CN112541187B - Cloud computing method and cloud computing cluster - Google Patents

Cloud computing method and cloud computing cluster Download PDF

Info

Publication number
CN112541187B
CN112541187B CN202011519727.2A CN202011519727A CN112541187B CN 112541187 B CN112541187 B CN 112541187B CN 202011519727 A CN202011519727 A CN 202011519727A CN 112541187 B CN112541187 B CN 112541187B
Authority
CN
China
Prior art keywords
vehicle
server
encryption
data
data information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011519727.2A
Other languages
Chinese (zh)
Other versions
CN112541187A (en
Inventor
刘均
曾庆博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN202011519727.2A priority Critical patent/CN112541187B/en
Publication of CN112541187A publication Critical patent/CN112541187A/en
Application granted granted Critical
Publication of CN112541187B publication Critical patent/CN112541187B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a cloud computing method and a cloud computing cluster, comprising the following steps: acquiring vehicle data information reported by vehicle-mounted terminal equipment through a computing server in a cloud computing cluster, and transmitting the vehicle data information to an encryption server in the cloud computing cluster; verifying whether the vehicle data information is trusted encrypted data or not through an encryption server, if so, re-encrypting the vehicle data information to obtain target encrypted data, and then sending the target encrypted data to a calculation server; and calculating by using the target encryption data through a calculation server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information. Therefore, safe transmission and calculation of data in the cloud computing cluster can be ensured, and the safety and reliability of the service and the cluster are improved.

Description

Cloud computing method and cloud computing cluster
Technical Field
The present application relates to the field of cloud computing technologies, and in particular, to a cloud computing method and a cloud computing cluster.
Background
At present, the process of vehicle online diagnosis cloud computing is basically as follows: the vehicle-mounted terminal equipment reads and uploads vehicle data, the vehicle data is reported to the cloud server, and after cloud computing is carried out by the cloud server and a computing result is generated, the computing result is sent to the vehicle-mounted terminal equipment as a diagnosis instruction, so that diagnosis service is completed. However, in the existing cloud computing process, after diagnostic data is uploaded to the servers, because the diagnostic service is complex, the computing performance requirement is high, and therefore data distribution needs to be broadcasted to all servers in the cloud cluster for computing, once a certain server in the cluster is invaded by a hacker, or the reported data is embedded into a virus Trojan program, the problems of data leakage and disclosure and computing failure of the cloud computing service can be caused. And also causes the whole computing cluster to have potential safety hazards, sick work and remote control risks.
Disclosure of Invention
Accordingly, the present application aims to provide a cloud computing method and a cloud computing cluster, which can ensure safe transmission and computation of data in the cloud computing cluster, thereby improving the security and reliability of the service and the cluster. The specific scheme is as follows:
in a first aspect, the present application discloses a cloud computing method, the method being applied to a cloud computing cluster, the cloud computing cluster including at least 2 computing servers and at least 1 encryption server, the method comprising:
Acquiring vehicle data information reported by vehicle-mounted terminal equipment through a computing server in the cloud computing cluster, and sending the vehicle data information to an encryption server in the cloud computing cluster;
Verifying whether the vehicle data information is trusted encrypted data or not through the encryption server, if so, re-encrypting the vehicle data information to obtain target encrypted data, and then sending the target encrypted data to the calculation server;
And calculating the target encrypted data through the calculation server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information.
Optionally, the verifying, by the encryption server, whether the vehicle data information is trusted encrypted data includes:
verifying whether the encryption key of the vehicle data information is the key of a preset encryption chip or not through the encryption server;
if yes, verifying that the vehicle data information is trusted encrypted data;
if not, verifying that the vehicle data information is the non-trusted encrypted data.
Optionally, if the encryption server verifies that the vehicle data information is non-trusted encrypted data, the method further includes:
Extracting characteristic values of the vehicle data information, and adding the characteristic values to a suspicious data characteristic library.
Optionally, the method further comprises:
monitoring target data in the computing server by utilizing the suspicious data feature library;
And if abnormal data exist in the computing server, triggering corresponding alarm information.
Optionally, the method further comprises:
Regularly generating a monitoring trigger instruction;
Triggering the step of monitoring the target data in the computing server by using the suspicious data feature library by using the monitoring triggering instruction.
Optionally, after the calculating the target encrypted data by the calculating server to obtain the vehicle diagnosis instruction corresponding to the vehicle data information, the method further includes:
Transmitting the vehicle diagnosis instruction to the encryption server;
Encrypting the vehicle diagnosis instruction through the encryption server to obtain an encrypted diagnosis instruction, and returning the encrypted diagnosis instruction to the calculation server;
and sending the encrypted diagnosis instruction to the vehicle-mounted terminal device through the computing server so that the vehicle-mounted terminal device can perform vehicle diagnosis based on the encrypted diagnosis instruction.
In a second aspect, the present application discloses a cloud computing cluster comprising at least 2 computing servers and at least 1 encryption server, wherein,
The computing server is used for acquiring vehicle data information reported by the vehicle-mounted terminal equipment and sending the vehicle data information to the encryption server;
The encryption server is used for verifying whether the vehicle data information is the trusted encryption data or not, if so, re-encrypting the vehicle data information to obtain target encryption data, and then sending the target encryption data to the calculation server;
the calculation server is also used for calculating the target encrypted data to obtain a vehicle diagnosis instruction corresponding to the vehicle data information.
Optionally, the encryption server is configured to verify whether an encryption key of the vehicle data information is a key of a preset encryption chip;
if yes, verifying that the vehicle data information is trusted encrypted data;
if not, verifying that the vehicle data information is the non-trusted encrypted data.
Optionally, the encryption server is further configured to directly send the vehicle data information to a calculation server if the vehicle data information is verified to be the untrusted encrypted data;
correspondingly, the computing server is used for extracting the characteristic value of the vehicle data information and adding the characteristic value to the suspicious data characteristic library.
Optionally, the computing server is further configured to monitor target data in the computing server by using the suspicious data feature library; and if abnormal data exist in the computing server, triggering corresponding alarm information.
Optionally, the computing server is further configured to generate a monitoring trigger instruction at regular time; triggering the step of monitoring the target data in the computing server by using the suspicious data feature library by using the monitoring triggering instruction.
Optionally, the computing server is further configured to send the vehicle diagnosis instruction to the encryption server;
Correspondingly, the encryption server is further used for encrypting the vehicle diagnosis instruction to obtain an encrypted diagnosis instruction, and returning the encrypted diagnosis instruction to the calculation server;
correspondingly, the computing server is further used for sending the encryption diagnosis instruction to the vehicle-mounted terminal device so that the vehicle-mounted terminal device can conduct vehicle diagnosis based on the encryption diagnosis instruction.
The vehicle diagnosis method comprises the steps of obtaining vehicle data information reported by vehicle-mounted terminal equipment through a computing server in a cloud computing cluster, sending the vehicle data information to an encryption server in the cloud computing cluster, verifying whether the vehicle data information is trusted encryption data through the encryption server, re-encrypting the vehicle data information to obtain target encryption data if the vehicle data information is trusted encryption data, sending the target encryption data to the computing server, and calculating the target encryption data through the computing server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information. That is, after the cloud computing cluster acquires the vehicle data information reported by the vehicle-mounted terminal device, whether the vehicle data information is the trusted encryption data is firstly verified, if yes, the vehicle data information is encrypted again to obtain the target encryption data, and then the target encryption data is transmitted to the computing server for computing, so that safe transmission and computing of the data in the cloud computing cluster can be ensured, and the safety and reliability of the service and the cluster are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a cloud computing method disclosed by the application;
FIG. 2 is a flowchart of a specific cloud computing method disclosed in the present application;
FIG. 3 is a flowchart of a specific cloud computing method disclosed in the present application;
Fig. 4 is a schematic diagram of a cloud computing cluster structure disclosed in the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
At present, the process of vehicle online diagnosis cloud computing is basically as follows: the vehicle-mounted terminal equipment reads and uploads vehicle data, the vehicle data is reported to the cloud server, and after cloud computing is carried out by the cloud server and a computing result is generated, the computing result is sent to the vehicle-mounted terminal equipment as a diagnosis instruction, so that diagnosis service is completed. However, in the existing cloud computing process, after diagnostic data is uploaded to the servers, because the diagnostic service is complex, the computing performance requirement is high, and therefore data distribution needs to be broadcasted to all servers in the cloud cluster for computing, once a certain server in the cluster is invaded by a hacker, or the reported data is embedded into a virus Trojan program, the problems of data leakage and disclosure and computing failure of the cloud computing service can be caused. And also causes the whole computing cluster to have potential safety hazards, sick work and remote control risks. Therefore, the cloud computing scheme provided by the application can ensure the safe transmission and computation of data in the cloud computing cluster, thereby improving the safety and reliability of the service and the cluster.
Referring to fig. 1, an embodiment of the present application discloses a cloud computing method, which is applied to a cloud computing cluster, where the cloud computing cluster includes at least 2 computing servers and at least 1 encryption server, and the method includes:
Step S11: and acquiring vehicle data information reported by the vehicle-mounted terminal equipment through a computing server in a cloud computing cluster, and sending the vehicle data information to an encryption server in the cloud computing cluster.
Step S12: and verifying whether the vehicle data information is the trusted encrypted data through the encryption server, if so, re-encrypting the vehicle data information to obtain target encrypted data, and then sending the target encrypted data to the calculation server.
In a specific embodiment, verifying, by the encryption server, whether the encryption key of the vehicle data information is a key of a preset encryption chip; if yes, verifying that the vehicle data information is trusted encrypted data; if not, verifying that the vehicle data information is the non-trusted encrypted data.
That is, when the preset encryption chip is registered in the encryption server, the key of the preset encryption information is registered, so that after the vehicle data information is acquired, whether the vehicle data information is the data encrypted by the registered preset encryption chip or not, that is, whether the vehicle data information is the trusted encryption data or not can be judged through the encryption key of the vehicle data information.
The vehicle terminal equipment is used for encrypting the vehicle data through the encryption chip after acquiring the clear text of the vehicle data, and then sending the encrypted vehicle data information to a calculation server of the cloud calculation cluster.
Step S13: and calculating by using the target encryption data through the calculation server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information.
After obtaining the vehicle diagnosis instruction corresponding to the vehicle data information, the embodiment sends the vehicle diagnosis instruction to the encryption server; encrypting the vehicle diagnosis instruction through the encryption server to obtain an encrypted diagnosis instruction, and returning the encrypted diagnosis instruction to the calculation server; and sending the encrypted diagnosis instruction to the vehicle-mounted terminal device through the computing server so that the vehicle-mounted terminal device can perform vehicle diagnosis based on the encrypted diagnosis instruction.
The vehicle diagnosis method comprises the steps of obtaining vehicle data information reported by vehicle-mounted terminal equipment through a computing server in a cloud computing cluster, sending the vehicle data information to an encryption server in the cloud computing cluster, verifying whether the vehicle data information is trusted encryption data through the encryption server, re-encrypting the vehicle data information to obtain target encryption data if the vehicle data information is trusted encryption data, sending the target encryption data to the computing server, and calculating the target encryption data through the computing server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information. That is, after the cloud computing cluster acquires the vehicle data information reported by the vehicle-mounted terminal device, whether the vehicle data information is the trusted encryption data is firstly verified, if yes, the vehicle data information is encrypted again to obtain the target encryption data, and then the target encryption data is transmitted to the computing server for computing, so that safe transmission and computing of the data in the cloud computing cluster can be ensured, and the safety and reliability of the service and the cluster are improved.
Referring to fig. 2, the embodiment of the application discloses a specific cloud computing method, which includes:
Step S21: and acquiring vehicle data information reported by the vehicle-mounted terminal equipment through a computing server in a cloud computing cluster, and sending the vehicle data information to an encryption server in the cloud computing cluster.
Step S22: and verifying whether the vehicle data information is the trusted encrypted data through the encryption server, if so, re-encrypting the vehicle data information to obtain target encrypted data, and then sending the target encrypted data to the calculation server.
Step S23: and calculating the target encrypted data through the calculation server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information.
Step S24: and if the encryption server verifies that the vehicle data information is the non-trusted encryption data, extracting the characteristic value of the vehicle data information, and adding the characteristic value to a suspicious data characteristic library.
That is, the embodiment of the application can perform security verification on the vehicle data through the encryption server, and the data which is not encrypted by the preset encryption chip, including the unencrypted data and the data encrypted by other non-preset encryption chips, are directly sent to the calculation server for feature extraction.
In a specific embodiment, different computing servers in the cloud computing cluster may be used to respectively calculate the target encrypted data, obtain a vehicle diagnosis instruction corresponding to the vehicle data information, extract a feature value of the vehicle data information, and add the feature value to a suspicious data feature library, that is, the computing servers in the computing cluster may be used to partially calculate the vehicle data information encrypted by the preset encryption chip, and partially extract features of the vehicle data information not encrypted by the preset encryption chip. Of course, in other embodiments, the computing servers in the cloud computing cluster may perform the same task, that is, any server may perform computation on the target encrypted data to obtain a vehicle diagnosis instruction corresponding to the vehicle data information, or extract a feature value of the vehicle data information, and add the feature value to the suspicious data feature library.
The characteristic values may include IP, software attributes, device numbers, vehicle VIN, GPS information, etc. The suspicious data feature library can be pre-established, and in practical application, the features of abnormal data are continuously added into the suspicious data feature library.
Further, the implementation can monitor the target data in the computing server by using the suspicious data feature library; and if abnormal data exist in the computing server, triggering corresponding alarm information.
In a specific embodiment, the feature value of the target data in the computing server may be extracted, compared with the suspicious data feature library, and whether the target data is abnormal data may be determined.
The target data may include the target encrypted data and decrypted data corresponding to the target encrypted data.
Moreover, the implementation can generate a monitoring trigger instruction at regular time; triggering the step of monitoring the target data in the computing server by using the suspicious data feature library by using the monitoring triggering instruction.
That is, the embodiment may extract the feature value of the target data in the calculation server at regular time, compare the feature value with the suspicious data feature library, and determine whether the target data is abnormal data.
In a specific embodiment, if abnormal data is monitored in the computing server, corresponding alarm information is triggered, and alarm mail is triggered so as to achieve the monitoring purpose.
For example, referring to fig. 3, fig. 3 is a flowchart of a specific cloud computing method disclosed in an embodiment of the present application. Wherein the computing network comprises at least two computing servers.
Referring to fig. 4, the present application discloses a cloud computing cluster comprising at least 2 computing servers 11 and at least 1 encryption server 12, wherein,
The computing server 11 is configured to obtain vehicle data information reported by a vehicle-mounted terminal device, and send the vehicle data information to the encryption server;
the encryption server 12 is configured to verify whether the vehicle data information is trusted encrypted data, if yes, re-encrypt the vehicle data information to obtain target encrypted data, and then send the target encrypted data to the computing server;
The calculation server 11 is further configured to calculate the target encrypted data, and obtain a vehicle diagnosis instruction corresponding to the vehicle data information.
It can be seen that in the embodiment of the present application, vehicle data information reported by a vehicle-mounted terminal device is obtained through a computing server in a cloud computing cluster, and the vehicle data information is sent to an encryption server in the cloud computing cluster, then whether the vehicle data information is trusted encryption data is verified through the encryption server, if yes, the vehicle data information is re-encrypted to obtain target encryption data, then the target encryption data is sent to the computing server, and then the target encryption data is calculated through the computing server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information. That is, after the cloud computing cluster acquires the vehicle data information reported by the vehicle-mounted terminal device, whether the vehicle data information is the trusted encrypted data or not is verified, if yes, the vehicle data information is encrypted again to obtain the target encrypted data, and then the target encrypted data is transmitted to the computing server for computing, so that safe transmission and computing of the data in the cloud computing cluster can be ensured, and the safety and reliability of the service and the cluster are improved.
The encryption server 12 is specifically configured to verify whether an encryption key of the vehicle data information is a key of a preset encryption chip; if yes, verifying that the vehicle data information is trusted encrypted data; if not, verifying that the vehicle data information is the non-trusted encrypted data.
The encryption server 12 is further configured to, if it is verified that the vehicle data information is the non-trusted encrypted data, directly send the vehicle data information to the calculation server 11;
accordingly, the calculation server 11 is configured to extract a feature value of the vehicle data information, and add the feature value to the suspicious data feature library.
Further, the computing server 11 is further configured to monitor target data in the computing server by using the suspicious data feature library; if abnormal data exists in the calculation server 11, corresponding alarm information is triggered.
In addition, the computing server 11 is further configured to generate a monitoring trigger instruction at regular time; triggering the step of monitoring the target data in the computing server by using the suspicious data feature library by using the monitoring triggering instruction.
Further, the computing server 11 is further configured to send the vehicle diagnosis instruction to the encryption server 12;
correspondingly, the encryption server 12 is further configured to encrypt the vehicle diagnosis instruction to obtain an encrypted diagnosis instruction, and return the encrypted diagnosis instruction to the calculation server;
Accordingly, the computing server 11 is further configured to send the encrypted diagnosis instruction to the vehicle-mounted terminal device, so that the vehicle-mounted terminal device performs vehicle diagnosis based on the encrypted diagnosis instruction.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The cloud computing method and the cloud computing cluster provided by the application are described in detail, and specific examples are applied to illustrate the principle and the implementation of the application, and the description of the above examples is only used for helping to understand the method and the core idea of the application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (3)

1. A cloud computing method, the method being applied to a cloud computing cluster comprising at least 2 computing servers and at least 1 encryption server, the method comprising:
Acquiring vehicle data information reported by vehicle-mounted terminal equipment through a computing server in the cloud computing cluster, and sending the vehicle data information to an encryption server in the cloud computing cluster;
Verifying whether the vehicle data information is trusted encrypted data or not through the encryption server, if so, re-encrypting the vehicle data information to obtain target encrypted data, and then sending the target encrypted data to the calculation server;
calculating the target encrypted data through the calculation server to obtain a vehicle diagnosis instruction corresponding to the vehicle data information;
wherein said verifying, by said encryption server, whether said vehicle data information is trusted encrypted data comprises:
verifying whether the encryption key of the vehicle data information is the key of a preset encryption chip or not through the encryption server;
if yes, verifying that the vehicle data information is trusted encrypted data;
if not, verifying that the vehicle data information is the non-trusted encrypted data;
and, the cloud computing method further includes:
If the encryption server verifies that the vehicle data information is the non-trusted encryption data, extracting a characteristic value of the vehicle data information, and adding the characteristic value to a suspicious data characteristic library;
monitoring target data in the computing server by utilizing the suspicious data feature library;
if abnormal data are monitored to exist in the computing server, triggering corresponding alarm information;
the calculating, by the calculating server, the target encrypted data, and after obtaining a vehicle diagnosis instruction corresponding to the vehicle data information, further includes:
Transmitting the vehicle diagnosis instruction to the encryption server;
Encrypting the vehicle diagnosis instruction through the encryption server to obtain an encrypted diagnosis instruction, and returning the encrypted diagnosis instruction to the calculation server;
And sending the encrypted diagnosis instruction to the vehicle-mounted terminal equipment through the computing server so that the vehicle-mounted terminal equipment can carry out vehicle diagnosis based on the encrypted diagnosis instruction.
2. The cloud computing method of claim 1, further comprising:
Regularly generating a monitoring trigger instruction;
Triggering the step of monitoring the target data in the computing server by using the suspicious data feature library by using the monitoring triggering instruction.
3. A cloud computing cluster is characterized by comprising at least 2 computing servers and at least 1 encryption server, wherein,
The computing server is used for acquiring vehicle data information reported by the vehicle-mounted terminal equipment and sending the vehicle data information to the encryption server;
The encryption server is used for verifying whether the vehicle data information is the trusted encryption data, if so, re-encrypting the vehicle data information to obtain target encryption data, and then sending the target encryption data to the calculation server;
The calculation server is also used for calculating the target encrypted data to obtain a vehicle diagnosis instruction corresponding to the vehicle data information;
the encryption server is further used for verifying whether the encryption key of the vehicle data information is the key of a preset encryption chip or not through the encryption server; if yes, verifying that the vehicle data information is trusted encrypted data; if not, verifying that the vehicle data information is the non-trusted encrypted data;
the encryption server is further used for directly sending the vehicle data information to the calculation server if the vehicle data information is verified to be the non-trusted encryption data;
The computing server is also used for extracting the characteristic value of the vehicle data information and adding the characteristic value to a suspicious data characteristic library;
the computing server is also used for monitoring target data in the computing server by utilizing the suspicious data feature library; if abnormal data are monitored to exist in the computing server, corresponding alarm information is triggered
The computing server is further used for sending the vehicle diagnosis instruction to the encryption server;
Correspondingly, the encryption server is further used for encrypting the vehicle diagnosis instruction to obtain an encrypted diagnosis instruction, and returning the encrypted diagnosis instruction to the calculation server;
correspondingly, the computing server is further used for sending the encryption diagnosis instruction to the vehicle-mounted terminal device so that the vehicle-mounted terminal device can conduct vehicle diagnosis based on the encryption diagnosis instruction.
CN202011519727.2A 2020-12-21 2020-12-21 Cloud computing method and cloud computing cluster Active CN112541187B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011519727.2A CN112541187B (en) 2020-12-21 2020-12-21 Cloud computing method and cloud computing cluster

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011519727.2A CN112541187B (en) 2020-12-21 2020-12-21 Cloud computing method and cloud computing cluster

Publications (2)

Publication Number Publication Date
CN112541187A CN112541187A (en) 2021-03-23
CN112541187B true CN112541187B (en) 2024-05-03

Family

ID=75019351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011519727.2A Active CN112541187B (en) 2020-12-21 2020-12-21 Cloud computing method and cloud computing cluster

Country Status (1)

Country Link
CN (1) CN112541187B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420306A (en) * 2008-12-12 2009-04-29 肖佐楠 Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN106685985A (en) * 2017-01-17 2017-05-17 同济大学 Vehicle remote diagnosis system and method based on information safety technology
CN108227579A (en) * 2017-12-29 2018-06-29 深圳市元征科技股份有限公司 A kind of processing method and processing device of vehicle diagnosis information, electronic equipment
CN111181928A (en) * 2019-12-14 2020-05-19 深圳市元征科技股份有限公司 Vehicle diagnosis method, server, and computer-readable storage medium
CN111552270A (en) * 2020-04-29 2020-08-18 北京汽车股份有限公司 Safety authentication and data transmission method and device for vehicle-mounted diagnosis
CN111565182A (en) * 2020-04-29 2020-08-21 深圳市元征科技股份有限公司 Vehicle diagnosis method and device and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9619946B2 (en) * 2014-07-29 2017-04-11 GM Global Technology Operations LLC Securely providing diagnostic data from a vehicle to a remote server using a diagnostic tool
WO2018014123A1 (en) * 2016-07-18 2018-01-25 Royal Bank Of Canada Distributed ledger platform for vehicle records
JP6260067B1 (en) * 2016-08-09 2018-01-17 Kddi株式会社 Management system, key generation device, in-vehicle computer, management method, and computer program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420306A (en) * 2008-12-12 2009-04-29 肖佐楠 Automobile mounted automatic diagnosis method based on RSA ciphering and signature algorithm
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN106685985A (en) * 2017-01-17 2017-05-17 同济大学 Vehicle remote diagnosis system and method based on information safety technology
CN108227579A (en) * 2017-12-29 2018-06-29 深圳市元征科技股份有限公司 A kind of processing method and processing device of vehicle diagnosis information, electronic equipment
CN111181928A (en) * 2019-12-14 2020-05-19 深圳市元征科技股份有限公司 Vehicle diagnosis method, server, and computer-readable storage medium
CN111552270A (en) * 2020-04-29 2020-08-18 北京汽车股份有限公司 Safety authentication and data transmission method and device for vehicle-mounted diagnosis
CN111565182A (en) * 2020-04-29 2020-08-21 深圳市元征科技股份有限公司 Vehicle diagnosis method and device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Unified data authenticated encryption for vehicular communication;Yi Wang 等;《2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS)》;全文 *
基于4G网络和CAN总线的车辆在线故障诊断系统设计与实现;何真承;《中国优秀硕士学位论文全文数据库 (工程科技Ⅱ辑)》(第12期);全文 *

Also Published As

Publication number Publication date
CN112541187A (en) 2021-03-23

Similar Documents

Publication Publication Date Title
US9342683B2 (en) Stateless attestation system
WO2021063068A1 (en) Operation and maintenance control and operation and maintenance analysis method and apparatus, system, and storage medium
US9432384B2 (en) Methods and nodes for verification of data
CN105262717A (en) Network service security management method and device
KR102177411B1 (en) Method for managing industrial control systems via physical one-way encryption remote monitoring
CN103118022B (en) A kind of without password heterodoxy Sign-On authentication method
WO2024002160A1 (en) Data processing method and apparatus, and electronic device and storage medium
CN111865993B (en) Identity authentication management method, distributed system and readable storage medium
CN112688972B (en) Method and system for protecting account security
CN114513786A (en) 5G feeder automation access control method, device and medium based on zero trust
CN104980449A (en) Network request security certification method and system
CN113411295A (en) Role-based access control situation awareness defense method and system
Cui et al. Lightweight encryption and authentication for controller area network of autonomous vehicles
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
KR101268298B1 (en) surveillance system and method for authentication procedure based by positioning information
CN105577706A (en) Network safety defense system and method thereof
CN112541187B (en) Cloud computing method and cloud computing cluster
KR20130085473A (en) Encryption system for intrusion detection system of cloud computing service
EP2710507B1 (en) Supervised data transfer
CN106878233B (en) Method for reading security data, security server, terminal and system
Feng et al. Autonomous Vehicles' Forensics in Smart Cities
WO2015131324A1 (en) Software security detection method, apparatus and device
CN112182547B (en) Trusted device authentication method, system, device and storage medium
CN111669746B (en) Protection system for information security of Internet of things
CN111523128B (en) Information protection method, system, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant