CN108449735A - Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications - Google Patents
Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications Download PDFInfo
- Publication number
- CN108449735A CN108449735A CN201810659256.1A CN201810659256A CN108449735A CN 108449735 A CN108449735 A CN 108449735A CN 201810659256 A CN201810659256 A CN 201810659256A CN 108449735 A CN108449735 A CN 108449735A
- Authority
- CN
- China
- Prior art keywords
- car
- mounted terminal
- operational order
- server
- short message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides method, car-mounted terminal, equipment and the computer readable storage medium of a kind of OTA communications, this method includes:Car-mounted terminal receives the operational order that server is sent, and operational order is encrypted using SCP80 agreements;Verification is decrypted to operational order in car-mounted terminal;If operational order establishes communication port by verification, car-mounted terminal;Car-mounted terminal is carried out data transmission using communication port, and data are encrypted using SCP81 agreements.Due to when receiving server operation instruction, SCP80 agreements are used to operational order to be encrypted, and in carrying out data transmission, data are encrypted using SCP81 agreements, it can be ensured that car-mounted terminal carries out the safety of OTA communications with server, the safety of data transmission is realized.
Description
Technical field
The present embodiments relate to method, car-mounted terminal, equipment that field of communication technology more particularly to a kind of OTA are communicated
And computer readable storage medium.
Background technology
In smart mobile phone, pass through over the air (full name in English:Over the Air Technology, referred to as:
OTA technologies) realize the update of system and the repairing of loophole.It uses the wireless networks such as WiFi, mobile communication to download OTA automatically
Upgrade package, automatic upgrading.
Constantly ripe however as Internet of Things and car networking market, the type of smart machine is more and more, so the spoke of OTA
It penetrates range and is also no longer limited to smart mobile phone.The OTA technologies of car networking are either from technology mode, or from business model
On, all it is entirely different with smart mobile phone.
And the existing OTA technologies development based on vehicle net is also immature, and can not ensure the safety of data transmission.
Invention content
The embodiment of the present invention provides a kind of method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications,
It is also immature to solve the existing OTA technologies development based on vehicle net, and can not ensure the skill of the safety of data transmission
Art problem.
The embodiment of the present invention provides a kind of OTA communication means, including:
Car-mounted terminal receives the operational order that server is sent, and place is encrypted using SCP80 agreements in the operational order
Reason;
Verification is decrypted to the operational order in the car-mounted terminal;
If the operational order establishes communication port by verification, the car-mounted terminal;
The car-mounted terminal is carried out data transmission using the communication port, and the data are added using SCP81 agreements
Close processing.
Further, method as described above, the car-mounted terminal are established communication port, are specifically included:
The car-mounted terminal and the server carry out PSK-TLS handshake operations, with to the server and described vehicle-mounted
Terminal is authenticated;
If the server and the car-mounted terminal by certification, open HTTPS sessions, meet TLS associations to establish
The communication port of view.
Further, method as described above, the operational order are the short message of order pack arrangement, in the order packet extremely
Include less:The associated safety parameter of key information, Encryption Algorithm indications and SPI codings.
Further, method as described above is also wrapped after the car-mounted terminal receives the operational order that server is sent
It includes:
The car-mounted terminal judge the operational order whether be split after short message, the short message use UDH data groups
Structure is knitted to be split;
If the operational order is the short message after splitting, the car-mounted terminal spells the short message after the fractionation
It connects, forms complete operational order.
The embodiment of the present invention provides a kind of car-mounted terminal, including:
Receiving module, the operational order for receiving server transmission, the operational order are added using SCP80 agreements
Close processing;
Decryption verification module, for verification to be decrypted to the operational order;
Module is established, if establishing communication port by verification for the operational order;
Transmission module, for being carried out data transmission using the communication port, the data are added using SCP81 agreements
Close processing.
Further, car-mounted terminal as described above, it is described to establish module, it is specifically used for:
PSK-TLS handshake operations are carried out with the server, to be authenticated to the server and the car-mounted terminal;
If the server and the car-mounted terminal by certification, open HTTPS sessions, to establish the communication for meeting tls protocol
Channel.
Further, car-mounted terminal as described above, the operational order are the short message of order pack arrangement, the order packet
In include at least:The associated safety parameter of key information, Encryption Algorithm indications and SPI codings.
Further, car-mounted terminal as described above further includes:Judgment module and concatenation module;
The judgment module, for judge the operational order whether be split after short message, the short message use UDH numbers
It is split according to institutional framework;
The concatenation module, if for the operational order be fractionation after short message, by the short message after the fractionation into
Row splicing, forms complete operational order.
The embodiment of the present invention provides a kind of OTA communication equipments, including:
Memory, processor and computer program;
Wherein, the computer program is stored in the memory, and is configured as being executed with reality by the processor
Existing method as described in any one of the above embodiments.
The embodiment of the present invention provides a kind of computer readable storage medium, is stored thereon with computer program, the calculating
Machine program is executed by processor to realize method as described in any one of the above embodiments.
The embodiment of the present invention provides a kind of method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications,
The operational order that server is sent is received by car-mounted terminal, operational order is encrypted using SCP80 agreements;Vehicle-mounted end
Verification is decrypted to operational order in end;If operational order establishes communication port by verification, car-mounted terminal;Car-mounted terminal is adopted
Carried out data transmission with communication port, data are encrypted using SCP81 agreements.Due to receiving server operation instruction
When, SCP80 agreements are used to operational order and are encrypted, and in carrying out data transmission, data are assisted using SCP81
View is encrypted, it can be ensured that car-mounted terminal and safety when server progress OTA communications, realize data transmission
Safety.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Some bright embodiments for those of ordinary skill in the art without having to pay creative labor, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow chart of the embodiment of the method one of OTA of the present invention communications;
Fig. 2 is the flow chart of the embodiment of the method two of OTA of the present invention communications;
Fig. 3 is the structural schematic diagram of car-mounted terminal embodiment one of the present invention;
Fig. 4 is the structural schematic diagram of car-mounted terminal embodiment two of the present invention;
Fig. 5 is the structural schematic diagram of the apparatus embodiments one of OTA of the present invention communications.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation of description affiliated partner, indicate
There may be three kinds of relationships, for example, A and/or B, can indicate:Individualism A, exists simultaneously A and B, individualism B these three
Situation.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Depending on context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determination " or " in response to detection ".Similarly, depend on context, phrase " if it is determined that " or " if detection
(condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when the detection (condition of statement
Or event) when " or " in response to detection (condition or event of statement) ".
Fig. 1 is the flow chart of OTA communication means embodiment one of the present invention, as shown in Figure 1, the executive agent of the present embodiment is
Car-mounted terminal, then OTA communication means provided in this embodiment includes following steps.
Step 101, car-mounted terminal receives the operational order that server is sent, and operational order is added using SCP80 agreements
Close processing.
Wherein, operational order can be download instruction, and activation instruction deactivates instruction, deletes and instructs, in switching command
Any one.
Specifically, in the present embodiment, car-mounted terminal carries out OTA communications by eSIM cards and server, car-mounted terminal with
When server is communicated for the first time, car-mounted terminal receives the download instruction that server is sent, to complete the download of OTA packets.Under
After having carried OTA packets, receives the activation instruction that server is sent and provide car-mounted terminal and server to complete the activation of eSIM cards
Communication.If user is not desired to, using eSIM cards, receive the deactivation instruction of server transmission and delete instruction.If user thinks
Operator is changed, then the switching command of server transmission is received, to carry out the switching of carrier server.
In the present embodiment, the form of the operational order is not limited, such as can be short message form or other forms.
Wherein, SCP agreements, full name Secure Copy agreements, be for defining " between local machine and REMOTE MACHINE " or
Person's " between REMOTE MACHINE and REMOTE MACHINE " transmits the agreement of the process of file.SCP agreements are in the application in seven coating systems of OSI
Layer.SCP agreements are based on SSH agreements, it uses the connection tunnels SSH established as data transmission channel, and SSH connections tunnel is
Safety, thus it is safe to be transmitted based on the file of SCP agreements.SCP80 agreements are used on the basis of SCP agreements
One group of special secret key collection, is encrypted the data of transmission.In the present embodiment, in advance in the root of the eUUIC cards of car-mounted terminal
Security domain is (referred to as:ISD-R a set of key set, key version from " 05 " to " 08 " just) are implanted before distribution.The set key set
In include at least:Algorithm title and minimum key length.Wherein, table 1 is that the information in key set illustrates table.
Table 1:Information in key set illustrates table
Wherein, which is that M2M contract signing relationships manage Security routing platform.
Step 102, verification is decrypted to operational order in car-mounted terminal.
Specifically, in the present embodiment, car-mounted terminal solves operational order using the corresponding decipherment algorithm of SCP80 agreements
Close processing, and whether safely the operational order is verified according to decrypted result.If passing through according to corresponding secret key decryption, illustrate this
Operational order is safety command, by verification, if not passing through according to corresponding secret key decryption, illustrates that the operational order is uneasiness
All referring to order, verification does not pass through.
Step 103, if operational order is by verification, car-mounted terminal establishes communication port.
Specifically, in the present embodiment, if operational order passes through, illustrate that the operational order is safety command, operation service
The operational order that device is assigned establishes the communication port of car-mounted terminal and server.Start HTTPS processes.
Step 104, car-mounted terminal is carried out data transmission using communication port, and place is encrypted using SCP81 agreements in data
Reason.
Specifically, in the present embodiment, after the operation for completing server, car-mounted terminal carries out data transmission with server
When, in order to ensure the safety of transmission data, data are encrypted using SCP81 agreements, and be transferred to server, are serviced
Device is decrypted using corresponding decipherment algorithm and is verified, and after data are by verification, executes corresponding operation.
Wherein, SCP81 agreements are one group of special secret key collection have been used, to the data of transmission on the basis of SCP agreements
It is encrypted.In the present embodiment, a set of key set, key version are just implanted before the ISD-R of car-mounted terminal distribution in advance
From " 40 " to " 43 ".
OTA communication means provided in this embodiment receives the operational order that server is sent by car-mounted terminal, and operation refers to
Order is encrypted using SCP80 agreements;Verification is decrypted to operational order in car-mounted terminal;If operational order is by testing
Card, then car-mounted terminal establishes communication port;Car-mounted terminal is carried out data transmission using communication port, and data use SCP81 agreements
It is encrypted.Due to when receiving server operation instruction, using SCP80 agreements to operational order and place be encrypted
Reason, and in carrying out data transmission, data is encrypted using SCP81 agreements, it can be ensured that car-mounted terminal and
Server carries out safety when OTA communications, realizes the safety of data transmission.
Fig. 2 is the flow chart of OTA communication means embodiment two of the present invention, as shown in Fig. 2, OTA provided in this embodiment is logical
Letter method, be on the basis of OTA communication means embodiment one of the present invention, to step 101, the further refinement of step 103, and
And further comprise judge operational order whether be split after short message, if operational order be fractionation after short message, car-mounted terminal
The step of operational order is spliced, complete operational order is formed.Then OTA communication means provided in this embodiment include with
Lower step.
Step 201, car-mounted terminal receives the operational order that server is sent, and operational order is added using SCP80 agreements
Close processing.
Further, in this embodiment the operational order is the short message of order pack arrangement, included at least in order packet:It is close
The associated safety parameter of key information, Encryption Algorithm indications and SPI codings.
Wherein, the associated safety parameter of SPI codings includes at least:Redundancy verification parameters field, cryptographic check parameter field,
Digital signature parameter field.
Further, in this embodiment the Encryption Algorithm in SCP80 agreements is symmetry algorithm (abbreviation:Aes algorithm), it is close
Key is the key that length is 128bits.
Step 202, car-mounted terminal judges whether operational order is short message after splitting, no if so, then follow the steps 203
Then follow the steps 204.
Wherein, short message is split using UDH data organizational structures.
Step 203, car-mounted terminal splices the short message after fractionation, forms complete operational order.
It is illustrated in conjunction with step 202- steps 203.Further, in this embodiment if server is sent out to car-mounted terminal
The short message length of the operational order sent is more than pre-set length threshold, then the short message of the operational order is used UDH data organization knots
Structure is split, and fractionation identification information is added, and a plurality of short message after fractionation is sent to car-mounted terminal successively.Car-mounted terminal connects
After receiving short message, know that the operational order has carried out fractionation by server and slitting is sent according to identification information is split,
The short message after the fractionation received is spliced by reception sequence then, forms complete operational order.
Wherein, the order pack arrangement of operational order is mapped in UDH data organizational structures, the UDH data organizational structures
In include at least:User Data Header length information splits identification information, Information element Data Length information, Information element Data
Information.
Wherein, pre-set length threshold can be 140 bytes or other suitable numerical value, not done to this in the present embodiment
It limits.
Step 204, verification is decrypted to operational order in car-mounted terminal, judges whether by verification, if so, executing step
Rapid 205, it is no to then follow the steps 208.
Step 205, car-mounted terminal carries out PSK-TLS handshake operations with server, with to server and car-mounted terminal progress
Certification.
Further, in this embodiment server and car-mounted terminal progress can be carried out during PSK-TLS handshake operations
Two-way authentication, with the safety of authentication server and car-mounted terminal.Specifically, sender can be realized using digital signature technology
The authentication of equipment.
Wherein, digital signature technology is based on encryption technology, and core is to be realized using encryption technology to sending
The digital signature of information.The most important function of digital signature is exactly:What transmission method, apparatus was crossed cannot deny afterwards transmitted by
Message, i.e. non-repudiation.Digital signature is realized by hash function and public key encryption algorithm.The process of digital signature
For:Data or use of information hash function to pre-transfer generate the hashed value of a regular length, then send method, apparatus and use
The private key of oneself forms the encryption of this hashed value the digital signature for sending method, apparatus, and finally, this digital signature is as text
The attachment of part sends jointly to receiver equipment.
Step 206, judge that server and car-mounted terminal whether by certification, if so, thening follow the steps 207, are otherwise held
Row step 208.
Step 207, HTTPS sessions are opened, to establish the communication port for meeting tls protocol.
Step 208, authentification failure message is sent to server.
Further, it is illustrated in conjunction with step 206- steps 208.Specifically, in the present embodiment, judge server and vehicle
Whether certification passes through mounted terminal, if certification passes through, illustrates the equipment that server and car-mounted terminal are safe, opens
HTTPS sessions, establish communication port.Wherein, communication port meets tls protocol.If in server or car-mounted terminal there are one or
It is unverified to pass through, then illustrate that at least one equipment is unsafe equipment, if to establish server and car-mounted terminal at this time
Communication port, then it cannot be guaranteed that data transmission safety, then to server send authentification failure message so that server not with
Car-mounted terminal establishes communication port.
It is understood that in the present embodiment, when foundation meets the communication port of tls protocol, car-mounted terminal can be to service
Device sends the maximum version number and the data such as algorithm set and compression algorithm set for supporting tls protocol.Server receives
To after these data, the tls protocol version that can support of both sides and Encryption Algorithm and compression algorithm are selected and to car-mounted terminal
Return to confirmation message.Car-mounted terminal obtains the pre- master key information of SCP81 according to PSK identity informations, and according to random number and in advance
Master key byte arrays generate master key, and the encryption of communication data is carried out using the master key as key seed.
Step 209, car-mounted terminal is carried out data transmission using communication port, and place is encrypted using SCP81 agreements in data
Reason.
Further, in this embodiment the Encryption Algorithm in SCP81 agreements is symmetry algorithm (abbreviation:Aes algorithm), it is close
Key is the key that length is 128bits.
OTA communication means provided in this embodiment receives the operational order that server is sent by car-mounted terminal, and operation refers to
Order is encrypted using SCP80 agreements, and verification is decrypted to operational order in car-mounted terminal, is judged whether through verification,
If so, car-mounted terminal carries out PSK-TLS handshake operations with server, to be authenticated to server and car-mounted terminal, judge
Whether server and car-mounted terminal are by certification, if so, opening HTTPS sessions, the communication that tls protocol is met with foundation is logical
Otherwise road sends authentification failure message to server, car-mounted terminal is carried out data transmission using communication port, and data use
SCP81 agreements are encrypted.SCP80 agreements not only are respectively adopted to instruction and data and SCP81 agreements are encrypted
Processing, and establish before communication port and two-way authentication has been carried out to server and car-mounted terminal, it ensure that the safety of communication equipment,
To further enhance the safety of data transmission.
The method of OTA communications provided in this embodiment receives operational order by car-mounted terminal, and car-mounted terminal judges operation
Instruction whether be split after short message form complete operational order if so, car-mounted terminal splices operational order.
When can ensure car-mounted terminal and server using the overlength operational order of short message form is encountered in OTA communications, car-mounted terminal energy
It enough identifies the operational order, the business of various OTA communications is enable successfully to carry out.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can lead to
The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a read/write memory medium.The program is being held
When row, execution includes the steps that above-mentioned each method embodiment;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or CD
Etc. the various media that can store program code.
Fig. 3 is the structural schematic diagram of car-mounted terminal embodiment one of the present invention, as shown in figure 3, provided in this embodiment vehicle-mounted
Terminal includes:Receiving module 31, decryption verification module 32 establish module 33, transmission module 34.
Wherein, receiving module 31, for receive server transmission operational order, operational order using SCP80 agreements into
Row encryption.Decryption verification module 32, for verification to be decrypted to operational order.Module 33 is established, if referring to for operating
It enables through verification, then establishes communication port.Transmission module 34, for being carried out data transmission using communication port, data use
SCP81 agreements are encrypted.
Car-mounted terminal provided in this embodiment can execute the technical solution of embodiment of the method shown in Fig. 1, realization principle
Similar with technique effect, details are not described herein again.
Fig. 4 is the structural schematic diagram of car-mounted terminal embodiment two of the present invention, as shown in figure 4, provided in this embodiment vehicle-mounted
Terminal further, further includes on the basis of car-mounted terminal embodiment one of the present invention:Judgment module 41 and concatenation module 42.
Further, module 33 is established, is specifically used for:
PSK-TLS handshake operations are carried out with server, to be authenticated to server and car-mounted terminal;If server and vehicle
Mounted terminal then opens HTTPS sessions by certification, to establish the communication port for meeting tls protocol.
Further, operational order is the short message of order pack arrangement, is included at least in order packet:Key information, encryption are calculated
The associated safety parameter of method indications and SPI codings.
Further, judgment module 41, for judge operational order whether be split after short message, short message use UDH numbers
It is split according to institutional framework.Concatenation module 42, if for operational order be fractionation after short message, by the short message after fractionation into
Row splicing, forms complete operational order.
Car-mounted terminal provided in this embodiment can execute the technical solution of embodiment of the method shown in Fig. 2, realization principle
Similar with technique effect, details are not described herein again.
The embodiment of the present invention also provides a kind of equipment of OTA communications, including:Memory 51, processor 52 and computer
Program.
Wherein, computer program is stored in memory 51, and is configured as being executed to realize the present invention by processor 52
Method in the embodiment of the method one of OTA communications or the embodiment of the method two of OTA of the present invention communications.Related description can correspond to ginseng
The corresponding associated description of the step of seeing Fig. 1 to Fig. 2 and effect are understood, do not do excessively repeating herein.
Wherein, in the present embodiment, memory 51 and processor 52 are connected by bus 53.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, computer
Program is executed by processor to realize the embodiment of the method one of OTA communications of the present invention or the embodiment of the method for OTA of the present invention communications
Method in two.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to
So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into
Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of OTA communication means, which is characterized in that including:
Car-mounted terminal receives the operational order that server is sent, and the operational order is encrypted using SCP80 agreements;
Verification is decrypted to the operational order in the car-mounted terminal;
If the operational order establishes communication port by verification, the car-mounted terminal;
The car-mounted terminal is carried out data transmission using the communication port, and place is encrypted using SCP81 agreements in the data
Reason.
2. according to the method described in claim 1, it is characterized in that, the car-mounted terminal establishes communication port, specifically include:
The car-mounted terminal carries out PSK-TLS handshake operations with the server, with to the server and the car-mounted terminal
It is authenticated;
If the server and the car-mounted terminal by certification, open HTTPS sessions, meet tls protocol to establish
Communication port.
3. according to the method described in claim 2, it is characterized in that, the operational order be order pack arrangement short message, it is described
It is included at least in order packet:The associated safety parameter of key information, Encryption Algorithm indications and SPI codings.
4. according to claim 1-3 any one of them methods, which is characterized in that the car-mounted terminal receives what server was sent
After operational order, further include:
The car-mounted terminal judge the operational order whether be split after short message, the short message use UDH data organization knots
Structure is split;
If the operational order is the short message after splitting, the car-mounted terminal splices the short message after the fractionation, shape
At complete operational order.
5. a kind of car-mounted terminal, which is characterized in that including:
Place is encrypted using SCP80 agreements in receiving module, the operational order for receiving server transmission, the operational order
Reason;
Decryption verification module, for verification to be decrypted to the operational order;
Module is established, if establishing communication port by verification for the operational order;
Transmission module, for being carried out data transmission using the communication port, place is encrypted using SCP81 agreements in the data
Reason.
6. car-mounted terminal according to claim 5, which is characterized in that it is described to establish module, it is specifically used for:
PSK-TLS handshake operations are carried out with the server, to be authenticated to the server and the car-mounted terminal;If institute
Server and the car-mounted terminal are stated by certification, then opens HTTPS sessions, to establish the communication port for meeting tls protocol.
7. car-mounted terminal according to claim 6, which is characterized in that the operational order is the short message of order pack arrangement,
It is included at least in the order packet:The associated safety parameter of key information, Encryption Algorithm indications and SPI codings.
8. according to claim 5-7 any one of them car-mounted terminals, which is characterized in that further include:Judgment module and splicing mould
Block;
The judgment module, for judge the operational order whether be split after short message, the short message use UDH data groups
Structure is knitted to be split;
The concatenation module spells the short message after the fractionation if being the short message after splitting for the operational order
It connects, forms complete operational order.
9. a kind of OTA communication equipments, which is characterized in that including:
Memory, processor and computer program;
Wherein, the computer program is stored in the memory, and is configured as being executed to realize such as by the processor
Method described in any one of claim 1-4.
10. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, the computer program
It is executed by processor to realize the method as described in any one of claim 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810659256.1A CN108449735A (en) | 2018-06-25 | 2018-06-25 | Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810659256.1A CN108449735A (en) | 2018-06-25 | 2018-06-25 | Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108449735A true CN108449735A (en) | 2018-08-24 |
Family
ID=63207232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810659256.1A Pending CN108449735A (en) | 2018-06-25 | 2018-06-25 | Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108449735A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109407651A (en) * | 2018-11-19 | 2019-03-01 | 北汽福田汽车股份有限公司 | The control method and device of vehicle |
JP2020087259A (en) * | 2018-11-30 | 2020-06-04 | 株式会社デンソー | Control device |
CN112534793A (en) * | 2020-02-14 | 2021-03-19 | 华为技术有限公司 | Vehicle-mounted equipment upgrading method and related device |
CN114143031A (en) * | 2021-11-01 | 2022-03-04 | 北京银盾泰安网络科技有限公司 | Remote encryption platform based on Web and SSH and encryption method thereof |
CN115086385A (en) * | 2022-05-12 | 2022-09-20 | 阿里巴巴达摩院(杭州)科技有限公司 | Vehicle-cloud data interaction method and device and computer-readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010049252A1 (en) * | 2008-10-28 | 2010-05-06 | Gemalto Sa | Method of managing data sent over the air to an applet having a restricted interface |
CN103747019A (en) * | 2014-02-12 | 2014-04-23 | 中国联合网络通信集团有限公司 | Data transmission method and device |
CN105050073A (en) * | 2014-04-22 | 2015-11-11 | 三星电子株式会社 | Method and apparatus for provisioning profiles |
CN105282732A (en) * | 2014-07-17 | 2016-01-27 | 三星电子株式会社 | Method and device for updating profile management server |
CN106162602A (en) * | 2014-08-14 | 2016-11-23 | 三星电子株式会社 | The method and apparatus downloaded for the configuration file of group device |
CN106453269A (en) * | 2016-09-21 | 2017-02-22 | 东软集团股份有限公司 | Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system |
-
2018
- 2018-06-25 CN CN201810659256.1A patent/CN108449735A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010049252A1 (en) * | 2008-10-28 | 2010-05-06 | Gemalto Sa | Method of managing data sent over the air to an applet having a restricted interface |
CN103747019A (en) * | 2014-02-12 | 2014-04-23 | 中国联合网络通信集团有限公司 | Data transmission method and device |
CN105050073A (en) * | 2014-04-22 | 2015-11-11 | 三星电子株式会社 | Method and apparatus for provisioning profiles |
CN105282732A (en) * | 2014-07-17 | 2016-01-27 | 三星电子株式会社 | Method and device for updating profile management server |
CN106162602A (en) * | 2014-08-14 | 2016-11-23 | 三星电子株式会社 | The method and apparatus downloaded for the configuration file of group device |
CN106453269A (en) * | 2016-09-21 | 2017-02-22 | 东软集团股份有限公司 | Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109407651A (en) * | 2018-11-19 | 2019-03-01 | 北汽福田汽车股份有限公司 | The control method and device of vehicle |
JP2020087259A (en) * | 2018-11-30 | 2020-06-04 | 株式会社デンソー | Control device |
JP7081464B2 (en) | 2018-11-30 | 2022-06-07 | 株式会社デンソー | Control device |
CN112534793A (en) * | 2020-02-14 | 2021-03-19 | 华为技术有限公司 | Vehicle-mounted equipment upgrading method and related device |
US11321074B2 (en) | 2020-02-14 | 2022-05-03 | Huawei Technologies Co., Ltd. | Vehicle-mounted device upgrade method and related apparatus |
CN114143031A (en) * | 2021-11-01 | 2022-03-04 | 北京银盾泰安网络科技有限公司 | Remote encryption platform based on Web and SSH and encryption method thereof |
CN115086385A (en) * | 2022-05-12 | 2022-09-20 | 阿里巴巴达摩院(杭州)科技有限公司 | Vehicle-cloud data interaction method and device and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108449735A (en) | Method, car-mounted terminal, equipment and the computer readable storage medium of OTA communications | |
CN108206996A (en) | Auth method and device | |
CN106341372A (en) | Terminal authentication processing method and device, and terminal authentication method, device and system | |
CN105429945B (en) | A kind of method, apparatus and system of data transmission | |
CN108632814A (en) | A kind of terminal device network collocating method and system | |
CN106936792A (en) | Safety certifying method and system and the mobile terminal for safety certification | |
CN102594555A (en) | Security protection method for data, entity on network side and communication terminal | |
CN102026180A (en) | M2M transmission control method, device and system | |
AU2020396746B2 (en) | Provisioning method and terminal device | |
CN105871864A (en) | Mobile terminal identity authentication method and device | |
CN109756336A (en) | A kind of authentication method, V2X computing system and V2X calculate node | |
US20230180010A1 (en) | Method for securely connecting vehicle and bluetooth key, and bluetooth module and bluetooth key | |
CN108966208A (en) | The method for down loading and device of eUICC subscription data | |
CN113055176A (en) | Terminal authentication method and system, terminal device, P2P verification platform and medium | |
CN108234119B (en) | Digital certificate management method and platform | |
CN107819766B (en) | Security authentication method, system and computer readable storage medium | |
CN107566112A (en) | Dynamic encryption and decryption method and server | |
CN115334508A (en) | Satellite short message communication method integrating authentication and encryption | |
CN101640614B (en) | Method and device for configuring IPSEC security strategy | |
CN113132976B (en) | Differential protection method and system for distributed wireless communication power distribution network | |
CN108810835A (en) | Correlating method, device, terminal and the storage medium of No.1 multiple terminals | |
CN106302345A (en) | A kind of terminal authentication method and device | |
CN108616877B (en) | Communication method, system and equipment of small base station | |
CN108123918A (en) | A kind of account authentication login method and device | |
CN105813006B (en) | A kind of information upgrade method, terminal device, network management device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180824 |