CN108337258A - A method of the remote control vehicle based on long-range actuating code - Google Patents

A method of the remote control vehicle based on long-range actuating code Download PDF

Info

Publication number
CN108337258A
CN108337258A CN201810097924.6A CN201810097924A CN108337258A CN 108337258 A CN108337258 A CN 108337258A CN 201810097924 A CN201810097924 A CN 201810097924A CN 108337258 A CN108337258 A CN 108337258A
Authority
CN
China
Prior art keywords
long
actuating code
server
range
range actuating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810097924.6A
Other languages
Chinese (zh)
Inventor
秦锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Fufu Mdt Infotech Ltd
Original Assignee
China Electric Fufu Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Fufu Mdt Infotech Ltd filed Critical China Electric Fufu Mdt Infotech Ltd
Priority to CN201810097924.6A priority Critical patent/CN108337258A/en
Publication of CN108337258A publication Critical patent/CN108337258A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Abstract

The present invention discloses a kind of method of the remote control vehicle based on long-range actuating code comprising following steps:S1:Client is first initiated to obtain the request of long-range actuating code to server-side;S2:Server-side is by current server time, device id and the long-range actuating code of login name combination producing;S3:Long-range actuating code storage is recorded in the database of server by server-side;S4:Server-side will be sent to client after long-range execution code encryption;S5:After client receives encrypted long-range actuating code, then to server-side initiate containing encrypted long-range actuating code remote vehicle control data;S6:Server-side remote vehicle control data carries out the verification of long-range actuating code;S7:After long-range actuating code verification is errorless, server-side verifies remote control password;S8:After remote control password authentification is correct, server-side issues specific control operation to vehicle.The http request that the method for the present invention can allow remote vehicle to control reduces the chance being modeled, and improves the safety of remote vehicle control.

Description

A method of the remote control vehicle based on long-range actuating code
Technical field
The present invention relates to telecom communication field more particularly to a kind of sides of the remote control vehicle based on long-range actuating code Method.
Background technology
The message header structure of the http request of remote vehicle control in the prior art, is shown in Table one:
The message header of one http request of table
The message body structure of the http request of remote vehicle control, such as Car's door controlling are shown in Table two in the prior art:
The message body of two http request of table
After server-side receives the http request that remote vehicle controls in the prior art, first whether just remote control password is verified Really, then specific control operation is issued.There is the risk intercepted by hacker in transmission over networks in http request.Hacker can break Remote control password is solved, simulation sends the http request of remote vehicle control to achieve the purpose that remote control vehicle, safety wind Danger is larger.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of remote control vehicles based on long-range actuating code Method, reduce remote vehicle and control the chance that is modeled, improve the safety of remote vehicle control.
The technical solution adopted by the present invention is:
A method of the remote control vehicle based on long-range actuating code comprising following steps:
S1:Client first is initiated to obtain before sending the request that remote vehicle controls to server-side every time to server-side The request of long-range actuating code;
S2:Server-side using the current server time as request time stab, then with the device id of the request and login name group Symphysis is at long-range actuating code;
S3:Long-range actuating code storage is recorded in the database of server using login name as major key by server-side;
S4:Server-side will be sent to client after long-range execution code encryption;
S5:After client receives encrypted long-range actuating code, then initiate containing encrypted long-range actuating code to server-side Remote vehicle control data;
S6:Server-side remote vehicle control data carries out the verification of long-range actuating code;
S7:After long-range actuating code verification is errorless, server-side verifies remote control password again;
S8:After remote control password authentification is correct, server-side issues the operation of the specific control in remote vehicle control data To vehicle.
Further, server-side uses BASE64 encrypted remote actuating codes.
Further, in step S6 server-side remote vehicle control data carry out the verification of long-range actuating code specifically include it is following Step:
S6-1:Login name in server side searches remote vehicle control data is corresponding in servicing client database remotely to be held Row code whether there is;In the absence of long-range actuating code, long-range actuating code verification does not pass through, and it is wrong that server-side returns to long-range actuating code Accidentally to client;Otherwise, step S6-2 is executed;
S6-2:In the presence of long-range actuating code, BASE64 decryption is carried out to the long-range actuating code in remote vehicle control data, Whether compare long-range actuating code that long-range actuating code and lane database after decryption preserve;When long-range actuating code is different When, long-range actuating code verification does not pass through, and server-side returns to long-range actuating code mistake to client;Otherwise, step S6-3 is executed;
S6-3:The device id in the long-range actuating code after decryption is obtained, the application of the device id and preservation that compare decryption should Whether the device id of long-range actuating code is consistent;When the device id of the two is inconsistent, long-range actuating code verification does not pass through, server-side Long-range actuating code mistake is returned to client;Otherwise, step S6-4 is executed;
S6-4:The request time stamp in the long-range actuating code after decryption is obtained, and by the time at current service end and decryption Request time stamp subtract each other to obtain the time difference;Judge whether the time difference is more than the allowed time;It is not more than the allowed time when the time difference When, long-range actuating code verification is errorless;Otherwise, long-range actuating code verification does not pass through, and server-side returns to long-range actuating code mistake to visitor Family end.
Further, the allowed time is 1 minute.
The present invention use above technical scheme, client every time to server-side send remote vehicle control request it Before, the request for obtaining long-range actuating code is first initiated to server-side;Then client adds when sending the request of remote vehicle control On the long-range actuating code that has just got send together;Last server-side verifies it.The method of the present invention can allow remote vehicle The http requests of control reduce the chance being modeled, and improve the safety of remote vehicle control.
Description of the drawings
The present invention is described in further details below in conjunction with the drawings and specific embodiments;
Fig. 1 is a kind of flow diagram of the method for the remote control vehicle based on long-range actuating code of the present invention.
Fig. 2 is that the server-side remote vehicle control data of the present invention carries out the flow diagram of long-range actuating code verification.
Specific implementation mode
As shown in Figure 1, the invention discloses a kind of methods of the remote control vehicle based on long-range actuating code comprising with Lower step:
S1:Client first is initiated to obtain before sending the request that remote vehicle controls to server-side every time to server-side The request of long-range actuating code;
S2:Server-side using the current server time as request time stab, then with the device id of the request and login name group Symphysis is at long-range actuating code;
Specifically, server-side obtains the timestamp (time) of server-side this moment, request disappears respectively after receiving this request Cease head in intelligent terminal id (smartDeviceId) and login name (loginName), time with SmartDeviceId obtains a long-range actuating code (useCode) after carrying out orderly combination, and definition is shown in Table three.In data, Only retain portion using loginName as the record of major key.Long-range actuating code is finally returned to visitor after BASE64 is encrypted Family end.
Composition Example
time_smartDeviceId 1704050923893_e2fc7098-e3b7-3304-bef3-b01e3dadd39d
The definition of three long-range actuating code of table
S3:Long-range actuating code storage is recorded in the database of server using login name as major key by server-side;
S4:Server-side will be sent to client after long-range execution code encryption;
S5:After client receives encrypted long-range actuating code, then initiate containing encrypted long-range actuating code to server-side Remote vehicle control data;
S6:Server-side remote vehicle control data carries out the verification of long-range actuating code;
S7:After long-range actuating code verification is errorless, server-side verifies remote control password again;
S8:After remote control password authentification is correct, server-side issues the operation of the specific control in remote vehicle control data To vehicle.
Further, server-side uses BASE64 encrypted remote actuating codes.
Further, in step S6 server-side remote vehicle control data carry out the verification of long-range actuating code specifically include it is following Step:
S6-1:Login name in server side searches remote vehicle control data is corresponding in servicing client database remotely to be held Row code whether there is;In the absence of long-range actuating code, long-range actuating code verification does not pass through, and it is wrong that server-side returns to long-range actuating code Accidentally to client;Otherwise, step S6-2 is executed;
S6-2:In the presence of long-range actuating code, BASE64 decryption is carried out to the long-range actuating code in remote vehicle control data, Whether compare long-range actuating code that long-range actuating code and lane database after decryption preserve;When long-range actuating code is different When, long-range actuating code verification does not pass through, and server-side returns to long-range actuating code mistake to client;Otherwise, step S6-3 is executed;
S6-3:The device id in the long-range actuating code after decryption is obtained, the application of the device id and preservation that compare decryption should Whether the device id of long-range actuating code is consistent;When the device id of the two is inconsistent, long-range actuating code verification does not pass through, server-side Long-range actuating code mistake is returned to client;Otherwise, step S6-4 is executed;
S6-4:The request time stamp in the long-range actuating code after decryption is obtained, and by the time at current service end and decryption Request time stamp subtract each other to obtain the time difference;Judge whether the time difference is more than the allowed time;It is not more than the allowed time when the time difference When, long-range actuating code verification is errorless;Otherwise, long-range actuating code verification does not pass through, and server-side returns to long-range actuating code mistake to visitor Family end.
Further, the allowed time is 1 minute.
Further, following analysis once reaction effect of the various situation server-sides to remote vehicle control data.
1, in vehicle control request, without long-range actuating code;Without long-range actuating code in request, server-side does not receive far Journey actuating code returns to mistake.
2, in vehicle control request, long-range actuating code is arbitrarily write;Long-range actuating code in request can be logged in database The corresponding long-range actuating code of name is compared, and the probability verified by server-side is extremely low.
3, in vehicle control request, long-range actuating code is used to other clients;Since the composition of long-range actuating code is with visitor For the intelligent terminal id at family end there are relationship, the long-range actuating code that different clients uses is different.
4, in vehicle control request, long-range actuating code does not use immediately;Since the term of validity of long-range actuating code is very short, surpass After crossing when system provides, long-range actuating code will fail.
5, in vehicle control request, old long-range actuating code is used;Before being asked due to each vehicle control, can all it initiate Obtain the request of long-range actuating code.Once generating new long-range actuating code, old long-range actuating code is weathering.
The present invention use above technical scheme, client every time to server-side send remote vehicle control request it Before, the request for obtaining long-range actuating code is first initiated to server-side;Then client adds when sending the request of remote vehicle control On the long-range actuating code that has just got send together;Last server-side verifies it.The method of the present invention can allow remote vehicle The http request of control reduces the chance being modeled, and improves the safety of remote vehicle control.

Claims (4)

1. a kind of method of the remote control vehicle based on long-range actuating code, it is characterised in that:It includes the following steps:
S1:Client first is initiated to obtain long-range before sending the request that remote vehicle controls to server-side every time to server-side The request of actuating code;
S2:Server-side using the current server time as request time stab, then with the device id of the request and login name group symphysis At long-range actuating code;
S3:Long-range actuating code storage is recorded in the database of server using login name as major key by server-side;
S4:Server-side will be sent to client after long-range execution code encryption;
S5:After client receives encrypted long-range actuating code, then it is long-range containing encrypted long-range actuating code to server-side initiation Vehicle control is asked;
S6:Server-side remote vehicle control data carries out the verification of long-range actuating code;
S7:After long-range actuating code verification is errorless, server-side verifies remote control password again;
S8:After remote control password authentification is correct, server-side issues the operation of the specific control in remote vehicle control data to vehicle .
2. a kind of method of remote control vehicle based on long-range actuating code according to claim 1, it is characterised in that:Institute It states server-side and uses BASE64 encrypted remote actuating codes.
3. a kind of method of remote control vehicle based on long-range actuating code according to claim 1, it is characterised in that:Step Server-side remote vehicle control data carries out long-range actuating code verification and specifically includes following steps in rapid S6:
S6-1:Login name in the server side searches remote vehicle control data corresponding long-range actuating code in servicing client database It whether there is;In the absence of long-range actuating code, long-range actuating code verification does not pass through, and server-side returns to long-range actuating code mistake extremely Client;Otherwise, step S6-2 is executed;
S6-2:In the presence of long-range actuating code, BASE64 decryption is carried out to the long-range actuating code in remote vehicle control data, is compared Whether the long-range actuating code that long-range actuating code after decryption and lane database preserve;When long-range actuating code is different, far The verification of journey actuating code does not pass through, and server-side returns to long-range actuating code mistake to client;Otherwise, step S6-3 is executed;
S6-3:Obtain the device id in the long-range actuating code after decryption, compare decryption device id and the application of preservation this is long-range Whether the device id of actuating code is consistent;When the device id of the two is inconsistent, long-range actuating code verification does not pass through, and server-side returns Long-range actuating code mistake is to client;Otherwise, step S6-4 is executed;
S6-4:The request time stamp in the long-range actuating code after decryption is obtained, and the time at current service end is asked with what is decrypted Seeking time stamp subtracts each other to obtain the time difference;Judge whether the time difference is more than the allowed time;When the time difference being not more than the allowed time, far The verification of journey actuating code is errorless;Otherwise, long-range actuating code verification does not pass through, and server-side returns to long-range actuating code mistake to client.
4. a kind of method of remote control vehicle based on long-range actuating code according to claim 3, it is characterised in that:Institute It is 1 minute to state the allowed time.
CN201810097924.6A 2018-01-31 2018-01-31 A method of the remote control vehicle based on long-range actuating code Withdrawn CN108337258A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810097924.6A CN108337258A (en) 2018-01-31 2018-01-31 A method of the remote control vehicle based on long-range actuating code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810097924.6A CN108337258A (en) 2018-01-31 2018-01-31 A method of the remote control vehicle based on long-range actuating code

Publications (1)

Publication Number Publication Date
CN108337258A true CN108337258A (en) 2018-07-27

Family

ID=62927633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810097924.6A Withdrawn CN108337258A (en) 2018-01-31 2018-01-31 A method of the remote control vehicle based on long-range actuating code

Country Status (1)

Country Link
CN (1) CN108337258A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080019826A (en) * 2006-08-29 2008-03-05 주식회사 케이티 Robot remote control apparatus using instant message protocol and method thereof
JP2011250054A (en) * 2010-05-26 2011-12-08 Nec Corp Remote control device, and control method and program for the same
CN103200215A (en) * 2012-01-08 2013-07-10 佳都新太科技股份有限公司 Method achieving XenServer virtual machine remote control on https
CN104135482A (en) * 2014-08-07 2014-11-05 浪潮(北京)电子信息产业有限公司 Authentication method and device as well as server
CN104163158A (en) * 2013-05-15 2014-11-26 广州汽车集团股份有限公司 Vehicle remote control method and system and vehicle capable of achieving remote control
CN104179413A (en) * 2014-08-14 2014-12-03 奇瑞汽车股份有限公司 Car window remote control system and method
CN104683356A (en) * 2015-03-26 2015-06-03 上海众人网络安全技术有限公司 Dynamic password authentication method and system based on software token
CN105100094A (en) * 2015-07-15 2015-11-25 广东欧珀移动通信有限公司 Unlocking control methods, terminal and server
CN105207782A (en) * 2015-11-18 2015-12-30 上海爱数软件有限公司 Identity verification method based on restful framework
CN105915576A (en) * 2015-12-18 2016-08-31 乐视致新电子科技(天津)有限公司 Vehicle remote control method, apparatus and system
CN106302546A (en) * 2016-10-18 2017-01-04 青岛海信电器股份有限公司 The method and apparatus realizing server access
CN107566396A (en) * 2017-09-28 2018-01-09 郑州云海信息技术有限公司 A kind of method based on dynamic password enhancing server VPN protocol securitys

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080019826A (en) * 2006-08-29 2008-03-05 주식회사 케이티 Robot remote control apparatus using instant message protocol and method thereof
JP2011250054A (en) * 2010-05-26 2011-12-08 Nec Corp Remote control device, and control method and program for the same
CN103200215A (en) * 2012-01-08 2013-07-10 佳都新太科技股份有限公司 Method achieving XenServer virtual machine remote control on https
CN104163158A (en) * 2013-05-15 2014-11-26 广州汽车集团股份有限公司 Vehicle remote control method and system and vehicle capable of achieving remote control
CN104135482A (en) * 2014-08-07 2014-11-05 浪潮(北京)电子信息产业有限公司 Authentication method and device as well as server
CN104179413A (en) * 2014-08-14 2014-12-03 奇瑞汽车股份有限公司 Car window remote control system and method
CN104683356A (en) * 2015-03-26 2015-06-03 上海众人网络安全技术有限公司 Dynamic password authentication method and system based on software token
CN105100094A (en) * 2015-07-15 2015-11-25 广东欧珀移动通信有限公司 Unlocking control methods, terminal and server
CN105207782A (en) * 2015-11-18 2015-12-30 上海爱数软件有限公司 Identity verification method based on restful framework
CN105915576A (en) * 2015-12-18 2016-08-31 乐视致新电子科技(天津)有限公司 Vehicle remote control method, apparatus and system
CN106302546A (en) * 2016-10-18 2017-01-04 青岛海信电器股份有限公司 The method and apparatus realizing server access
CN107566396A (en) * 2017-09-28 2018-01-09 郑州云海信息技术有限公司 A kind of method based on dynamic password enhancing server VPN protocol securitys

Similar Documents

Publication Publication Date Title
CN106850580B (en) A kind of automobile account system and account automatic verification method
CN105187450B (en) A kind of method and apparatus authenticated based on authenticating device
CN105162785B (en) A kind of method and apparatus registered based on authenticating device
CN107968781A (en) The security processing of vehicle shared service
CN108809637B (en) LTE-R vehicle-ground communication non-access stratum authentication key agreement method based on mixed password
EP3240227B1 (en) Method and device for tamper-proof provision of a key certificate
CN102664893B (en) Adaptive retransmission and signature segmented embedding data transmission method
CN109672538A (en) A kind of lightweight vehicle bus safety communicating method and safe communication system
CN113781678B (en) Vehicle Bluetooth key generation and authentication method and system in networking-free environment
CN103118022B (en) A kind of without password heterodoxy Sign-On authentication method
CN111884811B (en) Block chain-based data evidence storing method and data evidence storing platform
CN110365483A (en) Cloud platform authentication method, client, middleware and system
CN110768973A (en) Signaling safety evaluation system and method based on GB35114 standard
CN111267774B (en) Virtual key authorization method and device
CN108173860A (en) A kind of MQTT connection methods, system, terminal and the server of low side constrained devices
CN103607389A (en) Remote wireless identity authentication system
CN105450658A (en) System login method and device
CN109040098A (en) A method of MQTT protocol authentication is realized based on JWT
CN107223328A (en) A kind of method and system of Root authority management and control
CN103152326A (en) Distributed authentication method and authentication system
CN106302539A (en) A kind of embedded type WEB safety certifying method
CN110505619A (en) A kind of data transmission method in eSIM Remote configuration
CN110248334B (en) LTE-R vehicle-ground communication non-access stratum authentication method
CN110942538A (en) Remote authorized real-time Bluetooth electronic key with encryption algorithm
CN108337258A (en) A method of the remote control vehicle based on long-range actuating code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180727