CN115802316A - Vehicle information encryption method - Google Patents
Vehicle information encryption method Download PDFInfo
- Publication number
- CN115802316A CN115802316A CN202310102087.2A CN202310102087A CN115802316A CN 115802316 A CN115802316 A CN 115802316A CN 202310102087 A CN202310102087 A CN 202310102087A CN 115802316 A CN115802316 A CN 115802316A
- Authority
- CN
- China
- Prior art keywords
- information
- vehicle
- time
- real
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 239000002826 coolant Substances 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Traffic Control Systems (AREA)
Abstract
The application discloses a vehicle information encryption method. The method comprises the steps of obtaining real-time position information of a vehicle at first time, and uploading the real-time position information of the vehicle by using a first channel at the first time; checking the real-time position information of the vehicle according to the preset route information, if the checking result is correct, opening a second channel and acquiring the designated information of the vehicle at a second time, splitting the designated information of the vehicle into first information and second information, and uploading the second information by using the second channel at the second time; acquiring real-time position information of the vehicle at a second time, combining the real-time position information of the vehicle and the first information into combined information, and uploading the combined information by using a first channel at the second time; and receiving the merged information and the second information uploaded at the same time, splitting the merged information into real-time position information and first information of the vehicle, and merging the first information and the second information into the recovered specified information of the vehicle. The method and the device can solve the problem that the confidentiality of transmission of the vehicle information cannot be guaranteed.
Description
Technical Field
The application relates to the technical field of information encryption, in particular to a vehicle information encryption method. .
Background
The vehicle information may include a variety of information about the vehicle acquired in a vehicle information collection device embodied in the vehicle. For example, data on the vehicle state such as a vehicle trouble code, a vehicle speed, an engine revolution number, a coolant temperature, and the like. Especially, the measures of spread spectrum code disclosure and no information encryption adopted in the aspect of civil vehicle-mounted navigation positioning cannot ensure the confidentiality of vehicle information transmission.
It is to be noted that the above information disclosed in this background section is only for background of the inventive concept and may therefore contain information that does not constitute prior art.
Disclosure of Invention
Aiming at the defects of the prior art, the application discloses a vehicle information encryption method which can solve the problem that the confidentiality of transmission cannot be guaranteed by the existing vehicle information.
In order to achieve the above purpose, the present application is implemented by the following technical solutions:
a vehicle information encryption method comprising the steps of:
the method comprises the steps of obtaining real-time position information of a vehicle at first time, and uploading the real-time position information of the vehicle by using a first channel at the first time;
checking the real-time position information of the vehicle according to the preset route information, if the checking result is correct, starting a second channel and executing the next step, and if the checking result is wrong, re-acquiring the real-time position information of the vehicle and keeping the second channel closed;
acquiring the designated information of the vehicle at a second time, splitting the designated information of the vehicle into first information and second information, and uploading the second information by using a second channel at the second time;
acquiring real-time position information of the vehicle at a second time, combining the real-time position information of the vehicle and the first information into combined information, and uploading the combined information by using a first channel at the second time;
and receiving the merged information and the second information uploaded at the same time, splitting the merged information into real-time position information and first information of the vehicle, and merging the first information and the second information into the restored designated information of the vehicle.
In a preferred feature, the first time is set to a specified time point, the second time is set to a specified time point, and the first time is set to be earlier than the second time.
In a preferred feature, the first time is set to a specified time interval, the second time is set to a specified time interval, and the end point of the first time is set to be earlier than the start point of the second time.
In a preferred feature, the real-time position information of the vehicle is checked, and if the longitude information, the latitude information, the azimuth information, and the speed information of the vehicle are all correct, the result of the check is determined to be correct.
Preferably, the real-time position information of the vehicle is checked, and if any one of longitude information, latitude information, azimuth information, and speed information of the vehicle is wrong, the result of the check is determined to be wrong.
The method is characterized by comprising the following steps of checking the real-time position information of the vehicle, sending an opening signal to the second channel if the checking result is correct, and receiving the opening signal and opening the specified time by the second channel.
Preferably, the real-time position information of the vehicle is checked, and if the check result is incorrect, no signal is sent to the second channel, and the second channel is kept closed.
In a preferred feature, the first information is set as type information of the specification information of the vehicle, and the second information is set as data information of the specification information of the vehicle.
The application discloses a vehicle information encryption method, which has the following advantages:
the first information and the second information are transmitted through mutually independent information channels, so that mutually independent information safety is formed, and the information of the two channels cannot be intercepted and decoded simultaneously. The first information and the second information can be analyzed in the next step only if the data restored by the correct sorting mode is at the same time point, and errors at any time and any position can cause decoded errors. The method and the device are beneficial to avoiding the vehicle information from being tampered and decoded in the transfer process, and the reliability of the transferred data is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a schematic diagram of an embodiment of the present application.
Detailed description of the preferred embodiments
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments.
All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
Examples
The present application provides a vehicle information encryption method as shown in fig. 1.
The Beidou positioning system-based vehicle mounted device acquires real-time position information of the vehicle at the first time and uploads the real-time position information of the vehicle to a remote terminal by using a first channel at the first time. The remote terminal checks the real-time position information of the vehicle according to the preset route information, if the checking result is correct, the second channel is opened and the next step is executed, and if the checking result is wrong, the real-time position information of the vehicle is obtained again and the second channel is kept closed.
If the real-time position information of the vehicle is found to be wrong, the vehicle is indicated to be in a fault or a driver of the vehicle does not drive the vehicle according to requirements, and the designated information of the vehicle obtained in the subsequent steps does not have research and analysis values.
Specifically, in the process of checking the real-time position information of the vehicle, if the longitude information, the latitude information, the azimuth information and the speed information of the vehicle are all correct, the checking result is judged to be correct. If the check result is correct, an opening signal is sent to the second channel, and the second channel receives the opening signal and is opened for a specified time.
It is to be noted in particular that, in order to protect the security and confidentiality of the vehicle's specifying information from the point of view of the channel, the second channel for transmitting part of the specifying information of the vehicle is only opened during the transmission, and remains closed otherwise.
Accordingly, in the process of checking the real-time position information of the vehicle, if any one of the longitude information, the latitude information, the azimuth information and the speed information of the vehicle is wrong, the checking result is judged to be wrong. If the check result is wrong, no signal is sent to the second channel, and the second channel is kept closed.
After checking that the real-time position information of the vehicle is correct, the information acquisition equipment installed on the vehicle acquires and processes the designated information of the vehicle. The remote terminal acquires the designated information of the vehicle at a second time, splits the designated information of the vehicle into the first information and the second information, and uploads the second information by using the second channel at the second time.
In particular, in one embodiment, the first time is set to a specified point in time, the second time is set to a specified point in time, and the first time is set to be earlier than the second time. For example, the first second during the running of the vehicle is set as the first time, and the twelfth second is set as the second time; alternatively, the first time may be set at the one hundred second and the second time may be set at the one hundred ten second during the running of the vehicle, as long as the first time is earlier than the second time.
In another embodiment, the first time is set to a specified time interval, the second time is set to the specified time interval, and the end point of the first time is set to be earlier than the start point of the second time. For example, the first time is set at the first second to the tenth second, and the second time is set at the twelfth second to the fifteenth second during the travel of the vehicle; alternatively, the first hour of the vehicle driving process is set as the first time, the second hour is set as the second time, and the first time is earlier than the second time.
Specifically, the first information is set as type information of the specifying information of the vehicle, such as name information of "vehicle speed", "engine revolution number", and "coolant temperature" arranged in order, and the second information is set as data information of the specifying information of the vehicle, such as specific data values of the vehicle speed, engine revolution number, and coolant temperature arranged correspondingly.
And acquiring the real-time position information of the vehicle at the second time, combining the real-time position information of the vehicle and the first information into combined information, and uploading the combined information by using the first channel at the second time. It will be readily appreciated that combining the real-time location information of the vehicle with the first information according to a predetermined algorithm may form an encryption of the specific information of the vehicle.
Since the first channel is independent of the second channel and the information transmission on the first channel is also public and non-information-encrypted, the real-time location information of the vehicle can be public, but the first information separated from the designation information of the vehicle needs to be encrypted.
And finally, the remote terminal receives the combined information and the second information uploaded at the same time, splits the combined information into the real-time position information and the first information of the vehicle, and combines the first information and the second information into the recovered specified information of the vehicle. In the above steps, the first information and the second information are transmitted through mutually independent information channels, so that mutually independent information security is formed, and the information of the two channels cannot be intercepted and decoded simultaneously. The first information and the second information can be analyzed in the next step only if the data recovered by the correct sorting mode at the same time point, and the error of any time and position can cause the decoded error.
It is noted that relational terms are used herein only to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
It will be apparent to those skilled in the art that the modules or steps of the present application described above can be implemented using a general purpose computing device, which can be centralized on a single computing device or distributed across a network of multiple computing devices.
Alternatively, they may be implemented in program code executable by a computing device such that it is executed by the computing device when stored in a memory device, or separately as individual integrated circuit modules, or as a single integrated circuit module having multiple modules or steps.
The present invention is not limited to any specific combination of hardware and software.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present application.
Claims (8)
1. A vehicle information encryption method characterized by comprising the steps of:
the method comprises the steps of obtaining real-time position information of a vehicle at first time, and uploading the real-time position information of the vehicle by using a first channel at the first time;
checking the real-time position information of the vehicle according to the preset route information, if the checking result is correct, starting a second channel and executing the next step, and if the checking result is wrong, re-acquiring the real-time position information of the vehicle and keeping the second channel closed;
acquiring the designated information of the vehicle at a second time, splitting the designated information of the vehicle into first information and second information, and uploading the second information by using a second channel at the second time;
acquiring real-time position information of the vehicle at a second time, combining the real-time position information of the vehicle and the first information into combined information, and uploading the combined information by using a first channel at the second time;
and receiving the merged information and the second information uploaded at the same time, splitting the merged information into real-time position information and first information of the vehicle, and merging the first information and the second information into the recovered specified information of the vehicle.
2. The vehicle information encryption method according to claim 1, characterized in that the first time is set to a specified time point, the second time is set to a specified time point, and the first time is set to be earlier than the second time.
3. The vehicle information encryption method according to claim 1, characterized in that the first time is set to a specified time interval, the second time is set to a specified time interval, and an end point of the first time is set to be earlier than a start point of the second time.
4. The vehicle information encryption method according to claim 1, wherein in the process of checking the real-time position information of the vehicle, if the longitude information, the latitude information, the azimuth information, and the speed information of the vehicle are all correct, the result of the check is determined to be correct.
5. The vehicle information encryption method according to claim 1, wherein in the process of checking the real-time position information of the vehicle, if any one of longitude information, latitude information, azimuth information, and speed information of the vehicle is wrong, the result of the check is determined to be wrong.
6. The vehicle information encryption method according to claim 1, wherein a real-time position information process of the vehicle is checked, and if the check result is correct, an open signal is transmitted to the second channel, and the second channel receives the open signal and is opened for a specified time.
7. The vehicle information encryption method according to claim 1, wherein in the process of checking the real-time position information of the vehicle, if the result of the check is wrong, no signal is sent to the second channel, and the second channel is kept closed.
8. The vehicle information encryption method according to claim 1, wherein the first information is set as type information of specifying information of a vehicle, and the second information is set as data information of the specifying information of the vehicle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310102087.2A CN115802316A (en) | 2023-02-13 | 2023-02-13 | Vehicle information encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310102087.2A CN115802316A (en) | 2023-02-13 | 2023-02-13 | Vehicle information encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115802316A true CN115802316A (en) | 2023-03-14 |
Family
ID=85430937
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310102087.2A Pending CN115802316A (en) | 2023-02-13 | 2023-02-13 | Vehicle information encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115802316A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117560666A (en) * | 2024-01-11 | 2024-02-13 | 南京中科齐信科技有限公司 | Method for establishing point-to-point encryption communication network between intelligent network-connected automobile and cloud |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0974408A (en) * | 1995-09-04 | 1997-03-18 | Nippon Telegr & Teleph Corp <Ntt> | Security communication method |
US20170090473A1 (en) * | 2006-04-17 | 2017-03-30 | General Electric Company | Vehicle communication system |
CN107113576A (en) * | 2014-12-18 | 2017-08-29 | 株式会社电装 | Radio communication device |
-
2023
- 2023-02-13 CN CN202310102087.2A patent/CN115802316A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0974408A (en) * | 1995-09-04 | 1997-03-18 | Nippon Telegr & Teleph Corp <Ntt> | Security communication method |
US20170090473A1 (en) * | 2006-04-17 | 2017-03-30 | General Electric Company | Vehicle communication system |
CN107113576A (en) * | 2014-12-18 | 2017-08-29 | 株式会社电装 | Radio communication device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117560666A (en) * | 2024-01-11 | 2024-02-13 | 南京中科齐信科技有限公司 | Method for establishing point-to-point encryption communication network between intelligent network-connected automobile and cloud |
CN117560666B (en) * | 2024-01-11 | 2024-03-15 | 南京中科齐信科技有限公司 | Method for establishing point-to-point encryption communication network between intelligent network-connected automobile and cloud |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103529818B (en) | The record of teleprocessing system | |
US7774111B2 (en) | Method and system for providing vehicle emissions data to an authorized recipient | |
US8515616B2 (en) | Method of diagnosing vehicle malfunction using a telematics unit | |
DE102017100543A1 (en) | IMPROVING VEHICLE POSITION SERVICES | |
US20150270968A1 (en) | Securing electronic control units using message authentication codes | |
CN111431848B (en) | Method for collecting and managing event data of a vehicle | |
US9817838B2 (en) | Purging user data from vehicle memory | |
CN115802316A (en) | Vehicle information encryption method | |
US10109115B2 (en) | Modifying vehicle fault diagnosis based on statistical analysis of past service inquiries | |
CN104883678A (en) | Processing Secure SMS Messages | |
US20220303305A1 (en) | Automated can message translator | |
US11757676B2 (en) | Systems and methods for asset type fingerprinting and data message decoding | |
US11588664B2 (en) | Systems and methods for data message decoding and asset type fingerprinting | |
CN114093201B (en) | Flight equipment management method, device, equipment and storage medium | |
CN111008342B (en) | Weather information pushing method, device and system | |
US20180132100A1 (en) | Wireless communication apparatus and wireless communication method | |
US20150073649A1 (en) | Managing diagnostic trouble codes in a vehicle | |
Répás et al. | Autonomous Vehicles Forensics-The next step of the Digital Vehicles Forensics | |
KR20200086632A (en) | Method and system for collecting and managing vehicle generated data | |
US10560205B2 (en) | Detecting satellite radio reception interference | |
US11544408B2 (en) | Method and system for managing vehicle generated data | |
EP3142078A1 (en) | Central unit, road toll system and methods for operating a road toll system and a central unit | |
CN115210783A (en) | Method and system for collecting and managing vehicle generated data | |
McDougall et al. | LoVe is in the Air-Location Verification of ADS-B Signals using Distributed Public Sensors | |
CN112991573B (en) | Data opening method and related device for automobile data recorder |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20230314 |
|
RJ01 | Rejection of invention patent application after publication |