CN115088232A - Data encryption method, data transmission method, related device and equipment - Google Patents

Data encryption method, data transmission method, related device and equipment Download PDF

Info

Publication number
CN115088232A
CN115088232A CN202180000112.5A CN202180000112A CN115088232A CN 115088232 A CN115088232 A CN 115088232A CN 202180000112 A CN202180000112 A CN 202180000112A CN 115088232 A CN115088232 A CN 115088232A
Authority
CN
China
Prior art keywords
data transmission
data
vehicle service
transmission node
service data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202180000112.5A
Other languages
Chinese (zh)
Inventor
耿峰
李江琪
李民
李�泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN115088232A publication Critical patent/CN115088232A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Abstract

The application provides a data encryption method, a data transmission method, a related device and equipment, which are suitable for the technical field of communication, and are used for encrypting data transmitted among a plurality of nodes and improving the security of data transmission among the nodes. The method comprises the steps of firstly obtaining vehicle service data of a target vehicle and N data transmission nodes for transmitting the vehicle service data, then encrypting the N-N encrypted vehicle service data by using a data transmission key of an nth data transmission node to obtain N-N +1 encrypted vehicle service data, wherein the nth data transmission node is the nth data transmission node in the transmission sequence of the N data transmission nodes, the 0 th encrypted vehicle service data is the vehicle service data, encrypting the N-1 encrypted vehicle service data by using the data transmission key of the 1 st data transmission node to obtain the N encrypted vehicle service data, and transmitting the N encrypted vehicle service data to the 1 st data transmission node, wherein N is more than or equal to 2, and N is more than or equal to 1.

Description

Data encryption method, data transmission method, related device and equipment
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a data encryption method, a data transmission method, a related device and equipment.
Background
In recent years, Information and Communication Technology (ICT) has been developed at a high speed, and the scale of personal data flow has therefore reached a completely new height. Such a development situation makes it easier for an individual to ignore the infringement of data transmission that may be caused by using a system and product services, and makes it more difficult for an enterprise or organization to assess and manage the impact and potential risk consequences on the individual and the society due to the development of internet information technology. Second, conventional automobiles lack data protection control systems due to lack of networking capability and less association with personal data. In addition, due to the communication architecture, the existing data protection control systems in the conventional terminal and computer industries cannot be directly applied to automobiles. With the development of smart vehicles, the number of service scenes in which data needs to be uploaded from the inside of a vehicle to the cloud is increasing, and therefore a systematic method for controlling vehicle data is urgently needed in the industry at present.
At present, a category tag is added to vehicle service data of a user for identifying the category of the vehicle service data, then a program for processing the vehicle service data is run on an Electronic Control Unit (ECU), after the program processes relevant data, the tag carried in a data packet is detected at a data outlet, and the type of the vehicle service data sent by the program is judged.
However, since the ECU is required to determine only the data type of the vehicle service data, and there is usually data transmission across multiple nodes in the intelligent vehicle architecture, a method for controlling the vehicle service data to perform data transmission among multiple nodes is urgently needed.
Disclosure of Invention
The embodiment of the application provides a data encryption method, a data transmission method, a related device and equipment, which are used for encrypting data transmitted among a plurality of nodes and improving the security of data transmission among the nodes.
In a first aspect, the present application provides a method for data encryption, and the method is applied to a target vehicle, in the method, vehicle service data of the target vehicle is obtained first, then N data transmission nodes for transmitting the vehicle service data are obtained, and then the N-N encrypted vehicle service data is encrypted by using a data transmission key of an nth data transmission node to obtain N-N +1 encrypted vehicle service data, the nth data transmission node is an nth data transmission node in a transmission order among the N data transmission nodes, the transmission order is an order in which the N data transmission nodes transmit the vehicle service data, the 0 th encrypted vehicle service data is the vehicle service data, and the N-1 encrypted vehicle service data is encrypted by using the data transmission key of the 1 st data transmission node to obtain the N encrypted vehicle service data, and sending the Nth encrypted vehicle service data to the 1 st data transmission node, wherein N is more than or equal to 2, and N is more than or equal to 1. It should be understood that the data transmission key described in the present application may be symmetric or asymmetric, and is not limited herein.
In the embodiment, the data transmitted among the plurality of data transmission nodes are sequentially encrypted, each encryption uses a data transmission key corresponding to the data transmission node, and each encryption is performed on the result obtained by the previous encryption, so that the safety of the vehicle service data is improved, and the safety of the data transmission of the vehicle service data among the plurality of data transmission nodes is improved.
In one possible implementation, the nth-nth encrypted vehicle service data and the communication certificate of the nth data transmission node need to be encrypted by using the data transmission key of the nth data transmission node to obtain the nth-N +1 encrypted vehicle service data, wherein the communication certificate of the nth data transmission node indicates the transmission condition of the nth-nth encrypted vehicle service data at the nth data transmission node.
In the embodiment, the communication certificate of the data transmission node is also required to be encrypted, since the communication certificate of the nth data transmission node indicates the transmission condition of the N-nth encrypted vehicle service data at the nth data transmission node, and the vehicle service data is transmitted only when the transmission condition of the vehicle service data at the data transmission node is met, the condition for data transmission among the plurality of data transmission nodes is controlled according to the communication certificate, so that the safety of data transmission among the plurality of nodes of the vehicle service data is improved.
In one possible embodiment, when N is equal to N, the nth data transmission node is a vehicle exterior transmission node and the 1 st data transmission node is a vehicle interior transmission node.
In the embodiment, data encryption for transmission between the vehicle internal transmission node and the vehicle external transmission node is realized, and vehicle service data transmitted to the vehicle external transmission node is ensured to be encrypted, so that the safety of data transmission of the vehicle service data between the interior of the target vehicle and the exterior of the target vehicle is improved.
In a second aspect, the present application provides a data transmission method, and the method is applied to a data transmission node, in the method, first, the data transmission node receives encrypted vehicle service data, and then obtains decrypted encrypted vehicle service data, where the decrypted encrypted vehicle service data is obtained by decrypting the encrypted vehicle service data using a data transmission key of the data transmission node, and the decrypted encrypted vehicle service data is obtained by encrypting using a data transmission key of a next data transmission node, or the decrypted encrypted vehicle service data is vehicle service data.
In this embodiment, the received encrypted vehicle service data is obtained by sequentially encrypting data transmitted between the plurality of data transmission nodes, so that the security of the encrypted vehicle service data is high, and the security of data transmission is improved. Secondly, the decrypted encrypted vehicle service data can be vehicle service data providing services and can also be data needing further decryption, so that at the next data transmission node, the decrypted encrypted vehicle service data needs to be decrypted by using a data transmission key of the next data transmission node, and the safety of data transmission is further improved.
In one possible implementation, the decrypted encrypted vehicle service data and the communication certificate of the data transmission node are obtained by decrypting the encrypted vehicle service data by using the data transmission key of the data transmission node, and the communication certificate of the data transmission node indicates the transmission condition of the decrypted encrypted vehicle service data at the data transmission node. When the transmission condition of the decrypted encrypted vehicle service data at the data transmission node is met, the data transmission node sends the decrypted encrypted vehicle service data to the next data transmission node.
In this embodiment, when the transmission condition of the decrypted encrypted vehicle service data at the data transmission node is satisfied, the decrypted encrypted vehicle service data is sent to the next data transmission node, and the condition for data transmission between the data transmission nodes is controlled according to the communication certificate, so that the security of data transmission is improved.
In a possible embodiment, when the data transmission node is a high-computation-power node, that is, the data transmission node has the decryption capability required by the technical solution provided by the present application, the data transmission node needs to receive the data transmission key of the data transmission node, and decrypt the encrypted vehicle service data using the data transmission key of the data transmission node, so as to obtain the decrypted encrypted vehicle service data and the communication credential of the data transmission node.
In this embodiment, the data transmission node decrypts the encrypted vehicle service data using the data transmission key of the data transmission node, so that the decryption process can be directly performed at the data transmission node, thereby improving the efficiency of the decryption process and the efficiency of data transmission.
In a possible implementation manner, when the data transmission node is a low-computation-power node, that is, the data transmission node does not have the decryption capability required by the technical solution provided by the present application, the data transmission node needs to send the encrypted vehicle service data to the decryption module, the decryption module decrypts the encrypted vehicle service data by using the data transmission key of the data transmission node to obtain the decrypted encrypted vehicle service data and the communication credential of the data transmission node, and then the data transmission node receives the decrypted encrypted vehicle service data and the communication credential of the data transmission node sent by the decryption module.
In this embodiment, the data transmission node does not perform decryption operation, and the encrypted vehicle service data is sent to the decryption module, so that the decryption process is performed at the decryption module, and the decrypted encrypted vehicle service data sent by the decryption module and the communication certificate of the data transmission node are received to obtain the Europe on the decryption result, thereby improving the feasibility of the scheme.
In a third aspect, a data encryption device is provided, the data encryption device being applied to a target vehicle. The data encryption device has some or all of the functions of any one of the possible implementations of the first aspect and the first aspect. For example, the function of the data encryption device may be a function that separately implements any of the embodiments in the present application. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more units or modules corresponding to the above functions.
In one embodiment, the data encryption apparatus includes:
the acquisition module is used for acquiring vehicle service data of the target vehicle;
the acquisition module is also used for acquiring N data transmission nodes for transmitting vehicle service data, wherein N is more than or equal to 2;
the encryption module is used for encrypting the N-nth encrypted vehicle service data by using a data transmission key of an nth data transmission node to obtain the N-nth +1 encrypted vehicle service data, wherein N is more than or equal to N and is more than or equal to 1, the nth data transmission node is the nth data transmission node in the transmission sequence of the N data transmission nodes, the transmission sequence is the sequence of the N data transmission nodes for transmitting the vehicle service data, and the 0 th encrypted vehicle service data is the vehicle service data;
the sending module is used for sending the N-th encrypted vehicle service data to the 1 st data transmission node, wherein the N-th encrypted vehicle service data is obtained by encrypting the N-1 th encrypted vehicle service data by using the data transmission key of the 1 st data transmission node.
In a possible implementation manner, the encryption module is specifically configured to encrypt the nth-N encrypted vehicle service data and the communication certificate of the nth data transmission node by using the data transmission key of the nth data transmission node to obtain the N-N +1 encrypted vehicle service data, where the communication certificate of the nth data transmission node indicates a transmission condition of the nth-N encrypted vehicle service data at the nth data transmission node.
In one possible embodiment, when N is equal to N, the nth data transmission node is a vehicle external transmission node;
the 1 st data transmission node is a vehicle interior transmission node.
In a fourth aspect, a data transmission apparatus is provided, where the data transmission apparatus is applied to a data transmission node. The data transmission device has the function of realizing part or all of the functions of any one of the possible implementation manners of the second aspect and the second aspect. For example, the function of the data transmission device may be a function of separately implementing any of the embodiments in the present application. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more units or modules corresponding to the above functions.
In one embodiment, the data transmission apparatus includes:
a receiving module for receiving encrypted vehicle service data;
and the obtaining module is used for obtaining the decrypted encrypted vehicle service data, wherein the decrypted encrypted vehicle service data is obtained by decrypting the encrypted vehicle service data by using the data transmission key of the data transmission node, and the decrypted encrypted vehicle service data is obtained by encrypting by using the data transmission key of the next data transmission node.
In a possible embodiment, the data transmission device further comprises a sending module;
the obtaining module is specifically used for obtaining the decrypted encrypted vehicle service data and the communication certificate of the data transmission node, wherein the decrypted encrypted vehicle service data and the communication certificate of the data transmission node are obtained by decrypting the encrypted vehicle service data by using the data transmission key of the data transmission node, and the communication certificate of the data transmission node indicates the transmission condition of the decrypted encrypted vehicle service data at the data transmission node;
and the sending module is used for sending the decrypted encrypted vehicle service data to the next data transmission node when the transmission condition of the decrypted encrypted vehicle service data at the data transmission node is met after the decrypted encrypted vehicle service data and the communication certificate of the data transmission node are obtained by the obtaining module.
In a possible implementation manner, the receiving module is further configured to receive a data transmission key of the data transmission node;
and the obtaining module is specifically used for decrypting the encrypted vehicle service data by using the data transmission key of the data transmission node to obtain the decrypted encrypted vehicle service data and the communication certificate of the data transmission node.
In one possible embodiment, the acquisition module is specifically configured to send the encrypted vehicle service data to the decryption module;
and receiving the decrypted encrypted vehicle service data and the communication certificate of the data transmission node, which are sent by the decryption module.
In a fifth aspect, a data encryption apparatus is provided that includes a processor. The processor is coupled to the memory and is operable to execute instructions in the memory to implement the method of any one of the possible implementations of the first aspect. Optionally, the data encryption device further comprises a memory. Optionally, the data encryption apparatus further comprises a communication interface, the processor being coupled to the communication interface for inputting and/or outputting information, the information comprising at least one of instructions and data.
In one implementation, the data encryption apparatus is a data processing device. When the data encryption device is a data processing apparatus, the communication interface may be a transceiver, or an input/output interface.
Alternatively, the transceiver may be a transmit-receive circuit. Alternatively, the input/output interface may be an input/output circuit.
In another implementation, the data encryption device is a chip or a system of chips configured in a data processing apparatus. When the data encryption device is a chip or a system of chips configured in a data processing apparatus, the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or related circuit, etc. The processor may also be embodied as a processing circuit or a logic circuit.
In a sixth aspect, a data transmission apparatus is provided that includes a processor. The processor is coupled to the memory and is operable to execute the instructions in the memory to implement the method of any one of the possible implementations of the second aspect. Optionally, the data transmission device further comprises a memory. Optionally, the data transmission device further comprises a communication interface, the processor being coupled to the communication interface for inputting and/or outputting information, the information comprising at least one of instructions and data.
In one implementation, the data transmission apparatus is a data processing device. When the data transmission device is a data processing apparatus, the communication interface may be a transceiver, or an input/output interface.
Alternatively, the transceiver may be a transmit-receive circuit. Alternatively, the input/output interface may be an input/output circuit.
In another implementation, the data transmission device is a chip or a system of chips configured in the data processing apparatus. When the data transmission device is a chip or a chip system configured in a data processing apparatus, the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, and the like. The processor may also be embodied as a processing circuit or a logic circuit.
In a seventh aspect, a processor is provided, including: input circuit, output circuit and processing circuit. The processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor performs the method in any one of the possible implementations of the first aspect or performs the method in any one of the possible implementations of the second aspect.
In a specific implementation process, the processor may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, various logic circuits, and the like. The input signal received by the input circuit may be received and input by, for example and without limitation, a receiver, the signal output by the output circuit may be output to and transmitted by a transmitter, for example and without limitation, and the input circuit and the output circuit may be the same circuit that functions as the input circuit and the output circuit, respectively, at different times. The embodiment of the present application does not limit the specific implementation manner of the processor and various circuits.
In an eighth aspect, a data encryption apparatus is provided that includes a communication interface and a processor. The communication interface is coupled with the processor. The communication interface is used for inputting and/or outputting information. The information includes at least one of instructions and data. The processor is configured to execute a computer program to cause the data encryption apparatus to perform the method of any one of the possible implementations of the first aspect.
Optionally, the number of the processors is one or more, and the number of the memories is one or more.
In a ninth aspect, a data transmission apparatus is provided that includes a communication interface and a processor. The communication interface is coupled with the processor. The communication interface is used for inputting and/or outputting information. The information includes at least one of instructions and data. The processor is configured to execute a computer program to cause the data encryption apparatus to perform the method of any of the possible implementations of the second aspect.
Optionally, the number of the processors is one or more, and the number of the memories is one or more.
In a tenth aspect, a data encryption apparatus is provided that includes a processor and a memory. The processor is configured to read instructions stored in the memory and to receive signals via the receiver and transmit signals via the transmitter, so that the apparatus performs the method of any of the possible implementations of the first aspect.
Optionally, the number of the processors is one or more, and the number of the memories is one or more.
Alternatively, the memory may be integral to the processor or provided separately from the processor.
In an eleventh aspect, a data transmission apparatus is provided that includes a processor and a memory. The processor is configured to read instructions stored in the memory and to receive signals via the receiver and transmit signals via the transmitter, so that the apparatus performs the method of any of the possible implementations of the second aspect.
Optionally, the number of the processors is one or more, and the number of the memories is one or more.
Alternatively, the memory may be integral to the processor or provided separately from the processor.
In a specific implementation process, the memory may be a non-transient memory, such as a Read Only Memory (ROM), which may be integrated on the same chip as the processor, or may be separately disposed on different chips.
It will be appreciated that the relevant information interaction process, e.g., sending a message, may be the process of outputting a message from the processor, and receiving a message may be the process of inputting a received message to the processor. In particular, the information output by the processor may be output to a transmitter and the input information received by the processor may be from a receiver. The transmitter and receiver may be collectively referred to as a transceiver, among others.
The data encryption device and the data transmission device in the above eighth to eleventh aspects may be chips, the processor may be implemented by hardware or software, and when implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like; when implemented in software, the processor may be a general-purpose processor implemented by reading software code stored in a memory, which may be integrated with the processor, located external to the processor, or stand-alone.
In a twelfth aspect, there is provided a computer program product comprising: computer program (also called code, or instructions), which when executed, causes a computer to perform the method of any of the possible implementations of the first aspect described above, or to perform the method of any of the possible implementations of the second aspect described above.
In a thirteenth aspect, a computer-readable storage medium is provided, which stores a computer program (which may also be referred to as code, or instructions) that, when executed on a computer, causes the computer to perform the method of any of the above-described possible implementations of the first aspect, or the method of any of the above-described possible implementations of the second aspect.
In a fourteenth aspect, the present application provides a chip system, where the chip system includes a processor and an interface, where the interface is configured to obtain a program or an instruction, and the processor is configured to call the program or the instruction to implement or support a data processing device to implement the functions related to the first aspect, or call the program or the instruction to implement or support a data processing device to implement the functions related to the second aspect.
In one possible design, the system-on-chip further includes a memory for storing program instructions and data necessary for the data processing device. The chip system may be formed by a chip, or may include a chip and other discrete devices.
It should be noted that, beneficial effects brought by the embodiments of the third aspect to the fourteenth aspect of the present application can be understood with reference to the embodiments of the first aspect and the second aspect, and therefore, detailed descriptions are not repeated.
Drawings
FIG. 1 is a block diagram of a system framework according to an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating a method for controlling transmission of vehicle service data according to an embodiment of the present application;
FIG. 3 is another flow chart illustrating a method for controlling vehicle service data transmission according to an embodiment of the present application;
fig. 4 is a schematic diagram of a data encryption apparatus according to an embodiment of the present application;
fig. 5 is a schematic diagram of a data transmission apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions provided in the present application are further described below with reference to the accompanying drawings and examples. It should be understood that the system structure and the service scenario provided in the embodiment of the present application are mainly used to illustrate possible implementation manners of the technical solutions of the present application, and should not be construed as the only limitation to the technical solutions of the present application. As can be known to those skilled in the art, with the evolution of the system structure and the appearance of new service scenarios, the technical solution provided in the present application is also applicable to similar technical problems.
The terms "first," "second," "third," "fourth," and the like in the description and claims of this application and in the above-described drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Additionally, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical scheme provided by the application is suitable for the service scene of vehicle service data transmission from the inside of the vehicle to the outside of the vehicle, the propagation path of the covered vehicle service data is generally a node where the vehicle service data is located, an in-vehicle data transmission node and an out-vehicle data transmission node, the node where the vehicle service data is located is a data source where the vehicle service data needing to be transmitted out of the vehicle is originally located, the in-vehicle data transmission node is a node through which the transmission process of the vehicle service data from the inside to the outside of the vehicle must pass, such as Telematics (Telematics BOX) or Gateway (Gateway), etc., the off-board data transmission node ultimately needs to transmit vehicle service data to a cloud server for storage or processing, before the vehicle service data reach the target application, the vehicle service data need to pass through a data transmission node, and the data transmission node is an external data transmission node.
In an actual service scenario, the number of data transmission nodes needs to be flexibly determined according to requirements. And because of the mechanism requirement, the node where the data transmission node is located needs to have the capability of data encryption and decryption. The data transmission nodes can be used for positioning the transmission path of the vehicle service data in the vehicle, when the number of the data transmission nodes is increased, the transmission path of the vehicle service data is finer, and the times of encryption and decryption required by the vehicle service data are correspondingly increased, so that the path granularity and the performance consumption caused by encryption and decryption need to be balanced in an actual service scene, and the number of the data transmission nodes is deployed. Secondly, in the technical scheme provided by the application, controlling the transmission of the vehicle service data from inside to outside of the vehicle cannot be applied to a scene of uploading the personal service data to a cloud server for processing in the vehicle, however, as long as the communication object can allow the complete operation of the protection control mechanism in terms of performance, the technical scheme provided by the application is also applicable to a scene of interaction of the vehicle service data with terminal devices (such as a smart phone, a tablet computer and the like) outside of the vehicle through bluetooth or other short-distance communication modes, and is not limited herein specifically.
For better understanding of the method, the related device and the apparatus for controlling vehicle service data transmission disclosed in the embodiments of the present application, the technical solutions in the present application will be described below with reference to the drawings in the present application. First, a system architecture of a data transmission protection system used in the embodiment of the present application is described. The data transmission control center is used for a data transmission protection system consisting of a vehicle end and a cloud server, the vehicle end is provided with the data transmission control center, and the data transmission control center is responsible for data transmission control on the whole vehicle level, so that the data transmission control center can perform data transmission related functions such as data transmission notification and data transmission strategy control. In addition, the vehicle end is also provided with a data transmission node which is responsible for receiving a data transmission strategy configuration item issued by the data transmission control center and detecting the vehicle service data passing through the data transmission node. And secondly, the cloud server is also provided with data transmission nodes and is responsible for functions of data transmission management, control strategies and the like of the whole Internet of vehicles service. Furthermore, the vehicle-side data transmission control center and the cloud server data transmission node can synchronize data transmission strategy configuration, and the data transmission node deployed by the cloud server can also detect flowing vehicle service data. Besides, the data transmission protection System also has a Key Management System (KMS) and an Identity authentication service (IAM) as a security infrastructure supporting normal operation of the data protection process, in which the KMS and the IAM are used to jointly generate a data security identifier, that is, a data transmission Key used to ensure confidentiality of the vehicle service data during transmission, and in addition, the KMS and the IAM may also be configured to perform data transmission marking on the vehicle service data in combination with a data transmission policy in the embodiment of the present application.
For easy understanding, please refer to fig. 1, fig. 1 is a schematic block diagram of a system framework in an embodiment of the present application, and as shown in fig. 1, a data transmission technology facility includes a data transmission control center, an in-vehicle KMS and an in-vehicle IAM, a user data transmission communication policy is configured by the data transmission control center, the user data transmission communication policy includes data transmission nodes capable of performing vehicle service data transmission and a data transmission sequence, the user data transmission communication policy is issued to the in-vehicle KMS and the in-vehicle IAM, the in-vehicle KMS and the in-vehicle IAM authorize a communication credential corresponding to vehicle service data according to the user data transmission communication policy, the in-vehicle KMS and the in-vehicle IAM issue a key to a data transmission node deployed on a security group boundary network element according to the user data transmission communication policy, the key is used for verifying the communication credential corresponding to the vehicle service data, and when the vehicle service data passes the authentication of the in-vehicle KMS and the in-vehicle IAM, the vehicle service data is transmitted. In the process of vehicle service data transmission, the data transmission nodes detect vehicle service data in real time on networking boundaries inside and outside the vehicle, communication certificates corresponding to the vehicle service data are verified, if transmission conditions indicated by the communication certificates meet the transmission conditions indicated by a user data transmission communication strategy, the vehicle service data corresponding to the communication certificates can be transmitted, and the communication certificates of the vehicle service data to the next data transmission node are updated, so that vehicle service data transmission is completed. It should be understood that, during the transmission of the vehicle service data, the in-vehicle data transmission control center may also record (e.g., alarm or log) the transmission of the vehicle service data detected by the data transmission node, and provide a visual interface of the transmission of the vehicle service data to the user for the user to further control and manage the transmission of the vehicle service data based on the visual interface.
It should be understood that the data processing device described in the technical solution provided in the present application may be an ECU, a terminal device, an in-vehicle device, a bluetooth, a device deployed in a cloud server, a data source may be the ECU, the terminal device, the in-vehicle device, and the like, and a data transmission node may be the terminal device, the in-vehicle device, the bluetooth, the device deployed in the cloud server, and the like. Secondly, the data transmission node may be a low-power node without decryption capability or a high-power node with decryption capability (with decryption capability required by the technical solution provided in the present application). Therefore, if the vehicle service data is a low-computing-power node without decryption capability, when the vehicle service data needs to be decrypted, the vehicle service data needs to be sent to a decryption module (in the embodiment of the present application, the IAM or the KMS is taken as an example) to perform decryption operation, the decrypted vehicle service data is returned to the data transmission node by the decryption module, and then whether the decrypted vehicle service data can be continuously transmitted is determined. If the data transmission node is a high-computation-power node with decryption capability, the vehicle service data can be directly decrypted at the data transmission node, and the description will be given below of the case where the data transmission node is a low-computation-power node or a high-computation-power node.
Referring to fig. 2, fig. 2 is a schematic flow chart of a method for controlling vehicle service data transmission in an embodiment of the present application, where, as shown in fig. 2, the step of controlling vehicle service data transmission includes:
s101, determining N data transmission nodes and a transmission sequence for transmitting vehicle service data by a data transmission control center according to user requirements;
in this embodiment, in the user configuration stage, the user may configure the flow permission of the vehicle service data in the vehicle through the data transmission control center, that is, select N data transmission nodes through which the vehicle service data are allowed to flow and a sequence in which the N data transmission nodes transmit the vehicle service data, where the sequence in which the N data transmission nodes transmit the vehicle service data is a transmission sequence. For example, if the transmission sequence is a first data transmission node transmitting to a second data transmission node, the second data transmission node transmitting to a third data transmission node, then the vehicle service data will be transmitted in sequence from the first data transmission node, the second data transmission node to the third data transmission node based on the transmission sequence. Secondly, the data transmission control center also sends the related information of the N data transmission nodes to the IAM or the KMS, and sends the transmission sequence to the data source.
Specifically, the nth data transmission node is a vehicle exterior transmission node, and the first data transmission node indicated by the transmission sequence is a vehicle interior transmission node.
Further, if the data transmission control center has the capability of summarizing all data related to vehicle service in the vehicle and displaying the data to the user through a central control screen menu or other modes, the user can configure the N data transmission nodes and the transmission sequence of the vehicle service data according to the requirement.
It can be understood that the data transmission nodes and the transmission sequence illustrated in the embodiments of the present application are both used for understanding the present solution, and the number of the specific data transmission nodes and the specific transmission sequence need to be flexibly determined according to user requirements and actual situations, and should not be construed as limitations of the embodiments of the present application.
S102, generating data transmission keys of N data transmission nodes by the IAM or the KMS;
in this embodiment, the IAM or the KMS receives the relevant information of the N data transmission nodes from the data transmission control center, and generates data transmission keys of the N data transmission nodes based on the relevant information of the N data transmission nodes, where each data transmission key corresponds to one data transmission node. It should be understood that the data transmission key described in the present application may be symmetric or asymmetric, and is not limited herein.
Illustratively, taking N data transfer nodes including a first data transfer node, a second data transfer node, and a third data transfer node as an example, the IAM or KMS may generate the data transfer key of the first data transfer node, the data transfer key of the second data transfer node, and the data transfer key of the third data transfer node. It should be understood that only three data transmission nodes are described in the foregoing example, and in practical applications, the number of data transmission nodes through which the vehicle service data is allowed to flow is determined, and then the number of the generated corresponding data transmission keys is the same, and the specific number is not limited herein.
Specifically, the data transmission key set is generated by the KMS, for example, the data transmission key of each data transmission node is generated by using a key material preset in the KMS, or the data transmission key of each data transmission node is randomly generated in real time, so the specific generation manner of the data transmission key set should not be construed as a limitation to the embodiments of the present application.
S103, the IAM or the KMS sends the data transmission key to the corresponding data transmission node and sends the data transmission keys of the N data transmission nodes to the data source;
in this embodiment, the IAM or the KMS sends the data transmission key generated in step S102 to the corresponding data transmission node, and sends the data transmission keys of the N data transmission nodes to the data source.
Illustratively, taking N data transmission nodes including a first data transmission node, a second data transmission node and a third data transmission node as an example, the data transmission key of the first data transmission node, the data transmission key of the second data transmission node and the data transmission key of the third data transmission node can be obtained through step S102, the IAM or KMS therefore needs to send the data transmission key of the first data transmission node to the first data transmission, and, similarly, the IAM or KMS needs to send the data transmission key of the second data transmission node to the second data transmission, and the third data transmission sends the data transmission key of the third data transmission node, and sends the data transmission key of the first data transmission node, the data transmission key of the second data transmission node and the data transmission key of the third data transmission node to the data source. It should be understood that the foregoing examples only describe the transmission of the corresponding data transmission keys to three data transmission nodes, and in practical applications, the number of data transmission nodes through which the vehicle service data is allowed to flow is determined, and then the number of the corresponding data transmission keys that need to be transmitted is the same, so the number of the corresponding data transmission keys that need to be transmitted is not limited herein.
S104, generating communication vouchers of the N data transmission nodes by the IAM or the KMS;
in this embodiment, the IAM or the KMS receives the relevant information of the N data transmission nodes from the data transmission control center, and may further generate communication credentials of the N data transmission nodes based on the relevant information of the N data transmission nodes, where the communication credentials correspond to the data transmission nodes one to one, and each communication credential indicates a transmission condition of the decrypted encrypted vehicle service data at the data transmission node.
Illustratively, the data transfer node set includes a first data transfer node, a second data transfer node, and a third data transfer node as an example. If the communication certificate of the first data transmission node indicates that the transmission is performed between 14:00 and 15:00, namely the transmission condition of the first data transmission node is that the decrypted encrypted vehicle service data needs to be transmitted between 14:00 and 15:00, if the decrypted encrypted vehicle service data is between 14:00 and 15:00, the first data transmission node sends the decrypted encrypted vehicle service data to the next data transmission node, and if the decrypted encrypted vehicle service data is not between 14:00 and 15:00, the data transmission is not performed. And secondly, if the communication certificate of the second data transmission node indicates that the data is transmitted in a size smaller than 10 megabytes (M), namely the transmission condition of the second data transmission node is that the size of the decrypted encrypted vehicle service data needs to be smaller than 10M, if the decrypted encrypted vehicle service data is smaller than 10M, the second data transmission node sends the decrypted vehicle service data to the next data transmission node, and if the decrypted encrypted vehicle service data is larger than or equal to 10M, the data transmission is not carried out. It should be understood that the foregoing examples are only used to understand the present solution, and the specific communication credentials of each data transfer node are not limited herein.
It should be understood that step S102 and step S104 are not limited to a time sequence, and therefore the numbers of step S102 and step S104 are not to be construed as limiting in the embodiment of the present application, and step S102 and step S104 may be executed simultaneously, or step S102 and step S104 have a sequential execution order, which is not specifically limited herein.
S105, the IAM or the KMS sends the communication voucher of the N data transmission nodes to the data source;
in this embodiment, the IAM or the KMS sends the communication credentials of the N data transmission nodes obtained in step S104 to the data source.
In the following steps, the N data transmission nodes include a first data transmission node, a second data transmission node, and a third data transmission node, and a transmission sequence is that the first data transmission node transmits to the second data transmission node, and the second data transmission node transmits to the third data transmission node.
S106, the data source encrypts the vehicle service data and the communication certificate of the third data transmission node through the data transmission key of the third data transmission node to obtain first encrypted vehicle service data;
in this embodiment, before the data source is encrypted, it is required to ensure that a communication certificate of the data transmission node is carried in a packet load (payload). After the data source sends the data transmission keys of the N data transmission nodes obtained in step S103 and the communication credentials of the N data transmission nodes obtained in step S105 to the data source, the data source needs to determine the data transmission key of the third data transmission node from the data transmission keys of the N data transmission nodes, and then obtain the communication credentials of the third data transmission node from the communication credentials of the N data transmission nodes. The data source encrypts the vehicle service data and the communication certificate of the third data transmission node by the data transmission key of the third data transmission node to obtain the first encrypted vehicle service data.
S107, the data source encrypts the first encrypted vehicle service data and the communication certificate of the second data transmission node through the data transmission key of the second data transmission node to obtain second encrypted vehicle service data;
in this embodiment, after the data source obtains the first encrypted vehicle service data through step S106, it needs to determine the data transmission key of the second data transmission node from the data transmission keys of the N data transmission nodes, and then obtain the communication credential of the second data transmission node from the communication credentials of the N data transmission nodes. The data source encrypts the first encrypted vehicle service data and the communication certificate of the second data transmission node through the data transmission key of the second data transmission node to obtain second encrypted vehicle service data.
S108, the data source encrypts the second encrypted vehicle service data and the communication certificate of the first data transmission node through the data transmission key of the first data transmission node to obtain third encrypted vehicle service data;
in this embodiment, after the data source obtains the second encrypted vehicle service data through step S107, it needs to further determine the data transmission key of the first data transmission node from the data transmission keys of the N data transmission nodes, and then obtain the communication credential of the first data transmission node from the communication credentials of the N data transmission nodes. The data source encrypts the second encrypted vehicle service data and the communication certificate of the first data transmission node by the data transmission key of the first data transmission node to obtain third encrypted vehicle service data. At this time, the encryption operation for the vehicle service data is completed, whereby the encrypted third encrypted vehicle service data can be encrypted.
S109, the first data transmission node receives a third encrypted vehicle service number sent by the data source;
in this embodiment, the first data transmission node receives the third encrypted vehicle service data sent by the data source.
S110, the first data transmission node decrypts the third encrypted vehicle service data through the data transmission key of the first data transmission node to obtain second encrypted vehicle service data and a communication certificate of the first data transmission node;
in this embodiment, after the third encrypted vehicle service data is received by the first data transmission node, the third encrypted vehicle service data needs to be decrypted by the data transmission key of the first data transmission node to obtain the second encrypted vehicle service data and the communication credential of the first data transmission node, where the communication credential of the first data transmission node indicates the transmission condition of the second encrypted vehicle service data at the first data transmission node.
S111, when the transmission condition of the second encrypted vehicle service data at the first data transmission node is met, the first data transmission node sends the second encrypted vehicle service data to the second data transmission node;
in this embodiment, the first data transmission node determines whether a transmission condition of the second encrypted vehicle service data at the first data transmission node is satisfied, and sends the second encrypted vehicle service data to the second data transmission node when the transmission condition of the second encrypted vehicle service data at the first data transmission node is satisfied. And when the transmission condition of the second encrypted vehicle service data at the first data transmission node is not met, the second encrypted vehicle service data is not further transmitted, so that the safety of data transmission is improved.
Illustratively, if the communication certificate of the first data transmission node indicates that the transmission is performed between 14:00 and 15:00, that is, the transmission condition of the first data transmission node is that the second encrypted vehicle service data needs to be transmitted between 14:00 and 15:00, when the time for decrypting the third encrypted vehicle service data by the first data transmission node to obtain the second encrypted vehicle service data is between 14:00 and 15:00, the second encrypted vehicle service data is obtained, and the next data transmission node is known to be the second data transmission node according to the transmission sequence, so that the first data transmission node sends the second encrypted vehicle service data to the second data transmission node. And secondly, when the time for decrypting the third encrypted vehicle service data by the first data transmission node to obtain the second encrypted vehicle service data is 11:30, namely the transmission condition of the second encrypted vehicle service data at the first data transmission node is not met, the second encrypted vehicle service data needs to be intercepted, and the second encrypted vehicle service data is not further transmitted.
It should be understood that the foregoing examples are only for the understanding of the present solution, and the data transmission needs to be flexibly determined according to the actual situation of the specific transmission conditions.
S112, the second data transmission node decrypts the second encrypted vehicle service data through the data transmission key of the second data transmission node to obtain the first encrypted vehicle service data and the communication certificate of the second data transmission node;
in this embodiment, after the transmission condition of the second encrypted vehicle service data at the first data transmission node is met, the second data transmission node may receive the second encrypted vehicle service data sent by the first data transmission node, and then decrypt the second encrypted vehicle service data by using the data transmission key of the second data transmission node to obtain the first encrypted vehicle service data and the communication credential of the second data transmission node, where the communication credential of the second data transmission node indicates the transmission condition of the first encrypted vehicle service data at the second data transmission node.
S113, when the transmission condition of the first encrypted vehicle service data in the second data transmission node is met, the second data transmission node sends the first encrypted vehicle service data to a third data transmission node;
in this embodiment, the second data transmission node determines whether a transmission condition of the first encrypted vehicle service data at the second data transmission node is satisfied, and sends the first encrypted vehicle service data to the third data transmission node when the transmission condition of the first encrypted vehicle service data at the second data transmission node is satisfied. And when the transmission condition of the first encrypted vehicle service data at the second data transmission node is not met, the first encrypted vehicle service data is not further transmitted, so that the safety of data transmission is improved.
Illustratively, if the communication certificate of the second data transmission node indicates that the data is transmitted in less than 10 megabytes (M), that is, the transmission condition of the second data transmission node is that the size of the first encrypted vehicle service data needs to be less than 10 megabytes, when the second data transmission node decrypts the second encrypted vehicle service data to obtain that the size of the first encrypted vehicle service data is 8 megabytes, it is determined that the transmission condition of the first encrypted vehicle service data in the second data transmission node is satisfied, and the next data transmission node is known to be a third data transmission node according to the transmission sequence, so that the second data transmission node transmits the first encrypted vehicle service data to the third data transmission node. Secondly, when the second data transmission node decrypts the second encrypted vehicle service data to obtain that the size of the first encrypted vehicle service data is 16M, the transmission condition of the first encrypted vehicle service data in the second data transmission node is not met, the second encrypted vehicle service data needs to be intercepted, and the second encrypted vehicle service data is not further transmitted.
S114, the third data transmission node decrypts the first encrypted vehicle service data through the data transmission key of the third data transmission node to obtain vehicle service data and a communication certificate of the third data transmission node;
in this embodiment, after the transmission condition of the first encrypted vehicle service data at the second data transmission node is satisfied, the third data transmission node may receive the first encrypted vehicle service data sent by the second data transmission node, and then decrypt the first encrypted vehicle service data by using the data transmission key of the third data transmission node to obtain the vehicle service data and the communication credential of the third data transmission node, where the communication credential of the third data transmission node indicates the transmission condition of the vehicle service data at the third data transmission node.
And S115, when the transmission condition of the vehicle service data at the third data transmission node is met, the third data transmission node sends the vehicle service data to the next data transmission node.
In this embodiment, the third data transmission node determines whether the transmission condition of the vehicle service data at the third data transmission node is satisfied, and sends the vehicle service data to the next data transmission node when the transmission condition of the vehicle service data at the third data transmission node is satisfied. And when the transmission condition of the vehicle service data at the third data transmission node is not met, the vehicle service data is not further transmitted or processed, so that the safety of data transmission is improved.
Specifically, the third data transmission node is a node deployed in the cloud server. When the architecture of the cloud server includes multiple modules, a third data transmission node of the cloud server may serve as a screening threshold for vehicle service data to enter the cloud server in actual application, and an actual transmission destination may be a module at a deeper level in the cloud server, so that the third data transmission node needs to transmit the vehicle service data to the module at the deeper level in the cloud server, and thus a next data transmission node may be a module at a deeper level in the cloud server. Secondly, when the architecture of the cloud server is only a single module, that is, the transmission destination of the vehicle service data is the third data transmission node itself, when the third data transmission node determines that the transmission condition indicated by the communication certificate of the third data transmission node is satisfied, the service of the vehicle service data can be provided for the target vehicle directly based on the vehicle service data. In the embodiment of the present application, both scenarios may be implemented, but in a cross-domain scenario, when a new domain is reached (for example, data is transmitted from a vehicle to a cloud server, which is a new domain), at least one data transmission node is set in the new domain, and is used to determine a transmission condition indicated by a communication credential of the data transmission node, so as to improve reliable and secure data transmission.
Illustratively, if the transmission condition of the vehicle service data at the third data transmission node is that the vehicle service data is allowed to be transmitted to 192.168.1.1, that is, the transmission condition of the third data transmission node is that the vehicle service data can be transmitted to 192.168.1.1, when the third data transmission node decrypts the first encrypted vehicle service data to obtain the vehicle service data and the address of the next data transmission node is "192.168.1.1", the transmission condition of the vehicle service data at the third data transmission node is met, and the vehicle service data is transmitted to the next data transmission node (that is, the data transmission node with the address of "192.168.1.1") based on the data transmission sequence. Secondly, when the third data transmission node decrypts the first encrypted vehicle service data to obtain the vehicle service data and the address of the next data transmission node is '192.167.1.0', the transmission condition of the vehicle service data at the third data transmission node is not satisfied, the vehicle service data needs to be intercepted, the vehicle service data is not further transmitted, or the service of the vehicle service data is not provided.
Referring to fig. 3, please refer to fig. 3 for describing a case that the data transmission node in the embodiment of the present application is a low-computation-power node without decryption capability, fig. 3 is another schematic flow chart of the method for controlling vehicle service data transmission in the embodiment of the present application, and as shown in fig. 3, the step of controlling vehicle service data transmission includes:
s201, determining N data transmission nodes and a transmission sequence for transmitting vehicle service data by a data transmission control center according to user requirements;
in this embodiment, the specific manner of determining, by the data transmission control center, the N data transmission nodes for transmitting the vehicle service data and the transmission sequence according to the user requirement is similar to that in step S101, and details are not described herein again.
S202, generating data transmission keys of N data transmission nodes by the IAM or the KMS;
in this embodiment, a specific manner of generating the data transmission keys of the N data transmission nodes by the IAM or the KMS is similar to that in step S102, and is not described herein again.
S203, the IAM or the KMS sends the data transmission keys of the N data transmission nodes to a data source;
in this embodiment, since the data transfer node is a low-computation-power node without decryption capability, the data transfer node cannot decrypt the encrypted data, and therefore the IAM or the KMS only needs to send the data transfer keys of the N data transfer nodes generated in step S202 to the data source.
S204, generating communication credentials of the N data transmission nodes by the IAM or the KMS;
in this embodiment, the specific manner of generating the communication credentials of the N data transmission nodes by the IAM or the KMS is similar to that in step S104, and is not described herein again.
It should be understood that step S202 and step S204 are not limited to a time sequence, and therefore the numbers of step S202 and step S204 are not to be construed as limiting in the embodiment of the present application, and step S202 and step S204 may be executed simultaneously, or step S202 and step S204 have a sequential execution order, which is not specifically limited herein.
S205, the IAM or the KMS sends the communication voucher of the N data transmission nodes to a data source;
in this embodiment, a specific manner of sending the communication credentials of the N data transmission nodes generated in step S204 to the data source by the IAM or the KMS is similar to that in step S105, and is not described herein again.
Similar to the embodiment shown in fig. 2, the following steps are described by taking as an example that the N data transmission nodes include a first data transmission node, a second data transmission node and a third data transmission node, and the transmission sequence is that the first data transmission node transmits to the second data transmission node and the second data transmission node transmits to the third data transmission node, and it should be understood that the number of specific data transmission nodes and the specific transmission sequence should not be construed as limitations of the present application.
S206, the data source encrypts the vehicle service data and the communication certificate of the third data transmission node through the data transmission key of the third data transmission node to obtain first encrypted vehicle service data;
in this embodiment, the data source encrypts the vehicle service data and the communication credential of the third data transmission node through the data transmission key of the third data transmission node, and a specific manner of obtaining the first encrypted vehicle service data is similar to that in step S106, and is not described herein again.
S207, the data source encrypts the first encrypted vehicle service data and the communication certificate of the second data transmission node through the data transmission key of the second data transmission node to obtain second encrypted vehicle service data;
in this embodiment, the specific manner in which the data source encrypts the first encrypted vehicle service data and the communication credential of the second data transmission node through the data transmission key of the second data transmission node to obtain the second encrypted vehicle service data is similar to that in step S107, and is not described herein again.
S208, the data source encrypts the second encrypted vehicle service data and the communication certificate of the first data transmission node through the data transmission key of the first data transmission node to obtain third encrypted vehicle service data;
in this embodiment, the specific manner in which the data source encrypts the second encrypted vehicle service data and the communication credential of the first data transmission node through the data transmission key of the first data transmission node to obtain the third encrypted vehicle service data is similar to that in step S108, and is not described herein again.
S209, the first data transmission node receives third encrypted vehicle service data sent by the data source and sends the third encrypted vehicle service data to the IAM or the KMS;
in this embodiment, the first data transmission node receives the third encrypted vehicular service data sent by the data source, and since the data transmission node is a low-computation-power node without decryption capability, the first data transmission node needs to send the third encrypted vehicular service data to the IAM or the KMS.
S210, the IAM or the KMS decrypts the third encrypted vehicle service data through the data transmission key of the first data transmission node to obtain second encrypted vehicle service data and a communication certificate of the first data transmission node;
in this embodiment, after receiving the third encrypted vehicle service data sent by the first data transmission node, the IAM or the KMS decrypts the third encrypted vehicle service data by using the data transmission key of the first data transmission node to obtain the second encrypted vehicle service data and the communication credential of the first data transmission node, which is similar to the decryption manner of the first data transmission node in step S110 and is not described herein again.
Further, after the IAM or the KMS obtains the second encrypted vehicle service data and the communication credential of the first data transmission node, the IAM or the KMS needs to send the second encrypted vehicle service data and the communication credential of the first data transmission node to the first data transmission node, where the communication credential of the first data transmission node indicates a transmission condition of the second encrypted vehicle service data at the first data transmission node.
S211, when the transmission condition of the second encrypted vehicle service data at the first data transmission node is met, the first data transmission node sends the second encrypted vehicle service data to the second data transmission node;
in this embodiment, after receiving the second encrypted vehicular service data and the communication credential of the first data transmission node sent by the IAM or the KMS in step S210, the first data transmission node determines the transmission condition of the second encrypted vehicular service data at the first data transmission node through the communication credential of the first data transmission node, determines whether the transmission condition of the second encrypted vehicular service data at the first data transmission node is satisfied, and sends the second encrypted vehicular service data to the second data transmission node when the transmission condition of the second encrypted vehicular service data at the first data transmission node is satisfied. And when the transmission condition of the second encrypted vehicle service data at the first data transmission node is not met, the second encrypted vehicle service data is not further transmitted, so that the safety of data transmission is improved.
The specific manner in which the first data transmission node determines that the transmission condition of the second encrypted vehicle service data at the first data transmission node is satisfied and sends the second encrypted vehicle service data to the second data transmission node is similar to step S111, and is not described herein again.
S212, the second data transmission node receives the second encrypted vehicle service data sent by the first data transmission node and sends the second encrypted vehicle service data to the IAM or the KMS;
in this embodiment, the second data transmission node receives the second encrypted vehicular service data sent by the first data transmission node, and since the data transmission node is a low-power node without decryption capability, the second data transmission node needs to send the second encrypted vehicular service data to the IAM or the KMS.
S213, the IAM or the KMS decrypts the second encrypted vehicular service data through the data transmission key of the second data transmission node to obtain the first encrypted vehicular service data and the communication certificate of the second data transmission node;
in this embodiment, after receiving the second encrypted vehicle service data sent by the second data transmission node, the IAM or the KMS decrypts the second encrypted vehicle service data by using the data transmission key of the second data transmission node to obtain the first encrypted vehicle service data and the communication credential of the second data transmission node, which is similar to the decryption manner of the second data transmission node in step S112 and is not described herein again.
Further, after the IAM or the KMS obtains the first encrypted vehicle service data and the communication credential of the second data transmission node, the IAM or the KMS needs to send the first encrypted vehicle service data and the communication credential of the second data transmission node to the second data transmission node, where the communication credential of the second data transmission node indicates a transmission condition of the first encrypted vehicle service data at the second data transmission node.
S214, when the transmission condition of the first encrypted vehicle service data in the second data transmission node is met, the second data transmission node sends the first encrypted vehicle service data to the third data transmission node;
in this embodiment, after receiving the first encrypted vehicular service data and the communication credential of the second data transmission node sent by the IAM or the KMS in step S213, the second data transmission node determines the transmission condition of the first encrypted vehicular service data at the second data transmission node through the communication credential of the second data transmission node, determines whether the transmission condition of the first encrypted vehicular service data at the second data transmission node is satisfied, and transmits the first encrypted vehicular service data to the third data transmission node when the transmission condition of the first encrypted vehicular service data at the second data transmission node is satisfied.
The specific manner in which the second data transmission node determines that the transmission condition of the first encrypted vehicle service data at the second data transmission node is satisfied and the third data transmission node transmits the first encrypted vehicle service data is similar to step S113, and is not described herein again.
S215, the third data transmission node receives the first encrypted vehicle service data sent by the second data transmission node and sends the first encrypted vehicle service data to the IAM or the KMS;
in this embodiment, the third data transmission node receives the first encrypted vehicular service data sent by the second data transmission node, and since the data transmission node is a low-power node without decryption capability, the second data transmission node needs to send the first encrypted vehicular service data to the IAM or the KMS.
S216, the IAM or the KMS decrypts the first encrypted vehicle service data through the data transmission key of the third data transmission node to obtain the vehicle service data and the communication certificate of the third data transmission node;
in this embodiment, after receiving the first encrypted vehicle service data sent by the third data transmission node, the IAM or the KMS decrypts the first encrypted vehicle service data by using the data transmission key of the third data transmission node to obtain the vehicle service data and the communication credential of the third data transmission node, which is similar to the decryption manner of the third data transmission node in step S114 and is not described herein again.
Further, after the IAM or the KMS obtains the vehicle service data and the communication credential of the third data transmission node, the IAM or the KMS needs to send the vehicle service data and the communication credential of the third data transmission node to the third data transmission node, where the communication credential of the third data transmission node indicates a transmission condition of the vehicle service data at the third data transmission node.
And S217, when the transmission condition of the vehicle service data at the third data transmission node is met, the third data transmission node sends the vehicle service data to the next data transmission node.
In this embodiment, the third data transfer node receives the vehicle service data and the communication credential of the third data transfer node sent by the IAM or the KMS in step S216, determines the transmission condition of the vehicle service data at the third data transfer node according to the communication credential of the third data transfer node, determines whether the transmission condition of the vehicle service data at the third data transfer node is satisfied, and sends the vehicle service data to the next data transfer node when the transmission condition of the vehicle service data at the third data transfer node is satisfied. And when the transmission condition of the vehicle service data at the third data transmission node is not met, the vehicle service data is not further transmitted or processed, so that the safety of data transmission is improved.
Specifically, the third data transmission node is a node deployed in the cloud server. The architecture of the cloud server may include multiple modules or a single module, when the architectures of the cloud servers are different, the manner and purpose of transmitting the vehicle service data by the third data transmission node are also different, and the specific manner of transmitting the vehicle service data is similar to that in step S115, and is not described herein again.
The scheme provided by the embodiment of the application is mainly introduced in the aspect of a method. It is understood that the data encryption device and the data transmission device include hardware structures and/or software modules corresponding to the respective functions in order to realize the functions. Those of skill in the art will readily appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the data encryption device and the data transmission device may be divided into functional modules based on the above method examples, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
Referring to fig. 4, fig. 4 is a schematic diagram of a data encryption device according to an embodiment of the present application, and as shown in fig. 4, the data encryption device 400 includes:
an obtaining module 401, configured to obtain vehicle service data of a target vehicle;
the obtaining module 401 is further configured to obtain N data transmission nodes for transmitting vehicle service data, where N is greater than or equal to 2;
the encryption module 402 is configured to encrypt the nth-nth encrypted vehicle service data by using a data transmission key of an nth data transmission node to obtain nth-N +1 encrypted vehicle service data, where N is greater than or equal to N and is greater than or equal to 1, the nth data transmission node is an nth data transmission node in a transmission sequence among the N data transmission nodes, the transmission sequence is a sequence in which the N data transmission nodes transmit the vehicle service data, and the 0 th encrypted vehicle service data is the vehicle service data;
a sending module 403, configured to send nth encrypted vehicle service data to the 1 st data transmission node, where the nth encrypted vehicle service data is obtained by encrypting the N-1 st encrypted vehicle service data with the data transmission key of the 1 st data transmission node.
In an optional implementation manner, on the basis of the embodiment corresponding to fig. 4, in another embodiment of the data encryption device 400 provided in the embodiment of the present application, the encryption module 402 is specifically configured to encrypt the nth-N encrypted vehicle service data and the communication credential of the nth data transmission node by using the data transmission key of the nth data transmission node, so as to obtain the N-N +1 encrypted vehicle service data, where the communication credential of the nth data transmission node indicates the transmission condition of the N-N encrypted vehicle service data at the nth data transmission node.
In an alternative implementation manner, on the basis of the embodiment corresponding to fig. 4, in another embodiment of the data encryption device 400 provided in the embodiment of the present application, when N is equal to N, the nth data transmission node is a vehicle external transmission node;
the 1 st data transmission node is a vehicle interior transmission node.
Referring to fig. 5, fig. 5 is a schematic diagram of a data transmission device according to an embodiment of the present application, and as shown in fig. 5, the data transmission device 500 includes:
a receiving module 501, configured to receive encrypted vehicle service data;
an obtaining module 502, configured to obtain decrypted encrypted vehicle service data, where the decrypted encrypted vehicle service data is obtained by decrypting the encrypted vehicle service data using the data transmission key of the data transmission node, and the decrypted encrypted vehicle service data is obtained by encrypting using the data transmission key of the next data transmission node.
In an alternative implementation manner, on the basis of the embodiment corresponding to fig. 5, the data transmission apparatus 500 further includes a sending module 503;
the obtaining module 502 is specifically configured to obtain the decrypted encrypted vehicle service data and the communication credential of the data transmission node, where the decrypted encrypted vehicle service data and the communication credential of the data transmission node are obtained by decrypting the encrypted vehicle service data using the data transmission key of the data transmission node, and the communication credential of the data transmission node indicates the transmission condition of the decrypted encrypted vehicle service data at the data transmission node;
and a sending module, configured to send the decrypted encrypted vehicle service data to a next data transmission node when a transmission condition of the decrypted encrypted vehicle service data at the data transmission node is met after the obtaining module 502 obtains the decrypted encrypted vehicle service data and the communication credential of the data transmission node.
In an optional implementation manner, on the basis of the embodiment corresponding to fig. 5, in another embodiment of the data transmission apparatus 500 provided in this embodiment of the present application, the receiving module 501 is further configured to receive a data transmission key of a data transmission node;
the obtaining module 502 is specifically configured to decrypt the encrypted vehicle service data with the data transmission key of the data transmission node to obtain the decrypted encrypted vehicle service data and the communication credential of the data transmission node.
In an alternative implementation manner, on the basis of the embodiment corresponding to fig. 5, in another embodiment of the data transmission device 500 provided in the embodiment of the present application, the obtaining module 502 is specifically configured to send the encrypted vehicle service data to the decrypting module;
and receiving the decrypted encrypted vehicle service data and the communication certificate of the data transmission node, which are sent by the decryption module.
In an alternative implementation manner, on the basis of the embodiment corresponding to fig. 5, in another embodiment of the data transmission device 500 provided in this embodiment of the present application, the decrypted encrypted vehicle service data is obtained by encrypting with the data transmission key of the next data transmission node.
The present application further provides a data encryption apparatus comprising at least one processor configured to execute a computer program stored in a memory, so that the data encryption apparatus performs the method performed by the data encryption control center, the data source, the IAM or the KMS in any of the above method embodiments.
It should be understood that the data encryption device described above may be one or more chips. For example, the data encryption device may be a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), a system on chip (SoC), a Central Processing Unit (CPU), a Network Processor (NP), a digital signal processing circuit (DSP), a Microcontroller (MCU), a Programmable Logic Device (PLD) or other integrated chips.
The present application further provides a data transmission apparatus comprising at least one processor configured to execute a computer program stored in a memory, so as to cause the data transmission apparatus to perform the method performed by the data source, the IAM or the KMS, the first data transmission node, the second data transmission node, and the third data transmission node in any of the above method embodiments.
It should be understood that the data transmission means may be one or more chips. For example, the data transmission device may be an FPGA, an ASIC, an SoC, a CPU, an NP, a DSP, an MCU, a PLD, or another integrated chip.
The embodiment of the application also provides a data encryption device, which comprises a processor and a communication interface. The communication interface is coupled with the processor. The communication interface is used for inputting and/or outputting information. The information includes at least one of instructions and data. The processor is configured to execute a computer program to cause the data encryption device to perform the method performed by the data encryption control center, the data source, the IAM or the KMS in any one of the above method embodiments.
The embodiment of the application also provides a data transmission device which comprises a processor and a communication interface. The communication interface is coupled with the processor. The communication interface is used for inputting and/or outputting information. The information includes at least one of instructions and data. The processor is configured to execute a computer program to cause the data transmission apparatus to perform the method performed by the data source, the IAM or the KMS, the first data transmission node, the second data transmission node, and the third data transmission node in any of the above method embodiments.
The embodiment of the application also provides a data encryption device which comprises a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program from the memory so as to enable the data encryption device to execute the method executed by the data encryption control center, the data source, the IAM or the KMS in any method embodiment.
The embodiment of the application also provides a data transmission device, which comprises a processor and a memory. The memory is configured to store a computer program, and the processor is configured to call and execute the computer program from the memory to cause the data transmission apparatus to execute the method executed by the data source, the IAM or the KMS, the first data transmission node, the second data transmission node, and the third data transmission node in any of the above method embodiments.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor. To avoid repetition, it is not described in detail here.
It should be noted that the processor in the embodiments of the present application may be an integrated circuit chip having signal processing capability. In implementation, the steps of the above method embodiments may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software modules may be located in ram, flash, rom, prom, or eprom, registers, etc. as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and combines hardware thereof to complete the steps of the method.
It will be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), double data rate SDRAM, enhanced SDRAM, SLDRAM, Synchronous Link DRAM (SLDRAM), and direct rambus RAM (DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
According to the method provided by the embodiment of the present application, the present application further provides a computer program product, which includes: computer program code which, when run on a computer, causes the computer to perform the methods performed by the various elements in the embodiments shown in fig. 2 and 3.
According to the method provided by the embodiment of the present application, the present application also provides a computer-readable storage medium, which stores program codes, and when the program codes are executed on a computer, the computer is caused to execute the method executed by each unit in the embodiments shown in fig. 2 and fig. 3.
The modules in the above-mentioned device embodiments and the units in the method embodiments completely correspond to each other, and the corresponding steps are executed by the corresponding modules or units, for example, the communication unit (transceiver) executes the steps of receiving or transmitting in the method embodiments, and other steps besides transmitting and receiving may be executed by the processing unit (processor). The functions of the specific elements may be referred to in the respective method embodiments. The number of the processors may be one or more.
As used in this specification, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between 2 or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from two components interacting with another component in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (17)

1. A method of data encryption, the method being applied to a target vehicle, comprising:
acquiring vehicle service data of the target vehicle;
acquiring N data transmission nodes for transmitting the vehicle service data, wherein N is more than or equal to 2;
encrypting the N-nth encrypted vehicle service data by using a data transmission key of an nth data transmission node to obtain the N-nth +1 encrypted vehicle service data, wherein N is more than or equal to N and is more than or equal to 1, the nth data transmission node is the data transmission node of the N data transmission nodes with the transmission sequence of the nth data transmission node, the transmission sequence is the sequence of the N data transmission nodes for transmitting the vehicle service data, and the 0 th encrypted vehicle service data is the vehicle service data;
and sending N encrypted vehicle service data to the 1 st data transmission node, wherein the N encrypted vehicle service data is obtained by encrypting the N-1 encrypted vehicle service data by using the data transmission key of the 1 st data transmission node.
2. The method of claim 1, wherein the encrypting the N-nth encrypted vehicular service data using the data transmission key of the nth data transmission node to obtain N-N +1 th encrypted vehicular service data comprises:
and encrypting the N-N encrypted vehicle service data and the communication certificate of the nth data transmission node by using the data transmission key of the nth data transmission node to obtain the N-N +1 encrypted vehicle service data, wherein the communication certificate of the nth data transmission node indicates the transmission condition of the N-N encrypted vehicle service data at the nth data transmission node.
3. The method according to claim 1 or 2, characterized in that when N is equal to N, the nth data transmission node is a vehicle external transmission node;
the 1 st data transmission node is a vehicle interior transmission node.
4. A method for data transmission, the method being applied to a data transmission node, and comprising:
receiving encrypted vehicle service data;
and acquiring the decrypted encrypted vehicle service data, wherein the decrypted encrypted vehicle service data is obtained by decrypting the encrypted vehicle service data by using the data transmission key of the data transmission node, and the decrypted encrypted vehicle service data is data encrypted by using the data transmission key of the next data transmission node.
5. The method of claim 4, wherein obtaining the decrypted encrypted vehicle service data comprises:
acquiring the decrypted encrypted vehicle service data and a communication certificate of a data transmission node, wherein the decrypted encrypted vehicle service data and the communication certificate of the data transmission node are obtained by decrypting the encrypted vehicle service data by using a data transmission key of the data transmission node, and the communication certificate of the data transmission node indicates the transmission condition of the decrypted encrypted vehicle service data at the data transmission node;
after the obtaining the decrypted encrypted vehicle service data and the communication credentials of the data transfer node, the method further comprises:
and when the transmission condition of the decrypted encrypted vehicle service data at the data transmission node is met, sending the decrypted encrypted vehicle service data to the next data transmission node.
6. The method of claim 5, further comprising:
receiving a data transmission key of the data transmission node;
the obtaining of the decrypted encrypted vehicle service data and the communication certificate of the data transmission node includes:
and decrypting the encrypted vehicle service data by using the data transmission key of the data transmission node to obtain the decrypted encrypted vehicle service data and the communication certificate of the data transmission node.
7. The method of claim 5, wherein obtaining the decrypted encrypted vehicle service data and the communication credentials of the data transfer node comprises:
sending the encrypted vehicle service data to a decryption module;
and receiving the decrypted encrypted vehicle service data and the communication certificate of the data transmission node, which are sent by the decryption module.
8. A data encryption device applied to a target vehicle, comprising:
an acquisition module for acquiring vehicle service data of the target vehicle;
the acquisition module is also used for acquiring N data transmission nodes for transmitting the vehicle service data, wherein N is more than or equal to 2;
the encryption module is used for encrypting the N-nth encrypted vehicle service data by using a data transmission key of an nth data transmission node to obtain the N-nth +1 encrypted vehicle service data, wherein N is more than or equal to N and is more than or equal to 1, the nth data transmission node is the data transmission node of the nth data transmission node in the transmission sequence, the transmission sequence is the sequence of the N data transmission nodes for transmitting the vehicle service data, and the 0 th encrypted vehicle service data is the vehicle service data;
the sending module is used for sending the N encrypted vehicle service data to the 1 st data transmission node, wherein the N encrypted vehicle service data is obtained by encrypting the N-1 encrypted vehicle service data by using the data transmission key of the 1 st data transmission node.
9. The data encryption device according to claim 8, wherein the encryption module is specifically configured to encrypt the N-th encrypted vehicle service data and the communication credential of the nth data transmission node by using the data transmission key of the nth data transmission node to obtain the N-N +1 encrypted vehicle service data, wherein the communication credential of the nth data transmission node indicates the transmission condition of the N-th encrypted vehicle service data at the nth data transmission node.
10. The data encryption device according to claim 8 or 9, wherein when N is equal to N, the nth data transmission node is a vehicle outside transmission node;
the 1 st data transmission node is a vehicle interior transmission node.
11. A data transmission apparatus, the data transmission apparatus being applied to a data transmission node, comprising:
a receiving module for receiving encrypted vehicle service data;
the obtaining module is configured to obtain the decrypted encrypted vehicle service data, where the decrypted encrypted vehicle service data is obtained by decrypting the encrypted vehicle service data using the data transmission key of the data transmission node, and the decrypted encrypted vehicle service data is data encrypted using the data transmission key of the next data transmission node.
12. The data transmission apparatus of claim 11, wherein the data transmission apparatus further comprises a sending module;
the obtaining module is specifically configured to obtain the decrypted encrypted vehicle service data and a communication credential of a data transmission node, where the decrypted encrypted vehicle service data and the communication credential of the data transmission node are obtained by decrypting the encrypted vehicle service data using a data transmission key of the data transmission node, and the communication credential of the data transmission node indicates a transmission condition of the decrypted encrypted vehicle service data at the data transmission node;
the sending module is configured to send the decrypted encrypted vehicle service data to the next data transmission node when the transmission condition of the decrypted encrypted vehicle service data at the data transmission node is met after the obtaining module obtains the decrypted encrypted vehicle service data and the communication credential of the data transmission node.
13. The data transmission apparatus according to claim 12, wherein the receiving module is further configured to receive a data transmission key of the data transmission node;
the obtaining module is specifically configured to decrypt the encrypted vehicle service data using the data transmission key of the data transmission node to obtain the decrypted encrypted vehicle service data and the communication credential of the data transmission node.
14. The data transmission device according to claim 12, wherein the obtaining module is configured to send the encrypted vehicle service data to a decryption module;
and receiving the decrypted encrypted vehicle service data and the communication certificate of the data transmission node, which are sent by the decryption module.
15. A data processing apparatus, characterized by comprising:
the system comprises a processor, a memory and an input/output interface;
the processor is coupled with the memory and the input-output interface;
the processor performs the method of any of claims 1 to 3 by executing code in the memory, or performs the method of any of claims 4 to 7.
16. A chip comprising at least one processor communicatively coupled to at least one memory, the at least one memory having instructions stored therein; the instructions are for execution by the at least one processor to perform the method of any one of claims 1 to 3, or to perform the method of any one of claims 4 to 7.
17. A computer-readable storage medium having stored therein instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 3 or perform the method of any one of claims 4 to 7.
CN202180000112.5A 2021-01-20 2021-01-20 Data encryption method, data transmission method, related device and equipment Pending CN115088232A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/072808 WO2022155803A1 (en) 2021-01-20 2021-01-20 Data encryption method, data transmission method, related apparatuses and device

Publications (1)

Publication Number Publication Date
CN115088232A true CN115088232A (en) 2022-09-20

Family

ID=82548473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202180000112.5A Pending CN115088232A (en) 2021-01-20 2021-01-20 Data encryption method, data transmission method, related device and equipment

Country Status (2)

Country Link
CN (1) CN115088232A (en)
WO (1) WO2022155803A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116248711B (en) * 2022-12-19 2024-01-30 中电车联信安科技有限公司 Network security system based on Internet of vehicles gateway
CN116049910A (en) * 2023-02-01 2023-05-02 广东高云半导体科技股份有限公司 Data encryption system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120166582A1 (en) * 2010-12-22 2012-06-28 May Patents Ltd System and method for routing-based internet security
CN106254425A (en) * 2016-07-22 2016-12-21 北京京东尚科信息技术有限公司 For mobile device to high in the clouds the transmission method and system of data, mobile terminal
CN111343207A (en) * 2020-05-19 2020-06-26 北京华云安信息技术有限公司 Multi-node joint encryption data transmission method, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6986036B2 (en) * 2002-03-20 2006-01-10 Microsoft Corporation System and method for protecting privacy and anonymity of parties of network communications
CN100370724C (en) * 2004-03-22 2008-02-20 西安电子科技大学 Anonymous connection method of broadband radio IP network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120166582A1 (en) * 2010-12-22 2012-06-28 May Patents Ltd System and method for routing-based internet security
CN106254425A (en) * 2016-07-22 2016-12-21 北京京东尚科信息技术有限公司 For mobile device to high in the clouds the transmission method and system of data, mobile terminal
CN111343207A (en) * 2020-05-19 2020-06-26 北京华云安信息技术有限公司 Multi-node joint encryption data transmission method, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RONGXING LU 等: "《5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy》", 《PROCEEDINGS OF THE IEEE》 *

Also Published As

Publication number Publication date
WO2022155803A1 (en) 2022-07-28

Similar Documents

Publication Publication Date Title
Lam et al. ANT-centric IoT security reference architecture—Security-by-design for satellite-enabled smart cities
US20190034936A1 (en) Approving Transactions from Electronic Wallet Shares
EP3403246B1 (en) A device and method for collecting user-based insurance data in vehicles
JP5783103B2 (en) VEHICLE DATA COMMUNICATION SYSTEM AND VEHICLE DATA COMMUNICATION DEVICE
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN108632250B (en) Method and equipment for generating command control session master key and transmitting operation command
KR102450811B1 (en) System for key control for in-vehicle network
US9307403B2 (en) System and method for NFC peer-to-peer authentication and secure data transfer
CN113016201B (en) Key provisioning method and related product
CN115088232A (en) Data encryption method, data transmission method, related device and equipment
CN105635131A (en) Data transmission method and device and server
CN110446075A (en) Encryption method and device, decryption method and device, electronic equipment
US11128455B2 (en) Data encryption method and system using device authentication key
CN113438205B (en) Block chain data access control method, node and system
CN111181944A (en) Communication system, information distribution method, device, medium, and apparatus
WO2019069308A1 (en) System and method for validation of authenticity of communication at in-vehicle networks
US11362823B2 (en) Cryptographic device
KR102377045B1 (en) SYSTEMS AND METHODS FOR AUTHENTICATING IoT DEVICE THROUGH CLOUD USING HARDWARE SECURITY MODULE
CN113961931A (en) Adb tool using method and device and electronic equipment
CN114036232A (en) Block chain data processing method, device, storage medium, node and system
US10764285B2 (en) Method and system for encryption using a radio frequency fingerprint
Mansor Security and privacy aspects of automotive systems
AU2019238635A1 (en) Method and terminal for establishing security infrastructure and device
CN104580181A (en) Device and method for data encryption and encryption accelerator engine
CN116561820B (en) Trusted data processing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220920