CN114786136A - Authentication method and device for road side unit, electronic equipment and storage medium - Google Patents

Authentication method and device for road side unit, electronic equipment and storage medium Download PDF

Info

Publication number
CN114786136A
CN114786136A CN202210396335.4A CN202210396335A CN114786136A CN 114786136 A CN114786136 A CN 114786136A CN 202210396335 A CN202210396335 A CN 202210396335A CN 114786136 A CN114786136 A CN 114786136A
Authority
CN
China
Prior art keywords
unit
road side
vehicle
authentication code
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210396335.4A
Other languages
Chinese (zh)
Other versions
CN114786136B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Chenggu Technology Co ltd
Original Assignee
Shenzhen Huichen Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huichen Software Co ltd filed Critical Shenzhen Huichen Software Co ltd
Priority to CN202210396335.4A priority Critical patent/CN114786136B/en
Publication of CN114786136A publication Critical patent/CN114786136A/en
Application granted granted Critical
Publication of CN114786136B publication Critical patent/CN114786136B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/06Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems
    • G07B15/063Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems using wireless information transmission between the vehicle and a fixed station
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Traffic Control Systems (AREA)

Abstract

The application is applicable to the technical field of intelligent traffic, and provides an authentication method and device of a road side unit, electronic equipment and a storage medium. The authentication method comprises the following steps: the method comprises the steps that a vehicle-mounted unit obtains a beacon service table broadcasted by a current road side unit, wherein the beacon service table carries a reference authentication code for validity check; if the authentication code stored in the vehicle-mounted unit is consistent with the reference authentication code, the vehicle-mounted unit takes the current road side unit as an authenticated legal road side unit, the authentication code stored in the vehicle-mounted unit is a unified authentication code of the legal road side units sent to the vehicle-mounted unit by other authenticated legal road side units of the vehicle-mounted unit, and the authenticated other legal road side units and the current road side unit are different road side units. The embodiment of the application can improve the communication efficiency between the vehicle-mounted unit and the road side unit and solve the problem of low safety of the existing broadcast communication.

Description

Authentication method and device for road side unit, electronic equipment and storage medium
Technical Field
The application belongs to the technical field of intelligent traffic, and particularly relates to an authentication method and device for a road side unit, electronic equipment and a storage medium.
Background
Electronic Toll Collection (ETC) is implemented by adopting a vehicle automatic identification technology to complete wireless data communication between a vehicle and a Toll station, and performing vehicle automatic induction identification and interaction of related data, and is usually implemented by an On Board Unit (OBU) installed On the vehicle and a Road Side Unit (RSU) installed On the Toll station.
With the development of high speed of intelligence, in the existing ETC system, the roadside unit often needs to push service data to the on-board unit, such as push messages for reminding danger and congestion of the road ahead. The service data need to be pushed to the vehicle-mounted unit one by one in a unicast communication mode. Therefore, in the actual running process of the vehicle, the on-board unit and each road side unit sequentially arranged along the road need to establish unicast communication connection and authentication one by one and then communicate, and the communication efficiency is low. The broadcast communication is only used for establishing a communication link and acquiring the information of the vehicle-mounted unit, a corresponding safety mechanism is lacked, and because the service data can play a certain guiding role for the vehicle, if the safety protection is not carried out, the risk of false information pushed by an illegal road side unit and wrong guiding for the vehicle exists.
Disclosure of Invention
The embodiment of the application provides a method and a device for authenticating a road side unit, electronic equipment and a storage medium, which can improve the communication efficiency between an on-board unit and the road side unit and solve the problem of low safety of the existing broadcast communication.
A first aspect of the embodiments of the present application provides an authentication method for a road side unit, which is applied to an onboard unit, and the authentication method includes:
acquiring a beacon service table broadcasted by a current road side unit, wherein the beacon service table carries a reference authentication code for validity check;
and if the authentication code stored in the on-board unit is consistent with the reference authentication code, taking the current road side unit as an authenticated legal road side unit, wherein the authentication code stored in the on-board unit is a unified authentication code used by other authenticated legal road side units of the on-board unit to send the legal road side units to the on-board unit, and the authenticated other legal road side units and the current road side unit are different road side units.
A second aspect of the present embodiment provides an authentication method for a road side unit, which is applied to a current road side unit, and the authentication method includes:
and broadcasting a beacon service table, wherein the beacon service table carries a reference authentication code for validity check, so that the vehicle-mounted unit receiving the beacon service table executes the authentication method in the first aspect.
A third aspect of the embodiments of the present application provides an authentication apparatus for a road side unit, configured on an on-board unit, the authentication apparatus including:
the system comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring a beacon service table broadcasted by a current road side unit, and the beacon service table carries a reference authentication code for validity verification;
and the authentication unit is used for taking the current road side unit as an authenticated legal road side unit if the authentication code stored by the on-board unit is consistent with the reference authentication code, wherein the authentication code stored by the on-board unit is a unified authentication code used by other authenticated legal road side units of the on-board unit to send the legal road side units to the on-board unit, and the authenticated other legal road side units and the current road side unit are different road side units.
An authentication device of a road side unit provided in a fourth aspect of the embodiment of the present application is configured at a current road side unit, and the authentication device includes:
a sending unit, configured to broadcast a beacon service table, where the beacon service table carries a reference authentication code for validity check, so that a vehicle-mounted unit that receives the beacon service table executes the authentication method of the first aspect.
A fifth aspect of embodiments of the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the authentication method according to the first aspect or the second aspect when executing the computer program.
A sixth aspect of embodiments of the present application provides a computer-readable storage medium, which stores a computer program, and the computer program, when executed by a processor, implements the steps of the authentication method according to the first aspect or the second aspect.
A seventh aspect of embodiments of the present application provides a computer program product, which, when run on an electronic device, enables the electronic device to perform the authentication method according to the first aspect or the second aspect.
In the embodiment of the application, by acquiring the beacon service table broadcasted by the current road side unit and using the current road side unit as an authenticated legal road side unit when the authentication code stored by the vehicle-mounted unit is consistent with the reference authentication code carried in the beacon service table, on one hand, the vehicle-mounted unit can complete authentication of the road side unit based on broadcast communication of the road side unit before receiving the message pushed by the current road side unit, thereby avoiding the safety risk that the vehicle-mounted unit is pushed by an illegal road side unit to push false messages and improving the safety of broadcast communication between the vehicle-mounted unit and the road side unit, on the other hand, because the authentication code stored by the vehicle-mounted unit is the unified authentication code of the legal road side unit sent by other legal road side units and the reference authentication code of the current road side unit is carried in the beacon service table broadcasted by the vehicle-mounted unit, during the running of the vehicle along the road, the vehicle-mounted unit can acquire and store the unified authentication code after completing unicast communication connection and authentication with the first road side unit, and when the subsequent road side units are authenticated, unicast communication connection does not need to be established again, and multiple random code interaction and encryption and decryption operations do not need to be carried out like the existing unicast authentication mode, so that the communication efficiency between the road side unit and the vehicle-mounted unit can be improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the embodiments or the prior art description will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings may be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic flow chart illustrating an implementation of an authentication method for a road side unit according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an authentication device of a road side unit according to an embodiment of the present application;
FIG. 3 is a schematic diagram of data transmission of an on-board unit continuously authenticating a plurality of road side units according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an authentication device of a road side unit disposed on an on-board unit according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an authentication device of a road side unit configured on the road side unit according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any inventive step, are intended to be protected by the present application.
The electronic toll collection system adopts the vehicle automatic identification technology to complete wireless data communication between a vehicle and a toll station, performs vehicle automatic induction identification and related data interaction, and is usually realized through a vehicle-mounted unit arranged on the vehicle and a road side unit arranged on the toll station.
With the development of high speed of intelligence, in the existing ETC system, the roadside unit often needs to push service data to the on-board unit, such as push messages for reminding danger and congestion of a road ahead. The service data need to be pushed to the vehicle-mounted unit one by one in a unicast communication mode. Based on the consideration of security, when the vehicle-mounted unit and the road side unit communicate with each other, both parties can authenticate each other based on a security mechanism of a point of sale terminal security Access Module (PSAM) -Embedded security control Module (ESAM) during unicast communication. The PSAM-ESAM security mechanism can be divided into an access permission authentication procedure (the roadside unit is authenticated by the on-board unit) and an information authentication procedure (the on-board unit is authenticated by the roadside unit).
Specifically, the access permission authentication flow is as follows:
1. the road side unit obtains a agreement sequence code conttraceSerialNumber from a Vehicle Service Table (VST) sent by the Vehicle-mounted unit through a Get Service or directly, and obtains a random code RndOBE from the Vehicle Service Table through a GetRInd Service or directly, wherein the RndOBE is suitable for being obtained from the Vehicle Service Table;
2. the road side unit determines a temporary authentication key tmpAccessKey (usually 16 bytes) by using a master authentication key MasterAccessKey (usually 16 bytes) and a protocol sequence code contisequenalnumber;
3. the roadside unit encrypts RndOBU1 using the temporary key tmpAccessKey (usually 16 bytes, RndOBU1 is formed by supplementing 8 bytes of 0x00 behind a random code RndOBU, which may be obtained through GetRand service), generating a first access credential accessccredentials 1;
4. the road side unit carries a second access certificate accesscredials in the subsequent instruction (the second access certificate accesscredials are obtained by respectively carrying out exclusive or on the first 8 bytes and the second 8 bytes of the first access certificate accesscredials 1), and sends the second access certificate accesscredials to the vehicle-mounted unit;
5. the vehicle-mounted unit calculates a temporary access certificate tmpaccesscredials by using the authentication key AccessKey and the random code RndOBU;
6. and the vehicle-mounted unit compares whether the second access certificate accesscredials and the temporary access certificate tmpaccesscredials are equal or not, and if the second access certificate accesscredials and the temporary access certificate tmpaccesscredials are equal, the vehicle-mounted unit gives the access permission right to the road side unit, namely the road side unit is confirmed to be a legal road side unit.
The information identification process is as follows:
1. the road side unit directly obtains a protocol sequence code contitserialnumber from the vehicle service table through Get service;
2. the road side unit generates a random number rndRSUFORAuthenn (usually 8 bytes) and sends the random number rndRSUFORAuthenn to the vehicle-mounted unit together with GetSecure service;
3. the vehicle-mounted unit performs MAC calculation on the random number rndRSUFORAuthenn and the content of a File (File) by using an authentication key EncryptKey (usually 16 bytes) to obtain an authentication code;
4. the vehicle-mounted unit sends the File and the authentication code to the road side unit in response;
5. the road side unit calculates a temporary key tmpencyptkey (usually 16 bytes) by using a protocol sequence code contctSerialNumber and a master authentication key MasterEncryptKey;
6. the road side unit calculates an MAC identification code tmpAuthenticator by using a temporary key tmpKey, a random number rndRSUFORAuthenn and a File;
7. and the road side unit compares the authentication code authenticator with the authentication code tmpAuthenticator, and if the authentication code and the authentication code tmpAuthenticator are equal, the data transmitted by the vehicle-mounted unit is confirmed to be legal data.
Currently, the on-board unit and the road side unit generally use only an information identification process to perform unicast communication authentication. Therefore, in the actual running process of the vehicle, the on-board unit and each road side unit sequentially arranged along the road need to establish unicast communication connection and authentication one by one, and the communication efficiency is low.
Moreover, the authentication method of unicast communication requires random code interaction and multiple encryption and decryption operations between the on-board unit and the road side unit, which further reduces communication efficiency.
The broadcast service is only used for establishing a communication link and acquiring the information of the vehicle-mounted unit, a corresponding safety mechanism is lacked, and because the service data can play a certain guiding role for the vehicle, if the safety protection is not carried out, the risk of false information pushed by an illegal road side unit and wrong guiding for the vehicle exists.
In view of this, the present application provides an authentication method for authenticating a road side unit by an on-board unit, which can solve the above problems and improve the communication efficiency between the on-board unit and the road side unit and the security of broadcast communication.
In order to explain the technical means of the present application, the following description will be given by way of specific examples.
Fig. 1 shows a schematic implementation flow diagram of an authentication method for a road side unit according to an embodiment of the present application, where the method may be applied to an onboard unit, and is applicable to a situation where communication efficiency between the onboard unit and the road side unit needs to be improved and security of broadcast communication needs to be improved.
In some embodiments of the present application, the structure of the on-board unit and the roadside unit may be as shown in fig. 2, wherein the on-board unit includes an ESAM module, a radio frequency module, and a main control module. The road side unit comprises a PSAM module, a radio frequency module, a main control module and a communication module.
The ESAM module and the PSAM module are used for executing authentication of a PSAM-ESAM security mechanism. The radio frequency module and the communication module are used for achieving establishment of communication connection and data interaction between the vehicle-mounted unit and the road side unit, and the radio frequency module can be composed of a 5.8GHz radio frequency chip. And each main control module is used for controlling the normal work of the main control module.
Specifically, the authentication method of the roadside unit may include the following steps S101 to S102.
Step S101, a Beacon Service Table (BST) broadcasted by the current road side unit is obtained.
In an embodiment of the application, each road side unit may perform periodic broadcasting of a beacon service table at a first downlink time interval. The beacon service table broadcasted by the current road side unit can indicate that the vehicle-mounted unit replies the corresponding vehicle service table as a response according to the uplink time interval after receiving the beacon service table, and then the connection between the road side unit and the vehicle-mounted unit is established. The beacon service table sent by each road side unit can carry a reference authentication code, and the reference authentication code can be used for verifying the validity of the road side unit.
In the embodiments of the present application, the reference authentication code may be composed of characters such as numbers and letters, and the present application is not limited thereto.
Illustratively, the following table is a description of the data fields of the beacon service table provided in some embodiments of the present application:
Figure BDA0003599147950000071
Figure BDA0003599147950000081
Figure BDA0003599147950000091
and S102, if the authentication code stored in the vehicle-mounted unit is consistent with the reference authentication code, taking the current road side unit as an authenticated legal road side unit.
The authentication code stored by the vehicle-mounted unit is a unified use authentication code of the legal road side unit sent to the vehicle-mounted unit by other legal road side units authenticated by the vehicle-mounted unit. The authenticated other legal RSUs and the current RSU are different RSUs.
That is, after passing the legitimacy authentication of the on-board unit, the other legitimate rsu may transmit the unified usage authentication code commonly used by the respective legitimate rsus to the on-board unit. If the reference authentication code carried in the beacon service table broadcasted by the current road side unit is consistent with the authentication code stored by the vehicle-mounted unit, the authentication code used by the current road side unit is a unified authentication code used by all legal road side units, namely the current road side unit is a legal road side unit, and therefore the vehicle-mounted unit can take the current road side unit as the authenticated legal road side unit.
On the contrary, if the reference authentication code carried in the beacon service table broadcasted by the current road side unit is not consistent with the authentication code stored by the vehicle-mounted unit, it indicates that the authentication code used by the current road side unit is not the unified authentication code used by all legal road side units together, that is, it indicates that the current road side unit is not necessarily the legal road side unit, and at this time, the vehicle-mounted unit can further perform validity authentication on the current road side unit through other modes.
It should be understood that the reference authentication code carried in the beacon service table broadcast by the illegal rsu is not a unified authentication code, or the reference authentication code is not carried in the beacon service table broadcast by the illegal rsu, so the illegal rsu will not pass the legal authentication.
It should be noted that the method for the valid rsu to obtain the commonly used unified authentication code may be selected according to actual situations. In some embodiments, the unified usage authentication code may be generated by any one of the legitimate rsus and sent by that legitimate rsu to the other legitimate rsus. In other embodiments, the upper computer may also generate a unified authentication code, and the upper computer sends the unified authentication code to each legal road side unit.
In order to further improve the security, in some embodiments of the present application, after the on-board unit obtains the beacon service table broadcasted by the current rsu, it may be determined whether the authentication code stored in the on-board unit is within the validity period, and if the authentication code stored in the on-board unit is within the validity period and the authentication code stored in the on-board unit is consistent with the reference authentication code, the current rsu is taken as an authenticated valid rsu.
Specifically, the effective period may be relative time, such as 1 hour. The on-board unit may start timing when receiving the authentication code from the other legitimate rsu. And if the timing time is less than or equal to the validity period, confirming that the authentication code stored in the vehicle-mounted unit is positioned in the validity period, otherwise, confirming that the authentication code stored in the vehicle-mounted unit exceeds the validity period.
The validity period may also be an absolute time, and if the validity period reaches 9 o' clock, the on-board unit may acquire the current absolute time and determine whether the current absolute time is within the end time of the validity period. And if the current absolute time is within the end time of the validity period, confirming that the authentication code stored in the vehicle-mounted unit is located in the validity period, otherwise, confirming that the authentication code stored in the vehicle-mounted unit exceeds the validity period.
It should be noted that, in some embodiments, the valid road side unit may agree to use the authentication code in a unified manner, agree to use the validity period corresponding to the authentication code in a unified manner, and issue the validity period corresponding to the authentication code in a unified manner to the vehicle-mounted unit. More specifically, the valid rsus may update the unified access authentication code at a predetermined frequency. The end time of the validity period of the unified use authentication code used each time is the time for next updating. The preset frequency may be set according to actual conditions, and may be set to 1 hour, 1 day, or the like, for example.
In other embodiments, the validity period may also be a time that is self-configurable by the on-board unit. The configuration process can be completed by staff when the vehicle-mounted unit is generated or issued.
And if the authentication code stored by the vehicle-mounted unit is inconsistent with the reference authentication code, or the vehicle-mounted unit does not store the authentication code, or the current time exceeds the validity period of the authentication code stored by the vehicle-mounted unit, sending a vehicle service table to the current road side unit, wherein the vehicle service table carries an authentication invalid message.
The current road side unit can actively or passively establish unicast communication connection with the vehicle-mounted unit by utilizing routing information carried in the vehicle service table and used for establishing unicast communication connection between the vehicle-mounted unit and the current road side unit based on the authentication invalid message. At this time, the on-board unit may perform validity check on the current road side unit through the established unicast communication connection.
The validity check can be performed through the PSAM-ESAM security mechanism or other security authentication modes, and the application is not limited.
If the validity check is successful after the current road side unit is checked through unicast communication connection, the vehicle-mounted unit can take the current road side unit as an authenticated legal road side unit, and then a new reference authentication code sent by the current road side unit is acquired and stored. The new reference authentication code stored here can be used as the authentication code stored in the vehicle-mounted unit for comparison with the reference authentication code carried in the beacon service table received next time.
It should be noted that, the roadside unit may directly send a new reference authentication code to the on-board unit. In order to reduce the number of data interaction and improve the interaction efficiency, the current road side unit may also carry a new reference authentication code in the first service data, and the new reference authentication code is sent to the vehicle-mounted unit when the first service data is sent to the vehicle-mounted unit.
The first service data includes data sent by the road side unit to the vehicle-mounted unit currently in the process of executing the service operation by the vehicle-mounted unit, and specifically may refer to bill data of a payment operation, a payment success message, a push message for reminding the road side unit of danger and congestion of a road ahead to the vehicle-mounted unit, and the like.
In the embodiment of the application, by acquiring the beacon service table broadcasted by the current road side unit and using the current road side unit as the authenticated legal road side unit when the authentication code stored by the vehicle-mounted unit is consistent with the reference authentication code carried in the beacon service table, on one hand, the vehicle-mounted unit can complete the authentication of the authenticated road side unit based on the broadcast communication of the road side unit before receiving the message pushed by the current road side unit, thereby avoiding the safety risk that the vehicle-mounted unit is pushed by the illegal road side unit to push false messages and improving the safety of the broadcast communication between the vehicle-mounted unit and the road side unit, on the other hand, because the authentication code stored by the vehicle-mounted unit is the unified authentication code of the legal road side units sent by other legal road side units and the reference authentication code of the current road side unit is carried in the beacon service table broadcasted by the vehicle-mounted unit, the vehicle runs along the road, the vehicle-mounted unit can acquire and store the unified authentication code after completing unicast communication connection and authentication with the first road side unit, and when the subsequent road side unit is authenticated, unicast communication connection does not need to be established again, multiple random code interaction and encryption and decryption operations do not need to be carried out like the existing unicast authentication mode, and the communication efficiency between the road side unit and the vehicle-mounted unit can be improved.
It should be noted that, after the current road side unit is taken as a legal road side unit, the on-board unit may send the vehicle service table to the current road side unit.
The vehicle service table may carry an authentication success message, and the authentication success message may be used to instruct the current road side unit and the vehicle-mounted unit to perform interaction of the second service data.
The second service data may include data mutually transmitted between the current road side unit and the vehicle-mounted unit in the process of executing the service operation by the vehicle-mounted unit, and specifically may refer to bill data sent by the current road side unit to the vehicle-mounted unit, a paid message sent by the vehicle-mounted unit to the current road side unit, successful paid message data sent by the current road side unit to the vehicle-mounted unit, a push message for reminding the vehicle-mounted unit of danger and congestion of a road ahead by the road side unit, and the like.
The embodiment of the application further provides an authentication method for the road side unit, which can be applied to the current road side unit and can be suitable for improving the communication efficiency between the vehicle-mounted unit and the road side unit while improving the safety of data interaction between the vehicle-mounted unit and the road side unit.
The current road side unit may broadcast a beacon service table, where the beacon service table carries a reference authentication code for validity check, so that the vehicle-mounted unit that receives the beacon service table executes the authentication method shown in fig. 1.
For ease of understanding, referring to fig. 3, fig. 3 is a schematic diagram of data transmission of a vehicle-mounted unit continuously authenticating a plurality of road side units during the running of the vehicle on a road. The road side units A, B and C are arranged in sequence along a road and are legal road side units, and the legal road side units are updated periodically by using authentication codes uniformly. The road side unit D is an illegal road side unit.
When the vehicle passes through the signal area of the rsu a, the on-board unit may receive the beacon service table broadcast by the rsu a, and at this time, the rsu a is the current rsu. Because the authentication code is not stored in the vehicle-mounted unit, and the authentication code stored in the vehicle-mounted unit is inconsistent with the reference authentication code, the vehicle-mounted unit can send a vehicle service table carrying an authentication invalid message to the road side unit A. The vehicle-mounted unit establishes unicast communication connection with the road side unit A, and the legitimacy of the road side unit A is verified through the unicast communication connection. After the validity check is passed, the road side unit a can feed back a new reference authentication code to the vehicle-mounted unit (if the unified authentication code is not updated in the period, the new reference authentication code is the same as the reference authentication code carried by the beacon service table, and if the unified authentication code is updated in the period, the new reference authentication code is different from the reference authentication code carried by the beacon service table), and performs service data interaction with the road side unit a. After the vehicle-mounted unit acquires the new reference authentication code sent by the road side unit A, the new reference authentication code is stored as the authentication code stored by the vehicle-mounted unit.
Then, when the vehicle passes through the signal area of the road side unit B, the on board unit may receive the beacon service table broadcast by the road side unit B, and at this time, the road side unit B is the current road side unit. Because the authentication code stored by the vehicle-mounted unit (i.e. the new reference authentication code sent by the road side unit a) is located in the validity period of the authentication code, and the authentication code stored by the vehicle-mounted unit is consistent with the reference authentication code, the vehicle-mounted unit can take the road side unit B as an authenticated legal road side unit, send the vehicle service table carrying the authentication success message to the road side unit B, and perform service data interaction with the road side unit B.
Then, when the vehicle passes through the signal area of the rsu C, the on-board unit may receive the beacon service table broadcast by the rsu C, and at this time, the rsu C is the current rsu. Since the authentication code stored in the on-board unit (i.e. the new reference authentication code sent by the rsu a) exceeds its validity period, the on-board unit may send the rsu C a vehicle service table carrying an authentication invalidity message. And the vehicle-mounted unit establishes unicast communication connection with the road side unit C, and performs validity check on the road side unit C through the unicast communication connection. After the validity check is passed, the road side unit C may feed back a new reference authentication code to the vehicle-mounted unit, and perform service data interaction with the road side unit C. After the vehicle-mounted unit acquires the new reference authentication code sent by the road side unit C, the vehicle-mounted unit stores the new reference authentication code sent by the road side unit C as the authentication code stored by the vehicle-mounted unit.
In the process, if the vehicle-mounted unit receives the beacon service table sent by the road side unit D, the vehicle-mounted unit may send the vehicle service table carrying the authentication invalidity message to the road side unit D because the beacon service table does not carry the reference authentication code for performing the validity check, or the authentication code stored in the vehicle-mounted unit is not consistent with the reference authentication code carried in the beacon service table. And the on-board unit establishes unicast communication connection with the road side unit D, and the legitimacy of the road side unit D is verified through the unicast communication connection. At this time, if the validity check fails, the vehicle-mounted unit takes the current road side unit as an illegal road side unit, and the vehicle-mounted unit does not interact with the road side unit D in service data.
It should be noted that for simplicity of description, the above-mentioned method embodiments are described as a series of combinations of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts, as some steps may occur in other orders according to the present application.
Fig. 4 is a schematic structural diagram of an authentication device 400 of a road side unit according to an embodiment of the present application, where the authentication device 400 of the road side unit is disposed on an on-board unit.
Specifically, the authentication device 400 of the roadside unit may include:
an obtaining unit 401, configured to obtain a beacon service table broadcasted by a current roadside unit, where the beacon service table carries a reference authentication code for performing validity check;
an authentication unit 402, configured to, if the authentication code stored in the onboard unit is consistent with the reference authentication code, take the current rsu as an authenticated valid rsu, where the authentication code stored in the onboard unit is a unified authentication code used by valid rsus sent by other authenticated valid rsus to the onboard unit, and the authenticated other valid rsus and the current rsu are different rsus.
In some embodiments of the present application, the authentication unit 402 may be specifically configured to: and if the authentication code stored in the vehicle-mounted unit is positioned in the validity period of the authentication code, and the authentication code stored in the vehicle-mounted unit is consistent with the reference authentication code, taking the current road side unit as an authenticated legal road side unit.
In some embodiments of the present application, the authentication unit 402 may be specifically configured to: if the authentication code stored in the vehicle-mounted unit is not consistent with the reference authentication code, or the vehicle-mounted unit does not store the authentication code, or the current time exceeds the validity period of the authentication code stored in the vehicle-mounted unit, sending a vehicle service table to the current road side unit, wherein the vehicle service table carries an authentication invalid message; and establishing unicast communication connection with the current road side unit based on the vehicle service table, and carrying out validity check on the current road side unit through the unicast communication connection.
In some embodiments of the present application, the authentication unit 402 may be specifically configured to: and carrying out validity check on the current road side unit through a PSAM-ESAM safety mechanism.
In some embodiments of the present application, the authentication device 400 of the rsu may further include a storage unit, configured to, if the validity check is successful, take the current rsu as an authenticated valid rsu; and acquiring and storing a new reference authentication code sent by the current road side unit, wherein the new reference authentication code is carried in first service data, and the first service data comprises data sent by the current road side unit to the vehicle-mounted unit in the process of executing service operation by the vehicle-mounted unit.
In some embodiments of the application, the end time of the validity period is a time point when the unified authentication code sent by the other valid rsu to the on-board unit is updated next time, and the authentication unit 402 may be specifically configured to: and determining whether the current time is within the validity period or not according to the current time and the end time of the validity period.
In some embodiments of the present application, the authentication apparatus 400 of the rsu may further include a data transmission unit, configured to send a vehicle service table to the current rsu, where the vehicle service table carries an authentication success message, where the authentication success message is used to instruct the current rsu to perform second service data interaction with the on-board unit, and the second service data includes data mutually transmitted between the current rsu and the on-board unit in a process of performing a service operation by the on-board unit.
It should be noted that, for convenience and simplicity of description, the specific working process of the authentication device 400 of the roadside unit may refer to the corresponding process of the method described in fig. 1 to fig. 3, and is not described herein again.
Fig. 5 is a schematic structural diagram of an authentication device 500 of a road side unit according to an embodiment of the present disclosure, where the authentication device 500 of the road side unit is configured on a current road side unit.
Specifically, the authentication device 500 of the roadside unit may include:
a sending unit 501, configured to broadcast a beacon service table, where the beacon service table carries a reference authentication code for performing validity check, so that a vehicle-mounted unit receiving the beacon service table executes the authentication method shown in fig. 1.
Fig. 6 is a schematic view of an electronic device according to an embodiment of the present application. The electronic device 6 may be the aforementioned on-board unit or roadside unit.
Specifically, the electronic device 6 may include: a processor 60, a memory 61 and a computer program 62, such as an authentication program of a road side unit, stored in said memory 61 and executable on said processor 60. The processor 60, when executing the computer program 62, implements the steps in the authentication method embodiments of each roadside unit described above, such as steps S101 to S102 shown in fig. 1, and for example, broadcasts a beacon service table. Alternatively, the processor 60 implements the functions of the modules/units in the device embodiments described above when executing the computer program 52, for example, the obtaining unit 401 and the authentication unit 402 shown in fig. 4, and for example, the sending unit 501 shown in fig. 5.
The computer program may be divided into one or more modules/units, which are stored in the memory 61 and executed by the processor 60 to complete the application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program in the electronic device.
For example, the computer program may be divided into: an acquisition unit and an authentication unit. The specific functions of each unit are as follows: the system comprises an acquisition unit, a receiving unit and a processing unit, wherein the acquisition unit is used for acquiring a beacon service table broadcasted by a current road side unit, and the beacon service table carries a reference authentication code for validity check; and the authentication unit is used for taking the current road side unit as an authenticated legal road side unit if the authentication code stored by the vehicle-mounted unit is consistent with the reference authentication code, wherein the authentication code stored by the vehicle-mounted unit is a unified use authentication code of the legal road side units sent to the vehicle-mounted unit by other authenticated legal road side units of the vehicle-mounted unit, and the other authenticated legal road side units and the current road side unit are different road side units.
For another example, the computer program may be divided into: and a sending unit. The specific functions of the sending unit are as follows: a sending unit, configured to broadcast a beacon service table, where the beacon service table carries a reference authentication code for performing validity check, so that a vehicle-mounted unit receiving the beacon service table executes the authentication method shown in fig. 1.
The electronic device may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 6 is merely an example of an electronic device, and does not constitute a limitation of electronic devices, and may include more or fewer components than those shown, or some components may be combined, or different components, e.g., the electronic device may also include input output devices, network access devices, buses, etc.
The Processor 60 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 61 may be an internal storage unit of the electronic device, such as a hard disk or a memory of the electronic device. The memory 61 may also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the electronic device. Further, the memory 61 may also include both an internal storage unit and an external storage device of the electronic device. The memory 61 is used for storing the computer program and other programs and data required by the electronic device. The memory 61 may also be used to temporarily store data that has been output or is to be output.
It should be noted that, for convenience and simplicity of description, the structure of the electronic device may also refer to the specific description of the structure in the method embodiment, and details are not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the description of each embodiment has its own emphasis, and reference may be made to the related description of other embodiments for parts that are not described or recited in any embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/electronic device and method may be implemented in other ways. For example, the above-described apparatus/electronic device embodiments are merely illustrative, and for example, the division of the modules or units is only one type of logical function division, and other division manners may exist in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated module/unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier signal, telecommunications signal, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (12)

1. An authentication method of a road side unit is applied to an on-board unit, and comprises the following steps:
acquiring a beacon service table broadcasted by a current road side unit, wherein the beacon service table carries a reference authentication code for validity check;
and if the authentication code stored in the vehicle-mounted unit is consistent with the reference authentication code, taking the current road side unit as an authenticated legal road side unit, wherein the authentication code stored in the vehicle-mounted unit is a unified use authentication code of the legal road side units sent to the vehicle-mounted unit by other authenticated legal road side units of the vehicle-mounted unit, and the authenticated other legal road side units and the current road side unit are different road side units.
2. The method of authenticating a rsu of claim 1, wherein the determining the current rsu as an authenticated valid rsu if the authentication code stored by the on-board unit matches the reference authentication code comprises:
and if the authentication code stored in the vehicle-mounted unit is positioned in the validity period of the authentication code, and the authentication code stored in the vehicle-mounted unit is consistent with the reference authentication code, taking the current road side unit as an authenticated legal road side unit.
3. The method of authentication of a roadside unit of claim 2, further comprising:
if the authentication code stored in the vehicle-mounted unit is not consistent with the reference authentication code, or the vehicle-mounted unit does not store the authentication code, or the current time exceeds the validity period of the authentication code stored in the vehicle-mounted unit, sending a vehicle service table to the current road side unit, wherein the vehicle service table carries an authentication invalid message;
and establishing unicast communication connection with the current road side unit based on the vehicle service table, and carrying out validity check on the current road side unit through the unicast communication connection.
4. The method of authenticating a rsu of claim 3, wherein the verifying the validity of the current rsu comprises:
and carrying out validity check on the current road side unit through a PSAM-ESAM safety mechanism.
5. The method of authentication of a rsu of claim 3, wherein after the validity check of the current rsu, the method of authentication comprises:
if the validity check is successful, taking the current road side unit as an authenticated valid road side unit;
and acquiring and storing a new reference authentication code sent by the current road side unit, wherein the new reference authentication code is carried in first service data, and the first service data comprises data sent by the current road side unit to the vehicle-mounted unit in the process of executing service operation by the vehicle-mounted unit.
6. The method of authenticating a rsu of claim 3, wherein the end time of the validity period is the next time the other legitimate rsu sends the on-board unit an update of the unified access authentication code, the method further comprising:
and determining whether the current time is within the valid period according to the current time and the end time of the valid period.
7. Method of authentication of a rsu according to any of claims 1 to 6, comprising, after said taking the current rsu as a legal rsu:
and sending a vehicle service table to the current road side unit, wherein the vehicle service table carries an authentication success message, the authentication success message is used for indicating the current road side unit and the vehicle-mounted unit to perform interaction of second service data, and the second service data comprises data mutually transmitted between the current road side unit and the vehicle-mounted unit in the process of executing service operation by the vehicle-mounted unit.
8. An authentication method of a road side unit is applied to a current road side unit, and the authentication method comprises the following steps:
broadcasting a beacon service table, wherein the beacon service table carries a reference authentication code for validity check, so that a vehicle-mounted unit receiving the beacon service table executes the authentication method in any one of claims 1 to 7.
9. An authentication device of a roadside unit, which is disposed in an on-board unit, the authentication device comprising:
the system comprises an acquisition unit, a receiving unit and a processing unit, wherein the acquisition unit is used for acquiring a beacon service table broadcasted by a current road side unit, and the beacon service table carries a reference authentication code for validity check;
and the authentication unit is used for taking the current road side unit as an authenticated legal road side unit if the authentication code stored by the vehicle-mounted unit is consistent with the reference authentication code, wherein the authentication code stored by the vehicle-mounted unit is a unified use authentication code of the legal road side units sent to the vehicle-mounted unit by other authenticated legal road side units of the vehicle-mounted unit, and the other authenticated legal road side units and the current road side unit are different road side units.
10. An authentication device of a road side unit, configured to a current road side unit, the authentication device comprising:
a sending unit, configured to broadcast a beacon service table, where the beacon service table carries a reference authentication code for validity check, so that a vehicle-mounted unit that receives the beacon service table executes the authentication method according to any one of claims 1 to 7.
11. An electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the steps of the authentication method according to any of claims 1 to 7 are implemented when the processor executes the computer program or the steps of the authentication method according to claim 8 are implemented when the processor executes the computer program.
12. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the authentication method according to any one of claims 1 to 7, or which, when being executed by a processor, carries out the steps of the authentication method according to claim 8.
CN202210396335.4A 2022-04-15 2022-04-15 Authentication method and device for road side unit, electronic equipment and storage medium Active CN114786136B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210396335.4A CN114786136B (en) 2022-04-15 2022-04-15 Authentication method and device for road side unit, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210396335.4A CN114786136B (en) 2022-04-15 2022-04-15 Authentication method and device for road side unit, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114786136A true CN114786136A (en) 2022-07-22
CN114786136B CN114786136B (en) 2024-02-13

Family

ID=82428907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210396335.4A Active CN114786136B (en) 2022-04-15 2022-04-15 Authentication method and device for road side unit, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114786136B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115988461A (en) * 2022-12-28 2023-04-18 交通运输部路网监测与应急处置中心 Extended broadcasting method and device based on vehicle-road cooperation, storage medium and electronic equipment

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11205308A (en) * 1997-10-29 1999-07-30 Hitachi Ltd Authentication method and information system
JP2004139380A (en) * 2002-10-18 2004-05-13 Organization For Road System Enhancement On-vehicle equipment setup method and its system, and on-vehicle equipment
JP2015075990A (en) * 2013-10-10 2015-04-20 株式会社デンソー Road-vehicle communication system and in-vehicle unit
CN108076016A (en) * 2016-11-15 2018-05-25 ***通信有限公司研究院 Authentication method and device between mobile unit
CN109194610A (en) * 2018-07-24 2019-01-11 北京交通大学 Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary
CN110831004A (en) * 2019-10-16 2020-02-21 上海交通大学 Node identity authentication method and system suitable for Internet of vehicles
CN111385735A (en) * 2020-02-21 2020-07-07 北京交通大学 Authentication group maintenance method for distributed authentication of Internet of vehicles
AU2017445300A1 (en) * 2017-12-28 2020-08-13 Paxgrid Cdn Inc. System for authenticating and authorizing access to and accounting for wireless access vehicular environment consumption by client devices
CN111951420A (en) * 2020-08-27 2020-11-17 深圳成谷智能科技有限公司 Method and device for safely transmitting ETC broadcast message
CN112019517A (en) * 2020-08-04 2020-12-01 中国联合网络通信集团有限公司 Internet of vehicles authentication method and road side unit
CN113596778A (en) * 2021-07-28 2021-11-02 国家电网有限公司 Vehicle networking node anonymous authentication method based on block chain
CN113905351A (en) * 2021-08-30 2022-01-07 兰州大学 Internet of vehicles authentication method based on block chain and confidential calculation
CN114339680A (en) * 2022-03-07 2022-04-12 高新兴智联科技有限公司 V2X system and safety authentication method

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11205308A (en) * 1997-10-29 1999-07-30 Hitachi Ltd Authentication method and information system
JP2004139380A (en) * 2002-10-18 2004-05-13 Organization For Road System Enhancement On-vehicle equipment setup method and its system, and on-vehicle equipment
JP2015075990A (en) * 2013-10-10 2015-04-20 株式会社デンソー Road-vehicle communication system and in-vehicle unit
CN108076016A (en) * 2016-11-15 2018-05-25 ***通信有限公司研究院 Authentication method and device between mobile unit
AU2017445300A1 (en) * 2017-12-28 2020-08-13 Paxgrid Cdn Inc. System for authenticating and authorizing access to and accounting for wireless access vehicular environment consumption by client devices
CN109194610A (en) * 2018-07-24 2019-01-11 北京交通大学 Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary
CN110831004A (en) * 2019-10-16 2020-02-21 上海交通大学 Node identity authentication method and system suitable for Internet of vehicles
CN111385735A (en) * 2020-02-21 2020-07-07 北京交通大学 Authentication group maintenance method for distributed authentication of Internet of vehicles
CN112019517A (en) * 2020-08-04 2020-12-01 中国联合网络通信集团有限公司 Internet of vehicles authentication method and road side unit
CN111951420A (en) * 2020-08-27 2020-11-17 深圳成谷智能科技有限公司 Method and device for safely transmitting ETC broadcast message
CN113596778A (en) * 2021-07-28 2021-11-02 国家电网有限公司 Vehicle networking node anonymous authentication method based on block chain
CN113905351A (en) * 2021-08-30 2022-01-07 兰州大学 Internet of vehicles authentication method based on block chain and confidential calculation
CN114339680A (en) * 2022-03-07 2022-04-12 高新兴智联科技有限公司 V2X system and safety authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
文松;王敏;胡春阳;徐德刚;: "基于可信计算的车载网认证方案", 湖北文理学院学报, no. 08 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115988461A (en) * 2022-12-28 2023-04-18 交通运输部路网监测与应急处置中心 Extended broadcasting method and device based on vehicle-road cooperation, storage medium and electronic equipment
CN115988461B (en) * 2022-12-28 2024-02-09 交通运输部路网监测与应急处置中心 Extension broadcasting method and device based on vehicle-road cooperation, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN114786136B (en) 2024-02-13

Similar Documents

Publication Publication Date Title
US10069634B2 (en) Apparatuses and methods for certificate generation, certificate revocation and certificate verification
JP6065113B2 (en) Data authentication apparatus and data authentication method
US9450937B2 (en) Vehicle network authentication system, and vehicle network authentication method
US20190281462A1 (en) Systems and methods for transmitting conditional access information
CN107682859B (en) Message processing method and related equipment
CN111193721A (en) ETC safety communication method and system
JP2012227672A (en) Inter-vehicle/road-to-vehicle communication system
KR101782483B1 (en) Method and apparatus for generating certificate of vehicle in vehicular ad-hoc network
CN111951420A (en) Method and device for safely transmitting ETC broadcast message
WO2021120931A1 (en) Communication method, terminal device, road side unit, server, system and medium
US20120300929A1 (en) Method for authenticating onboard units
CN113920615A (en) Method for connecting Bluetooth key with vehicle, vehicle Bluetooth system and Bluetooth key
KR20150079232A (en) Wireless lan apparatus and vehicle authentiction method using the wireless lan apparatus
CN114786136B (en) Authentication method and device for road side unit, electronic equipment and storage medium
JP2014096811A (en) Communication apparatus
CN113442870A (en) Method and device for deactivating vehicle-mounted unit, storage medium and terminal
CN111954168A (en) Method and device for realizing differentiated LTE-V broadcast message
CN114785521B (en) Authentication method, authentication device, electronic equipment and storage medium
US20210067349A1 (en) Method Of Enrolling A Device Into A PKI Domain For Certificate Management Using Factory Key Provisioning
CN106372557B (en) Certificate card information acquisition method, device and system
CN115802347A (en) Method and device for authenticating identity of terminal in Internet of vehicles, electronic equipment and storage medium
EP2916518A1 (en) Apparatuses and methods for certificate generation, certificate revocation and certificate verification
CN115706929A (en) Vehicle road information interaction method, system and related equipment
CN114449513A (en) Authentication method, device and equipment of road side equipment and computer storage medium
CN112839019A (en) Vehicle-mounted data transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230714

Address after: 518000 3rd floor, block a, building 19, zhonghaixin Innovation Industrial Park, Ganli 2nd Road, Longgang District, Shenzhen City, Guangdong Province

Applicant after: SHENZHEN CHENGGU TECHNOLOGY Co.,Ltd.

Address before: 518000 1004, 10th floor, building 3, Yongnan Industrial Zone, Shangcun community, Gongming street, Guangming District, Shenzhen, Guangdong

Applicant before: Shenzhen Huichen Software Co.,Ltd.

GR01 Patent grant
GR01 Patent grant