CN110941820A - Vehicle safety detection method and device, automobile and readable storage medium - Google Patents

Vehicle safety detection method and device, automobile and readable storage medium Download PDF

Info

Publication number
CN110941820A
CN110941820A CN201911227027.3A CN201911227027A CN110941820A CN 110941820 A CN110941820 A CN 110941820A CN 201911227027 A CN201911227027 A CN 201911227027A CN 110941820 A CN110941820 A CN 110941820A
Authority
CN
China
Prior art keywords
application program
application
request
authentication center
white list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911227027.3A
Other languages
Chinese (zh)
Inventor
赖妍华
刘强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Forda Vehicle Networking Shenzhen Co Ltd
Original Assignee
Forda Vehicle Networking Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Forda Vehicle Networking Shenzhen Co Ltd filed Critical Forda Vehicle Networking Shenzhen Co Ltd
Priority to CN201911227027.3A priority Critical patent/CN110941820A/en
Publication of CN110941820A publication Critical patent/CN110941820A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application relates to a detection method and device for vehicle safety, an automobile and a readable storage medium, wherein the method comprises the following steps: detecting an application program to be installed; judging whether the application program is allowed to be installed or not by installing a white list in an authentication center; if yes, installing the application program; the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list; and if the request of the application program is in the authority range, executing the request by the application program. By the method, the application program of the vehicle is detected, and the condition that the vehicle and the owner of the vehicle are harmed due to illegal use of the vehicle control service is avoided.

Description

Vehicle safety detection method and device, automobile and readable storage medium
Technical Field
The present application relates to the field of vehicle safety technologies, and in particular, to a method and an apparatus for detecting vehicle safety, an automobile, and a readable storage medium.
Background
Due to the openness and the ecological universality of Android applications, in recent years, Android systems gradually replace WinCE and Linux systems commonly used in the conventional vehicle-mounted industry to become mainstream applications in the industry. However, due to the openness and freedom of the Android operating system, the Android operating system becomes one of the main objects of malicious programs and virus attacks at present, but the security of the vehicle-mounted system is higher than that of common electronic equipment, and particularly, if the vehicle-mounted system with a remote control function is not well controlled, the vehicle may be stolen, and even the life security of the vehicle owner can be damaged.
The openness of the Android system enables a vehicle owner to download more applications according to the requirements of the vehicle owner, and the travel and entertainment are facilitated. However, the Android system has limited application at present, and once the intruding application obtains the Android system permission, the interface of the system can be easily obtained to further infringe the system, for example, an interface for remote ignition of the vehicle is called to start the vehicle.
Therefore, the prior art is in need of improvement.
Disclosure of Invention
The technical problem to be solved by the application is to provide a vehicle safety detection method and device, an automobile and a readable storage medium, so that the condition that the safety of the automobile and an owner of the automobile is damaged due to the fact that vehicle control services are illegally used is avoided.
In a first aspect, an embodiment of the present application provides a method for detecting vehicle safety, where the method includes:
detecting an application program to be installed;
judging whether the application program is allowed to be installed or not by installing a white list in an authentication center;
if yes, installing the application program;
the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list;
and if the request of the application program is in the authority range, executing the request by the application program.
Optionally, the detecting the application to be installed includes:
detecting whether an installation package exists or not;
and if the installation package is detected, determining the application program to be installed.
Optionally, before the determining, by the authentication center, whether to allow the application to be installed through an installation white list, the method includes:
and judging whether the application program is a system application program.
Optionally, after the determining whether the application is a system application, the method includes:
if the application program is a system application program, judging whether the application program is allowed to be installed or not through an installation white list in the authentication center;
and if the application program is not the system application program, installing the application program.
Optionally, after installing the application program, the method includes:
saving the installation number of the application program to an application information file;
and sending the application information file to the authentication center for storage.
Optionally, the determining, by the authentication center, whether the request of the application program is within the authority range according to the running white list includes:
verifying the application program;
and if the verification is successful, adding the application information into an operation white list.
Optionally, the verifying the application program at the authentication center includes:
encrypting the secret key of the application program and then sending the encrypted secret key to the authentication center;
comparing the key of the application program with a correct key stored in the authentication center to determine whether the application program is allowed to run;
and if the application program is allowed to run, the verification is successful.
In a second aspect, an embodiment of the present application provides a vehicle safety detection device, including:
the detection module is used for detecting the application program to be installed;
the first judgment module is used for judging whether the application program is allowed to be installed or not through an installation white list in an authentication center;
the installation module is used for installing the application program if the application program is installed;
the second judgment module is used for receiving the request of the application program by the authentication center and judging whether the request of the application program is in the authority range according to the running white list;
and the execution module is used for executing the request by the application program if the request of the application program is in the authority range.
In a third aspect, an embodiment of the present application provides an automobile, including a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program:
detecting an application program to be installed;
judging whether the application program is allowed to be installed or not by installing a white list in an authentication center;
if yes, installing the application program;
the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list;
and if the request of the application program is in the authority range, executing the request by the application program.
In a fourth aspect, an embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps:
detecting an application program to be installed;
judging whether the application program is allowed to be installed or not by installing a white list in an authentication center;
if yes, installing the application program;
the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list;
and if the request of the application program is in the authority range, executing the request by the application program.
Compared with the prior art, the embodiment of the application has the following advantages:
according to the method provided by the embodiment of the application, the application program to be installed is detected; judging whether the application program is allowed to be installed or not by installing a white list in an authentication center; if yes, installing the application program; the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list; and if the request of the application program is in the authority range, executing the request by the application program. By the method, the application program of the vehicle is detected, and the condition that the vehicle and the owner of the vehicle are harmed due to illegal use of the vehicle control service is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flow chart of a method for detecting vehicle safety in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a vehicle safety detection device in an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The inventor finds that the Android system has limited application limitation at present, and once the invading application obtains the Android system permission, the interface of the system can be easily obtained to further damage the system, for example, the interface of the vehicle remote ignition is called to start the vehicle.
In order to solve the above problem, in the embodiment of the present application, an authentication center is established at a system layer, and two aspects of an installation process and an operation process are authenticated to enhance application security and reliability.
Various non-limiting embodiments of the present application are described in detail below with reference to the accompanying drawings.
The embodiment of the application provides a method for detecting vehicle safety, and as shown in fig. 1, the method comprises the following steps:
and step S1, detecting the application program to be installed.
In the embodiment of the application, whether the application program is to be installed or not is determined by detecting whether an installation package exists in the system or not. Specifically, whether an installation package exists is detected, and if the installation package is detected, the application program to be installed is determined. The application program is simply referred to as an application.
And step S2, judging whether the application program is allowed to be installed or not through an installation white list in the authentication center.
In this embodiment of the present application, an application may be a system application or a third-party application, since the authority of the system application is higher than that of the third-party application, and the third-party application does not use the higher authority in the vehicle system service, it needs to be determined whether the application is the system application when the application is installed, if the application is not the system application, for example, the third-party application, the application may be directly installed, and if the application is the system application, it needs to determine whether to allow the application to be installed by installing a white list in the authentication center, specifically, before step S2, the method includes:
and step S21, judging whether the application program is a system application program.
In this embodiment of the present application, after determining whether the application is a system application, the method includes:
step S22, if the application is a system application, determining whether to allow the application to be installed in the authentication center through an installation white list.
And step S23, if the application program is not the system application program, installing the application program.
In this embodiment of the application, if the application is a system application, determining, in the authentication center, whether to allow the application to be installed through an installation white list, where step S22 includes:
step S221, the authentication center judges whether the application program exists in the installation white list.
Step S222, if the application program exists in the installation white list, allowing the application program to be installed.
Step S223, if the application does not exist in the installation white list, prohibiting the application from being installed.
In the embodiment of the application, the application program is marked at the same time of installation of the application program. The application program can be marked by the installation number because only the application installed through the normal flow has the installation number. Specifically, the flow of application marking comprises the following steps:
and step S24, saving the installation number of the application program to an application information file.
And step S25, sending the application information file to the authentication center for storage.
Specifically, each application in the Android system has some application information stored in the package info, and after the application is successfully installed, the installation number is written into the package info and sent to the APP authentication center for backup storage. By detecting the installation authority of the application program to be installed, illegal operation after the application program skipping the installation process flow is successfully installed is prevented.
And step S3, if yes, the application program is installed.
Step S4, the authentication center receives the request of the application program and determines whether the request of the application program is in the scope of authority according to the running white list.
In this embodiment of the present application, before the determining, by the authentication center, whether to allow the application to be installed through the installation white list, the method includes:
and step S41, verifying the application program.
And step S42, if the verification is successful, adding the application information into the running white list.
Wherein, step S42 includes:
step S421, the secret key of the application program is encrypted and then sent to the authentication center.
Step S422, comparing the key of the application program with the correct key stored in the authentication center, and determining whether to allow the application program to run.
And step S423, if the application program is allowed to run, the verification is successful.
And step S5, if the request of the application program is in the authority range, the application program executes the request.
In the embodiment of the present application, the request of the application may need to call a vehicle system service, for example, to open or close a vehicle door, start a vehicle, open or close a vehicle air conditioner, and the like, so in the embodiment of the present application, it needs to determine whether the request of the application is within the scope of authority, especially, the application of the vehicle system service needs to be used, otherwise, the application may be illegally used, thereby endangering the life and property safety of the vehicle owner. Specifically, the authentication center stores an operation white list, and the operation white list records the application programs allowed to be operated and the authority ranges of the application programs. And determining the identity of the developer of the application program and whether the application program is allowed to run or not through application information such as a key, an installation package and the like. When the application program applies for the service, the authentication center judges whether the application program has the authority to apply for the system service by running a white list.
In the embodiment of the present application, the authentication procedure for the application (i.e., steps S3 and S4) is as follows:
1. the application program applies to the authentication center through the encryption key. The application program uses a Socket communication mode, encrypts the secret key by MD5 according to the communication protocol content and the format specified by the protocol, and sends the encrypted secret key to the authentication center to apply for authentication. The format of the communication protocol generally includes a protocol header, contents, check bits, and the like. The key is a string of characters generated inside the main system operator company and is sent to the application developer to be installed in the system by mail or the like. The application encrypts the key with MD5 and sends it to the authentication center, which compares the key to determine the identity of the developer of the application.
2. The application authentication center verifies the validity of the key by comparing the encryption key to confirm the identity of the application program. After the identity is confirmed to be successful, the APP authentication center gives response to the application program in a Socket communication mode.
3. After receiving the response of successful authentication of the authentication center, the application program submits the effective information such as the self packet name and the like to the authentication center in a Socket communication mode according to a defined protocol format.
4. After receiving the application program information, the authentication center establishes the application program information in the program running white list in a data base writing mode.
5. When the application program applies for the vehicle system service, the system service applies for the authentication application authority like an authentication center, the APP authentication center operates a white list through a query program to confirm whether the application program has the authority to apply for the system service, the vehicle service can be obtained if the authentication is successful, and the vehicle service is failed if the authentication is failed.
In the related technology, after the Android system root authority is obtained by the illegal application, the Android system root authority is impersonated as the system application for installation, and an application program impersonates an identity illegal obtaining system interface to destroy the system or issue an illegal command and the like. Through the vehicle safety detection method, on one hand, illegal application can be effectively prevented from being installed through a network means or by using a serial port/ADB tool and the like. On the other hand, even if the application is installed successfully, if the application is not authenticated by the security authentication of the authentication center, the system service and the method protected by the system cannot be acquired, so that the condition that the vehicle control service is illegally used to damage the safety of the vehicle and the owner of the vehicle is avoided.
The embodiment of the present application provides a detection device for vehicle safety, as shown in fig. 2, the device includes:
the detection module 20 is used for detecting the application program to be installed;
a first judging module 22, configured to judge, at the authentication center, whether to allow the application to be installed through an installation white list;
an installation module 24, configured to install the application program if the application program is installed;
a second judging module 26, configured to receive the request of the application program by the authentication center, and judge whether the request of the application program is within the scope of authority according to the running white list;
and the execution module 28 is configured to execute the request of the application program if the request of the application program is within the scope of authority.
Through the vehicle safety detection method, on one hand, illegal application can be effectively prevented from being installed through a network means or by using a serial port/ADB tool and the like. On the other hand, even if the application is installed successfully, if the application is not authenticated by the security authentication of the authentication center, the system service and the method protected by the system cannot be acquired, so that the condition that the vehicle control service is illegally used to damage the safety of the vehicle and the owner of the vehicle is avoided.
The embodiment of the application provides an automobile, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor is characterized in that the following steps are realized when executing the computer program:
detecting an application program to be installed;
judging whether the application program is allowed to be installed or not by installing a white list in an authentication center;
if yes, installing the application program;
the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list;
and if the request of the application program is in the authority range, executing the request by the application program.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps:
detecting an application program to be installed;
judging whether the application program is allowed to be installed or not by installing a white list in an authentication center;
if yes, installing the application program;
the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list;
and if the request of the application program is in the authority range, executing the request by the application program.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for detecting vehicle safety, the method comprising:
detecting an application program to be installed;
judging whether the application program is allowed to be installed or not by installing a white list in an authentication center;
if yes, installing the application program;
the authentication center receives the request of the application program and judges whether the request of the application program is in the authority range according to the running white list;
and if the request of the application program is in the authority range, executing the request by the application program.
2. The method of claim 1, wherein the detecting the application to be installed comprises:
detecting whether an installation package exists or not;
and if the installation package is detected, determining the application program to be installed.
3. The method of claim 1, wherein before the authentication center determines whether the application is allowed to be installed by installing a white list, the method comprises:
and judging whether the application program is a system application program.
4. The method of claim 3, wherein determining whether the application is a system application comprises:
if the application program is a system application program, judging whether the application program is allowed to be installed or not through an installation white list in the authentication center;
and if the application program is not the system application program, installing the application program.
5. The method of claim 4, wherein after installing the application, comprising:
saving the installation number of the application program to an application information file;
and sending the application information file to the authentication center for storage.
6. The method of claim 1, wherein the authentication center determines whether the request of the application program is in the scope of authority before the request of the application program is in the scope of authority according to a running white list, comprising:
verifying the application program;
and if the verification is successful, adding the application information into an operation white list.
7. The method of claim 6, wherein the validating the application comprises:
encrypting the secret key of the application program and then sending the encrypted secret key to the authentication center;
comparing the key of the application program with a correct key stored in the authentication center to determine whether the application program is allowed to run;
and if the application program is allowed to run, the verification is successful.
8. A vehicle safety detection device, comprising:
the detection module is used for detecting the application program to be installed;
the first judgment module is used for judging whether the application program is allowed to be installed or not through an installation white list in an authentication center;
the installation module is used for installing the application program if the application program is installed;
the second judgment module is used for receiving the request of the application program by the authentication center and judging whether the request of the application program is in the authority range according to the running white list;
and the execution module is used for executing the request by the application program if the request of the application program is in the authority range.
9. An automobile comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method according to any one of claims 1 to 7 when executing the computer program.
10. A readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN201911227027.3A 2019-12-04 2019-12-04 Vehicle safety detection method and device, automobile and readable storage medium Pending CN110941820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911227027.3A CN110941820A (en) 2019-12-04 2019-12-04 Vehicle safety detection method and device, automobile and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911227027.3A CN110941820A (en) 2019-12-04 2019-12-04 Vehicle safety detection method and device, automobile and readable storage medium

Publications (1)

Publication Number Publication Date
CN110941820A true CN110941820A (en) 2020-03-31

Family

ID=69910188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911227027.3A Pending CN110941820A (en) 2019-12-04 2019-12-04 Vehicle safety detection method and device, automobile and readable storage medium

Country Status (1)

Country Link
CN (1) CN110941820A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022022428A1 (en) * 2020-07-31 2022-02-03 华为技术有限公司 Remote service invoking method, device, and system, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282117A (en) * 2014-07-21 2016-01-27 中兴通讯股份有限公司 Access control method and device
CN107016279A (en) * 2016-12-13 2017-08-04 蔚来汽车有限公司 Using installation method and apply installation system
CN110008690A (en) * 2019-04-04 2019-07-12 百度在线网络技术(北京)有限公司 Right management method, device, equipment and the medium of terminal applies

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282117A (en) * 2014-07-21 2016-01-27 中兴通讯股份有限公司 Access control method and device
CN107016279A (en) * 2016-12-13 2017-08-04 蔚来汽车有限公司 Using installation method and apply installation system
CN110008690A (en) * 2019-04-04 2019-07-12 百度在线网络技术(北京)有限公司 Right management method, device, equipment and the medium of terminal applies

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022022428A1 (en) * 2020-07-31 2022-02-03 华为技术有限公司 Remote service invoking method, device, and system, and storage medium
EP4177753A4 (en) * 2020-07-31 2023-10-18 Huawei Technologies Co., Ltd. Remote service invoking method, device, and system, and storage medium

Similar Documents

Publication Publication Date Title
KR101216306B1 (en) Updating configuration parameters in a mobile terminal
US6167521A (en) Securely downloading and executing code from mutually suspicious authorities
CN106534148B (en) Access control method and device for application
US8863290B2 (en) Methods and devices for improving the reliability of communication between an aircraft and a remote system
CN106330984B (en) Dynamic updating method and device of access control strategy
JP6422059B2 (en) Processing device, in-vehicle terminal device, processing device activation method, and processing device activation program
US8533829B2 (en) Method for monitoring managed device
US11757911B2 (en) Method and system for providing security on in-vehicle network
US20070016961A1 (en) Application revocation using an application revocation list in a portable electronic device
CN107508801B (en) Method and device for preventing file from being tampered
CN103843303A (en) Management control method, device and system for virtual machine
CN106295350B (en) identity verification method and device of trusted execution environment and terminal
CN107430658A (en) Fail-safe software certification and checking
US20150339467A1 (en) Apparatus, method for controlling apparatus, and program
CN111508110B (en) Method and device for realizing remote locking of vehicle
CN111651748A (en) Safety access processing system and method for ECU in vehicle
WO2014206170A1 (en) Verification method and device
CN110247877B (en) Management method and terminal for offline management instruction
CN112417422B (en) Security chip upgrading method and computer readable storage medium
CN110941820A (en) Vehicle safety detection method and device, automobile and readable storage medium
CN111291425B (en) Chip protection method and device, storage medium and vehicle-mounted chip
CN117349849A (en) Chip starting method and chip
US11620385B2 (en) Vehicle control device, vehicle control device start-up method, and recording medium
CN102158480A (en) Method, system and device for controlling system service recovery
US20220019669A1 (en) Information processing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: No.23, 136 Yuhai East Road, Hangzhou Bay New District, Ningbo City, Zhejiang Province

Applicant after: Fu Zhi Yi Internet of vehicles (Ningbo) Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: FUERDA IOV (SHENZHEN) Co.,Ltd.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination