CN108650255A - A kind of safe communication method and system of information of vehicles - Google Patents

A kind of safe communication method and system of information of vehicles Download PDF

Info

Publication number
CN108650255A
CN108650255A CN201810432112.2A CN201810432112A CN108650255A CN 108650255 A CN108650255 A CN 108650255A CN 201810432112 A CN201810432112 A CN 201810432112A CN 108650255 A CN108650255 A CN 108650255A
Authority
CN
China
Prior art keywords
vehicle
information
vehicles
management end
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810432112.2A
Other languages
Chinese (zh)
Inventor
郭经宇
郭刚
宋志华
成盼青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201810432112.2A priority Critical patent/CN108650255A/en
Publication of CN108650255A publication Critical patent/CN108650255A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Traffic Control Systems (AREA)

Abstract

This application discloses a kind of safe communication method of information of vehicles, this method includes that acquisition vehicle encryption information is encrypted to the information of vehicles of acquisition in vehicle;And vehicle verification information is sent to management end;Management end judges that whether true the identity of vehicle is legal according to vehicle verification information;When the identity of vehicle is really legal, management end receives the vehicle encryption information;Vehicle encryption information is decrypted in management end, obtains information of vehicles.This method realizes the identification to vehicle before carrying out information of vehicles transmission, effectively prevent vehicle illegally controlled and its information by leakage the problem of, further ensure the safe operation of vehicle, pushed the fast development of car networking industry.Disclosed herein as well is a kind of safety communication systems of information of vehicles, it may have above-mentioned advantageous effect.

Description

A kind of safe communication method and system of information of vehicles
Technical field
This application involves field of computer information security, more particularly to a kind of safe communication method of information of vehicles also relates to And a kind of safety communication system of information of vehicles.
Background technology
In recent years, with the development of mobile communication and Internet technology, vehicle is gone out not by the event layers of hacker's long-range attack Thoroughly, cause the relevant information of vehicle easily to be revealed and distorted in communication process, further result in vehicle by unauthorized access And control, therefore the security breaches of information of vehicles mean a large amount of vehicle be faced be stolen, illegally control, unlock equivalent risk, Huge economic loss will be brought to automobile industry.
In the prior art, vehicle is faced with more complicated secure communication environment, acquires information, as identity information, Location information, temporal information etc., management information, as manufacturer and manufacturer's information, purchase place and temporal information, engine are compiled Number information, speed changer type information etc., these information of vehicles are to be sent to the management end on backstage in the form of plaintext to be handled And control, therefore, in its transmission process, there is being revealed and illegally distorted and palmed off, so as to cause Management end is difficult to differentiate between the true legitimacy of the information of vehicles of reception, and can not effectively be supervised to vehicle.In addition, vehicle pair It is equally also difficult to its true legitimacy in the control instruction that management end issues, is easy to be done by the signal that pseudo- platform is sent out It disturbs, further results in the problem of vehicle is by unauthorized access and control, huge life is brought to users and vehicle manufacturer Property hidden danger.
Therefore, how information of vehicles effectively to be avoided to be leaked and distort, vehicle is avoided illegally to be controlled, to ensure vehicle Safe operation, be those skilled in the art's urgent problem to be solved to push the fast development of car networking industry.
Invention content
The purpose of the application is to provide a kind of safe communication method of information of vehicles, and this method is carrying out information of vehicles transmission Before, realize the identification to vehicle, effectively prevent vehicle illegally controlled and its information by leakage the problem of, The safe operation for further ensuring vehicle has pushed the fast development of car networking industry;The another object of the application is to provide A kind of safety communication system of information of vehicles, all has above-mentioned advantageous effect.
In order to solve the above technical problems, the application provides a kind of safe communication method of information of vehicles, this method includes:
Vehicle is encrypted the information of vehicles of acquisition and obtains vehicle encryption information;And vehicle verification information is sent to pipe Manage end;
The management end judges that whether true the identity of the vehicle is legal according to the vehicle verification information;
When the identity of the vehicle is really legal, the management end receives the vehicle encryption information;
The vehicle encryption information is decrypted in the management end, obtains the information of vehicles.
Preferably, the vehicle to the information of vehicles of acquisition be encrypted obtain vehicle encryption information include:
The vehicle is encrypted the information of vehicles using symmetric encipherment algorithm, obtains the vehicle encryption information.
Preferably, the vehicle verification information is digital certificate.
Preferably, the management end judges the whether true legal packet of the identity of the vehicle according to the vehicle verification information It includes:
Whether effective verify the digital certificate;
It is true legal by the identity marks of the vehicle if the digital certificate is effective.
Preferably, the content of the verification includes the term of validity of the digital certificate, the true legitimacy of signature and is It is no to be revoked.
Preferably, the vehicle encryption information is decrypted in the management end, obtains the information of vehicles and includes:
The vehicle verification information is parsed, first key is obtained;
The vehicle encryption information is decrypted using the first key, obtains the information of vehicles.
Preferably, the method further includes:
Management end verification information is sent to vehicle by the management end;
The vehicle judges that whether true the identity of the management end is legal according to the management end verification information;If so, Then receive the control extension instruction that the management end is sent;And control extension instruction is decrypted, obtain control instruction.
Preferably, the control extension instruction carries out the control instruction using symmetric encipherment algorithm by the management end Encryption obtains.
Preferably, described that control extension instruction is decrypted, obtaining control instruction includes:
The management end verification information is parsed, the second key is obtained;
It is decrypted using control extension instruction described in second key pair, obtains the control instruction.
In order to solve the above technical problems, the application also provides a kind of safety communication system of information of vehicles, which includes:
Vehicle is encrypted for the information of vehicles to acquisition and obtains vehicle encryption information;And vehicle verification information is sent out It send to management end;
The management end, for judging that whether true the identity of the vehicle is legal according to the vehicle verification information;If It is then to receive the vehicle encryption information;And the vehicle encryption information is decrypted, obtain the information of vehicles.
A kind of safe communication method of information of vehicles provided herein, including vehicle carry out the information of vehicles of acquisition Encryption obtains vehicle encryption information;And vehicle verification information is sent to management end;The management end is verified according to the vehicle Information judges that whether true the identity of the vehicle is legal;When the identity of the vehicle is really legal, the management end receives The vehicle encryption information;The vehicle encryption information is decrypted in the management end, obtains the information of vehicles.
As it can be seen that technical solution provided herein carries out body to vehicle first before the communication for carrying out information of vehicles Part verification, under the premise of ensureing that its identity is true legal, relevant information of vehicles is encrypted vehicle, and is sent to management End, then it is decrypted by management end and obtains above-mentioned information of vehicles to be managed and control, by identity validation technology and letter Encryption for information technology is combined, and effectively avoids that information of vehicles is leaked and is distorted in communication process, vehicle is illegally controlled The problem of processed, has further ensured that car networking vehicle safety, terminal security, service platform safety, communication security etc. are comprehensive Network security promotes vehicle, traffic, the fusion of information communication industry and upgrading, has pushed related industry ecology and value chain The remodeling of system, realize vehicle car networking field security application.
Present invention also provides a kind of safety communication systems of information of vehicles, it may have above-mentioned advantageous effect, herein no longer It repeats.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of the safe communication method of information of vehicles provided herein;
Fig. 2 is a kind of schematic diagram of the safety communication system of information of vehicles provided herein.
Specific implementation mode
The core of the application is to provide a kind of safe communication method of information of vehicles, and this method is carrying out information of vehicles transmission Before, realize the identification to vehicle, effectively prevent vehicle illegally controlled and its information by leakage the problem of, The safe operation for further ensuring vehicle has pushed the fast development of car networking industry;Another core of the application is to provide A kind of safety communication system of information of vehicles, all has above-mentioned advantageous effect.
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art The all other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, Fig. 1 is a kind of flow diagram of the safe communication method of information of vehicles provided herein, This method may include:
S101:Vehicle is encrypted the information of vehicles of acquisition and obtains vehicle encryption information;And vehicle verification information is sent out It send to management end;
Specifically, vehicle and management end be before the transmission for carrying out information of vehicles, can first to the information of vehicles of acquisition into Row encryption specifically can realize the above process, for example, the ciphering process can be by corresponding by corresponding built-in encryption device Encryption Algorithm realize, such as can generate symmetric key by symmetric encipherment algorithm, or public key generated by rivest, shamir, adelman And private key or the two are combined, the application is not specifically limited the realization method of its ciphering process.Wherein, above-mentioned to add Close device may include the processor that information of vehicles is encrypted, the memory for storing associated encryption algorithm and crystal oscillator, each Class interface, power supply, time service/omniselector etc., to realize that timing positioning, information storage, safety certification and the information of vehicle add solution Close equal service.Certainly, the installation site for above-mentioned encryption device in the car, the application do not limit.
In addition, the content of above-mentioned information of vehicles is not unique, such as may include the real time information of acquisition and relevant hard Part information etc., wherein real time information may include identity information, location information, temporal information, manipulation information of vehicle etc., phase The hardware information of pass may include then manufacturer's information, user information, time buying and location information, the engine mumber of vehicle Information, speed changer type information etc., the application do not limit the content of information of vehicles.
Preferably, it may include that vehicle is adopted that above-mentioned vehicle, which is encrypted the information of vehicles of acquisition and obtains vehicle encryption information, Information of vehicles is encrypted with symmetric encipherment algorithm, obtains vehicle encryption information.
Specifically, management end can first generate a pair of of symmetric key, and by one of symmetric key together with digital certificate one Rise and be sent to vehicle, vehicle is encrypted information of vehicles using the symmetric key, obtains vehicle encryption information, and by its It is sent to management end, management end is that the vehicle encryption information is decrypted in another symmetric key that oneself can be utilized to preserve, Obtain information of vehicles.Certainly, which is only a kind of embodiment provided herein, not unique, it can be achieved that right The encryption function of information of vehicles, such as rivest, shamir, adelman, the application do not do unique restriction.
Further, can also use the method that symmetric encipherment algorithm is combined with rivest, shamir, adelman to information of vehicles into Row encryption, the safety communication of information of vehicles is effectively ensured.Specifically, vehicle is a pair of right by symmetric encipherment algorithm generation first Claim key to preserve key A such as key A and key B, key B is encrypted using the public key that management end issues, and sends To management end, management end is that acquisition key B is decrypted in the key B after can utilizing the private key pair encryption of oneself;Further, exist When carrying out information of vehicles communication, vehicle is encrypted information of vehicles using key A, obtains vehicle encryption information, and sent out It send to management end, management end is decrypted vehicle encryption information using the key B of acquisition, obtains information of vehicles.
Above-described embodiment is realized the communication of information of vehicles in the form of ciphertext, avoided by the way that information of vehicles is encrypted Information leakage that plaintext communication band comes, by distorting the problems such as, the effective guarantee safety of information of vehicles is further ensured that The safe operation of vehicle.
Further, first before vehicle encryption information is sent to management end by vehicle to ensure the safety of information of vehicles Can first authentication be carried out to vehicle, specifically, the authentication information of the vehicle can be sent from vehicle to management end, i.e., on Vehicle verification information is stated, management end can carry out true legitimate verification according to the vehicle verification information to the identity of the vehicle. Wherein, above-mentioned vehicle verification information may include the correlated characteristic information of the vehicle, such as manufacturer's information, relevant core part Information, such as engine mumber information, speed changer type information, particular content the application do not limit;It is of course also possible to sharp Realize that above-mentioned authentication process itself, the application do not do unique restriction for the mode that vehicle identification is verified with digital certificate.
Preferably, above-mentioned vehicle verification information can be digital certificate.
Specifically, in a kind of embodiment provided by the present application, the identity that vehicle is carried out in the form of digital certificate is tested Card.First, before carrying out authentication, certificate request is generated by vehicle, management end then can be according to the certificate request of reception Corresponding digital certificate is provided for vehicle, is preserved, is specifically can save into the corresponding safety certification device of vehicle by vehicle, Certainly, unique restriction is not done for its save location the application, in addition, particular content the application for digital certificate is not also done It is specific to limit;Further, when vehicle and management end carry out the communication of information of vehicles, for example, vehicle needs to report to management end When position or other information, digital certificate first can be sent to management end by vehicle, and management end then can be according to the digital certificate to this Vehicle carries out authentication.
In addition, when management end needs to send corresponding control instruction to vehicle, the digital certificate of oneself can also be sent out It send to vehicle, its true legitimacy is verified by the relevant safety certification device of vehicle, then in the biography for carrying out relevant control instruction It is defeated, hereby it is achieved that the bidirectional safe certification between vehicle and management end.
S102:Management end judges that whether true the identity of vehicle is legal according to vehicle verification information;
Specifically, after the vehicle verification information that management end receives vehicle transmission, you can according to the vehicle verification information Judge the true legitimacy of vehicle identification, the content that can included according to above-mentioned vehicle verification information specifically, such as the phase of the vehicle Characteristic information etc. is closed to be judged.
Preferably, above-mentioned to judge that the true legitimacy of vehicle identification may include verification number card according to vehicle verification information Whether book is effective;It is true legal by the identity marks of vehicle if digital certificate is effective.
Specifically, when carrying out the true legitimate verification of vehicle identification using digital certificate, the number can be first verified The validity of certificate, if the digital certificate is effective, you can illustrate that the identity of the vehicle is true legal, you can by the vehicle Identity marks be true legal, in order to carry out the transmission of subsequent vehicle information.
Preferably, the content of above-mentioned verification may include the term of validity of digital certificate, the true legitimacy of signature and be It is no to be revoked.
Specifically, when being verified to digital certificate, it can verify whether it exceeds the term of validity, whether signature is true Legal and whether it is in being revoked state, since the digital certificate is sent out from management end to vehicle, therefore it internal is protected There is the relevant information of the digital certificate, specifically can mutually be compareed, to obtain corresponding verification result.If the number is demonstrate,proved Book is true legal without departing from the term of validity, signature, and is not revoked, you can illustrate the digital certificate be it is effective, also further Illustrate that the identity of the vehicle is true legal.Certainly, above-mentioned verification content is only a kind of preferred implementation provided herein Mode uniquely can also not include other related contents, can be specifically determined according to actual conditions, the application is not It limits.
S103:When the identity of vehicle is really legal, management end receives vehicle encryption information;
S104:It is when the identity of vehicle is untrue legal, then without any processing;
Specifically, management end carry out vehicle identification true validity judgement when, if as a result, the body of the vehicle Part is true legal, then the vehicle encryption information sent by the vehicle can be further received, to carry out subsequent processing;If it is tied Fruit is that the identity of the vehicle is untrue legal, then illustrates that the vehicle may be not belonging to the management and control range or the vehicle of the management end Relevant information be leaked and distorted, illegally controlled or other similar situations, at this point, not allowing after continued access then Any information for receiving the vehicle no longer needs to do any relevant treatment.
S105:Vehicle encryption information is decrypted in management end, obtains information of vehicles.
Specifically, after management end receives the vehicle encryption information, you can the vehicle encryption information is decrypted, with Corresponding information of vehicles is obtained, thereby ensures that the safety communication of information of vehicles.Wherein, the manner of decryption of vehicle encryption information can Corresponding to the ciphering process of information of vehicles, if for example, vehicle encryption information is obtained by symmetric encipherment algorithm, can utilize It is decrypted in the inverse operation of symmetric encipherment algorithm, obtains above-mentioned information of vehicles, and detailed process is no longer illustrated herein.
Preferably, above-mentioned that vehicle encryption information is decrypted, it may include to vehicle verification information to obtain information of vehicles It is parsed, obtains first key;The vehicle encryption information is decrypted using first key, obtains information of vehicles.
Specifically, vehicle complete to the encryption of information of vehicles after, can by the corresponding decruption key of its encryption key, i.e., on It states first key to be stored in vehicle verification information, is sent to management end together;Further, management end is in the body for verifying the vehicle It is part true it is legal after, you can parsing is carried out to vehicle verification information and obtains above-mentioned first key, and using the first key to vehicle Encryption information is decrypted, and obtains information of vehicles.
It is tested it should be noted that information of vehicles is encrypted in above-mentioned vehicle process and management end carry out identity to vehicle The process of card, the sequencing the application executed do not limit, and the two can be also carried out at the same time, and the communication to improve both sides is imitated Rate.
The safe communication method of information of vehicles provided herein carries out identity validation technology and information encryption In conjunction with effectively avoiding the problem of information of vehicles is leaked and is distorted in communication process, vehicle is illegally controlled, further It has ensured the comprehensive network securitys such as car networking vehicle safety, terminal security, service platform safety, communication security, has promoted Vehicle, traffic, the fusion of information communication industry and upgrading have pushed the remodeling of related industry ecology and value chain system's, realize Security application of the vehicle in car networking field.
On the basis of the above embodiments:
As a kind of preferred embodiment, management end verification information can also be sent to vehicle by this method including management end; Vehicle judges that whether true the identity of management end is legal according to management end verification information;If so, receiver management terminal transmission adds Close control instruction;And control extension instruction is decrypted, obtain control instruction.
Specifically, this method can also realize that management end controls the management of vehicle, to ensure its control instruction issued Safety, first, management end the control instruction can be encrypted obtain control extension instruction, encryption method the application It is not specifically limited, and specifically can refer to the ciphering process of information of vehicles for its ciphering process, details are not described herein;Into one Corresponding authentication information, i.e., above-mentioned management end verification information are sent to corresponding vehicle, are judged by vehicle by step, management end The true legitimacy of the management end identity, if the identity of the management end is really legal, you can receive above-mentioned control extension instruction;Most Afterwards, control extension instruction is decrypted in vehicle, corresponding control instruction is obtained, likewise, its decrypting process can correspond to The ciphering process of information of vehicles, details are not described herein.
Wherein, safe operation management and control of the management end to vehicle may be implemented in above-mentioned control instruction, such as can control vehicle Run time, place and region etc., certainly, above-mentioned management end are only that the application is carried to the various control instructions that vehicle issues The partial content of confession, however it is not limited to this, it can specifically be set as the case may be.
Preferably, above-mentioned control extension instruction can be encrypted control instruction using symmetric encipherment algorithm by management end It obtains.
Specifically, symmetric encipherment algorithm realization when control instruction is encrypted, equally can be used in management end, it is specific Ciphering process can refer to the detailed process that information of vehicles is encrypted in vehicle, and this will not be repeated here by the application.Certainly, the encryption Mode is only a kind of preferred embodiment provided herein, and not uniquely, similar functions can be achieved in other cipher modes, this Application does not limit this.
The preferred embodiment is realized the reception and registration of control instruction in the form of ciphertext, avoided by the way that control instruction is encrypted Leaking data that plaintext communication band comes, by distorting the problems such as, the safety that effective guarantee control refers to avoids vehicle incident It is illegally controlled, further ensures the safe operation of vehicle.
Preferably, above-mentioned that control extension instruction is decrypted, it may include verifying to believe to management end to obtain control instruction Breath is parsed, and the second key is obtained;It is decrypted using the second key pair encryption control instruction, obtains control instruction.
Specifically, management end can equally instruct control extension corresponding decruption key, i.e., above-mentioned second key to preserve In management end verification information, vehicle can similarly test management end when the control extension instruction to reception is decrypted Card information is parsed, and obtains above-mentioned second key, and be decrypted using the second key pair encryption control instruction, to obtain Corresponding control instruction.
The present embodiment is on the basis of management end carries out authentication to vehicle, information of vehicles is encrypted, further It increases vehicle and security verification is carried out to the identity of management end, and the control instruction that it sends out is encrypted, it is effectively real The bidirectional safe communication for having showed related data information between vehicle and management end, further ensures the safe operation of vehicle.
To solve the above problems, referring to FIG. 2, Fig. 2 is a kind of safety communication system of information of vehicles provided herein The schematic diagram of system, the system may include:
Vehicle 10 is encrypted for the information of vehicles to acquisition and obtains vehicle encryption information;And by vehicle verification information It is sent to management end 20;
Management end 20, for judging that whether true the identity of vehicle 20 is legal according to vehicle verification information;If so, receiving Vehicle encryption information;And vehicle encryption information is decrypted, obtain information of vehicles.
Above method embodiment is please referred to for the introduction of system provided by the present application, this will not be repeated here by the application.
Each embodiment is described by the way of progressive in specification, the highlights of each of the examples are with other realities Apply the difference of example, just to refer each other for identical similar portion between each embodiment.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related place is referring to method part illustration .
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, depends on the specific application and design constraint of technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think to exceed scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
The safe communication method and system of information of vehicles provided herein are described in detail above.Herein In apply specific case the principle and implementation of this application are described, the explanation of above example is only intended to sides Assistant solves the present processes and its core concept.It should be pointed out that for those skilled in the art, not Be detached from the application principle under the premise of, can also to the application, some improvement and modification can also be carried out, these improvement and modification are also fallen into The application scope of the claims element.

Claims (10)

1. a kind of safe communication method of information of vehicles, which is characterized in that the method includes:
Vehicle is encrypted the information of vehicles of acquisition and obtains vehicle encryption information;And vehicle verification information is sent to management End;
The management end judges that whether true the identity of the vehicle is legal according to the vehicle verification information;
When the identity of the vehicle is really legal, the management end receives the vehicle encryption information;
The vehicle encryption information is decrypted in the management end, obtains the information of vehicles.
2. the method as described in claim 1, which is characterized in that acquisition vehicle is encrypted to the information of vehicles of acquisition in the vehicle Encryption information includes:
The vehicle is encrypted the information of vehicles using symmetric encipherment algorithm, obtains the vehicle encryption information.
3. the method as described in claim 1, which is characterized in that the vehicle verification information is digital certificate.
4. method as claimed in claim 3, which is characterized in that the management end is according to described in vehicle verification information judgement Whether the identity of vehicle is really legal to include:
Whether effective verify the digital certificate;
It is true legal by the identity marks of the vehicle if the digital certificate is effective.
5. method as claimed in claim 4, which is characterized in that the content of the verification includes the effective of the digital certificate Phase, signature true legitimacy and whether be revoked.
6. the method as described in claim 1, which is characterized in that the vehicle encryption information is decrypted in the management end, Obtaining the information of vehicles includes:
The vehicle verification information is parsed, first key is obtained;
The vehicle encryption information is decrypted using the first key, obtains the information of vehicles.
7. the method as described in claim 1, which is characterized in that further include:
Management end verification information is sent to vehicle by the management end;
The vehicle judges that whether true the identity of the management end is legal according to the management end verification information;If so, connecing Receive the control extension instruction that the management end is sent;And control extension instruction is decrypted, obtain control instruction.
8. the method for claim 7, which is characterized in that the control extension instruction is added by the management end using symmetrical Acquisition is encrypted to the control instruction in close algorithm.
9. method as claimed in claim 8, which is characterized in that it is described that control extension instruction is decrypted, it is controlled System instructs:
The management end verification information is parsed, the second key is obtained;
It is decrypted using control extension instruction described in second key pair, obtains the control instruction.
10. a kind of safety communication system of information of vehicles, which is characterized in that the system comprises:
Vehicle is encrypted for the information of vehicles to acquisition and obtains vehicle encryption information;And vehicle verification information is sent to Management end;
The management end, for judging that whether true the identity of the vehicle is legal according to the vehicle verification information;If so, Receive the vehicle encryption information;And the vehicle encryption information is decrypted, obtain the information of vehicles.
CN201810432112.2A 2018-05-08 2018-05-08 A kind of safe communication method and system of information of vehicles Pending CN108650255A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810432112.2A CN108650255A (en) 2018-05-08 2018-05-08 A kind of safe communication method and system of information of vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810432112.2A CN108650255A (en) 2018-05-08 2018-05-08 A kind of safe communication method and system of information of vehicles

Publications (1)

Publication Number Publication Date
CN108650255A true CN108650255A (en) 2018-10-12

Family

ID=63749390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810432112.2A Pending CN108650255A (en) 2018-05-08 2018-05-08 A kind of safe communication method and system of information of vehicles

Country Status (1)

Country Link
CN (1) CN108650255A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134836A (en) * 2019-04-09 2019-08-16 深圳市赛格导航科技股份有限公司 Information of vehicles processing, verification method, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040025011A1 (en) * 2002-07-30 2004-02-05 Jerome Azema Secure management of configuration parameters in a computing platform
WO2013110669A3 (en) * 2012-01-23 2013-11-21 Youview Tv Limited Method and devices for auhtorisation in content provision system
CN104936180A (en) * 2015-06-26 2015-09-23 陈昊 Authentication system and method for providing authentication service specific to unmanned aerial vehicle and ground station
CN104955047A (en) * 2015-06-26 2015-09-30 陈昊 Authentication center for providing authentication service for unmanned aerial vehicles and authentication method
CN105792207A (en) * 2016-04-29 2016-07-20 北京航空航天大学 Vehicle networking authentication method facing vehicle differentiation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040025011A1 (en) * 2002-07-30 2004-02-05 Jerome Azema Secure management of configuration parameters in a computing platform
WO2013110669A3 (en) * 2012-01-23 2013-11-21 Youview Tv Limited Method and devices for auhtorisation in content provision system
CN104936180A (en) * 2015-06-26 2015-09-23 陈昊 Authentication system and method for providing authentication service specific to unmanned aerial vehicle and ground station
CN104955047A (en) * 2015-06-26 2015-09-30 陈昊 Authentication center for providing authentication service for unmanned aerial vehicles and authentication method
CN105792207A (en) * 2016-04-29 2016-07-20 北京航空航天大学 Vehicle networking authentication method facing vehicle differentiation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张仕斌等: "《应用密码学(卓越工程师计划)》", 31 January 2017 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134836A (en) * 2019-04-09 2019-08-16 深圳市赛格导航科技股份有限公司 Information of vehicles processing, verification method, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109309565B (en) Security authentication method and device
CN106899410B (en) A kind of method and device of equipment identities certification
CN105450406B (en) The method and apparatus of data processing
US20170208049A1 (en) Key agreement method and device for verification information
CN107105060A (en) A kind of method for realizing electric automobile information security
KR101549034B1 (en) Method for guarantying the confidentiality and integrity of a data in Controller Area Networks
CN112528250B (en) System and method for realizing data privacy and digital identity through block chain
CN102299930B (en) Method for ensuring security of client software
CN109728914B (en) Digital signature verification method, system, device and computer readable storage medium
CN110365486B (en) Certificate application method, device and equipment
CN101610150B (en) Third-party digital signature method and data transmission system
CN109729523A (en) A kind of method and apparatus of terminal networking certification
CN112532393A (en) Verification method of cross-link transaction, relay link node equipment and medium
CN101272616A (en) Safety access method of wireless metropolitan area network
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
CN104717063A (en) Software security protection method of mobile terminal
CN111552270A (en) Safety authentication and data transmission method and device for vehicle-mounted diagnosis
CN109495441A (en) Access authentication method, device, relevant device and computer readable storage medium
CN103177225B (en) A kind of data managing method and system
WO2017020530A1 (en) Enhanced wlan certificate authentication method, device and system
CN104243452A (en) Method and system for cloud computing access control
CN110611679A (en) Data transmission method, device, equipment and system
CN108696517A (en) A kind of safe communication method, the apparatus and system of unmanned vehicle information
CN116073989A (en) Authentication data processing method, device, system, equipment and medium
CN106096336B (en) Software anti-crack method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181012

RJ01 Rejection of invention patent application after publication