CN109787756A - A kind of car-mounted terminal key distribution management method based on whitepack encryption technology - Google Patents
A kind of car-mounted terminal key distribution management method based on whitepack encryption technology Download PDFInfo
- Publication number
- CN109787756A CN109787756A CN201811580794.8A CN201811580794A CN109787756A CN 109787756 A CN109787756 A CN 109787756A CN 201811580794 A CN201811580794 A CN 201811580794A CN 109787756 A CN109787756 A CN 109787756A
- Authority
- CN
- China
- Prior art keywords
- key
- car
- mounted terminal
- whitepack
- firmware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The car-mounted terminal key distribution management method based on whitepack encryption technology that the invention discloses a kind of comprising following steps: the step of car-mounted terminal key is distributed;The step of generation of car-mounted terminal root key and data encrypting and deciphering.By distribution to car-mounted terminal key, storage, using and more new technological process is comprehensively protected and safety management, can be effectively solved the information security issue during entire key lifetimes, key avoided to leak;And the present invention can be in the case where not using encryption chip, it is ensured that the storage and use on the vehicle-mounted terminal equipment of key are safe, therefore, are promoting the BOM cost that car-mounted terminal can also be effectively reduced while safety, are reducing user's use and maintenance cost.
Description
Technical field
The present invention relates to car-mounted terminal information security field more particularly to a kind of car-mounted terminals based on whitepack encryption technology
Key distribution management method.
Background technique
As vehicle is merged with information-based height, an automobile is no longer individual information island, in order to give user
Bring more vehicles using service and trip service, automobile is substantially with the trend of external Networking.And guaranteeing safety
While communication, how to guarantee that the secure distribution of core key, preservation and use are more and more paid attention in Encryption Algorithm.
There are mainly two types of for current terminal device key management mode:
Disk is directly accessed: simple to save the key distributed when factory using disk, when encryption and decryption, directly reads from disk close
Key uses, and can be regularly updated online to key.
Encryption chip access: by the key typing encryption chip of generation before factory, encryption process is directly in encryption core
It is completed inside piece, outside can not read or change, to realize complete physical isolation.
But in such a way that disk is directly accessed key, key can be made to be easy to be illegally accessed, there are larger safety is hidden
Suffer from.And by the way of encryption chip access keys, it will lead to the key problem that can not regularly update online, and increase terminal
BOM cost.
Therefore, the prior art needs further improvement and develops.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of based on the vehicle-mounted of whitepack encryption technology
Terminal key distribution management method reduces the cost of key distribution management under the premise of ensuring information security.
In order to solve the above technical problems, the present invention program includes:
A kind of car-mounted terminal key distribution management method based on whitepack encryption technology comprising following steps:
The step of car-mounted terminal key is distributed;
The step of generation of car-mounted terminal root key and data encrypting and deciphering.
The car-mounted terminal key distribution management method, wherein above-mentioned car-mounted terminal key are as follows: Key=Keybasic +
Keypart, wherein KeybasicIt is foundation, this part of the equipment of same production batch is identical, by whitepack cryptoguard;
KeypartIt is unique identification part, the corresponding unique Key of each equipmentpart。
The car-mounted terminal key distribution management method, wherein the Key in car-mounted terminalbasicIt injects in whitepack firmware
Programming is into equipment together in portion, the Key of same batch equipmentbasicIt is identical, KeypartIt can be obtained by air interface application.
The car-mounted terminal key distribution management method, wherein the step of above-mentioned car-mounted terminal key is distributed specifically wraps
It includes:
A, it is manufactured by Key Management Center and generates USBKEY, the Digital Certificate Security of mark USB KEY identity is stored in USB KEY
In the unreadable safety chip in an interior outside;
B, the authentication based on USB KEY, Key Management Center receive the whitepack firmware downloading request of production line;
C, production line issues Key to Key Management Center application according to the whitepack firmware version number heldpartKey, and
Locally carry out relationship storage;
D, corresponding whitepack firmware programming is entered terminal device according to production batch by production line;
E, production line is according to the equipment unique identifier of car-mounted terminal by corresponding KeypartThe equipment that car-mounted terminal is written;
F, USB KEY is removed after the completion of production, removes local whitepack firmware copies and correlation KeypartKey.
The car-mounted terminal key distribution management method, wherein step A is specific further include: the number of USB KEY identity
Word certificate is assigned to production line by the way of physical distribution;Production line security official needs USB KEY being inserted into computer, with key
The encrypted tunnel based on SSL is established between administrative center.
The car-mounted terminal key distribution management method, wherein it is white to generate the production line for corresponding software in step B whitepack
The version number of box firmware, and by corresponding KeybasicIt is sent to the corresponding software, generating includes KeybasicWhitepack firmware, together
When whitepack software the version number of whitepack firmware notice Key Management Center is managed.
The car-mounted terminal key distribution management method, wherein above-mentioned car-mounted terminal root key generates and data add solution
Close step includes:
Key is inputted to whitepack firmwarepartAnd plain/cipher text;
Inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted;
Inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key;
Using terminal root key carries out encryption and decryption operation inside whitepack;
Ciphertext/plaintext is exported outside to whitepack.
The car-mounted terminal key distribution management method, wherein the car-mounted terminal key distribution management method further includes
Long-range the step of updating car-mounted terminal root key, comprising:
SSL encryption channel is established between car-mounted terminal and center management server;
Center management server issues Key according to the equipment unique identifier of car-mounted terminalpart;
Car-mounted terminal generates random code and uses the Key newly issuedpartKey Management Center is sent to after encryption, in key management
The heart, which is decrypted after receiving ciphertext and returns to car-mounted terminal and compare, confirms new KeypartIt is legal effective;
With new KeypartReplace current Keypart。
The car-mounted terminal key distribution management method based on whitepack encryption technology that the present invention provides a kind of, by vehicle-mounted
The distribution of terminal key, storage, using and more new technological process is comprehensively protected and safety management, can be effectively solved entire
Information security issue during key lifetimes, avoids key from leaking;And the present invention can be without using encryption chip
In the case of, it is ensured that the storage and use on the vehicle-mounted terminal equipment of key are safe, therefore, can also while promoting safety
The BOM cost of car-mounted terminal is effectively reduced, reduces user's use and maintenance cost.
Detailed description of the invention
Fig. 1 is key distribution flow schematic diagram in the present invention;
Fig. 2 is encrypting and decrypting flow diagram in the present invention;
Fig. 3 is that medium-long range of the present invention updates key flow diagram;
Fig. 4 is the idiographic flow schematic diagram of car-mounted terminal key ways of distribution in the present invention;
Fig. 5 is the idiographic flow schematic diagram of the generation of car-mounted terminal root key and data encrypting and deciphering in the present invention;
The position Fig. 6 medium-long range of the present invention updates the idiographic flow schematic diagram of car-mounted terminal root key.
Specific embodiment
The car-mounted terminal key distribution management method based on whitepack encryption technology that the present invention provides a kind of, to make the present invention
Purpose, technical solution and effect it is clearer, clear, the present invention is described in more detail below.It should be appreciated that this place
The specific embodiment of description is only used to explain the present invention, is not intended to limit the present invention.
The car-mounted terminal key distribution management method based on whitepack encryption technology that the present invention provides a kind of, such as Fig. 1 and Fig. 2
Shown in, specifically include the steps that the step of the distribution of car-mounted terminal key and the generation of car-mounted terminal root key and data encrypting and deciphering
It suddenly, also may include long-range update car-mounted terminal root key of course for more preferably car-mounted terminal key distribution management side is improved
The step of, as shown in Figure 3.
More specifically, above-mentioned car-mounted terminal key are as follows: Key=Keybasic + Keypart, wherein KeybasicIt is base
Plinth part, this part of the equipment of same production batch is identical, by whitepack cryptoguard;KeypartIt is unique identification part, each
Equipment corresponds to a unique Keypart.And the Key in car-mounted terminalbasicProgramming together is injected inside whitepack firmware to equipment
In, the Key of same batch equipmentbasicIt is identical, KeypartIt can be obtained by air interface application.
In another preferred embodiment of the present invention, as shown in Figure 4, the step of above-mentioned car-mounted terminal key is distributed, is specific
Include:
A, it is manufactured by Key Management Center and generates USBKEY, the Digital Certificate Security of mark USB KEY identity is stored in USB KEY
In the unreadable safety chip in an interior outside;
B, the authentication based on USB KEY, Key Management Center receive the whitepack firmware downloading request of production line;
C, production line issues Key to Key Management Center application according to the whitepack firmware version number heldpartKey, and
Locally carry out relationship storage;
D, corresponding whitepack firmware programming is entered terminal device according to production batch by production line;
E, production line is according to the equipment unique identifier of car-mounted terminal by corresponding KeypartThe equipment that car-mounted terminal is written;
F, USB KEY is removed after the completion of production, removes local whitepack firmware copies and correlation KeypartKey.
More specifically, step A is specific further include: the digital certificate of USB KEY identity uses the side of physical distribution
Formula is assigned to production line;Production line security official, which needs to be inserted between computer, with Key Management Center to establish by USB KEY, to be based on
The encrypted tunnel of SSL.
And corresponding software generates the version number of the production line whitepack firmware in step B whitepack, and by corresponding Keybasic
It is sent to the corresponding software, generating includes KeybasicWhitepack firmware, while whitepack software notifies the version number of whitepack firmware
Key Management Center is managed.
When car-mounted terminal carries out specifically used, as shown in Figure 5, above-mentioned car-mounted terminal root key generates and data add solution
Close step includes:
Key is inputted to whitepack firmwarepartAnd plain/cipher text;
Inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted;
Inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key;
Using terminal root key carries out encryption and decryption operation inside whitepack;
Ciphertext/plaintext is exported outside to whitepack.
It is long-range the step of updating car-mounted terminal root key, as shown in FIG. 6, it specifically includes:
SSL encryption channel is established between car-mounted terminal and center management server;
Center management server issues Key according to the equipment unique identifier of car-mounted terminalpart;
Car-mounted terminal generates random code and uses the Key newly issuedpartKey Management Center is sent to after encryption, in key management
The heart, which is decrypted after receiving ciphertext and returns to car-mounted terminal and compare, confirms new KeypartIt is legal effective;
With new KeypartReplace current Keypart。
In order to which the present invention is described in further detail, it is exemplified below more detailed embodiment and is illustrated.
The key code system of the car-mounted terminal of entirety is a Che Yimi, and car-mounted terminal key Key is made of 2 parts:
Key = Keybasic + Keypart
Keybasic is foundation, this part of the equipment of same production batch is identical, by whitepack cryptoguard;
Keypart is uniquely that the key of each equipment is different.
Key ways of distribution
Key in car-mounted terminalbasicInject whitepack firmware inside together programming into equipment.KeybasicIt is related with product batches,
Same batch products KeybasicIt is identical.Due to KeybasicIt is comprised in the whitepack firmware of generation, therefore can ensure producing
It is safe during link burning.
KeypartAir interface application can be passed through.Due to individual KeypartRoot key cannot be generated, even if therefore the part
Leakage will not cause safety problem.
It is specific as shown in Figure 4;
1. by KMC(key manage center: Key Management Center) generation USBKEY is manufactured, identify the number of USB KEY identity
Word Credential-Security is stored in the safety chip that an outside is unreadable in USB KEY.It is (confidential by the way of physical distribution
Application etc. that part, information security assistant director carry, supplier visits) it is assigned to production line.Production line security official needs to insert USB KEY
Enter computer, the encrypted tunnel based on SSL could be established between KMC.
2. the whitepack firmware that KMC is subjected to production line downloads request based on the authentication of USB KEY.Whitepack software meeting
Generate the version number of the production line whitepack firmware, and by corresponding KeybasicIt is sent to the software, generating includes KeybasicIt is white
Box firmware, while the version number notice KMC of whitepack firmware is managed by whitepack software.
3. production line can issue Key to KMC application according to the whitepack firmware version number heldpartKey, and in local
The storage of the relationship of progress.KeybasicWith KeypartIt is one-to-many relationship, by corresponding Key inside KMCbasicKey encryption is deposited
Storage.
4. corresponding whitepack firmware programming is entered terminal device according to production batch by production line.
5. production line is according to terminal device unique identifier by corresponding KeypartTerminal device is written.
6. removing USB KEY after the completion of production, local whitepack firmware copies and correlation Key are removedparT key.
3. terminal root key generates and data encrypting and deciphering, as shown in Figure 5, process is as follows:
1. inputting Key to whitepack firmwarepartAnd plain/cipher text.
2. inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted.
3. inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key.
4. using terminal root key carries out encryption and decryption operation inside whitepack.
5. exporting ciphertext/plaintext outside to whitepack.
4. long-range more new terminal root key, as shown in FIG. 6, process is as follows:
1. terminal and CMS(Content Management System: center management server) between establish SSL encryption channel.
2. CMS issues Key according to terminal device unique identifierpart。
3. terminal generates random code and uses the Key newly issuedpartKMS is sent to after encryption, KMS is decrypted after receiving ciphertext
And it returns to terminal side and compares and confirm new KeypartIt is legal effective.
4. with new KeypartReplace current Keypart。
Certainly, described above is only that presently preferred embodiments of the present invention is answered the present invention is not limited to enumerate above-described embodiment
When explanation, anyone skilled in the art is all equivalent substitutes for being made, bright under the introduction of this specification
Aobvious variant, all falls within the essential scope of this specification, ought to be by protection of the invention.
Claims (8)
1. a kind of car-mounted terminal key distribution management method based on whitepack encryption technology, is characterized in that comprising following steps:
The step of car-mounted terminal key is distributed;
The step of generation of car-mounted terminal root key and data encrypting and deciphering.
2. car-mounted terminal key distribution management method according to claim 1, which is characterized in that above-mentioned car-mounted terminal key
Are as follows: Key=Keybasic + Keypart, wherein KeybasicIt is foundation, this part of the equipment of same production batch is identical,
By whitepack cryptoguard;KeypartIt is unique identification part, the corresponding unique Key of each equipmentpart。
3. car-mounted terminal key distribution management method according to claim 2, which is characterized in that in car-mounted terminal
KeybasicProgramming is into equipment together inside injection whitepack firmware, the Key of same batch equipmentbasicIt is identical, KeypartIt can pass through
Air interface application obtains.
4. car-mounted terminal key distribution management method according to claim 2, which is characterized in that above-mentioned car-mounted terminal key
The step of distribution, specifically includes:
A, it is manufactured by Key Management Center and generates USBKEY, the Digital Certificate Security of mark USB KEY identity is stored in USB KEY
In the unreadable safety chip in an interior outside;
B, the authentication based on USB KEY, Key Management Center receive the whitepack firmware downloading request of production line;
C, production line issues Key to Key Management Center application according to the whitepack firmware version number heldpartKey, and at this
Ground carries out relationship storage;
D, corresponding whitepack firmware programming is entered terminal device according to production batch by production line;
E, production line is according to the equipment unique identifier of car-mounted terminal by corresponding KeypartThe equipment that car-mounted terminal is written;
F, USB KEY is removed after the completion of production, removes local whitepack firmware copies and correlation KeypartKey.
5. car-mounted terminal key distribution management method according to claim 4, which is characterized in that step A is specifically also wrapped
Include: the digital certificate of USB KEY identity is assigned to production line by the way of physical distribution;Production line security official needs USB
KEY, which is inserted between computer, with Key Management Center, establishes the encrypted tunnel based on SSL.
6. car-mounted terminal key distribution management method according to claim 4, which is characterized in that corresponding in step B whitepack
The version number of the Software Create production line whitepack firmware, and by corresponding KeybasicIt is sent to the corresponding software, generation includes
KeybasicWhitepack firmware, while the version number of whitepack firmware notice Key Management Center is managed by whitepack software.
7. car-mounted terminal key distribution management method according to claim 1, which is characterized in that above-mentioned car-mounted terminal root is close
Key generates and the step of data encrypting and deciphering includes:
Key is inputted to whitepack firmwarepartAnd plain/cipher text;
Inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted;
Inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key;
Using terminal root key carries out encryption and decryption operation inside whitepack;
Ciphertext/plaintext is exported outside to whitepack.
8. car-mounted terminal key distribution management method according to claim 1, which is characterized in that the car-mounted terminal key point
Hair management method further includes the steps that remotely updating car-mounted terminal root key, comprising:
SSL encryption channel is established between car-mounted terminal and center management server;
Center management server issues Key according to the equipment unique identifier of car-mounted terminalpart;
Car-mounted terminal generates random code and uses the Key newly issuedpartKey Management Center is sent to after encryption, in key management
The heart, which is decrypted after receiving ciphertext and returns to car-mounted terminal and compare, confirms new KeypartIt is legal effective;
With new KeypartReplace current Keypart。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811580794.8A CN109787756B (en) | 2018-12-24 | 2018-12-24 | Vehicle-mounted terminal key distribution management method based on white-box encryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811580794.8A CN109787756B (en) | 2018-12-24 | 2018-12-24 | Vehicle-mounted terminal key distribution management method based on white-box encryption technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109787756A true CN109787756A (en) | 2019-05-21 |
CN109787756B CN109787756B (en) | 2021-11-26 |
Family
ID=66498177
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811580794.8A Active CN109787756B (en) | 2018-12-24 | 2018-12-24 | Vehicle-mounted terminal key distribution management method based on white-box encryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109787756B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263526A (en) * | 2019-06-13 | 2019-09-20 | 惠州市德赛西威汽车电子股份有限公司 | A kind of producing line certificate injected system and its method |
CN110417548A (en) * | 2019-07-26 | 2019-11-05 | 交通运输部公路科学研究所 | A kind of bus or train route contract network method for security protection based on digital certificates |
CN111695166A (en) * | 2020-06-11 | 2020-09-22 | 北京百度网讯科技有限公司 | Disk encryption protection method and device |
CN115988488A (en) * | 2023-03-21 | 2023-04-18 | 北京全路通信信号研究设计院集团有限公司 | Method and device for on-line centralized updating of vehicle-mounted key |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007120024A1 (en) * | 2006-04-19 | 2007-10-25 | Electronics And Telecommunications Research Institute | The efficient generation method of authorization key for mobile communication |
US20120137137A1 (en) * | 2010-11-30 | 2012-05-31 | Brickell Ernest F | Method and apparatus for key provisioning of hardware devices |
CN102752635A (en) * | 2012-02-23 | 2012-10-24 | 中央电视台 | Downloadable and replaceable condition receiving system |
US9195858B2 (en) * | 2009-08-04 | 2015-11-24 | Seagate Technology Llc | Encrypted data storage device |
CN106230583A (en) * | 2016-07-19 | 2016-12-14 | 成都安程通科技有限公司 | Automobile ecu information monitoring system |
CN106330868A (en) * | 2016-08-14 | 2017-01-11 | 北京数盾信息科技有限公司 | Encrypted storage key management system and method of high-speed network |
US20180157804A1 (en) * | 2011-09-22 | 2018-06-07 | Sk2Tech, Llc | Methods and apparatuses for digital content protection |
CN108282467A (en) * | 2017-12-29 | 2018-07-13 | 北京握奇智能科技有限公司 | The application process of digital certificate, system |
CN108287999A (en) * | 2017-01-10 | 2018-07-17 | 厦门雅迅网络股份有限公司 | A kind of startup method that system based on TrustZone is credible |
CN108304722A (en) * | 2017-12-21 | 2018-07-20 | 广州小鹏汽车科技有限公司 | A kind of software installation packet and its generation method, upgrade method and system |
CN108629207A (en) * | 2017-03-22 | 2018-10-09 | 温科尼克斯多夫国际有限公司 | The system and method that information based on peripheral equipment generates encryption key |
CN108989024A (en) * | 2018-06-29 | 2018-12-11 | 百度在线网络技术(北京)有限公司 | Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car |
-
2018
- 2018-12-24 CN CN201811580794.8A patent/CN109787756B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007120024A1 (en) * | 2006-04-19 | 2007-10-25 | Electronics And Telecommunications Research Institute | The efficient generation method of authorization key for mobile communication |
US9195858B2 (en) * | 2009-08-04 | 2015-11-24 | Seagate Technology Llc | Encrypted data storage device |
US20120137137A1 (en) * | 2010-11-30 | 2012-05-31 | Brickell Ernest F | Method and apparatus for key provisioning of hardware devices |
US20180157804A1 (en) * | 2011-09-22 | 2018-06-07 | Sk2Tech, Llc | Methods and apparatuses for digital content protection |
CN102752635A (en) * | 2012-02-23 | 2012-10-24 | 中央电视台 | Downloadable and replaceable condition receiving system |
CN106230583A (en) * | 2016-07-19 | 2016-12-14 | 成都安程通科技有限公司 | Automobile ecu information monitoring system |
CN106330868A (en) * | 2016-08-14 | 2017-01-11 | 北京数盾信息科技有限公司 | Encrypted storage key management system and method of high-speed network |
CN108287999A (en) * | 2017-01-10 | 2018-07-17 | 厦门雅迅网络股份有限公司 | A kind of startup method that system based on TrustZone is credible |
CN108629207A (en) * | 2017-03-22 | 2018-10-09 | 温科尼克斯多夫国际有限公司 | The system and method that information based on peripheral equipment generates encryption key |
CN108304722A (en) * | 2017-12-21 | 2018-07-20 | 广州小鹏汽车科技有限公司 | A kind of software installation packet and its generation method, upgrade method and system |
CN108282467A (en) * | 2017-12-29 | 2018-07-13 | 北京握奇智能科技有限公司 | The application process of digital certificate, system |
CN108989024A (en) * | 2018-06-29 | 2018-12-11 | 百度在线网络技术(北京)有限公司 | Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car |
Non-Patent Citations (2)
Title |
---|
曹启: ""车联网密钥管理系统设计与实现"", 《中国优秀博硕士学位论文全文数据库(硕士)工程科技Ⅱ辑》 * |
许涛 等: ""基于白盒密码的DCAS终端安全芯片方案"", 《计算机研究与发展》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263526A (en) * | 2019-06-13 | 2019-09-20 | 惠州市德赛西威汽车电子股份有限公司 | A kind of producing line certificate injected system and its method |
CN110263526B (en) * | 2019-06-13 | 2023-08-18 | 惠州市德赛西威汽车电子股份有限公司 | Production line certificate injection system and method thereof |
CN110417548A (en) * | 2019-07-26 | 2019-11-05 | 交通运输部公路科学研究所 | A kind of bus or train route contract network method for security protection based on digital certificates |
CN111695166A (en) * | 2020-06-11 | 2020-09-22 | 北京百度网讯科技有限公司 | Disk encryption protection method and device |
CN111695166B (en) * | 2020-06-11 | 2023-06-06 | 阿波罗智联(北京)科技有限公司 | Disk encryption protection method and device |
CN115988488A (en) * | 2023-03-21 | 2023-04-18 | 北京全路通信信号研究设计院集团有限公司 | Method and device for on-line centralized updating of vehicle-mounted key |
CN115988488B (en) * | 2023-03-21 | 2023-06-30 | 北京全路通信信号研究设计院集团有限公司 | Method and device for on-line centralized updating of vehicle-mounted secret key |
Also Published As
Publication number | Publication date |
---|---|
CN109787756B (en) | 2021-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109787756A (en) | A kind of car-mounted terminal key distribution management method based on whitepack encryption technology | |
CN108513704B (en) | Remote distribution method and system of terminal master key | |
CN102246455B (en) | Self-authentication communication equipment and equipment authentication system | |
CN101350718B (en) | Method for protecting play content authority range base on user identification module | |
CN111464301B (en) | Key management method and system | |
CN102549595B (en) | Information processor, controller, Key Issuance station, ineffective treatment listing effectiveness decision method and Key Issuance method | |
CN103067333B (en) | The method of proof machine top box access identity and certificate server | |
CN112347453A (en) | Data safety writing method and system of automobile electronic identification embedded NFC chip | |
CN106464485A (en) | System and method for securing content keys delivered in manifest files | |
US20070083757A1 (en) | Authentication system | |
CN102006171B (en) | Method for updating internal clock of dynamic password token, token, authentication equipment and system | |
CN104868998B (en) | A kind of system, apparatus and method that encryption data is supplied to electronic equipment | |
CN112598827B (en) | Intelligent lock authentication method, security chip, intelligent lock and management system thereof | |
CN108650261B (en) | Mobile terminal system software burning method based on remote encryption interaction | |
CN106571915A (en) | Terminal master key setting method and apparatus | |
CN104780445A (en) | Method and system for preventing set top box software from malicious upgrade | |
CN115665138A (en) | Automobile OTA (over the air) upgrading system and method | |
CN114267100A (en) | Unlocking authentication method and device, security chip and electronic key management system | |
CN112311799B (en) | OTA (over the air) security upgrading method for Tbox firmware | |
CN113115255A (en) | Certificate issuing method, secret key authentication method, vehicle unlocking method, equipment and storage medium | |
CA2553081A1 (en) | A method for binding a security element to a mobile device | |
CN111489462B (en) | Personal Bluetooth key system | |
CN108418692B (en) | On-line writing method of authentication certificate | |
CN111542050B (en) | TEE-based method for guaranteeing remote initialization safety of virtual SIM card | |
CN112668024B (en) | Method for preventing tampering of data at gas meter end |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |