CN108650255A - A kind of safe communication method and system of information of vehicles - Google Patents
A kind of safe communication method and system of information of vehicles Download PDFInfo
- Publication number
- CN108650255A CN108650255A CN201810432112.2A CN201810432112A CN108650255A CN 108650255 A CN108650255 A CN 108650255A CN 201810432112 A CN201810432112 A CN 201810432112A CN 108650255 A CN108650255 A CN 108650255A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- information
- vehicles
- management end
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Traffic Control Systems (AREA)
Abstract
This application discloses a kind of safe communication method of information of vehicles, this method includes that acquisition vehicle encryption information is encrypted to the information of vehicles of acquisition in vehicle;And vehicle verification information is sent to management end;Management end judges that whether true the identity of vehicle is legal according to vehicle verification information;When the identity of vehicle is really legal, management end receives the vehicle encryption information;Vehicle encryption information is decrypted in management end, obtains information of vehicles.This method realizes the identification to vehicle before carrying out information of vehicles transmission, effectively prevent vehicle illegally controlled and its information by leakage the problem of, further ensure the safe operation of vehicle, pushed the fast development of car networking industry.Disclosed herein as well is a kind of safety communication systems of information of vehicles, it may have above-mentioned advantageous effect.
Description
Technical field
This application involves field of computer information security, more particularly to a kind of safe communication method of information of vehicles also relates to
And a kind of safety communication system of information of vehicles.
Background technology
In recent years, with the development of mobile communication and Internet technology, vehicle is gone out not by the event layers of hacker's long-range attack
Thoroughly, cause the relevant information of vehicle easily to be revealed and distorted in communication process, further result in vehicle by unauthorized access
And control, therefore the security breaches of information of vehicles mean a large amount of vehicle be faced be stolen, illegally control, unlock equivalent risk,
Huge economic loss will be brought to automobile industry.
In the prior art, vehicle is faced with more complicated secure communication environment, acquires information, as identity information,
Location information, temporal information etc., management information, as manufacturer and manufacturer's information, purchase place and temporal information, engine are compiled
Number information, speed changer type information etc., these information of vehicles are to be sent to the management end on backstage in the form of plaintext to be handled
And control, therefore, in its transmission process, there is being revealed and illegally distorted and palmed off, so as to cause
Management end is difficult to differentiate between the true legitimacy of the information of vehicles of reception, and can not effectively be supervised to vehicle.In addition, vehicle pair
It is equally also difficult to its true legitimacy in the control instruction that management end issues, is easy to be done by the signal that pseudo- platform is sent out
It disturbs, further results in the problem of vehicle is by unauthorized access and control, huge life is brought to users and vehicle manufacturer
Property hidden danger.
Therefore, how information of vehicles effectively to be avoided to be leaked and distort, vehicle is avoided illegally to be controlled, to ensure vehicle
Safe operation, be those skilled in the art's urgent problem to be solved to push the fast development of car networking industry.
Invention content
The purpose of the application is to provide a kind of safe communication method of information of vehicles, and this method is carrying out information of vehicles transmission
Before, realize the identification to vehicle, effectively prevent vehicle illegally controlled and its information by leakage the problem of,
The safe operation for further ensuring vehicle has pushed the fast development of car networking industry;The another object of the application is to provide
A kind of safety communication system of information of vehicles, all has above-mentioned advantageous effect.
In order to solve the above technical problems, the application provides a kind of safe communication method of information of vehicles, this method includes:
Vehicle is encrypted the information of vehicles of acquisition and obtains vehicle encryption information;And vehicle verification information is sent to pipe
Manage end;
The management end judges that whether true the identity of the vehicle is legal according to the vehicle verification information;
When the identity of the vehicle is really legal, the management end receives the vehicle encryption information;
The vehicle encryption information is decrypted in the management end, obtains the information of vehicles.
Preferably, the vehicle to the information of vehicles of acquisition be encrypted obtain vehicle encryption information include:
The vehicle is encrypted the information of vehicles using symmetric encipherment algorithm, obtains the vehicle encryption information.
Preferably, the vehicle verification information is digital certificate.
Preferably, the management end judges the whether true legal packet of the identity of the vehicle according to the vehicle verification information
It includes:
Whether effective verify the digital certificate;
It is true legal by the identity marks of the vehicle if the digital certificate is effective.
Preferably, the content of the verification includes the term of validity of the digital certificate, the true legitimacy of signature and is
It is no to be revoked.
Preferably, the vehicle encryption information is decrypted in the management end, obtains the information of vehicles and includes:
The vehicle verification information is parsed, first key is obtained;
The vehicle encryption information is decrypted using the first key, obtains the information of vehicles.
Preferably, the method further includes:
Management end verification information is sent to vehicle by the management end;
The vehicle judges that whether true the identity of the management end is legal according to the management end verification information;If so,
Then receive the control extension instruction that the management end is sent;And control extension instruction is decrypted, obtain control instruction.
Preferably, the control extension instruction carries out the control instruction using symmetric encipherment algorithm by the management end
Encryption obtains.
Preferably, described that control extension instruction is decrypted, obtaining control instruction includes:
The management end verification information is parsed, the second key is obtained;
It is decrypted using control extension instruction described in second key pair, obtains the control instruction.
In order to solve the above technical problems, the application also provides a kind of safety communication system of information of vehicles, which includes:
Vehicle is encrypted for the information of vehicles to acquisition and obtains vehicle encryption information;And vehicle verification information is sent out
It send to management end;
The management end, for judging that whether true the identity of the vehicle is legal according to the vehicle verification information;If
It is then to receive the vehicle encryption information;And the vehicle encryption information is decrypted, obtain the information of vehicles.
A kind of safe communication method of information of vehicles provided herein, including vehicle carry out the information of vehicles of acquisition
Encryption obtains vehicle encryption information;And vehicle verification information is sent to management end;The management end is verified according to the vehicle
Information judges that whether true the identity of the vehicle is legal;When the identity of the vehicle is really legal, the management end receives
The vehicle encryption information;The vehicle encryption information is decrypted in the management end, obtains the information of vehicles.
As it can be seen that technical solution provided herein carries out body to vehicle first before the communication for carrying out information of vehicles
Part verification, under the premise of ensureing that its identity is true legal, relevant information of vehicles is encrypted vehicle, and is sent to management
End, then it is decrypted by management end and obtains above-mentioned information of vehicles to be managed and control, by identity validation technology and letter
Encryption for information technology is combined, and effectively avoids that information of vehicles is leaked and is distorted in communication process, vehicle is illegally controlled
The problem of processed, has further ensured that car networking vehicle safety, terminal security, service platform safety, communication security etc. are comprehensive
Network security promotes vehicle, traffic, the fusion of information communication industry and upgrading, has pushed related industry ecology and value chain
The remodeling of system, realize vehicle car networking field security application.
Present invention also provides a kind of safety communication systems of information of vehicles, it may have above-mentioned advantageous effect, herein no longer
It repeats.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of the safe communication method of information of vehicles provided herein;
Fig. 2 is a kind of schematic diagram of the safety communication system of information of vehicles provided herein.
Specific implementation mode
The core of the application is to provide a kind of safe communication method of information of vehicles, and this method is carrying out information of vehicles transmission
Before, realize the identification to vehicle, effectively prevent vehicle illegally controlled and its information by leakage the problem of,
The safe operation for further ensuring vehicle has pushed the fast development of car networking industry;Another core of the application is to provide
A kind of safety communication system of information of vehicles, all has above-mentioned advantageous effect.
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
The all other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram of the safe communication method of information of vehicles provided herein,
This method may include:
S101:Vehicle is encrypted the information of vehicles of acquisition and obtains vehicle encryption information;And vehicle verification information is sent out
It send to management end;
Specifically, vehicle and management end be before the transmission for carrying out information of vehicles, can first to the information of vehicles of acquisition into
Row encryption specifically can realize the above process, for example, the ciphering process can be by corresponding by corresponding built-in encryption device
Encryption Algorithm realize, such as can generate symmetric key by symmetric encipherment algorithm, or public key generated by rivest, shamir, adelman
And private key or the two are combined, the application is not specifically limited the realization method of its ciphering process.Wherein, above-mentioned to add
Close device may include the processor that information of vehicles is encrypted, the memory for storing associated encryption algorithm and crystal oscillator, each
Class interface, power supply, time service/omniselector etc., to realize that timing positioning, information storage, safety certification and the information of vehicle add solution
Close equal service.Certainly, the installation site for above-mentioned encryption device in the car, the application do not limit.
In addition, the content of above-mentioned information of vehicles is not unique, such as may include the real time information of acquisition and relevant hard
Part information etc., wherein real time information may include identity information, location information, temporal information, manipulation information of vehicle etc., phase
The hardware information of pass may include then manufacturer's information, user information, time buying and location information, the engine mumber of vehicle
Information, speed changer type information etc., the application do not limit the content of information of vehicles.
Preferably, it may include that vehicle is adopted that above-mentioned vehicle, which is encrypted the information of vehicles of acquisition and obtains vehicle encryption information,
Information of vehicles is encrypted with symmetric encipherment algorithm, obtains vehicle encryption information.
Specifically, management end can first generate a pair of of symmetric key, and by one of symmetric key together with digital certificate one
Rise and be sent to vehicle, vehicle is encrypted information of vehicles using the symmetric key, obtains vehicle encryption information, and by its
It is sent to management end, management end is that the vehicle encryption information is decrypted in another symmetric key that oneself can be utilized to preserve,
Obtain information of vehicles.Certainly, which is only a kind of embodiment provided herein, not unique, it can be achieved that right
The encryption function of information of vehicles, such as rivest, shamir, adelman, the application do not do unique restriction.
Further, can also use the method that symmetric encipherment algorithm is combined with rivest, shamir, adelman to information of vehicles into
Row encryption, the safety communication of information of vehicles is effectively ensured.Specifically, vehicle is a pair of right by symmetric encipherment algorithm generation first
Claim key to preserve key A such as key A and key B, key B is encrypted using the public key that management end issues, and sends
To management end, management end is that acquisition key B is decrypted in the key B after can utilizing the private key pair encryption of oneself;Further, exist
When carrying out information of vehicles communication, vehicle is encrypted information of vehicles using key A, obtains vehicle encryption information, and sent out
It send to management end, management end is decrypted vehicle encryption information using the key B of acquisition, obtains information of vehicles.
Above-described embodiment is realized the communication of information of vehicles in the form of ciphertext, avoided by the way that information of vehicles is encrypted
Information leakage that plaintext communication band comes, by distorting the problems such as, the effective guarantee safety of information of vehicles is further ensured that
The safe operation of vehicle.
Further, first before vehicle encryption information is sent to management end by vehicle to ensure the safety of information of vehicles
Can first authentication be carried out to vehicle, specifically, the authentication information of the vehicle can be sent from vehicle to management end, i.e., on
Vehicle verification information is stated, management end can carry out true legitimate verification according to the vehicle verification information to the identity of the vehicle.
Wherein, above-mentioned vehicle verification information may include the correlated characteristic information of the vehicle, such as manufacturer's information, relevant core part
Information, such as engine mumber information, speed changer type information, particular content the application do not limit;It is of course also possible to sharp
Realize that above-mentioned authentication process itself, the application do not do unique restriction for the mode that vehicle identification is verified with digital certificate.
Preferably, above-mentioned vehicle verification information can be digital certificate.
Specifically, in a kind of embodiment provided by the present application, the identity that vehicle is carried out in the form of digital certificate is tested
Card.First, before carrying out authentication, certificate request is generated by vehicle, management end then can be according to the certificate request of reception
Corresponding digital certificate is provided for vehicle, is preserved, is specifically can save into the corresponding safety certification device of vehicle by vehicle,
Certainly, unique restriction is not done for its save location the application, in addition, particular content the application for digital certificate is not also done
It is specific to limit;Further, when vehicle and management end carry out the communication of information of vehicles, for example, vehicle needs to report to management end
When position or other information, digital certificate first can be sent to management end by vehicle, and management end then can be according to the digital certificate to this
Vehicle carries out authentication.
In addition, when management end needs to send corresponding control instruction to vehicle, the digital certificate of oneself can also be sent out
It send to vehicle, its true legitimacy is verified by the relevant safety certification device of vehicle, then in the biography for carrying out relevant control instruction
It is defeated, hereby it is achieved that the bidirectional safe certification between vehicle and management end.
S102:Management end judges that whether true the identity of vehicle is legal according to vehicle verification information;
Specifically, after the vehicle verification information that management end receives vehicle transmission, you can according to the vehicle verification information
Judge the true legitimacy of vehicle identification, the content that can included according to above-mentioned vehicle verification information specifically, such as the phase of the vehicle
Characteristic information etc. is closed to be judged.
Preferably, above-mentioned to judge that the true legitimacy of vehicle identification may include verification number card according to vehicle verification information
Whether book is effective;It is true legal by the identity marks of vehicle if digital certificate is effective.
Specifically, when carrying out the true legitimate verification of vehicle identification using digital certificate, the number can be first verified
The validity of certificate, if the digital certificate is effective, you can illustrate that the identity of the vehicle is true legal, you can by the vehicle
Identity marks be true legal, in order to carry out the transmission of subsequent vehicle information.
Preferably, the content of above-mentioned verification may include the term of validity of digital certificate, the true legitimacy of signature and be
It is no to be revoked.
Specifically, when being verified to digital certificate, it can verify whether it exceeds the term of validity, whether signature is true
Legal and whether it is in being revoked state, since the digital certificate is sent out from management end to vehicle, therefore it internal is protected
There is the relevant information of the digital certificate, specifically can mutually be compareed, to obtain corresponding verification result.If the number is demonstrate,proved
Book is true legal without departing from the term of validity, signature, and is not revoked, you can illustrate the digital certificate be it is effective, also further
Illustrate that the identity of the vehicle is true legal.Certainly, above-mentioned verification content is only a kind of preferred implementation provided herein
Mode uniquely can also not include other related contents, can be specifically determined according to actual conditions, the application is not
It limits.
S103:When the identity of vehicle is really legal, management end receives vehicle encryption information;
S104:It is when the identity of vehicle is untrue legal, then without any processing;
Specifically, management end carry out vehicle identification true validity judgement when, if as a result, the body of the vehicle
Part is true legal, then the vehicle encryption information sent by the vehicle can be further received, to carry out subsequent processing;If it is tied
Fruit is that the identity of the vehicle is untrue legal, then illustrates that the vehicle may be not belonging to the management and control range or the vehicle of the management end
Relevant information be leaked and distorted, illegally controlled or other similar situations, at this point, not allowing after continued access then
Any information for receiving the vehicle no longer needs to do any relevant treatment.
S105:Vehicle encryption information is decrypted in management end, obtains information of vehicles.
Specifically, after management end receives the vehicle encryption information, you can the vehicle encryption information is decrypted, with
Corresponding information of vehicles is obtained, thereby ensures that the safety communication of information of vehicles.Wherein, the manner of decryption of vehicle encryption information can
Corresponding to the ciphering process of information of vehicles, if for example, vehicle encryption information is obtained by symmetric encipherment algorithm, can utilize
It is decrypted in the inverse operation of symmetric encipherment algorithm, obtains above-mentioned information of vehicles, and detailed process is no longer illustrated herein.
Preferably, above-mentioned that vehicle encryption information is decrypted, it may include to vehicle verification information to obtain information of vehicles
It is parsed, obtains first key;The vehicle encryption information is decrypted using first key, obtains information of vehicles.
Specifically, vehicle complete to the encryption of information of vehicles after, can by the corresponding decruption key of its encryption key, i.e., on
It states first key to be stored in vehicle verification information, is sent to management end together;Further, management end is in the body for verifying the vehicle
It is part true it is legal after, you can parsing is carried out to vehicle verification information and obtains above-mentioned first key, and using the first key to vehicle
Encryption information is decrypted, and obtains information of vehicles.
It is tested it should be noted that information of vehicles is encrypted in above-mentioned vehicle process and management end carry out identity to vehicle
The process of card, the sequencing the application executed do not limit, and the two can be also carried out at the same time, and the communication to improve both sides is imitated
Rate.
The safe communication method of information of vehicles provided herein carries out identity validation technology and information encryption
In conjunction with effectively avoiding the problem of information of vehicles is leaked and is distorted in communication process, vehicle is illegally controlled, further
It has ensured the comprehensive network securitys such as car networking vehicle safety, terminal security, service platform safety, communication security, has promoted
Vehicle, traffic, the fusion of information communication industry and upgrading have pushed the remodeling of related industry ecology and value chain system's, realize
Security application of the vehicle in car networking field.
On the basis of the above embodiments:
As a kind of preferred embodiment, management end verification information can also be sent to vehicle by this method including management end;
Vehicle judges that whether true the identity of management end is legal according to management end verification information;If so, receiver management terminal transmission adds
Close control instruction;And control extension instruction is decrypted, obtain control instruction.
Specifically, this method can also realize that management end controls the management of vehicle, to ensure its control instruction issued
Safety, first, management end the control instruction can be encrypted obtain control extension instruction, encryption method the application
It is not specifically limited, and specifically can refer to the ciphering process of information of vehicles for its ciphering process, details are not described herein;Into one
Corresponding authentication information, i.e., above-mentioned management end verification information are sent to corresponding vehicle, are judged by vehicle by step, management end
The true legitimacy of the management end identity, if the identity of the management end is really legal, you can receive above-mentioned control extension instruction;Most
Afterwards, control extension instruction is decrypted in vehicle, corresponding control instruction is obtained, likewise, its decrypting process can correspond to
The ciphering process of information of vehicles, details are not described herein.
Wherein, safe operation management and control of the management end to vehicle may be implemented in above-mentioned control instruction, such as can control vehicle
Run time, place and region etc., certainly, above-mentioned management end are only that the application is carried to the various control instructions that vehicle issues
The partial content of confession, however it is not limited to this, it can specifically be set as the case may be.
Preferably, above-mentioned control extension instruction can be encrypted control instruction using symmetric encipherment algorithm by management end
It obtains.
Specifically, symmetric encipherment algorithm realization when control instruction is encrypted, equally can be used in management end, it is specific
Ciphering process can refer to the detailed process that information of vehicles is encrypted in vehicle, and this will not be repeated here by the application.Certainly, the encryption
Mode is only a kind of preferred embodiment provided herein, and not uniquely, similar functions can be achieved in other cipher modes, this
Application does not limit this.
The preferred embodiment is realized the reception and registration of control instruction in the form of ciphertext, avoided by the way that control instruction is encrypted
Leaking data that plaintext communication band comes, by distorting the problems such as, the safety that effective guarantee control refers to avoids vehicle incident
It is illegally controlled, further ensures the safe operation of vehicle.
Preferably, above-mentioned that control extension instruction is decrypted, it may include verifying to believe to management end to obtain control instruction
Breath is parsed, and the second key is obtained;It is decrypted using the second key pair encryption control instruction, obtains control instruction.
Specifically, management end can equally instruct control extension corresponding decruption key, i.e., above-mentioned second key to preserve
In management end verification information, vehicle can similarly test management end when the control extension instruction to reception is decrypted
Card information is parsed, and obtains above-mentioned second key, and be decrypted using the second key pair encryption control instruction, to obtain
Corresponding control instruction.
The present embodiment is on the basis of management end carries out authentication to vehicle, information of vehicles is encrypted, further
It increases vehicle and security verification is carried out to the identity of management end, and the control instruction that it sends out is encrypted, it is effectively real
The bidirectional safe communication for having showed related data information between vehicle and management end, further ensures the safe operation of vehicle.
To solve the above problems, referring to FIG. 2, Fig. 2 is a kind of safety communication system of information of vehicles provided herein
The schematic diagram of system, the system may include:
Vehicle 10 is encrypted for the information of vehicles to acquisition and obtains vehicle encryption information;And by vehicle verification information
It is sent to management end 20;
Management end 20, for judging that whether true the identity of vehicle 20 is legal according to vehicle verification information;If so, receiving
Vehicle encryption information;And vehicle encryption information is decrypted, obtain information of vehicles.
Above method embodiment is please referred to for the introduction of system provided by the present application, this will not be repeated here by the application.
Each embodiment is described by the way of progressive in specification, the highlights of each of the examples are with other realities
Apply the difference of example, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment
Speech, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is referring to method part illustration
.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think to exceed scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
The safe communication method and system of information of vehicles provided herein are described in detail above.Herein
In apply specific case the principle and implementation of this application are described, the explanation of above example is only intended to sides
Assistant solves the present processes and its core concept.It should be pointed out that for those skilled in the art, not
Be detached from the application principle under the premise of, can also to the application, some improvement and modification can also be carried out, these improvement and modification are also fallen into
The application scope of the claims element.
Claims (10)
1. a kind of safe communication method of information of vehicles, which is characterized in that the method includes:
Vehicle is encrypted the information of vehicles of acquisition and obtains vehicle encryption information;And vehicle verification information is sent to management
End;
The management end judges that whether true the identity of the vehicle is legal according to the vehicle verification information;
When the identity of the vehicle is really legal, the management end receives the vehicle encryption information;
The vehicle encryption information is decrypted in the management end, obtains the information of vehicles.
2. the method as described in claim 1, which is characterized in that acquisition vehicle is encrypted to the information of vehicles of acquisition in the vehicle
Encryption information includes:
The vehicle is encrypted the information of vehicles using symmetric encipherment algorithm, obtains the vehicle encryption information.
3. the method as described in claim 1, which is characterized in that the vehicle verification information is digital certificate.
4. method as claimed in claim 3, which is characterized in that the management end is according to described in vehicle verification information judgement
Whether the identity of vehicle is really legal to include:
Whether effective verify the digital certificate;
It is true legal by the identity marks of the vehicle if the digital certificate is effective.
5. method as claimed in claim 4, which is characterized in that the content of the verification includes the effective of the digital certificate
Phase, signature true legitimacy and whether be revoked.
6. the method as described in claim 1, which is characterized in that the vehicle encryption information is decrypted in the management end,
Obtaining the information of vehicles includes:
The vehicle verification information is parsed, first key is obtained;
The vehicle encryption information is decrypted using the first key, obtains the information of vehicles.
7. the method as described in claim 1, which is characterized in that further include:
Management end verification information is sent to vehicle by the management end;
The vehicle judges that whether true the identity of the management end is legal according to the management end verification information;If so, connecing
Receive the control extension instruction that the management end is sent;And control extension instruction is decrypted, obtain control instruction.
8. the method for claim 7, which is characterized in that the control extension instruction is added by the management end using symmetrical
Acquisition is encrypted to the control instruction in close algorithm.
9. method as claimed in claim 8, which is characterized in that it is described that control extension instruction is decrypted, it is controlled
System instructs:
The management end verification information is parsed, the second key is obtained;
It is decrypted using control extension instruction described in second key pair, obtains the control instruction.
10. a kind of safety communication system of information of vehicles, which is characterized in that the system comprises:
Vehicle is encrypted for the information of vehicles to acquisition and obtains vehicle encryption information;And vehicle verification information is sent to
Management end;
The management end, for judging that whether true the identity of the vehicle is legal according to the vehicle verification information;If so,
Receive the vehicle encryption information;And the vehicle encryption information is decrypted, obtain the information of vehicles.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810432112.2A CN108650255A (en) | 2018-05-08 | 2018-05-08 | A kind of safe communication method and system of information of vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810432112.2A CN108650255A (en) | 2018-05-08 | 2018-05-08 | A kind of safe communication method and system of information of vehicles |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108650255A true CN108650255A (en) | 2018-10-12 |
Family
ID=63749390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810432112.2A Pending CN108650255A (en) | 2018-05-08 | 2018-05-08 | A kind of safe communication method and system of information of vehicles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108650255A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110134836A (en) * | 2019-04-09 | 2019-08-16 | 深圳市赛格导航科技股份有限公司 | Information of vehicles processing, verification method, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040025011A1 (en) * | 2002-07-30 | 2004-02-05 | Jerome Azema | Secure management of configuration parameters in a computing platform |
WO2013110669A3 (en) * | 2012-01-23 | 2013-11-21 | Youview Tv Limited | Method and devices for auhtorisation in content provision system |
CN104936180A (en) * | 2015-06-26 | 2015-09-23 | 陈昊 | Authentication system and method for providing authentication service specific to unmanned aerial vehicle and ground station |
CN104955047A (en) * | 2015-06-26 | 2015-09-30 | 陈昊 | Authentication center for providing authentication service for unmanned aerial vehicles and authentication method |
CN105792207A (en) * | 2016-04-29 | 2016-07-20 | 北京航空航天大学 | Vehicle networking authentication method facing vehicle differentiation |
-
2018
- 2018-05-08 CN CN201810432112.2A patent/CN108650255A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040025011A1 (en) * | 2002-07-30 | 2004-02-05 | Jerome Azema | Secure management of configuration parameters in a computing platform |
WO2013110669A3 (en) * | 2012-01-23 | 2013-11-21 | Youview Tv Limited | Method and devices for auhtorisation in content provision system |
CN104936180A (en) * | 2015-06-26 | 2015-09-23 | 陈昊 | Authentication system and method for providing authentication service specific to unmanned aerial vehicle and ground station |
CN104955047A (en) * | 2015-06-26 | 2015-09-30 | 陈昊 | Authentication center for providing authentication service for unmanned aerial vehicles and authentication method |
CN105792207A (en) * | 2016-04-29 | 2016-07-20 | 北京航空航天大学 | Vehicle networking authentication method facing vehicle differentiation |
Non-Patent Citations (1)
Title |
---|
张仕斌等: "《应用密码学(卓越工程师计划)》", 31 January 2017 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110134836A (en) * | 2019-04-09 | 2019-08-16 | 深圳市赛格导航科技股份有限公司 | Information of vehicles processing, verification method, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109309565B (en) | Security authentication method and device | |
CN106899410B (en) | A kind of method and device of equipment identities certification | |
CN105450406B (en) | The method and apparatus of data processing | |
US20170208049A1 (en) | Key agreement method and device for verification information | |
CN107105060A (en) | A kind of method for realizing electric automobile information security | |
KR101549034B1 (en) | Method for guarantying the confidentiality and integrity of a data in Controller Area Networks | |
CN112528250B (en) | System and method for realizing data privacy and digital identity through block chain | |
CN102299930B (en) | Method for ensuring security of client software | |
CN109728914B (en) | Digital signature verification method, system, device and computer readable storage medium | |
CN110365486B (en) | Certificate application method, device and equipment | |
CN101610150B (en) | Third-party digital signature method and data transmission system | |
CN109729523A (en) | A kind of method and apparatus of terminal networking certification | |
CN112532393A (en) | Verification method of cross-link transaction, relay link node equipment and medium | |
CN101272616A (en) | Safety access method of wireless metropolitan area network | |
CN109831311A (en) | A kind of server validation method, system, user terminal and readable storage medium storing program for executing | |
CN104717063A (en) | Software security protection method of mobile terminal | |
CN111552270A (en) | Safety authentication and data transmission method and device for vehicle-mounted diagnosis | |
CN109495441A (en) | Access authentication method, device, relevant device and computer readable storage medium | |
CN103177225B (en) | A kind of data managing method and system | |
WO2017020530A1 (en) | Enhanced wlan certificate authentication method, device and system | |
CN104243452A (en) | Method and system for cloud computing access control | |
CN110611679A (en) | Data transmission method, device, equipment and system | |
CN108696517A (en) | A kind of safe communication method, the apparatus and system of unmanned vehicle information | |
CN116073989A (en) | Authentication data processing method, device, system, equipment and medium | |
CN106096336B (en) | Software anti-crack method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181012 |
|
RJ01 | Rejection of invention patent application after publication |