CN108881486A - Intelligent network connection vehicle remote communication means and system based on trusted technology - Google Patents

Intelligent network connection vehicle remote communication means and system based on trusted technology Download PDF

Info

Publication number
CN108881486A
CN108881486A CN201810860141.9A CN201810860141A CN108881486A CN 108881486 A CN108881486 A CN 108881486A CN 201810860141 A CN201810860141 A CN 201810860141A CN 108881486 A CN108881486 A CN 108881486A
Authority
CN
China
Prior art keywords
data
telecommunication
intelligent network
remote communication
safety certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810860141.9A
Other languages
Chinese (zh)
Inventor
秦洪懋
周云水
吴新开
闫梦如
赵付霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201810860141.9A priority Critical patent/CN108881486A/en
Publication of CN108881486A publication Critical patent/CN108881486A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The present invention provides a kind of intelligent network connection vehicle remote communication means and system based on trusted technology, wherein the intelligent network connection vehicle remote communication means based on trusted technology includes the following steps:Automobile receives the instruction of telecommunication;Automobile judges whether the safety certification condition of the telecommunication and preset safety certification condition are consistent;If the safety certification condition and preset safety certification of the telecommunication are consistent, the automobile is transmitted after calling communication data decryption corresponding with the safety certification condition.Remote communication method of the invention utilizes trusted technology, and crucial operation is placed in credible performing environment and is executed so that the malicious entities in conventional environment can not unauthorized access, distort protected data.It realizes that end-by-end security communicates using cryptological technique, the data transmitted between vapour in-vehicle network and external network is realized with the protection of Life cycle, guarantees its integrality and authentication property.

Description

Intelligent network connection vehicle remote communication means and system based on trusted technology
Technical field
The invention belongs to intelligent networks to join automotive networking security fields, and in particular to a kind of intelligent network connection based on trusted technology Vehicle remote communication means and system.
Background technique
In recent years, the intelligence of motor vehicle, net connectionization degree are higher and higher, and intelligent network connection automobile has become in internet A kind of special security terminal, on it and network other communication entities (such as:Cloud platform, smart phone, drive test basis are set Apply, other intelligent networks join automobile etc.) it is communicated.The net connectionization of motor vehicle can be producer, the manager, use of motor vehicle Person provides many convenient services, meanwhile, it can also face the risk of network security.
As a mobile terminal in internet, intelligent network connection automobile is faced with information similar with traditional mobile terminal Security threat and risk, in addition, automobile also has the particularity of its own.Automotive interior has a controller nodes up to a hundred, this A little nodes are by internal network connection communication, so its own is also a complicated communication control system.Automobile passes through one Telecommunication gateway is connect with cellular network, so as to be communicated with the entity on network.Vehicle internal networks pass through remote Journey communication gate and external network carry out data transmission being the net connection main attack face of automobile, there is huge security risk.Vehicle Internal network (such as:CAN bus) information security issue is not accounted at the beginning of design, there is very more safety leakages Hole, once network interface is exposed to outside, attacker will have many methods and enter automotive system, carry out to automotive system Different degrees of destruction or utilization.Up to now, it has had already appeared many automobiles to be cracked the event of invasion, for example Miller is logical The information entertainment wireless interface for crossing Cherokee remotely controls automobile, and Tencent's Koln laboratory remotely controls tesla and breaks Solve TBOX and the entertainment systems etc. of BMW.
In view of this, there is an urgent need to design the new intelligent network connection vehicle remote communication means of one kind and system, to ensure vapour Safety and reliability during vehicle telecommunication.
Summary of the invention
The purpose of the present invention is to solve safety and reliability problems existing during motor vehicle telecommunication.
To achieve the above object, the first scheme of the invention is to provide a kind of intelligent network connection automobile based on trusted technology Remote communication method, including:Automobile receives the instruction of telecommunication;Automobile judges the safety certification condition of the telecommunication It is whether consistent with preset safety certification condition;If the safety certification condition of the telecommunication and preset safety certification item Part is consistent, and the automobile is transmitted after calling communication data decryption corresponding with the safety certification condition.
It further, further include following steps before the step of automobile receives the instruction of telecommunication:Automobile Telecommunications data encrypt and presets safety certification condition.
Further, described the step of being encrypted telecommunications data, specifically refers to the data encryption that will need to transmit And it is bound with specific secure communication strategy.
Further, described the step of needing the data encryption transmitted and being bound with specific secure communication strategy It specifically includes:Specific function is called, input needs to encrypt the data and secure communication policy script of encapsulation, by scripted code sum number According to being encrypted to binary object after combination.
Further, the step of default safety certification condition is specifically referred to through authentication secret key pair communication data It signs.
Further, the automobile receives the step of instruction of telecommunication and specifically includes:Automobile receives long-range logical Communication authentication is carried out to telecommunication equipment after the instruction of letter, and confirms that telecommunication equipment meets communication authentication requirement.
It further, further include following steps:If the safety certification condition of the telecommunication is recognized with preset safety Card condition is inconsistent, and the automobile refusal transmits communication data.
Further, the object of the motor vehicle telecommunication is including further including following steps:If the telecommunication Safety certification condition and preset safety certification condition it is inconsistent, automobile refusal transmits communication data.
To achieve the above object, second scheme of the invention is to provide a kind of vehicle communication system, including:Processing Device, memory and telecommunication circuit, the processor couple the memory and the telecommunication circuit;The memory is stored with The working procedure data of communication data information, identity key information and processor, the telecommunication circuit is transmitted for information, described Processor executes described program data at work and joins automobile with the intelligent network based on trusted technology for realizing any description above Remote communication method.
To achieve the above object, the third scheme of the invention is to provide the device with store function, is stored thereon with Program data realizes that the intelligent network based on trusted technology of any description above joins vapour when described program data are executed by processor Vehicle remote communication method.
The present invention is based on credible theory and technologies, realize the telecommunication of vehicle communication terminal safety, specifically:
1. the present invention is able to achieve between vehicle external communication network and in-vehicle network and safely and reliably communicates;
2. the present invention can resist the attack methods such as eavesdropping, man-in-the-middle attack on network;
3. the present invention can defend the malware attacks in normal operating system;
4. being easier to dispose on automobile in the present invention, general vehicle cloud communication means can be used as;
5. the present invention can configure specific security strategy according to specific requirements by developer, different systems can satisfy Demand for security, have relatively good flexibility;
6. the present invention is suitable for the safety long-distance communication between various physical networks, there is good suitability;
7. the present invention does not need to increase hardware cost, there is lower-cost advantage.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly or technical solution, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others Attached drawing, wherein:
Fig. 1 is that the process of the intelligent network connection vehicle remote communication means embodiment provided by the invention based on trusted technology is shown It is intended to;
Fig. 2 is the hardware system of the intelligent network connection vehicle remote communication means embodiment provided by the invention based on trusted technology System framework map;
Fig. 3 is that ARM is flat in the intelligent network connection vehicle remote communication means embodiment provided by the invention based on trusted technology The interruption architecture diagram of the communication equipments such as trusted communications system processing CAN bus under platform;
Fig. 4 is the structural schematic diagram of vehicle communication system of the present invention.
Specific embodiment
The technical scheme in the embodiments of the invention will be clearly and completely described below, it is clear that described implementation Example is only a part of the embodiments of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common Technical staff's all other embodiment obtained without making creative work belongs to the model that the present invention protects It encloses.
Refering to fig. 1, Fig. 1 is the intelligent network connection vehicle remote communication means embodiment provided by the invention based on trusted technology Flow diagram, this method includes:
Step 1:Automobile receives the instruction of telecommunication.
In a specific embodiment, by taking intelligent network joins automobile as an example, user trigger on automobile some specific answer With program, automobile is the instruction for receiving telecommunication.
Further, in general, to achieve the purpose of the present invention, telecommunication is received in automobile motor vehicle Before the step of instruction, need in advance to set automobile, i.e., telecommunications data is encrypted and preset in advance by automobile Safety certification condition.
Further, in a specific embodiment, described the step of being encrypted telecommunications data, is specifically The data encryption transmitted will be needed and binds with specific secure communication strategy by referring to.
Further, in a specific embodiment, it is described will need the data encryption transmitted and with specific safety The step of communication strategy is bound specifically includes:Specific function is called, input needs to encrypt the data and secure communication of encapsulation Policy script will be encrypted to binary object after scripted code and data combination.
Further, in a specific embodiment, the step of default safety certification condition specifically refers to pass through Authentication secret key pair communication data is signed.
In a specific embodiment, communication data needs the processing locality applied by trusted communications to be forwarded to cloud again End, for example, the CAN bus data on automobile need identity information or data plus equipment to need to upload again after compressing, or Person needs to transmit again after recompiling by protocol conversion.These legal processing operations influence whether the complete of communication data Property.Authenticity in order to protect data, automobile carry out communication authentication to telecommunication equipment after receiving the instruction of telecommunication, And confirm that telecommunication equipment meets communication authentication requirement.
Step 2:Automobile judge the telecommunication safety certification condition and preset safety certification condition whether one It causes.
Step 3:If the safety certification condition and preset safety certification of the telecommunication are consistent, the vapour Vehicle is transmitted after calling communication data decryption corresponding with the safety certification condition.
Further, if the safety certification condition of the telecommunication and preset safety certification condition are inconsistent, institute Automobile refusal is stated to transmit communication data.
In above-described embodiment, the object of vehicle remote communication includes cloud platform, smart phone, drive test infrastructure or other Intelligent network joins automobile.
Safety long-distance communication means of the invention utilizes trusted technology, and crucial operation is placed in credible performing environment and is held Row so that malicious entities in conventional environment can not unauthorized access, distort protected data.End is realized using cryptological technique To the secure communication at end, the data transmitted between in-vehicle network and external network are realized with the protection of Life cycle, guarantees it Integrality and authentication property.
Above-mentioned remote communication method is further described below in conjunction with Fig. 2.Under usual situation, the communication system in automobile is by each A controller node and multiple network (such as CAN, Lin, Flexray, Ethernet etc.) composition, these networks and extraneous safety Communication gate is important safety equipment.The design of security gateway needs to guarantee the integrality and authentication property of data, prevents vehicle Critical data during acquisition, storage, transmission by the stealing of malice, distort, destroy.Therefore, trusted communications are realized Code must be by the protection of operating system and equipment.Code should operate in the environment of an isolation.The safety fortune of isolation On the one hand row environment protects the integrality of code, it is ensured that Malware cannot modify trusted communications software stack, on the other hand protect The confidentiality of signature and key.This partial code belongs to a part of system trusted computing base (TCB), realizes trusted communications API and bottom communication driving and a strategy interpreting device.Trusted communications method in the present invention is mainly by two software modules (authentication module and data package module) is realized, trusted communications software is run in trusted context, and credible performing environment can be with base It is realized in the SGX of hardware isolated technology trustzone, intel of arm or virtual isolation technology.
Trusted computing base (TCB) is located at the bottom of software stack, and middle layer is trusted communications application layer, be responsible for communication data with The interaction of bottom layer driving and communication with cloud, top layer are common operating system and other application software.Middle layer Processing locality and forwarding are done to communication data, in order to guarantee the integrality of code and data, needed middle layer and other layers It is isolated.But this layer is not belonging to the trusted computing base (TCB) of system, because it includes application code, in these codes Bug will not influence the safety of trusted communications.But its safety is extremely important for the application of each trusted communications 's.It would therefore be desirable to carry out certification to these codes to prove its integrality.
It is that the intelligent network provided by the invention based on trusted technology joins vehicle remote communication means embodiment refering to Fig. 3, Fig. 3 The interruption architecture diagram of the communication equipments such as trusted communications system processing CAN bus under middle ARM platform.
ARM TrustZone is hardware supported of the ARM for trusted technology, is the processor of current many ARM frameworks Security extension, such as Cortex A8 and Cortex A9.By the access control mechanisms of hardware, TrustZone provides two void Quasi- processor.Software stack can be converted in two states, i.e. safer world and common world.It general operating system and answers With common world is operated in, a credible micro-kernel operates in safer world, the integrality and secret of safer world protective program Property, because the untrusted code in common world is unable to the locked resource in the access safety world, such as memory and peripheral hardware. ARM platform initially enters safer world, environment when system firmware provides the whole service of safer world when starting, configuration is completed Afterwards, safer world will start common world, load the general-purpose operating system.The normal world must be instructed using SMC carrys out access safety The world.When CPU executes SMC instruction, hardware exchange to safety monitor, safety monitor executes context switching to enter safety The world.
Hardware interrupts are managed by safety monitor, and safety monitor can route interrupts in the different world.So logical Their interruption can be mapped to safer world by letter equipment, to protect the integrality of communication equipment.
Hereinafter, introducing the concrete function of authentication module and data package module respectively.
Authentication module
Authentication module protects the integrality and authenticity of communication data, and in order to realize the two targets, communication data exists It signs before transmission, when signature uses the authentication key (AIK) of credible platform module (TPM), private key storage It in TPM, is protected by TPM, it is made to be not easy illegally to be read or distorted.Underlying platform binds same AIK to platform TCB Software configuration, use this AIK sign remote authentication.Binding AIK and trusted configuration and shared AIK go to communication interface and Remote authentication, to ensure that the authenticity of communication system:Credible platform with the configuration of some particular trusted is being led to Letter.
Data package module
The data of data packaging protection communications are bound by data encryption and with specific secure communication strategy.Solution When sealing data, using the private key ciphertext data of storage key as AIK, the private key for storing key is protected by TPM.It is logical Security strategy when letter may be extremely complex, and bigger difference is had in different application scenarios, in order to meet more Complicated demand under scape, strategy can be expressed by the complete language of figure spirit, and the unlimited specific language of system, such as Python, lisp etc..
In a specific embodiment, DataSeal function is called when data encapsulate, input needs the data encapsulated And security policy script, it will be encrypted to a binary object after scripted code and data combination, returns to caller.Unseal number According to when, call DataUnseal function, input the binary object of encryption, deblocking function call private key decryption, the private key is by can Letter calculates base protection, will not leave trusted computing base.DataUnseal returns to the data and policy script of decryption.Script is by sentencing Determine function and determines that the transmission of communication and remote software certification are determined, if the transmission of data meets scheduled security strategy, Then determine to return to true value, then decrypts the data of encapsulation and return to caller.If the transmission of data does not meet scheduled peace Full strategy, automobile refusal transmit communication data.
In a specific embodiment, data encapsulation and deblocking are realized by following procedure:
In above-described embodiment, the object that intelligent network joins vehicle remote communication includes cloud platform, and smart phone, drive test basis is set It applies or other intelligent networks joins automobile, it is not limited here.
It is the structural schematic diagram of vehicle communication system of the present invention refering to Fig. 4, Fig. 4.Vehicle communication system packet of the present invention It includes:Processor, memory and telecommunication circuit, the processor couple the memory and the telecommunication circuit;The storage Device is stored with communication data information, the working procedure data of identity key information and processor, and the telecommunication circuit is used for information Transmission, the processor execute described program data at work to realize any of the above-described intelligence based on trusted technology Net connection vehicle remote communication means.The detailed description of related content refers to above method part, and details are not described herein.
The present invention also provides a kind of device with store function, this, which has, is stored with program number on the device of store function According to realization realizes that any of the above-described intelligent network connection automobile based on trusted technology is remote when the program data is executed by processor Journey communication means, the detailed description of related content refer to above method part, and details are not described herein.
Wherein, there is the device of store function can read for server, floppy disk drive, hard disk drive, CD-ROM for this Take at least one of device, magneto-optic disk reader etc..
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright description is applied directly or indirectly in other relevant technology necks Domain is included within the scope of the present invention.

Claims (10)

1. the intelligent network based on trusted technology joins vehicle remote communication means, which is characterized in that including:
Automobile receives the instruction of telecommunication;
Automobile judges whether the safety certification condition of the telecommunication and preset safety certification condition are consistent;
If the safety certification condition and preset safety certification of the telecommunication are consistent, the automobile is called and the peace It is transmitted after the corresponding communication data decryption of authentication condition entirely.
2. the intelligent network according to claim 1 based on trusted technology joins vehicle remote communication means, which is characterized in that The automobile further includes following steps before receiving the step of instruction of telecommunication:Automobile is added telecommunications data Close and default safety certification condition.
3. the intelligent network according to claim 2 based on trusted technology joins vehicle remote communication means, which is characterized in that institute State the step of being encrypted telecommunications data specifically refer to the data encryption that will need to transmit and with specific secure communication Strategy is bound.
4. the intelligent network according to claim 3 based on trusted technology joins vehicle remote communication means, which is characterized in that institute The data encryption transmitted will be needed and specifically includes the step of binding with specific secure communication strategy by stating:Call specific letter Number, input need encrypt encapsulation data and secure communication policy script, will scripted code and data combination after be encrypted to two into Object processed.
5. the intelligent network according to claim 2 based on trusted technology joins vehicle remote communication means, which is characterized in that institute The step of stating default safety certification condition specifically refers to sign by authentication secret key pair communication data.
6. the intelligent network according to claim 1 based on trusted technology joins vehicle remote communication means, which is characterized in that institute The step of automobile receives the instruction of telecommunication is stated to specifically include:Automobile receives after the instruction of telecommunication to telecommunication Equipment carries out communication authentication, and confirms that telecommunication equipment meets communication authentication requirement.
7. the intelligent network according to claim 1 based on trusted technology joins vehicle remote communication means, which is characterized in that also Include the following steps:If the safety certification condition of the telecommunication and preset safety certification condition are inconsistent, the vapour Vehicle refusal transmits communication data.
8. the intelligent network according to claim 1 based on trusted technology joins vehicle remote communication means, which is characterized in that institute The object for stating intelligent network connection vehicle remote communication includes cloud platform, and smart phone, drive test infrastructure or other intelligent networks join vapour Vehicle.
9. intelligent network joins vehicle communication system, which is characterized in that including:Processor, memory and telecommunication circuit, the processing Device couples the memory and the telecommunication circuit;The memory is stored with communication data information, identity key information and place The working procedure data of device are managed, the telecommunication circuit is transmitted for information, and the processor executes described program number at work Realize that any intelligent network based on trusted technology of claim 1-8 joins vehicle remote communication means accordingly.
10. a kind of device with store function, is stored thereon with program data, which is characterized in that described program data are located It manages and realizes that any intelligent network based on trusted technology of claim 1-8 joins vehicle remote communication means when device executes.
CN201810860141.9A 2018-08-01 2018-08-01 Intelligent network connection vehicle remote communication means and system based on trusted technology Pending CN108881486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810860141.9A CN108881486A (en) 2018-08-01 2018-08-01 Intelligent network connection vehicle remote communication means and system based on trusted technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810860141.9A CN108881486A (en) 2018-08-01 2018-08-01 Intelligent network connection vehicle remote communication means and system based on trusted technology

Publications (1)

Publication Number Publication Date
CN108881486A true CN108881486A (en) 2018-11-23

Family

ID=64306782

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810860141.9A Pending CN108881486A (en) 2018-08-01 2018-08-01 Intelligent network connection vehicle remote communication means and system based on trusted technology

Country Status (1)

Country Link
CN (1) CN108881486A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111148070A (en) * 2019-12-31 2020-05-12 华为技术有限公司 V2X communication method and device and vehicle
CN111212094A (en) * 2020-03-20 2020-05-29 山东大学 TrustZone-based safety control method for automatic driving carrier
CN112468294A (en) * 2020-11-23 2021-03-09 北京经纬恒润科技股份有限公司 Access method and authentication equipment for vehicle-mounted TBOX
CN112977331A (en) * 2019-12-13 2021-06-18 苏州三六零智能安全科技有限公司 Automobile remote control device, automobile body control equipment, automobile body control system and automobile body control method
CN113660269A (en) * 2021-08-17 2021-11-16 上海交通大学 Information credibility recognition processing method for centralized networking cloud control platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100105356A1 (en) * 2008-10-29 2010-04-29 Ohannes Deir Ghazarian Secure mobile communication system
CN103929428A (en) * 2014-04-24 2014-07-16 吴刚 Method for achieving communication safety of vehicle-mounted electronic information system
CN105897713A (en) * 2016-04-11 2016-08-24 福州华鹰重工机械有限公司 Method and device for designing inter vehicle communication system security protocol
CN107004091A (en) * 2014-09-26 2017-08-01 英特尔公司 Safely exchange vehicle sensor information
CN107835185A (en) * 2017-11-21 2018-03-23 广州大学 A kind of mobile terminal safety method of servicing and device based on ARM TrustZone
CN108090376A (en) * 2016-11-23 2018-05-29 厦门雅迅网络股份有限公司 CAN bus data prevention method and system based on TrustZone
CN108111510A (en) * 2017-12-20 2018-06-01 北京航空航天大学 A kind of in-vehicle network intrusion detection method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100105356A1 (en) * 2008-10-29 2010-04-29 Ohannes Deir Ghazarian Secure mobile communication system
CN103929428A (en) * 2014-04-24 2014-07-16 吴刚 Method for achieving communication safety of vehicle-mounted electronic information system
CN107004091A (en) * 2014-09-26 2017-08-01 英特尔公司 Safely exchange vehicle sensor information
CN105897713A (en) * 2016-04-11 2016-08-24 福州华鹰重工机械有限公司 Method and device for designing inter vehicle communication system security protocol
CN108090376A (en) * 2016-11-23 2018-05-29 厦门雅迅网络股份有限公司 CAN bus data prevention method and system based on TrustZone
CN107835185A (en) * 2017-11-21 2018-03-23 广州大学 A kind of mobile terminal safety method of servicing and device based on ARM TrustZone
CN108111510A (en) * 2017-12-20 2018-06-01 北京航空航天大学 A kind of in-vehicle network intrusion detection method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112977331A (en) * 2019-12-13 2021-06-18 苏州三六零智能安全科技有限公司 Automobile remote control device, automobile body control equipment, automobile body control system and automobile body control method
CN111148070A (en) * 2019-12-31 2020-05-12 华为技术有限公司 V2X communication method and device and vehicle
CN111148070B (en) * 2019-12-31 2021-06-15 华为技术有限公司 V2X communication method and device and vehicle
CN111212094A (en) * 2020-03-20 2020-05-29 山东大学 TrustZone-based safety control method for automatic driving carrier
CN112468294A (en) * 2020-11-23 2021-03-09 北京经纬恒润科技股份有限公司 Access method and authentication equipment for vehicle-mounted TBOX
CN112468294B (en) * 2020-11-23 2023-07-18 北京经纬恒润科技股份有限公司 Access method and authentication equipment of vehicle-mounted TBOX
CN113660269A (en) * 2021-08-17 2021-11-16 上海交通大学 Information credibility recognition processing method for centralized networking cloud control platform

Similar Documents

Publication Publication Date Title
CN108881486A (en) Intelligent network connection vehicle remote communication means and system based on trusted technology
CN105450406B (en) The method and apparatus of data processing
CN110336774A (en) Hybrid Encryption decryption method, equipment and system
Rahouti et al. Secure software-defined networking communication systems for smart cities: current status, challenges, and trends
CN105610837B (en) For identity authentication method and system between SCADA system main website and slave station
CN106603487B (en) Method for improving security of TLS protocol processing based on CPU space-time isolation mechanism
CN109729523A (en) A kind of method and apparatus of terminal networking certification
CN110519753A (en) Access method, device, terminal and readable storage medium storing program for executing
CN109218263A (en) A kind of control method and device
CN105306483B (en) A kind of Anonymizing networks communication means and system safely and fast
CN109302432B (en) Network communication data combination encryption transmission method based on network security isolation technology
CN104065485A (en) Power grid dispatching mobile platform safety guaranteeing and controlling method
CN110336788A (en) A kind of data safety exchange method of internet of things equipment and mobile terminal
KR101227873B1 (en) Access method suitable for wireless personal area network
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
CN105933886A (en) ESIM number writing method, security system, ESIM number server and terminal
CN110278084B (en) eID establishing method, related device and system
CN109586924A (en) A kind of intelligent distribution network data safe transmission method based on cloud computing
US20210279307A1 (en) Method for the secure interaction of a user with a mobile terminal and a further entity
CN101834852B (en) Realization method of credible OpenSSH for protecting platform information
Gu et al. IoT security and new trends of solutions
CN110492994B (en) Trusted network access method and system
CN107705122A (en) The method and system of secure payment are carried out in Android system
CN107948140A (en) The method of calibration and system of portable set
Hein et al. An autonomous attestation token to secure mobile agents in disaster response

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123