[go: up one dir, main page]

CN110191415A - A kind of encryption method of information of vehicles, mobile unit and server - Google Patents

A kind of encryption method of information of vehicles, mobile unit and server Download PDF

Info

Publication number
CN110191415A
CN110191415A CN201910458680.4A CN201910458680A CN110191415A CN 110191415 A CN110191415 A CN 110191415A CN 201910458680 A CN201910458680 A CN 201910458680A CN 110191415 A CN110191415 A CN 110191415A
Authority
CN
China
Prior art keywords
information
vehicles
server
ciphered data
mobile unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910458680.4A
Other languages
Chinese (zh)
Other versions
CN110191415B (en
Inventor
刘均
戴凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910458680.4A priority Critical patent/CN110191415B/en
Publication of CN110191415A publication Critical patent/CN110191415A/en
Application granted granted Critical
Publication of CN110191415B publication Critical patent/CN110191415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of encryption method of information of vehicles, mobile unit and servers, wherein this method, using mobile unit, the mobile unit is connect with terminal equipment in communication, to be connect by the terminal device with server communication, which comprises obtain the information of vehicles of target vehicle;Ciphered data information is generated using the information of vehicles;The ciphered data information is sent to the terminal device, the ciphered data information is sent to the server by the terminal device, so that whether the server passes through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.The application is by verifying data, to monitor information of vehicles by whether being tampered in terminal device transfer, it is ensured that the reliability of terminal device interim data.

Description

A kind of encryption method of information of vehicles, mobile unit and server
Technical field
This application involves information monitoring technical field more particularly to a kind of encryption method of information of vehicles, mobile unit and Server.
Background technique
When carrying out vehicle diagnosis, the vehicle of the target vehicle that will be diagnosed for the sensor being set on vehicle is believed Breath uploads to vehicle-mounted OBD equipment, by being sent to the terminal devices such as mobile phone, IPAD with OBD equipment, then by terminal device by vehicle Information of vehicles be sent to server, in this process, transfer of the terminal device as data, and trustless exists The risk modified of the corresponding data of information of vehicles of vehicle, so as to cause when being diagnosed to target vehicle, due to vehicle Information of vehicles distort, lead to the risk of diagnostic result inaccuracy.
Therefore, how to monitor whether information of vehicles is tampered in passing through terminal device transfer, to ensure in terminal device The reliability of revolution evidence is those skilled in the art's technical problem urgently to be resolved.
Summary of the invention
The main purpose of the application is to provide encryption method, mobile unit and the server of a kind of information of vehicles, it is intended to Solve whether monitoring information of vehicles is tampered in passing through terminal device transfer, to ensure the information of vehicles number of terminal device transfer According to reliability.
To achieve the above object, the application provides a kind of encryption method of information of vehicles, is applied to mobile unit, the vehicle It carries equipment to connect with terminal equipment in communication, to connect by the terminal device with server communication, the method includes obtaining The information of vehicles of target vehicle;Ciphered data information is generated using the information of vehicles;The ciphered data information is sent to The terminal device, the ciphered data information is sent to the server by the terminal device, so that the clothes Whether business device passes through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
Preferably, the mobile unit is stored with device private, device certificate and server public key, described in the utilization Information of vehicles generates ciphered data information, comprising: generates key according to the device private and the server public key;Using institute Information of vehicles described in key pair is stated to be encrypted to generate encryption information of vehicles;Using the device private to the encryption vehicle Information is signed, to obtain the encryption information of vehicles of signature;By the encryption information of vehicles and the device certificate of the signature It is packaged, to generate ciphered data information.
Preferably, before the information of vehicles for obtaining target vehicle, the method also includes: Xiang Suoshu server hair The request for obtaining the information of vehicles of target vehicle out, so that the server receives and responds described request to the terminal device Send wake up instruction;The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that described vehicle-mounted Equipment receives the wake up instruction, to obtain the information of vehicles of target vehicle according to the wake up instruction.
Preferably, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle or described GPS positioning device on mobile unit obtains.
To achieve the above object, the application provides a kind of encryption method of information of vehicles, the encryption applied to information of vehicles The server of system, the encryption system of the information of vehicles further include the terminal device being connect with the server communication and with The mobile unit of the terminal equipment in communication connection, which comprises receive the encryption data letter that the terminal device is sent Breath, wherein the ciphered data information is the information of vehicles that the mobile unit obtains target vehicle, according to the information of vehicles The ciphered data information is generated, and the ciphered data information is sent to the terminal device, so that the terminal device The ciphered data information is sent to the server;The vehicle of the target vehicle is detected according to the ciphered data information Whether information passes through illegal modifications.
Preferably, the mobile unit is stored with device private, device certificate and server public key, described according to Information of vehicles generates ciphered data information, comprising: the mobile unit is raw according to the device private and the server public key It is encrypted at key, and using information of vehicles described in the key pair to generate encryption information of vehicles;The mobile unit benefit It is signed with the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;It is described vehicle-mounted to set It is standby to be packaged the encryption information of vehicles of the signature and the device certificate, to generate ciphered data information.
Preferably, the server is stored with verifying certificate, described to detect the target according to the ciphered data information The information of vehicles of vehicle whether pass through illegal modifications include: judge it is described verifying certificate and the ciphered data information in it is described Whether device certificate is that same certificate server is signed and issued;If it is not, then judging the information of vehicles of the target vehicle by illegally repairing Change.
Preferably, the server is also stored with privacy key, and the device certificate includes and the device private pair The equipment public key answered, the method also includes: if so, the server is according to the equipment public key and the privacy key Solution confidential information is generated, and the encryption information of vehicles is decrypted according to the solution confidential information, to obtain decryption information of vehicles; If successful decryption, equipment public key described in the server by utilizing carries out signature verification to the decryption information of vehicles;If signature It verifies unsuccessful, then judges the information of vehicles of the target vehicle by illegal modifications;If signature verification success, described in judgement The information of vehicles of target vehicle is without illegal modifications.
Preferably, the method also includes: receive the terminal device and issue and obtain the information of vehicles of target vehicle and ask It asks;The request is responded, Xiang Suoshu terminal device sends wake up instruction, so that the terminal device forwards the wake up instruction To the mobile unit, and make the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
To achieve the above object, the encryption method that the application provides a kind of information of vehicles is applied to the encryption system of information of vehicles System, the encryption system of the information of vehicles include server, the terminal device being connect with the server communication and with it is described The mobile unit of terminal equipment in communication connection, which comprises the mobile unit obtains the information of vehicles of target vehicle, benefit Ciphered data information is generated with the information of vehicles;The ciphered data information is sent to the terminal and set by the mobile unit It is standby;The terminal device receives the ciphered data information, and the ciphered data information is sent to the server;It is described Server receives the ciphered data information, and is according to the information of vehicles that the ciphered data information detects the target vehicle It is no to pass through illegal modifications.
To achieve the above object, the application provides a kind of mobile unit, and the mobile unit includes: data obtaining module, For obtaining the information of vehicles of target vehicle;Data encryption module, for generating ciphered data information using the information of vehicles; Data transmission blocks, for the ciphered data information to be sent to the terminal device, to pass through the terminal device for institute It states ciphered data information and is sent to the server, so that the server detects the target according to the ciphered data information Whether the information of vehicles of vehicle passes through illegal modifications.
Preferably, the mobile unit is stored with device private, device certificate and server public key, the data encryption Module is also used to: generating key according to the device private and the server public key;Believed using vehicle described in the key pair Breath is encrypted to generate encryption information of vehicles;It is signed using the device private to the encryption information of vehicles, to obtain Take the encryption information of vehicles of signature;The encryption information of vehicles of the signature and the device certificate are packaged, to generate encryption number It is believed that breath.
Preferably, the mobile unit further includes information request module and command reception module, wherein the information is asked Modulus block, for issuing the request for obtaining the information of vehicles of target vehicle to the server, so that the server receives simultaneously Respond described request to terminal device transmission wake up instruction;Described instruction receiving module, for receiving the wake up instruction, And the wake up instruction is transmitted to the mobile unit, so that the mobile unit receives the wake up instruction, according to institute State the information of vehicles that wake up instruction obtains target vehicle.
Preferably, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle or described GPS positioning device on mobile unit obtains.
To achieve the above object, the application provides a kind of mobile unit, and the mobile unit includes: memory, for depositing Store up the executable encryption method program of computer;And processor, the processor, which is configured for transferring, is stored in described deposit Encryption method program in reservoir is to execute method above-mentioned.
To achieve the above object, the application provides a kind of server, and the server includes the first receiving module, for connecing Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is that the mobile unit obtains target The information of vehicles of vehicle generates the ciphered data information according to the information of vehicles, and the ciphered data information is sent To the terminal device, so that the ciphered data information is sent to the server by the terminal device;And detection mould Whether block, the information of vehicles for detecting the target vehicle according to the ciphered data information pass through illegal modifications.
Preferably, the mobile unit is stored with device private, device certificate and server public key, described according to Information of vehicles generates ciphered data information, comprising: the mobile unit is raw according to the device private and the server public key It is encrypted at key, and using information of vehicles described in the key pair to generate encryption information of vehicles;The mobile unit benefit It is signed with the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;It is described vehicle-mounted to set It is standby to be packaged the encryption information of vehicles of the signature and the device certificate, to generate ciphered data information.
Preferably, the server is stored with verifying certificate, and the detection module is also used to: judge the verifying certificate and Whether the device certificate in the ciphered data information is that same certificate server is signed and issued;If it is not, then judging the target The information of vehicles of vehicle passes through illegal modifications.
Preferably, the server is also stored with privacy key, and the device certificate includes and the device private pair The equipment public key answered, the detection module are also used to: if so, the server is according to the equipment public key and the server Private key generates solution confidential information, and the encryption information of vehicles is decrypted according to the solution confidential information, to obtain decryption vehicle Information;If successful decryption, equipment public key described in the server by utilizing carries out signature verification to the decryption information of vehicles;If Signature verification is unsuccessful, then judges the information of vehicles of the target vehicle by illegal modifications;If signature verification success, judges The information of vehicles of the target vehicle is without illegal modifications.
Preferably, the server further includes the second receiving module and respond module, wherein described second receives mould Block, the request for issuing the information of vehicles of acquisition target vehicle for receiving the terminal device;The respond module, for responding The request, Xiang Suoshu terminal device send wake up instruction so that the terminal device wake up instruction is transmitted to it is described Mobile unit, and make the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
To achieve the above object, the application provides a kind of server, and the server includes: memory, based on storing The executable encryption method program of calculation machine;And processor, the processor, which is configured for transferring, is stored in the memory In encryption method program to execute method above-mentioned.
Compared with prior art, the application provides encryption method, mobile unit and the server of a kind of information of vehicles.The party Method obtains the information of vehicles of target vehicle by mobile unit, generates ciphered data information using the information of vehicles and is sent to The ciphered data information to receive the ciphered data information by terminal device, and is sent to the clothes by terminal device Business device, so that server receives the ciphered data information, and detects the target vehicle according to the ciphered data information Whether information of vehicles passes through illegal modifications.By being verified to data, to monitor information of vehicles by terminal device transfer In whether be tampered, it is ensured that the reliability of terminal device interim data.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of the encryption method for information of vehicles that the application first embodiment provides.
Fig. 2 is the sub-step flow chart of step S11 in Fig. 1.
Fig. 3 is the sub-step flow chart of step S14 in Fig. 1.
Fig. 4 is a kind of step flow chart of the encryption method for information of vehicles that the application second embodiment provides.
Fig. 5 A is a kind of structural block diagram for mobile unit that the application 3rd embodiment provides.
Fig. 5 B is a kind of structural block diagram for mobile unit that the application fourth embodiment provides.
Fig. 6 A is a kind of structural block diagram for server that the 5th embodiment of the application provides.
Fig. 6 B is a kind of structural block diagram for server that the application sixth embodiment provides.
Specific embodiment
In order to which the objects, technical solutions and advantages of the application are more clearly understood, accompanying drawings and embodiments are combined as follows, it is right The application is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the application, not For limiting the application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein Or the sequence other than the content of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce The other step or units of product or equipment inherently.
It should be noted that the description for being related to " first ", " second " etc. in this application is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not this application claims Protection scope within.
The application provides encryption method, mobile unit, server and the storage medium of a kind of information of vehicles.This method passes through Mobile unit obtains the information of vehicles of target vehicle, generates ciphered data information using the information of vehicles and is sent to terminal and sets It is standby, to receive the ciphered data information by terminal device, and the ciphered data information is sent to the server, with So that server is received the ciphered data information, and detects the information of vehicles of the target vehicle according to the ciphered data information Whether illegal modifications are passed through.By being verified to data, with monitor information of vehicles by terminal device transfer whether by It distorts, it is ensured that the reliability of terminal device interim data.
Referring to Fig. 1, Fig. 1 is a kind of encryption method for information of vehicles that the application first embodiment provides, vehicle letter The encryption method of breath includes:
Step S10: the information of vehicles of mobile unit acquisition target vehicle.
Collecting vehicle information equipment is provided on target vehicle, for acquiring the information of vehicles of vehicle, and by the vehicle Information is sent to mobile unit 10, and the information of vehicles of the vehicle can be the GPS position information of vehicle or the status information of vehicle, Wherein the status information of vehicle can be the speed of vehicle, acceleration, driving direction, any one the more group in course angle It closes.Namely collecting vehicle information equipment can be the corresponding GPS positioning device for obtaining GPS position information or correspond to and obtains vehicle The acceleration transducer or angular transducer of status information.Wherein, GPS positioning device can be set can also set in target vehicle It is placed in mobile unit, herein with no restrictions.
Mobile unit 10 can be vehicle-mounted OBD equipment or be set to other ends communicated to connect on vehicle with terminal device 20 End equipment.
Step S11: the mobile unit generates ciphered data information using the information of vehicles.
Mobile unit 10 obtains the information of vehicles of target vehicle, and the information of vehicles of the acquisition is encrypted and/or signed Processing, to obtain ciphered data information.
Referring to Fig. 2, in some embodiments, the mobile unit 10 is stored with device private, device certificate and clothes Business device public key, device certificate includes equipment public key, and step S11 includes:
Step S111: the mobile unit generates key according to the device private and the server public key.
Step S112: the mobile unit is encrypted using information of vehicles described in the key pair to generate encryption vehicle Information.
Mobile unit 10 carries out key agreement according to the equipment public key and privacy key of storage, to generate key, and benefit It is encrypted with the information of vehicles that the key pair obtains, to generate encryption information of vehicles, wherein key agreement can be preferably ECDH algorithm.
Step S113: the mobile unit signs to the encryption information of vehicles using the device private, to obtain Take the encryption information of vehicles of signature.
Mobile unit 10 signs to encryption information of vehicles using device private, to generate the encryption vehicle letter of signature Breath.
Step S114: the encryption information of vehicles of the signature and the device certificate are packaged by the mobile unit, with life At ciphered data information.
The encryption information of vehicles and device certificate of signature are packaged by mobile unit 10, to generate ciphered data information. Wherein, device certificate includes equipment public key corresponding with device private.
Preferably, device certificate is the certificate of CA server distribution comprising the information of E-VISA organ, public key user Information, equipment public key, the signature of authoritative institution and validity period.
Step S12: the ciphered data information is sent to the terminal device by the mobile unit.
Mobile unit 10 is communicated to connect by the communications such as wifi or bluetooth and terminal device 20, is also possible to lead to It crosses the modes such as data line and terminal device 20 communicates to connect.
The ciphered data information of generation is sent to terminal device 20 by mobile unit 10 by wireless communication, the terminal device 20 can be mobile phone, ipad, laptop etc..
Step S13: the terminal device receives the ciphered data information, and the ciphered data information is sent to institute State server.
Terminal device 20 is connect with server 30 by communications such as mobile, connection or telecommunications.In terminal device After 20 receive the ciphered data information of the transmission of mobile unit 10, which is transmitted to server 30.
Step S14: the server receives the ciphered data information, and according to ciphered data information detection Whether the information of vehicles of target vehicle passes through illegal modifications.
Referring to Fig. 3, in some embodiments, the server 30 is stored with verifying certificate, the verifying certificate is for just Whether step card ciphered data information is modified, the vehicle that the target vehicle is detected according to the ciphered data information Whether information passes through illegal modifications, comprising:
Step S141: the server judges the device certificate in the verifying certificate and the ciphered data information It whether is that same certificate server is signed and issued.
Verifying certificate and device certificate are that same certificate server is signed and issued, and each verifying certificate is corresponding with unique authentication proof Book, it is preferable that the certificate server is CA authentication service device.
It whether is that same certificate server is signed and issued by verifying the verifying certificate and device certificate, so as to preliminary judgement Whether ciphered data information is modified.
Step S142: if it is not, then judging the information of vehicles of the target vehicle by illegal modifications.
If the verifying certificate and device certificate are not that same certificate server is signed and issued, judge that the ciphered data information passes through The information of vehicles of modification namely the target vehicle passes through illegal modifications, and the information of vehicles of the target vehicle is unreliable.
Referring again to Fig. 3, in some embodiments, the server is also stored with privacy key, the device certificate Including equipment public key corresponding with the device private, the method also includes:
Step S143: if so, the server generates solution secret letter according to the equipment public key and the privacy key Breath, and the encryption information of vehicles is decrypted according to the solution confidential information, to obtain decryption information of vehicles.
The solution of corresponding unlocker device private key and the server public key can be generated in equipment public key and the privacy key Confidential information, server 30 can use the solution confidential information and the encryption information of vehicles are decrypted, to obtain decryption vehicle letter Breath, namely obtain the information of vehicles of the target vehicle of signature.
For example, key 001 can be generated in device private and the server public key, then equipment public key and the server are private Corresponding unlocking pin 001 also can be generated in key, and can be unlocked using the password can by device private and the server public key The data encrypted with the key of generation.
Step S144: if decryption is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications.
If decryption is unsuccessful, may illegally be distorted namely the vehicle of the target vehicle for the encryption information of vehicles Information passes through illegal modifications.
Referring again to Fig. 3, in some embodiments, the method also includes:
Step S145: if successful decryption, equipment public key described in the server by utilizing to the decryption information of vehicles into Row signature verification.
If successful decryption, equipment public key described in the server by utilizing carries out signature to the decryption information of vehicles and tests Card.
For example, reserved signing messages is 007, then server benefit when device private signs to encryption information of vehicles The signature is verified with equipment public key corresponding with the device private, whether corresponding with device private detects the signing messages Signing messages it is identical, if they are the same then signature verification success, signature verification is unsuccessful if not identical.
Step S146: if signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications.
Step S147: if signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
Referring to Fig. 4, Fig. 4 is a kind of encryption method for information of vehicles that the application second embodiment provides, this method packet It includes: step S20-S27.
Step S20: the terminal device issues the request for obtaining the information of vehicles of target vehicle to the server.
Terminal device 20 issues the request for obtaining the information of vehicles of target vehicle to server 30, which includes for obtaining The information of the mobile unit 10 of the information of vehicles of target vehicle is taken, so that server 30 is according to the request to corresponding mobile unit 10 send wake up instruction, so that corresponding mobile unit 10 be made to respond the information of vehicles that the wake up instruction obtains target vehicle.
Step S21: the server receives and responds described request to terminal device transmission wake up instruction.
The request that 30 receiving terminal apparatus 20 of server is sent, and according to 10 information of the mobile unit generation pair in the request Mobile unit 10 on the wake up target vehicle answered obtains the wake up instruction of the information of vehicles of target vehicle, and by the wake up instruction It is sent to terminal device 20, to be sent to corresponding mobile unit 10 by terminal device 20, so that corresponding mobile unit 10 Response wake up instruction obtain target vehicle information of vehicles.
Step S22: the terminal device receives the wake up instruction, and the wake up instruction is transmitted to corresponding vehicle-mounted Equipment.
Terminal device 20 receives wake up instruction, and the wake up instruction is transmitted to all mobile units for communicating connection 10 or the specified correspondence mobile unit 10 of the wake up instruction.
Step S23: the mobile unit receives the wake up instruction, to obtain target vehicle according to the wake up instruction Information of vehicles.
After mobile unit 10 receives wake up instruction, obtain the information of vehicles of target vehicle, will to the information of vehicles into Row encrypts and is sent to server 30 by terminal device 20.
Step S24: the mobile unit obtains the information of vehicles of target vehicle.
Step S24 is identical as step S10 in Fig. 1, and this will not be repeated here.
Step S25: ciphered data information is generated using the information of vehicles.
Step S25 is identical as step S11 in Fig. 1, and this will not be repeated here.
Step S26: the ciphered data information is sent to the terminal device by the mobile unit.
Step S26 is identical as step S12 in Fig. 1, and this will not be repeated here.
Step S27: the terminal device receives the ciphered data information, and the ciphered data information is sent to institute State server.
Step S27 is identical as step S13 in Fig. 1, and this will not be repeated here.
Step S28: the server receives the ciphered data information, and according to ciphered data information detection Whether the information of vehicles of target vehicle passes through illegal modifications.
Step S28 is identical as step S14 in Fig. 1, and this will not be repeated here.
Fig. 5 A is please referred to, in some embodiments, mobile unit 10 includes data obtaining module 101, data encryption module 102 and data transmission blocks 103.Wherein, data obtaining module 101, for obtaining the information of vehicles of target vehicle.Data add Close module 102, for generating ciphered data information using the information of vehicles.Data transmission blocks 103 are used for the encryption Data information is sent to the terminal device, the ciphered data information is sent to the service by the terminal device Device, so that whether the server detects the information of vehicles of the target vehicle by illegally repairing according to the ciphered data information Change.
In some embodiments, mobile unit is stored with device private, device certificate and server public key, the data Encrypting module 102 is also used to: generating key according to the device private and the server public key;Using described in the key pair Information of vehicles is encrypted to generate encryption information of vehicles;The encryption information of vehicles is signed using the device private Name, to obtain the encryption information of vehicles of signature;The encryption information of vehicles of the signature and the device certificate are packaged, to generate Ciphered data information.
In some embodiments, the mobile unit further includes information request module 104 and command reception module 105, Wherein, information request module 104, for issuing the request for obtaining the information of vehicles of target vehicle to the server, so that institute Server is stated to receive and respond described request to terminal device transmission wake up instruction.
Command reception module 105 is transmitted to described vehicle-mounted set for receiving the wake up instruction, and by the wake up instruction It is standby, so that the mobile unit receives the wake up instruction, to obtain the information of vehicles of target vehicle according to the wake up instruction.
Wherein, the information of vehicles includes GPS position information, and the GPS position information is by being set to target vehicle or vehicle The GPS positioning device carried in equipment 10 obtains.
Please refer to Fig. 5 B, in some embodiments, mobile unit 10 include first memory 106, first processor 107 with And first bus 108, first memory 106 are electrically connected by the first bus 108 with first processor 107.
First memory 106 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory, Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..First storage Device 106 can be the internal storage unit of mobile unit, such as the hard disk of the mobile unit in some embodiments.First storage What device 106 was also possible to be equipped on the External memory equipment of mobile unit 10, such as mobile unit 10 in further embodiments Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..First memory 106 can be not only used for storage and be installed on the application software of mobile unit and each Class data, such as the code of computer-readable program etc., can be also used for temporarily storing and have exported or will export Data namely the first memory can be used as storage medium.
First processor 107 can be in some embodiments central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips, first processor 107 can call first memory The program code or processing data stored in 106, to realize following steps:
Obtain the information of vehicles of target vehicle;
Ciphered data information is generated using the information of vehicles;
The ciphered data information is sent to the terminal device, with by the terminal device by the encryption data Information is sent to the server, so that the server detects the vehicle of the target vehicle according to the ciphered data information Whether information passes through illegal modifications.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, and first Processor 107 is also used to perform the steps of
Key is generated according to the device private and the server public key;
It is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;
It is signed using the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;
The encryption information of vehicles of the signature and the device certificate are packaged, to generate ciphered data information.
In some embodiments, first processor 107 is also used to perform the steps of
The request for obtaining the information of vehicles of target vehicle is issued to the server, so that the server is received and responded It is described to request to send wake up instruction to the terminal device;
The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that the mobile unit The wake up instruction is received, to obtain the information of vehicles of target vehicle according to the wake up instruction.
In some embodiments, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle Or the mobile unit on GPS positioning device obtain.
In some embodiments, the application also provides a kind of storage medium, and the storage medium is stored with executable add Decryption method program, the encryption method program are performed, and realize following encryption method step:
Obtain the information of vehicles of target vehicle;
Ciphered data information is generated using the information of vehicles;
The ciphered data information is sent to the terminal device, with by the terminal device by the encryption data Information is sent to the server, so that the server detects the vehicle of the target vehicle according to the ciphered data information Whether information passes through illegal modifications.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, described Encryption method program is performed, and realizes following encryption method step:
Key is generated according to the device private and the server public key;
It is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;
It is signed using the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;
The encryption information of vehicles of the signature and the device certificate are packaged, to generate ciphered data information.
In some embodiments, the encryption method program is performed, and realizes following encryption method step:
The request for obtaining the information of vehicles of target vehicle is issued to the server, so that the server is received and responded It is described to request to send wake up instruction to the terminal device;
The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that the mobile unit The wake up instruction is received, to obtain the information of vehicles of target vehicle according to the wake up instruction.
In some embodiments, the information of vehicles includes GPS position information, and the GPS position information is by being set to vehicle Or the mobile unit on GPS positioning device obtain.
Fig. 6 A is please referred to, in some embodiments, which includes receiving module 301 and detection module 302.
Wherein, the first receiving module 301, the ciphered data information sent for receiving the terminal device, wherein described Ciphered data information is the information of vehicles that the mobile unit obtains target vehicle, generates the encryption according to the information of vehicles Data information, and the ciphered data information is sent to the terminal device, so that the terminal device is by the encryption number It is believed that breath is sent to the server.
Whether detection module 302, the information of vehicles for detecting the target vehicle according to the ciphered data information pass through Cross illegal modifications.
In section Example, the mobile unit is stored with device private, device certificate and server public key, the benefit Ciphered data information is generated with the information of vehicles, comprising: the mobile unit is according to the device private and the server Public key generates key, and is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;It is described vehicle-mounted Device private described in equipment utilization signs to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;It is described The encryption information of vehicles of the signature and the device certificate are packaged by mobile unit, to generate ciphered data information.
In section Example, the server 30 is stored with verifying certificate, and detection module 302 is also used to: being tested described in judgement Whether the device certificate demonstrate,proved in certificate and the ciphered data information is that same certificate server is signed and issued;If it is not, then judging The information of vehicles of the target vehicle passes through illegal modifications.
In section Example, the server 30 is also stored with privacy key, and detection module 302 is also used to: if verifying The device certificate in certificate and the ciphered data information is that same certificate server is signed and issued, then the server is according to institute State equipment public key and the privacy key and generate solution confidential information, and according to the solution confidential information to the encryption information of vehicles into Row decryption, to obtain decryption information of vehicles;If successful decryption, equipment public key described in the server by utilizing is to the decryption vehicle Information carries out signature verification;If signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications. If signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
In section Example, the server 30 further includes the second receiving module 303 and respond module 304, wherein second Receiving module 303 is used to receive the terminal device and issues the request for obtaining the information of vehicles of target vehicle;
Respond module 304 is for responding the request, and Xiang Suoshu terminal device sends wake up instruction, so that the terminal is set It is standby that the wake up instruction is transmitted to the mobile unit, and the mobile unit is made to obtain target carriage according to the wake up instruction Information of vehicles.
Please refer to Fig. 6 B, in some embodiments, server 80 include second memory 305, second processor 306 and Second bus 307,305 second bus 307 of second memory are electrically connected with second processor 306.
Second memory 305 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory, Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..Second storage Device 305 can be the internal storage unit of mobile unit, such as the hard disk of the mobile unit in some embodiments.Second storage Device 305 is also possible to the grafting being equipped on the External memory equipment of server 30, such as server 30 in further embodiments Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Second memory 305 can be not only used for storing the application software for being installed on mobile unit and all kinds of numbers According to, such as code of computer-readable program etc., it can be also used for temporarily storing the data that has exported or will export, Namely the second memory can be used as storage medium.
Second processor 306 can be in some embodiments central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips, second processor 306 can call second memory The program code or processing data stored in 305, realizes following steps:
Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is described vehicle-mounted sets The standby information of vehicles for obtaining target vehicle generates the ciphered data information according to the information of vehicles, and by the encryption number It is believed that breath is sent to the terminal device, so that the ciphered data information is sent to the server by the terminal device;
Whether pass through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, described Ciphered data information is generated according to the information of vehicles, comprising:
The mobile unit generates key according to the device private and the server public key, and utilizes the key pair The information of vehicles is encrypted to generate encryption information of vehicles;
The mobile unit signs to the encryption information of vehicles using the device private, to obtain adding for signature Close information of vehicles;
The encryption information of vehicles of the signature and the device certificate are packaged by the mobile unit, to generate encryption data Information.
In section Example, the server is stored with verifying certificate, and second processor 306 is also used to realize following step It is rapid:
Judge whether the device certificate in the verifying certificate and the ciphered data information is same authentication service Device is signed and issued;
If it is not, then judging the information of vehicles of the target vehicle by illegal modifications.
In section Example, the server is also stored with privacy key, and second processor 306 is also used to realize as follows Step:
If so, the server is generated according to the equipment public key and the privacy key solves confidential information, and according to The encryption information of vehicles is decrypted in the solution confidential information, to obtain decryption information of vehicles;
If successful decryption, equipment public key described in the server by utilizing carries out signature to the decryption information of vehicles and tests Card;
If signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications;
If signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
In section Example, second processor 306 is also used to realize following steps:
It receives the terminal device and issues the request for obtaining the information of vehicles of target vehicle;
The request is responded, Xiang Suoshu terminal device sends wake up instruction, so that the terminal device refers to the wake-up Order is transmitted to the mobile unit, and makes the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
The application provides a kind of storage medium, and the storage medium is stored with executable encryption method program, described to add Decryption method program is performed, and realizes encryption method step:
Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is described vehicle-mounted sets The standby information of vehicles for obtaining target vehicle generates the ciphered data information according to the information of vehicles, and by the encryption number It is believed that breath is sent to the terminal device, so that the ciphered data information is sent to the server by the terminal device;
Whether pass through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
In some embodiments, the mobile unit is stored with device private, device certificate and server public key, described Ciphered data information is generated according to the information of vehicles, comprising:
The mobile unit generates key according to the device private and the server public key, and utilizes the key pair The information of vehicles is encrypted to generate encryption information of vehicles;
The mobile unit signs to the encryption information of vehicles using the device private, to obtain adding for signature Close information of vehicles;
The encryption information of vehicles of the signature and the device certificate are packaged by the mobile unit, to generate encryption data Information.
In section Example, the server is stored with verifying certificate, and the encryption method program is performed, and realizes and adds Decryption method step:
Judge whether the device certificate in the verifying certificate and the ciphered data information is same authentication service Device is signed and issued;If it is not, then judging the information of vehicles of the target vehicle by illegal modifications.
In section Example, the server is also stored with privacy key, and the encryption method program is performed, real Existing encryption method step:
If so, the server is generated according to the equipment public key and the privacy key solves confidential information, and according to The encryption information of vehicles is decrypted in the solution confidential information, to obtain decryption information of vehicles;
If successful decryption, equipment public key described in the server by utilizing carries out signature to the decryption information of vehicles and tests Card;
If signature verification is unsuccessful, judge the information of vehicles of the target vehicle by illegal modifications;
If signature verification success, judges the information of vehicles of the target vehicle without illegal modifications.
In section Example, the encryption method program is performed, and realizes encryption method step:
It receives the terminal device and issues the request for obtaining the information of vehicles of target vehicle;
The request is responded, Xiang Suoshu terminal device sends wake up instruction, so that the terminal device refers to the wake-up Order is transmitted to the mobile unit, and makes the mobile unit according to the information of vehicles of wake up instruction acquisition target vehicle.
The above is only preferred embodiment of the present application, are not intended to limit the protection scope of the application, all to utilize this Shen Please equivalent structure or equivalent flow shift made by specification and accompanying drawing content, be applied directly or indirectly in other relevant skills Art field similarly includes within the scope of protection of this application.

Claims (10)

1. a kind of encryption method of information of vehicles is applied to mobile unit, the mobile unit is connect with terminal equipment in communication, with It is connect by the terminal device with server communication, which is characterized in that the described method includes:
Obtain the information of vehicles of target vehicle;
Ciphered data information is generated using the information of vehicles;
The ciphered data information is sent to the terminal device, to pass through the terminal device for the ciphered data information It is sent to the server, so that the server detects the information of vehicles of the target vehicle according to the ciphered data information Whether illegal modifications are passed through.
2. the method as described in claim 1, which is characterized in that the mobile unit be stored with device private, device certificate with And server public key, it is described to generate ciphered data information using the information of vehicles, comprising:
Key is generated according to the device private and the server public key;
It is encrypted using information of vehicles described in the key pair to generate encryption information of vehicles;
It is signed using the device private to the encryption information of vehicles, to obtain the encryption information of vehicles of signature;
The encryption information of vehicles of the signature and the device certificate are packaged, to generate ciphered data information.
3. according to the method described in claim 1, it is characterized by: it is described obtain target vehicle information of vehicles before, institute State method further include:
The request for obtaining the information of vehicles of target vehicle is issued to the server, so that the server is received and responded described It requests to send wake up instruction to the terminal device;
The wake up instruction is received, and the wake up instruction is transmitted to the mobile unit, so that the mobile unit receives The wake up instruction, to obtain the information of vehicles of target vehicle according to the wake up instruction.
4. method according to claim 1 to 3, it is characterised in that: the information of vehicles includes GPS location letter Breath, the GPS position information are obtained by the GPS positioning device being set on vehicle or the mobile unit.
5. a kind of encryption method of information of vehicles, the server of the encryption system applied to information of vehicles, the information of vehicles Encryption system further includes the terminal device connecting with the server communication and connect with the terminal equipment in communication vehicle-mounted Equipment, which is characterized in that the described method includes:
Receive the ciphered data information that the terminal device is sent, wherein the ciphered data information is that the mobile unit obtains The information of vehicles for taking target vehicle generates the ciphered data information according to the information of vehicles, and the encryption data is believed Breath is sent to the terminal device, so that the ciphered data information is sent to the server by the terminal device;
Whether pass through illegal modifications according to the information of vehicles that the ciphered data information detects the target vehicle.
6. a kind of encryption method of information of vehicles, the encryption system applied to information of vehicles, which is characterized in that the information of vehicles Encryption system include server, the terminal device connecting with the server communication and connect with the terminal equipment in communication Mobile unit, which is characterized in that the described method includes:
The mobile unit obtains the information of vehicles of target vehicle, generates ciphered data information using the information of vehicles;
The ciphered data information is sent to the terminal device by the mobile unit;
The terminal device receives the ciphered data information, and the ciphered data information is sent to the server;
The server receives the ciphered data information, and the vehicle of the target vehicle is detected according to the ciphered data information Whether information passes through illegal modifications.
7. a kind of mobile unit, which is characterized in that the mobile unit includes:
Data obtaining module, for obtaining the information of vehicles of target vehicle;
Data encryption module, for generating ciphered data information using the information of vehicles;
Data transmission blocks, for the ciphered data information to be sent to the terminal device, to pass through the terminal device The ciphered data information is sent to the server, so that the server is according to ciphered data information detection Whether the information of vehicles of target vehicle passes through illegal modifications.
8. a kind of mobile unit, which is characterized in that the mobile unit includes:
Memory, for storing the executable encryption method program of computer;And
Processor, the processor are used to transfer the encryption method program of storage in the memory to execute such as claim The described in any item methods of 1-4.
9. a kind of server, which is characterized in that the server includes:
Receiving module, the ciphered data information sent for receiving the terminal device, wherein the ciphered data information is institute The information of vehicles that mobile unit obtains target vehicle is stated, the ciphered data information is generated according to the information of vehicles, and by institute State ciphered data information and be sent to the terminal device so that the terminal device ciphered data information is sent to it is described Server;And
Detection module, for whether detecting the information of vehicles of the target vehicle according to the ciphered data information by illegally repairing Change.
10. a kind of server, which is characterized in that the server includes:
Memory, for storing the executable encryption method program of computer;And
Processor, the processor are configured for the encryption method program transferred Cun Chu in the memory to execute such as power Benefit require 5 described in method.
CN201910458680.4A 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server Active CN110191415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910458680.4A CN110191415B (en) 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910458680.4A CN110191415B (en) 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server

Publications (2)

Publication Number Publication Date
CN110191415A true CN110191415A (en) 2019-08-30
CN110191415B CN110191415B (en) 2022-01-25

Family

ID=67718713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910458680.4A Active CN110191415B (en) 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server

Country Status (1)

Country Link
CN (1) CN110191415B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753345A (en) * 2019-10-08 2020-02-04 武汉光庭信息技术股份有限公司 TBox communication method and TBox device
CN110969723A (en) * 2019-11-11 2020-04-07 深圳市元征科技股份有限公司 Data management method, detection device, server, and computer-readable storage medium
CN111724494A (en) * 2020-06-27 2020-09-29 北京百度网讯科技有限公司 Traffic information processing method and device, electronic equipment and storage medium
TWI738551B (en) * 2020-10-28 2021-09-01 中華汽車工業股份有限公司 Pluggable vehicle control device, vehicle control system and vehicle control method
CN113918928A (en) * 2021-10-28 2022-01-11 Oppo广东移动通信有限公司 Vehicle management method and device, storage medium and electronic equipment
CN115225399A (en) * 2022-07-22 2022-10-21 蔚来汽车科技(安徽)有限公司 A vehicle alarm information processing system and method
CN115225398A (en) * 2022-07-22 2022-10-21 蔚来汽车科技(安徽)有限公司 A vehicle alarm information processing system and method
CN115242841A (en) * 2022-07-22 2022-10-25 蔚来汽车科技(安徽)有限公司 A vehicle operation log processing system and method
CN118741518A (en) * 2024-09-04 2024-10-01 杭州锘崴信息科技有限公司 Intelligent vehicle data information trusted verification method and device based on trusted computing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6968060B1 (en) * 1999-02-11 2005-11-22 Bull, S.A. Method for verifying the use of public keys generated by an on-board system
CN101420306A (en) * 2008-12-12 2009-04-29 肖佐楠 Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm
CN108055236A (en) * 2017-11-03 2018-05-18 深圳市轱辘车联数据技术有限公司 A kind of data processing method, mobile unit and electronic equipment
CN109587164A (en) * 2018-12-27 2019-04-05 深圳市元征科技股份有限公司 A kind of information encrypting transmission method, device, equipment and storage medium
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
WO2019075408A1 (en) * 2017-10-13 2019-04-18 FLIR Unmanned Aerial Systems AS Encryption and decryption of media data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6968060B1 (en) * 1999-02-11 2005-11-22 Bull, S.A. Method for verifying the use of public keys generated by an on-board system
CN101420306A (en) * 2008-12-12 2009-04-29 肖佐楠 Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
WO2019075408A1 (en) * 2017-10-13 2019-04-18 FLIR Unmanned Aerial Systems AS Encryption and decryption of media data
CN108055236A (en) * 2017-11-03 2018-05-18 深圳市轱辘车联数据技术有限公司 A kind of data processing method, mobile unit and electronic equipment
CN109587164A (en) * 2018-12-27 2019-04-05 深圳市元征科技股份有限公司 A kind of information encrypting transmission method, device, equipment and storage medium

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753345A (en) * 2019-10-08 2020-02-04 武汉光庭信息技术股份有限公司 TBox communication method and TBox device
CN110753345B (en) * 2019-10-08 2022-11-25 武汉光庭信息技术股份有限公司 TBox communication method and TBox device
CN110969723A (en) * 2019-11-11 2020-04-07 深圳市元征科技股份有限公司 Data management method, detection device, server, and computer-readable storage medium
CN111724494A (en) * 2020-06-27 2020-09-29 北京百度网讯科技有限公司 Traffic information processing method and device, electronic equipment and storage medium
CN111724494B (en) * 2020-06-27 2022-05-10 阿波罗智联(北京)科技有限公司 Traffic information processing method and device, electronic equipment and storage medium
TWI738551B (en) * 2020-10-28 2021-09-01 中華汽車工業股份有限公司 Pluggable vehicle control device, vehicle control system and vehicle control method
CN113918928A (en) * 2021-10-28 2022-01-11 Oppo广东移动通信有限公司 Vehicle management method and device, storage medium and electronic equipment
CN115225399A (en) * 2022-07-22 2022-10-21 蔚来汽车科技(安徽)有限公司 A vehicle alarm information processing system and method
CN115225398A (en) * 2022-07-22 2022-10-21 蔚来汽车科技(安徽)有限公司 A vehicle alarm information processing system and method
CN115242841A (en) * 2022-07-22 2022-10-25 蔚来汽车科技(安徽)有限公司 A vehicle operation log processing system and method
CN118741518A (en) * 2024-09-04 2024-10-01 杭州锘崴信息科技有限公司 Intelligent vehicle data information trusted verification method and device based on trusted computing

Also Published As

Publication number Publication date
CN110191415B (en) 2022-01-25

Similar Documents

Publication Publication Date Title
CN110191415A (en) A kind of encryption method of information of vehicles, mobile unit and server
CN111181928B (en) Vehicle diagnosis method, server, and computer-readable storage medium
CN101300808B (en) Method and arrangement for secure autentication
US7302252B2 (en) Authentication systems, wireless communication terminals, and wireless base stations
CN111131313A (en) Safety assurance method and system for replacing ECU in intelligent networked vehicles
CN104765357A (en) Authorization system and method for vehicle remote diagnosis
US20080189772A1 (en) Method for generating digital fingerprint using pseudo random number code
CN111565182B (en) Vehicle diagnosis method and device and storage medium
CN113138775B (en) Firmware protection method and system for vehicle-mounted diagnosis system
CN109190362B (en) Secure communication method and related equipment
EP3017580A1 (en) Signatures for near field communications
CN112165382A (en) Software authorization method and device, authorization server and terminal equipment
CN102546172A (en) Access control method of intelligent card, intelligent card, terminal and system
Ammar et al. Securing the on-board diagnostics port (obd-ii) in vehicles
CN112506267B (en) RTC calibration method, vehicle-mounted terminal, user and storage medium
CN104796262B (en) Data ciphering method and terminal system
CN109743334A (en) A kind of T-BOX encryption system and method
CN113452517A (en) Key updating method, device, system, storage medium and terminal
CN101883357A (en) Method, device and system for mutual authentication between terminal and intelligent card
CN109743283B (en) Information transmission method and equipment
CN107659407A (en) Method for providing an authenticated connection between at least two communication partners
CN110717770A (en) Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts
CN107026730A (en) Data processing method, apparatus and system
CN110168550A (en) Data-message certification based on random number
KR102551592B1 (en) Method for preventing mileage tampering of car and mileage recording device using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant