CN111832003A - Internet of vehicles alliance authentication method and device for application program - Google Patents

Internet of vehicles alliance authentication method and device for application program Download PDF

Info

Publication number
CN111832003A
CN111832003A CN201910309047.9A CN201910309047A CN111832003A CN 111832003 A CN111832003 A CN 111832003A CN 201910309047 A CN201910309047 A CN 201910309047A CN 111832003 A CN111832003 A CN 111832003A
Authority
CN
China
Prior art keywords
module
application program
mirrorlink
authentication
use case
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910309047.9A
Other languages
Chinese (zh)
Inventor
刘博文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910309047.9A priority Critical patent/CN111832003A/en
Publication of CN111832003A publication Critical patent/CN111832003A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a vehicle networking alliance authentication method and device of an application program. The Internet of vehicles alliance authentication method of the application program comprises the following steps: receiving an application program authentication instruction sent by a screen projection protocol MirrorLink module; executing each use case of the application program according to the preset steps, and sending an execution result message of each use case to the MirrorLink module; and generating a universal unique identifier UUID for the application program which confirms all use cases to pass through, and generating an application program self-signed certificate according to the UUID. The method for authenticating the Internet of vehicles alliance of the application program can complete local authentication of the application program and generate the self-signed certificate, thereby ensuring the safety of the authentication process and the accuracy of the authentication result.

Description

Internet of vehicles alliance authentication method and device for application program
Technical Field
The invention relates to a vehicle networking alliance authentication method and device of an application program.
Background
The screen projection protocol MirrorLink is a 'car networking' standard which is jointly established by some international well-known mobile phone manufacturers and car manufacturers, aims to standardize the effective connection between intelligent equipment and a vehicle-mounted system, and forms good user experience. The intelligent device is a terminal device such as a mobile phone and a vehicle-mounted system. When the standard is adopted to interconnect the intelligent equipment and the vehicle machine, the bidirectional control of the intelligent equipment and the vehicle machine of a specific application program can be realized. Applications based on the screen-casting protocol MirrorLink need to be authenticated by a Car Connectivity association (CCC) organization before being released, and application providers generally need to complete local authentication before online authentication. Currently, the authentication method for the local authentication of the application based on MirrorLink is missing.
Disclosure of Invention
In view of the above, the present invention is proposed to provide a car networking alliance authentication method and apparatus for an application that overcomes or at least partially solves the above problems.
In a first aspect, an embodiment of the present invention provides a method for CCC authentication of an application program, where the method includes:
receiving an application program authentication instruction sent by a screen projection protocol MirrorLink module;
executing each use case of the application program according to the preset steps, sending an execution result message of each use case to the MirrorLink module, and judging whether the use cases are executed successfully or not by the MirrorLink module;
and when the MirrorLink module is determined to judge that all the use cases of the application program are successfully executed, generating a universal unique identifier UUID, and generating an application program self-signed certificate according to the UUID.
In some optional embodiments, the receiving an application authentication instruction sent by a MirrorLink module in a screen projection protocol includes:
and receiving an application program authentication instruction sent by the MirrorLink module by calling a Common API (Common interface).
In some optional embodiments, the executing each use case of the application program according to the preset steps, and sending an execution result message of each use case to the MirrorLink module includes:
executing each use case of the application program according to the preset execution step of the use case of the application program;
the execution result messages of the various use cases of the application are sent to the MirrorLink module by calling the Common API.
In some optional embodiments, the determining, by the MirrorLink module, whether the use case is successfully executed includes:
and the MirrorLink module judges whether the use case is successfully executed or not according to the execution result message of the use case through the use case authentication tool.
In some optional embodiments, generating a universally unique identifier UUID, and generating an application self-signed certificate according to the UUID includes:
generating an encryption character string according to a designated part of an application program, and generating a UUID according to the encryption character string;
and generating a self-signed certificate through a certificate generation tool according to the UUID.
In some optional embodiments, the method further comprises:
receiving an execution action instruction sent by the MirrorLink module, executing a corresponding use case of an application program according to the instruction, and sending an execution result message to the MirrorLink module; in a corresponding manner, the first and second optical fibers are,
and determining that the MirrorLink module judges that all use cases of the application program are successfully executed, wherein the step of determining that the use cases executed by the application program according to the preset steps and the corresponding use cases executed according to the execution action instructions sent by the MirrorLink module are successfully executed.
In some optional embodiments, receiving the action execution instruction sent by the MirrorLink module includes:
and receiving an execution action instruction sent by the MirrorLink module by calling Common API.
In a second aspect, an embodiment of the present invention provides an application program CCC authentication apparatus, including a MirrorLink module, a program module, and a certificate generation module;
the MirrorLink module is used for sending an application program authentication instruction to the program module;
the program module is used for receiving an application program authentication instruction sent by the MirrorLink module; executing each use case of the application program according to preset steps, sending an execution result message of each use case to the MirrorLink module, and judging whether the use cases are executed successfully or not by the MirrorLink module;
and the certificate generation module is used for generating a universal unique identifier UUID when the MirrorLink module is determined to judge that all use cases of the application program are successfully executed, and generating the self-signed certificate of the application program according to the UUID.
In some optional embodiments, the apparatus further comprises:
and the bus interface module is used for receiving the application program authentication instruction sent by the MirrorLink module and forwarding the received application program authentication instruction to the program module.
In a third aspect, an embodiment of the present invention provides a server, including: the device comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the method for authenticating the application program through the Internet of vehicles alliance CCC.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which computer instructions are stored, and when the instructions are executed by a processor, the method for authenticating the car networking alliance CCC of the application program is implemented.
The technical scheme provided by the embodiment of the invention has the beneficial effects that at least:
the embodiment of the invention provides a CCC authentication method for an application program, which tests each use case of the application program; in the authentication process, the execution steps of the use cases of the application program are carried out according to rules, the execution steps of the use cases are not lost or omitted, whether the application program is executed according to a complete tool chain provided by the vehicle networking alliance CCC authentication organization can be judged according to the execution results of the use cases, and the safety and the accuracy of the authentication results in the authentication process are guaranteed. Generating a self-signed certificate for the application program which passes the execution case, and completing local authentication of the application program so as to upload the self-signed certificate to a MirrorLink authentication server for online authentication; and by generating the UUID and generating the self-signed certificate according to the UUID, the validity of the self-signed certificate is ensured.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of a CCC authentication method for an application according to a first embodiment of the present invention;
fig. 2 is a schematic diagram illustrating an application program and a MirrorLink module implementing communication according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a CCC authentication apparatus for an application according to a second embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In order to solve the problem that the application program based on the MirrorLink cannot perform local CCC authentication on the AliOS system in the prior art, embodiments of the present invention provide a CCC authentication method and apparatus for an application program, which can complete local authentication of an application program, generate a self-signed certificate, and ensure security of an authentication process and accuracy of an authentication result.
Example one
The embodiment of the invention provides a method for authenticating a vehicle networking alliance (CCC) of an application program, in particular to a method for realizing CCC local authentication of the application program based on a screen projection protocol MirrorLink, wherein the flow is shown in figure 1 and comprises the following steps:
step S11: and receiving an application program authentication instruction sent by a screen projection protocol MirrorLink module.
Specifically, the Application program (App) authentication command sent by the MirrorLink module may be received through the Common API of the bus interface.
The following description is given by taking an example Of an authentication method Of an application program based on MirrorLink on an alic system Of a car machine, where alic is an Internet Of Things operating system developed for automobiles, Internet Of Things (IOT) terminals, IOT chips, industrial fields, and the like, and referring to fig. 2, communication between the application program Of the alic system and a MirrorLink module is completed through a Common API. The application program communicates with the Common API through a bus system, for example, a Signal system in the Ubus system may be used to implement the communication between the application program and the Common API; the Common API and the screen projection protocol MirrorLink module may communicate by calling plug-ins each other. When the local authentication of the application program is started, the MirrorLink module sends an application program authentication instruction to the Common API, and sends the application program authentication instruction to the execution module of the application program through the Common API.
Specifically, the Application program, the Common API of the bus interface, and the MirrorLink module are all computer Application programs (APPs) on the vehicle.
Step S12: and executing each use case of the application program according to the preset steps, and sending an execution result message of each use case to the MirrorLink module, wherein the execution result message is used for the MirrorLink module to judge whether the use cases are executed successfully or not.
Specifically, each use case of the application program may be executed according to a preset execution step of the use case of the application program; the execution result messages of the various use cases of the application are sent to the MirrorLink module by calling the Common API.
The preset steps of the use case of the application program are obtained according to use case execution rules provided by a Car Connectivity Consortium (CCC) organization.
For example, when the application program is an application program of a music player and a use case for playing music is executed, the application program executes a playing action, the music playing is successful, and the execution result message is sent to the Common API which sends the execution result message to the MirrorLink module in a manner that plug-ins are exposed; correspondingly, after receiving an external action execution request, the MirrorLink module sends an action execution instruction to the Common API by calling the plug-in addons, and the Common API sends the action execution instruction to the application program in a Ubus manner to notify the application program of executing a specific use case.
Optionally, when the Common API is called to send the execution result message of each use case of the application program to the MirrorLink module, the CCC authentication method for the car networking alliance of the application program of the present invention further includes:
and judging whether the use case is successfully executed or not according to the execution result message of the use case through a use case authentication tool of the MirrorLink module.
Specifically, the use case authentication tool in the MirrorLink module includes an execution specification of an application program specified by the car networking alliance CCC organization, the MirrorLink module compares the execution action of the use case of the application program with the execution specification in the use case authentication tool to determine whether the execution action of the use case of the application program is correct, and if the execution action of the use case of the application program conforms to the execution specification in the use case authentication tool, the execution action is accurate, and the use case of the application program is successfully executed. More specifically, the authentication tool of the MirrorLink module may be provided with an interface for displaying the execution condition of the use case, and whether the execution result of the execution action of the use case of the application program is consistent with the expected result of the execution specification in the use case authentication tool may be shown.
Step S13: and when the MirrorLink module is determined to judge that all the use cases of the application program are successfully executed, generating a universal unique identifier UUID, and generating an application program self-signed certificate according to the UUID.
Specifically, for an application program in which all use cases are successfully executed, the certificate generation module generates an encrypted string according to an assigned part of the application program, and generates a Universal Unique Identifier (UUID) according to the encrypted string; and generating a self-signed certificate through a certificate generation tool according to the UUID.
Specifically, the message that all use cases of the application program are successfully executed may be actively sent to the certificate generation module by the program module; optionally, the operator may input an instruction for generating a self-signed certificate of the application program to the certificate generation module, and when the certificate generation module receives the instruction for generating the self-signed certificate of the application program, all use cases of the default application program are executed successfully.
Wherein generating the encrypted string based on the specified portion of the application may employ a selected digest calculation method. The calculation method of the encrypted character string may select a Secure Hash Algorithm (SHA 1) Algorithm, may select a Message Digest Algorithm fifth version (MD 5) Algorithm, or may select another Algorithm, as long as the specified part of the application program can be encrypted to generate the encrypted character string.
The self-signed certificate is generated through the certificate generation tool according to the UUID, and may be generated through the certificate generation tool according to the obtained UUID, a preset developer ID and a certificate template provided by the car networking alliance CCC organization. Certificate generation tools in the prior art, such as the key tool Keytool or the software package library OPENSSL, may be employed.
In some optional embodiments, the CCC authentication method for an internet of vehicles alliance of an application program provided in the embodiments of the present invention may further include:
and receiving an execution action instruction sent by the MirrorLink module, executing a corresponding use case of the application program according to the instruction, and sending an execution result message to the MirrorLink module.
Specifically, the execution action instruction sent by the MirrorLink module may be received by calling Common API.
Correspondingly, in the step S13, it is determined that the MirrorLink module determines that all use cases of the application program are successfully executed, including determining that the use cases executed by the application program according to the preset step and the corresponding use cases executed according to the execution action instruction sent by the MirrorLink module are successfully executed.
In the embodiment of the invention, the use case execution of the application program can be executed according to the received application program authentication and the preset steps; or, the application program may execute the corresponding use case according to the received execution action instruction through the execution action instruction sent by the MirrorLink module. For example, an application may execute different use cases according to different modes.
Taking an example that the application program has two modes of day and night, and the display interface of the application program is different in different modes, specifically, when the MirrorLink module receives an external mode switching request, the plug-in addons is called to send an execution action instruction to the Common API, and the Common API sends the execution action instruction to the application program in a Ubus manner to notify the application program of executing a specific use case. The method comprises the steps that an application program executes switching of a night mode/a day mode according to an execution action instruction, a display interface of the application program is switched to the day mode or the night mode, an authentication tool can sense whether switching is successful or not, a MirrorLink module compares execution actions of use cases of the application program with execution specifications in a use case authentication tool according to the execution actions of the use cases of the application program, whether the execution actions of mode switching of the application program are correct or not is judged, if the execution actions of mode switching of the application program conform to the execution specifications in the use case authentication tool, the execution actions are accurate, and the mode switching use cases of the application program are confirmed to be executed successfully.
The embodiment of the invention provides a vehicle networking alliance CCC authentication method of an application program of an AliOS system, which is used for testing each use case of the application program; in the authentication process, the execution steps of the use cases of the application program are carried out according to rules, the execution steps of the use cases are not lost or omitted, whether the application program is executed according to a complete tool chain provided by the vehicle networking alliance CCC authentication organization can be judged according to the execution results of the use cases, and the safety and the accuracy of the authentication results in the authentication process are guaranteed. Generating a self-signed certificate for the application program which passes the execution case, and completing local authentication of the application program so as to upload the self-signed certificate to a MirrorLink authentication server for online authentication; and by generating the UUID and generating the self-signed certificate according to the UUID, the validity of the self-signed certificate is ensured.
Example two
Based on the inventive concept of the present invention, an embodiment of the present invention further provides an application program CCC authentication apparatus, which has a structure as shown in fig. 3 and includes a MirrorLink module 31, a program module 32, and a certificate generation module 33;
a MirrorLink module 31, configured to send an application authentication instruction to a program module 32;
a program module 32, configured to receive an application authentication instruction sent by the MirrorLink module 31; executing each use case of the application program according to the preset steps, and sending an execution result message of each use case to the MirrorLink module 31, so that the MirrorLink module 31 judges whether the use case is executed successfully;
and the certificate generating module 33 is configured to generate a universal unique identifier UUID when it is determined that the MirrorLink module 31 determines that all use cases of the application program are successfully executed, and generate a self-signed certificate of the application program according to the UUID.
In some optional embodiments, the above-mentioned car networking alliance CCC authentication apparatus for an application further includes a bus interface module 34, configured to receive an application authentication instruction sent by the MirrorLink module 31, and forward the received application authentication instruction to the program module 32.
In some alternative embodiments, the program module 32 is specifically configured to:
executing each use case of the application program according to the preset execution step of the use case of the application program; the execution result messages of the respective use cases of the application are sent to the MirrorLink module 31 through the bus interface module 35.
In some optional embodiments, the MirrorLink module 31 is specifically configured to:
and judging whether the use case is successfully executed or not according to the execution result message of the use case through a use case authentication tool.
In some optional embodiments, the certificate generation module 33 is specifically configured to:
generating an encryption character string according to a designated part of an application program, and generating a UUID according to the encryption character string; and generating a self-signed certificate through a certificate generation tool according to the UUID.
In some alternative embodiments, the program module 32 is further configured to:
receiving an action execution instruction sent by the MirrorLink module 31; executing a corresponding use case of the application program according to the execution action instruction, and sending an execution result message to the MirrorLink module 31; in a corresponding manner, the first and second optical fibers are,
determining that the MirrorLink module 31 judges that all use cases of the application program are executed successfully, including determining that both the use cases executed by the application program according to the preset steps and the corresponding use cases executed according to the execution action instruction sent by the MirrorLink module 31 are executed successfully.
In some alternative embodiments, the bus interface module 34 is further configured to:
and receiving the execution action command sent by the MirrorLink module 31, and forwarding the received execution action command to the program module 32.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Based on the inventive concept of the present invention, an embodiment of the present invention further provides a server, including: the device comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the method for authenticating the application program of the embodiment CCC.
Based on the inventive concept of the present invention, an embodiment of the present invention further provides a computer-readable storage medium, on which computer instructions are stored, and when the instructions are executed by a processor, the method for authenticating the car networking alliance CCC of the application program according to the first embodiment of the present invention is implemented.
Unless specifically stated otherwise, terms such as processing, computing, calculating, determining, displaying, or the like, may refer to an action and/or process of one or more processing or computing systems or similar devices that manipulates and transforms data represented as physical (e.g., electronic) quantities within the processing system's registers and memories into other data similarly represented as physical quantities within the processing system's memories, registers or other such information storage, transmission or display devices. Information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, information, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
It should be understood that the specific order or hierarchy of steps in the processes disclosed is an example of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged without departing from the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not intended to be limited to the specific order or hierarchy presented.
In the foregoing detailed description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, invention lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby expressly incorporated into the detailed description, with each claim standing on its own as a separate preferred embodiment of the invention.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. Of course, the processor and the storage medium may reside as discrete components in a user terminal.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in memory units and executed by processors. The memory unit may be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means as is known in the art.
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term "comprising" as "comprising" is interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean a "non-exclusive or".

Claims (11)

1. A method for authenticating application programs by a car networking alliance (CCC) is characterized by comprising the following steps:
receiving an application program authentication instruction sent by a screen projection protocol MirrorLink module;
executing each use case of the application program according to the preset steps, sending an execution result message of each use case to the MirrorLink module, and judging whether the use cases are executed successfully or not by the MirrorLink module;
and when the MirrorLink module is determined to judge that all the use cases of the application program are successfully executed, generating a universal unique identifier UUID, and generating an application program self-signed certificate according to the UUID.
2. The method of claim 1, wherein receiving the application authentication command sent by the screen projection protocol MirrorLink module comprises:
and receiving an application program authentication instruction sent by the MirrorLink module by calling a Common API (Common interface).
3. The method of claim 1, wherein executing each use case of the application according to the preset steps and sending an execution result message of each use case to the MirrorLink module comprises:
executing each use case of the application program according to the preset execution step of the use case of the application program;
the execution result messages of the various use cases of the application are sent to the MirrorLink module by calling the Common API.
4. The method of any one of claims 1-3, wherein the determining, by the MirrorLink module, whether the use case was executed successfully comprises:
and the MirrorLink module judges whether the use case is successfully executed or not according to the execution result message of the use case through the use case authentication tool.
5. The method of claim 1, wherein generating a Universally Unique Identifier (UUID) and generating an application self-signed certificate based on the UUID comprises:
generating an encryption character string according to a designated part of an application program, and generating a UUID according to the encryption character string;
and generating a self-signed certificate through a certificate generation tool according to the UUID.
6. The method of claim 1, further comprising:
receiving an execution action instruction sent by the MirrorLink module, executing a corresponding use case of an application program according to the instruction, and sending an execution result message to the MirrorLink module; in a corresponding manner, the first and second optical fibers are,
and determining that the MirrorLink module judges that all use cases of the application program are successfully executed, wherein the step of determining that the use cases executed by the application program according to the preset steps and the corresponding use cases executed according to the execution action instructions sent by the MirrorLink module are successfully executed.
7. The method of claim 6, wherein receiving the action-performing instruction sent by the MirrorLink module comprises:
and receiving an execution action instruction sent by the MirrorLink module by calling Common API.
8. The CCC authentication device for the Internet of vehicles alliance of the application program is characterized by comprising a MirrorLink module, a program module and a certificate generation module;
the MirrorLink module is used for sending an application program authentication instruction to the program module;
the program module is used for receiving an application program authentication instruction sent by the MirrorLink module; executing each use case of the application program according to preset steps, sending an execution result message of each use case to the MirrorLink module, and judging whether the use cases are executed successfully or not by the MirrorLink module;
and the certificate generation module is used for generating a universal unique identifier UUID when the MirrorLink module is determined to judge that all use cases of the application program are successfully executed, and generating the self-signed certificate of the application program according to the UUID.
9. The apparatus of claim 8, further comprising:
and the bus interface module is used for receiving the application program authentication instruction sent by the MirrorLink module and forwarding the received application program authentication instruction to the program module.
10. An application's Federation of Car (Internet) CCC authentication server, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method for vehicle networking alliance CCC authentication of an application as claimed in any one of claims 1 to 7 when executing the program.
11. A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the car networking alliance CCC authentication method for an application as claimed in any one of claims 1 to 7.
CN201910309047.9A 2019-04-17 2019-04-17 Internet of vehicles alliance authentication method and device for application program Pending CN111832003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910309047.9A CN111832003A (en) 2019-04-17 2019-04-17 Internet of vehicles alliance authentication method and device for application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910309047.9A CN111832003A (en) 2019-04-17 2019-04-17 Internet of vehicles alliance authentication method and device for application program

Publications (1)

Publication Number Publication Date
CN111832003A true CN111832003A (en) 2020-10-27

Family

ID=72915066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910309047.9A Pending CN111832003A (en) 2019-04-17 2019-04-17 Internet of vehicles alliance authentication method and device for application program

Country Status (1)

Country Link
CN (1) CN111832003A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717111A (en) * 2004-06-30 2006-01-04 微软公司 Secure certificate enrollment of device over a cellular network
US20130340064A1 (en) * 2012-06-15 2013-12-19 Nokia Corporation Mechanisms for Certificate Revocation Status Verification on Constrained Devices
US20140277937A1 (en) * 2013-03-15 2014-09-18 Audi Ag In-vehicle access of mobile device functions
US20160234367A1 (en) * 2015-02-08 2016-08-11 Lg Electronics Inc. Method of outputting screens from server and client devices in performing mirrorlink

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717111A (en) * 2004-06-30 2006-01-04 微软公司 Secure certificate enrollment of device over a cellular network
US20130340064A1 (en) * 2012-06-15 2013-12-19 Nokia Corporation Mechanisms for Certificate Revocation Status Verification on Constrained Devices
CN104380655A (en) * 2012-06-15 2015-02-25 诺基亚公司 Mechanisms for certificate revocation status verification on constrained devices
US20140277937A1 (en) * 2013-03-15 2014-09-18 Audi Ag In-vehicle access of mobile device functions
US20160234367A1 (en) * 2015-02-08 2016-08-11 Lg Electronics Inc. Method of outputting screens from server and client devices in performing mirrorlink

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈晓晨;寇力;杨广贺;梁然;: "车联网联盟MirrorLink认证流程介绍", 现代电信科技, no. 03, 25 March 2013 (2013-03-25) *

Similar Documents

Publication Publication Date Title
JP5864510B2 (en) Correction program checking method, correction program checking program, and information processing apparatus
CN103744686A (en) Control method and system for installing application in intelligent terminal
CN113038451B (en) Machine-card binding method and device, communication module and storage medium
CN112887282B (en) Identity authentication method, device, system and electronic equipment
CN103248495B (en) A kind of method, server, client and system applying interior paying
WO2014108993A1 (en) Authentication processing device, authentication processing system, authentication processing method and authentication processing program
CN112491776B (en) Security authentication method and related equipment
CN112734431B (en) Method and device for querying Fabric Block Link book data
CN115131022B (en) Block chain based digital asset transaction method, device, equipment and medium
CN113282310A (en) Application management method and system, vehicle-mounted device, server and readable storage medium
CN114329358A (en) Application signature method and system, transaction terminal and service platform
CN106576239B (en) Method and device for managing content in security unit
CN105471920A (en) Identifying code processing method and device
CN116707758A (en) Authentication method, equipment and server of trusted computing equipment
JP2022543891A (en) SOFTWARE PACKAGE TRANSMISSION METHOD, SOFTWARE PACKAGE TRANSMISSION VERIFICATION METHOD, NETWORK DEVICE AND STORAGE MEDIUM
CN109063461B (en) Third-party password-free login method and system
CN111832003A (en) Internet of vehicles alliance authentication method and device for application program
CN109699030B (en) Unmanned aerial vehicle authentication method, device, equipment and computer readable storage medium
CN106326723A (en) Method and device for certifying APK (Android Package) signature
CN116032546A (en) Resource access method and device and electronic equipment
CN114281065A (en) Electronic control unit flashing method and device for vehicle and diagnostic equipment
CN112565251B (en) Access authentication method, device and system for vehicle-mounted application
CN114390478A (en) Equipment authentication system, method and terminal equipment
CN115174645A (en) Automobile OTA (over the air) vehicle cloud interaction method and system
CN110784474B (en) Embedded product access authorization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination