CN113572745A - Authentication method, peripheral equipment, vehicle-mounted connector and server - Google Patents

Authentication method, peripheral equipment, vehicle-mounted connector and server Download PDF

Info

Publication number
CN113572745A
CN113572745A CN202110769901.7A CN202110769901A CN113572745A CN 113572745 A CN113572745 A CN 113572745A CN 202110769901 A CN202110769901 A CN 202110769901A CN 113572745 A CN113572745 A CN 113572745A
Authority
CN
China
Prior art keywords
vehicle
peripheral equipment
mounted connector
random code
intermediate data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110769901.7A
Other languages
Chinese (zh)
Other versions
CN113572745B (en
Inventor
曾庆生
彭波涛
张文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiayu Intelligent Technology Co ltd
Original Assignee
Shanghai Xianta Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Xianta Intelligent Technology Co Ltd filed Critical Shanghai Xianta Intelligent Technology Co Ltd
Priority to CN202110769901.7A priority Critical patent/CN113572745B/en
Publication of CN113572745A publication Critical patent/CN113572745A/en
Application granted granted Critical
Publication of CN113572745B publication Critical patent/CN113572745B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

An authentication method, peripheral equipment, a vehicle-mounted connector and a server are provided, wherein the authentication method between the peripheral equipment and the vehicle-mounted connector comprises the following steps: after the peripheral equipment is connected with the vehicle-mounted connector, whether connection authorization is obtained or not is detected, when the authorization is not obtained, information interaction is carried out between the server and the peripheral equipment, authorization judgment is carried out, after the authorization is obtained, a working password generated by the peripheral equipment is stored by the vehicle-mounted connector, and the peripheral equipment and the vehicle-mounted connector simultaneously store a third random code used for encrypting and decrypting data transmitted by the vehicle-mounted connector and a fourth random code used for encrypting and decrypting data transmitted by the peripheral equipment. The method can ensure that the peripheral equipment has higher safety performance when performing data interaction with the vehicle-mounted connector.

Description

Authentication method, peripheral equipment, vehicle-mounted connector and server
Technical Field
The invention relates to the technical field of information interaction between vehicles, in particular to an authentication method between peripheral equipment and a vehicle-mounted connector, the peripheral equipment, the vehicle-mounted connector, a server and a system.
Background
The vehicle-mounted connector can interact with the vehicle in various data types, so that the peripheral equipment can interact with the vehicle through the vehicle-mounted connector, and the application scene of the peripheral equipment is expanded.
Since the vehicle-mounted connector needs to perform data interaction with the vehicle during use, safety during data interaction is a problem that must be considered. How to improve the safety performance when the peripheral equipment and the vehicle-mounted connector are authenticated becomes a problem which needs to be solved urgently.
Disclosure of Invention
In view of this, the present invention provides an authentication method between a peripheral device and a vehicle-mounted connector, the peripheral device, the vehicle-mounted connector, a server and a system, and the method can enable the peripheral device and the vehicle-mounted connector to have higher security performance when performing data interaction.
The invention provides an authentication method between peripheral equipment and a vehicle-mounted connector, which comprises the following steps:
s11: detecting whether a peripheral device is connected with a vehicle-mounted connector, when the connection is established between the peripheral device and the vehicle-mounted connector, acquiring basic information of the peripheral device by the vehicle-mounted connector, judging whether authorization for connection with the vehicle-mounted connector is acquired before the peripheral device is connected at this time, if the authorization is not acquired, entering a step S12, and if the authorization is acquired, entering a step S14;
s12: the vehicle-mounted connector requests a server to judge whether the peripheral equipment is authorized peripheral equipment, the server performs information interaction with the peripheral equipment through the vehicle-mounted connector, judges whether the peripheral equipment is authorized peripheral equipment according to basic information of the peripheral equipment and interaction information of the peripheral equipment, sends a judgment result of the authorization to the vehicle-mounted connector, and enters S13 when the judgment result is that the peripheral equipment is authorized peripheral equipment;
s13: when the vehicle-mounted connector receives the information that the peripheral equipment is authorized peripheral equipment and sent by the server, the vehicle-mounted connector performs information interaction with the peripheral equipment to obtain a work password generated by the peripheral equipment, records the work password and basic information corresponding to the peripheral equipment, and performs the step S14;
s14: the vehicle-mounted connector performs information interaction with the peripheral equipment, the vehicle-mounted connector generates a third random code used for encrypting and decrypting data transmitted by the vehicle-mounted connector, the peripheral equipment is used for encrypting and decrypting a fourth random code transmitted by the peripheral equipment, and the third random code and the fourth random code are simultaneously stored in the vehicle-mounted connector and the peripheral equipment.
Further, after the connection between the vehicle-mounted connector and the peripheral device, the method further comprises:
the vehicle-mounted connector sends first request information to the peripheral equipment;
and the peripheral equipment replies the basic information to the vehicle-mounted connector, wherein the basic information comprises identity information and version number information.
Further, in step S12, the method further includes:
the vehicle-mounted connector sends an authorization request containing the identity information of the peripheral equipment to the server;
the server sends a first random code to the peripheral equipment through the vehicle-mounted connector;
the peripheral equipment encrypts a pre-stored authorization code according to the first random code to obtain first intermediate data, and transmits the first intermediate data to the server through the vehicle-mounted connector;
the server decrypts the first intermediate data through the first random code to obtain an authorization code of the peripheral equipment, compares the obtained identity information and the obtained authorization code of the peripheral equipment with the identity information and the authorization code of the peripheral equipment stored by the server to judge whether the peripheral equipment is authorized peripheral equipment or not, and transmits a judgment result of the authorization to the vehicle-mounted connector.
Further, in the step of obtaining the working password generated by the peripheral device through the vehicle-mounted connector, the method further includes:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the peripheral equipment;
the peripheral equipment decrypts the second intermediate data through the authorization code of the peripheral equipment to obtain a second random code generated by the vehicle-mounted connector;
the peripheral equipment generates a working password, encrypts the working password by using the second random code to obtain third intermediate data, and transmits the third intermediate data to the vehicle-mounted connector;
and the vehicle-mounted connector decrypts the third intermediate data by using the second random code to obtain the working password, and stores the working password.
Further, in the step S14, the method further includes:
the vehicle-mounted connector generates the third random code, encrypts the third random code by using the working password to obtain fourth intermediate data, and transmits the fourth intermediate data to the peripheral equipment;
the peripheral equipment decrypts the fourth intermediate data by using the working password to obtain the third random code and stores the third random code;
the peripheral equipment generates the fourth random code, encrypts the fourth random code by using the third random code to obtain fifth intermediate data, and transmits the fifth intermediate data to the vehicle-mounted connector.
The invention also provides an authentication method between the peripheral equipment based on the vehicle-mounted connector and the vehicle-mounted connector, which comprises the following steps:
s21: detecting whether a peripheral device is connected, when the peripheral device is connected with a vehicle-mounted connector, the vehicle-mounted connector acquires basic information of the peripheral device connected with the vehicle-mounted connector, and meanwhile, judging whether the authorization of connection between the peripheral device and the vehicle-mounted connector is acquired before the peripheral device is connected with the vehicle-mounted connector. When the peripheral device does not acquire authorization to connect with the vehicle-mounted connector before the connection, the step proceeds to step S22, and when the peripheral device acquires authorization to connect with the vehicle-mounted connector before the connection, the step proceeds to step S23;
s22: the vehicle-mounted connector requests the server for a judgment result whether the peripheral equipment is the authorized peripheral equipment or not, receives the judgment result of the authorization, and enters the step S23 when the judgment result is that the peripheral equipment is the authorized peripheral equipment;
s23: and generating a third random code for encrypting and decrypting data transmitted by the vehicle-mounted connector, transmitting the third random code to the peripheral equipment, receiving a fourth random code for encrypting and decrypting data transmitted by the peripheral equipment, and storing the third random code and the fourth random code.
Further, in step S22, the method further includes:
the vehicle-mounted connector judges whether the authorization for connection between the peripheral equipment and the vehicle-mounted connector is obtained before the connection of the peripheral equipment according to the identity information and the version number information of the peripheral equipment, and when the authorization is not obtained, the vehicle-mounted connector sends an authentication request containing the identity information of the peripheral equipment to the outside;
the vehicle-mounted connector receives a first random code and sends the first random code to the peripheral equipment;
the vehicle-mounted connector receives first intermediate data, the first intermediate data contain encrypted authorization codes of the peripheral equipment, and the first intermediate data are transmitted outwards;
the vehicle-mounted connector receives a judgment result of whether the peripheral equipment is authorized peripheral equipment or not, and when the judgment result shows that the peripheral equipment is authorized peripheral equipment, the vehicle-mounted connector and the peripheral equipment perform information interaction to obtain a work password generated by the peripheral equipment and store the work password and basic information of the peripheral equipment.
Further, in the step of obtaining, by the vehicle-mounted connector, the work password generated by the peripheral device, the method further includes:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the outside;
and the vehicle-mounted connector receives third intermediate data, the third intermediate data contain encrypted working passwords generated by the peripheral equipment, the third intermediate data are decrypted by using the second random codes to obtain the working passwords, and the working passwords are stored.
Further, in step S23, the method further includes:
the vehicle-mounted connector generates a third random code, encrypts the third random code by using the working password to obtain fourth intermediate data, and transmits the fourth intermediate data outwards;
and the vehicle-mounted connector receives fifth intermediate data, the fifth intermediate data are the fourth random code generated by the encrypted peripheral equipment, the fifth intermediate data are decrypted by using the third random code to obtain the fourth random code, and the fourth random code is stored.
The invention also provides a vehicle-mounted connector, which comprises a first computer storage medium, wherein the first computer storage medium comprises a computer program, and the computer program realizes the authentication method between the vehicle-mounted connector-based peripheral equipment and the vehicle-mounted connector when being executed.
The invention also provides an authentication method between the peripheral equipment based on the peripheral equipment and the vehicle-mounted connector, which comprises the following steps:
s31: after connecting with the vehicle-mounted connector, sending basic information of the peripheral equipment, and entering the step S32;
s32: receiving information sent by the vehicle-mounted connector, judging the information, assisting the server in judging whether the peripheral equipment is authorized peripheral equipment or not when the received information is the interactive information between the server and the peripheral equipment, and entering the step S33; when the received information is the interaction information sent by the vehicle-mounted connector for acquiring the fourth random code, the step S34 is carried out;
s33: receiving interactive information generated by the vehicle-mounted connector and sent for obtaining a work password, generating the work password, transmitting the work password to the outside, and entering the step S34;
s34: and receiving a third random code used for encrypting and decrypting the data transmitted by the vehicle-mounted connector, generating a fourth random code used for encrypting and decrypting the data transmitted by the peripheral equipment, transmitting the fourth random code outwards, and storing the third random code and the fourth random code.
Further, in step S33, the method further includes:
receiving second intermediate data, wherein the second intermediate data contains the encrypted second random code generated by the vehicle-mounted connector, and decrypting the second intermediate data by using an authorization code prestored in the second intermediate data to obtain the second random code generated by the vehicle-mounted connector;
and generating a working password, encrypting the working password by using the second random code to obtain third intermediate data, and transmitting the third data outwards.
Further, in step S34, the method further includes:
the peripheral equipment receives fourth intermediate data, the fourth intermediate data contain a third random code generated by the encrypted vehicle-mounted connector, and the fourth intermediate data are decrypted by using the working password to obtain the third random code;
and generating the third random code, encrypting the fourth random code by using the third random code to obtain fifth intermediate data, and transmitting the fifth intermediate data outwards.
The invention also provides a peripheral device comprising a second computer storage medium comprising a computer program which, when executed, implements the method of authentication between a peripheral device based on a peripheral device and a vehicle-mounted connector as claimed.
The invention also provides an authentication method between the peripheral equipment and the vehicle-mounted connector based on the server, which comprises the following steps:
s41: receiving request information sent by the vehicle-mounted connector for judging whether the peripheral equipment is authorized peripheral equipment or not, performing information interaction with the peripheral equipment, and entering the step S42;
s42: and comparing the basic information of the peripheral equipment and the interactive information of the peripheral equipment with self prestored information, judging whether the peripheral equipment is authorized peripheral equipment or not, and transmitting the judgment result outwards.
Further, in step S41, the method further includes:
the server generates a first random code after receiving request information of connection between the peripheral equipment and the vehicle-mounted connector, which is sent by the vehicle-mounted connector, and transmits the first random code outwards;
and receiving first intermediate data, wherein the first intermediate data contains the encrypted authorization code of the peripheral equipment, and decrypting the first intermediate data by using the first random code to obtain the authorization code of the peripheral equipment.
Further, when the step S42 is performed, the method includes:
the server compares the obtained identity information and the authorization code of the peripheral equipment with the corresponding relation of the identity information and the authorization code of the peripheral equipment stored by the server, judges whether the corresponding relation of the identity information and the authorization code is consistent, and judges that the peripheral equipment is authorized peripheral equipment when the corresponding relation of the identity information and the authorization code is consistent.
The invention also provides a server comprising a third computer storage medium comprising a computer program which, when executed, implements a method of authentication between the server-based peripheral device and the in-vehicle connector.
In summary, in the present invention, when the peripheral devices connected to each other do not obtain the authorization for connection with the vehicle-mounted connector, whether the connection between the peripheral devices and the vehicle-mounted connector can be authorized is determined through information interaction between the server and the peripheral devices and the basic information of the peripheral devices; meanwhile, after connection authorization is obtained, a third random code and a fourth random code which are new and used for encryption and decryption during respective data transmission are generated during connection between the vehicle-mounted connector and the peripheral equipment, and therefore safety of the peripheral equipment and the vehicle-mounted connector during data interaction can be greatly improved.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical means of the present invention more clearly understood, the present invention may be implemented in accordance with the content of the description, and in order to make the above and other objects, features, and advantages of the present invention more clearly understood, the following preferred embodiments are described in detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic flowchart of an authentication method between a peripheral device and a vehicle-mounted connector according to an embodiment of the present invention.
Fig. 2 is a schematic flowchart of an authentication method between a peripheral device based on a vehicle-mounted connector and the vehicle-mounted connector according to an embodiment of the present invention.
Fig. 3 is a schematic flowchart of an authentication method between a peripheral device based on a peripheral device and a vehicle-mounted connector according to an embodiment of the present invention.
Fig. 4 is a schematic flowchart of an authentication method between a server-based peripheral device and a vehicle-mounted connector according to an embodiment of the present invention.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the predetermined objects, the following detailed description is given with reference to the accompanying drawings and preferred embodiments.
The invention provides an authentication method between peripheral equipment and a vehicle-mounted connector, the peripheral equipment, the vehicle-mounted connector, a server and a system.
Fig. 1 is a schematic flowchart of an authentication method between a peripheral device and a vehicle-mounted connector according to an embodiment of the present invention. As shown in fig. 1, the authentication method between the peripheral device and the vehicle-mounted connector according to the embodiment of the present invention includes the following steps:
s11: whether the peripheral equipment is connected with the vehicle-mounted connector or not is detected, when the peripheral equipment is connected with the vehicle-mounted connector, the vehicle-mounted connector acquires basic information of the peripheral equipment, and meanwhile, whether the authorization of connection between the peripheral equipment and the vehicle-mounted connector is acquired or not is judged before the peripheral equipment is connected with the vehicle-mounted connector. When the peripheral device does not acquire the authorization of connection with the vehicle-mounted connector, the process proceeds to step S12, and when the peripheral device acquires the authorization of connection with the vehicle-mounted connector before the connection, the process proceeds to step S14:
in this step, the peripheral device and the vehicle-mounted connector may be connected in a wireless manner such as wifi, radio frequency, bluetooth, BT (bit stream), or may be connected in a wired manner by an interface such as a USB interface, a UART interface, a CAN line interface, an LVDS interface, an HDMI interface, or an MIPI interface.
Further, after the vehicle-mounted connector detects that the peripheral device is connected with the vehicle-mounted connector, the method further comprises the following steps:
the method comprises the steps that a vehicle-mounted connector sends first request information to external equipment, such as identity and version number information of the vehicle-mounted connector;
after receiving first request information sent by the vehicle-mounted connector, the peripheral equipment replies basic information of the peripheral equipment, wherein the basic information comprises identity information and version number information;
and the vehicle-mounted connector judges whether the authorization for connecting with the vehicle-mounted connector is obtained before the peripheral equipment is connected according to the identity and version number information of the peripheral equipment.
Further, in this step, after the vehicle-mounted connector receives the identity and version number information of the peripheral device, the identity information of the peripheral device needs to be checked to verify whether the peripheral device is an authorized peripheral device capable of performing data interaction with the vehicle-mounted connector. If the peripheral equipment is the peripheral equipment which cannot perform data interaction with the vehicle-mounted connector, the vehicle-mounted connector prohibits the data interaction between the peripheral equipment and the vehicle, and the vehicle-mounted connector can only charge the peripheral equipment in a wired or wireless mode.
S12: the vehicle-mounted connector requests the server to judge whether the peripheral equipment is the peripheral equipment which can be authorized or not, the server carries out information interaction with the peripheral equipment through the vehicle-mounted connector, judges whether the peripheral equipment is the peripheral equipment which can be authorized or not according to the basic information of the peripheral equipment and the interaction information of the peripheral equipment, sends the judgment result of the authorization to the vehicle-mounted connector, and enters the step S13 when the judgment result is that the peripheral equipment is the peripheral equipment which can be authorized;
more specifically, the method further comprises:
the vehicle-mounted connector sends an authorization request containing the identity information of the peripheral equipment to the server. In this step, the on-board connector may communicate with the server via the communication system of the vehicle.
The server transmits the first random code R1 to the external device through the in-vehicle connector. In the present embodiment, the vehicle-mounted connector also verifies the format of the first random code R1.
The peripheral equipment encrypts a pre-stored authorization code according to the obtained first random code R1 to obtain first intermediate data, and transmits the first intermediate data to the server through the vehicle-mounted connector. In this step, the authorization code in the peripheral device may be directly assigned at the time of factory shipment, which is different from the identity information of the peripheral device, and is used for the authorization code when connecting with the vehicle-mounted connector. That is, in different peripheral devices, the identity information and the authorization code are unique and corresponding. Further, the vehicle-mounted connector also verifies the format of the first intermediate data.
The server decrypts the first intermediate data through the first random code R1 to obtain an authorization code in the peripheral device, compares the identity information of the peripheral device obtained from the vehicle-mounted connector and the authorization code of the peripheral device obtained through decryption with the identity information of the peripheral device and the authorization code stored in the server to determine whether the peripheral device is an authorized peripheral device, and transmits a determination result of the authorization to the vehicle-mounted connector.
In the step, the server stores the identity information of the peripheral equipment and the corresponding data of the authorization code thereof in advance, and when the identity information of the peripheral equipment and the authorization code phase obtained by decryption, which are obtained by the server from the vehicle-mounted connector, correspond to the data stored in the server, the peripheral equipment can be judged to be the authorized peripheral equipment.
S13: when the vehicle-mounted connector receives the information that the peripheral equipment is authorized peripheral equipment and is sent by the server, the vehicle-mounted connector performs information interaction with the peripheral equipment to obtain a work password generated by the peripheral equipment, records basic information and the work password corresponding to the peripheral equipment, and enters the step S14; and when the vehicle-mounted connector receives the unauthorized information sent by the server, the data interaction between the peripheral equipment and the vehicle-mounted connector is forbidden.
That is, when the peripheral device obtains the authorization of connection on a certain vehicle-mounted connector, at least three pieces of corresponding information, i.e., the work password, the identity information and the version number information of the peripheral device, are stored in the vehicle-mounted connector. In the next connection, only when the vehicle-mounted connector stores the work password corresponding to the identity information and the version number information transmitted by the peripheral device, in step S11, the vehicle-mounted connector determines that a certain peripheral device has acquired the connection authorization on the vehicle-mounted connector.
More specifically, in this embodiment, in the step of obtaining, by the vehicle-mounted connector, the work password generated by the peripheral device, the method further includes:
the vehicle-mounted connector acquires an authorization code of the peripheral device. In this embodiment, the authorization code may be obtained from the peripheral device, or may be obtained from the server when a determination result indicating whether the server is authorized is obtained;
the vehicle-mounted connector generates a second random code R2, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the peripheral equipment;
the peripheral equipment decrypts the second intermediate data through the self authorization code to obtain a second random code R2 generated by the vehicle-mounted connector;
the peripheral equipment generates a working password, encrypts the working password by using a second random code R2 to obtain third intermediate data, and transmits the third intermediate data to the vehicle-mounted connector;
the vehicle-mounted connector decrypts the third intermediate data by using the second random code R2 to obtain a working password, and stores the working password.
S14: the vehicle-mounted connector performs information interaction with the peripheral equipment, the vehicle-mounted connector generates a third random code R3 used for encrypting and decrypting data transmitted by the vehicle-mounted connector, the peripheral equipment generates a fourth random code R4 used for encrypting and decrypting data transmitted by the peripheral equipment, and the third random code R3 and the fourth random code R4 are simultaneously stored in the vehicle-mounted connector and the peripheral equipment so as to complete authentication between the vehicle-mounted connector and the peripheral equipment.
More specifically, in this step, when the third random code R3 and the fourth random code R4 are generated and stored, the method further includes the steps of:
the vehicle-mounted connector generates a third random code R3, encrypts the third random code R3 by using the working password stored in the step S13 to obtain fourth intermediate data, and transmits the fourth intermediate data to the peripheral equipment;
the peripheral equipment decrypts the fourth intermediate data by using the working password to obtain a third random code R3, stores the third random code R3, generates a fourth random code R4, encrypts the fourth random code R4 by using the third random code R3 to obtain fifth intermediate data, and transmits the fifth intermediate data to the vehicle-mounted connector;
the vehicle-mounted connector decrypts the fifth intermediate data through the third random code R3 to obtain a fourth random code R4 generated by the peripheral equipment.
Further, the method may further include the peripheral device performing AES (Advanced Encryption Standard) Encryption, such as AES-128 Encryption, on the fifth intermediate data to further improve security performance. Accordingly, the in-vehicle connector AES decrypts the corresponding data to obtain fifth intermediate data.
When the peripheral equipment performs data interaction with the vehicle through the vehicle-mounted connector, data sent by the peripheral equipment needs to be encrypted through the fourth random code R4, and data sent by the vehicle-mounted connector needs to be encrypted through the third random code R3.
Before data interaction is carried out between the peripheral equipment and the vehicle-mounted connector every time, the vehicle-mounted connector and the peripheral equipment need to regenerate the third random code R3 and the fourth random code R4, and transmit and store the third random code R3 and the fourth random code R4, so that the safety of data transmission is guaranteed.
Fig. 2 is a schematic flowchart of an authentication method between a peripheral device based on a vehicle-mounted connector and the vehicle-mounted connector according to an embodiment of the present invention. As shown in fig. 2, the present invention further provides an authentication method between a peripheral device based on a vehicle-mounted connector and the vehicle-mounted connector, the method includes the following steps:
s21: whether a peripheral device is connected is detected, when the peripheral device is connected with the vehicle-mounted connector, the vehicle-mounted connector acquires basic information of the peripheral device connected with the vehicle-mounted connector, and meanwhile, whether the authorization of connection between the peripheral device and the vehicle-mounted connector is acquired before the peripheral device is connected is judged. When the peripheral device does not acquire authorization to connect with the vehicle-mounted connector before the connection, the step proceeds to step S22, and when the peripheral device acquires authorization to connect with the vehicle-mounted connector before the connection, the step proceeds to step S23;
in this embodiment, when the vehicle-mounted connector detects that the peripheral device is connected, the vehicle-mounted connector sends first request information, such as the identity and version number information of the vehicle-mounted connector itself, to the peripheral device to obtain basic information of the peripheral device, including the identity information and the version number information.
S22: the vehicle-mounted connector requests the server for a judgment result whether the peripheral equipment is the authorized peripheral equipment or not, receives the judgment result, and enters the step S23 when the judgment result indicates that the peripheral equipment is the authorized peripheral equipment;
more specifically, in this step, the method includes:
the vehicle-mounted connector judges whether the external equipment obtains the authorization of connection with the vehicle-mounted connector before the connection according to the identity and version number information of the external equipment, and when the external equipment does not obtain the authorization before the connection, the vehicle-mounted connector sends an authentication request containing the identity information of the external equipment to the outside:
the vehicle-mounted connector receives a first random code R1 sent by the server and sends the first random code R1 to the peripheral equipment;
the vehicle-mounted connector receives first intermediate data transmitted by the peripheral equipment, the first intermediate data contains an encrypted authorization code of the peripheral equipment, and the first intermediate data is transmitted outwards;
the method comprises the steps that a vehicle-mounted connector receives a judgment result of whether peripheral equipment is authorized peripheral equipment or not, and when the judgment result shows that the peripheral equipment is authorized peripheral equipment, the vehicle-mounted connector and the peripheral equipment perform information interaction to obtain a working password generated by the peripheral equipment and record the working password corresponding to the peripheral equipment and basic information of the peripheral equipment; and when the judgment result is unauthorized information, forbidding data interaction between the peripheral equipment and the vehicle-mounted connector.
When the vehicle-mounted connector obtains the working password generated by the peripheral equipment, the method further comprises the following steps:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code R2, encrypts the second random code R2 through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the outside;
and the vehicle-mounted connector receives third intermediate data, the third intermediate data are work passwords generated by the encrypted peripheral equipment, the third intermediate data are decrypted by using a second random code R2 to obtain the work passwords, and the work passwords are stored.
S23: the method comprises the steps of generating a third random code R3 for encrypting and decrypting data transmitted by the vehicle-mounted connector, transmitting the third random code R3 to the peripheral equipment, receiving a fourth random code R4 for encrypting and decrypting data transmitted by the peripheral equipment, and storing the third random code R3 and the fourth random code R4.
Specifically, in this step, the method further includes:
the vehicle-mounted connector generates a third random code R3, encrypts the third random code R3 by using a working password transmitted by the peripheral equipment to obtain fourth intermediate data, and transmits the fourth intermediate data to the outside;
and the vehicle-mounted connector receives fifth intermediate data sent by the peripheral equipment, the fifth intermediate data contains a fourth random code R4 generated by the encrypted peripheral equipment, decrypts the fifth intermediate data by using the third random code R3 to obtain a fourth random code R4, and stores the fourth random surface R4.
The invention also provides a vehicle-mounted connector, which comprises a first computer storage medium, wherein the first computer storage medium comprises a computer program, and the computer program is executed to realize the authentication method between the vehicle-mounted connector-based peripheral equipment and the vehicle-mounted connector.
Fig. 3 is a schematic flowchart of an authentication method between a peripheral device based on a peripheral device and a vehicle-mounted connector according to an embodiment of the present invention. As shown in fig. 3, the present invention further provides an authentication method between a peripheral device and a vehicle-mounted connector based on the peripheral device, the method includes the following steps:
s31: after the connection with the vehicle-mounted connector, basic information of the peripheral equipment is sent, and the process goes to step S32;
s32: receiving information sent by the vehicle-mounted connector, judging the information, assisting the server to judge whether the peripheral equipment is authorized peripheral equipment or not when the received information is interactive information of the server and the peripheral equipment, and entering the step S33; when the received information is the interaction information sent by the vehicle-mounted connector for acquiring the fourth random code R4, the step S34 is carried out;
more specifically, when the server performs information interaction, the method includes: when the first random code R1 is sent by the vehicle-mounted connector, the pre-stored authorization code is encrypted according to the first random code R1 to obtain first intermediate data, and the first intermediate data is transmitted to the vehicle-mounted connector.
S33: receiving interactive information generated by the vehicle-mounted connector and sent for obtaining the work password, generating the work password, transmitting the work password to the outside, and entering the step S34;
more specifically, the method comprises:
receiving second intermediate data, wherein the second intermediate data contains a second random code R2 generated by the encrypted vehicle-mounted connector, and decrypting the second intermediate data through a pre-stored authorization code to obtain a second random code R2 generated by the vehicle-mounted connector;
generating a working password, encrypting the working password by using a second random code R2 to obtain third intermediate data, and transmitting the third intermediate data outwards.
S34: the method comprises the steps of receiving a third random code R3 used for encrypting and decrypting data transmitted by the vehicle-mounted connector, generating a fourth random code R4 used for encrypting and decrypting data transmitted by peripheral equipment, transmitting the fourth random code R4 outwards, and storing the third random code R3 and the fourth random code R4.
Specifically, in this step, the method further includes:
the peripheral equipment receives fourth intermediate data, the fourth intermediate data contain a third random code R3 generated by the encrypted vehicle-mounted connector, and the fourth intermediate data are decrypted by using the working password to obtain a third random code R4;
a fourth random code R4 is generated and the fourth random code R4 is encrypted using the third random code R3 to obtain fifth intermediate data, and the fifth intermediate data is transmitted to the outside.
The invention also provides the peripheral equipment which comprises a computer storage medium, wherein the computer storage medium adopts the authentication method between the peripheral equipment based on the peripheral equipment and the vehicle-mounted connector to authenticate the peripheral equipment and the vehicle-mounted connector.
Fig. 4 is a schematic flowchart of an authentication method between a server-based peripheral device and a vehicle-mounted connector according to an embodiment of the present invention. As shown in fig. 4, the present invention further provides an authentication method between a server-based peripheral device and a vehicle-mounted connector, the method comprising the steps of:
s41: receiving request information sent by the vehicle-mounted connector for judging whether the peripheral equipment is authorized peripheral equipment, performing information interaction with the peripheral equipment through the vehicle-mounted connector, and entering the step S42;
specifically, the information interaction mode is as follows:
the server generates a first random code R1 and transmits the first random code R1 outwards;
and receiving first intermediate data, wherein the first intermediate data contains the encrypted authorization code of the peripheral equipment, and decrypting the first intermediate data by using the first random code R1 to obtain the authorization code of the peripheral equipment.
S42: and comparing the basic information of the peripheral equipment and the interactive information of the peripheral equipment with self prestored information, judging whether the peripheral equipment is authorized peripheral equipment or not, and transmitting the judgment result outwards.
Specifically, in this step, the server compares the identity information of the peripheral device obtained from the vehicle-mounted connector and the authorization code obtained by decryption with the correspondence between the identity information of the peripheral device and the authorization code stored in the server, and determines whether the correspondence between the two pieces of information is consistent. And when the identity information and the authorization code of the peripheral equipment acquired by the server are consistent with the stored identity information and the stored authorization code of the peripheral equipment, judging that the peripheral equipment is authorized peripheral equipment.
The present invention also provides a server comprising a third computer storage medium comprising a computer program which, when executed, implements the authentication method between the server-based peripheral device and the in-vehicle connector described above.
In the invention, when the peripheral equipment which is connected with each other does not acquire the authorization of the connection with the vehicle-mounted connector, whether the connection between the peripheral equipment and the vehicle-mounted connector can be authorized or not is judged through the information interaction between the server and the peripheral equipment and the basic information of the peripheral equipment; meanwhile, after the connection authorization is obtained, the third random code R3 and the fourth random code R4 for encrypting and decrypting the data transmission of the vehicle-mounted connector and the peripheral equipment are generated newly every time the vehicle-mounted connector and the peripheral equipment are connected, so that the safety of the peripheral equipment and the vehicle-mounted connector in data interaction can be greatly improved.
Although the present invention has been described with reference to a preferred embodiment, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (18)

1. An authentication method between a peripheral device and a vehicle-mounted connector, characterized in that: the method comprises the following steps:
s11: detecting whether a peripheral device is connected with a vehicle-mounted connector, when the connection is established between the peripheral device and the vehicle-mounted connector, acquiring basic information of the peripheral device by the vehicle-mounted connector, judging whether authorization for connection with the vehicle-mounted connector is acquired before the peripheral device is connected at this time, if the authorization is not acquired, entering a step S12, and if the authorization is acquired, entering a step S14;
s12: the vehicle-mounted connector requests a server to judge whether the peripheral equipment is authorized peripheral equipment, the server performs information interaction with the peripheral equipment through the vehicle-mounted connector, judges whether the peripheral equipment is authorized peripheral equipment according to basic information of the peripheral equipment and interaction information of the peripheral equipment, sends a judgment result of the authorization to the vehicle-mounted connector, and enters S13 when the judgment result is that the peripheral equipment is authorized peripheral equipment;
s13: when the vehicle-mounted connector receives the information that the peripheral equipment is authorized peripheral equipment and sent by the server, the vehicle-mounted connector performs information interaction with the peripheral equipment to obtain a work password generated by the peripheral equipment, records the work password and basic information corresponding to the peripheral equipment, and performs the step S14;
s14: the vehicle-mounted connector performs information interaction with the peripheral equipment, the vehicle-mounted connector generates a third random code used for encrypting and decrypting data transmitted by the vehicle-mounted connector, the peripheral equipment generates a fourth random code used for encrypting and decrypting data transmitted by the peripheral equipment, and the third random code and the fourth random code are simultaneously stored in the vehicle-mounted connector and the peripheral equipment.
2. The authentication method between the peripheral device and the in-vehicle connector according to claim 1, characterized in that: after the connection between the vehicle-mounted connector and the peripheral equipment, the method further comprises the following steps:
the vehicle-mounted connector sends first request information to the peripheral equipment;
and the peripheral equipment replies the basic information to the vehicle-mounted connector, wherein the basic information comprises identity information and version number information.
3. The authentication method between the peripheral device and the in-vehicle connector according to claim 2, characterized in that: in step S12, the method further includes:
the vehicle-mounted connector sends an authorization request containing the identity information of the peripheral equipment to the server;
the server sends a first random code to the peripheral equipment through the vehicle-mounted connector;
the peripheral equipment encrypts a pre-stored authorization code according to the first random code to obtain first intermediate data, and transmits the first intermediate data to the server through the vehicle-mounted connector;
the server decrypts the first intermediate data through the first random code to obtain an authorization code of the peripheral equipment, compares the obtained identity information and the obtained authorization code of the peripheral equipment with the identity information and the authorization code of the peripheral equipment stored by the server to judge whether the peripheral equipment is authorized peripheral equipment or not, and transmits a judgment result of the authorization to the vehicle-mounted connector.
4. The authentication method between the peripheral device and the in-vehicle connector according to claim 2, characterized in that: in the step of obtaining the working password generated by the peripheral device by the vehicle-mounted connector, the method further comprises:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the peripheral equipment;
the peripheral equipment decrypts the second intermediate data through the authorization code of the peripheral equipment to obtain a second random code generated by the vehicle-mounted connector;
the peripheral equipment generates a working password, encrypts the working password by using the second random code to obtain third intermediate data, and transmits the third intermediate data to the vehicle-mounted connector;
and the vehicle-mounted connector decrypts the third intermediate data by using the second random code to obtain the working password, and stores the working password.
5. The authentication method between the peripheral device and the in-vehicle connector according to claim 1, characterized in that: in the step S14, the method further includes:
the vehicle-mounted connector generates the third random code, encrypts the third random code by using the working password to obtain fourth intermediate data, and transmits the fourth intermediate data to the peripheral equipment;
the peripheral equipment decrypts the fourth intermediate data by using the working password to obtain the third random code and stores the third random code;
the peripheral equipment generates the fourth random code, encrypts the fourth random code by using the third random code to obtain fifth intermediate data, and transmits the fifth intermediate data to the vehicle-mounted connector.
6. An authentication method between peripheral equipment based on a vehicle-mounted connector and the vehicle-mounted connector is characterized in that: the method comprises the following steps:
s21: detecting whether a peripheral device is connected or not, wherein when the peripheral device is connected with the vehicle-mounted connector, the vehicle-mounted connector acquires basic information of the peripheral device connected with the vehicle-mounted connector, and meanwhile, judging whether the authorization of connection between the peripheral device and the vehicle-mounted connector is acquired or not before the peripheral device is connected; when the peripheral device does not acquire authorization to connect with the vehicle-mounted connector before the connection, the step proceeds to step S22, and when the peripheral device acquires authorization to connect with the vehicle-mounted connector before the connection, the step proceeds to step S23;
s22: the vehicle-mounted connector requests the server for a judgment result whether the peripheral equipment is the authorized peripheral equipment or not, receives the judgment result, and enters the step S23 when the judgment result indicates that the peripheral equipment is the authorized peripheral equipment;
s23: and generating a third random code for encrypting and decrypting data transmitted by the vehicle-mounted connector, transmitting the third random code to the peripheral equipment, receiving a fourth random code for encrypting and decrypting data transmitted by the peripheral equipment, and storing the third random code and the fourth random code.
7. The authentication method between the vehicle-mounted connector-based peripheral device and the vehicle-mounted connector according to claim 6, characterized in that: in step S22, the method further includes:
the vehicle-mounted connector judges whether the authorization for connection between the peripheral equipment and the vehicle-mounted connector is obtained before the connection of the peripheral equipment according to the identity information and the version number information of the peripheral equipment, and when the authorization is not obtained, the vehicle-mounted connector sends an authentication request containing the identity information of the peripheral equipment to the outside;
the vehicle-mounted connector receives a first random code and sends the first random code to the peripheral equipment;
the vehicle-mounted connector receives first intermediate data, the first intermediate data contain encrypted authorization codes of the peripheral equipment, and the first intermediate data are transmitted outwards;
the vehicle-mounted connector receives a judgment result of whether the peripheral equipment is authorized peripheral equipment or not, and when the judgment result shows that the peripheral equipment is authorized peripheral equipment, the vehicle-mounted connector and the peripheral equipment perform information interaction to obtain a work password generated by the peripheral equipment and store the work password and basic information of the peripheral equipment.
8. The authentication method between the vehicle-mounted connector-based peripheral device and the vehicle-mounted connector according to claim 7, characterized in that: in the step of obtaining the work password generated by the peripheral device by the vehicle-mounted connector, the method further includes:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the outside;
and the vehicle-mounted connector receives third intermediate data, the third intermediate data contain encrypted working passwords generated by the peripheral equipment, the third intermediate data are decrypted by using the second random codes to obtain the working passwords, and the working passwords are stored.
9. The authentication method between the vehicle-mounted connector-based peripheral device and the vehicle-mounted connector according to claim 7, characterized in that: in step S23, the method further includes:
the vehicle-mounted connector generates a third random code, encrypts the third random code by using the working password to obtain fourth intermediate data, and transmits the fourth intermediate data outwards;
and the vehicle-mounted connector receives fifth intermediate data, the fifth intermediate data are the fourth random code generated by the encrypted peripheral equipment, the fifth intermediate data are decrypted by using the third random code to obtain the fourth random code, and the fourth random code is stored.
10. An on-vehicle connector characterized in that: the vehicle-mounted connector includes a first computer storage medium including a computer program that, when executed, implements the authentication method between the vehicle-mounted connector-based peripheral device and the vehicle-mounted connector of any one of claims 6 to 9.
11. An authentication method between a peripheral device based on a peripheral device and the vehicle-mounted connector is characterized in that: the method comprises the following steps:
s31: after connecting with the vehicle-mounted connector, sending basic information of the peripheral equipment, and entering the step S32;
s32: receiving information sent by the vehicle-mounted connector, judging the information, assisting the server in judging whether the peripheral equipment is authorized peripheral equipment or not when the received information is the interactive information between the server and the peripheral equipment, and entering the step S33; when the received information is the interaction information sent by the vehicle-mounted connector for acquiring the fourth random code, the step S34 is carried out;
s33: receiving interactive information generated by the vehicle-mounted connector and sent for obtaining a work password, generating the work password, transmitting the work password to the outside, and entering the step S34;
s34: and receiving a third random code used for encrypting and decrypting the data transmitted by the vehicle-mounted connector, generating a fourth random code used for encrypting and decrypting the data transmitted by the peripheral equipment, transmitting the fourth random code outwards, and storing the third random code and the fourth random code.
12. The authentication method between a peripheral device based on a peripheral device and the in-vehicle connector according to claim 11, characterized in that: in step S33, the method further includes:
receiving second intermediate data, wherein the second intermediate data contains the encrypted second random code generated by the vehicle-mounted connector, and decrypting the second intermediate data by using an authorization code prestored in the second intermediate data to obtain the second random code generated by the vehicle-mounted connector;
and generating a working password, encrypting the working password by using the second random code to obtain third intermediate data, and transmitting the third intermediate data outwards.
13. The authentication method between a peripheral device based on a peripheral device and the in-vehicle connector according to claim 11, characterized in that: in step S34, the method further includes:
the peripheral equipment receives fourth intermediate data, the fourth intermediate data contain a third random code generated by the encrypted vehicle-mounted connector, and the fourth intermediate data are decrypted by using the working password to obtain the third random code;
and generating the fourth random code, encrypting the fourth random code by using the third random code to obtain fifth intermediate data, and transmitting the fifth intermediate data outwards.
14. A peripheral device, characterized by: a second computer storage medium comprising a computer program that, when executed, implements the method of authentication between the peripheral device based on a peripheral device and the in-vehicle connector of any one of claims 11 to 13.
15. An authentication method between a peripheral device and a vehicle-mounted connector based on a server is characterized in that: the method comprises the following steps:
s41: receiving request information sent by the vehicle-mounted connector for judging whether the peripheral equipment is authorized peripheral equipment or not, performing information interaction with the peripheral equipment, and entering the step S42;
s42: and comparing the received basic information of the peripheral equipment and the interaction information of the peripheral equipment with self prestored information, judging whether the peripheral equipment is authorized peripheral equipment or not, and transmitting the judgment result outwards.
16. The authentication method between the server-based peripheral device and the in-vehicle connector of claim 15, wherein: in step S41, the method further includes:
the server generates a first random code after receiving the request information sent by the vehicle-mounted connector, and transmits the first random code outwards;
and receiving first intermediate data, wherein the first intermediate data contains the encrypted authorization code of the peripheral equipment, and decrypting the first intermediate data by using the first random code to obtain the authorization code of the peripheral equipment.
17. The authentication method between the server-based peripheral device and the in-vehicle connector of claim 15, wherein: in performing the step S42, the method includes:
the server compares the obtained identity information of the peripheral equipment with the corresponding relationship between the identity information of the peripheral equipment and the authorization code stored in the server, judges whether the corresponding relationship between the identity information of the peripheral equipment and the authorization code is consistent, and judges that the peripheral equipment is authorized when the corresponding relationship between the identity information of the peripheral equipment and the authorization code is consistent.
18. A server, characterized by: the server includes a third computer storage medium comprising a computer program that, when executed, implements the method of authentication between the server-based peripheral device and the in-vehicle connector of any one of claims 15 to 17.
CN202110769901.7A 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server Active CN113572745B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110769901.7A CN113572745B (en) 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110769901.7A CN113572745B (en) 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server

Publications (2)

Publication Number Publication Date
CN113572745A true CN113572745A (en) 2021-10-29
CN113572745B CN113572745B (en) 2023-08-08

Family

ID=78164011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110769901.7A Active CN113572745B (en) 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server

Country Status (1)

Country Link
CN (1) CN113572745B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115257580A (en) * 2022-07-22 2022-11-01 智己汽车科技有限公司 Peripheral control method and system of intelligent vehicle machine

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023458A (en) * 2016-05-13 2016-10-12 智车优行科技(北京)有限公司 Vehicle control method, apparatus and terminal, vehicle, server and system
CN106257861A (en) * 2015-06-18 2016-12-28 涓ヤ卡 By controlling authentication method and the system thereof of equipment and auto communication
CN109159758A (en) * 2018-08-31 2019-01-08 深圳市元征科技股份有限公司 Equipment authentication method and mobile unit
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
CN109618345A (en) * 2019-01-29 2019-04-12 盐城骏拔汽车零部件有限公司 Vehicle remote authorization access control system and method
CN110289958A (en) * 2019-07-18 2019-09-27 郑州信大捷安信息技术股份有限公司 Internet of Vehicles identity authentication method and system
CN110830491A (en) * 2019-11-14 2020-02-21 武汉虹信通信技术有限责任公司 Internet of vehicles information acquisition method and device
CN112153019A (en) * 2020-09-09 2020-12-29 上海仙塔智能科技有限公司 Data interaction system, vehicle-mounted connector, peripheral equipment, vehicle and method
CN112751832A (en) * 2020-12-18 2021-05-04 湖南麒麟信安科技股份有限公司 Online authorization authentication method, equipment and storage medium for virtual machine operating system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106257861A (en) * 2015-06-18 2016-12-28 涓ヤ卡 By controlling authentication method and the system thereof of equipment and auto communication
CN106023458A (en) * 2016-05-13 2016-10-12 智车优行科技(北京)有限公司 Vehicle control method, apparatus and terminal, vehicle, server and system
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
CN109159758A (en) * 2018-08-31 2019-01-08 深圳市元征科技股份有限公司 Equipment authentication method and mobile unit
CN109618345A (en) * 2019-01-29 2019-04-12 盐城骏拔汽车零部件有限公司 Vehicle remote authorization access control system and method
CN110289958A (en) * 2019-07-18 2019-09-27 郑州信大捷安信息技术股份有限公司 Internet of Vehicles identity authentication method and system
CN110830491A (en) * 2019-11-14 2020-02-21 武汉虹信通信技术有限责任公司 Internet of vehicles information acquisition method and device
CN112153019A (en) * 2020-09-09 2020-12-29 上海仙塔智能科技有限公司 Data interaction system, vehicle-mounted connector, peripheral equipment, vehicle and method
CN112751832A (en) * 2020-12-18 2021-05-04 湖南麒麟信安科技股份有限公司 Online authorization authentication method, equipment and storage medium for virtual machine operating system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115257580A (en) * 2022-07-22 2022-11-01 智己汽车科技有限公司 Peripheral control method and system of intelligent vehicle machine
CN115257580B (en) * 2022-07-22 2024-05-14 智己汽车科技有限公司 Peripheral control method and control system of intelligent vehicle

Also Published As

Publication number Publication date
CN113572745B (en) 2023-08-08

Similar Documents

Publication Publication Date Title
CN108122311B (en) Vehicle virtual key implementation method and system
CN109862040B (en) Security authentication method and authentication system
EP3648396B1 (en) Maintenance system and maintenance method
US10708062B2 (en) In-vehicle information communication system and authentication method
US9143320B2 (en) Electronic key registration system
CN105704131A (en) Vehicle lock control method and cloud management server
CN110191415B (en) Vehicle information encryption method, vehicle-mounted equipment and server
CN106912046B (en) One-way key fob and vehicle pairing
US10778655B2 (en) Secure control and access of a vehicle
CN105636037B (en) Authentication method, device and electronic equipment
CN102142961A (en) Method, device and system for authenticating gateway, node and server
KR101842009B1 (en) System and authentication method for vehicle remote key entry
US9609512B2 (en) Wireless authentication system and wireless authentication method
CN110738776A (en) method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof
CN113138775A (en) Firmware protection method and system for vehicle-mounted diagnosis system
CN109618313B (en) Vehicle-mounted Bluetooth device and connection method and system thereof
CN108116367B (en) Keyless system matching method and keyless matching system
CN113572745B (en) Authentication method, peripheral equipment, vehicle-mounted connector and server
CN109743283B (en) Information transmission method and equipment
TW201912909A (en) Smart lock and control method of smart lock
JP6905950B2 (en) Authentication methods and computer programs for terminal devices, automobiles, and remote-controlled terminals for automobiles
CN115690955A (en) Security authentication method and device for digital key, vehicle and digital key equipment
JP2016152438A (en) Software updating device, portable terminal and software updating system
CN114245353A (en) Calibration method, terminal, cloud end and vehicle end of whole vehicle Bluetooth key reference clock
JP5985845B2 (en) Electronic key registration method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231101

Address after: Floors 3-7, Building T3, No. 377 Songhong Road, Changning District, Shanghai, 200000

Patentee after: Shanghai Jiayu Intelligent Technology Co.,Ltd.

Address before: Room 8041, 1033 Changning Road, Changning District, Shanghai 200042 (9th floor, nominal floor)

Patentee before: Shanghai xianta Intelligent Technology Co.,Ltd.

TR01 Transfer of patent right