CN112187893B - Vehicle safety interaction method and device, vehicle and storage medium - Google Patents

Vehicle safety interaction method and device, vehicle and storage medium Download PDF

Info

Publication number
CN112187893B
CN112187893B CN202010976785.1A CN202010976785A CN112187893B CN 112187893 B CN112187893 B CN 112187893B CN 202010976785 A CN202010976785 A CN 202010976785A CN 112187893 B CN112187893 B CN 112187893B
Authority
CN
China
Prior art keywords
vehicle
identification code
data
storage area
vehicle identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010976785.1A
Other languages
Chinese (zh)
Other versions
CN112187893A (en
Inventor
杨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neolithic Shaoxing Autonomous Vehicle Technology Co ltd
Original Assignee
Neolix Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neolix Technologies Co Ltd filed Critical Neolix Technologies Co Ltd
Priority to CN202010976785.1A priority Critical patent/CN112187893B/en
Publication of CN112187893A publication Critical patent/CN112187893A/en
Application granted granted Critical
Publication of CN112187893B publication Critical patent/CN112187893B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Traffic Control Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the disclosure relates to a vehicle safety interaction method, a device, a vehicle and a storage medium, in particular to the technical field of unmanned, automatic driving or unmanned vehicles, wherein the vehicle safety interaction method can comprise the following steps: acquiring a local vehicle identification code from a safe storage area of a vehicle, wherein the safe storage area is a read-only storage area; the local vehicle identification code is transmitted to the server together with the interaction data. According to the embodiment of the disclosure, the safety of data interaction between the vehicle and the server can be improved, and further safe operation of the vehicle is ensured.

Description

Vehicle safety interaction method and device, vehicle and storage medium
Technical Field
The disclosure relates to the technical field of internet of vehicles, and in particular relates to a vehicle safety interaction method, device, vehicle and storage medium.
Background
With the widespread use of vehicle communications, a range of vehicle safety hazards are also created. In order to ensure the communication safety and privacy protection of vehicles, the steps of perfecting the existence of potential safety hazards of vehicles and enhancing the network safety architecture of the current-stage vehicle communication are urgent.
The internet of vehicles is a part of wireless communication, and security threats encountered by vehicles in the network communication process are mainly caused by potential safety hazards in the wireless communication, such as illegal theft and hacking of data. How to improve the safety of data interaction between a vehicle and a server, and further ensure the safe operation of the vehicle, is still a problem to be solved at present.
Disclosure of Invention
To solve or at least partially solve the above technical problems, embodiments of the present disclosure provide a vehicle security interaction method, device, vehicle, and storage medium.
In a first aspect, an embodiment of the present disclosure provides a vehicle security interaction method, including:
acquiring a local vehicle identification code from a safe storage area of a vehicle, wherein the safe storage area is a read-only storage area;
and sending the local vehicle identification code and the interaction data to a server.
In a second aspect, an embodiment of the present disclosure further provides a vehicle security interaction device, including:
the vehicle identification code acquisition module is used for acquiring a local vehicle identification code from a safe storage area of a vehicle, wherein the safe storage area is a read-only storage area;
and the data transmitting module is used for transmitting the local vehicle identification code and the interaction data to the server together.
In a third aspect, embodiments of the present disclosure also provide a vehicle including a vehicle body, the vehicle including: a processor; a memory for storing the processor-executable instructions; the processor is configured to read the executable instructions from the memory and execute the executable instructions to implement any vehicle security interaction method as provided by the embodiments of the present disclosure.
In a fourth aspect, the disclosed embodiments also provide a computer readable storage medium storing a computer program which, when executed by a processor, implements any of the vehicle security interaction methods as provided by the disclosed embodiments.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages: the safety storage area is specially deployed in the vehicle and is at least used for storing the local vehicle identification code, and is a read-only storage area, namely, data rewriting is not supported, so that the storage safety of the local vehicle identification code is improved, when the vehicle and the server perform data interaction, the vehicle needs to acquire the local vehicle identification code from the safety storage area, the risk that the local vehicle identification code is illegally acquired or maliciously tampered is reduced, the problem that the safety of data interaction between the vehicle and the server is lower in the existing scheme is solved, the safety of the data interaction between the vehicle and the server is improved, the correctness and the integrity of interaction data are guaranteed, and further the safe operation of the vehicle is ensured. In addition, by adopting the technical scheme of the embodiment of the disclosure, the special safe storage area is set for each vehicle, the difficulty of interacting with the server by falsifying the vehicle identification code to disguise the vehicle is increased, the phenomenon of simultaneously controlling a plurality of vehicles to interact with the server for illegal data is further reduced, and the risk of illegal invasion of portals of the whole vehicle network is reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic diagram of an interaction architecture between a vehicle and a server according to an embodiment of the disclosure;
FIG. 2 is a flow chart of a method of vehicle security interaction provided by an embodiment of the present disclosure;
FIG. 3 is a flow chart of another method of vehicle security interaction provided by an embodiment of the present disclosure;
FIG. 4 is a flow chart of another method of vehicle security interaction provided by an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a vehicle security interaction device according to an embodiment of the disclosure;
fig. 6 is a schematic structural diagram of a vehicle according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
Fig. 1 is a schematic diagram of an interaction architecture between a vehicle and a server according to an embodiment of the present disclosure, which is used to exemplarily illustrate an interaction scenario according to an embodiment of the present disclosure, and should not be construed as a specific limitation of the embodiment of the present disclosure. As shown in fig. 1, a secure storage area is deployed in advance in a vehicle, and is used for storing a local vehicle identification code (which refers to a vehicle identification code stored locally in the vehicle), where the local vehicle identification code may specifically refer to a vehicle vin (Vehicle Identification Number) code, or may refer to other identification codes that can be used for uniquely identifying the vehicle, and in order to further ensure data interaction security between the vehicle and a server, a data key may be stored in the secure storage area, where the data key may be used for encrypting interaction data sent by the vehicle to a service, and may also be used for decrypting encrypted interaction data sent by the server to the vehicle. The local vehicle identification code and the data key can be used as an electronic nameplate of the vehicle. Specifically, in the process that the vehicle sends the interactive data to the server, the local vehicle identification code carried in the interactive data can be used for the server to carry out identity authentication on the vehicle; in the process that the server sends the interactive data to the vehicle, a remote vehicle identification code (referring to a vehicle identification code stored in the server) carried in the interactive data can be used for the vehicle to verify the reliability of the source of the interactive data. Each vehicle interior module, including the vehicle control system, may access the secure storage area from which the local vehicle identification code and/or data key is read. The vehicle and the server perform network communication, for example, network communication implemented based on a router, and the like.
In addition, in the embodiment of the disclosure, in the process of establishing connection between the vehicle and the server for the first time, the vehicle needs to send the local vehicle identification code and the interaction data to the server together; the server can consider that the communication process after the authentication of the identity passes is safe communication after the authentication of the identity passes based on the received local vehicle identification code, thereby reducing the data transmission quantity and the occupation of bandwidth. Of course, according to the authentication requirement of the vehicle, the server may also perform the authentication of the vehicle periodically or periodically during the interaction process after the vehicle establishes a connection with the server.
The communication connection between the vehicle and the server may be long or short.
Fig. 2 is a flowchart of a vehicle security interaction method provided in an embodiment of the present disclosure, which may be used in an interaction scenario in which a vehicle sends interaction data to a server, where the method may be performed by a vehicle security interaction device, and the device may be implemented by software and/or hardware, and may be integrated on any vehicle supporting network communication with the server, for example, an autonomous vehicle or an unmanned vehicle.
As shown in fig. 2, the vehicle security interaction method provided by the embodiment of the disclosure may include:
s101, acquiring a local vehicle identification code from a safe storage area of the vehicle, wherein the safe storage area is a read-only storage area.
The local vehicle identification code is used to uniquely identify the vehicle. Specifically, the safe storage area of the vehicle can be realized by adopting a preset storage area in the vehicle control system or by adopting an external storage device, so that the implementation mode is flexible, that is, the technical scheme of the embodiment of the disclosure has wider applicability. For example, in the vehicle production process, a designer may set a preset storage area in the vehicle control system as a safe storage area in advance, and set an attribute of the safe storage area to be read-only and non-writable, that is, not to support overwriting of data; alternatively, an external storage device such as a vehicle-identifiable shield, a flash disk, or a memory chip may be integrated on the vehicle as a secure storage area, and the attribute of the secure storage area may be set to be read-only and non-writable. By utilizing the specially arranged safe storage area to store the local vehicle identification code, the storage safety of the local vehicle identification code is improved, and the safe storage area is a read-only unwritable area, so that the risk that the local vehicle identification code is maliciously acquired or maliciously tampered is reduced.
S102, the local vehicle identification code and the interaction data are transmitted to a server together.
In the disclosed embodiments, the interaction data that the vehicle may send to the server includes, but is not limited to: any type of data request instruction generated by the vehicle, running state data of the vehicle and the like can be specifically determined according to the interaction requirement of the vehicle and the server. The data request instruction may include a request instruction that the vehicle requests to establish a communication connection with the server, may further include a request instruction that the vehicle request server send demand data to the vehicle, for example, for an automatic driving vehicle, the data request instruction may include a route planning request instruction to request the server to send a navigation route to the vehicle according to the current position and destination of the vehicle; the running state data of the vehicle is used for representing the running state of the vehicle, and can include, but is not limited to, position data, running speed, performance data of a control system and the like of the vehicle, and by sending the running state data to the server, the server can timely master the dynamic state of the vehicle, so that the vehicle can be controlled better. In the running process of the vehicle, the interactive data sent to the server can be determined in real time or periodically according to the preset interactive logic and the type of the interactive data.
The local vehicle identification code and the interaction data are sent to the server together, so that the server can carry out identity authentication on the vehicle according to the local vehicle identification code, and confirm that the current interaction data are sent by the vehicle corresponding to the local vehicle identification code, thereby ensuring the safety of data interaction between the vehicle and the server. Specifically, after analyzing the local vehicle identification code of the vehicle from the received interaction data, the server can match with the locally stored remote vehicle identification code, and if the matching is successful, the identity verification of the vehicle is successful; or after the server analyzes the local vehicle identification code of the vehicle, the server can send the interactive confirmation information to the vehicle based on the local vehicle identification code, wherein the interactive confirmation information is used for confirming whether the vehicle sends the current interactive data to the server or not, and if the server receives the interactive feedback information sent by the vehicle, the identity verification of the vehicle is successful. The interaction feedback information is used for indicating that the vehicle sends current interaction data to the server and sending the current interaction data to the server after the vehicle confirms; the interaction confirmation information may carry a preset field in the current interaction data, which is used for identifying the current interaction data. The server may further determine whether the authentication of the vehicle is successful according to the time of receiving the interactive feedback information, for example, the time of receiving the interactive feedback information exceeds a preset time (the preset time may be flexibly set, for example, within x minutes after the transmission of the interactive confirmation information), and even if the server receives the interactive feedback information, the authentication of the vehicle is failed, thereby preventing the interactive feedback information from being sent disguised.
The successful authentication of the vehicle means that the interactive data sent by the vehicle can be approved by the server, and further, if the interactive data sent by the vehicle is a data request instruction, the server sends data corresponding to the data request instruction to the vehicle; if the interaction data sent by the vehicle is running state data of the vehicle, the server can store the running state data and analyze the running state of the vehicle in time, for example, the interaction data sent by the vehicle is position data of the vehicle, and the server can adjust the navigation path of the vehicle in real time according to the position of the vehicle.
On the basis of the above technical solution, optionally, in the embodiment of the present disclosure, the external storage device includes a storage chip, that is, the safe storage area of the vehicle may be implemented by using an independent safe storage chip, so that the dependency on the vehicle control system itself may be reduced; correspondingly, the method provided by the embodiment of the disclosure further comprises the following steps:
receiving abnormal installation information of a memory chip sent by a preset sensor; the preset sensor is used for detecting the installation state of the memory chip;
and sending an alarm signal according to the installation abnormality information.
The processor of the vehicle can directly access the memory chip, and can acquire abnormal information about the installation of the memory chip through a preset sensor. The preset sensor may include, but is not limited to, a pressure detection sensor, for example, when an external force maliciously removes the storage chip from the vehicle control system, the pressure detection sensor will detect the external force, so as to send abnormal installation information about the storage chip to the vehicle processor, and further enable the vehicle to send an alarm signal, for example, further send the alarm signal to a server, so as to prompt a background staff to timely perform safety maintenance of the vehicle, and ensure that the storage chip is normally installed, i.e. in the embodiment of the disclosure, the safety storage area of the vehicle is bound with the vehicle and is not detachable. Further, after receiving the alarm signal sent by the vehicle, the server may set the authentication related to the current vehicle within a preset time (specifically, a specific time period with the alarm signal receiving time as a time starting point, or a specific time period including the alarm signal receiving time, for example, within x minutes before and after the alarm signal receiving time) as an authentication failure according to the alarm signal receiving time, or determine the interaction data sent by the current vehicle and received within the preset time as illegal data, so as to avoid that the security of the interaction data is affected due to the violent damage of the installation of the memory chip, and further affect the safe operation of the vehicle.
According to the technical scheme of the embodiment of the disclosure, the safety storage area is specially deployed in the vehicle and is at least used for storing the local vehicle identification code, and the safety storage area is a read-only storage area, namely data rewriting is not supported, so that the storage safety of the local vehicle identification code is improved, when the vehicle and the server perform data interaction, the vehicle needs to acquire the local vehicle identification code for identifying the identity of the vehicle from the safety storage area, the risk that the local vehicle identification code is illegally acquired or maliciously tampered is reduced, the problem that the safety of data interaction between the vehicle and the server is lower in the existing scheme is solved, the safety of data interaction between the vehicle and the server is improved, the correctness and the integrity of interaction data are ensured, and the safe operation of the vehicle is further ensured. In addition, by adopting the technical scheme of the embodiment of the disclosure, the special safe storage area is set for each vehicle, the difficulty of interacting with the server by falsifying the vehicle identification code to disguise the vehicle is increased, the phenomenon of simultaneously controlling a plurality of vehicles to interact with the server for illegal data is further reduced, and the risk of illegal invasion of portals of the whole vehicle network is reduced.
Fig. 3 is a flowchart of another vehicle security interaction method provided by the embodiment of the disclosure, which is further optimized and expanded based on the above technical solution, and may be combined with the above various alternative embodiments. As shown in fig. 3, the method may include:
s201, acquiring a local vehicle identification code and a data key from a safe storage area of the vehicle, wherein the safe storage area is a read-only storage area.
The data key is used to encrypt the interaction data sent by the vehicle to the server, i.e., in the embodiment of the present disclosure, the interaction data between the vehicle and the server may be transmitted in the form of ciphertext. The data key may be generated by any available data encryption algorithm, and the embodiment of the disclosure is not limited in particular, for example, the data key may be generated by an asymmetric encryption algorithm, a data key locally stored in the vehicle is a private key, and a public key corresponding to the private key is stored in the server.
By storing the vehicle identification code and the data key in the preset safe storage area, the safety of the vehicle identification code and the data key is ensured, the leakage risk of the vehicle identification code and the data key is avoided, the risk of malicious tampering of the vehicle identification code and the data key is avoided, and the safe transmission of interactive data between the vehicle and the server is further ensured.
S202, encrypting the local vehicle identification code and the interaction data by using the data key, and transmitting the encrypted local vehicle identification code and the encrypted interaction data to a server.
Specifically, the vehicle may encrypt the local vehicle identification code and the interaction data respectively, and then send the encrypted local vehicle identification code and the interaction data as a data packet to the server, so that the server analyzes the encrypted local vehicle identification code from the received interaction data, and then decrypts the encrypted local vehicle identification code, thereby verifying the identity of the vehicle based on the decrypted local vehicle identification code; the vehicle can also firstly package the local vehicle identification code and the interactive data into a data packet, then encrypt the data and send the data packet to the server, so that the server can decrypt the encrypted interactive data and then directly analyze the decrypted local vehicle identification code from the decrypted interactive data, thereby verifying the vehicle identity based on the decrypted local vehicle identification code.
Based on the above technical solution, further, obtaining the local vehicle identification code and the data key from the secure storage area of the vehicle includes:
acquiring an encrypted target vehicle identification code and an encrypted data key from a secure storage area of the vehicle;
and decrypting the encrypted target vehicle identification code and the encrypted data key by using the security key to obtain a local vehicle identification code and a data key.
In the embodiment of the disclosure, the local vehicle identification code and the data key can be stored in the safe storage area in an encrypted form, so that the safety of the local vehicle identification code and the data key is further ensured, and the risks of illegal theft and malicious tampering of the local vehicle identification code and the data key are reduced. The security key may also be generated by any available encryption algorithm, for example, the security key may be generated by an asymmetric encryption algorithm, and the private key is used to encrypt the local vehicle identification code and the data key and stored in the secure storage area, and the corresponding public key is stored in the vehicle local and used to decrypt the encrypted target vehicle identification code and the data key.
According to the technical scheme of the embodiment of the disclosure, the safe storage area is specially deployed in the vehicle and is at least used for storing the local vehicle identification code, and the safe storage area is a read-only storage area, namely data rewriting is not supported, so that the storage safety of the local vehicle identification code is improved, when the vehicle and the server perform data interaction, the vehicle needs to acquire the local vehicle identification code from the safe storage area, the risk that the local vehicle identification code is illegally acquired or maliciously tampered is reduced, and the vehicle and the server perform data transmission in a ciphertext mode, so that the problem that the safety of data interaction between the vehicle and the server in the existing scheme is lower is solved, the safety of data interaction between the vehicle and the server is improved, the correctness and the integrity of interaction data are ensured, and the safe operation of the vehicle is further ensured. And through carrying out encryption data transmission between the vehicle and the server and the encryption storage of the local vehicle identification code and the data key, even if the CAN bus of the vehicle is illegally invaded or the communication frequency band between the vehicle and the server is illegally invaded, the safety and the integrity of the interaction data, the local vehicle identification code and the data key CAN be ensured because the data are encrypted.
Fig. 4 is a flowchart of another vehicle security interaction method provided by the embodiment of the disclosure, which is further optimized and expanded based on the above technical solution, and may be combined with the above various alternative embodiments. As shown in fig. 4, the method may include:
s301, acquiring a local vehicle identification code and a data key from a safe storage area of the vehicle, wherein the safe storage area is a read-only storage area.
S302, encrypting the local vehicle identification code and the interaction data by using the data key, and transmitting the encrypted local vehicle identification code and the encrypted interaction data to a server.
At this time, the interactive data sent by the vehicle to the server may include interactive data generated by the vehicle during running, or may include interactive data received from the server.
S303, decrypting the encrypted interaction data sent by the server by using the data key.
In the embodiment of the disclosure, in order to ensure the safety of the interaction data, the interaction data is transmitted between the vehicle and the server in a ciphertext mode. The data key in the server has a corresponding relation with the data key in the vehicle, so that the normal realization of data encryption and decryption is ensured.
The interaction data sent by the server to the vehicle may include, but is not limited to: after the communication connection between the vehicle and the server is established, the control instruction of the server to the vehicle, the data requested by the vehicle to the server, the data actively sent by the server to the vehicle and the like. For example, for an autonomous vehicle, the server may actively send a navigation path to the vehicle, or send a driving control instruction to the vehicle, etc., according to position data reported by the vehicle in real time.
For example, the data key may be generated by an asymmetric encryption algorithm, the data key stored locally in the vehicle is a private key, and a public key corresponding to the private key is stored in the server. The server encrypts the interaction data sent to the vehicle by using the public key, and the vehicle decrypts the received encrypted interaction data by using the private key.
After the vehicle finishes decrypting the received encrypted interactive data, a corresponding operation can be executed according to the type of the interactive data obtained by decryption. For example, if the decrypted interactive data is a control instruction, the vehicle may perform an operation corresponding to the control instruction; if the decrypted interaction data is data requested by the vehicle to the server or data actively sent by the server to the vehicle, the vehicle may store the interaction data and use the interaction data in the current driving decision.
It should be noted that, if the vehicle fails to decrypt the received encrypted interactive data by using the data key, the source of the currently received interactive data may be considered unreliable, and the subsequent operation corresponding to the interactive data may be refused to be performed.
According to the technical scheme of the embodiment of the disclosure, the safe storage area is specially deployed in the vehicle and is at least used for storing the local vehicle identification code, and the safe storage area is a read-only storage area, namely data rewriting is not supported, so that the storage safety of the local vehicle identification code is improved, when the vehicle and the server perform data interaction, the vehicle needs to acquire the local vehicle identification code from the safe storage area, the risk that the local vehicle identification code is illegally acquired or maliciously tampered is reduced, and the vehicle and the server perform data transmission in a ciphertext mode, so that the problem that the safety of data interaction between the vehicle and the server in the existing scheme is lower is solved, the safety of data interaction between the vehicle and the server is improved, the correctness and the integrity of interaction data are ensured, and the safe operation of the vehicle is further ensured. And through carrying out encryption data transmission between the vehicle and the server and the encryption storage of the local vehicle identification code and the data key, even if the CAN bus of the vehicle is illegally invaded or the communication frequency band between the vehicle and the server is illegally invaded, the safety and the integrity of the interaction data, the local vehicle identification code and the data key CAN be ensured because the data are encrypted.
Fig. 5 is a schematic structural diagram of a vehicle security interaction device provided in an embodiment of the present disclosure, which may be used in an interaction scenario in which a vehicle sends interaction data to a server, and the device may be implemented in software and/or hardware and may be integrated on any vehicle supporting network communication with the server, for example, an autopilot vehicle or an unmanned vehicle.
As shown in fig. 5, the vehicle security interaction device provided in the embodiment of the present disclosure may include a vehicle identification code acquisition module 601 and a data transmission module 602, where:
the vehicle identification code obtaining module 601 is configured to obtain a local vehicle identification code from a secure storage area of a vehicle, where the secure storage area is a read-only storage area, and the local vehicle identification code is used for uniquely identifying the vehicle;
a data transmitting module 602, configured to transmit the local vehicle identification code and the interaction data together to a server; the server is used for verifying the identity of the vehicle according to the local vehicle identification code.
Optionally, the safe storage area of the vehicle is implemented by a preset storage area in the vehicle control system, or by an external storage device.
Optionally, the external storage device includes a memory chip;
correspondingly, the device provided by the embodiment of the disclosure further comprises:
the abnormal information receiving module is used for receiving the installation abnormal information of the memory chip sent by the preset sensor; the preset sensor is used for detecting the installation state of the memory chip;
and the alarm signal sending module is used for sending an alarm signal according to the installation abnormality information.
Optionally, the vehicle identification code acquisition module 601 is further configured to: acquiring a data key from a safe storage area of a vehicle in the process of acquiring a local vehicle identification code from the safe storage area of the vehicle;
accordingly, the data sending module 602 is specifically configured to:
the local vehicle identification code and the interactive data are encrypted by using the data key, and the encrypted local vehicle identification code and the encrypted interactive data are transmitted to the server together.
Optionally, the vehicle identification code acquisition module 601 includes:
an encrypted identification code and key acquisition unit for acquiring an encrypted target vehicle identification code and an encrypted data key from within a secure storage area of the vehicle;
and the identification code and key decryption unit is used for decrypting the encrypted target vehicle identification code and the encrypted data key by utilizing the security key to obtain the local vehicle identification code and the data key.
Optionally, the apparatus provided by the embodiment of the present disclosure further includes:
and the interactive data decryption module is used for decrypting the encrypted interactive data sent by the server by utilizing the data key acquired from the secure storage area.
The vehicle safety interaction device provided by the embodiment of the disclosure can execute any vehicle safety interaction method provided by the embodiment of the disclosure, and has the corresponding functional modules and beneficial effects of the execution method. Details of the embodiments of the apparatus of the present disclosure that are not described in detail may refer to descriptions of any of the embodiments of the method of the present disclosure.
Fig. 6 is a schematic structural diagram of a vehicle according to an embodiment of the present disclosure. As shown in fig. 6, the vehicle 800 includes not only a vehicle body (not shown in the drawings, the vehicle body structure may be implemented with reference to the related art, and the embodiments of the present disclosure are not limited thereto), but also one or more processors 801 and a memory 802.
The processor 801 may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or instruction execution capabilities and may control other components in the vehicle 800 to perform desired functions.
Memory 802 may include one or more computer program products, which may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. Volatile memory can include, for example, random Access Memory (RAM) and/or cache memory (cache) and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like. One or more computer program instructions may be stored on a computer readable storage medium and the processor 801 may execute the program instructions to implement the vehicle security interaction methods and/or other desired functions provided by the embodiments of the disclosure above. Various contents such as an input signal, a signal component, a noise component, and the like may also be stored in the computer-readable storage medium.
In one example, the vehicle 800 may further include: an input device 803 and an output device 804, which are interconnected by a bus system and/or other forms of connection mechanisms (not shown).
In addition, the input device 803 may also include, for example, a keyboard, a mouse, and the like.
The output device 804 may output various information to the outside, including the determined distance information, direction information, and the like. The output device 804 may include, for example, a display, speakers, a printer, and a communication network and remote output devices connected thereto, etc.
Of course, only some of the components of the vehicle 800 that are relevant to the present disclosure are shown in fig. 6, with components such as buses, input/output interfaces, etc. omitted for simplicity. In addition, vehicle 800 may include any other suitable components depending on the particular application.
In addition to the methods and apparatus described above, embodiments of the present disclosure may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform any of the vehicle safety interaction methods provided by the embodiments of the present disclosure.
The computer program product may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
Further, embodiments of the present disclosure may also be a computer-readable storage medium having stored thereon computer program instructions that, when executed by a processor, cause the processor to perform any of the vehicle security interaction methods provided by the embodiments of the present disclosure.
A computer readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The above is merely a specific embodiment of the disclosure to enable one skilled in the art to understand or practice the disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. A method of vehicle security interaction, comprising:
acquiring a local vehicle identification code from a safe storage area of a vehicle, wherein the safe storage area is a read-only storage area;
transmitting the local vehicle identification code and the interaction data to a server;
the obtaining the local vehicle identification code from the safe storage area of the vehicle further comprises:
acquiring a data key from the secure storage area;
the data key is generated by adopting an asymmetric encryption algorithm, the data key locally stored in the vehicle is a private key, and a public key corresponding to the private key is stored in a server;
correspondingly, the sending the local vehicle identification code and the interaction data to the server together comprises the following steps:
encrypting the local vehicle identification code and the interactive data by using the data key, and transmitting the encrypted local vehicle identification code and the encrypted interactive data to a server;
acquiring the local vehicle identification code and the data key from the secure storage area comprises:
acquiring an encrypted target vehicle identification code and an encrypted data key from the secure storage area;
and decrypting the encrypted target vehicle identification code and the encrypted data key by using a security key to obtain the local vehicle identification code and the data key.
2. The method of claim 1, wherein the secure storage area is implemented using a preset storage area in a vehicle control system or using an external storage device.
3. The method of claim 2, wherein the external storage device comprises a memory chip;
correspondingly, the method further comprises the steps of:
receiving abnormal installation information of the memory chip sent by a preset sensor; the preset sensor is used for detecting the installation state of the memory chip;
and sending an alarm signal according to the installation abnormality information.
4. The method as recited in claim 1, further comprising:
and decrypting the encrypted interaction data sent by the server by using the data key.
5. A vehicle security interaction device, comprising:
the vehicle identification code acquisition module is used for acquiring a local vehicle identification code from a safe storage area of a vehicle, wherein the safe storage area is a read-only storage area;
the vehicle identification code acquisition module is also used for acquiring a data key from the safe storage area of the vehicle in the process of acquiring the local vehicle identification code from the safe storage area of the vehicle;
the vehicle identification code acquisition module further includes:
an encrypted identification code and key acquisition unit for acquiring an encrypted target vehicle identification code and an encrypted data key from within a secure storage area of the vehicle;
the data key is generated by adopting an asymmetric encryption algorithm, the data key locally stored in the vehicle is a private key, and a public key corresponding to the private key is stored in a server;
the identification code and key decryption unit is used for decrypting the encrypted target vehicle identification code and the encrypted data key by utilizing the security key to obtain a local vehicle identification code and a data key;
the data sending module is used for sending the local vehicle identification code and the interaction data to a server together;
the data sending module is specifically configured to encrypt the local vehicle identification code and the interaction data by using the data key, and send the encrypted local vehicle identification code and the encrypted interaction data to a server together.
6. The device of claim 5, wherein the secure storage area is implemented using a preset storage area in a vehicle control system or using an external storage device.
7. A vehicle comprising a vehicle body, further comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor is configured to read the executable instructions from the memory and execute the executable instructions to implement the vehicle security interaction method of any of claims 1-4.
8. A computer readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the vehicle safety interaction method of any of claims 1-4.
CN202010976785.1A 2020-09-16 2020-09-16 Vehicle safety interaction method and device, vehicle and storage medium Active CN112187893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010976785.1A CN112187893B (en) 2020-09-16 2020-09-16 Vehicle safety interaction method and device, vehicle and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010976785.1A CN112187893B (en) 2020-09-16 2020-09-16 Vehicle safety interaction method and device, vehicle and storage medium

Publications (2)

Publication Number Publication Date
CN112187893A CN112187893A (en) 2021-01-05
CN112187893B true CN112187893B (en) 2024-02-20

Family

ID=73921442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010976785.1A Active CN112187893B (en) 2020-09-16 2020-09-16 Vehicle safety interaction method and device, vehicle and storage medium

Country Status (1)

Country Link
CN (1) CN112187893B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483393A (en) * 2016-11-22 2017-12-15 宝沃汽车(中国)有限公司 Communication means, server and the communication system of car networking
CN108307674A (en) * 2016-12-02 2018-07-20 华为技术有限公司 A kind of method and apparatus ensureing terminal security
CN109218266A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6709582B2 (en) * 2017-03-29 2020-06-17 深▲せん▼市元征科技股▲ふん▼有限公司 Communication method, device and system for vehicle remote diagnosis

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483393A (en) * 2016-11-22 2017-12-15 宝沃汽车(中国)有限公司 Communication means, server and the communication system of car networking
CN108307674A (en) * 2016-12-02 2018-07-20 华为技术有限公司 A kind of method and apparatus ensureing terminal security
CN109218266A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device

Also Published As

Publication number Publication date
CN112187893A (en) 2021-01-05

Similar Documents

Publication Publication Date Title
US10229547B2 (en) In-vehicle gateway device, storage control method, and computer program product
US10382419B2 (en) Communication device, LSI, program, and communication system
US11088997B2 (en) Secure communication method and apparatus for vehicle, multimedia system for vehicle, and vehicle
JP6065113B2 (en) Data authentication apparatus and data authentication method
US20160378457A1 (en) Program update system and program update method
CN109714171B (en) Safety protection method, device, equipment and medium
CN109218266B (en) Driving data acquisition method and device
US11373762B2 (en) Information communication device, authentication program for information communication device, and authentication method
US20190089681A1 (en) Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle
KR101954507B1 (en) Method and apparatus for generating certificate of a vehicle
CN112883382B (en) Vehicle writing method, internet of vehicles box, vehicle and storage medium
US20190026478A1 (en) Vehicle secure communication method and apparatus, vehicle multimedia system, and vehicle
US10926737B2 (en) Extra-vehicular communication device, communication control method, and communication control program
KR20070078341A (en) Apparatus for managing installation of drm and method thereof
CN114125027B (en) Communication establishment method and device, electronic equipment and storage medium
CN112187893B (en) Vehicle safety interaction method and device, vehicle and storage medium
CN112511983A (en) Privacy protection system and protection method based on position of Internet of vehicles
EP4109820A2 (en) Methods and systems for data processing, electronic device and storage medium
WO2018152324A1 (en) Cybersecure endpoint system for a network
KR20140057074A (en) Phishing preventing system and the method
KR101656615B1 (en) Network security system and method for displaying a blocked site
KR102259674B1 (en) Authentication method for operating program using block chain
CN111465009B (en) Method for detecting network interface request of mobile application and related device
KR102411797B1 (en) Hardware-based vehicle cyber security system
CN118467008B (en) Security management method, system, medium and electronic equipment for OTA upgrade

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240914

Address after: Room 103, 1st Floor, Building 2, Qingfeng Village, Qianqing Street, Keqiao District, Shaoxing City, Zhejiang Province, 312000

Patentee after: Neolithic (Shaoxing) Autonomous Vehicle Technology Co.,Ltd.

Country or region after: China

Address before: 102209 Room 122, No. 3 Institute of Future Iron and Steel Research, Anshan Iron and Steel Co., Ltd., North Second Street, Future Science City, Changping District, Beijing

Patentee before: NEOLIX TECHNOLOGIES Co.,Ltd.

Country or region before: China