Background
Along with the higher and higher intellectualization degree of the automobile and the higher and higher informatization degree of the automobile, more and more functions control the automobile through the automobile ECU to realize corresponding functions, and some technologies for remotely controlling the automobile exist, and the technologies enable the automobile to be more and more convenient to drive. On the other hand, the safety of the automobile is reduced, and the life safety of the user is seriously threatened once a lawless person remotely controls the automobile.
Disclosure of Invention
In order to overcome the defects in the background art, the invention provides an information authentication method in a new energy automobile based on the technology of the internet of things.
An information authentication method in a new energy automobile based on the technology of the Internet of things comprises the following steps:
configuring an exclusive storage area for data encryption storage in an automobile ECU;
configuring information authentication rules of an automobile ECU and a remote terminal;
and the user is authenticated by remote control requested by the remote terminal through the information authentication rule.
The information authentication method in the new energy automobile based on the technology of the Internet of things comprises the following steps:
the exclusive storage area for configuring data encryption storage in the automobile ECU comprises:
s1, dividing a special storage area in the automobile ECU, wherein the special storage area is used for data encryption storage;
the information authentication rule for configuring the automobile ECU and the remote terminal comprises the following steps:
s2, acquiring the identification information of each member with the automobile control authority; sending the identification information of each user to an automobile ECU;
s3, the automobile ECU processes all the identification information according to a first preset algorithm to obtain an identification data set, and then the identification information of each user is deleted; the automobile ECU carries out data grouping on the identification data set according to members;
s4, establishing a mapping relation between each data group and a remote terminal corresponding to the member in the automobile ECU; the mapping relation between each data packet and the user authority is configured in the automobile ECU;
the authentication of the user through remote control requested by the remote terminal through the information authentication rule comprises the following steps:
s5, when a user requests to perform remote control through a remote terminal, acquiring corresponding user information through the remote terminal, processing the user information through a second preset algorithm to obtain verification information, deleting the remote terminal to acquire the corresponding user information, and then sending the verification information to the automobile ECU;
s6, the automobile ECU verifies the verification information, receives the identity authentication request of the user when the verification is passed, and jumps to the step S7; otherwise, the user identity authentication fails, and the step S9 is skipped to;
s7, judging whether the vehicle control authority in the request sent by the user through the remote terminal is matched with the mapping relation between each data packet and the user authority through the mapping relation between each data packet and the user authority, controlling the vehicle to complete the corresponding function by the automobile ECU when the vehicle control authority is matched with the mapping relation between each data packet and the user authority, otherwise, skipping to the step S9;
and S9, the automobile ECU refuses the corresponding functions of the vehicle corresponding to the vehicle control authority in the request sent by the user through the remote terminal.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S3 includes:
the automobile ECU respectively converts the identification information of each user into a data matrix;
generating a compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices;
generating a reference matrix corresponding to each data matrix according to the compensation matrix, encrypting the reference matrix through a secure channel, and sending the encrypted reference matrix to a remote terminal corresponding to the data matrix;
the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set; the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value;
the automobile ECU carries out data grouping on the identification data set according to members and establishes a mapping relation between the matrix association value and the data grouping and matrix association value in the data set;
and the automobile ECU deletes the identification information, the reference matrix and the compensation matrix of the user, and stores the data set, the matrix correlation value and the mapping relation between the data packet and the matrix correlation value in the exclusive storage area.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S5 includes:
when a user requests to carry out remote control through a remote terminal, acquiring corresponding user information through the remote terminal;
the remote terminal converts the user information into a verification data matrix;
the remote terminal processes the verification data matrix and the reference matrix through a second preset algorithm to obtain verification information, and the remote terminal deletes corresponding user information and then sends the verification information to the automobile ECU.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S6 includes:
s61, judging whether the verification information is matched with the matrix correlation value by the automobile ECU; jumping to step S62 upon matching;
s62, the automobile ECU determines the corresponding data packet by establishing the mapping relation between the matrix correlation value and the data packet and the matrix correlation value in the data set;
s63, the automobile ECU confirms whether the identity authentication request of the user passes through the mapping relation between each data group and the mobile terminal corresponding to the member, receives the identity authentication request of the user when the verification passes and jumps to the step S7; otherwise, the user authentication fails, and the process goes to step S9.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the generating of the compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices includes:
screening out other matrixes of which the number of rows and the number of columns are less than or equal to the number of rows and the number of columns corresponding to the data matrix as incidence matrixes according to the number of rows and the number of columns of the data matrix;
and setting a compensation value, and carrying out standardization processing on the incidence matrix according to the compensation value to obtain a compensation matrix.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set, and the data set comprises the following steps:
the automobile ECU obtains a first intermediate matrix by performing product operation on each data matrix and the compensation matrix;
the automobile ECU processes the first intermediate matrix through an SHA512 algorithm to obtain a data set in a serialized form;
the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value, and the matrix correlation value comprises the following steps:
the automobile ECU obtains a second intermediate matrix by performing product operation on each data matrix and the reference matrix;
the automobile ECU processes the second intermediate matrix through an SHA512 algorithm to obtain a reference data set in a serialized form;
and comparing the data set with the reference data set by the automobile ECU to obtain a set difference value, and taking the difference value as a matrix correlation value.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S4 further includes:
configuring a mutual exclusion rule for each user to request for remote control through a remote terminal; accordingly, when matching in the step S7, the vehicle ECU controls the vehicle to complete the corresponding function, otherwise, the step S9 includes:
and during matching, judging whether the request sent by the user through the remote terminal meets the mutual exclusion rule or not through the mutual exclusion rule that each user requests to carry out remote control through the remote terminal, and if so, controlling the vehicle to complete the corresponding function by the automobile ECU, otherwise, skipping to the step S9.
The information authentication method in the new energy automobile based on the technology of the Internet of things has the following beneficial effects: the acquired original user information is not stored in the automobile ECU, only the processed data is reserved for information authentication, and the reserved information and the original user information have a unique determination relation, so that the safety of information storage is met, and the accuracy of authentication identification is improved; and lawless persons can not obtain the verification information in a cracking mode, so that the remote control probability of the automobile is greatly reduced.
Detailed Description
As shown in fig. 1, a method for authenticating information in a new energy vehicle based on the technology of internet of things includes the following steps:
configuring an exclusive storage area for data encryption storage in an automobile ECU;
configuring information authentication rules of an automobile ECU and a remote terminal;
and the user is authenticated by remote control requested by the remote terminal through the information authentication rule.
The following is a detailed description: an information authentication method in a new energy automobile based on the technology of the Internet of things comprises the following steps:
and S1, dividing a special storage area in the automobile ECU, wherein the special storage area is used for data encryption storage. Optionally, the exclusive storage area is encrypted in a hardware encryption mode, so that the storage safety of data in the automobile ECU is ensured.
S2, acquiring the identification information of each member with the automobile control authority; sending the identification information of each user to an automobile ECU; the method comprises the steps of obtaining identification information of each member and sending the identification information to the automobile ECU, wherein the identification information of the members is only configured with information for verifying whether a user request is legal or not in the automobile ECU, and therefore the identification information is transmitted at one time and cannot be stolen in subsequent use.
S3, the automobile ECU processes all the identification information according to a first preset algorithm to obtain an identification data set, and then the identification information of each user is deleted; the vehicle ECU groups the identification data sets into data according to the members. By implementing this step, only the data set, the matrix correlation value, and the mapping relationship between the data group and the matrix correlation value are stored in the vehicle ECU, and even if these three different pieces of information can be acquired at the same time, the identification information of the user corresponding to the array group cannot be acquired.
And deleting the identity identification information of each user after obtaining the identification data set, so that the identity identification information of the user is ensured not to be leaked, and the real identification information of the user cannot be obtained even if an exclusive storage area is leaked, wherein the identification information comprises iris identification information, fingerprint information and the like.
In the embodiment of the invention, a plurality of data sets exist, and the data sets have a corresponding relation with the identity identification information of the user; therefore, the automobile ECU groups the identification data sets according to the members, and the correspondence between the array groups and the user identities can be realized. Data grouping is a process of classifying a collection of data according to the identity of a user.
S4, establishing a mapping relation between each data group and a remote terminal corresponding to the member in the automobile ECU; the mapping relation between each data packet and the user authority is configured in the automobile ECU;
s5, when a user requests to perform remote control through a remote terminal, acquiring corresponding user information through the remote terminal, processing the user information through a second preset algorithm to obtain verification information, deleting the remote terminal to acquire the corresponding user information, and then sending the verification information to the automobile ECU; the remote terminal is a terminal for applying for remote control of the automobile, and can be a mobile terminal or a remote server.
S6, the automobile ECU verifies the verification information, receives the identity authentication request of the user when the verification is passed, and jumps to the step S7; otherwise, the user identity authentication fails, and the step S9 is skipped to; in the whole information authentication process, no matter the automobile ECU, the remote terminal or the transmission process, even if the illegal user obtains the information and data in the three links, the identification information of the user cannot be cracked.
S7, judging whether the vehicle control authority in the request sent by the user through the remote terminal is matched with the mapping relation between each data packet and the user authority through the mapping relation between each data packet and the user authority, controlling the vehicle to complete the corresponding function by the automobile ECU when the vehicle control authority is matched with the mapping relation between each data packet and the user authority, otherwise, skipping to the step S9;
and S9, the automobile ECU refuses the corresponding functions of the vehicle corresponding to the vehicle control authority in the request sent by the user through the remote terminal.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S3 includes:
the automobile ECU respectively converts the identification information of each user into a data matrix; because the identity information of the user may include biological identification information such as an iris, a fingerprint and the like, and the identification modes adopted by different users are different, the data matrixes converted from the identity identification information of different users are different, and not only are the values different, but also the number of rows and the number of columns may differ. The embodiment of the invention isomorphically introduces the concept of a data matrix and introduces the concept of obtaining a compensation matrix by carrying out standardized processing on the incidence matrix, so that the compatibility of the invention to various biological identification information of users is better, and the verification information can be crossed and flexibly combined, so that an illegal user cannot analyze the originally collected user information from all information.
Generating a compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices;
and generating a reference matrix corresponding to each data matrix according to the compensation matrix, encrypting the reference matrix through a secure channel, and sending the encrypted reference matrix to the remote terminal corresponding to the data matrix.
Optionally, generating the reference matrix corresponding to each data matrix according to the compensation matrix is obtained by replacing a specific numerical value in the compensation matrix.
The embodiment has the advantages that: the reference matrix is sent to the remote terminal, and the reference matrices corresponding to different data matrices are actually different, and the number of the reference matrices is different, and the number of rows/columns may also be different. Other illegal users cannot finally obtain the data matrix by referring to the matrix, and cannot simultaneously obtain the identity information of all the users.
The automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set;
the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value; the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set; and the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value. In the embodiment of the invention, whether the request of the user is legal is judged by verifying the matrix correlation value, on one hand, the corresponding relation with the unique identification information (iris information and fingerprint information) of the user can be established, and the information is not directly utilized for verification, thereby greatly improving the safety.
The automobile ECU carries out data grouping on the identification data set according to members and establishes a mapping relation between the matrix association value and the data grouping and matrix association value in the data set;
and the automobile ECU deletes the identification information, the reference matrix and the compensation matrix of the user, and stores the data set, the matrix correlation value and the mapping relation between the data packet and the matrix correlation value in the exclusive storage area.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S5 includes:
when a user requests to carry out remote control through a remote terminal, acquiring corresponding user information through the remote terminal;
the remote terminal converts the user information into a verification data matrix;
the remote terminal processes the verification data matrix and the reference matrix through a second preset algorithm to obtain verification information, and the remote terminal deletes corresponding user information and then sends the verification information to the automobile ECU.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S6 includes:
s61, judging whether the verification information is matched with the matrix correlation value by the automobile ECU; jumping to step S62 upon matching;
s62, the automobile ECU determines the corresponding data packet by establishing the mapping relation between the matrix correlation value and the data packet and the matrix correlation value in the data set;
s63, the automobile ECU confirms whether the identity authentication request of the user passes through the mapping relation between each data group and the mobile terminal corresponding to the member, receives the identity authentication request of the user when the verification passes and jumps to the step S7; otherwise, the user authentication fails, and the process goes to step S9.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the generating of the compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices includes:
screening out other matrixes of which the number of rows and the number of columns are less than or equal to the number of rows and the number of columns corresponding to the data matrix as incidence matrixes according to the number of rows and the number of columns of the data matrix;
and setting a compensation value, and carrying out standardization processing on the incidence matrix according to the compensation value to obtain a compensation matrix.
The compensation value can be set autonomously by the user, and preferably can be generated by the identity relationship between different users. A fixed value may be set in advance as the compensation value.
Normalizing the correlation matrix to obtain a compensation matrix may include: and if the row and/or column of the incidence matrix is less than the corresponding data matrix, the row and/or column of the incidence matrix are/is filled by the compensation value to obtain a compensation matrix.
By implementing the embodiment, because the compensation value is set, the subsequent data set is obtained through the standardized compensation matrix, and the operation amount is reduced.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set, and the data set comprises the following steps:
the automobile ECU obtains a first intermediate matrix by performing product operation on each data matrix and the compensation matrix;
the automobile ECU processes the first intermediate matrix through an SHA512 algorithm to obtain a data set in a serialized form;
since the SHA512 algorithm is an irreversible algorithm, even if a data set is obtained, the corresponding data matrix cannot be cracked, and thus the identification information of the corresponding user cannot be obtained. In the embodiment of the present invention, the first predetermined algorithm refers to all the processing steps described above.
The automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value, and the matrix correlation value comprises the following steps:
the automobile ECU obtains a second intermediate matrix by performing product operation on each data matrix and the reference matrix;
the automobile ECU processes the second intermediate matrix through an SHA512 algorithm to obtain a reference data set in a serialized form;
and comparing the data set with the reference data set by the automobile ECU to obtain a set difference value, and taking the difference value as a matrix correlation value.
Since the SHA512 algorithm is an irreversible algorithm, even if a reference data set is obtained, the corresponding data matrix cannot be cracked, and thus the identification information of the user cannot be obtained. In the embodiment of the present invention, the first predetermined algorithm refers to all the processing steps described above. By setting the matrix correlation value, the problem of different results caused by reference matrix and compensation matrix operation can be solved, and thus the mapping relation between the matrix correlation value and the data grouping and matrix correlation value in the data set can be formed.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S4 further includes:
configuring a mutual exclusion rule for each user to request for remote control through a remote terminal; accordingly, when matching in the step S7, the vehicle ECU controls the vehicle to complete the corresponding function, otherwise, the step S9 includes:
and during matching, judging whether the request sent by the user through the remote terminal meets the mutual exclusion rule or not through the mutual exclusion rule that each user requests to carry out remote control through the remote terminal, and if so, controlling the vehicle to complete the corresponding function by the automobile ECU, otherwise, skipping to the step S9.
Optionally, the mutual exclusion rule may include a time rule, a vehicle state rule. The time rule is a cooling time range of the automobile for completing remote control at the last time, and when the time rule is in the cooling time range, the automobile ECU refuses requests sent by all users through the remote terminal; the vehicle state rule is as follows: by setting the awakening states of different functional components of the automobile, the automobile ECU accepts the requests sent by all users through the remote terminal when the awakening states of the functional components are met, otherwise, the automobile ECU rejects the requests sent by all users through the remote terminal. By setting the awakening state, the remote control request in the normal driving state can be effectively refused, and the safety of automobile driving is improved.
The information authentication method in the new energy automobile based on the technology of the Internet of things has the following beneficial effects: the acquired original user information is not stored in the automobile ECU, only the processed data is reserved for information authentication, and the reserved information and the original user information have a unique determination relation, so that the safety of information storage is met, and the accuracy of authentication identification is improved; and lawless persons can not obtain the verification information in a cracking mode, so that the remote control probability of the automobile is greatly reduced.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in random access memory, read only memory, electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
It is understood that various other changes and modifications may be made by those skilled in the art based on the technical idea of the present invention, and all such changes and modifications should fall within the protective scope of the claims of the present invention.