → OBU
The ■ function: close the trade, release communicates to connect with electronic tag.
The operation that ■ need carry out:
Use the proprietary instruction of PSAM---ACCOMPLISH AUTHENCATION: contract sequence number, key version number and random number sequence number are sent in the PSAM card, get master encryption keys corresponding in the PSAM card, divide the interim encryption key that sheds, utilize the random number sequence number corresponding randRSUforAuthen of selection, utilize interim encryption key to carry out the TDES computing and generate tmpAuthenticator, differentiate authentication with the authentication code Authenticator contrast information of carrying out that ESAM sends over, identical then OBU information is legal, otherwise illegal.
Relative recording among the RSU is sent TCP report to driveway controller.TCP report comprises: whether RSU trade mode RSUTransactionMode, exchange hour exchangeTime, OBUMAC, OBU state OBUStatus, OBU information legal obuLegitimacy, stateful transaction exchangeStatus.If illegal situation is then carried out scene prompting and inspection.
The transaction data that ■ sends: do not have
Concrete frame format sees table:
Figure BDA00002807700000102
Figure BDA00002807700000111
OBU in the above table represents the mobile unit in the board units, and RSU represents roadside unit, and ESAM represents the embedded-type security control module in the mobile unit, and PSAM represents the secure access module of loading in the roadside unit.
PSAM of the present invention Cavan part structure: its file structure adopts tree-shaped hierarchical structure, root node is master control file MF, its child node comprises catalogue data file, card public information file, end message file, master key file, uses catalogue, the first expanded application catalogue and the second expanded application catalogue DF03 substantially, and the second expanded application catalogue comprises uses public information file, terminal applies transaction sequence number and second key file.
Master key file and second cipher key file structure see the following form:
Figure BDA00002807700000112
Figure BDA00002807700000121
The PSAM specific command explanation that the present invention uses:
(1) special instruction 1---EXPAND GET CHALLENGE: handle the concurrent situation of a plurality of OBU for roadside unit under the free stream mode, roadside unit obtains a random number (8 byte) and random number sequence number (1 byte) simultaneously, and random number, random number sequence number left in the list of random numbers in the PSAM buffer memory, carry out correspondingly in the random number sequence that PSAM will return according to board units number and the PSAM card list of random numbers, number respectively a plurality of OBU are carried out authentication operation according to random number sequence; Wherein random number sequence number from 0 to 31 circulation produces (totally 32 groups), and the random number sequence initial value is 0.Whenever call once this order, random number sequence number increases 1, and random number regenerates.Finish once circulation when random number sequence number is 31, increases progressively since 0 again, its command message is defined as follows:
Code Numerical value (16 system)
CLA ‘D0’
INS ‘84’
P1 ‘00’
P2 ‘00’
Lc Do not exist
DATA Do not exist
Le ' 09 ' comprises random number (8 byte)+random number sequence number (1 byte), totally 9 bytes
In the above-mentioned message, CLA represents to order classification, and INS represents the command byte of command message, P1 represents parameter 1, and P2 represents parameter 2, and Lc represents the physical length of the order data that terminal is sent, DATA represents concrete data, and Le represents the greatest hope length in the response data.
The response message data field comprises random number (8 bytes of length), and random number sequence number (1 byte) is 9 bytes altogether.The response message form is as follows:
Explanation Length (byte)
Random number 8
Random number sequence number 1
The status code that may return in the response message has:
SW1 SW Explanation
90 00 The command execution success
67 00 The Le size error
6A 81 Function is not supported
6A 86 P1, P2 parameter mistake
6D 00 Order does not exist
6E 00 The CLA mistake
(2) specific command 2---and ACCOMPLISH AUTHENTICATION: be used for finishing the OBU information of carrying out is differentiated operation, its command message is defined as follows:
The command execution process specifically describes as follows:
● select corresponding OBU encryption main key RK2(MasterEncryptKey, 16 bytes according to key version number);
● utilize contract sequence number ContractSerialNumber(8 byte) it is disperseed, generate interim OBU encryption main key tmpEncryptKey(16 byte), if disperse unsuccessful this process (status code SW1 is 6A, and status code SW2 is 88) that then finishes;
● utilize random number sequence number selection random number corresponding randRSUforAuthen, utilize the randRSUforAuthen of interim encryption key tmpEncryptKey to carry out the TDES computing and generate tmpAuthenticator, algorithm is as follows:
tmpAuthenticatior=TDES(tmpEncryptKey,randRSUforAuthen)
If generate unsuccessful this process (status code SW1 is 95, and status code SW2 is 03) that then finishes;
● namely utilize the ESAM(Embedded Secure Access Module of tmpAuthenticator and board units, the embedded-type security control module) the authentication code Authenticator contrast information of carrying out that sends over is differentiated authentication, identical then OBU information is legal, otherwise illegal (status code SW1 is 96, and status code SW2 is 02).
The response message data field does not exist, and the status code that may return in the response message has:
SW1 SW2 Explanation
90 00 The command execution success
61 Xx Also have the xx byte to return
62 81 The data of part loopback may be wrong
62 82 File size<Le
64 00 The sign mode bit does not have change
65 81 Write the EEPROM failure
67 00 The Lc size error
69 81 Current file is not binary file
69 82 Do not satisfy safe condition
69 83 The authenticate key locking
69 85 Service condition does not satisfy
69 86 Do not select current file
69 88 Security information (MAC and encryption) error in data
6A 81 Function is not supported
6A 85 Lc and TLV structure do not match
6A 86 P1, P2 parameter mistake
6A 88 Do not find key data
6B 00 Start address goes beyond the scope
6C Xx The Le size error.' xx ' represents physical length
? 6D 00 Order does not exist ?
? 6E 00 The CLA mistake ?
? 93 03 Use permanent locking ?
? 96 02 Authenticator information is differentiated failure ?
? 95 03 TempAuthenticator generates failure ?
The file structure explanation of ESAM card of the present invention:
Be used for freely flowing the board units ESAM module of charge, its file structure adopts tree-shaped hierarchical structure, its root node is master control file MF, and child node comprises system key file, system information file, system's document retaining, freely flows that catalogue file DF03 is used in electronic charging, catalogue file DF04 is used in traffic control.ESAM module basic structure comprises file structure and key management, when setting up, each catalogue file DF or master control file MF specify the interpolation authority of key, the attribute of key comprises contents such as identifier, type, version, error count, rights of using, modification authority, key value, and ESAM determines the uniqueness of key by identifier and type.
Described ESAM module freely flows electronic charging and uses the child node of catalogue file DF03 and comprise that electronic charging uses key file, electronic charging and use information of vehicles file, electronic charging and use transaction record file, electronic charging and use time window storage file, electronic charging and use that first document retaining, electronic charging are used second document retaining, board units uses first document retaining and board units is used second document retaining.
The child node that described ESAM module, traffic control are used catalogue file DF04 comprises traffic control application key file, traffic control application log file and traffic control application document retaining.
Described ESAM module, each key file data sees the following form:
Figure BDA00002807700000141
Figure BDA00002807700000151
The ESAM specific command explanation that the present invention uses:
(1) ESAM order---READ BINARY: range of application is the types of applications pattern, is used for reading the content (or partial content) of binary file, comprises binary files such as information of vehicles file, and its command message is defined as follows:
Figure BDA00002807700000152
The format specification of response message response message: when the value of Le was zero, the maximum length that needs only file was lacked length at 256() or the 65536(extension length) within, then its whole bytes will be read out.
The status code that may return in the response message has:
SW1 SW2 Explanation ?
90 00 The command execution success ?
61 xx Also have the xx byte to return ?
62 81 The data of part loopback may be wrong ?
62 82 File size<Le
65 81 Write the EEPROM failure
67 00 The Lc size error
69 81 Current file is not binary file
69 85 Service condition does not satisfy
69 86 Do not select current file
6A 81 Function is not supported
6A 82 Do not find file
6A 86 P1, P2 parameter mistake
6B 00 Start address goes beyond the scope
6C Xx The Le size error.' xx ' represents physical length
6D 00 Order does not exist
6E 00 The CLA mistake
93 03 Use permanent locking
(2) the proprietary order of ESAM---READ OBUINFO2, range of application is the inspection trade mode, needed partial data during for generation of transmission VST comprises: contract sequence number, OBU MAC ID, its command message is defined as follows:
Code Numerical value (sexadecimal)
CLA ‘D0’
INS ‘E6’
P1 ‘00’
P2 ‘00’
Lc Do not exist
DATA Do not exist
Le ' 0C ' comprises contract sequence number (8 byte)+OBU MAC ID(4 byte), totally 12 bytes
Response message response message form is as follows:
Explanation Length (byte)
The contract sequence number 8
OBU?MAC 4
The status code that may return in the response message has:
SW1 SW2 Explanation
90 00 The command execution success
61 xx Also have the xx byte to return
62 81 The data of part loopback may be wrong
62 82 File size<Le
65 81 Write the EEPROM failure
67 00 The Lc size error
69 81 Current file is not binary file
69 82 Do not satisfy safe condition
69 83 The authenticate key locking
69 85 Service condition does not satisfy
6A 81 Function is not supported
6A 86 P1, P2 parameter mistake
6A 88 Do not find key data
6B 00 Start address goes beyond the scope
6C Xx The Le size error.' xx ' represents physical length
6D 00 Order does not exist
6E 00 The CLA mistake
93 03 Use permanent locking
94 04 Do not find the system information file
94 07 The record of read-out system message file not
(3) the proprietary order of ESAM---READ DYNAMICINFO2, range of application is the inspection trade mode, is used for generating needed dynamic data when sending VST.Comprise obtaining OBU disassembly status and OBU type, its command message is defined as follows:
Code Numerical value (sexadecimal)
CLA ‘D0’
INS ‘E2’
P1 ‘00’
P2 ‘00’
Lc Do not exist
DATA Do not exist
Le ' 01 ' comprises OBU disassembly status and OBU type (1 byte)
Response message response message form is as follows:
Explanation Length (byte)
OBU disassembly status and OBU type 1
The status code that may return in the response message has:
SW1 SW2 Explanation
90 00 The command execution success
61 xx Also have the xx byte to return
62 81 The data of part loopback may be wrong
62 82 File size<Le
65 81 Write the EEPROM failure
67 00 The Lc size error
69 81 Current file is not binary file
69 82 Do not satisfy safe condition
69 83 The authenticate key locking
69 85 Service condition does not satisfy
6A 81 Function is not supported
6A 86 P1, P2 parameter mistake
6A 88 Do not find key data
6B 00 Start address goes beyond the scope
6C Xx The Le size error.' xx ' represents physical length
6D 00 Order does not exist
6E 00 The CLA mistake
93 03 Use permanent locking
94 04 Do not find the system information file
94 07 The record of read-out system message file not
(4) ESAM card specific command---GET AUTHENTICATION, range of application is the inspection trade mode, is used for the BST3 random number is encrypted, and generates message authentication code, its command message is defined as follows:
Code Numerical value (sexadecimal)
CLA ‘D0’
INS ‘D6’
P1 ‘00’
P2 ‘00’
Lc ‘09’
DATA Comprise the random number randRSUforAuthen(8 byte that RSU generates)+key version number (1 byte)
Le ' 08 ' comprises message authentication code Authenticator(8 byte)
The command execution process specifically describes as follows:
● ESAM selects corresponding application encipher key RK2 by key version number _ DF03
● carry out the TDES cryptographic calculation, specific algorithm is as follows,
Authenticator=TDES(RK2 _DF03,RandRSU)
Response message response message form is as follows:
Explanation Length (byte)
Authenticator 8
The status code that may return in the response message has:
SW1 SW2 Explanation
90 00 The command execution success
61 Xx Also have the xx byte to return
62 81 The data of part loopback may be wrong
62 82 File size<Le
65 81 Write the EEPROM failure
67 00 The Lc size error
69 81 Current file is not binary file
69 82 Do not satisfy safe condition
69 83 The authenticate key locking
69 84 Reference data invalid (not applying for random number)
69 85 Service condition does not satisfy
6A 81 Function is not supported
6A 86 P1, P2 parameter mistake
6A 88 Do not find key data
6B 00 Start address goes beyond the scope
6C Xx The Le size error.' xx ' represents physical length
6D 00 Order does not exist
6E 00 The CLA mistake
93 03 Use permanent locking
95 05 Authenticator generates failure
The concrete grammar explanation that dedicated window request of the present invention and dedicated window are distributed:
Dedicated link of the present invention creates a mechanism, be increase on former GB basis the dedicated window request (Private window request---PrWRq) and dedicated window distribute (Private window allocation---PrWA), while MAC(Media Access Control, media interviews control) control domain increases distribution time window mechanism on former GB basis, and the sequence control that distributes the descending chain circuit frame of dedicated uplink window, it is as follows specifically to create a mechanism:
(1) create a mechanism under the broadcast mode: RSU sends the descending chain circuit frame that distributes a plurality of common uplink windows, and what wherein RSU sent is broadcasting MAC Address (complete 1), and Q is 1.
(2) under the point-to-point mode, need set up dedicated communication link between RSU and the OBU, this link with special-purpose MAC Address as unique identification.Dedicated link to set up process as follows:
A) RSU periodic broadcast Q is 1 distribution N5 common uplink window, and includes the descending chain circuit frame of customizing messages (day wire size, i.e. last byte of Rsu BeaconID);
B) after OBU receives this information in the communication zone, random delay N1 the T5 of chronomere;
C) OBU sends and comprises that the dedicated link claim frame of its mac address information is to RSU;
D) after RSU acknowledges receipt of legal frame, register corresponding OBU MAC Address, and be assigned the descending chain circuit frame of dedicated uplink window to OBU with this MAC Address transmission;
E) after OBU received descending chain circuit frame with this OBU MAC Address, the dedicated link window was allocated successfully, and dedicated link is set up successfully.
The structural design of downlink MAC control domain and up-link MAC control domain sees Table shown in A and the table B.
Table A downlink MAC control domain
Figure BDA00002807700000191
Table B up-link MAC control domain
Figure BDA00002807700000192
Figure BDA00002807700000201
The time window administrative mechanism: the time window management is divided into the unallocated up-link window of descending chain circuit frame, distributed the dedicated uplink window, and distributed situations such as one or more common uplink windows, whether distribute window to be decided by the A bit of downlink MAC control domain.
(1) dedicated uplink window
Have only the obu mac address obu identical with the obu mac address of the window that is distributing to use this dedicated uplink window.
The starting point of a dedicated uplink window appears at and comprises the downlink window that distributes this up-link window frame and finish T1 after the time.
The end point of a dedicated uplink window appears at: if there is not OBU to begin to send, then finish after window begins T4a.OBU no longer sends the data of downlink window request after end point occurs, just send when RSU sends this request command again.
(2) common uplink window
Each descending chain circuit frame that has broadcast address can distribute one or more continuous common uplink window.A descending chain circuit frame can distribute N5 continuous common uplink window at most.A common uplink window can be used according to random delay counter rule by any OBU in communication zone.
The starting point of a common uplink window:
If 1. this common uplink window is downlink window first window afterwards, then appears at the link window that comprises this distribution window frame and finish after the T1.
If 2. previous window is the common uplink window, then appear at the finish time of previous window.
8. the end of common uplink window betide after the beginning T5 constantly.In the common uplink window, OBU sends data should begin before the T4b after this common window begins.
The definition of link layer key parameter: concrete definition sees the following form:
Figure BDA00002807700000202
Figure BDA00002807700000211

Claims (8)

1. board units-roadside unit freely flows inspection pattern method of commerce, it is characterized in that comprising successively the process of consulting to communicate with one another parameter and configuration between that roadside unit is initiated and a plurality of board units simultaneously, transmission and the process of reading of inspection data information frame, and the process of transmitting of record report.
2. method according to claim 1 is characterized in that, the process of consult between that roadside unit is initiated and a plurality of board units to communicate with one another parameter and configuration may further comprise the steps:
S11) roadside unit sends the beacon service table to board units;
S12) board units sends the dedicated window request to roadside unit;
S13) after roadside unit carries out the dedicated window distribution to a plurality of board units, and send dedicated window distribution control frame respectively to board units;
S14) board units sends the vehicle service table to roadside unit.
3. method according to claim 2 is characterized in that, step S11 specifically comprises: roadside unit reads board units type, the roadside unit trade mode of key version number and support; Splice above data then and generate the beacon service table, board units type, roadside unit trade mode that the beacon service table carries key version number and support are sent to board units.
4. method according to claim 3 is characterized in that, step S14 specifically may further comprise the steps:
S141) board units reads key version number in the beacon service table and the board units type of support, and the roadside unit trade mode, selects corresponding trade mode and key version number is deposited in the board units buffer memory;
S142) board units read system information data from its embedded-type security control module write in the board units buffer memory;
S143) board units generates the required partial information of follow-up inspection information data frame, comprises and read board units disassembly status and board units type from the embedded-type security control module, and write in the board units buffer memory;
S144) board units splices the information of step S141~S143 successively, generates complete vehicle service table and is sent to roadside unit.
5. method according to claim 2 is characterized in that, transmission and the process that reads of inspection data information frame may further comprise the steps:
S21) roadside unit is received after the vehicle service table, generates inspection information downlink frame, sends to board units;
S22) board units sends inspection information uplink frame to roadside unit.
6. method according to claim 5 is characterized in that, step S21 specifically comprises:
S211) roadside unit is differentiated with random number and random number sequence number by its terminal security access module generation information, the corresponding different random number sequence of each board units number and corresponding random number;
S212) the roadside unit concatenation information is differentiated with random number and random number sequence number, generates inspection information downlink frame and also sends to board units.
7. method according to claim 6, it is characterized in that, step S22 specifically comprises: board units reads corresponding encryption key according to key version number, then information is differentiated and be encrypted the generation authentication code with random number, and number write in the inspection information uplink frame together authentication code and random number sequence and send, roadside unit number is differentiated each board units successively by different random number sequences again.
8. method according to claim 5, it is characterized in that, the process of transmitting of record report specifically comprises: roadside unit is received after the inspection information uplink frame, finish the information of board units is differentiated, and the relative recording in the roadside unit is sent TCP report to driveway controller, if illegal, then carry out scene prompting and inspection, send the release isl frame simultaneously to board units.
CN201310040958.9A 2013-02-01 2013-02-01 Method of vehicular unit-roadside unit free flow inspection model transaction Expired - Fee Related CN103198527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310040958.9A CN103198527B (en) 2013-02-01 2013-02-01 Method of vehicular unit-roadside unit free flow inspection model transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310040958.9A CN103198527B (en) 2013-02-01 2013-02-01 Method of vehicular unit-roadside unit free flow inspection model transaction

Publications (2)

Publication Number Publication Date
CN103198527A true CN103198527A (en) 2013-07-10
CN103198527B CN103198527B (en) 2016-01-20

Family

ID=48721021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310040958.9A Expired - Fee Related CN103198527B (en) 2013-02-01 2013-02-01 Method of vehicular unit-roadside unit free flow inspection model transaction

Country Status (1)

Country Link
CN (1) CN103198527B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989632A (en) * 2015-02-27 2016-10-05 深圳市金溢科技股份有限公司 Free flow system and transaction method and device thereof
CN108616287A (en) * 2016-12-27 2018-10-02 航天信息股份有限公司 ETC communication means and system
CN110599611A (en) * 2018-06-12 2019-12-20 北京聚利科技股份有限公司 ETC lane control passing method and equipment
CN110689634A (en) * 2019-11-26 2020-01-14 交通运输部路网监测与应急处置中心 Communication method suitable for truck ETC lane system and lane system
CN110827429A (en) * 2019-11-26 2020-02-21 交通运输部路网监测与应急处置中心 Truck ETC lane PSAM card blacklist checking method and device
CN111325863A (en) * 2020-03-27 2020-06-23 深圳复芯微科技有限公司 Method, device and equipment for rapidly waking up vehicle-mounted unit

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201402475Y (en) * 2008-11-18 2010-02-10 上海东海电脑股份有限公司 Electronic charging on-vehicle unit with independent safety control module
CN102096952A (en) * 2009-12-14 2011-06-15 中兴通讯股份有限公司 Method and device for realizing electronic toll collection concurrent transaction
US20120093091A1 (en) * 2010-10-17 2012-04-19 Industrial Technology Research Institute Method and system for extended service channel access on demand in an alternating wireless channel access environment
CN102592327A (en) * 2012-03-02 2012-07-18 上海搜林信息技术有限公司 Road side station testing method and device for non-parking charging system
CN102904630A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Communication method for free-flow electronic toll collection system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201402475Y (en) * 2008-11-18 2010-02-10 上海东海电脑股份有限公司 Electronic charging on-vehicle unit with independent safety control module
CN102096952A (en) * 2009-12-14 2011-06-15 中兴通讯股份有限公司 Method and device for realizing electronic toll collection concurrent transaction
US20120093091A1 (en) * 2010-10-17 2012-04-19 Industrial Technology Research Institute Method and system for extended service channel access on demand in an alternating wireless channel access environment
CN102904630A (en) * 2011-07-25 2013-01-30 深圳市金溢科技有限公司 Communication method for free-flow electronic toll collection system
CN102592327A (en) * 2012-03-02 2012-07-18 上海搜林信息技术有限公司 Road side station testing method and device for non-parking charging system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989632A (en) * 2015-02-27 2016-10-05 深圳市金溢科技股份有限公司 Free flow system and transaction method and device thereof
CN105989632B (en) * 2015-02-27 2019-05-10 深圳市金溢科技股份有限公司 A kind of free flow system and its method of commerce and device
CN108616287A (en) * 2016-12-27 2018-10-02 航天信息股份有限公司 ETC communication means and system
CN108616287B (en) * 2016-12-27 2021-08-27 航天信息股份有限公司 ETC communication method and system
CN110599611A (en) * 2018-06-12 2019-12-20 北京聚利科技股份有限公司 ETC lane control passing method and equipment
CN110689634A (en) * 2019-11-26 2020-01-14 交通运输部路网监测与应急处置中心 Communication method suitable for truck ETC lane system and lane system
CN110827429A (en) * 2019-11-26 2020-02-21 交通运输部路网监测与应急处置中心 Truck ETC lane PSAM card blacklist checking method and device
CN110827429B (en) * 2019-11-26 2021-11-09 交通运输部路网监测与应急处置中心 Truck ETC lane PSAM card blacklist checking method and device
CN110689634B (en) * 2019-11-26 2021-12-14 交通运输部路网监测与应急处置中心 Communication method suitable for truck ETC lane system and lane system
CN111325863A (en) * 2020-03-27 2020-06-23 深圳复芯微科技有限公司 Method, device and equipment for rapidly waking up vehicle-mounted unit

Also Published As

Publication number Publication date
CN103198527B (en) 2016-01-20

Similar Documents

Publication Publication Date Title
CN103136805B (en) Board units-roadside unit Free-flow charging mode method of commerce
CN103150771B (en) Track PSAM card and the using method thereof of charge is freely flowed for city road and bridge
CN103150770A (en) On board unit embedded secure access module (ESAM) for free stream toll collection and use method thereof
CN203386245U (en) Electronic toll collection (ETC) on board unit on-line issuing system combining mobile terminal
CN103198527B (en) Method of vehicular unit-roadside unit free flow inspection model transaction
US9949132B2 (en) Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message
CN103198526B (en) The concurrent operations method of the multiple board units of roadside unit process
CN100559391C (en) A kind of distributing method of ETC electronic tag
CN201402475Y (en) Electronic charging on-vehicle unit with independent safety control module
CN103247085A (en) Front-mounted electronic toll collection (ETC) on board unit online publication system and method
CN108696353A (en) A kind of distribution method of quantum key and system, service station
CN104255011A (en) Cloud computing secure data storage
CN103679823B (en) OBU and its implementation, ETC system and the OBU of compatible multiple application initialize
CN101826219A (en) Rail transportation ticket-card processing intelligent system and data encryption auditing method
CN103152174A (en) Data processing method, device and parking lot management system applied to parking lot
CN104182786B (en) The safety control of partition management is realized to ultrahigh frequency electronic tag storage region
JP2002300152A (en) Communication security keeping method, its execution device, and its processing program
CN111968256A (en) Electronic tag anti-dismounting method and device, vehicle and storage medium
CN106296839B (en) A kind of safety certifying method and ETC system of anti-lock card
CN203386246U (en) Electronic toll collection (ETC) vehicle-mounted electronic label on-line issuing system
CN113313487A (en) Security authentication method and system
CN1980380B (en) Vehicle networked video advertisement agent authorization electronic processing method and system
CN112116726A (en) ETC transaction security method and device based on block chain technology
CN105551101A (en) ETC reader convenient for application expansion and working method thereof
CN113946876A (en) Service authentication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Zeng Zhiyuan

Inventor after: Zhu Zhenqiang

Inventor after: Yan Bingjie

Inventor after: Mao Zhengquan

Inventor after: Wang Durong

Inventor after: Li Yuhong

Inventor after: Peng Zongkui

Inventor after: Yang Feng

Inventor after: Ma Yueming

Inventor after: Yang Wenli

Inventor after: Zheng Chengzhi

Inventor after: Li Bo

Inventor before: Zeng Zhiyuan

Inventor before: Zheng Xin

Inventor before: Li Yuhong

Inventor before: Yang Yibing

Inventor before: Yang Feng

Inventor before: Zhu Zhenqiang

Inventor before: Yang Wenli

Inventor before: Yan Bingjie

Inventor before: Li Bo

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160120

Termination date: 20200201

CF01 Termination of patent right due to non-payment of annual fee