Movatterモバイル変換


[0]ホーム

URL:


CN106209384B - Use the client terminal of security mechanism and the communication authentication method of charging unit - Google Patents

Use the client terminal of security mechanism and the communication authentication method of charging unit
Download PDF

Info

Publication number
CN106209384B
CN106209384BCN201610566212.5ACN201610566212ACN106209384BCN 106209384 BCN106209384 BCN 106209384BCN 201610566212 ACN201610566212 ACN 201610566212ACN 106209384 BCN106209384 BCN 106209384B
Authority
CN
China
Prior art keywords
client terminal
server
charging unit
sid
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610566212.5A
Other languages
Chinese (zh)
Other versions
CN106209384A (en
Inventor
辛丹
朱卓敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Mdt Infotech Ltd
Original Assignee
Shanghai Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Mdt Infotech LtdfiledCriticalShanghai Mdt Infotech Ltd
Priority to CN201610566212.5ApriorityCriticalpatent/CN106209384B/en
Publication of CN106209384ApublicationCriticalpatent/CN106209384A/en
Application grantedgrantedCritical
Publication of CN106209384BpublicationCriticalpatent/CN106209384B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The present invention relates to the communication authentication methods of a kind of client terminal using security mechanism and charging unit, are as follows: client terminal sends the final ciphertext at least partly by the unique corresponding public key encryption of the client terminal by Internet of Things net mode to charging unit, the client terminal information whether legal by the request content of Internet of Things net mode reception charging unit forwarding, to complete communication authentication process.It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, are as follows: charging unit by Internet of Things net mode receive client terminal send at least partly by the client terminal uniquely final ciphertext of corresponding public key encryption after, it is transmitted to server, the information whether charging unit forwards the request content obtained by server legal by Internet of Things net mode to client terminal, to complete communication authentication process.The present invention realizes the communication authentication between client terminal and charging unit, safety with higher using the unique SID of client terminal, public key, key.

Description

Use the client terminal of security mechanism and the communication authentication method of charging unit
Technical field
The present invention relates to a kind of methods for realizing communication authentication between client terminal and charging unit, especially a kind ofCommunication authentication method under security mechanism.
Background technique
The existing charging pile solution based on cloud platform includes Cloud Server platform, charging unit and client terminal threeIt is most of.It in normal use process, is attached first by client terminal and charging unit, then charging unit passes through netNetwork sends Cloud Server platform for client terminal information and matches;It is laggard that Cloud Server platform receives client terminal informationRow authentication and matching issue the information of successful match to charging unit if success, to complete communication authentication, and fillElectric installation just can be carried out the subsequent operation with client terminal in next step after only receiving the information of successful match.But mistake hereinCheng Zhong, the safety problem that client terminal is communicated with charging unit are often ignored, and network hacker utilizes various loopholes, to entire logicalLetter link is launched a offensive, and is led to the leakage of many key messages, be will cause heavy losses to user and charging unit enterprise.
Summary of the invention
The object of the present invention is to provide a kind of safety that can be improved communication authentication between client terminal and charging unit,Avoid loss using the client terminal of security mechanism and the communication authentication method of charging unit.
In order to achieve the above objectives, the technical solution adopted by the present invention is that:
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, this method are as follows: client terminalThe final ciphertext at least partly by the unique corresponding public key encryption of the client terminal is sent to charging unit by Internet of Things net mode,The client terminal information whether legal by request content that Internet of Things net mode receives charging unit forwarding, thus completeAt communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the request content;The charging unitThe final ciphertext is transmitted to the server of its connection, the server by the SID uniquely decrypt by corresponding private keyThe final ciphertext simultaneously judges whether the request content is legal, and the whether legal information of request content is sent to described fillElectric installation;When the client terminal is to the server registration, by the corresponding SID for generating the client terminal of the server,The public key, the private key, the SID of the client terminal, the public key are sent to the client terminal, institute by the serverIt states private key to be stored in the server, for communication authentication process use.
In above scheme, the unique SID of client terminal and request time stamp, charge request content use the public keyEncryption forms level-one ciphertext, and the level-one ciphertext is spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private of the SIDKey decrypts the level-one ciphertext by the private key and obtains the request time and stabs, and the server is by the timestamp of its ownIt is compared with request time stamp and judges whether the request content is legal.
Preferably, allow when the phase difference of request time stamp and the timestamp of the server itself in threshold value δIn range, then judge that the request content is legal.
Preferably, the client terminal will be in the SID of plaintext character, request time stamp, the charge requestAfter appearance is converted to plaintext byte stream, level-one ciphertext is formed using the public key encryption;
After the plaintext byte circulation that the server will decrypt the level-one ciphertext acquisition is changed to plaintext character, described in acquisitionSID, request time stamp, the charge request content.
The Internet of Things net mode is the communication mode using any one communication protocol in NFC, bluetooth, zigbee, 433M.
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, this method are as follows: charging unitBy Internet of Things net mode receive that client terminal sends at least partly by the final of the unique corresponding public key encryption of the client terminalAfter ciphertext, it is transmitted to server, the charging unit is forwarded to the client terminal by the server by Internet of Things net modeThe whether legal information of the request content obtained, to complete communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the request content;The server is logicalCrossing the SID, uniquely corresponding private key decrypts the final ciphertext and judges whether the request content is legal, and will requestThe whether legal information of content is sent to the charging unit;When the client terminal is to the server registration, by the clothesBe engaged in corresponding SID, the public key, the private key for generating the client terminal of device, the SID of the client terminal, the public key byThe server is sent to the client terminal, and the private key is stored in the server, for the communication authentication processIt uses.
In above scheme, the unique SID of client terminal and request time stamp, charge request content use the public keyEncryption forms level-one ciphertext, and the level-one ciphertext is spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private of the SIDKey decrypts the level-one ciphertext by the private key and obtains the request time and stabs, and the server is by the timestamp of its ownIt is compared with request time stamp and judges whether the request content is legal.
Preferably, allow when the phase difference of request time stamp and the timestamp of the server itself in threshold value δIn range, then judge that the request content is legal.
Preferably, the client terminal will be in the SID of plaintext character, request time stamp, the charge requestAfter appearance is converted to plaintext byte stream, level-one ciphertext is formed using the public key encryption;
After the plaintext byte circulation that the server will decrypt the level-one ciphertext acquisition is changed to plaintext character, described in acquisitionSID, request time stamp, the charge request content.
The Internet of Things net mode is the communication mode using any one communication protocol in NFC, bluetooth, zigbee, 433M.
Due to the above technical solutions, the present invention has the following advantages over the prior art: the present invention utilizes clientThe unique SID of terminal, public key, key realize the communication authentication between client terminal and charging unit, solve server withAnd charging unit to client terminal authentication the problem of, the safety problem of transmission and legacy protocol process it is cumbersome, speedThe slower problem of rate, safety with higher are more advantageous to user and obtain good experience.
Detailed description of the invention
Attached drawing 1 is the composition schematic diagram of electrically-charging equipment.
Attached drawing 2 is client terminal register flow path figure.
Attached drawing 3 is SID product process figure.
Attached drawing 4 is the communication authentication method flow chart of client terminal and charging unit.
Attached drawing 5 is encryption, decryption flow chart.
Attached drawing 6 is the communication structure figure of client terminal and charging unit.
Specific embodiment
The invention will be further described for embodiment shown in reference to the accompanying drawing.
Embodiment one: as shown in Fig. 1 by user terminal (usually mobile phone), charging unit (charging pile) and serverThe electrically-charging equipment of composition needs user to pass through client before user is connect by client terminal with charging unit and to be chargedTerminal is registered.Register flow path is as shown in Fig. 2, since client terminal often uses mobile phone, register flow path are as follows:
1) user inputs telephone number in client terminal, and is sent to server;
2) server requests to send identifying code to Short Message Service Gateway;
3) identifying code is sent to client terminal by Short Message Service Gateway;
4) after client terminal receives the short message containing identifying code, identifying code is sent to server;
5) identifying code that server is sent according to client terminal completes verifying, and it is unique corresponding for new user to create itSID(Secure ID) and public private key pair (Kpub(Public Key) and Kpri(Private Key)), and by SID and public key KpubIt is sent to client terminal, and private key KpriIt then saves in the server.
In the above process, in order to guarantee the safety of Internet of Things Network Communication, with user orientation server submit application for registration stage,Design a unique user identification code SID for identification for different user, and be different from normal registration process itIt is in server is the RSA public private key pair that each user generates a 2048 new bit, is used for subsequent user identityThe encryption and decryption of certification and Content of Communication.
In order to guarantee the confidentiality of user information, server can carry out SHA-1 encryption according to the cell-phone number of user, generate 20The SID of a byte, the convenient phone number for not obtained user easily by malicious attacker in message transmitting procedure.SHA-1 addsClose process is as shown in Fig. 3, and SHA-1 one cycle iterative process is illustrated in diagram: A, B, C, D and E are the blocks of 32bit;F isNon-linear variable;N=5 in < < < n(figure, 30) show the digit of ring shift left, iterative process n is different each time;WtIt is thisTake turns the extension information word of t;KtIt is the circulation constant of epicycle t;Right side field word frame indicates to increase by 32 powers of mould 2 in figure.It is inputtingEnd input user mobile phone number, encrypts by SHA-1 after carrying out cover, piecemeal, generates the SID of 20 bytes.SHA-1 Encryption AlgorithmIt is irreversible, anti-collision, and there is good avalanche effect, so by the SID of the encrypted generation of SHA-1 as userTransmission of the information between client terminal and server has good confidentiality.Calculate user's using SHA-1 in the present inventionSummary info not only can guarantee that the SID that different user information generates was different, but also can guarantee in the case where SID leakage, Yong HuxinBreath will not be compromised, so that user be allowed to enjoy higher safety guarantee.
RSA is current most influential public key encryption algorithm, it can resist up to the present known mostCryptographic attack is recommended as public key data encryption standard by ISO.Server firstly generates a pair of 2048 RSA according to SIDKey, one of them is privacy key, also referred to as private key, is saved by server;Another is public-key cryptography, can external disclosure,Also referred to as public key sends jointly to user's client terminal together with SID by server and saves.RSA Algorithm is a kind of asymmetricCryptographic algorithm, it is so-called asymmetric, just refer to that the algorithm needs a pair of secret keys, using one of encryption, then needs to use anotherIt could decrypt.In server end, RSA public private key pair is produced using OPENSSL:
L generates private key: openssl genrsa-out privatekey.key 2048
L corresponds to public key: openssl rsa-in privatekey.key-pubout-out pubkey.key
Use RSA(asymmetric encryption), rather than AES(symmetric cryptography), it is to be obtained since symmetric cryptography decruption key is identicalTake one kind of wherein encryption key or decruption key that can crack and forge all data, very not for data transmission securityBenefit.So choosing RSA as the encryption method in data transmission, and set private key and be merely stored on server, can preventExisting identity forgery problem (being more common in man-in-the-middle attack) after the leakage of one side's key.
After completing above-mentioned register flow path, it can be communicated by client terminal with charging unit, it is between the two when completingCommunication authentication after, i.e., implementable specific charging instruction.
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, for client terminal,This method are as follows: client terminal is sent at least partly to charging unit by the unique corresponding public affairs of the client terminal by Internet of Things net modeThe final ciphertext of key encryption, the client terminal letter whether legal by the request content of Internet of Things net mode reception charging unit forwardingBreath, to complete communication authentication process.And for charging unit, this method are as follows: a kind of client using security mechanism is wholeThe communication authentication method at end and charging unit, this method are as follows: charging unit receives what client terminal was sent by Internet of Things net modeAt least partly by the client terminal uniquely final ciphertext of corresponding public key encryption after, be transmitted to server, charging unit passes throughThe whether legal information of the request content that Internet of Things net mode is obtained to client terminal forwarding by server, to complete communication authenticationProcess.In the above method, final ciphertext includes the unique SID of client terminal and request content;Charging unit turns final ciphertextThe server of its connection is issued, uniquely corresponding private key to decrypt final ciphertext and judges that request content is to server by SIDIt is no legal, and the whether legal information of request content is sent to charging unit;When client terminal is to server registration, by servicingCorresponding SID, public key, the private key for generating client terminal of device, the SID of client terminal, public key are sent to client terminal by server, privateKey saves in the server, for the use of communication authentication process.Here Internet of Things net mode be using NFC, bluetooth, zigbee,The communication mode of any one communication protocol in 433M.
The detailed process of this method is as shown in Fig. 4, comprising the following steps:
1) client terminal is established Internet of Things with charging unit and is connect;
2) after connection is established, charging unit sends OK instruction, and notice client terminal can send order;
3) client terminal uses public key, and SID, current request time are stabbed TS(Time Stamp) and charge request contentCT(Content splice after) encrypting with SID, obtained data are passed through to the connection of Internet of Things communication module, be sent to charging dressIt sets;
4) user data is transmitted to server judgement (passing through HTTPS) by network connection by charging unit;
5) server finds respective private keys according to SID, to data deciphering, stabs TS according to request time and judges having for data packetEffect property/legitimacy (preventing Replay Attack);
6) if request of data is invalid/and it is illegal, server, which is sent, requests invalid response;If request is effective/legal,Server returns to the effective response of request;
7) charging unit executes corresponding operating, and returns result to client terminal.
In the step 3) of the above process, the unique SID of client terminal is adopted with request time stamp TS, charge request content CTWith public key KpubEncryption forms level-one ciphertext Kpub(SID, TS, CT), level-one ciphertext Kpub(SID, TS, CT) is whole with client againUnique SID is held to be spliced to form final ciphertext SID | Kpub(SID, TS, CT).Wherein, client terminal is by plaintext characterAfter SID, request time stamp TS, charge request content CT are converted to plaintext byte stream, using public key KpubEncryption forms level-one ciphertextKpub(SID, TS, CT), as shown in Fig. 5.And in step 5), server splits out final ciphertext SID | Kpub(SID, TS,CT the SID that is spliced in) simultaneously finds the SID uniquely corresponding private key Kpri, pass through private key KpriDecrypt level-one ciphertext Kpub(SID,TS, CT) obtain request time stamp TS.Wherein, server will decrypt level-one ciphertext KpubThe plaintext word that (SID, TS, CT) is obtainedAfter throttling is converted to plaintext character, SID, request time stamp TS, charge request content CT are obtained, as shown in Fig. 5.Server willThe timestamp of its own and request time stamp TS are compared and are judged whether request content legal, upon request between stab and serverThe phase difference of the timestamp of itself then judges that request content is legal in the range of threshold value δ allows.
User is securely communicated by the Internet of Things communication module in client terminal with charging unit, can ensure that user believesThe safety of breath, it is ensured that the confidentiality and integrity of entire communication process.Firstly, user opens the Internet of Things Network Communication mould of client terminalBlock (the Internet of Things communication module of client terminal is managed at which to work under the control of device), searches neighbouring charging unit, carries out(the Internet of Things communication module of charging unit works under the control of its CPU, and CPU can also connect Wi-Fi mould for Internet of Things connectionBlock, charging unit and server are connected by HTTPS mode), if successful connection, client terminal, which can obtain, to be filledThe title of electric installation equipment and address can be communicated, as shown in Fig. 6.
In terms of above-mentioned communication authentication method essentially consists in the advantage of safety following four:
1, subscriber authentication
The SID decrypted is compared server with the SID splitted out before, if it does, showing to be transmitted acrossCheng Anquan, ciphertext are not held as a hostage, and are believable.
2, Brute Force is prevented
2048bit RSA is the one kind for the safest cipher mode being currently known, if using the calculating being currently knownMode, it is impossible to the communication key of client and server is obtained by the way of Brute Force, 2048bit RSA is also armyWith a kind of cipher mode common in communication.
3, Replay Attack is prevented
It include current time stamp TS in encrypted fields during link transmission, data are passed by Internet of Things communication moduleIt is defeated to arrive charging unit, then server is issued after server decryption by charging unit and obtains the timestamp in field, and with itselfTimestamp compares, if the two difference is no more than threshold values δ (δ is determined by network delay and Internet of Things transmission rate), judgesFor valid data;It otherwise, is invalid data (attack data).
4, man-in-the-middle attack is prevented
The core of man-in-the-middle attack is to need to establish connection respectively with client and charging unit, and can decrypt after connectingThe communication key of both sides has used RSA public key encryption for such attack, and go-between can not decrypt, altered data, can notForged identity, so attack is invalid.
The communication authentication method is that each user generates different public private key pairs in registration phase, even if because poleSituation is held, the leakage of single user's public key will not influence the communication security of other users.Even if client public key leaks, go-betweenPrivate key (be stored in server-side, and be not handed down to user) can not be obtained, so the server-side that can not also disguise oneself as, steals user's letterBreath.
In general, in order to guarantee the communication security in charging process, charging unit carry out charging operations when needed forCommunication authentication step are as follows: click client terminal open Internet of Things communication module --- being attached with charging unit --- connectCharge request --- charging unit is uploaded to user identity and charge request data by network for client terminal initiation after success--- server carries out authentication --- sending instructions under after success to charging unit ---, and user opens charging operations to server.From above step as can be seen that can also pass through Internet of Things when user cannot pass through network and communicate with charging unitCommunication module carries out communication and subsequent operation, and process is not only simple, speed is fast, but also safety is stronger, is more advantageous to userObtain good experience.The communication authentication method can be successfully applied on the electrically-charging equipment based on cloud platform, can allow new energySource user vehicle is securely communicated by Internet of Things communication module and charging unit, charge confirmation and charging operations.
The above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow person skilled in the artScholar cans understand the content of the present invention and implement it accordingly, and it is not intended to limit the scope of the present invention.It is all according to the present inventionEquivalent change or modification made by Spirit Essence, should be covered by the protection scope of the present invention.

Claims (8)

CN201610566212.5A2016-07-192016-07-19Use the client terminal of security mechanism and the communication authentication method of charging unitActiveCN106209384B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201610566212.5ACN106209384B (en)2016-07-192016-07-19Use the client terminal of security mechanism and the communication authentication method of charging unit

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201610566212.5ACN106209384B (en)2016-07-192016-07-19Use the client terminal of security mechanism and the communication authentication method of charging unit

Publications (2)

Publication NumberPublication Date
CN106209384A CN106209384A (en)2016-12-07
CN106209384Btrue CN106209384B (en)2019-09-10

Family

ID=57493156

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201610566212.5AActiveCN106209384B (en)2016-07-192016-07-19Use the client terminal of security mechanism and the communication authentication method of charging unit

Country Status (1)

CountryLink
CN (1)CN106209384B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108551466A (en)*2018-03-142018-09-18缤刻普锐(北京)科技有限责任公司A kind of data processing method and charging unit, data-updating method and system
CN113497812B (en)*2020-03-182024-08-09瑞昱半导体股份有限公司Networking authentication system and method for Internet of things
CN116345706A (en)*2021-12-172023-06-27中兴通讯股份有限公司NFC wireless charging method, system, electronic device and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1790984A (en)*2004-12-142006-06-21中兴通讯股份有限公司User identity secret-keeping method in communication system
CN102045340A (en)*2010-10-152011-05-04国家电网公司Secure data exchange method and system for electric vehicle and charging and exchanging power station
CN103095704A (en)*2013-01-152013-05-08杭州华三通信技术有限公司Trusted medium online validation method and device
CN103929744A (en)*2014-04-032014-07-16东南大学 A wireless sensor network key management method
CN104022549A (en)*2014-06-082014-09-03山东天海科技股份有限公司Intelligent charging access system for electric automobile

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090217027A1 (en)*2008-02-212009-08-27Zenlok CorporationSafe e-mail for everybody

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1790984A (en)*2004-12-142006-06-21中兴通讯股份有限公司User identity secret-keeping method in communication system
CN102045340A (en)*2010-10-152011-05-04国家电网公司Secure data exchange method and system for electric vehicle and charging and exchanging power station
CN103095704A (en)*2013-01-152013-05-08杭州华三通信技术有限公司Trusted medium online validation method and device
CN103929744A (en)*2014-04-032014-07-16东南大学 A wireless sensor network key management method
CN104022549A (en)*2014-06-082014-09-03山东天海科技股份有限公司Intelligent charging access system for electric automobile

Also Published As

Publication numberPublication date
CN106209384A (en)2016-12-07

Similar Documents

PublicationPublication DateTitle
Tsay et al.A vulnerability in the umts and lte authentication and key agreement protocols
JP4002035B2 (en) A method for transmitting sensitive information using unsecured communications
KR102219086B1 (en)HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN105871920A (en)Communication system and method of terminal and cloud server as well as terminal and cloud server
CN101867530A (en) Internet of things gateway system and data interaction method based on virtual machine
CN103118363B (en)A kind of method of mutual biography secret information, system, terminal unit and platform device
CN106936570A (en)A kind of cipher key configuration method and KMC, network element
CN108964897B (en)Identity authentication system and method based on group communication
CN104253801B (en)Realize the methods, devices and systems of login authentication
CN104683291B (en)Session key negotiation method based on IMS system
CN107733635B (en)Data security transmission method based on gateway
CN102547688A (en)Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
CN112291196B (en)End-to-end encryption method and system suitable for instant messaging
CN108712252B (en)Symmetric key pool and relay-crossing based AKA identity authentication system and method
CN108964896B (en)Kerberos identity authentication system and method based on group key pool
CN104901803A (en)Data interaction safety protection method based on CPK identity authentication technology
JP2016519873A (en) Establishing secure voice communication using a generic bootstrapping architecture
CN104468126A (en)Safety communication system and method
CN111970699A (en)Terminal WIFI login authentication method and system based on IPK
Cao et al.LPPA: Lightweight privacy‐preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks
Niu et al.A novel user authentication scheme with anonymity for wireless communications
CZ2013373A3 (en)Authentication method of safe data channel
CN106209384B (en)Use the client terminal of security mechanism and the communication authentication method of charging unit
Leu et al.Improving security level of LTE authentication and key agreement procedure
CN105848140A (en)Safe end-to-end establishment method capable of achieving communication supervision in 5G network

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp