WO2020042844A1 - 确定证书状态的方法 - Google Patents
确定证书状态的方法 Download PDFInfo
- Publication number
- WO2020042844A1 WO2020042844A1 PCT/CN2019/098056 CN2019098056W WO2020042844A1 WO 2020042844 A1 WO2020042844 A1 WO 2020042844A1 CN 2019098056 W CN2019098056 W CN 2019098056W WO 2020042844 A1 WO2020042844 A1 WO 2020042844A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- certificate
- revocation
- server
- information
- receiving end
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 230000006854 communication Effects 0.000 claims abstract description 108
- 238000004891 communication Methods 0.000 claims abstract description 107
- 230000006855 networking Effects 0.000 claims description 39
- 238000012795 verification Methods 0.000 claims description 19
- 239000000284 extract Substances 0.000 claims description 10
- 238000000605 extraction Methods 0.000 claims 2
- 230000006870 function Effects 0.000 description 13
- 102000036364 Cullin Ring E3 Ligases Human genes 0.000 description 7
- 108091007045 Cullin Ring E3 Ligases Proteins 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 101000759879 Homo sapiens Tetraspanin-10 Proteins 0.000 description 6
- 102100024990 Tetraspanin-10 Human genes 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 5
- 238000004590 computer program Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000004422 calculation algorithm Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/46—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Definitions
- the present application relates to the field of communications, and in particular, to a method, device, and system for determining the status of a certificate when communicating between devices in the field of vehicle networking.
- V2X Vehicle, Everything refers to the communication system between vehicles, or between vehicles and pedestrians or cyclists, and between vehicles and infrastructure. Telematics communication has the characteristics of large message volume and high frequency of message sending and receiving, such as on-board communication unit (OBU) or road side communication unit (RSU) sending periodically (such as 10 Hz) to describe vehicle operation Cooperative awareness messages (CAM) of state (speed, orientation, orientation), or when a special event occurs, a decentralized environment notification message (DENM) describing the type of event is sent.
- OBU on-board communication unit
- RSU road side communication unit
- CAM Cooperative awareness messages
- state speed, orientation, orientation
- DENM decentralized environment notification message
- a communication system usually uses a certificate for data source authentication.
- the sender carries a certificate in a sent message, and the receiver verifies the certificate carried in the message, which includes verifying whether the certificate has been revoked.
- the OCSP scheme is used, that is, the client uses an online certificate status protocol (Online Certificate Status Protocol) to the OCSP server to check whether the certificate is revoked in real time.
- Online Certificate Status Protocol Online Certificate Status Protocol
- the certificate In the IoV communication, the certificate also needs to be used for data source authentication, but the traditional OCSP solution is not suitable for the IoV communication scenario.
- Take the CAM message as an example.
- a vehicle broadcasts 10 CAM messages per second. In theory, all vehicles within a radius of 1 km from the vehicle will receive the broadcasted CAM message. If the OCSP scheme is adopted, each vehicle that receives the CAM message needs The real-time query of the certificate in each CAM message will not only cause a huge burden on the performance of the OCSP server and the network bandwidth, but also the communication between the vehicle and the OCSP server will increase the delay of the vehicle-to-vehicle communication.
- this application proposes a method that enables the message receiving end to quickly confirm the status of the certificate.
- the certificate status described in this application refers to whether the certificate has been revoked.
- the embodiment of the present application proposes a scheme based on a certificate revocation list, in which two concepts of classification information of a certificate and characteristic information of a certificate are proposed.
- the classification information of the certificate refers to a category information assigned to the certificate when the certificate issuing server issues the certificate, and is used to classify the certificate.
- the characteristic information of the certificate refers to the information that can uniquely identify a certificate.
- the characteristic information of the certificate can be an n-byte random number assigned by the certificate issuing server when the certificate is issued, or after the hash calculation is performed on the certificate. The value of the truncated n bytes.
- the embodiment of the present application proposes to include the classification information of the certificate in the agreed field of the certificate, and to include the classification information of the revoked certificate in the agreed field of the certificate revocation list.
- the characteristic information of the certificate is an n-byte random number assigned by the certificate issuing server when the certificate is issued, in a possible implementation manner, the characteristic information of the certificate may be included in a certain agreed field of the certificate .
- the certificate revocation list also needs to contain the characteristic information of the revoked certificate in a certain agreed field.
- the certificate revocation list is generated and maintained by the certificate revocation server.
- Communication units in the Internet of Vehicles such as the receiving end and the sending end, obtain a certificate revocation list from a certificate revocation server.
- the receiver verifies the certificate of the message sender according to the saved certificate revocation list to determine the status of the certificate.
- the receiving end can record a large number of records in the certificate revocation list according to the classification information carried in the certificate of the sending end. To narrow the search or match quickly to increase the speed and efficiency of certificate verification.
- the receiving end determines, in the certificate revocation list, a record set of revoked certificates having the same classification information as the sending end certificate, and further determines in this set records of revoked certificates having the same characteristic information as the sending end certificate. If there is a matching record, the sender's certificate has been revoked. If there is no matching record, the sending certificate has not been revoked.
- the embodiment of the present application also proposes a scheme based on certificate revocation fingerprint database.
- the certificate revocation server records the fingerprint information of the revoked certificate into the certificate revocation fingerprint database.
- Communication units in the Internet of Vehicles such as the receiving end and the sending end, obtain a certificate revocation fingerprint database from a certificate revocation server.
- the receiver extracts the fingerprint information of the certificate of the message sender, verifies the certificate of the message sender based on the saved certificate revocation fingerprint database, and determines the status of the certificate.
- the embodiment of the present application proposes that the certificate revocation server maintains a certificate revocation fingerprint location database to save the changes recorded in the certificate revocation fingerprint database over a period of time.
- the telematics communication unit can obtain the certificate revocation fingerprint location database and refresh it.
- the saved certificate revokes the fingerprint library.
- the embodiment of the present application also proposes a solution of whether the self-verification certificate of the sending end is revoked to ensure that the certificate carried in the message is a certificate with no matching record in the certificate revocation fingerprint database to prevent the receiving end Misjudgment.
- the receiving end In order to cooperate with the method described in the claims of the present application, the receiving end also needs to make corresponding improvements to support the method for determining the status of a certificate described in the embodiments of the present application.
- the message sent by the sender to the receiver includes the certificate of the sender. Because the certificate of the sender includes classification information, the receiver can classify the certificate that is revoked in the certificate revocation list based on the classification information of the certificate of the sender. The information is matched, and the status of the certificate of the sending end is determined according to the matching result.
- the sender determines a certificate with no matching record in the certificate revocation fingerprint database in the certificate of the sender based on the saved certificate revocation fingerprint database, and uses the selected certificate in the sent message.
- the sender calculates and obtains the fingerprint information of any certificate of the sender. If the sender determines that there is no fingerprint information matching the fingerprint information of the certificate in the certificate revocation fingerprint database, it is used in the sent message.
- the certificate If the sender determines that there is no fingerprint information matching the fingerprint information of the certificate in the certificate revocation fingerprint database, it is used in the sent message. The certificate.
- the sender calculates and obtains the fingerprint information of any certificate of the sender. If the sender determines that there is fingerprint information in the certificate revocation fingerprint database that matches the fingerprint information of the certificate, it selects a certificate that is different from the certificate. The second certificate, and continues to calculate the fingerprint information of the second certificate, and determines whether there is fingerprint information in the certificate revocation fingerprint database that matches the fingerprint information of the second certificate.
- the method described in the embodiment of the present application relates to devices such as a receiving end, a sending end, a certificate revocation server, and a car networking server. Therefore, the embodiments of the present application further provide a device and a server for implementing the above-mentioned certificate verification method.
- an embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium stores instructions, and when the computer-readable storage medium runs on the computer, causes the computer to execute the foregoing certificate verification method.
- the present application provides a computer program product containing instructions that, when run on a computer, causes the computer to perform the above-mentioned certificate verification method.
- FIG. 1 is a structural diagram of a connected vehicle system provided by an embodiment of the present application
- FIG. 2 is a flowchart of a vehicle-to-vehicle communication method according to an embodiment of the present application
- FIG. 3 is a schematic structural diagram of classifying and classifying certificates according to an embodiment of the present application.
- FIG. 5 is a flowchart of a method for obtaining information on a revoked certificate from a certificate revocation server according to an embodiment of the present application
- FIG. 6 is a schematic diagram showing a data structure of a certificate revocation fingerprint database
- FIG. 7 is a flowchart of a vehicle-to-vehicle communication method of a self-certification provided by an embodiment of the present application.
- FIG. 8 is a flowchart of a method for confirming a certificate status according to an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a device used by the device described in the embodiment of the present application.
- the embodiment of the present application proposes a method for judging whether a certificate is revoked or not, which is more efficient than the prior art. It should be noted that the certificate described in the embodiment of the present application refers to a digital certificate used in the communication field.
- FIG. 1 shows a vehicle networking system architecture according to an embodiment of the present application, which includes a certificate issuing server, a certificate revocation server, a vehicle networking server, and a vehicle networking terminal.
- the vehicle networking terminal may also be a vehicle networking device or device, such as a vehicle-mounted communication unit or a roadside communication unit or a communication device carried by a pedestrian.
- the connected vehicle terminal obtains a certificate from a certificate issuing server, and directly or indirectly obtains a certificate revocation list (CRL) from a certificate revocation server.
- the CRL is generated by the certificate revocation server and is used to record the information of the certificate that has been revoked.
- the connected vehicle terminal reports the connected vehicle terminal's status, operating information and abnormal information to the connected vehicle server.
- the Internet of Vehicles server may directly request the certificate of an Internet of Vehicles terminal to be revoked from the certificate revocation server, or it may request the certificate of the Internet of Vehicles terminal to be revoked by the certificate issuing
- FIG. 2 is a schematic diagram of a vehicle networking communication service process according to an embodiment of the present application.
- the communication process involves two IoV terminals, devices or equipment, which are divided into a transmitting end and a receiving end according to different communication roles.
- the sender carries the certificate of the sender in the message sent in step 101.
- the certificate sent by the sender contains classification information.
- the classification information is a category information assigned to the certificate by the certificate issuing server when the certificate is issued, and is used to classify the certificates; the dimension of the classification is not limited in this application, and the geographical orientation can be used as the dimension, such as the geographical location of the certificate issuing server As the classification information, the administrative area can also be used as the dimension, such as the administrative area where the certificate issuing server is located as the classification information.
- the format and length of the classification information are not limited in this application.
- the classification information may be multi-level classification information including multiple levels, or it may be first-level classification information.
- the classification information can be carried in various ways.
- the embodiment of the present application takes the format of the Internet of Vehicles certificate defined by the IEEE1609.2 standard as an example, and lists several possible ways to carry classification information in the certificate.
- the first method carrying the classification information through the ID certificate identification field. Take secondary classification information as an example.
- the format of id is defined as "first-level classification information
- the first-level classification information may be the provincial-level information where the certificate-issuing server is located, and the second-level classification information may be the city information where the certificate-issuing server is located.
- the characteristic information is information used by the certificate issuing server to identify the certificate when generating the certificate, and the characteristic information may be recorded in any of the agreed fields of the certificate.
- the characteristic information may be an n-byte binary number generated using a random number generator.
- the characteristics information of two certificates with different classification information may be the same. Assuming the length of the first-level classification information is 1 byte, the length of the second-level classification information is 1 byte, and n is 1, then the value of a possible certificate id is "100010000001000111111110", where "10001000” is the certificate "00010001" is the second-level classification information, and "11111110" is a random number.
- the second method carrying the classification information through the region field.
- Region The format of Region is defined as "first-level classification information
- the third method carry the classification information through the crlSeries certificate revocation series field, or carry the classification information through the cracaId certificate revocation server ID and the crlSeries field.
- the format of the crlSeries field is defined as "first-level classification information
- the cracaId field records the identity of the certificate revocation server responsible for revoking the certificate, and uses this as the first-level classification information; the crlSeries field records the CRL series to which the certificate belongs once it is revoked, and this is used as the second-level classification information.
- the receiver Before processing the message, the receiver first verifies whether the certificate is revoked according to the locally held certificate revocation list CRL in step 102, and directly discards the message if the certificate has been revoked.
- the receiving end obtains the CRL directly or indirectly from the certificate revocation server before verifying the certificate.
- the CRL stored locally at the receiving end also needs to record the classification information of the revoked certificate.
- the CRL also needs to record the characteristic information of the revoked certificate.
- the field that records the classification information of the revoked certificate in the CRL can be any field. For the convenience of description in this application, the field that records the classification information of the revoked certificate is collectively referred to as the revocation identification.
- the revocation identification is used to uniquely identify a Revoked certificate.
- the following is the CRL format defined by the IEEE 1609.2 standard. It is assumed that the field responsible for the revocation identification function is the id field in the CRL. Meanwhile, it is assumed that the id field records characteristic information of the revoked certificate. Of course, other fields other than the revocation identification field can also be used to record the characteristic information of the revoked certificate.
- the format of the id field in the CRL is defined as "first-level classification information
- the random number may also be a value of n bytes intercepted after hashing the certificate, and the characteristic information of the certificate is used to uniquely identify a certificate.
- the n bytes of random number can be information extracted from the agreed fields in the revoked certificate, such as the first way with the classification information contained in the certificate
- a random number of n bytes in the identity of the revoked certificate is intercepted.
- the first-level classification information may be national-level information of the certificate issuing server where the certificate is revoked
- the second-level classification information may be information of the city where the certificate issuing server of the revoked certificate is located.
- the value of id in a possible CRL is "100010000001000111111110", where "10001000” is The first-level classification information of the revoked certificate, "00010001" is the second-level classification information, and "11111110" is a random number intercepted from the logo of the revoked certificate.
- the receiver when the receiver verifies the certificate in step 102 in Figure 2, the receiver can use the classification information contained in the received certificate and the extracted feature information of the received certificate to quickly and efficiently revoke the identification with the CRL. Matching is performed to determine whether the certificate on the sending end has been revoked. As shown in FIG. 3, the revocation identifiers recorded in the CRL list can be classified into different sets and sub-collections according to the classification information.
- the first-level classification information of the revoked identifier in the CRL stored locally by the receiving end can be divided into two categories, namely the first-level classification information -1 and The first level of classification information-2, where the value of the first level of classification information -1 is "10001000", when the receiving end verifies whether the certificate is revoked, it only needs to match and find the first level of classification information as the first level of classification information -1 Then, the receiving end continues to narrow down the scope of the matching search based on the second-level classification information “00010001” contained in the id of the received certificate, and the first-level classification information is “00010001”.
- the receiving end narrows down the scope of matching and searching according to different levels of classification information, and finally determines a subset that needs to be matched and searched based on the characteristic information of the certificate, and according to the characteristics of the received certificate
- the information is matched with the characteristic information contained in the revocation identification. If there is a matching record, it is determined that the received certificate has been revoked. Matching records, it is determined that the received certificate has not been revoked. If the classification information of the received certificate does not exist in the CRL at all, it can be directly determined that the received certificate has not been revoked.
- the receiving end extracts the specified position from the received certificate ID when verifying the certificate Random number of n bytes; if the characteristic information of the revoked certificate recorded in the revocation identification in the CRL is defined as n bytes of the specified position are intercepted after hashing the revoked certificate, the receiving end will verify the certificate Hash the received certificate and intercept n bytes at the specified position.
- the recipient can use the classification information to narrow the scope of searching and matching when verifying whether the certificate is revoked.
- the calculation amount of the verification certificate at the receiving end can be greatly reduced, the speed and efficiency of the verification certificate can be improved, and the real-time business requirements in the Internet of Vehicles can be met.
- FIG. 4 is a schematic flowchart of a method for revocation of a certificate by the certificate revocation server and adding a revocation identifier containing classification information to the CRL.
- the receiving end receives the vehicle networking message, which includes the certificate of the sending end of the message.
- the receiving end determines that there is an abnormal situation.
- the abnormal situation includes the frequency of sending the message too fast, the signature information contained in the message is incorrectly verified, or the certificate is not valid.
- the received vehicle networking message containing the certificate is sent to the vehicle networking server, and the vehicle networking server is requested to make further security judgment and processing.
- the Internet of Vehicles server receives the Internet of Vehicles message containing the certificate, determines and decides according to local policies, determines that the certificate needs to be revoked, sends a message to the certificate revocation server, and requests the certificate revocation server to revoke the certificate, and the message carries the certificate.
- the connected vehicle server can directly send a message to the certificate revocation server to request the certificate to be revoked, or it can send a message to the certificate revocation server through the certificate issuing server to request the certificate to be revoked. For example, when the connected car server is not granted the permission to write to the certificate revocation server, the connected car server needs to send a message to the certificate revocation server through the certificate issuing server.
- the certificate revocation server adds a revocation identification record to the CRL according to the request of the connected vehicle server, extracts the classification information and characteristic information of the certificate according to the format of the certificate, and writes the classification information of the certificate into the newly added revocation identification.
- the manner in which the certificate revocation server extracts the classification information of the certificate corresponds to the manner in which the classification information is carried in the embodiment shown in FIG. 2. Specifically, corresponding to the three methods for carrying classification information described in the embodiment shown in FIG. 2, the certificate revocation server extracts the classification information in the id field, or region field, or crlSeries field of the certificate, and uses the classification information as Classification information of the revocation identification field added in the CRL.
- the manner in which the certificate revocation server extracts the characteristic information of the certificate corresponds to the format of the certificate described in the embodiment shown in FIG. 2.
- an agreed-upon field of the certificate such as the id field
- the certificate revocation server extracts the n-byte random number in the agreed-on field of the certificate as the characteristic information of the revoked certificate;
- n bytes are intercepted as the characteristic information of the revoked certificate.
- the classification information and characteristic information are recorded in the revocation identification field at the same time, it is recorded in the format of "classification information
- the hash algorithm used by the receiving end and the certificate revocation server must be consistent. Specifically, the hash algorithm used by the receiving end when hashing the received certificate in step 102, and the hash algorithm used by the certificate revocation server when hashing the revoked certificate in step 304, keep Consistent.
- the method for extracting certificate information performed by the certificate revocation server in step 304 may also be performed by the connected vehicle server before sending the certificate revocation request in step 303, that is, as an alternative to step 303, the connected vehicle server receives The IoV message that contains the certificate, judges and decides according to local policies, determines that the certificate needs to be revoked, the IoV server extracts the classification information and characteristic information of the certificate, sends the extracted classification and characteristic information to the certificate revocation server, and requests The certificate revocation server revokes the certificate.
- FIG. 5 is a schematic flowchart of a method for obtaining a CRL by a vehicle-to-vehicle communication unit according to an embodiment of the present invention.
- the vehicle networking communication unit can actively request a CRL from the certificate revocation server according to a preset trigger condition.
- the certificate revocation server can also directly broadcast or unicast the CRL to the vehicle networking communication unit according to a preset policy or rule. That is, the 402 message can be a response to the 401 message or a message actively pushed by the certificate revocation server.
- the connected vehicle communication unit can also indirectly obtain CRLs from other connected vehicle communication units, as shown in steps 403 and 404.
- the connected vehicle communication unit 2 can obtain the CRL from the connected vehicle communication unit 1 that has obtained the CRL, and the 404 message. It can be a response to a 403 request, or it can be a CRL that the vehicle-to-vehicle communication unit 1 actively pushes to the vehicle-to-vehicle communication unit 2 through broadcast or unicast.
- the triggering condition for the vehicle networking communication unit to actively request the CRL can be an event trigger, such as a vehicle ignition start, or a periodic trigger, such as a periodic timer timeout, or a specific condition trigger, such as reaching a reservation area or a reservation speed threshold.
- an event trigger such as a vehicle ignition start
- a periodic trigger such as a periodic timer timeout
- a specific condition trigger such as reaching a reservation area or a reservation speed threshold.
- the CRL carried in the 402 or 404 message by the certificate revocation server or the car networking communication unit may be a full CRL or a differential CRL.
- the so-called full CRL includes the information of all certificates revoked by the certificate revocation server.
- the differential CRL includes two lists of newly added CRLs and deleted CRLs.
- the new CRL only includes a time period, and the full CRL corresponding to the end of the time period corresponds to the time
- the full CRL corresponding to the start time of the segment, the information of the newly revoked certificate, and the deletion of the CRL only include the time period.
- the full CRL corresponding to the end time of the period is smaller than the full CRL corresponding to the start time of the period. Information on the revoked certificate.
- the vehicle networking communication unit needs to refresh according to the two lists of newly added CRLs and deleted CRLs. Locally saved CRLs; if a fully updated solution is adopted, the IoC communication unit obtains the full CRL in the 402 or 404 message, and the IoC communication unit will directly replace the locally saved CRL with the full CRL received.
- the embodiment described above describes how the certificate revocation server generates a CRL containing classification information and characteristic information of the revoked certificate, how the vehicle networking communication unit obtains a CRL containing classification information and characteristic information of the revoked certificate from the certificate revocation server, and vehicle networking communication
- the unit receives the message, how to extract the classification and characteristic information of the certificate in the message and match it with the record in the CRL to determine whether the certificate carried in the message is revoked.
- the embodiment of the present application further proposes a certificate revocation fingerprint database scheme.
- the certificate revocation fingerprint database is a binary array of length N initialized to 0.
- the certificate revocation fingerprint database records the fingerprint information of the revoked certificate.
- the fingerprint information of the revoked certificate is 1 in the binary array of length N.
- Bit information, N is a positive integer greater than 0.
- the fingerprint information of the revoked certificate can be obtained by calculating the revoked certificate through various algorithms. For example, the fingerprint information of the revoked certificate can be obtained by hash calculation.
- the certificate revocation fingerprint database is a binary array initialized to 0 and having a length of 16.
- the certificate revocation server uses three hash functions to perform hash calculation and mapping on the revoked certificate (such as hash calculation). The result is calculated by taking the remainder of the length of the binary array of the fingerprint database. Each mapping will generate a value. Each value corresponds to a bit in the binary array. The corresponding bit position is set to 1. The three bits are set to 1.
- the information is the fingerprint information of the revoked certificate.
- the receiving end receives the vehicle networking message containing the certificate, calculates the fingerprint information of the certificate, and matches it in the certificate revocation fingerprint database. If there is the same fingerprint information, the certificate has been revoked.
- the format of the certificate may be the format including classification information described in the embodiments of the present application, or may be other formats.
- the vehicle networking communication unit obtains the certificate revocation fingerprint database at step 402 or 404.
- the certificate revocation fingerprint database can be a full certificate revocation fingerprint database that contains all the fingerprint information of the revoked certificate, or it can be a differential certificate revocation fingerprint location database.
- the differential certificate revocation fingerprint location database records the time period corresponding to the end of the time period. Compared with the full certificate revocation fingerprint database corresponding to the starting point of the time period, the full certificate revocation fingerprint database has changed bit information.
- the full certificate revocation fingerprint database recorded in the certificate revocation server contains the fingerprints of two revoked certificates A and B, the fingerprint length is 10, the fingerprint of A is 0010010001, and the fingerprint of B is 0001110000, then the full certificate revocation fingerprint database is 0011110001. If a revoked certificate C is to be added in step 304, assuming that the fingerprint of C is 1100001000, compared with the overall fingerprint database 0011110001, it is found that the value of the 4th, 9th and 10th bits from the right is changed from 0 to 0 1, the value of the 4th, 9th, and 10th bits of the differential certificate revocation fingerprint position database is recorded.
- the specific recording method is not limited in this application, and the changed bit position can be in the form of a binary array. It is 1, and can also record only the serial number of the bits that have changed in the form of an enumeration or an array. If you want to delete the fingerprint of the B certificate from the full certificate revocation fingerprint database, the updated full certificate revocation fingerprint database is 0010010001, and the changed bits are the 6th and 7th bits from the right, then the differential certificate The values of the 6th bit and the 7th bit in the record of the revoked fingerprint position database have changed.
- the ICU communication unit receives the differential certificate revocation fingerprint location database, it can obtain the latest certificate revocation fingerprint by inverting the value of the corresponding bit in the locally stored certificate revocation fingerprint database according to the bit information recorded therein. Library. If you receive the full certificate revocation fingerprint database, you will directly replace the locally stored certificate revocation fingerprint database.
- 1 in the certificate revocation fingerprint database is not bound to a specific revoked certificate, when the vehicle networking communication unit performs certificate verification in step 102, there may be misjudgments. For example, when there is a lot of fingerprint information recorded in the certificate revocation fingerprint database, the bits corresponding to the fingerprint information of a certificate to be confirmed in the certificate revocation fingerprint database may have been set to 1, and these bits are not necessarily Corresponds to the fingerprint of the same revoked certificate.
- the certificate issuing server will issue multiple certificates to the connected vehicle communication unit at one time. Among these certificates, the connected vehicle communication unit selects a certificate that does not have a matching record in the certificate revocation fingerprint database. If no certificate is available locally, the IoV communication unit requests a certificate from the certificate issuing server again.
- the certificate revocation server is requested to verify the certificate.
- the message contains the certificate or certificate information. Because the certificate revocation server not only stores the fingerprint information of the revoked certificate, but also CRL and other information, the verification result of the certificate revocation server is more accurate.
- the vehicle-to-vehicle communication unit at the receiving end finally processes the V2X message based on the verification result returned by the certificate revocation server in step 104. If the verification result returned by the certificate revocation server is not revoked, the receiving end continues to process V2X messages; if the verification result returned by the certificate revocation server is revoked, the receiving end discards the V2X message.
- the certificate revocation list scheme and certificate revocation fingerprint database scheme described in the embodiments of the present application are both to improve the efficiency and speed of certificate verification by a vehicle-connected terminal or a vehicle-connected communication unit in vehicle-to-vehicle communication to improve the real-time performance of message processing , And reduce the impact of the verification certificate on the performance of the connected car terminal or connected car communication unit.
- the certificate revocation fingerprint database solution requires lower storage space of the connected car terminal or connected car communication unit.
- the connected car terminal or connected car communication unit requires only a small amount of storage space to save the certificate revocation fingerprint database.
- the certificate revocation fingerprint database scheme may have a certain probability of misjudgment. Therefore, in addition to the certificate verification at the receiving end, additional processing is required to improve the accuracy of certificate verification.
- the certificate revocation list scheme and the certificate revocation fingerprint database scheme can be applied independently or in combination.
- the format of the certificate adopts the format containing classification information described in the certificate revocation list scheme.
- the certificate revocation server saves both the CRL and the certificate revocation fingerprint database, and the ICU communication unit only saves the certificate revocation fingerprint database.
- the two solutions are combined:
- step 304 the certificate revocation server refreshes the CRL and the certificate revocation fingerprint database respectively according to the certificate revocation list scheme and the certificate revocation fingerprint database scheme;
- step 402 or step 404 the connected vehicle communication unit only obtains and saves the certificate revocation fingerprint database to reduce the consumption of storage space;
- step 102 the vehicle networking communication unit uses a certificate revocation fingerprint database scheme to verify the certificate
- Steps 103-104 In order to improve the accuracy of the verification, the connected vehicle communication unit requests a certificate revocation server to verify the certificate, and the certificate revocation server uses the CRL list to quickly verify the certificate.
- entities such as a vehicle networking communication unit, a vehicle networking server, and a certificate revocation server include hardware structures and / or software modules corresponding to performing each function.
- the connected vehicle server and certificate revocation server described in the embodiments of the present application may be separate physical devices or different logical functional entities in the same physical device, that is, the connected vehicle server and certificate revocation in the embodiments of the present application
- the functions of the server can be implemented in the same physical device.
- the vehicle-to-vehicle communication unit, the vehicle-to-vehicle networking server, and the certificate revocation server in the above embodiment can all be implemented by a device as shown in FIG. 9.
- the device 500 includes at least one processor 501, a communication bus 502, a memory 503, and at least one communication interface 504.
- the processor 501 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of the solution of the present invention. integrated circuit.
- CPU central processing unit
- ASIC application-specific integrated circuit
- the communication bus 502 may include a path for transmitting information between the aforementioned components.
- the communication interface 504 uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
- RAN radio access network
- WLAN wireless local area networks
- the memory 503 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM), or other types that can store information and instructions
- the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM-ready-only memory (EEPROM)), compact disc (read-only memory (CD-ROM)) or other optical disk storage, optical disk storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
- the memory may exist independently and be connected to the processor through a bus. The memory can also be integrated with the processor.
- the memory 503 is configured to store application program code that executes the solution of the present invention, and is controlled and executed by the processor 501.
- the processor 501 is configured to execute application program code stored in the memory 503, so as to implement the functions of the vehicle networking communication unit, the vehicle networking server, and the certificate revocation server in the method of the present patent.
- the processor 501 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 6.
- the apparatus 500 may include multiple processors, such as the processor 501 and the processor 508 in FIG. 6. Each of these processors may be a single-CPU processor or a multi-CPU processor.
- a processor herein may refer to one or more devices, circuits, and / or processing cores for processing data (such as computer program instructions).
- the apparatus 500 may further include an output device 505 and an input device 506.
- the output device 505 is in communication with the processor 501 and can display information in a variety of ways.
- the output device 505 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
- the input device 506 communicates with the processor 501 and can accept user input in a variety of ways.
- the input device 506 may be a mouse, a keyboard, a touch screen device, or a sensing device.
- the device 500 may be a general-purpose server or a dedicated server.
- the device 500 may be a telematics box (T-Box) or a multi-domain controller (MDC) integrated in a vehicle.
- the device 500 may also be a chip integrated in the vehicle, and then the function / implementation process of the communication interface 504 may also be implemented through pins or circuits, etc .
- the memory is a storage in the chip A unit such as a register, a cache, etc., the storage unit may also be a storage unit located outside the chip.
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server, or data center Transmission by wire (for example, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (for example, infrared, wireless, microwave, etc.) to another website site, computer, server, or data center.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, and the like that includes one or more available medium integration.
- the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (Solid State Disk (SSD)), and the like.
- a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
- an optical medium for example, a DVD
- a semiconductor medium for example, a solid state disk (Solid State Disk (SSD)
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Computer And Data Communications (AREA)
Abstract
为满足车联网通信中实时性和安全性的需求,本申请提出一种能够使消息接收端快速确认证书状态的方法。通过在证书的约定字段中包含证书的分类信息,并在证书吊销列表的约定字段中包含被吊销证书的分类信息,接收端能够根据发送端证书中携带的分类信息,在证书吊销列表海量的记录中快速缩小搜索或匹配的范围,以提高确定证书状态的速度和效率。
Description
本申请要求于2018年8月25日提交中国国家知识产权局、申请号为201810976472.9、申请名称为“确定证书状态的方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信领域,尤其涉及车联网领域设备间通信时,确定证书的状态的方法、装置和系统。
V2X(Vehicle to Everything)车联网指的是车辆之间,或者车辆与行人或骑行者之间以及车辆与基础设施之间的通信系统。车联网通信具有消息量大且消息收发频率高的特点,如车载通信单元(on-board unit,OBU)或路侧通信单元(road side unit,RSU)周期性(如10赫兹)发送描述车辆运行状态(速度、朝向、方位)的协作感知消息(cooperative awareness message,CAM),或当发生特殊事件时,发送描述事件类型的分散环境通知信息(Decentralized Environmental Notification Message,DENM)。
出于安全性考虑,通信系统中通常使用证书进行数据源认证,如发送端在发送的消息中携带证书,接收端对消息中携带的证书进行验证,其中包括验证证书是否已被吊销。在传统互联网通信领域使用OCSP方案,即客户端使用在线证书状态协议(Online Certificate Status Protocol,OCSP)到OCSP服务器实时查询证书是否被吊销。
在车联网通信中,同样需要使用证书进行数据源认证,但传统的OCSP方案并不适用于车联网通信的场景。以CAM消息为例,车辆每秒广播10条CAM消息,理论上以车辆为中心半径1千米内的全部车辆都会受到广播的CAM消息,如果采用OCSP方案,每辆接收到CAM消息的车辆都需要对每条CAM消息中的证书进行实时查询,不仅会对OCSP服务器的性能和网络带宽造成巨大负担,而且车辆与OCSP服务器间的通信,会额外增加车联网通信的时延。
因此,为满足车联网通信中实时性和安全性的需求,亟需一种效率更高的判断证书是否被吊销的方法。
发明内容
为满足车联网通信中实时性和安全性的需求,本申请提出一种能够使消息接收端快速确认证书状态的方法。本申请中所述的证书状态指证书是否被吊销。
本申请实施例提出一种基于证书吊销列表的方案,该方案中提出证书的分类信息和证书的特征信息两个概念。证书的分类信息指为证书颁发服务器在颁发证书时为证书分配的一个类别信息,用于对证书进行分类。证书的特征信息指可以唯一识别一个证书的信息,证书的特征信息可以是证书颁发服务器在颁发证书时为证书分配的一个n个字节的随机数,还可以是对该证书进行哈希计算后截取的n个字节的数值。
本申请实施例提出在证书的约定字段中包含证书的分类信息,并在证书吊销列表的约定字段中包含被吊销证书的分类信息。另外,当证书的特征信息为证书颁发服务器在颁发证书时为证书分配的一个n个字节的随机数时,一种可能的实现方式中,证书的特征信息可以包 含在证书的某一约定字段。证书吊销列表中除了记录被吊销证书的分类信息,还需要在某一约定字段包含被吊销证书的特征信息。
证书吊销列表由证书吊销服务器生成并维护。车联网中的通信单元,如接收端和发送端,从证书吊销服务器获取证书吊销列表。接收端在接收到消息后,根据保存的证书吊销列表,对消息发送端证书进行验证,确定证书的状态。通过在证书的约定字段中包含证书的分类信息,并在证书吊销列表的约定字段中包含被吊销证书的分类信息,接收端能够根据发送端证书中携带的分类信息,在证书吊销列表海量的记录中快速缩小搜索或匹配的范围,以提高证书验证的速度和效率。具体的,接收端在证书吊销列表中,确定与发送端证书具有相同分类信息的被吊销证书的记录集合,并进而在该集合中确定与发送端证书具有相同特征信息的被吊销证书的记录,如果存在匹配的记录,则发送端证书已被吊销,如果不存在匹配的记录,则发送端证书未被吊销。
另外,本申请实施例还提出一种基于证书吊销指纹库的方案。证书吊销服务器将被吊销证书的指纹信息录入证书吊销指纹库。车联网中的通信单元,如接收端和发送端,从证书吊销服务器获取证书吊销指纹库。接收端在接收到消息后,提取消息发送端证书的指纹信息,根据保存的证书吊销指纹库,对消息发送端证书进行验证,确定证书的状态。为提高通信效率,本申请实施例提出证书吊销服务器维护一个证书吊销指纹位置库,以保存一段时间内证书吊销指纹库中记录的变化情况,车联网通信单元获取证书吊销指纹位置库,就可以刷新保存的证书吊销指纹库。为了提高证书吊销指纹库方案的准确性,本申请实施例还提出发送端自验证书是否被吊销的方案,确保消息中携带的证书为证书吊销指纹库中无匹配记录的证书,以防止接收端误判。
为配合本申请权利要求部分所述的方法,接收端也需要进行相应的改进,以支持本申请实施例中所述的确定证书状态的方法。
证书吊销列表方案中,发送端向接收端发送的消息中包括发送端的证书,由于发送端的证书中包括分类信息,接收端可以根据发送端证书的分类信息,与证书吊销列表中被吊销证书的分类信息进行匹配,并根据匹配结果确定所述发送端的证书的状态。
证书吊销指纹库方案中,发送端根据保存的证书吊销指纹库,在发送端的证书中确定一个证书吊销指纹库中没有匹配记录的证书,并在发送的消息中使用该选定的证书。
一种可能的实现方式中,发送端计算获得发送端任一证书的指纹信息,如果发送端判断证书吊销指纹库中不存在与该证书的指纹信息匹配的指纹信息,则在发送的消息中使用该证书。
另一种可能的实现方式中,发送端计算获得发送端任一证书的指纹信息,如果发送端判断证书吊销指纹库中存在与该证书的指纹信息匹配的指纹信息,则选择与该证书不同的第二证书,并继续计算第二证书的指纹信息,并判断证书吊销指纹库中是否存在与第二证书的指纹信息匹配的指纹信息。
本申请实施例中所述的方法涉及接收端、发送端、证书吊销服务器和车联网服务器等装置。因此,本申请实施例还提供实现如上证书验证方法的装置和服务器。
另外,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述证书验证方法。
最后,本申请提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述证书验证方法。
图1所示为本申请实施例提供的一种车联网系统架构图;
图2所示为本申请实施例提供的一种车联网通信方法流程图;
图3所示为本申请实施例提供的一种将证书进行分级分类的结构示意图;
图4所示为本申请实施例提供的一种吊销证书的方法流程图;
图5所示为本申请实施例提供的一种从证书吊销服务器获取被吊销证书信息的方法流程图;
图6所示为一种证书吊销指纹库的数据结构示意图;
图7所示为本申请实施例提供的一种自验证书的车联网通信方法流程图;
图8所示为本申请实施例提供的一种确认证书状态的方法流程图;
图9所示为本申请实施例中所述装置采用的装置结构示意图。
为满足车联网通信中实时性和安全性的需求,本申请实施例提出一种相比现有技术,效率更高的判断证书是否被吊销的方法。需要说明的是,本申请实施例中所述的证书,指通信领域中使用的数字证书。
图1所示为本申请实施例提出的一种车联网系统架构,其中包括证书颁发服务器,证书吊销服务器,车联网服务器和车联网终端。其中车联网终端也可以是车联网装置或设备,如车载通信单元或路侧通信单元或行人所携带的通信装置。车联网终端从证书颁发服务器获取证书,直接或间接从证书吊销服务器获取证书吊销列表(Certificate Revocation List,CRL)。CRL为证书吊销服务器生成的,用于记录已被吊销证书的信息。车联网终端向车联网服务器上报车联网终端的状态,运行信息和异常信息。车联网服务器可以直接向证书吊销服务器请求吊销某一车联网终端的证书,也可以通过证书颁发服务器向向证书吊销服务器请求吊销某一车联网终端的证书。
图2所示为本申请实施例提出的一种车联网通信业务流程示意图。通信流程涉及两个车联网终端、装置或设备,根据通信角色的不同,分为发送端和接收端。
发送端在101步骤发送的消息中携带发送端的证书。发送端发送的证书中包含分类信息。分类信息为证书颁发服务器在颁发证书时为证书分配的一个类别信息,用于对证书进行分类;分类的维度本申请不进行限定,可以以地理方位为维度,如将证书颁发服务器所在的地理方位作为分类信息,也可以以行政区域为维度,如将证书颁发服务器所在的行政区域作为分类信息。分类信息的格式和长度,本申请也不进行限定,分类信息可以是包含多个级别的多级分类信息,也可以是一级分类信息。分类信息可以通过多种方式携带,本申请实施例以IEEE1609.2标准定义的车联网证书格式为例,列举几种可能的证书中携带分类信息的方式。
第一种方式:通过id证书标识字段携带分类信息。以二级分类信息为例。id的格式定义为“第一级分类信息|第二级分类信息|特征信息”,其中“|”为连接运算符。当采用证书颁发服务器的行政区域作为分类信息时,第一级分类信息可以是证书颁发服务器所在的省级信息,第二级分类信息可以是证书颁发服务器所在的地市信息。在第一种方式中,特征信息为为证书颁发服务器在生成证书时为证书分配的用于标识该证书的信息,特征信息可以记录在证书的任一约定字段中。一种可能的实现方式中,特征信息可以是使用随机数生成器生成的n个字节的二进制数字。第一种方式中,两个不同分类信息的证书,其特征信息可以相同。假设第一级分类信息长度为1个字节,第二级分类信息长度为1个字节,n为1,则一个可能的证书的id的取值为“100010000001000111111110”,其中“10001000”为证书的第一级分类信息,“00010001”为第二级分类信息,“11111110”为随机数。
第二种方式:通过region区域字段携带分类信息。Region的格式定义为“第一级分类信息|第二级分类信息”。
第三种方式:通过crlSeries证书吊销系列字段携带分类信息,或通过cracaId证书吊销服务器标识和crlSeries字段携带分类信息。如crlSeries字段的格式定义为“第一级分类信息|第二级分类信息”;或通过cracaId字段携带第一级分类信息,通过crlSeries字段携带第二级分类信息。如cracaId字段记录负责对该证书进行吊销的证书吊销服务器的标识,以此作为第一级分类信息;crlSeries字段记录该证书一旦被吊销,所归属的CRL系列,以此作为第二级分类信息。
接收端在处理消息之前,在102步骤首先根据本地保存的证书吊销列表CRL,验证证书是否被吊销,如果证书已被吊销,则直接丢弃消息。接收端在验证证书之前,直接或间接从证书吊销服务器获取CRL。与证书中包含的分类信息相对应,接收端本地保存的CRL中也需要记录被吊销证书的分类信息。此外,CRL中还需要记录被吊销证书的特征信息。CRL中记录被吊销证书的分类信息的字段可以是任意字段,本申请中为描述方便,统一将记录被吊销证书的分类信息的字段称之为吊销标识,吊销标识用于在CRL中唯一标识一个被吊销的证书。如下为IEEE 1609.2标准定义的CRL格式,假设承担吊销标识功能的字段为CRL中的id字段。同时,假设id字段记录被吊销证书的特征信息。当然,还可以选用不同于吊销标识字段的其它字段记录被吊销证书的特征信息。
以二级分类信息为例。CRL中id字段的格式定义为“第一级分类信息|第二级分类信息|被吊销证书的特征信息”,其中“|”为连接运算符,任一证书的特征信息可以是n个字节的随机数,还可以是对该证书进行哈希计算后截取的n个字节的数值,证书的特征信息用于唯一标识一个证书。当被吊销证书的特征信息为n个字节的随机数时,这n个字节的随机数可以是从被吊销证书中约定字段提取的信息,如与证书中包含分类信息的第一种方式相对应,截取被吊销证书标识中的n个字节的随机数。第一级分类信息可以是被吊销证书的证书颁发服务器所在的省级信息,第二级分类信息可以是被吊销证书的证书颁发服务器所在的地市信息。假设第一级分类信息长度为1个字节,第二级分类信息长度为1个字节,n为1,则一个可能的CRL中的id的取值为“100010000001000111111110”,其中“10001000”为被吊销证书的的第一级分类信息,“00010001”为第二级分类信息,“11111110”为被吊销证书标识中截取的随机数。
基于如上的定义,接收端在图2中第102步验证证书的时候,就可以使用接收到的证书中包含的分类信息和提取的接收到的证书的特征信息,快速高效地与CRL中吊销标识进行匹配,以确定发送端的证书是否被吊销。如图3所示,CRL列表中记录的吊销标识可以根据分类信息归类在不同的集合和子集合中。假设接收端收到的证书中携带的id取值为“100010000001000111111110”;接收端本地保存的CRL中,吊销标识的第一级分类信息可以分为两大类,即第一级分类信息-1和第一级分类信息-2,其中第一级分类信息-1取值为“10001000”,则接收端验证证书是否被吊销时,只需要匹配查找第一级分类信息为第一级分类信息-1的吊销标识;然后,接收端根据接收到的证书中id包含的第二级分类信息“00010001”,继续缩小匹配查找的范围,第一级分类信息为“00010001”的吊销标识;当存在多级分类信息时,类似的,接收端根据不同级别的分类信息,逐级缩小需要匹配和查找的范围,最终确定一个需要根据证书的特征信息进行匹配查找的子集,并根据接收到的证书的特征信息和吊销标识中包含的特征信息进行匹配,如果存在匹配的记录,则确定接收到的证书已被吊销,如果没有匹配的记录,则确定接收到的证书未被吊销。如果CRL中根本不存在接收到的证书的分类信息,则可以直接确定该接收到的证书未被吊销。
需要说明的是,本申请实施例中需要约定接收端接收到的证书的特征信息的定义,和CRL中吊销标识中记录的被吊销证书的特征信息定义保持一致。如果CRL中吊销标识中记录的被吊销证书的特征信息定义为被吊销证书标识中的指定位置的n个字节的随机数,则接收端在验证证书时从接收到的证书标识中提取指定位置的n个字节的随机数;如果CRL中吊销标识中记录的被吊销证书的特征信息定义为对被吊销证书进行哈希计算后截取指定位置的n个字节,则接收端在验证证书时对接收到的证书进行哈希计算后截取指定位置的n个字节。
通过如上实施例中所述的方法可以看出,通过在证书和CRL中吊销标识中包含分类信息,接受方在验证证书是否被吊销的时候,可以通过分类信息缩小需要查找和匹配的范围,在CRL中保存的记录较多的情况下,可以极大的减少接收端验证证书的计算量,提升验证证书的速度和效率,满足车联网中实时性的业务需求。
如图2实施例中所述,CRL是证书吊销服务器生成的,图4所示为证书吊销服务器吊销证书,并在CRL中增加包含分类信息的吊销标识的方法流程示意图。
301-302、接收端接收车联网消息,其中包含消息发送端的证书,接收端判断存在异常情况,异常情况包括发送消息频率过快,消息中包含的签名信息验证错误,或证书不在有效期等,则将接收到的,包含证书的车联网消息发送给车联网服务器,请求车联网服务器做进一步安全性判断和处理。
303、车联网服务器接收到包含证书的车联网消息,根据本地策略进行判断和决策,确定需要对证书进行吊销,发送消息到证书吊销服务器,请求证书吊销服务器吊销该证书,消息中携带证书。需要说明的是,车联网服务器可以直接向证书吊销服务器发送消息,请求吊销证书,也可以通过证书颁发服务器向证书吊销服务器发送消息,请求吊销证书。如,当车联网服务器没有被授予写入证书吊销服务器的权限时,车联网服务器需要通过证书颁发服务器向证书吊销服务器发送消息。
304、证书吊销服务器根据车联网服务器的请求,在CRL中增加一条吊销标识记录,根据证书的格式,提取证书的分类信息和特征信息,并将该证书的分类信息写入新增的吊销标识。证书吊销服务器提取证书的分类信息的方式,与图2所示实施例中描述的携带分类信息的方式相对应。具体的,对应如图2所示实施例中描述的三种携带分类信息的方式,证书吊销服务器提取证书的id字段,或region字段,或crlSeries字段,中的分类信息,并将该分类信息作为CRL中新增的吊销标识字段的分类信息。证书吊销服务器提取证书的特征信息的方式,与图2所示实施例中描述的证书的格式相对应。当证书的某个约定字段,如id字段,中包含的n字节随机数作为证书的特征信息时,证书吊销服务器提取证书约定字段中的n字节随机数,作为被吊销证书的特征信息;其它情况下,或对证书进行哈希计算后截取n个字节,作为被吊销证书的特征信息。当吊销标识字段同时记录分类信息和特征信息时,按照“分类信息|被吊销证书的特征信息”的格式记录。
需要说明的是,当证书的特征信息和CRL中记录的被吊销证书的特征信息为哈希值时,接收端和证书吊销服务器所使用的哈希算法要保持一致。具体的,接收端在102步骤对接收到的证书进行哈希计算时所使用的哈希算法,和证书吊销服务器在304步骤对被吊销的证书进行哈希计算时所使用的哈希算法,保持一致。
可选的,证书吊销服务器在第304步执行的提取证书信息的方法,还可以由车联网服务器在第303步发送证书吊销请求之前执行,即作为第303步的替代方案,车联网服务器接收到包含证书的车联网消息,根据本地策略进行判断和决策,确定需要对证书进行吊销,车联网服务器提取证书的分类信息和特征信息,发送提取的证书的分类信息和特征信息到证书吊销服务器,请求证书吊销服务器吊销该证书。
如上结合图4中的步骤描述了在CRL中新增被吊销证书的流程。由于被吊销证书的记录是不断变化的,因此车联网通信单元从证书吊销服务器获取CRL后,还需要从证书吊销服务器获取CRL变化的信息,并更新本地存储的CRL。
图5所示为本发明实施例提供的车联网通信单元获取CRL的方法流程示意图。车联网通信单元可以根据预设的触发条件主动向证书吊销服务器请求获取CRL,如401步骤所示,还可以直接由证书吊销服务器根据预设的策略或规则向车联网通信单元广播或单播CRL,即402消息即可以是401消息的响应,也可以是证书吊销服务器主动推送的消息。需要说明的是,车联网通信单元还可以间接从其它车联网通信单元获取CRL,如403和404步骤所示,车联网通信单元2可以从已获取CRL的车联网通信单元1获取CRL,404消息可以是403请求的响应,也可以是车联网通信单元1主动通过广播或单播方式向车联网通信单元2推送的CRL。
车联网通信单元主动请求获取CRL的触发条件可以是事件触发,如车辆点火启动,也可以是周期触发,如周期定时器超时,还可以是特定条件触发,如到达预订区域或预订速度阈值等。
证书吊销服务器或车联网通信单元在402或404消息中携带的CRL可以是全量CRL,也可以是差分CRL。所谓全量CRL包含证书吊销服务器吊销的所有证书的信息,差分CRL包括新 增CRL和删除CRL两个列表,其中新增CRL仅包括一个时间段内,时间段结束时间点对应的全量CRL相比时间段开始时间点对应的全量CRL,新增的被吊销证书的信息,删除CRL仅包括一个时间段内,时间段结束时间点对应的全量CRL相比时间段开始时间点对应的全量CRL,减少的被吊销证书的信息。如果采用差分更新的方案,则车联网通信单元在首次获取全量CRL后,后续在402或404消息中获取到的是差分CRL,车联网通信单元需要根据新增CRL和删除CRL两个列表,刷新本地保存的CRL;如果采用全量更新的方案,车联网通信单元在402或404消息中获取到的是全量CRL,车联网通信单元将接收到的全量CRL直接替换本地保存的CRL。
如上所述实施例描述了证书吊销服务器如何生成包含被吊销证书分类信息和特征信息的CRL,车联网通信单元如何从证书吊销服务器获取包含被吊销证书分类信息和特征信息的CRL,以及车联网通信单元在收到消息时,如何提取消息中证书的分类信息和特征信息,并与CRL中的记录进行匹配,以确定消息中携带的证书是否被吊销的方法。
由于车联网终端的数量巨大,车联网系统中颁发的证书数量也是海量的,相应的,被吊销证书的数量也相对较大。为降低保存被吊销证书的信息对车联网通信单元存储空间的影响,在上述CRL方案之外,本申请实施例进一步提出证书吊销指纹库方案。证书吊销指纹库为初始化为0的长度为N的二进制数组,证书吊销指纹库中记录了被吊销证书的指纹信息,被吊销证书的指纹信息为所述长度为N的二进制数组中取值为1的比特位信息,N为大于0的正整数。被吊销证书的指纹信息可以通过多种算法对被吊销证书进行计算而获得,如可以采用哈希计算获得被吊销证书的指纹信息。
如图6所示,假设证书吊销指纹库为初始化为0,长度为16的二进制数组。在图4所示流程的304步骤,当证书吊销服务器需要记录一个被吊销证书的时候,证书吊销服务器使用3个哈希函数,分别对被吊销证书进行哈希计算和映射(如用哈希计算的结果对指纹库二进制数组的长度取余),每次映射都会产生一个数值,每个数值对应二进制数组的一个比特位,将对应的比特位置为1,这三个取值为1的比特位信息就是该被吊销证书的指纹信息。
图2所示的方法流程中,接收端收到包含证书的车联网消息,计算证书的指纹信息,并在证书吊销指纹库中进行匹配,如果有相同的指纹信息,则该证书已被吊销。需要说明的是,证书的格式可以是本申请实施例中所述的包含分类信息的格式,也可以是其它格式。
图5所示的方法流程中,车联网通信单元在402或404步骤获取到的是证书吊销指纹库。证书吊销指纹库可以是包含全部被吊销证书指纹信息的全量证书吊销指纹库,也可以是差分证书吊销指纹位置库,差分证书吊销指纹位置库记录了一个时间段内,时间段结束时间点对应的全量证书吊销指纹库相比时间段开始时间点对应的全量证书吊销指纹库,发生变化的比特位信息。
比如,证书吊销服务器中记录的全量证书吊销指纹库中包含两个被吊销证书A和B的指纹,指纹长度为10,A的指纹为0010010001,B的指纹为0001110000,那么全量证书吊销指纹库为0011110001。如果在304步骤要新增一个被吊销证书C,假设C的指纹为1100001000,则与总体指纹库0011110001对比,发现从右数第4比特,第9比特和第10比特的取值由0变为1,则差分证书吊销指纹位置库中记录第4比特,第9比特和第10比特的取值发生变化,具体记录方式本申请不进行限定,可以以二进制数组的形式,将发生变化的比特位置为1,也可以以枚举或数组的形式,只记录发生变化的比特位的序号。如果要从全量证书吊销指纹库中将B证书的指纹删除,则更新后的全量证书吊销指纹库为0010010001,发生变化的比特位为从右数第6比特位和第7比特位,则差分证书吊销指纹位置库中记录第6比特和第7比 特的取值发生变化。
车联网通信单元如果收到差分证书吊销指纹位置库,则根据其中记录的比特位信息,将本地保存的证书吊销指纹库中对应的比特位的取值取反,就可以获得最新的证书吊销指纹库。如果收到全量证书吊销指纹库,则直接替换本地保存的证书吊销指纹库。
由于证书吊销指纹库中的1没有和特定的被吊销证书进行绑定,因此车联网通信单元在第102步骤进行证书验证的时候,可能会存在误判。如在证书吊销指纹库中记录的指纹信息较多的情况下,证书吊销指纹库中,一个待确认证书的指纹信息所对应的比特位可能都已被置为1,而这些比特位并不一定对应同一个被吊销证书的指纹。
作为发送端的车联网通信单元,在101步骤发送消息前,为防止接收端误判而丢弃自己发送的消息,首先使用本地保存的证书吊销指纹库,自行验证证书的指纹信息是否在证书吊销指纹库中有匹配的记录,确保在消息中携带一个在证书吊销指纹库中没有匹配记录的证书,如图7中100步骤所示。一般情况下,证书颁发服务器会一次颁发给车联网通信单元多个证书,车联网通信单元在这些证书中,选用一个在证书吊销指纹库中没有匹配记录的证书。如果本地没有可用的证书,则车联网通信单元重新向证书颁发服务器申请证书。
作为接收端的车联网通信单元,在102步骤,如果确定消息中证书的指纹信息在证书吊销指纹库中存在,为了防止误判,请求证书吊销服务器验证证书,如图8中103步骤所示,请求消息中包含证书或证书的信息。由于证书吊销服务器不仅保存了被吊销证书的指纹信息,还保存了CRL等信息,因此证书吊销服务器的验证结果更加准确。接收端的车联网通信单元最终以证书吊销服务器在104步骤中返回的验证结果为准,对V2X消息进行处理。如果证书吊销服务器返回的验证结果为未吊销,则接收端继续处理V2X消息;如果证书吊销服务器返回的验证结果为已吊销,则接收端丢弃V2X消息。
本申请实施例中所述的证书吊销列表方案和证书吊销指纹库方案,都是为了提升车联网通信中,车联网终端或车联网通信单元验证证书的效率和速度,以提升消息处理的实时性,并降低验证证书对车联网终端或车联网通信单元性能的影响。相比证书吊销列表方案,证书吊销指纹库方案对车联网终端或车联网通信单元存储空间的要求更低,车联网终端或车联网通信单元保存证书吊销指纹库只需要占用很少的存储空间,但另一方面,证书吊销指纹库方案可能存在一定的误判概率,因此除了接收端进行证书的验证,还需要额外的处理以提升证书验证的准确性。
需要说明的是,证书吊销列表方案和证书吊销指纹库方案可以各自独立应用,也可以组合应用。两种方案组合应用时,证书的格式采用证书吊销列表方案中描述的包含分类信息的格式,证书吊销服务器同时保存CRL和证书吊销指纹库,车联网通信单元只保存证书吊销指纹库。两种方案组合应用的场景下:
304步骤,证书吊销服务器同时根据证书吊销列表方案和证书吊销指纹库方案分别刷新CRL和证书吊销指纹库;
402步骤或404步骤,车联网通信单元只获取并保存证书吊销指纹库,以减少对存储空间的消耗;
102步骤,车联网通信单元采用证书吊销指纹库方案对证书进行验证;
103-104步骤,为提高验证的准确性,车联网通信单元请求证书吊销服务器对证书进行验证,证书吊销服务器使用CRL列表对证书进行快速验证。
上述主要从方法流程的角度对本发明实施例提供的方案进行了介绍。可以理解的是,车联网通信单元、车联网服务器和证书吊销服务器等实体为了实现上述功能,其包含了执行各 个功能相应的硬件结构和/或软件模块。另外,本申请实施例中所描述的车联网服务器和证书吊销服务器可以是分离的物理设备,也可以是同一个物理设备中的不同逻辑功能实体,即本申请实施例中车联网服务器和证书吊销服务器所具备的功能可以在同一个物理设备中实现。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的方法流程,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
例如,如上实施例中的车联网通信单元、车联网服务器和证书吊销服务器均可以由如图9所示的装置来实现。
装置500包括至少一个处理器501,通信总线502,存储器503以及至少一个通信接口504。
处理器501可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本发明方案程序执行的集成电路。
通信总线502可包括一通路,在上述组件之间传送信息。
通信接口504,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。
存储器503可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器503用于存储执行本发明方案的应用程序代码,并由处理器501来控制执行。处理器501用于执行存储器503中存储的应用程序代码,从而实现本专利方法中车联网通信单元、车联网服务器和证书吊销服务器的功能。
在具体实现中,作为一种实施例,处理器501可以包括一个或多个CPU,例如图6中的CPU0和CPU1。
在具体实现中,作为一种实施例,装置500可以包括多个处理器,例如图6中的处理器501和处理器508。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
在具体实现中,作为一种实施例,装置500还可以包括输出设备505和输入设备506。输出设备505和处理器501通信,可以以多种方式来显示信息。例如,输出设备505可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备506和处理器501通信,可以以多种方式接受用户的输入。例如,输入设备506可以是鼠标、键盘、触摸屏设备或传感设备等。
当上述装置实现车联网服务器或证书吊销服务器的功能时,装置500可以是一个通用服 务器或者是一个专用服务器。
当上述装置实现本申请实施例中车联网通信单元的功能时,装置500可以是集成在车辆中的车载盒子(Telematics BOX,T-Box)或多域控制器(Multi-Domian Controller,MDC)。可选的,可选的,装置500还可以是集成在车辆中的芯片,那么通信接口504的功能/实现过程还可以通过管脚或电路等来实现;所述存储器为所述芯片内的存储单元,如寄存器、缓存等,所述存储单元还可以是位于所述芯片外部的存储单元。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,本领域技术人员应该理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明的保护范围之内。在权利要求中,“包括”一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其它单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能结合起来产生良好的效果。
Claims (41)
- 一种确定证书状态的方法,其特征在于,接收端接收发送端发送的消息,所述消息中包括所述发送端证书,所述发送端证书中包含分类信息;所述接收端根据所述分类信息,在保存的证书吊销列表中确定吊销标识的集合,所述吊销标识用于在所述证书吊销列表中标识被吊销证书,所述吊销标识包含被吊销证书的分类信息,所述集合中的吊销标识包含的分类信息与所述发送方证书的分类信息相同;所述接收端提取所述发送端证书的特征信息,与所述集合中吊销标识对应的被吊销证书的特征信息进行匹配,并根据匹配结果确定所述发送端证书的状态。
- 根据权利要求1所述的方法,其特征在于,所述吊销标识包含的特征信息为所述吊销标识对应的被吊销证书的第一约定字段包含的N个字节的随机数,N为大于0的正整数;所述接收端提取所述发送端证书的特征信息,具体包括:所述接收端从所述发送端证书的第一约定字段截取N个字节的随机数作为所述发送端证书的特征信息。
- 根据权利要求1所述的方法,其特征在于,所述吊销标识包含的特征信息为对所述吊销标识对应的被吊销证书进行哈希运算后得到的M个字节的哈希值,M为大于0的正整数;所述接收端提取所述发送端证书的特征信息,具体包括:所述接收端对所述发送端证书进行所述哈希运算后,得到的M个字节的哈希值作为所述发送端证书的特征信息。
- 根据权利要求1-3任一所述的方法,其特征在于,所述发送端证书的分类信息包含在所述发送端证书的第二约定字段中。
- 根据权利要求4所述的方法,其特征在于,所述第二约定字段为所述发送端证书的证书标识字段,或所述证书的区域字段,或所述证书的证书吊销系列字段。
- 根据权利要求1-5任一所述的方法,其特征在于,所述分类信息包含第一级分类信息和第二级分类信息。
- 根据权利要求6所述的方法,其特征在于,所述接收端根据所述分类信息,在保存的证书吊销列表中确定吊销标识的集合,具体包括:所述接收端根据所述发送端证书的第一级分类信息,在所述证书吊销列表中确定第一吊销标识的集合,所述第一吊销标识的集合中的吊销标识包含的的第一级分类信息与所述发送端证书的第一级分类信息相同;所述接收端根据所述发送端证书的第二级分类信息,在所述第一吊销标识的集合中确定第二吊销标识的集合,所述第二吊销标识的集合中的吊销标识包含的的第二级分类信息与所述发送端证书的第二级分类信息相同。
- 根据权利要求1-7任一所述的方法,其特征在于,所述接收端根据所述分类信息,在保存的证书吊销列表中确定吊销标识的集合之前,所述方法还包括,所述接收端从证书吊销服务器获取证书吊销列表。
- 根据权利要求8所述的方法,其特征在于,所述接收端从证书吊销服务器获取证书吊销列表具体包括,所述接收端从证书吊销服务器获取全量证书吊销列表;所述接收端从证书吊销服务器获取差分证书吊销列表,所述差分证书吊销列表包括一个 新增证书吊销列表和一个删除证书吊销列表,所述新增证书吊销列表中包括相比所述全量证书吊销列表,增加的吊销标识,所述删除证书吊销列表中包括相比所述完整的证书吊销列表,删除的吊销标识;所述接收端根据所述差分证书吊销列表,刷新保存的所述全量证书吊销列表。
- 根据权利要求1-9任一所述的方法,其特征在于,所述接收端根据匹配结果确定所述发送端证书的状态,具体包括,所述接收端在通过匹配,确定所述集合中吊销标识对应的被吊销证书的特征信息中,存在与所述发送端证书的特征信息相同的特征信息,则所述接收端确定所述发送端证书已被吊销。
- 根据权利要求1-9任一所述的方法,其特征在于,所述接收端根据匹配结果确定所述发送端证书的状态,具体包括,所述接收端通过匹配,确定所述集合中吊销标识对应的被吊销证书的特征信息中,不存在与所述发送端证书的特征信息相同的特征信息,则所述接收端确定所述发送端证书未被吊销。
- 根据权利要求1-11任一所述的方法,其特征在于,所述接收端或发送端为车载通信单元或路侧通信单元。
- 一种确定证书状态的方法,其特征在于,接收端接收发送端发送的消息,所述消息中包括所述发送端证书;所述接收端确定证书吊销指纹库中存在与所述发送端证书的指纹信息匹配的被吊销证书的指纹信息,所述发送端证书的指纹信息为所述接收端根据所述发送端证书计算获得;所述接收端向证书吊销服务器发送所述发送端证书,请求所述证书吊销服务器验证所述发送端证书的状态;所述接收端接收所述证书吊销服务器的验证结果,并根据所述验证结果确定所述发送端证书的状态。
- 根据权利要求13所述的方法,其特征在于,所述证书吊销指纹库为初始化为0的长度为N的二进制数组,所述指纹信息为长度为N的二进制数组中取值为1的比特位信息,N为大于0的正整数。
- 根据权利要求13或14所述的方法,其特征在于,所述接收端对所述发送端证书进行哈希运算,对哈希运算后的取值截取其中M个字节,M为大于0的正整数,对所述M个字节的数值进行哈希运算并对N取模,获得所述发送端证书的指纹信息。
- 根据权利要求13-15任一所述的方法,其特征在于,所述接收端接收发送端发送的消息之前,所述方法还包括,所述接收端从证书吊销服务器或第三车联网通信单元获取所述证书吊销指纹库。
- 根据权利要求16所述的方法,其特征在于,所述接收端从证书吊销服务器或第三车联网通信单元获取所述证书吊销指纹库,具体包括,所述接收端从证书吊销服务器或第三车联网通信单元获取全量证书吊销指纹库,所述全量证书吊销指纹库中包括所有被吊销证书的指纹信息;所述接收端从证书吊销服务器或第三车联网通信单元获取差分证书吊销指纹位置库,所述差分证书吊销指纹位置库记录所述全量证书吊销指纹库发生变化的比特位信息;所述接收端根据所述差量证书吊销指纹库,将所述全量证书吊销指纹库中发生变化的比 特位对应的取值进行取反运算。
- 根据权利要求13-17任一所述的方法,其特征在于,所述接收端确定所述发送端证书被吊销的情况下,所述方法还包括,所述接收端丢弃所述发送端发送的消息。
- 根据权利要求13-18任一所述的方法,其特征在于,所述接收端或发送端或第三车联网通信单元为车载通信单元或路侧通信单元。
- 一种确定证书状态的方法,其特征在于,证书吊销服务器接收请求吊销证书的消息,所述请求吊销证书的消息中包括证书,所述证书中包含所述证书的分类信息;所述证书吊销服务器提取所述证书的分类信息和特征信息,并在证书吊销列表中记录所述证书的分类信息和特征信息。
- 根据权利要求20所述的方法,其特征在于,所述证书的特征信息为所述证书的第一约定字段包含的N个字节的随机数,N为大于0的正整数;所述证书吊销服务器提取所述证书的特征信息,具体包括:所述证书吊销服务器在所述证书的第一约定字段截取N个字节的随机数作为所述证书的特征信息。
- 根据权利要求20所述的方法,其特征在于,所述证书的特征信息为对所述证书进行哈希运算后得到的M个字节的哈希值,M为大于0的正整数;所述证书吊销服务器提取所述证书的特征信息,具体包括:所述证书吊销服务器对所述证书进行所述哈希运算后,得到的M个字节的哈希值作为所述证书的特征信息。
- 根据权利要求20-22任一所述的方法,其特征在于,所述证书的分类信息包含在所述证书的第二约定字段中;所述证书吊销服务器提取所述证书的分类信息,具体包括:所述证书吊销服务器在所述证书的第二约定字段截取所述证书的分类信息。
- 根据权利要求23所述的方法,其特征在于,所述第二约定字段为所述证书的证书标识字段,或所述证书的区域字段,或所述证书的证书吊销系列字段。
- 根据权利要求20-24任一所述的方法,其特征在于,所述证书吊销服务器在所述证书吊销列表中的吊销标识字段记录所述证书的分类信息。
- 根据权利要求20-25任一所述的方法,其特征在于,所述证书吊销服务器在所述证书吊销列表中的吊销标识字段记录所述证书的特征信息。
- 根据权利要求20-26任一所述的方法,其特征在于,所述证书吊销服务器将所述证书的分类信息和所述证书的特征信息进行连接运算,并在所述证书吊销列表中的吊销标识字段记录所述连接运算后得到的值。
- 一种确定证书状态的方法,其特征在于,证书吊销服务器接收车联网服务器发送的请求吊销证书的消息,所述请求吊销证书的消息中包括证书;所述证书吊销服务器计算获得所述证书的指纹信息,并在证书吊销指纹库记录所述证书的指纹信息;所述证书吊销服务器比较证书吊销指纹库记录所述证书的指纹信息前后发生变化的比特 位信息,并将发生变化的比特位信息记录到差分证书吊销指纹位置库。
- 根据权利要求28所述的方法,其特征在于,所述证书吊销指纹库中包括被吊销证书的指纹信息,所述证书吊销指纹库为初始化为0的长度为N的二进制数组,所述指纹信息为长度为N的二进制数组中取值为1的比特位信息,N为大于0的正整数。
- 根据权利要求28或29所述的方法,其特征在于,所述方法还包括,所述证书吊销服务器向车联网通信单元发送所述差分证书吊销指纹位置库。
- 一种确定证书状态的方法,其特征在于,车联网服务器接收第一车联网通信单元发送的消息,所述消息中包括第二车联网通信单元发送给所述第一车联网通信单元的消息,所述第二车联网通信单元发送给所述第一车联网通信单元的消息中包括所述第二车联网通信单元的证书,所述证书中包括所述证书的分类信息;所述车联网服务器提取所述的证书的分类信息和特征信息;所述车联网服务器向证书吊销服务器发送消息,请求吊销所述证书,所述消息中包括所述证书的分类信息和特征信息。
- 根据权利要求31所述的方法,其特征在于,所述证书的特征信息为所述证书的第一约定字段包含的N个字节的随机数,N为大于0的正整数;所述车联网服务器提取所述第二车联网通信单元的证书的特征信息,具体包括:所述车联网服务器在所述证书的第一约定字段截取N个字节的随机数作为所述证书的特征信息。
- 根据权利要求31所述的方法,其特征在于,所述证书的特征信息为对所述证书进行哈希运算后得到的M个字节的哈希值,M为大于0的正整数;所述车联网服务器提取所述第二车联网通信单元的证书的特征信息,具体包括:所述车联网服务器对所述证书进行所述哈希运算后,得到的M个字节的哈希值作为所述证书的特征信息。
- 根据权利要求31-33任一所述的方法,其特征在于,所述证书的分类信息包含在所述证书的第二约定字段中;所述车联网服务器提取所述第二车联网通信单元的证书的分类信息,具体包括:所述车联网服务器在所述证书的第二约定字段截取所述证书的分类信息。
- 根据权利要求34所述的方法,其特征在于,所述第二约定字段为所述证书的证书标识字段,或所述证书的区域字段,或所述证书的证书吊销系列字段。
- 根据权利要求31-35任一所述的方法,其特征在于,所述分类信息包含第一级分类信息和第二级分类信息。
- 根据权利要求31-36任一所述的方法,其特征在于,所述第一车联网通信单元或第二车联网通信单元为车载通信单元或路侧通信单元。
- 一种车联网通信单元,其特征在于,包括:通信接口、存储器和处理器,所述通信接口用于与车联网通信单元外部的装置或设备进行通信;所述存储器用于存储程序;所述处理器用于执行所述存储器中存储的程序,当所述程序被执行时,所述车联网通信单元执行如权利要求1-19任一所述的方法。
- 一种证书吊销服务器,其特征在于,包括:通信接口、存储器和处理器,所述通信接口用于与证书吊销服务器外部的装置或设备进行通信;所述存储器用于存储程序;所述处理器用于执行所述存储器中存储的程序,当所述程序被执行时,所述证书吊销服务器执行如权利要求20-30任一所述的方法。
- 一种车联网服务器,其特征在于,包括:通信接口、存储器和处理器,所述通信接口用于与车联网服务器外部的装置或设备进行通信;所述存储器用于存储程序;所述处理器用于执行所述存储器中存储的程序,当所述程序被执行时,所述车联网服务器执行如权利要求31-37任一所述的方法。
- 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行如权利要求1至37中任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19853992.6A EP3836481A4 (en) | 2018-08-25 | 2019-07-27 | CERTIFICATE STATE DETERMINATION PROCESS |
JP2021510230A JP7214838B2 (ja) | 2018-08-25 | 2019-07-27 | 証明書ステータスの決定方法 |
US17/182,493 US12034871B2 (en) | 2018-08-25 | 2021-02-23 | Certificate status determining method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810976472.9 | 2018-08-25 | ||
CN201810976472.9A CN110858804B (zh) | 2018-08-25 | 2018-08-25 | 确定证书状态的方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/182,493 Continuation US12034871B2 (en) | 2018-08-25 | 2021-02-23 | Certificate status determining method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020042844A1 true WO2020042844A1 (zh) | 2020-03-05 |
Family
ID=69636313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/098056 WO2020042844A1 (zh) | 2018-08-25 | 2019-07-27 | 确定证书状态的方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US12034871B2 (zh) |
EP (1) | EP3836481A4 (zh) |
JP (1) | JP7214838B2 (zh) |
CN (1) | CN110858804B (zh) |
WO (1) | WO2020042844A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113568986A (zh) * | 2021-07-06 | 2021-10-29 | 东风汽车集团股份有限公司 | 远程联网终端生产数据匹配方法及系统 |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10868677B2 (en) * | 2018-06-06 | 2020-12-15 | Blackberry Limited | Method and system for reduced V2X receiver processing load using certificates |
US11184178B2 (en) * | 2018-09-28 | 2021-11-23 | Blackberry Limited | Method and system for intelligent transportation system certificate revocation list reduction |
EP4035049A4 (en) * | 2019-09-27 | 2023-06-28 | INTEL Corporation | Secured hd map services using blockchain |
CN112740617B (zh) * | 2020-03-19 | 2022-03-08 | 华为技术有限公司 | 证书列表更新方法及装置 |
CN111711937B (zh) * | 2020-06-16 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | 用于车联网v2x通信的在线证书状态获取方法和系统 |
CN111818482B (zh) * | 2020-06-16 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | 用于v2x的在线证书状态获取方法、系统及通信方法 |
CN112489458B (zh) * | 2020-11-05 | 2021-11-09 | 暨南大学 | 基于v2x技术的可信、隐私保护的智能红绿灯方法及系统 |
CN114866243B (zh) * | 2021-01-20 | 2024-03-15 | 华为技术有限公司 | 证书吊销列表管理方法、装置及电子设备 |
CN113242130B (zh) * | 2021-04-01 | 2022-07-22 | 深圳国实检测技术有限公司 | 设备数字证书吊销方法、电子设备及计算机可读存储介质 |
CN114257993A (zh) * | 2021-12-27 | 2022-03-29 | 智道网联科技(北京)有限公司 | 车载通信和定位数据处理的方法、车载终端和车辆 |
CN116455633B (zh) * | 2023-04-17 | 2024-01-30 | 清华大学 | 数字证书验证方法、装置、电子设备及存储介质 |
CN117061251B (zh) * | 2023-10-12 | 2024-01-30 | 兴原认证中心有限公司 | 一种用于认证平台的pki证书暂停撤销方法及系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236753A (zh) * | 2010-05-07 | 2011-11-09 | 中兴通讯股份有限公司 | 版权管理方法及系统 |
EP3226464A1 (de) * | 2016-03-30 | 2017-10-04 | Siemens Aktiengesellschaft | Datenstruktur zur verwendung als positivliste in einem gerät, verfahren zur aktualisierung einer positivliste und gerät |
CN107508682A (zh) * | 2017-08-16 | 2017-12-22 | 努比亚技术有限公司 | 浏览器证书认证方法及移动终端 |
CN107786515A (zh) * | 2016-08-29 | 2018-03-09 | 中国移动通信有限公司研究院 | 一种证书认证的方法和设备 |
CN108092777A (zh) * | 2017-12-26 | 2018-05-29 | 北京奇虎科技有限公司 | 数字证书的监管方法及装置 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7743248B2 (en) * | 1995-01-17 | 2010-06-22 | Eoriginal, Inc. | System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components |
US5745574A (en) * | 1995-12-15 | 1998-04-28 | Entegrity Solutions Corporation | Security infrastructure for electronic transactions |
US7444509B2 (en) | 2004-05-27 | 2008-10-28 | International Business Machines Corporation | Method and system for certification path processing |
EP2034661A1 (en) | 2007-09-07 | 2009-03-11 | Deutsche Telekom AG | Method and system for distributed, localized authentication in the framework of 802.11 |
US8397063B2 (en) * | 2009-10-07 | 2013-03-12 | Telcordia Technologies, Inc. | Method for a public-key infrastructure for vehicular networks with limited number of infrastructure servers |
US8819414B2 (en) * | 2010-04-19 | 2014-08-26 | GM Global Technology Operations LLC | Threat mitigation in a vehicle-to-vehicle communication network |
US10153908B2 (en) * | 2010-04-30 | 2018-12-11 | T-Central, Inc. | Secure communication of IOT devices for vehicles |
EP3099004B1 (en) * | 2014-01-22 | 2019-03-13 | Panasonic Intellectual Property Corporation of America | Authentication method |
CN106330449A (zh) * | 2015-07-02 | 2017-01-11 | 西安西电捷通无线网络通信股份有限公司 | 一种验证数字证书有效性的方法及其鉴别服务器 |
DE102015218800A1 (de) * | 2015-09-29 | 2017-03-30 | Continental Automotive Gmbh | Kommunikationssystem zur V2X-Kommunikation |
US9882727B1 (en) * | 2015-10-02 | 2018-01-30 | Digicert, Inc. | Partitioning certificate revocation lists |
US10326753B2 (en) * | 2016-06-23 | 2019-06-18 | International Business Machines Corporation | Authentication via revocable signatures |
JP6319817B2 (ja) | 2016-09-27 | 2018-05-09 | Necプラットフォームズ株式会社 | 検証装置及び電子証明書検証方法 |
KR101896783B1 (ko) * | 2016-10-17 | 2018-10-18 | 현대자동차주식회사 | V2x 데이터 신뢰도 검증을 위한 v2x 통신 장치, 그를 포함한 v2x 통신 시스템 및 그 방법 |
EP3907639A1 (en) * | 2016-11-14 | 2021-11-10 | Integrity Security Services Llc | Secure provisioning and management of devices |
US11025607B2 (en) * | 2016-12-15 | 2021-06-01 | At&T Mobility Ii Llc | V2X certificate management |
US10055260B2 (en) * | 2017-01-05 | 2018-08-21 | Guardknox Cyber Technologies Ltd. | Specially programmed computing systems with associated devices configured to implement centralized services ECU based on services oriented architecture and methods of use thereof |
WO2018150546A1 (ja) | 2017-02-17 | 2018-08-23 | 三菱電機株式会社 | 車両通信システム、車両通信装置、失効情報発行装置、車両通信方法および車両通信プログラム |
US10868677B2 (en) * | 2018-06-06 | 2020-12-15 | Blackberry Limited | Method and system for reduced V2X receiver processing load using certificates |
-
2018
- 2018-08-25 CN CN201810976472.9A patent/CN110858804B/zh active Active
-
2019
- 2019-07-27 JP JP2021510230A patent/JP7214838B2/ja active Active
- 2019-07-27 WO PCT/CN2019/098056 patent/WO2020042844A1/zh unknown
- 2019-07-27 EP EP19853992.6A patent/EP3836481A4/en active Pending
-
2021
- 2021-02-23 US US17/182,493 patent/US12034871B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236753A (zh) * | 2010-05-07 | 2011-11-09 | 中兴通讯股份有限公司 | 版权管理方法及系统 |
EP3226464A1 (de) * | 2016-03-30 | 2017-10-04 | Siemens Aktiengesellschaft | Datenstruktur zur verwendung als positivliste in einem gerät, verfahren zur aktualisierung einer positivliste und gerät |
CN107786515A (zh) * | 2016-08-29 | 2018-03-09 | 中国移动通信有限公司研究院 | 一种证书认证的方法和设备 |
CN107508682A (zh) * | 2017-08-16 | 2017-12-22 | 努比亚技术有限公司 | 浏览器证书认证方法及移动终端 |
CN108092777A (zh) * | 2017-12-26 | 2018-05-29 | 北京奇虎科技有限公司 | 数字证书的监管方法及装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3836481A4 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113568986A (zh) * | 2021-07-06 | 2021-10-29 | 东风汽车集团股份有限公司 | 远程联网终端生产数据匹配方法及系统 |
CN113568986B (zh) * | 2021-07-06 | 2024-05-10 | 东风汽车集团股份有限公司 | 远程联网终端生产数据匹配方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
JP7214838B2 (ja) | 2023-01-30 |
US20210176080A1 (en) | 2021-06-10 |
CN110858804A (zh) | 2020-03-03 |
US12034871B2 (en) | 2024-07-09 |
JP2021536177A (ja) | 2021-12-23 |
CN110858804B (zh) | 2022-04-05 |
EP3836481A1 (en) | 2021-06-16 |
EP3836481A4 (en) | 2021-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020042844A1 (zh) | 确定证书状态的方法 | |
US11888993B2 (en) | Digital certificate application method | |
US10523675B2 (en) | Remote direct memory access authorization | |
CN112435028B (zh) | 一种基于区块链的物联网数据共享方法及装置 | |
US11546173B2 (en) | Methods, application server, IoT device and media for implementing IoT services | |
WO2020052335A1 (zh) | 一种发送消息的方法、验证消息的方法、装置及通信系统 | |
US10503893B2 (en) | Security certificate management method for a vehicular network node and vehicular network node applying the same | |
US11979509B2 (en) | Method and system for handling dynamic cybersecurity posture of a V2X entity | |
US20230362607A1 (en) | Method and system for addition of assurance information to v2x messaging | |
WO2020259169A1 (zh) | 认证方法、设备及系统 | |
Theodore et al. | A novel lightweight authentication and privacy-preserving protocol for vehicular ad hoc networks | |
Magsi et al. | A machine learning-based attack detection and prevention system in vehicular named data networking | |
Roy et al. | BLAME: A blockchain-assisted misbehavior detection and event validation in VANETs | |
US11290276B2 (en) | Method and system for a signed document validity service | |
WO2020259519A1 (zh) | 一种证书更新方法以及相关设备 | |
TW201220804A (en) | comprising the steps of generating change information; transmitting; signing and issuing the latest message; transmitting to each web domain; sending a request message by a user end; and receiving a response message by the user end | |
Sharma et al. | Token based trust computation in VANET | |
CN112995992B (zh) | 一种大规模无线传感器网络协同身份验证方法 | |
Patil et al. | Original Research Article Novel machine learning based authentication technique in VANET system for secure data transmission | |
Carter et al. | Analysis of vehicle-based security operations | |
Lavingia et al. | Blockchain for Secure Message Transmission in VANETs | |
CN117097479A (zh) | 数据处理方法及装置、电子设备、可读存储介质 | |
Rao | Performance evaluation of secure communication in vehicular networks | |
ACHIEVE et al. | INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19853992 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021510230 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019853992 Country of ref document: EP Effective date: 20210308 |