CN102833250A - Security management method and system for vehicular mobile Internet - Google Patents
Security management method and system for vehicular mobile Internet Download PDFInfo
- Publication number
- CN102833250A CN102833250A CN2012103097211A CN201210309721A CN102833250A CN 102833250 A CN102833250 A CN 102833250A CN 2012103097211 A CN2012103097211 A CN 2012103097211A CN 201210309721 A CN201210309721 A CN 201210309721A CN 102833250 A CN102833250 A CN 102833250A
- Authority
- CN
- China
- Prior art keywords
- application
- service
- application program
- car
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a security management method and a system for the vehicular mobile Internet. When an application program accesses a vehicular terminal, the vehicular terminal judges the authorization of the application program. When the authorization of the application program is the runtime authorization of a local access, the application program directly accesses the vehicular terminal information. When the authorization of the application program is the remote authorization of a remote access, the vehicular terminal authenticates the access authority of the application program through a server side. If the authorization is passed, the application program accesses the vehicular terminal information. The server side provides register, application, safe key management and application audit service for application developers of a third party, and the application access authority of the third party is saved in the server side. Through the interaction of the vehicular terminal and the server side and the own management of the vehicular terminal, the method and the system adopt a high-efficiency authentication mechanism and an encryption communication mechanism, so that the safety management of vehicular application is easily realized, and the critical data of the vehicular terminal cannot be embezzled by illegal application. Thus, a car accesses the mobile Internet to share the convenience and fast of the network, and while the privacy data of users cannot be stolen.
Description
Technical field
The invention belongs to the vehicle-mounted interconnected security fields of moving, particularly a kind ofly be used for vehicle-mounted interconnected method for managing security and the system that move.
Background technology
The status of automobile intelligent terminal in following automobile industry is more and more important.Digitlization, informationization, networking are the inexorable trends of consumer automobile electronics technical development of 21 century.Mobile Internet is actual to be to combine traditional the Internet with mobile communication, and then also drives the fusion at portable terminal and PC, E-consumer terminal.The boundary of telecommunications, internet industry is fuzzy day by day, and following operator provides the integrated information service that integrates informationization, multimedia, amusement, ad content.
Under the fast development of mobile Internet, automobile moves and interconnectedly also will become new trend, and the vehicle intelligent terminal of networking will have more efficiently that information is obtained, function service more easily, abundanter third party use.Intelligent vehicle mounted terminal based on mobile Internet can be realized the information system management in people's car steering; As can show the vehicle dynamic running status in real time, exactly through the GIS platform; Comprise Vehicle Speed, mileage, ground of living in traffic; Also can show and use various information, comprise vehicle trouble, car owner's identity information etc. from vehicle self.But convenient, fast, the opening of vehicle intelligent terminal also make it be faced with important data security problem.Mobile Internet combines with car-mounted terminal, makes the positional information of automobile, the vehicle body state information, and occupant information is exposed in the network, is faced with various security threats constantly.Therefore; It is particularly important that the safety management of car-mounted terminal data seems; How under the environment of open network, guarantee that the car-mounted terminal critical data do not usurped by illegal application so that automobile insert move interconnected enjoy network conveniently simultaneously; The private data that ensures the user is not stolen, and becomes a thorny difficult problem.Simultaneously,, carry out authentication efficiently, become another difficult problem with minimal data flow cost because how the restriction of mobile internet sets up simple and high-efficient authentication mechanism and encryption communication mechanism.
Summary of the invention
The objective of the invention is to requirement to vehicle-mounted mobile interconnected high reliability, high security; Set up authentication mechanism and encryption communication mechanism efficiently; And, a kind of vehicle-mounted interconnected method for managing security and system that move that be used for proposed for local application, third party's application provide service.
To achieve these goals, technical scheme of the present invention is:
A kind ofly be used for the vehicle-mounted interconnected method for managing security that moves,
The authority of application access car-mounted terminal is stored to service end,
When the application access car-mounted terminal, car-mounted terminal is judged the purview certification of application program, and during purview certification, application program is directly visited car-mounted terminal information when application program is the operation of this accessing; When application program was remote access long-range purview certification, car-mounted terminal was through the access rights of server side authentication application program, and authentication is through application access car-mounted terminal information then.
During purview certification, application program is this accessing, does not promptly apply for the INTERNET access rights, can't diffusion of information be gone out through the mode of access internet, obtains important information and only need apply for that vehicle-mounted important information access rights get final product during operation;
In long-range purview certification, it is remote access that system determines application program, has promptly applied for the INTERNET access rights, can pass through the access internet sharing information, has the illegal risk of revealing of important information.This moment, application program must just can continue to obtain vehicle-mounted important information through the purview certification of service end.
Carry out in the process of rights management in application programs; Said service end provides registration service, uses application service, the security key management service, uses the audit service to third party's application developer, and the authority that third party's application developer is visited car-mounted terminal is stored to service end;
Said registration service is that service end allows the developer to register the account number cipher of oneself; So that carry out follow-up application application and key management;
Said application application service is the authority that service end allows the developer to apply for application program according to the own number of the account of registering and password, and the registration service of third party's application developer is provided; Make things convenient for the service end can the unified management developer and the safety and the purview certification management of institute's Application and Development;
Said security key management service is that service end allows the developer that its key is managed, and prevents the safety problem that causes because of problems such as key leakage midway, losses;
Said application audit service is that service end allows the keeper that third party's application is examined.
Using the audit service also is last one safety guarantee for the user provides first road; Allow the keeper that the third party is used and examine, have only third party through audit to use and could pass through purview certification, visit the vehicle body sensitive information; Find that when midway this third party uses to onboard system, when user profile has threat; Can use this third party at once and forbid, prevent that it from causing further infringement to user etc., guarantees user information safety.
Said car-mounted terminal contains the authority buffer memory that is useful on the long-range authority of buffer memory.The authority buffer memory has significantly reduced the time and the data traffic thereof of purview certification, has accelerated the efficient of application authorization.
When said application program is remote access long-range purview certification; Car-mounted terminal is through the access rights of server side authentication application program; When carrying out communication, authority is encrypted, transmit as data format with JSON through the mode that asymmetric encryption and symmetric cryptography combine with service end.Crucial sensitive information to authority is encrypted, and the reliability of guarantee information prevents that the authentication privacy information from being stolen midway, has good autgmentability and fail safe, makes verification process succinctly efficient.
A kind ofly be applied to the vehicle-mounted management system that moves interconnected method for managing security, comprise the purview certification module that is used for purview certification,
Said purview certification module comprises when being used for the application access car-mounted terminal; The purview certification module was when being used for the application access car-mounted terminal when car-mounted terminal was judged application program for the operation of this accessing, and car-mounted terminal judges that application program is remote access long-range purview certification module.
Said management system also comprises and is used for data management module that third party's application developer is managed; Said data management module comprises the registration service module that is used for developer's register account number password, be used for the developer applies for the authority of application program according to the account number cipher of registration, provide the registration service of third party's application developer application application service module, be used for the security key management service module that the developer manages key and be used for the keeper third party being used the application audit service module of examining.
Said purview certification module also comprises the authority cache module that is used for the long-range purview certification of buffer memory.
Said long-range purview certification module combines through asymmetric encryption and symmetric cryptography and the data format mode of JSON is carried out communication.
Said registration service module, application application service module, security key management service module and application audit service module adopt the HTTPS agreement that the data of transmitting are encrypted.Prevent that this important information from being stolen midway in network environment, cause inestimable infringement, it is safe and reliable that guarantee information is transmitted.
The management of the mutual and car-mounted terminal self through car-mounted terminal and service end; Adopt authentication mechanism and encryption communication mechanism efficiently; Easily realize the safety management of vehicular applications; Assurance car-mounted terminal critical data is not usurped by illegal application, so that insert the conveniently while of moving interconnected enjoy network at automobile, ensures that user's private data is not stolen.
Description of drawings
Fig. 1 is security gateway system figure of the present invention;
Fig. 2 is purview certification module frame figure of the present invention;
Fig. 3 is a data management module frame diagram of the present invention;
Purview certification module frame figure when Fig. 4 is operation of the present invention;
Fig. 5 is long-range purview certification module frame figure of the present invention;
Fig. 6 is a data management module sketch map of the present invention.
Embodiment
Like Fig. 1,2, shown in 3, the application access car-mounted terminal, car-mounted terminal is judged the access rights of application program; If promptly do not apply for the INTERNET access rights for this accessing; Be the not situation of access internet, can use vehicle-mounted important information this moment, and other information of level is used during in order to operation; Car-mounted terminal user's important information can not utilized by illegal through this visit of using through the Internet, has ensured user's information security.
Install this application program the time, can remind this application program of car-mounted terminal user to use " obtaining important information " authority, can continue to install this application program after the user must confirm.Utilize system when installation application,, inform that the user should use used allowance authority with the mode and the user interactions at figure and literal interface.
When this application program operation; In case the interface that obtains important information that this application has used system to provide; Then system can judge using the authority of being applied for; After confirming that application is not used the INTERNET access rights and obtained the authority of ACCESS_AUTOMOBILE_INFO, onboard system just allows to application program vehicle-mounted protected information to be provided, and keeps supplying the applied off-line of layer program.As shown in Figure 4.
If for remote access has promptly been applied for the INTERNET access rights and has been obtained the authority of vehicle-mounted important protection information; Then need pass through the safety certification process of service end and can use vehicle-mounted important information afterwards, having strengthened level of security can be through the Internet approach by illegal utilization with the information that ensures the user.
Rank is the same during with operation when this application program is installed, and can remind the user should use the authority situation of use through the UI interface, as comprise INTERNET authority and ACCESS_AUTOMOBLE_INFO authority, can install after needing the user to confirm equally.
In this application program running, when this application used that system provides obtain the interface of important information the time, the authority that system can the application programs application is judged; Have at the same time under the situation of INTERNET authority and AUTOMOBILE_INFO authority this moment; Obtain protected information through creating an InfoManager object, the InfoManager class is equivalent in information a security gateway on the interface is provided, and upper layer application will be obtained the information that bottom provides; Must be through the authentication of InfoManager; The information that the layer interface that just can obtain returns after the success, otherwise can not acquired information, and the abnormal prompt of dishing out.Visit the authority buffer memory of successful access through InfoManager afterwards,, then return and verify successfully if this authority was buffered.Otherwise can the authority operating position and the service end of this application carried out communication and carried out remote validation, after service end judged that the authority application of this application program is passed through, car-mounted terminal just can be obtained information through the interface that obtains important information that system provides.Under the situation of this high-level safety verification, user's important information can only be used in the application after audit, thereby reaches the purpose of safe handling important information.InfoManager in the client is the terminal authentication module, and it calls the only way which must be passed that bottom obtains the important information interface for upper layer application.
Simultaneously, the authority buffer memory can be cleared up once according to the characteristics of car-mounted terminal self at set intervals, guarantees the sustainability of the safety of vehicular applications program, prevents that the vehicular applications program from carrying out illegal operation in back through safety certification in the process of upgrading.When carrying out communication with service end; The mode that combines through asymmetric encryption and symmetric cryptography; As data format, adopt crucial sensitive information cipher mode with JSON, only minority emphasis data are encrypted; And re-assembly data encrypted and issue service end, the counterweight point data was deciphered after service end was taken out data.The mode of this data verification still has efficient very efficiently for the data of later stage big data quantity on the one hand; Guaranteed simultaneously the reliability of information again; Prevent that the authentication privacy information from being stolen midway, have good autgmentability and fail safe, make verification process succinctly efficient.As shown in Figure 5.
Like Fig. 3, shown in 6; Application is being carried out in the process of rights management, the developer who uses to the third party, its third party use need use vehicle-mounted under the situation of protected information; Need be in vehicle-mounted its information of service end registration; Supply service end that the application of its exploitation is managed, comprise number of the account, the encrypted message of discerning identity, and the safety communication key information of submitting to etc.
After developer's registration; It can key management services safe in utilization manage the close spoon of the corresponding safety of this number of the account; Can upload and download close spoon; With the service end communication time, use, can obtain the partnerID information of oneself simultaneously, in application development process, use as identify label as encryption and decryption.
In vehicular applications, the developer can develop various application to car-mounted terminal, and this just needs the developer to use the application permission service to carry out the application of application permission.Third party's application need is uploaded relevant information (like application package etc.) to service end; After the service end audit, the relevant information of this application program is stored in service end, and auditing result can be " success " or " forbidding "; When application program is installed the back use; Vehicle-mounted end can send an authentication request to service end, and whether service end is replied authentication result, allow this application to obtain protected information (promptly using the interface that provides through InfoManager).Using the application service is to be benchmark with the applied version; Promptly need repeatedly use the application service with a different editions of using; Thereby guarantee at every turn when the developer issues new application version, all must can obtain authority after the strictness audit through the keeper.
For the sustainability of the safety that guarantees vehicular applications, introduced the audit service of using.The developer has only through can finally getting access to authority after the audit of using the audit service through after using the application service and carrying out authority application.In order to prevent to meet accident midway; Prevent because of vehicular applications is infected, vehicular applications is carried out situation such as malicious operation midway; Use the audit service and can in the vehicular applications use, forbid its authority, prevent that it from causing further infringement to user etc., guarantees user information safety.
Claims (9)
1. one kind is used for the vehicle-mounted interconnected method for managing security that moves, and it is characterized in that:
The authority of application access car-mounted terminal is stored to service end,
When the application access car-mounted terminal, car-mounted terminal is judged the purview certification of application program, and during purview certification, application program is directly visited car-mounted terminal information when application program is the operation of this accessing; When application program was remote access long-range purview certification, car-mounted terminal was through the access rights of server side authentication application program, and authentication is through application access car-mounted terminal information then.
2. be used for the vehicle-mounted interconnected method for managing security that moves according to claim 1 is said; It is characterized in that said service end provides registration service, uses application service, security key management service and uses the audit service third party's application developer, and the authority of third party's application developer visit car-mounted terminal is stored to service end;
Said registration service is that service end allows the developer to register the account number cipher of oneself;
Said application application service is the authority that service end allows the developer to apply for application program according to the own number of the account of registering and password, and the registration service of third party's application developer is provided;
Said security key management service is that service end allows the developer that its key is managed;
Said application audit service is that service end allows the keeper that application is examined.
3. be used for the vehicle-mounted interconnected method for managing security that moves according to claim 1 is said, it is characterized in that said car-mounted terminal contains the authority buffer memory that is useful on the long-range authority of buffer memory.
4. be used for the vehicle-mounted interconnected method for managing security that moves according to claim 1 is said; When it is characterized in that said application program is remote access long-range purview certification; Car-mounted terminal is through the access rights of server side authentication application program; When carrying out communication, authority is encrypted, transmit as data format with JSON through the mode that asymmetric encryption and symmetric cryptography combine with service end.
5. one kind is applied to claim 1 to 4 each saidly is used for the vehicle-mounted management system that moves interconnected method for managing security, it is characterized in that comprising the purview certification module that is used for purview certification,
Said purview certification module comprises when being used for the application access car-mounted terminal; The purview certification module was when being used for the application access car-mounted terminal when car-mounted terminal was judged application program for the operation of this accessing, and car-mounted terminal judges that application program is remote access long-range purview certification module.
6. according to the said management system of claim 5; It is characterized in that also comprising and be used for data management module that third party's application developer is managed; Said data management module comprises the registration service module that is used for developer's register account number password, be used for the developer applies for the authority of application program according to the account number cipher of registration, provide the registration service of third party's application developer application application service module, be used for the security key management service module that the developer manages key and be used for the keeper third party being used the application audit service module of examining.
7. according to the said management system of claim 5, it is characterized in that said purview certification module also comprises the authority cache module that is used for the long-range purview certification of buffer memory.
8. according to the said management system of claim 5, it is characterized in that said long-range purview certification module combines through asymmetric encryption and symmetric cryptography and the data format mode of JSON is carried out communication.
9. according to the said management system of claim 6, it is characterized in that said registration service module, use and apply for that service module, security key management service module and application audit service module adopt the HTTPS agreement that the data of transmission are encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210309721.1A CN102833250B (en) | 2012-08-28 | 2012-08-28 | A kind of method for managing security interconnected for vehicle-mounted mobile and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210309721.1A CN102833250B (en) | 2012-08-28 | 2012-08-28 | A kind of method for managing security interconnected for vehicle-mounted mobile and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102833250A true CN102833250A (en) | 2012-12-19 |
CN102833250B CN102833250B (en) | 2016-04-13 |
Family
ID=47336220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210309721.1A Active CN102833250B (en) | 2012-08-28 | 2012-08-28 | A kind of method for managing security interconnected for vehicle-mounted mobile and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102833250B (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533053A (en) * | 2013-10-15 | 2014-01-22 | 中国联合网络通信集团有限公司 | Approving method, server and system for open application programming interface |
CN103746969A (en) * | 2013-12-24 | 2014-04-23 | 深圳市领华卫通数码科技有限公司 | Vehicle terminal authentication method and authentication server |
CN103984890A (en) * | 2014-05-26 | 2014-08-13 | 惠州华阳通用电子有限公司 | Method and apparatus for entering hidden setting of in-vehicle infotainment information system |
CN104601267A (en) * | 2015-01-04 | 2015-05-06 | 广东工业大学 | Broadcast warning system based on anonymous reports of mobile intelligent terminals and realization method thereof |
CN105260198A (en) * | 2014-07-09 | 2016-01-20 | 麦恩电子有限公司 | Vehicle software update verification |
CN105391721A (en) * | 2015-11-23 | 2016-03-09 | 兰玉杰 | Unified authentication management open system based on cloud computing |
CN105794146A (en) * | 2014-11-13 | 2016-07-20 | 松下电器(美国)知识产权公司 | Key management method, vehicle-mounted network system and key management device |
CN105978862A (en) * | 2016-04-26 | 2016-09-28 | 北京经纬恒润科技有限公司 | Data processing method and data processing system |
CN106154903A (en) * | 2015-04-16 | 2016-11-23 | 上海汽车集团股份有限公司 | Carry out, with peripheral hardware, the system and method that information is mutual for car load network |
CN107147646A (en) * | 2017-05-11 | 2017-09-08 | 郑州信大捷安信息技术股份有限公司 | A kind of automobile function interface security mandate accesses system and security certificate access method |
CN107968774A (en) * | 2016-10-20 | 2018-04-27 | 深圳联友科技有限公司 | A kind of protecting information safety method of car networking terminal device |
CN107995228A (en) * | 2017-12-29 | 2018-05-04 | 河南森源鸿马电动汽车有限公司 | Intelligent terminal for special vehicle control authority remote management |
CN108377249A (en) * | 2018-03-20 | 2018-08-07 | 武汉康慧然信息技术咨询有限公司 | Information authentication method in new-energy automobile based on technology of Internet of things |
CN108521409A (en) * | 2018-03-29 | 2018-09-11 | 浙江吉利汽车研究院有限公司 | A kind of acquisition methods, the apparatus and system of on-vehicle host access rights |
CN108521410A (en) * | 2018-03-19 | 2018-09-11 | 北京航空航天大学 | The security architecture of vehicle-mounted Ethernet |
WO2018195763A1 (en) * | 2017-04-25 | 2018-11-01 | 余菁 | Intelligent in-vehicle system authenticating connection based on sound waves and method for connection in authentication |
WO2020048353A1 (en) * | 2018-09-04 | 2020-03-12 | 比亚迪股份有限公司 | Vehicle |
CN115801445A (en) * | 2022-12-22 | 2023-03-14 | 成都赛力斯科技有限公司 | Vehicle-mounted service safety protection method for preventing malicious connection of third-party application |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090027946A (en) * | 2007-09-13 | 2009-03-18 | 어울림정보기술주식회사 | System for managing information resources |
CN101686129A (en) * | 2008-09-24 | 2010-03-31 | 北京创原天地科技有限公司 | Novel method for strong safety service and user resource management |
CN101794366A (en) * | 2010-01-26 | 2010-08-04 | 恒生电子股份有限公司 | Core business system access right control method and device thereof |
CN101989982A (en) * | 2009-07-29 | 2011-03-23 | 飞力凯网路股份有限公司 | Information processing apparatus, program, storage medium and information processing system |
CN102394887A (en) * | 2011-11-10 | 2012-03-28 | 杭州东信北邮信息技术有限公司 | OAuth protocol-based safety certificate method of open platform and system thereof |
CN102479304A (en) * | 2010-11-26 | 2012-05-30 | 深圳市硅格半导体有限公司 | Method, client and system for software access control |
CN102611709A (en) * | 2012-03-31 | 2012-07-25 | 奇智软件(北京)有限公司 | Access control method and system for third party resources |
-
2012
- 2012-08-28 CN CN201210309721.1A patent/CN102833250B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090027946A (en) * | 2007-09-13 | 2009-03-18 | 어울림정보기술주식회사 | System for managing information resources |
CN101686129A (en) * | 2008-09-24 | 2010-03-31 | 北京创原天地科技有限公司 | Novel method for strong safety service and user resource management |
CN101989982A (en) * | 2009-07-29 | 2011-03-23 | 飞力凯网路股份有限公司 | Information processing apparatus, program, storage medium and information processing system |
CN101794366A (en) * | 2010-01-26 | 2010-08-04 | 恒生电子股份有限公司 | Core business system access right control method and device thereof |
CN102479304A (en) * | 2010-11-26 | 2012-05-30 | 深圳市硅格半导体有限公司 | Method, client and system for software access control |
CN102394887A (en) * | 2011-11-10 | 2012-03-28 | 杭州东信北邮信息技术有限公司 | OAuth protocol-based safety certificate method of open platform and system thereof |
CN102611709A (en) * | 2012-03-31 | 2012-07-25 | 奇智软件(北京)有限公司 | Access control method and system for third party resources |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533053B (en) * | 2013-10-15 | 2016-08-17 | 中国联合网络通信集团有限公司 | The measures and procedures for the examination and approval, server and the system of a kind of open applications Program Interfaces |
CN103533053A (en) * | 2013-10-15 | 2014-01-22 | 中国联合网络通信集团有限公司 | Approving method, server and system for open application programming interface |
CN103746969A (en) * | 2013-12-24 | 2014-04-23 | 深圳市领华卫通数码科技有限公司 | Vehicle terminal authentication method and authentication server |
CN103984890A (en) * | 2014-05-26 | 2014-08-13 | 惠州华阳通用电子有限公司 | Method and apparatus for entering hidden setting of in-vehicle infotainment information system |
CN105260198A (en) * | 2014-07-09 | 2016-01-20 | 麦恩电子有限公司 | Vehicle software update verification |
CN105260198B (en) * | 2014-07-09 | 2020-04-17 | 麦恩电子有限公司 | Vehicle software update verification |
CN105794146A (en) * | 2014-11-13 | 2016-07-20 | 松下电器(美国)知识产权公司 | Key management method, vehicle-mounted network system and key management device |
CN104601267A (en) * | 2015-01-04 | 2015-05-06 | 广东工业大学 | Broadcast warning system based on anonymous reports of mobile intelligent terminals and realization method thereof |
CN104601267B (en) * | 2015-01-04 | 2019-02-01 | 广东工业大学 | A kind of broadcast warning system and its implementation to be reported an offender anonymously based on mobile intelligent terminal |
CN106154903A (en) * | 2015-04-16 | 2016-11-23 | 上海汽车集团股份有限公司 | Carry out, with peripheral hardware, the system and method that information is mutual for car load network |
CN105391721A (en) * | 2015-11-23 | 2016-03-09 | 兰玉杰 | Unified authentication management open system based on cloud computing |
CN105978862A (en) * | 2016-04-26 | 2016-09-28 | 北京经纬恒润科技有限公司 | Data processing method and data processing system |
CN107968774B (en) * | 2016-10-20 | 2020-10-09 | 深圳联友科技有限公司 | Information safety protection method for terminal equipment of Internet of vehicles |
CN107968774A (en) * | 2016-10-20 | 2018-04-27 | 深圳联友科技有限公司 | A kind of protecting information safety method of car networking terminal device |
WO2018195763A1 (en) * | 2017-04-25 | 2018-11-01 | 余菁 | Intelligent in-vehicle system authenticating connection based on sound waves and method for connection in authentication |
CN107147646B (en) * | 2017-05-11 | 2019-09-13 | 郑州信大捷安信息技术股份有限公司 | A kind of automobile function interface security authorization access system and security certificate access method |
CN107147646A (en) * | 2017-05-11 | 2017-09-08 | 郑州信大捷安信息技术股份有限公司 | A kind of automobile function interface security mandate accesses system and security certificate access method |
CN107995228A (en) * | 2017-12-29 | 2018-05-04 | 河南森源鸿马电动汽车有限公司 | Intelligent terminal for special vehicle control authority remote management |
CN107995228B (en) * | 2017-12-29 | 2020-10-13 | 河南森源鸿马电动汽车有限公司 | Intelligent terminal for remote authority management of special vehicle control system |
CN108521410A (en) * | 2018-03-19 | 2018-09-11 | 北京航空航天大学 | The security architecture of vehicle-mounted Ethernet |
CN108521410B (en) * | 2018-03-19 | 2020-09-04 | 北京航空航天大学 | Safety protection architecture of vehicle-mounted Ethernet |
CN108377249A (en) * | 2018-03-20 | 2018-08-07 | 武汉康慧然信息技术咨询有限公司 | Information authentication method in new-energy automobile based on technology of Internet of things |
CN108377249B (en) * | 2018-03-20 | 2021-01-12 | 陈瑛昊 | Information authentication method in new energy automobile based on Internet of things technology |
CN108521409A (en) * | 2018-03-29 | 2018-09-11 | 浙江吉利汽车研究院有限公司 | A kind of acquisition methods, the apparatus and system of on-vehicle host access rights |
WO2020048353A1 (en) * | 2018-09-04 | 2020-03-12 | 比亚迪股份有限公司 | Vehicle |
CN115801445A (en) * | 2022-12-22 | 2023-03-14 | 成都赛力斯科技有限公司 | Vehicle-mounted service safety protection method for preventing malicious connection of third-party application |
Also Published As
Publication number | Publication date |
---|---|
CN102833250B (en) | 2016-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102833250B (en) | A kind of method for managing security interconnected for vehicle-mounted mobile and system | |
US11304057B2 (en) | Authorized access to vehicle data | |
Li et al. | TSP security in intelligent and connected vehicles: Challenges and solutions | |
KR102347659B1 (en) | Secure provisioning and management of devices | |
CN102870093B (en) | Utilize the virtual system and method with proving multiple client in remote maintenance electric network | |
US20130212659A1 (en) | Trusted connected vehicle systems and methods | |
CN104683336B (en) | A kind of Android private data guard method and system based on security domain | |
ES2876000T3 (en) | Method and device for controlling a closing mechanism with a mobile terminal | |
CN103067338A (en) | Third party application centralized safety management method and system and corresponding communication system | |
US9361465B2 (en) | Privacy-enhanced car data distribution | |
CN108701384B (en) | Method for monitoring access to electronically controllable devices | |
KR20130129224A (en) | Tamper proof location services | |
KR20190133558A (en) | Electronic device and method for storing digital key | |
US11722529B2 (en) | Method and apparatus for policy-based management of assets | |
WO2015193578A1 (en) | Method and system for authentication by means of tokens | |
Plappert et al. | Secure role and rights management for automotive access and feature activation | |
CN104462899A (en) | Trust access control method for comprehensive avionics system | |
Choi et al. | Security threats in connected car environment and proposal of in-vehicle infotainment-based access control mechanism | |
KR102377045B1 (en) | SYSTEMS AND METHODS FOR AUTHENTICATING IoT DEVICE THROUGH CLOUD USING HARDWARE SECURITY MODULE | |
Wang et al. | A brief survey on cyber security attack entrances and protection strategies of intelligent connected vehicle | |
US20220294770A1 (en) | Method and system for performing identity checks in a distributed system | |
Ellison et al. | The car as an Internet-enabled device, or how to make trusted networked cars | |
KR102411797B1 (en) | Hardware-based vehicle cyber security system | |
Arm et al. | Safety and Security of the Car-Sharing System | |
KR20230125227A (en) | Method and Apparatus for Providing Authorization to Access Interactive Goods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |