CN112068528A - Diagnostic device verification method, vehicle, device and server - Google Patents

Diagnostic device verification method, vehicle, device and server Download PDF

Info

Publication number
CN112068528A
CN112068528A CN202010883724.0A CN202010883724A CN112068528A CN 112068528 A CN112068528 A CN 112068528A CN 202010883724 A CN202010883724 A CN 202010883724A CN 112068528 A CN112068528 A CN 112068528A
Authority
CN
China
Prior art keywords
verification
information
vehicle
diagnostic device
key value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010883724.0A
Other languages
Chinese (zh)
Inventor
刘均
吴华武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN202010883724.0A priority Critical patent/CN112068528A/en
Publication of CN112068528A publication Critical patent/CN112068528A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0208Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the configuration of the monitoring system
    • G05B23/0213Modular or universal configuration of the monitoring system, e.g. monitoring system having modules that may be combined to build monitoring program; monitoring system that can be applied to legacy systems; adaptable monitoring system; using different communication protocols
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24065Real time diagnostics

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Stored Programmes (AREA)

Abstract

The application provides a diagnostic equipment verification method, a vehicle, equipment and a server, relates to the technical field of vehicles, and can improve the safety of the diagnostic equipment in accessing the vehicle and solve the potential safety hazard in the vehicle diagnosis process. The method comprises the following steps: responding to verification request information sent by the diagnosis equipment, and generating verification information according to the verification request information; sending the verification information to a diagnostic device to instruct the diagnostic device to send the verification information to a server; and responding to the key value information returned by the diagnostic equipment, and performing security verification on the diagnostic equipment according to the key value information.

Description

Diagnostic device verification method, vehicle, device and server
Technical Field
The present application relates to the field of vehicle technologies, and in particular, to a diagnostic device verification method, a vehicle, a device, and a server.
Background
At present, the vehicle diagnosis interface is basically open, such as an OBD (on Board diagnostics) interface. The diagnostic equipment of any manufacturer can communicate with the vehicle through the open vehicle diagnostic interface, so that some illegal persons have the opportunity to modify the vehicle controller through the diagnostic equipment, even perform operations such as automobile key matching and the like.
Therefore, there is a safety issue in diagnosing a vehicle using an open vehicle diagnostic interface.
Disclosure of Invention
The embodiment of the application provides a diagnostic equipment verification method, a vehicle, equipment and a server, which can effectively solve the safety problem existing when an open vehicle diagnostic interface is used for diagnosing the vehicle.
In a first aspect, the present application provides a diagnostic device verification method applied to a diagnostic device verification system, where the diagnostic device verification system includes a diagnostic device, a vehicle, and a server, and the method includes:
the diagnostic device transmits verification request information to the vehicle;
the vehicle generates verification information according to the verification request information and sends the verification information to the diagnosis equipment;
the diagnostic device sends the verification information to the server;
the server carries out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and the key value information is sent to the diagnostic equipment;
the diagnostic device sends the key value information to the vehicle;
and the vehicle carries out safety verification on the diagnostic equipment according to the key value information.
In a second aspect, the present application provides a diagnostic device validation method for use with a vehicle, the method comprising:
responding to verification request information sent by the diagnosis equipment, and generating verification information according to the verification request information;
sending the verification information to a diagnostic device to instruct the diagnostic device to send the verification information to a server;
and responding to key value information returned by the diagnostic equipment, carrying out safety verification on the diagnostic equipment according to the key value information, wherein the key value information is obtained by carrying out encryption calculation on the verification information by the server according to a preset encryption and decryption algorithm, and the server sends the key value information to the diagnostic equipment so as to instruct the diagnostic equipment to return the key value information to the vehicle.
In an optional implementation manner, performing security verification on the diagnostic device according to the key value information includes:
decrypting the key value information according to the encryption and decryption algorithm, and if the verification information is obtained, determining that the safety verification of the diagnostic equipment is passed;
and decrypting the key value information according to the encryption and decryption algorithm, and determining that the safety verification of the diagnostic equipment is not passed if the verification information is obtained.
In a third aspect, the present application provides a diagnostic device verification method, applied to a diagnostic device, the method including:
sending verification request information to a vehicle, wherein the verification request information is used for indicating the vehicle to generate verification information;
responding to the verification information sent by the vehicle, sending the verification information to a server, wherein the verification information is used for indicating the server to carry out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and sending the key value information to the diagnostic equipment;
and responding to the key value information sent by the server, returning the key value information to the vehicle to indicate the vehicle to perform safety verification on the diagnostic equipment according to the key value information.
In an optional implementation manner, sending the verification information to a server includes:
calling a preset network interface function;
and sending the verification information to the server through the network interface function.
In an optional implementation, returning the key-value information to the vehicle includes:
framing the key value information according to a preset communication protocol to generate frame data;
returning the frame data to the vehicle.
In a fourth aspect, the present application provides a diagnostic device verification method, applied to a server, the method including:
receiving verification information sent by a diagnosis device, wherein the verification information is generated and returned by the vehicle according to verification request information after the diagnosis device sends the verification request information to the vehicle;
and carrying out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, sending the key value information to the diagnostic equipment to indicate the diagnostic equipment to return the key value information to the vehicle, and carrying out safety verification on the diagnostic equipment by the vehicle according to the key value information.
In a fifth aspect, the present application provides a vehicle comprising:
a memory for storing a diagnostic device verification program;
a processor for implementing the diagnostic device verification method according to the first aspect when executing the diagnostic device verification program.
In a sixth aspect, the present application provides a diagnostic device comprising:
a memory for storing a diagnostic device verification program;
a processor for implementing the diagnostic device verification method according to the second aspect when executing the diagnostic device verification program.
In a seventh aspect, the present application provides a server, including:
a memory for storing a diagnostic device verification program;
a processor for implementing the diagnostic device verification method according to the third aspect when executing the diagnostic device verification program.
In an eighth aspect, the present application provides a computer readable storage medium storing a computer program which, when executed by a processor, implements a diagnostic device verification method as described in the first aspect above, or which, when executed by a processor, implements a diagnostic device verification method as described in the second aspect above, or which, when executed by a processor, implements a diagnostic device verification method as described in the third aspect above.
According to the diagnostic equipment verification method provided by the first aspect of the application, verification information is generated according to verification request information sent by the diagnostic equipment, the verification information is sent to the diagnostic equipment so as to instruct the diagnostic equipment to send the verification information to the server, key value information is generated, and then the safety of the diagnostic equipment is verified according to the key value information. The safety of the diagnostic equipment for vehicle access can be improved, and potential safety hazards in the vehicle diagnosis process are solved.
It is understood that the beneficial effects of the second aspect to the eighth aspect can be referred to the related description of the first aspect, and are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the following briefly introduces the embodiments or drawings supported by the prior art description, and it is obvious that the drawings in the following description are only embodiments of the present application, and those skilled in the art can also obtain other drawings according to these drawings without inventive labor.
FIG. 1(a) is a schematic diagram of a diagnostic device verification system provided in a first embodiment of the present application;
fig. 1(b) is an interactive flowchart of a diagnostic device verification method provided in a second embodiment of the present application;
FIG. 2 is a flow chart of a diagnostic device verification method provided in a third embodiment of the present application;
FIG. 3 is a flow chart of a diagnostic device verification method provided in a fourth embodiment of the present application;
fig. 4 is a flowchart of a diagnostic device verification method provided in a fifth embodiment of the present application;
FIG. 5 is a schematic illustration of a vehicle provided by a sixth embodiment of the present application;
FIG. 6 is a schematic view of a diagnostic device provided in a seventh embodiment of the present application;
fig. 7 is a schematic diagram of a server provided in an eighth embodiment of the present application;
FIG. 8 is a schematic illustration of a vehicle provided in a ninth embodiment of the present application;
FIG. 9 is a schematic view of a diagnostic device provided in a tenth embodiment of the present application;
fig. 10 is a schematic diagram of a server according to an eleventh embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail. It should be understood that the terms "first," "second," "third," and the like in the description of the present application and in the appended claims, are used for distinguishing between descriptions that are not intended to indicate or imply relative importance.
It should also be appreciated that reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. It should be further noted that, for the convenience of description, only some but not all of the relevant aspects of the present invention are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
First, before describing the diagnostic device verification method provided in the embodiment of the present application, the principle of the diagnostic device verification method provided in the embodiment of the present application is exemplarily described with reference to fig. 1 (a). As shown in fig. 1(a), fig. 1(a) is a schematic diagram of a diagnostic device verification system provided in a first embodiment of the present application. As shown in fig. 1(a), the diagnostic device verification system 100 according to the embodiment of the present disclosure includes a diagnostic device 101, a vehicle 102, and a server 103. For example, the diagnostic device 101 includes two communication ports, namely a first communication port and a second communication port, the first communication port is connected to the diagnostic interface OBD of the vehicle 102 and is connected to the vehicle 102, and the second communication port is connected to the server 103 and is connected to the server 103.
Illustratively, after the diagnostic device 101 establishes communication connections with the vehicle 102 and the server 103, respectively, the diagnostic device 101 transmits verification request information to the vehicle 102; the vehicle 102 generates the verification information from the verification request information transmitted by the diagnostic apparatus 101, and transmits the verification information to the diagnostic apparatus 101. The diagnostic apparatus 101 transmits the verification information to the server 103. After receiving the verification information, the server 103 performs encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and sends the key value information to the diagnostic device 101. The diagnostic device 101 further transmits the key-value information to the vehicle 102. The vehicle 102 can perform security verification on the diagnostic device 101 based on the key value information.
The diagnostic device verification method provided by the present application is exemplarily described below by specific embodiments.
As shown in fig. 1(b), fig. 1(b) is an interactive flowchart of a diagnostic device verification method according to a second embodiment of the present application. As can be seen from fig. 1(b), the exchange process of the diagnostic device verification method provided in the embodiment of the present application includes:
s1101, the diagnostic device transmits verification request information to the vehicle.
And S1102, the vehicle generates verification information according to the verification request information.
S1103, the vehicle transmits the verification information to the diagnostic device.
S1104, the diagnosis device transmits the verification information to a server.
S1105, the server carries out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information.
S1106, the server sends the key value information to the diagnosis equipment.
S1107, the diagnostic device sends the key-value information to the vehicle.
And S1108, the vehicle carries out safety verification on the diagnostic equipment according to the key value information.
As can be seen from the above analysis, in the diagnostic device verification method provided in the embodiment of the present application, verification information is generated according to the verification request information sent by the diagnostic device, and the verification information is sent to the diagnostic device, so that the diagnostic device is instructed to send the verification information to the server, key value information is generated, and the security of the diagnostic device is verified according to the key value information. The safety of the diagnostic equipment accessing the open vehicle diagnostic interface can be improved, and potential safety hazards in the vehicle diagnostic process are solved.
Referring to fig. 2, fig. 2 is a flowchart of a diagnostic device verification method according to a third embodiment of the present application. The diagnostic device authentication method in the present embodiment may be performed by a vehicle having a control unit to implement the diagnostic device authentication method of the present embodiment, wherein the control unit may be, for example, an electronic control unit ECU or the like. For example, in embodiments of the present application, the vehicle may implement the verification of the diagnostic device by the electronic control unit. The diagnostic device verification method as shown in fig. 2 may include:
s201, responding to the verification request information sent by the diagnosis equipment, and generating verification information according to the verification request information.
In an embodiment of the present application, the verification request information is security authentication request information generated by a diagnostic device according to a preset vehicle diagnostic protocol, for example, an ODB diagnostic protocol.
It is to be understood that the diagnostic device establishes a communication connection with the vehicle through a diagnostic interface of the vehicle, such as an OBD interface, before the diagnostic device sends the verification request information to the vehicle. Wherein the diagnostic interface of the vehicle is an open interface. The vehicle generates the verification information based on the verification request information as a response to the verification request information after responding to the verification request information transmitted by the diagnostic device. For example, the verification information is a group of character strings carrying the verification request information.
Illustratively, after the vehicle receives the verification request information through the electronic control unit, the vehicle returns the verification information to the diagnosis device according to the verification request information.
S202, the verification information is sent to a diagnosis device so as to instruct the diagnosis device to send the verification information to a server.
In this embodiment of the application, the server is a server in communication connection with the diagnostic device, and may be a background server that processes diagnostic data.
Illustratively, the diagnostic device may access the server through a network interface function. For example, the diagnostic device sends the verification information to a server by calling the network interface function.
And S203, responding to key value information returned by the diagnostic equipment, carrying out safety verification on the diagnostic equipment according to the key value information, wherein the key value information is obtained by carrying out encryption calculation on the verification information by the server according to a preset encryption and decryption algorithm, and the server sends the key value information to the diagnostic equipment so as to instruct the diagnostic equipment to return the key value information to the vehicle.
In this embodiment of the application, the encryption and decryption algorithm may be a common key generation and decryption algorithm, such as a digital signature algorithm and an international data encryption algorithm, which are not described in detail herein.
In an embodiment of the present application, the performing security verification on the diagnostic device according to the key value information may include: decrypting the key value information according to the encryption and decryption algorithm, and if the verification information is obtained, determining that the safety verification of the diagnostic equipment is passed;
and decrypting the key value information according to the encryption and decryption algorithm, and determining that the safety verification of the diagnostic equipment is not passed if the verification information is obtained. Wherein the key value information may be a key.
It can be understood that if the safety verification of the diagnosis device is passed, the access of the diagnosis device to the vehicle is determined to be legal, and the diagnosis device can be allowed to perform diagnosis access to various systems of the vehicle; and if the safety verification of the diagnostic equipment is not passed, determining that the access of the diagnostic equipment to the vehicle is illegal, and not allowing the diagnostic equipment to perform diagnostic access on various systems of the vehicle.
As can be seen from the above analysis, in the diagnostic device verification method provided in the embodiment of the present application, verification information is generated according to the verification request information sent by the diagnostic device, and the verification information is sent to the diagnostic device, so that the diagnostic device is instructed to send the verification information to the server, key value information is generated, and the security of the diagnostic device is verified according to the key value information. The safety of the diagnostic equipment accessing the open vehicle diagnostic interface can be improved, and potential safety hazards in the vehicle diagnostic process are solved.
As shown in fig. 3, fig. 3 is a flowchart of a diagnostic device verification method according to a fourth embodiment of the present application. The diagnostic device verification method in the present embodiment may be performed by a diagnostic device, and the diagnostic device may be implemented by hardware and/or software. For example, the diagnostic device verification method as shown in fig. 3 may include:
s301, sending verification request information to a vehicle, wherein the verification request information is used for indicating the vehicle to generate verification information.
In this embodiment of the application, the verification request information is also security authentication request information generated by the diagnostic device according to a preset vehicle diagnostic protocol, for example, an ODB protocol, a K-line protocol, or a keyword protocol.
After the diagnostic equipment establishes communication connection with the vehicle, the vehicle generates verification information based on the verification request information in order to ensure the validity of the accessed diagnostic equipment, and verifies the validity of the diagnostic equipment.
S302, responding to the verification information sent by the vehicle, sending the verification information to a server, wherein the verification information is used for indicating the server to carry out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and sending the key value information to the diagnosis equipment.
In an embodiment of the present application, sending the verification information to a server may include: calling a preset network interface function; and sending the verification information to the server through the network interface function.
And S303, responding to the key value information sent by the server, returning the key value information to the vehicle to indicate the vehicle to perform safety verification on the diagnostic equipment according to the key value information.
In an embodiment of the present application, returning the key value information to the vehicle may include: framing the key value information according to a preset communication protocol to generate frame data; returning the frame data to the vehicle.
Illustratively, the preset communication protocol may be a K-wire based diagnostic protocol, a keyword protocol, an OBD protocol, or the like.
According to the above analysis, the diagnostic device verification method provided in the embodiment of the present application generates verification information according to the verification request information sent by the diagnostic device, and sends the verification information to the diagnostic device, so as to instruct the diagnostic device to send the verification information to the server, generate key value information, and further verify the security of the diagnostic device according to the key value information. The safety of the diagnostic equipment accessing the open vehicle diagnostic interface can be improved, and potential safety hazards in the vehicle diagnostic process are solved.
As shown in fig. 4, fig. 4 is a flowchart of a diagnostic device verification method according to a fifth embodiment of the present application. The diagnostic device verification method in this embodiment may be performed by a server, and the server may be implemented by hardware and/or software. For example, the diagnostic device verification method as shown in fig. 4 may include:
s401, receiving verification information sent by a diagnosis device, wherein the verification information is generated and returned by the vehicle according to verification request information after the diagnosis device sends the verification request information to the vehicle.
S402, carrying out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, sending the key value information to the diagnosis equipment to indicate the diagnosis equipment to return the key value information to the vehicle, and carrying out safety verification on the diagnosis equipment by the vehicle according to the key value information.
As can be seen from the above analysis, in the diagnostic device verification method provided in the embodiment of the present application, verification information is generated according to the verification request information sent by the diagnostic device, and the verification information is sent to the diagnostic device, so that the diagnostic device is instructed to send the verification information to the server, key value information is generated, and the security of the diagnostic device is verified according to the key value information. The safety of the diagnostic equipment accessing the open vehicle diagnostic interface can be improved, and potential safety hazards in the vehicle diagnostic process are solved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Based on the diagnostic device verification method provided by the above embodiment, the embodiment of the present invention further provides an embodiment of an apparatus for implementing the above method embodiment.
Referring to fig. 5, fig. 5 is a schematic view of a vehicle according to a sixth embodiment of the present application. The modules included are used to perform the steps in the corresponding embodiment of fig. 2. Please refer to fig. 2 for a related description of the embodiment. For convenience of explanation, only the portions related to the present embodiment are shown. Referring to fig. 5, the vehicle 5 includes:
a generating module 501, configured to respond to the verification request information sent by the diagnostic device, and generate verification information according to the verification request information.
A first sending module 502, configured to send the verification information to the diagnostic device to instruct the diagnostic device to send the verification information to a server.
The verification module 503 is configured to perform security verification on the diagnostic device according to key value information returned by the diagnostic device, where the key value information is obtained by the server performing encryption calculation on the verification information according to a preset encryption and decryption algorithm, and the server sends the key value information to the diagnostic device to instruct the diagnostic device to return the key value information to the vehicle.
In an optional implementation manner, the verification module 503 includes:
and the first determining unit is used for decrypting the key value information according to the encryption and decryption algorithm, and if the verification information is obtained, the diagnosis equipment is determined to pass the safety verification.
And the second determining unit is used for decrypting the key value information according to the encryption and decryption algorithm, and if the verification information is obtained, determining that the safety verification of the diagnostic equipment is not passed.
As shown in fig. 6, fig. 6 is a schematic diagram of a diagnostic apparatus according to a seventh embodiment of the present application. The modules included are used to perform the steps in the embodiment corresponding to fig. 3. Please refer to the related description of the embodiment in fig. 3. For convenience of explanation, only the portions related to the present embodiment are shown. Referring to fig. 6, the diagnostic apparatus 6 includes:
the second sending module 601 is configured to send verification request information to a vehicle, where the verification request information is used to instruct the vehicle to generate verification information.
A third sending module 602, configured to send the verification information to a server in response to the verification information sent by the vehicle, where the verification information is used to instruct the server to perform encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and send the key value information to the diagnostic device.
A returning module 603, configured to, in response to the key value information sent by the server, return the key value information to the vehicle, so as to instruct the vehicle to perform security verification on the diagnostic device according to the key value information.
In an optional implementation manner, the third sending module 603 includes:
and the calling unit is used for calling a preset network interface function in response to the verification information sent by the vehicle.
And the first sending unit is used for sending the verification information to the server through the network interface function.
In an optional implementation manner, the returning module 603 includes:
and the generating unit is used for framing the key value information according to a preset communication protocol to generate frame data.
A returning unit for returning the frame data to the vehicle.
As shown in fig. 7, fig. 7 is a schematic diagram of a server according to an eighth embodiment of the present application. The modules included are used to perform the steps in the embodiment corresponding to fig. 4. Please refer to fig. 4 for a related description of the embodiment. For convenience of explanation, only the portions related to the present embodiment are shown. Referring to fig. 7, the server 7 shown in fig. 7 includes:
the receiving module 701 is configured to receive verification information sent by a diagnostic device, where the verification information is verification information that is generated and returned by a vehicle according to verification request information after the diagnostic device sends the verification request information to the vehicle.
A fourth sending module 702, configured to perform encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and send the key value information to the diagnostic device, so as to instruct the diagnostic device to return the key value information to the vehicle, where the vehicle performs security verification on the diagnostic device according to the key value information.
It should be noted that, because the contents of information interaction, execution process, and the like between the modules are based on the same concept as that of the embodiment of the method of the present application, specific functions and technical effects thereof may be specifically referred to a part of the embodiment of the method, and details are not described here.
Fig. 8 is a schematic view of a vehicle according to a ninth embodiment of the present application. As shown in fig. 8, the vehicle 8 of the embodiment includes: a processor 800, a memory 801 and a computer program 802, such as a diagnostic device validation program, stored in the memory 801 and executable on the processor 800. The steps in the diagnostic device verification method embodiment described above in fig. 2 are implemented when the computer program 802 is executed by the processor 800. Alternatively, the processor 800 implements the functions of the modules 501 to 503 shown in fig. 5 when executing the computer program 802.
Illustratively, the computer program 802 may be partitioned into one or more modules/units that are stored in the memory 801 and executed by the processor 800 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 802 in the vehicle 8. For example, the computer program 802 may be divided into a generating module, a first sending module, and a verifying module, and specific functions of each module are described in the embodiment corresponding to fig. 5, which is not described herein again.
The vehicle may include, but is not limited to, a processor 800, a memory 801. Those skilled in the art will appreciate that fig. 8 is merely an example of a vehicle 8 and is not intended to limit vehicle 8 and may include more or fewer components than shown, or some components in combination, or different components, e.g., the video processing device may also include input output devices, network access devices, buses, etc.
The Processor 800 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 801 may be an internal storage unit of the vehicle 8, such as a hard disk or a memory of the vehicle 8. The memory 801 may also be an external storage device of the vehicle 8, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the vehicle 8. Further, the memory 801 may also include both internal and external storage devices of the vehicle 8. The memory 801 is used to store the computer program 802 and other programs and data supported by the vehicle 8. The memory 801 may also be used to temporarily store data that has been output or is to be output.
Fig. 9 is a schematic diagram of a diagnostic apparatus according to a tenth embodiment of the present application. As shown in fig. 9, the diagnostic apparatus 9 of this embodiment includes: a processor 900, a memory 901, and a computer program 902, such as a diagnostic device verification program, stored in the memory 901 and executable on the processor 900. The steps in the diagnostic device verification method embodiment described above in fig. 3 are implemented when the computer program 902 is executed by the processor 900. Alternatively, the processor 900 implements the functions of the modules 601 to 603 shown in fig. 6 when executing the computer program 902.
Illustratively, the computer program 902 may be partitioned into one or more modules/units, which are stored in the memory 901 and executed by the processor 900 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 902 in the diagnostic device 9. For example, the computer program 902 may be divided into a second sending module, a third sending module and a returning module, and specific functions of each module are described in the embodiment corresponding to fig. 6, which is not described herein again.
The vehicle may include, but is not limited to, a processor 900, a memory 901. It will be understood by those skilled in the art that fig. 9 is merely an example of the diagnostic device 9, and does not constitute a limitation of the diagnostic device 9, and may include more or less components than those shown, or combine certain components, or different components, for example, the video processing device may also include an input output device, a network access device, a bus, etc.
The Processor 900 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 901 may be an internal storage unit of the diagnostic device 9, such as a hard disk or a memory of the diagnostic device 9. The memory 901 may also be an external storage device of the diagnostic device 9, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the diagnostic device 9. Further, the memory 901 may also include both an internal storage unit and an external storage device of the diagnostic device 9. The memory 901 is used for storing the computer program 902 and other programs and data supported by the diagnostic device 9. The memory 901 may also be used to temporarily store data that has been output or is to be output.
Fig. 10 is a schematic diagram of a server according to an eleventh embodiment of the present application. As shown in fig. 10, the server 10 of this embodiment includes: a processor 1000, a memory 1001 and a computer program 1002, such as a diagnostic device verification program, stored in said memory 1001 and executable on said processor 1000. The steps in the diagnostic device verification method embodiment described above in fig. 4 are implemented by the processor 1000 when executing the computer program 1002. Alternatively, the processor 1000 implements the functions of the modules 701 to 702 shown in fig. 7 when executing the computer program 1002.
Illustratively, the computer program 1002 may be partitioned into one or more modules/units, which are stored in the memory 1001 and executed by the processor 1000 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 1002 in the server 10. For example, the computer program 1002 may be divided into a receiving module and a fourth sending module, and specific functions of each module are described in the embodiment corresponding to fig. 7, which is not described herein again.
The server may include, but is not limited to, a processor 1000, a memory 1001. Those skilled in the art will appreciate that fig. 10 is merely an example of a server 10 and is not intended to limit server 10 and may include more or fewer components than those shown, or some components may be combined, or different components, e.g., the video processing device may also include input output devices, network access devices, buses, etc.
The Processor 1000 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 1001 may be an internal storage unit of the server 10, such as a hard disk or a memory of the server 10. The memory 1001 may also be an external storage device of the server 10, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the server 10. Further, the memory 1001 may also include both an internal storage unit and an external storage device of the server 10. The memory 1001 is used for storing the computer program 1002 and other programs and data supported by the server 10. The memory 1001 may also be used to temporarily store data that has been output or is to be output.
An embodiment of the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the diagnostic device verification method can be implemented.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A diagnostic device verification method is applied to a diagnostic device verification system, the diagnostic device verification system comprises a diagnostic device, a vehicle and a server, and the method is characterized by comprising the following steps:
the diagnostic device transmits verification request information to the vehicle;
the vehicle generates verification information according to the verification request information and sends the verification information to the diagnosis equipment;
the diagnostic device sends the verification information to the server;
the server carries out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and the key value information is sent to the diagnostic equipment;
the diagnostic device sends the key value information to the vehicle;
and the vehicle carries out safety verification on the diagnostic equipment according to the key value information.
2. A diagnostic device validation method, applied to a vehicle, the method comprising:
responding to verification request information sent by the diagnosis equipment, and generating verification information according to the verification request information;
sending the verification information to a diagnostic device to instruct the diagnostic device to send the verification information to a server;
and responding to key value information returned by the diagnostic equipment, carrying out safety verification on the diagnostic equipment according to the key value information, wherein the key value information is obtained by carrying out encryption calculation on the verification information by the server according to a preset encryption and decryption algorithm, and the server sends the key value information to the diagnostic equipment so as to instruct the diagnostic equipment to return the key value information to the vehicle.
3. The method of claim 2, wherein the security verifying the diagnostic device based on the key-value information comprises:
decrypting the key value information according to the encryption and decryption algorithm, and if the verification information is obtained, determining that the safety verification of the diagnostic equipment is passed;
and decrypting the key value information according to the encryption and decryption algorithm, and determining that the safety verification of the diagnostic equipment is not passed if the verification information is obtained.
4. A diagnostic device verification method, applied to a diagnostic device, the method comprising:
sending verification request information to a vehicle, wherein the verification request information is used for indicating the vehicle to generate verification information;
responding to the verification information sent by the vehicle, sending the verification information to a server, wherein the verification information is used for indicating the server to carry out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, and sending the key value information to the diagnostic equipment;
and responding to the key value information sent by the server, returning the key value information to the vehicle to indicate the vehicle to perform safety verification on the diagnostic equipment according to the key value information.
5. The method of claim 4, wherein sending the verification information to a server comprises:
calling a preset network interface function;
and sending the verification information to the server through the network interface function.
6. The method of claim 4 or 5, wherein returning the key-value information to the vehicle comprises:
framing the key value information according to a preset communication protocol to generate frame data;
returning the frame data to the vehicle.
7. A diagnostic device verification method, applied to a server, the method comprising:
receiving verification information sent by a diagnosis device, wherein the verification information is generated and returned by the vehicle according to verification request information after the diagnosis device sends the verification request information to the vehicle;
and carrying out encryption calculation on the verification information according to a preset encryption and decryption algorithm to obtain key value information, sending the key value information to the diagnostic equipment to indicate the diagnostic equipment to return the key value information to the vehicle, and carrying out safety verification on the diagnostic equipment by the vehicle according to the key value information.
8. A vehicle, characterized by comprising:
a memory for storing a diagnostic device verification program;
a processor for implementing the diagnostic device authentication method as claimed in claim 2 or 3 when executing the diagnostic device authentication program.
9. A diagnostic device, comprising:
a memory for storing a diagnostic device verification program;
a processor for implementing the diagnostic device verification method of any one of claims 4 to 6 when executing the diagnostic device verification program.
10. A server, comprising:
a memory for storing a diagnostic device verification program;
a processor for implementing the diagnostic device authentication method as claimed in claim 7 when executing the diagnostic device authentication program.
CN202010883724.0A 2020-08-28 2020-08-28 Diagnostic device verification method, vehicle, device and server Pending CN112068528A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010883724.0A CN112068528A (en) 2020-08-28 2020-08-28 Diagnostic device verification method, vehicle, device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010883724.0A CN112068528A (en) 2020-08-28 2020-08-28 Diagnostic device verification method, vehicle, device and server

Publications (1)

Publication Number Publication Date
CN112068528A true CN112068528A (en) 2020-12-11

Family

ID=73659318

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010883724.0A Pending CN112068528A (en) 2020-08-28 2020-08-28 Diagnostic device verification method, vehicle, device and server

Country Status (1)

Country Link
CN (1) CN112068528A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338073A (en) * 2021-11-09 2022-04-12 江铃汽车股份有限公司 Protection method, system, storage medium and equipment for vehicle-mounted network
CN115333977A (en) * 2022-08-11 2022-11-11 南京国电南自电网自动化有限公司 System diagnosis channel realization method and device based on network interface

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110109443A (en) * 2019-05-13 2019-08-09 上海英恒电子有限公司 Safety communicating method, device, storage medium and the equipment of vehicle diagnostics
US20190268376A1 (en) * 2018-02-27 2019-08-29 Hyundai Motor Company System and method for security inspection of electronic equipment
CN110189434A (en) * 2019-05-29 2019-08-30 深圳市元征科技股份有限公司 A kind of method and its relevant device of vehicle safety verification
CN110515366A (en) * 2019-07-29 2019-11-29 华为技术有限公司 A kind of method for diagnosing faults and device
CN110572400A (en) * 2019-09-10 2019-12-13 百度在线网络技术(北京)有限公司 Vehicle OBD interface authentication method and device, electronic equipment and storage medium
CN110912690A (en) * 2019-11-01 2020-03-24 中国第一汽车股份有限公司 Data encryption and decryption method, vehicle and storage medium
CN111038413A (en) * 2020-01-15 2020-04-21 江铃汽车股份有限公司 Vehicle mode logic control and switching method
US20200122656A1 (en) * 2018-10-18 2020-04-23 Northrop Grumman Systems Corporation Parametric data modeling for model based reasoners

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190268376A1 (en) * 2018-02-27 2019-08-29 Hyundai Motor Company System and method for security inspection of electronic equipment
US20200122656A1 (en) * 2018-10-18 2020-04-23 Northrop Grumman Systems Corporation Parametric data modeling for model based reasoners
CN110109443A (en) * 2019-05-13 2019-08-09 上海英恒电子有限公司 Safety communicating method, device, storage medium and the equipment of vehicle diagnostics
CN110189434A (en) * 2019-05-29 2019-08-30 深圳市元征科技股份有限公司 A kind of method and its relevant device of vehicle safety verification
CN110515366A (en) * 2019-07-29 2019-11-29 华为技术有限公司 A kind of method for diagnosing faults and device
CN110572400A (en) * 2019-09-10 2019-12-13 百度在线网络技术(北京)有限公司 Vehicle OBD interface authentication method and device, electronic equipment and storage medium
CN110912690A (en) * 2019-11-01 2020-03-24 中国第一汽车股份有限公司 Data encryption and decryption method, vehicle and storage medium
CN111038413A (en) * 2020-01-15 2020-04-21 江铃汽车股份有限公司 Vehicle mode logic control and switching method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338073A (en) * 2021-11-09 2022-04-12 江铃汽车股份有限公司 Protection method, system, storage medium and equipment for vehicle-mounted network
CN115333977A (en) * 2022-08-11 2022-11-11 南京国电南自电网自动化有限公司 System diagnosis channel realization method and device based on network interface
CN115333977B (en) * 2022-08-11 2023-08-15 南京国电南自电网自动化有限公司 Method and device for realizing system diagnosis channel based on network interface

Similar Documents

Publication Publication Date Title
EP3474488A1 (en) System, certification authority, vehicle-mounted computer, vehicle, public key certificate issuance method, and program
CN103685214B (en) Safety access method for vehicle electronic control unit
CN110061846B (en) Method, device and computer readable storage medium for identity authentication and confirmation of user node in block chain
CN110109443B (en) Safe communication method and device for vehicle diagnosis, storage medium and equipment
CN109040285B (en) Method and device for safety authentication of vehicle-mounted network, storage medium and vehicle
CN111142500B (en) Permission setting method and device for vehicle diagnosis data and vehicle-mounted gateway controller
CN110784450A (en) Single sign-on method and device based on browser
CN109190362B (en) Secure communication method and related equipment
CN110190958A (en) A kind of auth method of vehicle, device, electronic equipment and storage medium
CN111813078B (en) Safety diagnosis method, device, equipment and medium for vehicle
CN111565182B (en) Vehicle diagnosis method and device and storage medium
US20150043594A1 (en) Gateway apparatus and message routing method
WO2023185492A1 (en) Diagnostic method and apparatus for a vehicle controller, device, and medium
CN112068528A (en) Diagnostic device verification method, vehicle, device and server
CN112235263B (en) Diagnostic device security authentication method, server, vehicle, and storage medium
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN114040411B (en) Equipment binding method and device, electronic equipment and storage medium
CN114867011A (en) Vehicle-mounted data transmission device and method, vehicle and vehicle-mounted data transmission system
US11474961B2 (en) Reducing runtime load for vehicle system data encryption using crypto engine with direct memory access (DMA)
CN110752917A (en) Vehicle access control method, device and system
CN116155579A (en) Secure communication method, system, storage medium and vehicle
CN109917775A (en) Automobile security gateway data transmission method and electronic equipment
CN109359450A (en) Safety access method, device, equipment and the storage medium of linux system
CN112180898B (en) Parameter position determining method, device, equipment and storage medium
CN117956263B (en) Image processing method and device for vehicle camera, computer equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201211

RJ01 Rejection of invention patent application after publication