CN113079511B - Method, device, vehicle and storage medium for sharing information between vehicles - Google Patents

Method, device, vehicle and storage medium for sharing information between vehicles Download PDF

Info

Publication number
CN113079511B
CN113079511B CN201911304056.5A CN201911304056A CN113079511B CN 113079511 B CN113079511 B CN 113079511B CN 201911304056 A CN201911304056 A CN 201911304056A CN 113079511 B CN113079511 B CN 113079511B
Authority
CN
China
Prior art keywords
information
verification
vehicle
target vehicle
vehicles
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911304056.5A
Other languages
Chinese (zh)
Other versions
CN113079511A (en
Inventor
叶紫光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Henan Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Henan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Henan Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201911304056.5A priority Critical patent/CN113079511B/en
Publication of CN113079511A publication Critical patent/CN113079511A/en
Application granted granted Critical
Publication of CN113079511B publication Critical patent/CN113079511B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/46Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Traffic Control Systems (AREA)

Abstract

The embodiment of the invention provides a method, equipment, a vehicle and a storage medium for information sharing among vehicles, wherein the method comprises the following steps: broadcasting an information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein the vehicle that transmits the response information stores shared information that satisfies the shared demand information; the response information comprises identification information of the vehicle; determining a target vehicle with information sharing according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles; and under the condition that the identity verification of the target vehicle is successful, sending an information acquisition request to the target vehicle, and receiving the sharing information meeting the sharing requirement information sent by the target vehicle. The embodiment of the invention can realize information sharing among vehicles under the condition of ensuring the security of the private information of the user.

Description

Method, device, vehicle and storage medium for sharing information between vehicles
Technical Field
The present invention relates to the field of internet of vehicles, and in particular, to a method for sharing information between vehicles, a vehicle-mounted communication device, a vehicle, and a computer readable storage medium.
Background
With the technology of 5G, internet, big data, cloud computing, artificial intelligence and the like entering the vehicle field, the innovation of the vehicle industry is brought, and the Internet of vehicles is used as a product of fusing the technology of 5G, internet, big data, cloud computing, artificial intelligence and the like, and is a typical application of the Internet of things technology in the traffic system field.
Along with the development of the internet of vehicles technology, the safety problem of the internet of vehicles is getting more and more attention, and how to realize information sharing among vehicles under the condition of guaranteeing the security of private information of users has become one of the key problems of the current internet of vehicles technology research.
Disclosure of Invention
The embodiment of the invention aims to provide a method, equipment, a vehicle and a storage medium for information sharing among vehicles, which can realize information sharing among vehicles under the condition of ensuring the security of private information of users.
In order to solve the technical problems, the embodiment of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a method for sharing information between vehicles, including:
Broadcasting an information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information;
receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle;
determining an information sharing target vehicle according to the response information, selecting at least two verification vehicles in the internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles;
and under the condition that the identity verification of the target vehicle is successful, sending an information acquisition request to the target vehicle, and receiving the shared information meeting the shared demand information sent by the target vehicle.
In a second aspect, an embodiment of the present invention provides an in-vehicle communication apparatus, including:
the communication module is used for broadcasting information sharing requests through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle;
The processing module is used for determining an information sharing target vehicle according to the response information, selecting at least two verification vehicles in the internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles;
the communication module is further configured to send an information acquisition request to the target vehicle and receive sharing information meeting the sharing requirement information sent by the target vehicle when the target vehicle authentication is successful.
In a third aspect, an embodiment of the present invention provides a vehicle, including the in-vehicle communication device of the second aspect.
In a fourth aspect, an embodiment of the present invention provides a computer readable storage medium, where a computer program is stored, where the computer program is executed by a processor to implement the method for sharing information between vehicles according to the first aspect.
The method for sharing information between vehicles, the vehicle-mounted communication equipment, the vehicle and the computer readable storage medium provided by the embodiment of the invention broadcast information sharing requests through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle; determining a target vehicle with information sharing according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles; under the condition that the identity verification of the target vehicle is successful, an information acquisition request is sent to the target vehicle, and sharing information meeting the sharing requirement information sent by the target vehicle is received; the identity of the target vehicle for information sharing is verified by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, and the target vehicle is subjected to information sharing after the target vehicle is successfully verified, so that the accuracy of an identity verification result can be ensured, the safety of information sharing is ensured, the hardware equipment of the vehicles is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the privacy information safety of users.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of one implementation of a method for information sharing between vehicles according to an embodiment of the present invention;
FIG. 2 is a flow chart of one implementation of the present invention for verifying the identity of a target vehicle by verifying the vehicle;
FIG. 3 is a flow chart of an implementation of receiving shared information sent by a target vehicle according to an embodiment of the present invention;
FIG. 4 is a flow chart of another implementation of receiving shared information sent by a target vehicle according to an embodiment of the present invention;
FIG. 5 is a flow chart of another implementation of a method for information sharing between vehicles according to an embodiment of the present invention;
FIG. 6 is a flow chart of yet another implementation of a method for information sharing between vehicles according to an embodiment of the present invention;
FIG. 7 is a flow chart of yet another implementation of a method for information sharing between vehicles according to an embodiment of the present invention;
FIG. 8 is a flow diagram of one implementation of an embodiment of the present invention for sending shared information to a requesting vehicle;
FIG. 9 is a flow chart of another implementation of sending shared information to a requesting vehicle in accordance with an embodiment of the present invention;
fig. 10 is a schematic diagram of an application scenario of a method for information sharing between vehicles according to an embodiment of the present invention;
fig. 11 is a schematic diagram of a composition structure of a vehicle-mounted communication device according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of an in-vehicle communication device embodying various embodiments of the present invention.
Detailed Description
In order to make the technical solution of the present invention better understood by those skilled in the art, the technical solution of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, shall fall within the scope of the invention.
Fig. 1 is a flow chart of an implementation manner of a method for sharing information between vehicles according to an embodiment of the present invention, where the method in fig. 1 may be performed by a vehicle-mounted communication device in a vehicle as an execution body, where the vehicle-mounted communication device may implement information sharing between vehicles by accessing a vehicle network, as shown in fig. 1, and the method at least includes:
s102, broadcasting an information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information.
In the embodiment of the invention, the Internet of vehicles can be constructed based on 5G, and because the 5G has the characteristics of high bandwidth, low delay and the like, the Internet of vehicles constructed based on 5G can better meet the requirement of the Internet of vehicles on real-time performance in the aspects of information interaction, information sharing and the like, but the embodiment of the invention does not limit the form of the Internet of vehicles.
In the embodiment of the present invention, the information sharing request may be generated according to an operation instruction of a user, and sent to the internet of things in a broadcast manner, where the operation instruction of the user may be generated by an operation of the user, for example: the mode of generating the information sharing request is not limited in the embodiment of the invention, such as voice operation or manual operation of the user.
In an embodiment of the present invention, the information sharing request may include sharing requirement information, and content of the sharing requirement information may be determined according to requirement of information sharing, for example: when the requirement of information sharing is that the road condition information in front is desired to be acquired, the sharing requirement information may include information such as information acquisition time and information acquisition position, and the information sharing request may also include information of the sharing requirement information. In the embodiment of the present invention, a vehicle that issues an information sharing request may be referred to as a requesting vehicle, and the information sharing request may further include identification information of the requesting vehicle.
Alternatively, the sharing requirement information may be directly input by the user, for example: receiving sharing requirement information such as information acquisition time, information acquisition position and the like which are directly input by a user through a dialog box or a microphone; alternatively, the sharing requirement information may be automatically generated according to the requirement of information sharing, for example: the information sharing requirement is that road condition information of a road intersection in front is obtained, and sharing requirement information such as information acquisition time, information acquisition positions and the like is automatically generated according to the information sharing requirement and by combining a map; the embodiment of the invention does not limit the acquisition mode of the sharing requirement information.
S104, receiving response information sent by vehicles in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information includes identification information of the vehicle.
In the embodiment of the invention, after a vehicle in the Internet of vehicles receives an information sharing request, information stored in the vehicle is matched with sharing requirement information in the information sharing request, whether the vehicle stores the sharing information meeting the sharing requirement information or not is judged, and if the vehicle stores the sharing information meeting the sharing requirement information, response information is sent to a requesting vehicle according to the identification information of the vehicle in the information sharing request.
In the embodiment of the present invention, the vehicle that sends out the response information may be referred to as a response vehicle, and the response information may include identification information of the response vehicle. In the embodiment of the invention, the identification information of the vehicle is information capable of carrying out unique identification on the vehicle. Optionally, the identification information of the vehicle may be an existing number such as a license plate number, a vehicle identification code (Vehicle Identification Number, abbreviated as VIN), a vehicle engine number, a driver license number of the user, a mobile phone number of the user, etc.; or, the identification information of the vehicle may be a number set for the vehicle by the internet of vehicles, and the form of the identification information of the vehicle is not limited in the embodiment of the invention.
Optionally, the response information may further include current speed information, position information, and the like of the response vehicle, and the embodiment of the invention does not limit the content of the response information.
S106, determining the target vehicle with the information sharing according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles.
In the embodiment of the invention, the target vehicle for information sharing can be determined according to the number of the received response messages. Optionally, if only one response message is received, the response vehicle corresponding to the response message may be determined as the target vehicle for information sharing; if more than two response messages are received, one response message can be randomly selected, and a response vehicle corresponding to the response message is determined to be a target vehicle for information sharing; if no response information is received, the execution is resumed from S102.
In some optional examples, when the response information further includes current speed information and position information of the response vehicle, if more than two response information are received, the time when the response vehicle meets the request vehicle can be determined according to the current speed information and position information of the response vehicle and the current speed information and position information of the request vehicle in the response information, and the response vehicle with the shortest meeting time, namely the response vehicle which meets the request vehicle first, is determined as the target vehicle of information sharing. At this time, if there are more than two response vehicles meeting at the same time, one response vehicle may be selected randomly to be determined as the target vehicle for information sharing.
In the embodiment of the invention, after the verification vehicle is selected, the identification information of the target vehicle can be sent to the verification vehicle, the verification information generated by the verification vehicle according to the identification information of the target vehicle is received, and the identity of the target vehicle is verified according to the verification information of the verification vehicle. Alternatively, the verification vehicle may acquire the information of the target vehicle from the identification information of the target vehicle, for example: information such as the speed and/or the position of the target vehicle is acquired, and verification information is generated according to the acquired information of the target vehicle. The embodiment of the invention does not limit the implementation way of carrying out identity verification on the target vehicle through the verification vehicle.
In some alternative examples, a time of information acquisition may be determined first, for example: the time of information acquisition can be randomly determined, after the verification vehicle is selected, the identification information of the target vehicle and the time of information acquisition can be sent to the verification vehicle, the verification information generated by the verification vehicle according to the identification information of the target vehicle and the time of information acquisition is received, and the identity verification is carried out on the target vehicle according to the verification information of the verification vehicle. The verification vehicle can acquire the time speed information and the position information of the target vehicle acquired by the information according to the identification information of the target vehicle, and generate the verification information according to the speed information and the position information of the target vehicle at the time acquired by the information.
In some alternative examples, the authentication of the target vehicle may be performed by comparing authentication information obtained from the authentication vehicle with authentication information generated by the requesting vehicle itself based on identification information of the target vehicle, for example, based on the authentication information of the authentication vehicle: if the verification information obtained from the verification vehicle is the same as the verification information generated by the request vehicle, the identity verification of the target vehicle is successful, otherwise, the identity verification of the target vehicle fails. In other alternative examples, the target vehicle may be authenticated by comparing the authentication information of the authenticated vehicle based on the authentication information of the authenticated vehicle, for example: if the verification information of the verification vehicles is the same, the identity verification of the target vehicles is successful, otherwise, the identity verification of the target vehicles fails.
S108, when the identity verification of the target vehicle is successful, an information acquisition request is sent to the target vehicle, and sharing information meeting the sharing requirement information sent by the target vehicle is received.
Optionally, under the condition that the identity verification of the target vehicle is successful, speed information and position information of the target vehicle can be acquired in real time, the distance between the target vehicle and the request vehicle is determined according to the speed information and the position information of the target vehicle and the speed information and the position information of the request vehicle, the distance is compared with a preset distance threshold, and when the distance is smaller than the preset distance threshold, an information acquisition request is sent to the target vehicle.
Optionally, after receiving the information acquisition request, the target vehicle may encrypt the shared information that satisfies the shared demand information, and send the encrypted shared information to the requesting vehicle, and after receiving the encrypted shared information, the requesting vehicle may decrypt the encrypted shared information to obtain the shared information that satisfies the shared demand information. In some alternative examples, the target vehicle may perform asymmetric encryption processing on the shared information by using a public key of the requesting vehicle to obtain encrypted shared information, and the requesting vehicle may perform decryption processing on the encrypted shared information by using a private key to obtain shared information. In other optional examples, the target vehicle may encrypt the shared information by using the sending time of the information acquisition request to obtain encrypted shared information, and the requesting vehicle may decrypt the encrypted shared information by using the sending time of the information acquisition request to obtain shared information. The implementation method of the shared information encryption and decryption is not limited by the embodiment of the invention.
Optionally, after receiving the information acquisition request, the target vehicle may generate tag verification information of the target vehicle according to the verification information generated by the verification vehicle, and the requesting vehicle may receive the tag verification information sent by the target vehicle while receiving the shared information sent by the target vehicle, and the requesting vehicle may first perform identity tag verification on the target vehicle according to the tag verification information, where the shared information received from the target vehicle is used as the shared information that is hoped to be obtained when the identity tag verification of the target vehicle is successful. In some optional examples, the target vehicle may perform asymmetric encryption processing on the verification information through a public key of the requesting vehicle to obtain the verification information, and the requesting vehicle may perform decryption processing on the verification information through a private key to obtain the verification information. In other alternative examples, the target vehicle may encrypt the verification by the sending time of the information obtaining request to obtain the verification information, and the requesting vehicle may decrypt the verification information by the sending time of the information obtaining request to obtain the verification information. The method for obtaining the signature verification information in the embodiment of the invention is not limited.
According to the method for sharing information among vehicles, provided by the embodiment of the invention, the information sharing request is broadcast through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle; determining a target vehicle with information sharing according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles; under the condition that the identity verification of the target vehicle is successful, an information acquisition request is sent to the target vehicle, and sharing information meeting the sharing requirement information sent by the target vehicle is received; the identity of the target vehicle with information sharing is verified by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, and the target vehicle is subjected to information sharing after the target vehicle is successfully verified, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicles is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of users.
The method of information sharing between vehicles according to the present invention will be described in detail with reference to the embodiments of fig. 2 to 4.
FIG. 2 is a flow chart of one implementation of the present invention for verifying the identity of a target vehicle by verifying the vehicle. As shown in fig. 2, selecting at least two verification vehicles in the internet of vehicles, and performing identity verification on the target vehicle by the verification vehicles according to the identification information of the target vehicle at least includes:
s202, generating at least one random number, selecting at least two verification vehicles in the Internet of vehicles, and sending the random number, the generation time of the random number and the identification information of the target vehicle to the at least two verification vehicles.
In an embodiment of the present invention, the random number T may be generated by a random number generator 1 For example: the rand function in the C language can generate a random number T with larger value for ensuring the safety of information 1 For example: the value of the generated random number is larger than 2 10 The embodiment of the invention does not limit the generation mode and the numerical range of the random number.
Optionally, when the verification vehicles are selected in the internet of vehicles, the number of the selected verification vehicles can be manually set; alternatively, the number of verification vehicles selected may be determined based on the number of response vehicles, such as: the number of selected verification vehicles can be calculated according to the number of response vehicles through a preset proportion, wherein the preset proportion can be the proportion of the number of response vehicles to the number of verification vehicles; the embodiment of the invention does not limit the method for determining the number of the verification vehicles.
S204, receiving verification information generated by at least two verification vehicles; the verification vehicle generates verification information according to the random number, speed information and position information of the target vehicle at the generation time of the random number.
In the embodiment of the invention, the verification vehicle can acquire the speed information and the position information of the target vehicle at the generation time of the random number according to the identification information of the target vehicle,according to the preset algorithm for generating verification information, carrying out corresponding operation on the random number, the acquired speed information and position information of the target vehicle at the generation time of the random number to obtain verification information S 1 . The embodiment of the invention generates the verification information S according to the random number, the speed information and the position information of the target vehicle at the generation time of the random number 1 The method of (2) is not limited.
In some alternative examples, the preset algorithm for generating the verification information may be performing corresponding logic operation on the speed information, the location information and the random number to obtain the verification information S 1 . In other optional examples, the preset algorithm for generating the verification information may be that hash value of the speed is obtained by performing hash operation on the speed information, and corresponding logic operation is performed on the hash value of the speed, the location information and the random number to obtain the verification information S 1 . In still other alternative examples, the preset algorithm for generating the verification information may be that hash operation is performed on the location information to obtain a hash value of the location, and corresponding logic operation is performed on the speed information, the hash value of the location and the random number to obtain the verification information S 1 . In still other alternative examples, the preset algorithm for generating the verification information may be that hash values of the speed and the position are obtained by performing hash operations on the speed information and the position information, and corresponding logic operations are performed on the hash values of the speed, the hash values of the position, and the random number to obtain the verification information S 1 The method comprises the steps of carrying out a first treatment on the surface of the The hash operation performed on the speed information and the position information may be the same hash algorithm or different hash algorithms. Alternatively, existing hashing algorithms may be employed to hash the speed information and/or the position information, such as: hash algorithms such as MD4, MD5, SHA-1 and the like; hash operations on the speed information and/or the position information may also be performed by using a hash algorithm designed for the present invention, and the implementation manner of the hash operations is not limited in the embodiments of the present invention.
Alternatively, the logic operation performed on the speed information/speed hash value, the position information/position hash value, and the random number may be implemented by performing a first logic operation on the first two of them and performing a second logic operation on the result of the first logic operation and the third party, where the two logic operations may be the same logic operation or different logic operations. Alternatively, the logical operation performed on the speed information/speed hash value, the position information/position hash value, and the random number may be at least one of an and operation, an or operation, an exclusive or operation, a nand operation, a nor operation, or the like.
S206, carrying out identity verification on the target vehicle according to the verification information of at least two verification vehicles; if the verification information of at least two verification vehicles is the same, the identity verification of the target vehicle is successful; otherwise, the identity verification of the target vehicle fails.
In other alternative examples, at least two verification vehicles may also be provided with verification information S 1 Comparing the same number of verification vehicles with a preset number threshold, if the verification information S 1 If the number of the same verification vehicles is greater than a preset number threshold, the identity verification of the target vehicle is successful; otherwise, the identity verification of the target vehicle fails. The embodiment of the invention is used for verifying the verification information S of the vehicle according to the verification 1 The implementation of the authentication of the target vehicle is not limited.
According to the method, the random number is generated, verification information is generated according to the random number, the speed information of the target vehicle at the random number generation time and the position information, the identity of the target vehicle is verified, the verification information generated each time is different, the safety of the verification information is improved, and therefore the accuracy of the identity verification result can be further guaranteed.
Fig. 3 is a flowchart of an implementation manner of receiving shared information sent by a target vehicle according to an embodiment of the present invention. As shown in fig. 3, in the case that the identity verification of the target vehicle is successful, receiving the sharing information meeting the sharing requirement information sent by the target vehicle at least includes:
S302, receiving encryption information sent by a target vehicle; the encryption information comprises encrypted sharing information; and the target vehicle encrypts the shared information according to the verification information and the sending time of the information acquisition request to obtain the encrypted shared information.
In the embodiment of the present invention, the target vehicle may also receive verification information S generated by at least two verification vehicles 1 . Alternatively, the target vehicle may sequentially pass through the verification information S 1 The sending time of the information acquisition request carries out encryption processing on the shared information meeting the shared requirement information to obtain encrypted shared information; alternatively, the target vehicle may verify the information S according to a preset algorithm for generating the key 1 Performing corresponding operation on the sending time of the information acquisition request to obtain a secret key S 2 By means of a key S 2 And carrying out encryption processing on the shared information meeting the shared demand information to obtain encrypted shared information. The embodiment pair of the invention is based on the verification information S 1 The method of encrypting the shared information with the transmission time of the information acquisition request is not limited.
In some alternative examples, the preset algorithm for generating the key may be, for example, to verify the information S 1 Performing corresponding logic operation with the sending time of the information acquisition request to obtain a secret key S 2 . Optionally, to the verification information S 1 The logical operation performed with the sending time of the information acquisition request may be at least one of an and operation, an or operation, an exclusive or operation, a nand operation, a nor operation, etc., and the implementation manner of the logical operation is not limited in the embodiment of the present invention.
S304, decrypting the encrypted shared information according to the verification information and the sending time of the information acquisition request to obtain the shared information.
Alternatively, the requesting vehicle may sequentially pass the transmission time of the information acquisition request and the verification information S 1 Decrypting the encrypted shared information to obtain shared information meeting the shared demand information; alternatively, the requesting vehicle may verify the information S based on a preset algorithm for generating the key 1 Performing corresponding operation on the sending time of the information acquisition request to obtain a secret key S 2 By means of a key S 2 Decrypting the encrypted shared information to obtain the satisfactionSharing information of sharing requirement information. The embodiment pair of the invention is based on the verification information S 1 And the transmission time of the information acquisition request, the method of decrypting the encrypted shared information is not limited.
In the method of the embodiment, when the shared information is transmitted, the shared information is encrypted by the sending time of the verification information and the information acquisition request, so that the secret keys for encrypting the shared information are different each time, and the security of the shared information transmission is improved.
Fig. 4 is a flowchart of another implementation manner of receiving shared information sent by a target vehicle according to an embodiment of the present invention. As shown in fig. 4, in the case that the authentication of the target vehicle is successful, receiving the sharing information meeting the sharing requirement information sent by the target vehicle at least includes:
s402, receiving encryption information sent by a target vehicle; the encryption information comprises encrypted shared information and an encrypted secret key; the target vehicle obtains a secret key according to the verification information and the sending time of the information acquisition request; the target vehicle encrypts the shared information through the secret key to obtain encrypted shared information; and the target vehicle performs asymmetric encryption processing on the secret key through the public key of the vehicle sending the information sharing request to obtain encrypted sharing information.
In the embodiment of the present invention, the target vehicle may also receive verification information S generated by at least two verification vehicles 1 And verifying the information S according to a preset algorithm for generating the secret key 1 Performing corresponding operation on the sending time of the information acquisition request to obtain a secret key S 2 By means of a key S 2 Encrypting the shared information meeting the shared demand information to obtain encrypted shared information, and transmitting the public key pair key S of the vehicle requesting the information sharing 2 And (3) performing asymmetric encryption processing to obtain an encrypted key, and transmitting the encrypted key as signature verification information of the target vehicle and the encrypted shared information simultaneously. The embodiment pair of the invention is based on the verification information S 1 And the method of generating the key at the transmission time of the information acquisition request are not limited.
S404, decrypting the encrypted key through the private key to obtain the key, and recovering the verification information from the key according to the sending time of the information acquisition request.
In the embodiment of the invention, the request vehicle can decrypt the encrypted key through the private key to obtain the key S 2 And based on a preset algorithm for generating the key, the key S is obtained according to the sending time of the information acquisition request 2 Is restored to the verification information S 1
S406, carrying out identity verification on the target vehicle according to the verification information restored from the secret key and the verification information received from the verification vehicle.
In the embodiment of the invention, the slave key S can be used for 2 Verification information S restored from the medium 1 With verification information S received from a verification vehicle 1 Comparing, if the slave key S 2 Verification information S restored from the medium 1 With verification information S received from a verification vehicle 1 If the identity of the target vehicle is the same, the identification verification of the target vehicle is successful; otherwise, the identity verification of the target vehicle fails.
S408, under the condition that the target vehicle identity verification is successful, the encrypted shared information is decrypted through the secret key, and the shared information is obtained.
In the embodiment of the invention, under the condition that the target vehicle identity verification is successful, the requesting vehicle can directly pass through the obtained secret key S 2 And decrypting the encrypted shared information to obtain the shared information meeting the shared requirement information.
According to the method, when the shared information is transmitted, the signature verification mechanism is introduced, the shared information is verified by using the verification information, so that the shared information is not hijacked in the transmission process, and the safety of the shared information is further improved.
Corresponding to the methods of fig. 1 to fig. 4, based on the same technical concept, the embodiment of the present invention further provides a method for sharing information between vehicles, fig. 5 is a schematic flow chart of another implementation manner of the method for sharing information between vehicles according to the embodiment of the present invention, and the method in fig. 5 may be performed by a vehicle-mounted communication device in a vehicle as an execution body, where the vehicle-mounted communication device may implement information sharing between vehicles by accessing to the internet of vehicles, as shown in fig. 5, and the method at least includes:
S502, receiving the identification information of the target vehicle sent by the request vehicle, and sending an information acquisition request to the target vehicle according to the identification information of the target vehicle; wherein the information acquisition request includes acquisition demand information.
S504, receiving information of the target vehicle meeting the acquisition requirement information sent by the target vehicle, and generating verification information according to the information of the target vehicle.
S506, sending verification information to the requesting vehicle.
In the embodiment of the present invention, the descriptions of S502, S504 and S506 may be referred to the description of S106 in fig. 1, so that the description will not be repeated here.
According to the method for sharing information among vehicles, which is provided by the embodiment of the invention, the identification information of the target vehicle sent by the request vehicle is received, and an information acquisition request is sent to the target vehicle according to the identification information of the target vehicle; the information acquisition request comprises acquisition requirement information; receiving information of a target vehicle meeting the acquisition requirement information sent by the target vehicle, and generating verification information according to the information of the target vehicle; transmitting verification information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
Corresponding to the method of fig. 2, based on the same technical concept, the embodiment of the present invention further provides a method for sharing information between vehicles, fig. 6 is a flowchart of another implementation manner of the method for sharing information between vehicles according to the embodiment of the present invention, where the method of fig. 6 may be performed by a vehicle-mounted communication device in a vehicle as an execution body, where the vehicle-mounted communication device may implement information sharing between vehicles by accessing to the internet of vehicles, as shown in fig. 6, and the method at least includes:
s602, receiving a random number sent by a request vehicle, the generation time of the random number and the identification information of a target vehicle, and sending an information acquisition request to the target vehicle according to the identification information of the target vehicle; wherein the information acquisition request includes a generation time of the random number.
S604, receiving speed information and position information of the target vehicle at the generation time of the random number, which are sent by the target vehicle, and generating verification information according to the random number and the speed information and the position information of the target vehicle at the generation time of the random number.
S606, the verification information is sent to the requesting vehicle.
In the embodiment of the present invention, the descriptions of S602, S604 and S606 may be referred to the descriptions of S202 and S204 in fig. 2, and will not be repeated here.
According to the method, the verification information is generated according to the random number and the speed information and the position information of the target vehicle at the generation time of the random number, the identity of the target vehicle is verified, the verification information generated each time is different, the safety of the verification information is improved, and therefore the accuracy of the identity verification result can be further guaranteed.
Corresponding to the methods described in fig. 1 to fig. 4, based on the same technical concept, the embodiment of the present invention further provides a method for sharing information between vehicles, fig. 7 is a flowchart of still another implementation manner of the method for sharing information between vehicles according to the embodiment of the present invention, where the method in fig. 7 may be performed by a vehicle-mounted communication device in a vehicle as an execution body, where the vehicle-mounted communication device may implement information sharing between vehicles by accessing to a vehicle network, as shown in fig. 7, and the method at least includes:
s702, receiving an information sharing request sent by a requesting vehicle, and judging whether sharing information meeting the sharing requirement information is stored in the vehicle according to the sharing requirement information in the information sharing request.
S704, in a case where shared information satisfying the shared demand information is stored in the vehicle, transmitting response information to the requesting vehicle; wherein the response information includes identification information of the vehicle.
S706, receiving information acquisition requests sent by at least two verification vehicles, and sending information meeting the acquisition requirement information to the at least two verification vehicles according to the acquisition requirement information in the information acquisition requests.
S708, receiving the information acquisition request sent by the requesting vehicle, and sending the sharing information satisfying the sharing requirement information to the requesting vehicle.
In the embodiment of the present invention, the descriptions of S702, S704, S706 and S706 may be referred to the descriptions of S102, S104, S106 and S108 in fig. 1, and thus will not be repeated here.
According to the method for sharing information among vehicles, provided by the embodiment of the invention, through receiving an information sharing request sent by a requesting vehicle, and according to sharing demand information in the information sharing request, whether the vehicle stores sharing information meeting the sharing demand information is judged; transmitting response information to the requesting vehicle in the case where shared information satisfying the shared demand information is stored in the vehicle; the response information comprises identification information of the vehicle; receiving information acquisition requests sent by at least two verification vehicles, and sending information meeting the acquisition requirement information to the at least two verification vehicles according to the acquisition requirement information in the information acquisition requests; receiving an information acquisition request sent by a requesting vehicle, and sending sharing information meeting sharing requirement information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
Corresponding to the method described in fig. 3, based on the same technical concept, the embodiment of the present invention further provides a method for sending shared information to a requesting vehicle, and fig. 8 is a schematic flow chart of one implementation manner of sending shared information to a requesting vehicle according to the embodiment of the present invention, where, as shown in fig. 8, sending shared information to the requesting vehicle at least includes:
s802, receiving an information acquisition request sent by a requesting vehicle, and carrying out encryption processing on the shared information according to the verification information and the sending time of the information acquisition request to obtain encrypted shared information.
S804, sending encryption information to the requesting vehicle; wherein the encrypted information includes encrypted shared information.
In the embodiment of the present invention, the descriptions of S802 and S804 may be referred to the descriptions of S108 in fig. 1 and S302 in fig. 3, so that the descriptions will not be repeated here.
In the method of the embodiment, when the shared information is transmitted, the shared information is encrypted by the sending time of the verification information and the information acquisition request, so that the secret keys for encrypting the shared information are different each time, and the security of the shared information transmission is improved.
Corresponding to the method described in fig. 4, based on the same technical concept, the embodiment of the present invention further provides another method for sending shared information to a requesting vehicle, and fig. 9 is a schematic flow chart of another implementation of the shared information sent to the requesting vehicle according to the embodiment of the present invention, where, as shown in fig. 9, sending the shared information to the requesting vehicle at least includes:
S902, receiving an information acquisition request sent by a requesting vehicle, and obtaining a secret key for the shared information according to the verification information and the sending time of the information acquisition request.
S904, encrypting the shared information through the secret key to obtain encrypted shared information.
S906, carrying out asymmetric encryption processing on the secret key by requesting the public key of the vehicle to obtain encrypted shared information.
S908, sending encryption information to the requesting vehicle; wherein the encrypted information includes encrypted shared information and an encrypted key.
In the embodiment of the present invention, the descriptions of S902, S904, S906, and S908 may be referred to in fig. 1 for S108 and fig. 4 for S402, so that the descriptions will not be repeated here.
According to the method, when the shared information is transmitted, the signature verification mechanism is introduced, the shared information is verified by using the verification information, so that the shared information is not hijacked in the transmission process, and the safety of the shared information is further improved.
Fig. 10 is a schematic diagram of an application scenario of a method for information sharing between vehicles according to an embodiment of the present invention. As shown in fig. 10, when a vehicle a traveling from north to south and a vehicle B traveling from north to south are traveling simultaneously on the same road, and the vehicle a wants to share road condition information in front of the vehicle a from the vehicle B when the vehicle a meets the vehicle B, the method for sharing information between vehicles provided by the embodiment of the invention can be implemented according to the following procedures:
The vehicle A firstly broadcasts an information sharing request through the Internet of vehicles, wherein the information sharing request comprises sharing requirement information, namely information such as information acquisition time and information acquisition position. For example, the sharing requirement information is: the road conditions from the south to the north are collected from the three-way and the morning and the Xue road intersection to the three-way and the Xinyuan road intersection in the 10:35-10:40 of the xx year, the Xue and the Xue day.
After receiving the information sharing request, the vehicle B determines whether shared information satisfying the information acquisition time, the information acquisition position and the like is stored in the vehicle, and if the shared information satisfying the information acquisition time, the information acquisition position and the like is stored in the vehicle B, response information is sent to the vehicle a, wherein the response information comprises identification information, current speed information and position information of the vehicle B.
When the vehicle A receives a plurality of response messages, the time when the response vehicle meets the vehicle A is determined according to the current speed information and the current position information of the response vehicle and the current speed information and the current position information of the vehicle A, and the vehicle B which meets the vehicle A first is determined as a target vehicle for information sharing.
Vehicle a performs authentication on vehicle B by:
1) Vehicle A generates a random number T 1 Meanwhile, the vehicle A randomly selects n verification vehicles in the vehicle network and sends a random number T to the n verification vehicles 1 The generation time of the random number and the identification information of the vehicle B, wherein n is an integer and n is equal to or greater than 2.
2) Each verification vehicle acquires speed information and position information of the vehicle B at the generation time of the random number according to the identification information of the vehicle B, and performs the following operation:
verifying information
Authentication information S to be obtained 1 To vehicle a and vehicle B.
3) If the vehicle A receives the verification information S of all n verification vehicles 1 And n pieces of verification information S 1 And if the identity of the vehicle B is the same, the identity verification of the vehicle B is successful.
The vehicle A acquires the speed information and the position information of the vehicle B in real time, determines the distance between the vehicle B and the vehicle A according to the speed information and the position information of the vehicle B and the speed information and the position information of the vehicle A, and sends an information acquisition request to the vehicle B if the distance is smaller than a preset distance threshold.
After receiving the information acquisition request, the vehicle B passes through the secret keyCalculate key S 2 Through S 2 Encrypting shared information satisfying information acquisition time, information acquisition position, and the like, and encrypting the key S by the public key of the vehicle a 2 Asymmetric encryption is performed.
The vehicle B transmits encrypted information to the vehicle a, wherein the encrypted information includes encrypted shared information and an asymmetrically encrypted key.
After receiving the encryption information, the vehicle A decrypts the asymmetrically encrypted key through the private key to obtain a key S 2 The slave key S is transmitted according to the request time 2 Is restored to the verification information S 1 Will be derived from the key S 2 Verification information S restored from the medium 1 With verification information S received from a verification vehicle 1 Comparing, if the identity verification of the vehicle B is the same, the vehicle B is successfully verified by the key S 2 Decrypting the encrypted shared information to obtain shared information; otherwise, the vehicle B identity verification fails, and the received encryption information is discarded.
Corresponding to the methods described in fig. 1 to fig. 4, based on the same technical concept, an embodiment of the present invention further provides a vehicle-mounted communication device, and fig. 11 is a schematic structural diagram of the vehicle-mounted communication device according to the embodiment of the present invention, where the vehicle-mounted communication device may be used to perform the method for sharing information between vehicles described in fig. 1 to fig. 4, and as shown in fig. 11, the vehicle-mounted communication device at least includes: a communication module 1110 and a processing module 1120, wherein the communication module 1110 is connected with the processing module 1120.
A communication module 1110 configured to broadcast an information sharing request through the internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information includes identification information of the vehicle.
And the processing module 1120 is used for determining the target vehicle with the information sharing according to the response information, selecting at least two verification vehicles in the internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles.
The communication module 1110 is further configured to send an information acquisition request to the target vehicle and receive sharing information that satisfies the sharing requirement information and is sent by the target vehicle, if the target vehicle authentication is successful.
In the embodiment of the present invention, the description of the communication module 1110 and the processing module 1120 may refer to the description of S102, S104, S106, S108 in fig. 1, so that the description will not be repeated here.
The vehicle-mounted communication equipment provided by the embodiment of the invention broadcasts the information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle; determining a target vehicle with information sharing according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles; under the condition that the identity verification of the target vehicle is successful, an information acquisition request is sent to the target vehicle, and sharing information meeting the sharing requirement information sent by the target vehicle is received; the identity of the target vehicle for information sharing is verified by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, and the target vehicle is subjected to information sharing after the target vehicle is successfully verified, so that the accuracy of an identity verification result can be ensured, the safety of information sharing is ensured, the hardware equipment of the vehicles is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the privacy information safety of users.
Optionally, the processing module 1120 is configured to generate at least one random number, and select at least two verification vehicles in the internet of vehicles.
The communication module 1110 is further configured to send the random number, the generation time of the random number, and identification information of the target vehicle to at least two verification vehicles; and receiving verification information generated by at least two verification vehicles; the verification vehicle generates verification information according to the random number, speed information and position information of the target vehicle at the generation time of the random number.
The processing module 1120 is configured to perform identity verification on the target vehicle according to the verification information of at least two verification vehicles; if the verification information of at least two verification vehicles is the same, the identity verification of the target vehicle is successful; otherwise, the identity verification of the target vehicle fails.
Optionally, the communication module 1110 is further configured to obtain, according to the identification information of the target vehicle, speed information and position information of the target vehicle at the time of generating the random number.
The processing module 1120 is further configured to perform hash operations on the speed information and the position information, respectively, to obtain a hash value of the speed and a hash value of the position; and performing exclusive OR operation on the hash value of the speed, the hash value of the position and the random number to obtain verification information.
Optionally, a communication module 1110, configured to receive encrypted information sent by the target vehicle; the encryption information comprises encrypted sharing information; and the target vehicle encrypts the shared information according to the verification information and the sending time of the information acquisition request to obtain the encrypted shared information.
The processing module 1120 is further configured to decrypt the encrypted shared information according to the verification information and the sending time of the information acquisition request, to obtain the shared information.
Optionally, a communication module 1110, configured to receive encrypted information sent by the target vehicle; the encryption information comprises encrypted shared information and an encrypted secret key; the target vehicle obtains a secret key according to the verification information and the sending time of the information acquisition request; the target vehicle encrypts the shared information through the secret key to obtain encrypted shared information; and the target vehicle performs asymmetric encryption processing on the secret key through the public key of the vehicle sending the information sharing request to obtain encrypted sharing information.
The processing module 1120 is further configured to decrypt the encrypted key according to the private key to obtain the key, and restore the verification information from the key according to the sending time of the information acquisition request; according to the verification information restored from the secret key and the verification information received from the verification vehicle, carrying out identity verification on the target vehicle; and under the condition that the target vehicle identity verification is successful, decrypting the encrypted shared information according to the secret key to obtain the shared information.
Optionally, if the verification information restored from the secret key is the same as the verification information received from the verification vehicle, the target vehicle identity verification is successful; otherwise, the identity verification of the target vehicle fails.
Corresponding to the methods described in fig. 5 to fig. 6, based on the same technical concept, the embodiment of the present invention further provides a vehicle-mounted communication device, where the vehicle-mounted communication device may be used to perform the method for sharing information between vehicles described in fig. 5 to fig. 6, and may be the same vehicle-mounted communication device as the vehicle-mounted communication device in fig. 11, that is, the vehicle-mounted communication device at least includes: a communication module 1110 and a processing module 1120, wherein the communication module 1110 is connected with the processing module 1120.
A communication module 1110, configured to receive identification information of a target vehicle sent by a requesting vehicle, and send an information acquisition request to the target vehicle according to the identification information of the target vehicle; the information acquisition request comprises acquisition requirement information; and receiving information of the target vehicle meeting the acquisition requirement information sent by the target vehicle, and a processing module 1120 for generating verification information according to the information of the target vehicle.
The communication module 1110 is further configured to send verification information to the requesting vehicle.
The vehicle-mounted communication equipment provided by the embodiment of the invention is used for receiving the identification information of the target vehicle sent by the request vehicle and sending an information acquisition request to the target vehicle according to the identification information of the target vehicle; the information acquisition request comprises acquisition requirement information; receiving information of a target vehicle meeting the acquisition requirement information sent by the target vehicle, and generating verification information according to the information of the target vehicle; transmitting verification information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
Optionally, the communication module 1110 is configured to receive a random number sent by the requesting vehicle, a generation time of the random number, and identification information of the target vehicle, and send an information acquisition request to the target vehicle according to the identification information of the target vehicle; wherein the information acquisition request includes a generation time of the random number; and receiving speed information and position information of the target vehicle at the generation time of the random number, which are sent by the target vehicle.
The processing module 1120 is configured to generate verification information according to the random number, the speed information of the target vehicle at the generation time of the random number, and the position information.
Corresponding to the methods described in fig. 7 to 9, based on the same technical concept, the embodiment of the present invention further provides a vehicle-mounted communication device, where the vehicle-mounted communication device may be used to perform the method for sharing information between vehicles described in fig. 7 to 9, and may be the same vehicle-mounted communication device as the vehicle-mounted communication device in fig. 11, that is, the vehicle-mounted communication device at least includes: a communication module 1110 and a processing module 1120, wherein the communication module 1110 is connected with the processing module 1120.
And a communication module 1110, configured to receive an information sharing request sent by the requesting vehicle.
The processing module 1120 is configured to determine whether the vehicle stores sharing information that satisfies the sharing requirement information according to the sharing requirement information in the information sharing request.
The communication module 1110 is further configured to send response information to the requesting vehicle when sharing information that satisfies the sharing requirement information is stored in the vehicle; the response information comprises identification information of the vehicle; receiving information acquisition requests sent by at least two verification vehicles, and sending information meeting the acquisition requirement information to the at least two verification vehicles according to the acquisition requirement information in the information acquisition requests; and receiving an information acquisition request sent by the requesting vehicle, and sending sharing information meeting the sharing requirement information to the requesting vehicle.
The vehicle-mounted communication equipment provided by the embodiment of the invention judges whether the vehicle stores the sharing information meeting the sharing requirement information or not according to the sharing requirement information in the information sharing request by receiving the information sharing request sent by the requesting vehicle; transmitting response information to the requesting vehicle in the case where shared information satisfying the shared demand information is stored in the vehicle; the response information comprises identification information of the vehicle; receiving information acquisition requests sent by at least two verification vehicles, and sending information meeting the acquisition requirement information to the at least two verification vehicles according to the acquisition requirement information in the information acquisition requests; receiving an information acquisition request sent by a requesting vehicle, and sending sharing information meeting sharing requirement information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
Optionally, the processing module 1120 is further configured to encrypt the shared information according to the verification information and the sending time of the information acquisition request, to obtain encrypted shared information.
A communication module 1110 for sending encrypted information to a requesting vehicle; wherein the encrypted information includes encrypted shared information.
Optionally, the processing module 1120 is further configured to obtain a key for the shared information according to the verification information and the sending time of the information acquisition request; encrypting the shared information through a secret key to obtain encrypted shared information; carrying out asymmetric encryption processing on the secret key by requesting the public key of the vehicle to obtain encrypted shared information;
and a communication module 1110 configured to send encrypted information to the requesting vehicle, where the encrypted information includes encrypted shared information and an encrypted key.
Fig. 12 is a schematic structural view of a vehicle-mounted communication device embodying various embodiments of the present invention, as shown in fig. 12. The vehicle-mounted communication device may have a relatively large difference due to different configurations or performances, and may include one or more processors 1201 and a memory 1202, where the memory 1202 may store one or more storage applications or data. Wherein the memory 1202 may be transient storage or persistent storage. The application programs stored in memory 1202 may include one or more modules (not shown in the figures), each of which may include a series of computer-executable instructions for use in a computer device. Still further, the processor 1201 may be configured to communicate with the memory 1202 and execute a series of computer executable instructions in the memory 1202 on a computer device. The computer device may also include one or more power supplies 1203, one or more wired or wireless network interfaces 1204, one or more input/output interfaces 1205, and one or more keyboards 1206.
The embodiment of the present invention also provides a vehicle, which includes the vehicle-mounted communication device in the above embodiment, based on the same technical concept, corresponding to the methods described in fig. 1 to 4.
The vehicle provided by the embodiment of the invention broadcasts the information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle; determining a target vehicle with information sharing according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles; under the condition that the identity verification of the target vehicle is successful, an information acquisition request is sent to the target vehicle, and sharing information meeting the sharing requirement information sent by the target vehicle is received; the identity of the target vehicle for information sharing is verified by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, and the target vehicle is subjected to information sharing after the target vehicle is successfully verified, so that the accuracy of an identity verification result can be ensured, the safety of information sharing is ensured, the hardware equipment of the vehicles is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the privacy information safety of users.
Corresponding to the methods described in fig. 5 to fig. 6, based on the same technical concept, the embodiment of the present invention further provides a vehicle, where the vehicle includes the vehicle-mounted communication device in the embodiment.
The vehicle provided by the embodiment of the invention receives the identification information of the target vehicle sent by the request vehicle, and sends an information acquisition request to the target vehicle according to the identification information of the target vehicle; the information acquisition request comprises acquisition requirement information; receiving feedback information meeting the acquisition requirement information sent by a target vehicle, and generating verification information according to the feedback information; transmitting verification information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
Corresponding to the methods described in fig. 7 to 9, based on the same technical concept, the embodiment of the present invention further provides a vehicle, which includes the vehicle including the vehicle-mounted communication device in the embodiment.
According to the vehicle provided by the embodiment of the invention, through receiving the information sharing request sent by the requesting vehicle and according to the sharing requirement information in the information sharing request, whether the sharing information meeting the sharing requirement information is stored in the vehicle is judged; transmitting response information to the requesting vehicle in the case where shared information satisfying the shared demand information is stored in the vehicle; the response information comprises identification information of the vehicle; receiving information acquisition requests sent by at least two verification vehicles, and sending feedback information meeting the acquisition requirement information to the at least two verification vehicles according to the acquisition requirement information in the information acquisition requests; receiving an information acquisition request sent by a requesting vehicle, and sending sharing information meeting sharing requirement information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
Corresponding to the methods described in fig. 1 to fig. 4, based on the same technical concept, the embodiment of the present application further provides a computer readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the following method steps are implemented:
broadcasting an information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information.
Receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information includes identification information of the vehicle.
And determining the target vehicles with the shared information according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicles according to the identification information of the target vehicles through the verification vehicles.
And under the condition that the identity verification of the target vehicle is successful, sending an information acquisition request to the target vehicle, and receiving the sharing information meeting the sharing requirement information sent by the target vehicle.
The computer readable storage medium provided by the embodiment of the application broadcasts the information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle; determining a target vehicle with information sharing according to the response information, selecting at least two verification vehicles in the Internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles; under the condition that the identity verification of the target vehicle is successful, an information acquisition request is sent to the target vehicle, and sharing information meeting the sharing requirement information sent by the target vehicle is received; the identity of the target vehicle for information sharing is verified by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, and the target vehicle is subjected to information sharing after the target vehicle is successfully verified, so that the accuracy of an identity verification result can be ensured, the safety of information sharing is ensured, the hardware equipment of the vehicles is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the privacy information safety of users.
Corresponding to the methods described in fig. 5 to 6, based on the same technical concept, the embodiment of the present application further provides a computer readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the following method steps are implemented:
receiving the identification information of the target vehicle sent by the request vehicle, and sending an information acquisition request to the target vehicle according to the identification information of the target vehicle; wherein the information acquisition request includes acquisition demand information.
And receiving information of the target vehicle meeting the acquisition requirement information, which is sent by the target vehicle, and generating verification information according to the information of the target vehicle.
The verification information is sent to the requesting vehicle.
The computer readable storage medium provided by the embodiment of the application is used for receiving the identification information of the target vehicle sent by the request vehicle and sending an information acquisition request to the target vehicle according to the identification information of the target vehicle; the information acquisition request comprises acquisition requirement information; receiving information of a target vehicle meeting the acquisition requirement information sent by the target vehicle, and generating verification information according to the information of the target vehicle; transmitting verification information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
Corresponding to the methods described in fig. 7 to 9, based on the same technical concept, the embodiment of the present application further provides a computer readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the following method steps are implemented:
and receiving an information sharing request sent by the requesting vehicle, and judging whether the vehicle stores sharing information meeting the sharing requirement information according to the sharing requirement information in the information sharing request.
Transmitting response information to the requesting vehicle in the case where shared information satisfying the shared demand information is stored in the vehicle; wherein the response information includes identification information of the vehicle.
And receiving information acquisition requests sent by at least two verification vehicles, and sending information meeting the acquisition requirement information to the at least two verification vehicles according to the acquisition requirement information in the information acquisition requests.
And receiving an information acquisition request sent by the requesting vehicle, and sending sharing information meeting the sharing requirement information to the requesting vehicle.
The computer readable storage medium provided by the embodiment of the application is used for judging whether the vehicle stores the sharing information meeting the sharing requirement information or not according to the sharing requirement information in the information sharing request by receiving the information sharing request sent by the requesting vehicle; transmitting response information to the requesting vehicle in the case where shared information satisfying the shared demand information is stored in the vehicle; the response information comprises identification information of the vehicle; receiving information acquisition requests sent by at least two verification vehicles, and sending information meeting the acquisition requirement information to the at least two verification vehicles according to the acquisition requirement information in the information acquisition requests; receiving an information acquisition request sent by a requesting vehicle, and sending sharing information meeting sharing requirement information to the requesting vehicle; by utilizing at least two verification vehicles randomly selected from the Internet of vehicles, the identity of the target vehicle with information sharing is verified through verification information generated according to the information of the target vehicle, and the information sharing is carried out with the target vehicle after the successful identity verification of the target vehicle, so that the accuracy of an identity verification result can be ensured, the safety of shared information is ensured, hardware equipment of the vehicle is not required to be modified, and the information sharing among the vehicles can be realized under the condition of ensuring the safety of private information of a user.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (9)

1. A method of information sharing between vehicles, comprising:
broadcasting an information sharing request through the Internet of vehicles; wherein the information sharing request includes sharing requirement information;
receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle;
Determining an information sharing target vehicle according to the response information, selecting at least two verification vehicles in the internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles;
under the condition that the identity verification of the target vehicle is successful, an information acquisition request is sent to the target vehicle, and shared information meeting the shared demand information, which is sent by the target vehicle, is received;
at least two verification vehicles in the Internet of vehicles are selected, and the identity of the target vehicle is verified by the verification vehicles according to the identification information of the target vehicle, including:
generating at least one random number, selecting at least two verification vehicles in the internet of vehicles, and sending the random number, the generation time of the random number and the identification information of the target vehicle to the at least two verification vehicles;
receiving verification information generated by the at least two verification vehicles; the verification vehicle generates the verification information according to the random number, the speed information and the position information of the target vehicle at the generation time of the random number;
according to the verification information of the at least two verification vehicles, carrying out identity verification on the target vehicle; if the verification information of the at least two verification vehicles is the same, the identity verification of the target vehicle is successful; otherwise, the target vehicle identity verification fails.
2. The method according to claim 1, wherein the authentication vehicle generates the authentication information from speed information and position information of the target vehicle at the generation time of the random number and the random number, comprising:
acquiring speed information and position information of the target vehicle at the generation time of the random number according to the identification information of the target vehicle;
performing hash operation on the speed information and the position information respectively to obtain a hash value of the speed and a hash value of the position;
and performing exclusive OR operation on the hash value of the speed, the hash value of the position and the random number to obtain the verification information.
3. The method according to claim 1 or 2, wherein the receiving the sharing information satisfying the sharing requirement information transmitted by the target vehicle includes:
receiving encryption information sent by the target vehicle; wherein the encrypted information comprises encrypted shared information; the target vehicle encrypts the shared information according to the verification information and the sending time of the information acquisition request to obtain the encrypted shared information;
and decrypting the encrypted shared information according to the verification information and the sending time of the information acquisition request to obtain the shared information.
4. The method according to claim 3, wherein the target vehicle encrypts the shared information according to the authentication information and the transmission time of the information acquisition request to obtain the encrypted shared information, comprising:
receiving the verification information generated by the at least two verification vehicles;
performing exclusive OR operation on the verification information and the sending time of the information acquisition request to obtain a secret key;
and encrypting the shared information meeting the shared demand information through the secret key to obtain the encrypted shared information.
5. The method of claim 4, wherein the encrypted information further comprises an encrypted key; the target vehicle carries out asymmetric encryption processing on the secret key through a public key of the vehicle sending the information sharing request to obtain the encrypted secret key;
the decryption processing is performed on the encrypted shared information according to the verification information and the sending time of the information acquisition request, so as to obtain the shared information, and the method comprises the following steps:
decrypting the encrypted key through a private key to obtain the key, and restoring the verification information from the key according to the sending time of the information acquisition request;
According to the verification information restored from the secret key and the verification information received from the verification vehicle, carrying out identity verification on the target vehicle;
and under the condition that the target vehicle identity verification is successful, decrypting the encrypted shared information through the secret key to obtain the shared information.
6. The method of claim 5, wherein authenticating the target vehicle based on the verification information recovered from the key and the verification information received from the verification vehicle comprises:
if the verification information restored from the secret key is the same as the verification information received from the verification vehicle, the target vehicle identity verification is successful; otherwise, the target vehicle identity verification fails.
7. A vehicle-mounted communication apparatus, characterized by comprising:
the communication module is used for broadcasting information sharing requests through the Internet of vehicles; wherein the information sharing request includes sharing requirement information; receiving response information sent by a vehicle in the Internet of vehicles according to the information sharing request; wherein, the vehicle sending the response information stores the sharing information meeting the sharing requirement information; the response information comprises identification information of the vehicle;
The processing module is used for determining an information sharing target vehicle according to the response information, selecting at least two verification vehicles in the internet of vehicles, and carrying out identity verification on the target vehicle according to the identification information of the target vehicle through the verification vehicles;
the communication module is further configured to send an information acquisition request to the target vehicle and receive shared information meeting the shared demand information sent by the target vehicle when the target vehicle is successfully authenticated;
the processing module is specifically configured to:
generating at least one random number, selecting at least two verification vehicles in the internet of vehicles, and sending the random number, the generation time of the random number and the identification information of the target vehicle to the at least two verification vehicles;
receiving verification information generated by the at least two verification vehicles; the verification vehicle generates the verification information according to the random number, the speed information and the position information of the target vehicle at the generation time of the random number;
according to the verification information of the at least two verification vehicles, carrying out identity verification on the target vehicle; if the verification information of the at least two verification vehicles is the same, the identity verification of the target vehicle is successful; otherwise, the target vehicle identity verification fails.
8. A vehicle comprising the in-vehicle communication apparatus according to claim 7.
9. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements a method of information sharing between vehicles according to any of claims 1-6.
CN201911304056.5A 2019-12-17 2019-12-17 Method, device, vehicle and storage medium for sharing information between vehicles Active CN113079511B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911304056.5A CN113079511B (en) 2019-12-17 2019-12-17 Method, device, vehicle and storage medium for sharing information between vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911304056.5A CN113079511B (en) 2019-12-17 2019-12-17 Method, device, vehicle and storage medium for sharing information between vehicles

Publications (2)

Publication Number Publication Date
CN113079511A CN113079511A (en) 2021-07-06
CN113079511B true CN113079511B (en) 2023-11-03

Family

ID=76608257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911304056.5A Active CN113079511B (en) 2019-12-17 2019-12-17 Method, device, vehicle and storage medium for sharing information between vehicles

Country Status (1)

Country Link
CN (1) CN113079511B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114845267B (en) * 2022-02-25 2024-06-04 清华大学 Sensor data sharing method and device based on Internet of vehicles
CN114866613B (en) * 2022-04-28 2024-02-23 上海极豆科技有限公司 Internet of vehicles request processing method and device, electronic equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281191A (en) * 2013-05-30 2013-09-04 江苏大学 Method and system for communicating based on car networking
CN104468140A (en) * 2013-04-04 2015-03-25 通用汽车环球科技运作有限责任公司 Methods, systems and apparatus for sharing information among a group of vehicle
CN104601329A (en) * 2014-12-26 2015-05-06 深圳市金溢科技股份有限公司 Vehicle-mounted terminal, vehicle information release system and vehicle information release method
CN106027519A (en) * 2016-05-18 2016-10-12 安徽大学 Efficient condition privacy protection and security authentication method in internet of vehicles
CN109922475A (en) * 2019-04-19 2019-06-21 郑州轻工业学院 Vehicle authentication and message verification method under In-vehicle networking environment
CN110099367A (en) * 2019-04-26 2019-08-06 河南工学院 Car networking secure data sharing method based on edge calculations
CN110197541A (en) * 2019-05-21 2019-09-03 北京首汽智行科技有限公司 A kind of shared automobile management method based on block chain
WO2019179373A1 (en) * 2018-03-23 2019-09-26 华为技术有限公司 Information processing method, related device, and computer storage medium
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN110430266A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of side cloud synergistic data transmission method, device, equipment and storage medium
CN110519345A (en) * 2019-08-14 2019-11-29 杭州师范大学 Based on the car networking information securities cooperation method for down loading for assisting vehicle independently to select more

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10796501B2 (en) * 2017-06-19 2020-10-06 Qualcomm Incorporated Interactive sharing of vehicle sensor information
KR20190106860A (en) * 2019-08-27 2019-09-18 엘지전자 주식회사 Method for sharing application module and apparatus using thereof

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468140A (en) * 2013-04-04 2015-03-25 通用汽车环球科技运作有限责任公司 Methods, systems and apparatus for sharing information among a group of vehicle
CN103281191A (en) * 2013-05-30 2013-09-04 江苏大学 Method and system for communicating based on car networking
CN104601329A (en) * 2014-12-26 2015-05-06 深圳市金溢科技股份有限公司 Vehicle-mounted terminal, vehicle information release system and vehicle information release method
CN106027519A (en) * 2016-05-18 2016-10-12 安徽大学 Efficient condition privacy protection and security authentication method in internet of vehicles
WO2019179373A1 (en) * 2018-03-23 2019-09-26 华为技术有限公司 Information processing method, related device, and computer storage medium
CN110312203A (en) * 2018-03-23 2019-10-08 华为技术有限公司 Information processing method, relevant device and computer storage medium
CN109922475A (en) * 2019-04-19 2019-06-21 郑州轻工业学院 Vehicle authentication and message verification method under In-vehicle networking environment
CN110099367A (en) * 2019-04-26 2019-08-06 河南工学院 Car networking secure data sharing method based on edge calculations
CN110197541A (en) * 2019-05-21 2019-09-03 北京首汽智行科技有限公司 A kind of shared automobile management method based on block chain
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN110430266A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of side cloud synergistic data transmission method, device, equipment and storage medium
CN110519345A (en) * 2019-08-14 2019-11-29 杭州师范大学 Based on the car networking information securities cooperation method for down loading for assisting vehicle independently to select more

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Bidisha Bhabani ; Atanu Mondal ; .A demand based unicast data dissemination scheme in VANET.2015 Annual IEEE India Conference (INDICON).2016,全文. *
车联网中基于群签名的身份认证协议研究;郑明辉;段洋洋;吕含笑;;工程科学与技术(第04期);全文 *

Also Published As

Publication number Publication date
CN113079511A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
US11706026B2 (en) Location aware cryptography
CN111684760B (en) Cryptographic method and system for managing digital certificates
WO2019083440A2 (en) Vehicle-mounted device upgrading method and related device
CN109756336B (en) Authentication method, V2X computing system and V2X computing node
CN110365486B (en) Certificate application method, device and equipment
CN107342861B (en) Data processing method, device and system
CN113032357A (en) File storage method and device and server
CN113438205B (en) Block chain data access control method, node and system
EP3479540A1 (en) Multi-hop secure content routing based on cryptographic partial blind signatures and embedded terms
JP2008060789A (en) Public key distribution system and public key distribution method
CN113852632B (en) SM9 algorithm-based vehicle identity authentication method, system, device and storage medium
CN113079511B (en) Method, device, vehicle and storage medium for sharing information between vehicles
CN111193755B (en) Data access method, data encryption method and data encryption and access system
JP2023506661A (en) Certificate application method and device
CN114218548B (en) Identity verification certificate generation method, authentication method, device, equipment and medium
CN108933758B (en) Sharable cloud storage encryption and decryption method, device and system
CN113259722A (en) Secure video Internet of things key management method, device and system
JP6203798B2 (en) In-vehicle control system, vehicle, management device, in-vehicle computer, data sharing method, and computer program
CN116614811A (en) Distributed information authentication method and system for Internet of vehicles
CN115174083A (en) Internet of vehicles information encryption method and device and Internet of vehicles system
CN112398655A (en) File transmission method, server and computer storage medium
CN113472734B (en) Identity authentication method and device
CN110881176B (en) Method for improving utilization rate of vehicle-to-X communication device and vehicle-to-X communication device
CN114980083A (en) Secure communication method based on self-adaptive application and server
CN116033415A (en) Reference station data transmission method and device, reference station, server and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant