Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
Fig. 1 is a schematic diagram of an interaction architecture between a vehicle and a server according to an embodiment of the present disclosure, which is used to exemplarily illustrate an interaction scenario according to an embodiment of the present disclosure, and should not be construed as a specific limitation of the embodiment of the present disclosure. As shown in fig. 1, a secure storage area is deployed in advance in a vehicle, and is used for storing a local vehicle identification code (which refers to a vehicle identification code stored locally in the vehicle), where the local vehicle identification code may specifically refer to a vehicle vin (Vehicle Identification Number) code, or may refer to other identification codes that can be used for uniquely identifying the vehicle, and in order to further ensure data interaction security between the vehicle and a server, a data key may be stored in the secure storage area, where the data key may be used for encrypting interaction data sent by the vehicle to a service, and may also be used for decrypting encrypted interaction data sent by the server to the vehicle. The local vehicle identification code and the data key can be used as an electronic nameplate of the vehicle. Specifically, in the process that the vehicle sends the interactive data to the server, the local vehicle identification code carried in the interactive data can be used for the server to carry out identity authentication on the vehicle; in the process that the server sends the interactive data to the vehicle, a remote vehicle identification code (referring to a vehicle identification code stored in the server) carried in the interactive data can be used for the vehicle to verify the reliability of the source of the interactive data. Each vehicle interior module, including the vehicle control system, may access the secure storage area from which the local vehicle identification code and/or data key is read. The vehicle and the server perform network communication, for example, network communication implemented based on a router, and the like.
In addition, in the embodiment of the disclosure, in the process of establishing connection between the vehicle and the server for the first time, the vehicle needs to send the local vehicle identification code and the interaction data to the server together; the server can consider that the communication process after the authentication of the identity passes is safe communication after the authentication of the identity passes based on the received local vehicle identification code, thereby reducing the data transmission quantity and the occupation of bandwidth. Of course, according to the authentication requirement of the vehicle, the server may also perform the authentication of the vehicle periodically or periodically during the interaction process after the vehicle establishes a connection with the server.
The communication connection between the vehicle and the server may be long or short.
Fig. 2 is a flowchart of a vehicle security interaction method provided in an embodiment of the present disclosure, which may be used in an interaction scenario in which a vehicle sends interaction data to a server, where the method may be performed by a vehicle security interaction device, and the device may be implemented by software and/or hardware, and may be integrated on any vehicle supporting network communication with the server, for example, an autonomous vehicle or an unmanned vehicle.
As shown in fig. 2, the vehicle security interaction method provided by the embodiment of the disclosure may include:
s101, acquiring a local vehicle identification code from a safe storage area of the vehicle, wherein the safe storage area is a read-only storage area.
The local vehicle identification code is used to uniquely identify the vehicle. Specifically, the safe storage area of the vehicle can be realized by adopting a preset storage area in the vehicle control system or by adopting an external storage device, so that the implementation mode is flexible, that is, the technical scheme of the embodiment of the disclosure has wider applicability. For example, in the vehicle production process, a designer may set a preset storage area in the vehicle control system as a safe storage area in advance, and set an attribute of the safe storage area to be read-only and non-writable, that is, not to support overwriting of data; alternatively, an external storage device such as a vehicle-identifiable shield, a flash disk, or a memory chip may be integrated on the vehicle as a secure storage area, and the attribute of the secure storage area may be set to be read-only and non-writable. By utilizing the specially arranged safe storage area to store the local vehicle identification code, the storage safety of the local vehicle identification code is improved, and the safe storage area is a read-only unwritable area, so that the risk that the local vehicle identification code is maliciously acquired or maliciously tampered is reduced.
S102, the local vehicle identification code and the interaction data are transmitted to a server together.
In the disclosed embodiments, the interaction data that the vehicle may send to the server includes, but is not limited to: any type of data request instruction generated by the vehicle, running state data of the vehicle and the like can be specifically determined according to the interaction requirement of the vehicle and the server. The data request instruction may include a request instruction that the vehicle requests to establish a communication connection with the server, may further include a request instruction that the vehicle request server send demand data to the vehicle, for example, for an automatic driving vehicle, the data request instruction may include a route planning request instruction to request the server to send a navigation route to the vehicle according to the current position and destination of the vehicle; the running state data of the vehicle is used for representing the running state of the vehicle, and can include, but is not limited to, position data, running speed, performance data of a control system and the like of the vehicle, and by sending the running state data to the server, the server can timely master the dynamic state of the vehicle, so that the vehicle can be controlled better. In the running process of the vehicle, the interactive data sent to the server can be determined in real time or periodically according to the preset interactive logic and the type of the interactive data.
The local vehicle identification code and the interaction data are sent to the server together, so that the server can carry out identity authentication on the vehicle according to the local vehicle identification code, and confirm that the current interaction data are sent by the vehicle corresponding to the local vehicle identification code, thereby ensuring the safety of data interaction between the vehicle and the server. Specifically, after analyzing the local vehicle identification code of the vehicle from the received interaction data, the server can match with the locally stored remote vehicle identification code, and if the matching is successful, the identity verification of the vehicle is successful; or after the server analyzes the local vehicle identification code of the vehicle, the server can send the interactive confirmation information to the vehicle based on the local vehicle identification code, wherein the interactive confirmation information is used for confirming whether the vehicle sends the current interactive data to the server or not, and if the server receives the interactive feedback information sent by the vehicle, the identity verification of the vehicle is successful. The interaction feedback information is used for indicating that the vehicle sends current interaction data to the server and sending the current interaction data to the server after the vehicle confirms; the interaction confirmation information may carry a preset field in the current interaction data, which is used for identifying the current interaction data. The server may further determine whether the authentication of the vehicle is successful according to the time of receiving the interactive feedback information, for example, the time of receiving the interactive feedback information exceeds a preset time (the preset time may be flexibly set, for example, within x minutes after the transmission of the interactive confirmation information), and even if the server receives the interactive feedback information, the authentication of the vehicle is failed, thereby preventing the interactive feedback information from being sent disguised.
The successful authentication of the vehicle means that the interactive data sent by the vehicle can be approved by the server, and further, if the interactive data sent by the vehicle is a data request instruction, the server sends data corresponding to the data request instruction to the vehicle; if the interaction data sent by the vehicle is running state data of the vehicle, the server can store the running state data and analyze the running state of the vehicle in time, for example, the interaction data sent by the vehicle is position data of the vehicle, and the server can adjust the navigation path of the vehicle in real time according to the position of the vehicle.
On the basis of the above technical solution, optionally, in the embodiment of the present disclosure, the external storage device includes a storage chip, that is, the safe storage area of the vehicle may be implemented by using an independent safe storage chip, so that the dependency on the vehicle control system itself may be reduced; correspondingly, the method provided by the embodiment of the disclosure further comprises the following steps:
receiving abnormal installation information of a memory chip sent by a preset sensor; the preset sensor is used for detecting the installation state of the memory chip;
and sending an alarm signal according to the installation abnormality information.
The processor of the vehicle can directly access the memory chip, and can acquire abnormal information about the installation of the memory chip through a preset sensor. The preset sensor may include, but is not limited to, a pressure detection sensor, for example, when an external force maliciously removes the storage chip from the vehicle control system, the pressure detection sensor will detect the external force, so as to send abnormal installation information about the storage chip to the vehicle processor, and further enable the vehicle to send an alarm signal, for example, further send the alarm signal to a server, so as to prompt a background staff to timely perform safety maintenance of the vehicle, and ensure that the storage chip is normally installed, i.e. in the embodiment of the disclosure, the safety storage area of the vehicle is bound with the vehicle and is not detachable. Further, after receiving the alarm signal sent by the vehicle, the server may set the authentication related to the current vehicle within a preset time (specifically, a specific time period with the alarm signal receiving time as a time starting point, or a specific time period including the alarm signal receiving time, for example, within x minutes before and after the alarm signal receiving time) as an authentication failure according to the alarm signal receiving time, or determine the interaction data sent by the current vehicle and received within the preset time as illegal data, so as to avoid that the security of the interaction data is affected due to the violent damage of the installation of the memory chip, and further affect the safe operation of the vehicle.
According to the technical scheme of the embodiment of the disclosure, the safety storage area is specially deployed in the vehicle and is at least used for storing the local vehicle identification code, and the safety storage area is a read-only storage area, namely data rewriting is not supported, so that the storage safety of the local vehicle identification code is improved, when the vehicle and the server perform data interaction, the vehicle needs to acquire the local vehicle identification code for identifying the identity of the vehicle from the safety storage area, the risk that the local vehicle identification code is illegally acquired or maliciously tampered is reduced, the problem that the safety of data interaction between the vehicle and the server is lower in the existing scheme is solved, the safety of data interaction between the vehicle and the server is improved, the correctness and the integrity of interaction data are ensured, and the safe operation of the vehicle is further ensured. In addition, by adopting the technical scheme of the embodiment of the disclosure, the special safe storage area is set for each vehicle, the difficulty of interacting with the server by falsifying the vehicle identification code to disguise the vehicle is increased, the phenomenon of simultaneously controlling a plurality of vehicles to interact with the server for illegal data is further reduced, and the risk of illegal invasion of portals of the whole vehicle network is reduced.
Fig. 3 is a flowchart of another vehicle security interaction method provided by the embodiment of the disclosure, which is further optimized and expanded based on the above technical solution, and may be combined with the above various alternative embodiments. As shown in fig. 3, the method may include:
s201, acquiring a local vehicle identification code and a data key from a safe storage area of the vehicle, wherein the safe storage area is a read-only storage area.
The data key is used to encrypt the interaction data sent by the vehicle to the server, i.e., in the embodiment of the present disclosure, the interaction data between the vehicle and the server may be transmitted in the form of ciphertext. The data key may be generated by any available data encryption algorithm, and the embodiment of the disclosure is not limited in particular, for example, the data key may be generated by an asymmetric encryption algorithm, a data key locally stored in the vehicle is a private key, and a public key corresponding to the private key is stored in the server.
By storing the vehicle identification code and the data key in the preset safe storage area, the safety of the vehicle identification code and the data key is ensured, the leakage risk of the vehicle identification code and the data key is avoided, the risk of malicious tampering of the vehicle identification code and the data key is avoided, and the safe transmission of interactive data between the vehicle and the server is further ensured.
S202, encrypting the local vehicle identification code and the interaction data by using the data key, and transmitting the encrypted local vehicle identification code and the encrypted interaction data to a server.
Specifically, the vehicle may encrypt the local vehicle identification code and the interaction data respectively, and then send the encrypted local vehicle identification code and the interaction data as a data packet to the server, so that the server analyzes the encrypted local vehicle identification code from the received interaction data, and then decrypts the encrypted local vehicle identification code, thereby verifying the identity of the vehicle based on the decrypted local vehicle identification code; the vehicle can also firstly package the local vehicle identification code and the interactive data into a data packet, then encrypt the data and send the data packet to the server, so that the server can decrypt the encrypted interactive data and then directly analyze the decrypted local vehicle identification code from the decrypted interactive data, thereby verifying the vehicle identity based on the decrypted local vehicle identification code.
Based on the above technical solution, further, obtaining the local vehicle identification code and the data key from the secure storage area of the vehicle includes:
acquiring an encrypted target vehicle identification code and an encrypted data key from a secure storage area of the vehicle;
and decrypting the encrypted target vehicle identification code and the encrypted data key by using the security key to obtain a local vehicle identification code and a data key.
In the embodiment of the disclosure, the local vehicle identification code and the data key can be stored in the safe storage area in an encrypted form, so that the safety of the local vehicle identification code and the data key is further ensured, and the risks of illegal theft and malicious tampering of the local vehicle identification code and the data key are reduced. The security key may also be generated by any available encryption algorithm, for example, the security key may be generated by an asymmetric encryption algorithm, and the private key is used to encrypt the local vehicle identification code and the data key and stored in the secure storage area, and the corresponding public key is stored in the vehicle local and used to decrypt the encrypted target vehicle identification code and the data key.
According to the technical scheme of the embodiment of the disclosure, the safe storage area is specially deployed in the vehicle and is at least used for storing the local vehicle identification code, and the safe storage area is a read-only storage area, namely data rewriting is not supported, so that the storage safety of the local vehicle identification code is improved, when the vehicle and the server perform data interaction, the vehicle needs to acquire the local vehicle identification code from the safe storage area, the risk that the local vehicle identification code is illegally acquired or maliciously tampered is reduced, and the vehicle and the server perform data transmission in a ciphertext mode, so that the problem that the safety of data interaction between the vehicle and the server in the existing scheme is lower is solved, the safety of data interaction between the vehicle and the server is improved, the correctness and the integrity of interaction data are ensured, and the safe operation of the vehicle is further ensured. And through carrying out encryption data transmission between the vehicle and the server and the encryption storage of the local vehicle identification code and the data key, even if the CAN bus of the vehicle is illegally invaded or the communication frequency band between the vehicle and the server is illegally invaded, the safety and the integrity of the interaction data, the local vehicle identification code and the data key CAN be ensured because the data are encrypted.
Fig. 4 is a flowchart of another vehicle security interaction method provided by the embodiment of the disclosure, which is further optimized and expanded based on the above technical solution, and may be combined with the above various alternative embodiments. As shown in fig. 4, the method may include:
s301, acquiring a local vehicle identification code and a data key from a safe storage area of the vehicle, wherein the safe storage area is a read-only storage area.
S302, encrypting the local vehicle identification code and the interaction data by using the data key, and transmitting the encrypted local vehicle identification code and the encrypted interaction data to a server.
At this time, the interactive data sent by the vehicle to the server may include interactive data generated by the vehicle during running, or may include interactive data received from the server.
S303, decrypting the encrypted interaction data sent by the server by using the data key.
In the embodiment of the disclosure, in order to ensure the safety of the interaction data, the interaction data is transmitted between the vehicle and the server in a ciphertext mode. The data key in the server has a corresponding relation with the data key in the vehicle, so that the normal realization of data encryption and decryption is ensured.
The interaction data sent by the server to the vehicle may include, but is not limited to: after the communication connection between the vehicle and the server is established, the control instruction of the server to the vehicle, the data requested by the vehicle to the server, the data actively sent by the server to the vehicle and the like. For example, for an autonomous vehicle, the server may actively send a navigation path to the vehicle, or send a driving control instruction to the vehicle, etc., according to position data reported by the vehicle in real time.
For example, the data key may be generated by an asymmetric encryption algorithm, the data key stored locally in the vehicle is a private key, and a public key corresponding to the private key is stored in the server. The server encrypts the interaction data sent to the vehicle by using the public key, and the vehicle decrypts the received encrypted interaction data by using the private key.
After the vehicle finishes decrypting the received encrypted interactive data, a corresponding operation can be executed according to the type of the interactive data obtained by decryption. For example, if the decrypted interactive data is a control instruction, the vehicle may perform an operation corresponding to the control instruction; if the decrypted interaction data is data requested by the vehicle to the server or data actively sent by the server to the vehicle, the vehicle may store the interaction data and use the interaction data in the current driving decision.
It should be noted that, if the vehicle fails to decrypt the received encrypted interactive data by using the data key, the source of the currently received interactive data may be considered unreliable, and the subsequent operation corresponding to the interactive data may be refused to be performed.
According to the technical scheme of the embodiment of the disclosure, the safe storage area is specially deployed in the vehicle and is at least used for storing the local vehicle identification code, and the safe storage area is a read-only storage area, namely data rewriting is not supported, so that the storage safety of the local vehicle identification code is improved, when the vehicle and the server perform data interaction, the vehicle needs to acquire the local vehicle identification code from the safe storage area, the risk that the local vehicle identification code is illegally acquired or maliciously tampered is reduced, and the vehicle and the server perform data transmission in a ciphertext mode, so that the problem that the safety of data interaction between the vehicle and the server in the existing scheme is lower is solved, the safety of data interaction between the vehicle and the server is improved, the correctness and the integrity of interaction data are ensured, and the safe operation of the vehicle is further ensured. And through carrying out encryption data transmission between the vehicle and the server and the encryption storage of the local vehicle identification code and the data key, even if the CAN bus of the vehicle is illegally invaded or the communication frequency band between the vehicle and the server is illegally invaded, the safety and the integrity of the interaction data, the local vehicle identification code and the data key CAN be ensured because the data are encrypted.
Fig. 5 is a schematic structural diagram of a vehicle security interaction device provided in an embodiment of the present disclosure, which may be used in an interaction scenario in which a vehicle sends interaction data to a server, and the device may be implemented in software and/or hardware and may be integrated on any vehicle supporting network communication with the server, for example, an autopilot vehicle or an unmanned vehicle.
As shown in fig. 5, the vehicle security interaction device provided in the embodiment of the present disclosure may include a vehicle identification code acquisition module 601 and a data transmission module 602, where:
the vehicle identification code obtaining module 601 is configured to obtain a local vehicle identification code from a secure storage area of a vehicle, where the secure storage area is a read-only storage area, and the local vehicle identification code is used for uniquely identifying the vehicle;
a data transmitting module 602, configured to transmit the local vehicle identification code and the interaction data together to a server; the server is used for verifying the identity of the vehicle according to the local vehicle identification code.
Optionally, the safe storage area of the vehicle is implemented by a preset storage area in the vehicle control system, or by an external storage device.
Optionally, the external storage device includes a memory chip;
correspondingly, the device provided by the embodiment of the disclosure further comprises:
the abnormal information receiving module is used for receiving the installation abnormal information of the memory chip sent by the preset sensor; the preset sensor is used for detecting the installation state of the memory chip;
and the alarm signal sending module is used for sending an alarm signal according to the installation abnormality information.
Optionally, the vehicle identification code acquisition module 601 is further configured to: acquiring a data key from a safe storage area of a vehicle in the process of acquiring a local vehicle identification code from the safe storage area of the vehicle;
accordingly, the data sending module 602 is specifically configured to:
the local vehicle identification code and the interactive data are encrypted by using the data key, and the encrypted local vehicle identification code and the encrypted interactive data are transmitted to the server together.
Optionally, the vehicle identification code acquisition module 601 includes:
an encrypted identification code and key acquisition unit for acquiring an encrypted target vehicle identification code and an encrypted data key from within a secure storage area of the vehicle;
and the identification code and key decryption unit is used for decrypting the encrypted target vehicle identification code and the encrypted data key by utilizing the security key to obtain the local vehicle identification code and the data key.
Optionally, the apparatus provided by the embodiment of the present disclosure further includes:
and the interactive data decryption module is used for decrypting the encrypted interactive data sent by the server by utilizing the data key acquired from the secure storage area.
The vehicle safety interaction device provided by the embodiment of the disclosure can execute any vehicle safety interaction method provided by the embodiment of the disclosure, and has the corresponding functional modules and beneficial effects of the execution method. Details of the embodiments of the apparatus of the present disclosure that are not described in detail may refer to descriptions of any of the embodiments of the method of the present disclosure.
Fig. 6 is a schematic structural diagram of a vehicle according to an embodiment of the present disclosure. As shown in fig. 6, the vehicle 800 includes not only a vehicle body (not shown in the drawings, the vehicle body structure may be implemented with reference to the related art, and the embodiments of the present disclosure are not limited thereto), but also one or more processors 801 and a memory 802.
The processor 801 may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or instruction execution capabilities and may control other components in the vehicle 800 to perform desired functions.
Memory 802 may include one or more computer program products, which may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. Volatile memory can include, for example, random Access Memory (RAM) and/or cache memory (cache) and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like. One or more computer program instructions may be stored on a computer readable storage medium and the processor 801 may execute the program instructions to implement the vehicle security interaction methods and/or other desired functions provided by the embodiments of the disclosure above. Various contents such as an input signal, a signal component, a noise component, and the like may also be stored in the computer-readable storage medium.
In one example, the vehicle 800 may further include: an input device 803 and an output device 804, which are interconnected by a bus system and/or other forms of connection mechanisms (not shown).
In addition, the input device 803 may also include, for example, a keyboard, a mouse, and the like.
The output device 804 may output various information to the outside, including the determined distance information, direction information, and the like. The output device 804 may include, for example, a display, speakers, a printer, and a communication network and remote output devices connected thereto, etc.
Of course, only some of the components of the vehicle 800 that are relevant to the present disclosure are shown in fig. 6, with components such as buses, input/output interfaces, etc. omitted for simplicity. In addition, vehicle 800 may include any other suitable components depending on the particular application.
In addition to the methods and apparatus described above, embodiments of the present disclosure may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform any of the vehicle safety interaction methods provided by the embodiments of the present disclosure.
The computer program product may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
Further, embodiments of the present disclosure may also be a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, cause the processor to perform any of the vehicle security interaction methods provided by the embodiments of the present disclosure.
A computer readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The above is merely a specific embodiment of the disclosure to enable one skilled in the art to understand or practice the disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.