CN114928817A - Vehicle remote control method based on encrypted short message - Google Patents

Vehicle remote control method based on encrypted short message Download PDF

Info

Publication number
CN114928817A
CN114928817A CN202210442674.1A CN202210442674A CN114928817A CN 114928817 A CN114928817 A CN 114928817A CN 202210442674 A CN202210442674 A CN 202210442674A CN 114928817 A CN114928817 A CN 114928817A
Authority
CN
China
Prior art keywords
vehicle
certificate
short message
encrypted
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210442674.1A
Other languages
Chinese (zh)
Inventor
赵志定
周洪涛
王国政
乔尚平
颜诗敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zero Run Technology Co Ltd
Original Assignee
Zhejiang Zero Run Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Zero Run Technology Co Ltd filed Critical Zhejiang Zero Run Technology Co Ltd
Priority to CN202210442674.1A priority Critical patent/CN114928817A/en
Publication of CN114928817A publication Critical patent/CN114928817A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a vehicle remote control method based on encrypted short messages, which comprises the following steps: encrypting and coding the remote vehicle awakening function in a short message form; the short message is sent to a vehicle-mounted intelligent terminal through an operator short message gateway; the vehicle-mounted intelligent terminal receives the encrypted short message and performs judgment, verification and decryption; after the awakening short message is confirmed, the vehicle-mounted intelligent terminal executes a vehicle awakening function; connecting to a vehicle TSP cloud through an MQTT protocol and verifying a certificate; and updating the trusted encrypted short message source list and the trusted server list. The technical scheme is based on mature short message technology, combines encryption technology and a digital certificate authentication system, establishes a vehicle-certificate-one-certificate safety mechanism, and realizes a safe and reliable vehicle remote control method.

Description

Vehicle remote control method based on encrypted short message
Technical Field
The invention relates to the technical field of vehicle control, in particular to a vehicle remote control method based on encrypted short messages.
Background
Under the background of the whole upgrading of the automobile industry, the development of the internet automobile is an inevitable trend, the remote vehicle control is gradually popularized, and higher requirements are put forward on the safety awakening and control functions of the vehicle. The method comprises the steps of utilizing a mature short message technology as a carrier, fusing a digital signature certificate system and an encryption technology, forming a one-vehicle one-certificate scheme by a cloud TSP server and a vehicle-end intelligent terminal, encrypting the content of the short message, issuing the encrypted short message to a vehicle-mounted intelligent terminal through an operator short message gateway, receiving the encrypted short message by the terminal, calling a PKI SDK in a vehicle-mounted intelligent terminal system and a communication link layer to decrypt and digitally check the encrypted short message, obtaining a remote awakening instruction and a high-priority vehicle control instruction, and realizing remote awakening of a vehicle and having a high-priority remote vehicle control function.
In the traditional vehicle remote control based on the short message, the content of the short message is not encrypted or authenticated, so that the risk that the content is easily intercepted exists, and potential safety hazards exist. According to the vehicle remote awakening function based on wireless data communication, a vehicle terminal cannot be constantly connected for a long time, and the conditions of wireless data network congestion and unstable data connection exist, so that the vehicle remote awakening fails, and the realization of other vehicle remote control functions is influenced.
Chinese patent document CN106292449B discloses a "system and method for remotely controlling vehicles based on encrypted short messages". The method comprises the following steps: the client is used for encrypting the short message and sending the short message to the GSM communication module; the GSM communication module is used for transmitting the short messages and the automobile data and verifying the new short messages; and the automobile burglar alarm is used for acquiring automobile data according to the short message content and sending the automobile data to the GSM communication module. The invention encrypts the short messages through the client and adds a serial number in each short message; the client side sends the short message to the GSM communication module through the GSM network, the GSM communication module verifies the short message through the serial number and the timestamp, and sends the verified short message to the automobile burglar alarm. Above-mentioned technical scheme only carries out communication encryption through the short message encryption, and the encryption mode is single, is difficult to satisfy the uniqueness of a car certificate.
Disclosure of Invention
The invention mainly solves the technical problems that the encryption mode of the original technical scheme is single and the uniqueness of one vehicle certificate is difficult to satisfy, and provides a vehicle remote control method based on encrypted short messages.
The technical problem of the invention is mainly solved by the following technical scheme: the invention comprises the following steps:
s1, the remote vehicle awakening function is encrypted and coded in a short message form;
s2 is sent to the vehicle-mounted intelligent terminal through the operator short message gateway;
s3, the vehicle-mounted intelligent terminal receives the encrypted short message and carries out judgment, verification and decryption;
s4, after confirming the awakening short message, the vehicle-mounted intelligent terminal executes the vehicle awakening function;
s5, connecting to the cloud of the vehicle TSP through an MQTT protocol and verifying the certificate;
s6, updating the trusted encryption short message source list and the trusted server list;
and S7, updating the built-in device certificate and the public key certificate of the vehicle-mounted intelligent terminal.
The vehicle remote control method for encrypting the short messages can execute remote vehicle control instructions and services with high priority, and the remote vehicle control instructions and the services include but are not limited to unlocking a vehicle, flashing lights and whistling, opening a trunk and the like. The method can be fused with a vehicle remote awakening method based on wireless data communication, and the success rate of vehicle remote control can be improved on the premise of ensuring safety.
Preferably, after the vehicle-mounted intelligent terminal receives the encrypted short message, the step S3 firstly determines whether the sender of the encrypted short message is from a trusted server, and then checks the validity of the short message. Firstly, whether the server is a trusted server or not is judged to carry out first judgment screening, and the working efficiency is improved.
Preferably, the short message validity check comprises time validity check, T Current time of terminal -T Obtaining the sending time after decryption ≤T Time validity threshold The vehicle remote control misoperation condition caused by repeated sending of the short message or delay of the short message is avoided. And the encrypted short message content can not be reused through time verification.
Preferably, the step S3 of decrypting specifically includes that the vehicle-mounted intelligent terminal system bottom layer and the communication link layer call a built-in PKI SDK to perform decryption operation and digital signature verification on the encrypted short message, and the encrypted short message is confirmed to be a trusted wake-up function short message. The encryption algorithm comprises AES, SM1 and the like, can be matched with a digital certificate authentication system to effectively encrypt and decrypt vehicle remote wake-up information and the like, and is not easy to crack and the like under the condition that an encrypted short message is intercepted, so that potential safety hazards are left.
Preferably, the vehicle-mounted intelligent terminal in step S5 is connected to the cloud of the vehicle TSP through the MQTT protocol, and first verifies the validity of the certificate built in the vehicle and the secondary certificate server of the CA, including whether the vehicle device certificate is legal within the validity period and whether the certificate conforms to the uniqueness of a vehicle certificate, so as to implement bidirectional identity authentication between the vehicle and the TSP platform and ensure the security of the MQTT communication link.
Preferably, the vehicle TSP cloud certificate system uses a secondary certificate chain architecture and consists of a root certificate, a secondary certificate, a platform certificate and a vehicle-mounted terminal certificate, and the platform certificate, the access gateway certificate, the vehicle-mounted terminal built-in certificate and the equipment certificate are signed and issued by the secondary certificate mechanism, so that a vehicle certificate-one certificate authentication system is realized.
Preferably, the step S6 is that the vehicle-mounted intelligent terminal is connected to the cloud of the vehicle TSP through an MQTT protocol, the vehicle-mounted intelligent terminal can update the built-in device certificate and the public key certificate, update the trusted encrypted short message source list, when the vehicle device certificate exceeds the legal validity period or is revoked by a CA certificate system and does not meet the identity authentication requirement of a vehicle certificate, the vehicle initiates a certificate update request service, the TSP platform checks the device information of the vehicle, applies for device certificate update to a CA secondary server, and issues a new device certificate to the vehicle. After the vehicle is remotely controlled through the encrypted short message, the vehicle-mounted intelligent terminal is connected to a TSP cloud of the vehicle through an MQTT protocol, and the vehicle-mounted intelligent terminal can update built-in equipment certificates, public key certificates and the like.
Preferably, when the TSP platform updates the trusted encrypted short message source list, after the bidirectional identity authentication between the vehicle and the TSP platform is completed, the TSP platform issues the IP address and the port in the trusted encrypted short message source list to the vehicle terminal through the MQTT protocol to update the trusted encrypted short message source list.
The invention has the beneficial effects that:
through encrypting SMS remote control vehicle, on-vehicle intelligent terminal passes through the MQTT agreement and is connected to vehicle TSP high in the clouds, responds priority high accuse car instruction, includes and not be limited to unblock vehicle, flashing light and whistling, opens trunk etc.. And responding to an APP vehicle control instruction of a vehicle owner mobile phone, and implementing a complete remote vehicle control function by the vehicle-mounted intelligent terminal. The vehicle-mounted intelligent terminal can update the trusted encrypted short message source list and update the trusted server list. The vehicle-mounted intelligent terminal can update the built-in equipment certificate, the public key certificate and the like. The vehicle-mounted intelligent terminal can feed back to the TSP cloud end of the vehicle according to the power-on and power-off conditions of the vehicle, and whether the vehicle is in a low power consumption state or not.
Drawings
FIG. 1 is a flow chart of the present invention.
Fig. 2 is a vehicle wake-up function diagram of the present invention.
Fig. 3 is a diagram of a two-level certificate chain architecture of the present invention.
Detailed Description
The technical scheme of the invention is further specifically described by the following embodiments and the accompanying drawings.
Example (b): the vehicle remote control method based on the encrypted short message comprises the steps of encrypting and coding a remote vehicle awakening function in a short message form, wherein an encryption algorithm comprises AES (advanced encryption standard), SM1 and the like, can be matched with a digital certificate authentication system to effectively encrypt and decrypt vehicle remote awakening information and the like, and is not easy to crack and the like under the condition that the encrypted short message is intercepted, so that potential safety hazards are left. The short message is issued to the vehicle-mounted intelligent terminal through an operator short message gateway, the vehicle-mounted intelligent terminal system bottom layer and the communication link layer call the built-in PKI SDK to carry out decryption operation and digital signature verification on the encrypted short message, after the credible awakening vehicle function information is confirmed, the vehicle-mounted intelligent terminal executes a vehicle awakening function, then mobile data connection is established, and the vehicle TSP cloud is connected through an MQTT protocol. The vehicle remote control method for encrypting the short message can execute remote vehicle control instructions and services with high priority, and the remote vehicle control instructions and the services include but are not limited to unlocking a vehicle, flashing a light and whistling, opening a trunk and the like.
The encrypted short message is issued to the vehicle-mounted intelligent terminal through the operator short message gateway with high credibility, and after the vehicle-mounted intelligent terminal receives the encrypted short message, whether an encrypted short message sender is from a credible server is judged firstly, and the encrypted short message content is ensured not to be reused through time verification.
The vehicle-mounted intelligent terminal system bottom layer and the communication link layer call the built-in PKI SDK to carry out decryption operation and digital signature verification on the encrypted short message, after the short message is confirmed to be a credible awakening function short message, the vehicle-mounted intelligent terminal executes a vehicle awakening function, then mobile data connection is established, and the vehicle-mounted intelligent terminal can be connected to the TSP cloud end of the vehicle through an MQTT protocol.
Take remote wake-up encrypted short message as an example:
1234567899870478;asdfghjkl;20180227164359
the short message content is encrypted in an AES mode, the vehicle machine receives the encrypted short message and then wakes up from a dormant state, and the following actions are sequentially executed: and decrypting the short message, verifying the validity of the short message and executing condition judgment. Wherein, the validity of the short message comprises time validity check T (terminal Current time) -T (obtaining the time of Transmission after decryption) ≤T (time validity threshold) The occurrence of the situation of vehicle remote control misoperation caused by repeated short message sending or short message delay is avoided.
The vehicle TSP cloud certificate system uses a second-level certificate chain architecture and consists of a root certificate, a second-level certificate, a platform certificate and a vehicle-mounted terminal certificate, and the platform certificate, the access gateway certificate, the vehicle-mounted terminal built-in certificate and the equipment certificate are issued by a second-level certificate mechanism, so that a vehicle-one-certificate authentication system is realized.
The vehicle-mounted intelligent terminal is connected to the vehicle TSP cloud end through an MQTT protocol, firstly, the validity of a certificate arranged in a vehicle and a secondary certificate server of a CA is verified, the certificate comprises whether a vehicle equipment certificate is legal within a valid period range, whether the uniqueness of a vehicle certificate is met, and the like, the two-way identity authentication of the vehicle and a TSP platform is realized, the safety of an MQTT communication link is ensured, and remote vehicle control instructions and services with high priority can be executed, including but not limited to unlocking the vehicle, flashing a whistle, opening a trunk and the like.
After a vehicle is awakened remotely through the encrypted short message, the vehicle-mounted intelligent terminal is connected to the TSP cloud end of the vehicle through an MQTT protocol, and the vehicle-mounted intelligent terminal can update built-in equipment certificates, public key certificates and the like and update a trusted encrypted short message source list. When the vehicle equipment certificate exceeds the legal validity period range or is cancelled by a CA certificate system and does not meet the identity authentication requirement of one vehicle certificate, the vehicle initiates a certificate updating request service, the TSP platform verifies the equipment information of the vehicle and the like, applies for equipment certificate updating to a CA secondary server, and signs and issues a new equipment certificate to the vehicle. Similarly, when the TSP platform updates the trusted encrypted short message source list, after the bidirectional identity authentication between the vehicle and the TSP platform is completed, the TSP platform issues the IP address, the port and the like in the trusted encrypted short message source list to the vehicle terminal for updating through the MQTT protocol.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.
Although the terms of vehicle-mounted intelligent terminal, TSP cloud, etc. are used more herein, the possibility of using other terms is not excluded. These terms are used merely to more conveniently describe and explain the nature of the present invention; they are to be construed as being without limitation to any additional limitations that may be imposed by the spirit of the present invention.

Claims (8)

1. A vehicle remote control method based on encrypted short messages is characterized by comprising the following steps:
s1, the remote vehicle awakening function is encrypted and coded in a short message form;
s2, issuing to the vehicle-mounted intelligent terminal through the operator short message gateway;
s3, the vehicle-mounted intelligent terminal receives the encrypted short message and carries out judgment, verification and decryption;
s4, the vehicle-mounted intelligent terminal executes the vehicle awakening function after confirming the awakening short message;
s5 is connected to the cloud end of the vehicle TSP through an MQTT protocol and certificate verification is carried out;
s6 updating the trusted encrypted SMS source list and the trusted server list;
s7, updating the built-in equipment certificate and the public key certificate of the vehicle-mounted intelligent terminal.
2. The method as claimed in claim 1, wherein the step S3 is implemented by determining whether the sender of the encrypted short message is from a trusted server and then checking the validity of the short message after the vehicle-mounted intelligent terminal receives the encrypted short message.
3. The method as claimed in claim 2, wherein the short message validity check includes time validity check, T Current time of terminal -T Obtaining the sending time after decryption ≤T Time validity threshold The vehicle remote control misoperation condition caused by repeated sending of the short message or delay of the short message is avoided.
4. The method for remotely controlling the vehicle based on the encrypted short message according to the claim 1, the step S3 is characterized in that the decryption specifically comprises the steps that the vehicle-mounted intelligent terminal system bottom layer and the communication link layer call the built-in PKI SDK to carry out decryption operation and digital signature verification on the encrypted short message, and the encrypted short message is confirmed to be the credible awakening function short message.
5. The method as claimed in claim 1, wherein the step S5 is that the vehicle-mounted intelligent terminal is connected to the cloud of the vehicle TSP via MQTT protocol, and the validity of the certificate built in the vehicle and the secondary certificate server of the CA is verified, including whether the certificate of the vehicle device is legal within the validity period and whether the certificate conforms to the uniqueness of a vehicle certificate, so as to implement bidirectional identity authentication between the vehicle and the TSP platform and ensure the security of the MQTT communication link.
6. The method as claimed in claim 1 or 5, wherein the TSP cloud certificate system of the vehicle uses a secondary certificate chain architecture and comprises a root certificate, a secondary certificate, a platform certificate and a vehicle-mounted terminal certificate, and the platform certificate, the access gateway certificate, the vehicle-mounted terminal built-in certificate and the equipment certificate are issued by a secondary certificate authority, so as to realize a vehicle-certificate-one-certificate authentication system.
7. The method as claimed in claim 1, wherein the step S6 is that the vehicle-mounted intelligent terminal is connected to the cloud of the vehicle TSP via MQTT protocol, the vehicle-mounted intelligent terminal can update the built-in device certificate and the public key certificate, update the trusted encrypted short message source list, when the vehicle device certificate exceeds the valid period range, or is revoked by the CA certificate system, and does not meet the identity authentication requirement of a vehicle certificate, the vehicle initiates a certificate update request service, the TSP platform audits the device information of the vehicle, applies for device certificate update to the CA secondary server, and issues a new device certificate to the vehicle.
8. The method as claimed in claim 5 or 7, wherein when the TSP platform updates the trusted encrypted SMS source list, after the bidirectional authentication between the vehicle and the TSP platform is completed, the TSP platform issues the IP address and port in the trusted encrypted SMS source list to the vehicle terminal through MQTT protocol to update the trusted encrypted SMS source list.
CN202210442674.1A 2022-04-25 2022-04-25 Vehicle remote control method based on encrypted short message Pending CN114928817A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210442674.1A CN114928817A (en) 2022-04-25 2022-04-25 Vehicle remote control method based on encrypted short message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210442674.1A CN114928817A (en) 2022-04-25 2022-04-25 Vehicle remote control method based on encrypted short message

Publications (1)

Publication Number Publication Date
CN114928817A true CN114928817A (en) 2022-08-19

Family

ID=82807553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210442674.1A Pending CN114928817A (en) 2022-04-25 2022-04-25 Vehicle remote control method based on encrypted short message

Country Status (1)

Country Link
CN (1) CN114928817A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101881104A (en) * 2010-06-18 2010-11-10 烟台麦特电子有限公司 Vehicle-mounted terminal used for remotely unlocking vehicle central lock and unlocking method thereof
CN104363266A (en) * 2014-10-23 2015-02-18 北京远特科技有限公司 Remote vehicle control method, TSP (telematics service provider) backstage system and vehicular terminal
US20160075293A1 (en) * 2014-09-16 2016-03-17 Hyundai Motor Company Method and system for remotely controlling telematics unit of vehicle
KR20160058546A (en) * 2014-11-17 2016-05-25 현대자동차주식회사 Communication device of vehicle
US20170180330A1 (en) * 2015-12-18 2017-06-22 Le Holdings (Beijing) Co., Ltd. Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium
CN107566464A (en) * 2017-08-22 2018-01-09 济宁中科先进技术研究院有限公司 The automobile double mode automatic switch door device and its method of attack resistance
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key
US20190159026A1 (en) * 2017-11-20 2019-05-23 Valeo North America, Inc. Hybrid authentication of vehicle devices and/or mobile user devices
CN110581882A (en) * 2019-07-31 2019-12-17 华为技术有限公司 Service implementation method and electronic equipment
CN111065081A (en) * 2019-12-30 2020-04-24 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111638704A (en) * 2020-06-03 2020-09-08 上海蔚来汽车有限公司 Method, system and device for remotely waking up vehicle
US20210185495A1 (en) * 2019-12-13 2021-06-17 Hyundai Motor Company Apparatus for controlling a vehicle using low power communication and method thereof
CN113709695A (en) * 2021-08-04 2021-11-26 一汽解放汽车有限公司 Vehicle use authorization method and system
CN113873448A (en) * 2021-08-24 2021-12-31 江铃汽车股份有限公司 Method for remotely waking up vehicle-mounted intelligent terminal after sleeping

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101881104A (en) * 2010-06-18 2010-11-10 烟台麦特电子有限公司 Vehicle-mounted terminal used for remotely unlocking vehicle central lock and unlocking method thereof
US20160075293A1 (en) * 2014-09-16 2016-03-17 Hyundai Motor Company Method and system for remotely controlling telematics unit of vehicle
CN104363266A (en) * 2014-10-23 2015-02-18 北京远特科技有限公司 Remote vehicle control method, TSP (telematics service provider) backstage system and vehicular terminal
KR20160058546A (en) * 2014-11-17 2016-05-25 현대자동차주식회사 Communication device of vehicle
US20170180330A1 (en) * 2015-12-18 2017-06-22 Le Holdings (Beijing) Co., Ltd. Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium
CN107566464A (en) * 2017-08-22 2018-01-09 济宁中科先进技术研究院有限公司 The automobile double mode automatic switch door device and its method of attack resistance
US20190159026A1 (en) * 2017-11-20 2019-05-23 Valeo North America, Inc. Hybrid authentication of vehicle devices and/or mobile user devices
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key
CN110581882A (en) * 2019-07-31 2019-12-17 华为技术有限公司 Service implementation method and electronic equipment
US20210185495A1 (en) * 2019-12-13 2021-06-17 Hyundai Motor Company Apparatus for controlling a vehicle using low power communication and method thereof
CN111065081A (en) * 2019-12-30 2020-04-24 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111638704A (en) * 2020-06-03 2020-09-08 上海蔚来汽车有限公司 Method, system and device for remotely waking up vehicle
CN113709695A (en) * 2021-08-04 2021-11-26 一汽解放汽车有限公司 Vehicle use authorization method and system
CN113873448A (en) * 2021-08-24 2021-12-31 江铃汽车股份有限公司 Method for remotely waking up vehicle-mounted intelligent terminal after sleeping

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
夏宝华;李佳;胡孟永;: "UDP穿透NAT技术实现数据唤醒车联网T-Box设备的方案", 电子技术与软件工程 *
胡文;姜立标;: "智能网联汽车的多级安全防护方案设计和分析", 网络安全技术与应用 *

Similar Documents

Publication Publication Date Title
US11258598B2 (en) Smartphones based vehicle access
CN107085870B (en) Regulating vehicle access using encryption methods
CN106685653B (en) Vehicle remote firmware updating method and device based on information security technology
CN101369896B (en) Method of authenticating a short message service (SMS) message
WO2017101310A1 (en) Remote control method, device and system for vehicle
WO2022027957A1 (en) Safe distribution method, device and system of vehicle bluetooth key and storage medium
CN111031147B (en) Remote vehicle-mounted control system and method based on MQTT framework
CN104243160A (en) Identity authentication management method and identity authentication method and device
CN111049803A (en) Data encryption and platform security access method based on vehicle-mounted CAN bus communication system
CN112584355A (en) Key cooperation method, system and medium for inter-vehicle communication
CN111638704A (en) Method, system and device for remotely waking up vehicle
CN114339680B (en) V2X system and safety authentication method
CN106850230A (en) A kind of data safety exchange method based on CAN network
CN115694891A (en) Roadside device communication system and method based on central computing platform
CN113572795A (en) Vehicle safety communication method and system and vehicle-mounted terminal
CN111935258A (en) Method and system for performing parameter operation on electric vehicle-mounted terminal
CN113221136B (en) AIS data transmission method, AIS data transmission device, electronic equipment and storage medium
CN113556235A (en) Digital key authorization method
CN111247770B (en) Method and related system for protecting vehicle external communication by using IBC
CN110138823B (en) Remote vehicle body control method and system
CN117097462A (en) Vehicle-mounted intelligent software upgrading encryption system based on quantum key system
CN114928817A (en) Vehicle remote control method based on encrypted short message
CN111464554B (en) Vehicle information safety control method and system
CN110881176A (en) Method for improving the utilization of a vehicle-to-X communication device and vehicle-to-X communication device
CN111711937B (en) Online certificate status acquisition method and system for communication of Internet of vehicles V2X

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination