CN111212072A - Vehicle-based safety control method and system, storage medium and processor - Google Patents

Vehicle-based safety control method and system, storage medium and processor Download PDF

Info

Publication number
CN111212072A
CN111212072A CN201911426104.8A CN201911426104A CN111212072A CN 111212072 A CN111212072 A CN 111212072A CN 201911426104 A CN201911426104 A CN 201911426104A CN 111212072 A CN111212072 A CN 111212072A
Authority
CN
China
Prior art keywords
vehicle
controller
superlattice
encryption
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911426104.8A
Other languages
Chinese (zh)
Other versions
CN111212072B (en
Inventor
王志华
王志海
喻波
安鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201911426104.8A priority Critical patent/CN111212072B/en
Publication of CN111212072A publication Critical patent/CN111212072A/en
Application granted granted Critical
Publication of CN111212072B publication Critical patent/CN111212072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/40006Architecture of a communication node
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40208Bus networks characterized by the use of a particular bus standard
    • H04L2012/40215Controller Area Network CAN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40267Bus for use in transportation systems
    • H04L2012/40273Bus for use in transportation systems the transportation system being a vehicle

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a safety control method and system based on a vehicle, a storage medium and a processor. Wherein, the method comprises the following steps: starting a vehicle and initializing a plurality of superlattice encryption and decryption chips in the vehicle; and a superlattice encryption and decryption chip built in the vehicle encrypts and decrypts at least one of the storage data, the interaction data and the communication data collected by the gateway and/or the controller. The invention solves the technical problem that the vehicle-mounted system has poor data processing performance due to the fact that the RSA series algorithm or the SM series algorithm is adopted to carry out the encryption and decryption process of communication data or stored data in the process of carrying out data acquisition, communication and other interaction on each subsystem and electronic equipment in a vehicle in the prior art.

Description

Vehicle-based safety control method and system, storage medium and processor
Technical Field
The invention relates to the field of vehicle control, in particular to a vehicle-based safety control method, a vehicle-based safety control system, a storage medium and a processor.
Background
With the commercialization of 5G technology, the internet of things, especially the internet of vehicles, is moving to the public at a step, and in V2X, information security is an especially important link. The information security of the V2X mainly includes three scenes, i.e., vehicle-vehicle, vehicle-road, and vehicle interior, and different security mechanisms are required to be adopted for protection in different scenes. Especially in the scene in the car, different subsystems and electronic equipment can carry out frequent data acquisition and communication, the acquired data and communication need to be encrypted and protected, a PKI system is adopted for protection in the current common way, but most of the current universal encryption algorithm systems, such as the adoption of RSA series algorithm or SM to process data, have the technical problems of low data processing efficiency, potential safety hazard and the like.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a vehicle-based safety control method, a vehicle-based safety control system, a storage medium and a processor, which are used for at least solving the technical problem of poor data processing performance of a vehicle-mounted system caused by the adoption of an RSA series algorithm or an SM series algorithm to carry out encryption and decryption processes of communication data or stored data in the interaction processes of data acquisition, communication and the like aiming at each subsystem and electronic equipment in a vehicle in the prior art.
According to an aspect of an embodiment of the present invention, there is provided a vehicle-based safety control method including: starting a vehicle and initializing a plurality of superlattice encryption and decryption chips in the vehicle; a superlattice encryption and decryption chip arranged in the vehicle encrypts and decrypts at least one of the storage data, the interaction data and the communication data collected by the gateway and/or the controller
Optionally, the encrypting and decrypting chip built in the vehicle encrypts and decrypts at least one of the storage data, the interaction data, and the communication data collected by the gateway and/or the controller, and includes: a gateway of the vehicle carries out data interaction with an external host and/or a controller through a CAN bus; and the gateway of the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the interactive data.
Optionally, the encrypting and decrypting chip built in the vehicle encrypts and decrypts at least one of the storage data, the interaction data, and the communication data collected by the gateway and/or the controller, and includes: a controller in the vehicle controls the CAN receiver to receive communication data through the CAN controller; and the controller in the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the communication data.
Optionally, the encrypting and decrypting chip built in the vehicle encrypts and decrypts at least one of the storage data, the interaction data, and the communication data collected by the gateway and/or the controller, and includes:
each controller of the vehicle encrypts and decrypts the acquired storage data by calling an API (application programming interface) interface of a built-in superlattice encryption and decryption chip;
if the controller receives the encrypted storage data, the controller decrypts the encrypted storage data; and if the controller encrypts the local storage data and sends the encrypted local storage data to the gateway, the gateway decrypts the encrypted storage data.
Optionally, the superlattice encryption/decryption chip encrypts the data by using a dynamic key stream.
Optionally, in the process of initializing the superlattice encryption/decryption chips in the vehicle, the superlattice key driving variable is issued to each superlattice encryption/decryption chip.
According to another aspect of an embodiment of the present invention, there is also provided a safety control system of a vehicle, which may include: a superlattice encryption and decryption chip gateway is arranged in the device; the controller is accessed to the gateway through a CAN bus, and a superlattice encryption and decryption chip is arranged in each controller; the vehicle is started, a plurality of superlattice encryption and decryption chips in the vehicle are initialized, and the superlattice encryption and decryption chips built in the vehicle encrypt and decrypt at least one of storage data, interaction data and communication data collected by the gateway and/or the controller.
Optionally, the type of controller comprises at least one of: the remote control door lock controller, car light controller, instrument panel controller, door controller, engine controller, gasbag controller, brake controller and tire pressure controller.
Optionally, the gateway of the vehicle interacts data with an external host and/or a processor through a CAN bus; and the gateway of the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the interactive data.
Optionally, the controller in the vehicle controls the CAN receiver to receive the communication data through the CAN controller; and the controller in the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the communication data.
Optionally, each controller of the vehicle encrypts and decrypts the acquired storage data by calling an API interface of a built-in superlattice encryption and decryption chip; if the controller receives the encrypted storage data, the controller decrypts the encrypted storage data; if the controller encrypts the local storage data and sends the encrypted local storage data to the gateway.
Optionally, in the process of initializing the superlattice encryption/decryption chips in the vehicle, the superlattice key driving variable is issued to each superlattice encryption/decryption chip.
According to another aspect of the embodiments of the present invention, there is also provided a storage medium including a stored program, wherein the apparatus on which the storage medium is controlled when the program is executed performs any one of the above-described vehicle-based safety control methods.
According to another aspect of the embodiments of the present invention, there is also provided a processor for executing a program, wherein the program executes any one of the above-mentioned vehicle-based safety control methods.
In the embodiment of the invention, a plurality of superlattice encryption and decryption chips in a vehicle are initialized by starting the vehicle in a mode that the superlattice encryption and decryption chips are used for encrypting and decrypting stored data, interactive data and communication data; a superlattice encryption and decryption chip arranged in a vehicle encrypts and decrypts at least one of storage data, interactive data and communication data collected by a gateway and/or a controller, so that the purpose of encrypting and decrypting in the interaction process of data collection, communication and the like of each subsystem and electronic equipment in the vehicle is achieved, the technical effect of rapidly and safely processing the data of the vehicle-mounted embedded equipment is achieved, and the technical problem that in the prior art, in the interaction process of data collection, communication and the like of each subsystem and electronic equipment in the vehicle, the data processing performance of the vehicle-mounted system is poor due to the fact that the encryption and decryption process of the communication data or the storage data is carried out by adopting an RSA series algorithm or an SM series algorithm.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic flow diagram of a vehicle-based safety control method according to an embodiment of the present application;
FIG. 2 is a system framework architecture diagram of the general solution of the present application;
FIG. 3 is a schematic block diagram of a vehicle-based safety control system according to an embodiment of the present application; and
FIG. 4 is a schematic diagram of an alternative ECU system configuration according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For better understanding of the embodiments of the present application, some of the terms or expressions referred to in the embodiments of the present application are explained below:
a superlattice: the superlattice password technology is a brand new basic information security technology developed based on the research of the unique physical security characteristics of semiconductor superlattice devices. The superlattice cryptosystem utilizes the characteristics of a superlattice physical unclonable function to ensure the generation of a security key, and utilizes the unique twinning characteristic of the superlattice to realize the distribution of the security key. The superlattice cryptosystem is completely and independently developed and researched by scientists and technical teams in China from original research results and key practical technologies, is independently controllable in the whole process from basic theory to device technology to application technology, and can play an important role and demonstration significance in national information security strategy.
V2X: the English is called vehicle-to-evaluating, which can realize information interaction between the vehicle and all entities which may influence the vehicle, and aims to reduce accidents, alleviate traffic congestion, reduce environmental pollution and provide other information services; V2X mainly comprises vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-network (V2N) and vehicle-to-peedestrian (V2P).
CAN: a Controller Area Network (CAN or CAN bus) is a bus standard for vehicles with rich functions, and is designed to allow a single chip microcomputer and an instrument on the Network to communicate with each other without a Host (Host). It was based on a messaging protocol, was designed to use multiplexed communication cables on vehicles at the beginning to reduce copper wire usage, and was later used by other industries as well.
An ECU: an Engine Controller (ECU) is an electronic device that controls the operation of each part of an internal combustion Engine. The simplest ECU controls only the amount of fuel injected per engine cycle. More advanced engine controllers equipped on modern automobiles also control ignition timing, Variable Valve Timing (VVT), turbocharger sustained boost levels (turbocharged equipped automobiles), and other peripherals. At present, in some medium-high class cars, the ECU is applied to an engine, and the trace of the ECU can be found in other places. For example, an anti-lock brake system, a four-wheel drive system, an electric control automatic transmission, an active suspension system, an air bag system, a multi-direction adjustable electric control seat and the like are all provided with respective ECUs. With the improvement of the electronic automation of the car, the number of ECUs is increased and the circuit is complicated. In order to simplify the circuit and reduce the cost, a technology called multiplexing communication network is adopted for information transmission among a plurality of ECUs on the automobile, and the ECUs of the whole automobile form a network system, namely a CAN data bus.
In accordance with an embodiment of the present invention, there is provided a method embodiment for vehicle-based safety control, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than presented herein.
Fig. 1 is a vehicle-based safety control method according to an embodiment of the present invention, as shown in fig. 1, including the steps of:
step S102, starting a vehicle, and initializing a plurality of superlattice encryption and decryption chips in the vehicle;
and step S104, a superlattice encryption and decryption chip arranged in the vehicle encrypts and decrypts at least one of the storage data, the interaction data and the communication data collected by the gateway and/or the controller.
In the control method, firstly, a plurality of superlattice encryption and decryption chips in the vehicle need to be initialized when the vehicle is started, and then at least one of storage data, interactive data and communication data acquired by a gateway and/or a controller is encrypted and decrypted by the superlattice encryption and decryption chips built in the vehicle, so that the aim of encrypting and decrypting data acquisition, communication and other interaction processes of each subsystem and electronic equipment in the vehicle is fulfilled, and the technical effect of quickly and safely processing data of the vehicle-mounted embedded equipment is achieved.
It should be noted that the plurality of superlattice encryption/decryption chips may be chips of the same batch and the same model.
In an alternative, the encryption and decryption of at least one of the storage data, the interaction data and the communication data collected by the gateway and/or the controller by the superlattice encryption and decryption chip built in the vehicle executed in step S104 may be implemented by one of the following optional implementations:
and the gateway of the vehicle interacts data with an external host and/or a controller through a CAN bus, and in the process of data interaction, the gateway of the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the interaction data.
Specifically, taking a remote control door lock as an example, after a superlattice key (pluggable) is arranged in an in-vehicle gateway to encrypt or decrypt data interacted between the in-vehicle gateway and a CAN bus by adopting a superlattice, a built-in superlattice encryption/decryption chip, namely a superlattice chip of the remote control door lock, acquires the data, and then CAN decrypt or encrypt the data; similarly, a built-in superlattice encryption and decryption chip, for example, a superlattice chip of a remote control door lock CAN encrypt or decrypt data, a superlattice key (pluggable) is built in the vehicle gateway, the vehicle gateway and the CAN bus CAN decrypt or encrypt data interacted with the remote control door lock by adopting the superlattice, and the superlattice has secret key distribution and does not need encryption, so that the safety and the high efficiency of the remote controller when sending an opening or closing signal to a vehicle door are ensured.
In another alternative, the encryption and decryption of at least one of the storage data, the interaction data and the communication data collected by the gateway and/or the controller by the superlattice encryption and decryption chip built in the vehicle executed in step S104 may be implemented by one of the following optional implementations:
the controller in the vehicle controls the CAN receiver to receive communication data through the CAN controller, and calls an API (application program interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the communication data.
Specifically, taking a remote control door lock as an example, after a superlattice key (pluggable) is arranged in an in-vehicle gateway to encrypt or decrypt data communicated with a CAN bus by adopting a superlattice, a built-in superlattice encryption/decryption chip, namely a superlattice chip of the remote control door lock, is used for decrypting or encrypting the data after the data is acquired; similarly, a built-in superlattice encryption and decryption chip, for example, a superlattice chip of a remote control door lock CAN encrypt or decrypt data, a superlattice key (pluggable) is built in the vehicle gateway, the vehicle gateway and the CAN bus CAN decrypt or encrypt data communicated with the remote control door lock by adopting the superlattice, and the superlattice has secret key distribution and does not need encryption, so that the safety and the high efficiency of the remote controller when sending an opening or closing signal to a vehicle door are ensured.
In still another alternative, the encryption and decryption chip built in the vehicle executed in step S104 encrypts and decrypts at least one of the storage data, the interaction data, and the communication data collected by the gateway and/or the controller, which may be implemented by one of the following optional implementations:
each controller of the vehicle encrypts and decrypts the acquired storage data by calling an API (application programming interface) of a built-in superlattice encryption and decryption chip, wherein if the controller receives the encrypted storage data, the controller decrypts the encrypted storage data; and if the controller encrypts the local storage data and sends the encrypted local storage data to the gateway, the gateway decrypts the encrypted storage data.
Specifically, taking the adaptive lamp as an example, the adaptive lamp with the built-in superlattice encryption and decryption chip encrypts and stores the illumination intensity data of the adaptive lamp, the controller decrypts the illumination intensity data after receiving the illumination intensity data, and the superlattice has the key distribution and does not need to be encrypted, so that the safety and the high efficiency of the stored data are ensured.
Optionally, in order to further ensure the security of data in the processes of storage, interaction, communication and the like, the superlattice encryption and decryption chip uses a dynamic key stream for encryption.
In some embodiments of the present application, in the process of initializing a superlattice encryption/decryption chip in a vehicle, a superlattice key driving variable is issued to each superlattice encryption/decryption chip, and specifically, a superlattice key driving variable of an in-vehicle gateway is issued to a superlattice encryption/decryption chip that remotely controls a door lock, an adaptive lamp, an instrument panel, and the like, a vehicle door, an engine, an airbag, a brake, a decompression, and the like.
In some embodiments of the present application, a system framework structure diagram of an overall technical solution is further provided, as shown in fig. 2, a process implemented by the technical solution is as follows:
when the automobiles are assembled, each automobile uses the same set of superlattice hardware encryption chip; after the automobile leaves the factory, when the automobile is started for the first time, the initialization process of the superlattice encryption system is carried out, the in-automobile electronic system is initialized, and the superlattice key driving variable is issued to all superlattice keys; a superlattice key (pluggable) is arranged in the in-vehicle gateway, and the data of the in-vehicle gateway and the CAN bus communication are encrypted by adopting a superlattice; each high-speed or low-speed ECU receives encrypted data and decrypts the data by using a superlattice key built in the ECU before use; data sent by the ECU are encrypted by using the superlattice and then sent to the gateway; in order to ensure the storage safety, when the data collected by the in-vehicle gateway is stored locally, the superlattice is also adopted for encryption; because the superlattice has the characteristic that the key distribution does not need encryption, the traditional certificate distribution process of PKI is omitted, dynamic key stream and data are encrypted or the encryption mode is adopted in the superlattice encryption, the required computing resource is lower than that of a traditional symmetric encryption algorithm by more than 2 orders of magnitude, and the encryption efficiency is very high.
An embodiment of the present application further provides a vehicle-based safety control system, and fig. 3 is a schematic structural diagram of the vehicle-based safety control system according to the embodiment of the present application, and as shown in fig. 3, the system includes:
a superlattice encryption and decryption chip gateway is arranged in the device;
the controller is accessed to the gateway through a CAN bus, and a superlattice encryption and decryption chip is arranged in each controller;
the vehicle is started, a plurality of superlattice encryption and decryption chips in the vehicle are initialized, and the superlattice encryption and decryption chips built in the vehicle encrypt and decrypt at least one of storage data, interaction data and communication data collected by the gateway and/or the controller.
In some embodiments of the present application, the type of controller (ECU) comprises at least one of: the remote control system comprises a remote control door lock controller, a vehicle lamp controller, an instrument panel controller, a vehicle door controller, an engine controller, an air bag controller, a brake controller and a tire pressure controller; as shown in fig. 4, the controller (ECU) includes: MCU, CAN controller, contain superlattice key, the CAN receiver of superlattice encryption/decryption chip.
In a first optional embodiment, after the vehicle is started, under the condition that each built-in superlattice encryption/decryption chip normally works, the gateway of the vehicle may perform data interaction with an external host and/or a controller through a CAN bus, and then the gateway of the vehicle calls an API interface of the built-in superlattice encryption/decryption chip to encrypt/decrypt the interaction data.
Specifically, taking a remote control door lock as an example, after a superlattice key (which may be a pluggable USB disk with a USB interface) is built in an in-vehicle gateway to encrypt or decrypt data interacted between the in-vehicle gateway and a CAN bus by using a superlattice, a built-in superlattice encryption/decryption chip, that is, after the data is acquired by the superlattice chip of the remote control door lock, the data CAN be decrypted or encrypted; similarly, a built-in superlattice encryption and decryption chip, for example, a superlattice chip of a remote control door lock CAN encrypt or decrypt data, a superlattice key (pluggable) is built in the vehicle gateway, the vehicle gateway and the CAN bus CAN decrypt or encrypt data interacted with the remote control door lock by adopting the superlattice, and the superlattice has secret key distribution and does not need encryption, so that the safety and the high efficiency of the remote controller when sending an opening or closing signal to a vehicle door are ensured.
In a second optional embodiment, after the vehicle is started, under the condition that each built-in superlattice encryption/decryption chip normally works, the controller in the vehicle controls the CAN receiver to receive the communication data through the CAN controller, and at this time, the controller in the vehicle calls an API interface of the built-in superlattice encryption/decryption chip to encrypt/decrypt the communication data.
Specifically, taking a remote control door lock as an example, after a superlattice key (pluggable) is arranged in an in-vehicle gateway to encrypt or decrypt data communicated with a CAN bus by adopting a superlattice, a built-in superlattice encryption/decryption chip, namely a superlattice chip of the remote control door lock, is used for decrypting or encrypting the data after the data is acquired; similarly, a built-in superlattice encryption and decryption chip, for example, a superlattice chip of a remote control door lock CAN encrypt or decrypt data, a superlattice key (pluggable) is built in the vehicle gateway, the vehicle gateway and the CAN bus CAN decrypt or encrypt data communicated with the remote control door lock by adopting the superlattice, and the superlattice has secret key distribution and does not need encryption, so that the safety and the high efficiency of the remote controller when sending an opening or closing signal to a vehicle door are ensured.
In a second optional embodiment, after the vehicle is started, under the condition that each built-in superlattice encryption/decryption chip normally works, each controller of the vehicle encrypts and decrypts the acquired storage data by calling an API interface of the built-in superlattice encryption/decryption chip, wherein if the controller receives the encrypted storage data, the controller decrypts the encrypted storage data; and if the controller encrypts the local storage data and sends the encrypted local storage data to the gateway, the gateway decrypts the encrypted storage data.
Specifically, taking the adaptive lamp as an example, the adaptive lamp with the built-in superlattice encryption and decryption chip encrypts and stores the illumination intensity data of the adaptive lamp, the controller decrypts the illumination intensity data after receiving the illumination intensity data, and the superlattice has the key distribution and does not need to be encrypted, so that the safety and the high efficiency of the stored data are ensured.
Optionally, in order to further ensure the security of data in the processes of storage, interaction, communication and the like, the superlattice encryption and decryption chip uses a dynamic key stream for encryption.
The embodiment of the application also provides a storage medium which comprises a stored program, wherein when the program runs, the device where the storage medium is located is controlled to execute any one of the vehicle-based safety control methods.
The embodiment of the application also provides a processor, wherein the processor is used for running the program, and when the program runs, any one of the vehicle-based safety control methods is executed.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit may be a division of a logic function, and an actual implementation may have another division, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or may not be executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that it is obvious to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and these modifications and improvements should also be considered as the protection scope of the present invention.

Claims (14)

1. A vehicle-based security control method, wherein at least a gateway and at least one controller in a vehicle have superlattice encryption/decryption chips built therein, the method comprising:
starting a vehicle and initializing a plurality of superlattice encryption and decryption chips in the vehicle;
the superlattice encryption and decryption chip built in the vehicle encrypts and decrypts at least one of the storage data, the interaction data and the communication data collected by the gateway and/or the controller.
2. The method of claim 1, wherein the superlattice encryption/decryption chip built in the vehicle encrypts and decrypts at least one of storage data, interaction data and communication data collected by the gateway and/or the controller, and comprises:
the gateway of the vehicle carries out data interaction with an external host and/or a controller through a CAN bus;
and the gateway of the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the interactive data.
3. The method of claim 1, wherein the superlattice encryption/decryption chip built in the vehicle encrypts and decrypts at least one of storage data, interaction data and communication data collected by the gateway and/or the controller, and comprises:
a controller in the vehicle controls a CAN receiver to receive communication data through a CAN controller;
and the controller in the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the communication data.
4. The method of claim 1, wherein the superlattice encryption/decryption chip built in the vehicle encrypts and decrypts at least one of storage data, interaction data and communication data collected by the gateway and/or the controller, and comprises:
each controller of the vehicle encrypts and decrypts the acquired storage data by calling an API (application programming interface) interface of a built-in superlattice encryption and decryption chip;
wherein if the controller receives encrypted storage data, the controller decrypts the encrypted storage data; and if the controller encrypts the local storage data and sends the encrypted local storage data to the gateway, the gateway decrypts the encrypted storage data.
5. The method of claim 1, wherein the superlattice encryption/decryption chip is encrypted using a dynamic key stream.
6. The method according to any one of claims 1 to 5, wherein a superlattice key driving variable is issued to each superlattice encryption/decryption chip in the process of initializing the superlattice encryption/decryption chips in the vehicle.
7. A vehicle-based safety control system, comprising:
a superlattice encryption and decryption chip gateway is arranged in the device;
the controller is connected to the gateway through a CAN bus, and a superlattice encryption and decryption chip is arranged in each controller;
the method comprises the steps that a vehicle is started, a plurality of superlattice encryption and decryption chips in the vehicle are initialized, and the superlattice encryption and decryption chips built in the vehicle encrypt and decrypt at least one of storage data, interaction data and communication data collected by a gateway and/or a controller.
8. The system of claim 7, wherein the type of controller comprises at least one of: the remote control door lock controller, car light controller, instrument panel controller, door controller, engine controller, gasbag controller, brake controller and tire pressure controller.
9. The system of claim 7,
the gateway of the vehicle carries out data interaction with an external host and/or a processor through a CAN bus;
and the gateway of the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the interactive data.
10. The system of claim 7,
a controller in the vehicle controls a CAN receiver to receive communication data through a CAN controller;
and the controller in the vehicle calls an API (application programming interface) interface of a built-in superlattice encryption and decryption chip to encrypt and decrypt the communication data.
11. The system of claim 7,
each controller of the vehicle encrypts and decrypts the acquired storage data by calling an API (application programming interface) interface of a built-in superlattice encryption and decryption chip;
wherein if the controller receives encrypted storage data, the controller decrypts the encrypted storage data; and if the controller encrypts the local storage data, the local storage data is sent to the gateway.
12. The system according to any one of claims 7 to 11, wherein superlattice key driving variables are issued to respective superlattice encryption/decryption chips during initialization of the superlattice encryption/decryption chips in the vehicle.
13. A storage medium characterized by comprising a stored program, wherein a device in which the storage medium is located is controlled to execute the vehicle-based safety control method according to any one of claims 1 to 6 when the program is executed.
14. A processor for running a program, wherein the program is run to perform the vehicle-based safety control method of any one of claims 1 to 6.
CN201911426104.8A 2019-12-31 2019-12-31 Vehicle safety control method and system based on superlattice encryption and decryption chip Active CN111212072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911426104.8A CN111212072B (en) 2019-12-31 2019-12-31 Vehicle safety control method and system based on superlattice encryption and decryption chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911426104.8A CN111212072B (en) 2019-12-31 2019-12-31 Vehicle safety control method and system based on superlattice encryption and decryption chip

Publications (2)

Publication Number Publication Date
CN111212072A true CN111212072A (en) 2020-05-29
CN111212072B CN111212072B (en) 2021-05-14

Family

ID=70789496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911426104.8A Active CN111212072B (en) 2019-12-31 2019-12-31 Vehicle safety control method and system based on superlattice encryption and decryption chip

Country Status (1)

Country Link
CN (1) CN111212072B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354494A (en) * 2013-07-05 2013-10-16 中国科学院苏州纳米技术与纳米仿生研究所 Communication system based on superlattice chaotic synchronization
CN105637975A (en) * 2014-09-02 2016-06-01 常勤生 System and method for green communication for intelligent mobile internet of things
CN106101111A (en) * 2016-06-24 2016-11-09 郑州信大捷安信息技术股份有限公司 Vehicle electronics safe communication system and communication means
CN106357681A (en) * 2016-11-02 2017-01-25 合肥工业大学 Security access and secret communication method of vehicle-mounted remote diagnostic services
CN106953796A (en) * 2017-04-13 2017-07-14 北京汽车集团有限公司 Security gateway, data processing method, device, vehicle network topology and vehicle
CN110239484A (en) * 2019-06-28 2019-09-17 江苏恒宝智能系统技术有限公司 Vehicle lock telesecurity control system and method
CN110519036A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 The application method of data encryption and transmission method, terminal device and superlattices chaos device
CN110519210A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 Cryptographic key distribution method and terminal device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354494A (en) * 2013-07-05 2013-10-16 中国科学院苏州纳米技术与纳米仿生研究所 Communication system based on superlattice chaotic synchronization
CN105637975A (en) * 2014-09-02 2016-06-01 常勤生 System and method for green communication for intelligent mobile internet of things
CN106101111A (en) * 2016-06-24 2016-11-09 郑州信大捷安信息技术股份有限公司 Vehicle electronics safe communication system and communication means
CN106357681A (en) * 2016-11-02 2017-01-25 合肥工业大学 Security access and secret communication method of vehicle-mounted remote diagnostic services
CN106953796A (en) * 2017-04-13 2017-07-14 北京汽车集团有限公司 Security gateway, data processing method, device, vehicle network topology and vehicle
CN110519036A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 The application method of data encryption and transmission method, terminal device and superlattices chaos device
CN110519210A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 Cryptographic key distribution method and terminal device
CN110239484A (en) * 2019-06-28 2019-09-17 江苏恒宝智能系统技术有限公司 Vehicle lock telesecurity control system and method

Also Published As

Publication number Publication date
CN111212072B (en) 2021-05-14

Similar Documents

Publication Publication Date Title
Bernardini et al. Security and privacy in vehicular communications: Challenges and opportunities
US20200250108A1 (en) Hardware security for an electronic control unit
CN107919955B (en) Vehicle network security authentication method, system, vehicle, device and medium
CN106899404B (en) Vehicle-mounted CAN FD bus communication system and method based on pre-shared key
Woo et al. A practical wireless attack on the connected car and security protocol for in-vehicle CAN
Lee et al. Fuzzing can packets into automobiles
US20150200804A1 (en) In-vehicle apparatus for efficient reprogramming and control method thereof
CN111491299A (en) Data message authentication system and authentication method in vehicle communication network
CN103929428A (en) Method for achieving communication safety of vehicle-mounted electronic information system
Castiglione et al. Securing the internet of vehicles through lightweight block ciphers
CN111865901A (en) Information encryption transmission method based on CAN bus
CN112740617B (en) Certificate list updating method and device
CN113852632A (en) Vehicle identity authentication method, system, device and storage medium based on SM9 algorithm
CN108881494B (en) Safety information transmission method based on vehicle-mounted network and block chain
CN111212072B (en) Vehicle safety control method and system based on superlattice encryption and decryption chip
CN114200907A (en) Identifying security critical controller area network messages and nodes using signal ratings
CN113179258A (en) Vehicle-mounted data encryption method based on multiple encryption algorithms
CN113448299B (en) Vehicle gateway controller, information processing method and vehicle
CN116800531A (en) Automobile electronic and electric architecture and safety communication method
CN117336191A (en) Attack simulation method, device, electronic equipment and storage medium
KR20180081332A (en) Security System and Method of Embeded software in Vehicle electric device
CN111865602A (en) Multi-party authentication method and system for heterogeneous terminal of intelligent energy service system
CN114584385B (en) In-vehicle network safety communication method, computer equipment, medium and terminal
CN114978726A (en) Backbone network safety communication method based on vehicle-mounted Ethernet
CN113434181A (en) Software upgrading method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant