CN103856321A - Data encryption and decryption method and system - Google Patents

Data encryption and decryption method and system Download PDF

Info

Publication number
CN103856321A
CN103856321A CN201210524307.2A CN201210524307A CN103856321A CN 103856321 A CN103856321 A CN 103856321A CN 201210524307 A CN201210524307 A CN 201210524307A CN 103856321 A CN103856321 A CN 103856321A
Authority
CN
China
Prior art keywords
key
data
server
encryption
controlled device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210524307.2A
Other languages
Chinese (zh)
Inventor
贺思聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ooros Automotive Co Ltd
Original Assignee
Ooros Automotive Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ooros Automotive Co Ltd filed Critical Ooros Automotive Co Ltd
Priority to CN201210524307.2A priority Critical patent/CN103856321A/en
Publication of CN103856321A publication Critical patent/CN103856321A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a data encryption and decryption method. The method includes the steps that a device sends a secret key encryption request to a server connected with the device through a wireless communication network; the server obtains a first secret key from a secret key controller and transmits the first secret key to the device; the device stores the received first secret key, and data to be transmitted are encrypted by means of the first secret key; the encrypted data are transmitted from the device to the server; the server sends a secret key decryption request to the secret key controller; the server obtains a second secret key corresponding to the first secret key from the secret key controller, and the received encrypted data are decrypted with the second secret key. Accordingly, the invention further discloses a data encryption and decryption system. According to the technical scheme, secure transmission of the data can be achieved and implementation is convenient to achieve.

Description

A kind of data encryption and decryption method and system thereof
Technical field
The present invention relates to a kind of communication technology, particularly a kind of data encryption and decryption method and system.
Background technology
A lot of automobiles on sale all have automotive remote service function in the market, automobile is in the time realizing remote service functions, need to be by CAN(Controller Area Network, i.e. controller local area network) provider of data from automobile terminal transmission to automotive remote service.CAN data are (or to be called car running computer by the control unit for vehicle of high speed or the transmission of low speed physical link, ECU) data message, it includes a lot of important and secret information, as VIN(Vehicle Identification Number, vehicle identification code), GPS position, the state of Car Electronic Control unit etc. of vehicle.Therefore need the transmission of CAN data to carry out safe handling.
Car networking technology is current just in flourish technology in this area, and car networking refers to that car and car, Che Yulu, car and people, car and sensing equipment etc. are mutual, realizes the dynamic mobile telecommunication system that vehicle is communicated by letter with public network.It can be interconnected and be realized information sharing by car and car, car and people, Che Yulu, collect the information of vehicle, road and environment, and on information network platform, the information of multi-source collection is processed, calculates, shared and safety issue, according to different functional requirements, vehicle is carried out to effectively guiding and supervision, and professional multimedia and mobile Internet application service is provided.
CAN data can be divided into read operation and write operation operating function, and wherein read operation is generally used for the state information of obtaining control unit for vehicle, and write operation is generally used for the state of controlling or setting control unit for vehicle.But existing most of car networked product is the not read-write support to CAN data all.
In addition, have minority car networked product to support the read-write operation of CAN data, but in order to guarantee the fail safe of CAN data, CAN data are only carried out read-write operation in equipment (as car running computer, or being called control unit for vehicle) inside.That is to say, the read-write operation of CAN data is not undertaken by network.
In addition, both supported CAN data manipulation although there is only a few car networked product, carry out again Internet Transmission, but this Internet Transmission is to complete via the privately-owned network passage of Virtual network operator, not using public network, although the mode fail safe that this use privately-owned network passage carries out Internet Transmission is higher, is dedicated channel due to what use, limited the user of outer net greatly and entered, and cost is also very high.
At present, the safe transmission of CAN data between vehicle arrangement and server is achieved in that as shown in Figure 1:
The 1st step, car machine MMC(Multi Media Controller, multimedia console) and server definite certain agreement encryption standard between development period;
The 2nd step, is encrypted by the encryption standard of above-mentioned agreement before CAN transfer of data;
The 3rd step, transmits the CAN data after encrypting, and is generally to transmit in 3G private network environment.
In prior art, the shortcoming of this safe transmission is:
1. because car machine MMC is embedded hardware, therefore the encryption standard of agreement must be fired into hardware, and therefore it is not modifiable, once there is leakage or the change of agreed specifications, can only recall rolling stock product.
2. the encryption standard insider of this agreement is more, and the main developer of the programming of generally participation project and design may know the inside story, and this is unfavorable for information security, probably causes huge security risk once there is labor turnover.
3. on the MMC hardware fired at vehicle of encryption standard due to agreement, and the terminal user of vehicle is user, therefore may occur being cracked hardware and being obtained the situation of cryptographic algorithm by illegal means, once that is to say that vehicle sells, security risk is uncontrollable.
4. the CAN data that are encrypted by this encryption method are difficult to transmit in public network, because be present in public network environment and intercepted and captured in a large number by the data file that agreement is cryptographic algorithm encryption, the possibility that then uses the method for exhaustion to crack.
Summary of the invention
Based on above-mentioned technical problem, one of the object of the invention is to provide a kind of data encryption and decryption method, by this encrypting and decrypting method, can guarantee the fail safe of data, this encrypting and decrypting method is implemented simple simultaneously, in the time that needs transmit data, use this data encryption and decryption method can also pass through transmitted data on network.
Another object of the present invention is to provide a kind of corresponding data ciphering and deciphering system, use this data ciphering and deciphering system to guarantee data security, this encrypting and decrypting process is simple simultaneously, in the time that needs transmit data, use this data ciphering and deciphering system to transmit data at net environment.
In order to realize foregoing invention object, the invention provides a kind of data encryption and decryption method, it comprises:
One equipment sends an encryption key requests to a server, and described equipment is connected by wireless communication networks with server;
Described server is receiving after the encryption key requests of equipment, obtains one first key from a cipher controlled device, and by extremely described equipment of this first cipher key delivery;
The first key that described device storage receives, and use this first key to be encrypted the data that will transmit;
Enciphered data by device transmission to server;
Server sends a decruption key request to cipher controlled device;
Server obtains second key corresponding with the first key from cipher controlled device, and uses this second key to be decrypted the enciphered data receiving.
In above-mentioned data encryption and decryption method, the first key and the second key can be identical, can be also different.
In above-mentioned data encryption and decryption method, described server is connected by non-public network with cipher controlled device.For example, physical connection or wired connection or proprietary network connect.
In above-mentioned data encryption and decryption method, described equipment is by the first key storage receiving in internal memory (RAM), and the first key being stored in internal memory is wiped free of after equipment is out of service.This method can make the first key stop and eliminating timely and effectively after not carrying out transfer of data at equipment, thereby avoids the risk of the first key from stealing.
In above-mentioned data encryption and decryption method, whether described equipment Real-Time Monitoring stores the first key in it, sends described encryption key requests to server at once if the first key is lost.
In addition, equipment can also send described encryption key requests to server receiving after a triggering signal.This triggering signal can be device start signal or equipment networking signal.
In above-mentioned data encryption and decryption method, described the first key and the second key are disposable dynamic key, and its key seed by the described cipher controlled device of an input generates.Dynamic key can be modified the first key being encrypted and the second key being decrypted at any time, thereby has prevented the risk that single key is cracked.
In above-mentioned data encryption and decryption method, described equipment can be car machine MMC(Multi MediaController, multimedia console), described data are CAN(Controller Area Network, controller local area network) data.
In the time that equipment is car machine MMC, car machine MMC can to whether storing the first key in it monitor in real time, once find the first key loss, just sends encryption key requests to server at once.Car machine MMC can also send encryption key requests receiving after triggering signal to server in addition, and aforementioned triggering signal can be the signal of vehicle launch, or network connects or the signal of recovery.For example, in the time of vehicle launch, car machine is corresponding startup also, and this just triggers car machine MMC and sends encryption key requests to server.Again for example, vehicle may enter that network signal is weak or there is no the region of network signal in the process of moving, and this can cause the first key to be lost, and in the time that vehicle regains network and connects, also can trigger car machine MMC and send encryption key requests to server so.
In above-mentioned data encryption and decryption method, described server is the remote services server of automotive remote service provider.
In order to realize another object of the present invention, the present invention also correspondingly provides a kind of data ciphering and deciphering system, and it comprises:
One equipment, it has a memory cell;
One server, it is connected by wireless communication networks with described equipment;
One cipher controlled device, it is connected with described server; Wherein
After the encryption key requests that described server sends at the equipment that receives, obtain one first key from described cipher controlled device, and transmit it to described equipment, described equipment by the first key storage receiving to memory cell and adopt the first key by data encryption, enciphered data by device transmission to server, server sends a decruption key request to obtain second key corresponding with the first key from cipher controlled device to described cipher controlled device, and uses this second key to be decrypted the enciphered data receiving.
In above-mentioned data ciphering and deciphering system, the first key and the second key can be identical, can be also different.
In above-mentioned data ciphering and deciphering system, described server is connected by non-public network with cipher controlled device.For example, physical connection or wired connection or proprietary network connect.
In above-mentioned data ciphering and deciphering system, server comprises data reception module, and it is by the enciphered data of this data reception module receiving equipment transmission.
In above-mentioned data ciphering and deciphering system, described memory cell is internal memory (RAM).
In above-mentioned data ciphering and deciphering system, described the first key and the second key are the dynamic key being generated in described cipher controlled device by the key seed of an input cipher controlled device.
In above-mentioned data ciphering and deciphering system, described equipment is car machine MMC(Multi MediaController, multimedia console), described data are CAN(Controller Area Network, controller local area network) data.
In above-mentioned data ciphering and deciphering system, described server is the remote services server of automotive remote service provider.
It should be noted that, what in the technical program, relate to is encrypted to data any reading and writing operation referring to data and carries out content-encrypt, makes the data message after encrypting can carry out safe transmission, storage and distribution.In the time that data are CAN data, refer to any reading and writing operation of CAN data is carried out to content-encrypt, make the data message after encrypting can carry out safe transmission, storage and distribution.
Also be noted that in addition the combination in any of above-described each technical characterictic is all in invention which is intended to be protected.
Data encryption and decryption method of the present invention has the following advantages than existing data encryption and decryption method:
1. server obtains key by cipher controlled device, and by key storage in equipment, can replace key is fired in equipment in existing way, in the time that needs are destroyed key or changed, needn't make any change to device hardware, greatly save the cost of change or destruction key;
2. improved the fail safe of data;
3. this data ciphering method can make data transmit in comparatively open public network environment;
4. in the time that data are stored in the internal memory of equipment, can prevent that equipment user from illegally cracking equipment, thereby further improve the fail safe of data;
5. in the time that key is generated by key seed in cipher controlled device, key seed can only be known by the administrative staff of only a few, thus the fail safe that has further improved data.
Correspondingly, data ciphering and deciphering system of the present invention has improved the fail safe of data greatly, but also can guarantee to transmit the fail safe of data in network; In addition, once needs, key is destroyed or changed, adopt the technical program needn't modify to device hardware, only need to revise key by cipher controlled device, thereby greatly improved the convenience that equipment uses.
Accompanying drawing explanation
Fig. 1 is the FB(flow block) of carrying out Data Encryption Transmission between existing car machine MMC and server.
Fig. 2 is the structured flowchart of data ciphering and deciphering system of the present invention under a kind of execution mode.
Fig. 3 be data encryption and decryption method of the present invention under a kind of execution mode, for example FB(flow block) of encrypted transmission CAN data between car machine MMC and server.
Embodiment
Below in conjunction with Figure of description and specific embodiment, the technical program is described in further detail.
The present embodiment is described in further detail the technical program to transmit CAN data instance between the car machine MMC of vehicle and remote server.
As shown in Figure 2, this data ciphering and deciphering system comprises the car machine MMC as equipment, and server and cipher controlled device, wherein server is the remote services server of automotive remote service provider, transfer of data between server and car machine MMC is undertaken by wireless communication networks, server (is for example connected by non-public network with cipher controlled device, physical connection, wired connection or proprietary network connection etc.), management generates the first key and second key for decipher corresponding with the first key for encrypting to a cipher controlled device key seed of input in cipher controlled device.Equipment uses the first key of this generation to be encrypted the CAN data that will transmit, thereby guarantee that CAN data can transfer to safely by wireless communication networks server, then server re-uses the second key obtaining from cipher controlled device by the CAN data deciphering of encrypting, and just can obtain CAN data.
It should be noted that, in the technical program, the first key that data are encrypted and the second key that data are decrypted can be identical, can be also different.
Fig. 3 has shown data encryption and decryption method of the present invention FB(flow block) in one embodiment.As shown in Figure 3, the transfer of data between car machine MMC and server is undertaken by wireless communication networks, and this data encryption and decryption method comprises the steps:
The 0th step: keeper inputs key seed, cipher controlled device generates the first key according to key seed;
The 1st step: vehicle launch (or communication network recovery), its notice car machine MMC;
The 2nd step: car machine MMC is receiving after above-mentioned notice, sends encryption key requests by wireless communication networks (as 3G public network) to server;
The 3rd step: server is being received after encryption key requests, the cipher controlled device transmission encryption key requests that Xiang Yuqi connects by non-public network;
The 4th step: the first key generating is sent to server by cipher controlled device;
The 5th step: server is transferred to car machine MMC by the first key that is received from cipher controlled device by wireless communication networks (as 3G public network);
The 6th step: car machine MMC in internal memory, uses this first key by CAN data encryption the first key storage simultaneously;
The 7th step: car machine MMC will be transferred to server by wireless communication networks (as 3G public network) through the CAN data of encrypting;
The 8th step: server sends decruption key request to cipher controlled device;
The 9th step: the second key corresponding with the first key sent to server by cipher controlled device;
The 10th step: server uses the second key obtaining to be decrypted the encryption CAN data that receive.
It should be noted that, although the present embodiment has only provided car machine under the state of vehicle launch or communication network recovery, send encryption key requests to server, if but in other cases, car machine MMC as equipment has lost the first key, also should send encryption key requests to server immediately.
In addition, in the technical program, the first key that data are encrypted and the second key that data are decrypted can be identical, can be also different.
It should be noted that in addition, key in the technical program is that cipher controlled device obtains according to the key seed computing of input, for example keeper inputs key seed, as 12345, cipher controlled device generates the key of 32bits length by algorithm, as R^R & R & TR & ^GI:KJGFJdghgshs1248I+.In the category that the operation method of key will not be discussed in the present invention, and the computing of key is that one of ordinary skilled in the art should know, therefore the present invention is no longer introduced at this.The key that computing obtains can be the key of a 32bits, can be also those skilled in the art can expect other can realize the key of encryption effect.
This key will be within one period, acts on the car machine MMC product in certain limit.
Definition " one period " and " in certain limit " are can not accomplish that in order to solve under actual conditions a large amount of different keys offer different car machine MMC products, and server budgeted capacity is also not enough to support a large amount of encryption and decryption computings.
In addition, keeper can be by a visual interface input to cipher controlled device input key seed, and other modes that also can expect by other those skilled in that art are inputted.The keeper who has authority input key seed or know key seed can only limit to the administrative staff that level of security is higher, can further improve like this fail safe of transfer of data.
In addition; also be noted that; although the present embodiment is take the CAN transfer of data between vehicle car machine and server as example; but protection scope of the present invention is not limited to the CAN transfer of data between car machine and server, any technical scheme that meets spirit of the present invention and/or technical characterictic is all in protection scope of the present invention.
It should be noted that; cited embodiment is only specific embodiments of the invention above; obviously the present invention is not limited to above embodiment; the similar variation of thereupon making and distortion are that those skilled in the art can directly draw or be easy to from content disclosed by the invention and just associate, and all should belong to protection scope of the present invention.

Claims (19)

1. a data encryption and decryption method, it comprises:
One equipment sends an encryption key requests to a server, and described equipment is connected by wireless communication networks with server;
Server, according to described encryption key requests, obtains one first key from a cipher controlled device, and by extremely described equipment of this first cipher key delivery;
The first key that described device storage receives, and use this first key to be encrypted data;
Enciphered data by device transmission to server;
Server sends a decruption key request to cipher controlled device;
Server obtains second key corresponding with the first key from cipher controlled device, and uses this second key to be decrypted the enciphered data receiving.
2. data encryption and decryption method as claimed in claim 1, is characterized in that, described the first key and the second key are identical.
3. data encryption and decryption method as claimed in claim 1, is characterized in that, described the first key and the second key are different.
4. data encryption and decryption method as claimed in claim 1, is characterized in that, described server is connected by non-public network with cipher controlled device.
5. data encryption and decryption method as claimed in claim 1, is characterized in that, described equipment is by the first key storage receiving in internal memory, and the first key being stored in internal memory is wiped free of after described equipment is out of service.
6. data encryption and decryption method as claimed in claim 1, is characterized in that, whether described equipment Real-Time Monitoring stores the first key in it, sends described encryption key requests to server if the first key is lost.
7. data encryption and decryption method as claimed in claim 1, is characterized in that, described equipment sends described encryption key requests to server receiving after a triggering signal.
8. data encryption and decryption method as claimed in claim 7, is characterized in that, described triggering signal is device start signal or equipment networking signal.
9. data encryption and decryption method as claimed in claim 1, is characterized in that, described the first key and the second key are disposable dynamic key, and its key seed by the described cipher controlled device of an input generates.
10. data encryption and decryption method as claimed in claim 1, is characterized in that, described equipment is car machine MMC, and described data are CAN data.
11. data encryption and decryption methods as claimed in claim 10, is characterized in that, described server is the remote services server of automotive remote service provider.
12. 1 kinds of data ciphering and deciphering systems, it comprises:
One equipment, it has a memory cell;
One server, it is connected by wireless communication networks with described equipment;
One cipher controlled device, it is connected with described server; Wherein
After the encryption key requests that described server sends at the equipment that receives, obtain one first key from described cipher controlled device, and transmit it to described equipment, described equipment by the first key storage receiving to memory cell and adopt the first key by data encryption, enciphered data by device transmission to server, server sends a decruption key request to obtain second key corresponding with described the first key from cipher controlled device to described cipher controlled device, and uses this second key to be decrypted the enciphered data receiving.
13. data ciphering and deciphering systems as claimed in claim 12, is characterized in that, described the first key and the second key are identical.
14. data ciphering and deciphering systems as claimed in claim 12, is characterized in that, described the first key and the second key are different.
15. data ciphering and deciphering systems as claimed in claim 12, is characterized in that, described server is connected by non-public network with cipher controlled device.
16. data ciphering and deciphering systems as claimed in claim 12, is characterized in that, described memory cell is internal memory.
17. data ciphering and deciphering systems as claimed in claim 12, is characterized in that, described the first key and the second key are the dynamic key being generated in described cipher controlled device by the key seed of an input cipher controlled device.
18. data ciphering and deciphering systems as claimed in claim 12, is characterized in that, described equipment is car machine MMC, and described data are CAN data.
19. data ciphering and deciphering systems as claimed in claim 18, is characterized in that, described server is the remote services server of automotive remote service provider.
CN201210524307.2A 2012-12-07 2012-12-07 Data encryption and decryption method and system Pending CN103856321A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210524307.2A CN103856321A (en) 2012-12-07 2012-12-07 Data encryption and decryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210524307.2A CN103856321A (en) 2012-12-07 2012-12-07 Data encryption and decryption method and system

Publications (1)

Publication Number Publication Date
CN103856321A true CN103856321A (en) 2014-06-11

Family

ID=50863567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210524307.2A Pending CN103856321A (en) 2012-12-07 2012-12-07 Data encryption and decryption method and system

Country Status (1)

Country Link
CN (1) CN103856321A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915336A (en) * 2016-05-24 2016-08-31 珠海市魅族科技有限公司 Object cooperative decryption method and device thereof
CN106487783A (en) * 2016-09-28 2017-03-08 深圳市速美特电子科技有限公司 The encryption method connecting for vehicle communication and device
CN106789925A (en) * 2016-11-25 2017-05-31 北京洋浦伟业科技发展有限公司 Information of vehicles safe transmission method and device in car networking
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment
CN107196903A (en) * 2017-03-31 2017-09-22 斑马信息科技有限公司 Auto communication management system and its management method and personal identification method
CN110034932A (en) * 2017-11-24 2019-07-19 力旺电子股份有限公司 The operating method of communication system and communication system
CN112543439A (en) * 2020-12-02 2021-03-23 山东大学 Internet of vehicles location information encryption cloud platform, terminal, system and method
CN112654989A (en) * 2020-03-18 2021-04-13 华为技术有限公司 Data storage method, data access method, related device and equipment
CN114258013A (en) * 2020-09-11 2022-03-29 中国联合网络通信集团有限公司 Data encryption method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1703889A (en) * 2002-01-22 2005-11-30 通用仪器公司 Encryption, authentication, and key management for multimedia content pre-encryption
CN101094394A (en) * 2007-07-17 2007-12-26 中国科学院软件研究所 Method for guaranteeing safe transmission of video data, and video monitoring system
CN101488950A (en) * 2007-12-14 2009-07-22 英特尔公司 Symmetric key distribution framework for the internet
CN101997679A (en) * 2009-08-21 2011-03-30 华为终端有限公司 Encrypted message negotiation method, equipment and network system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1703889A (en) * 2002-01-22 2005-11-30 通用仪器公司 Encryption, authentication, and key management for multimedia content pre-encryption
CN101094394A (en) * 2007-07-17 2007-12-26 中国科学院软件研究所 Method for guaranteeing safe transmission of video data, and video monitoring system
CN101488950A (en) * 2007-12-14 2009-07-22 英特尔公司 Symmetric key distribution framework for the internet
CN101997679A (en) * 2009-08-21 2011-03-30 华为终端有限公司 Encrypted message negotiation method, equipment and network system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888183A (en) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 Data encryption, decryption, the method and apparatus and system of key request treatment
CN105915336B (en) * 2016-05-24 2020-06-09 珠海市魅族科技有限公司 Object collaborative decryption method and device
CN105915336A (en) * 2016-05-24 2016-08-31 珠海市魅族科技有限公司 Object cooperative decryption method and device thereof
CN106487783A (en) * 2016-09-28 2017-03-08 深圳市速美特电子科技有限公司 The encryption method connecting for vehicle communication and device
CN106789925A (en) * 2016-11-25 2017-05-31 北京洋浦伟业科技发展有限公司 Information of vehicles safe transmission method and device in car networking
CN107196903A (en) * 2017-03-31 2017-09-22 斑马信息科技有限公司 Auto communication management system and its management method and personal identification method
CN110034932A (en) * 2017-11-24 2019-07-19 力旺电子股份有限公司 The operating method of communication system and communication system
CN112654989A (en) * 2020-03-18 2021-04-13 华为技术有限公司 Data storage method, data access method, related device and equipment
WO2021184264A1 (en) * 2020-03-18 2021-09-23 华为技术有限公司 Data saving method, data access method, and related apparatus and device
CN114258013A (en) * 2020-09-11 2022-03-29 中国联合网络通信集团有限公司 Data encryption method, device and storage medium
CN114258013B (en) * 2020-09-11 2023-10-31 中国联合网络通信集团有限公司 Data encryption method, device and storage medium
CN112543439A (en) * 2020-12-02 2021-03-23 山东大学 Internet of vehicles location information encryption cloud platform, terminal, system and method
CN112543439B (en) * 2020-12-02 2021-12-28 山东大学 Internet of vehicles location information encryption cloud platform, terminal, system and method

Similar Documents

Publication Publication Date Title
CN103856321A (en) Data encryption and decryption method and system
CN111181928B (en) Vehicle diagnosis method, server, and computer-readable storage medium
CN106357400B (en) Establish the method and system in channel between TBOX terminal and TSP platform
CN106572106B (en) Method for transmitting message between TBOX terminal and TSP platform
CN101772024B (en) User identification method, device and system
CN105139499A (en) Mobile phone door lock system based on asymmetric secret key and realization method thereof
CN110535641B (en) Key management method and apparatus, computer device, and storage medium
CN110635893A (en) Vehicle-mounted Ethernet information security protection method
CN103095457A (en) Login and verification method for application program
CN101399825A (en) Method, device and system for sharing matched pair information between equipments
CN101539977B (en) Method for protecting computer software
CN101711028B (en) Method for automatically protecting user data on mobile terminal
CN105191332A (en) Method and device to embed watermark in uncompressed video data
CN1980122B (en) Method for increasing information transmission safety
CN110378135A (en) Intimacy protection system and method based on big data analysis and trust computing
CN112511983A (en) Privacy protection system and protection method based on position of Internet of vehicles
CN112040482A (en) Encryption processing method and equipment for automatic driving data under 5G communication
CN106209910A (en) A kind of method for security protection of inter-vehicle information system
CN101325486B (en) Method and apparatus for transferring field permission cryptographic key
CN116366289A (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN103853340A (en) Touch keyword using national cipher SM1 encryption chip and encryption method thereof
CN101539978B (en) Software protection method based on space
CN112217797B (en) Intelligent gateway Internet of things control system and method applying block chain technology
CN108390757A (en) Processing method of communication data, device, electronic equipment, program and medium
CN114258013A (en) Data encryption method, device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140611

RJ01 Rejection of invention patent application after publication