CN111698086A - Method and device for data transmission - Google Patents

Method and device for data transmission Download PDF

Info

Publication number
CN111698086A
CN111698086A CN202010536390.XA CN202010536390A CN111698086A CN 111698086 A CN111698086 A CN 111698086A CN 202010536390 A CN202010536390 A CN 202010536390A CN 111698086 A CN111698086 A CN 111698086A
Authority
CN
China
Prior art keywords
key
electronic device
value
fresh value
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010536390.XA
Other languages
Chinese (zh)
Other versions
CN111698086B (en
Inventor
陈洪银
吴杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apollo Zhilian Beijing Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010536390.XA priority Critical patent/CN111698086B/en
Publication of CN111698086A publication Critical patent/CN111698086A/en
Application granted granted Critical
Publication of CN111698086B publication Critical patent/CN111698086B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application discloses a method and a device for data transmission, and relates to the field of automatic driving. The specific implementation scheme is as follows: responding to the request of acquiring the data sent to the electronic equipment, and executing incremental operation on a fresh value which is locally stored and is communicated with the electronic equipment; determining whether the fresh value after the increment operation is executed is equal to an initial value of a fresh value which is locally saved and is communicated with the electronic equipment; updating a locally stored key for communication with the electronic device in response to determining that the fresh value after the incremental operation is performed is equal to the initial value; and sending the data unit generated according to the updated key to the electronic equipment. This embodiment improves the security of data transmission.

Description

Method and device for data transmission
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to the technical field of automatic driving.
Background
With the development of the automatic driving technology, the number of devices in the in-vehicle network is increasing sharply, and the in-vehicle communication network structure is becoming more and more complex. Currently, the market has extremely high requirements on the safety of the automatic driving vehicle, especially in the application scene of passenger transportation. The safety of the automatic driving vehicle comprises not only functional safety but also information transmission safety. In order to ensure the safety of information transmission, most of transmitted data is encrypted by using a fixed key in the existing in-vehicle network communication process.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a storage medium for data transmission.
According to a first aspect of the present disclosure, there is provided a method for data transmission, the method comprising: responding to the request of acquiring the data sent to the electronic equipment, and executing incremental operation on a fresh value which is locally stored and is communicated with the electronic equipment; determining whether the fresh value after the increment operation is executed is equal to an initial value of a fresh value which is locally saved and is communicated with the electronic equipment; updating a locally stored key for communication with the electronic device in response to determining that the fresh value after the incremental operation is performed is equal to the initial value; and sending the data unit generated according to the updated key to the electronic equipment.
According to a second aspect of the present disclosure, there is provided a method for data transmission, comprising: in response to receiving the data unit sent by the electronic equipment, performing message authentication on the data unit according to a locally stored key communicated with the electronic equipment; updating a locally stored fresh value communicated with the electronic device in response to the data unit passing the message authentication; determining whether the updated fresh value is equal to an initial value of a locally stored fresh value for communicating with the electronic device; in response to determining that the updated freshness value is equal to the initial value, a locally stored key for communicating with the electronic device is updated.
According to a third aspect of the present disclosure, there is provided an apparatus for data transmission, the apparatus comprising: the incremental unit is configured to respond to the acquired request for sending the data to the electronic equipment, and perform incremental operation on the fresh value which is locally saved and is communicated with the electronic equipment; a first determination unit configured to determine whether the fresh value after the increment operation is performed is equal to an initial value of a fresh value locally saved for communication with the electronic device; a first updating unit configured to update a locally stored key for communication with the electronic device in response to determining that the fresh value after the incremental operation is performed is equal to the initial value; a transmitting unit configured to transmit the data unit generated according to the updated key to the electronic device.
According to a fourth aspect of the present disclosure, there is provided an apparatus for data transmission, comprising: the authentication unit is configured to respond to the data unit sent by the electronic equipment, and carry out message authentication on the data unit according to a locally-saved key communicated with the electronic equipment; a second updating unit configured to update a locally saved fresh value communicated with the electronic device in response to the data unit passing the message authentication; a third determination unit configured to determine whether the updated fresh value is equal to an initial value of a fresh value saved locally in communication with the electronic device; a third updating unit configured to update a locally stored key for communication with the electronic device in response to determining that the updated freshness value is equal to the initial value.
According to a fifth aspect of the present disclosure, there is provided an apparatus comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the method of any of the first or second aspects.
According to a sixth aspect of the present disclosure, there is provided a computer readable medium having stored thereon a computer program which, when executed by a processor, performs the method of any one of the first or second aspects.
According to the technology of the application, the safety of data transmission is improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
FIG. 1 is an exemplary system architecture diagram in which one embodiment of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for data transmission according to the present application;
FIG. 3 is a flow diagram of yet another embodiment of a method for data transmission according to the present application;
FIG. 4 is a schematic block diagram of one embodiment of an apparatus for data transmission according to the present application;
FIG. 5 is a schematic block diagram of yet another embodiment of an apparatus for data transmission according to the present application;
FIG. 6 is a schematic block diagram of a computer system suitable for use with an electronic device implementing embodiments of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows an exemplary system architecture 100 to which embodiments of the method for data transmission or the apparatus for data transmission of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include an onboard smart device 101, a gateway 102, onboard an autonomous vehicle. A network of media providing a communication link exists between the in-vehicle smart device 101 and the gateway 102. The network may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The in-vehicle smart device 101 may be responsible for intelligent control of the unmanned vehicle 101. The in-vehicle smart device 101 may include an Electronic Control Unit (ECU) or other devices including Electronic devices having input/output ports and an arithmetic Control function. The gateway 102 is a central node of the vehicle-mounted intelligent devices connected with various network segments and having various functions, the vehicle-mounted intelligent devices in the network segments can directly communicate without passing through the gateway 102, and the vehicle-mounted intelligent devices not in the uniform network segment can forward messages through the gateway 102.
When the vehicle-mounted intelligent device 101 serves as a sending end, incremental operation can be performed on a fresh value which is locally stored and communicated with the electronic device in response to a request for obtaining data sent to the electronic device; determining whether the fresh value after the increment operation is executed is equal to an initial value of a fresh value which is locally saved and is communicated with the electronic equipment; updating a locally stored key for communication with the electronic device in response to determining that the fresh value after the incremental operation is performed is equal to the initial value; and sending the data unit generated according to the updated key to the electronic equipment.
When the vehicle-mounted intelligent device 102 serves as a receiving end, the vehicle-mounted intelligent device can respond to the received data unit sent by the electronic device and perform message authentication on the data unit according to a locally stored key communicated with the electronic device; updating a locally stored fresh value communicated with the electronic device in response to the data unit passing the message authentication; determining whether the updated fresh value is equal to an initial value of a locally stored fresh value for communicating with the electronic device; in response to determining that the updated freshness value is equal to the initial value, a locally stored key for communicating with the electronic device is updated.
It should be noted that the method for data transmission provided by the embodiment of the present application is generally performed by the in-vehicle smart device 102. Accordingly, the means for data transmission is typically provided in the in-vehicle smart device 102.
It should be understood that the number of onboard intelligent devices, gateways in fig. 1 is merely illustrative. Any number of vehicle-mounted intelligent devices and gateways can be provided according to implementation requirements.
With continued reference to fig. 2, a flow 200 of one embodiment of a method for data transmission in accordance with the present application is shown. The method for data transmission comprises the following steps:
step 201, in response to acquiring a request for sending data to the electronic device, performing an increment operation on a fresh value which is locally saved and is communicated with the electronic device.
In this embodiment, a method execution subject for data transmission (e.g., an in-vehicle smart device shown in fig. 1) may perform an increment operation on a fresh value locally saved in communication with an electronic device in response to acquiring a request to transmit data to the electronic device. The electronic device may include other onboard intelligent devices inside the vehicle, for example, other ECUs inside the vehicle, and the electronic device also locally holds the fresh value communicated with the execution subject. The request to send data to the electronic device may be generated in response to acquiring data to be sent to the electronic device or obtaining a control instruction to be issued to the electronic device. A Freshness value (fresh value) may represent Freshness of Communication and may be used to prevent replay attack, for example, a secure on board Communication (SecOC) mechanism is introduced in an Automotive Open System Architecture (AUTOSAR) specification, which adds a Freshness value to a data message transmitted by an in-vehicle network, and a data frame is associated with a Freshness value in an IEEE 802.15.4 technical standard. The initial value of the fresh value and the increment amplitude of the increment operation can be determined in a self-defined manner, and the increment amplitude can be 1 or other values agreed by the execution subject and the electronic device, which is not limited in this application. The execution body may locally hold several fresh values, each for communication with a different device. Electronic device
At step 202, it is determined whether the fresh value after the increment operation is performed is equal to the initial value of the fresh value stored locally for communication with the electronic device.
In this embodiment, the executing body may determine whether the fresh value after the increment operation is performed in step 201 is equal to an initial value of the fresh value locally saved for communication with the electronic device. The initial value of the fresh value communicated with the electronic device may be randomly initialized or determined according to a rule. The initial value of the fresh value can be determined by a random number broadcasted by the gateway, or can be determined by a random number broadcasted by a vehicle-mounted intelligent node which is specially responsible for issuing the fresh value.
In some optional implementations of this embodiment, the initial value comprises an initial value determined via: acquiring a random number broadcasted by a gateway after the whole vehicle is powered on; an initial value is determined from the random number. Determining the initial value from the random number may include directly determining the random number as the initial value, or processing the random number by a preset data processing operation, which may include incrementing, decrementing, hash-transforming, or the like. The execution body can determine whether the random number is received after power-on, and if the random number can not be actively requested until the request is successful. In addition, an encryption mode of a random number can be preset between the gateway and the execution main body, if the execution main body fails to verify after receiving the data, the attack is considered to exist, and a safety alarm can be carried out.
The central gateway is a central node of the vehicle-mounted intelligent equipment connected with various functions of each network segment, the gateway is used as the central node for fresh value management, and the fresh value issuing operation is carried out after the whole vehicle is powered on.
In some optional implementation manners of this embodiment, after obtaining the random number broadcasted by the gateway after the entire vehicle is powered on, the method further includes: a key for communicating with the electronic device is generated based on the random number. The execution main body may directly generate a key for communicating with the electronic device according to the random number, or may generate an initial value according to the random number, and then generate a key for communicating with the electronic device according to the initial value, specifically, the random number or the initial value may be directly determined as the key, or the random number or the initial value may be obtained by processing the random number or the initial value through a preset data processing operation, where the data processing operation may include increment, decrement, hash, and the like. In the implementation mode, the key for communication with the electronic equipment is generated according to the random number broadcasted by the gateway after the whole vehicle is powered on, and compared with the key generated by the random number issued by other non-central nodes, the key generation method reduces the forwarding of data and improves the efficiency of data transmission.
In some optional implementations of the embodiment, generating the key for communicating with the electronic device according to the random number includes: and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment. The Encryption algorithm may include a Data Encryption Standard (DES), an Advanced Encryption Standard (AES), and the like, which are not limited in this application. In the implementation mode, the random number and the preset root key are encrypted through the predefined encryption algorithm to generate the key communicated with the electronic equipment, and compared with a mode that the random number is directly determined as the key or only simple operation is carried out to obtain the key, the security is further improved.
Step 203, updating the locally stored key for communication with the electronic device in response to determining that the fresh value after the incrementing operation is performed is equal to the initial value.
In this embodiment, the executing entity may update the locally stored key for communication with the electronic device in response to determining in step 202 that the fresh value after the incrementing operation is performed is equal to the initial value. The rule for updating the key may be set according to actual needs, for example, the rule may be encrypted by using an encryption algorithm, or may be incremented or decremented, and the rule for the execution principal to update the locally stored key for communicating with the electronic device may be the same as the rule for the electronic device to update the locally stored key for communicating with the execution principal.
In some optional implementations of this embodiment, updating the locally stored key for communication with the electronic device includes: updating an initial value of a fresh value stored locally and communicated with the electronic equipment; and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment. The encryption algorithm may include a data encryption standard, an advanced encryption standard, etc., which is not limited in this application. In the implementation mode, the updated initial value and the preset root key are encrypted through the encryption algorithm to generate the updated key communicated with the electronic equipment, and compared with a mode of obtaining the key through simple operation, the security is further improved.
Step 204, sending the data unit generated according to the updated key to the electronic device.
In this embodiment, the execution main body may send a data unit generated according to the updated key to the electronic device, where the data unit may be generated based on different automotive electronic software development specifications and different secure communication mechanisms, and the data unit may include target data to be transmitted to the electronic device, where the target data includes real data, for example, acquired data or instruction data to be issued, and may further include data that may be used for verification, such as a key and a message authentication code.
In some optional implementations of this embodiment, the data unit includes a Message Authentication Code (MAC); and before sending the data unit generated from the updated key to the electronic device, the method further comprises: and calculating a message authentication code according to the target data and the updated key. In this implementation manner, the data unit includes a message authentication code calculated according to the target data and the updated key, and after receiving the data unit, the electronic device can perform message authentication through the message authentication code, thereby further improving the security of data transmission.
In some optional implementations of this embodiment, the data unit further includes lower bits of the fresh value after performing the increment operation; and calculating a message authentication code according to the target data and the updated key, including: and calculating a message authentication code according to the target data, the low order of the fresh value after the increment operation and the updated key. The fresh value locally stored by the execution main body may include lower bits and upper bits, for example, the fresh value includes two bytes, the upper bits and the lower bits may occupy one byte respectively, and the lower bits may be used for data transmission. In the implementation mode, the message authentication code is obtained by low-order calculation according to the fresh value after the incremental operation is executed, and the safety of data transmission is further improved.
In the flow 200 of the method for data transmission in this embodiment, in response to determining that the fresh value after the incremental operation is performed is equal to the initial value, the locally stored key for communication with the electronic device is updated, so that replay attack can be prevented, and the security of data transmission is improved.
With further reference to fig. 3, a flow 300 of yet another embodiment of a method for data transmission according to the present application is shown. The method for data transmission comprises the following steps:
step 301, in response to receiving the data unit sent by the electronic device, performing message authentication on the data unit according to a locally stored key for communication with the electronic device.
In this embodiment, a method execution subject for data transmission (e.g., the in-vehicle smart device shown in fig. 1) may perform message authentication on a data unit according to a locally stored key for communication with the electronic device in response to receiving the data unit sent by the electronic device. The data unit can be generated by the electronic device based on the collected information or generated according to the control instruction, and the data unit can be generated based on different automobile electronic software development specifications and different safety communication mechanisms. The message authentication of the data unit may include key-based authentication alone or may be verified in combination with the freshness value and the message authentication code.
In some optional implementations of this embodiment, performing message authentication on the data unit includes: acquiring the lower bits of a fresh value included in a data unit; determining a fresh value for message authentication according to the lower bits of the fresh value included in the data unit and a locally saved fresh value communicated with the electronic equipment; generating a message authentication code according to the fresh value for message authentication, the target data in the data unit and a locally stored key for communication with the electronic equipment; determining whether the message authentication code matches a message authentication code included in the data unit; if so, the data unit passes the message authentication. After the data unit is received, the implementation mode generates the message authentication code through the fresh value, the target data and the secret key to perform message authentication, and the safety of data transmission is further improved.
In this implementation, the executing entity may determine whether a lower order of the fresh value included in the data unit is greater than a lower order of a locally stored fresh value communicated with the electronic device, and in response to determining that the lower order of the fresh value included in the data unit is greater than the lower order of the locally stored fresh value communicated with the electronic device, combine the lower order of the fresh value included in the data unit with the higher order of the locally stored fresh value communicated with the electronic device to obtain a fresh value for message authentication; and in response to determining that the lower bits of the fresh value included in the data unit are less than or equal to the lower bits of the locally stored fresh value communicated with the electronic device, combining the higher bits of the locally stored fresh value communicated with the electronic device plus one with the lower bits of the fresh value included in the data unit to obtain the fresh value for message authentication. The lower bits of the fresh value included in the data unit being less than or equal to the lower bits of the locally saved fresh value in communication with the electronic device indicate that a carry may have occurred to perform the increment operation, so the upper bits of the locally saved fresh value in communication with the electronic device are incremented by one.
The executing entity may also add one to the lower bits of the fresh value stored locally and communicated with the electronic device to compare whether the comparison is the same as the lower bits of the fresh value included in the data unit, but the above manner cannot be used for fault tolerance of frame loss and the like. In addition, because the frame loss or low carry occurs, the high-order asynchronous condition can be caused, another fault-tolerant mechanism can be provided based on this, that is, the execution main body can execute the high-order plus one operation for the preset times, and the obtained fresh values for message authentication have the fresh values for successful authentication, namely the message authentication is considered to pass. The preset times can be set according to the frame loss or low carry condition.
Step 302, in response to the data unit passing the message authentication, updating a locally stored fresh value in communication with the electronic device.
In this embodiment, the executing agent may update the locally stored fresh value communicated with the electronic device in response to the data unit received in step 301 passing through the message authentication. If the data unit fails the message authentication, the data unit may be discarded. Updating the locally saved fresh value in communication with the electronic device may be updating the fresh value in communication with the electronic device by an incrementing operation or updating the locally saved fresh value in communication with the electronic device to a fresh value for message authentication.
In some optional implementations of this embodiment, updating the locally saved fresh value in communication with the electronic device includes: and updating the fresh value which is locally saved and is communicated with the electronic equipment into a fresh value for message authentication. Compared with the mode of updating the fresh value communicated with the electronic equipment through incremental operation, the implementation mode provides a fault-tolerant mechanism, the fresh value which is locally stored and communicated with the electronic equipment is directly updated to the fresh value for message authentication, the condition that the fresh value which is locally stored at the local terminal and the fresh value which is locally stored in the electronic equipment are inconsistent due to abnormal conditions such as frame loss is avoided, and the efficiency of data transmission is further improved.
Step 303 determines whether the updated fresh value is equal to the initial value of the locally stored fresh value for communicating with the electronic device.
In this embodiment, the executing entity may determine whether the updated fresh value in step 302 is equal to the initial value of the fresh value stored locally for communication with the electronic device. The initial value of the fresh value communicated with the electronic device may be randomly initialized or determined according to a rule. The initial value of the fresh value can be determined by a random number broadcasted by the gateway, or can be determined by a random number broadcasted by a vehicle-mounted intelligent node which is specially responsible for issuing the fresh value.
In some optional implementations of this embodiment, the initial value comprises an initial value determined via: acquiring a random number broadcasted by a gateway after the whole vehicle is powered on; an initial value is determined from the random number. The execution body can determine whether the random number is received after power-on, and if the random number can not be actively requested until the request is successful. In addition, an encryption mode of a random number can be preset between the gateway and the execution main body, if the execution main body fails to verify after receiving the data, the attack is considered to exist, and a safety alarm can be carried out.
In some optional implementation manners of this embodiment, after obtaining the random number broadcasted by the gateway after the entire vehicle is powered on, the method further includes: a key for communicating with the electronic device is generated based on the random number. The execution main body may directly generate a key for communicating with the electronic device according to the random number, or may generate an initial value according to the random number, and then generate a key for communicating with the electronic device according to the initial value, specifically, the random number or the initial value may be directly determined as the key, or the random number or the initial value may be obtained by processing the random number or the initial value through a preset data processing operation, where the data processing operation may include increment, decrement, hash, and the like. In the implementation mode, the key for communication with the electronic equipment is generated according to the random number broadcasted by the gateway after the whole vehicle is powered on, and compared with the key generated by the random number issued by other non-central nodes, the key generation method reduces the forwarding of data and improves the efficiency of data transmission.
In some optional implementations of the embodiment, generating the key for communicating with the electronic device according to the random number includes: and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment. The Encryption algorithm may include a Data Encryption Standard (DES), an Advanced Encryption Standard (AES), and the like, which are not limited in this application. In the implementation mode, the random number and the preset root key are encrypted through the predefined encryption algorithm to generate the key communicated with the electronic equipment, and compared with a mode that the random number is directly determined as the key or only simple operation is carried out to obtain the key, the security is further improved.
In response to determining that the updated freshness value is equal to the initial value, step 304, a locally stored key for communication with the electronic device is updated.
In this embodiment, the executing entity may update the locally stored key for communication with the electronic device in response to determining that the updated fresh value is equal to the initial value in step 303. The rule for updating the key may be set according to actual needs, for example, the rule may be encrypted by using an encryption algorithm, or may be incremented or decremented, and the rule for the execution principal to update the locally stored key for communicating with the electronic device may be the same as the rule for the electronic device to update the locally stored key for communicating with the execution principal.
In some optional implementations of this embodiment, updating the locally stored key for communication with the electronic device includes: updating an initial value of a fresh value stored locally and communicated with the electronic equipment; and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment. The encryption algorithm may include a data encryption standard, an advanced encryption standard, etc., which is not limited in this application. In the implementation mode, the updated initial value and the preset root key are encrypted through the encryption algorithm to generate the updated key communicated with the electronic equipment, and compared with a mode of obtaining the key through simple operation, the security is further improved.
In the flow 300 of the method for data transmission in this embodiment, in response to determining that the updated fresh value is equal to the initial value, the locally stored key for communication with the electronic device is updated, so that replay attack can be prevented, and the security of data transmission is improved.
With further reference to fig. 4, as an implementation of the method shown in fig. 2, the present application provides an embodiment of an apparatus for data transmission, which corresponds to the embodiment of the method shown in fig. 2, and which can be applied in various electronic devices.
As shown in fig. 4, the apparatus 400 for data transmission of the present embodiment includes: an increment unit 401, a first determination unit 402, a first update unit 403. The incremental unit is configured to respond to the request of acquiring the data sent to the electronic equipment, and perform incremental operation on the fresh value which is locally saved and is communicated with the electronic equipment; a first determination unit configured to determine whether the fresh value after the increment operation is performed is equal to an initial value of a fresh value locally saved for communication with the electronic device; a first updating unit configured to update a locally stored key for communication with the electronic device in response to determining that the fresh value after the incremental operation is performed is equal to the initial value; a transmitting unit configured to transmit the data unit generated according to the updated key to the electronic device.
In this embodiment, the specific processing of the increment unit 401, the first determination unit 402, the first update unit 403, and the sending unit 404 of the apparatus 400 for data transmission may refer to step 201, step 202, step 203, and step 204 in the corresponding embodiment of fig. 2.
In some optional implementations of this embodiment, the apparatus further comprises a second determining unit configured to: acquiring a random number broadcasted by a gateway after the whole vehicle is powered on; an initial value is determined from the random number.
In some optional implementations of this embodiment, the apparatus further comprises: a first generating unit configured to generate a key for communication with the electronic device according to the random number.
In some optional implementations of the present embodiment, the first generating unit is further configured to: and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment.
In some optional implementations of this embodiment, the first updating unit is further configured to: updating an initial value of a fresh value stored locally and communicated with the electronic equipment; and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment.
In some optional implementations of this embodiment, the data unit includes a message authentication code; and the apparatus further comprises: a calculation unit configured to calculate a message authentication code based on the target data and the updated key.
In some optional implementations of this embodiment, the data unit further includes lower bits of the fresh value after performing the increment operation; and a computing unit, further configured to: and calculating a message authentication code according to the target data, the low order of the fresh value after the increment operation and the updated key.
The device provided by the above embodiment of the application, by responding to the request for acquiring the data sent to the electronic device, performs an increment operation on the locally stored fresh value communicated with the electronic device; determining whether the fresh value after the increment operation is executed is equal to an initial value of a fresh value which is locally saved and is communicated with the electronic equipment; updating a locally stored key for communication with the electronic device in response to determining that the fresh value after the incremental operation is performed is equal to the initial value; and the data unit generated according to the updated key is sent to the electronic equipment, so that the safety of data transmission is improved.
With further reference to fig. 5, as an implementation of the method shown in fig. 3, the present application provides an embodiment of an apparatus for data transmission, which corresponds to the embodiment of the method shown in fig. 3, and which can be applied in various electronic devices.
As shown in fig. 5, the apparatus 500 for data transmission of the present embodiment includes: authentication section 501, second updating section 502, third determination section 503, and third updating section 504. The authentication unit is configured to respond to the data unit sent by the electronic equipment, and perform message authentication on the data unit according to a locally stored key communicated with the electronic equipment; a second updating unit configured to update a locally saved fresh value communicated with the electronic device in response to the data unit passing the message authentication; a third determination unit configured to determine whether the updated fresh value is equal to an initial value of a fresh value saved locally in communication with the electronic device; a third updating unit configured to update a locally stored key for communication with the electronic device in response to determining that the updated freshness value is equal to the initial value.
In this embodiment, the specific processes of the authentication unit 501, the second updating unit 502, the third determining unit 503 and the third updating unit 504 of the apparatus for data transmission 500 may refer to step 301, step 302, step 303 and step 304 in the corresponding embodiment of fig. 3.
In some optional implementations of this embodiment, the authentication unit is further configured to: acquiring the lower bits of a fresh value included in a data unit; determining a fresh value for message authentication according to the lower bits of the fresh value included in the data unit and a locally saved fresh value communicated with the electronic equipment; generating a message authentication code according to the fresh value for message authentication, the target data in the data unit and a locally stored key for communication with the electronic equipment; determining whether the message authentication code matches a message authentication code included in the data unit; if so, the data unit passes the message authentication.
In some optional implementations of this embodiment, the third updating unit is further configured to: and updating the fresh value which is locally saved and is communicated with the electronic equipment into a fresh value for message authentication.
In some optional implementations of this embodiment, the apparatus further comprises a fourth determining unit configured to: acquiring a random number broadcasted by a gateway after the whole vehicle is powered on; an initial value is determined from the random number.
In some optional implementations of this embodiment, the apparatus further comprises: a second generation unit configured to generate a key for communication with the electronic device according to the random number.
In some optional implementations of this embodiment, the second generating unit is further configured to: and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment.
In some optional implementations of this embodiment, the third updating unit is further configured to: updating an initial value of a fresh value stored locally and communicated with the electronic equipment; and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment.
The apparatus provided in the foregoing embodiment of the present application performs message authentication on a data unit according to a locally stored key for communicating with an electronic device, by responding to a received data unit sent by the electronic device; updating a locally stored fresh value communicated with the electronic device in response to the data unit passing the message authentication; determining whether the updated fresh value is equal to an initial value of a locally stored fresh value for communicating with the electronic device; and in response to determining that the updated fresh value is equal to the initial value, updating a locally stored key for communication with the electronic device, thereby improving the security of data transmission.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
As shown in fig. 6, it is a block diagram of an electronic device for data transmission according to the method of the embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 6, the electronic apparatus includes: one or more processors 601, memory 602, and interfaces for connecting the various components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 6, one processor 601 is taken as an example.
The memory 602 is a non-transitory computer readable storage medium as provided herein. Wherein the memory stores instructions executable by at least one processor to cause the at least one processor to perform the method for data transmission provided herein. The non-transitory computer readable storage medium of the present application stores computer instructions for causing a computer to perform the method for data transmission provided herein.
The memory 602 is used as a non-transitory computer readable storage medium and can be used for storing non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the method for data transmission in the embodiment of the present application (for example, the incrementing unit 401, the first determining unit 402, the first updating unit 403, and the sending unit 404 shown in fig. 4, or the authenticating unit 501, the second updating unit 502, the third determining unit 503, and the third updating unit 504 shown in fig. 5). The processor 601 executes various functional applications of the server and data processing by executing non-transitory software programs, instructions, and modules stored in the memory 602, that is, implements the method for data transmission in the above method embodiments.
The memory 602 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device for data transmission, and the like. Further, the memory 602 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 602 optionally includes memory located remotely from the processor 601, which may be connected to an electronic device for data transfer over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the method for data transmission may further include: an input device 603 and an output device 604. The processor 601, the memory 602, the input device 603 and the output device 604 may be connected by a bus or other means, and fig. 6 illustrates the connection by a bus as an example.
The input device 603 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus for data transmission, such as an input device like a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointer, one or more mouse buttons, a track ball, a joystick, etc. The output devices 604 may include a display device, auxiliary lighting devices (e.g., LEDs), and tactile feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the cluster operation efficiency is improved.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present application can be achieved, and the present invention is not limited herein.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (30)

1. A method for data transmission, comprising:
in response to acquiring a request for sending data to the electronic equipment, performing incremental operation on a fresh value which is locally saved and is communicated with the electronic equipment;
determining whether the fresh value after the increment operation is executed is equal to an initial value of a fresh value which is locally saved and is communicated with the electronic equipment;
in response to determining that the fresh value after performing the increment operation is equal to the initial value, updating a locally stored key for communication with the electronic device;
and sending the data unit generated according to the updated key to the electronic equipment.
2. The method of claim 1, wherein the initial value comprises an initial value determined via:
acquiring a random number broadcasted by a gateway after the whole vehicle is powered on;
and determining the initial value according to the random number.
3. The method of claim 2, wherein after obtaining the random number broadcasted by the gateway after powering on the entire vehicle, the method further comprises:
and generating a secret key for communicating with the electronic equipment according to the random number.
4. The method of claim 3, wherein the generating a key to communicate with the electronic device from the random number comprises:
and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment.
5. The method of claim 1, wherein the updating the locally stored key for communication with the electronic device comprises:
updating an initial value of a fresh value stored locally for communication with the electronic device;
and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment.
6. The method of any of claims 1-5, wherein the data unit includes a message authentication code; and
before the sending the data unit generated according to the updated key to the electronic device, the method further includes:
and calculating a message authentication code according to the target data and the updated key.
7. The method of claim 6, wherein the data unit further comprises low order bits of a fresh value after the incrementing operation is performed; and
the calculating a message authentication code according to the target data and the updated key includes:
and calculating a message authentication code according to the target data, the low order of the fresh value after the increment operation and the updated key.
8. A method for data transmission, comprising:
in response to receiving a data unit sent by electronic equipment, performing message authentication on the data unit according to a locally stored key communicated with the electronic equipment;
updating a locally stored fresh value in communication with the electronic device in response to the data unit passing message authentication;
determining whether the updated fresh value is equal to an initial value of a locally stored fresh value for communication with the electronic device;
in response to determining that the updated fresh value is equal to the initial value, updating a locally stored key for communication with the electronic device.
9. The method of claim 8, wherein the message authenticating the data unit according to a locally stored key for communication with the electronic device comprises:
acquiring the low order of a fresh value included in the data unit;
determining a fresh value for message authentication according to the lower bits of the fresh value included in the data unit and a locally saved fresh value communicated with the electronic equipment;
generating a message authentication code according to the fresh value for message authentication, the target data in the data unit and a locally stored key for communication with the electronic equipment;
determining whether the message authentication code matches a message authentication code included in the data unit;
and if the data units are matched, the data units pass the message authentication.
10. The method of claim 9, wherein the updating the locally saved fresh value in communication with the electronic device comprises:
and updating the locally saved fresh value communicated with the electronic equipment into the fresh value for message authentication.
11. The method of any of claims 8-10, wherein the initial value comprises an initial value determined via:
acquiring a random number broadcasted by a gateway after the whole vehicle is powered on;
and determining the initial value according to the random number.
12. The method of claim 11, wherein after obtaining the random number broadcasted by the gateway after powering on the entire vehicle, the method further comprises:
and generating a secret key for communicating with the electronic equipment according to the random number.
13. The method of claim 12, wherein the generating a key to communicate with the electronic device from the random number comprises:
and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment.
14. The method of claim 8, wherein the updating the locally stored key for communication with the electronic device comprises:
updating an initial value of a fresh value stored locally for communication with the electronic device;
and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment.
15. An apparatus for data transmission, comprising:
the incremental unit is configured to respond to the acquired request for sending data to the electronic equipment, and perform incremental operation on the fresh value which is locally saved and is communicated with the electronic equipment;
a first determination unit configured to determine whether the fresh value after the increment operation is performed is equal to an initial value of a fresh value saved locally and communicated with the electronic device;
a first updating unit configured to update a locally stored key for communication with the electronic device in response to determining that the fresh value after the incrementing operation is performed is equal to the initial value;
a transmitting unit configured to transmit a data unit generated according to the updated key to the electronic device.
16. The apparatus of claim 15, the apparatus further comprising a second determining unit configured to:
acquiring a random number broadcasted by a gateway after the whole vehicle is powered on;
and determining the initial value according to the random number.
17. The apparatus of claim 16, the apparatus further comprising:
a first generating unit configured to generate a key for communication with the electronic device according to the random number.
18. The apparatus of claim 17, wherein the first generating unit is further configured to:
and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment.
19. The apparatus of claim 15, wherein the first updating unit is further configured to:
updating an initial value of a fresh value stored locally for communication with the electronic device;
and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment.
20. The apparatus of any of claims 15-19, the data unit comprising a message authentication code; and
the device further comprises: a computing unit configured to compute the message authentication code according to target data and the updated key.
21. The apparatus of claim 20, wherein the data unit further comprises low bits of a fresh value after the increment operation is performed; and
the computing unit, further configured to:
and calculating a message authentication code according to the target data, the low order of the fresh value after the increment operation and the updated key.
22. An apparatus for data transmission, comprising:
the authentication unit is configured to respond to the reception of the data unit sent by the electronic equipment, and perform message authentication on the data unit according to a locally-saved key for communication with the electronic equipment;
a second updating unit configured to update a locally saved fresh value communicated with the electronic device in response to the data unit passing message authentication;
a third determination unit configured to determine whether the updated fresh value is equal to an initial value of a fresh value saved locally for communication with the electronic device;
a third updating unit configured to update a locally stored key for communication with the electronic device in response to determining that the updated fresh value is equal to the initial value.
23. The apparatus of claim 22, wherein the authentication unit is further configured to:
acquiring the low order of a fresh value included in the data unit;
determining a fresh value for message authentication according to the lower bits of the fresh value included in the data unit and a locally saved fresh value communicated with the electronic equipment;
generating a message authentication code according to the fresh value for message authentication, the target data in the data unit and a locally stored key for communication with the electronic equipment;
determining whether the message authentication code matches a message authentication code included in the data unit;
and if the data units are matched, the data units pass the message authentication.
24. The apparatus of claim 23, wherein the third updating unit is further configured to:
and updating the locally saved fresh value communicated with the electronic equipment into the fresh value for message authentication.
25. The apparatus according to any of claims 22-24, the apparatus further comprising a fourth determination unit configured to:
acquiring a random number broadcasted by a gateway after the whole vehicle is powered on;
and determining the initial value according to the random number.
26. The apparatus of claim 25, the apparatus further comprising:
a second generation unit configured to generate a key for communication with the electronic device according to the random number.
27. The apparatus of claim 26, wherein the second generating unit is further configured to:
and encrypting the random number and a preset root key through a predefined encryption algorithm to generate a key for communicating with the electronic equipment.
28. The apparatus of claim 22, wherein the third updating unit is further configured to:
updating an initial value of a fresh value stored locally for communication with the electronic device;
and encrypting the updated initial value and the preset root key through a predefined encryption algorithm to generate an updated key for communicating with the electronic equipment.
29. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method recited in any of claims 1-14.
30. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-14.
CN202010536390.XA 2020-06-12 2020-06-12 Method and device for data transmission Active CN111698086B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010536390.XA CN111698086B (en) 2020-06-12 2020-06-12 Method and device for data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010536390.XA CN111698086B (en) 2020-06-12 2020-06-12 Method and device for data transmission

Publications (2)

Publication Number Publication Date
CN111698086A true CN111698086A (en) 2020-09-22
CN111698086B CN111698086B (en) 2023-12-12

Family

ID=72480773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010536390.XA Active CN111698086B (en) 2020-06-12 2020-06-12 Method and device for data transmission

Country Status (1)

Country Link
CN (1) CN111698086B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112740726A (en) * 2020-12-28 2021-04-30 华为技术有限公司 Data transmission method and device
CN113259374A (en) * 2021-06-10 2021-08-13 中汽创智科技有限公司 Fresh value management method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2177582A2 (en) * 2008-10-13 2010-04-21 tesa AG Adhesive band with functionalised adhesive mass and use of the same
CN104247328A (en) * 2013-04-17 2014-12-24 华为技术有限公司 Method and device for data transmission
CN106534086A (en) * 2016-10-31 2017-03-22 深圳数字电视国家工程实验室股份有限公司 Device authentication method and system, terminal device and server
CN110378139A (en) * 2019-07-25 2019-10-25 江苏芯盛智能科技有限公司 A kind of data key guard method, system and electronic equipment and storage medium
CN110933110A (en) * 2019-12-17 2020-03-27 东软集团股份有限公司 Communication method, sending end, receiving end and vehicle of vehicle-mounted network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2177582A2 (en) * 2008-10-13 2010-04-21 tesa AG Adhesive band with functionalised adhesive mass and use of the same
CN104247328A (en) * 2013-04-17 2014-12-24 华为技术有限公司 Method and device for data transmission
CN106534086A (en) * 2016-10-31 2017-03-22 深圳数字电视国家工程实验室股份有限公司 Device authentication method and system, terminal device and server
CN110378139A (en) * 2019-07-25 2019-10-25 江苏芯盛智能科技有限公司 A kind of data key guard method, system and electronic equipment and storage medium
CN110933110A (en) * 2019-12-17 2020-03-27 东软集团股份有限公司 Communication method, sending end, receiving end and vehicle of vehicle-mounted network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
欧阳小星等: "基于AKA协议的USIM卡安全研究与实现", 《计算机技术与发展》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112740726A (en) * 2020-12-28 2021-04-30 华为技术有限公司 Data transmission method and device
CN112740726B (en) * 2020-12-28 2022-06-10 华为技术有限公司 Data transmission method and device
WO2022140895A1 (en) * 2020-12-28 2022-07-07 华为技术有限公司 Data transmission method, and apparatus
CN113259374A (en) * 2021-06-10 2021-08-13 中汽创智科技有限公司 Fresh value management method and device
CN113259374B (en) * 2021-06-10 2021-11-02 中汽创智科技有限公司 Fresh value management method and device

Also Published As

Publication number Publication date
CN111698086B (en) 2023-12-12

Similar Documents

Publication Publication Date Title
CN111356114B (en) In-vehicle electronic control unit upgrading method, device, equipment and vehicle system
CN111769958B (en) Block chain cross-chain processing method, device, equipment and storage medium
CN109040063B (en) Method, device and equipment for determining vehicle ECU key and storage medium
CN108696589B (en) Block chain data transmission method, device, equipment and storage medium
CN111131317B (en) Data processing method, device, equipment and medium based on block chain
CN112134956A (en) Distributed Internet of things instruction management method and system based on block chain
CN112584350B (en) Method, device and equipment for processing information and readable storage medium
CN111698086B (en) Method and device for data transmission
CN111737366A (en) Private data processing method, device, equipment and storage medium of block chain
JP7327731B2 (en) Security protection method and device in in-vehicle system
WO2021147100A1 (en) Message transmission method and apparatus
CN111866092B (en) Message transmission method and device, electronic equipment and readable storage medium
WO2019019593A1 (en) Stateless communication security signature method, terminal and server end
CN113259901B (en) Message protection method and device for Internet of vehicles
CN113987600A (en) Computer system, data processing method and computer readable storage medium
US7870251B2 (en) Devices, methods, and computer program products for real-time resource capacity management
CN110545320A (en) Intranet data interaction method and equipment
CN115333851A (en) Automatic driving data transmission method and device and electronic equipment
CN113794706A (en) Data processing method and device, electronic equipment and readable storage medium
CN114172675A (en) Gateway access method, device, electronic equipment and storage medium
CN111371557A (en) Block chain data processing method and device, electronic equipment and medium
US20210132961A1 (en) Configuration synthesis utilizing information extraction from service oriented architectures
CN113824546B (en) Method and device for generating information
CN115883200B (en) Log security management method, device, platform and medium
CN116318727B (en) ECU access method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20211009

Address after: 100176 101, floor 1, building 1, yard 7, Ruihe West 2nd Road, Beijing Economic and Technological Development Zone, Daxing District, Beijing

Applicant after: Apollo Zhilian (Beijing) Technology Co.,Ltd.

Address before: 2 / F, baidu building, No. 10, Shangdi 10th Street, Haidian District, Beijing 100085

Applicant before: BEIJING BAIDU NETCOM SCIENCE AND TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant