CN113792287A - Key generation method, verification method and device for vehicle-mounted navigation system background - Google Patents

Key generation method, verification method and device for vehicle-mounted navigation system background Download PDF

Info

Publication number
CN113792287A
CN113792287A CN202111074317.6A CN202111074317A CN113792287A CN 113792287 A CN113792287 A CN 113792287A CN 202111074317 A CN202111074317 A CN 202111074317A CN 113792287 A CN113792287 A CN 113792287A
Authority
CN
China
Prior art keywords
key
information
vehicle
navigation system
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111074317.6A
Other languages
Chinese (zh)
Inventor
曹戎格
戴建
徐猛
孙静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Bdstar Navigation Automotive Electronics Co ltd
Original Assignee
Jiangsu Bdstar Navigation Automotive Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Bdstar Navigation Automotive Electronics Co ltd filed Critical Jiangsu Bdstar Navigation Automotive Electronics Co ltd
Priority to CN202111074317.6A priority Critical patent/CN113792287A/en
Publication of CN113792287A publication Critical patent/CN113792287A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Navigation (AREA)
  • Traffic Control Systems (AREA)

Abstract

The invention provides a key generation method, a key verification method and a key verification device for a vehicle-mounted navigation system background, which relate to the technical field of information security and comprise the following steps: acquiring authorization information for generating a key; wherein, the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal; generating a key file of the key based on the authorization information; importing the key file into a storage device; and burning the key stamp into the storage device to use the storage device carrying the key stamp as a background key of the vehicle-mounted navigation system. According to the method, the key manufacturing of the vehicle-mounted navigation system background can be completed by using the common storage equipment, and the vehicle-mounted navigation equipment information and the attribute information of the storage equipment are bound in the key, so that the illegal copying of the key can be effectively prevented. The user can quickly open the management background through simple storage device connection, and the rapidness, operability and safety of the operation of the management background entrance are effectively improved.

Description

Key generation method, verification method and device for vehicle-mounted navigation system background
Technical Field
The invention relates to the technical field of information security, in particular to a key generation method, a key verification method and a key verification device for a background of a vehicle navigation system.
Background
In the prior art, the background of the vehicle navigation system can be used for executing operations such as parameter setting of the vehicle navigation system, vehicle driving safety parameter management and the like, for example, radio calibration, reverse calibration and network management, parameters related to the operations play an important role in the vehicle navigation system, and meanwhile, the management of the system parameters directly influences the driving experience and driving safety of a user.
At present, most background management entry access modes provided by vehicle navigation systems are realized by a system hidden interface method, the entry management method is only locally managed, and password content is only unchanged. Under the management mode, the safety of the background management entrance cannot be reliably guaranteed, and the background management entrance is easy to crack and illegally invade.
Disclosure of Invention
The invention aims to provide a key generation method, a key verification method and a key verification device for a vehicle-mounted navigation system background, so as to improve the rapidness, operability and safety of the vehicle-mounted navigation system background entrance operation.
In a first aspect, the present invention provides a key generation method for a vehicle navigation system background, which is applied to a management terminal, and the method includes: acquiring authorization information for generating a key; wherein the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal; generating a key file of the key based on the authorization information; importing the key file into the storage device; and burning a key stamp into the storage device so as to use the storage device carrying the key stamp as a key of the background of the vehicle-mounted navigation system.
In an alternative embodiment, generating a key file for the key based on the authorization information includes: encoding the authorization information by using a preset encoding method to obtain encoded authorization information; sequencing the encoded authorization information based on a preset sequencing rule to obtain sequenced authorization information; encrypting the sequenced authorization information by using a preset encryption algorithm to obtain a target ciphertext; wherein, the target secret text contains an authorization information check code; and storing the target ciphertext into a preset file, and using the preset file in which the target ciphertext is stored as the key file.
In an alternative embodiment, burning a key stamp into the storage device includes: performing preset partition operation on the storage device, and taking a partition mark as the key mark; or writing a preset identification file into the storage device, and taking the preset identification file as the key stamp.
In an alternative embodiment, before importing the key file into the storage device, the method further comprises: and performing read-write protection processing on the key file to obtain a read-write protected key file.
In an optional embodiment, the authorization information of the key further includes: key user information, usage time information, usage number information, key creation time information, and key management level information.
In an alternative embodiment, the method further comprises: and uploading the authorization information of the key to a specified cloud server.
In a second aspect, the invention provides a key verification method for a vehicle navigation system background, which is applied to a vehicle navigation system, and the method comprises the following steps: judging whether a legal key stamp is recorded in a storage device accessed to the vehicle-mounted navigation system; if yes, acquiring a key file in the storage equipment and attribute information of the storage equipment; analyzing the key file to obtain the authorization information of the key, the authorization information check code and the attribute information of the key file; locally verifying the key based on the authorization information of the key, the authorization information verification code, the attribute information of the key file and the attribute information of the storage device to obtain a local verification result; and if the local verification result is that the local verification result passes, starting a background management page of the vehicle navigation system, and updating the use record of the key.
In an alternative embodiment, the authorization information of the key includes: the vehicle-mounted navigation equipment information matched with the key, the equipment attribute information, the use time information, the use frequency information and the key making time information of the key are obtained; the attribute information of the key file includes: creating time information; the local verification of the key is performed based on the authorization information of the key, the authorization information check code, the attribute information of the key file and the attribute information of the storage device, and comprises the following steps: performing hardware validity check based on the equipment attribute information of the key and the attribute information of the storage equipment to obtain a hardware check result; if the hardware verification result is passed, performing limited time validity verification based on the service time information and the current time information of the vehicle-mounted navigation system to obtain a limited time verification result; if the limited use verification result is passed, verifying the validity of the creation time based on the key making time information and the creation time information to obtain a creation verification result; if the created verification result is passed, performing use validity verification based on the use time information and preset limited time information to obtain a use validity verification result; if the validity check result passes, carrying out code validity check based on the authorization information check code and the vehicle navigation check code to obtain a code validity check result; the vehicle-mounted navigation check code represents a current check code calculated by the vehicle-mounted navigation system according to the authorization information; and if the code validity check result is passed, determining that the local check result is passed.
In an optional embodiment, the authorization information of the key further includes: key user information and key management level information; the attribute information of the key file further includes: modifying the time information; before a background management page of the vehicle navigation system is started, the method further comprises the following steps: uploading target information to a specified cloud server so that the specified cloud server performs validity detection on the target information; wherein the target information includes: device attribute information of the key, the key user information and modification time information of the key file; and receiving a legality detection result fed back by the appointed cloud server, and opening a background management page of the vehicle navigation system corresponding to the key management level information under the condition that the legality detection result passes.
In a third aspect, the present invention provides a key generation device for a vehicle navigation system background, which is applied to a management terminal, and the device includes: the first acquisition module is used for acquiring the authorization information for generating the key; wherein the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal; a generation module for generating a key file of the key based on the authorization information; the import module is used for importing the key file into the storage equipment; and the recording module is used for recording a key stamp into the storage device so as to use the storage device carrying the key stamp as a key of the vehicle-mounted navigation system background.
In a fourth aspect, the present invention provides a key verification device for a vehicle navigation system background, which is applied to a vehicle navigation system, and the device includes: the judging module is used for judging whether a legal key stamp is recorded in the storage equipment accessed to the vehicle-mounted navigation system; the second acquisition module acquires the key file in the storage equipment and the attribute information of the storage equipment if the key file is in the storage equipment; the analysis module is used for analyzing the key file to obtain the authorization information of the key, the authorization information check code and the attribute information of the key file; the verification module is used for locally verifying the key based on the authorization information of the key, the authorization information verification code, the attribute information of the key file and the attribute information of the storage device to obtain a local verification result; and the response module is used for opening a background management page of the vehicle navigation system and updating the use record of the key if the local verification result is that the local verification result passes.
In a fifth aspect, the present invention provides an electronic device, comprising a memory and a processor, wherein the memory stores a computer program operable on the processor, and the processor executes the computer program to implement the steps of the method according to any of the foregoing embodiments.
In a sixth aspect, the invention provides a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the method of any of the preceding embodiments.
The invention provides a key generation method of a vehicle navigation system background, which comprises the steps of firstly, acquiring authorization information for generating a key; wherein, the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal; then generating a key file of the key based on the authorization information; next, importing the key file into a storage device; and finally, recording the key stamp into the storage device so as to use the storage device carrying the key stamp as a key of the background of the vehicle-mounted navigation system. According to the method, the key manufacturing of the vehicle-mounted navigation system background can be completed by using the common storage equipment, and the vehicle-mounted navigation equipment information and the attribute information of the storage equipment are bound in the key, so that the illegal copying of the key can be effectively prevented. The user can quickly open the management background through simple storage device connection, and the rapidness, operability and safety of the operation of the management background entrance are effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a key generation method for a vehicle navigation system background according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an optional process of encoding authorization information and determining an authorization information check code according to an embodiment of the present invention;
fig. 3 is a flowchart of a key verification method for a background of a vehicle navigation system according to an embodiment of the present invention;
FIG. 4 is a communication diagram illustrating a key generation and verification process according to an embodiment of the present invention;
fig. 5 is a functional block diagram of a key generation device in a background of a car navigation system according to an embodiment of the present invention;
fig. 6 is a functional block diagram of a key verification device in a background of a car navigation system according to an embodiment of the present invention;
fig. 7 is a schematic diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
The vehicle-mounted navigation system is a special vehicle informatization product which is developed specially aiming at the special operating environment of the vehicle and the characteristics of an electric circuit, has the functions of high temperature resistance, dust resistance and shock resistance, and can be fused with an electronic circuit of the vehicle, supports the functions of internet surfing, audio-visual entertainment, satellite positioning, voice navigation, games, telephones and the like in the vehicle, and can realize the specific functions of visual backing, fault detection and the like. With the development of technologies such as vehicle-mounted electronics, intelligent driving, vehicle networking and the like, vehicle-mounted navigation systems are increasingly applied in the automobile industry. The vehicle-mounted navigation system is used as a central control device of automobile electronics, is connected with a plurality of key electronic devices of an automobile, and can realize control over various functions of an automobile body.
At present, most background management entry access modes provided by vehicle navigation systems are realized by a system hidden interface method, the entry management method is only locally managed, and password content is only unchanged. In the management mode, the opening of the background management entrance needs complex operation steps, the entrance position is easy to expose, the safety cannot be reliably guaranteed, and the entrance is easy to crack and illegally intrude. In view of the above, embodiments of the present invention provide a method for generating a key in a background of a car navigation system, so as to alleviate the technical problems mentioned above.
Example one
Fig. 1 is a flowchart of a key generation method for a vehicle navigation system background according to an embodiment of the present invention, where the method is applied to a management terminal, and as shown in fig. 1, the method specifically includes the following steps:
and step S102, acquiring the authorization information of the generated key.
Specifically, the management terminal in the embodiment of the present invention may be implemented by a PC, a smart phone, a tablet computer, and the like, and in order to improve convenience and security of the background management entry of the vehicle navigation system, the inventor thinks of a solution that the background management entry can be quickly opened by using a simple storage device connection, where the storage device may be a simple USB storage device, such as a USB disk. That is, the storage device is used as a key of the background of the car navigation system, and the background management entrance is opened immediately as long as a correct key is inserted.
When the management terminal makes a key, firstly, authorization information for generating the key is acquired, that is, the key needs to be made according to the authorization information, wherein the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal. Optionally, the acquiring of the authorization information by the management terminal may be accomplished by a user directly inputting information through an interactive interface of the management terminal, or by selecting from a preset candidate list, or by a user directly importing a file including the authorization information into the management terminal.
The vehicle-mounted navigation equipment is used as a carrier of background application of the vehicle-mounted navigation system, in order to ensure the unique corresponding relation between the key and the vehicle-mounted navigation system, when the key is manufactured, the vehicle-mounted navigation equipment information corresponding to the key is used as necessary acquisition information, and in order to prevent illegal copying of the key, attribute information of storage equipment inserted into the management terminal is required to be acquired. The attribute information of the storage device includes: device name, drive letter, supplier identification code, product identification code, serial number, manufacturer information, product information, version, etc. generally, authorization information generally selects supplier identification code, product identification code, and serial number for use.
And step S104, generating a key file of the key based on the authorization information.
After the authorization information is obtained, the management terminal needs to generate a key file of a background key of the vehicle navigation system according to the authorization information, wherein the key file is an encrypted file with a limited format and is mainly used for storing an encrypted ciphertext, and the encrypted ciphertext is generated by encrypting based on the authorization information.
And step S106, importing the key file into the storage device.
Next, the management terminal generates a key file, and then introduces the key file into the storage device so that the storage device holds the key file. In addition, a file can be optionally created in the storage device, and then the encrypted ciphertext generated based on the authorization information described above is written into the created file.
In order to further enhance the security of the key, enable the key to have uniqueness and prevent illegal copying, the key making time information can be added into the authorization information generated by the management terminal, so that after the key file is generated by the management terminal, the difference between the key file creating time information and the key making time information can be within a certain time range only by importing the key file into the storage device within the preset specified time, and after the key file is verified by the vehicle-mounted navigation device, the validity of the key file can be verified according to the time difference between the key file creating time and the key making time.
And S108, recording the key stamp into the storage device so as to use the storage device carrying the key stamp as a background key of the vehicle navigation system.
After the key file is determined to be imported into the storage device, in order to further enhance the security of the key, the management terminal records a key stamp in the storage device by a software method, so that the key stamp is used as a key feature of a background key of the vehicle-mounted navigation system, that is, the key stamp is used for representing an anti-counterfeiting mark, and the vehicle-mounted navigation system can identify whether the storage device connected with the vehicle-mounted navigation system is the background key or not by the mark. The embodiment of the invention does not specifically limit the method for recording the key stamp into the storage device, and a user can set the method according to actual requirements.
After the burning of the key stamp is completed, the storage device becomes a physical main body of the vehicle navigation system background key, that is, only the storage device containing the key file and the key stamp can become the vehicle navigation system background key.
The invention provides a key generation method of a vehicle navigation system background, which comprises the steps of firstly, acquiring authorization information for generating a key; wherein, the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal; then generating a key file of the key based on the authorization information; next, importing the key file into a storage device; and finally, recording the key stamp into the storage device so as to use the storage device carrying the key stamp as a key of the background of the vehicle-mounted navigation system. According to the method, the key manufacturing of the vehicle-mounted navigation system background can be completed by using the common storage equipment, and the vehicle-mounted navigation equipment information and the attribute information of the storage equipment are bound in the key, so that the illegal copying of the key can be effectively prevented. The user can quickly open the management background through simple storage device connection, and the rapidness, operability and safety of the operation of the management background entrance are effectively improved.
In an optional implementation manner, the step S104 of generating a key file of the key based on the authorization information specifically includes the following steps:
step S1041, encoding the authorization information by using a preset encoding method to obtain encoded authorization information.
Specifically, since the information types included in the authorization information are not uniform, after the authorization information is acquired, the management terminal needs to encode the authorization information to obtain encoded authorization information, where each encoded authorization information may be a string of numbers or a character string, that is, the encoding may be understood as a format normalization arrangement of the authorization information.
Step S1042, sorting the encoded authorization information based on a preset sorting rule to obtain sorted authorization information.
Since the authorization information includes multiple types of data, after the encoding processing, the encoded authorization information needs to be sorted, so that the encryption processing in the subsequent steps is performed in different sorting manners, and ciphertexts obtained by encryption are different, so that the sorting manner can also be used as a check condition.
And S1043, encrypting the sequenced authorization information by using a preset encryption algorithm to obtain a target ciphertext.
After the sequenced authorization information is obtained, the management terminal encrypts the authorization information by using a preset encryption algorithm to obtain a target ciphertext, wherein the preset encryption algorithm can use the existing encryption algorithm, and the embodiment of the invention does not specifically limit the encryption algorithm, and can adopt the following steps: MD5, RSA, DSA, DES, etc. After the target ciphertext is obtained, in order to prevent the key file from being illegally tampered, the target ciphertext also comprises an authorization information check code; the authorization information check code is obtained by utilizing the preset encryption algorithm to encrypt the authorization information and then calculating according to an encryption result.
And step S1044, storing the target ciphertext into a preset file, and using the preset file in which the target ciphertext is stored as a key file.
In an alternative embodiment, after obtaining the key file, before importing the key file into the storage device, the method of the present invention further includes the following steps:
step S105, performing read-write protection processing on the key file to obtain a read-write protected key file. That is, after step S105, the key file is a protection file, and the unspecified device cannot delete or modify the key file, wherein the specified device includes: the management terminal and the vehicle navigation equipment matched with the key.
In an optional implementation manner, in step S106, the key stamp is recorded into the storage device, which specifically includes the following contents:
performing preset partition operation on the storage device, and using a partition mark as a key mark; or writing a preset identification file into the storage device, and taking the preset identification file as a key stamp.
If the storage device is a usb disk, performing a predetermined partition operation on the storage device may be understood as specially dividing a storage area in the storage space of the usb disk, naming or performing other special processing on the storage area, and marking the usb disk as having the predetermined storage area, so that the partition mark may be used as a feature identifier (key stamp). Or, a preset identification file with a special mark (a special naming mode or special storage content, etc.) is preset, and then the preset identification file is written into the storage device, so that the preset identification file can also be used as a key mark. The two optional recording methods of the key stamp are provided, and a user can select other methods to realize recording of the key stamp according to actual requirements.
In an optional embodiment, the authorization information of the key further includes: key user information, usage time information, usage number information, key creation time information, and key management level information. The method of the invention also comprises the following steps: and uploading the authorization information of the key to a specified cloud server.
In order to make the use of the key controllable, the use time information and the use frequency information may be added to the authorization information of the key, and the use time and the use frequency may be checked each time the key is used, so as to prevent operations other than authorized use time and authorized use frequency.
For example, if the used time information is set to be 2020-1-2030-1, the background cannot be opened by using the key outside the above time; the using time information can be set according to the specific requirements of the user, and can also be a specified time period every day.
Assuming that the information of the number of times of use is 50 times, the vehicle-mounted navigation system updates the number of times of use each time the key is used, and if the vehicle-mounted navigation system analyzes that the number of times of use of the key reaches 50 times, the vehicle-mounted navigation system cannot authorize the key to enter the background.
Furthermore, key user information and key management level information can be added to the key authorization information, a vehicle navigation system can be provided with a plurality of keys, and different keys can be configured with different user information and management level information. The key user information represents the object of the key; the management level information of the key represents the management authority of the key, when the key is manufactured, the management terminal can set the management authority of the key according to the information of a key user or other related information, and different management levels correspond to different background management interfaces so as to prevent the lower-level key from being illegally set for the vehicle navigation system. Fig. 2 is a schematic diagram of an optional process of encoding authorization information and determining an authorization information check code according to an embodiment of the present invention.
In order to further improve the security of the system, after the management terminal generates the key, the management terminal uploads the authorization information of the key to the specified cloud server, so that the attribute information of the storage device and the key configuration information (the number of use times, the use time, the manufacture time and the like) are bound, and the key is prevented from being illegally copied. The specified cloud server is provided with a cloud database, and the cloud database realizes centralized storage and management of key information. Based on the method, the vehicle-mounted navigation system can verify the key through a method combining local verification and cloud verification, and even if one of the local or cloud is invaded or hijacked, the safety of the vehicle-mounted navigation background can be still ensured.
In summary, according to the key generation method for the vehicle navigation system background provided by the embodiment of the invention, in the key making process, the target ciphertext can be bound with the time by adding the key making time information, so that the key has uniqueness, and the illegal copying of the key can be effectively prevented; the use time information and the use frequency information are added into the authorization information, so that the operation except the authorized use time and the authorized use frequency can be effectively prevented, and the key has controllability; the attribute information of the storage device is used as the necessary information for making the key file, and the illegal copying of the key can be prevented; furthermore, a cloud verification mode is introduced on the basis of local verification, and the safety of the vehicle navigation background can be powerfully guaranteed. By using the key generated in the mode, a user can quickly open the management background through simple storage equipment connection, so that the operation rapidness, operability and safety of the management background entry are effectively improved, and the problems that the vehicle-mounted navigation background entry is easy to expose and crack are solved.
Example two
Fig. 3 is a flowchart of a key verification method for a vehicle navigation system background according to an embodiment of the present invention, where the method is applied to a vehicle navigation system, and as shown in fig. 3, the method specifically includes the following steps:
step S202, judging whether a legal key stamp is recorded in a storage device accessed to the vehicle-mounted navigation system.
Specifically, the vehicle-mounted navigation system in the embodiment of the present invention sets an application carrier for a factory, and may be implemented by a vehicle-mounted computer based on an Android system or a Linux system, which is commonly used in the prior art, or by a vehicle-mounted computer based on a WinCE system, a ucos ii system, or a ucos iii system.
After the vehicle-mounted navigation system detects that the storage device is accessed, a detection program for the storage device is automatically started, whether the connection is normal or not is judged, and key feature retrieval is carried out on the storage device under the condition that the connection is determined to be normal. Firstly, whether a legal key stamp is recorded in the accessed storage equipment is judged. In the first embodiment, the possible existence form of the key stamp has been described, so that in the determining step, only one corresponding search needs to be performed according to the possible occurrence form of the key stamp, and if the key stamp is only one of the partition mark and the preset identification file, only one search needs to be performed on the partition mark and the preset identification file in sequence in the search process. If the vehicle-mounted navigation system can acquire the legal key stamp in the storage device, the storage device can be preliminarily determined as the background key of the vehicle-mounted navigation system.
If yes, go to step S204; if not, determining that the storage equipment is not a key of the background of the vehicle-mounted navigation system, and processing the storage equipment according to the common external storage equipment.
Step S204, acquiring the key file in the storage device and the attribute information of the storage device.
After the vehicle navigation system acquires the legal key stamp, the key file and attribute information (hardware characteristics, such as supplier identification code, product identification code, serial number, and the like) of the storage device are further acquired from the storage device, so that the validity of the key can be detected in the subsequent steps. The key file may be obtained by searching for a file having a predetermined rule name or a file having a designated name from the storage device. And if the vehicle-mounted navigation system cannot acquire the key file from the storage equipment, processing the storage equipment according to the common external storage equipment.
And step S206, analyzing the key file to obtain the authorization information of the key, the authorization information check code and the attribute information of the key file.
In the embodiment of the present invention, the parsing of the key file includes parsing the attribute of the key file itself, parsing the attribute of the key file to obtain the attribute information of the key file, where the parsing includes: the creation time information, the modification time information, the name of the key file and the like of the key file; the analyzing of the target ciphertext means that the decryption algorithm corresponding to the preset encryption algorithm in the first embodiment is used to decrypt the target ciphertext to obtain the authorization information check code generated during encryption and the authorization information of the key.
And S208, locally verifying the key based on the authorization information of the key, the authorization information verification code, the attribute information of the key file and the attribute information of the storage device to obtain a local verification result.
If the local verification result is passed, the following step S210 is executed; otherwise, confirming that the verification fails and prompting key error information.
And step S210, starting a background management page of the vehicle navigation system, and updating the use record of the key.
When local verification is carried out, the vehicle-mounted navigation system firstly determines the matching of the key model according to the vehicle-mounted navigation equipment information which is analyzed to be matched with the key, and then judges the hardware effectiveness of the storage equipment according to the equipment attribute information of the key (namely, the attribute information of the storage equipment which is inserted into the management terminal and is included in the authorization information) and the attribute information of the storage equipment which is currently accessed into the vehicle-mounted navigation system; the authorization information check code is used for judging whether the key file is illegally tampered, specifically, after the key file is decrypted by the vehicle-mounted navigation system, encryption calculation is carried out by using the authorization information obtained by decryption again to obtain a new check code, and a conclusion can be obtained by comparing the two check codes; the verification of the attribute information of the key file may be simply set to discriminate the authenticity of the key file based on the document name.
If the verification is passed, the storage device is considered to be a legal key, the vehicle-mounted navigation system immediately starts a background management page of the vehicle-mounted navigation system, meanwhile, the use record is updated to a key file, the use record updating includes but is not limited to adding one to the use times of the key, and after the update, the vehicle-mounted navigation system updates the use record of the key file to a specified cloud server.
By using the method provided by the embodiment of the invention, after the storage device is inserted into the vehicle-mounted navigation device, the vehicle-mounted navigation system can reduce the complexity of background entry operation through the processing flow of automatic detection, judgment, analysis and local verification, so that the background operation is simpler and faster, and the operability of background key verification is improved.
In an alternative embodiment, the authorization information of the key comprises: the vehicle-mounted navigation equipment information matched with the key, the equipment attribute information of the key, the use time information, the use frequency information and the key making time information; the attribute information of the key file includes: time information is created.
In the step S208, the local verification is performed on the key based on the authorization information of the key, the authorization information check code, the attribute information of the key file, and the attribute information of the storage device, which specifically includes the following contents:
and carrying out hardware validity check based on the equipment attribute information of the key and the attribute information of the storage equipment to obtain a hardware check result. The hardware checking result comprises one of the following: by not passing, the results of the multiple checks in the following steps are also provided with the above two possibilities, which will not be described again. And only when the device attribute information of the key is completely consistent with the attribute information of the storage device, the hardware verification result can be determined to be passed. And if the hardware verification result is that the key fails to pass, determining that the key verification fails and prompting key error information.
And if the hardware verification result is passed, performing the validity verification of the limited time based on the use time information and the current time information of the vehicle-mounted navigation system to obtain a limited time verification result. The above has explained the usage method of the usage time information, and if it is determined that the current time information is within the authorized usage time, it is determined that the usage limit verification result is passed; otherwise, the key verification is determined to be failed, and the key error information is prompted.
And if the limited use verification result is passed, performing creation time validity verification based on the key making time information and the creation time information to obtain a creation verification result. In the first embodiment, a method for verifying a key file according to key making time information and key file creation time information has been introduced, that is, validity of the key file is verified according to a time difference between the key making time information and the key file creation time information, and only when the time difference meets a preset requirement, it can be determined that a verification result is passed; otherwise, the key verification is determined to be failed, and the key error information is prompted.
And if the created verification result is passed, performing use validity verification based on the use time information and the preset limited time information to obtain a use validity verification result. The method for checking the number of times of use has been explained in the first embodiment, and is not described herein again. If the number of times of using the key does not reach the limit value, the verification is passed; otherwise, the verification is determined to be not passed, the key verification fails, and the key error information is prompted.
If the validity check result is passed, carrying out code validity check based on the authorization information check code and the vehicle navigation check code to obtain a code validity check result; and the vehicle navigation check code represents a current check code calculated by the vehicle navigation system according to the authorization information.
And if the code validity check result is passed, determining that the local check result is passed.
The code validity check shows that the decrypted authorization information check code is compared with the consistency of the current check code obtained by the vehicle navigation system through encryption calculation according to the analyzed authorization information, and if the two are consistent, the check is determined to be passed; otherwise, the key verification is determined to be failed, and the key error information is prompted. The sequence of the plurality of checks may be adjusted according to actual requirements, and the embodiment of the present invention is not specifically limited thereto.
On the premise that the management terminal uploads the authorization information of the key to the designated cloud server, in order to improve the security of key verification, a step of cloud validity detection can be added on the basis that local verification passes, that is, only under the condition that local verification passes and cloud verification passes, a step of starting a background management page of the vehicle navigation system is executed.
Specifically, the authorization information of the key further includes: key user information and key management level information; the attribute information of the key file further includes: the time information is modified.
Before starting a background management page of the vehicle navigation system, the method also comprises the following steps:
step 2091, uploading the target information to a designated cloud server, so that the designated cloud server performs validity detection on the target information; wherein the target information includes: device attribute information of the key, key user information and modification time information of the key file;
step S2092, receiving a validity detection result fed back by the designated cloud server, and opening a background management page of the vehicle navigation system corresponding to the key management level information if the validity detection result is passed.
Specifically, when the designated cloud server performs validity detection on the key, the validity detection specifically includes use history detection and user validity detection, the use history detection is to compare the key use record stored in the cloud with the modification time of the key file received by the cloud according to the device attribute information of the key, detect whether an out-of-record use condition exists, that is, judge whether an illegal use record exists, and if so, the validity detection does not pass.
The user legality detection is mainly used for detecting whether the authorized user of the key reports that the key is lost or the key use right is cancelled, and the like, so that the illegal operation caused by the key loss or the user being cancelled is prevented.
If the usage history detection and the user validity detection both pass, the cloud server is appointed to determine that the validity detection result passes, and the detection result is issued to the vehicle navigation system, so that the vehicle navigation system starts a background management page of the vehicle navigation system corresponding to the key management level information; and if the cloud validity detection fails, prompting verification error information. For ease of understanding, fig. 4 is a communication diagram of a key generation and verification process according to an embodiment of the present invention.
According to the key verification method for the vehicle-mounted navigation system background, provided by the embodiment of the invention, the time-consuming and complex verification process is realized locally, the simple verification process is completed at the cloud, the transmission quantity of network data is effectively reduced, the requirement of the method on the network quality is reduced, the key identification can be still rapidly and efficiently completed in a complex network environment, and the reliability and operability of key verification are improved.
EXAMPLE III
The embodiment of the invention also provides a key generation device of the vehicle-mounted navigation system background, which is applied to the management terminal, is mainly used for executing the key generation method of the vehicle-mounted navigation system background provided by the first embodiment of the invention, and the key generation device of the vehicle-mounted navigation system background provided by the embodiment of the invention is specifically introduced below.
Fig. 5 is a functional block diagram of a key generation device in a vehicle navigation system background according to an embodiment of the present invention, and as shown in fig. 5, the key generation device mainly includes: the first obtaining module 100, the generating module 200, the importing module 300, and the recording module 400, wherein:
a first obtaining module 100, configured to obtain authorization information for generating a key; wherein, the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal.
A generating module 200 for generating a key file of the key based on the authorization information.
An import module 300 for importing the key file into the storage device.
The recording module 400 is configured to record a key stamp into the storage device, so that the storage device carrying the key stamp is used as a background key of the vehicle navigation system.
The embodiment of the invention provides a key generation device of a vehicle-mounted navigation system background, which can be used for manufacturing keys of the vehicle-mounted navigation system background by utilizing common storage equipment, and the keys are bound with vehicle-mounted navigation equipment information and attribute information of the storage equipment, so that the keys can be effectively prevented from being illegally copied. The user can quickly open the management background through simple storage device connection, and the rapidness, operability and safety of the operation of the management background entrance are effectively improved.
Optionally, the generating module 200 is specifically configured to:
and coding the authorization information by using a preset coding method to obtain the coded authorization information.
And sequencing the encoded authorization information based on a preset sequencing rule to obtain the sequenced authorization information.
Encrypting the sequenced authorization information by using a preset encryption algorithm to obtain a target ciphertext; wherein, the target secret text contains an authorization information check code.
And storing the target ciphertext into a preset file, and using the preset file in which the target ciphertext is stored as a key file.
Optionally, the recording module 400 is specifically configured to:
performing preset partition operation on the storage device, and using a partition mark as a key mark; or writing a preset identification file into the storage device, and taking the preset identification file as a key stamp.
Optionally, the apparatus further comprises:
and the read-write protection module is used for performing read-write protection processing on the key file to obtain the read-write protected key file.
Optionally, the authorization information of the key further includes: key user information, usage time information, usage number information, key creation time information, and key management level information.
Optionally, the apparatus further comprises:
the first uploading module is used for uploading the authorization information of the key to the appointed cloud server.
Example four
The embodiment of the invention also provides a key verification device of the vehicle-mounted navigation system background, which is applied to the vehicle-mounted navigation system and is mainly used for executing the key verification method of the vehicle-mounted navigation system background provided by the second embodiment.
Fig. 6 is a functional block diagram of a key verification device in a vehicle navigation system background according to an embodiment of the present invention, and as shown in fig. 6, the key verification device mainly includes: the determining module 500, the second obtaining module 600, the parsing module 700, the verifying module 800, and the responding module 900, wherein:
the determining module 500 is configured to determine whether a legal key stamp is recorded in a storage device accessed to the car navigation system.
If yes, the second obtaining module 600 obtains the key file in the storage device and the attribute information of the storage device.
The parsing module 700 is configured to parse the key file to obtain the authorization information of the key, the authorization information check code, and the attribute information of the key file.
The verification module 800 is configured to perform local verification on the key based on the authorization information of the key, the authorization information verification code, the attribute information of the key file, and the attribute information of the storage device, so as to obtain a local verification result.
If the local verification result is that the local verification result is passed, the response module 900 starts a background management page of the vehicle navigation system, and updates the use record of the key.
Optionally, the authorization information of the key includes: the vehicle-mounted navigation equipment information matched with the key, the equipment attribute information of the key, the use time information, the use frequency information and the key making time information; the attribute information of the key file includes: time information is created.
The verification module 800 is specifically configured to:
and carrying out hardware validity check based on the equipment attribute information of the key and the attribute information of the storage equipment to obtain a hardware check result.
And if the hardware verification result is passed, performing the validity verification of the limited time based on the use time information and the current time information of the vehicle-mounted navigation system to obtain a limited time verification result.
And if the limited use verification result is passed, performing creation time validity verification based on the key making time information and the creation time information to obtain a creation verification result.
And if the created verification result is passed, performing use validity verification based on the use time information and the preset limited time information to obtain a use validity verification result.
If the validity check result is passed, carrying out code validity check based on the authorization information check code and the vehicle navigation check code to obtain a code validity check result; and the vehicle navigation check code represents a current check code calculated by the vehicle navigation system according to the authorization information.
And if the code validity check result is passed, determining that the local check result is passed.
Optionally, the authorization information of the key further includes: key user information and key management level information; the attribute information of the key file further includes: the time information is modified.
The device also includes:
the second uploading module is used for uploading the target information to the specified cloud server so that the specified cloud server can carry out validity detection on the target information; wherein the target information includes: device attribute information of the key, key user information and modification time information of the key file.
And the receiving module is used for receiving the legality detection result fed back by the appointed cloud server and opening a background management page of the vehicle navigation system corresponding to the key management level information under the condition that the legality detection result passes.
EXAMPLE five
Referring to fig. 7, an embodiment of the present invention provides an electronic device, including: a processor 60, a memory 61, a bus 62 and a communication interface 63, wherein the processor 60, the communication interface 63 and the memory 61 are connected through the bus 62; the processor 60 is arranged to execute executable modules, such as computer programs, stored in the memory 61.
The Memory 61 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 63 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used.
The bus 62 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 7, but this does not indicate only one bus or one type of bus.
The memory 61 is used for storing a program, the processor 60 executes the program after receiving an execution instruction, and the method executed by the apparatus defined by the flow process disclosed in any of the foregoing embodiments of the present invention may be applied to the processor 60, or implemented by the processor 60.
The processor 60 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 60. The Processor 60 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 61, and the processor 60 reads the information in the memory 61 and, in combination with its hardware, performs the steps of the above method.
The computer program product of the key generation method, the key verification method and the key verification device for the vehicle-mounted navigation system background provided by the embodiment of the invention comprises a computer readable storage medium storing a nonvolatile program code executable by a processor, wherein instructions included in the program code can be used for executing the method described in the foregoing method embodiment, and specific implementation can refer to the method embodiment, and is not described herein again.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings or the orientations or positional relationships that the products of the present invention are conventionally placed in use, and are only used for convenience in describing the present invention and simplifying the description, but do not indicate or imply that the devices or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
Furthermore, the terms "horizontal", "vertical", "overhang" and the like do not imply that the components are required to be absolutely horizontal or overhang, but may be slightly inclined. For example, "horizontal" merely means that the direction is more horizontal than "vertical" and does not mean that the structure must be perfectly horizontal, but may be slightly inclined.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (13)

1. A key generation method of a vehicle navigation system background is characterized by being applied to a management terminal, and comprises the following steps:
acquiring authorization information for generating a key; wherein the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal;
generating a key file of the key based on the authorization information;
importing the key file into the storage device;
and burning a key stamp into the storage device so as to use the storage device carrying the key stamp as a key of the background of the vehicle-mounted navigation system.
2. The method of claim 1, wherein generating a key file for the key based on the authorization information comprises:
encoding the authorization information by using a preset encoding method to obtain encoded authorization information;
sequencing the encoded authorization information based on a preset sequencing rule to obtain sequenced authorization information;
encrypting the sequenced authorization information by using a preset encryption algorithm to obtain a target ciphertext; wherein, the target secret text contains an authorization information check code;
and storing the target ciphertext into a preset file, and using the preset file in which the target ciphertext is stored as the key file.
3. The method of claim 1, wherein recording a key stamp into the storage device comprises:
performing preset partition operation on the storage device, and taking a partition mark as the key mark; or writing a preset identification file into the storage device, and taking the preset identification file as the key stamp.
4. The method of claim 1, wherein prior to importing the key file into the storage device, the method further comprises:
and performing read-write protection processing on the key file to obtain a read-write protected key file.
5. The method of claim 1, wherein the key authorization information further comprises: key user information, usage time information, usage number information, key creation time information, and key management level information.
6. The method of claim 1, further comprising:
and uploading the authorization information of the key to a specified cloud server.
7. A key verification method of a vehicle navigation system background is characterized by being applied to a vehicle navigation system, and comprises the following steps:
judging whether a legal key stamp is recorded in a storage device accessed to the vehicle-mounted navigation system;
if yes, acquiring a key file in the storage equipment and attribute information of the storage equipment;
analyzing the key file to obtain the authorization information of the key, the authorization information check code and the attribute information of the key file;
locally verifying the key based on the authorization information of the key, the authorization information verification code, the attribute information of the key file and the attribute information of the storage device to obtain a local verification result;
and if the local verification result is that the local verification result passes, starting a background management page of the vehicle navigation system, and updating the use record of the key.
8. The method of claim 7, wherein the authorization information for the key comprises: the vehicle-mounted navigation equipment information matched with the key, the equipment attribute information, the use time information, the use frequency information and the key making time information of the key are obtained; the attribute information of the key file includes: creating time information;
the local verification of the key is performed based on the authorization information of the key, the authorization information check code, the attribute information of the key file and the attribute information of the storage device, and comprises the following steps:
performing hardware validity check based on the equipment attribute information of the key and the attribute information of the storage equipment to obtain a hardware check result;
if the hardware verification result is passed, performing limited time validity verification based on the service time information and the current time information of the vehicle-mounted navigation system to obtain a limited time verification result;
if the limited use verification result is passed, verifying the validity of the creation time based on the key making time information and the creation time information to obtain a creation verification result;
if the created verification result is passed, performing use validity verification based on the use time information and preset limited time information to obtain a use validity verification result;
if the validity check result passes, carrying out code validity check based on the authorization information check code and the vehicle navigation check code to obtain a code validity check result; the vehicle-mounted navigation check code represents a current check code calculated by the vehicle-mounted navigation system according to the authorization information;
and if the code validity check result is passed, determining that the local check result is passed.
9. The method of claim 7, wherein the key authorization information further comprises: key user information and key management level information; the attribute information of the key file further includes: modifying the time information;
before a background management page of the vehicle navigation system is started, the method further comprises the following steps:
uploading target information to a specified cloud server so that the specified cloud server performs validity detection on the target information; wherein the target information includes: device attribute information of the key, the key user information and modification time information of the key file;
and receiving a legality detection result fed back by the appointed cloud server, and opening a background management page of the vehicle navigation system corresponding to the key management level information under the condition that the legality detection result passes.
10. A key generation device of a vehicle-mounted navigation system background is characterized by being applied to a management terminal, and the device comprises:
the first acquisition module is used for acquiring the authorization information for generating the key; wherein the authorization information includes: the vehicle-mounted navigation equipment information matched with the key and the attribute information of the storage equipment inserted into the management terminal;
a generation module for generating a key file of the key based on the authorization information;
the import module is used for importing the key file into the storage equipment;
and the recording module is used for recording a key stamp into the storage device so as to use the storage device carrying the key stamp as a key of the vehicle-mounted navigation system background.
11. The key verification device at the background of the vehicle-mounted navigation system is characterized by being applied to the vehicle-mounted navigation system and comprising:
the judging module is used for judging whether a legal key stamp is recorded in the storage equipment accessed to the vehicle-mounted navigation system;
the second acquisition module acquires the key file in the storage equipment and the attribute information of the storage equipment if the key file is in the storage equipment;
the analysis module is used for analyzing the key file to obtain the authorization information of the key, the authorization information check code and the attribute information of the key file;
the verification module is used for locally verifying the key based on the authorization information of the key, the authorization information verification code, the attribute information of the key file and the attribute information of the storage device to obtain a local verification result;
and the response module is used for opening a background management page of the vehicle navigation system and updating the use record of the key if the local verification result is that the local verification result passes.
12. An electronic device comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor implements the steps of the method of any of claims 1 to 9 when executing the computer program.
13. A computer-readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the method of any of claims 1 to 9.
CN202111074317.6A 2021-09-14 2021-09-14 Key generation method, verification method and device for vehicle-mounted navigation system background Pending CN113792287A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111074317.6A CN113792287A (en) 2021-09-14 2021-09-14 Key generation method, verification method and device for vehicle-mounted navigation system background

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111074317.6A CN113792287A (en) 2021-09-14 2021-09-14 Key generation method, verification method and device for vehicle-mounted navigation system background

Publications (1)

Publication Number Publication Date
CN113792287A true CN113792287A (en) 2021-12-14

Family

ID=78880154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111074317.6A Pending CN113792287A (en) 2021-09-14 2021-09-14 Key generation method, verification method and device for vehicle-mounted navigation system background

Country Status (1)

Country Link
CN (1) CN113792287A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127111A (en) * 2006-08-18 2008-02-20 中信银行 Internet bank U disc KEY ciphering, authentication device and method
US20100185843A1 (en) * 2009-01-20 2010-07-22 Microsoft Corporation Hardware encrypting storage device with physically separable key storage device
CN102029972A (en) * 2010-08-24 2011-04-27 吉林大学 Method, system and equipment for implementing driver identity authentication of motor vehicle
CN203515016U (en) * 2013-08-24 2014-04-02 惠州市诺盾汽车用品有限公司 Emergency device applied to vehicle-mounted password safe box
US20150295920A1 (en) * 2014-04-09 2015-10-15 De Sonneville International Ltd. Self-authenticating chips
WO2018040642A1 (en) * 2016-08-31 2018-03-08 长城汽车股份有限公司 Method and device for controlling vehicle to connect to mobile terminal, and vehicle
CN108206996A (en) * 2017-12-08 2018-06-26 中兴通讯股份有限公司 Auth method and device
CN108416193A (en) * 2018-03-14 2018-08-17 北京车和家信息技术有限公司 Method for authenticating, device and vehicle
WO2019114659A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Vehicle authorization management method and system
CN112230858A (en) * 2020-10-22 2021-01-15 北斗星通智联科技有限责任公司 Universal unique identification code writing method and system for navigator
CN112468294A (en) * 2020-11-23 2021-03-09 北京经纬恒润科技股份有限公司 Access method and authentication equipment for vehicle-mounted TBOX

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127111A (en) * 2006-08-18 2008-02-20 中信银行 Internet bank U disc KEY ciphering, authentication device and method
US20100185843A1 (en) * 2009-01-20 2010-07-22 Microsoft Corporation Hardware encrypting storage device with physically separable key storage device
CN102029972A (en) * 2010-08-24 2011-04-27 吉林大学 Method, system and equipment for implementing driver identity authentication of motor vehicle
CN203515016U (en) * 2013-08-24 2014-04-02 惠州市诺盾汽车用品有限公司 Emergency device applied to vehicle-mounted password safe box
US20150295920A1 (en) * 2014-04-09 2015-10-15 De Sonneville International Ltd. Self-authenticating chips
WO2018040642A1 (en) * 2016-08-31 2018-03-08 长城汽车股份有限公司 Method and device for controlling vehicle to connect to mobile terminal, and vehicle
CN108206996A (en) * 2017-12-08 2018-06-26 中兴通讯股份有限公司 Auth method and device
WO2019114659A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Vehicle authorization management method and system
CN108416193A (en) * 2018-03-14 2018-08-17 北京车和家信息技术有限公司 Method for authenticating, device and vehicle
CN112230858A (en) * 2020-10-22 2021-01-15 北斗星通智联科技有限责任公司 Universal unique identification code writing method and system for navigator
CN112468294A (en) * 2020-11-23 2021-03-09 北京经纬恒润科技股份有限公司 Access method and authentication equipment for vehicle-mounted TBOX

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王祥楚;: "嵌入式系统在车载电子中的应用", 中国新技术新产品, no. 10, 25 May 2017 (2017-05-25) *

Similar Documents

Publication Publication Date Title
US10397212B2 (en) Information device, data processing system, data processing method, and non-transitory storage medium for executing content upon authentication
CN110493197B (en) Login processing method and related equipment
US9055427B2 (en) Updating configuration parameters in a mobile terminal
CN106571951B (en) Audit log obtaining method, system and device
CN108183924A (en) A kind of login validation method and terminal device
US20080250403A1 (en) Method and apparatus for generating firmware update file and updating firmware by using the firmware update file
US20120272052A1 (en) Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer
CN104320375B (en) A kind of method and apparatus for preventing from illegally registering
CN106302379A (en) The authentication method of vehicle mounted electrical apparatus, system and its apparatus
CN106293691A (en) Automatic discovery and installation of secure boot credentials
US7353386B2 (en) Method and device for authenticating digital data by means of an authentication extension module
CN111538517A (en) Server firmware upgrading method and system, electronic equipment and storage medium
EP2947611A1 (en) Apparatus, method for controlling apparatus, and program
CN110011794B (en) Cipher machine key attribute testing method
CN114553444A (en) Identity authentication method, identity authentication device and storage medium
CN111476014A (en) Verification method and related device
CN113792287A (en) Key generation method, verification method and device for vehicle-mounted navigation system background
CN112347458A (en) Password resetting method and device, terminal equipment and server
CN115708340A (en) Data verification method, device and storage medium
CN111984961B (en) Password resetting system, method, device, equipment and storage medium
CN113868628A (en) Signature verification method and device, computer equipment and storage medium
CN111859364A (en) Authority authentication method, device, equipment and storage medium
KR20210069496A (en) Method for preventing mileage tampering of car and mileage recording device using the same
CN111079155A (en) Data processing method and device, electronic equipment and computer storage medium
CN111414611B (en) Chip verification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination