CN106453269A - Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system - Google Patents

Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system Download PDF

Info

Publication number
CN106453269A
CN106453269A CN201610838067.1A CN201610838067A CN106453269A CN 106453269 A CN106453269 A CN 106453269A CN 201610838067 A CN201610838067 A CN 201610838067A CN 106453269 A CN106453269 A CN 106453269A
Authority
CN
China
Prior art keywords
car
mounted terminal
server
key
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610838067.1A
Other languages
Chinese (zh)
Other versions
CN106453269B (en
Inventor
刘玉涛
陈静相
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201610838067.1A priority Critical patent/CN106453269B/en
Publication of CN106453269A publication Critical patent/CN106453269A/en
Application granted granted Critical
Publication of CN106453269B publication Critical patent/CN106453269B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/163In-band adaptation of TCP data exchange; In-band control procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The application provides an Internet of Vehicles safety communication method, a vehicle-mounted terminal, a server and a system. The Internet of Vehicles safety communication method is characterized by comprising the following steps: the vehicle-mounted terminal sends a handshake authentication request to a server after determining that the transmission control protocol connection with the server has been finished, wherein the handshake authentication request comprises an identifier of the vehicle-mounted terminal and a first Hash value encrypted by use of a symmetrical encryption algorithm same as that adopted by the server; the vehicle-mounted terminal receives an authentication response message returned by the server, wherein the authentication response message is returned by the server after determining that the vehicle-mounted terminal is legal; and the vehicle-mounted terminal establishes a safety authentication transmission protocol connection with the server according to the authentication response message. A lightweight safety authentication transmission protocol is established between the vehicle-mounted terminal and the server by use of less resource, and the security of the data transmission between the vehicle-mounted terminal and the server is improved.

Description

Car networking safety communicating method, car-mounted terminal, server and system
Technical field
The application is related to car networking technology field, more particularly to a kind of car networking safety communicating method, car-mounted terminal, service Device and system.
Background technology
As automobile accesses the progressively ripe of Internet technology, the function of network vehicular applications has also been obtained greatly Abundant and extend, these are all that the prosperity of car networking application market is laid a good foundation.But the thing followed one can not be ignored Problem be exactly safety problem, how to ensure the safety (i.e. transmission safety) of the sensitive information that vehicle interact by network and the external world The very big concern of people is obtained.If transmission safety cannot be guaranteed, sensitive data can be caused to be stolen, distorted, or even Cause vehicle to be remotely controlled, so can greatly threaten the personal safety of car owner.
At present, some security protocols in network security, such as:SSL (Secure Sockets Layer, referred to as SSL), IP safety (IP security, abbreviation IPSec) etc., big due to taking resource, it is difficult to the vehicle-mounted mobile in resource-constrained Terminal is used or is popularized, even for resource than more rich vehicle mobile terminals, if applying above-mentioned security protocol, not only The pressure of server end can be caused to increase, and increased safety cost.
Content of the invention
The application is intended at least to solve to a certain extent one of technical problem in correlation technique.
For this purpose, first purpose of the application is to propose a kind of car networking safety communicating method, the method achieve The safety certification host-host protocol of lightweight is set up between car-mounted terminal server, using less resource, improves car-mounted terminal The safety of data transfer between server.
Second purpose of the application is to propose another kind of car networking safety communicating method.
3rd purpose of the application is to propose a kind of car-mounted terminal.
4th purpose of the application is to propose a kind of server.
5th purpose of the application is to propose a kind of car networking safe communication system.
For reaching above-mentioned purpose, the application first aspect embodiment proposes a kind of car networking safety communicating method, including:Car Mounted terminal has completed after transmission control protocol be connected, to ask to server transmission handshake authentication determining with server, wherein, institute Stating handshake authentication request includes the mark of the car-mounted terminal and using adding with the server identical symmetric encipherment algorithm The first close cryptographic Hash;The car-mounted terminal receives the authentication response message that the server is returned, the authentication response message It is that the server is determining the legal rear return of the car-mounted terminal;The car-mounted terminal according to the authentication response message, Safety certification host-host protocol is set up with the server to be connected.
In a kind of way of realization of first aspect, before the car-mounted terminal sends handshake authentication request to server, Also include:
The car-mounted terminal generates the first random number according to default rule;
The car-mounted terminal according to first random number and with the first initial key, generate first cryptographic Hash.
In another kind of way of realization of first aspect, the authentication response message includes that after encryption first is random Number, more new key and the second cryptographic Hash, after the car-mounted terminal receives the authentication response message that the server is returned, also wrap Include:
The authentication response message is decrypted process by the car-mounted terminal;
Whether the first random number that the car-mounted terminal is obtained after judging to decipher is mated with the first random number for generating;
If coupling, car-mounted terminal carries out key updating according to the more new key for obtaining after deciphering.
In another kind of way of realization of first aspect, second after also including in the authentication response message to encrypt is random Number;
After the car-mounted terminal carries out key updating according to the more new key for obtaining after deciphering, also include:
The car-mounted terminal updates to the server " return " key" and confirms message, and the key updating confirms to wrap in message Include the second random number after encryption and according to the more new key and the second cryptographic Hash of the second generating random number, so that the clothes Business device carries out key updating.
In another kind of way of realization of first aspect, in the handshake authentication request and authentication response message, including:
Record protocol head, message body and message authentication code corresponding with the message body.
In another kind of way of realization of first aspect, first initial key includes:Read key and write key;
The reading key includes symmetric cryptographic key value, random vector and Hash operation message authentication respectively with writing in key Code algorithm secret key.
In another way of realization of first aspect, the car-mounted terminal sets up safety certification transmission with the server After agreement connection, also include:
The car-mounted terminal constructs the first record protocol head according to data type waiting for transmission;
The car-mounted terminal carries out Hash information identifying code to the first record protocol head and body of data waiting for transmission Computing, determines the first message authentication code of data to be transmitted;
The car-mounted terminal using the key after updating and encryption function, by the body of data waiting for transmission and described the After one message authentication code is encrypted, the server is transferred to.
In another way of realization of first aspect, the car-mounted terminal sets up safety certification transmission with the server After agreement connection, also include:
The car-mounted terminal receives the data message that the server sends;
The car-mounted terminal is determined second in the data message according to the second record protocol head in the data message The position of message authentication code;
The car-mounted terminal utilizes the key after updating and the decryption function symmetrical with encryption function in server, to described Data message is decrypted process, to obtain body of data and the second message authentication code that the data message includes;
The car-mounted terminal carries out Hash information identifying code fortune to the second record protocol head and the body of data Calculate, determine the 3rd message authentication code;
The car-mounted terminal judges whether second message authentication code is consistent with the 3rd message authentication code, if one Cause, then the application layer in sending the body of data to the car-mounted terminal.
In another way of realization of first aspect, also include:
The car-mounted terminal receives the connection closed message that the server sends;
The car-mounted terminal discharges, according to the connection closed message, the local resource for associating with message sink.
In another way of realization of first aspect, the car-mounted terminal receives the connection closed that the server sends After message, also include:
The car-mounted terminal judges the local whether data message of available for transmission;
If no, returning connection closed response message to the server, so that the server closing is vehicle-mounted with described Communication connection between terminal.
The car networking safety communicating method that the embodiment of the present application is provided, car-mounted terminal establishes TCP being determined at server After connection, you can based on default initial key and with server identical symmetric encipherment algorithm, send to server and shake hands and recognize Card request, then after the authentication response message for receiving server return, you can set up safety certification host-host protocol with server Connection.Hereby it is achieved that the safety certification host-host protocol of lightweight is set up between car-mounted terminal server, using less money Source, improves the safety of data transfer between car-mounted terminal server.
For reaching above-mentioned purpose, the application second aspect embodiment proposes another kind of car networking safety communicating method, including: Server receives the handshake authentication request of car-mounted terminal transmission, and wherein, the handshake authentication request includes the car-mounted terminal Mark and using with the server identical symmetric encipherment algorithm encryption the first cryptographic Hash;The server is according to described The mark of car-mounted terminal, obtains locally stored second initial key corresponding with the mark of the car-mounted terminal;The service Device adopts the decipherment algorithm symmetrical with the car-mounted terminal, and handshake authentication request is decrypted, to determine described shaking hands The first initial key for carrying in certification request;The server judges first initial key with second initial key Whether consistent;If consistent, to the car-mounted terminal return authentication response message.
The car networking safety communicating method of the embodiment of the present application, server please in the handshake authentication for receiving car-mounted terminal transmission After asking, according to the mark of car-mounted terminal, second initial key corresponding with car-mounted terminal mark is obtained, then adopt and vehicle-mounted end The symmetrical decipherment algorithm in end, is decrypted to handshake authentication request, obtains the first initial key in handshake authentication request, true When fixed first initial key and the second key agreement, to car-mounted terminal return authentication response message.Hereby it is achieved that at vehicle-mounted end The safety certification host-host protocol of lightweight is set up between the server of end, using less resource, improves car-mounted terminal and service The safety of data transfer between device.
For reaching above-mentioned purpose, the application third aspect embodiment proposes a kind of car-mounted terminal, including:For storage program The memorizer of code and processor;
The processor is used for calling the code in the memorizer, to execute procedure below:
Complete after transmission control protocol be connected, to ask to server transmission handshake authentication determining with server, wherein, The handshake authentication request includes the mark of the car-mounted terminal and adopts and the server identical symmetric encipherment algorithm First cryptographic Hash of encryption;The authentication response message of server return is received, the authentication response message is the service Device is determining the legal rear return of the car-mounted terminal;According to the authentication response message, safety is set up with the server and recognize Card host-host protocol connection.
The embodiment of the present application provide car-mounted terminal, car-mounted terminal be determined at server establish TCP connection after, you can Based on default initial key and with server identical symmetric cryptography AES, to server send handshake authentication request, Then after the authentication response message for receiving server return, you can set up safety certification host-host protocol with server and be connected.By This, it is achieved that the safety certification host-host protocol of lightweight is set up between car-mounted terminal server, using less resource, is improved The safety of data transfer between car-mounted terminal server.
In a kind of way of realization of the third aspect, the processor, it is additionally operable to:According to default rule, first is generated Random number;According to first random number and first initial key, the first cryptographic Hash is generated.
In another kind of way of realization of the third aspect, the authentication response message includes that after encryption first is random Number, more new key and the second cryptographic Hash;
The processor, is additionally operable to:
The authentication response message is decrypted process;
Whether the first random number for obtaining after judging to decipher is mated with the first random number for generating;
If coupling, carries out key updating according to the more new key for obtaining after deciphering.
In another kind of way of realization of the third aspect, second after also including in the authentication response message to encrypt is random Number;
The processor, is additionally operable to:
Update to the server " return " key" and confirm message, the key updating confirms that message includes after encryption the Two randoms number and according to the more new key and the second cryptographic Hash of the second generating random number, so that the server carries out key Update.
In another kind of way of realization of the third aspect, in the handshake authentication request and authentication response message, including:
Record protocol head, message body and message authentication code corresponding with the message body.
In another kind of way of realization of the third aspect, first initial key includes:Read key and write key;
The reading key includes symmetric cryptographic key value, random vector and Hash operation message authentication respectively with writing in key Code algorithm secret key.
In another kind of way of realization of the third aspect, the processor, it is additionally operable to:
According to data type waiting for transmission, the first record protocol head is constructed;
To the first record protocol head and body of data waiting for transmission, Hash information identifying code computing is carried out, determination is treated The first message authentication code of transmission data;
Using the key after renewal and encryption function, by the body of data waiting for transmission and the first message authentication code After being encrypted, the server is transferred to.
In another kind of way of realization of the third aspect, the processor, it is additionally operable to:
Receive the data message of server transmission;
According to the second record protocol head in the data message, the second message authentication code in the data message is determined Position;
Using the key after renewal and the decryption function symmetrical with encryption function in server, the data message is carried out Decryption processing, to obtain body of data and the second message authentication code that the data message includes;
To the second record protocol head and the body of data, Hash information identifying code computing is carried out, determine that the 3rd disappears Breath authentication code;
Judge whether second message authentication code is consistent with the 3rd message authentication code, if unanimously, by the number Application layer in sending to the car-mounted terminal according to body.
In another way of realization of the third aspect, the processor, it is additionally operable to:
Receive the connection closed message of server transmission;
According to the connection closed message, the local resource for associating with message sink is discharged.
In another way of realization of the third aspect, the processor, it is additionally operable to:
The car-mounted terminal judges the local whether data message of available for transmission;
If no, returning connection closed response message to the server, so that the server closing is vehicle-mounted with described Communication connection between terminal.
For reaching above-mentioned purpose, the application fourth aspect embodiment proposes a kind of server, including for storage program generation The memorizer of code and processor, wherein, the processor is used for calling the program code in the memorizer, to execute following behaviour Make:The handshake authentication request of car-mounted terminal transmission is received, wherein, the handshake authentication request includes the mark of the car-mounted terminal Know and using the first cryptographic Hash with server identical symmetric encipherment algorithm encryption;Mark according to the car-mounted terminal Know, obtain locally stored second initial key corresponding with the mark of the car-mounted terminal;Using with the car-mounted terminal pair The decipherment algorithm of title, is decrypted to handshake authentication request, to determine at the beginning of carry in handshake authentication request first Beginning key;Judge whether first initial key is consistent with second initial key;If consistent, to the car-mounted terminal Return authentication response message.
The server of the embodiment of the present application, server receive car-mounted terminal transmission handshake authentication request after, according to car The mark of mounted terminal, obtains second initial key corresponding with car-mounted terminal mark, then adopts the solution symmetrical with car-mounted terminal Close algorithm, is decrypted to handshake authentication request, obtains the first initial key in handshake authentication request, is determining that first is initial When key and the second key agreement, to car-mounted terminal return authentication response message.Hereby it is achieved that in car-mounted terminal server Between set up the safety certification host-host protocol of lightweight, using less resource, improve data between car-mounted terminal server and pass Defeated safety.
For reaching above-mentioned purpose, the 5th aspect of the application proposes a kind of car networking safe communication system, including such as third party The server described in car-mounted terminal and fourth aspect described in face.
Description of the drawings
The above-mentioned and/or additional aspect of the present invention and advantage will become from the following description of the accompanying drawings of embodiments Substantially and easy to understand, wherein:
Fig. 1 is the flow chart of the car networking safety communicating method of the application one embodiment;
Fig. 2 is the structural representation of the car networking safe communication system of the application one embodiment;
The verification process schematic diagram of the car-mounted terminal that Fig. 3 is provided for the embodiment of the present application and server;
The schematic flow sheet that Fig. 4 is carried out data transmission with server for the car-mounted terminal that the embodiment of the present application is provided;
The schematic flow sheet of another kind of car networking safety communicating method that Fig. 5 is provided for the embodiment of the present application;
Fig. 6 is the structural representation of the car-mounted terminal of the application one embodiment;
Fig. 7 is the structural representation of the server of the application one embodiment.
Specific embodiment
Embodiments herein is described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finish Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the application, and it is not intended that restriction to the application.
The each embodiment of the application mainly in prior art, due to car-mounted terminal resource-constrained, it is impossible to using existing Transmission security protocol ensureing the problem of the safety of data transfer, propose a kind of car networking safety communicating method, car-mounted terminal, Server and system.In the car networking safety communicating method that the application is provided, certification between car-mounted terminal server and Communication process, all using symmetric encipherment algorithm, so as to reduce the resource consumption of car-mounted terminal server.
Below with reference to the accompanying drawings vehicle net safety communicating method and the device of the embodiment of the present application are described.
Fig. 1 is the flow chart of the car networking safety communicating method of the application one embodiment.
As shown in figure 1, the car networking safety communicating method includes:
S101, car-mounted terminal has completed after transmission control protocol is connected, to shake hands to server transmission determining with server Certification request.
Wherein, the handshake authentication request includes the mark of the car-mounted terminal, and using identical with the server Symmetric encipherment algorithm encryption the first cryptographic Hash.
Specifically, the car networking safety communicating method that the present embodiment is provided, the car networking that executive agent is provided for the application Secure communication device, the device can be configured in car-mounted terminal, to ensure the communication security between car-mounted terminal and server.
Wherein, the mark of car-mounted terminal, refers to uniquely characterize the mark of car-mounted terminal identity, can be such as car-mounted terminal Product ID, or the exclusive identification code that server distributes for car-mounted terminal, the present embodiment is not construed as limiting to this.First Cryptographic Hash, is the check value for asking generation according to handshake authentication, wherein can also include in handshake authentication request that first is initially close Any one or more in key, the mark of the first initial key, first random number etc., for making server according to handshake authentication Request, verifies to the identity of car-mounted terminal.First random number is car-mounted terminal according to default rule, random generates.
In addition, car-mounted terminal and server identical AES, can be any symmetric encipherment algorithms, such as AES128-CTR etc..
Wherein, the first initial key be car-mounted terminal before dispatching from the factory, the initial key for being generated according to server by producer sets Put.Wherein, a car-mounted terminal corresponds to an initial key.
For example, before car-mounted terminal dispatches from the factory, server end produces the first initial key first, then using hypertext Host-host protocol (HyperText Transfer Protocal, abbreviation HTTP) connection is delivered to the production work at car-mounted terminal place Factory, then by special messenger's (Producer), the first initial key is injected in vehicle mobile terminals.
Further, it is to ensure that car-mounted terminal can be from server, can be on the lower by the downloadable authentication of the first initial key Load is got off, and needs the HTTP connection for ensureing the first initial key of transmission reliable, in the embodiment of the present application, can also be by for HTTP One certification certificate of link configuration, ensures that the HTTP connection for transmitting the first initial key is reliable.
Specifically, a kind of car networking safe communication system structural representation that Fig. 2 is provided for the embodiment of the present application.As Fig. 2 Shown, the car networking safe communication system includes the data center (Data Center) 1 of server side and the manufacture of car-mounted terminal Factory (Plant) 2.As shown in Fig. 2 the downloading process of the certificate, can be made up of procedure below:
1) Data Center firstly generates the certificate of an entitled C1 (C1 is served only for downloading please for setting up HTTPS link The certificate of the first initial key is sought, it cannot be used for downloading the first initial key).
2) Data Center is compressed to C1 in one file, during compression can using carrying out as AES256 scheduling algorithm plus Close, and add password.
3) C1 after encryption is sent to workman (Producer) by e-mail by Data Center.
4) Producer gets the C1 after encrypting by mail and preserves.
5) Data Center generates the certificate of an entitled C2 for downloading the first initial key, is then uploaded to On HTTPS server in safe transmission gateway (Security Transmission Gateway, abbreviation STG).
6) Data Center deciphers the password of C1 by the Producer that tells by telephone.
7) after Producer deciphering C1, browser is uploaded.
8) Producer downloads C2 by HTTPS link as early as possible.
9), after confirming that Producer successfully downloads C2, Data Center modification STG configuration is so that C1 failure.
10) Producer uploads C2 and then sets up new HTTPS link to browser.
11) Producer downloads initial key or upgrading certificate using HTTPS link.
It should be noted that for the reliability for ensureing downloadable authentication, server can also enter line period to downloadable authentication Property update, such as weekly, per 10 days etc. update once, so as to ensure the reliability of the HTTP link that sets up by downloadable authentication as far as possible Property and safety.
S102, the car-mounted terminal receives the authentication response message that the server is returned, and the authentication response message is The server is determining the legal rear return of the car-mounted terminal.
Specifically, be stored with server initial key corresponding with the mark of each car-mounted terminal, when server is being received To car-mounted terminal send handshake authentication request after, you can using with identical symmetric encipherment algorithm in car-mounted terminal by encrypt First cryptographic Hash is decrypted, and the first initial key being worth to further according to the first Hash afterwards is vehicle-mounted with this with locally stored Whether the corresponding initial key of the mark of terminal is identical, if identical, can determine that the car-mounted terminal is legal, so as to can be to car Mounted terminal return authentication response message.
It is possible to further the form of communication information between car-mounted terminal and server is arranged, simplify car-mounted terminal kimonos Resolving during business device communication.Specifically, above-mentioned handshake authentication request and authentication response message, can be as shown in the table, Including:Record protocol head (Record header), message body (Message Body) and message corresponding with the message body are recognized Card code (MAC Value).
Wherein record protocol head is that MAC value is ciphertext in plain text, depending on the content of message body is then according to type of message, such as, If message is asked for handshake authentication, message body can include the data message such as handshake authentication heading and car-mounted terminal mark, If message is data transfer message, the data value that message body only can be transmitted.
In addition, the first initial key in car-mounted terminal server, mainly includes two parts:Read key and write key;
The reading key includes symmetric cryptographic key value, random vector and Hash operation message authentication respectively with writing in key Code algorithm (Hash-based Message Authentication Code, abbreviation HMAC) key.In three parts of key, Reading per one end and write the key in direction and be different from, but local terminal read key necessarily with opposite end write that key is identical, local terminal Write key necessarily identical with the reading key of opposite end.Read direction and write direction to use different keys cause the anti-statistical analysiss of agreement The ability of attack is higher, so as to improve safety.
S103, the car-mounted terminal sets up safety certification transmission association according to the authentication response message with the server View connection.
Specifically, car-mounted terminal is after the authentication response message for receiving server return, you can determine server legitimacy, from And safety certification host-host protocol (Security Authentication and Transportation can be set up with server Layer, abbreviation SATL) connection, and carried out data transmission by the agreement.
It is understood that being set up between car-mounted terminal and server every time after TCP is connected, it is required for by the way, STAL connection is set up, the certification of identity and the renewal of key can be completed in this process.The purpose for carrying out authentication is Make car-mounted terminal or server confirm the legal identity of opposite end, prevent false communication ends, man-in-the-middle attack and Replay Attack.Update The purpose of key is to strengthen the safety of key.
The car networking safety communicating method that the embodiment of the present application is provided, car-mounted terminal establishes TCP being determined at server After connection, you can based on default initial key and with server identical symmetric encipherment algorithm, send to server and shake hands and recognize Card request, then after the authentication response message for receiving server return, you can set up safety certification host-host protocol with server Connection.Hereby it is achieved that the safety certification host-host protocol of lightweight is set up between car-mounted terminal server, using less money Source, improves the safety of data transfer between car-mounted terminal server.
By above-mentioned analysis, car-mounted terminal can carry out handshake authentication by symmetry algorithm with server, so as to Server sets up the connection of safety certification host-host protocol, using the secure transfer protocol of lightweight, takes less resource, you can real The safety of data transfer between existing car-mounted terminal server.
Further, the handshake authentication request in order to prevent car-mounted terminal from sending illegally is distorted, in above-mentioned steps 101, Car-mounted terminal can also be according to using PRNG (Pseudorandom Number Generator, abbreviation PRNG) A random number is generated, and hash algorithm is utilized, a cryptographic Hash is generated according to random number and initial key, then by the Hash Value is together sent to server as ciphertext with the mark of car-mounted terminal and carries out handshake authentication, with reference to Fig. 3, to car-mounted terminal Verification process between server describes in detail.I.e. as shown in figure 3, the car-mounted terminal that provides for the embodiment of the present application of Fig. 3 Verification process schematic diagram with server.
As shown in figure 3, car-mounted terminal is included with the verification process of server:
S301, the car-mounted terminal generates the first random number according to default rule.
Wherein, default rule, can be the rule of PRNG acquiescence, or the preset rule of user Then, the present embodiment is not construed as limiting to this.
S302, the car-mounted terminal generates the first cryptographic Hash according to first random number and first initial key.
S303, the car-mounted terminal is adopted and the server identical symmetric encipherment algorithm, by first cryptographic Hash It is encrypted.
S304, the car-mounted terminal send to the server include the mark of the car-mounted terminal, the first random number and The handshake authentication request of the first cryptographic Hash after encryption.
Specifically, server is after handshake authentication request is received, you can handshake authentication request is decrypted, and judges root According to the cryptographic Hash that the first random number and locally stored initial key corresponding with car-mounted terminal mark are generated, obtain with deciphering Whether the first cryptographic Hash mates, if coupling, to car-mounted terminal return authentication response message, otherwise terminates.
It should be noted that server is if it is determined that deciphering the first cryptographic Hash for obtaining and the first Hash for being generated according to algorithm Value coupling, then can determine that the handshake authentication request is legal, be not modified, otherwise, can return, to car-mounted terminal, failed message of shaking hands, So that car-mounted terminal initiates handshake authentication request again.
S305, car-mounted terminal receives the authentication response message of server return.
Wherein, in authentication response message, including the first random number after encryption, more new key and the second cryptographic Hash.
Specifically, the second cryptographic Hash, is server according to more new key and the first generating random number.
S306, the car-mounted terminal judge to decipher after the first random number for obtaining and the first random number for generating whether Join, if coupling, S307 is executed, otherwise, execute S301.
S307, carries out key updating according to the more new key for obtaining after deciphering.
Specifically, car-mounted terminal is after deciphering authentication response message, you can contrast authentication response message in first with Machine number, whether identical with local the first random number for generating before, if identical, can determine that the service for sending authentication response message Device is legal, so as to carrying out key updating according to the more new key in authentication response message, otherwise, you can return S301.
Further, in order that server can determine whether car-mounted terminal has carried out key updating, car-mounted terminal is carried out After key updating, a key updating can be returned to server again and confirm message, so that server can be with car-mounted terminal Synchronously key updating is carried out.
For example, server, can be given birth to using random number generator to before car-mounted terminal return authentication response message Become second random number, then by after the second random number encryption, car-mounted terminal is sent to by authentication response message, vehicle-mounted end End according to the first random number, after determining server legitimacy, you can according to the second random number and more new key one Hash of generation Value, and server after cryptographic Hash is encrypted, is returned to, so as to server after key updating to be confirmed message deciphering, you can pass through Judge that key updating confirms whether the second random number in message is identical with the second random number for generating before, if identical, can Determining that car-mounted terminal has carried out key updating, also renewal can will be replaced with the car-mounted terminal corresponding key of mark so as to server Key, so as to complete authentication procedures.
It is understood that the key between car-mounted terminal and server must be consistent, otherwise next time, communication will Failure.But key updating cannot be successful because of the problem of communication link, so require that agreement must be in key updating Also can guarantee that in the case of failure that communication next time is normal.
Therefore, for each car-mounted terminal, two parts of keys can be preserved in server, portion is old (being denoted as KO), Yi Fenshi New (being denoted as KN).When certification request of shaking hands arrives, first deciphered with KN, if be updated successfully, KN meeting successful decryption, if Deciphering failure, then deciphered with KO, if updating failure, will be successful with KO deciphering.If it is determined that key updating success, then again Covering KO can be write during secondary more new key, retain KN;Covering KN is otherwise write, retains KO.
In the present embodiment, car-mounted terminal server in authentication procedures, using using less symmetrical of resource Encryption, decipherment algorithm, carry out authentication and key updating, that is, improve the safety of car-mounted terminal server communication, and Reduce the resource consumption to car-mounted terminal server.
Set up after safety certification host-host protocol is connected in car-mounted terminal and server, you can carry out data transmission, tie below Fig. 4 is closed, the car networking safety communicating method provided by the embodiment of the present application is further described.
The schematic flow sheet that Fig. 4 is carried out data transmission with server for the car-mounted terminal that the embodiment of the present application is provided.
As shown in figure 4, after above-mentioned S307, also including:
S401, the car-mounted terminal constructs the first record protocol head according to data type waiting for transmission.
Wherein, the first record protocol head, for characterizing the type of data to be transmitted, such as travels message for vehicle, or Data with alert etc..
S402, the car-mounted terminal carries out Hash information to the first record protocol head and body of data waiting for transmission Identifying code computing, determines the first message authentication code of data to be transmitted.
S403, the car-mounted terminal using the key after updating and encryption function, will the body of data waiting for transmission with After the first message authentication code is encrypted, the server is transferred to.
Specifically, car-mounted terminal is after the content of each several part of message waiting for transmission is determined, you can write using local Key and encryption function, after body of data and first message certification code encryption, are transferred to server, so that server is adopted Symmetrical decruption key and decryption function, the message for receiving is decrypted, to obtain corresponding data.
Further, server, can be with car-mounted terminal identical side when modifying to the data in car-mounted terminal Formula, body of data and corresponding message authentication code encryption is obtained, after transmitting message, being then forwarded to car-mounted terminal, the corresponding party Method, also includes:
S404, the car-mounted terminal receives the data message that the server sends.
S405, the car-mounted terminal determines the data message according to the second record protocol head in the data message In the second message authentication code position.
S406, the car-mounted terminal utilizes the key after updating and the decryption function symmetrical with encryption function in server, Process is decrypted to the data message, to obtain body of data and the second message authentication that the data message includes Code.
S407, the car-mounted terminal carries out Hash information checking to the second record protocol head and the body of data Code computing, determines the 3rd message authentication code.
S408, the car-mounted terminal judges whether second message authentication code is consistent with the 3rd message authentication code, If consistent, the application layer during the body of data is sent to the car-mounted terminal.
Specifically, car-mounted terminal is after the data message for receiving server transmission, first by symmetrical decruption key and Corresponding decryption function, obtains body of data and the second message authentication code that data message includes after deciphering, then further according to Body of data computing obtains the 3rd message authentication code, if the 3rd message authentication code is consistent with the second message authentication code, clothes is described The data message reliability of business device transmission, so as to clear data body being sent to application layer, so that car-mounted terminal is according to bright Literary data are modified.And if the 3rd message authentication code is inconsistent with the second message authentication code, it is believed that safety certification transmission Agreement connection is unreliable, so as to closing the link, then re-establishes a new connection, or returns transmission to server Unexpected message.
Further, after completing data transfer between car-mounted terminal and server, SATL connection can also be closed, so that Car-mounted terminal server discharges corresponding resource, i.e. the method also includes:
The car-mounted terminal receives the connection closed message that the server sends;
The car-mounted terminal discharges, according to the connection closed message, the local resource for associating with message sink.
Correspondingly, car-mounted terminal can also send connection closed message, the i.e. party to server after data is activation is completed Method also includes:
The car-mounted terminal judges the local whether data message of available for transmission;
If no, returning connection closed response message to the server, so that the server closing is vehicle-mounted with described Communication connection between terminal.
If communicating pair is desired based on current TCP connection and SATL connection is re-established, above-mentioned flow process pass is must comply with Old SATL connection is closed, or SATL connection can also be closed by way of directly closing TCP connection.
The car networking safety communicating method that the present embodiment is provided, car-mounted terminal and server are set up after STAL is connected, you can According to body of data waiting for transmission, the message of transmission is constructed, and is connected by STAL, by data message transmitting to opposite end, And after DTD, close STAL connection in real time, to discharge the resource in car-mounted terminal server.Thus, that is, carry The high safety of car-mounted terminal server communication, reduces the resource consumption to car-mounted terminal server again.Fig. 5 is this The schematic flow sheet of another kind of car networking safety communicating method of application embodiment offer.
As shown in figure 5, the method includes:
S501, server receives the handshake authentication request of car-mounted terminal transmission.
Wherein, the handshake authentication request includes the mark of the car-mounted terminal and adopts and the server identical First cryptographic Hash of symmetric encipherment algorithm encryption;
S502, the server is obtained locally stored with the car-mounted terminal according to the mark of the car-mounted terminal Identify corresponding second initial key;
S503, the server adopt the decipherment algorithm symmetrical with the car-mounted terminal, the handshake authentication is asked into Row deciphering, to determine the first initial key for carrying in handshake authentication request;
S504, the server judges whether first initial key is consistent with second initial key;
S505, if unanimously, to the car-mounted terminal return authentication response message.
Specifically, the executive agent of the car networking safety communicating method that the present embodiment is provided is server.In the present embodiment In, server using the key symmetrical with car-mounted terminal and encryption, decipherment algorithm, by with the interacting of car-mounted terminal, foundation SATL connects, so as to realize the safety of data, transmitting.
The method implement process, can refer to detailed description of the above-described embodiment to car-mounted terminal side, herein no longer Repeat.
The car networking safety communicating method of the embodiment of the present application, server please in the handshake authentication for receiving car-mounted terminal transmission After asking, according to the mark of car-mounted terminal, second initial key corresponding with car-mounted terminal mark is obtained, then adopt and vehicle-mounted end The symmetrical decipherment algorithm in end, is decrypted to handshake authentication request, obtains the first initial key in handshake authentication request, true When fixed first initial key and the second key agreement, to car-mounted terminal return authentication response message.Hereby it is achieved that at vehicle-mounted end The safety certification host-host protocol of lightweight is set up between the server of end, using less resource, improves car-mounted terminal and service The safety of data transfer between device.
In order to realize above-described embodiment, the application also proposes a kind of car-mounted terminal.
Fig. 6 is the structural representation of the car-mounted terminal of the application one embodiment.
As shown in fig. 6, the car-mounted terminal 60 includes:Memorizer 61 and processor 62.
Wherein, memorizer 61, for store program codes;
The processor 62, for calling the code in the storage 61, to execute procedure below:
Complete after transmission control protocol be connected, to ask to server transmission handshake authentication determining with server, wherein, The handshake authentication request includes the mark of the car-mounted terminal and adopts and the server identical symmetric encipherment algorithm First cryptographic Hash of encryption;
The authentication response message of server return is received, the authentication response message is that the server is determining institute State the legal rear return of car-mounted terminal;
According to the authentication response message, safety certification host-host protocol is set up with the server and be connected.
Wherein, the car-mounted terminal that the present embodiment is provided, for executing the car networking secure communication of the offer of above-described embodiment one Method.
In a kind of possible realization of the present embodiment, the processor 62, it is additionally operable to:
According to default rule, the first random number is generated;
According to first random number and first initial key, the first cryptographic Hash is generated;
Using with the server identical symmetric encipherment algorithm, first cryptographic Hash is encrypted;
Sending to the server includes the handshake authentication of the mark of the car-mounted terminal and the first cryptographic Hash after encryption Request.
In a kind of possible realization of the present embodiment, the authentication response message includes the first random number after encryption, more New key and the second cryptographic Hash;
Accordingly, the processor 62, is additionally operable to:
The authentication response message is decrypted process;
Whether the first random number for obtaining after judging to decipher is mated with the first random number for generating;
If coupling, carries out key updating according to the more new key for obtaining after deciphering.
In the alternatively possible realization of the present embodiment, second after also including in the authentication response message to encrypt is random Number;
Accordingly, the processor 62, is additionally operable to:
Update to the server " return " key" and confirm message, the key updating confirms that message includes after encryption the Two randoms number and according to the more new key and the second cryptographic Hash of the second generating random number, so that the server carries out key Update.
In the alternatively possible realization of the present embodiment, the handshake authentication request and authentication response message, including:
Record protocol head, message body and message authentication code corresponding with the message body.
In the alternatively possible realization of the present embodiment, the initial key includes:Read key and write key;
The reading key includes symmetric cryptographic key value, random vector and Hash operation message authentication respectively with writing in key Code algorithm secret key.
In the alternatively possible realization of the present embodiment, the processor 62, it is additionally operable to:
According to data type waiting for transmission, the first record protocol head is constructed;
To the first record protocol head and body of data waiting for transmission, Hash information identifying code computing is carried out, determination is treated The first message authentication code of transmission data;
Using the key after renewal and encryption function, by the body of data waiting for transmission and the first message authentication code After being encrypted, the server is transferred to.
In the present embodiment, another possible realization, the processor 62, are additionally operable to:
Receive the data message of server transmission;
According to the second record protocol head in the data message, the second message authentication code in the data message is determined Position;
Using the key after renewal and the decryption function symmetrical with encryption function in server, the data message is carried out Decryption processing, to obtain body of data and the second message authentication code that the data message includes;
To the second record protocol head and the body of data, Hash information identifying code computing is carried out, determine that the 3rd disappears Breath authentication code;
Judge whether second message authentication code is consistent with the 3rd message authentication code, if unanimously, by the number Application layer in sending to the car-mounted terminal according to body.
In the present embodiment in another possible way of realization, the processor 62, it is additionally operable to:
Receive the connection closed message of server transmission;
According to the connection closed message, the local resource for associating with message sink is discharged.
In the present embodiment in another possible way of realization, the processor 62, it is additionally operable to:
The car-mounted terminal judges the local whether data message of available for transmission;
If no, returning connection closed response message to the server, so that the server closing is vehicle-mounted with described Communication connection between terminal.
It should be noted that the aforementioned explanation to car networking safety communicating method embodiment is also applied for the embodiment Car-mounted terminal, here is omitted.
The car-mounted terminal of the embodiment of the present application, car-mounted terminal be determined at server establish TCP connection after, you can be based on Default initial key and with server identical symmetric encipherment algorithm, to server send handshake authentication request, then receive After the authentication response message for returning to server, you can set up safety certification host-host protocol with server and be connected.Hereby it is achieved that The safety certification host-host protocol of lightweight is set up between car-mounted terminal server, using less resource, improves vehicle-mounted end The safety of data transfer between the server of end.
Fig. 7 is the structural representation of the server of the application one embodiment.
As shown in fig. 7, the server 70, including:Memorizer 71 and processor 72.
Wherein, memorizer 71 is used for store program codes;
The processor 72 is used for calling the program code in the memorizer, to execute following operation:
The handshake authentication request of car-mounted terminal transmission is received, wherein, the handshake authentication request includes the vehicle-mounted end The first cryptographic Hash that the mark at end and employing are encrypted with the server identical symmetric encipherment algorithm;
According to the mark of the car-mounted terminal, obtain at the beginning of locally stored corresponding with the mark of the car-mounted terminal second Beginning key;
Using the decipherment algorithm symmetrical with the car-mounted terminal, handshake authentication request is decrypted, to determine State the first initial key for carrying in handshake authentication request;
Judge whether first initial key is consistent with second initial key;
If consistent, to the car-mounted terminal return authentication response message.
It should be noted that the server is by executing the method for interacting with above-mentioned car-mounted terminal, to build with car-mounted terminal The secure communication connection of vertical lightweight, so as to ensure the safety of data transfer.
It should be noted that the aforementioned explanation to car networking safety communicating method embodiment is also applied for the embodiment Server, here is omitted.
The server of the embodiment of the present application, server receive car-mounted terminal transmission handshake authentication request after, according to car The mark of mounted terminal, obtains second initial key corresponding with car-mounted terminal mark, then adopts the solution symmetrical with car-mounted terminal Close algorithm, is decrypted to handshake authentication request, obtains the first initial key in handshake authentication request, is determining that first is initial When key and the second key agreement, to car-mounted terminal return authentication response message.Hereby it is achieved that in car-mounted terminal server Between set up the safety certification host-host protocol of lightweight, using less resource, improve data between car-mounted terminal server and pass Defeated safety.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for describing with reference to the embodiment or example Point is contained at least one embodiment or the example of the application.Additionally, term " first ", " second " are only used for describing purpose, And it is not intended that indicating or hint relative importance or the implicit quantity for indicating indicated technical characteristic.
It should be appreciated that each several part of the application can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realizing.For example, if realized with hardware, and in another embodiment, can be with well known in the art Any one of row technology or their combination are realizing:The logic gates having for realizing logic function to data signal Discrete logic, the special IC with suitable combinational logic gate circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step of above-described embodiment method carrying Suddenly the hardware that can be by program to instruct correlation is completed, and described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
Storage medium mentioned above can be read only memory, disk or CD etc..Although having shown that above and retouching Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the application System, one of ordinary skill in the art can be changed to above-described embodiment, change, replace and become within the scope of application Type.

Claims (10)

1. a kind of car networking safety communicating method, it is characterised in that comprise the following steps:
Car-mounted terminal has completed after transmission control protocol be connected, to ask to server transmission handshake authentication determining with server, Wherein, the handshake authentication request includes the mark of the car-mounted terminal and adopts and the server identical symmetric cryptography First cryptographic Hash of algorithm for encryption;
The car-mounted terminal receives the authentication response message that the server is returned, and the authentication response message is the server Determining the legal rear return of the car-mounted terminal;
The car-mounted terminal is set up safety certification host-host protocol with the server and is connected according to the authentication response message.
2. the method for claim 1, it is characterised in that the car-mounted terminal sends handshake authentication to server and asks it Before, also include:
The car-mounted terminal generates the first random number according to default rule;
The car-mounted terminal according to first random number and with the first initial key, generate first cryptographic Hash.
3. method as claimed in claim 2, it is characterised in that the authentication response message includes that after encryption first is random Number, more new key and the second cryptographic Hash, after the car-mounted terminal receives the authentication response message that the server is returned, also wrap Include:
The authentication response message is decrypted process by the car-mounted terminal;
Whether the first random number that the car-mounted terminal is obtained after judging to decipher is mated with the first random number for generating;
If coupling, car-mounted terminal carries out key updating according to the more new key for obtaining after deciphering.
4. method as claimed in claim 3, it is characterised in that second after also including in the authentication response message to encrypt with Machine number;
After the car-mounted terminal carries out key updating according to the more new key for obtaining after deciphering, also include:
The car-mounted terminal updates to the server " return " key" and confirms message, and the key updating confirms that message includes to add The second random number after close and according to the more new key and the second cryptographic Hash of the second generating random number, so that the server Carry out key updating.
5. method as claimed in claim 3, it is characterised in that in the handshake authentication request and authentication response message, including:
Record protocol head, message body and message authentication code corresponding with the message body.
6. the method as described in claim 1-5 is arbitrary, it is characterised in that first initial key includes:Read key and Write key;
With writing in key, the reading key includes that symmetric cryptographic key value, random vector and Hash operation message authentication code are calculated respectively Method key.
7. a kind of car networking safety communicating method, it is characterised in that comprise the following steps:
Server receives the handshake authentication request of car-mounted terminal transmission, and wherein, the handshake authentication request includes described vehicle-mounted The first cryptographic Hash that the mark of terminal and employing are encrypted with the server identical symmetric encipherment algorithm;
The server is obtained locally stored corresponding with the mark of the car-mounted terminal according to the mark of the car-mounted terminal Second initial key;
The server adopts the decipherment algorithm symmetrical with the car-mounted terminal, and handshake authentication request is decrypted, with Determine the first initial key for carrying in handshake authentication request;
The server judges whether first initial key is consistent with second initial key;
If consistent, to the car-mounted terminal return authentication response message.
8. a kind of car-mounted terminal, it is characterised in that include:Memorizer and processor for store program codes;
The processor is used for calling the code in the memorizer, to execute procedure below:
Complete after transmission control protocol be connected, to ask to server transmission handshake authentication determining with server, wherein, described Handshake authentication request includes the mark of the car-mounted terminal and adopts to encrypt with the server identical symmetric encipherment algorithm The first cryptographic Hash;
The authentication response message of server return is received, the authentication response message is that the server is determining the car Return after mounted terminal is legal;
According to the authentication response message, safety certification host-host protocol is set up with the server and be connected.
9. a kind of server, it is characterised in that include memorizer and the processor for store program codes,
Wherein, the processor is used for calling the program code in the memorizer, to execute following operation:
The handshake authentication request of car-mounted terminal transmission is received, wherein, the handshake authentication request includes the car-mounted terminal Identify and using the first cryptographic Hash with server identical symmetric encipherment algorithm encryption;
According to the mark of the car-mounted terminal, locally stored corresponding with the mark of the car-mounted terminal second is obtained initially close Key;
Using the decipherment algorithm symmetrical with the car-mounted terminal, handshake authentication request is decrypted, to determine described holding The first initial key for carrying in handss certification request;
Judge whether first initial key is consistent with second initial key;
If consistent, to the car-mounted terminal return authentication response message.
10. a kind of car networking safe communication system, it is characterised in that including car-mounted terminal as claimed in claim 8 and as weighed Profit requires the server described in 9.
CN201610838067.1A 2016-09-21 2016-09-21 Internet of vehicles safety communication method, vehicle-mounted terminal, server and system Active CN106453269B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610838067.1A CN106453269B (en) 2016-09-21 2016-09-21 Internet of vehicles safety communication method, vehicle-mounted terminal, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610838067.1A CN106453269B (en) 2016-09-21 2016-09-21 Internet of vehicles safety communication method, vehicle-mounted terminal, server and system

Publications (2)

Publication Number Publication Date
CN106453269A true CN106453269A (en) 2017-02-22
CN106453269B CN106453269B (en) 2021-06-25

Family

ID=58165775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610838067.1A Active CN106453269B (en) 2016-09-21 2016-09-21 Internet of vehicles safety communication method, vehicle-mounted terminal, server and system

Country Status (1)

Country Link
CN (1) CN106453269B (en)

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106912049A (en) * 2017-04-05 2017-06-30 深圳市风云实业有限公司 The method for improving user authentication experience
CN107070998A (en) * 2017-03-20 2017-08-18 广东工业大学 A kind of safe Internet of Things communications protocol and method
CN107483539A (en) * 2017-07-14 2017-12-15 宝沃汽车(中国)有限公司 The key management method of car networking
CN107491279A (en) * 2017-08-15 2017-12-19 深圳市创维群欣安防科技股份有限公司 A kind of method, storage medium and throwing screen control device realized mobile terminal and throw screen
CN108076062A (en) * 2017-12-22 2018-05-25 深圳市汇川技术股份有限公司 Internet of things equipment safe communication system, method, networked devices and server
CN108243181A (en) * 2017-10-09 2018-07-03 北京车和家信息技术有限公司 A kind of car networking terminal, data ciphering method and car networking server
CN108449735A (en) * 2018-06-25 2018-08-24 中国联合网络通信集团有限公司 Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications
CN108632250A (en) * 2018-03-27 2018-10-09 北京安御道合科技有限公司 The method and apparatus of the generation of instruction manipulation session master key, operational order transmission
CN108810859A (en) * 2018-05-20 2018-11-13 陈将 A kind of Bluetooth smart watch sound control method and system based on encryption function
CN108882164A (en) * 2018-06-05 2018-11-23 宁波市鄞州智伴信息科技有限公司 Safe and reliable auto navigation communication control method
CN108958779A (en) * 2018-09-20 2018-12-07 广东美的暖通设备有限公司 Firmware upgrade management method, device and computer readable storage medium
CN108989318A (en) * 2018-07-26 2018-12-11 中国电子科技集团公司第三十研究所 A kind of lightweight safety certification and key exchange method towards narrowband Internet of Things
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car
CN108989282A (en) * 2018-06-06 2018-12-11 咕咚网络(北京)有限公司 The connection method of door lock terminal and gateway in a kind of Wireless Networking door-locking system
CN109495441A (en) * 2018-09-10 2019-03-19 北京车和家信息技术有限公司 Access authentication method, device, relevant device and computer readable storage medium
CN109525559A (en) * 2018-10-25 2019-03-26 深圳市创维群欣安防科技股份有限公司 A kind of picture sharing method and system
CN109561116A (en) * 2017-09-26 2019-04-02 株洲中车时代电气股份有限公司 Obtain the method and Train Control and diagnostic system of low-floor train fault data
CN109617886A (en) * 2018-12-21 2019-04-12 广州市宏大欣电子科技有限公司 Client data encryption method and service end data encryption method based on TCP communication
CN109672538A (en) * 2019-02-13 2019-04-23 北京仁信证科技有限公司 A kind of lightweight vehicle bus safety communicating method and safe communication system
CN109862040A (en) * 2019-03-27 2019-06-07 北京经纬恒润科技有限公司 A kind of safety certifying method and Verification System
CN110071904A (en) * 2018-01-24 2019-07-30 比亚迪股份有限公司 A kind of detection method of car-mounted terminal and system, server and storage medium
CN110182218A (en) * 2019-05-23 2019-08-30 格陆博科技有限公司 A kind of power bottom plate domain controller for unmanned electric vehicle
CN110263526A (en) * 2019-06-13 2019-09-20 惠州市德赛西威汽车电子股份有限公司 A kind of producing line certificate injected system and its method
CN110719247A (en) * 2018-07-11 2020-01-21 视联动力信息技术股份有限公司 Terminal network access method and device
CN110719248A (en) * 2018-07-12 2020-01-21 中移(杭州)信息技术有限公司 Method and device for forwarding user datagram protocol message
CN110830491A (en) * 2019-11-14 2020-02-21 武汉虹信通信技术有限责任公司 Internet of vehicles information acquisition method and device
CN110912680A (en) * 2019-11-26 2020-03-24 福建汉特云智能科技有限公司 Data transmission method for improving safety of vehicle condition data and storage medium
CN111127706A (en) * 2019-11-28 2020-05-08 深圳指芯物联技术有限公司 Intelligent lock control method, intelligent lock, cloud server and computing equipment
CN111182498A (en) * 2019-12-31 2020-05-19 成都车晓科技有限公司 Real-time asset management method and system for motor vehicle
CN111475869A (en) * 2020-03-31 2020-07-31 东软集团股份有限公司 Communication method, device, medium, secure computing module and secure chip
CN111541716A (en) * 2020-05-14 2020-08-14 东软睿驰汽车技术(沈阳)有限公司 Data transmission method and related device
CN111629002A (en) * 2020-05-28 2020-09-04 爱瑟福信息科技(上海)有限公司 OTA (over the air) safety upgrading method and system of vehicle ECU (electronic control Unit)
CN111787125A (en) * 2020-08-05 2020-10-16 安徽江淮汽车集团股份有限公司 Information interaction system and method
CN111865666A (en) * 2020-06-24 2020-10-30 微梦创科网络科技(中国)有限公司 Service method and system for integrating API gateway by sdk
CN112087419A (en) * 2020-07-25 2020-12-15 北京蜂云科创信息技术有限公司 Vehicle-mounted terminal data transmission safety protection method and device
CN112134843A (en) * 2020-08-19 2020-12-25 南京信息职业技术学院 Authentication method of Internet of things equipment
CN112328271A (en) * 2019-07-31 2021-02-05 株洲中车时代电气股份有限公司 Vehicle-mounted equipment software upgrading method and system
CN112383897A (en) * 2020-10-19 2021-02-19 东软集团股份有限公司 Information transmission method, device, medium and electronic equipment based on intelligent network connection
CN112437436A (en) * 2020-12-07 2021-03-02 中国联合网络通信集团有限公司 Identity authentication method and device
CN112565251A (en) * 2020-12-02 2021-03-26 北京梧桐车联科技有限责任公司 Access authentication method, device and system for vehicle-mounted application
CN112839035A (en) * 2020-12-29 2021-05-25 合安科技技术有限公司 Safe communication control method and device for street lamp and related equipment
CN112839019A (en) * 2019-11-25 2021-05-25 广州汽车集团股份有限公司 Vehicle-mounted data transmission method, device and system
CN113207322A (en) * 2020-05-15 2021-08-03 华为技术有限公司 Communication method and communication device
CN113347133A (en) * 2020-02-18 2021-09-03 华为技术有限公司 Authentication method and device for vehicle-mounted equipment
CN113395335A (en) * 2021-05-31 2021-09-14 江铃汽车股份有限公司 Detection method and system for connecting vehicle-mounted intelligent terminal with background server
CN113572795A (en) * 2020-04-28 2021-10-29 广州汽车集团股份有限公司 Vehicle safety communication method and system and vehicle-mounted terminal
CN113656822A (en) * 2021-08-31 2021-11-16 成都卫士通信息产业股份有限公司 Multimedia conference key management method, device, equipment and storage medium
CN113660271A (en) * 2021-08-17 2021-11-16 安徽江淮汽车集团股份有限公司 Security authentication method and device for Internet of vehicles
CN113992331A (en) * 2021-11-15 2022-01-28 苏州挚途科技有限公司 Vehicle-mounted Ethernet data transmission method, device and system
CN114157489A (en) * 2021-12-02 2022-03-08 安徽江淮汽车集团股份有限公司 Communication domain controller safety communication method based on periodic authentication handshake mechanism
CN115174605A (en) * 2021-03-17 2022-10-11 大唐移动通信设备有限公司 Internet of vehicles equipment authentication method and device and processor readable storage medium
CN111083664B (en) * 2018-10-19 2023-05-02 本田技研工业株式会社 Authentication registration system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI814487B (en) * 2022-07-15 2023-09-01 系統電子工業股份有限公司 Remote update vehicle host method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012215922A (en) * 2011-03-31 2012-11-08 Japan Research Institute Ltd Car sharing system and car sharing method
CN103684766A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Private key protection method and system for terminal user
CN103746969A (en) * 2013-12-24 2014-04-23 深圳市领华卫通数码科技有限公司 Vehicle terminal authentication method and authentication server
CN104363586A (en) * 2014-11-14 2015-02-18 安徽大学 Lightweight-class roaming access authentication method for Internet of Vehicles
CN104579694A (en) * 2015-02-09 2015-04-29 浙江大学 Identity authentication method and system
CN105101194A (en) * 2014-04-28 2015-11-25 华为技术有限公司 Terminal security authentication method, device and system
CN105656862A (en) * 2014-11-21 2016-06-08 航天恒星科技有限公司 Authentication method and device
WO2016118523A1 (en) * 2015-01-19 2016-07-28 InAuth, Inc. Systems and methods for trusted path secure communication
CN105871857A (en) * 2016-04-13 2016-08-17 北京怡和嘉业医疗科技有限公司 Authentication method, authentication device, authentication system and treatment equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012215922A (en) * 2011-03-31 2012-11-08 Japan Research Institute Ltd Car sharing system and car sharing method
CN103684766A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Private key protection method and system for terminal user
CN103746969A (en) * 2013-12-24 2014-04-23 深圳市领华卫通数码科技有限公司 Vehicle terminal authentication method and authentication server
CN105101194A (en) * 2014-04-28 2015-11-25 华为技术有限公司 Terminal security authentication method, device and system
CN104363586A (en) * 2014-11-14 2015-02-18 安徽大学 Lightweight-class roaming access authentication method for Internet of Vehicles
CN105656862A (en) * 2014-11-21 2016-06-08 航天恒星科技有限公司 Authentication method and device
WO2016118523A1 (en) * 2015-01-19 2016-07-28 InAuth, Inc. Systems and methods for trusted path secure communication
CN104579694A (en) * 2015-02-09 2015-04-29 浙江大学 Identity authentication method and system
CN105871857A (en) * 2016-04-13 2016-08-17 北京怡和嘉业医疗科技有限公司 Authentication method, authentication device, authentication system and treatment equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WENLONG SHEN等: "《Cooperative Message Authentication in Vehicular Cyber-Physical Systems》", 《IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING》 *
高文彬: "《TCM在车联网移动终端中的应用》", 《中国优秀硕士学位论文全文数据库信息科技辑》《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107070998A (en) * 2017-03-20 2017-08-18 广东工业大学 A kind of safe Internet of Things communications protocol and method
CN107070998B (en) * 2017-03-20 2019-11-29 广东工业大学 A kind of safe Internet of Things communications protocol and method
CN106912049B (en) * 2017-04-05 2020-11-06 深圳市风云实业有限公司 Method for improving user authentication experience
CN106912049A (en) * 2017-04-05 2017-06-30 深圳市风云实业有限公司 The method for improving user authentication experience
CN107483539A (en) * 2017-07-14 2017-12-15 宝沃汽车(中国)有限公司 The key management method of car networking
CN107491279A (en) * 2017-08-15 2017-12-19 深圳市创维群欣安防科技股份有限公司 A kind of method, storage medium and throwing screen control device realized mobile terminal and throw screen
CN109561116A (en) * 2017-09-26 2019-04-02 株洲中车时代电气股份有限公司 Obtain the method and Train Control and diagnostic system of low-floor train fault data
CN108243181A (en) * 2017-10-09 2018-07-03 北京车和家信息技术有限公司 A kind of car networking terminal, data ciphering method and car networking server
CN108076062A (en) * 2017-12-22 2018-05-25 深圳市汇川技术股份有限公司 Internet of things equipment safe communication system, method, networked devices and server
CN110071904A (en) * 2018-01-24 2019-07-30 比亚迪股份有限公司 A kind of detection method of car-mounted terminal and system, server and storage medium
CN108632250A (en) * 2018-03-27 2018-10-09 北京安御道合科技有限公司 The method and apparatus of the generation of instruction manipulation session master key, operational order transmission
CN108632250B (en) * 2018-03-27 2020-12-08 北京安御道合科技有限公司 Method and equipment for generating command control session master key and transmitting operation command
CN108810859A (en) * 2018-05-20 2018-11-13 陈将 A kind of Bluetooth smart watch sound control method and system based on encryption function
CN108882164B (en) * 2018-06-05 2020-08-21 台州市荣创电子有限公司 Safe and reliable automobile navigation communication control method
CN108882164A (en) * 2018-06-05 2018-11-23 宁波市鄞州智伴信息科技有限公司 Safe and reliable auto navigation communication control method
CN108989282A (en) * 2018-06-06 2018-12-11 咕咚网络(北京)有限公司 The connection method of door lock terminal and gateway in a kind of Wireless Networking door-locking system
CN108449735A (en) * 2018-06-25 2018-08-24 中国联合网络通信集团有限公司 Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car
CN108989024B (en) * 2018-06-29 2023-04-14 百度在线网络技术(北京)有限公司 Method, device and equipment for controlling communication between ECUs and corresponding vehicle
CN110719247B (en) * 2018-07-11 2021-09-10 视联动力信息技术股份有限公司 Terminal network access method and device
CN110719247A (en) * 2018-07-11 2020-01-21 视联动力信息技术股份有限公司 Terminal network access method and device
CN110719248B (en) * 2018-07-12 2021-08-17 中移(杭州)信息技术有限公司 Method and device for forwarding user datagram protocol message
CN110719248A (en) * 2018-07-12 2020-01-21 中移(杭州)信息技术有限公司 Method and device for forwarding user datagram protocol message
CN108989318A (en) * 2018-07-26 2018-12-11 中国电子科技集团公司第三十研究所 A kind of lightweight safety certification and key exchange method towards narrowband Internet of Things
CN108989318B (en) * 2018-07-26 2020-12-29 中国电子科技集团公司第三十研究所 Light-weight security authentication and key exchange method for narrowband Internet of things
CN109495441A (en) * 2018-09-10 2019-03-19 北京车和家信息技术有限公司 Access authentication method, device, relevant device and computer readable storage medium
CN108958779A (en) * 2018-09-20 2018-12-07 广东美的暖通设备有限公司 Firmware upgrade management method, device and computer readable storage medium
CN111083664B (en) * 2018-10-19 2023-05-02 本田技研工业株式会社 Authentication registration system
CN109525559A (en) * 2018-10-25 2019-03-26 深圳市创维群欣安防科技股份有限公司 A kind of picture sharing method and system
CN109525559B (en) * 2018-10-25 2021-08-10 深圳创维数字技术有限公司 Picture sharing method and system
CN109617886B (en) * 2018-12-21 2021-07-27 广东宏大欣电子科技有限公司 Client data encryption method and server data encryption method based on TCP communication
CN109617886A (en) * 2018-12-21 2019-04-12 广州市宏大欣电子科技有限公司 Client data encryption method and service end data encryption method based on TCP communication
CN109672538B (en) * 2019-02-13 2021-08-27 北京仁信证科技有限公司 Lightweight vehicle-mounted bus secure communication method and system
CN109672538A (en) * 2019-02-13 2019-04-23 北京仁信证科技有限公司 A kind of lightweight vehicle bus safety communicating method and safe communication system
CN109862040B (en) * 2019-03-27 2021-08-24 北京经纬恒润科技股份有限公司 Security authentication method and authentication system
CN109862040A (en) * 2019-03-27 2019-06-07 北京经纬恒润科技有限公司 A kind of safety certifying method and Verification System
CN110182218A (en) * 2019-05-23 2019-08-30 格陆博科技有限公司 A kind of power bottom plate domain controller for unmanned electric vehicle
CN110263526B (en) * 2019-06-13 2023-08-18 惠州市德赛西威汽车电子股份有限公司 Production line certificate injection system and method thereof
CN110263526A (en) * 2019-06-13 2019-09-20 惠州市德赛西威汽车电子股份有限公司 A kind of producing line certificate injected system and its method
CN112328271A (en) * 2019-07-31 2021-02-05 株洲中车时代电气股份有限公司 Vehicle-mounted equipment software upgrading method and system
CN112328271B (en) * 2019-07-31 2022-05-03 株洲中车时代电气股份有限公司 Vehicle-mounted equipment software upgrading method and system
CN110830491A (en) * 2019-11-14 2020-02-21 武汉虹信通信技术有限责任公司 Internet of vehicles information acquisition method and device
CN112839019B (en) * 2019-11-25 2023-04-25 广州汽车集团股份有限公司 Vehicle-mounted data transmission method, device and system
CN112839019A (en) * 2019-11-25 2021-05-25 广州汽车集团股份有限公司 Vehicle-mounted data transmission method, device and system
CN110912680B (en) * 2019-11-26 2023-06-27 福建汉特云智能科技有限公司 Data transmission method and storage medium for improving safety of vehicle condition data
CN110912680A (en) * 2019-11-26 2020-03-24 福建汉特云智能科技有限公司 Data transmission method for improving safety of vehicle condition data and storage medium
CN111127706A (en) * 2019-11-28 2020-05-08 深圳指芯物联技术有限公司 Intelligent lock control method, intelligent lock, cloud server and computing equipment
CN111127706B (en) * 2019-11-28 2022-04-22 深圳指芯物联技术有限公司 Intelligent lock control method, intelligent lock, cloud server and computing equipment
CN111182498A (en) * 2019-12-31 2020-05-19 成都车晓科技有限公司 Real-time asset management method and system for motor vehicle
CN113347133A (en) * 2020-02-18 2021-09-03 华为技术有限公司 Authentication method and device for vehicle-mounted equipment
CN111475869B (en) * 2020-03-31 2023-10-27 东软集团股份有限公司 Communication method, device, medium, secure computing module and secure chip
CN111475869A (en) * 2020-03-31 2020-07-31 东软集团股份有限公司 Communication method, device, medium, secure computing module and secure chip
CN113572795B (en) * 2020-04-28 2023-10-27 广州汽车集团股份有限公司 Vehicle safety communication method, system and vehicle-mounted terminal
CN113572795A (en) * 2020-04-28 2021-10-29 广州汽车集团股份有限公司 Vehicle safety communication method and system and vehicle-mounted terminal
CN111541716A (en) * 2020-05-14 2020-08-14 东软睿驰汽车技术(沈阳)有限公司 Data transmission method and related device
CN113207322A (en) * 2020-05-15 2021-08-03 华为技术有限公司 Communication method and communication device
CN113207322B (en) * 2020-05-15 2022-09-23 华为技术有限公司 Communication method and communication device
CN111629002A (en) * 2020-05-28 2020-09-04 爱瑟福信息科技(上海)有限公司 OTA (over the air) safety upgrading method and system of vehicle ECU (electronic control Unit)
CN111865666A (en) * 2020-06-24 2020-10-30 微梦创科网络科技(中国)有限公司 Service method and system for integrating API gateway by sdk
CN112087419A (en) * 2020-07-25 2020-12-15 北京蜂云科创信息技术有限公司 Vehicle-mounted terminal data transmission safety protection method and device
CN112087419B (en) * 2020-07-25 2022-07-29 北京蜂云科创信息技术有限公司 Vehicle-mounted terminal data transmission safety protection method and device
CN111787125A (en) * 2020-08-05 2020-10-16 安徽江淮汽车集团股份有限公司 Information interaction system and method
CN111787125B (en) * 2020-08-05 2021-09-28 安徽江淮汽车集团股份有限公司 Information interaction system and method
CN112134843A (en) * 2020-08-19 2020-12-25 南京信息职业技术学院 Authentication method of Internet of things equipment
CN112134843B (en) * 2020-08-19 2023-10-13 南京信息职业技术学院 Authentication method of Internet of things equipment
CN112383897A (en) * 2020-10-19 2021-02-19 东软集团股份有限公司 Information transmission method, device, medium and electronic equipment based on intelligent network connection
CN112383897B (en) * 2020-10-19 2023-09-22 东软集团股份有限公司 Information transmission method, device, medium and electronic equipment based on intelligent network
CN112565251A (en) * 2020-12-02 2021-03-26 北京梧桐车联科技有限责任公司 Access authentication method, device and system for vehicle-mounted application
CN112437436B (en) * 2020-12-07 2023-05-02 中国联合网络通信集团有限公司 Identity authentication method and device
CN112437436A (en) * 2020-12-07 2021-03-02 中国联合网络通信集团有限公司 Identity authentication method and device
CN112839035A (en) * 2020-12-29 2021-05-25 合安科技技术有限公司 Safe communication control method and device for street lamp and related equipment
CN115174605A (en) * 2021-03-17 2022-10-11 大唐移动通信设备有限公司 Internet of vehicles equipment authentication method and device and processor readable storage medium
CN113395335B (en) * 2021-05-31 2022-04-08 江铃汽车股份有限公司 Detection method and system for connecting vehicle-mounted intelligent terminal with background server
CN113395335A (en) * 2021-05-31 2021-09-14 江铃汽车股份有限公司 Detection method and system for connecting vehicle-mounted intelligent terminal with background server
CN113660271B (en) * 2021-08-17 2022-11-25 安徽江淮汽车集团股份有限公司 Security authentication method and device for Internet of vehicles
CN113660271A (en) * 2021-08-17 2021-11-16 安徽江淮汽车集团股份有限公司 Security authentication method and device for Internet of vehicles
CN113656822A (en) * 2021-08-31 2021-11-16 成都卫士通信息产业股份有限公司 Multimedia conference key management method, device, equipment and storage medium
CN113992331A (en) * 2021-11-15 2022-01-28 苏州挚途科技有限公司 Vehicle-mounted Ethernet data transmission method, device and system
CN114157489A (en) * 2021-12-02 2022-03-08 安徽江淮汽车集团股份有限公司 Communication domain controller safety communication method based on periodic authentication handshake mechanism

Also Published As

Publication number Publication date
CN106453269B (en) 2021-06-25

Similar Documents

Publication Publication Date Title
CN106453269A (en) Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system
CN105978917B (en) A kind of system and method for trusted application safety certification
CN101641976B (en) An authentication method
CN1961557B (en) Method and system for a secure connection in communication networks
US8799657B2 (en) Method and system of reconstructing a secret code in a vehicle for performing secure operations
CN101401465B (en) Method and system for recursive authentication in a mobile network
CN109728909A (en) Identity identifying method and system based on USBKey
US11282079B2 (en) Method for securing contactless transactions
KR101706117B1 (en) Apparatus and method for other portable terminal authentication in portable terminal
CN109218263A (en) A kind of control method and device
CN107690642A (en) Radio communication
CN107800675A (en) A kind of data transmission method, terminal and server
CN1977559B (en) Method and system for protecting information exchanged during communication between users
CN108964897B (en) Identity authentication system and method based on group communication
KR20140134663A (en) Method for verifying the identity of a user of a communicating terminal and associated system
CN111541716A (en) Data transmission method and related device
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN107454035A (en) A kind of identity authentication method and device
CN106712939A (en) Offline key transmission method and device
CN106056419A (en) Method, system and device for realizing independent transaction by using electronic signature equipment
CN113507372A (en) Bidirectional authentication method for interface request
CN108447149A (en) A kind of unlocking method and device in shared house
CN108966214A (en) Authentication method, the wireless network safety communication method and device of wireless network
CN108352982B (en) Communication device, communication method, and recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant