CN105635147A - Vehicle-mounted-special-equipment-system-based secure data transmission method and system - Google Patents
Vehicle-mounted-special-equipment-system-based secure data transmission method and system Download PDFInfo
- Publication number
- CN105635147A CN105635147A CN201511020141.0A CN201511020141A CN105635147A CN 105635147 A CN105635147 A CN 105635147A CN 201511020141 A CN201511020141 A CN 201511020141A CN 105635147 A CN105635147 A CN 105635147A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- key
- random number
- execution result
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 38
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012795 verification Methods 0.000 claims description 28
- 230000001960 triggered effect Effects 0.000 claims description 8
- 238000012545 processing Methods 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 239000000446 fuel Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 206010039203 Road traffic accident Diseases 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a vehicle-mounted-special-equipment-system-based secure data transmission method and system. The method comprises: ciphertext data are received, wherein a terminal carries out encryption processing on a character string including a random number, an operation instruction, and user information by a public key to obtain the ciphertext data and then the ciphertext data are sent to a vehicle; decryption processing is carried out on the ciphertext data by a private key to obtain plaintext data of the random number, the operation instruction, and the user information; whether the user information is legal is checked and a checking result is generated; if the user information is legal, the operation instruction is executed to obtain an execution result; the execution result is encrypted by using the random number as a preset encryption secrete key of a symmetric encryption algorithm and the execution result after the encryption processing is sent to the terminal by a wireless network, so that the terminal carries out decryption on the encrypted execution result by using the random number as a decryption secrete key of the symmetric encryption algorithm and thus an execution result of the plaintext is obtained. With the method and system, security of data transmission between a terminal and a vehicle is improved.
Description
Technical Field
The invention relates to the technical field of communication network security, in particular to a data security transmission method and system based on a vehicle-mounted special equipment system.
Background
With the continuous development of the automobile internet technology, the networking degree of automobiles and the capacity of internal and external data exchange will increase day by day in the future. The advanced vehicle-mounted networking technology brings convenient experience to users, and meanwhile, more and more safety problems can be brought. For example, a vehicle connected to the internet in a direct or indirect manner is easily exposed to code and data attacks by malicious software, and the vehicle is controlled to run, suddenly steps on a brake, automatically opens and closes a door without permission, and even causes traffic accidents. Secure transmission of on-board special equipment systems connected to the internet is therefore of particular importance.
At present, because the safety problem is not fully considered, the data is not safely encrypted but transmitted in a plaintext manner or simply encrypted for transmission. With the popularization of the super computer, the traditional simple encryption technology cannot ensure the safety of data transmission of the vehicle-mounted special equipment system on the internet.
Disclosure of Invention
In view of the above, it is necessary to provide a data security transmission method and system based on a vehicle-mounted special equipment system, which can improve data transmission security.
A data encryption transmission method based on a vehicle-mounted special equipment system is applied to a vehicle, and comprises the following steps:
receiving ciphertext data, wherein the ciphertext data is sent to a vehicle after a terminal encrypts a character string comprising a random number, an operation instruction and user information through a public key;
decrypting the ciphertext data through a private key to obtain the random number, the operation instruction and plaintext data of user information;
verifying whether the user information is legal and generating a verification result;
when the verification result is yes, executing the operation instruction to obtain an execution result;
and encrypting the execution result by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted execution result to the terminal through a wireless network, so that the terminal decrypts the encrypted execution result by taking the random number as a decryption key of the symmetric encryption algorithm to obtain an execution result of a plaintext.
In one embodiment, when the check result is no, the method further includes:
generating feedback information of failure of executing the operation instruction;
and encrypting the feedback information by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted feedback information to the terminal through a wireless network.
In one embodiment, the method further comprises:
generating a key pair, the key pair comprising a private key and a public key;
and storing the private key to a safe area, uploading the public key and a preset vehicle identifier to a server, and providing a downloading service of the public key and the vehicle identifier for the terminal by the server.
In one embodiment, the step of generating the key pair includes:
generating a plurality of prime numbers, and randomly selecting two unequal prime numbers from the plurality of prime numbers;
and generating a key pair comprising a public key and a private key by using the two prime numbers as key factors through a preset asymmetric encryption algorithm.
A data encryption transmission method based on a vehicle-mounted special equipment system is applied to a terminal, and the method comprises the following steps:
acquiring a public key and a vehicle identifier;
receiving an operation instruction triggered by a user on a vehicle corresponding to the vehicle identifier;
generating a random number, and encrypting a character string containing the random number, the operation instruction and preset user information through the public key to obtain ciphertext data;
sending the ciphertext data to a vehicle through a wireless network, enabling the vehicle to decrypt the ciphertext data through a private key to obtain plaintext data, checking whether user information is legal or not, and executing the operation instruction to obtain an execution result when the check result is yes;
receiving an execution result sent by the vehicle, wherein the execution result is obtained by encrypting the execution result by using the random number as an encryption key;
and decrypting the encrypted execution result by taking the random number as a decryption key of the symmetric encryption algorithm to obtain the plaintext execution result.
In one embodiment, the method further comprises:
receiving feedback information which is sent by a vehicle and fails to generate an execution operation instruction, wherein the vehicle uses a random number as an encryption key of a preset symmetric encryption algorithm to encrypt the feedback information;
and the random number is used as a decryption key of a symmetric encryption algorithm to decrypt the feedback information, so that the feedback information of the plaintext is obtained.
A data encryption transmission system based on a vehicle-mounted special equipment system comprises a vehicle and a terminal; the terminal is used for downloading the public key and the vehicle identifier from the server; receiving an operation instruction triggered by a user on a vehicle corresponding to the vehicle identifier; generating a random number; encrypting a character string containing the random number, the operation instruction and preset user information through the public key to obtain ciphertext data; transmitting the ciphertext data to a vehicle through a wireless network; receiving an execution result sent by the vehicle; the random number is used as a decryption key to decrypt the encrypted execution result to obtain the plaintext execution result; and receiving encrypted feedback information sent by the vehicle, and decrypting the feedback information by using the random number as a decryption key of a preset symmetric encryption algorithm to obtain plaintext feedback information.
The vehicle is used for receiving ciphertext data sent by the terminal; decrypting the ciphertext data through a private key to obtain the random number, the operation instruction and plaintext data of user information; verifying whether the user information is legal and generating a verification result; when the verification result is yes, executing the operation instruction to obtain an execution result; encrypting the execution result by taking the random number as a key of a symmetric encryption algorithm, and sending the encrypted execution result to the terminal through a wireless network; when the checking result is negative, generating feedback information of failure of executing the operation instruction; and encrypting the feedback information by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted feedback information to the terminal through a wireless network.
A vehicle-mounted special equipment system comprises a vehicle-mounted computer, a wireless transceiver, an encryption and decryption device and a checker; the wireless transceiver is connected with the encryptor and the decryptor, the encryptor and the calibrator, and the vehicle-mounted computer is respectively connected with the encryptor and the decryptor and the calibrator;
the encryption and decryption device is used for storing the vehicle identification, generating a key pair comprising a public key and a private key, storing the private key, and decrypting ciphertext data sent by the terminal through the private key to obtain a random number of a plaintext, an operation instruction and user information; taking the random number as a key of a symmetric encryption algorithm to encrypt an execution result and feedback information;
the wireless transceiver is used for receiving ciphertext data which is sent by the terminal and obtained by encrypting the random number, the operation instruction and the user information through a public key, and sending an execution result obtained by encrypting the execution result by the encryptor and the decryptor to the terminal;
the checker is used for acquiring the user information transmitted by the encryptor and the decryptor; verifying whether the user information is legal or not, generating a verification result and transmitting the verification result to the vehicle-mounted special equipment system;
and the vehicle-mounted computer is used for executing the operation instruction when the verification result is yes, sending the execution result to the encryption and decryption device for encryption, and generating feedback information of failure of the execution instruction and sending the feedback information to the encryption and decryption device when the verification result is not.
In one embodiment, the encryption and decryption device is further configured to send the public key and the vehicle identification to the wireless transceiver; the wireless transceiver is further used for uploading the public key and the vehicle identifier to a server, and the server provides downloading service of the public key and the vehicle identifier for the terminal.
A vehicle is equipped with a special equipment on-board system.
According to the data encryption transmission method and system based on the vehicle-mounted special equipment system, the data transmitted to the vehicle by the terminal are encrypted and decrypted by adopting the secret key pair of the private key and the public key, the data transmitted to the terminal by the vehicle are encrypted and decrypted by taking the random number as the encryption and decryption secret key factor of the symmetric encryption algorithm, the encryption and decryption adopt different secret keys, so that the decryption difficulty of the password is increased, and the safety of data transmission between the terminal and the vehicle is improved.
Drawings
FIG. 1 is a schematic flow chart of a data encryption transmission method based on a vehicle-mounted special equipment system in one embodiment;
FIG. 2 is a schematic flow chart of a data encryption transmission method based on an on-vehicle special equipment system in another embodiment;
FIG. 3 is a schematic flow chart of a data encryption transmission method based on an on-vehicle special equipment system in one embodiment;
FIG. 4 is a diagram of an application scenario of a data encryption transmission system based on an on-vehicle special equipment system in one embodiment;
FIG. 5 is a schematic structural diagram of an on-board special equipment system in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In one embodiment, referring to fig. 1, a data encryption transmission method based on an on-vehicle special equipment system is applied to a vehicle, and the method comprises the following steps:
step 101, receiving ciphertext data.
In this embodiment, the ciphertext data is sent to the vehicle after the terminal encrypts the character string including the random number, the operation instruction, and the user information through the public key. The terminal includes, but is not limited to, a remote controller, a smart phone, a tablet computer, a notebook computer, a desktop computer, and the like.
And 103, decrypting the ciphertext data through the private key to obtain the random number, the operation instruction and plaintext data of the user information.
In this embodiment, after the wireless transceiver of the vehicle receives the ciphertext data, the ciphertext data is further transmitted to the encryption/decryption device, and the ciphertext data is decrypted by the private key stored in the encryption/decryption device. The private key is stored in a secure storage area of the encryptor or decryptor. For example, the secure storage area is an soc (systemonacachip) on-chip otp (onetimeprogramable) area. And decrypting the ciphertext data by using the private key to obtain plaintext data. Specifically, the private key is an RSA private key. The RSA private key decryption formula is as follows: where c is ciphertext data, (N, d) is an RSA private key, N is calculated, and N is decrypted plaintext data. The encryption and decryption device comprises an RSA encryption and decryption arithmetic device.
And 105, verifying whether the user information is legal and generating a verification result.
In this embodiment, the user information is used as an identification of the vehicle user. Specifically, the user information includes, but is not limited to, a user identity ID or a terminal ID. For example, when the terminal is a mobile phone, the user information may be a mobile phone number or an identification number. In order to prevent a malicious user from manipulating the vehicle, it is necessary to verify whether the user is a legitimate user before executing the operation instruction. In one embodiment, the user information is pre-consolidated to a secure storage area in the vehicle's validator to await subsequent validation use. And checking whether the user information is legal or not, namely comparing the user information stored in the checker with the user information sent by the terminal, and indicating that the user information is legal when the user information and the user information are completely the same, otherwise, the user information is illegal.
And step 107, when the verification result is yes, executing the operation instruction to obtain an execution result.
In this embodiment, when the verification result is yes, it indicates that the user giving the operation instruction to the vehicle is legal, and further, the operation instruction is executed through a vehicle-mounted special equipment system in the vehicle, and an execution result is obtained. For example, if the operation command is a turn-off command of the air conditioner of the vehicle, the execution result is information on whether the air conditioner is successfully turned off. And transmitting the execution result to the encryption and decryption device in the form of character strings, and carrying out encryption processing on the execution result by the encryption and decryption device.
And step 109, encrypting the execution result by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted execution result to the terminal through the wireless network.
In this embodiment, the terminal decrypts the encrypted execution result by using the random number as the decryption key of the symmetric encryption algorithm, so as to obtain the execution result of the plaintext. Generally, data fed back to the terminal by the vehicle cannot affect the security of the terminal, so a symmetric encryption algorithm is adopted for encryption and decryption, as the encryption key and the decryption key are the same, the encryption and decryption speed is high, the random number generated by the terminal is used as the encryption and decryption key, the keys of the data transmitted each time are different, and the data transmission efficiency is improved while the security of the data is not affected. Preferably, the symmetric encryption algorithm is an AES algorithm, and the encryption and decryption device includes an AES encryption and decryption arithmetic device.
According to the data encryption transmission method based on the vehicle-mounted special equipment system, the data transmitted to the vehicle by the terminal are encrypted and decrypted by adopting the secret key pair of the private key and the public key, and the data transmitted to the terminal by the vehicle are encrypted and decrypted by taking the random number as the encryption and decryption secret key factor of the symmetric encryption algorithm.
In one embodiment, referring to fig. 2, the data encryption transmission method based on the vehicle-mounted special equipment system further includes:
and 106, when the checking result is negative, generating feedback information of failure in executing the operation instruction.
And step 108, encrypting the feedback information by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted feedback information to the terminal through the wireless network.
In this embodiment, the result of the check is no, which indicates that the vehicle will not execute the operation command. The situation may be that an illegal user wants to operate the vehicle, a hacker falsifies data sent by the terminal to the vehicle, or data is lost during encryption or transmission. At the moment, the vehicle-mounted special equipment system of the vehicle can not execute the operation instruction, and directly discards the data sent by the terminal.
In one embodiment, the vehicle-mounted special equipment system of the vehicle can further analyze the reason causing the verification failure, obtain an error code corresponding to the reason causing the verification failure, and feed back a character string of the error code to the terminal, so that a user of the terminal can clearly know the reason causing the failure in executing the operation instruction.
In one embodiment, the data encryption transmission method based on the vehicle-mounted special equipment system further comprises the following steps: generating a key pair, wherein the key pair comprises a private key and a public key; and storing the private key to a safe area, and uploading the public key and a preset vehicle identifier to a server. The server provides download service of the public key and the vehicle identification for the terminal. The public key is required to be provided for the terminal, the vehicle can directly send the public key to the terminal through a wireless network, the public key can also be uploaded to a server, and the server provides downloading service for the terminal.
In this embodiment, the private key of the key pair is stored in a secure area of the vehicle for decrypting data, and the public key is stored in the terminal for encrypting transmitted data. Because the encryption and decryption of the data adopt different keys, the encrypted data is not easy to crack. Specifically, the format of the public key stored on the server is x.509 format.
In one embodiment, the step of generating the key pair comprises: generating a plurality of prime numbers, and randomly selecting two unequal prime numbers from the plurality of prime numbers; and taking the two prime numbers as key factors, and generating a key pair comprising a public key and a private key through a preset asymmetric encryption algorithm.
Specifically, random numbers are generated through a module encryption operation controller and a random number generator in an encryption and decryption device of the vehicle, two random numbers p and q are selected from the random numbers, whether p and q are prime numbers or not and are mutually prime is judged, and if yes, p and q are used as key factors of a key pair. If not, continuing to generate the random number p and the random number q until the condition is met. The vehicle encryptor and decryptor generally adopt a hardware control accelerator based on an SoC chip, such as a modular encryption arithmetic unit, an AES encryption arithmetic unit, an RSA encryption arithmetic unit, and the like.
In one embodiment, the asymmetric cryptographic algorithm is an RSA algorithm, and generating the key pair by the RSA algorithm comprises the steps of: a vehicle encryption and decryption device randomly generates prime numbers, two large prime numbers p and q are selected from the prime numbers, p is not equal to q, the p and the q serve as key factors, and N is equal to pq. Further, according to the Euler function, r is obtained as (p-1) (q-1); and selecting an integer e smaller than r, and solving a modulo inverse element of e relative to the modulo r, namely d. (the modulo element is present if and only if e is coprime to r); destroying the records of p and q; (N, e) is a public key and (N, d) is a private key. In order to make the speed of the cipher key ciphertext data not too slow and make the encrypted data not easy to crack, a proper byte length needs to be selected for the cipher key. Preferably, the byte length of the key pair is 2048 bits or more, and e is 3 or 65537.
As shown in fig. 3, in an embodiment, a data encryption transmission method based on a vehicle-mounted special equipment system is provided, and is applied to a terminal, and the method includes the following steps:
step 301, a public key and a vehicle identifier are obtained.
In this embodiment, the vehicle identifier is used as a unique identity label for the vehicle. Specifically, the vehicle identification includes but is not limited to: the number of the engine of the vehicle, the number plate number of the vehicle, the MAC address of the WIFI of the vehicle and the like. The vehicle identification is stored in the vehicle's encryptor in advance, and the public key of the asymmetric key pair generated by the vehicle encryptor is stored in the terminal. And after the vehicle is connected to the Internet, uploading the public key and the vehicle identifier to a server. The user accesses the internet through the terminal, and downloads the public key and the vehicle identification to the local after obtaining the authorization of the server. Since it is important that the private key for decryption is secured, the private key is stored in a secure storage area in the encryptor.
Step 302, receiving an operation instruction triggered by a user to a vehicle corresponding to the vehicle identifier.
In this embodiment, an application for performing data interaction with a vehicle is run in the terminal, a user inputs login information (a user name and a login password) on a login interface of the application, and an operation instruction for the vehicle can be triggered on an operation interface of the software after the login information is verified. The operation instruction may be specifically triggered by a button or touch. The operation command herein does not particularly refer to a command for operating the vehicle, and includes a command for acquiring vehicle state data. For example, mileage data or fuel consumption data of the vehicle.
Step 303, generating a random number, and encrypting a character string including the random number, an operation instruction and preset user information through a public key to obtain ciphertext data.
In this embodiment, before the terminal sends the operation command to the vehicle, the operation command needs to be encrypted to ensure the security of data transmission. And encrypting the character string consisting of the random number, the operation instruction and the user information by using the public key. Specifically, the encryption is carried out through the RSA public key, as the RSA belongs to an asymmetric key algorithm, namely, the encryption and the decryption are different keys, after the RSA public key is encrypted, only the unique private key can be used for decryption, and the private key is stored in the vehicle safety storage area, so that the safety of the private key can be ensured, and the encrypted data is not easy to crack by an illegal user.
And step 304, transmitting the ciphertext data to the vehicle through the wireless network.
In this embodiment, the terminal sends the ciphertext data to the vehicle through the wireless transmission module. Specifically, the wireless transmission module includes but is not limited to: and wireless transmission modules such as GSM, GPRS, 3G, 4G and WIFI. And the vehicle decrypts the ciphertext data through the private key to obtain plaintext data, verifies whether the user information is legal or not, and executes the operation instruction to obtain an execution result when the verification result is yes.
And 305, receiving an execution result sent by the vehicle, wherein the execution result is obtained by the vehicle encrypting the execution result by using the random number as an encryption key through a preset symmetric encryption algorithm.
And step 306, decrypting the encrypted execution result by taking the random number as a decryption key of the symmetric encryption algorithm to obtain an execution result of a plaintext.
In this embodiment, since the encryption key used by the vehicle to encrypt the execution result is the random number sent by the terminal, the terminal only needs to decrypt the encrypted execution result by using the random number as the decryption key of the symmetric encryption algorithm, and the execution result in the clear text can be obtained. Specifically, the symmetric encryption algorithm is an AES algorithm, and since AES is an advanced symmetric encryption and decryption algorithm and the same key is used for encryption and decryption, the encryption and decryption speed is high. And random numbers are used as encryption and decryption keys, so that the encryption and decryption keys in each time are different, and the cracking difficulty is increased, so that the data transmission is safer. And the terminal obtains the execution result of the plaintext and then displays the execution result through the terminal.
The command sent by the terminal to the automobile influences the driving safety, so that the public key is used for encrypting at the terminal before data is sent, the encrypted ciphertext data is decrypted by the private key in the automobile, and the data returned by the automobile to the terminal has little influence on the safety of the terminal, so that the symmetric encryption key is used for encrypting and decrypting. The asymmetric key pair has long time for encryption and decryption operation but good safety, vehicles return to the terminal with more data, the time for encryption and decryption operation by adopting the symmetric key is short, and the one-time key safety can be ensured. The data interaction safety between the terminal and the vehicle is improved, and the data transmission efficiency is also ensured.
In one embodiment, the data encryption transmission method based on the vehicle-mounted special equipment system is applied to a terminal and further comprises the following steps: and receiving feedback information which is sent by the vehicle and fails to generate the operation instruction. The vehicle encrypts the feedback information by taking the random number as an encryption key of a preset symmetric encryption algorithm; and the random number is used as a decryption key of the symmetric encryption algorithm to decrypt the feedback information to obtain the feedback information of the plaintext.
Specifically, the feedback information is a character string used for prompting that the terminal vehicle can receive the data but the operation instruction cannot be normally executed. In one embodiment, the feedback information further includes information of a reason for the execution failure, so that the user of the terminal can make adjustments in time. The terminal displays the feedback information obtained from the plaintext in a window form.
In one embodiment, as shown in fig. 4, a data encryption transmission system based on an on-board special equipment system is provided, which includes a vehicle 10 and a terminal 20. Wherein,
the terminal 20 is used for downloading the public key and the vehicle identification from the server 30; receiving an operation instruction triggered by a user to a vehicle corresponding to the vehicle identifier; generating a random number; encrypting a character string containing a random number, an operation instruction and preset user information through a public key to obtain ciphertext data; transmitting the ciphertext data to the vehicle 10 over the wireless network; receiving an execution result transmitted by the vehicle 10; the random number is used as a decryption key to decrypt the encrypted execution result to obtain the plaintext execution result; and receiving the encrypted feedback information sent by the vehicle 10, and decrypting the feedback information by using the random number as a decryption key of a preset symmetric encryption algorithm to obtain the plaintext feedback information.
The vehicle 10 is used for receiving the ciphertext data sent by the terminal 20; decrypting the ciphertext data through a private key to obtain a random number, an operation instruction and plaintext data of user information; verifying whether the user information is legal and generating a verification result; when the verification result is yes, executing the operation instruction to obtain an execution result; encrypting the execution result by using the random number as a key of a symmetric encryption algorithm, and transmitting the encrypted execution result to the terminal 20 through a wireless network; when the checking result is negative, generating feedback information of failure of executing the operation instruction; the random number is used as an encryption key of a preset symmetric encryption algorithm to encrypt the feedback information, and the encrypted feedback information is sent to the terminal 20 through the wireless network.
In this embodiment, the terminal, the vehicle, and the server establish connection via the internet. The terminal can download the vehicle identification and the public key after obtaining the authorization of the server. The terminal downloading the public key and the vehicle can encrypt and decrypt safe transmission data through data. The operation instruction sent by the terminal to the vehicle includes but is not limited to: the user manipulates a command of the vehicle, for example, a command to close a door of the vehicle. It may also be an instruction to acquire vehicle state data, for example, an instruction to acquire vehicle fuel consumption data. The data for the vehicle to execute the operation command and return to the terminal includes but is not limited to: the vehicle monitoring system comprises oil consumption data, mileage data, door or window opening state data, video monitoring data, photographing data and the like of the vehicle. As shown in fig. 5, in one embodiment, an on-board special equipment system is provided, the on-board special equipment system 50 comprising: an on-board computer 501, a wireless transceiver 502, an encryption and decryption device 503 and a checker 504; the wireless transceiver 502 is connected with the encryptor/decryptor 503, the encryptor/decryptor 503 is connected with the verifier 504, and the on-board computer 501 is respectively connected with the encryptor/decryptor 503 and the verifier 504.
The encryptor/decryptor 503 is configured to store the vehicle identifier, generate a key pair including a public key and a private key, store the private key, decrypt ciphertext data sent by the terminal through the private key, and obtain a random number of a plaintext, an operation instruction, and user information; and encrypting the execution result and the feedback information by taking the random number as a key of a symmetric encryption algorithm.
The wireless transceiver 502 is configured to receive ciphertext data sent by the terminal and obtained by encrypting the random number, the operation instruction, and the user information with the public key, and send an execution result obtained by encrypting the execution result with the encryptor and the decryptor to the terminal. Specifically, the wireless transceiver includes at least one wireless transceiver in GSM, GPRS, 3G, 4G, LTE, WIFI and bluetooth.
A checker 504 for acquiring the user information transmitted by the encryptor and the decryptor; and checking whether the user information is legal or not, generating a checking result and transmitting the checking result to the vehicle-mounted special equipment system.
The verifier acquires the user information (terminal ID and/or user ID) stored in advance from the secure storage area of the encryptor and compares it with the user information in the plaintext data. And if the operation instruction is consistent with the operation instruction, the verification is passed, and an execution result obtained after the vehicle-mounted special equipment system executes the operation instruction is output. For example, the execution result includes information that the execution operation is successful or acquisition of state data of the vehicle. If the operation instruction is inconsistent with the operation instruction, the verification fails, and feedback information of failure in executing the operation instruction is output.
And the vehicle-mounted computer 501 is used for executing the operation instruction and sending the execution result to the encryption and decryption device for encryption processing when the verification result is yes, and generating feedback information of failure of the execution instruction and sending the feedback information to the encryption and decryption device when the verification result is no.
In this embodiment, the vehicle-mounted special equipment system includes functional components such as an ECU (electronic control unit), a CAN bus (controller area network), and an OBD (On-board diagnostic). Wherein the vehicle-mounted computer is used for executing the operation instruction.
In one embodiment, a vehicle is provided with the on-board special equipment system. The vehicle is a normal household automobile and other types of vehicles. Such as military vehicles, police vehicles, special vehicles, and the like. The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only show some embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A data encryption transmission method based on a vehicle-mounted special equipment system is applied to a vehicle, and is characterized by comprising the following steps:
receiving ciphertext data, wherein the ciphertext data is sent to a vehicle after a terminal encrypts a character string comprising a random number, an operation instruction and user information through a public key;
decrypting the ciphertext data through a private key to obtain the random number, the operation instruction and plaintext data of user information;
verifying whether the user information is legal and generating a verification result;
when the verification result is yes, executing the operation instruction to obtain an execution result;
and encrypting the execution result by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted execution result to the terminal through a wireless network, so that the terminal decrypts the encrypted execution result by taking the random number as a decryption key of the symmetric encryption algorithm to obtain an execution result of a plaintext.
2. The method of claim 1, wherein when the check result is negative, the method further comprises:
generating feedback information of failure of executing the operation instruction;
and encrypting the feedback information by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted feedback information to the terminal through a wireless network.
3. The method of claim 1, further comprising:
generating a key pair, the key pair comprising a private key and a public key;
and storing the private key to a safe area, uploading the public key and a preset vehicle identifier to a server, and providing a downloading service of the public key and the vehicle identifier for the terminal by the server.
4. The method of claim 3, wherein the step of generating the key pair comprises:
generating a plurality of prime numbers, and randomly selecting two unequal prime numbers from the plurality of prime numbers;
and generating a key pair comprising a public key and a private key by using the two prime numbers as key factors through a preset asymmetric encryption algorithm.
5. A data encryption transmission method based on a vehicle-mounted special equipment system is applied to a terminal, and is characterized by comprising the following steps:
acquiring a public key and a vehicle identifier;
receiving an operation instruction triggered by a user on a vehicle corresponding to the vehicle identifier;
generating a random number, and encrypting a character string containing the random number, the operation instruction and preset user information through the public key to obtain ciphertext data;
sending the ciphertext data to a vehicle through a wireless network, enabling the vehicle to decrypt the ciphertext data through a private key to obtain plaintext data, checking whether user information is legal or not, and executing the operation instruction to obtain an execution result when the check result is yes;
receiving an execution result sent by the vehicle, wherein the execution result is obtained by encrypting the execution result by using the random number as an encryption key;
and decrypting the encrypted execution result by taking the random number as a decryption key of the symmetric encryption algorithm to obtain the plaintext execution result.
6. The method of claim 5, further comprising:
receiving feedback information which is sent by a vehicle and fails to generate an execution operation instruction, wherein the vehicle uses a random number as an encryption key of a preset symmetric encryption algorithm to encrypt the feedback information;
and the random number is used as a decryption key of a symmetric encryption algorithm to decrypt the feedback information, so that the feedback information of the plaintext is obtained.
7. A data encryption transmission system based on a vehicle-mounted special equipment system is characterized by comprising a vehicle and a terminal; the terminal is used for downloading a public key and a vehicle identifier from a server; receiving an operation instruction triggered by a user on a vehicle corresponding to the vehicle identifier; generating a random number; encrypting a character string containing the random number, the operation instruction and preset user information through the public key to obtain ciphertext data; transmitting the ciphertext data to a vehicle through a wireless network; receiving an execution result sent by the vehicle; the random number is used as a decryption key to decrypt the encrypted execution result to obtain the plaintext execution result; and receiving encrypted feedback information sent by the vehicle, and decrypting the feedback information by using the random number as a decryption key of a preset symmetric encryption algorithm to obtain plaintext feedback information.
The vehicle is used for receiving ciphertext data sent by the terminal; decrypting the ciphertext data through a private key to obtain the random number, the operation instruction and plaintext data of user information; verifying whether the user information is legal and generating a verification result; when the verification result is yes, executing the operation instruction to obtain an execution result; encrypting the execution result by taking the random number as a key of a symmetric encryption algorithm, and sending the encrypted execution result to the terminal through a wireless network; when the checking result is negative, generating feedback information of failure of executing the operation instruction; and encrypting the feedback information by taking the random number as an encryption key of a preset symmetric encryption algorithm, and sending the encrypted feedback information to the terminal through a wireless network.
8. A vehicle-mounted special equipment system is characterized by comprising a vehicle-mounted computer, a wireless transceiver, an encryption and decryption device and a checker; the vehicle-mounted computer is respectively connected with the encryption and decryption device and the checker;
the encryption and decryption device is used for storing the vehicle identification, generating a key pair comprising a public key and a private key, storing the private key, and decrypting ciphertext data sent by the terminal through the private key to obtain a random number of a plaintext, an operation instruction and user information; taking the random number as a key of a symmetric encryption algorithm to encrypt an execution result and feedback information;
the wireless transceiver is used for receiving ciphertext data which is sent by the terminal and obtained by encrypting the random number, the operation instruction and the user information through a public key, and sending an execution result obtained by encrypting the execution result by the encryptor and the decryptor to the terminal;
the checker is used for acquiring the user information transmitted by the encryptor and the decryptor; verifying whether the user information is legal or not, generating a verification result and transmitting the verification result to the vehicle-mounted special equipment system;
and the vehicle-mounted computer is used for executing the operation instruction when the verification result is yes, sending the execution result to the encryption and decryption device for encryption, and generating feedback information of failure of the execution instruction and sending the feedback information to the encryption and decryption device when the verification result is not.
9. The vehicle of claim 8, wherein the encrypter and decrypter are further configured to send a public key and a vehicle identification to the wireless transceiver; the wireless transceiver is further used for uploading the public key and the vehicle identifier to a server, and the server provides downloading service of the public key and the vehicle identifier for the terminal.
10. A vehicle, characterized in that it is equipped with a specially equipped on-board system according to any one of claims 8 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511020141.0A CN105635147A (en) | 2015-12-30 | 2015-12-30 | Vehicle-mounted-special-equipment-system-based secure data transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511020141.0A CN105635147A (en) | 2015-12-30 | 2015-12-30 | Vehicle-mounted-special-equipment-system-based secure data transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105635147A true CN105635147A (en) | 2016-06-01 |
Family
ID=56049637
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511020141.0A Pending CN105635147A (en) | 2015-12-30 | 2015-12-30 | Vehicle-mounted-special-equipment-system-based secure data transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105635147A (en) |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487783A (en) * | 2016-09-28 | 2017-03-08 | 深圳市速美特电子科技有限公司 | The encryption method connecting for vehicle communication and device |
CN106850602A (en) * | 2017-01-20 | 2017-06-13 | 宇龙计算机通信科技(深圳)有限公司 | A kind of vehicle communication method, terminal, server and system |
CN107104791A (en) * | 2017-03-29 | 2017-08-29 | 江苏大学 | A kind of in-vehicle network one-time pad communication means hidden based on ECU identity |
CN108366115A (en) * | 2018-02-08 | 2018-08-03 | 深圳市轱辘车联数据技术有限公司 | A kind of vehicle OBD connectors management method, system and relevant apparatus |
CN108377235A (en) * | 2017-02-01 | 2018-08-07 | 松下航空电子公司 | For the communicant method and system of passenger on transport vehicle |
CN108632356A (en) * | 2018-03-30 | 2018-10-09 | 深圳市元征科技股份有限公司 | Control method for vehicle and system, car-mounted terminal based on car networking and server |
CN108628611A (en) * | 2018-04-20 | 2018-10-09 | 无锡盈达聚力科技有限公司 | A kind of data calling method and data call device |
CN109327466A (en) * | 2018-11-16 | 2019-02-12 | 广州创想云科技有限公司 | Data encryption and transmission method, electronic equipment, storage medium |
CN109472891A (en) * | 2017-09-07 | 2019-03-15 | 恩智浦有限公司 | Transceiver system |
CN109636948A (en) * | 2019-01-31 | 2019-04-16 | 上海易点时空网络有限公司 | Data processing method and device based on onboard system |
CN109714361A (en) * | 2019-01-31 | 2019-05-03 | 上海易点时空网络有限公司 | Data verification method and device |
CN109727333A (en) * | 2019-01-31 | 2019-05-07 | 上海易点时空网络有限公司 | The data processing method and device attended to anything else based on address |
CN109765880A (en) * | 2019-01-16 | 2019-05-17 | 江苏徐工信息技术股份有限公司 | The anti-dismounting method and system of T-BOX based on MD5 dynamic encryption algorithm |
CN109785490A (en) * | 2019-01-29 | 2019-05-21 | 上海博泰悦臻网络技术服务有限公司 | Bi-directional verification method and system, intelligent terminal and the T-BOX of bluetooth key |
CN110312232A (en) * | 2018-03-27 | 2019-10-08 | 丰田自动车株式会社 | Vehicular communication system and vehicle communication method |
CN110457171A (en) * | 2019-08-08 | 2019-11-15 | 浙江大华技术股份有限公司 | A kind of embedded apparatus debugging method and system |
CN110909318A (en) * | 2019-11-22 | 2020-03-24 | 展讯通信(上海)有限公司 | Operating system anti-theft method and device for user equipment and terminal |
CN110979256A (en) * | 2019-12-11 | 2020-04-10 | 英华达(上海)科技有限公司 | Electric carrier and anti-theft method thereof |
CN111222958A (en) * | 2020-01-10 | 2020-06-02 | 临沂大学 | Mechanical equipment power control method, system, medium and electronic equipment |
CN111263328A (en) * | 2020-01-17 | 2020-06-09 | 南京英锐创电子科技有限公司 | Vehicle information acquisition method and vehicle-mounted device |
CN111382401A (en) * | 2018-12-27 | 2020-07-07 | 创发信息科技(苏州)有限公司 | Method for realizing embedded system login dynamic password |
CN111490876A (en) * | 2020-04-03 | 2020-08-04 | 北京达龙上东文化艺术传播有限责任公司 | Communication method based on USB KEY and USB KEY |
CN112026783A (en) * | 2019-06-04 | 2020-12-04 | 上海擎感智能科技有限公司 | Vehicle control method, front end, rear end, device, and computer-readable storage medium |
CN112073193A (en) * | 2020-09-07 | 2020-12-11 | 江苏徐工工程机械研究院有限公司 | Information safety processing method, device and system and engineering vehicle |
CN112202549A (en) * | 2020-09-02 | 2021-01-08 | 深圳市车电网络有限公司 | Charging management method, charging terminal data processing method and charging management platform data processing method |
CN112468294A (en) * | 2020-11-23 | 2021-03-09 | 北京经纬恒润科技股份有限公司 | Access method and authentication equipment for vehicle-mounted TBOX |
CN112541187A (en) * | 2020-12-21 | 2021-03-23 | 深圳市元征科技股份有限公司 | Cloud computing method and cloud computing cluster |
CN112804061A (en) * | 2021-01-04 | 2021-05-14 | 武汉虹信科技发展有限责任公司 | Data transmission method and system of electrically-adjusted antenna controller |
CN113112243A (en) * | 2021-04-28 | 2021-07-13 | 南京交通职业技术学院 | Automobile identity recognition device and data processing and communication method |
CN113132395A (en) * | 2021-04-22 | 2021-07-16 | 支付宝(杭州)信息技术有限公司 | Remote equipment control method and system |
CN113572795A (en) * | 2020-04-28 | 2021-10-29 | 广州汽车集团股份有限公司 | Vehicle safety communication method and system and vehicle-mounted terminal |
CN113783687A (en) * | 2021-09-07 | 2021-12-10 | 浙江吉利控股集团有限公司 | Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile |
CN113821805A (en) * | 2020-06-19 | 2021-12-21 | 北京达佳互联信息技术有限公司 | Data encryption method and device |
CN113830024A (en) * | 2021-09-22 | 2021-12-24 | 中国第一汽车股份有限公司 | Anti-theft control method and device for engine |
CN114666764A (en) * | 2022-03-03 | 2022-06-24 | 北京全路通信信号研究设计院集团有限公司 | Reliable method and system for wirelessly transmitting orbit data |
CN115037463A (en) * | 2022-05-31 | 2022-09-09 | 锦图计算技术(深圳)有限公司 | Middleware device and method of intelligent cabin based on android system |
CN115527292A (en) * | 2022-11-25 | 2022-12-27 | 广州万协通信息技术有限公司 | Mobile phone terminal remote vehicle unlocking method of security chip and security chip device |
CN117118613A (en) * | 2023-10-18 | 2023-11-24 | 湖北芯擎科技有限公司 | Whole vehicle instrument data security protection method, equipment and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138186A1 (en) * | 1999-12-02 | 2005-06-23 | Lambertus Hesselink | Managed peer-to-peer applications, systems and methods for distributed data access and storage |
CN103507730A (en) * | 2013-09-30 | 2014-01-15 | 奇瑞汽车股份有限公司 | Automobile control device, system and method and mobile terminal |
CN103685255A (en) * | 2013-12-06 | 2014-03-26 | 上海众人网络安全技术有限公司 | File encryption method based on two-dimension code scanning |
CN103944913A (en) * | 2014-04-28 | 2014-07-23 | 浪潮电子信息产业股份有限公司 | Server-oriented safe firmware designing method |
CN104424779A (en) * | 2013-08-30 | 2015-03-18 | 比亚迪股份有限公司 | System and method for controlling vehicle by virtue of mobile terminal |
CN104601331A (en) * | 2014-12-26 | 2015-05-06 | 深圳市科陆电子科技股份有限公司 | System and method for monitoring and controlling charging pile |
-
2015
- 2015-12-30 CN CN201511020141.0A patent/CN105635147A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138186A1 (en) * | 1999-12-02 | 2005-06-23 | Lambertus Hesselink | Managed peer-to-peer applications, systems and methods for distributed data access and storage |
CN104424779A (en) * | 2013-08-30 | 2015-03-18 | 比亚迪股份有限公司 | System and method for controlling vehicle by virtue of mobile terminal |
CN103507730A (en) * | 2013-09-30 | 2014-01-15 | 奇瑞汽车股份有限公司 | Automobile control device, system and method and mobile terminal |
CN103685255A (en) * | 2013-12-06 | 2014-03-26 | 上海众人网络安全技术有限公司 | File encryption method based on two-dimension code scanning |
CN103944913A (en) * | 2014-04-28 | 2014-07-23 | 浪潮电子信息产业股份有限公司 | Server-oriented safe firmware designing method |
CN104601331A (en) * | 2014-12-26 | 2015-05-06 | 深圳市科陆电子科技股份有限公司 | System and method for monitoring and controlling charging pile |
Cited By (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487783A (en) * | 2016-09-28 | 2017-03-08 | 深圳市速美特电子科技有限公司 | The encryption method connecting for vehicle communication and device |
CN106850602A (en) * | 2017-01-20 | 2017-06-13 | 宇龙计算机通信科技(深圳)有限公司 | A kind of vehicle communication method, terminal, server and system |
CN106850602B (en) * | 2017-01-20 | 2020-08-14 | 宇龙计算机通信科技(深圳)有限公司 | Vehicle communication method, terminal, server and system |
CN108377235A (en) * | 2017-02-01 | 2018-08-07 | 松下航空电子公司 | For the communicant method and system of passenger on transport vehicle |
CN107104791A (en) * | 2017-03-29 | 2017-08-29 | 江苏大学 | A kind of in-vehicle network one-time pad communication means hidden based on ECU identity |
CN107104791B (en) * | 2017-03-29 | 2019-06-28 | 江苏大学 | A kind of in-vehicle network one-time pad communication means hidden based on ECU identity |
CN109472891A (en) * | 2017-09-07 | 2019-03-15 | 恩智浦有限公司 | Transceiver system |
US11533612B2 (en) | 2017-09-07 | 2022-12-20 | Nxp B.V. | Transceiver system |
CN108366115A (en) * | 2018-02-08 | 2018-08-03 | 深圳市轱辘车联数据技术有限公司 | A kind of vehicle OBD connectors management method, system and relevant apparatus |
CN110312232B (en) * | 2018-03-27 | 2022-06-24 | 丰田自动车株式会社 | Vehicle communication system and vehicle communication method |
CN110312232A (en) * | 2018-03-27 | 2019-10-08 | 丰田自动车株式会社 | Vehicular communication system and vehicle communication method |
CN108632356B (en) * | 2018-03-30 | 2021-06-15 | 深圳市元征科技股份有限公司 | Vehicle control method and system based on Internet of vehicles, vehicle-mounted terminal and server |
CN108632356A (en) * | 2018-03-30 | 2018-10-09 | 深圳市元征科技股份有限公司 | Control method for vehicle and system, car-mounted terminal based on car networking and server |
CN108628611A (en) * | 2018-04-20 | 2018-10-09 | 无锡盈达聚力科技有限公司 | A kind of data calling method and data call device |
CN108628611B (en) * | 2018-04-20 | 2022-02-01 | 无锡盈达聚力科技有限公司 | Data calling method and data calling device |
CN109327466A (en) * | 2018-11-16 | 2019-02-12 | 广州创想云科技有限公司 | Data encryption and transmission method, electronic equipment, storage medium |
CN111382401A (en) * | 2018-12-27 | 2020-07-07 | 创发信息科技(苏州)有限公司 | Method for realizing embedded system login dynamic password |
CN109765880A (en) * | 2019-01-16 | 2019-05-17 | 江苏徐工信息技术股份有限公司 | The anti-dismounting method and system of T-BOX based on MD5 dynamic encryption algorithm |
CN109765880B (en) * | 2019-01-16 | 2020-07-07 | 江苏徐工信息技术股份有限公司 | MD5 dynamic encryption algorithm-based T-BOX (T-BOX) anti-removal method and system |
CN109785490A (en) * | 2019-01-29 | 2019-05-21 | 上海博泰悦臻网络技术服务有限公司 | Bi-directional verification method and system, intelligent terminal and the T-BOX of bluetooth key |
CN109727333A (en) * | 2019-01-31 | 2019-05-07 | 上海易点时空网络有限公司 | The data processing method and device attended to anything else based on address |
CN109714361A (en) * | 2019-01-31 | 2019-05-03 | 上海易点时空网络有限公司 | Data verification method and device |
CN109636948A (en) * | 2019-01-31 | 2019-04-16 | 上海易点时空网络有限公司 | Data processing method and device based on onboard system |
CN112026783A (en) * | 2019-06-04 | 2020-12-04 | 上海擎感智能科技有限公司 | Vehicle control method, front end, rear end, device, and computer-readable storage medium |
CN110457171A (en) * | 2019-08-08 | 2019-11-15 | 浙江大华技术股份有限公司 | A kind of embedded apparatus debugging method and system |
CN110909318A (en) * | 2019-11-22 | 2020-03-24 | 展讯通信(上海)有限公司 | Operating system anti-theft method and device for user equipment and terminal |
TWI753360B (en) * | 2019-12-11 | 2022-01-21 | 英華達股份有限公司 | Electric vehicle and anti-theft method thereof |
CN110979256A (en) * | 2019-12-11 | 2020-04-10 | 英华达(上海)科技有限公司 | Electric carrier and anti-theft method thereof |
CN110979256B (en) * | 2019-12-11 | 2023-03-10 | 英华达(上海)科技有限公司 | Electric carrier and anti-theft method thereof |
CN111222958B (en) * | 2020-01-10 | 2023-12-05 | 临沂大学 | Mechanical equipment power control method, system, medium and electronic equipment |
CN111222958A (en) * | 2020-01-10 | 2020-06-02 | 临沂大学 | Mechanical equipment power control method, system, medium and electronic equipment |
CN111263328A (en) * | 2020-01-17 | 2020-06-09 | 南京英锐创电子科技有限公司 | Vehicle information acquisition method and vehicle-mounted device |
CN111490876A (en) * | 2020-04-03 | 2020-08-04 | 北京达龙上东文化艺术传播有限责任公司 | Communication method based on USB KEY and USB KEY |
CN113572795B (en) * | 2020-04-28 | 2023-10-27 | 广州汽车集团股份有限公司 | Vehicle safety communication method, system and vehicle-mounted terminal |
CN113572795A (en) * | 2020-04-28 | 2021-10-29 | 广州汽车集团股份有限公司 | Vehicle safety communication method and system and vehicle-mounted terminal |
CN113821805B (en) * | 2020-06-19 | 2023-12-26 | 北京达佳互联信息技术有限公司 | Data encryption method and device |
CN113821805A (en) * | 2020-06-19 | 2021-12-21 | 北京达佳互联信息技术有限公司 | Data encryption method and device |
CN112202549A (en) * | 2020-09-02 | 2021-01-08 | 深圳市车电网络有限公司 | Charging management method, charging terminal data processing method and charging management platform data processing method |
CN112073193B (en) * | 2020-09-07 | 2022-06-07 | 江苏徐工工程机械研究院有限公司 | Information safety processing method, device and system and engineering vehicle |
CN112073193A (en) * | 2020-09-07 | 2020-12-11 | 江苏徐工工程机械研究院有限公司 | Information safety processing method, device and system and engineering vehicle |
CN112468294A (en) * | 2020-11-23 | 2021-03-09 | 北京经纬恒润科技股份有限公司 | Access method and authentication equipment for vehicle-mounted TBOX |
CN112468294B (en) * | 2020-11-23 | 2023-07-18 | 北京经纬恒润科技股份有限公司 | Access method and authentication equipment of vehicle-mounted TBOX |
CN112541187B (en) * | 2020-12-21 | 2024-05-03 | 深圳市元征科技股份有限公司 | Cloud computing method and cloud computing cluster |
CN112541187A (en) * | 2020-12-21 | 2021-03-23 | 深圳市元征科技股份有限公司 | Cloud computing method and cloud computing cluster |
CN112804061A (en) * | 2021-01-04 | 2021-05-14 | 武汉虹信科技发展有限责任公司 | Data transmission method and system of electrically-adjusted antenna controller |
CN113132395B (en) * | 2021-04-22 | 2022-11-11 | 支付宝(杭州)信息技术有限公司 | Remote equipment control method and system |
CN113132395A (en) * | 2021-04-22 | 2021-07-16 | 支付宝(杭州)信息技术有限公司 | Remote equipment control method and system |
CN113112243A (en) * | 2021-04-28 | 2021-07-13 | 南京交通职业技术学院 | Automobile identity recognition device and data processing and communication method |
CN113783687A (en) * | 2021-09-07 | 2021-12-10 | 浙江吉利控股集团有限公司 | Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile |
CN113783687B (en) * | 2021-09-07 | 2023-08-29 | 浙江吉利控股集团有限公司 | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code |
CN113830024A (en) * | 2021-09-22 | 2021-12-24 | 中国第一汽车股份有限公司 | Anti-theft control method and device for engine |
CN114666764A (en) * | 2022-03-03 | 2022-06-24 | 北京全路通信信号研究设计院集团有限公司 | Reliable method and system for wirelessly transmitting orbit data |
CN115037463A (en) * | 2022-05-31 | 2022-09-09 | 锦图计算技术(深圳)有限公司 | Middleware device and method of intelligent cabin based on android system |
CN115037463B (en) * | 2022-05-31 | 2024-10-11 | 锦图计算技术(深圳)有限公司 | Middleware device and method for intelligent cabin based on android system |
CN115527292A (en) * | 2022-11-25 | 2022-12-27 | 广州万协通信息技术有限公司 | Mobile phone terminal remote vehicle unlocking method of security chip and security chip device |
CN117118613A (en) * | 2023-10-18 | 2023-11-24 | 湖北芯擎科技有限公司 | Whole vehicle instrument data security protection method, equipment and readable storage medium |
CN117118613B (en) * | 2023-10-18 | 2024-01-02 | 湖北芯擎科技有限公司 | Whole vehicle instrument data security protection method, equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105635147A (en) | Vehicle-mounted-special-equipment-system-based secure data transmission method and system | |
Woo et al. | A practical wireless attack on the connected car and security protocol for in-vehicle CAN | |
CN106101111B (en) | Vehicle electronics safe communication system and communication means | |
Mundhenk et al. | Security in automotive networks: Lightweight authentication and authorization | |
US20180205729A1 (en) | Method and apparatus for encryption, decryption and authentication | |
CN111181928B (en) | Vehicle diagnosis method, server, and computer-readable storage medium | |
CN102546155B (en) | On-demand safe key generates method and system | |
Wang et al. | NOTSA: Novel OBU with three-level security architecture for internet of vehicles | |
CN106572106B (en) | Method for transmitting message between TBOX terminal and TSP platform | |
CN111726274B (en) | Automobile CAN bus data communication method, equipment and storage medium | |
CN106161032B (en) | A kind of identity authentication method and device | |
US9479329B2 (en) | Motor vehicle control unit having a cryptographic device | |
CN108632250B (en) | Method and equipment for generating command control session master key and transmitting operation command | |
US10680816B2 (en) | Method and system for improving the data security during a communication process | |
CN105450406A (en) | Data processing method and device | |
JP2019009688A (en) | Maintenance system and maintenance method | |
CN112396735B (en) | Internet automobile digital key safety authentication method and device | |
CN103929428A (en) | Method for achieving communication safety of vehicle-mounted electronic information system | |
CN105187442A (en) | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system | |
KR20140023799A (en) | Method for guarantying the confidentiality and integrity of a data in controller area networks | |
CN110855616B (en) | Digital key generation system | |
EP3158710A1 (en) | Method and system for authentication by means of tokens | |
CN108141444A (en) | Improved authentication method and authentication device | |
CN115396121A (en) | Security authentication method for security chip OTA data packet and security chip device | |
CN109314644A (en) | Data providing system, data protecting device, data offering method and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160601 |
|
RJ01 | Rejection of invention patent application after publication |