CN114244514A - Data security processing method based on Internet of vehicles - Google Patents
Data security processing method based on Internet of vehicles Download PDFInfo
- Publication number
- CN114244514A CN114244514A CN202210154836.1A CN202210154836A CN114244514A CN 114244514 A CN114244514 A CN 114244514A CN 202210154836 A CN202210154836 A CN 202210154836A CN 114244514 A CN114244514 A CN 114244514A
- Authority
- CN
- China
- Prior art keywords
- data
- key
- user
- user side
- negotiation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data security processing method based on the Internet of vehicles, which comprises the steps of generating a main key for authorization decryption from a user side to an automobile side according to an acquired user side request for a credit and credit granting center; after a private key and a public key when the target file is encrypted and a negotiated main public key are obtained through the calculation of the main secret key granted by the user side, corresponding calculation information is respectively returned to the user side and the automobile side; and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key to complete data decryption at the automobile side. Based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain, so that the data content is ensured to be public, transparent and traceable, and the specific execution of the user for using data authorization can be inquired.
Description
Technical Field
The invention relates to the technical field of vehicle-mounted information equipment, in particular to a data security processing method based on the Internet of vehicles.
Background
With the rapid development of new energy automobiles, unmanned vehicles, 5G and Internet of things, automobiles are more and more intelligent, and sensor equipment on the automobiles is more and more provided with cameras, positioning devices, network communication devices, millimeter wave sensors, laser radars and the like. Along with the intellectualization, the automobile generates massive user information every day, including where and who often go, the route of driving, and songs loving listening, which are all as well as fingered, and all record the privacy information of the daily behaviors of the user.
The data is used, so that the risk of stealing the data by people exists, the data can be used in a trusted environment, the purpose and the amount of the data can be limited, the safe use of the data at an algorithm level is realized, the purpose that the data can be used and cannot be seen is realized, and the purpose and the amount of the data are specified, so that the method becomes a research hotspot.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a data security processing method based on the Internet of vehicles, which realizes the purpose and the usage of associated data in a secure and credible environment by utilizing the uniqueness of block chain distributed storage, controlling the usage of the data by an authorization mechanism based on rules while ensuring the consistency of the storage by a consensus mechanism, and controlling the usage of the data by an access amount; the purposes that the data can be used but can not be seen and the purpose and the dosage of the data are specified are achieved; meanwhile, the method has the advantages of meeting the requirements of universality, performance and safety, and solves the problems in the background technology.
In order to achieve the purpose, the invention is realized by the following technical scheme: a data security processing method based on Internet of vehicles comprises the following steps:
generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the user side request comprises user side private key information and negotiation public key information;
after a private key, a public key and a negotiated main public key of the target file during encryption are obtained through the calculation of the main secret key granted by the user side, corresponding calculation information is respectively returned to the user side and the automobile side;
and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key at the automobile side to complete data decryption.
As an improvement of the data security processing method based on the internet of vehicles in the present invention, the processing method of the vehicle-mounted interconnection system on the ciphertext data includes:
configuring and starting a processing process containing a TEE application program environment at the automobile end;
based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein,
if the corresponding program instruction does not exist in the vehicle-mounted interconnection system, pulling a corresponding execution program from a data storage area block chain of the vehicle end; and meanwhile, judging whether other system data except the program is needed in the corresponding execution program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the execution program, otherwise, obtaining an authorization application from the user side.
As an improvement of the data security processing method based on the internet of vehicles in the present invention, when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side;
secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request;
thirdly, judging the authorization result of the user, wherein if the user is not authorized, directly returning the result to the automobile end; otherwise, calculating the usage and usage authorization information corresponding to the zero-knowledge-based certificate, and synchronously starting a service process waiting for negotiation;
and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end to judge the validity of the authorization information.
As an improvement of the data security processing method based on the internet of vehicles, when the validity of the authorization information is judged by the vehicle end and the authorization information returned to the vehicle end does not exist, marking the data as a data decryption failure and ending the instruction;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end negotiates with the user end based on the synchronously started service process waiting for negotiation,
if the negotiation fails, quitting the negotiation service process, marking the negotiation service process as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
Compared with the prior art, the invention has the beneficial effects that:
1. based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain to ensure the data content to be public, transparent and traceable, so that the specific execution of the user for using data authorization can be inquired;
2. configuring a processing process containing a TEE application program environment at an automobile end to ensure that data is encrypted outside the Tee environment and the data is safe when a secret key cannot be acquired outside the Tee environment;
3. after SM9 negotiation key encryption, the negotiation is successful, the automobile end receives the data encryption content of the credit to the user end, and uses the negotiation key to decrypt the data, and the transmission process of the key from the user end to the automobile end is safe in the process of completing the data processing process;
4. storing the execution file on the chain based on the block chain, wherein the MD5 of the execution file is used as one party of the key negotiation in the SM9, the other party is used as the user party, the purpose of the data is associated with the authorization in the algorithm level, and meanwhile, in order to reach one intelligent automobile to match one user.
Drawings
The disclosure of the present invention is illustrated with reference to the accompanying drawings. It is to be understood that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which like reference numerals are used to indicate like parts. Wherein:
fig. 1 is a flowchart illustrating information transmission between a vehicle end and a user end in a car networking based data security process according to an embodiment of the present invention;
fig. 2 is a flowchart of a time sequence of processing ciphertext data obtained by calculating a master key granted by a user side in a vehicle-mounted interconnection system according to an embodiment of the present invention.
Detailed Description
It is easily understood that according to the technical solution of the present invention, a person skilled in the art can propose various alternative structures and implementation ways without changing the spirit of the present invention. Therefore, the following detailed description and the accompanying drawings are merely illustrative of the technical aspects of the present invention, and should not be construed as all of the present invention or as limitations or limitations on the technical aspects of the present invention.
As for understanding the technical conception and the realization principle of the invention, in the prior art, the basic idea of trusted computing is to construct a trust root in a computer system at first, wherein the credibility of the trust root is ensured by physical security, technical security and management security; a trust chain is established again, starting from a trust root to a software and hardware platform, to an operating system, to an application, a first-level measurement authentication, a first-level trust, and extending the trust to the whole computer system, thereby ensuring the trust of the whole computer system, wherein the SM9 provided by the invention adopts a general identification cryptographic standard (GM/T0044 + SM 2016 SM9 identification cryptographic algorithm), and the negotiable key protocol of SM9 defines an identification-based key exchange protocol implemented by an elliptic curve pair. The initiator user A and the responder user B participating in the key exchange respectively hold an identifier and a corresponding encryption private key, and the encryption private keys are generated by combining an encryption main private key and the identifier of the user through a key generation center. The users A and B use the identification and the respective encryption private keys to agree a secret key only known to them through interactive information transfer, and both users can realize key confirmation through an option. This shared secret key is typically used in some symmetric cryptographic algorithm. The key exchange protocol can be used for key management and negotiation. And will not be described in detail herein.
In view of the above, as shown in fig. 1, the present invention provides a data security processing method based on internet of vehicles, including the following steps:
firstly, generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the specific implementation mode is as follows:
firstly, a user is granted to request a certificate storing center to acquire private key information and negotiation public key information, and the user keeps a long connection relationship with the certificate storing center and waits for the certificate storing center to return request information; secondly, the certificate storing center sends a request for confirming the association to the (intelligent) automobile end, and finally, after the (intelligent) automobile end confirms the association, the certificate storing center maintains a long connection relation;
secondly, after obtaining a private key, a public key and a negotiated main public key when the target file executes encryption through the calculation of the main secret key which is trusted by the user side, the certificate storing center respectively returns corresponding calculation information to the user side and the automobile side, wherein the corresponding calculation information returned to the user side comprises the private key when the target file executes encryption, the negotiated public key and ID information corresponding to the automobile side, and the corresponding calculation information returned to the automobile side comprises the public key when the target file executes encryption, the negotiated public key and ID information corresponding to the user side;
and thirdly, acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system (vehicle side), and using the negotiation key to finish data decryption at the vehicle side, wherein the negotiation key is encrypted through SM9 to ensure that the negotiation is successful, the vehicle side receives the data encryption content granted with the credit from the user side and uses the negotiation key to decrypt the data, and the transmission process of the key from the user side to the vehicle side is safe in the process of finishing the data processing process.
As shown in fig. 2, based on the above technical concept, it should be noted that the cryptograph data processing method of the vehicle-mounted interconnection system includes:
firstly, configuring and starting a processing process containing a TEE application program environment at an automobile end, and aiming at ensuring that an execution code for the purpose of ciphertext data is stored on a block chain, ensuring that the content carried by the ciphertext data is public, transparent and traceable, and simultaneously meeting the requirement that a user can inquire the specific execution authorized by the used data, and on the other hand, ensuring that the ciphertext data is encrypted outside the TEE application program environment, and simultaneously ensuring that the data is safe when the key cannot be acquired outside the TEE application program environment;
secondly, based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein at this time, it can be understood that if no corresponding program instruction exists in the vehicle-mounted interconnection system, the corresponding execution program needs to be pulled from a data storage block chain of the vehicle end (at this time, the corresponding execution program stores an executed target file on the chain through the block chain, and the MD5 of the executed file is used as one party of negotiating a key in the SM9, and the other party is a user party, so that the purpose of the data is related to the authorization in the algorithm level); and meanwhile, judging whether other system data except the program is needed in the corresponding executive program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the executive program, otherwise, continuously obtaining an authorization application from the user side: and, instead,
when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side; secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request; thirdly, judging an authorization result of the user side, wherein if the user side is not authorized, the result is directly returned to the automobile side; on the contrary, the usage and usage authorization information corresponding to the zero-knowledge proof is calculated, and a service process waiting for negotiation is started synchronously, so that the method can be understood that one user is matched for reaching one intelligent automobile, all applications on the intelligent automobile only need one negotiation key, and the method also has the characteristic of meeting the requirements of the usage and the usage; and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end, and judging the validity of the authorization information:
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end does not exist, marking the authorization information as data decryption failure, and ending the instruction at the moment;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end and the user end negotiate based on the synchronously started service process waiting for negotiation, and at the moment,
if the negotiation fails, quitting the module corresponding to the negotiation service process, marking the module as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
Based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain, so that the data content is ensured to be public, transparent and traceable, and the specific execution queryability of the user for using data authorization is met.
The technical scope of the present invention is not limited to the above description, and those skilled in the art can make various changes and modifications to the above-described embodiments without departing from the technical spirit of the present invention, and such changes and modifications should fall within the protective scope of the present invention.
Claims (4)
1. A data security processing method based on Internet of vehicles is characterized in that: the method comprises the following steps:
generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the user side request comprises user side private key information and negotiation public key information;
after a private key, a public key and a negotiated main public key of the target file during encryption are obtained through the calculation of the main secret key granted by the user side, corresponding calculation information is respectively returned to the user side and the automobile side;
and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key at the automobile side to complete data decryption.
2. The data security processing method based on the internet of vehicles according to claim 1, wherein: the vehicle-mounted interconnection system comprises the following processing modes of ciphertext data:
configuring and starting a processing process containing a TEE application program environment at the automobile end;
based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein,
if the corresponding program instruction does not exist in the vehicle-mounted interconnection system, pulling a corresponding execution program from a data storage area block chain of the vehicle end; and meanwhile, judging whether other system data except the program is needed in the corresponding execution program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the execution program, otherwise, obtaining an authorization application from the user side.
3. The data security processing method based on the internet of vehicles according to claim 2, characterized in that: when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side;
secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request;
thirdly, judging the authorization result of the user, wherein if the user is not authorized, directly returning the result to the automobile end; otherwise, calculating the usage and usage authorization information corresponding to the zero-knowledge-based certificate, and synchronously starting a service process waiting for negotiation;
and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end to judge the validity of the authorization information.
4. The data security processing method based on the Internet of vehicles according to claim 3, wherein: when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end does not exist, marking the authorization information as data decryption failure and ending the instruction;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end negotiates with the user end based on the synchronously started service process waiting for negotiation,
if the negotiation fails, quitting the negotiation service process, marking the negotiation service process as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210154836.1A CN114244514B (en) | 2022-02-21 | 2022-02-21 | Data security processing method based on Internet of vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210154836.1A CN114244514B (en) | 2022-02-21 | 2022-02-21 | Data security processing method based on Internet of vehicles |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114244514A true CN114244514A (en) | 2022-03-25 |
CN114244514B CN114244514B (en) | 2022-05-24 |
Family
ID=80747597
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210154836.1A Active CN114244514B (en) | 2022-02-21 | 2022-02-21 | Data security processing method based on Internet of vehicles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114244514B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120159170A1 (en) * | 2010-12-15 | 2012-06-21 | Electronics And Telecommunications Research Institute | Method of authenticating vehicle communication |
CN108471351A (en) * | 2018-06-27 | 2018-08-31 | 西南交通大学 | Car networking certifiede-mail protocol method based on no certificate aggregate signature |
CN109922475A (en) * | 2019-04-19 | 2019-06-21 | 郑州轻工业学院 | Vehicle authentication and message verification method under In-vehicle networking environment |
CN110601830A (en) * | 2019-09-16 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Key management method, device, equipment and storage medium based on block chain |
CN110830555A (en) * | 2019-10-15 | 2020-02-21 | 图灵人工智能研究院(南京)有限公司 | Data processing method, control device and storage medium for unmanned equipment |
US10673617B1 (en) * | 2018-04-24 | 2020-06-02 | George Antoniou | Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity |
CN111431713A (en) * | 2020-03-27 | 2020-07-17 | 财付通支付科技有限公司 | Private key storage method and device and related equipment |
CN112733107A (en) * | 2021-04-02 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Information verification method, related device, equipment and storage medium |
CN113300836A (en) * | 2021-04-23 | 2021-08-24 | 暨南大学 | Vehicle-mounted network message authentication method and system based on block chain and ECC |
CN113395159A (en) * | 2021-01-08 | 2021-09-14 | 腾讯科技(深圳)有限公司 | Data processing method based on trusted execution environment and related device |
US20210320978A1 (en) * | 2020-12-10 | 2021-10-14 | Apollo Intelligent Connectivity (Beijing) Technology Co., Ltd. | Information processing method, apparatus, device, and readable storage medium |
CN113596778A (en) * | 2021-07-28 | 2021-11-02 | 国家电网有限公司 | Vehicle networking node anonymous authentication method based on block chain |
CN113630243A (en) * | 2021-07-13 | 2021-11-09 | 暨南大学 | Authentication key agreement method with key exposure resistance characteristic in Internet of vehicles environment |
CN113783696A (en) * | 2021-08-14 | 2021-12-10 | 西安电子科技大学 | Internet of things perception data sharing transaction platform, control method, equipment and terminal |
WO2022006320A1 (en) * | 2020-06-30 | 2022-01-06 | Interdigital Patent Holdings, Inc. | Methods, architectures, apparatuses and systems directed to transaction management in blockchain-enabled wireless systems |
-
2022
- 2022-02-21 CN CN202210154836.1A patent/CN114244514B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120159170A1 (en) * | 2010-12-15 | 2012-06-21 | Electronics And Telecommunications Research Institute | Method of authenticating vehicle communication |
US10673617B1 (en) * | 2018-04-24 | 2020-06-02 | George Antoniou | Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity |
CN108471351A (en) * | 2018-06-27 | 2018-08-31 | 西南交通大学 | Car networking certifiede-mail protocol method based on no certificate aggregate signature |
CN109922475A (en) * | 2019-04-19 | 2019-06-21 | 郑州轻工业学院 | Vehicle authentication and message verification method under In-vehicle networking environment |
CN110601830A (en) * | 2019-09-16 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Key management method, device, equipment and storage medium based on block chain |
CN110830555A (en) * | 2019-10-15 | 2020-02-21 | 图灵人工智能研究院(南京)有限公司 | Data processing method, control device and storage medium for unmanned equipment |
CN111431713A (en) * | 2020-03-27 | 2020-07-17 | 财付通支付科技有限公司 | Private key storage method and device and related equipment |
WO2022006320A1 (en) * | 2020-06-30 | 2022-01-06 | Interdigital Patent Holdings, Inc. | Methods, architectures, apparatuses and systems directed to transaction management in blockchain-enabled wireless systems |
US20210320978A1 (en) * | 2020-12-10 | 2021-10-14 | Apollo Intelligent Connectivity (Beijing) Technology Co., Ltd. | Information processing method, apparatus, device, and readable storage medium |
CN113395159A (en) * | 2021-01-08 | 2021-09-14 | 腾讯科技(深圳)有限公司 | Data processing method based on trusted execution environment and related device |
CN112733107A (en) * | 2021-04-02 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Information verification method, related device, equipment and storage medium |
CN113300836A (en) * | 2021-04-23 | 2021-08-24 | 暨南大学 | Vehicle-mounted network message authentication method and system based on block chain and ECC |
CN113630243A (en) * | 2021-07-13 | 2021-11-09 | 暨南大学 | Authentication key agreement method with key exposure resistance characteristic in Internet of vehicles environment |
CN113596778A (en) * | 2021-07-28 | 2021-11-02 | 国家电网有限公司 | Vehicle networking node anonymous authentication method based on block chain |
CN113783696A (en) * | 2021-08-14 | 2021-12-10 | 西安电子科技大学 | Internet of things perception data sharing transaction platform, control method, equipment and terminal |
Non-Patent Citations (3)
Title |
---|
DURBADAL CHATTARAJ: ""Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation"", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 * |
周启扬等: "基于区块链技术的车联网匿名身份认证技术研究", 《汽车技术》 * |
唐兰文等: "基于区块链技术的车联网研究", 《电脑知识与技术》 * |
Also Published As
Publication number | Publication date |
---|---|
CN114244514B (en) | 2022-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110637328B (en) | Vehicle access method based on portable equipment | |
CN111884805B (en) | Data hosting method and system based on blockchain and distributed identity | |
TW201927601A (en) | Method for generating and using virtual key of vehicle, system for same, and user terminal | |
CN111200496B (en) | Digital key implementation method based on vehicle | |
CN110324335B (en) | Automobile software upgrading method and system based on electronic mobile certificate | |
US20140075186A1 (en) | Multiple Access Key Fob | |
CN110099037A (en) | Control unit remote-control key pairing based on certificate | |
CN111572493B (en) | Vehicle keyless entry and starting system and method based on Internet of vehicles | |
CN113347133B (en) | Authentication method and device of vehicle-mounted equipment | |
US11722529B2 (en) | Method and apparatus for policy-based management of assets | |
CN110148239A (en) | A kind of authorization method and system of Intelligent key | |
CN116074023A (en) | Authentication method and communication device | |
CN110519238B (en) | Internet of things security system and communication method based on cryptographic technology | |
CN110932846B (en) | Vehicle-mounted virtual key communication method | |
KR102521936B1 (en) | Method of secured sharing of vehicle key | |
CN111225001B (en) | Block chain decentralized communication method, electronic equipment and system | |
CN114244514B (en) | Data security processing method based on Internet of vehicles | |
US11014535B2 (en) | Shared vehicle security | |
CN112423298B (en) | Identity authentication system and method for road traffic signal management and control facility | |
CN116318637A (en) | Method and system for secure network access communication of equipment | |
CN102231736B (en) | Network access control method and system | |
KR20020006985A (en) | Certification service method in two different certifying system using certification gate way | |
CN117676580B (en) | Safety authentication method based on vehicle-mounted gateway | |
CN117318944B (en) | Method, system and storage medium for issuing group key in advance in vehicle-road cooperative scene | |
CN115987519B (en) | Block chain intelligent collaborative authentication method for multi-user common management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |