CN116506427A - Certificate list downloading method and device, vehicle-mounted equipment and storage medium - Google Patents

Certificate list downloading method and device, vehicle-mounted equipment and storage medium Download PDF

Info

Publication number
CN116506427A
CN116506427A CN202310721128.6A CN202310721128A CN116506427A CN 116506427 A CN116506427 A CN 116506427A CN 202310721128 A CN202310721128 A CN 202310721128A CN 116506427 A CN116506427 A CN 116506427A
Authority
CN
China
Prior art keywords
certificate
downloading
downloaded
verification code
certificate list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310721128.6A
Other languages
Chinese (zh)
Inventor
吴淼
李木犀
杨雪珠
刘毅
邵馨蕊
边泽宇
高铭霞
陈明
王汉斌
胡闯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FAW Group Corp
Original Assignee
FAW Group Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FAW Group Corp filed Critical FAW Group Corp
Priority to CN202310721128.6A priority Critical patent/CN116506427A/en
Publication of CN116506427A publication Critical patent/CN116506427A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the invention discloses a certificate list downloading method, a device, vehicle-mounted equipment and a storage medium. The method comprises the following steps: acquiring a local policy file and a first verification code of a local certificate list, wherein the local policy file comprises a second verification code of a certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in vehicle networking secure communication; judging whether the first verification code is matched with the second verification code or not; and downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code. According to the technical scheme provided by the embodiment of the invention, the cloud pressure can be reduced.

Description

Certificate list downloading method and device, vehicle-mounted equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of automobiles, in particular to a certificate list downloading method and device, vehicle-mounted equipment and a storage medium.
Background
In the internet of vehicles (Vehicle to Everything, V2X) secure communication process, a trusted identity authentication needs to be established based on a secure certificate, so that mutual trust in the internet of vehicles V2X secure communication process is realized, and a certificate list needs to be downloaded.
However, aiming at the problem that the updating time cannot be accurately identified due to the untimely updating of the certificate list, the downloading of the certificate list can only be frequently performed at present, but the excessive cloud pressure can be caused by the frequent downloading of the certificate list, and the problem is solved.
Disclosure of Invention
The embodiment of the invention provides a certificate list downloading method, a device, vehicle-mounted equipment and a storage medium, so as to reduce cloud pressure.
According to an aspect of the present invention, there is provided a certificate list downloading method, applied to a vehicle-mounted device, which may include:
the method comprises the steps of obtaining a local policy file and a first verification code of a local certificate list, wherein the local policy file comprises a second verification code of the certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in internet of vehicles safety communication;
judging whether the first verification code is matched with the second verification code;
and downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code.
According to another aspect of the present invention, there is provided a certificate list downloading apparatus configured in a vehicle-mounted device, which may include:
The system comprises a first verification code acquisition module, a second verification code acquisition module and a first verification code acquisition module, wherein the first verification code acquisition module is used for acquiring a local strategy file and a first verification code of a local certificate list, the local strategy file comprises a second verification code of the certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in vehicle networking safety communication;
the matching judging module is used for judging whether the first verification code is matched with the second verification code or not;
and the to-be-downloaded certificate list downloading module is used for downloading the to-be-downloaded certificate list from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code.
According to another aspect of the present invention, there is provided an in-vehicle apparatus, which may include:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to implement the certificate list downloading method provided by any embodiment of the present invention when executed.
According to another aspect of the present invention, there is provided a computer readable storage medium having stored thereon computer instructions for causing a processor to implement the certificate list downloading method provided by any embodiment of the present invention when executed.
According to the technical scheme, a local policy file and a first verification code of a local certificate list are obtained, wherein the local policy file comprises a second verification code of the certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in vehicle networking safety communication; judging whether the first verification code is matched with the second verification code; and downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code. According to the technical scheme, the local certificate list is downloaded through the acquired local strategy file, so that frequent downloading of the certificate list can be avoided, and the cloud pressure is reduced.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention, nor is it intended to be used to limit the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
FIG. 1 is a flowchart of a certificate list downloading method provided in a first embodiment of the present invention;
fig. 2 is a block diagram of a certificate list downloading method according to a first embodiment of the present invention;
FIG. 3 is a flowchart of a certificate list downloading method provided in a second embodiment of the present invention;
FIG. 4 is a flowchart of an alternative example of a certificate list downloading method provided in the second embodiment of the present invention;
fig. 5 is a block diagram showing the structure of a certificate list downloading apparatus provided in the third embodiment of the present invention;
fig. 6 is a schematic structural diagram of an in-vehicle apparatus that implements a certificate list downloading method according to the fourth embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. The cases of "target", "original", etc. are similar and will not be described in detail herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Fig. 1 is a flowchart of a certificate list downloading method according to a first embodiment of the present invention. The embodiment can be applied to the situation of downloading the certificate list. The method is applied to the vehicle-mounted equipment, and can be executed by the certificate list downloading device provided by the embodiment of the invention, the device can be realized by software and/or hardware, the device can be integrated on the vehicle-mounted equipment, and the vehicle-mounted equipment can be various user terminals or servers.
Referring to fig. 1, the method of the embodiment of the present invention specifically includes the following steps:
s110, acquiring a local policy file and a first verification code of a local certificate list, wherein the local policy file comprises a second verification code of the certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in vehicle networking secure communication.
Among other things, the local policy file (Local Policy File, LPF) can be understood as a file that can be used to determine whether to download a list of certificates to be downloaded. The local certificate list can be understood as a locally stored list used for guaranteeing identity authentication in the internet of vehicles safety communication; the local certificate list may include at least one of a trusted domain certificate authority certificate list (Trusted Domain Certificate Authority Certificates List, TDCL), a trusted root certificate list file (Trusted Root Certificate List, TRCL), and a certificate revocation list (Certificate Revocation List, CRL), and it should be noted that the trusted domain certificate authority certificate list is a trusted domain CA certificate list, and in the embodiment of the present invention, the local certificate list may further include other types of certificate lists, which is not limited specifically. The first verification code can be understood as a verification code which corresponds to the local certificate list and is used for determining whether to download the certificate list to be downloaded; the hash value has the function of integrity protection, one-to-one matching property and can be calculated according to the corresponding security file, so that the first verification code can be, for example, a hash value obtained by SM3 hash algorithm operation according to the local certificate list, can also be, for example, a code set for the local certificate list, and the like. The second verification code can be understood as a verification code which corresponds to the certificate list to be downloaded and is used for determining whether to download the certificate list to be downloaded; the second verification code may be, for example, a hash value obtained by performing an SM3 hash algorithm operation according to the to-be-downloaded certificate list, and the second verification code may also be, for example, a code set for the to-be-downloaded certificate list, and in the embodiment of the present invention, the source and the expression form of the second verification code are not specifically limited. The certificate list download address may be understood as an address for downloading a certificate list to be downloaded, and the certificate list download address may be, for example, a cloud address for downloading the certificate list to be downloaded. In the embodiment of the present invention, the local area may be an On Board Unit (OBU).
It should be noted that, public key encryption authentication based on digital certificates is commonly adopted by the current domestic and foreign standard organizations as a security mechanism of internet of things (Vehicle to Everything, V2X), and TRCL, TDCL, CRL related security files are required to ensure an interconnection identity authentication mechanism of terminal equipment, so that in the embodiment of the present invention, security files such as a certificate list to be downloaded can be downloaded from a cloud based on local policy files.
In the embodiment of the invention, a strategy generation (Policy generation, PG) system is added on the basis of the certificate management system architecture of long-term evolution-Internet of vehicles (Long Term Evolution Vehicle to Everything, LTE-V2X) and a local strategy file is issued through the PG system according to the standard design of the related standard of the third generation partnership project (3rd Generation Partnership Project,3GPP) and the technical requirement of the safety certificate management system of the wireless communication technology of the Internet of vehicles based on LTE (China Commission standards association) (China Communications Standards Association, CCSA); the local policy file can be issued by the PG system in response to a vehicle start signal when the vehicle is ignited. Illustratively, referring to fig. 2, the certificate management system architecture of LTE-V2X that adds a policy generator (Policy generation, PG) includes: a trusted Root certificate list authority (Trusted Root Certificate List Authority, TRCLA), root certificate (Root CA) authority, intermediate Certificate Authority (ICA), CA authority (ECA) issuing registration certificates, CA authority (PCA) issuing pseudonym certificates, link Authority (LA), abnormal behavior authority (MA)/certificate revocation issue authority (CRA), policy Generator (PG) device, trusted Certificate Management Function (TCMF), device management system (DCM), certificate registration approval authority (ERA), pseudonym certificate registration authority (PRA) and car remote service provider (Telematics Service Provider, TSP); the certificate management system architecture may communicate with the terminal through an nminbx server. Wherein the CA mechanism for issuing registration certificates, the CA mechanism for issuing pseudonymous certificates, the link mechanism, the abnormal behavior management mechanism/certificate revocation issuing mechanism and the policy generator belong to the part of the issuing service; the trusted certificate authority (credential) management function, the device management system, (ERA) and the pseudonym certificate authority are part of the registration service.
In the embodiment of the present invention, the local policy file may include a second verification code of the to-be-downloaded certificate list, a certificate list download address, a version number of a format of the local policy file, a version number of a certificate management system that issues the local policy file, an issue time of the local policy file, a preset number of repetitions of the to-be-downloaded certificate list, and/or a preset time interval of the to-be-downloaded certificate list. It should be noted that, the local policy file may include version numbers of the format of the local policy file because the content format of the local policy file and/or the format of the local policy file itself may be changed due to deletion, expansion, modification, etc. of the content of the local policy file, where the local policy file in different formats corresponds to different version numbers; after the application of downloading the certificate list to be downloaded, the fact that the downloading of the certificate list to be downloaded fails due to the conditions such as busyness of the cloud end may exist, in this case, the downloading of the certificate list to be downloaded may be reapplied, but if the downloading is frequently applied, the condition that the cloud end pressure is too high may be caused, so the preset repetition number corresponding to the certificate list to be downloaded and/or the preset time interval corresponding to the certificate list to be downloaded may be set, where the preset repetition number is the preset number of times that the downloading is maximally repeated in a period from the start of the vehicle to the stop of the vehicle, or the preset number of times that the downloading is maximally repeated in a preset period of time after the start of the vehicle, and the preset time interval is the minimum time interval allowed between the preset two applications of downloading.
Optionally, the certificate list to be downloaded includes at least one of a trusted domain certificate authority certificate list, a trusted root certificate list, and a certificate revocation list. In the embodiment of the present invention, the certificate list to be downloaded may also include other types of certificate lists, which are not limited in particular.
Illustratively, referring to the contents of the local policy file in table 1 below, the local policy file may include a version number of a format of the local policy file, a issuance time of the local policy file, a version number of a Security Credential Management System (SCMS), a TRCL download address, a hash value of a SCMS cloud-up-to-date TRCL file, a preset time interval of a TRCL file, a preset number of repetitions of a TRCL file, a TDCL download address, a hash value of a SCMS cloud-up-to-date TDCL file, a preset time interval of a TDCL file, a preset number of repetitions of a TDCL file, an LPF download address, a preset time interval of an LPF file, a preset number of repetitions of an LPF file, a CRL download address, a hash value of a SCMS cloud-up-to-date CRL file, a preset time interval of a CRL file, and a preset number of repetitions of a CRL file. The TRCL download address may be a program interface address (Application Programming Interface, API), among others. It should be noted that, the corresponding preset time interval and/or preset repetition number may be set for the local policy file, which is similar to the effect of the preset repetition number of the to-be-downloaded certificate list and/or the preset time interval of the to-be-downloaded certificate list, so that frequent downloading of the local policy file may be avoided, thereby reducing cloud pressure.
Table 1 content of local policy file
S120, judging whether the first verification code is matched with the second verification code.
In the embodiment of the invention, whether the first verification code is matched with the second verification code or not can be judged, and if the first verification code is matched with the second verification code, the fact that the local certificate list is the same as the certificate list to be downloaded is indicated, and the local certificate list is not updated at the cloud; and under the condition that the first verification code is not matched with the second verification code, namely, the local certificate list is different from the certificate list to be downloaded, and the local certificate list is updated at the cloud.
And S130, downloading a certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code.
In the embodiment of the invention, under the condition that the first verification code is not matched with the second verification code, the local certificate list is updated in the cloud, the certificate list to be downloaded can be downloaded from the cloud based on the certificate list downloading address, and the downloaded certificate list obtained after being downloaded to the local can be updated into the local certificate list.
In the embodiment of the invention, the local policy file can also comprise a third verification code of the security file to be downloaded and a security file downloading address, which are used for an interconnection and intercommunication identity authentication mechanism of the terminal equipment; a fourth verification code of the local security file can also be obtained; judging whether the third verification code is matched with the fourth verification code; and under the condition that the third verification code is not matched with the fourth verification code, downloading the security file to be downloaded from the cloud based on the security file downloading address.
According to the technical scheme, a local policy file and a first verification code of a local certificate list are obtained, wherein the local policy file comprises a second verification code of the certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in vehicle networking safety communication; judging whether the first verification code is matched with the second verification code; and downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code. According to the technical scheme, the local certificate list is downloaded through the acquired local policy file, so that the waste of flow can be reduced, frequent downloading of the certificate list is avoided, and the cloud pressure is reduced.
An optional technical scheme is that the first verification code is a first hash value obtained according to a local certificate list, and the second verification code is a second hash value obtained according to a certificate list to be downloaded; judging whether the first verification code is matched with the second verification code or not comprises the following steps: and comparing the first hash value with the second hash value, and judging whether the first hash value is matched with the second hash value or not according to the comparison result.
The first hash value may be understood as a hash value obtained by an SM3 hash algorithm based on the local certificate list. The second hash value may be understood as a hash value obtained by the SM3 hash algorithm based on the list of certificates to be downloaded.
In the embodiment of the invention, whether the first hash value is consistent with the second hash value can be compared, and whether the first hash value is matched with the second hash value or not is judged according to the comparison result, namely, the first hash value is matched with the second hash value under the condition that the first hash value is consistent with the second hash value, and the first hash value is not matched with the second hash value under the condition that the first hash value is not consistent with the second hash value.
In the embodiment of the invention, the first verification code is a first hash value obtained according to a local certificate list, and the second verification code is a second hash value obtained according to a certificate list to be downloaded; and comparing the first hash value with the second hash value, and judging whether the first hash value is matched with the second hash value or not according to the comparison result. In the embodiment of the invention, the first hash value can be automatically obtained through the local certificate list, the second hash value can be automatically obtained through the certificate list to be downloaded, the first hash value is more matched with the local certificate list, and the second hash value is more matched with the certificate list to be downloaded, so that the first verification code and the first verification code which are automatically obtained can be realized, the accuracy of judging whether the first verification code and the second verification code are matched is higher, and whether the local certificate list is updated can be reflected more.
An optional technical solution, obtaining a local policy file, includes: responding to a vehicle starting signal, acquiring current time, and determining a target time period corresponding to the current time; checking whether a local policy file downloaded in a target time period exists in the vehicle-mounted equipment; and downloading the local policy file from the cloud under the condition that the local policy file does not exist in the vehicle-mounted equipment.
The target time period may be a preset time period, or a time period that matches the issue period of the local policy file, which is not limited specifically.
In the embodiment of the invention, considering that if the vehicle is started by frequently performing ignition operation on the vehicle, the situation that the same local policy file is frequently and repeatedly downloaded is likely to be caused, in order to avoid increasing the pressure of the cloud, the current time can be obtained in response to the vehicle starting signal, the target time period corresponding to the current time is determined, for example, the obtained current time is determined, and the target time period corresponding to the current time is determined to be the time period within the current day range; checking whether a local policy file downloaded in a target period exists in the vehicle-mounted device, for example, checking whether a local policy file downloaded in the vehicle-mounted device exists in the current day; downloading a local policy file from the cloud under the condition that the local policy file does not exist in the vehicle-mounted equipment; and under the condition that the local policy file exists in the vehicle-mounted equipment, the local policy file is not downloaded from the cloud.
In the embodiment of the invention, the local policy file is not existed in the vehicle-mounted device, but the local policy file is downloaded from the cloud end under the condition that the local policy file which is not downloaded in the target time period exists, and the local policy file which is not downloaded in the target time period is updated to be the downloaded local policy file.
It should be noted that, in the embodiment of the present invention, after the local policy file is downloaded from the cloud, the signature of the local policy file may also be verified to verify whether the local policy file is valid for the PG system, and if it is invalid for issuing, the local policy file is not used, or the local policy file is downloaded again, and so on.
In the embodiment of the invention, the current time can be acquired in response to the vehicle starting signal, and the target time period corresponding to the current time is determined; checking whether a local policy file downloaded in a target time period exists in the vehicle-mounted equipment; and downloading the local policy file from the cloud under the condition that the local policy file does not exist in the vehicle-mounted equipment. In the embodiment of the invention, the local strategy file is downloaded from the cloud under the condition that the local strategy file does not exist in the vehicle-mounted equipment, so that the condition of overlarge cloud pressure caused by frequently downloading the local strategy file can be avoided, and the pressure of the cloud is further reduced.
Example two
Fig. 3 is a flowchart of another certificate list downloading method provided in the second embodiment of the present invention. The present embodiment is optimized based on the above technical solutions. In this embodiment, optionally, in a case where the first verification code and the second verification code are not matched, downloading the certificate list to be downloaded from the cloud based on the certificate list download address includes: under the condition that the first verification code is not matched with the second verification code, applying for downloading a certificate list to be downloaded from the cloud; downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the number of times of applied downloading is not more than the preset repetition number of the certificate list to be downloaded and/or the first time interval is not less than the preset time interval of the certificate list to be downloaded; the first time interval is a time interval between a current application downloading time and a last application downloading time, and the last application downloading time is a last application downloading time of the current application downloading. Wherein, the explanation of the same or corresponding terms as the above embodiments is not repeated herein.
Referring to fig. 3, the method of this embodiment may specifically include the following steps:
S210, acquiring a local policy file and a first verification code of a local certificate list, wherein the local policy file comprises a second verification code of the certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in vehicle networking secure communication.
S220, judging whether the first verification code is matched with the second verification code.
S230, applying for downloading a certificate list to be downloaded to the cloud under the condition that the first verification code is not matched with the second verification code.
In the embodiment of the invention, the to-be-downloaded certificate list can be applied to the cloud end under the condition that the first verification code is not matched with the second verification code, for example, an application downloading signal for applying to download the to-be-downloaded certificate list can be sent to the cloud end.
S240, downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the number of times of applied downloading is not more than the preset repetition number of the certificate list to be downloaded and/or the first time interval is not less than the preset time interval of the certificate list to be downloaded, wherein the first time interval is the time interval between the current application downloading time and the last application downloading time, and the last application downloading time is the last application downloading time of the current application downloading.
In the embodiment of the invention, whether the number of times of applied downloading is not more than the preset repetition number of the certificate list to be downloaded and/or whether the first time interval is not less than the preset time interval of the certificate list to be downloaded can be judged; downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the number of times of applied downloading is not more than the preset repetition number of the certificate list to be downloaded and/or the first time interval is not less than the preset time interval of the certificate list to be downloaded; if not, the certificate list to be downloaded is not downloaded from the cloud.
In the embodiment of the invention, the application downloading signal is generated under the condition that the first verification code is not matched with the second verification code, and whether the number of times of applied downloading is not more than the preset repetition number of the certificate list to be downloaded or not is judged, and/or whether the first time interval is not less than the preset time interval of the certificate list to be downloaded or not is judged; transmitting a download application signal to the cloud terminal to download the certificate list to be downloaded based on the certificate list download address under the condition that the number of times of the applied download is not more than the preset repetition number of the certificate list to be downloaded and/or the first time interval is not less than the preset time interval of the certificate list to be downloaded; if not, the application downloading signal is not sent to the cloud.
According to the technical scheme, under the condition that the first verification code is not matched with the second verification code, a certificate list to be downloaded is applied to be downloaded from the cloud; downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the number of times of applied downloading is not more than the preset repetition number of the certificate list to be downloaded and/or the first time interval is not less than the preset time interval of the certificate list to be downloaded; the first time interval is a time interval between a current application downloading time and a last application downloading time, and the last application downloading time is a last application downloading time of the current application downloading. In the embodiment of the invention, the certificate list to be downloaded can be downloaded from the cloud based on the certificate list downloading address under the condition that the number of times of the applied downloading is not more than the preset repetition number of the certificate list to be downloaded and/or the first time interval is not less than the preset time interval of the certificate list to be downloaded, so that the condition that the cloud pressure is overlarge due to frequent application downloading is avoided, and the cloud pressure is further reduced.
Based on any technical scheme, an optional technical scheme is that the local policy file further comprises a certificate update address of the registration certificate to be updated; after obtaining the local policy file, the method further comprises: acquiring the latest update time or issuance time of a registration certificate to be updated and the current time; judging whether a second time interval between the latest update time or the issuance time and the current time exceeds a preset update interval; and updating the registration certificate to be updated from the cloud based on the certificate updating address under the condition that the second time interval exceeds the preset updating interval.
The registration certificate to be updated is a digital certificate to be updated for marking identity information in the car networking secure communication. The certificate update address may be understood as an address to update the registration certificate to be updated, and the certificate update address may be, for example, a cloud address to update the registration certificate to be updated. The latest update time may be understood as a time for updating the registration certificate to be updated that is closest to the current time. The issuance time may be understood as the time when the registration certificate to be updated is issued.
In the embodiment of the present invention, the local policy file may further include a certificate update address of the registration certificate to be updated; after the local policy file is acquired, the latest update time or issuing time of the registration certificate to be updated can be acquired, and the current time, and it is noted that when the operation closest to the current time is the operation of updating the registration certificate to be updated, the latest update time of the registration certificate to be updated is acquired, and when the operation closest to the current time is the operation of issuing the registration certificate to be updated, the issuing time of the registration certificate to be updated is acquired; judging whether a second time interval between the latest update time or the issuing time and the current time exceeds a preset update interval, wherein the preset time interval can be understood as a time interval for updating the registration certificate to be updated according to preset requirements, and the preset time interval can be the validity period of the registration certificate to be updated; and under the condition that the second time interval exceeds the preset updating interval, the requirement of updating the registration certificate to be updated is illustrated, and the registration certificate to be updated is updated from the cloud based on the certificate updating address. According to the scheme provided by the embodiment of the invention, the registration certificate to be updated can be updated from the cloud directly based on the certificate update address, so that complex operations such as searching the update address according to the update demand and the like are avoided when the cloud needs to be updated, and the pressure of the cloud is further reduced.
Based on any technical scheme, an optional technical scheme is that the local policy file further comprises a certificate download address of a pseudonym certificate to be downloaded; after obtaining the local policy file, the method further comprises: judging whether the number of the local pseudonym certificates is smaller than a preset stock, and downloading the pseudonym certificates to be downloaded from the cloud based on the certificate downloading addresses under the condition that the number is smaller than the preset stock.
The pseudonym certificate to be downloaded is a certificate to be downloaded for verifying the virtual identity in the car networking secure communication, and can be used for verifying the identity of a user and the security of a virtual account of the user. The certificate download address may be understood as an address for downloading the pseudonymous certificate to be downloaded, and may be, for example, a cloud address for downloading the pseudonymous certificate to be downloaded.
It should be noted that, in the process of internet of vehicles secure communication, in order to ensure that the source of the message in the process of internet of vehicles secure communication is reliable and the content is reliable, a certificate management system such as an SCMS may issue a pseudonym certificate for a vehicle, and in order to protect the location privacy of the vehicle, the validity period of the pseudonym certificate is very short, so that in order to meet the use requirement, it may be required to issue a plurality of pseudonym certificates for the same vehicle, for example, 20 pseudonym certificates may be required, so in the embodiment of the present invention, the required stock of the pseudonym certificate may be preset as a preset stock according to the requirement, and when the number of the pseudonym certificates is smaller than the preset stock, the pseudonym certificate is downloaded to ensure that the number of the pseudonym certificates meets the requirement.
In the embodiment of the present invention, the local policy file may further include a certificate download address of the pseudonym certificate to be downloaded; after the local policy file is acquired, whether the number of the local pseudonym certificates is smaller than a preset stock or not can be judged, and under the condition that the number is smaller than the preset stock, the pseudonym certificates to be downloaded are downloaded from the cloud based on the certificate download addresses. According to the scheme provided by the embodiment of the invention, the to-be-downloaded pseudonym certificate can be directly downloaded from the cloud based on the certificate download address, so that complex operations such as searching the download address and the like by the cloud according to the download requirement when the to-be-downloaded pseudonym certificate is required to be downloaded are avoided, and the pressure of the cloud is further reduced.
For better understanding of the technical solution of the embodiment of the present invention described above, an alternative example is provided herein. For example, referring to fig. 4, in response to a vehicle start signal, whether the running environment on the vehicle-mounted device is initialized successfully is judged, and if the initialization fails, the operation is directly ended; if the initialization is successful, downloading or managing the local strategy file; judging whether to need to update or download the trusted domain CA certificate list based on the local policy file, if so, updating or downloading the trusted domain CA certificate list, and judging whether to need to update or download the trusted root certificate list based on the local policy file after updating or downloading; if the trusted domain CA certificate list is not required to be updated or downloaded, judging whether the trusted root certificate list is required to be updated or downloaded based on a local policy file; if the trusted root certificate list is required to be updated or downloaded, updating or downloading the trusted root certificate list, and judging whether the certificate revocation list is required to be updated or downloaded based on a local policy file after updating or downloading; if the trusted root certificate list is not required to be updated or downloaded, judging whether the certificate revocation list is required to be updated or downloaded based on a local policy file; if the certificate revocation list is required to be updated or downloaded, updating or downloading the certificate revocation list, and judging whether updating or management of the registration certificate to be updated is required or not based on a local policy file after updating or downloading; if the certificate revocation list is not required to be updated or downloaded, judging whether the registration certificate to be updated is required to be updated or managed based on a local policy file; if the registration certificate to be updated is required to be updated or managed, the registration certificate to be updated is updated or managed, and after the registration certificate to be updated or managed, whether the request for applying, downloading or managing the pseudonym certificate to be downloaded is required is judged based on a local policy file; if the registration certificate to be updated is not required to be updated or managed, judging whether the request for applying, downloading or managing the pseudonym certificate to be downloaded is required based on the local policy file; if the request is applied, downloaded or managed on the pseudonym certificate to be downloaded, the pseudonym certificate to be downloaded is applied, downloaded or managed, and the pseudonym certificate to be downloaded enters a dormant state after the application, the downloading or the management; if the pseudonym certificate to be downloaded is not required to be applied, downloaded or managed, the pseudonym certificate enters a dormant state, and when the local policy file is required to be downloaded or managed, the local policy file is downloaded or managed until the vehicle stops.
Example III
Fig. 5 is a block diagram of a certificate list downloading apparatus according to a third embodiment of the present invention, which is configured in a vehicle-mounted device and is configured to execute the certificate list downloading method according to any of the above embodiments. The device and the certificate list downloading method of the above embodiments belong to the same inventive concept, and reference may be made to the embodiments of the certificate list downloading method for details which are not described in detail in the embodiments of the certificate list downloading device. Referring to fig. 5, the apparatus may specifically include: the device comprises a first verification code acquisition module 310, a matching judgment module 320 and a certificate list to be downloaded downloading module 330.
The first verification code obtaining module 310 is configured to obtain a local policy file and a first verification code of a local certificate list, where the local policy file includes a second verification code of a certificate list to be downloaded and a certificate list download address, and the certificate list to be downloaded is a list to be downloaded for guaranteeing identity authentication in internet of vehicles secure communication;
a matching judging module 320, configured to judge whether the first verification code and the second verification code are matched;
the to-be-downloaded certificate list downloading module 330 is configured to download the to-be-downloaded certificate list from the cloud based on the certificate list downloading address if the first verification code and the second verification code are not matched.
Optionally, the certificate list to be downloaded downloading module 330 may include:
the application downloading unit is used for applying for downloading a certificate list to be downloaded to the cloud under the condition that the first verification code is not matched with the second verification code;
the device comprises a to-be-downloaded certificate list downloading unit, a cloud end downloading unit and a cloud end downloading unit, wherein the to-be-downloaded certificate list downloading unit is used for downloading the to-be-downloaded certificate list from the cloud end based on a certificate list downloading address under the condition that the number of times of applied downloading is not more than the preset repetition number of the to-be-downloaded certificate list and/or the first time interval is not less than the preset time interval of the to-be-downloaded certificate list;
the first time interval is a time interval between a current application downloading time and a last application downloading time, and the last application downloading time is a last application downloading time of the current application downloading.
Optionally, the first verification code is a first hash value obtained according to the local certificate list, and the second verification code is a second hash value obtained according to the certificate list to be downloaded;
the matching judgment module 320 may include:
and the matching judging unit is used for comparing the first hash value with the second hash value and judging whether the first hash value is matched with the second hash value or not according to the comparison result.
Optionally, the first verification code obtaining module 310 may include:
a target time period determining unit for acquiring a current time in response to a vehicle start signal and determining a target time period corresponding to the current time;
a local policy file checking unit, configured to check whether a local policy file downloaded in a target time period exists in the vehicle-mounted device;
the local policy file downloading unit is used for downloading the local policy file from the cloud under the condition that the local policy file does not exist in the vehicle-mounted equipment.
Optionally, the local policy file further includes a certificate update address of the registration certificate to be updated;
the certificate list downloading device may further include:
the current time acquisition module is used for acquiring the latest update time or issuing time of the registration certificate to be updated and the current time after the local policy file is acquired;
the second time interval judging module is used for judging whether the second time interval between the latest update time or the issuing time and the current time exceeds a preset update interval or not;
and the registration certificate updating module is used for updating the registration certificate to be updated from the cloud based on the certificate updating address under the condition that the second time interval exceeds the preset updating interval.
Optionally, the local policy file further includes a certificate download address of a pseudonym certificate to be downloaded;
the certificate list downloading device may further include:
and the to-be-downloaded pseudonym certificate downloading module is used for judging whether the number of the local pseudonym certificates is smaller than a preset stock after the local policy file is acquired, and downloading the to-be-downloaded pseudonym certificates from the cloud based on the certificate downloading address under the condition that the number is smaller than the preset stock.
Optionally, the certificate list to be downloaded includes at least one of a trusted domain certificate authority certificate list, a trusted root certificate list, and a certificate revocation list.
The third embodiment of the present invention provides a certificate list downloading device, which obtains a local policy file and a first verification code of a local certificate list through a first verification code obtaining module, where the local policy file includes a second verification code of a certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is a list to be downloaded for guaranteeing identity authentication in internet of vehicles secure communication; judging whether the first verification code is matched with the second verification code or not through a matching judging module; and downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code by the certificate list downloading module to be downloaded. According to the device, the local certificate list is downloaded through the acquired local policy file, so that frequent downloading of the certificate list can be avoided, and the cloud pressure is reduced.
The certificate list downloading device provided by the embodiment of the invention can execute the certificate list downloading method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the executing method.
It should be noted that, in the above embodiment of the certificate list downloading apparatus, each unit and module included are only divided according to the functional logic, but not limited to the above division, so long as the corresponding functions can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present invention.
Example IV
Fig. 6 shows a schematic structural diagram of the in-vehicle apparatus 10 that can be used to implement an embodiment of the present invention. In-vehicle devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. In-vehicle devices may also represent various forms of mobile equipment, such as personal digital assistants, cellular telephones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing equipment. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 6, the in-vehicle apparatus 10 includes at least one processor 11, and a memory such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc. communicatively connected to the at least one processor 11, wherein the memory stores a computer program executable by the at least one processor, and the processor 11 can execute various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the in-vehicle apparatus 10 can also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
A plurality of components in the in-vehicle apparatus 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the in-vehicle device 10 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as the certificate list download method.
In some embodiments, the certificate list downloading method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the in-vehicle apparatus 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the certificate list downloading method described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the certificate list downloading method in any other suitable way (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an in-vehicle device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the in-vehicle device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A certificate list downloading method, characterized by being applied to a vehicle-mounted device, the method comprising:
acquiring a local policy file and a first verification code of a local certificate list, wherein the local policy file comprises a second verification code of a certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in vehicle networking secure communication;
Judging whether the first verification code is matched with the second verification code or not;
and downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code.
2. The method of claim 1, wherein the downloading the to-be-downloaded certificate list from the cloud based on the certificate list download address in the event of a mismatch between the first verification code and the second verification code comprises:
under the condition that the first verification code is not matched with the second verification code, applying for downloading the certificate list to be downloaded to the cloud;
downloading the certificate list to be downloaded from the cloud based on the certificate list downloading address under the condition that the number of times of applied downloading is not more than the preset repetition number of the certificate list to be downloaded and/or the first time interval is not less than the preset time interval of the certificate list to be downloaded;
the first time interval is a time interval between a current application downloading time and a last application downloading time, and the last application downloading time is a last application downloading time of the current application downloading.
3. The method of claim 1, wherein the first verification code is a first hash value obtained from the local certificate list, and the second verification code is a second hash value obtained from the certificate list to be downloaded;
the judging whether the first verification code is matched with the second verification code or not comprises the following steps:
and comparing the first hash value with the second hash value, and judging whether the first hash value is matched with the second hash value or not according to a comparison result.
4. The method of claim 1, wherein the obtaining the local policy file comprises:
responding to a vehicle starting signal, acquiring current time, and determining a target time period corresponding to the current time;
checking whether a local policy file downloaded in the target time period exists in the vehicle-mounted equipment;
and downloading the local policy file from the cloud end under the condition that the local policy file does not exist in the vehicle-mounted equipment.
5. The method of claim 1, wherein the local policy file further comprises a certificate update address for a registration certificate to be updated;
after the local policy file is obtained, the method further comprises:
Acquiring the latest update time or issuance time and the current time of the registration certificate to be updated;
judging whether the latest update time or a second time interval between the issuance time and the current time exceeds a preset update interval;
and updating the registration certificate to be updated from the cloud based on the certificate updating address under the condition that the second time interval exceeds the preset updating interval.
6. The method of claim 1, wherein the local policy file further comprises a certificate download address for a pseudonym certificate to be downloaded;
after the local policy file is obtained, the method further comprises:
judging whether the number of the local pseudonym certificates is smaller than a preset stock, and downloading the pseudonym certificates to be downloaded from the cloud based on the certificate downloading address under the condition that the number is smaller than the preset stock.
7. The method of claim 1, wherein the list of certificates to be downloaded comprises at least one of a list of trusted domain certificates, a list of trusted root certificates, and a list of certificate revocation.
8. A certificate list downloading apparatus, characterized by being configured in a vehicle-mounted device, comprising:
The system comprises a first verification code acquisition module, a first verification code generation module and a second verification code generation module, wherein the first verification code acquisition module is used for acquiring a local strategy file and a first verification code of a local certificate list, the local strategy file comprises a second verification code of a certificate list to be downloaded and a certificate list downloading address, and the certificate list to be downloaded is used for guaranteeing identity authentication in Internet of vehicles secure communication;
the matching judging module is used for judging whether the first verification code is matched with the second verification code or not;
and the to-be-downloaded certificate list downloading module is used for downloading the to-be-downloaded certificate list from the cloud based on the certificate list downloading address under the condition that the first verification code is not matched with the second verification code.
9. An in-vehicle apparatus, characterized by comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to cause the at least one processor to perform the certificate list downloading method as claimed in any one of claims 1 to 7.
10. A computer readable storage medium storing computer instructions for causing a processor to perform the certificate list downloading method according to any one of claims 1-7.
CN202310721128.6A 2023-06-16 2023-06-16 Certificate list downloading method and device, vehicle-mounted equipment and storage medium Pending CN116506427A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310721128.6A CN116506427A (en) 2023-06-16 2023-06-16 Certificate list downloading method and device, vehicle-mounted equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310721128.6A CN116506427A (en) 2023-06-16 2023-06-16 Certificate list downloading method and device, vehicle-mounted equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116506427A true CN116506427A (en) 2023-07-28

Family

ID=87324993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310721128.6A Pending CN116506427A (en) 2023-06-16 2023-06-16 Certificate list downloading method and device, vehicle-mounted equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116506427A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116827544A (en) * 2023-08-31 2023-09-29 北京云驰未来科技有限公司 Method and system for replacing on-board OBU trust root
CN117156440A (en) * 2023-10-27 2023-12-01 中电科网络安全科技股份有限公司 Certificate authentication method, system, storage medium and electronic equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116827544A (en) * 2023-08-31 2023-09-29 北京云驰未来科技有限公司 Method and system for replacing on-board OBU trust root
CN116827544B (en) * 2023-08-31 2023-11-07 北京云驰未来科技有限公司 Method and system for replacing on-board OBU trust root
CN117156440A (en) * 2023-10-27 2023-12-01 中电科网络安全科技股份有限公司 Certificate authentication method, system, storage medium and electronic equipment
CN117156440B (en) * 2023-10-27 2024-01-30 中电科网络安全科技股份有限公司 Certificate authentication method, system, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN116506427A (en) Certificate list downloading method and device, vehicle-mounted equipment and storage medium
CN111526159B (en) Method and device for establishing data connection, terminal equipment and storage medium
US9270684B2 (en) Providing a domain to IP address reputation service
CN112491776B (en) Security authentication method and related equipment
CN113271565B (en) Vehicle communication method, device, storage medium and program product
CN113569285A (en) Identity authentication and authorization method, device, system, equipment and storage medium
CN108491466B (en) Electronic device, access instruction information acquisition method, and storage medium
CN112422595A (en) Vehicle-mounted system safety protection method and device
US11681513B2 (en) Controlled scope of authentication key for software update
CN112905990A (en) Access method, client, server and access system
CN106570402A (en) Encryption module and process trusted measurement method
CN111259371B (en) Internet of things equipment authentication method, electronic device and storage medium
CN116126380A (en) Firmware upgrading method and device, electronic equipment and storage medium
CN108228280A (en) The configuration method and device of browser parameters, storage medium, electronic equipment
CN112995098B (en) Authentication method, electronic device and storage medium
CN113360868A (en) Application program login method and device, computer equipment and storage medium
CN113468188A (en) SELinux policy base updating method and device
CN113541987A (en) Method and device for updating configuration data
CN115390883B (en) Vehicle safety starting information updating method, device, equipment and storage medium
CN113672994B (en) Cooking equipment data management method, device and system based on blockchain
CN114884718B (en) Data processing method, device, equipment and storage medium
CN113271320B (en) Terminal authentication method, device, system, medium and equipment
US20210266186A1 (en) Method for validating a digital certificate
CN116668027A (en) Safe starting method and device based on elliptic curve encryption algorithm
CN115794165A (en) Application upgrading method and device, EPS and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination