CN110191415B - Vehicle information encryption method, vehicle-mounted equipment and server - Google Patents

Vehicle information encryption method, vehicle-mounted equipment and server Download PDF

Info

Publication number
CN110191415B
CN110191415B CN201910458680.4A CN201910458680A CN110191415B CN 110191415 B CN110191415 B CN 110191415B CN 201910458680 A CN201910458680 A CN 201910458680A CN 110191415 B CN110191415 B CN 110191415B
Authority
CN
China
Prior art keywords
vehicle
information
server
encrypted data
vehicle information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910458680.4A
Other languages
Chinese (zh)
Other versions
CN110191415A (en
Inventor
刘均
戴凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910458680.4A priority Critical patent/CN110191415B/en
Publication of CN110191415A publication Critical patent/CN110191415A/en
Application granted granted Critical
Publication of CN110191415B publication Critical patent/CN110191415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Abstract

The application discloses a vehicle information encryption method, vehicle-mounted equipment and a server, wherein the method applies the vehicle-mounted equipment, the vehicle-mounted equipment is in communication connection with terminal equipment so as to be in communication connection with the server through the terminal equipment, and the method comprises the following steps: acquiring vehicle information of a target vehicle; generating encrypted data information using the vehicle information; and sending the encrypted data information to the terminal equipment so as to send the encrypted data information to the server through the terminal equipment, so that the server detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information. According to the method and the device, data are verified to monitor whether the vehicle information is tampered in the transfer process through the terminal equipment, and the reliability of the transfer data of the terminal equipment is ensured.

Description

Vehicle information encryption method, vehicle-mounted equipment and server
Technical Field
The application relates to the technical field of information monitoring, in particular to an encryption method of vehicle information, vehicle-mounted equipment and a server.
Background
When automobile diagnosis is carried out, vehicle information of a target vehicle to be diagnosed, which is arranged on a sensor of the vehicle, is uploaded to an on-board OBD device, the vehicle information is sent to terminal devices such as a mobile phone and an IPAD through the OBD device, and then the vehicle information of the vehicle is sent to a server through the terminal devices.
Therefore, how to monitor whether vehicle information is tampered during transit through the terminal device to ensure reliability of transit data of the terminal device is a technical problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The application mainly aims to provide an encryption method of vehicle information, vehicle-mounted equipment and a server, and aims to solve the problem that whether the vehicle information is tampered in the transfer process through terminal equipment or not so as to ensure the reliability of vehicle information data transferred through the terminal equipment.
In order to achieve the above object, the present application provides an encryption method for vehicle information, which is applied to a vehicle-mounted device, wherein the vehicle-mounted device is in communication connection with a terminal device so as to be in communication connection with a server through the terminal device, and the method includes acquiring vehicle information of a target vehicle; generating encrypted data information using the vehicle information; and sending the encrypted data information to the terminal equipment so as to send the encrypted data information to the server through the terminal equipment, so that the server detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
Preferably, the vehicle-mounted device stores a device private key, a device certificate, and a server public key, and the generating encrypted data information using the vehicle information includes: generating a secret key according to the equipment private key and the server public key; encrypting the vehicle information with the key to generate encrypted vehicle information; signing the encrypted vehicle information by using the device private key to obtain signed encrypted vehicle information; packaging the signed encrypted vehicle information and the device certificate to generate encrypted data information.
Preferably, before the acquiring the vehicle information of the target vehicle, the method further includes: sending a request for acquiring vehicle information of a target vehicle to the server, so that the server receives and responds to the request to send a wake-up instruction to the terminal equipment; and receiving the awakening instruction, and forwarding the awakening instruction to the vehicle-mounted equipment so that the vehicle-mounted equipment receives the awakening instruction and acquires the vehicle information of the target vehicle according to the awakening instruction.
Preferably, the vehicle information includes GPS position information, which is acquired by a GPS positioning device provided on the vehicle or the vehicle-mounted apparatus.
In order to achieve the above object, the present application provides a vehicle information encryption method applied to a server of a vehicle information encryption system, the vehicle information encryption system further including a terminal device communicatively connected to the server and an in-vehicle device communicatively connected to the terminal device, the method including: receiving encrypted data information sent by the terminal equipment, wherein the encrypted data information is vehicle information of a target vehicle obtained by the vehicle-mounted equipment, generating the encrypted data information according to the vehicle information, and sending the encrypted data information to the terminal equipment so that the terminal equipment sends the encrypted data information to the server; and detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
Preferably, the vehicle-mounted device stores a device private key, a device certificate, and a server public key, and the generating encrypted data information according to the vehicle information includes: the vehicle-mounted equipment generates a secret key according to the equipment private key and the server public key, and encrypts the vehicle information by using the secret key to generate encrypted vehicle information; the vehicle-mounted equipment signs the encrypted vehicle information by using the equipment private key so as to obtain the signed encrypted vehicle information; the vehicle-mounted device packages the signed encrypted vehicle information and the device certificate to generate encrypted data information.
Preferably, the server stores a certificate of authenticity, and the detecting whether the vehicle information of the target vehicle is illegally modified from the encrypted data information includes: judging whether the equipment certificate in the verification certificate and the encrypted data information is signed and issued by the same authentication server; if not, judging that the vehicle information of the target vehicle is illegally modified.
Preferably, the server further stores a server private key, the device certificate includes a device public key corresponding to the device private key, and the method further includes: if so, the server generates decryption information according to the equipment public key and the server private key, and decrypts the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information; if the decryption is successful, the server uses the equipment public key to carry out signature verification on the decrypted vehicle information; if the signature verification is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified; and if the signature verification is successful, judging that the vehicle information of the target vehicle is not illegally modified.
Preferably, the method further comprises: receiving a request sent by the terminal equipment for acquiring vehicle information of a target vehicle; and responding to the request, sending a wake-up instruction to the terminal equipment so that the terminal equipment forwards the wake-up instruction to the vehicle-mounted equipment, and enabling the vehicle-mounted equipment to acquire the vehicle information of the target vehicle according to the wake-up instruction.
In order to achieve the above object, the present application provides a method for encrypting vehicle information, applied to an encryption system for vehicle information, the encryption system for vehicle information including a server, a terminal device communicatively connected to the server, and an in-vehicle device communicatively connected to the terminal device, the method including: the vehicle-mounted equipment acquires vehicle information of a target vehicle and generates encrypted data information by using the vehicle information; the vehicle-mounted equipment sends the encrypted data information to the terminal equipment; the terminal equipment receives the encrypted data information and sends the encrypted data information to the server; and the server receives the encrypted data information and detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
In order to achieve the above object, the present application provides an in-vehicle apparatus, including: the information acquisition module is used for acquiring vehicle information of the target vehicle; the data encryption module is used for generating encrypted data information by utilizing the vehicle information; and the data sending module is used for sending the encrypted data information to the terminal equipment so as to send the encrypted data information to the server through the terminal equipment, so that the server can detect whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
Preferably, the vehicle-mounted device stores a device private key, a device certificate, and a server public key, and the data encryption module is further configured to: generating a secret key according to the equipment private key and the server public key; encrypting the vehicle information with the key to generate encrypted vehicle information; signing the encrypted vehicle information by using the device private key to obtain signed encrypted vehicle information; packaging the signed encrypted vehicle information and the device certificate to generate encrypted data information.
Preferably, the vehicle-mounted device further comprises an information request module and an instruction receiving module, wherein the information request module is configured to send a request for obtaining vehicle information of a target vehicle to the server, so that the server receives and responds to the request to send a wake-up instruction to the terminal device; the instruction receiving module is used for receiving the awakening instruction and forwarding the awakening instruction to the vehicle-mounted equipment so that the vehicle-mounted equipment receives the awakening instruction and obtains vehicle information of the target vehicle according to the awakening instruction.
Preferably, the vehicle information includes GPS position information, which is acquired by a GPS positioning device provided on the vehicle or the vehicle-mounted apparatus.
In order to achieve the above object, the present application provides an in-vehicle apparatus, including: a memory for storing a computer-executable encryption method program; and a processor configured to call up an encryption method program stored in the memory to perform the aforementioned method.
In order to achieve the above object, the present application provides a server, where the server includes a first receiving module, configured to receive encrypted data information sent by the terminal device, where the encrypted data information is vehicle information of a target vehicle obtained by the vehicle-mounted device, generate the encrypted data information according to the vehicle information, and send the encrypted data information to the terminal device, so that the terminal device sends the encrypted data information to the server; and the detection module is used for detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
Preferably, the vehicle-mounted device stores a device private key, a device certificate, and a server public key, and the generating encrypted data information according to the vehicle information includes: the vehicle-mounted equipment generates a secret key according to the equipment private key and the server public key, and encrypts the vehicle information by using the secret key to generate encrypted vehicle information; the vehicle-mounted equipment signs the encrypted vehicle information by using the equipment private key so as to obtain the signed encrypted vehicle information; the vehicle-mounted device packages the signed encrypted vehicle information and the device certificate to generate encrypted data information.
Preferably, the server stores a certificate of authenticity, and the detection module is further configured to: judging whether the equipment certificate in the verification certificate and the encrypted data information is signed and issued by the same authentication server; if not, judging that the vehicle information of the target vehicle is illegally modified.
Preferably, the server further stores a server private key, the device certificate includes a device public key corresponding to the device private key, and the detection module is further configured to: if so, the server generates decryption information according to the equipment public key and the server private key, and decrypts the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information; if the decryption is successful, the server uses the equipment public key to carry out signature verification on the decrypted vehicle information; if the signature verification is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified; and if the signature verification is successful, judging that the vehicle information of the target vehicle is not illegally modified.
Preferably, the server further includes a second receiving module and a response module, wherein the second receiving module is configured to receive a request for obtaining vehicle information of a target vehicle sent by the terminal device; the response module is used for responding to the request and sending a wake-up instruction to the terminal equipment so that the terminal equipment forwards the wake-up instruction to the vehicle-mounted equipment and the vehicle-mounted equipment acquires the vehicle information of the target vehicle according to the wake-up instruction.
To achieve the above object, the present application provides a server, comprising: a memory for storing a computer-executable encryption method program; and a processor configured to call up an encryption method program stored in the memory to perform the aforementioned method.
Compared with the prior art, the vehicle information encryption method, the vehicle-mounted equipment and the server are provided. The method comprises the steps that vehicle information of a target vehicle is obtained through vehicle-mounted equipment, encrypted data information is generated through the vehicle information and is sent to terminal equipment, the encrypted data information is received through the terminal equipment, the encrypted data information is sent to a server, the server receives the encrypted data information, and whether the vehicle information of the target vehicle is illegally modified or not is detected according to the encrypted data information. The data is verified to monitor whether the vehicle information is tampered in the transfer process through the terminal equipment, and the reliability of the transfer data of the terminal equipment is ensured.
Drawings
Fig. 1 is a flowchart illustrating steps of a method for encrypting vehicle information according to a first embodiment of the present application.
Fig. 2 is a flowchart illustrating sub-steps of step S11 in fig. 1.
Fig. 3 is a flowchart illustrating sub-steps of step S14 in fig. 1.
Fig. 4 is a flowchart illustrating steps of a method for encrypting vehicle information according to a second embodiment of the present application.
Fig. 5A is a block diagram of an in-vehicle device according to a third embodiment of the present application.
Fig. 5B is a block diagram of an in-vehicle device according to a fourth embodiment of the present application.
Fig. 6A is a block diagram of a server according to a fifth embodiment of the present application.
Fig. 6B is a block diagram of a server according to a sixth embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the descriptions in this application referring to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
The application provides an encryption method of vehicle information, vehicle-mounted equipment, a server and a storage medium. The method comprises the steps that vehicle information of a target vehicle is obtained through vehicle-mounted equipment, encrypted data information is generated through the vehicle information and is sent to terminal equipment, the encrypted data information is received through the terminal equipment, the encrypted data information is sent to a server, the server receives the encrypted data information, and whether the vehicle information of the target vehicle is illegally modified or not is detected according to the encrypted data information. The data is verified to monitor whether the vehicle information is tampered in the transfer process through the terminal equipment, and the reliability of the transfer data of the terminal equipment is ensured.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an encryption method for vehicle information according to a first embodiment of the present application, where the encryption method for vehicle information includes:
step S10: the vehicle-mounted device acquires vehicle information of a target vehicle.
The target vehicle is provided with a vehicle information collecting device for collecting vehicle information of the vehicle, which may be GPS position information of the vehicle or state information of the vehicle, and sending the vehicle information to the vehicle-mounted device 10, wherein the state information of the vehicle may be any one or more combination of the vehicle speed, the acceleration, the driving direction and the heading angle of the vehicle. That is, the vehicle information collecting device may be a GPS positioning device that correspondingly obtains GPS position information or an acceleration sensor or an angle sensor that correspondingly obtains status information of the vehicle. The GPS positioning device may be disposed on the target vehicle or on-board equipment, which is not limited herein.
The in-vehicle device 10 may be an in-vehicle OBD device or other terminal device provided on the vehicle to be communicatively connected to the terminal device 20.
Step S11: the vehicle-mounted device generates encrypted data information using the vehicle information.
The in-vehicle apparatus 10 acquires the vehicle information of the target vehicle, and performs encryption and/or signature processing on the acquired vehicle information to acquire encrypted data information.
Referring to fig. 2, in some embodiments, the vehicle-mounted device 10 stores a device private key, a device certificate and a server public key, where the device certificate includes the device public key, and step S11 includes:
step S111: and the vehicle-mounted equipment generates a secret key according to the equipment private key and the server public key.
Step S112: the vehicle-mounted device encrypts the vehicle information with the key to generate encrypted vehicle information.
The in-vehicle device 10 performs key agreement, which may preferably be an ECDH algorithm, according to the stored device public key and the server private key to generate a key, and encrypts the acquired vehicle information using the key to generate encrypted vehicle information.
Step S113: and the vehicle-mounted equipment signs the encrypted vehicle information by using the equipment private key so as to obtain the signed encrypted vehicle information.
The in-vehicle device 10 signs the encrypted vehicle information with the device private key to generate signed encrypted vehicle information.
Step S114: the vehicle-mounted device packages the signed encrypted vehicle information and the device certificate to generate encrypted data information.
The in-vehicle device 10 packages the signed encrypted vehicle information and the device certificate to generate encrypted data information. Wherein the device certificate includes a device public key corresponding to the device private key.
Preferably, the device certificate is a certificate distributed by a CA server, and includes information of an electronic certificate authority, public key user information, a device public key, signature of an authority, and a validity period.
Step S12: and the vehicle-mounted equipment sends the encrypted data information to the terminal equipment.
The vehicle-mounted device 10 is in communication connection with the terminal device 20 through wireless communication methods such as wifi or bluetooth, and may also be in communication connection with the terminal device 20 through data lines.
The in-vehicle device 10 transmits the generated encrypted data information to the terminal device 20 through wireless communication, and the terminal device 20 may be a mobile phone, an ipad, a notebook computer, or the like.
Step S13: and the terminal equipment receives the encrypted data information and sends the encrypted data information to the server.
The terminal device 20 and the server 30 are connected in communication through a mobile, a universal or a telecommunication communication network. After the terminal device 20 receives the encrypted data information transmitted by the in-vehicle device 10, the encrypted data information is forwarded to the server 30.
Step S14: and the server receives the encrypted data information and detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
Referring to fig. 3, in some embodiments, the server 30 stores a certificate for preliminarily verifying whether the encrypted data information is modified, and the detecting whether the vehicle information of the target vehicle is modified illegally according to the encrypted data information includes:
step S141: and the server judges whether the equipment certificate in the verification certificate and the encrypted data information is issued by the same authentication server.
The verification certificate and the equipment certificate are issued by the same authentication server, each verification certificate corresponds to a unique authentication certificate, and the authentication server is preferably a CA authentication server.
Whether the encrypted data information is modified or not can be preliminarily judged by verifying whether the verification certificate and the equipment certificate are issued by the same authentication server or not.
Step S142: if not, judging that the vehicle information of the target vehicle is illegally modified.
If the verification certificate and the equipment certificate are not issued by the same authentication server, the encrypted data information is judged to be modified, namely the vehicle information of the target vehicle is illegally modified, and the vehicle information of the target vehicle is unreliable.
Referring back to fig. 3, in some embodiments, the server further stores a server private key, and the device certificate includes a device public key corresponding to the device private key, and the method further includes:
step S143: and if so, the server generates decryption information according to the equipment public key and the server private key, and decrypts the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information.
The device public key and the server private key may generate decryption information corresponding to the unlock device private key and the server public key, and the server 30 may decrypt the encrypted vehicle information using the decryption information to obtain decrypted vehicle information, that is, vehicle information of the signed target vehicle.
For example, the device private key and the server public key may generate a key 001, and then the device public key and the server private key may also generate a corresponding unlocking password 001, by which data encrypted by the key that the device private key and the server public key may generate may be unlocked.
Step S144: and if the decryption is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified.
If the decryption is unsuccessful, the encrypted vehicle information may be illegally tampered, that is, the vehicle information of the target vehicle is illegally modified.
Referring to fig. 3, in some embodiments, the method further includes:
step S145: and if the decryption is successful, the server utilizes the equipment public key to carry out signature verification on the decrypted vehicle information.
And if the decryption is successful, the server utilizes the equipment public key to carry out signature verification on the decrypted vehicle information.
For example, when the device private key signs the encrypted vehicle information, the reserved signature information is 007, the server verifies the signature by using the device public key corresponding to the device private key, detects whether the signature information is the same as the signature information corresponding to the device private key, if so, the signature verification is successful, and if not, the signature verification is unsuccessful.
Step S146: and if the signature verification is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified.
Step S147: and if the signature verification is successful, judging that the vehicle information of the target vehicle is not illegally modified.
Referring to fig. 4, fig. 4 is a diagram illustrating an encryption method for vehicle information according to a second embodiment of the present application, where the method includes: steps S20-S27.
Step S20: the terminal device sends a request for obtaining vehicle information of a target vehicle to the server.
The terminal device 20 issues a request for acquiring the vehicle information of the target vehicle, which includes information of the on-vehicle device 10 for acquiring the vehicle information of the target vehicle, to the server 30, so that the server 30 transmits a wake-up instruction to the corresponding on-vehicle device 10 according to the request, thereby causing the corresponding on-vehicle device 10 to acquire the vehicle information of the target vehicle in response to the wake-up instruction.
Step S21: and the server receives and responds to the request to send a wake-up instruction to the terminal equipment.
The server 30 receives the request sent by the terminal device 20, generates a wake-up instruction for waking up the on-board device 10 on the corresponding target vehicle to acquire the vehicle information of the target vehicle according to the on-board device 10 information in the request, and sends the wake-up instruction to the terminal device 20 to be sent to the corresponding on-board device 10 through the terminal device 20, so that the corresponding on-board device 10 responds to the wake-up instruction to acquire the vehicle information of the target vehicle.
Step S22: and the terminal equipment receives the awakening instruction and forwards the awakening instruction to corresponding vehicle-mounted equipment.
The terminal device 20 receives the wake-up instruction and forwards the wake-up instruction to all the vehicle-mounted devices 10 communicatively connected with the terminal device, or the corresponding vehicle-mounted device 10 specified by the wake-up instruction.
Step S23: and the vehicle-mounted equipment receives the awakening instruction so as to acquire the vehicle information of the target vehicle according to the awakening instruction.
After receiving the wake-up instruction, the in-vehicle device 10 acquires the vehicle information of the target vehicle to encrypt the vehicle information and transmit the encrypted vehicle information to the server 30 through the terminal device 20.
Step S24: the vehicle-mounted equipment acquires vehicle information of a target vehicle.
Step S24 is the same as step S10 in fig. 1, and is not described herein.
Step S25: generating encrypted data information using the vehicle information.
Step S25 is the same as step S11 in fig. 1, and is not described herein.
Step S26: and the vehicle-mounted equipment sends the encrypted data information to the terminal equipment.
Step S26 is the same as step S12 in fig. 1, and is not described herein.
Step S27: and the terminal equipment receives the encrypted data information and sends the encrypted data information to the server.
Step S27 is the same as step S13 in fig. 1, and is not described herein.
Step S28: and the server receives the encrypted data information and detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
Step S28 is the same as step S14 in fig. 1, and is not described herein.
Referring to fig. 5A, in some embodiments, the vehicle-mounted device 10 includes an information obtaining module 101, a data encrypting module 102, and a data transmitting module 103. The information acquiring module 101 is configured to acquire vehicle information of a target vehicle. And the data encryption module 102 is used for generating encrypted data information by utilizing the vehicle information. A data sending module 103, configured to send the encrypted data information to the terminal device, so as to send the encrypted data information to the server through the terminal device, so that the server detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
In some embodiments, the vehicle-mounted device stores a device private key, a device certificate, and a server public key, and the data encryption module 102 is further configured to: generating a secret key according to the equipment private key and the server public key; encrypting the vehicle information with the key to generate encrypted vehicle information; signing the encrypted vehicle information by using the device private key to obtain signed encrypted vehicle information; packaging the signed encrypted vehicle information and the device certificate to generate encrypted data information.
In some embodiments, the vehicle-mounted device further includes an information request module 104 and an instruction receiving module 105, where the information request module 104 is configured to send a request for obtaining vehicle information of a target vehicle to the server, so that the server receives and responds to the request to send a wake-up instruction to the terminal device.
The instruction receiving module 105 is configured to receive the wake-up instruction, and forward the wake-up instruction to the vehicle-mounted device, so that the vehicle-mounted device receives the wake-up instruction, and obtains vehicle information of the target vehicle according to the wake-up instruction.
Wherein the vehicle information includes GPS position information acquired by a GPS positioning device provided on the target vehicle or the in-vehicle apparatus 10.
Referring to fig. 5B, in some embodiments, the vehicle-mounted device 10 includes a first memory 106, a first processor 107, and a first bus 108, and the first memory 106 is electrically connected to the first processor 107 through the first bus 108.
The first memory 106 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The first memory 106 may in some embodiments be an internal storage unit of the in-vehicle device, for example a hard disk of the in-vehicle device. The first memory 106 may be an external storage device of the in-vehicle device 10 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the in-vehicle device 10. The first memory 106 may be used not only to store application software installed in the in-vehicle device and various types of data, such as codes of a computer-readable program, etc., but also to temporarily store data that has been output or will be output, that is, the first memory may serve as a storage medium.
The first processor 107 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip in some embodiments, and the first processor 107 may call the program codes stored in the first memory 106 or process data to realize the following steps:
acquiring vehicle information of a target vehicle;
generating encrypted data information using the vehicle information;
and sending the encrypted data information to the terminal equipment so as to send the encrypted data information to the server through the terminal equipment, so that the server detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
In some embodiments, the vehicle-mounted device stores a device private key, a device certificate, and a server public key, and the first processor 107 is further configured to implement the following steps:
generating a secret key according to the equipment private key and the server public key;
encrypting the vehicle information with the key to generate encrypted vehicle information;
signing the encrypted vehicle information by using the device private key to obtain signed encrypted vehicle information;
packaging the signed encrypted vehicle information and the device certificate to generate encrypted data information.
In some embodiments, the first processor 107 is further configured to implement the following steps:
sending a request for acquiring vehicle information of a target vehicle to the server, so that the server receives and responds to the request to send a wake-up instruction to the terminal equipment;
and receiving the awakening instruction, and forwarding the awakening instruction to the vehicle-mounted equipment so that the vehicle-mounted equipment receives the awakening instruction and acquires the vehicle information of the target vehicle according to the awakening instruction.
In some embodiments, the vehicle information includes GPS position information, and the GPS position information is acquired by a GPS positioning device provided on the vehicle or the vehicle-mounted device.
In some embodiments, the present application further provides a storage medium storing an executable encryption method program, which when executed, implements the following encryption method steps:
acquiring vehicle information of a target vehicle;
generating encrypted data information using the vehicle information;
and sending the encrypted data information to the terminal equipment so as to send the encrypted data information to the server through the terminal equipment, so that the server detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
In some embodiments, the vehicle-mounted device stores a device private key, a device certificate, and a server public key, and when the encryption method program is executed, the following encryption method steps are implemented:
generating a secret key according to the equipment private key and the server public key;
encrypting the vehicle information with the key to generate encrypted vehicle information;
signing the encrypted vehicle information by using the device private key to obtain signed encrypted vehicle information;
packaging the signed encrypted vehicle information and the device certificate to generate encrypted data information.
In some embodiments, when executed, the encryption method program implements the following encryption method steps:
sending a request for acquiring vehicle information of a target vehicle to the server, so that the server receives and responds to the request to send a wake-up instruction to the terminal equipment;
and receiving the awakening instruction, and forwarding the awakening instruction to the vehicle-mounted equipment so that the vehicle-mounted equipment receives the awakening instruction and acquires the vehicle information of the target vehicle according to the awakening instruction.
In some embodiments, the vehicle information includes GPS position information, and the GPS position information is acquired by a GPS positioning device provided on the vehicle or the vehicle-mounted device.
Referring to fig. 6A, in some embodiments, the server 30 includes a receiving module 301 and a detecting module 302.
The first receiving module 301 is configured to receive encrypted data information sent by the terminal device, where the encrypted data information is vehicle information of a target vehicle acquired by the vehicle-mounted device, generate the encrypted data information according to the vehicle information, and send the encrypted data information to the terminal device, so that the terminal device sends the encrypted data information to the server.
A detecting module 302, configured to detect whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
In some embodiments, the on-board device stores a device private key, a device certificate, and a server public key, and the generating encrypted data information using the vehicle information includes: the vehicle-mounted equipment generates a secret key according to the equipment private key and the server public key, and encrypts the vehicle information by using the secret key to generate encrypted vehicle information; the vehicle-mounted equipment signs the encrypted vehicle information by using the equipment private key so as to obtain the signed encrypted vehicle information; the vehicle-mounted device packages the signed encrypted vehicle information and the device certificate to generate encrypted data information.
In some embodiments, the server 30 stores a certificate of authenticity, and the detection module 302 is further configured to: judging whether the equipment certificate in the verification certificate and the encrypted data information is signed and issued by the same authentication server; if not, judging that the vehicle information of the target vehicle is illegally modified.
In some embodiments, the server 30 further stores a server private key, and the detection module 302 is further configured to: if the verification certificate and the equipment certificate in the encrypted data information are issued by the same authentication server, the server generates decryption information according to the equipment public key and the server private key, and decrypts the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information; if the decryption is successful, the server uses the equipment public key to carry out signature verification on the decrypted vehicle information; and if the signature verification is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified. And if the signature verification is successful, judging that the vehicle information of the target vehicle is not illegally modified.
In some embodiments, the server 30 further includes a second receiving module 303 and a response module 304, where the second receiving module 303 is configured to receive a request sent by the terminal device to acquire vehicle information of a target vehicle;
the response module 304 is configured to send a wake-up instruction to the terminal device in response to the request, so that the terminal device forwards the wake-up instruction to the vehicle-mounted device, and the vehicle-mounted device obtains vehicle information of the target vehicle according to the wake-up instruction.
Referring to fig. 6B, in some embodiments, the server 80 includes a second memory 305, a second processor 306 and a second bus 307, wherein the second memory 305 and the second processor 306 are electrically connected through the second bus 307.
The second memory 305 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The second memory 305 may in some embodiments be an internal storage unit of the in-vehicle device, for example a hard disk of the in-vehicle device. The second memory 305 may also be an external storage device of the server 30 in other embodiments, such as a plug-in hard disk provided on the server 30, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and so on. The second memory 305 may be used not only to store application software installed in the vehicle-mounted device and various types of data, such as codes of a computer-readable program, etc., but also to temporarily store data that has been output or is to be output, that is, the second memory may serve as a storage medium.
The second processor 306 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip in some embodiments, and the second processor 306 may call the program codes stored in the second memory 305 or process data, and implement the following steps:
receiving encrypted data information sent by the terminal equipment, wherein the encrypted data information is vehicle information of a target vehicle obtained by the vehicle-mounted equipment, generating the encrypted data information according to the vehicle information, and sending the encrypted data information to the terminal equipment so that the terminal equipment sends the encrypted data information to the server;
and detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
In some embodiments, the on-board device stores a device private key, a device certificate, and a server public key, and the generating encrypted data information according to the vehicle information includes:
the vehicle-mounted equipment generates a secret key according to the equipment private key and the server public key, and encrypts the vehicle information by using the secret key to generate encrypted vehicle information;
the vehicle-mounted equipment signs the encrypted vehicle information by using the equipment private key so as to obtain the signed encrypted vehicle information;
the vehicle-mounted device packages the signed encrypted vehicle information and the device certificate to generate encrypted data information.
In some embodiments, the server stores a certificate of authenticity, and the second processor 306 is further configured to implement the following steps:
judging whether the equipment certificate in the verification certificate and the encrypted data information is signed and issued by the same authentication server;
if not, judging that the vehicle information of the target vehicle is illegally modified.
In some embodiments, the server further stores a server private key, and the second processor 306 is further configured to implement the following steps:
if so, the server generates decryption information according to the equipment public key and the server private key, and decrypts the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information;
if the decryption is successful, the server uses the equipment public key to carry out signature verification on the decrypted vehicle information;
if the signature verification is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified;
and if the signature verification is successful, judging that the vehicle information of the target vehicle is not illegally modified.
In some embodiments, the second processor 306 is further configured to implement the following steps:
receiving a request sent by the terminal equipment for acquiring vehicle information of a target vehicle;
and responding to the request, sending a wake-up instruction to the terminal equipment so that the terminal equipment forwards the wake-up instruction to the vehicle-mounted equipment, and enabling the vehicle-mounted equipment to acquire the vehicle information of the target vehicle according to the wake-up instruction.
The present application provides a storage medium storing an executable encryption method program that, when executed, implements encryption method steps:
receiving encrypted data information sent by the terminal equipment, wherein the encrypted data information is vehicle information of a target vehicle obtained by the vehicle-mounted equipment, generating the encrypted data information according to the vehicle information, and sending the encrypted data information to the terminal equipment so that the terminal equipment sends the encrypted data information to the server;
and detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
In some embodiments, the on-board device stores a device private key, a device certificate, and a server public key, and the generating encrypted data information according to the vehicle information includes:
the vehicle-mounted equipment generates a secret key according to the equipment private key and the server public key, and encrypts the vehicle information by using the secret key to generate encrypted vehicle information;
the vehicle-mounted equipment signs the encrypted vehicle information by using the equipment private key so as to obtain the signed encrypted vehicle information;
the vehicle-mounted device packages the signed encrypted vehicle information and the device certificate to generate encrypted data information.
In some embodiments, the server stores a certificate of authenticity, and when the encryption method program is executed, the encryption method is implemented as:
judging whether the equipment certificate in the verification certificate and the encrypted data information is signed and issued by the same authentication server; if not, judging that the vehicle information of the target vehicle is illegally modified.
In some embodiments, the server further stores a server private key, and when the encryption method program is executed, the encryption method includes:
if so, the server generates decryption information according to the equipment public key and the server private key, and decrypts the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information;
if the decryption is successful, the server uses the equipment public key to carry out signature verification on the decrypted vehicle information;
if the signature verification is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified;
and if the signature verification is successful, judging that the vehicle information of the target vehicle is not illegally modified.
In some embodiments, when the encryption method program is executed, the encryption method steps are implemented as:
receiving a request sent by the terminal equipment for acquiring vehicle information of a target vehicle;
and responding to the request, sending a wake-up instruction to the terminal equipment so that the terminal equipment forwards the wake-up instruction to the vehicle-mounted equipment, and enabling the vehicle-mounted equipment to acquire the vehicle information of the target vehicle according to the wake-up instruction.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (8)

1. An encryption method of vehicle information is applied to a vehicle-mounted device, the vehicle-mounted device is in communication connection with a terminal device, and is in communication connection with a server through the terminal device, and the method is characterized by comprising the following steps:
acquiring vehicle information of a target vehicle;
generating encrypted data information using the vehicle information;
the vehicle-mounted device stores a device private key, a device certificate and a server public key, and the generating of the encrypted data information by using the vehicle information comprises the following steps:
generating a secret key according to the equipment private key and the server public key;
encrypting the vehicle information with the key to generate encrypted vehicle information;
signing the encrypted vehicle information by using the device private key to obtain signed encrypted vehicle information;
packaging the signed encrypted vehicle information and the device certificate to generate encrypted data information;
sending the encrypted data information to the terminal equipment so as to send the encrypted data information to the server through the terminal equipment, so that the server detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information;
before the obtaining the vehicle information of the target vehicle, the method further includes:
sending a request for acquiring vehicle information of a target vehicle to the server, so that the server receives and responds to the request to send a wake-up instruction to the terminal equipment;
and the terminal equipment receives the awakening instruction and forwards the awakening instruction to the vehicle-mounted equipment so that the vehicle-mounted equipment receives the awakening instruction and acquires the vehicle information of the target vehicle according to the awakening instruction.
2. The method of claim 1, wherein: the vehicle information includes GPS position information acquired by a GPS positioning device provided on the vehicle or the vehicle-mounted device.
3. An encryption method of vehicle information, applied to a server of an encryption system of vehicle information, the encryption system of vehicle information further comprising a terminal device in communication connection with the server and an in-vehicle device in communication connection with the terminal device, the method comprising:
receiving encrypted data information sent by the terminal equipment, wherein the encrypted data information is vehicle information of a target vehicle obtained by the vehicle-mounted equipment, generating the encrypted data information according to the vehicle information, and sending the encrypted data information to the terminal equipment so that the terminal equipment sends the encrypted data information to the server;
detecting whether the vehicle information of the target vehicle is illegally modified based on the encrypted data information,
the detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information includes:
judging whether the verification certificate and the equipment certificate in the encrypted data information are issued by the same authentication server or not;
if so, generating decryption information according to the equipment public key and the server private key, and decrypting the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information;
and if the decryption is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified.
4. A vehicle information encryption method is applied to a vehicle information encryption system, and is characterized in that the vehicle information encryption system comprises a server, a terminal device in communication connection with the server and a vehicle-mounted device in communication connection with the terminal device, and the method comprises the following steps:
the vehicle-mounted equipment acquires vehicle information of a target vehicle and generates encrypted data information by using the vehicle information;
the vehicle-mounted equipment sends the encrypted data information to the terminal equipment;
the terminal equipment receives the encrypted data information and sends the encrypted data information to the server;
the server receives the encrypted data information and detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information;
the detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information includes:
the server judges whether the certificate of verification and the equipment certificate in the encrypted data information are issued by the same authentication server;
if so, the server generates decryption information according to the equipment public key and the server private key, and decrypts the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information;
and if the decryption is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified.
5. An in-vehicle apparatus characterized by comprising:
the information acquisition module is used for acquiring vehicle information of the target vehicle;
the data encryption module is used for generating encrypted data information by utilizing the vehicle information;
the vehicle-mounted device stores a device private key, a device certificate and a server public key, and the generating of the encrypted data information by using the vehicle information comprises the following steps:
generating a secret key according to the equipment private key and the server public key;
encrypting the vehicle information with the key to generate encrypted vehicle information;
signing the encrypted vehicle information by using the device private key to obtain signed encrypted vehicle information;
packaging the signed encrypted vehicle information and the device certificate to generate encrypted data information;
and the data sending module is used for sending the encrypted data information to the terminal equipment so as to send the encrypted data information to the server through the terminal equipment, so that the server detects whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information.
6. An in-vehicle apparatus characterized by comprising:
a memory for storing a computer-executable encryption method program; and
a processor for invoking an encryption method program stored in the memory to perform the method of any of claims 1-2.
7. A server, characterized in that the server comprises:
the receiving module is used for receiving encrypted data information sent by terminal equipment, wherein the encrypted data information is vehicle information of a target vehicle obtained by vehicle-mounted equipment, the encrypted data information is generated according to the vehicle information, and the encrypted data information is sent to the terminal equipment so that the terminal equipment sends the encrypted data information to the server; and
the detection module is used for detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information;
the detecting whether the vehicle information of the target vehicle is illegally modified according to the encrypted data information includes:
judging whether the verification certificate and the equipment certificate in the encrypted data information are issued by the same authentication server or not;
if so, generating decryption information according to the equipment public key and the server private key, and decrypting the encrypted vehicle information according to the decryption information to obtain decrypted vehicle information;
and if the decryption is unsuccessful, judging that the vehicle information of the target vehicle is illegally modified.
8. A server, characterized in that the server comprises:
a memory for storing a computer-executable encryption method program; and
a processor configured to invoke the encryption method program stored in the memory to perform the method of claim 3.
CN201910458680.4A 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server Active CN110191415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910458680.4A CN110191415B (en) 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910458680.4A CN110191415B (en) 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server

Publications (2)

Publication Number Publication Date
CN110191415A CN110191415A (en) 2019-08-30
CN110191415B true CN110191415B (en) 2022-01-25

Family

ID=67718713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910458680.4A Active CN110191415B (en) 2019-05-29 2019-05-29 Vehicle information encryption method, vehicle-mounted equipment and server

Country Status (1)

Country Link
CN (1) CN110191415B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110753345B (en) * 2019-10-08 2022-11-25 武汉光庭信息技术股份有限公司 TBox communication method and TBox device
CN110969723B (en) * 2019-11-11 2022-10-11 深圳市元征科技股份有限公司 Data management method, detection device, server, and computer-readable storage medium
CN111724494B (en) * 2020-06-27 2022-05-10 阿波罗智联(北京)科技有限公司 Traffic information processing method and device, electronic equipment and storage medium
TWI738551B (en) * 2020-10-28 2021-09-01 中華汽車工業股份有限公司 Pluggable vehicle control device, vehicle control system and vehicle control method
CN115225399A (en) * 2022-07-22 2022-10-21 蔚来汽车科技(安徽)有限公司 Vehicle alarm information processing system and method
CN115225398A (en) * 2022-07-22 2022-10-21 蔚来汽车科技(安徽)有限公司 Vehicle alarm information processing system and method
CN115242841A (en) * 2022-07-22 2022-10-25 蔚来汽车科技(安徽)有限公司 Vehicle operation log processing system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6968060B1 (en) * 1999-02-11 2005-11-22 Bull, S.A. Method for verifying the use of public keys generated by an on-board system
CN101420306A (en) * 2008-12-12 2009-04-29 肖佐楠 Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm
CN108055236A (en) * 2017-11-03 2018-05-18 深圳市轱辘车联数据技术有限公司 A kind of data processing method, mobile unit and electronic equipment
CN109587164A (en) * 2018-12-27 2019-04-05 深圳市元征科技股份有限公司 A kind of information encrypting transmission method, device, equipment and storage medium
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
WO2019075408A1 (en) * 2017-10-13 2019-04-18 FLIR Unmanned Aerial Systems AS Encryption and decryption of media data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6968060B1 (en) * 1999-02-11 2005-11-22 Bull, S.A. Method for verifying the use of public keys generated by an on-board system
CN101420306A (en) * 2008-12-12 2009-04-29 肖佐楠 Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
WO2019075408A1 (en) * 2017-10-13 2019-04-18 FLIR Unmanned Aerial Systems AS Encryption and decryption of media data
CN108055236A (en) * 2017-11-03 2018-05-18 深圳市轱辘车联数据技术有限公司 A kind of data processing method, mobile unit and electronic equipment
CN109587164A (en) * 2018-12-27 2019-04-05 深圳市元征科技股份有限公司 A kind of information encrypting transmission method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110191415A (en) 2019-08-30

Similar Documents

Publication Publication Date Title
CN110191415B (en) Vehicle information encryption method, vehicle-mounted equipment and server
EP3690643B1 (en) Vehicle-mounted device upgrading method and related device
RU2506642C2 (en) Tachograph, toll-on-board unit, indicator device and system
CN111131313B (en) Safety guarantee method and system for replacing ECU (electronic control Unit) of intelligent networked automobile
US8004404B2 (en) Information storage device, information storage program, verification device and information storage method
US20090207004A1 (en) Method for the Protection of a Movable Object, Especially a Vehicle, Against Unauthorized Use
US20140075186A1 (en) Multiple Access Key Fob
KR101565848B1 (en) Method and apparatus for vehicle control by using mobile terminal
CN102771078A (en) Wireless communications device and authentication processing method
KR20160092496A (en) Communication device, lsi, program, and communication system
JP2013234520A (en) Electronic key registration system
JP5772692B2 (en) In-vehicle control device authentication system and in-vehicle control device authentication method
US10239493B2 (en) Security method for a security system of a vehicle
CN111565182B (en) Vehicle diagnosis method and device and storage medium
CN111181928A (en) Vehicle diagnosis method, server, and computer-readable storage medium
CN111935672A (en) Information reading method, device, system and storage medium
JP2013015884A (en) Authentication system and authentication method
CN112153646A (en) Authentication method, equipment and system
US20170317825A1 (en) Communication device
CN109743334A (en) A kind of T-BOX encryption system and method
CN109743283B (en) Information transmission method and equipment
CN113115309B (en) Data processing method and device for Internet of vehicles, storage medium and electronic equipment
KR102551592B1 (en) Method for preventing mileage tampering of car and mileage recording device using the same
JP2009151557A (en) Anti-theft device
JP2008176741A (en) Client terminal, service providing server, service providing system, control method, and service providing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant