CN101739736A - Vehicle which can be monitored remotely - Google Patents

Vehicle which can be monitored remotely Download PDF

Info

Publication number
CN101739736A
CN101739736A CN 200910241830 CN200910241830A CN101739736A CN 101739736 A CN101739736 A CN 101739736A CN 200910241830 CN200910241830 CN 200910241830 CN 200910241830 A CN200910241830 A CN 200910241830A CN 101739736 A CN101739736 A CN 101739736A
Authority
CN
China
Prior art keywords
wireless monitor
random number
monitor controller
controller
service center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200910241830
Other languages
Chinese (zh)
Other versions
CN101739736B (en
Inventor
王景鹏
李昱
于铭汉
杜晓佳
李峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beiqi Foton Motor Co Ltd
Original Assignee
Beiqi Foton Motor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beiqi Foton Motor Co Ltd filed Critical Beiqi Foton Motor Co Ltd
Priority to CN 200910241830 priority Critical patent/CN101739736B/en
Publication of CN101739736A publication Critical patent/CN101739736A/en
Application granted granted Critical
Publication of CN101739736B publication Critical patent/CN101739736B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention provides a vehicle which can be monitored remotely, comprising a wireless monitoring controller (100) and an engine controller (200). The wireless monitoring controller (100) can be connected with a remote service center (300), and the remote service center (300) can change the wireless monitoring controller (100) authorization state so that the unauthorized wireless monitoring controller (100) can not be verified by the engine controller (200); the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying that whether the wireless monitoring controller (100) is authorized by the remote service center (300) before an engine is started; and the engine is allowed to be started after the wireless monitoring controller (100) is verified. The wireless monitoring controller can be verified by the engine controller, and the engine is not allowed to be started before the wireless monitoring controller is verified, therefore, the forcible dismounting of the wireless monitoring controller by the consumer can be prevented effectively.

Description

A kind of vehicle that can remote monitoring
Technical field
The present invention relates to vehicle remote monitoring field, and relate in particular to a kind of vehicle that can remote monitoring.
Background technology
Along with the development of automotive engineering and the raising of living standards of the people, the people who buys automobile is more and more, and Payment Methods are also more and more flexible, to satisfy the consumer demand with different purchasing power.A kind of Payment Methods of wherein being sampled are monthly payment plan; for the vehicle that adopts buy in instalments; seller can be installed a wireless monitor controller usually on vehicle; this wireless monitor controller can carry out telecommunication with the remote service center of seller; so that seller can not paid under the situation of account receivable under forward contracts the consumer on time; vehicle is controlled, thereby forced consumer's payment.
For preventing that some consumer from removing the wireless monitor controller, escape the monitoring of seller, the wireless monitor controller need possess anti-dismounting function, yet realizes that at present this function all just by some locking instruments, can't prevent that like this consumer from adopting violent means to remove.
Summary of the invention
Can be removed by consumer's violence and cause seller to lose the defective of monitoring for overcoming wireless monitor controller in the prior art, spy of the present invention provides a kind of vehicle that can remote monitoring, and this vehicle can prevent effectively that the wireless monitor controller is removed.
Vehicle that can remote monitoring provided by the invention comprises wireless monitor controller and engine controller, described wireless monitor controller can with the remote service center wireless connections, this remote service center can change the licensing status of described wireless monitor controller, so that this wireless monitor controller can't be by the checking of described engine controller under uncommitted situation; Described engine controller links to each other with described wireless monitor controller, whether is used for verifying earlier described wireless monitor controller through the remote service center mandate before starting engine, and just allows starting engine under the situation that checking is passed through.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller checking wireless monitor controller, and be not verified under the situation about passing through at the wireless monitor controller and stop engine start, thereby prevent that effectively the consumer from removing the wireless monitor controller by force.
Description of drawings
Fig. 1 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center;
Fig. 2 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center; And
Fig. 3 is the process flow diagram of the ciphering process of vehicle that can remote monitoring provided by the invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing.
As shown in Figure 1, the invention provides a kind of vehicle 400 that can remote monitoring, this vehicle 400 comprises: wireless monitor controller 100 and engine controller 200, described wireless monitor controller 100 can with remote service center 300 wireless connections, this remote service center 300 can change the licensing status of described wireless monitor controller 100, so that this wireless monitor controller 100 can't be by the checking of described engine controller 200 under uncommitted situation; Described engine controller 200 (for example links to each other with described wireless monitor controller 100, by the CAN bus), whether be used for before starting engine the described wireless monitor controller 100 of checking earlier authorizes through remote service center 300, and just allow starting engine under the situation that checking is passed through.
Wherein, described remote service center 300 can be the consumer under the situation of timely payment account receivable under forward contracts, change the state of described wireless monitor controller 100, for example, shield the cryptographic algorithm of communicating by letter, change this wireless monitor controller 100 between this wireless monitor controller 100 and the engine controller 200, encryption key or the like, so that this wireless monitor controller 100 can't be by the checking of engine controller 200, thereby the prevention engine start forces the consumer to pay seller with account receivable under forward contracts.
Preferably, as shown in Figure 2, described wireless monitor controller 100 can comprise GPS module 110.Wireless monitor controller 100 can be in response to the request of described remote service center 300, obtain vehicle position information by GPS module 110, and this information is sent to described remote service center 300, so that the current location of vehicle is in time known by dealer, and can force the consumer to pay account receivable under forward contracts at consumer's this vehicle of interception under the situation of timely payment account receivable under forward contracts not.
Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilize the encryption key and the cryptographic algorithm of being stored in the described wireless monitor controller 100 that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and utilize the encryption key and the cryptographic algorithm of being stored in this engine controller 200 that the random number that is received is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that is received are compared, whether authorize to verify described wireless monitor controller 100 through remote service center 300, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can be by changing the licensing status that described cryptographic algorithm or encryption key change wireless monitor controller 100.
At this, described cryptographic algorithm can adopt various cryptographic algorithm such as DES, 3DES or IDEA.Preferably, described wireless monitor controller 100 and described engine controller 200 utilize encryption key and cryptographic algorithm that described random number is encrypted to comprise: step 1): described random number is divided into a plurality of parts; Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys; Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted; Step 4): utilize next group sub-key that last one group of sub-key is encrypted result afterwards and encrypt; And step 5): repeating step 4), the result after obtaining last group key encryption, this result is encrypted ones.
Wherein, described random number can generate according to vehicle position information, also can be generated by other random number generating algorithms.Described encryption key and cryptographic algorithm all (for example, can be cured by vehicle manufacturers) in described wireless monitor controller 100 and engine controller 200.
For symmetric encipherment algorithm, the encryption key and the cryptographic algorithm of storing in encryption key and the cryptographic algorithm of storage and the described engine controller 200 in the described wireless monitor controller 100 are identical.
For rivest, shamir, adelman, described wireless monitor controller and engine controller 200 can be stored private key and PKI respectively.Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilizes private key that this random number is encrypted, and obtains encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and to utilizing PKI that the encrypted ones that is received is decrypted, obtain another random number, and this another random number and the random number that received compared, whether authorize to verify described wireless monitor controller 100 through remote service center 300, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can be by changing the licensing status that described private key changes wireless monitor controller 100.
Describe ciphering process of the present invention in detail below with reference to accompanying drawing 3.
Whole ciphering process comprises three parts: random number generative process, encryption key generative process and ciphering process.Below these three ones are introduced one by one.
The random number generative process
Longitude information that GPS module 110 sends and latitude information are that the form with 16 of double words sends, the integer-bit of most-significant byte degree of being and branch, least-significant byte be branchs the radix point position and second information.At this, as s1, the least-significant byte of latitude information is as s2 with the least-significant byte of longitude information.Suppose that the source random number is S, then can obtain 16 potential source random number: S=s1s2;
Afterwards, source random number S is divided into eight groups of 2 every group, i.e. x1, x2, x3, x4, x5, x6, x7, x8, and these 8 groups of numbers are carried out linear congruence handle:
Xn=(1025xn+1)mod(2^15)
84 16 systems that obtain are counted Xn, these 84 16 systems are counted Xn carry out following arrangement (wherein, n=1~8):
{X1X2X3X4X5X6X7X8?X5X2X7X1X8X4X3X6}
Obtain one 64 random number thus.
The encryption key generative process
With 6 decimal system car load passwords, (this car load password is provided by depot, for example can be the VIN sign indicating number of each car of unique identification) is designated as a.With this six figure places decimal system password square, a^2, its scope was 9 16 system numbers when a^2 was converted to 16 systems and counts, the scope of 16 system numbers after this conversion is as follows:
(100000)^2=2540B?E400<=a^2<=(999999)^2=E?8DB6?8B81
Get a^2 low eight of 16 systems, both obtained one 32 basic key, with this basic key be divided into eight groups (that is, and c1c2c3c4c5c6c7c8), 4 every group.These eight groups of numbers are carried out computing according to the following rules:
b1=(1025c1+1)mod(2^15)
b2=(1025c2+1)mod(2^15)
b3=(1025c3+1)mod(2^15)
b4=(1025c4+1)mod(2^15)
b5=(1025c5+1)mod(2^15)
b6=(1025c6+1)mod(2^15)
b7=(1025c7+1)mod(2^15)
b8=(1025c8+1)mod(2^15)
Wherein, bn is 4 16 system numbers, is total to 16bit, n=1~8.
If encryption key is B, B=b1b2b3b4b5b6b7b8 can get the encryption key of 128bit thus.
Ciphering process
Whole encryption comprises that 9 take turns iteration, and wherein every wheel of 1-8 wheel used 6 sub-keys, and the 9th takes turns 4 sub-keys of use, needs to use 52 sub-keys altogether.Ciphering process comprises: sub-key generates step, random number partiting step and encrypting step.
(1) Sub-key generates step
The 128 bit encryption key lists that generated in the above-mentioned encryption key generative process are shown k, and k=k1k2...k128 is divided into 8 sub-keys, and 16 of each sub-keys are followed successively by:
Z 1 (1)=k1k2...k16
Z 2 (1)=k17k18...k32
...
Z 5 (1)=k65k66...k80
Z 6 (1)=k81k82...k96
Z 1 (2)=k97k98...k112
Z 2 (2)=k113k114...k128
Wherein, Z i (n)Represent i sub-key in the n wheel iteration, i=1~6, n=1~9.Z 1 (1)~Z 6 (1)As 6 sub-keys of the first round, remaining Z 1 (2), Z 2 (2)As second sub-key of taking turns.
Afterwards, with k 25 of rotation displacements left:
k′=k26k27...k128k1k2...k25
Be divided into 8 sub-keys equally, preceding 4 Z 3 (2), Z 4 (2), Z 5 (2), Z 6 (2)Just in time divide formed Z with the last time 1 (2), Z 2 (2)Constitute second sub-key of taking turns together, back 4 sub-keys as third round.
Continue left 25 of rotation displacements afterwards, generate remaining sub-key, up to 52 sub-keys generate finish till.
(2) The random number partiting step
64 random numbers that generated in the above-mentioned random number generative process are divided into four groups, 16 every group.
If D is 64 random numbers receiving, then:
D 1=d1d2d3d4d5d6d7d8d9d10d11d12d13d14d15d16
D 2=d17d18d19d20d21d22d23d24d25d26d27d28d29d30d31d32
D 3=d33d34d35d36d37d38d39d40d41d42d43d44d45d46d47d48
D 4=d49d50d51d52d53d54d55d56d57d58d59d60d61d62d63d64
This sub-piece D of four 16 1, D 2, D 3, D 4Import as the iteration first round.
(3) Encrypting step
Fig. 3 shows the detailed process of whole encrypting step, wherein,
Figure G2009102418302D00071
Represent the sub-interblock of 16bit to make XOR by turn;
On behalf of the integer of 16bit, ⊙ do the multiplying of mod (2^16+1);
Figure G2009102418302D00072
Represent the integer of 16bit to do the additive operation of mod (2^16);
Figure G2009102418302D00073
Represent the operation result of each corresponding step;
1. represent D 1With the first round the 1st sub-key Z 1 (1)Make the result of multiplying;
2. represent D 2With the first round the 2nd sub-key Z 2 (1)Make the result of additive operation;
3. represent D 3With the first round the 3rd sub-key Z 3 (1)Make the result of additive operation;
4. represent D 4With the first round the 4th sub-key Z 4 (1)Make the result of multiplying;
5. 1. and 3. representative makes the result of XOR;
6. 2. and 4. representative makes the result of XOR;
7. the representative 5. with the first round the 5th sub-key Z 5 (1)Make the result of multiplying;
8. 6. and 7. representative makes the result of additive operation;
9. the representative 8. with the first round the 6th sub-key Z 6 (1)Make the result of multiplying;
10. 7. and 9. representative makes the result of additive operation;
Figure G2009102418302D00081
1. and 9. representative makes the result of multiplying;
Figure G2009102418302D00082
3. and 9. representative makes the result of XOR;
Figure G2009102418302D00083
2. and 10. representative makes the result of XOR;
Figure G2009102418302D00084
4. and 10. representative makes the result of XOR.
Wherein,
Figure G2009102418302D00085
Input as next round repeats said process.Except that last takes turns (the 9th takes turns), from last round of when transitting to next round, the 2nd and the 3rd exchange mutually.
The 8th take turns end after, suppose output the result be
Figure G2009102418302D00086
Then last output result who takes turns is as follows:
With the 9th take turns the 1st sub-key piece Z 1 (9)Make the result of multiplying;
Figure G2009102418302D00088
With the 9th take turns the 2nd sub-key piece Z 2 (9)Make the result of additive operation;
Figure G2009102418302D00089
With the 9th take turns the 3rd sub-key piece Z 3 (9)Make the result of additive operation; And
With the 9th take turns the 4th sub-key piece Z 4 (9)Make the result of multiplying.
This result can (not need exchange at this moment) in order and is combined into encrypted ones between the 2nd and the 3rd.
More than described ciphering process provided by the present invention, yet the present invention is not limited to this, also can uses other random digit generation method, encryption key generation method and cryptographic algorithm.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller 200 checking wireless monitor controllers 100, and be not verified under the situation about passing through at wireless monitor controller 100 and stop engine start, thereby prevent that effectively the consumer from removing wireless monitor controller 100 by force.And seller can be the consumer under the situation of timely payment account receivable under forward contracts, the vehicle position information interception car that stops engine start or can receive according to remote service center 300, thus force the consumer to pay account receivable under forward contracts.

Claims (8)

  1. One kind can remote monitoring vehicle, this vehicle comprises wireless monitor controller (100) and engine controller (200),
    Described wireless monitor controller (100) can with remote service center (300) wireless connections, this remote service center (300) can change the licensing status of described wireless monitor controller (100), so that this wireless monitor controller (100) can't be by the checking of described engine controller (200) under uncommitted situation;
    Described engine controller (200) links to each other with described wireless monitor controller (100), whether be used for before starting engine, verifying earlier described wireless monitor controller (100) through remote service center (300) mandate, and under the situation that checking is passed through, just allow starting engine.
  2. 2. vehicle according to claim 1, wherein, described wireless monitor controller (100) comprises GPS module (110), described wireless monitor controller (100) is in response to the request of described remote service center (300), obtain vehicle position information by described GPS module (110), and this vehicle position information is sent to described remote service center (300).
  3. 3. vehicle according to claim 1, wherein,
    Described wireless monitor controller (100) generates random number, utilize the encryption key and the cryptographic algorithm of being stored in the described wireless monitor controller (100) that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller (200); And
    Described engine controller (200) receives described random number and encrypted ones, and utilize the encryption key and the cryptographic algorithm of being stored in the described engine controller (200) that the random number that is received is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that is received are compared, if both are identical, show that then described wireless monitor controller (100) authorizes through remote service center (300), otherwise show that described wireless monitor controller (100) authorizes without remote service center (300).
  4. 4. vehicle according to claim 3, wherein, the licensing status that described remote service center (300) changes described wireless monitor controller (100) comprises: change cryptographic algorithm or the encryption key stored in the described wireless monitor controller (100).
  5. 5. vehicle according to claim 3, wherein, described wireless monitor controller (100) or described engine controller (200) utilize encryption key and cryptographic algorithm that random number is encrypted to comprise:
    Step 1): described random number is divided into a plurality of parts;
    Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys;
    Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted;
    Step 4): utilize next group sub-key that last one group of sub-key is encrypted result afterwards and encrypt; And
    Step 5): repeating step 4), the result after obtaining last group key encryption, this result is encrypted ones.
  6. 6. vehicle according to claim 1, wherein,
    Described wireless monitor controller (100) generates random number, utilizes the private key of storage in the described wireless monitor controller (100) that this random number is encrypted, and obtains encrypted ones, and described random number and encrypted ones are sent to engine controller (200); And
    Described engine controller (200) receives described random number and encrypted ones, and to utilizing the PKI of storing in the engine controller (200) that the encrypted ones that is received is decrypted, obtain another random number, and this another random number and the random number that received compared, if both are identical, show that then described wireless monitor controller (100) authorizes through remote service center (300), otherwise show that described wireless monitor controller (100) authorizes without remote service center (300).
  7. 7. vehicle according to claim 6, wherein, the licensing status that described remote service center (300) changes described wireless monitor controller (100) comprises: the private key that changes storage in the described wireless monitor controller (100).
  8. 8. according to each described vehicle among the claim 3-7, wherein, described random number generates according to vehicle position information.
CN 200910241830 2009-12-09 2009-12-09 Vehicle which can be monitored remotely Active CN101739736B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910241830 CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910241830 CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Publications (2)

Publication Number Publication Date
CN101739736A true CN101739736A (en) 2010-06-16
CN101739736B CN101739736B (en) 2013-10-16

Family

ID=42463182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910241830 Active CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Country Status (1)

Country Link
CN (1) CN101739736B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637312A (en) * 2012-03-29 2012-08-15 中联重科股份有限公司 Unlocking treatment method, device and system for engineering machine
CN103465866A (en) * 2013-09-25 2013-12-25 北京汽车股份有限公司 Vehicle starting control method, vehicle starting control device and vehicle
CN103625427A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile door opening and closing automatic control method and system based on satellite locating technology
CN103625426A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile start control system and method based on locating technology
CN105245406A (en) * 2015-11-02 2016-01-13 厦门雅迅网络股份有限公司 Method for preventing in-car terminal from being detached
CN105357181A (en) * 2015-09-29 2016-02-24 广东顺德中山大学卡内基梅隆大学国际联合研究院 Method for monitoring Wi-Fi label through multiple terminals
CN105721149A (en) * 2016-04-25 2016-06-29 北汽福田汽车股份有限公司 Internet of vehicles system session key generation method and vehicular terminal and ECU binding method
CN106707817A (en) * 2016-12-30 2017-05-24 上海华兴数字科技有限公司 Dynamic matching anti-dismantle method and excavator
CN109215164A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
CN111970317A (en) * 2020-04-28 2020-11-20 浙江吉利汽车研究院有限公司 Remote control method, storage medium, and remote control system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6025774A (en) * 1998-06-24 2000-02-15 Forbes; Mark P. Method for retrieving vehicular collateral
US6195648B1 (en) * 1999-08-10 2001-02-27 Frank Simon Loan repay enforcement system
US20050162016A1 (en) * 2003-10-15 2005-07-28 Payment Protection Systems, Inc. Vehicle disablement system user interface
JP4598567B2 (en) * 2005-03-07 2010-12-15 本田技研工業株式会社 Vehicle anti-theft system
CN1919666A (en) * 2005-08-26 2007-02-28 刘立平 Money-supply prompting method and system for automobile

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637312A (en) * 2012-03-29 2012-08-15 中联重科股份有限公司 Unlocking treatment method, device and system for engineering machine
CN102637312B (en) * 2012-03-29 2015-03-11 中联重科股份有限公司 Unlocking treatment method, device and system for engineering machine
CN103465866A (en) * 2013-09-25 2013-12-25 北京汽车股份有限公司 Vehicle starting control method, vehicle starting control device and vehicle
CN103625427A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile door opening and closing automatic control method and system based on satellite locating technology
CN103625426A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile start control system and method based on locating technology
CN105357181A (en) * 2015-09-29 2016-02-24 广东顺德中山大学卡内基梅隆大学国际联合研究院 Method for monitoring Wi-Fi label through multiple terminals
CN105357181B (en) * 2015-09-29 2018-06-12 广东顺德中山大学卡内基梅隆大学国际联合研究院 A kind of method of multiple terminals monitoring Wi-Fi labels
CN105245406A (en) * 2015-11-02 2016-01-13 厦门雅迅网络股份有限公司 Method for preventing in-car terminal from being detached
CN105721149A (en) * 2016-04-25 2016-06-29 北汽福田汽车股份有限公司 Internet of vehicles system session key generation method and vehicular terminal and ECU binding method
CN105721149B (en) * 2016-04-25 2019-02-26 北汽福田汽车股份有限公司 A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding
CN106707817A (en) * 2016-12-30 2017-05-24 上海华兴数字科技有限公司 Dynamic matching anti-dismantle method and excavator
CN109215164A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
US11005827B2 (en) 2017-07-04 2021-05-11 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for acquiring vehicular data
CN111970317A (en) * 2020-04-28 2020-11-20 浙江吉利汽车研究院有限公司 Remote control method, storage medium, and remote control system
CN111970317B (en) * 2020-04-28 2023-08-15 浙江吉利汽车研究院有限公司 Remote control method, storage medium and remote control system

Also Published As

Publication number Publication date
CN101739736B (en) 2013-10-16

Similar Documents

Publication Publication Date Title
CN101739736B (en) Vehicle which can be monitored remotely
CN102546155B (en) On-demand safe key generates method and system
CN100592686C (en) A secure validation method for car diagnosis communication
CN101149768B (en) Special processor software encryption and decryption method
WO2013179392A1 (en) Authentication system and authentication method
Abood et al. Investigation of cryptography algorithms used for security and privacy protection in smart grid
CN102725737A (en) V erifiable, leak-resistant encryption and decryption
CN109728899B (en) Pure electric vehicle authentication key safety management method and system
CN101925867B (en) Field device and method of operation thereof
CN110958219A (en) SM2 proxy re-encryption method and device for medical cloud shared data
CN109617675A (en) Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal
CN108717666A (en) Personalized vehicle insurance computational methods, system and terminal based on block chain
CN100353704C (en) Asymmetrical cryptographic communication method and portable object therefor
CN1427575A (en) Electronic cipher formation and checking method
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN101179375A (en) Chaos algorithm based network data encryption card
CN107733634A (en) A kind of lightweight chaos authentication encryption method based on displacement coupling
CN101883096B (en) Method, device and system for safely transferring data between electronic signature tools
CN113326530B (en) Key negotiation method suitable for key sharing of two communication parties
EP1156618B1 (en) Chaos cryptographic communication method and chaos cryptographic communication system
RU2503135C1 (en) Method for cryptographic transformation of information and apparatus for realising said method
CN1722656B (en) A digital signature method and digital signature tool
EP2104269A1 (en) An electronic control unit (ECU) and a method for verifying data integrity
JP2000047580A (en) Encipher converting device, decipher converting device, cryptographic communication equipment and automatic toll collecting device
CN113034276A (en) Block chain privacy transaction solution method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant