CN114040356A - Intelligent networking automobile data safety protection method integrating quantum safety - Google Patents
Intelligent networking automobile data safety protection method integrating quantum safety Download PDFInfo
- Publication number
- CN114040356A CN114040356A CN202111222001.7A CN202111222001A CN114040356A CN 114040356 A CN114040356 A CN 114040356A CN 202111222001 A CN202111222001 A CN 202111222001A CN 114040356 A CN114040356 A CN 114040356A
- Authority
- CN
- China
- Prior art keywords
- quantum
- key
- unit
- security
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000006855 networking Effects 0.000 title claims abstract description 17
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 26
- 238000004891 communication Methods 0.000 claims abstract description 22
- 230000003993 interaction Effects 0.000 claims description 26
- 230000006698 induction Effects 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000005094 computer simulation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an intelligent networking automobile data security protection method fusing quantum security, which is characterized in that a quantum security intelligent vehicle-mounted terminal is installed in an automobile, an encryption and decryption module is installed on a cloud server of the intelligent networking automobile, a quantum random number generated by a quantum random number source in the quantum security intelligent vehicle-mounted terminal is used as a symmetric key, a national security chip uses a national security symmetric algorithm, and 5G is used as a transmission channel to carry out quantum security encryption protection on data communication between the automobile and the cloud server; the quantum safety intelligent vehicle-mounted terminal adopts a standardized interface, the method is simple and convenient, and the applicability is strong; the vehicle legal user can master and manage the secret key by himself, the secret key is quantum random number, the secret keys used for data communication encryption between the vehicle and the cloud server are different each time, and high data safety of the intelligent networked vehicle is obviously guaranteed.
Description
Technical Field
The invention designs a method for protecting intelligent networking automobile data by using an encryption technology, and particularly relates to an intelligent networking automobile data security protection method integrating quantum security.
Background
The vehicle-mounted intelligent terminal is called a T-Box (telematics Box) and is used as a control unit for vehicle body networking, vehicle related information including but not limited to position information, attitude information and vehicle state information is acquired by connecting a CAN bus on a vehicle, the information is transmitted to a cloud control background through a self-contained wireless communication module, a vehicle legal user enters the cloud control background by using a mobile phone APP and a webpage client, and corresponding remote operation is carried out on the vehicle by issuing data and instructions. With the increasing of the degree of vehicle intelligence, the information capacity of vehicle interaction with the outside is increased rapidly, and the existing method cannot meet the requirements of high safety and high reliability of intelligent networked automobile data and content services.
In the aspect of protecting the data self-security, an encryption technology is generally adopted for solving the problem, and the method can be divided into an asymmetric password and a symmetric password according to a secret key mode. The security of the asymmetric password, namely the public and private key password depends on the computational complexity of the mathematical difficulty problem which the public key algorithm depends on, and is threatened by increasing the mathematical level and the computing power; the symmetric cipher refers to a cipher with the same encryption key and decryption key, the security of the symmetric cipher depends on the security of the encryption key and the security of the encryption and decryption algorithm, the randomness of the encryption key is poor, and the security is greatly reduced due to the long-term use of the same group of encryption keys and the insufficient protection measures taken for updating the encryption key. Under the condition that the key length is the same as other conditions, the symmetric cipher occupies less CPU than the asymmetric cipher, the network consumption is low, and the encryption and decryption speed is high.
The random number used in encryption can be extracted from classical physical noise such as thermal noise and electrical noise, and a pseudo-random number can be generated by means of computer simulation. In principle, classical physical processes can be modeled taking into account all variables, but the randomness produced by quantum physical processes can be truly random. The use of quantum random numbers in encryption can improve security.
Disclosure of Invention
The invention aims to provide an intelligent networking automobile data security protection method fusing quantum security aiming at the defects of the prior art.
The purpose of the invention is realized by the following technical scheme: an intelligent networking automobile data safety protection method fusing quantum safety is realized on an intelligent networking automobile data safety protection system fusing quantum safety, the system comprises a quantum safety intelligent vehicle-mounted terminal and a cloud server, the quantum safety intelligent vehicle-mounted terminal comprises a microprocessor unit, a state secret security chip, a quantum random number source, a fingerprint acquisition unit, a camera unit, a WIFI unit, a positioning unit, a storage unit, an automobile electronic induction brake control unit, an electronic control unit connector, a high-speed bus driving unit, a first 5G communication unit, an audio and video coding and decoding unit, a clock unit, a gyroscope, a signal control unit, an automobile body sensor unit and a power supply unit, wherein the state secret security chip, the quantum random number source, the fingerprint acquisition unit, the camera unit, the WIFI unit, the positioning unit, the storage unit, the automobile electronic induction brake control unit, the electronic control unit connector, the high-speed bus driving unit, the first 5G communication unit, the audio and video coding and decoding unit, the clock unit, the gyroscope, the signal control unit, the automobile body sensor unit and the power supply unit are connected with the cloud server; the high-speed bus driving unit is connected with the electronic control unit connector, and the national security chip is connected with the quantum random number source; the cloud server comprises a second 5G communication unit and an encryption and decryption module, and comprises the following steps:
(1) before the vehicle leaves the factory, the quantum random number source generates a preset 128-bit quantum random number string Q0Said Q is0For the initial key, Q0The method comprises the steps of respectively storing the data in a quantum security intelligent vehicle-mounted terminal and a cloud server;
(2) after the automobile is delivered, the quantum random number source generates two new 128-bit quantum random number strings QiAnd QjSaid Q isiFor updating the keys, said QjFor use in encrypting data;
(3) the national secret security chip calls a symmetric algorithm and uses an initial secret key Q0For secret keys respectively to QiAnd QjCarrying out encryption;
(4) the encrypted Q is transmitted by 5G signaliAnd QjThe second 5G communication unit is sent to the cloud server; the cloud server receives the encrypted QiAnd QjThe encryption and decryption module calls a symmetric algorithm to initialize a secret key Q0Receiving for a key pairTo the encrypted QiAnd QjFor decrypting, and subsequently for decrypting the key Q used0Q after destroying and deciphering from thisiThe Q is used as a key for encryption and decryption when the key is synchronously updated between the next quantum security intelligent vehicle-mounted terminal and the cloud server, and the Q is decryptedjThe method comprises the following steps of (1) taking the obtained key as a key for encryption and decryption during data interaction between a quantum security intelligent vehicle-mounted terminal and a cloud server; qiAnd QjRespectively storing the data in a quantum security intelligent vehicle-mounted terminal and a cloud server;
(5) if no data interaction exists between the quantum security intelligent vehicle-mounted terminal and the cloud server within a period of time, the quantum security intelligent vehicle-mounted terminal automatically generates two new 128-bit quantum random number strings to form QiRepeating the step (3) and the step (4) for the key; if data interaction occurs between the quantum security intelligent vehicle-mounted terminal and the cloud server, the party receiving the data original text calls a symmetric algorithm to obtain QjEncrypting the data text for the key, sending the encrypted information to the other party through 5G signal, calling symmetric algorithm after the other party receives the encrypted information, and using QjDecrypting the secret key to obtain a data original text and storing the data original text, and then automatically generating two new 128-bit quantum random number strings by the quantum security intelligent vehicle-mounted terminal to obtain QiRepeating the step (3) and the step (4) for the key; and finishing the key updating and waiting for the next data interaction.
Further, the quantum random number source may generate a quantum random number string.
Furthermore, the encryption and decryption mode adopts a quantum random number string as a secret key, a symmetric algorithm is called to carry out encryption and decryption calculation, and the secret key used for encrypting the interactive data each time is a brand-new quantum random number.
Furthermore, the updating of the symmetric key between the quantum security intelligent vehicle-mounted terminal and the cloud server, namely the updating of the quantum random number string, can be automatically updated at regular time or automatically updated after data interaction occurs between the quantum security intelligent vehicle-mounted terminal and the cloud server.
The invention has the advantages that the invention realizes the encryption synchronization key updating and the encryption data interaction between the vehicle and the cloud by taking the quantum random number as the key and combining the national key symmetric algorithm, the key is mastered and managed by the user, the technical requirements of GB/T25070-2019 information security technology-network security level protection third-level related security design are met, the key randomness is good, the key updating frequency is high, and because the updating of the secret key is also encrypted and protected by using the quantum random number, the secret key is safe to update, the intelligent network-connected automobile-cloud data interaction has the effects of high safety, high reliability and high encryption and decryption speed, and the safety and reliability problems of intelligent network-connected automobile-mounted terminal-cloud server core data interaction, such as safe cloud uploading of legal user identity data, software-defined automobile wireless downloading and updating, and the like, are particularly solved.
Drawings
FIG. 1 is a diagram of an intelligent networked automobile data protection system with quantum security integrated;
FIG. 2 is a flow chart of quantum random number strings and new iteration in intelligent networking automobile data security interaction.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clear, the present invention is further described in detail below with reference to fig. 1 and 2:
an intelligent networking automobile data security protection method fusing quantum security is realized on an intelligent networking automobile data security protection system fusing quantum security, and fig. 1 is a diagram of the intelligent networking automobile data protection system fusing quantum security. The system comprises a quantum security intelligent vehicle-mounted terminal (QT-Box) and a cloud server; the quantum security intelligent vehicle-mounted terminal comprises a microprocessor unit, and a state secret security chip, a quantum random number source, a fingerprint acquisition unit, a camera unit, a WIFI unit, a positioning unit, a storage unit, an automobile electronic induction brake control unit, an electronic control unit connector, a high-speed bus driving unit, a first 5G communication unit, an audio and video coding and decoding unit, a clock unit, a gyroscope, a signal control unit, a vehicle body sensor unit and a power supply unit which are connected with the microprocessor unit; the high-speed bus driving unit is connected with the electronic control unit connector, and the national security chip is connected with the quantum random number source; the cloud server comprises a second 5G communication unit and an encryption and decryption module.
The quantum random number source is a generator capable of generating quantum random numbers and generating quantum random number strings; the first 5G communication unit and the second 5G communication unit are used for carrying out data communication between a quantum security intelligent vehicle-mounted terminal (QT-Box) and a cloud server through 5G signals; symmetric algorithms are built in the national encryption security chip and the encryption and decryption module, and the national encryption security chip and the encryption and decryption module have a symmetric encryption and decryption operation function; the fingerprint acquisition unit and the camera unit are used for acquiring the identity characteristic information of the driver.
The quantum security intelligent vehicle-mounted terminal is designed on a multilayer PCB circuit board, and integrates a quantum random number source, a state secret security chip, a fingerprint acquisition unit, a camera unit, a WIFI unit, a positioning unit, a storage unit, an automobile electronic induction brake control unit, an electronic control unit connector, a high-speed bus driving unit, a microprocessor unit, a first 5G communication unit, an audio and video coding and decoding unit, a clock unit, a gyroscope, a signal control unit, a vehicle body sensor unit and a power supply unit on a single board by using a universal PCB design method; the fingerprint acquisition unit, the camera unit, the WIFI unit, the positioning unit, the storage unit, the automobile electronic induction brake control unit, the electronic control unit connector, the high-speed bus driving unit, the microprocessor unit, the first 5G communication unit, the audio and video coding and decoding unit, the clock unit, the gyroscope, the signal control unit, the automobile body sensor unit and the power supply unit are common standard devices of a vehicle-mounted intelligent terminal (T-Box); the interfaces of all the devices are standard universal interfaces.
Example 1:
vehicle owner fingerprint information encryption input under quantum security
(1) Before the vehicle leaves the factory, the quantum random number source generates a preset 128-bit quantum random number string Q0Said Q is0For the initial key, Q0The method comprises the steps of respectively storing the data in a quantum security intelligent vehicle-mounted terminal and a cloud server; the quantum security intelligent vehicle-mounted terminal registers in the cloud server, and the quantum security intelligent vehicle-mounted terminal is installed in a vehicle.
(2) After the vehicle is delivered to the vehicle ownerAnd the vehicle owner activates the quantum security intelligent vehicle-mounted terminal and enters a configuration mode, and the quantum random number source generates two new 128-bit quantum random number strings QiAnd QjSaid Q isiFor updating the keys, said QjFor use in encrypting data.
(3) The national secret security chip calls a symmetric algorithm and uses an initial secret key Q0For secret keys respectively to QiAnd QjEncryption is performed.
(4) The encrypted Q is transmitted by 5G signaliAnd QjThe second 5G communication unit is sent to the cloud server; the cloud server receives the encrypted QiAnd QjThe encryption and decryption module calls a symmetric algorithm to initialize a secret key Q0Encrypting received Q for a key pairiAnd QjFor decrypting, and subsequently for decrypting the key Q used0Q after destroying and deciphering from thisiThe Q is used as a key for encryption and decryption when the key is synchronously updated between the next quantum security intelligent vehicle-mounted terminal and the cloud server, and the Q is decryptedjThe method comprises the following steps of (1) taking the obtained key as a key for encryption and decryption during data interaction between a quantum security intelligent vehicle-mounted terminal and a cloud server; qiAnd QjAnd respectively storing the data in the quantum security intelligent vehicle-mounted terminal and the cloud server.
(5) The car owner presses the fingerprint collector, and the quantum security intelligent vehicle-mounted terminal obtains the fingerprint information that fingerprint collector sent.
(6) At the moment, data interaction occurs between the quantum security intelligent vehicle-mounted terminal and the cloud server; then the quantum security intelligent vehicle-mounted terminal calls a symmetric algorithm to QjEncrypting the data original text of the fingerprint information for the key, and sending the encrypted information to the cloud server through a 5G signal; after the second 5G communication unit in the cloud server receives the encryption information, the encryption and decryption module calls a symmetric algorithm to obtain QjDecrypting the key to obtain a data original text of the fingerprint information and storing the data original text in a cloud server; then, the quantum security intelligent vehicle-mounted terminal automatically generates two new 128-bit quantum random number strings QmAnd QnSubsequently repeating steps (3) and (4); qmSubstitutionQiThe new key Q used for encryption and decryption is used for synchronously updating the key between the intelligent vehicle-mounted terminal and the cloud server next timenSubstituted for QjThe secret key is used for encryption and decryption during data interaction between the quantum security intelligent vehicle-mounted terminal and the cloud server; and finishing the key updating and waiting for the next data interaction.
The encryption and decryption mode adopts a quantum random number string as a secret key, a symmetric algorithm is called to carry out encryption and decryption calculation, and the secret key used for encrypting and interacting data each time is a brand-new quantum random number.
The updating of the symmetric key between the quantum security intelligent vehicle-mounted terminal and the cloud server, namely the updating of the quantum random number string, can be automatically updated at regular time or automatically updated after data interaction occurs between the quantum security intelligent vehicle-mounted terminal and the cloud server.
Example 2:
automatic key update under quantum security
(1) Before the vehicle leaves the factory, the quantum random number source generates a preset 128-bit quantum random number string Q0Said Q is0For the initial key, Q0The method comprises the steps of respectively storing the data in a quantum security intelligent vehicle-mounted terminal and a cloud server; the quantum security intelligent vehicle-mounted terminal registers in the cloud server, and the quantum security intelligent vehicle-mounted terminal is installed in a vehicle.
(2) After the vehicle is delivered to the vehicle owner, the vehicle owner activates the quantum security intelligent vehicle-mounted terminal and enters a configuration mode, and the quantum random number source generates two new 128-bit quantum random number strings QiAnd QjSaid Q isiFor updating the keys, said QjFor use in encrypting data.
(3) The national secret security chip calls a symmetric algorithm and uses an initial secret key Q0For secret keys respectively to QiAnd QjEncryption is performed.
(4) The encrypted Q is transmitted by 5G signaliAnd QjThe second 5G communication unit is sent to the cloud server; the cloud server receives the encrypted QiAnd QjThe encryption and decryption module calls a symmetric algorithm to initialize a secret key Q0As a key pairReceived encrypted QiAnd QjFor decrypting, and subsequently for decrypting the key Q used0Q after destroying and deciphering from thisiThe Q is used as a key for encryption and decryption when the key is synchronously updated between the next quantum security intelligent vehicle-mounted terminal and the cloud server, and the Q is decryptedjThe method comprises the following steps of (1) taking the obtained key as a key for encryption and decryption during data interaction between a quantum security intelligent vehicle-mounted terminal and a cloud server; qiAnd QjAnd respectively storing the data in the quantum security intelligent vehicle-mounted terminal and the cloud server.
(5) If no data interaction between the quantum security intelligent vehicle-mounted terminal and the cloud server exceeds 24 hours, the quantum security intelligent vehicle-mounted terminal automatically generates two new 128-bit quantum random number strings QaAnd QbWith QiRepeating the step (3) and the step (4) for the key; qaUsed as a secret key Q for encryption and decryption when the secret key is synchronously updated between the next quantum security intelligent vehicle-mounted terminal and the cloud serverbThe secret key is used for encryption and decryption in interaction when the secret key is used as data between the quantum security intelligent vehicle-mounted terminal and the cloud server; and finishing the key updating and waiting for the next data interaction.
Example 3:
automobile automatic auxiliary driving software upgrading under quantum safety
(1) The automobile automatic auxiliary driving software upgrade package enters a cloud server, an encryption and decryption module of the cloud server calls a symmetric algorithm, and Q is stored locallyjAnd encrypting the upgrade package for the secret key, wherein the encrypted upgrade package is sent to a first 5G communication unit of the quantum security intelligent vehicle-mounted terminal through a 5G signal.
(2) The quantum security intelligent vehicle-mounted terminal receives the encrypted upgrade package, and the national security chip of the vehicle-mounted terminal calls a symmetric algorithm to locally store QjAnd decrypting the encrypted upgrade package for the secret key to obtain an original text of the upgrade package and upgrade the original text.
(3) Quantum security intelligent vehicle-mounted terminal generates two new 128-bit quantum random number strings QcAnd QdThe national secret security chip calls a symmetric algorithm to store the Q locallyiIs a key pair QcAnd QdAnd encrypting and sending the encrypted data to a cloud server through a 5G signal.
(4) The cloud server receives the encrypted QcAnd QdThe encryption and decryption module calls a symmetric algorithm to locally store QiDecrypting for the secret key to obtain QcAnd Qd,QcUsed as a secret key Q for encryption and decryption when the secret key is synchronously updated between the next quantum security intelligent vehicle-mounted terminal and the cloud serverdThe method comprises the following steps of (1) taking the obtained key as a key for encryption and decryption during data interaction between a quantum security intelligent vehicle-mounted terminal and a cloud server; and finishing the key updating and waiting for the next data interaction.
All the above embodiments are only used to help understanding the method proposed by the present invention, and those skilled in the art can implement all the technical solutions proposed and included in the present invention according to the idea of the present invention; this description is not intended to limit the invention.
Claims (4)
1. An intelligent networking automobile data safety protection method fusing quantum safety is realized on an intelligent networking automobile data safety protection system fusing quantum safety, the system comprises a quantum safety intelligent vehicle-mounted terminal and a cloud server, the quantum safety intelligent vehicle-mounted terminal comprises a microprocessor unit, a state secret security chip, a quantum random number source, a fingerprint acquisition unit, a camera unit, a WIFI unit, a positioning unit, a storage unit, an automobile electronic induction brake control unit, an electronic control unit connector, a high-speed bus driving unit, a first 5G communication unit, an audio and video coding and decoding unit, a clock unit, a gyroscope, a signal control unit, an automobile body sensor unit and a power supply unit, wherein the state secret security chip, the quantum random number source, the fingerprint acquisition unit, the camera unit, the WIFI unit, the positioning unit, the storage unit, the automobile electronic induction brake control unit, the electronic control unit connector, the high-speed bus driving unit, the first 5G communication unit, the audio and video coding and decoding unit, the clock unit, the gyroscope, the signal control unit, the automobile body sensor unit and the power supply unit are connected with the cloud server; the high-speed bus driving unit is connected with the electronic control unit connector, and the national security chip is connected with the quantum random number source; the cloud server comprises a second 5G communication unit and an encryption and decryption module, and is characterized by comprising the following steps:
(1) before the vehicle leaves the factory, the quantum random number source generates a preset 128-bit quantum random number string Q0Said Q is0For the initial key, Q0The method comprises the steps of respectively storing the data in a quantum security intelligent vehicle-mounted terminal and a cloud server;
(2) after the automobile is delivered, the quantum random number source generates two new 128-bit quantum random number strings QiAnd QjSaid Q isiFor updating the keys, said QjFor use in encrypting data;
(3) the national secret security chip calls a symmetric algorithm and uses an initial secret key Q0For secret keys respectively to QiAnd QjCarrying out encryption;
(4) the encrypted Q is transmitted by 5G signaliAnd QjThe second 5G communication unit is sent to the cloud server; the cloud server receives the encrypted QiAnd QjThe encryption and decryption module calls a symmetric algorithm to initialize a secret key Q0Encrypting received Q for a key pairiAnd QjFor decrypting, and subsequently for decrypting the key Q used0Q after destroying and deciphering from thisiThe Q is used as a key for encryption and decryption when the key is synchronously updated between the next quantum security intelligent vehicle-mounted terminal and the cloud server, and the Q is decryptedjThe method comprises the following steps of (1) taking the obtained key as a key for encryption and decryption during data interaction between a quantum security intelligent vehicle-mounted terminal and a cloud server; qiAnd QjRespectively storing the data in a quantum security intelligent vehicle-mounted terminal and a cloud server;
(5) if no data interaction exists between the quantum security intelligent vehicle-mounted terminal and the cloud server within a period of time, the quantum security intelligent vehicle-mounted terminal automatically generates two new 128-bit quantum random number strings to form QiRepeating the step (3) and the step (4) for the key; if data interaction occurs between the quantum security intelligent vehicle-mounted terminal and the cloud server, the party receiving the data original text calls a symmetric algorithm to obtain QjEncrypting the data text for the key, sending the encrypted information to the other party through 5G signal, calling symmetric algorithm after the other party receives the encrypted information, and using QjDecrypting the secret key to obtain a data original text and storing the data original text, and then automatically generating two new 128-bit quantum random number strings by the quantum security intelligent vehicle-mounted terminal to obtain QiRepeating the step (3) and the step (4) for the key; and finishing the key updating and waiting for the next data interaction.
2. The intelligent networked automobile data security protection method fused with quantum security as claimed in claim 1, wherein the quantum random number source can generate quantum random number strings.
3. The intelligent networked automobile data security protection method fused with quantum security as claimed in claim 1, wherein the encryption and decryption manner adopts quantum random number string as key, and calls symmetric algorithm to perform encryption and decryption calculation, and the key used for encrypting the interactive data each time is brand new quantum random number.
4. The intelligent networking automobile data security protection method fusing quantum security as claimed in claim 1, wherein the updating of the symmetric key between the quantum security intelligent vehicle-mounted terminal and the cloud server, that is, the updating of the quantum random number string, can be automatically updated at regular time or automatically updated after data interaction occurs between the quantum security intelligent vehicle-mounted terminal and the cloud server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111222001.7A CN114040356B (en) | 2021-10-20 | 2021-10-20 | Quantum security-fused intelligent network-connected automobile data security protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111222001.7A CN114040356B (en) | 2021-10-20 | 2021-10-20 | Quantum security-fused intelligent network-connected automobile data security protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114040356A true CN114040356A (en) | 2022-02-11 |
CN114040356B CN114040356B (en) | 2024-07-30 |
Family
ID=80141832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111222001.7A Active CN114040356B (en) | 2021-10-20 | 2021-10-20 | Quantum security-fused intelligent network-connected automobile data security protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114040356B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115242411A (en) * | 2022-09-23 | 2022-10-25 | 合肥工业大学 | Vehicle-interior network secure communication method based on quantum random number generator |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968781A (en) * | 2017-11-23 | 2018-04-27 | 大陆汽车投资(上海)有限公司 | The security processing of vehicle shared service |
KR20180109651A (en) * | 2017-12-18 | 2018-10-08 | 이승철 | The claude security system with OTP quantum random numbers |
KR101993885B1 (en) * | 2018-02-27 | 2019-06-27 | 채령 | The PUF-QRANG quantum system with security chips |
US20190394031A1 (en) * | 2018-01-11 | 2019-12-26 | Beijing Guodian Tong Network Technology Co., Ltd | Method and device for quantum key fusion-based virtual power plant security communication and medium |
CN113285803A (en) * | 2021-06-24 | 2021-08-20 | 中电信量子科技有限公司 | Mail transmission system and transmission method based on quantum security key |
-
2021
- 2021-10-20 CN CN202111222001.7A patent/CN114040356B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968781A (en) * | 2017-11-23 | 2018-04-27 | 大陆汽车投资(上海)有限公司 | The security processing of vehicle shared service |
KR20180109651A (en) * | 2017-12-18 | 2018-10-08 | 이승철 | The claude security system with OTP quantum random numbers |
US20190394031A1 (en) * | 2018-01-11 | 2019-12-26 | Beijing Guodian Tong Network Technology Co., Ltd | Method and device for quantum key fusion-based virtual power plant security communication and medium |
KR101993885B1 (en) * | 2018-02-27 | 2019-06-27 | 채령 | The PUF-QRANG quantum system with security chips |
CN113285803A (en) * | 2021-06-24 | 2021-08-20 | 中电信量子科技有限公司 | Mail transmission system and transmission method based on quantum security key |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115242411A (en) * | 2022-09-23 | 2022-10-25 | 合肥工业大学 | Vehicle-interior network secure communication method based on quantum random number generator |
CN115242411B (en) * | 2022-09-23 | 2022-12-02 | 合肥工业大学 | Vehicle-interior network secure communication method based on quantum random number generator |
Also Published As
Publication number | Publication date |
---|---|
CN114040356B (en) | 2024-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9032208B2 (en) | Communication terminal, communication system, communication method and communication program | |
CN106357400B (en) | Establish the method and system in channel between TBOX terminal and TSP platform | |
CN102572314B (en) | Image sensor and payment authentication method | |
CN110891257B (en) | Internet-connected vehicle remote upgrading system and method with anti-attack bidirectional authentication | |
US20090046859A1 (en) | Methods for the generation of identical symmetrical cryptographic keys | |
CN109448195A (en) | The authentication method and device of vehicle virtual key | |
CN110912690A (en) | Data encryption and decryption method, vehicle and storage medium | |
CN111209558B (en) | Internet of things equipment identity authentication method and system based on block chain | |
CN110855616B (en) | Digital key generation system | |
CN109698746A (en) | Negotiate the method and system of the sub-key of generation bound device based on master key | |
CN112087419B (en) | Vehicle-mounted terminal data transmission safety protection method and device | |
CN113572795B (en) | Vehicle safety communication method, system and vehicle-mounted terminal | |
CN114040356B (en) | Quantum security-fused intelligent network-connected automobile data security protection method | |
CN110035080B (en) | Encryption and decryption system and method for vehicle-mounted terminal | |
EP4109820A2 (en) | Methods and systems for data processing, electronic device and storage medium | |
CN115909560A (en) | Data encryption method, data decryption method and door lock system | |
CN115696321A (en) | Method and system for filling secret key of digital key | |
CN112333699B (en) | Internet of things communication protocol encryption method, equipment and storage medium | |
CN114554479A (en) | Quantum random number high-speed encryption equipment and method for Internet of vehicles | |
CN111093169B (en) | Communication establishing method and device | |
CN109688151B (en) | Traffic information transmission method, transmission system and transmission equipment | |
CN112214753A (en) | Authentication method and device, electronic equipment and storage medium | |
CN220359171U (en) | Safety encryption system for Internet of vehicles | |
CN116318727B (en) | ECU access method, device, equipment and storage medium | |
CN115412244B (en) | Method, system and equipment for updating encrypted firmware on line |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |