CN114244514A - Data security processing method based on Internet of vehicles - Google Patents

Data security processing method based on Internet of vehicles Download PDF

Info

Publication number
CN114244514A
CN114244514A CN202210154836.1A CN202210154836A CN114244514A CN 114244514 A CN114244514 A CN 114244514A CN 202210154836 A CN202210154836 A CN 202210154836A CN 114244514 A CN114244514 A CN 114244514A
Authority
CN
China
Prior art keywords
data
key
user
user side
negotiation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210154836.1A
Other languages
Chinese (zh)
Other versions
CN114244514B (en
Inventor
龙利民
李强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tuling Artificial Intelligence Institute Nanjing Co ltd
Original Assignee
Tuling Artificial Intelligence Institute Nanjing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tuling Artificial Intelligence Institute Nanjing Co ltd filed Critical Tuling Artificial Intelligence Institute Nanjing Co ltd
Priority to CN202210154836.1A priority Critical patent/CN114244514B/en
Publication of CN114244514A publication Critical patent/CN114244514A/en
Application granted granted Critical
Publication of CN114244514B publication Critical patent/CN114244514B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data security processing method based on the Internet of vehicles, which comprises the steps of generating a main key for authorization decryption from a user side to an automobile side according to an acquired user side request for a credit and credit granting center; after a private key and a public key when the target file is encrypted and a negotiated main public key are obtained through the calculation of the main secret key granted by the user side, corresponding calculation information is respectively returned to the user side and the automobile side; and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key to complete data decryption at the automobile side. Based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain, so that the data content is ensured to be public, transparent and traceable, and the specific execution of the user for using data authorization can be inquired.

Description

Data security processing method based on Internet of vehicles
Technical Field
The invention relates to the technical field of vehicle-mounted information equipment, in particular to a data security processing method based on the Internet of vehicles.
Background
With the rapid development of new energy automobiles, unmanned vehicles, 5G and Internet of things, automobiles are more and more intelligent, and sensor equipment on the automobiles is more and more provided with cameras, positioning devices, network communication devices, millimeter wave sensors, laser radars and the like. Along with the intellectualization, the automobile generates massive user information every day, including where and who often go, the route of driving, and songs loving listening, which are all as well as fingered, and all record the privacy information of the daily behaviors of the user.
The data is used, so that the risk of stealing the data by people exists, the data can be used in a trusted environment, the purpose and the amount of the data can be limited, the safe use of the data at an algorithm level is realized, the purpose that the data can be used and cannot be seen is realized, and the purpose and the amount of the data are specified, so that the method becomes a research hotspot.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a data security processing method based on the Internet of vehicles, which realizes the purpose and the usage of associated data in a secure and credible environment by utilizing the uniqueness of block chain distributed storage, controlling the usage of the data by an authorization mechanism based on rules while ensuring the consistency of the storage by a consensus mechanism, and controlling the usage of the data by an access amount; the purposes that the data can be used but can not be seen and the purpose and the dosage of the data are specified are achieved; meanwhile, the method has the advantages of meeting the requirements of universality, performance and safety, and solves the problems in the background technology.
In order to achieve the purpose, the invention is realized by the following technical scheme: a data security processing method based on Internet of vehicles comprises the following steps:
generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the user side request comprises user side private key information and negotiation public key information;
after a private key, a public key and a negotiated main public key of the target file during encryption are obtained through the calculation of the main secret key granted by the user side, corresponding calculation information is respectively returned to the user side and the automobile side;
and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key at the automobile side to complete data decryption.
As an improvement of the data security processing method based on the internet of vehicles in the present invention, the processing method of the vehicle-mounted interconnection system on the ciphertext data includes:
configuring and starting a processing process containing a TEE application program environment at the automobile end;
based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein,
if the corresponding program instruction does not exist in the vehicle-mounted interconnection system, pulling a corresponding execution program from a data storage area block chain of the vehicle end; and meanwhile, judging whether other system data except the program is needed in the corresponding execution program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the execution program, otherwise, obtaining an authorization application from the user side.
As an improvement of the data security processing method based on the internet of vehicles in the present invention, when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side;
secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request;
thirdly, judging the authorization result of the user, wherein if the user is not authorized, directly returning the result to the automobile end; otherwise, calculating the usage and usage authorization information corresponding to the zero-knowledge-based certificate, and synchronously starting a service process waiting for negotiation;
and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end to judge the validity of the authorization information.
As an improvement of the data security processing method based on the internet of vehicles, when the validity of the authorization information is judged by the vehicle end and the authorization information returned to the vehicle end does not exist, marking the data as a data decryption failure and ending the instruction;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end negotiates with the user end based on the synchronously started service process waiting for negotiation,
if the negotiation fails, quitting the negotiation service process, marking the negotiation service process as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
Compared with the prior art, the invention has the beneficial effects that:
1. based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain to ensure the data content to be public, transparent and traceable, so that the specific execution of the user for using data authorization can be inquired;
2. configuring a processing process containing a TEE application program environment at an automobile end to ensure that data is encrypted outside the Tee environment and the data is safe when a secret key cannot be acquired outside the Tee environment;
3. after SM9 negotiation key encryption, the negotiation is successful, the automobile end receives the data encryption content of the credit to the user end, and uses the negotiation key to decrypt the data, and the transmission process of the key from the user end to the automobile end is safe in the process of completing the data processing process;
4. storing the execution file on the chain based on the block chain, wherein the MD5 of the execution file is used as one party of the key negotiation in the SM9, the other party is used as the user party, the purpose of the data is associated with the authorization in the algorithm level, and meanwhile, in order to reach one intelligent automobile to match one user.
Drawings
The disclosure of the present invention is illustrated with reference to the accompanying drawings. It is to be understood that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which like reference numerals are used to indicate like parts. Wherein:
fig. 1 is a flowchart illustrating information transmission between a vehicle end and a user end in a car networking based data security process according to an embodiment of the present invention;
fig. 2 is a flowchart of a time sequence of processing ciphertext data obtained by calculating a master key granted by a user side in a vehicle-mounted interconnection system according to an embodiment of the present invention.
Detailed Description
It is easily understood that according to the technical solution of the present invention, a person skilled in the art can propose various alternative structures and implementation ways without changing the spirit of the present invention. Therefore, the following detailed description and the accompanying drawings are merely illustrative of the technical aspects of the present invention, and should not be construed as all of the present invention or as limitations or limitations on the technical aspects of the present invention.
As for understanding the technical conception and the realization principle of the invention, in the prior art, the basic idea of trusted computing is to construct a trust root in a computer system at first, wherein the credibility of the trust root is ensured by physical security, technical security and management security; a trust chain is established again, starting from a trust root to a software and hardware platform, to an operating system, to an application, a first-level measurement authentication, a first-level trust, and extending the trust to the whole computer system, thereby ensuring the trust of the whole computer system, wherein the SM9 provided by the invention adopts a general identification cryptographic standard (GM/T0044 + SM 2016 SM9 identification cryptographic algorithm), and the negotiable key protocol of SM9 defines an identification-based key exchange protocol implemented by an elliptic curve pair. The initiator user A and the responder user B participating in the key exchange respectively hold an identifier and a corresponding encryption private key, and the encryption private keys are generated by combining an encryption main private key and the identifier of the user through a key generation center. The users A and B use the identification and the respective encryption private keys to agree a secret key only known to them through interactive information transfer, and both users can realize key confirmation through an option. This shared secret key is typically used in some symmetric cryptographic algorithm. The key exchange protocol can be used for key management and negotiation. And will not be described in detail herein.
In view of the above, as shown in fig. 1, the present invention provides a data security processing method based on internet of vehicles, including the following steps:
firstly, generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the specific implementation mode is as follows:
firstly, a user is granted to request a certificate storing center to acquire private key information and negotiation public key information, and the user keeps a long connection relationship with the certificate storing center and waits for the certificate storing center to return request information; secondly, the certificate storing center sends a request for confirming the association to the (intelligent) automobile end, and finally, after the (intelligent) automobile end confirms the association, the certificate storing center maintains a long connection relation;
secondly, after obtaining a private key, a public key and a negotiated main public key when the target file executes encryption through the calculation of the main secret key which is trusted by the user side, the certificate storing center respectively returns corresponding calculation information to the user side and the automobile side, wherein the corresponding calculation information returned to the user side comprises the private key when the target file executes encryption, the negotiated public key and ID information corresponding to the automobile side, and the corresponding calculation information returned to the automobile side comprises the public key when the target file executes encryption, the negotiated public key and ID information corresponding to the user side;
and thirdly, acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system (vehicle side), and using the negotiation key to finish data decryption at the vehicle side, wherein the negotiation key is encrypted through SM9 to ensure that the negotiation is successful, the vehicle side receives the data encryption content granted with the credit from the user side and uses the negotiation key to decrypt the data, and the transmission process of the key from the user side to the vehicle side is safe in the process of finishing the data processing process.
As shown in fig. 2, based on the above technical concept, it should be noted that the cryptograph data processing method of the vehicle-mounted interconnection system includes:
firstly, configuring and starting a processing process containing a TEE application program environment at an automobile end, and aiming at ensuring that an execution code for the purpose of ciphertext data is stored on a block chain, ensuring that the content carried by the ciphertext data is public, transparent and traceable, and simultaneously meeting the requirement that a user can inquire the specific execution authorized by the used data, and on the other hand, ensuring that the ciphertext data is encrypted outside the TEE application program environment, and simultaneously ensuring that the data is safe when the key cannot be acquired outside the TEE application program environment;
secondly, based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein at this time, it can be understood that if no corresponding program instruction exists in the vehicle-mounted interconnection system, the corresponding execution program needs to be pulled from a data storage block chain of the vehicle end (at this time, the corresponding execution program stores an executed target file on the chain through the block chain, and the MD5 of the executed file is used as one party of negotiating a key in the SM9, and the other party is a user party, so that the purpose of the data is related to the authorization in the algorithm level); and meanwhile, judging whether other system data except the program is needed in the corresponding executive program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the executive program, otherwise, continuously obtaining an authorization application from the user side: and, instead,
when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side; secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request; thirdly, judging an authorization result of the user side, wherein if the user side is not authorized, the result is directly returned to the automobile side; on the contrary, the usage and usage authorization information corresponding to the zero-knowledge proof is calculated, and a service process waiting for negotiation is started synchronously, so that the method can be understood that one user is matched for reaching one intelligent automobile, all applications on the intelligent automobile only need one negotiation key, and the method also has the characteristic of meeting the requirements of the usage and the usage; and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end, and judging the validity of the authorization information:
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end does not exist, marking the authorization information as data decryption failure, and ending the instruction at the moment;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end and the user end negotiate based on the synchronously started service process waiting for negotiation, and at the moment,
if the negotiation fails, quitting the module corresponding to the negotiation service process, marking the module as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
Based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain, so that the data content is ensured to be public, transparent and traceable, and the specific execution queryability of the user for using data authorization is met.
The technical scope of the present invention is not limited to the above description, and those skilled in the art can make various changes and modifications to the above-described embodiments without departing from the technical spirit of the present invention, and such changes and modifications should fall within the protective scope of the present invention.

Claims (4)

1. A data security processing method based on Internet of vehicles is characterized in that: the method comprises the following steps:
generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the user side request comprises user side private key information and negotiation public key information;
after a private key, a public key and a negotiated main public key of the target file during encryption are obtained through the calculation of the main secret key granted by the user side, corresponding calculation information is respectively returned to the user side and the automobile side;
and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key at the automobile side to complete data decryption.
2. The data security processing method based on the internet of vehicles according to claim 1, wherein: the vehicle-mounted interconnection system comprises the following processing modes of ciphertext data:
configuring and starting a processing process containing a TEE application program environment at the automobile end;
based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein,
if the corresponding program instruction does not exist in the vehicle-mounted interconnection system, pulling a corresponding execution program from a data storage area block chain of the vehicle end; and meanwhile, judging whether other system data except the program is needed in the corresponding execution program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the execution program, otherwise, obtaining an authorization application from the user side.
3. The data security processing method based on the internet of vehicles according to claim 2, characterized in that: when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side;
secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request;
thirdly, judging the authorization result of the user, wherein if the user is not authorized, directly returning the result to the automobile end; otherwise, calculating the usage and usage authorization information corresponding to the zero-knowledge-based certificate, and synchronously starting a service process waiting for negotiation;
and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end to judge the validity of the authorization information.
4. The data security processing method based on the Internet of vehicles according to claim 3, wherein: when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end does not exist, marking the authorization information as data decryption failure and ending the instruction;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end negotiates with the user end based on the synchronously started service process waiting for negotiation,
if the negotiation fails, quitting the negotiation service process, marking the negotiation service process as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
CN202210154836.1A 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles Active CN114244514B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210154836.1A CN114244514B (en) 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210154836.1A CN114244514B (en) 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles

Publications (2)

Publication Number Publication Date
CN114244514A true CN114244514A (en) 2022-03-25
CN114244514B CN114244514B (en) 2022-05-24

Family

ID=80747597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210154836.1A Active CN114244514B (en) 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles

Country Status (1)

Country Link
CN (1) CN114244514B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120159170A1 (en) * 2010-12-15 2012-06-21 Electronics And Telecommunications Research Institute Method of authenticating vehicle communication
CN108471351A (en) * 2018-06-27 2018-08-31 西南交通大学 Car networking certifiede-mail protocol method based on no certificate aggregate signature
CN109922475A (en) * 2019-04-19 2019-06-21 郑州轻工业学院 Vehicle authentication and message verification method under In-vehicle networking environment
CN110601830A (en) * 2019-09-16 2019-12-20 腾讯科技(深圳)有限公司 Key management method, device, equipment and storage medium based on block chain
CN110830555A (en) * 2019-10-15 2020-02-21 图灵人工智能研究院(南京)有限公司 Data processing method, control device and storage medium for unmanned equipment
US10673617B1 (en) * 2018-04-24 2020-06-02 George Antoniou Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
CN111431713A (en) * 2020-03-27 2020-07-17 财付通支付科技有限公司 Private key storage method and device and related equipment
CN112733107A (en) * 2021-04-02 2021-04-30 腾讯科技(深圳)有限公司 Information verification method, related device, equipment and storage medium
CN113300836A (en) * 2021-04-23 2021-08-24 暨南大学 Vehicle-mounted network message authentication method and system based on block chain and ECC
CN113395159A (en) * 2021-01-08 2021-09-14 腾讯科技(深圳)有限公司 Data processing method based on trusted execution environment and related device
US20210320978A1 (en) * 2020-12-10 2021-10-14 Apollo Intelligent Connectivity (Beijing) Technology Co., Ltd. Information processing method, apparatus, device, and readable storage medium
CN113596778A (en) * 2021-07-28 2021-11-02 国家电网有限公司 Vehicle networking node anonymous authentication method based on block chain
CN113630243A (en) * 2021-07-13 2021-11-09 暨南大学 Authentication key agreement method with key exposure resistance characteristic in Internet of vehicles environment
CN113783696A (en) * 2021-08-14 2021-12-10 西安电子科技大学 Internet of things perception data sharing transaction platform, control method, equipment and terminal
WO2022006320A1 (en) * 2020-06-30 2022-01-06 Interdigital Patent Holdings, Inc. Methods, architectures, apparatuses and systems directed to transaction management in blockchain-enabled wireless systems

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120159170A1 (en) * 2010-12-15 2012-06-21 Electronics And Telecommunications Research Institute Method of authenticating vehicle communication
US10673617B1 (en) * 2018-04-24 2020-06-02 George Antoniou Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
CN108471351A (en) * 2018-06-27 2018-08-31 西南交通大学 Car networking certifiede-mail protocol method based on no certificate aggregate signature
CN109922475A (en) * 2019-04-19 2019-06-21 郑州轻工业学院 Vehicle authentication and message verification method under In-vehicle networking environment
CN110601830A (en) * 2019-09-16 2019-12-20 腾讯科技(深圳)有限公司 Key management method, device, equipment and storage medium based on block chain
CN110830555A (en) * 2019-10-15 2020-02-21 图灵人工智能研究院(南京)有限公司 Data processing method, control device and storage medium for unmanned equipment
CN111431713A (en) * 2020-03-27 2020-07-17 财付通支付科技有限公司 Private key storage method and device and related equipment
WO2022006320A1 (en) * 2020-06-30 2022-01-06 Interdigital Patent Holdings, Inc. Methods, architectures, apparatuses and systems directed to transaction management in blockchain-enabled wireless systems
US20210320978A1 (en) * 2020-12-10 2021-10-14 Apollo Intelligent Connectivity (Beijing) Technology Co., Ltd. Information processing method, apparatus, device, and readable storage medium
CN113395159A (en) * 2021-01-08 2021-09-14 腾讯科技(深圳)有限公司 Data processing method based on trusted execution environment and related device
CN112733107A (en) * 2021-04-02 2021-04-30 腾讯科技(深圳)有限公司 Information verification method, related device, equipment and storage medium
CN113300836A (en) * 2021-04-23 2021-08-24 暨南大学 Vehicle-mounted network message authentication method and system based on block chain and ECC
CN113630243A (en) * 2021-07-13 2021-11-09 暨南大学 Authentication key agreement method with key exposure resistance characteristic in Internet of vehicles environment
CN113596778A (en) * 2021-07-28 2021-11-02 国家电网有限公司 Vehicle networking node anonymous authentication method based on block chain
CN113783696A (en) * 2021-08-14 2021-12-10 西安电子科技大学 Internet of things perception data sharing transaction platform, control method, equipment and terminal

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DURBADAL CHATTARAJ: ""Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation"", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 *
周启扬等: "基于区块链技术的车联网匿名身份认证技术研究", 《汽车技术》 *
唐兰文等: "基于区块链技术的车联网研究", 《电脑知识与技术》 *

Also Published As

Publication number Publication date
CN114244514B (en) 2022-05-24

Similar Documents

Publication Publication Date Title
CN110637328B (en) Vehicle access method based on portable equipment
CN111884805B (en) Data hosting method and system based on blockchain and distributed identity
TW201927601A (en) Method for generating and using virtual key of vehicle, system for same, and user terminal
CN111200496B (en) Digital key implementation method based on vehicle
CN110324335B (en) Automobile software upgrading method and system based on electronic mobile certificate
US20140075186A1 (en) Multiple Access Key Fob
CN110099037A (en) Control unit remote-control key pairing based on certificate
CN111572493B (en) Vehicle keyless entry and starting system and method based on Internet of vehicles
CN113347133B (en) Authentication method and device of vehicle-mounted equipment
US11722529B2 (en) Method and apparatus for policy-based management of assets
CN110148239A (en) A kind of authorization method and system of Intelligent key
CN116074023A (en) Authentication method and communication device
CN110519238B (en) Internet of things security system and communication method based on cryptographic technology
CN110932846B (en) Vehicle-mounted virtual key communication method
KR102521936B1 (en) Method of secured sharing of vehicle key
CN111225001B (en) Block chain decentralized communication method, electronic equipment and system
CN114244514B (en) Data security processing method based on Internet of vehicles
US11014535B2 (en) Shared vehicle security
CN112423298B (en) Identity authentication system and method for road traffic signal management and control facility
CN116318637A (en) Method and system for secure network access communication of equipment
CN102231736B (en) Network access control method and system
KR20020006985A (en) Certification service method in two different certifying system using certification gate way
CN117676580B (en) Safety authentication method based on vehicle-mounted gateway
CN117318944B (en) Method, system and storage medium for issuing group key in advance in vehicle-road cooperative scene
CN115987519B (en) Block chain intelligent collaborative authentication method for multi-user common management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant