The present invention relates to a certificate management apparatus verifying a message and a certificate using a digital certificate.
Conventionally, for instance, in an automobile, a system providing a driver with traffic congestion information, through radio communication which is carried out between a communication apparatus to be mounted on the automobile (hereinafter, referred to as an on-board device) and a communication apparatus to be set on a road (hereinafter, referred to as a roadside device) is used. Further, a system has been studied, in which driving support or automatic driving is carried out while on-board devices mutually perform radio communication. Since human lives are involved in these systems, the confidentiality or the integrity is required for the message to be transmitted.
In order to guarantee the confidentiality or the integrity, the communication apparatus mounts a digital certificate (EE (End Entity) certificate), and for data such as a message to be transmitted, puts a signature on the data or makes the data confidential. Since the digital certificate is issued for each communication apparatus, the communication apparatus transmits the message by appending its own certificate. The communication apparatus which has received the message verifies whether or not the received digital certificate is a digital certificate issued by a predetermined certification authority using a digital certificate (CA (Certification Authority) certificate) of the certification authority, and verifies the signature of the message using the EE certificate which has passed the verification. Hereinafter, the digital certificate is simply referred to as a certificate.
Generally, in a system carrying out driving support or automatic driving, it is required to process 2000 to 4000 messages per second; and it takes a large amount of time to verify the signatures. Therefore, a method is proposed, in which a certificate that has been verified once is stored in a cache, thereby eliminating the subsequent signature verification.
However, generally, since the size of the cache is limited, it is impossible to store certificates exceeding the upper limit of the cache size. For this problem, an apparatus is proposed, which overwrites a part of the cache to store certificates (for instance, Patent Literature 1). Further, for general data, an apparatus which overwrites the cache is proposed (for instance, Patent Literature 2).
According to Patent Literature 1, in order to compress memory quantity to store certificates, a certificate table to record a digest of a public key is retained. It is described that the certificate table stores a hash of the public key, an expiration date, a pointer to the upper certificate, and a counter to be used, and when a certain certificate is referenced, the counter of the certificate and the counter of the upper certificate are each incremented by one. However, in this case, the certificate to which the reference is made frequently is retained preferentially. In the system carrying out the driving support or the automatic driving, since the certificate which has been referenced lately has to be retained preferentially, the above method is not suitable for the system.
On the other hand, according to Patent Literature 2, it is described that since the oldest searched data is automatically deleted, the contents of auxiliary data corresponding to the registered or searched data is rewritten by a value of a counter which is retained inside. However, in a case where this method is applied without change, there is a possibility to delete the CA certificate which has to be retained even if the referenced date and time is old.
The present invention is done to solve the above problems, and provides a certificate management apparatus which retains an important certificate, while deleting the oldest referenced certificate.
In order to solve the above-discussed problems, a certificate management apparatus of the present invention includes: an update determination information output unit to output update determination information being information for determining whether or not to update a certificate; a certificate cache being a cache memory to store the certificate on a volatile memory; and an operation unit to store the update determination information output by the update determination information output unit by relating to the certificate in the certificate cache, and based on the update determination information stored in the certificate cache, to update the certificate related to the update determination information.
According to the present invention, update determination information being information for determining whether or not to update a certificate is stored by relating to the certificate, and a priority to update the certificate is decided using the update determination information, and thereby an effect that enables to retain an important certificate, while deleting the oldest referenced certificate, is obtained.
In a first embodiment, an embodiment will be explained, in which a value of an internal counter is used as update determination information being information for determining whether or not to update a certificate.
In
In
In
The operation to the cache is the same as the case of the EE certificate; in case of the CA certificate, the CA3 certificate is added also to the store 403. If the store has no space to write, an error may be returned or an unnecessary CA certificate may be deleted and overwritten.
In
In
Here, in the above explanation, the entry having the smallest counter value is updated; however, the update may be implemented when the counter value is equal to or less than a threshold value.
As discussed above, according to the invention of the first embodiment, the counter value of the internal counter is used as the update determination information being information for determining whether or not to update the certificate, the certificate is stored by relating to the counter value, and a priority to update the certificate is decided using the counter value, and thereby an effect that enables to retain the latest referenced certificate, while deleting the oldest referenced certificate, is obtained.
In the first embodiment, the counter value of the internal counter is used as the update determination information to decide a priority to update the certificate; in a second embodiment, an embodiment of a certificate management apparatus will be explained, which keeps a ratio of the CA certificates and the EE certificates that are stored in the certificate cache constant, so as to prevent the CA certificate from being deleted excessively.
As discussed above, according to the invention of the second embodiment, the ratio of the CA certificates and the EE certificates that are stored is kept constant, and thereby there is an effect that enables to prevent the CA certificate from being excessively deleted. Further, compared with a case in which separate caches are prepared for the CA certificate and the EE certificate, the ratio of the certificates that are stored can be dynamically changed, and thereby there is an effect that enables to keep an appropriate ratio according to the environment of the apparatus.
In the third embodiment, anther embodiment will be explained, in which geographic position information is used as update determination information for determining whether or not to update a certificate, and the certificate around a specific position is preferentially retained.
In
In
A certificate store 107 records the CA certificate and a geographic range in which the corresponding certificate is valid. If the valid geographic range is not limited, information indicating that is recorded.
The default range store 802 records a plurality of predetermined geographic ranges. The certificates in the predetermined ranges on the cache are retained preferentially. The describing method for the position and the range may be arbitrary. In an example of
It is assumed that the EE2 certificate is signed by the CA2 certificate. In a case where the cache 1001 has vacancy before adding, the EE2 certificate and the value of the current position at that time are added to a vacant area. Further, the CA2 certificate is not in the cache 1001, the corresponding certificate and the valid range are added from a store 1003 in the same manner. In a case where the CA2 certificate is in the cache, no operation is carried out.
In a store 1103, the CA2 certificate of which the valid range is “everywhere” is assumed to be a certificate being valid at an arbitrary place. The operation to the cache is the same as the case of the EE certificate; in case of the CA certificate, it is also added to the store. If the store has no vacancy to write, an error may be returned, or an unnecessary CA certificate may be deleted and overwritten. If the valid range of the CA3 certificate is determined, the corresponding valid range is added to a cache 1102 and the store 1103. If no valid range is particularly determined, a valid range of the CA2 certificate being the upper-level certificate may be succeeded.
Since the EE1 certificate and the CA1 certificate are stored in a cache 1201, the position information of the corresponding certificates on the cache are updated to the current positions.
First, a certificate (the EE2 certificate in case of
Here, in the above explanation, the certificate in the farthest position is overwritten; however, the overwriting may be implemented if a distance from the current position is equal to or greater than a threshold value.
Further, similarly to the second embodiment, a function may be added to select a certificate so as to keep a ratio of the CA certificates and the EE certificates that are stored constant.
As discussed above, the invention of the third embodiment enables to manage the certificates effectively by preferentially deleting the certificate which is the farthest from the current position since such a certificate is referenced the most hardly. In particular, in case of mounting on the automobile, since the current position changes from time to time, an effective certificate management can be implemented. Further, the certificate at a particular position is preferentially retained, and thereby the certificate of the roadside device of, for instance, the commuting route or the neighborhood can be preferentially retained; the certificate management can be implemented effectively.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2014/000998 | 2/26/2014 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2015/128895 | 9/3/2015 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5748960 | Fischer | May 1998 | A |
5943658 | Gravell | Aug 1999 | A |
5982898 | Hsu | Nov 1999 | A |
6230272 | Lockhart | May 2001 | B1 |
6321333 | Murray | Nov 2001 | B1 |
6414635 | Stewart | Jul 2002 | B1 |
6636975 | Khidekel | Oct 2003 | B1 |
6754661 | Hallin | Jun 2004 | B1 |
7712126 | Andersson | May 2010 | B2 |
7721108 | Pailles et al. | May 2010 | B2 |
7743248 | Bisbee | Jun 2010 | B2 |
7953977 | Maruyama et al. | May 2011 | B2 |
8060915 | Voice et al. | Nov 2011 | B2 |
8230486 | Voice | Jul 2012 | B2 |
8380985 | Sato et al. | Feb 2013 | B2 |
8402198 | de la Iglesia et al. | Mar 2013 | B1 |
8452954 | Strong | May 2013 | B2 |
8612757 | Chiviendacz et al. | Dec 2013 | B2 |
8788811 | Fu | Jul 2014 | B2 |
8874903 | Kudo | Oct 2014 | B2 |
8966579 | Mister et al. | Feb 2015 | B2 |
9037852 | Pinkus | May 2015 | B2 |
9100194 | Mister et al. | Aug 2015 | B2 |
9191215 | Chiviendacz et al. | Nov 2015 | B2 |
9281945 | Voice et al. | Mar 2016 | B2 |
20020007346 | Qiu | Jan 2002 | A1 |
20020056747 | Matsuyama | May 2002 | A1 |
20020184508 | Bialick | Dec 2002 | A1 |
20030014638 | Lincoln | Jan 2003 | A1 |
20030105399 | Morsy | Jun 2003 | A1 |
20030132285 | Blancas | Jul 2003 | A1 |
20030154406 | Honarvar | Aug 2003 | A1 |
20040039911 | Oka | Feb 2004 | A1 |
20040064334 | Nye | Apr 2004 | A1 |
20040093493 | Bisbee | May 2004 | A1 |
20040253943 | Suzuki | Dec 2004 | A1 |
20050069136 | Thornton | Mar 2005 | A1 |
20050076199 | Thornton | Apr 2005 | A1 |
20050081037 | Kumagai | Apr 2005 | A1 |
20050144449 | Voice | Jun 2005 | A1 |
20050144450 | Voice | Jun 2005 | A1 |
20050144451 | Voice et al. | Jun 2005 | A1 |
20050149761 | Chiviendacz et al. | Jul 2005 | A1 |
20050154877 | Trench | Jul 2005 | A1 |
20050204164 | Kakii | Sep 2005 | A1 |
20060015725 | Voice et al. | Jan 2006 | A1 |
20060036849 | Brown | Feb 2006 | A1 |
20060047949 | Brown | Mar 2006 | A1 |
20060075221 | Moore | Apr 2006 | A1 |
20060156385 | Chiviendacz et al. | Jul 2006 | A1 |
20060165386 | Garoutte | Jul 2006 | A1 |
20060168447 | Pailles | Jul 2006 | A1 |
20060174323 | Brown | Aug 2006 | A1 |
20070005967 | Mister et al. | Jan 2007 | A1 |
20070022469 | Cooper | Jan 2007 | A1 |
20070113071 | Lindinger et al. | May 2007 | A1 |
20070118735 | Cherrington | May 2007 | A1 |
20070143596 | Myers | Jun 2007 | A1 |
20070208943 | Gupta | Sep 2007 | A1 |
20070244817 | Dolivo | Oct 2007 | A1 |
20080034440 | Holtzman | Feb 2008 | A1 |
20080222418 | Futa | Sep 2008 | A1 |
20090132813 | Schibuk | May 2009 | A1 |
20090235071 | Bellur et al. | Sep 2009 | A1 |
20100031028 | Adams | Feb 2010 | A1 |
20100058058 | Busari | Mar 2010 | A1 |
20100115268 | Kudo | May 2010 | A1 |
20100146614 | Savoor | Jun 2010 | A1 |
20100185845 | Takayama | Jul 2010 | A1 |
20100268942 | Hernandez-Ardieta | Oct 2010 | A1 |
20110004763 | Sato | Jan 2011 | A1 |
20110119379 | McCormack | May 2011 | A1 |
20110191581 | Shim | Aug 2011 | A1 |
20110213967 | Wnuk | Sep 2011 | A1 |
20110231662 | Sato | Sep 2011 | A1 |
20110296190 | Paeschke | Dec 2011 | A1 |
20120006899 | Voice et al. | Jan 2012 | A1 |
20120159156 | Barham | Jun 2012 | A1 |
20120166796 | Metke | Jun 2012 | A1 |
20130080780 | Mister et al. | Mar 2013 | A1 |
20130263211 | Neuman | Oct 2013 | A1 |
20130321846 | Hiroshige | Dec 2013 | A1 |
20140230040 | Crowther | Aug 2014 | A1 |
20140282869 | Dabbiere | Sep 2014 | A1 |
20140283054 | Janjua | Sep 2014 | A1 |
20140303837 | Tuukkanen | Oct 2014 | A1 |
20140359280 | Saboor | Dec 2014 | A1 |
20140359281 | Saboori | Dec 2014 | A1 |
Number | Date | Country |
---|---|---|
1762964 | Mar 2007 | EP |
03-232036 | Oct 1991 | JP |
09016440 | Jan 1997 | JP |
2002-108209 | Apr 2002 | JP |
2002-163395 | Jun 2002 | JP |
2003-152718 | May 2003 | JP |
2005-529547 | Sep 2005 | JP |
2007-88737 | Apr 2007 | JP |
2009-510567 | Mar 2009 | JP |
2009067498 | Apr 2009 | JP |
2010-108396 | May 2010 | JP |
4-149676 | Jan 2011 | JP |
2011-15110 | Jan 2011 | JP |
4624099 | Feb 2011 | JP |
2011-81703 | Apr 2011 | JP |
20010038208 | May 2001 | KR |
WO 2011049429 | Apr 2011 | WO |
Entry |
---|
Raya, “The Security of Vehicular Ad Hoc Networks”, SASN'05, Nov. 5, 2005, Alexandria, Virginia, pp. 11-21. |
White, “Privacy and Scalability Analysis of Vehicular Combinatorial Certificate Schemes”, IEEE, 2009, 5 pages. |
Lin, “Security iin Vehicular Ad Hoc Networks”, IEEE Communication Magazine, Seuciryt in Mobile Ad Hoc and Sensor Networks, Apr. 2008, pp. 88-95. |
Jabri, “Authorization within Grid-Computing Using Certificateless Identity-Based Proxy Signature”, HPDC'10, Jun. 20-25, 2010, pp. 292-295. |
IEEE Std 1609.2TM-2006: IEEE Trial-Use Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management Messages, 2006, IEEE Standards Association, DOI:10.1109/IEEESTD.2006.243731; URL http://ieeexplore.ieee.org/document/1653011/ (called up on the internet on Apr. 20, 2017). |
Number | Date | Country | |
---|---|---|---|
20170187706 A1 | Jun 2017 | US |