CN113572745B - Authentication method, peripheral equipment, vehicle-mounted connector and server - Google Patents

Authentication method, peripheral equipment, vehicle-mounted connector and server Download PDF

Info

Publication number
CN113572745B
CN113572745B CN202110769901.7A CN202110769901A CN113572745B CN 113572745 B CN113572745 B CN 113572745B CN 202110769901 A CN202110769901 A CN 202110769901A CN 113572745 B CN113572745 B CN 113572745B
Authority
CN
China
Prior art keywords
peripheral equipment
vehicle
mounted connector
random code
intermediate data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110769901.7A
Other languages
Chinese (zh)
Other versions
CN113572745A (en
Inventor
曾庆生
彭波涛
张文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiayu Intelligent Technology Co ltd
Original Assignee
Shanghai Xianta Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Xianta Intelligent Technology Co Ltd filed Critical Shanghai Xianta Intelligent Technology Co Ltd
Priority to CN202110769901.7A priority Critical patent/CN113572745B/en
Publication of CN113572745A publication Critical patent/CN113572745A/en
Application granted granted Critical
Publication of CN113572745B publication Critical patent/CN113572745B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The authentication method between the peripheral equipment and the vehicle-mounted connector comprises the following steps: after the peripheral equipment is connected with the vehicle-mounted connector, detecting whether the connection authorization is obtained, when the authorization is not obtained, carrying out information interaction between the server and the peripheral equipment, judging the authorization, and after the authorization is obtained, storing a working password generated by the peripheral equipment by the vehicle-mounted connector, wherein the peripheral equipment and the vehicle-mounted connector simultaneously store a third random code for encrypting and decrypting data transmitted by the vehicle-mounted connector and a fourth random code for encrypting and decrypting data transmitted by the peripheral equipment. The method can enable the peripheral equipment to have higher safety performance when the peripheral equipment and the vehicle-mounted connector perform data interaction.

Description

Authentication method, peripheral equipment, vehicle-mounted connector and server
Technical Field
The invention relates to the technical field of information interaction between vehicles, in particular to an authentication method between peripheral equipment and a vehicle-mounted connector, the peripheral equipment, the vehicle-mounted connector, a server and a system.
Background
The vehicle-mounted connector can interact with the vehicle in various data types, so that the peripheral equipment can interact with the vehicle through the vehicle-mounted connector, and the application scene of the peripheral equipment is expanded.
Since the vehicle-mounted connector needs to interact data with the vehicle when in use, the safety during the data interaction is a problem to be considered. How to improve the safety performance when the peripheral equipment and the vehicle-mounted connector are authenticated becomes an urgent problem to be solved.
Disclosure of Invention
In view of the above, the invention provides an authentication method between a peripheral device and a vehicle-mounted connector, the peripheral device, the vehicle-mounted connector, a server and a system.
The invention provides an authentication method between peripheral equipment and a vehicle-mounted connector, which comprises the following steps:
s11: detecting whether the peripheral equipment is connected with the vehicle-mounted connector or not, when the connection is established between the peripheral equipment and the vehicle-mounted connector, acquiring basic information of the peripheral equipment by the vehicle-mounted connector, judging whether the peripheral equipment acquires authorization of the connection with the vehicle-mounted connector before the connection, entering S12 when the authorization is not acquired, and entering S14 when the authorization is acquired;
S12: the vehicle-mounted connector requests a server to judge whether the peripheral equipment is an authorized peripheral equipment or not, the server performs information interaction with the peripheral equipment through the vehicle-mounted connector, judges whether the peripheral equipment is the authorized peripheral equipment or not according to basic information of the peripheral equipment and interaction information of the peripheral equipment, sends an authorization judgment result to the vehicle-mounted connector, and enters S13 when the judgment result is that the peripheral equipment is the authorized peripheral equipment;
s13: when the vehicle-mounted connector receives the information that the peripheral equipment is an authorized peripheral equipment sent by the server, the vehicle-mounted connector performs information interaction with the peripheral equipment to obtain a working password generated by the peripheral equipment, records the working password and basic information corresponding to the peripheral equipment, and performs S14;
s14: the vehicle-mounted connector performs information interaction with the peripheral equipment, the vehicle-mounted connector generates a third random code for encrypting and decrypting data transmitted by the vehicle-mounted connector, the peripheral equipment is used for encrypting and decrypting a fourth random code for transmitting data by the peripheral equipment, and the third random code and the fourth random code are simultaneously stored in the vehicle-mounted connector and the peripheral equipment.
Further, after the connection between the vehicle-mounted connector and the peripheral device, the method further includes:
the vehicle-mounted connector sends first request information to the peripheral equipment;
the peripheral equipment replies the basic information to the vehicle-mounted connector, wherein the basic information comprises identity information and version number information.
Further, in step S12, the method further includes:
the vehicle-mounted connector sends an authorization request containing the identity information of the peripheral equipment to the server;
the server sends a first random code to the peripheral equipment through the vehicle-mounted connector;
the peripheral equipment encrypts a prestored authorization code according to the first random code to obtain first intermediate data, and transmits the first intermediate data to the server through the vehicle-mounted connector;
the server decrypts the first intermediate data through the first random code to obtain the authorization code of the peripheral equipment, compares the obtained identity information and authorization code of the peripheral equipment with the identity information and authorization code of the peripheral equipment stored by the server to judge whether the peripheral equipment is an authorized peripheral equipment or not, and transmits the authorization judgment result to the vehicle-mounted connector.
Further, in the step of obtaining, by the in-vehicle connector, the work password generated by the peripheral device, the method further includes:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the peripheral equipment;
the peripheral equipment decrypts the second intermediate data through the self authorization code to obtain a second random code generated by the vehicle-mounted connector;
the peripheral equipment generates a working password, encrypts the working password by using the second random code to obtain third intermediate data, and transmits the third intermediate data to the vehicle-mounted connector;
and the vehicle-mounted connector decrypts the third intermediate data by utilizing the second random code to obtain the working password and stores the working password.
Further, in the step S14, the method further includes:
the vehicle-mounted connector generates the third random code, encrypts the third random code by using the working password to obtain fourth intermediate data, and transmits the fourth intermediate data to the peripheral equipment;
The peripheral equipment decrypts the fourth intermediate data by using the working password to obtain the third random code and stores the third random code;
the peripheral equipment generates the fourth random code, encrypts the fourth random code by using the third random code to obtain fifth intermediate data, and transmits the fifth intermediate data to the vehicle-mounted connector.
The invention also provides an authentication method between the peripheral equipment based on the vehicle-mounted connector and the vehicle-mounted connector, which comprises the following steps:
s21: detecting whether peripheral equipment is connected or not, and when the peripheral equipment is connected with the vehicle-mounted connector, acquiring basic information of the peripheral equipment connected with the vehicle-mounted connector by the vehicle-mounted connector, and judging whether the peripheral equipment acquires authorization of connection with the vehicle-mounted connector before the connection. When the peripheral equipment does not acquire the authorization of the connection with the vehicle-mounted connector before the connection, the step S22 is performed, and when the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the connection, the step S23 is performed;
s22: the vehicle-mounted connector requests a judgment result of whether the peripheral equipment is an authorized peripheral equipment from a server, receives the judgment result of the authorization, and enters S23 when the judgment result is that the peripheral equipment is the authorized peripheral equipment;
S23: generating a third random code for encrypting and decrypting the data transmitted by the vehicle-mounted connector, transmitting the third random code to the peripheral equipment, receiving a fourth random code for encrypting and decrypting the data transmitted by the peripheral equipment, and storing the third random code and the fourth random code.
Further, in step S22, the method further includes:
the vehicle-mounted connector judges whether the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the peripheral equipment is connected according to the identity information and version number information of the peripheral equipment, and when the authorization is not acquired, the vehicle-mounted connector sends an authentication request containing the identity information of the peripheral equipment outwards;
the vehicle-mounted connector receives a first random code and sends the first random code to the peripheral equipment;
the vehicle-mounted connector receives first intermediate data, wherein the first intermediate data contains an encrypted authorization code of the peripheral equipment and transmits the first intermediate data outwards;
the vehicle-mounted connector receives a judging result of whether the peripheral equipment is an authorized peripheral equipment or not, and when the judging result is that the peripheral equipment is the authorized peripheral equipment, the vehicle-mounted connector performs information interaction with the peripheral equipment to acquire a working password generated by the peripheral equipment and stores the working password and basic information of the peripheral equipment.
Further, in the step of obtaining the working password generated by the peripheral device by the vehicle-mounted connector, the method further includes:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data outwards;
the vehicle-mounted connector receives third intermediate data, the third intermediate data contains an encrypted working password generated by the peripheral equipment, the second random code is utilized to decrypt the third intermediate data, the working password is obtained, and the working password is stored.
Further, in step S23, the method further includes:
the vehicle-mounted connector generates a third random code, encrypts the third random code by using the working password to obtain the fourth intermediate data, and transmits the fourth intermediate data outwards;
the vehicle-mounted connector receives fifth intermediate data, wherein the fifth intermediate data is the fourth random code generated by the peripheral equipment and contains encryption, the third random code is utilized to decrypt the fifth intermediate data to obtain the fourth random code, and the fourth random code is stored.
The invention also provides a vehicle-mounted connector, which comprises a first computer storage medium, wherein the first computer storage medium comprises a computer program, and when the computer program is executed, the authentication method between the peripheral equipment based on the vehicle-mounted connector and the vehicle-mounted connector is realized.
The invention also provides an authentication method between the peripheral equipment based on the peripheral equipment and the vehicle-mounted connector, which comprises the following steps:
s31: after being connected with the vehicle-mounted connector, the basic information of the peripheral equipment is sent, and the step S32 is carried out;
s32: receiving information sent by the vehicle-mounted connector, judging the information, assisting the server to judge whether the peripheral equipment is authorized peripheral equipment or not when the received information is interactive information of the server and the peripheral equipment, and entering step S33; when the received information is the interaction information sent by the vehicle-mounted connector for acquiring the fourth random code, entering into S34;
s33: receiving interaction information generated by the vehicle-mounted connector and sent to acquire a working password, generating the working password, transmitting the working password outwards, and entering into step S34;
S34: and receiving a third random code for encrypting and decrypting the data transmitted by the vehicle-mounted connector, generating a fourth random code for encrypting and decrypting the data transmitted by the peripheral equipment, transmitting the fourth random code outwards, and storing the third random code and the fourth random code.
Further, in step S33, the method further includes:
receiving second intermediate data, wherein the second intermediate data contains the second random code generated by the encrypted vehicle-mounted connector, and decrypting the second intermediate data by utilizing an authorization code pre-stored in the second intermediate data to obtain the second random code generated by the vehicle-mounted connector;
generating a working password, encrypting the working password by using the second random code to obtain the third intermediate data, and transmitting the third data outwards.
Further, in step S34, the method further includes:
the peripheral equipment receives fourth intermediate data, the fourth intermediate data contains a third random code generated by the encrypted vehicle-mounted connector, and the working password is utilized to decrypt the fourth intermediate data to obtain the third random code;
and generating the third random code, encrypting the fourth random code by using the third random code to obtain fifth intermediate data, and transmitting the fifth intermediate data outwards.
The invention also provides a peripheral device, which comprises a second computer storage medium, wherein the second computer storage medium comprises a computer program, and when the computer program is executed, the authentication method between the peripheral device based on the peripheral device and the vehicle-mounted connector is realized.
The invention also provides an authentication method between the peripheral equipment based on the server and the vehicle-mounted connector, which comprises the following steps:
s41: receiving request information which is sent by the vehicle-mounted connector and used for judging whether the external equipment is authorized external equipment or not, carrying out information interaction with the external equipment, and entering into S42;
s42: and comparing the basic information of the peripheral equipment and the interaction information of the peripheral equipment with pre-stored information of the peripheral equipment, judging whether the peripheral equipment is an authorized peripheral equipment or not, and transmitting the judging result outwards.
Further, in step S41, the method further includes:
the server generates a first random code after receiving request information which is sent by the vehicle-mounted connector and is used for connecting the peripheral equipment with the vehicle-mounted connector, and transmits the first random code outwards;
And receiving first intermediate data, wherein the first intermediate data contains the encrypted authorization code of the peripheral equipment, and decrypting the first intermediate data by using the first random code to obtain the authorization code of the peripheral equipment.
Further, in performing step S42, the method includes:
the server compares the obtained identity information and authorization code of the peripheral equipment with the corresponding relation between the identity information and authorization code of the peripheral equipment stored by the server, judges whether the corresponding relation between the identity information and authorization code of the peripheral equipment is consistent, and judges that the peripheral equipment is an authorized peripheral equipment when the corresponding relation between the identity information and authorization code of the peripheral equipment is consistent.
The invention also provides a server, which comprises a third computer storage medium, wherein the third computer storage medium comprises a computer program, and the computer program realizes the authentication method between the peripheral equipment based on the server and the vehicle-mounted connector when being executed.
In summary, in the present invention, when the peripheral devices connected to each other do not acquire the authorization of the connection with the vehicle-mounted connector, whether the connection between the peripheral devices and the vehicle-mounted connector can be authorized is determined through the information interaction between the server and the peripheral devices and the basic information of the peripheral devices; meanwhile, after the connection authorization is obtained, new third random codes and fourth random codes for encryption and decryption during respective data transmission are generated during each connection between the vehicle-mounted connector and the peripheral equipment, and therefore the safety of the peripheral equipment and the vehicle-mounted connector during data interaction can be greatly improved.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention, as well as the preferred embodiments thereof, together with the following detailed description of the invention, given by way of illustration only, together with the accompanying drawings.
Drawings
Fig. 1 is a flowchart of an authentication method between a peripheral device and a vehicle-mounted connector according to an embodiment of the present invention.
Fig. 2 is a flow chart of an authentication method between a peripheral device based on a vehicle-mounted connector and the vehicle-mounted connector according to an embodiment of the present invention.
Fig. 3 is a flowchart of an authentication method between a peripheral device and a vehicle-mounted connector based on the peripheral device according to an embodiment of the present invention.
Fig. 4 is a flowchart of an authentication method between a peripheral device based on a server and a vehicle-mounted connector according to an embodiment of the present invention.
Detailed Description
In order to further describe the technical means and effects adopted by the present invention to achieve the preset purpose, the following detailed description is given with reference to the accompanying drawings and preferred embodiments.
The invention provides an authentication method between peripheral equipment and a vehicle-mounted connector, the peripheral equipment, the vehicle-mounted connector, a server and a system, and the authentication method has higher safety performance when the peripheral equipment and the vehicle-mounted connector perform data interaction.
Fig. 1 is a flowchart of an authentication method between a peripheral device and a vehicle-mounted connector according to an embodiment of the present invention. As shown in fig. 1, the authentication method between the peripheral device and the vehicle-mounted connector provided by the embodiment of the invention includes the following steps:
s11: detecting whether the peripheral equipment is connected with the vehicle-mounted connector or not, and when the peripheral equipment is connected with the vehicle-mounted connector, acquiring basic information of the peripheral equipment by the vehicle-mounted connector, and judging whether the peripheral equipment acquires authorization of connection with the vehicle-mounted connector before the connection. When the peripheral equipment does not acquire the authorization of the connection with the vehicle-mounted connector, the step S12 is performed, and when the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the connection, the step S14 is performed:
in this step, the peripheral device and the vehicle-mounted connector may be connected by wifi, radio frequency, bluetooth, BT (BitTorrent) or the like, or may be connected by a wired manner through an interface such as a USB interface, UART interface, CAN line interface, LVDS interface, HDMI interface, or MIPI interface.
Further, after the vehicle-mounted connector detects that the peripheral equipment is connected with the vehicle-mounted connector, the method further comprises the following steps:
The vehicle-mounted connector sends first request information, such as identity and version number information of the vehicle-mounted connector, to the external equipment;
after receiving the first request information sent by the vehicle-mounted connector, the peripheral equipment replies basic information of the peripheral equipment, wherein the basic information comprises identity information and version number information;
the vehicle-mounted connector judges whether the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the connection according to the identity and version number information of the peripheral equipment.
Further, in this step, after the vehicle-mounted connector receives the identity and version number information of the peripheral device, it is further required to verify the identity information of the peripheral device, so as to verify whether the peripheral device is an authorized peripheral device capable of performing data interaction with the vehicle-mounted connector. If the peripheral equipment is the peripheral equipment which can not carry out data interaction with the vehicle-mounted connector, the vehicle-mounted connector prohibits the data interaction between the peripheral equipment and the vehicle, and the vehicle-mounted connector can only charge the peripheral equipment in a wired or wireless mode.
S12: the method comprises the steps that a vehicle-mounted connector requests a server to judge whether peripheral equipment is authorized peripheral equipment or not, the server performs information interaction with the peripheral equipment through the vehicle-mounted connector, judges whether the peripheral equipment is authorized peripheral equipment according to basic information of the peripheral equipment and interaction information of the peripheral equipment, sends an authorization judgment result to the vehicle-mounted connector, and enters S13 when the peripheral equipment is authorized peripheral equipment;
More specifically, the method further comprises:
the vehicle-mounted connector sends an authorization request containing the identity information of the peripheral equipment to the server. In this step, the in-vehicle connector may communicate with the server via the communication system of the vehicle.
The server sends a first random code R1 to the external device through the vehicle-mounted connector. In this embodiment, the in-vehicle connector also verifies the format of the first random code R1.
The peripheral equipment encrypts a prestored authorization code according to the obtained first random code R1 to obtain first intermediate data, and the first intermediate data is transmitted to a server through a vehicle-mounted connector. In this step, the authorization code in the peripheral device may be directly assigned at the time of shipment, unlike the authorization code for the connection with the in-vehicle connector of the identity information of the peripheral device. That is, the identity information and the authorization code are unique and corresponding in different peripheral devices. Further, the onboard connector also verifies the format of the first intermediate data.
The server decrypts the first intermediate data through the first random code R1 to obtain authorization codes in the peripheral equipment, compares the identity information of the peripheral equipment obtained from the vehicle-mounted connector and the authorization codes of the peripheral equipment obtained through decryption with the identity information and the authorization codes of the peripheral equipment stored in the server to judge whether the peripheral equipment is an authorized peripheral equipment, and transmits the authorization judgment result to the vehicle-mounted connector.
In the step, the server stores the identity information of the peripheral equipment and the corresponding data of the authorization code thereof in advance, and when the identity information of the peripheral equipment obtained by the server from the vehicle-mounted connector and the authorization code obtained by decryption correspond to the data stored by the server, the peripheral equipment can be judged to be the authorized peripheral equipment.
S13: when the vehicle-mounted connector receives information that the peripheral equipment is an authorized peripheral equipment sent by the server, the vehicle-mounted connector performs information interaction with the peripheral equipment to obtain a working password generated by the peripheral equipment, records basic information and the working password corresponding to the peripheral equipment, and enters the step S14; and when the vehicle-mounted connector receives the unauthorized information sent by the server, prohibiting data interaction between the peripheral equipment and the vehicle-mounted connector.
That is, when the peripheral device obtains the authorization of connection on a certain vehicle-mounted connector, at least three pieces of corresponding information including a working password, identity information and version number information of the peripheral device are stored in the vehicle-mounted connector. When the vehicle-mounted connector is connected next time, the vehicle-mounted connector only judges that a certain peripheral device acquires the authorization of connection on the vehicle-mounted connector when the working password corresponding to the identity information and the version number information transmitted by the peripheral device is stored in the vehicle-mounted connector in the step S11.
More specifically, in this embodiment, in the step of obtaining, by the in-vehicle connector, the work password generated by the peripheral device, the method further includes:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment. In this embodiment, the authorization code may be obtained from the peripheral device, or may be obtained from the server together when the determination result of whether the server is authorized is obtained;
the vehicle-mounted connector generates a second random code R2, encrypts the second random code through an authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the peripheral equipment;
the peripheral equipment decrypts the second intermediate data through the self authorization code to obtain a second random code R2 generated by the vehicle-mounted connector;
the peripheral equipment generates a working password, encrypts the working password by using a second random code R2 to obtain third intermediate data, and transmits the third intermediate data to the vehicle-mounted connector;
the vehicle-mounted connector decrypts the third intermediate data by using the second random code R2 to obtain a working password, and stores the working password.
S14: the vehicle-mounted connector and the peripheral equipment carry out information interaction, the vehicle-mounted connector generates a third random code R3 used for encrypting and decrypting data transmitted by the vehicle-mounted connector, the peripheral equipment generates a fourth random code R4 used for encrypting and decrypting data transmitted by the peripheral equipment, and the third random code R3 and the fourth random code R4 are simultaneously stored in the vehicle-mounted connector and the peripheral equipment so as to finish authentication between the vehicle-mounted connector and the peripheral equipment.
More specifically, in this step, when the generation and storage of the third random code R3 and the fourth random code R4 are performed, the method further includes the steps of:
the vehicle-mounted connector generates a third random code R3, encrypts the third random code R3 by utilizing the working password stored in the step S13 to obtain fourth intermediate data, and transmits the fourth intermediate data to the peripheral equipment;
the peripheral equipment decrypts the fourth intermediate data by using the working password to obtain a third random code R3, stores the third random code R3, generates a fourth random code R4 at the same time, encrypts the fourth random code R4 by using the third random code R3 to obtain fifth intermediate data, and transmits the fifth intermediate data to the vehicle-mounted connector;
the vehicle-mounted connector decrypts the fifth intermediate data through the third random code R3 to obtain a fourth random code R4 generated by the peripheral equipment.
Further, the method may further include the peripheral device performing AES (Advanced Encryption Standard ) encryption on the fifth intermediate data, such as AES-128 encryption, to further improve security performance. Accordingly, the in-vehicle connector AES-decrypts the corresponding data to obtain fifth intermediate data.
When the peripheral equipment performs data interaction with the vehicle through the vehicle-mounted connector, data sent by the peripheral equipment are encrypted through a fourth random code R4, and data sent by the vehicle-mounted connector are encrypted through a third random code R3.
Before each time of data interaction between the peripheral equipment and the vehicle-mounted connector, the vehicle-mounted connector and the peripheral equipment are required to regenerate the third random code R3 and the fourth random code R4, and transmit and store the third random code R3 and the fourth random code R4 so as to ensure the safety of data transmission.
Fig. 2 is a flow chart of an authentication method between a peripheral device based on a vehicle-mounted connector and the vehicle-mounted connector according to an embodiment of the present invention. As shown in fig. 2, the invention further provides an authentication method between the peripheral device based on the vehicle-mounted connector and the vehicle-mounted connector, which comprises the following steps:
s21: detecting whether peripheral equipment is connected or not, and when the peripheral equipment is connected with the vehicle-mounted connector, acquiring basic information of the peripheral equipment connected with the vehicle-mounted connector by the vehicle-mounted connector, and judging whether the peripheral equipment acquires authorization of connection with the vehicle-mounted connector before the connection. When the peripheral equipment does not acquire the authorization of the connection with the vehicle-mounted connector before the connection, the step S22 is performed, and when the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the connection, the step S23 is performed;
In this embodiment, when the vehicle-mounted connector detects that the peripheral device is connected, the vehicle-mounted connector sends first request information, such as identity and version number information of the vehicle-mounted connector itself, to the peripheral device so as to obtain basic information including identity information and version number information of the peripheral device.
S22: the vehicle-mounted connector requests a judgment result of whether the peripheral equipment is an authorized peripheral equipment from the server, receives the judgment result, and enters S23 when the judgment result is that the peripheral equipment is the authorized peripheral equipment;
more specifically, in this step, the method includes:
the vehicle-mounted connector judges whether the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the connection according to the identity and version number information of the peripheral equipment, and when the peripheral equipment does not acquire the authorization before the connection, the vehicle-mounted connector sends an authentication request containing the identity information of the peripheral equipment outwards:
the vehicle-mounted connector receives a first random code R1 sent by a server, and sends the first random code R1 to peripheral equipment;
the vehicle-mounted connector receives first intermediate data transmitted by the peripheral equipment, wherein the first intermediate data contains an encrypted authorization code of the peripheral equipment, and the first intermediate data is transmitted outwards;
The method comprises the steps that a vehicle-mounted connector receives a judging result of whether the peripheral equipment is an authorized peripheral equipment or not, when the judging result is that the peripheral equipment is the authorized peripheral equipment, the vehicle-mounted connector performs information interaction with the peripheral equipment to obtain a working password generated by the peripheral equipment, and records the working password corresponding to the peripheral equipment and basic information of the peripheral equipment; and when the judgment result is the information which is not authorized, prohibiting the data interaction between the peripheral equipment and the vehicle-mounted connector.
When the vehicle-mounted connector obtains the working password generated by the peripheral equipment, the method further comprises the following steps:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code R2, encrypts the second random code R2 through an authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data outwards;
the vehicle-mounted connector receives third intermediate data, wherein the third intermediate data is a working password generated by the encrypted peripheral equipment, and decrypts the third intermediate data by using the second random code R2 to obtain the working password, and stores the working password.
S23: and generating a third random code R3 for encrypting and decrypting the data transmitted by the vehicle-mounted connector, transmitting the third random code R3 to the peripheral equipment, receiving a fourth random code R4 for encrypting and decrypting the data transmitted by the peripheral equipment, and storing the third random code R3 and the fourth random code R4.
Specifically, in this step, the method further includes:
the vehicle-mounted connector generates a third random code R3, encrypts the third random code R3 by using a working password transmitted by peripheral equipment to obtain fourth intermediate data, and transmits the fourth intermediate data outwards;
the vehicle-mounted connector receives fifth intermediate data sent by the peripheral equipment, the fifth intermediate data contains a fourth random code R4 generated by the encrypted peripheral equipment, the third random code R3 is utilized to decrypt the fifth intermediate data to obtain the fourth random code R4, and the fourth random surface R4 is stored.
The invention also provides a vehicle-mounted connector, which comprises a first computer storage medium, wherein the first computer storage medium comprises a computer program, and when the computer program is executed, the authentication method between the peripheral equipment based on the vehicle-mounted connector and the vehicle-mounted connector is realized.
Fig. 3 is a flowchart of an authentication method between a peripheral device and a vehicle-mounted connector based on the peripheral device according to an embodiment of the present invention. As shown in fig. 3, the present invention further provides an authentication method between a peripheral device and a vehicle-mounted connector based on the peripheral device, the method comprising the following steps:
S31: after being connected with the vehicle-mounted connector, the method sends basic information of peripheral equipment and enters S32;
s32: receiving information sent by the vehicle-mounted connector, judging the information, assisting the server to judge whether the peripheral equipment is authorized peripheral equipment or not when the received information is interactive information of the server and the peripheral equipment, and entering step S33; when the received information is the interactive information sent by the vehicle-mounted connector for acquiring the fourth random code R4, entering S34;
more specifically, when the server performs information interaction, the method comprises the following steps: when the first random code R1 is sent by the vehicle-mounted connector, the prestored authorization code is encrypted according to the first random code R1 to obtain first intermediate data, and the first intermediate data is transmitted to the vehicle-mounted connector.
S33: receiving the interaction information generated by the vehicle-mounted connector and sent for acquiring the working password, generating the working password, transmitting the working password outwards, and entering into the step S34;
more specifically, the method comprises:
receiving second intermediate data, wherein the second intermediate data contains a second random code R2 generated by an encrypted vehicle-mounted connector, and decrypting the second intermediate data through an authorization code pre-stored in the second intermediate data to obtain the second random code R2 generated by the vehicle-mounted connector;
And generating a working password, encrypting the working password by using the second random code R2 to obtain third intermediate data, and transmitting the third intermediate data outwards.
S34: and receiving a third random code R3 for encrypting and decrypting the data transmitted by the vehicle-mounted connector, generating a fourth random code R4 for encrypting and decrypting the data transmitted by the peripheral equipment, transmitting the fourth random code R4 outwards, and storing the third random code R3 and the fourth random code R4.
Specifically, in this step, the method further includes:
the peripheral equipment is connected with fourth intermediate data, the fourth intermediate data contains a third random code R3 generated by the encrypted vehicle-mounted connector, and the fourth intermediate data is decrypted by utilizing a working password to obtain a third random code R4;
generating a fourth random code R4, encrypting the fourth random code R4 by using a third random code R3 to obtain fifth intermediate data, and transmitting the fifth intermediate data outwards.
The invention also provides the peripheral equipment, which comprises a computer storage medium, wherein the computer storage medium adopts the authentication method between the peripheral equipment based on the peripheral equipment and the vehicle-mounted connector to authenticate the peripheral equipment and the vehicle-mounted connector.
Fig. 4 is a flowchart of an authentication method between a peripheral device based on a server and a vehicle-mounted connector according to an embodiment of the present invention. As shown in fig. 4, the present invention further provides an authentication method between a peripheral device based on a server and a vehicle-mounted connector, the method comprising the following steps:
s41: receiving request information which is sent by the vehicle-mounted connector and used for judging whether the external equipment is authorized external equipment or not, carrying out information interaction with the external equipment through the vehicle-mounted connector, and entering into S42;
specifically, the information interaction mode is as follows:
the server generates a first random code R1 and transmits the first random code R1 outwards;
and receiving first intermediate data, wherein the first intermediate data contains the encrypted authorization code of the peripheral equipment, and decrypting the first intermediate data by using the first random code R1 to obtain the authorization code of the peripheral equipment.
S42: and comparing the basic information of the peripheral equipment and the interaction information of the peripheral equipment with pre-stored information of the peripheral equipment, judging whether the peripheral equipment is an authorized peripheral equipment or not, and transmitting the judging result outwards.
Specifically, in this step, the server compares the identity information of the peripheral device obtained from the vehicle-mounted connector and the authorization code obtained by decryption with the correspondence between the identity information of the peripheral device and the authorization code stored in the server itself, and determines whether the correspondence information of the two is consistent. When the identity information and authorization code of the peripheral equipment acquired by the server are consistent with the stored identity information and authorization code of the peripheral equipment, judging that the peripheral equipment is an authorized peripheral equipment.
The invention also provides a server, which comprises a third computer storage medium, wherein the third computer storage medium comprises a computer program, and when the computer program is executed, the authentication method between the external equipment based on the server and the vehicle-mounted connector is realized.
In the invention, when the mutually connected peripheral equipment does not acquire the connection authorization between the peripheral equipment and the vehicle-mounted connector, whether the connection between the peripheral equipment and the vehicle-mounted connector can be authorized or not is judged through the information interaction between the server and the peripheral equipment and the basic information of the peripheral equipment; meanwhile, after the connection authorization is obtained, new third random codes R3 and fourth random codes R4 for encryption and decryption during respective data transmission are generated during each connection between the vehicle-mounted connector and the peripheral equipment, and therefore the safety of the peripheral equipment and the vehicle-mounted connector during data interaction can be greatly improved.
The present invention is not limited to the above-mentioned embodiments, but is intended to be limited to the following embodiments, and any modifications, equivalent changes and variations in the above-mentioned embodiments can be made by those skilled in the art without departing from the scope of the present invention.

Claims (10)

1. An authentication method between a peripheral device and a vehicle-mounted connector is characterized in that: the method comprises the following steps:
s11: detecting whether the peripheral equipment is connected with the vehicle-mounted connector or not, when the connection is established between the peripheral equipment and the vehicle-mounted connector, acquiring basic information of the peripheral equipment by the vehicle-mounted connector, judging whether the peripheral equipment acquires authorization of the connection with the vehicle-mounted connector before the connection, entering S12 when the authorization is not acquired, and entering S14 when the authorization is acquired;
after the vehicle-mounted connector is connected with the peripheral equipment, the method further comprises the following steps:
the vehicle-mounted connector sends first request information to the peripheral equipment;
the peripheral equipment replies the basic information to the vehicle-mounted connector, wherein the basic information comprises identity information and version number information;
the vehicle-mounted connector sends an authorization request containing the identity information of the peripheral equipment to a server;
the server sends a first random code to the peripheral equipment through the vehicle-mounted connector;
the peripheral equipment encrypts a prestored authorization code according to the first random code to obtain first intermediate data, and transmits the first intermediate data to the server through the vehicle-mounted connector;
The server decrypts the first intermediate data through the first random code to obtain the authorization code of the peripheral equipment, compares the obtained identity information and authorization code of the peripheral equipment with the identity information and authorization code of the peripheral equipment stored by the server to judge whether the peripheral equipment is an authorized peripheral equipment or not, and transmits the judging result of authorization to the vehicle-mounted connector;
s12: the vehicle-mounted connector requests a server to judge whether the peripheral equipment is an authorized peripheral equipment or not, the server performs information interaction with the peripheral equipment through the vehicle-mounted connector, judges whether the peripheral equipment is the authorized peripheral equipment or not according to basic information of the peripheral equipment and interaction information of the peripheral equipment, sends an authorization judgment result to the vehicle-mounted connector, and enters S13 when the judgment result is that the peripheral equipment is the authorized peripheral equipment;
s13: when the vehicle-mounted connector receives the information that the peripheral equipment is an authorized peripheral equipment sent by the server, the vehicle-mounted connector performs information interaction with the peripheral equipment to obtain a working password generated by the peripheral equipment, records the working password and basic information corresponding to the peripheral equipment, and performs S14;
S14: the vehicle-mounted connector performs information interaction with the peripheral equipment, the vehicle-mounted connector generates a third random code for encrypting and decrypting data transmitted by the vehicle-mounted connector, the peripheral equipment generates a fourth random code for encrypting and decrypting data transmitted by the peripheral equipment, and the third random code and the fourth random code are simultaneously stored in the vehicle-mounted connector and the peripheral equipment.
2. The authentication method between the peripheral device and the in-vehicle connector according to claim 1, wherein: in the step of obtaining the peripheral device to generate the working password by the vehicle-mounted connector, the method further comprises the following steps:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the peripheral equipment;
the peripheral equipment decrypts the second intermediate data through the self authorization code to obtain a second random code generated by the vehicle-mounted connector;
the peripheral equipment generates a working password, encrypts the working password by using the second random code to obtain third intermediate data, and transmits the third intermediate data to the vehicle-mounted connector;
And the vehicle-mounted connector decrypts the third intermediate data by utilizing the second random code to obtain the working password and stores the working password.
3. The authentication method between the peripheral device and the in-vehicle connector according to claim 1, wherein: in the step S14, the method further includes:
the vehicle-mounted connector generates the third random code, encrypts the third random code by using the working password to obtain fourth intermediate data, and transmits the fourth intermediate data to the peripheral equipment;
the peripheral equipment decrypts the fourth intermediate data by using the working password to obtain the third random code and stores the third random code;
the peripheral equipment generates the fourth random code, encrypts the fourth random code by using the third random code to obtain fifth intermediate data, and transmits the fifth intermediate data to the vehicle-mounted connector.
4. An authentication method between a peripheral device based on a vehicle-mounted connector and the vehicle-mounted connector is characterized by comprising the following steps of: the method comprises the following steps:
s21: detecting whether peripheral equipment is connected or not, when the peripheral equipment is connected with the vehicle-mounted connector, the vehicle-mounted connector acquires basic information of the peripheral equipment connected with the vehicle-mounted connector, and judging whether the peripheral equipment acquires authorization of connection with the vehicle-mounted connector before the connection; when the peripheral equipment does not acquire the authorization of the connection with the vehicle-mounted connector before the connection, the step S22 is performed, and when the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the connection, the step S23 is performed;
S22: the vehicle-mounted connector requests a judgment result of whether the peripheral equipment is an authorized peripheral equipment from a server, receives the judgment result, and enters S23 when the judgment result is that the peripheral equipment is the authorized peripheral equipment;
the vehicle-mounted connector judges whether the peripheral equipment acquires the authorization of the connection with the vehicle-mounted connector before the peripheral equipment is connected according to the identity information and version number information of the peripheral equipment, and when the authorization is not acquired, the vehicle-mounted connector sends an authentication request containing the identity information of the peripheral equipment to a server;
the vehicle-mounted connector receives a first random code from the server and sends the first random code to the peripheral equipment;
the vehicle-mounted connector receives first intermediate data sent by the peripheral equipment, the first intermediate data is obtained by encrypting a prestored authorization code by the peripheral equipment according to the first random code, the first intermediate data contains the encrypted authorization code of the peripheral equipment, and the first intermediate data is transmitted to the server;
the vehicle-mounted connector receives a judging result of whether the peripheral equipment is an authorized peripheral equipment or not, and when the judging result is that the peripheral equipment is the authorized peripheral equipment, the vehicle-mounted connector performs information interaction with the peripheral equipment to acquire a working password generated by the peripheral equipment and stores the working password and basic information of the peripheral equipment;
S23: generating a third random code for encrypting and decrypting the data transmitted by the vehicle-mounted connector, transmitting the third random code to the peripheral equipment, receiving a fourth random code for encrypting and decrypting the data transmitted by the peripheral equipment, and storing the third random code and the fourth random code.
5. The authentication method between the peripheral device based on the in-vehicle connector and the in-vehicle connector according to claim 4, wherein: in the step of obtaining the working password generated by the peripheral device by the vehicle-mounted connector, the method further comprises the following steps:
the vehicle-mounted connector acquires an authorization code of the peripheral equipment;
the vehicle-mounted connector generates a second random code, encrypts the second random code through the authorization code of the peripheral equipment to obtain second intermediate data, and transmits the second intermediate data to the peripheral equipment;
the vehicle-mounted connector receives third intermediate data from the peripheral equipment, the third intermediate data contains an encrypted working password generated by the peripheral equipment, the second random code is utilized to decrypt the third intermediate data, the working password is obtained, and the working password is stored.
6. The authentication method between the peripheral device based on the in-vehicle connector and the in-vehicle connector according to claim 4, wherein: in step S23, the method further comprises:
the vehicle-mounted connector generates a third random code, encrypts the third random code by using the working password to obtain fourth intermediate data, and transmits the fourth intermediate data to the peripheral equipment;
the vehicle-mounted connector receives fifth intermediate data from the peripheral equipment, wherein the fifth intermediate data is the fourth random code generated by the peripheral equipment and contains encryption, the third random code is utilized to decrypt the fifth intermediate data to obtain the fourth random code, and the fourth random code is stored.
7. A vehicle connector, characterized in that: the in-vehicle connector includes a first computer storage medium including a computer program which, when executed, implements the authentication method between the in-vehicle connector-based peripheral device of any one of claims 4 to 6 and the in-vehicle connector.
8. An authentication method between a peripheral device based on a server and a vehicle-mounted connector is characterized in that: the method comprises the following steps:
S41: receiving request information which is sent by the vehicle-mounted connector and used for judging whether the external equipment is authorized external equipment, wherein the request information comprises identity information of the external equipment, performs information interaction with the external equipment and enters S42;
the server generates a first random code after receiving the request information sent by the vehicle-mounted connector, and transmits the first random code to the peripheral equipment through the vehicle-mounted connector;
receiving first intermediate data sent by the peripheral equipment through the vehicle-mounted connector, wherein the first intermediate data is obtained by encrypting a prestored authorization code by the peripheral equipment according to the first random code, and decrypting the first intermediate data by utilizing the first random code to obtain the authorization code of the peripheral equipment;
s42: comparing the received identity information of the peripheral equipment and the received interaction information of the peripheral equipment with pre-stored information of the peripheral equipment, judging whether the peripheral equipment is an authorized peripheral equipment or not, and transmitting the judging result to the vehicle-mounted connector.
9. The authentication method between the server-based peripheral device and the in-vehicle connector according to claim 8, wherein: in performing step S42, the method includes:
The server compares the acquired identity information and authorization code of the peripheral equipment with the corresponding relation between the identity information acquired from the peripheral equipment and the identity information and authorization code of the peripheral equipment stored by the server, judges whether the corresponding relation between the identity information and authorization code is consistent, and judges that the peripheral equipment is an authorized peripheral equipment when the corresponding relation between the identity information and authorization code of the peripheral equipment is consistent.
10. A server, characterized by: the server comprises a third computer storage medium comprising a computer program which, when executed, implements the authentication method between the server-based peripheral device of any of claims 8 to 9 and the in-vehicle connector.
CN202110769901.7A 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server Active CN113572745B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110769901.7A CN113572745B (en) 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110769901.7A CN113572745B (en) 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server

Publications (2)

Publication Number Publication Date
CN113572745A CN113572745A (en) 2021-10-29
CN113572745B true CN113572745B (en) 2023-08-08

Family

ID=78164011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110769901.7A Active CN113572745B (en) 2021-07-07 2021-07-07 Authentication method, peripheral equipment, vehicle-mounted connector and server

Country Status (1)

Country Link
CN (1) CN113572745B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115257580B (en) * 2022-07-22 2024-05-14 智己汽车科技有限公司 Peripheral control method and control system of intelligent vehicle

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023458A (en) * 2016-05-13 2016-10-12 智车优行科技(北京)有限公司 Vehicle control method, apparatus and terminal, vehicle, server and system
CN106257861A (en) * 2015-06-18 2016-12-28 涓ヤ卡 By controlling authentication method and the system thereof of equipment and auto communication
CN109159758A (en) * 2018-08-31 2019-01-08 深圳市元征科技股份有限公司 Equipment authentication method and mobile unit
CN109618345A (en) * 2019-01-29 2019-04-12 盐城骏拔汽车零部件有限公司 Vehicle remote authorization access control system and method
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
CN110289958A (en) * 2019-07-18 2019-09-27 郑州信大捷安信息技术股份有限公司 Internet of Vehicles identity authentication method and system
CN110830491A (en) * 2019-11-14 2020-02-21 武汉虹信通信技术有限责任公司 Internet of vehicles information acquisition method and device
CN112153019A (en) * 2020-09-09 2020-12-29 上海仙塔智能科技有限公司 Data interaction system, vehicle-mounted connector, peripheral equipment, vehicle and method
CN112751832A (en) * 2020-12-18 2021-05-04 湖南麒麟信安科技股份有限公司 Online authorization authentication method, equipment and storage medium for virtual machine operating system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106257861A (en) * 2015-06-18 2016-12-28 涓ヤ卡 By controlling authentication method and the system thereof of equipment and auto communication
CN106023458A (en) * 2016-05-13 2016-10-12 智车优行科技(北京)有限公司 Vehicle control method, apparatus and terminal, vehicle, server and system
CN109618313A (en) * 2017-09-30 2019-04-12 厦门歌乐电子企业有限公司 A kind of vehicle-mounted Bluetooth equipment and attaching method thereof, system
CN109159758A (en) * 2018-08-31 2019-01-08 深圳市元征科技股份有限公司 Equipment authentication method and mobile unit
CN109618345A (en) * 2019-01-29 2019-04-12 盐城骏拔汽车零部件有限公司 Vehicle remote authorization access control system and method
CN110289958A (en) * 2019-07-18 2019-09-27 郑州信大捷安信息技术股份有限公司 Internet of Vehicles identity authentication method and system
CN110830491A (en) * 2019-11-14 2020-02-21 武汉虹信通信技术有限责任公司 Internet of vehicles information acquisition method and device
CN112153019A (en) * 2020-09-09 2020-12-29 上海仙塔智能科技有限公司 Data interaction system, vehicle-mounted connector, peripheral equipment, vehicle and method
CN112751832A (en) * 2020-12-18 2021-05-04 湖南麒麟信安科技股份有限公司 Online authorization authentication method, equipment and storage medium for virtual machine operating system

Also Published As

Publication number Publication date
CN113572745A (en) 2021-10-29

Similar Documents

Publication Publication Date Title
CN109862040B (en) Security authentication method and authentication system
CN108122311B (en) Vehicle virtual key implementation method and system
US10708062B2 (en) In-vehicle information communication system and authentication method
EP3648396B1 (en) Maintenance system and maintenance method
CN111194028B (en) Safety control method based on vehicle
CN107995608B (en) Method and device for authentication through Bluetooth vehicle-mounted unit
US9143320B2 (en) Electronic key registration system
CN106572106B (en) Method for transmitting message between TBOX terminal and TSP platform
CN109895734B (en) Authorized Bluetooth key activation method and system, storage medium and T-BOX
US9479329B2 (en) Motor vehicle control unit having a cryptographic device
CN105704131A (en) Vehicle lock control method and cloud management server
CN106850311B (en) Data security transmission system and method for firmware upgrade
CN107493561B (en) Shared device unlocking method, device and system and storage medium
CN106912046B (en) One-way key fob and vehicle pairing
CN102142961A (en) Method, device and system for authenticating gateway, node and server
CN105636037B (en) Authentication method, device and electronic equipment
CN110738776A (en) method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof
CN113572745B (en) Authentication method, peripheral equipment, vehicle-mounted connector and server
CN109618313B (en) Vehicle-mounted Bluetooth device and connection method and system thereof
CN111294771A (en) In-vehicle device, system for implementing in-vehicle communication and related method
CN111526511B (en) Charging pile and charging vehicle identity verification method based on random code decoding
JP6905950B2 (en) Authentication methods and computer programs for terminal devices, automobiles, and remote-controlled terminals for automobiles
JP2016152438A (en) Software updating device, portable terminal and software updating system
JP5985845B2 (en) Electronic key registration method
TWI559165B (en) Wireless authentication system and wireless authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231101

Address after: Floors 3-7, Building T3, No. 377 Songhong Road, Changning District, Shanghai, 200000

Patentee after: Shanghai Jiayu Intelligent Technology Co.,Ltd.

Address before: Room 8041, 1033 Changning Road, Changning District, Shanghai 200042 (9th floor, nominal floor)

Patentee before: Shanghai xianta Intelligent Technology Co.,Ltd.

TR01 Transfer of patent right