CN110191415A - A kind of encryption method of information of vehicles, mobile unit and server - Google Patents
A kind of encryption method of information of vehicles, mobile unit and server Download PDFInfo
- Publication number
- CN110191415A CN110191415A CN201910458680.4A CN201910458680A CN110191415A CN 110191415 A CN110191415 A CN 110191415A CN 201910458680 A CN201910458680 A CN 201910458680A CN 110191415 A CN110191415 A CN 110191415A
- Authority
- CN
- China
- Prior art keywords
- information
- vehicles
- server
- ciphered data
- mobile unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000012986 modification Methods 0.000 claims abstract description 42
- 230000004048 modification Effects 0.000 claims abstract description 42
- 238000004891 communication Methods 0.000 claims abstract description 17
- 238000012546 transfer Methods 0.000 claims abstract description 8
- 238000001514 detection method Methods 0.000 claims description 11
- 230000008901 benefit Effects 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 8
- 230000008859 change Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 description 17
- 238000012545 processing Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 208000033748 Device issues Diseases 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application discloses a kind of encryption method of information of vehicles, mobile unit and servers, wherein this method, using mobile unit, the mobile unit is connect with terminal equipment in communication, to be connect by the terminal device with server communication, which comprises obtain the information of vehicles of target vehicle;Ciphered data information is generated using the information of vehicles;The ciphered data information is sent to the terminal device, the ciphered data information is sent to the server by the terminal device, so that whether the server passes through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.The application is by verifying data, to monitor information of vehicles by whether being tampered in terminal device transfer, it is ensured that the reliability of terminal device interim data.
Description
Technical field
This application involves information monitoring technical field more particularly to a kind of encryption method of information of vehicles, mobile unit and
Server.
Background technique
When carrying out vehicle diagnosis, the vehicle of the target vehicle that will be diagnosed for the sensor being set on vehicle is believed
Breath uploads to vehicle-mounted OBD equipment, by being sent to the terminal devices such as mobile phone, IPAD with OBD equipment, then by terminal device by vehicle
Information of vehicles be sent to server, in this process, transfer of the terminal device as data, and trustless exists
The risk modified of the corresponding data of information of vehicles of vehicle, so as to cause when being diagnosed to target vehicle, due to vehicle
Information of vehicles distort, lead to the risk of diagnostic result inaccuracy.
Therefore, how to monitor whether information of vehicles is tampered in passing through terminal device transfer, to ensure in terminal device
The reliability of revolution evidence is those skilled in the art's technical problem urgently to be resolved.
Summary of the invention
The main purpose of the application is to provide encryption method, mobile unit and the server of a kind of information of vehicles, it is intended to
Solve whether monitoring information of vehicles is tampered in passing through terminal device transfer, to ensure the information of vehicles number of terminal device transfer
According to reliability.
To achieve the above object, the application provides a kind of encryption method of information of vehicles, is applied to mobile unit, the vehicle
It carries equipment to connect with terminal equipment in communication, to connect by the terminal device with server communication, the method includes obtaining
The information of vehicles of target vehicle;Ciphered data information is generated using the information of vehicles;The ciphered data information is sent to
The terminal device, the ciphered data information is sent to the server by the terminal device, so that the clothes
Whether business device passes through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
Preferably, the mobile unit is stored with device private, device certificate and server public key, described in the utilization
Information of vehicles generates ciphered data information, comprising: generates key according to the device private and the server public key;Using institute
Information of vehicles described in key pair is stated to be encrypted to generate encryption information of vehicles;Using the device private to the encryption vehicle
Information is signed, to obtain the encryption information of vehicles of signature;By the encryption information of vehicles and the device certificate of the signature
It is packaged, to generate ciphered data information.
Preferably, before the information of vehicles for obtaining target vehicle, the method also includes: Xiang Suoshu server hair
The request for obtaining the information of vehicles of target vehicle out, so that the server receives and responds described request to the terminal device
Send wake up instruction;The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that described vehicle-mounted
Equipment receives the wake up instruction, to obtain the information of vehicles of target vehicle according to the wake up instruction.
Preferably, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle or described
GPS positioning device on mobile unit obtains.
To achieve the above object, the application provides a kind of encryption method of information of vehicles, the encryption applied to information of vehicles
The server of system, the encryption system of the information of vehicles further include the terminal device being connect with the server communication and with
The mobile unit of the terminal equipment in communication connection, which comprises receive the encryption data letter that the terminal device is sent
Breath, wherein the ciphered data information is the information of vehicles that the mobile unit obtains target vehicle, according to the information of vehicles
The ciphered data information is generated, and the ciphered data information is sent to the terminal device, so that the terminal device
The ciphered data information is sent to the server;The vehicle of the target vehicle is detected according to the ciphered data information
Whether information passes through illegal modifications.
Preferably, the mobile unit is stored with device private, device certificate and server public key, described according to
Information of vehicles generates ciphered data information, comprising: the mobile unit is raw according to the device private and the server public key
It is encrypted at key, and using information of vehicles described in the key pair to generate encryption information of vehicles;The mobile unit benefit
It is signed with the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;It is described vehicle-mounted to set
It is standby to be packaged the encryption information of vehicles of the signature and the device certificate, to generate ciphered data information.
Preferably, the server is stored with verifying certificate, described to detect the target according to the ciphered data information
The information of vehicles of vehicle whether pass through illegal modifications include: judge it is described verifying certificate and the ciphered data information in it is described
Whether device certificate is that same certificate server is signed and issued;If it is not, then judging the information of vehicles of the target vehicle by illegally repairing
Change.
Preferably, the server is also stored with privacy key, and the device certificate includes and the device private pair
The equipment public key answered, the method also includes: if so, the server is according to the equipment public key and the privacy key
Solution confidential information is generated, and the encryption information of vehicles is decrypted according to the solution confidential information, to obtain decryption information of vehicles;
If successful decryption, equipment public key described in the server by utilizing carries out signature verification to the decryption information of vehicles;If signature
It verifies unsuccessful, then judges the information of vehicles of the target vehicle by illegal modifications;If signature verification success, described in judgement
The information of vehicles of target vehicle is without illegal modifications.
Preferably, the method also includes: receive the terminal device and issue and obtain the information of vehicles of target vehicle and ask
It asks;The request is responded, Xiang Suoshu terminal device sends wake up instruction, so that the terminal device forwards the wake up instruction
To the mobile unit, and make the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
To achieve the above object, the encryption method that the application provides a kind of information of vehicles is applied to the encryption system of information of vehicles
System, the encryption system of the information of vehicles include server, the terminal device being connect with the server communication and with it is described
The mobile unit of terminal equipment in communication connection, which comprises the mobile unit obtains the information of vehicles of target vehicle, benefit
Ciphered data information is generated with the information of vehicles;The ciphered data information is sent to the terminal and set by the mobile unit
It is standby;The terminal device receives the ciphered data information, and the ciphered data information is sent to the server;It is described
Server receives the ciphered data information, and is according to the information of vehicles that the ciphered data information detects the target vehicle
It is no to pass through illegal modifications.
To achieve the above object, the application provides a kind of mobile unit, and the mobile unit includes: data obtaining module,
For obtaining the information of vehicles of target vehicle;Data encryption module, for generating ciphered data information using the information of vehicles;
Data transmission blocks, for the ciphered data information to be sent to the terminal device, to pass through the terminal device for institute
It states ciphered data information and is sent to the server, so that the server detects the target according to the ciphered data information
Whether the information of vehicles of vehicle passes through illegal modifications.
Preferably, the mobile unit is stored with device private, device certificate and server public key, the data encryption
Module is also used to: generating key according to the device private and the server public key;Believed using vehicle described in the key pair
Breath is encrypted to generate encryption information of vehicles;It is signed using the device private to the encryption information of vehicles, to obtain
Take the encryption information of vehicles of signature;The encryption information of vehicles of the signature and the device certificate are packaged, to generate encryption number
It is believed that breath.
Preferably, the mobile unit further includes information request module and command reception module, wherein the information is asked
Modulus block, for issuing the request for obtaining the information of vehicles of target vehicle to the server, so that the server receives simultaneously
Respond described request to terminal device transmission wake up instruction;Described instruction receiving module, for receiving the wake up instruction,
And the wake up instruction is transmitted to the mobile unit, so that the mobile unit receives the wake up instruction, according to institute
State the information of vehicles that wake up instruction obtains target vehicle.
Preferably, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle or described
GPS positioning device on mobile unit obtains.
To achieve the above object, the application provides a kind of mobile unit, and the mobile unit includes: memory, for depositing
Store up the executable encryption method program of computer;And processor, the processor, which is configured for transferring, is stored in described deposit
Encryption method program in reservoir is to execute method above-mentioned.
To achieve the above object, the application provides a kind of server, and the server includes the first receiving module, for connecing
Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is that the mobile unit obtains target
The information of vehicles of vehicle generates the ciphered data information according to the information of vehicles, and the ciphered data information is sent
To the terminal device, so that the ciphered data information is sent to the server by the terminal device;And detection mould
Whether block, the information of vehicles for detecting the target vehicle according to the ciphered data information pass through illegal modifications.
Preferably, the mobile unit is stored with device private, device certificate and server public key, described according to
Information of vehicles generates ciphered data information, comprising: the mobile unit is raw according to the device private and the server public key
It is encrypted at key, and using information of vehicles described in the key pair to generate encryption information of vehicles;The mobile unit benefit
It is signed with the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;It is described vehicle-mounted to set
It is standby to be packaged the encryption information of vehicles of the signature and the device certificate, to generate ciphered data information.
Preferably, the server is stored with verifying certificate, and the detection module is also used to: judge the verifying certificate and
Whether the device certificate in the ciphered data information is that same certificate server is signed and issued;If it is not, then judging the target
The information of vehicles of vehicle passes through illegal modifications.
Preferably, the server is also stored with privacy key, and the device certificate includes and the device private pair
The equipment public key answered, the detection module are also used to: if so, the server is according to the equipment public key and the server
Private key generates solution confidential information, and the encryption information of vehicles is decrypted according to the solution confidential information, to obtain decryption vehicle
Information;If successful decryption, equipment public key described in the server by utilizing carries out signature verification to the decryption information of vehicles;If
Signature verification is unsuccessful, then judges the information of vehicles of the target vehicle by illegal modifications;If signature verification success, judges
The information of vehicles of the target vehicle is without illegal modifications.
Preferably, the server further includes the second receiving module and respond module, wherein described second receives mould
Block, the request for issuing the information of vehicles of acquisition target vehicle for receiving the terminal device;The respond module, for responding
The request, Xiang Suoshu terminal device send wake up instruction so that the terminal device wake up instruction is transmitted to it is described
Mobile unit, and make the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
To achieve the above object, the application provides a kind of server, and the server includes: memory, based on storing
The executable encryption method program of calculation machine;And processor, the processor, which is configured for transferring, is stored in the memory
In encryption method program to execute method above-mentioned.
Compared with prior art, the application provides encryption method, mobile unit and the server of a kind of information of vehicles.The party
Method obtains the information of vehicles of target vehicle by mobile unit, generates ciphered data information using the information of vehicles and is sent to
The ciphered data information to receive the ciphered data information by terminal device, and is sent to the clothes by terminal device
Business device, so that server receives the ciphered data information, and detects the target vehicle according to the ciphered data information
Whether information of vehicles passes through illegal modifications.By being verified to data, to monitor information of vehicles by terminal device transfer
In whether be tampered, it is ensured that the reliability of terminal device interim data.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of the encryption method for information of vehicles that the application first embodiment provides.
Fig. 2 is the sub-step flow chart of step S11 in Fig. 1.
Fig. 3 is the sub-step flow chart of step S14 in Fig. 1.
Fig. 4 is a kind of step flow chart of the encryption method for information of vehicles that the application second embodiment provides.
Fig. 5 A is a kind of structural block diagram for mobile unit that the application 3rd embodiment provides.
Fig. 5 B is a kind of structural block diagram for mobile unit that the application fourth embodiment provides.
Fig. 6 A is a kind of structural block diagram for server that the 5th embodiment of the application provides.
Fig. 6 B is a kind of structural block diagram for server that the application sixth embodiment provides.
Specific embodiment
In order to which the objects, technical solutions and advantages of the application are more clearly understood, accompanying drawings and embodiments are combined as follows, it is right
The application is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the application, not
For limiting the application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing
The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage
The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein
Or the sequence other than the content of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that
Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit
In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce
The other step or units of product or equipment inherently.
It should be noted that the description for being related to " first ", " second " etc. in this application is used for description purposes only, and cannot
It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment
Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution
Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not this application claims
Protection scope within.
The application provides encryption method, mobile unit, server and the storage medium of a kind of information of vehicles.This method passes through
Mobile unit obtains the information of vehicles of target vehicle, generates ciphered data information using the information of vehicles and is sent to terminal and sets
It is standby, to receive the ciphered data information by terminal device, and the ciphered data information is sent to the server, with
So that server is received the ciphered data information, and detects the information of vehicles of the target vehicle according to the ciphered data information
Whether illegal modifications are passed through.By being verified to data, with monitor information of vehicles by terminal device transfer whether by
It distorts, it is ensured that the reliability of terminal device interim data.
Referring to Fig. 1, Fig. 1 is a kind of encryption method for information of vehicles that the application first embodiment provides, vehicle letter
The encryption method of breath includes:
Step S10: the information of vehicles of mobile unit acquisition target vehicle.
Collecting vehicle information equipment is provided on target vehicle, for acquiring the information of vehicles of vehicle, and by the vehicle
Information is sent to mobile unit 10, and the information of vehicles of the vehicle can be the GPS position information of vehicle or the status information of vehicle,
Wherein the status information of vehicle can be the speed of vehicle, acceleration, driving direction, any one the more group in course angle
It closes.Namely collecting vehicle information equipment can be the corresponding GPS positioning device for obtaining GPS position information or correspond to and obtains vehicle
The acceleration transducer or angular transducer of status information.Wherein, GPS positioning device can be set can also set in target vehicle
It is placed in mobile unit, herein with no restrictions.
Mobile unit 10 can be vehicle-mounted OBD equipment or be set to other ends communicated to connect on vehicle with terminal device 20
End equipment.
Step S11: the mobile unit generates ciphered data information using the information of vehicles.
Mobile unit 10 obtains the information of vehicles of target vehicle, and the information of vehicles of the acquisition is encrypted and/or signed
Processing, to obtain ciphered data information.
Referring to Fig. 2, in some embodiments, the mobile unit 10 is stored with device private, device certificate and clothes
Business device public key, device certificate includes equipment public key, and step S11 includes:
Step S111: the mobile unit generates key according to the device private and the server public key.
Step S112: the mobile unit is encrypted using information of vehicles described in the key pair to generate encryption vehicle
Information.
Mobile unit 10 carries out key agreement according to the equipment public key and privacy key of storage, to generate key, and benefit
It is encrypted with the information of vehicles that the key pair obtains, to generate encryption information of vehicles, wherein key agreement can be preferably
ECDH algorithm.
Step S113: the mobile unit signs to the encryption information of vehicles using the device private, to obtain
Take the encryption information of vehicles of signature.
Mobile unit 10 signs to encryption information of vehicles using device private, to generate the encryption vehicle letter of signature
Breath.
Step S114: the encryption information of vehicles of the signature and the device certificate are packaged by the mobile unit, with life
At ciphered data information.
The encryption information of vehicles and device certificate of signature are packaged by mobile unit 10, to generate ciphered data information.
Wherein, device certificate includes equipment public key corresponding with device private.
Preferably, device certificate is the certificate of CA server distribution comprising the information of E-VISA organ, public key user
Information, equipment public key, the signature of authoritative institution and validity period.
Step S12: the ciphered data information is sent to the terminal device by the mobile unit.
Mobile unit 10 is communicated to connect by the communications such as wifi or bluetooth and terminal device 20, is also possible to lead to
It crosses the modes such as data line and terminal device 20 communicates to connect.
The ciphered data information of generation is sent to terminal device 20 by mobile unit 10 by wireless communication, the terminal device
20 can be mobile phone, ipad, laptop etc..
Step S13: the terminal device receives the ciphered data information, and the ciphered data information is sent to institute
State server.
Terminal device 20 is connect with server 30 by communications such as mobile, connection or telecommunications.In terminal device
After 20 receive the ciphered data information of the transmission of mobile unit 10, which is transmitted to server 30.
Step S14: the server receives the ciphered data information, and according to ciphered data information detection
Whether the information of vehicles of target vehicle passes through illegal modifications.
Referring to Fig. 3, in some embodiments, the server 30 is stored with verifying certificate, the verifying certificate is for just
Whether step card ciphered data information is modified, the vehicle that the target vehicle is detected according to the ciphered data information
Whether information passes through illegal modifications, comprising:
Step S141: the server judges the device certificate in the verifying certificate and the ciphered data information
It whether is that same certificate server is signed and issued.
Verifying certificate and device certificate are that same certificate server is signed and issued, and each verifying certificate is corresponding with unique authentication proof
Book, it is preferable that the certificate server is CA authentication service device.
It whether is that same certificate server is signed and issued by verifying the verifying certificate and device certificate, so as to preliminary judgement
Whether ciphered data information is modified.
Step S142: if it is not, then judging the information of vehicles of the target vehicle by illegal modifications.
If the verifying certificate and device certificate are not that same certificate server is signed and issued, judge that the ciphered data information passes through
The information of vehicles of modification namely the target vehicle passes through illegal modifications, and the information of vehicles of the target vehicle is unreliable.
Referring again to Fig. 3, in some embodiments, the server is also stored with privacy key, the device certificate
Including equipment public key corresponding with the device private, the method also includes:
Step S143: if so, the server generates solution secret letter according to the equipment public key and the privacy key
Breath, and the encryption information of vehicles is decrypted according to the solution confidential information, to obtain decryption information of vehicles.
The solution of corresponding unlocker device private key and the server public key can be generated in equipment public key and the privacy key
Confidential information, server 30 can use the solution confidential information and the encryption information of vehicles are decrypted, to obtain decryption vehicle letter
Breath, namely obtain the information of vehicles of the target vehicle of signature.
For example, key 001 can be generated in device private and the server public key, then equipment public key and the server are private
Corresponding unlocking pin 001 also can be generated in key, and can be unlocked using the password can by device private and the server public key
The data encrypted with the key of generation.
Step S144: if decryption is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications.
If decryption is unsuccessful, may illegally be distorted namely the vehicle of the target vehicle for the encryption information of vehicles
Information passes through illegal modifications.
Referring again to Fig. 3, in some embodiments, the method also includes:
Step S145: if successful decryption, equipment public key described in the server by utilizing to the decryption information of vehicles into
Row signature verification.
If successful decryption, equipment public key described in the server by utilizing carries out signature to the decryption information of vehicles and tests
Card.
For example, reserved signing messages is 007, then server benefit when device private signs to encryption information of vehicles
The signature is verified with equipment public key corresponding with the device private, whether corresponding with device private detects the signing messages
Signing messages it is identical, if they are the same then signature verification success, signature verification is unsuccessful if not identical.
Step S146: if signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications.
Step S147: if signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
Referring to Fig. 4, Fig. 4 is a kind of encryption method for information of vehicles that the application second embodiment provides, this method packet
It includes: step S20-S27.
Step S20: the terminal device issues the request for obtaining the information of vehicles of target vehicle to the server.
Terminal device 20 issues the request for obtaining the information of vehicles of target vehicle to server 30, which includes for obtaining
The information of the mobile unit 10 of the information of vehicles of target vehicle is taken, so that server 30 is according to the request to corresponding mobile unit
10 send wake up instruction, so that corresponding mobile unit 10 be made to respond the information of vehicles that the wake up instruction obtains target vehicle.
Step S21: the server receives and responds described request to terminal device transmission wake up instruction.
The request that 30 receiving terminal apparatus 20 of server is sent, and according to 10 information of the mobile unit generation pair in the request
Mobile unit 10 on the wake up target vehicle answered obtains the wake up instruction of the information of vehicles of target vehicle, and by the wake up instruction
It is sent to terminal device 20, to be sent to corresponding mobile unit 10 by terminal device 20, so that corresponding mobile unit 10
Response wake up instruction obtain target vehicle information of vehicles.
Step S22: the terminal device receives the wake up instruction, and the wake up instruction is transmitted to corresponding vehicle-mounted
Equipment.
Terminal device 20 receives wake up instruction, and the wake up instruction is transmitted to all mobile units for communicating connection
10 or the specified correspondence mobile unit 10 of the wake up instruction.
Step S23: the mobile unit receives the wake up instruction, to obtain target vehicle according to the wake up instruction
Information of vehicles.
After mobile unit 10 receives wake up instruction, obtain the information of vehicles of target vehicle, will to the information of vehicles into
Row encrypts and is sent to server 30 by terminal device 20.
Step S24: the mobile unit obtains the information of vehicles of target vehicle.
Step S24 is identical as step S10 in Fig. 1, and this will not be repeated here.
Step S25: ciphered data information is generated using the information of vehicles.
Step S25 is identical as step S11 in Fig. 1, and this will not be repeated here.
Step S26: the ciphered data information is sent to the terminal device by the mobile unit.
Step S26 is identical as step S12 in Fig. 1, and this will not be repeated here.
Step S27: the terminal device receives the ciphered data information, and the ciphered data information is sent to institute
State server.
Step S27 is identical as step S13 in Fig. 1, and this will not be repeated here.
Step S28: the server receives the ciphered data information, and according to ciphered data information detection
Whether the information of vehicles of target vehicle passes through illegal modifications.
Step S28 is identical as step S14 in Fig. 1, and this will not be repeated here.
Fig. 5 A is please referred to, in some embodiments, mobile unit 10 includes data obtaining module 101, data encryption module
102 and data transmission blocks 103.Wherein, data obtaining module 101, for obtaining the information of vehicles of target vehicle.Data add
Close module 102, for generating ciphered data information using the information of vehicles.Data transmission blocks 103 are used for the encryption
Data information is sent to the terminal device, the ciphered data information is sent to the service by the terminal device
Device, so that whether the server detects the information of vehicles of the target vehicle by illegally repairing according to the ciphered data information
Change.
In some embodiments, mobile unit is stored with device private, device certificate and server public key, the data
Encrypting module 102 is also used to: generating key according to the device private and the server public key;Using described in the key pair
Information of vehicles is encrypted to generate encryption information of vehicles;The encryption information of vehicles is signed using the device private
Name, to obtain the encryption information of vehicles of signature;The encryption information of vehicles of the signature and the device certificate are packaged, to generate
Ciphered data information.
In some embodiments, the mobile unit further includes information request module 104 and command reception module 105,
Wherein, information request module 104, for issuing the request for obtaining the information of vehicles of target vehicle to the server, so that institute
Server is stated to receive and respond described request to terminal device transmission wake up instruction.
Command reception module 105 is transmitted to described vehicle-mounted set for receiving the wake up instruction, and by the wake up instruction
It is standby, so that the mobile unit receives the wake up instruction, to obtain the information of vehicles of target vehicle according to the wake up instruction.
Wherein, the information of vehicles includes GPS position information, and the GPS position information is by being set to target vehicle or vehicle
The GPS positioning device carried in equipment 10 obtains.
Please refer to Fig. 5 B, in some embodiments, mobile unit 10 include first memory 106, first processor 107 with
And first bus 108, first memory 106 are electrically connected by the first bus 108 with first processor 107.
First memory 106 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory,
Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..First storage
Device 106 can be the internal storage unit of mobile unit, such as the hard disk of the mobile unit in some embodiments.First storage
What device 106 was also possible to be equipped on the External memory equipment of mobile unit 10, such as mobile unit 10 in further embodiments
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..First memory 106 can be not only used for storage and be installed on the application software of mobile unit and each
Class data, such as the code of computer-readable program etc., can be also used for temporarily storing and have exported or will export
Data namely the first memory can be used as storage medium.
First processor 107 can be in some embodiments central processing unit (Central Processing Unit,
CPU), controller, microcontroller, microprocessor or other data processing chips, first processor 107 can call first memory
The program code or processing data stored in 106, to realize following steps:
Obtain the information of vehicles of target vehicle;
Ciphered data information is generated using the information of vehicles;
The ciphered data information is sent to the terminal device, with by the terminal device by the encryption data
Information is sent to the server, so that the server detects the vehicle of the target vehicle according to the ciphered data information
Whether information passes through illegal modifications.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, and first
Processor 107 is also used to perform the steps of
Key is generated according to the device private and the server public key;
It is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;
It is signed using the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;
The encryption information of vehicles of the signature and the device certificate are packaged, to generate ciphered data information.
In some embodiments, first processor 107 is also used to perform the steps of
The request for obtaining the information of vehicles of target vehicle is issued to the server, so that the server is received and responded
It is described to request to send wake up instruction to the terminal device;
The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that the mobile unit
The wake up instruction is received, to obtain the information of vehicles of target vehicle according to the wake up instruction.
In some embodiments, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle
Or the mobile unit on GPS positioning device obtain.
In some embodiments, the application also provides a kind of storage medium, and the storage medium is stored with executable add
Decryption method program, the encryption method program are performed, and realize following encryption method step:
Obtain the information of vehicles of target vehicle;
Ciphered data information is generated using the information of vehicles;
The ciphered data information is sent to the terminal device, with by the terminal device by the encryption data
Information is sent to the server, so that the server detects the vehicle of the target vehicle according to the ciphered data information
Whether information passes through illegal modifications.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, described
Encryption method program is performed, and realizes following encryption method step:
Key is generated according to the device private and the server public key;
It is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;
It is signed using the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;
The encryption information of vehicles of the signature and the device certificate are packaged, to generate ciphered data information.
In some embodiments, the encryption method program is performed, and realizes following encryption method step:
The request for obtaining the information of vehicles of target vehicle is issued to the server, so that the server is received and responded
It is described to request to send wake up instruction to the terminal device;
The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that the mobile unit
The wake up instruction is received, to obtain the information of vehicles of target vehicle according to the wake up instruction.
In some embodiments, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle
Or the mobile unit on GPS positioning device obtain.
Fig. 6 A is please referred to, in some embodiments, which includes receiving module 301 and detection module 302.
Wherein, the first receiving module 301, the ciphered data information sent for receiving the terminal device, wherein described
Ciphered data information is the information of vehicles that the mobile unit obtains target vehicle, generates the encryption according to the information of vehicles
Data information, and the ciphered data information is sent to the terminal device, so that the terminal device is by the encryption number
It is believed that breath is sent to the server.
Whether detection module 302, the information of vehicles for detecting the target vehicle according to the ciphered data information pass through
Cross illegal modifications.
In section Example, the mobile unit is stored with device private, device certificate and server public key, the benefit
Ciphered data information is generated with the information of vehicles, comprising: the mobile unit is according to the device private and the server
Public key generates key, and is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;It is described vehicle-mounted
Device private described in equipment utilization signs to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;It is described
The encryption information of vehicles of the signature and the device certificate are packaged by mobile unit, to generate ciphered data information.
In section Example, the server 30 is stored with verifying certificate, and detection module 302 is also used to: being tested described in judgement
Whether the device certificate demonstrate,proved in certificate and the ciphered data information is that same certificate server is signed and issued;If it is not, then judging
The information of vehicles of the target vehicle passes through illegal modifications.
In section Example, the server 30 is also stored with privacy key, and detection module 302 is also used to: if verifying
The device certificate in certificate and the ciphered data information is that same certificate server is signed and issued, then the server is according to institute
State equipment public key and the privacy key and generate solution confidential information, and according to the solution confidential information to the encryption information of vehicles into
Row decryption, to obtain decryption information of vehicles;If successful decryption, equipment public key described in the server by utilizing is to the decryption vehicle
Information carries out signature verification;If signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications.
If signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
In section Example, the server 30 further includes the second receiving module 303 and respond module 304, wherein second
Receiving module 303 is used to receive the terminal device and issues the request for obtaining the information of vehicles of target vehicle;
Respond module 304 is for responding the request, and Xiang Suoshu terminal device sends wake up instruction, so that the terminal is set
It is standby that the wake up instruction is transmitted to the mobile unit, and the mobile unit is made to obtain target carriage according to the wake up instruction
Information of vehicles.
Please refer to Fig. 6 B, in some embodiments, server 80 include second memory 305, second processor 306 and
Second bus 307,305 second bus 307 of second memory are electrically connected with second processor 306.
Second memory 305 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory,
Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..Second storage
Device 305 can be the internal storage unit of mobile unit, such as the hard disk of the mobile unit in some embodiments.Second storage
Device 305 is also possible to the grafting being equipped on the External memory equipment of server 30, such as server 30 in further embodiments
Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card
(Flash Card) etc..Second memory 305 can be not only used for storing the application software for being installed on mobile unit and all kinds of numbers
According to, such as code of computer-readable program etc., it can be also used for temporarily storing the data that has exported or will export,
Namely the second memory can be used as storage medium.
Second processor 306 can be in some embodiments central processing unit (Central Processing Unit,
CPU), controller, microcontroller, microprocessor or other data processing chips, second processor 306 can call second memory
The program code or processing data stored in 305, realizes following steps:
Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is described vehicle-mounted sets
The standby information of vehicles for obtaining target vehicle generates the ciphered data information according to the information of vehicles, and by the encryption number
It is believed that breath is sent to the terminal device, so that the ciphered data information is sent to the server by the terminal device;
Whether pass through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, described
Ciphered data information is generated according to the information of vehicles, comprising:
The mobile unit generates key according to the device private and the server public key, and utilizes the key pair
The information of vehicles is encrypted to generate encryption information of vehicles;
The mobile unit signs to the encryption information of vehicles using the device private, to obtain adding for signature
Close information of vehicles;
The encryption information of vehicles of the signature and the device certificate are packaged by the mobile unit, to generate encryption data
Information.
In section Example, the server is stored with verifying certificate, and second processor 306 is also used to realize following step
It is rapid:
Judge whether the device certificate in the verifying certificate and the ciphered data information is same authentication service
Device is signed and issued;
If it is not, then judging the information of vehicles of the target vehicle by illegal modifications.
In section Example, the server is also stored with privacy key, and second processor 306 is also used to realize as follows
Step:
If so, the server is generated according to the equipment public key and the privacy key solves confidential information, and according to
The encryption information of vehicles is decrypted in the solution confidential information, to obtain decryption information of vehicles;
If successful decryption, equipment public key described in the server by utilizing carries out signature to the decryption information of vehicles and tests
Card;
If signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications;
If signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
In section Example, second processor 306 is also used to realize following steps:
It receives the terminal device and issues the request for obtaining the information of vehicles of target vehicle;
The request is responded, Xiang Suoshu terminal device sends wake up instruction, so that the terminal device refers to the wake-up
Order is transmitted to the mobile unit, and makes the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
The application provides a kind of storage medium, and the storage medium is stored with executable encryption method program, described to add
Decryption method program is performed, and realizes encryption method step:
Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is described vehicle-mounted sets
The standby information of vehicles for obtaining target vehicle generates the ciphered data information according to the information of vehicles, and by the encryption number
It is believed that breath is sent to the terminal device, so that the ciphered data information is sent to the server by the terminal device;
Whether pass through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, described
Ciphered data information is generated according to the information of vehicles, comprising:
The mobile unit generates key according to the device private and the server public key, and utilizes the key pair
The information of vehicles is encrypted to generate encryption information of vehicles;
The mobile unit signs to the encryption information of vehicles using the device private, to obtain adding for signature
Close information of vehicles;
The encryption information of vehicles of the signature and the device certificate are packaged by the mobile unit, to generate encryption data
Information.
In section Example, the server is stored with verifying certificate, and the encryption method program is performed, and realizes and adds
Decryption method step:
Judge whether the device certificate in the verifying certificate and the ciphered data information is same authentication service
Device is signed and issued;If it is not, then judging the information of vehicles of the target vehicle by illegal modifications.
In section Example, the server is also stored with privacy key, and the encryption method program is performed, real
Existing encryption method step:
If so, the server is generated according to the equipment public key and the privacy key solves confidential information, and according to
The encryption information of vehicles is decrypted in the solution confidential information, to obtain decryption information of vehicles;
If successful decryption, equipment public key described in the server by utilizing carries out signature to the decryption information of vehicles and tests
Card;
If signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications;
If signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
In section Example, the encryption method program is performed, and realizes encryption method step:
It receives the terminal device and issues the request for obtaining the information of vehicles of target vehicle;
The request is responded, Xiang Suoshu terminal device sends wake up instruction, so that the terminal device refers to the wake-up
Order is transmitted to the mobile unit, and makes the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
The above is only preferred embodiment of the present application, are not intended to limit the protection scope of the application, all to utilize this Shen
Please equivalent structure or equivalent flow shift made by specification and accompanying drawing content, be applied directly or indirectly in other relevant skills
Art field similarly includes within the scope of protection of this application.
Claims (10)
1. a kind of encryption method of information of vehicles is applied to mobile unit, the mobile unit is connect with terminal equipment in communication, with
It is connect by the terminal device with server communication, which is characterized in that the described method includes:
Obtain the information of vehicles of target vehicle;
Ciphered data information is generated using the information of vehicles;
The ciphered data information is sent to the terminal device, to pass through the terminal device for the ciphered data information
It is sent to the server, so that the server detects the information of vehicles of the target vehicle according to the ciphered data information
Whether illegal modifications are passed through.
2. the method as described in claim 1, which is characterized in that the mobile unit be stored with device private, device certificate with
And server public key, it is described to generate ciphered data information using the information of vehicles, comprising:
Key is generated according to the device private and the server public key;
It is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;
It is signed using the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;
The encryption information of vehicles of the signature and the device certificate are packaged, to generate ciphered data information.
3. according to the method described in claim 1, it is characterized by: it is described obtain target vehicle information of vehicles before, institute
State method further include:
The request for obtaining the information of vehicles of target vehicle is issued to the server, so that the server is received and responded described
It requests to send wake up instruction to the terminal device;
The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that the mobile unit receives
The wake up instruction, to obtain the information of vehicles of target vehicle according to the wake up instruction.
4. method according to claim 1 to 3, it is characterised in that: the information of vehicles includes GPS location letter
Breath, the GPS position information are obtained by the GPS positioning device being set on vehicle or the mobile unit.
5. a kind of encryption method of information of vehicles, the server of the encryption system applied to information of vehicles, the information of vehicles
Encryption system further includes the terminal device connecting with the server communication and connect with the terminal equipment in communication vehicle-mounted
Equipment, which is characterized in that the described method includes:
Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is that the mobile unit obtains
The information of vehicles for taking target vehicle generates the ciphered data information according to the information of vehicles, and the encryption data is believed
Breath is sent to the terminal device, so that the ciphered data information is sent to the server by the terminal device;
Whether pass through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
6. a kind of encryption method of information of vehicles, the encryption system applied to information of vehicles, which is characterized in that the information of vehicles
Encryption system include server, the terminal device connecting with the server communication and connect with the terminal equipment in communication
Mobile unit, which is characterized in that the described method includes:
The mobile unit obtains the information of vehicles of target vehicle, generates ciphered data information using the information of vehicles;
The ciphered data information is sent to the terminal device by the mobile unit;
The terminal device receives the ciphered data information, and the ciphered data information is sent to the server;
The server receives the ciphered data information, and the vehicle of the target vehicle is detected according to the ciphered data information
Whether information passes through illegal modifications.
7. a kind of mobile unit, which is characterized in that the mobile unit includes:
Data obtaining module, for obtaining the information of vehicles of target vehicle;
Data encryption module, for generating ciphered data information using the information of vehicles;
Data transmission blocks, for the ciphered data information to be sent to the terminal device, to pass through the terminal device
The ciphered data information is sent to the server, so that the server is according to ciphered data information detection
Whether the information of vehicles of target vehicle passes through illegal modifications.
8. a kind of mobile unit, which is characterized in that the mobile unit includes:
Memory, for storing the executable encryption method program of computer;And
Processor, the processor are used to transfer the encryption method program of storage in the memory to execute such as claim
The described in any item methods of 1-4.
9. a kind of server, which is characterized in that the server includes:
Receiving module, the ciphered data information sent for receiving the terminal device, wherein the ciphered data information is institute
The information of vehicles that mobile unit obtains target vehicle is stated, the ciphered data information is generated according to the information of vehicles, and by institute
State ciphered data information and be sent to the terminal device so that the terminal device ciphered data information is sent to it is described
Server;And
Detection module, for whether detecting the information of vehicles of the target vehicle according to the ciphered data information by illegally repairing
Change.
10. a kind of server, which is characterized in that the server includes:
Memory, for storing the executable encryption method program of computer;And
Processor, the processor are configured for the encryption method program transferred Cun Chu in the memory to execute such as power
Benefit require 5 described in method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458680.4A CN110191415B (en) | 2019-05-29 | 2019-05-29 | Vehicle information encryption method, vehicle-mounted equipment and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458680.4A CN110191415B (en) | 2019-05-29 | 2019-05-29 | Vehicle information encryption method, vehicle-mounted equipment and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110191415A true CN110191415A (en) | 2019-08-30 |
CN110191415B CN110191415B (en) | 2022-01-25 |
Family
ID=67718713
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910458680.4A Active CN110191415B (en) | 2019-05-29 | 2019-05-29 | Vehicle information encryption method, vehicle-mounted equipment and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110191415B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110753345A (en) * | 2019-10-08 | 2020-02-04 | 武汉光庭信息技术股份有限公司 | TBox communication method and TBox device |
CN110969723A (en) * | 2019-11-11 | 2020-04-07 | 深圳市元征科技股份有限公司 | Data management method, detection device, server, and computer-readable storage medium |
CN111724494A (en) * | 2020-06-27 | 2020-09-29 | 北京百度网讯科技有限公司 | Traffic information processing method and device, electronic equipment and storage medium |
TWI738551B (en) * | 2020-10-28 | 2021-09-01 | 中華汽車工業股份有限公司 | Pluggable vehicle control device, vehicle control system and vehicle control method |
CN113918928A (en) * | 2021-10-28 | 2022-01-11 | Oppo广东移动通信有限公司 | Vehicle management method and device, storage medium and electronic equipment |
CN115225399A (en) * | 2022-07-22 | 2022-10-21 | 蔚来汽车科技(安徽)有限公司 | A vehicle alarm information processing system and method |
CN115225398A (en) * | 2022-07-22 | 2022-10-21 | 蔚来汽车科技(安徽)有限公司 | A vehicle alarm information processing system and method |
CN115242841A (en) * | 2022-07-22 | 2022-10-25 | 蔚来汽车科技(安徽)有限公司 | A vehicle operation log processing system and method |
CN118741518A (en) * | 2024-09-04 | 2024-10-01 | 杭州锘崴信息科技有限公司 | Intelligent vehicle data information trusted verification method and device based on trusted computing |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6968060B1 (en) * | 1999-02-11 | 2005-11-22 | Bull, S.A. | Method for verifying the use of public keys generated by an on-board system |
CN101420306A (en) * | 2008-12-12 | 2009-04-29 | 肖佐楠 | Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm |
CN108055236A (en) * | 2017-11-03 | 2018-05-18 | 深圳市轱辘车联数据技术有限公司 | A kind of data processing method, mobile unit and electronic equipment |
CN109587164A (en) * | 2018-12-27 | 2019-04-05 | 深圳市元征科技股份有限公司 | A kind of information encrypting transmission method, device, equipment and storage medium |
CN109618313A (en) * | 2017-09-30 | 2019-04-12 | 厦门歌乐电子企业有限公司 | A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system |
WO2019075408A1 (en) * | 2017-10-13 | 2019-04-18 | FLIR Unmanned Aerial Systems AS | Encryption and decryption of media data |
-
2019
- 2019-05-29 CN CN201910458680.4A patent/CN110191415B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6968060B1 (en) * | 1999-02-11 | 2005-11-22 | Bull, S.A. | Method for verifying the use of public keys generated by an on-board system |
CN101420306A (en) * | 2008-12-12 | 2009-04-29 | 肖佐楠 | Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm |
CN109618313A (en) * | 2017-09-30 | 2019-04-12 | 厦门歌乐电子企业有限公司 | A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system |
WO2019075408A1 (en) * | 2017-10-13 | 2019-04-18 | FLIR Unmanned Aerial Systems AS | Encryption and decryption of media data |
CN108055236A (en) * | 2017-11-03 | 2018-05-18 | 深圳市轱辘车联数据技术有限公司 | A kind of data processing method, mobile unit and electronic equipment |
CN109587164A (en) * | 2018-12-27 | 2019-04-05 | 深圳市元征科技股份有限公司 | A kind of information encrypting transmission method, device, equipment and storage medium |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110753345A (en) * | 2019-10-08 | 2020-02-04 | 武汉光庭信息技术股份有限公司 | TBox communication method and TBox device |
CN110753345B (en) * | 2019-10-08 | 2022-11-25 | 武汉光庭信息技术股份有限公司 | TBox communication method and TBox device |
CN110969723A (en) * | 2019-11-11 | 2020-04-07 | 深圳市元征科技股份有限公司 | Data management method, detection device, server, and computer-readable storage medium |
CN111724494A (en) * | 2020-06-27 | 2020-09-29 | 北京百度网讯科技有限公司 | Traffic information processing method and device, electronic equipment and storage medium |
CN111724494B (en) * | 2020-06-27 | 2022-05-10 | 阿波罗智联(北京)科技有限公司 | Traffic information processing method and device, electronic equipment and storage medium |
TWI738551B (en) * | 2020-10-28 | 2021-09-01 | 中華汽車工業股份有限公司 | Pluggable vehicle control device, vehicle control system and vehicle control method |
CN113918928A (en) * | 2021-10-28 | 2022-01-11 | Oppo广东移动通信有限公司 | Vehicle management method and device, storage medium and electronic equipment |
CN115225399A (en) * | 2022-07-22 | 2022-10-21 | 蔚来汽车科技(安徽)有限公司 | A vehicle alarm information processing system and method |
CN115225398A (en) * | 2022-07-22 | 2022-10-21 | 蔚来汽车科技(安徽)有限公司 | A vehicle alarm information processing system and method |
CN115242841A (en) * | 2022-07-22 | 2022-10-25 | 蔚来汽车科技(安徽)有限公司 | A vehicle operation log processing system and method |
CN118741518A (en) * | 2024-09-04 | 2024-10-01 | 杭州锘崴信息科技有限公司 | Intelligent vehicle data information trusted verification method and device based on trusted computing |
Also Published As
Publication number | Publication date |
---|---|
CN110191415B (en) | 2022-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110191415A (en) | A kind of encryption method of information of vehicles, mobile unit and server | |
CN111181928B (en) | Vehicle diagnosis method, server, and computer-readable storage medium | |
CN101300808B (en) | Method and arrangement for secure autentication | |
US7302252B2 (en) | Authentication systems, wireless communication terminals, and wireless base stations | |
CN111131313A (en) | Safety assurance method and system for replacing ECU in intelligent networked vehicles | |
CN104765357A (en) | Authorization system and method for vehicle remote diagnosis | |
US20080189772A1 (en) | Method for generating digital fingerprint using pseudo random number code | |
CN111565182B (en) | Vehicle diagnosis method and device and storage medium | |
CN113138775B (en) | Firmware protection method and system for vehicle-mounted diagnosis system | |
CN109190362B (en) | Secure communication method and related equipment | |
EP3017580A1 (en) | Signatures for near field communications | |
CN112165382A (en) | Software authorization method and device, authorization server and terminal equipment | |
CN102546172A (en) | Access control method of intelligent card, intelligent card, terminal and system | |
Ammar et al. | Securing the on-board diagnostics port (obd-ii) in vehicles | |
CN112506267B (en) | RTC calibration method, vehicle-mounted terminal, user and storage medium | |
CN104796262B (en) | Data ciphering method and terminal system | |
CN109743334A (en) | A kind of T-BOX encryption system and method | |
CN113452517A (en) | Key updating method, device, system, storage medium and terminal | |
CN101883357A (en) | Method, device and system for mutual authentication between terminal and intelligent card | |
CN109743283B (en) | Information transmission method and equipment | |
CN107659407A (en) | Method for providing an authenticated connection between at least two communication partners | |
CN110717770A (en) | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts | |
CN107026730A (en) | Data processing method, apparatus and system | |
CN110168550A (en) | Data-message certification based on random number | |
KR102551592B1 (en) | Method for preventing mileage tampering of car and mileage recording device using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |