CN112652080A - Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment - Google Patents

Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment Download PDF

Info

Publication number
CN112652080A
CN112652080A CN202011491356.1A CN202011491356A CN112652080A CN 112652080 A CN112652080 A CN 112652080A CN 202011491356 A CN202011491356 A CN 202011491356A CN 112652080 A CN112652080 A CN 112652080A
Authority
CN
China
Prior art keywords
vehicle
mounted electronic
electronic tag
equipment
ecu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011491356.1A
Other languages
Chinese (zh)
Other versions
CN112652080B (en
Inventor
韩冬阁
赵昱阳
王庆飞
韩茂强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wanji Intelligent Network Technology Co ltd
Original Assignee
Beijing Wanji Intelligent Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wanji Intelligent Network Technology Co ltd filed Critical Beijing Wanji Intelligent Network Technology Co ltd
Priority to CN202011491356.1A priority Critical patent/CN112652080B/en
Publication of CN112652080A publication Critical patent/CN112652080A/en
Application granted granted Critical
Publication of CN112652080B publication Critical patent/CN112652080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/48Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/06Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Traffic Control Systems (AREA)

Abstract

The embodiment of the disclosure provides a method and a device for preventing disassembly of vehicle-mounted electronic label equipment and electronic equipment, and belongs to the technical field of data processing. The method comprises the following steps: controlling the vehicle-mounted electronic tag equipment to execute a wake-up operation; after the vehicle-mounted electronic tag equipment is awakened, the identity authentication is carried out on the vehicle-mounted electronic tag equipment through a first communication protocol between the vehicle-mounted electronic tag equipment and a vehicle-mounted ECU; after the identity authentication is completed, the vehicle-mounted electronic tag equipment carries out periodic encrypted communication with the vehicle-mounted ECU through a second communication protocol; and after the vehicle-mounted electronic tag equipment receives a dormancy triggering event, acquiring link release response information sent by the vehicle-mounted ECU, stopping encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU, and executing dormancy operation on the vehicle-mounted electronic tag equipment based on a third communication protocol. Through the scheme disclosed by the invention, the anti-dismantling performance of the vehicle-mounted electronic tag equipment can be improved, and the safety of the vehicle-mounted electronic tag equipment is ensured.

Description

Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment
Technical Field
The disclosure relates to the technical field of data processing, in particular to a method and a device for preventing disassembly of vehicle-mounted electronic label equipment and electronic equipment.
Background
At present, an On-board electronic tag Unit (OBU) (an abbreviation of On board Unit) plays an increasingly important role in the field of intelligent transportation. Particularly, after the electronic toll collection system is vigorously developed in China, the vehicle-mounted electronic tag equipment is developed explosively. Because a large amount of owner privacy information is stored in the vehicle-mounted electronic tag device and is bound with the vehicle in the transaction process, anti-dismantling measures of the vehicle-mounted electronic tag device are particularly important for protecting the owner privacy and ensuring the transaction safety and reliability.
The vehicle-mounted electronic tag device is also interpreted as a vehicle-mounted Unit, and the vehicle-mounted electronic tag device is a microwave device which communicates with other ECUs on the whole vehicle by using a Controller Area Network (CAN) and communicates with an RSU (RSU-Road Side Unit) by using a dsrc (dedicated Short Range communication) technology. In an etc (electronic Toll collection) system, an OBU is mounted on a whole vehicle, a roadside unit RSU is erected on a roadside, and communication is performed between the OBU and the RSU through a DSRC technology. When the whole vehicle passes through the RSU at high speed, the OBU and the RSU are communicated by the DSRC technology, just like a non-contact card, the distance is longer-dozens of meters, the frequency is higher-5.8 GHz, and when the vehicle passes through the RSU, the vehicle is identified, the vehicle type is obtained, the rate is calculated, and the toll is deducted.
In an ETC system, an OBU adopts a DSRC technology to establish a microwave communication link with an RSU, and realizes vehicle identity identification and electronic fee deduction without stopping the vehicle on the way of the whole vehicle, so that the vehicle is not stopped and a card is not taken, and an unattended vehicle channel is established.
In the prior art, most of the OBUs are supported by mechanical anti-dismantling, so that not only is the cost of an actual product increased, but also the anti-dismantling leak exists, and the risks of information leakage, fund theft and brushing and the like of a terminal user are very high; the prior art also has solutions: the identity authentication of the OBU is done only once after each wake-up, but this approach does not prevent the detachment after the issuance authentication.
Disclosure of Invention
In view of this, the embodiments of the present disclosure provide a tamper-proof device for a vehicle-mounted electronic tag, which at least partially solves the problems in the prior art.
In a first aspect, an embodiment of the present disclosure provides a method for preventing detachment of a vehicle-mounted electronic tag device, including:
controlling the vehicle-mounted electronic tag equipment to execute a wake-up operation;
after the vehicle-mounted electronic tag equipment is awakened, the identity authentication is carried out on the vehicle-mounted electronic tag equipment through a first communication protocol between the vehicle-mounted electronic tag equipment and a vehicle-mounted ECU;
after the identity authentication is completed, the vehicle-mounted electronic tag equipment carries out periodic encrypted communication with the vehicle-mounted ECU through a second communication protocol;
and after the vehicle-mounted electronic tag equipment receives a dormancy triggering event, acquiring link release response information sent by the vehicle-mounted ECU, stopping encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU, and executing dormancy operation on the vehicle-mounted electronic tag equipment based on a third communication protocol.
According to a specific implementation manner of the embodiment of the present disclosure, after the vehicle-mounted electronic tag device is waken up, performing identity authentication on the vehicle-mounted electronic tag device through a first communication protocol with a vehicle-mounted ECU includes:
controlling the vehicle-mounted electronic label equipment to send an authentication handshake request to the vehicle-mounted ECU;
after the vehicle-mounted electronic tag equipment receives the encrypted seed sent by the vehicle-mounted ECU, sending a secret key to the vehicle-mounted ECU;
and after the vehicle-mounted electronic label equipment receives the authentication completion identification sent by the vehicle-mounted ECU, completing the identity authentication.
According to a specific implementation manner of the embodiment of the present disclosure, after the vehicle-mounted electronic tag device is waken up, the identity authentication of the vehicle-mounted electronic tag device is performed through a first communication protocol between the vehicle-mounted electronic tag device and the vehicle-mounted ECU, further including:
after the vehicle-mounted electronic tag equipment is powered on, sending an authentication request to a vehicle-mounted ECU (electronic control unit) at a vehicle end;
the vehicle-mounted ECU at the vehicle end encrypts the authentication request and returns the encrypted authentication request to the vehicle-mounted electronic label device;
the vehicle-mounted electronic tag equipment judges whether the anti-dismantling function is normal or not by comparing the encrypted data, and sends the anti-dismantling state to the vehicle end so as to continue to execute the subsequent encrypted communication process under the condition that the anti-dismantling function is normal.
According to a specific implementation manner of the embodiment of the present disclosure, after the vehicle-mounted electronic tag device is waken up, the identity authentication of the vehicle-mounted electronic tag device is performed through a first communication protocol between the vehicle-mounted electronic tag device and the vehicle-mounted ECU, further including:
sequentially executing random number generation encryption operation and keyword encryption and decryption operation between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU; wherein
In the process of random number generation encryption operation, after being electrified, the vehicle-mounted electronic tag equipment sends an authentication request to a vehicle-mounted ECU (electronic control unit) at a vehicle end; a vehicle-mounted ECU at a vehicle end generates a public key and sends the public key to vehicle-mounted electronic label equipment; the vehicle-mounted electronic tag equipment end generates a random number, encrypts the random number by using a public key and sends the encrypted random number to a vehicle-mounted ECU (electronic control unit) of the vehicle end;
in the operation process of encrypting and decrypting the keywords, after a vehicle-mounted ECU at the vehicle end decrypts the random number, the random number is used for generating the encrypted keywords and the encrypted keywords are sent to a vehicle-mounted electronic tag equipment end; the vehicle-mounted electronic tag equipment decrypts the encrypted keyword, executes anti-dismantling state authentication and updating, and sends an authentication result to a vehicle-mounted ECU (electronic control unit) of the vehicle end, so that a subsequent encrypted communication process is continuously executed under the condition that the anti-dismantling function is normal.
According to a specific implementation manner of the embodiment of the present disclosure, after the identity authentication is completed, the periodically encrypted communication between the vehicle-mounted electronic tag device and the vehicle-mounted ECU through a second communication protocol includes:
in each communication period, communication content between the vehicle-mounted electronic tag device and the vehicle-mounted ECU is re-encrypted;
different encrypted ciphertexts are set in different communication periods.
According to a specific implementation manner of the embodiment of the present disclosure, after the vehicle-mounted electronic tag device receives a hibernation triggering event, acquiring link release response information sent by the vehicle-mounted ECU, stopping encrypted communication between the vehicle-mounted electronic tag device and the vehicle-mounted ECU, and performing a hibernation operation on the vehicle-mounted electronic tag device based on a third communication protocol includes:
the vehicle-mounted electronic tag equipment sends an authentication waving request to the vehicle-mounted ECU;
after the vehicle-mounted electronic tag equipment receives the hand waving confirmation signal sent by the vehicle-mounted ECU, encrypted communication is stopped, and then the sleeping operation of the vehicle-mounted electronic tag equipment is started.
According to a specific implementation manner of the embodiment of the present disclosure, after the controlling the vehicle-mounted electronic tag device to perform the wakeup operation, the method further includes:
and controlling the vehicle-mounted electronic label equipment to be in a disabled state, wherein the vehicle-mounted electronic label equipment cannot execute a transaction function in the disabled state.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
after the identity authentication is successful, switching the vehicle-mounted electronic label equipment from a disabled state to a normal state, wherein in the normal state, the transaction function of the vehicle-mounted electronic label equipment is enabled;
and when the periodic communication of the vehicle-mounted electronic label equipment is abnormal, switching the vehicle-mounted electronic label equipment from a normal state to a disabled state.
According to a specific implementation manner of the embodiment of the present disclosure, the method further includes:
after the vehicle-mounted electronic label equipment is successfully issued and activated, switching the state of the vehicle-mounted electronic label equipment from a disassembly state to a normal state;
after the identity authentication response error of the vehicle-mounted electronic label equipment or the connection confirmation error of the periodic communication, switching the vehicle-mounted electronic label equipment from a normal state to a disassembly state;
when no bus fault exists but the identity authentication fails or a response message of an identity authentication request cannot be received, switching the vehicle-mounted electronic label equipment from a disabled state to a detached state;
after the vehicle-mounted electronic label device is activated and detects a bus error, the vehicle-mounted electronic label device is switched from a disassembly state to a disabled state.
In a second aspect, an embodiment of the present disclosure provides a detachment prevention device for a vehicle-mounted electronic tag device, including:
the control module is used for controlling the vehicle-mounted electronic tag equipment to execute awakening operation;
the authentication module is used for authenticating the identity of the vehicle-mounted electronic tag equipment through a first communication protocol between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU after the vehicle-mounted electronic tag equipment is awakened;
the communication module is used for carrying out periodical encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU through a second communication protocol after the identity authentication is finished;
and the dormancy module is used for acquiring link release response information sent by the vehicle-mounted ECU after the vehicle-mounted electronic tag equipment receives a dormancy trigger event, stopping encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU, and executing dormancy operation on the vehicle-mounted electronic tag equipment based on a third communication protocol.
In a third aspect, an embodiment of the present disclosure further provides an electronic device, where the electronic device includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the tamper-proofing method for the vehicle-mounted electronic tag device in the first aspect or any implementation manner of the first aspect.
In a fourth aspect, the disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the method for preventing detachment of an in-vehicle electronic label device in the foregoing first aspect or any implementation manner of the first aspect.
In a fifth aspect, the present disclosure also provides a computer program product, where the computer program product includes a computer program stored on a non-transitory computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer is caused to execute the in-vehicle electronic tag device anti-detachment method in the foregoing first aspect or any implementation manner of the first aspect.
The anti-dismantling scheme of the vehicle-mounted electronic label equipment in the embodiment of the disclosure comprises the following steps: controlling the vehicle-mounted electronic tag equipment to execute a wake-up operation; after the vehicle-mounted electronic tag equipment is awakened, the identity authentication is carried out on the vehicle-mounted electronic tag equipment through a first communication protocol between the vehicle-mounted electronic tag equipment and a vehicle-mounted ECU; after the identity authentication is completed, the vehicle-mounted electronic tag equipment carries out periodic encrypted communication with the vehicle-mounted ECU through a second communication protocol; and after the vehicle-mounted electronic tag equipment receives a dormancy triggering event, acquiring link release response information sent by the vehicle-mounted ECU, stopping encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU, and executing dormancy operation on the vehicle-mounted electronic tag equipment based on a third communication protocol. Through the scheme disclosed by the invention, the anti-dismantling performance of the vehicle-mounted electronic tag equipment can be improved, and the safety of the vehicle-mounted electronic tag equipment is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method for preventing detachment of a vehicle-mounted electronic tag device according to an embodiment of the present disclosure;
2a-2b are schematic flow diagrams of another tamper-evident method for a vehicle-mounted electronic label device according to an embodiment of the disclosure;
fig. 3 is a schematic diagram illustrating a tamper resistant state switching provided in an embodiment of the present disclosure;
fig. 4 is a schematic flow chart of another tamper-proof method for a vehicle-mounted electronic tag device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a detachment prevention device of a vehicle-mounted electronic tag device according to an embodiment of the present disclosure;
fig. 6 is a schematic view of an electronic device provided in an embodiment of the present disclosure.
Detailed Description
The embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
Referring to fig. 1, a schematic flow chart of a method for preventing detachment of a vehicle-mounted electronic tag device provided in an embodiment of the present disclosure is shown in fig. 1, where the method mainly includes:
and S101, controlling the vehicle-mounted electronic tag equipment to execute awakening operation.
An on-board electronic tag device (OBU) is mounted on a vehicle, and the on-board electronic tag device CAN communicate with an on-board ECU (electronic control unit) through a communication line (e.g., a CAN bus) on the vehicle, so that the ECU CAN recognize the identity of the on-board electronic tag device.
Therefore, when the whole vehicle is off-line, the whole vehicle and the OBU are matched, so that even if the OBU of the same vehicle type is exchanged, the identity authentication is not passed. After the whole vehicle is started, the identity authentication with the OBU is carried out at the first time. The purpose of this process is to confirm that the OBU is a legitimate OBU on the entire vehicle.
After the vehicle is started, the vehicle-mounted electronic tag equipment CAN monitor the state of the vehicle through the CAN bus, and after the vehicle is started, the vehicle-mounted electronic tag equipment CAN be awakened, so that the vehicle-mounted electronic tag equipment CAN communicate with the vehicle-mounted ECU.
S102, after the vehicle-mounted electronic tag device is awakened, identity authentication is carried out on the vehicle-mounted electronic tag device through a first communication protocol between the vehicle-mounted electronic tag device and a vehicle-mounted ECU.
After the vehicle-mounted electronic tag device is awakened, the vehicle-mounted electronic tag device can be communicated with the vehicle-mounted ECU through the first communication protocol to verify the identity of the vehicle-mounted electronic tag device.
Specifically, referring to fig. 2a and fig. 2b, in the process of implementing the identity authentication of the vehicle-mounted electronic tag device by using the first communication protocol with the vehicle-mounted ECU, an implementation scheme may be adopted, which is illustrated in the following steps:
scheme 1
The vehicle-mounted electronic label device can be controlled to send an authentication handshake request to the vehicle-mounted ECU; after the vehicle-mounted electronic tag equipment receives the encrypted seed sent by the vehicle-mounted ECU, sending a secret key to the vehicle-mounted ECU; and after the vehicle-mounted electronic label equipment receives the authentication completion identification sent by the vehicle-mounted ECU, completing the identity authentication.
Scheme 2
Referring to fig. 2a, in the process of implementing identity authentication of the vehicle-mounted electronic tag device by using a first communication protocol between the vehicle-mounted electronic tag device and the vehicle-mounted ECU, the vehicle-mounted electronic tag device is powered on and then sends an authentication request to the vehicle-mounted ECU at the vehicle end; the vehicle-mounted ECU at the vehicle end encrypts the authentication request and returns the encrypted authentication request to the vehicle-mounted electronic label device; the vehicle-mounted electronic tag equipment judges whether the anti-dismantling function is normal or not by comparing the encrypted data, and sends the anti-dismantling state to the vehicle end so as to continue to execute the subsequent encrypted communication process under the condition that the anti-dismantling function is normal.
The vehicle-mounted electronic tag equipment end is an authentication request initiator, and after being awakened every time, the vehicle-mounted electronic tag equipment starts to execute an anti-dismounting strategy: after the vehicle-mounted electronic tag equipment is awakened, firstly, the anti-dismantling state of the vehicle-mounted electronic tag equipment is defaulted to be invalid; generating a random number in the vehicle-mounted electronic tag equipment, and sending the random number to a vehicle end through a CAN data frame; the vehicle-mounted electronic tag device executes an encryption algorithm by using the random number and the keyword to generate encrypted data KEY 1.
After the vehicle end receives the authentication request of the vehicle-mounted electronic label equipment, the following operations are executed: recording a random number in a currently received authentication request; executing an encryption algorithm by using the random number and the keyword to generate encrypted data KEY 2; the vehicle end sends the encrypted data KEY2 through the CAN data frame.
After the vehicle-mounted electronic tag equipment receives the encrypted data of the vehicle end: comparing KEY1 with KEY2, and if the comparison results are the same, judging that the anti-dismantling is effective; otherwise, the tamper determination is invalid. And the vehicle-mounted electronic tag equipment end sends the comparison result to the vehicle end through the CAN data frame.
Scheme 3
Referring to fig. 2b, in the anti-tamper design of the vehicle-mounted electronic tag device CAN in scheme 2, based on data interaction between the vehicle-mounted electronic tag device and a vehicle, based on an asymmetric encryption algorithm, in the process of implementing identity authentication of the vehicle-mounted electronic tag device by a first communication protocol between the vehicle-mounted electronic tag device and a vehicle-mounted ECU, a random number generation encryption operation and a keyword encryption and decryption operation may be sequentially performed between the vehicle-mounted electronic tag device and the vehicle-mounted ECU; wherein
In the process of random number generation encryption operation, after the vehicle-mounted electronic tag equipment is awakened, the default anti-dismantling state is invalid; the vehicle-mounted electronic tag equipment sends an authentication request to a vehicle-mounted ECU (electronic control unit) at a vehicle end through a CAN (controller area network) data frame; a vehicle-mounted ECU at a vehicle end generates a public key and sends the public key to vehicle-mounted electronic label equipment through a CAN data frame; the vehicle-mounted electronic tag equipment end generates a random number, encrypts the random number by using a public key and sends the random number to a vehicle-mounted ECU (electronic control unit) of the vehicle end through a CAN (controller area network) data frame;
in the key word decryption and encryption operation process, after a vehicle-mounted ECU at a vehicle end decrypts a random number, the VIN number is encrypted by using the random number and is sent to a vehicle-mounted electronic tag equipment end through a CAN data frame; the vehicle-mounted electronic tag equipment decrypts the VIN, compares the VIN with the locally stored VIN, sets the anti-dismounting state to be valid after the comparison is successful, and sets the anti-dismounting state to be invalid if the comparison is not successful; and finally, sending the anti-disassembly result through the CAN data frame.
In a specific implementation process, the 3 schemes may be implemented as an independent scheme, or may be used in combination, which is not limited herein.
S103, after the identity authentication is completed, the vehicle-mounted electronic label device carries out periodic encrypted communication with the vehicle-mounted ECU through a second communication protocol.
After the identity authentication is completed, the vehicle-mounted electronic tag device enters a wake-up period, and in order to prevent the vehicle-mounted electronic tag device from being detached after the wake-up, the vehicle-mounted electronic tag device also needs to continue to periodically perform encrypted communication with the vehicle-mounted ECU through a second communication protocol.
In the process of encrypted communication, the communication period may be controlled within a preset time (e.g., 270ms), which is less than the communication time required by the vehicle-mounted electronic tag device to complete a transaction, so that even if the vehicle-mounted electronic tag device is waken up and then detached, the transaction cannot be completed.
In addition, the content of each period of communication needs to be re-encrypted to ensure the bus cryptograph communication, and the cryptographs at different time are different, so as to ensure that the information of the monitoring bus cannot be used for forging the encryption authentication request and confirmation. The communication encryption may be performed in various ways, and is not particularly limited herein.
And S104, after the vehicle-mounted electronic tag equipment receives the dormancy triggering event, acquiring link release response information sent by the vehicle-mounted ECU, stopping encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU, and executing dormancy operation on the vehicle-mounted electronic tag equipment based on a third communication protocol.
The vehicle-mounted electronic tag device acquires link release response information sent by the vehicle-mounted ECU after receiving the dormancy trigger event, can stop encrypted communication based on a second communication protocol, and executes dormancy operation on the vehicle-mounted electronic tag device based on a third communication protocol.
Specifically, the vehicle-mounted electronic tag device sends an authentication waving request to the vehicle-mounted ECU; after the vehicle-mounted electronic tag equipment receives the hand waving confirmation signal sent by the vehicle-mounted ECU, encrypted communication is stopped, and then the sleeping operation of the vehicle-mounted electronic tag equipment is started.
Through the content of the embodiment, the vehicle-mounted electronic tag device can still be prevented from being detached after being awakened, and the safety of the vehicle-mounted electronic tag device is improved.
Referring to fig. 4, according to a specific implementation manner of the embodiment of the present disclosure, after the vehicle-mounted electronic tag device wakes up, performing identity authentication on the vehicle-mounted electronic tag device through a first communication protocol with a vehicle-mounted ECU includes:
s401, controlling the vehicle-mounted electronic label device to send an authentication handshake request to the vehicle-mounted ECU;
s402, after the vehicle-mounted electronic tag device receives the encrypted seed sent by the vehicle-mounted ECU, a secret key is sent to the vehicle-mounted ECU;
and S403, after the vehicle-mounted electronic label device receives the authentication completion identifier sent by the vehicle-mounted ECU, completing the identity authentication.
Through the content of the embodiment, the vehicle-mounted electronic tag equipment can be ensured to be awakened safely and effectively.
In order to ensure the security of communication, according to a specific implementation manner of the embodiment of the present disclosure, after the identity authentication is completed, the periodically encrypted communication between the vehicle-mounted electronic tag device and the vehicle-mounted ECU through a second communication protocol includes: in each communication period, communication content between the vehicle-mounted electronic tag device and the vehicle-mounted ECU is re-encrypted; different encrypted ciphertexts are set in different communication periods. In this way, the security of the communication content of the second communication protocol can be further improved.
According to a specific implementation manner of the embodiment of the present disclosure, after the vehicle-mounted electronic tag device receives a hibernation triggering event, acquiring link release response information sent by the vehicle-mounted ECU, stopping encrypted communication between the vehicle-mounted electronic tag device and the vehicle-mounted ECU, and performing a hibernation operation on the vehicle-mounted electronic tag device based on a third communication protocol includes: the vehicle-mounted electronic tag equipment sends an authentication waving request to the vehicle-mounted ECU; after the vehicle-mounted electronic tag equipment receives the hand waving confirmation signal sent by the vehicle-mounted ECU, encrypted communication is stopped, and then the sleeping operation of the vehicle-mounted electronic tag equipment is started. By the implementation mode, the vehicle-mounted electronic tag equipment can be ensured to be in time sleep operation.
Referring to fig. 3, according to a specific implementation manner of the embodiment of the present disclosure, after the controlling the vehicle-mounted electronic tag device to perform the wakeup operation, the method further includes: and controlling the vehicle-mounted electronic label equipment to be in a disabled state, wherein the vehicle-mounted electronic label equipment cannot execute a transaction function in the disabled state. By the mode, the safety of the vehicle-mounted electronic tag equipment can be guaranteed in the awakening state.
In order to ensure the security of the vehicle-mounted electronic tag device, according to a specific implementation manner of the embodiment of the present disclosure, the method further includes: after the identity authentication is successful, switching the vehicle-mounted electronic label equipment from a disabled state to a normal state, wherein in the normal state, the transaction function of the vehicle-mounted electronic label equipment is enabled; and when the periodic communication of the vehicle-mounted electronic label equipment is abnormal, switching the vehicle-mounted electronic label equipment from a normal state to a disabled state. Through the mode, different safety levels can be set based on the actual working state of the vehicle-mounted electronic tag equipment, and the transaction safety is improved.
In addition, the normal state, the detached state, and the disabled state in fig. 3 may be further switched according to actual needs, where specific situations include:
after the vehicle-mounted electronic label equipment is successfully issued and activated, switching the state of the vehicle-mounted electronic label equipment from a disassembly state to a normal state;
after the identity authentication response error of the vehicle-mounted electronic label equipment or the connection confirmation error of the periodic communication, switching the vehicle-mounted electronic label equipment from a normal state to a disassembly state;
when no bus fault exists but the identity authentication fails or a response message of an identity authentication request cannot be received, switching the vehicle-mounted electronic label equipment from a disabled state to a detached state;
after the vehicle-mounted electronic label device is activated and detects a bus error, the vehicle-mounted electronic label device is switched from a disassembly state to a disabled state.
The various handover conditions in fig. 3 are described as follows:
condition 1: the identity authentication is successful;
condition 2: and (3) periodic communication abnormity: response timeout, bus BUSoff, inability to communicate due to high and low voltage faults, etc.;
condition 3: the detached OBU is successfully issued and activated;
condition 4: identity authentication response errors or connection confirmation errors of periodic communication;
condition 5: the bus fault does not exist, but the identity authentication fails or the response message of the identity authentication request cannot be received;
condition 6: after activation, a bus error is detected.
The various states in FIG. 3 are described as follows:
state 1 (disabled state): initial state after initial power-up or awakening, in which the transaction function is disabled.
Firstly, the OBU periodically sends an identity authentication request until a correct authentication response is received, and then enters a state 2;
when a CAN bus fault (such as busoff) is detected, the state is kept in the state 1, the sending of the authentication message is stopped, the CAN controller is restarted, and the sending of the authentication message is attempted;
and thirdly, when no CAN bus fault is detected, but the authentication request is overtime (timeout), the state 3 is entered.
State 2 (normal state): a normal operating state in which the transaction function is enabled.
Detecting a bus fault, and randomly entering a state 1;
if there is no bus fault but the connection confirmation request is overtime (timeout), then enter state 3;
state 2 if the correct connection confirmation response can be received;
state 3 (detached state): in this state, the tamper bit in the ESAM is cleared and the transaction cannot be completed.
After being normally activated, detecting that no CAN bus fault exists, and switching to a state 2 from the state;
secondly, after the CAN bus is normally activated, the CAN bus is detected to be in fault, and the state is switched to the state 1.
By setting the various states in fig. 3, the safety of the in-vehicle electronic label device is further improved.
Corresponding to the above method embodiment, referring to fig. 5, an embodiment of the present disclosure further provides a detachment prevention apparatus 50 for a vehicle-mounted electronic tag device, including:
the control module 501 is configured to control the vehicle-mounted electronic tag device to perform a wake-up operation;
the authentication module 502 is configured to perform identity authentication on the vehicle-mounted electronic tag device through a first communication protocol with a vehicle-mounted ECU after the vehicle-mounted electronic tag device is awakened;
the communication module 503 is configured to perform periodic encrypted communication with the vehicle-mounted ECU through a second communication protocol by the vehicle-mounted electronic tag device after the identity authentication is completed;
the sleep module 504 is configured to, after the vehicle-mounted electronic tag device receives a sleep trigger event, acquire link release response information sent by the vehicle-mounted ECU, stop encrypted communication between the vehicle-mounted electronic tag device and the vehicle-mounted ECU, and perform a sleep operation on the vehicle-mounted electronic tag device based on a third communication protocol.
The apparatus shown in fig. 5 may correspondingly execute the content in the above method embodiment, and details of the part not described in detail in this embodiment refer to the content described in the above method embodiment, which is not described again here.
Referring to fig. 6, an embodiment of the present disclosure further provides an electronic device 60, where the electronic device 60 may be a mobile terminal or an electronic device as referred to in the foregoing embodiments. The electronic device may include:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the anti-tamper method of the vehicle-mounted electronic tag device in the foregoing method embodiment.
The embodiment of the disclosure also provides a non-transitory computer readable storage medium, which stores computer instructions for causing the computer to execute the tamper-proofing method of the vehicle-mounted electronic tag device in the foregoing method embodiment.
The disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform the in-vehicle electronic label device tamper-proofing method in the aforementioned method embodiments.
Referring now to FIG. 6, a schematic diagram of an electronic device 60 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device 60 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 60 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 60 to communicate with other devices wirelessly or by wire to exchange data. While the figures illustrate an electronic device 60 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, enable the electronic device to implement the schemes provided by the method embodiments.
Alternatively, the computer readable medium carries one or more programs, which when executed by the electronic device, enable the electronic device to implement the schemes provided by the method embodiments.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or configuration server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present disclosure should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (11)

1. The method for preventing the disassembly of the vehicle-mounted electronic label equipment is characterized by comprising the following steps:
controlling the vehicle-mounted electronic tag equipment to execute a wake-up operation;
after the vehicle-mounted electronic tag equipment is awakened, the identity authentication is carried out on the vehicle-mounted electronic tag equipment through a first communication protocol between the vehicle-mounted electronic tag equipment and a vehicle-mounted ECU;
after the identity authentication is completed, the vehicle-mounted electronic tag equipment carries out periodic encrypted communication with the vehicle-mounted ECU through a second communication protocol;
and after the vehicle-mounted electronic tag equipment receives a dormancy triggering event, acquiring link release response information sent by the vehicle-mounted ECU, stopping encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU, and executing dormancy operation on the vehicle-mounted electronic tag equipment based on a third communication protocol.
2. The method according to claim 1, wherein the authenticating the vehicle-mounted electronic tag device through the first communication protocol with the vehicle-mounted ECU after the vehicle-mounted electronic tag device wakes up comprises:
controlling the vehicle-mounted electronic label equipment to send an authentication handshake request to the vehicle-mounted ECU;
after the vehicle-mounted electronic tag equipment receives the encrypted seed sent by the vehicle-mounted ECU, sending a secret key to the vehicle-mounted ECU;
and after the vehicle-mounted electronic label equipment receives the authentication completion identification sent by the vehicle-mounted ECU, completing the identity authentication.
3. The method according to claim 1, wherein after the vehicle-mounted electronic tag device wakes up, the identity authentication is performed on the vehicle-mounted electronic tag device through a first communication protocol with a vehicle-mounted ECU, and further comprising:
after the vehicle-mounted electronic tag equipment is powered on, sending an authentication request to a vehicle-mounted ECU (electronic control unit) at a vehicle end;
the vehicle-mounted ECU at the vehicle end encrypts the authentication request and returns the encrypted authentication request to the vehicle-mounted electronic label device;
the vehicle-mounted electronic tag equipment judges whether the anti-dismantling function is normal or not by comparing the encrypted data, and sends the anti-dismantling state to the vehicle end so as to continue to execute the subsequent encrypted communication process under the condition that the anti-dismantling function is normal.
4. The method according to claim 1, wherein after the vehicle-mounted electronic tag device wakes up, the identity authentication is performed on the vehicle-mounted electronic tag device through a first communication protocol with a vehicle-mounted ECU, and further comprising:
sequentially executing random number generation encryption operation and keyword encryption and decryption operation between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU; wherein
In the process of random number generation encryption operation, after being electrified, the vehicle-mounted electronic tag equipment sends an authentication request to a vehicle-mounted ECU (electronic control unit) at a vehicle end; a vehicle-mounted ECU at a vehicle end generates a public key and sends the public key to vehicle-mounted electronic label equipment; the vehicle-mounted electronic tag equipment end generates a random number, encrypts the random number by using a public key and sends the encrypted random number to a vehicle-mounted ECU (electronic control unit) of the vehicle end;
in the operation process of encrypting and decrypting the keywords, after a vehicle-mounted ECU at the vehicle end decrypts the random number, the random number is used for generating the encrypted keywords and the encrypted keywords are sent to a vehicle-mounted electronic tag equipment end; the vehicle-mounted electronic tag equipment decrypts the encrypted keyword, executes anti-dismantling state authentication and updating, and sends an authentication result to a vehicle-mounted ECU (electronic control unit) of the vehicle end, so that a subsequent encrypted communication process is continuously executed under the condition that the anti-dismantling function is normal.
5. The method according to claim 1, wherein the periodic encrypted communication of the vehicle-mounted electronic label device with the vehicle-mounted ECU through a second communication protocol after the identity authentication is completed comprises:
in each communication period, communication content between the vehicle-mounted electronic tag device and the vehicle-mounted ECU is re-encrypted;
different encrypted ciphertexts are set in different communication periods.
6. The method according to claim 1, wherein the obtaining of the link release response information sent by the vehicle-mounted ECU after the vehicle-mounted electronic tag device receives the sleep trigger event, stopping encrypted communication between the vehicle-mounted electronic tag device and the vehicle-mounted ECU, and performing a sleep operation on the vehicle-mounted electronic tag device based on a third communication protocol includes:
the vehicle-mounted electronic tag equipment sends an authentication waving request to the vehicle-mounted ECU;
after the vehicle-mounted electronic tag equipment receives the hand waving confirmation signal sent by the vehicle-mounted ECU, encrypted communication is stopped, and then the sleeping operation of the vehicle-mounted electronic tag equipment is started.
7. The method according to claim 1, wherein after controlling the vehicle-mounted electronic label device to perform the wake-up operation, the method further comprises:
and controlling the vehicle-mounted electronic label equipment to be in a disabled state, wherein the vehicle-mounted electronic label equipment cannot execute a transaction function in the disabled state.
8. The method of claim 7, further comprising:
after the identity authentication is successful, switching the vehicle-mounted electronic label equipment from a disabled state to a normal state, wherein in the normal state, the transaction function of the vehicle-mounted electronic label equipment is enabled;
and under the normal state, when the vehicle-mounted electronic label equipment has abnormal periodic communication, the vehicle-mounted electronic label equipment is switched from the normal state to the disabled state.
9. The method of claim 8, further comprising:
in the disassembly state, after the vehicle-mounted electronic label equipment is successfully issued and activated, switching the state of the vehicle-mounted electronic label equipment from the disassembly state to the normal state;
in a normal state, after the identity authentication response error of the vehicle-mounted electronic label equipment or the connection confirmation error of the periodic communication, switching the vehicle-mounted electronic label equipment from the normal state to a disassembly state;
in a disabled state, when no bus fault exists but the identity authentication fails or a response message of an identity authentication request cannot be received, switching the vehicle-mounted electronic label equipment from the disabled state to a detached state;
in the disassembly state, after the vehicle-mounted electronic tag equipment is activated and detects a bus error, the vehicle-mounted electronic tag equipment is switched from the disassembly state to the disabled state.
10. The utility model provides a device is prevented tearing open by on-vehicle electronic tags equipment which characterized in that includes:
the control module is used for controlling the vehicle-mounted electronic tag equipment to execute awakening operation;
the authentication module is used for authenticating the identity of the vehicle-mounted electronic tag equipment through a first communication protocol between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU after the vehicle-mounted electronic tag equipment is awakened;
the communication module is used for carrying out periodical encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU through a second communication protocol after the identity authentication is finished;
and the dormancy module is used for acquiring link release response information sent by the vehicle-mounted ECU after the vehicle-mounted electronic tag equipment receives a dormancy trigger event, stopping encrypted communication between the vehicle-mounted electronic tag equipment and the vehicle-mounted ECU, and executing dormancy operation on the vehicle-mounted electronic tag equipment based on a third communication protocol.
11. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-9.
CN202011491356.1A 2020-12-17 2020-12-17 Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment Active CN112652080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011491356.1A CN112652080B (en) 2020-12-17 2020-12-17 Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011491356.1A CN112652080B (en) 2020-12-17 2020-12-17 Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment

Publications (2)

Publication Number Publication Date
CN112652080A true CN112652080A (en) 2021-04-13
CN112652080B CN112652080B (en) 2023-02-21

Family

ID=75354544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011491356.1A Active CN112652080B (en) 2020-12-17 2020-12-17 Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment

Country Status (1)

Country Link
CN (1) CN112652080B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113453223A (en) * 2021-06-07 2021-09-28 北京聚利科技有限公司 Key updating method, system, device, storage medium and terminal
CN114900314A (en) * 2022-04-27 2022-08-12 北京万集科技股份有限公司 Electronic anti-dismantling method and system, readable storage medium and OBU device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001016015A (en) * 1999-06-29 2001-01-19 Matsushita Electric Ind Co Ltd Roadside antenna system
CN103247085A (en) * 2013-05-20 2013-08-14 北京速通科技有限公司 Front-mounted electronic toll collection (ETC) on board unit online publication system and method
CN203630825U (en) * 2013-12-17 2014-06-04 北京万集科技股份有限公司 ETC electronic tag electronic anti-detaching device based on wireless communication
CN205230145U (en) * 2015-12-24 2016-05-11 北京万集科技股份有限公司 Anti -disassembly device that ETC electronic tags is wireless based on automotive electronics sign
CN105631952A (en) * 2014-10-27 2016-06-01 上海华虹集成电路有限责任公司 ETC vehicle-mounted terminal self-activation method and device
CN109242994A (en) * 2017-07-10 2019-01-18 北京握奇智能科技有限公司 A kind of antiwithdrawal device of blue tooth vehicular unit OBU
CN111667596A (en) * 2020-05-19 2020-09-15 北京汽车股份有限公司 Vehicle integration system
CN111968256A (en) * 2020-08-20 2020-11-20 中国第一汽车股份有限公司 Electronic tag anti-dismounting method and device, vehicle and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001016015A (en) * 1999-06-29 2001-01-19 Matsushita Electric Ind Co Ltd Roadside antenna system
CN103247085A (en) * 2013-05-20 2013-08-14 北京速通科技有限公司 Front-mounted electronic toll collection (ETC) on board unit online publication system and method
CN203630825U (en) * 2013-12-17 2014-06-04 北京万集科技股份有限公司 ETC electronic tag electronic anti-detaching device based on wireless communication
CN105631952A (en) * 2014-10-27 2016-06-01 上海华虹集成电路有限责任公司 ETC vehicle-mounted terminal self-activation method and device
CN205230145U (en) * 2015-12-24 2016-05-11 北京万集科技股份有限公司 Anti -disassembly device that ETC electronic tags is wireless based on automotive electronics sign
CN109242994A (en) * 2017-07-10 2019-01-18 北京握奇智能科技有限公司 A kind of antiwithdrawal device of blue tooth vehicular unit OBU
CN111667596A (en) * 2020-05-19 2020-09-15 北京汽车股份有限公司 Vehicle integration system
CN111968256A (en) * 2020-08-20 2020-11-20 中国第一汽车股份有限公司 Electronic tag anti-dismounting method and device, vehicle and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113453223A (en) * 2021-06-07 2021-09-28 北京聚利科技有限公司 Key updating method, system, device, storage medium and terminal
CN114900314A (en) * 2022-04-27 2022-08-12 北京万集科技股份有限公司 Electronic anti-dismantling method and system, readable storage medium and OBU device

Also Published As

Publication number Publication date
CN112652080B (en) 2023-02-21

Similar Documents

Publication Publication Date Title
US10218702B2 (en) Vehicle access systems and methods
JP3156562B2 (en) Vehicle communication device and traveling vehicle monitoring system
CN112652080B (en) Anti-dismounting method and device for vehicle-mounted electronic label equipment and electronic equipment
US20210157570A1 (en) Vehicle master device, installation instruction determination method and computer program product
EP3403246A1 (en) A device, method and system for collecting user-based insurance data in vehicles
WO2009045523A1 (en) Encryption-based authentication for binding modules
CN103649964A (en) Secure hosted execution architecture
CN113259933B (en) Key updating method, gateway, control device, electronic equipment and medium
CN111959436B (en) Method and device for realizing remote vehicle locking through automobile combination instrument
CN111968256A (en) Electronic tag anti-dismounting method and device, vehicle and storage medium
CN113645590A (en) Method, apparatus, device and medium for remotely controlling vehicle based on encryption algorithm
CN113442870B (en) Method and device for deactivating vehicle-mounted unit, storage medium and terminal
CN112148312A (en) Firmware upgrading management method, device, equipment and medium for electronic controller
CN105243706A (en) Control method, control device and control system of entrance and exit of vehicles in garage
CN113453223B (en) Key updating method, system, device, storage medium and terminal
KR20140069596A (en) Method and System for Information Management in Secure Element
US11876898B2 (en) Vehicle master device, security access key management method, security access key management program and data structure of specification data
CN110717770B (en) Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts
CN112105000B (en) Method, apparatus and computer storage medium for authorizing a vehicle based on bluetooth
CN111667596A (en) Vehicle integration system
JP5269408B2 (en) Anti-theft device
CN113077558B (en) PSAM card two-stage online authorization authentication method, device and system
CN101807276A (en) Security management and supervision system of traffic management software and application method thereof
CN114745695A (en) Certificate processing method, device, equipment and storage medium
CN111142902B (en) Method and device for protecting upgrading firmware of processor and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant