CN117371057A - Vehicle-mounted control terminal, inter-core secure communication method, intelligent vehicle and storage medium - Google Patents

Vehicle-mounted control terminal, inter-core secure communication method, intelligent vehicle and storage medium Download PDF

Info

Publication number
CN117371057A
CN117371057A CN202311389075.9A CN202311389075A CN117371057A CN 117371057 A CN117371057 A CN 117371057A CN 202311389075 A CN202311389075 A CN 202311389075A CN 117371057 A CN117371057 A CN 117371057A
Authority
CN
China
Prior art keywords
chip
control command
control
encryption module
inter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311389075.9A
Other languages
Chinese (zh)
Inventor
任光明
何天翼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BDstar Intelligent and Connected Vehicle Technology Co Ltd
Original Assignee
BDstar Intelligent and Connected Vehicle Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BDstar Intelligent and Connected Vehicle Technology Co Ltd filed Critical BDstar Intelligent and Connected Vehicle Technology Co Ltd
Priority to CN202311389075.9A priority Critical patent/CN117371057A/en
Publication of CN117371057A publication Critical patent/CN117371057A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Abstract

The invention relates to the field of inter-core communication, and discloses a vehicle-mounted control terminal, an inter-core safety communication method, an intelligent vehicle and a storage medium, wherein the vehicle-mounted control terminal comprises the following components: the first chip, the second chip, the control background and the electronic control unit controller; the first chip is internally provided with a first encryption module, the first encryption module stores an inter-core communication key, the second chip is internally provided with a second encryption module, and the second encryption module stores the inter-core communication key; the first chip is used for establishing secure communication with the control background, and when the first chip acquires a control command from the control background, the first encryption module encrypts the control command through an inter-core communication key and sends the encrypted control command to the second chip; and when the second chip receives the data from the first chip, determining whether the control command is a control command, and if so, decrypting the encrypted control command through the second encryption module to obtain a control command in a plaintext. The safety of communication between the device cores is ensured.

Description

Vehicle-mounted control terminal, inter-core secure communication method, intelligent vehicle and storage medium
Technical Field
The present invention relates to the field of inter-core communications, and in particular, to a vehicle-mounted control terminal, an inter-core secure communication method, an intelligent vehicle, and a storage medium.
Background
With the development of economy and society, the quantity of automobile conservation is increased, high-precision positioning, automatic driving development and quick application and development of internet of vehicles are generated, and as an important node for interconnection of everything, automobiles are not independent mechanical individuals, but mobile terminals with super-strong functions, and the potential safety hazard is also increasingly highlighted.
Unlike computers, mobile phones and the like, if the automobile is black, information leakage is caused by light weight, properties are damaged, and personal safety is endangered by heavy weight. After the hacker finds out the loopholes of the vehicle-mounted embedded operating system or the vehicle-mounted software and hardware, the hacker comprehensively utilizes the loopholes of a plurality of different systems to implement attack by complex technical means, so that the hacker can steal the vehicle and can partially control the vehicle in the running state. As tesla of the intelligent internet-connected car "leader sheep", 150 cars have been broken by hackers to steal.
The risks of automobile information security at present include unsafe cloud interfaces, unauthorized access, rear doors of the system, unsafe vehicle-mounted communication, safety isolation of a vehicle-mounted network and the like.
The current vehicle-mounted system consists of a plurality of MCU and SOC processor chips, the inter-core communication among the processors is mostly plaintext transmission, the data communication related to vehicle control is not safe and reliable, and other people can directly send control commands to one processor if a protocol is cracked, so that the safety problem of the whole vehicle is caused.
Disclosure of Invention
In a first aspect, the present application provides a vehicle-mounted control terminal, including: the first chip, the second chip, the control background and the electronic control unit controller;
the first chip is internally provided with a first encryption module, the first encryption module stores an inter-core communication key, the second chip is internally provided with a second encryption module, and the second encryption module stores the inter-core communication key;
the first chip is used for establishing secure communication with the control background, and when the first chip acquires a control command from the control background, the first encryption module encrypts the control command through the inter-core communication key and sends the encrypted control command to the second chip;
and when the second chip receives the data from the first chip, determining whether the control command is a control command, and if so, decrypting the encrypted control command through the second encryption module to obtain the control command in a plaintext.
Further, the first encryption module also stores a first key;
the first chip establishes secure communication with a control background through the first encryption module, and the method comprises the following steps:
the first chip sends a connection request to the control background;
after receiving the reply message of the control background, acquiring a server side certificate of the control background, wherein the server side certificate comprises a public key and a signature;
and signing the server side certificate through the first secret key, and sending signed data to the control background to finish handshake communication between the first chip and the control background, thereby finishing establishment of the secure communication.
Further, a second key is stored in the second encryption module;
the second encryption module decrypts the encrypted control command to obtain the control command of the plaintext, and then the control command of the plaintext further comprises:
and the second chip encrypts the control command through the second encryption module and the second key to obtain a board-end encrypted communication message, and sends the board-end encrypted communication message to the electronic control unit controller through a bus.
Further, the first chip is an SOC chip, the second chip is an MCU chip, the first encryption module is a TEE module, and the second encryption module is an HSM module;
and when the SOC chip and the MCU chip leave the factory, burning the inter-core secret key into the TEE module and the HSM module.
Further, the first encryption module encrypts the control command through the inter-core communication key, including:
the first chip sends the control command to the first encryption module, the first encryption module encrypts the control command according to the inter-core communication key and a preset encryption algorithm to obtain an encrypted control command, and the preset encryption algorithm is a symmetric encryption algorithm.
In a second aspect, the present application provides an inter-core secure communication method, applied to the vehicle-mounted control terminal, where the method includes:
the first chip establishes secure communication with a control background through the first encryption module so as to acquire a control command from the control background;
after the first chip receives the control command, encrypting the control command through the inter-core communication key, and then sending the encrypted control command to the second chip;
and when the second chip receives the data from the first chip, determining whether the control command is an encrypted control command, and if so, decrypting the encrypted control command to obtain the control command in the plaintext.
Further, after the second chip obtains the control command in the plaintext, the method further includes:
and the second chip encrypts the control command through the second key to obtain a board-end encrypted communication message, and sends the board-end encrypted communication message to the electronic control unit controller.
Further, the second chip encrypts the control command through the second key to obtain a board-end encrypted communication message, which includes:
and encrypting the control command through the second key to obtain an encrypted command, slicing according to the encrypted command to generate authentication information, acquiring a freshness value, and packaging the freshness value, the authentication information and the encrypted command to obtain the board-end encrypted communication message.
In a third aspect, the present application provides an intelligent automobile, in which the vehicle-mounted control terminal is installed, and the vehicle-mounted control terminal executes the inter-core secure communication method.
In a fourth aspect, the present application provides a readable storage medium storing a computer program which, when run on a processor, performs the inter-core secure communication method.
The invention relates to the field of inter-core communication, and discloses a vehicle-mounted control terminal, an inter-core safety communication method, an intelligent vehicle and a storage medium, wherein the vehicle-mounted control terminal comprises the following components: the first chip, the second chip, the control background and the electronic control unit controller; the first chip is internally provided with a first encryption module, the first encryption module stores an inter-core communication key, the second chip is internally provided with a second encryption module, and the second encryption module stores the inter-core communication key; the first chip is used for establishing secure communication with the control background, and when the first chip acquires a control command from the control background, the first encryption module encrypts the control command through an inter-core communication key and sends the encrypted control command to the second chip; and when the second chip receives the data from the first chip, determining whether the control command is a control command, and if so, decrypting the encrypted control command through the second encryption module to obtain a control command in a plaintext. The key is protected through the hardware characteristic, the invisibility of the key is ensured, and meanwhile, each communication process of the chip is encrypted through the encryption module, so that the safety of communication between the cores of the equipment is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the present invention, the drawings that are required for the embodiments will be briefly described, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope of the present invention. Like elements are numbered alike in the various figures.
Fig. 1 shows a schematic structural diagram of a vehicle-mounted control terminal according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a method for inter-core secure communication according to an embodiment of the present application;
FIG. 3 is an interaction diagram of a first chip and a control background for establishing secure communications according to an embodiment of the present application;
FIG. 4 illustrates a diagram showing inter-core secure communications interactions according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments.
The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
The terms "comprises," "comprising," "including," or any other variation thereof, are intended to cover a specific feature, number, step, operation, element, component, or combination of the foregoing, which may be used in various embodiments of the present invention, and are not intended to first exclude the presence of or increase the likelihood of one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used merely to distinguish between descriptions and should not be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the invention belong. The terms (such as those defined in commonly used dictionaries) will be interpreted as having a meaning that is the same as the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in connection with the various embodiments of the invention.
The technical scheme of the application is applied to multi-chip inter-core communication of the vehicle-mounted control terminal, wherein a first chip and a second chip can be carried in the terminal, corresponding first encryption modules and second encryption modules are respectively configured in the first chip and the second chip, when the two chips need to communicate, sensitive data can be encrypted through the encryption modules, for example, control commands and parameters are encrypted, so that communication safety is ensured, and meanwhile, the encryption modules are used for storing keys used during encryption, so that the keys are stored in a non-plaintext readable form, and the difficulty of ciphertext cracking is increased.
The technical scheme of the application is described in the following specific embodiments.
Example 1
As shown in fig. 1, the vehicle-mounted control terminal of the present embodiment includes a first chip 100, a second chip 200, a control background 400, and an electronic control unit controller 300.
The first chip 100 and the second chip 200 represent a plurality of chips with different functions existing in a vehicle-mounted control terminal, for example, an MCU (Microcontroller Unit, micro control unit) or an SOC (system on chip) chip, etc., and these chips are often plural in one vehicle-mounted control terminal.
The electronic control unit controller 300, that is, an ECU (Elecmal Control Unit, electronic control unit) controller is an electronic control unit of an automobile, and the control background 400 is, for example, a TSP (Telematics Service Provider, content service providing) background or the like. The control background 400 is connected to the first chip 100 for internal communication, the first chip 100 is connected to the second chip 200 for transmitting a control command from the control background 400, and the second chip 200 is connected to the electronic control unit controller 300 for transmitting the control command to the electronic control unit controller 300 for realizing the control operation of the control command on the vehicle.
The first chip 100 is internally provided with a first encryption module 110, the first encryption module 110 stores an inter-core communication key, the second chip 200 is internally provided with a second encryption module 210, and the second encryption module 210 stores the inter-core communication key.
The inter-core communication key is a key used for encryption and decryption when encryption communication is carried out between the first chip and the second chip, and the encryption and decryption algorithm can be a symmetric encryption algorithm such as AES or DES.
The above-mentioned first encryption module and second encryption module can be HSM or TEE this kind of chip that is used for encrypting and decrypting specially, and because of the characteristic of this kind of chip, after the key burns into the chip from the time of leaving the factory, just become unreadable usable data, it is difficult for the hacker to crack to strengthen the security of key itself.
The first chip is also used for establishing secure communication with the control background, and when the first chip acquires a control command from the control background, the first encryption module encrypts the control command through the inter-core communication key and sends the encrypted control command to the second chip.
Specifically, a first key is also stored in a first encryption module of the first chip, and the first chip sends a connection request to the control background;
after receiving the reply message of the control background, acquiring a server side certificate of the control background, wherein the server side certificate comprises a public key and a signature;
and signing the server side certificate through the first secret key, and sending signed data to the control background to finish handshake communication between the first chip and the control background, thereby finishing establishment of the secure communication.
And when the second chip receives the data from the first chip, determining whether the control command is a control command, and if so, decrypting the encrypted control command through the second encryption module to obtain the control command in a plaintext.
A second key is stored in the second encryption module;
the second encryption module decrypts the encrypted control command to obtain the control command of the plaintext, and then the control command of the plaintext further comprises:
and the second chip encrypts the control command through the second encryption module and the second key to obtain a board-end encrypted communication message, and sends the board-end encrypted communication message to the electronic control unit controller through a bus.
In this embodiment, corresponding encryption modules are built in the first chip and the second chip, and by means of hardware protection, the key burnt into the chip is invisible, and meanwhile, by storing the first key and the second key respectively, secure communication between the first chip and the control background and secure communication between the second chip and the electric control unit controller are ensured, so that communication between each chip and equipment in the vehicle-mounted control terminal is encrypted communication, the key is unreadable, the safety of communication is ensured, and the risk caused by hacking is reduced.
Example 2
As shown in fig. 2, the present embodiment provides an inter-core secure communication method, which is applied to the vehicle-mounted control terminal in embodiment 1, and includes:
and step S100, the first chip establishes secure communication with the control background through the first encryption module so as to acquire a control command from the control background.
As shown in fig. 1, the first chip also communicates with the control background, so that, for the first chip, in addition to the secure communication with the second chip, secure communication with the control background is also required, so that data from the controlled state is also secure in the transmission link.
Specifically, the first chip is described as an example in which the SOC chip and the control background are TSP background.
The SOC chip establishes TLS communication with the TSP background through its own communication function, and during the handshake process, because the SOC chip is internally provided with a first encryption module, for example, a TEE module, the SOC chip may use a first key preset in the TEE to sign communication data for handshake verification with the TSP background, where the first key may be a key of various encryption algorithms such as an RSA key, and the specific encryption algorithm is not further limited in this embodiment.
The interaction flow of the first chip and the control background for establishing the secure communication is shown in fig. 3.
After the first chip and the control background make a call in the hello stage, the first chip sends a connection request to the control background and receives a reply message from the control background, then the first chip acquires a server side certificate of the control background, the server side certificate comprises a public key and a signature, the first chip signs the server side certificate through a first secret key of the first chip, and sends signed data and the public key of the first chip to the control background to complete handshake communication of the first chip and the control background and establish the secure communication. Thus, the data interaction between the control background and the first chip can be processed through the first key, and the safe communication between the first chip and the control background is realized.
Step S200, after the first chip receives the control command, encrypting the control command through the inter-core communication key, and then sending the encrypted control command to the second chip;
the control background sends control commands to the first chip, the first chip needs to send the control commands to the second chip, and the second chip sends the control commands to the controller of the electronic control unit, however, directly sending the control commands in the clear text can cause the commands to be unsafe in the communication process and easy to steal and tamper, so encryption is needed, and in this embodiment, the encryption and communication operation of the control commands are realized by storing the same inter-core communication keys in the first chip and the second chip.
Specifically, as shown in fig. 4, when a control command enters the first chip, the control command is encrypted by the first encryption module, wherein the control command is encrypted by using the inter-core communication key, and the encrypted control command is sent to the second chip.
As can be seen from the above step S100, the control command is generally sent from the control background, so that the control command sent at this time is also generally encrypted, so that the first encryption module needs to decrypt the control command sent by the line into plaintext by using the first key, and then encrypt the control command by using the inter-core communication key to obtain a new ciphertext, so that the second chip can perform the decryption operation.
And step S300, when the second chip receives the data from the first chip, determining whether the data is an encrypted control command, and if so, decrypting the encrypted control command to obtain the control command in the plaintext.
When the second chip receives the data from the first chip, the second chip firstly judges whether the control command is an encrypted control command, if so, the control command is transmitted to the second encryption module for processing, and the second encryption module is internally provided with an inter-core communication key, so that the control command can be decrypted according to the inter-core communication key to obtain the plaintext of the control command.
In addition, secure communication is also required between the second chip and the controller of the electronic control unit, that is, the second chip encrypts the decrypted control command again and then sends the encrypted control command to the electronic control unit.
The second chip encrypts the control command through the second key to obtain a board-end encrypted communication message, and sends the board-end encrypted communication (SECOC) message to the electronic control unit controller.
Specifically, the control command is encrypted through the second key to obtain an encrypted command, slicing is performed according to the encrypted command to generate authentication information, then a freshness value is obtained, and the freshness value, the authentication information and the encrypted command are packaged to obtain the board-end encrypted communication message.
Wherein freshness value is used to convey real-time nature of the information, may be generated by both modes of time stamp check and frame counter check. May be considered as a time-dependent data to indicate whether the data transferred is real-time data.
In summary, the inter-core secure communication method provided by the application can be applied to the vehicle-mounted control terminal, and aiming at the interaction among a plurality of chips in the vehicle-mounted control terminal and a plurality of chips which can be encountered, by arranging the encryption module in the chip and writing different keys into different communication paths, each communication session is ensured to be protected through encryption operation, meanwhile, the keys are not stored in a clear text, so that the key is harder for a hacker to crack, and a fake command is harder to generate to enter the device, thereby improving the security of the intelligent automobile.
The application also provides an intelligent automobile, which is provided with the vehicle-mounted control terminal, and the vehicle-mounted control terminal executes the inter-core safety communication method.
The present application provides a readable storage medium storing a computer program which when run on a processor performs the inter-core secure communication method.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other manners as well. The apparatus embodiments described above are merely illustrative, for example, of the flow diagrams and block diagrams in the figures, which illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules or units in various embodiments of the invention may be integrated together to form a single part, or the modules may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a smart phone, a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention.

Claims (10)

1. A vehicle-mounted control terminal, characterized by comprising: the first chip, the second chip, the control background and the electronic control unit controller;
the first chip is internally provided with a first encryption module, the first encryption module stores an inter-core communication key, the second chip is internally provided with a second encryption module, and the second encryption module stores the inter-core communication key;
the first chip is used for establishing secure communication with the control background, and when the first chip acquires a control command from the control background, the first encryption module encrypts the control command through the inter-core communication key and sends the encrypted control command to the second chip;
and when the second chip receives the data from the first chip, determining whether the control command is a control command, and if so, decrypting the encrypted control command through the second encryption module to obtain the control command in a plaintext.
2. The in-vehicle control terminal according to claim 1, wherein the first encryption module further stores a first key;
the first chip establishes secure communication with a control background through the first encryption module, and the method comprises the following steps:
the first chip sends a connection request to the control background;
after receiving the reply message of the control background, acquiring a server side certificate of the control background, wherein the server side certificate comprises a public key and a signature;
and signing the server side certificate through the first secret key, and sending signed data to the control background to finish handshake communication between the first chip and the control background, thereby finishing establishment of the secure communication.
3. The vehicle-mounted control terminal according to claim 1, wherein a second key is stored in the second encryption module;
the second encryption module decrypts the encrypted control command to obtain the control command of the plaintext, and then the control command of the plaintext further comprises:
and the second chip encrypts the control command through the second encryption module and the second key to obtain a board-end encrypted communication message, and sends the board-end encrypted communication message to the electronic control unit controller through a bus.
4. The vehicle-mounted control terminal according to claim 1, wherein the first chip is an SOC chip, the second chip is an MCU chip, the first encryption module is a TEE module, and the second encryption module is an HSM module;
and when the SOC chip and the MCU chip leave the factory, burning the inter-core secret key into the TEE module and the HSM module.
5. The in-vehicle control terminal according to claim 4, wherein the first encryption module encrypts the control command by the inter-core communication key, comprising:
the first chip sends the control command to the first encryption module, the first encryption module encrypts the control command according to the inter-core communication key and a preset encryption algorithm to obtain an encrypted control command, and the preset encryption algorithm is a symmetric encryption algorithm.
6. An inter-core secure communication method, applied to the in-vehicle control terminal according to any one of claims 1 to 5, comprising:
the first chip establishes secure communication with a control background through the first encryption module so as to acquire a control command from the control background;
after the first chip receives the control command, encrypting the control command through the inter-core communication key, and then sending the encrypted control command to the second chip;
and when the second chip receives the data from the first chip, determining whether the control command is an encrypted control command, and if so, decrypting the encrypted control command to obtain the control command in the plaintext.
7. The method of claim 6, wherein after the second chip obtains the control command in plaintext, further comprising:
and the second chip encrypts the control command through the second key to obtain a board-end encrypted communication message, and sends the board-end encrypted communication message to the electronic control unit controller.
8. The method for inter-core secure communication according to claim 7, wherein the encrypting the control command by the second chip through the second key to obtain the board-side encrypted communication message comprises:
and encrypting the control command through the second key to obtain an encrypted command, slicing according to the encrypted command to generate authentication information, acquiring a freshness value, and packaging the freshness value, the authentication information and the encrypted command to obtain the board-end encrypted communication message.
9. An intelligent automobile, characterized in that the in-vehicle control terminal according to any one of claims 1 to 5 is installed, which performs the inter-core secure communication method according to any one of claims 6 to 8.
10. A readable storage medium, characterized in that it stores a computer program which, when run on a processor, performs the inter-core secure communication method of any of claims 6 to 8.
CN202311389075.9A 2023-10-24 2023-10-24 Vehicle-mounted control terminal, inter-core secure communication method, intelligent vehicle and storage medium Pending CN117371057A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311389075.9A CN117371057A (en) 2023-10-24 2023-10-24 Vehicle-mounted control terminal, inter-core secure communication method, intelligent vehicle and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311389075.9A CN117371057A (en) 2023-10-24 2023-10-24 Vehicle-mounted control terminal, inter-core secure communication method, intelligent vehicle and storage medium

Publications (1)

Publication Number Publication Date
CN117371057A true CN117371057A (en) 2024-01-09

Family

ID=89388854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311389075.9A Pending CN117371057A (en) 2023-10-24 2023-10-24 Vehicle-mounted control terminal, inter-core secure communication method, intelligent vehicle and storage medium

Country Status (1)

Country Link
CN (1) CN117371057A (en)

Similar Documents

Publication Publication Date Title
US10708062B2 (en) In-vehicle information communication system and authentication method
Woo et al. A practical wireless attack on the connected car and security protocol for in-vehicle CAN
EP3723399A1 (en) Identity verification method and apparatus
CN108684041B (en) System and method for login authentication
CN111131313B (en) Safety guarantee method and system for replacing ECU (electronic control Unit) of intelligent networked automobile
EP3648396B1 (en) Maintenance system and maintenance method
CN111181928B (en) Vehicle diagnosis method, server, and computer-readable storage medium
CN109314640B (en) Vehicle information collection system, vehicle-mounted computer, vehicle information collection device, vehicle information collection method, and recording medium
US11212080B2 (en) Communication system, vehicle, server device, communication method, and computer program
CN105635147A (en) Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN107508797B (en) Data transmission security method for Internet of vehicles platform
CN109448195B (en) Authentication method and device for vehicle virtual key
CN110324335B (en) Automobile software upgrading method and system based on electronic mobile certificate
CN108650220B (en) Method and equipment for issuing and acquiring mobile terminal certificate and automobile end chip certificate
KR20150074414A (en) Firmware upgrade method and system thereof
JP2016139882A (en) Communication device, LSI, program and communication system
CN105450406A (en) Data processing method and device
CN110768938A (en) Vehicle safety communication method and device
CN111565182B (en) Vehicle diagnosis method and device and storage medium
CN113806772A (en) Information encryption transmission method and device based on block chain
CN110191415A (en) A kind of encryption method of information of vehicles, mobile unit and server
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
CN109314644A (en) Data providing system, data protecting device, data offering method and computer program
CN105407467A (en) Short message encryption methods, devices and system
Ammar et al. Securing the on-board diagnostics port (obd-ii) in vehicles

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination