CN101739736A - Vehicle which can be monitored remotely - Google Patents
Vehicle which can be monitored remotely Download PDFInfo
- Publication number
- CN101739736A CN101739736A CN 200910241830 CN200910241830A CN101739736A CN 101739736 A CN101739736 A CN 101739736A CN 200910241830 CN200910241830 CN 200910241830 CN 200910241830 A CN200910241830 A CN 200910241830A CN 101739736 A CN101739736 A CN 101739736A
- Authority
- CN
- China
- Prior art keywords
- wireless monitor
- random number
- monitor controller
- controller
- service center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Lock And Its Accessories (AREA)
- Selective Calling Equipment (AREA)
Abstract
The invention provides a vehicle which can be monitored remotely, comprising a wireless monitoring controller (100) and an engine controller (200). The wireless monitoring controller (100) can be connected with a remote service center (300), and the remote service center (300) can change the wireless monitoring controller (100) authorization state so that the unauthorized wireless monitoring controller (100) can not be verified by the engine controller (200); the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying that whether the wireless monitoring controller (100) is authorized by the remote service center (300) before an engine is started; and the engine is allowed to be started after the wireless monitoring controller (100) is verified. The wireless monitoring controller can be verified by the engine controller, and the engine is not allowed to be started before the wireless monitoring controller is verified, therefore, the forcible dismounting of the wireless monitoring controller by the consumer can be prevented effectively.
Description
Technical field
The present invention relates to vehicle remote monitoring field, and relate in particular to a kind of vehicle that can remote monitoring.
Background technology
Along with the development of automotive engineering and the raising of living standards of the people, the people who buys automobile is more and more, and Payment Methods are also more and more flexible, to satisfy the consumer demand with different purchasing power.A kind of Payment Methods of wherein being sampled are monthly payment plan; for the vehicle that adopts buy in instalments; seller can be installed a wireless monitor controller usually on vehicle; this wireless monitor controller can carry out telecommunication with the remote service center of seller; so that seller can not paid under the situation of account receivable under forward contracts the consumer on time; vehicle is controlled, thereby forced consumer's payment.
For preventing that some consumer from removing the wireless monitor controller, escape the monitoring of seller, the wireless monitor controller need possess anti-dismounting function, yet realizes that at present this function all just by some locking instruments, can't prevent that like this consumer from adopting violent means to remove.
Summary of the invention
Can be removed by consumer's violence and cause seller to lose the defective of monitoring for overcoming wireless monitor controller in the prior art, spy of the present invention provides a kind of vehicle that can remote monitoring, and this vehicle can prevent effectively that the wireless monitor controller is removed.
Vehicle that can remote monitoring provided by the invention comprises wireless monitor controller and engine controller, described wireless monitor controller can with the remote service center wireless connections, this remote service center can change the licensing status of described wireless monitor controller, so that this wireless monitor controller can't be by the checking of described engine controller under uncommitted situation; Described engine controller links to each other with described wireless monitor controller, whether is used for verifying earlier described wireless monitor controller through the remote service center mandate before starting engine, and just allows starting engine under the situation that checking is passed through.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller checking wireless monitor controller, and be not verified under the situation about passing through at the wireless monitor controller and stop engine start, thereby prevent that effectively the consumer from removing the wireless monitor controller by force.
Description of drawings
Fig. 1 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center;
Fig. 2 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center; And
Fig. 3 is the process flow diagram of the ciphering process of vehicle that can remote monitoring provided by the invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing.
As shown in Figure 1, the invention provides a kind of vehicle 400 that can remote monitoring, this vehicle 400 comprises: wireless monitor controller 100 and engine controller 200, described wireless monitor controller 100 can with remote service center 300 wireless connections, this remote service center 300 can change the licensing status of described wireless monitor controller 100, so that this wireless monitor controller 100 can't be by the checking of described engine controller 200 under uncommitted situation; Described engine controller 200 (for example links to each other with described wireless monitor controller 100, by the CAN bus), whether be used for before starting engine the described wireless monitor controller 100 of checking earlier authorizes through remote service center 300, and just allow starting engine under the situation that checking is passed through.
Wherein, described remote service center 300 can be the consumer under the situation of timely payment account receivable under forward contracts, change the state of described wireless monitor controller 100, for example, shield the cryptographic algorithm of communicating by letter, change this wireless monitor controller 100 between this wireless monitor controller 100 and the engine controller 200, encryption key or the like, so that this wireless monitor controller 100 can't be by the checking of engine controller 200, thereby the prevention engine start forces the consumer to pay seller with account receivable under forward contracts.
Preferably, as shown in Figure 2, described wireless monitor controller 100 can comprise GPS module 110.Wireless monitor controller 100 can be in response to the request of described remote service center 300, obtain vehicle position information by GPS module 110, and this information is sent to described remote service center 300, so that the current location of vehicle is in time known by dealer, and can force the consumer to pay account receivable under forward contracts at consumer's this vehicle of interception under the situation of timely payment account receivable under forward contracts not.
Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilize the encryption key and the cryptographic algorithm of being stored in the described wireless monitor controller 100 that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and utilize the encryption key and the cryptographic algorithm of being stored in this engine controller 200 that the random number that is received is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that is received are compared, whether authorize to verify described wireless monitor controller 100 through remote service center 300, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can be by changing the licensing status that described cryptographic algorithm or encryption key change wireless monitor controller 100.
At this, described cryptographic algorithm can adopt various cryptographic algorithm such as DES, 3DES or IDEA.Preferably, described wireless monitor controller 100 and described engine controller 200 utilize encryption key and cryptographic algorithm that described random number is encrypted to comprise: step 1): described random number is divided into a plurality of parts; Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys; Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted; Step 4): utilize next group sub-key that last one group of sub-key is encrypted result afterwards and encrypt; And step 5): repeating step 4), the result after obtaining last group key encryption, this result is encrypted ones.
Wherein, described random number can generate according to vehicle position information, also can be generated by other random number generating algorithms.Described encryption key and cryptographic algorithm all (for example, can be cured by vehicle manufacturers) in described wireless monitor controller 100 and engine controller 200.
For symmetric encipherment algorithm, the encryption key and the cryptographic algorithm of storing in encryption key and the cryptographic algorithm of storage and the described engine controller 200 in the described wireless monitor controller 100 are identical.
For rivest, shamir, adelman, described wireless monitor controller and engine controller 200 can be stored private key and PKI respectively.Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilizes private key that this random number is encrypted, and obtains encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and to utilizing PKI that the encrypted ones that is received is decrypted, obtain another random number, and this another random number and the random number that received compared, whether authorize to verify described wireless monitor controller 100 through remote service center 300, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can be by changing the licensing status that described private key changes wireless monitor controller 100.
Describe ciphering process of the present invention in detail below with reference to accompanying drawing 3.
Whole ciphering process comprises three parts: random number generative process, encryption key generative process and ciphering process.Below these three ones are introduced one by one.
The random number generative process
Longitude information that GPS module 110 sends and latitude information are that the form with 16 of double words sends, the integer-bit of most-significant byte degree of being and branch, least-significant byte be branchs the radix point position and second information.At this, as s1, the least-significant byte of latitude information is as s2 with the least-significant byte of longitude information.Suppose that the source random number is S, then can obtain 16 potential source random number: S=s1s2;
Afterwards, source random number S is divided into eight groups of 2 every group, i.e. x1, x2, x3, x4, x5, x6, x7, x8, and these 8 groups of numbers are carried out linear congruence handle:
Xn=(1025xn+1)mod(2^15)
84 16 systems that obtain are counted Xn, these 84 16 systems are counted Xn carry out following arrangement (wherein, n=1~8):
{X1X2X3X4X5X6X7X8?X5X2X7X1X8X4X3X6}
Obtain one 64 random number thus.
The encryption key generative process
With 6 decimal system car load passwords, (this car load password is provided by depot, for example can be the VIN sign indicating number of each car of unique identification) is designated as a.With this six figure places decimal system password square, a^2, its scope was 9 16 system numbers when a^2 was converted to 16 systems and counts, the scope of 16 system numbers after this conversion is as follows:
(100000)^2=2540B?E400<=a^2<=(999999)^2=E?8DB6?8B81
Get a^2 low eight of 16 systems, both obtained one 32 basic key, with this basic key be divided into eight groups (that is, and c1c2c3c4c5c6c7c8), 4 every group.These eight groups of numbers are carried out computing according to the following rules:
b1=(1025c1+1)mod(2^15)
b2=(1025c2+1)mod(2^15)
b3=(1025c3+1)mod(2^15)
b4=(1025c4+1)mod(2^15)
b5=(1025c5+1)mod(2^15)
b6=(1025c6+1)mod(2^15)
b7=(1025c7+1)mod(2^15)
b8=(1025c8+1)mod(2^15)
Wherein, bn is 4 16 system numbers, is total to 16bit, n=1~8.
If encryption key is B, B=b1b2b3b4b5b6b7b8 can get the encryption key of 128bit thus.
Ciphering process
Whole encryption comprises that 9 take turns iteration, and wherein every wheel of 1-8 wheel used 6 sub-keys, and the 9th takes turns 4 sub-keys of use, needs to use 52 sub-keys altogether.Ciphering process comprises: sub-key generates step, random number partiting step and encrypting step.
(1)
Sub-key generates step
The 128 bit encryption key lists that generated in the above-mentioned encryption key generative process are shown k, and k=k1k2...k128 is divided into 8 sub-keys, and 16 of each sub-keys are followed successively by:
Z
1 (1)=k1k2...k16
Z
2 (1)=k17k18...k32
...
Z
5 (1)=k65k66...k80
Z
6 (1)=k81k82...k96
Z
1 (2)=k97k98...k112
Z
2 (2)=k113k114...k128
Wherein, Z
i (n)Represent i sub-key in the n wheel iteration, i=1~6, n=1~9.Z
1 (1)~Z
6 (1)As 6 sub-keys of the first round, remaining Z
1 (2), Z
2 (2)As second sub-key of taking turns.
Afterwards, with k 25 of rotation displacements left:
k′=k26k27...k128k1k2...k25
Be divided into 8 sub-keys equally, preceding 4 Z
3 (2), Z
4 (2), Z
5 (2), Z
6 (2)Just in time divide formed Z with the last time
1 (2), Z
2 (2)Constitute second sub-key of taking turns together, back 4 sub-keys as third round.
Continue left 25 of rotation displacements afterwards, generate remaining sub-key, up to 52 sub-keys generate finish till.
(2)
The random number partiting step
64 random numbers that generated in the above-mentioned random number generative process are divided into four groups, 16 every group.
If D is 64 random numbers receiving, then:
D
1=d1d2d3d4d5d6d7d8d9d10d11d12d13d14d15d16
D
2=d17d18d19d20d21d22d23d24d25d26d27d28d29d30d31d32
D
3=d33d34d35d36d37d38d39d40d41d42d43d44d45d46d47d48
D
4=d49d50d51d52d53d54d55d56d57d58d59d60d61d62d63d64
This sub-piece D of four 16
1, D
2, D
3, D
4Import as the iteration first round.
(3)
Encrypting step
Fig. 3 shows the detailed process of whole encrypting step, wherein,
On behalf of the integer of 16bit, ⊙ do the multiplying of mod (2^16+1);
1. represent D
1With the first round the 1st sub-key Z
1 (1)Make the result of multiplying;
2. represent D
2With the first round the 2nd sub-key Z
2 (1)Make the result of additive operation;
3. represent D
3With the first round the 3rd sub-key Z
3 (1)Make the result of additive operation;
4. represent D
4With the first round the 4th sub-key Z
4 (1)Make the result of multiplying;
5. 1. and 3. representative makes the result of XOR;
6. 2. and 4. representative makes the result of XOR;
7. the representative 5. with the first round the 5th sub-key Z
5 (1)Make the result of multiplying;
8. 6. and 7. representative makes the result of additive operation;
9. the representative 8. with the first round the 6th sub-key Z
6 (1)Make the result of multiplying;
10. 7. and 9. representative makes the result of additive operation;
Wherein,
Input as next round repeats said process.Except that last takes turns (the 9th takes turns), from last round of when transitting to next round, the 2nd and the 3rd exchange mutually.
The 8th take turns end after, suppose output the result be
Then last output result who takes turns is as follows:
With the 9th take turns the 1st sub-key piece Z
1 (9)Make the result of multiplying;
With the 9th take turns the 4th sub-key piece Z
4 (9)Make the result of multiplying.
This result can (not need exchange at this moment) in order and is combined into encrypted ones between the 2nd and the 3rd.
More than described ciphering process provided by the present invention, yet the present invention is not limited to this, also can uses other random digit generation method, encryption key generation method and cryptographic algorithm.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller 200 checking wireless monitor controllers 100, and be not verified under the situation about passing through at wireless monitor controller 100 and stop engine start, thereby prevent that effectively the consumer from removing wireless monitor controller 100 by force.And seller can be the consumer under the situation of timely payment account receivable under forward contracts, the vehicle position information interception car that stops engine start or can receive according to remote service center 300, thus force the consumer to pay account receivable under forward contracts.
Claims (8)
- One kind can remote monitoring vehicle, this vehicle comprises wireless monitor controller (100) and engine controller (200),Described wireless monitor controller (100) can with remote service center (300) wireless connections, this remote service center (300) can change the licensing status of described wireless monitor controller (100), so that this wireless monitor controller (100) can't be by the checking of described engine controller (200) under uncommitted situation;Described engine controller (200) links to each other with described wireless monitor controller (100), whether be used for before starting engine, verifying earlier described wireless monitor controller (100) through remote service center (300) mandate, and under the situation that checking is passed through, just allow starting engine.
- 2. vehicle according to claim 1, wherein, described wireless monitor controller (100) comprises GPS module (110), described wireless monitor controller (100) is in response to the request of described remote service center (300), obtain vehicle position information by described GPS module (110), and this vehicle position information is sent to described remote service center (300).
- 3. vehicle according to claim 1, wherein,Described wireless monitor controller (100) generates random number, utilize the encryption key and the cryptographic algorithm of being stored in the described wireless monitor controller (100) that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller (200); AndDescribed engine controller (200) receives described random number and encrypted ones, and utilize the encryption key and the cryptographic algorithm of being stored in the described engine controller (200) that the random number that is received is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that is received are compared, if both are identical, show that then described wireless monitor controller (100) authorizes through remote service center (300), otherwise show that described wireless monitor controller (100) authorizes without remote service center (300).
- 4. vehicle according to claim 3, wherein, the licensing status that described remote service center (300) changes described wireless monitor controller (100) comprises: change cryptographic algorithm or the encryption key stored in the described wireless monitor controller (100).
- 5. vehicle according to claim 3, wherein, described wireless monitor controller (100) or described engine controller (200) utilize encryption key and cryptographic algorithm that random number is encrypted to comprise:Step 1): described random number is divided into a plurality of parts;Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys;Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted;Step 4): utilize next group sub-key that last one group of sub-key is encrypted result afterwards and encrypt; AndStep 5): repeating step 4), the result after obtaining last group key encryption, this result is encrypted ones.
- 6. vehicle according to claim 1, wherein,Described wireless monitor controller (100) generates random number, utilizes the private key of storage in the described wireless monitor controller (100) that this random number is encrypted, and obtains encrypted ones, and described random number and encrypted ones are sent to engine controller (200); AndDescribed engine controller (200) receives described random number and encrypted ones, and to utilizing the PKI of storing in the engine controller (200) that the encrypted ones that is received is decrypted, obtain another random number, and this another random number and the random number that received compared, if both are identical, show that then described wireless monitor controller (100) authorizes through remote service center (300), otherwise show that described wireless monitor controller (100) authorizes without remote service center (300).
- 7. vehicle according to claim 6, wherein, the licensing status that described remote service center (300) changes described wireless monitor controller (100) comprises: the private key that changes storage in the described wireless monitor controller (100).
- 8. according to each described vehicle among the claim 3-7, wherein, described random number generates according to vehicle position information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910241830 CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910241830 CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101739736A true CN101739736A (en) | 2010-06-16 |
CN101739736B CN101739736B (en) | 2013-10-16 |
Family
ID=42463182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910241830 Active CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101739736B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102637312A (en) * | 2012-03-29 | 2012-08-15 | 中联重科股份有限公司 | Unlocking treatment method, device and system for engineering machine |
CN103465866A (en) * | 2013-09-25 | 2013-12-25 | 北京汽车股份有限公司 | Vehicle starting control method, vehicle starting control device and vehicle |
CN103625427A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile door opening and closing automatic control method and system based on satellite locating technology |
CN103625426A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile start control system and method based on locating technology |
CN105245406A (en) * | 2015-11-02 | 2016-01-13 | 厦门雅迅网络股份有限公司 | Method for preventing in-car terminal from being detached |
CN105357181A (en) * | 2015-09-29 | 2016-02-24 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Method for monitoring Wi-Fi label through multiple terminals |
CN105721149A (en) * | 2016-04-25 | 2016-06-29 | 北汽福田汽车股份有限公司 | Internet of vehicles system session key generation method and vehicular terminal and ECU binding method |
CN106707817A (en) * | 2016-12-30 | 2017-05-24 | 上海华兴数字科技有限公司 | Dynamic matching anti-dismantle method and excavator |
CN109215164A (en) * | 2017-07-04 | 2019-01-15 | 百度在线网络技术(北京)有限公司 | Travelling data acquisition methods and device |
CN111970317A (en) * | 2020-04-28 | 2020-11-20 | 浙江吉利汽车研究院有限公司 | Remote control method, storage medium, and remote control system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6025774A (en) * | 1998-06-24 | 2000-02-15 | Forbes; Mark P. | Method for retrieving vehicular collateral |
US6195648B1 (en) * | 1999-08-10 | 2001-02-27 | Frank Simon | Loan repay enforcement system |
US20050162016A1 (en) * | 2003-10-15 | 2005-07-28 | Payment Protection Systems, Inc. | Vehicle disablement system user interface |
JP4598567B2 (en) * | 2005-03-07 | 2010-12-15 | 本田技研工業株式会社 | Vehicle anti-theft system |
CN1919666A (en) * | 2005-08-26 | 2007-02-28 | 刘立平 | Money-supply prompting method and system for automobile |
-
2009
- 2009-12-09 CN CN 200910241830 patent/CN101739736B/en active Active
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102637312A (en) * | 2012-03-29 | 2012-08-15 | 中联重科股份有限公司 | Unlocking treatment method, device and system for engineering machine |
CN102637312B (en) * | 2012-03-29 | 2015-03-11 | 中联重科股份有限公司 | Unlocking treatment method, device and system for engineering machine |
CN103465866A (en) * | 2013-09-25 | 2013-12-25 | 北京汽车股份有限公司 | Vehicle starting control method, vehicle starting control device and vehicle |
CN103625427A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile door opening and closing automatic control method and system based on satellite locating technology |
CN103625426A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile start control system and method based on locating technology |
CN105357181A (en) * | 2015-09-29 | 2016-02-24 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Method for monitoring Wi-Fi label through multiple terminals |
CN105357181B (en) * | 2015-09-29 | 2018-06-12 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | A kind of method of multiple terminals monitoring Wi-Fi labels |
CN105245406A (en) * | 2015-11-02 | 2016-01-13 | 厦门雅迅网络股份有限公司 | Method for preventing in-car terminal from being detached |
CN105721149A (en) * | 2016-04-25 | 2016-06-29 | 北汽福田汽车股份有限公司 | Internet of vehicles system session key generation method and vehicular terminal and ECU binding method |
CN105721149B (en) * | 2016-04-25 | 2019-02-26 | 北汽福田汽车股份有限公司 | A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding |
CN106707817A (en) * | 2016-12-30 | 2017-05-24 | 上海华兴数字科技有限公司 | Dynamic matching anti-dismantle method and excavator |
CN109215164A (en) * | 2017-07-04 | 2019-01-15 | 百度在线网络技术(北京)有限公司 | Travelling data acquisition methods and device |
US11005827B2 (en) | 2017-07-04 | 2021-05-11 | Baidu Online Network Technology (Beijing) Co., Ltd. | Method and apparatus for acquiring vehicular data |
CN111970317A (en) * | 2020-04-28 | 2020-11-20 | 浙江吉利汽车研究院有限公司 | Remote control method, storage medium, and remote control system |
CN111970317B (en) * | 2020-04-28 | 2023-08-15 | 浙江吉利汽车研究院有限公司 | Remote control method, storage medium and remote control system |
Also Published As
Publication number | Publication date |
---|---|
CN101739736B (en) | 2013-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101739736B (en) | Vehicle which can be monitored remotely | |
CN102546155B (en) | On-demand safe key generates method and system | |
CN100592686C (en) | A secure validation method for car diagnosis communication | |
CN101149768B (en) | Special processor software encryption and decryption method | |
WO2013179392A1 (en) | Authentication system and authentication method | |
Abood et al. | Investigation of cryptography algorithms used for security and privacy protection in smart grid | |
CN102725737A (en) | V erifiable, leak-resistant encryption and decryption | |
CN109728899B (en) | Pure electric vehicle authentication key safety management method and system | |
CN101925867B (en) | Field device and method of operation thereof | |
CN110958219A (en) | SM2 proxy re-encryption method and device for medical cloud shared data | |
CN109617675A (en) | Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal | |
CN108717666A (en) | Personalized vehicle insurance computational methods, system and terminal based on block chain | |
CN100353704C (en) | Asymmetrical cryptographic communication method and portable object therefor | |
CN1427575A (en) | Electronic cipher formation and checking method | |
CN101582170B (en) | Remote sensing image encryption method based on elliptic curve cryptosystem | |
CN101179375A (en) | Chaos algorithm based network data encryption card | |
CN107733634A (en) | A kind of lightweight chaos authentication encryption method based on displacement coupling | |
CN101883096B (en) | Method, device and system for safely transferring data between electronic signature tools | |
CN113326530B (en) | Key negotiation method suitable for key sharing of two communication parties | |
EP1156618B1 (en) | Chaos cryptographic communication method and chaos cryptographic communication system | |
RU2503135C1 (en) | Method for cryptographic transformation of information and apparatus for realising said method | |
CN1722656B (en) | A digital signature method and digital signature tool | |
EP2104269A1 (en) | An electronic control unit (ECU) and a method for verifying data integrity | |
JP2000047580A (en) | Encipher converting device, decipher converting device, cryptographic communication equipment and automatic toll collecting device | |
CN113034276A (en) | Block chain privacy transaction solution method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |