CN106487783A - The encryption method connecting for vehicle communication and device - Google Patents

The encryption method connecting for vehicle communication and device Download PDF

Info

Publication number
CN106487783A
CN106487783A CN201610859377.1A CN201610859377A CN106487783A CN 106487783 A CN106487783 A CN 106487783A CN 201610859377 A CN201610859377 A CN 201610859377A CN 106487783 A CN106487783 A CN 106487783A
Authority
CN
China
Prior art keywords
key
terminal
symmetric
encrypted
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610859377.1A
Other languages
Chinese (zh)
Inventor
林胜财
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Summit Electronic Technology Co Ltd
Original Assignee
Shenzhen Summit Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Summit Electronic Technology Co Ltd filed Critical Shenzhen Summit Electronic Technology Co Ltd
Priority to CN201610859377.1A priority Critical patent/CN106487783A/en
Publication of CN106487783A publication Critical patent/CN106487783A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Abstract

The present invention proposes a kind of encryption method for vehicle communication connection and device.The method comprises the following steps:First terminal generates public key and private key according to rivest, shamir, adelman and stores;Described public key is passed to second terminal;Receive encrypted symmetric key, described encrypted symmetric key is generated symmetric key according to symmetric encipherment algorithm and preserved by described second terminal, then this symmetric key is encrypted and is obtained by described rivest, shamir, adelman and described public key;According to rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtain described symmetric key and preserve.Encryption method for vehicle communication connection proposed by the present invention and device, using RSA2048 AES, symmetric key is encrypted, general data then adopts AES128 AES to encrypt, and is effective to ensure that the safety of data, will not increase the transmission quantity of data simultaneously.

Description

The encryption method connecting for vehicle communication and device
Technical field
The present invention relates to communication connect field of encryption, especially relate to for vehicle communication connect encryption method and Device.
Background technology
With the development of social intelligence, the terminal that vehicle is controlled also is changed into intelligent vehicle by original car key Key or smart mobile phone, communication distance also achieves long-range.
Original vehicle remote control device is all based on rolling code AES, and these algorithms have AES reliability not Enough, the shortcomings of data extensibility is looked into.The control of vehicle remote needs safer encryption method.
And although rivest, shamir, adelman is safe, because its ciphering process needs to take a large amount of computing resources, and Data volume after encryption is big, in actual applications and impracticable.
Content of the invention
The main object of the present invention is for providing a kind of encryption method for vehicle communication connection and device it is ensured that vehicle Communication security.
The present invention proposes a kind of encryption method for vehicle communication connection, comprises the following steps:
First terminal generates public key and private key according to rivest, shamir, adelman and stores;
Described public key is passed to second terminal;
Receive encrypted symmetric key, described encrypted symmetric key is first generated according to symmetric encipherment algorithm by described second terminal Symmetric key simultaneously preserves, then this symmetric key is encrypted and is obtained by described rivest, shamir, adelman and described public key;
According to rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtain described symmetric key simultaneously Preserve.
Preferably, described rivest, shamir, adelman includes RSA cryptographic algorithms;
The key length that described RSA cryptographic algorithms adopt is 2048 bits.
Preferably, described symmetric encipherment algorithm includes AES encryption algorithm;
The key length that described AES encryption algorithm adopts is 128 bits.
Preferably, when described second terminal is server, described first terminal includes:Vehicle-mounted MTK platform, operation APP Intelligent terminal or one of Intelligent key.
When described second terminal is vehicle-mounted MTK platform, described first terminal is Intelligent key.
Preferably, when first terminal is for described vehicle-mounted MTK platform, described according to rivest, shamir, adelman generate public key and Also include after private key the step that stores:
Described private key is passed to CANBus chip, described CANBus chip is the control chip of vehicle.
Preferably, after the step of described reception encrypted symmetric key,
Described vehicle-mounted MTK platform sends encrypted symmetric key to described CANBus chip, by described CANBus chip According to described rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtain symmetric key and be saved in institute State CANBus chip.
Preferably, the transfer mode between described vehicle-mounted MTK platform and described server is UDP;
Transfer mode between the intelligent terminal of described operation APP and described server is HTTP;
Transfer mode between described Intelligent key and described server is UDP;And/or
Transfer mode between described vehicle-mounted MTK platform and Intelligent key is bluetooth.
Preferably, described according to rivest, shamir, adelman and described in described private key pair encrypted symmetric key deciphering, obtain institute After stating symmetric key the step that preserves:
First terminal is sent to the transmission data of second terminal according to described symmetric encipherment algorithm and described symmetric key It is encrypted, or
Receive and according to described symmetric encipherment algorithm and described symmetric key, second terminal is sent to first through second terminal The data of terminal is encrypted the encrypted received data of acquisition, according to described symmetric encipherment algorithm and described symmetric key to encryption Receiving data is deciphered, and obtains receiving data.
The present invention also provides a kind of encryption device for vehicle communication connection, including:
Key production module, generates public key and private key for first terminal according to rivest, shamir, adelman and stores;
Key transfer module, for passing to second terminal by described public key;
Key reception module, receives encrypted symmetric key, and described encrypted symmetric key is by described second terminal according to symmetrical AES generates symmetric key and preserves, then this symmetric key is carried out by described rivest, shamir, adelman and described public key Encrypt and obtain;
Cipher key decryption block, according to rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtains Described symmetric key simultaneously preserves.
Preferably, a kind of encryption device for vehicle communication connection that the present invention provides, also includes:
Data encryption module, for sending to first terminal to according to described symmetric encipherment algorithm and described symmetric key The transmission data of two terminals is encrypted;
Data decryption module, for receiving through second terminal according to described symmetric encipherment algorithm and described symmetric key to the Two terminals send to the data of first terminal the encrypted received data being encrypted acquisition, according to described symmetric encipherment algorithm and institute State symmetric key encrypted received data is deciphered, obtain receiving data.
Encryption method for vehicle communication connection proposed by the present invention and device, using RSA2048 AES to right Key is claimed to be encrypted, general data then adopts AES128 AES to encrypt, and is effective to ensure that the safety of data, simultaneously The transmission quantity of data will not be increased.
Brief description
Fig. 1 is used for the schematic flow sheet of the encryption method first embodiment that vehicle communication connects for the present invention;
Fig. 2 is used for the schematic flow sheet of the encryption method second embodiment that vehicle communication connects for the present invention;
Fig. 3 is used for the schematic flow sheet of the encryption method 3rd embodiment that vehicle communication connects for the present invention;
Fig. 4 is used for the schematic flow sheet of the encryption method fourth embodiment that vehicle communication connects for the present invention;
Fig. 5 is used for the schematic flow sheet of encryption method the 5th embodiment that vehicle communication connects for the present invention;
Fig. 6 is used for the structural representation of the encryption device sixth embodiment that vehicle communication connects for the present invention;
Fig. 7 is used for the structural representation of encryption device the 7th embodiment that vehicle communication connects for the present invention.
The realization of the object of the invention, functional characteristics and advantage will be described further in conjunction with the embodiments referring to the drawings.
Specific embodiment
It should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
Embodiments of the invention are described below in detail, the example of described embodiment is shown in the drawings, wherein from start to finish The element that same or similar label represents same or similar element or has same or like function.Below with reference to attached The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " Individual ", " described ", " above-mentioned " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that making in the description of the present invention Wording " inclusion " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existing Or add other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that working as me Claim element to be " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or also may be used There is intermediary element.Additionally, " connection " used herein or " coupling " can include wirelessly connecting or wirelessly coupling.Here make Wording "and/or" includes one or more associated list the whole of item or any cell and combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art Language and scientific terminology), there is the general understanding identical meaning with the those of ordinary skill in art of the present invention.Also should Be understood by, those terms defined in such as general dictionary it should be understood that have with the context of prior art in The consistent meaning of meaning, and unless by specific definitions as here, otherwise will not use idealization or excessively formal implication To explain.
As shown in figure 1, the flow process that Fig. 1 is used for, for the present invention, the encryption method first embodiment that vehicle communication connects is illustrated Figure.The embodiment of the present invention proposes a kind of encryption method for vehicle communication connection, comprises the following steps:
S10, first terminal generates public key and private key according to rivest, shamir, adelman and stores;
S20, described public key is passed to second terminal;
S30, receives encryption second terminal symmetric key,
Described encrypted symmetric key first generates symmetric key by described second terminal according to symmetric encipherment algorithm and preserves, then This symmetric key is encrypted and is obtained by described rivest, shamir, adelman and described public key;
S40, according to rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtains described symmetrically close Key simultaneously preserves.
Unsymmetrical key is also public key encryption, and it is to be encoded with two mathematically related cipher key pair information.Its In key public-key cryptography, can arbitrarily issue the people that expectation securely communicates with key holder.Public-key cryptography is used for Information is encrypted.Second key is private cipher key, belongs to key holder.The letter that key holder is received with private cipher key pair Breath is decrypted.
The feature of asymmetric cryptosystem:Algorithm intensity is complicated, safety depends on algorithm and key is still due to its calculation Method is complicated, and makes encrypting and decrypting speed not have the speed of symmetric cryptography deciphering fast.Only have a kind of key in DSE arithmetic, And it is private, if will decipher to allow other side know key.So ensureing that its safety is ensuring that the peace of key Entirely, and Asymmetric encryption has two kinds of keys, one of them is disclosed, thus can not need as symmetric cryptography The key of transmission other side.So safety is just big a lot.
, compared with symmetric cryptography, its safety is more preferable for asymmetric encryption:The communicating pair of symmetric cryptography uses identical secret Key, if the key of a side is revealed, then whole communication will be cracked.And asymmetric encryption use a pair of key, one It is used for encrypting, one is used for deciphering, and public key is disclosed, key is oneself to preserve it is not necessary to as symmetric cryptography Before a communication will first synchronization key.
The shortcoming of asymmetric encryption is encryption and deciphering cost time length, speed are slow, is only suitable for low volume data is carried out to add Close.
Used in asymmetric encryption, main algorithm has:RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC are (ellipse Circular curve AES) etc..
Symmetric cryptography (being also private key encryption) refers to the AES encrypted and decipher using same key.Sometimes it is tradition again , it is simply that encryption key can calculate from decruption key, decruption key can also be from encryption key simultaneously for cryptographic algorithm Calculate.And in most symmetry algorithm, encryption key and decruption key are identicals, so also referred to as this encryption is calculated Method is secret-key algorithm or single key algorithm.It required sender and recipient before secure communication, decided through consultation a key. The safety of symmetry algorithm depends on key, and leakage key means that anyone message that they can be sent or receive Deciphering, so the confidentiality of key is most important to the safety of communication.
The feature of symmetric encipherment algorithm is that algorithm is open, amount of calculation is little, enciphering rate is fast, encryption efficiency is high.Weak point It is that all using same key, safety cannot be guaranteed both parties.
The algorithm commonly used in a symmetric encryption algorithm has:DES、3DES、TDEA、Blowfish、RC2、RC4、RC5、IDEA、 SKIPJACK, AES etc..
Optionally, described rivest, shamir, adelman includes RSA cryptographic algorithms;
The key length that described RSA cryptographic algorithms adopt is 2048 bits.
RSA public key encryption algorithm is 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamir (Adi Shamir) proposes together with Leonard A Deman (Leonard Adleman).Announce first within 1987, at that time he Three people all the Massachusetts Institute of Technology work.RSA is exactly that their three people's surnames start the alphabetical composition that is stitched together.
Presently, the safety of RSA2048 key is good, there is no the probability cracking.
Optionally, described symmetric encipherment algorithm includes AES encryption algorithm;
The key length that described AES encryption algorithm adopts is 128 bits.
AES encryption algorithm, also known as Advanced Encryption Standard (English:Advanced Encryption Standard, abbreviation: AES), also known as Rijndael enciphered method in cryptography, it is a kind of block encryption standard that Federal Government adopts.This mark Mutatis mutandis to substitute original DES, in many ways analyzed and widely the whole world used.AES encryption algorithm has symmetric cryptography Advantage, safety also meets the needs of vehicle communication.
Optionally, the transfer mode between described vehicle-mounted MTK platform and described server is UDP;
Transfer mode between the intelligent terminal of described operation APP and described server is HTTP;
Transfer mode between described Intelligent key and described server is UDP;And/or
Transfer mode between described vehicle-mounted MTK platform and Intelligent key is bluetooth.
UDP is the abbreviation of User Datagram Protocol, and Chinese name is UDP, is OSI (Open System Interconnection, open system interconnection) a kind of connectionless transport layer protocol in reference model, face is provided To the simply unreliable information transmission service of affairs, IETF RFC 768 is the formal specification of UDP.
Udp protocol full name is UDP, and it is used for processing data bag as Transmission Control Protocol in a network, is A kind of connectionless agreement.In osi model, in the 4th layer of transport layer, it is in the last layer of IP agreement.UDP is used for propping up Hold the network application that those need transmission data between the computers.Numerous visitor including Video Conference System The network application of family/server mode is required for using udp protocol.Udp protocol has been used many years so far from coming out, Although its initial brilliance is covered by some similar agreements, even today UDP still can yet be regarded as one non- Chang Shiyong and feasible network transmission layer protocol.
As known TCP (transmission control protocol) agreement, udp protocol is located immediately at IP (Internet protocol) agreement Top layer.According to OSI (open system interconnection) reference model, UDP and TCP broadly falls into transport layer protocol.The Main Function of udp protocol It is the form that network traffic data is compressed into packet.One typical packet is exactly the transmission list of a binary data Position.Front 8 bytes of each packet are used for comprising header information, and remainder bytes are then used for comprising specific transmission data.
For current, the data transmission capabilities of vehicle-mounted MTK platform and Intelligent key are weaker, are not suitable for transmitting counting in a large number According to.The transmission means of UDP is suitable to the connection of vehicle-mounted MTK platform and Intelligent key and Cloud Server.
HTTP, namely HTML (Hypertext Markup Language) (HTTP, HyperText Transfer Protocol) be on the Internet should With a kind of most commonly used procotol.
Optionally, when first terminal is for described vehicle-mounted MTK platform, described public key and private are generated according to RSA cryptographic algorithms Also include after key the step that stores:
Described private key is passed to CANBus chip, described CANBus chip is the control chip of vehicle.
CANBus (ControLLer Area Net-work Bus) as ISO11898CAN standard, is in maker Field equipment connecting (sensor, executor, controller etc.), the serial bus system towards broadcast.
CANBus data link layer protocol adopts peer-to-peer (Peer to peer) communication mode, even if event in main frame Barrier, system remainder still can run (certain performance is necessarily affected).When a station state changes, it can broadcast transmission Information is to all websites.
The information transfer of CANBus is carried out by message, and message frame has 4 types:Frame, remote frame, error frame and super Carry frame.The data fields of CANBus frame are shorter, and less than 8B, data length is given in controlling filed.Duan Zheng transmission side face reduces Message error rate, is simultaneously also beneficial to reduce the transmission time delay of other websites.The confirmation that frame sends is by dispatching station and reception Stand and jointly complete, the ACK field that dispatching station sends comprises two " idle " positions (recessive bit), receiving station is receiving correctly CRC field after, send " an occupying " position (dominant bit) immediately, to the answer of dispatching station one confirmation.CANBus is also Very strong error processing capacity is provided, bit-errors, fill-error, crc error, form error and response mistake etc. can be distinguished.
CANBus applies a kind of damage referee method towards bit-type to solve the collision problem that media multiple access brings. Its arbitrated procedure is:When bus free, circuit shows as " leaving unused " level (recessive level), and now any station is equal Message can be sent.The frame start field that dispatching station sends produces " an occupying " level (dominant level), and mark sends Start.All stations initiate forward position with the frame being first begin to dispatching station and carry out synchronization.If there are multiple stations to send simultaneously, then send Arbitration field carries out successive appraximation.Arbitration field comprises identifier ID (standard is llbit), its priority corresponding.Each stands in transmission During arbitration field, compare sending position with line level, if identical, send;If difference, learn that priority is low and exits arbitration, Do not retransmit.System response time is unrelated with website number, is solely dependent upon the priority of arrangement.As can be seen that this media interviews Control mode can cause data impaired with channel width unlike the CSMA/CDCA agreement of Ethetnet.
Optionally, after the step of described reception encryption second terminal symmetric key,
CANBus chip obtains described encryption second terminal symmetric key from vehicle-mounted MTK platform, and according to RSA cryptographic algorithms Encrypt second terminal symmetric key decryption with described in MTK private key pair, obtain second terminal symmetric key and preserve.After so, CANBus chip directly can also encrypt and decrypt operation to transmission data.
Optionally, first terminal is sent and sends out to second terminal according to described symmetric encipherment algorithm and described symmetric key Data is sent to be encrypted, or
Receive and according to described symmetric encipherment algorithm and described symmetric key, second terminal is sent to first through second terminal The data of terminal is encrypted the encrypted received data of acquisition, according to described symmetric encipherment algorithm and described symmetric key to encryption Receiving data is deciphered, and obtains receiving data.
With reference to Fig. 2, Fig. 2 is used for the schematic flow sheet of the encryption method second embodiment that vehicle communication connects for the present invention. Further, based on the first embodiment of the present invention, the invention allows for the of the encryption method connecting for vehicle communication Two embodiments, and unlike the first embodiment of the above-mentioned encryption method for vehicle communication connection, described first terminal is Vehicle-mounted MTK platform, described second terminal is server.
S101, vehicle-mounted MTK platform generates public key and private key according to RSA cryptographic algorithms and stores;
S201, described public key is passed to server in UDP mode;
S301, receives encryption server symmetric key, described encryption server symmetric key is by described server according to RSA AES and public key generate to server symmetric key encryption, and described server symmetric key encryption is by described server Generated according to AES encryption algorithm and store;
S401, according to RSA cryptographic algorithms and encryption server symmetric key decryption described in described private key pair, obtains server Symmetric key simultaneously preserves;
S501, the transmission data between vehicle-mounted MTK platform and server is according to AES encryption algorithm server symmetric key It is encrypted.
With reference to Fig. 3, Fig. 3 is used for the schematic flow sheet of the encryption method 3rd embodiment that vehicle communication connects for the present invention. Further, based on the first embodiment of the present invention, the invention allows for the of the encryption method connecting for vehicle communication Three embodiments, and unlike the first embodiment of the above-mentioned encryption method for vehicle communication connection, described first terminal is Intelligent key, described second terminal is server.
S102, Intelligent key generates public key and private key according to RSA cryptographic algorithms and stores;
S202, described public key is passed to server in UDP mode;
S302, receives encryption server symmetric key, described encryption server symmetric key is by described server according to RSA AES and public key generate to server symmetric key encryption, and described server symmetric key encryption is by described server Generated according to AES encryption algorithm and store;
S402, according to RSA cryptographic algorithms and encryption server symmetric key decryption described in described private key pair, obtains server Symmetric key simultaneously preserves;
S502, the transmission data between Intelligent key and server is entered according to AES encryption algorithm server symmetric key Row encryption.
With reference to Fig. 4, Fig. 4 is used for the schematic flow sheet of the encryption method fourth embodiment that vehicle communication connects for the present invention. Further, based on the first embodiment of the present invention, the invention allows for the of the encryption method connecting for vehicle communication Four embodiments, and unlike the first embodiment of the above-mentioned encryption method for vehicle communication connection, described first terminal is Run the intelligent terminal of APP, described second terminal is server.
S103, the intelligent terminal running APP generates public key and private key according to RSA cryptographic algorithms and stores;
S203, described public key is passed to server in HTTP mode;
S303, receives encryption server symmetric key, described encryption server symmetric key is by described server according to RSA AES and public key generate to server symmetric key encryption, and described server symmetric key encryption is by described server Generated according to AES encryption algorithm and store;
S403, according to RSA cryptographic algorithms and encryption server symmetric key decryption described in described private key pair, obtains server Symmetric key simultaneously preserves;
S503, the transmission data between the intelligent terminal of operation APP and server is according to AES encryption algorithm server pair Key is claimed to be encrypted.
With reference to Fig. 5, Fig. 5 is used for the schematic flow sheet of encryption method the 5th embodiment that vehicle communication connects for the present invention. Further, based on the first embodiment of the present invention, the invention allows for the of the encryption method connecting for vehicle communication Five embodiments, and unlike the first embodiment of the above-mentioned encryption method for vehicle communication connection, described first terminal is Intelligent key, described second terminal is vehicle-mounted MTK platform.
S104, Intelligent key generates public key and private key according to RSA cryptographic algorithms and stores;
S204, described public key is passed to vehicle-mounted MTK platform with bluetooth approach;
S304, receives and encrypts vehicle-mounted MTK platform symmetric key, and the vehicle-mounted MTK platform symmetric key of described encryption is by described car Carry MTK platform according to RSA cryptographic algorithms and public key, vehicle-mounted MTK platform symmetric key encryption to be generated, described vehicle-mounted MTK platform Symmetric key encryption is to be generated according to AES encryption algorithm and stored by described vehicle-mounted MTK platform;
S404, encrypts vehicle-mounted MTK platform symmetric key decryption according to RSA cryptographic algorithms and described private key pair, obtains Vehicle-mounted MTK platform symmetric key simultaneously preserves;
S504, the transmission data between Intelligent key and vehicle-mounted MTK platform is according to AES encryption algorithm and vehicle-mounted MTK platform Symmetric key is encrypted.
As shown in fig. 6, Fig. 6 is used for the structural representation of the encryption device sixth embodiment that vehicle communication connects for the present invention Figure.The present invention also provides a kind of encryption device connecting for vehicle communication utilizing said method, including:
Key production module 10, generates public key and private key for first terminal according to RSA cryptographic algorithms and stores;
Key transfer module 20, for passing to second terminal by described public key;
Key reception module 30, for receiving encryption second terminal symmetric key, described encryption second terminal symmetric key Second terminal symmetric key encryption is generated, described second terminal according to RSA cryptographic algorithms and public key by described second terminal Symmetric key encryption is to be generated according to AES encryption algorithm and stored by described second terminal;
Cipher key decryption block 40, encrypts second terminal symmetric key solution according to RSA cryptographic algorithms and described private key pair Close, obtain second terminal symmetric key and preserve.
With reference to Fig. 7, Fig. 7 is used for the schematic flow sheet of encryption device the 7th embodiment that vehicle communication connects for the present invention. Further, based on the sixth embodiment of the present invention, the invention allows for the of the encryption device connecting for vehicle communication Seven embodiments, from unlike the sixth embodiment of the above-mentioned encryption device for vehicle communication connection, this is used for vehicle communication The encryption device connecting also includes:
Data encryption module 50, for according to described symmetric encipherment algorithm and described symmetric key first terminal is sent to The transmission data of second terminal is encrypted;
Data decryption module 60, for receiving through second terminal according to described symmetric encipherment algorithm and described symmetric key pair Second terminal sends to the data of first terminal the encrypted received data being encrypted acquisition, according to described symmetric encipherment algorithm and Described symmetric key is deciphered to encrypted received data, obtains receiving data.
Encryption method for vehicle communication connection proposed by the present invention and device, using RSA2048 AES to right Key is claimed to be encrypted, general data then adopts AES128 AES to encrypt, and is effective to ensure that the safety of data, simultaneously The transmission quantity of data will not be increased.
It will be understood by those skilled in the art that the present invention includes relating to execute in operation described herein Or multinomial equipment.These equipment can specially design for required purpose and manufacture, or can also include general-purpose computations Known device in machine.These equipment have and are stored in its interior computer program, and these computer programs optionally activate Or reconstruct.Such computer program can be stored in equipment (for example, computer) computer-readable recording medium or be stored in and be suitable to Storage e-command is simultaneously coupled in any kind of medium of bus respectively, and described computer-readable medium includes but is not limited to (Read-Only Memory read-only deposits for any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM Reservoir), RAM (Random Access Memory, memorizer immediately), EPROM (Erasable Programmable Read- Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), flash memory, magnetic card or light card.It is, it is readable Medium include being stored in the form of can reading by equipment (for example, computer) or transmission information any medium.
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or Each frame in block diagram and/or flow graph and the combination of the frame in these structure charts and/or block diagram and/or flow graph.This technology is led Field technique personnel be appreciated that can by these computer program instructions be supplied to general purpose computer, special purpose computer or other The processor of programmable data processing method is realizing, thus the process by computer or other programmable data processing methods Device is executing the scheme specified in the frame of structure chart disclosed by the invention and/or block diagram and/or flow graph or multiple frame.
Those skilled in the art of the present technique be appreciated that the various operations having discussed in the present invention, method, in flow process Step, measure, scheme can be replaced, changed, combined or deleted.Further, there is discussed in the present invention each Kind of operation, method, other steps in flow process, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted. Further, of the prior art have and the step in the various operations disclosed in the present invention, method, flow process, measure, scheme Can also be replaced, changed, reset, decomposed, combined or deleted.
The foregoing is only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilization Equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or it is related to be directly or indirectly used in other Technical field, be included within the scope of the present invention.

Claims (10)

1. a kind of encryption method for vehicle communication connection is it is characterised in that comprise the following steps:
First terminal generates public key and private key according to rivest, shamir, adelman and stores;
Described public key is passed to second terminal;
Receive encrypted symmetric key, described encrypted symmetric key is generated symmetrically close by described second terminal according to symmetric encipherment algorithm Key simultaneously preserves, then this symmetric key is encrypted and is obtained by described rivest, shamir, adelman and described public key;
According to rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtain described symmetric key and protect Deposit.
2. the encryption method for vehicle communication connection according to claim 1 it is characterised in that:
Described rivest, shamir, adelman includes RSA cryptographic algorithms;
The key length that described RSA cryptographic algorithms adopt is 2048 bits.
3. the encryption method for vehicle communication connection according to claim 1 it is characterised in that:
Described symmetric encipherment algorithm includes AES encryption algorithm;
The key length that described AES encryption algorithm adopts is 128 bits.
4. the encryption method for vehicle communication connection according to claim 1 it is characterised in that:
When described second terminal is server, described first terminal includes:Vehicle-mounted MTK platform, run APP intelligent terminal or One of Intelligent key.
When described second terminal is vehicle-mounted MTK platform, described first terminal is Intelligent key.
5. the encryption method for vehicle communication connection according to claim 4 it is characterised in that:
When first terminal is for described vehicle-mounted MTK platform, described public key and private key generated according to rivest, shamir, adelman and stores Step after also include:
Described private key is passed to CANBus chip, described CANBus chip is the control chip of vehicle.
6. the encryption method for vehicle communication connection according to claim 5 is it is characterised in that described reception encryption is right After claiming the step of key,
Described vehicle-mounted MTK platform sends encrypted symmetric key to described CANBus chip, by described CANBus chip according to Described rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtain symmetric key and are saved in described CANBus chip.
7. the encryption method for vehicle communication connection according to claim 4 it is characterised in that:
Transfer mode between described vehicle-mounted MTK platform and described server is UDP;
Transfer mode between the intelligent terminal of described operation APP and described server is HTTP;
Transfer mode between described Intelligent key and described server is UDP;And/or
Transfer mode between described vehicle-mounted MTK platform and Intelligent key is bluetooth.
8. the encryption method connecting for vehicle communication according to claim 1-7 any one is it is characterised in that described According to rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtain described symmetric key the step preserving After rapid:
According to described symmetric encipherment algorithm and described symmetric key, first terminal is sent and carry out to the transmission data of second terminal Encryption, or
Receive and according to described symmetric encipherment algorithm and described symmetric key, second terminal is sent to first terminal through second terminal Data be encrypted the encrypted received data of acquisition, according to described symmetric encipherment algorithm and described symmetric key, encryption is received Data deciphering, obtains receiving data.
9. a kind of encryption device for vehicle communication connection is it is characterised in that include:
Key production module, generates public key and private key for first terminal according to rivest, shamir, adelman and stores;
Key transfer module, for passing to second terminal by described public key;
Key reception module, receives encrypted symmetric key, described encrypted symmetric key is by described second terminal according to symmetric cryptography Algorithm generates symmetric key and preserves, then this symmetric key is encrypted by described rivest, shamir, adelman and described public key And obtain;
Cipher key decryption block, according to rivest, shamir, adelman and encrypted symmetric key deciphering described in described private key pair, obtains described Symmetric key simultaneously preserves.
10. the encryption device for vehicle communication connection according to claim 9 is it is characterised in that also include:
Data encryption module, for sending to first terminal to second eventually according to described symmetric encipherment algorithm and described symmetric key The transmission data at end is encrypted;
Data decryption module, whole to second according to described symmetric encipherment algorithm and described symmetric key through second terminal for receiving End sends and is encrypted the encrypted received data of acquisition to the data of first terminal, according to described symmetric encipherment algorithm and described right Claim the deciphering of key pair encryption receiving data, obtain receiving data.
CN201610859377.1A 2016-09-28 2016-09-28 The encryption method connecting for vehicle communication and device Pending CN106487783A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610859377.1A CN106487783A (en) 2016-09-28 2016-09-28 The encryption method connecting for vehicle communication and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610859377.1A CN106487783A (en) 2016-09-28 2016-09-28 The encryption method connecting for vehicle communication and device

Publications (1)

Publication Number Publication Date
CN106487783A true CN106487783A (en) 2017-03-08

Family

ID=58268167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610859377.1A Pending CN106487783A (en) 2016-09-28 2016-09-28 The encryption method connecting for vehicle communication and device

Country Status (1)

Country Link
CN (1) CN106487783A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107682141A (en) * 2017-10-26 2018-02-09 广州市雷军游乐设备有限公司 Data ciphering method and system for data transfer
CN108200019A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of safe and efficient app Encryption Algorithm based on cloud lock
CN108737334A (en) * 2017-04-17 2018-11-02 中国科学院微电子研究所 A kind of ECG detecting data uploading system and method
CN109218266A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
CN109703571A (en) * 2018-12-24 2019-05-03 北京长城华冠汽车技术开发有限公司 A kind of vehicle entertainment system login system and login method based on recognition of face
CN109801423A (en) * 2019-02-20 2019-05-24 北京首汽智行科技有限公司 A kind of control method for vehicle and system based on bluetooth
CN109816831A (en) * 2019-01-31 2019-05-28 公安部第三研究所 A kind of authentication method and system of the smart lock based on national secret algorithm
CN109889669A (en) * 2019-03-07 2019-06-14 广东汇泰龙科技有限公司 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
CN110276870A (en) * 2019-06-25 2019-09-24 北京智宝云科科技有限公司 A kind of finger prints processing method and system
CN111614670A (en) * 2020-05-20 2020-09-01 浙江大华技术股份有限公司 Method and device for sending encrypted file and storage medium
CN112040482A (en) * 2020-09-08 2020-12-04 安徽大学 Encryption processing method and equipment for automatic driving data under 5G communication
CN112202549A (en) * 2020-09-02 2021-01-08 深圳市车电网络有限公司 Charging management method, charging terminal data processing method and charging management platform data processing method
CN113630772A (en) * 2021-08-17 2021-11-09 深圳市智莱科技股份有限公司 Bluetooth data transmission method and device, Bluetooth equipment and storage medium
WO2023061029A1 (en) * 2021-10-13 2023-04-20 华为技术有限公司 Digital key activation method, device and system

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002056528A2 (en) * 2001-01-09 2002-07-18 Tetrawave Inc Secure extensible computing environment
US20020166048A1 (en) * 2001-05-01 2002-11-07 Frank Coulier Use and generation of a session key in a secure socket layer connection
CN103856321A (en) * 2012-12-07 2014-06-11 观致汽车有限公司 Data encryption and decryption method and system
CN103986583A (en) * 2014-05-29 2014-08-13 上海斐讯数据通信技术有限公司 Dynamic encryption method and encryption communication system thereof
CN104185309A (en) * 2014-08-12 2014-12-03 深圳市元征科技股份有限公司 On-board wireless local area network equipment
CN104240352A (en) * 2014-09-22 2014-12-24 成都千帆科技开发有限公司 Cloud parking lot management system and vehicle anti-theft method based on intelligent terminal equipment
CN104570856A (en) * 2014-12-18 2015-04-29 黑龙江大学 Online-programmable monitoring network system
CN104780158A (en) * 2015-03-19 2015-07-15 赵姗姗 A plug and play long-distance authorization and control system for terminal
CN104973007A (en) * 2014-04-14 2015-10-14 上海海拉电子有限公司 Anti-theft matching equipment, matching method and motor vehicle with equipment
CN105049401A (en) * 2015-03-19 2015-11-11 浙江大学 Secure communication method based on intelligent vehicle
CN105216718A (en) * 2015-10-27 2016-01-06 重庆交通大学 Based on Automobile intelligent key system and the control method of internet
CN105338053A (en) * 2015-09-06 2016-02-17 思塔科技(天津)有限责任公司 Intelligent IOV (Internet of Vehicles) system based on cloud platform
CN105471874A (en) * 2015-11-30 2016-04-06 深圳市元征软件开发有限公司 Data transmission method and device
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002056528A2 (en) * 2001-01-09 2002-07-18 Tetrawave Inc Secure extensible computing environment
US20020166048A1 (en) * 2001-05-01 2002-11-07 Frank Coulier Use and generation of a session key in a secure socket layer connection
CN103856321A (en) * 2012-12-07 2014-06-11 观致汽车有限公司 Data encryption and decryption method and system
CN104973007A (en) * 2014-04-14 2015-10-14 上海海拉电子有限公司 Anti-theft matching equipment, matching method and motor vehicle with equipment
CN103986583A (en) * 2014-05-29 2014-08-13 上海斐讯数据通信技术有限公司 Dynamic encryption method and encryption communication system thereof
CN104185309A (en) * 2014-08-12 2014-12-03 深圳市元征科技股份有限公司 On-board wireless local area network equipment
CN104240352A (en) * 2014-09-22 2014-12-24 成都千帆科技开发有限公司 Cloud parking lot management system and vehicle anti-theft method based on intelligent terminal equipment
CN104570856A (en) * 2014-12-18 2015-04-29 黑龙江大学 Online-programmable monitoring network system
CN104780158A (en) * 2015-03-19 2015-07-15 赵姗姗 A plug and play long-distance authorization and control system for terminal
CN105049401A (en) * 2015-03-19 2015-11-11 浙江大学 Secure communication method based on intelligent vehicle
CN105338053A (en) * 2015-09-06 2016-02-17 思塔科技(天津)有限责任公司 Intelligent IOV (Internet of Vehicles) system based on cloud platform
CN105216718A (en) * 2015-10-27 2016-01-06 重庆交通大学 Based on Automobile intelligent key system and the control method of internet
CN105471874A (en) * 2015-11-30 2016-04-06 深圳市元征软件开发有限公司 Data transmission method and device
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737334A (en) * 2017-04-17 2018-11-02 中国科学院微电子研究所 A kind of ECG detecting data uploading system and method
CN109218266B (en) * 2017-07-04 2021-07-30 百度在线网络技术(北京)有限公司 Driving data acquisition method and device
CN109218266A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
CN109618313B (en) * 2017-09-30 2023-06-23 厦门歌乐电子企业有限公司 Vehicle-mounted Bluetooth device and connection method and system thereof
CN107682141A (en) * 2017-10-26 2018-02-09 广州市雷军游乐设备有限公司 Data ciphering method and system for data transfer
CN108200019A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of safe and efficient app Encryption Algorithm based on cloud lock
CN109703571A (en) * 2018-12-24 2019-05-03 北京长城华冠汽车技术开发有限公司 A kind of vehicle entertainment system login system and login method based on recognition of face
CN109816831A (en) * 2019-01-31 2019-05-28 公安部第三研究所 A kind of authentication method and system of the smart lock based on national secret algorithm
CN109801423A (en) * 2019-02-20 2019-05-24 北京首汽智行科技有限公司 A kind of control method for vehicle and system based on bluetooth
CN109889669A (en) * 2019-03-07 2019-06-14 广东汇泰龙科技有限公司 A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
CN110276870A (en) * 2019-06-25 2019-09-24 北京智宝云科科技有限公司 A kind of finger prints processing method and system
CN111614670A (en) * 2020-05-20 2020-09-01 浙江大华技术股份有限公司 Method and device for sending encrypted file and storage medium
CN112202549A (en) * 2020-09-02 2021-01-08 深圳市车电网络有限公司 Charging management method, charging terminal data processing method and charging management platform data processing method
CN112040482A (en) * 2020-09-08 2020-12-04 安徽大学 Encryption processing method and equipment for automatic driving data under 5G communication
CN113630772A (en) * 2021-08-17 2021-11-09 深圳市智莱科技股份有限公司 Bluetooth data transmission method and device, Bluetooth equipment and storage medium
WO2023061029A1 (en) * 2021-10-13 2023-04-20 华为技术有限公司 Digital key activation method, device and system

Similar Documents

Publication Publication Date Title
CN106487783A (en) The encryption method connecting for vehicle communication and device
EP0998799B1 (en) Security method and system for transmissions in telecommunication networks
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
CN106973056B (en) Object-oriented security chip and encryption method thereof
CN105049401B (en) A kind of safety communicating method based on intelligent vehicle
Saxena et al. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication
US20140355757A1 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN106357690B (en) data transmission method, data sending device and data receiving device
CN101442522B (en) Identification authentication method for communication entity based on combined public key
EP3987711B1 (en) Authenticated lattice-based key agreement or key encapsulation
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
CN105163309B (en) A method of the wireless sensor network security communication based on combination pin
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN107210911A (en) The improvement of terminal is installed in security system
CN103581175A (en) Safe data aggregation method
CN102833740A (en) Privacy protection method during data aggregation of wireless sensor network
CN107210915A (en) It is mutually authenticated
CN106533656A (en) Key multilayer mixed encryption/decryption method based on WSN
CN104113420A (en) Identity based aggregate signcryption method
EP2611066B1 (en) Method and system for entity authentication in resource-limited network
CN107408187A (en) Pass through the improvement safety of authentication token
US9635003B1 (en) Method of validating a private-public key pair
CN109274663A (en) Communication means based on SM2 dynamic key exchange and SM4 data encryption
CN116614239A (en) Data transmission method and system in Internet of things
CN102098307A (en) Password type instant message (IM) encryption method and system in self-service bank

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170308