CN117560227A - Intelligent traffic message encryption transmission method, device, equipment and storage medium - Google Patents

Intelligent traffic message encryption transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN117560227A
CN117560227A CN202410035734.7A CN202410035734A CN117560227A CN 117560227 A CN117560227 A CN 117560227A CN 202410035734 A CN202410035734 A CN 202410035734A CN 117560227 A CN117560227 A CN 117560227A
Authority
CN
China
Prior art keywords
data
encryption
encrypted data
current vehicle
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410035734.7A
Other languages
Chinese (zh)
Other versions
CN117560227B (en
Inventor
闫小良
张军
姜安刘
周清华
刘文昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Bochang Intelligent Control Technology Co ltd
Original Assignee
Shenzhen Bochang Intelligent Control Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Bochang Intelligent Control Technology Co ltd filed Critical Shenzhen Bochang Intelligent Control Technology Co ltd
Priority to CN202410035734.7A priority Critical patent/CN117560227B/en
Publication of CN117560227A publication Critical patent/CN117560227A/en
Application granted granted Critical
Publication of CN117560227B publication Critical patent/CN117560227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses an intelligent traffic message encryption transmission method, device, equipment and storage medium, wherein the method comprises the following steps: responding to a vehicle data uploading instruction, and acquiring current system time, current vehicle acquisition data and current vehicle positioning information; if the current vehicle positioning information is determined to meet the first preset condition, encrypting the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data; and encrypting the current vehicle acquisition data based on a second preset encryption algorithm by taking the first encryption data as an encryption key to obtain second encryption data, and transmitting the current system time, the first encryption data and the second encryption data to a background server. The embodiment of the invention can encrypt the current vehicle positioning information acquired by the intelligent automobile for the first time and then encrypt the current vehicle acquisition data for the second time, so as to obtain the first encrypted data and the second encrypted data which have higher data security and are difficult to crack, and upload the first encrypted data and the second encrypted data to the background server.

Description

Intelligent traffic message encryption transmission method, device, equipment and storage medium
Technical Field
The invention relates to the technical field of data security of intelligent traffic, in particular to an intelligent traffic message encryption transmission method, an intelligent traffic message encryption transmission device, intelligent traffic message encryption transmission equipment and a storage medium.
Background
At present, data interaction between an intelligent automobile (such as a new energy intelligent automobile) and a background server is generally based on an encryption algorithm arranged in the intelligent automobile, wherein the data to be uploaded to the background server by the intelligent automobile is encrypted to obtain encrypted data, and the encrypted data is obtained by encrypting the data through a symmetric encryption algorithm or an asymmetric encryption algorithm. In the process of encrypting the data to obtain the encrypted data, the encryption algorithm is always fixed, so that if the encrypted data is intercepted, the encrypted data is broken to cause the risk of data leakage, and the data security cannot be ensured.
Disclosure of Invention
The embodiment of the invention provides an intelligent traffic message encryption transmission method, device, equipment and storage medium, and aims to solve the problems that in the prior art, when an intelligent automobile interacts with data of a background server, the data which is required to be uploaded to the background server by the intelligent automobile is encrypted based on an encryption algorithm arranged in the intelligent automobile to obtain encrypted data, if the encrypted data is intercepted, the encrypted data is broken to cause the risk of data leakage, and the data security is not guaranteed.
In a first aspect, an embodiment of the present invention provides an intelligent traffic message encryption transmission method, applied to an intelligent automobile, including:
responding to a vehicle data uploading instruction, and acquiring current system time, current vehicle acquisition data and current vehicle positioning information;
if the current vehicle positioning information is determined to meet the first preset condition, encrypting the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data; the first preset condition comprises a plurality of allowed passing areas;
and encrypting the current vehicle collected data based on a second preset encryption algorithm by taking the first encrypted data as an encryption key to obtain second encrypted data, and sending the current system time, the first encrypted data and the second encrypted data to a background server.
In a second aspect, an embodiment of the present invention further provides an intelligent traffic message encryption transmission device configured in an intelligent automobile, including:
the data acquisition unit is used for acquiring the current system time, the current vehicle acquisition data and the current vehicle positioning information if the current condition is detected to meet the preset lane image acquisition condition;
The first encryption unit is used for encrypting the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data if the current vehicle positioning information is determined to meet a first preset condition; the first preset condition comprises a plurality of allowed passing areas;
the second encryption unit is used for encrypting the current vehicle collected data based on a second preset encryption algorithm by taking the first encrypted data as an encryption key to obtain second encrypted data, and sending the current system time, the first encrypted data and the second encrypted data to a background server.
In a third aspect, an embodiment of the present invention further provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the method described in the first aspect when executing the computer program.
In a fourth aspect, embodiments of the present invention also provide a computer readable storage medium storing a computer program comprising program instructions which, when executed by a processor, implement the method of the first aspect.
The embodiment of the invention provides an intelligent traffic message encryption transmission method, device, equipment and storage medium, wherein the method comprises the following steps: responding to a vehicle data uploading instruction, and acquiring current system time, current vehicle acquisition data and current vehicle positioning information; if the current vehicle positioning information is determined to meet the first preset condition, encrypting the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data; the first preset condition comprises a plurality of allowed passing areas; and encrypting the current vehicle acquisition data based on a second preset encryption algorithm by taking the first encryption data as an encryption key to obtain second encryption data, and transmitting the current system time, the first encryption data and the second encryption data to a background server. The embodiment of the invention can encrypt the current vehicle positioning information acquired by the intelligent automobile for the first time and then encrypt the current vehicle acquisition data for the second time, so as to obtain the first encrypted data and the second encrypted data which have higher data security and are difficult to crack, and upload the first encrypted data and the second encrypted data to the background server.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an application scenario of an intelligent traffic message encryption transmission method according to an embodiment of the present invention;
FIG. 2 is a flowchart of an intelligent traffic message encryption transmission method according to an embodiment of the present invention;
FIG. 3 is a schematic sub-flowchart of an intelligent traffic message encryption transmission method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of another sub-flow of the intelligent traffic message encryption transmission method according to the embodiment of the present invention;
FIG. 5 is a schematic diagram of another sub-flow of the intelligent traffic message encryption transmission method according to the embodiment of the present invention;
FIG. 6 is a schematic block diagram of an intelligent traffic message encryption transmission device according to an embodiment of the present invention;
fig. 7 is a schematic block diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
The embodiment of the invention provides an intelligent traffic message encryption transmission method, device, equipment and storage medium. The intelligent traffic message encryption transmission method in the embodiment of the invention is applied to an intelligent automobile, and one or more processors, a memory and one or more application programs are arranged in the intelligent automobile, wherein the one or more application programs are stored in the memory and are configured to be executed by the processors to realize the intelligent traffic message encryption transmission method.
As shown in fig. 1, fig. 1 is a schematic view of a scenario of an intelligent traffic message encryption transmission method according to an embodiment of the present invention, where the intelligent traffic message encryption transmission scenario includes an intelligent vehicle 10 and a background server 20, and an intelligent traffic message encryption transmission device is integrated in the intelligent vehicle 10, and a storage medium corresponding to the intelligent traffic message encryption transmission method is operated to execute steps of the intelligent traffic message encryption transmission method.
Fig. 2 is a flowchart of an intelligent traffic message encryption transmission method according to an embodiment of the present invention. As shown in fig. 2, the method includes the following steps S110 to S130.
S110, responding to a vehicle data uploading instruction, and acquiring current system time, current vehicle acquisition data and current vehicle positioning information.
In this embodiment, the technical scheme is described by using the intelligent automobile as an execution subject. In order to acquire some key vehicle data (such as driving speed, residual electric energy, driving mileage, working parameters of automobile equipment and the like) of the intelligent automobile, the key vehicle data are not sent to the background server in a clear text mode, when the intelligent automobile has a requirement for uploading data at a certain moment, the current system time, the current vehicle acquisition data and the current vehicle positioning information are acquired firstly at the local of the intelligent automobile, and the data can be uploaded to the background server after encryption processing.
The method comprises the following steps of:
1) The first is a timing generation mode, that is, after each preset command generation period, a vehicle data uploading command is automatically generated, for example, the generation time of the last vehicle data uploading command is T1, and the preset command generation period is T, and the generation time of the next vehicle data uploading command is t1+t;
2) The second is a fixed driving distance generation mode, that is, a preset driving distance is set at each interval to automatically generate a vehicle data uploading instruction, for example, a historical accumulated driving distance corresponding to a last vehicle data uploading instruction is D1, and the preset driving distance is D, and a historical accumulated driving distance corresponding to a next vehicle data uploading instruction is d1+d;
3) Thirdly, automatically generating a vehicle data uploading instruction every time the intelligent automobile senses a road side unit arranged on one side of a road;
4) The fourth is that an application program corresponding to the intelligent automobile is installed on an intelligent terminal (such as a smart phone) in communication connection with the intelligent automobile, and part of intelligent interactive control on the intelligent automobile can be realized on the application program, for example, a virtual button for triggering a vehicle data uploading instruction is arranged on an interactive interface of the application program, and when a user operates the intelligent terminal to click the virtual button for triggering the vehicle data uploading instruction, the virtual button for triggering the vehicle data uploading instruction can also be triggered to generate the vehicle data uploading instruction
Of course, in the specific implementation, the vehicle data upload instruction is not limited to the four generation methods described above, and may be generated in other ways, as long as the vehicle data upload instruction is triggered and generated. At the corresponding moment of generating the vehicle data uploading instruction, the current vehicle acquisition data (such as driving speed, residual electric energy, driving mileage, vehicle equipment working parameters and the like), the current system time and the current vehicle positioning information of the intelligent vehicle are acquired and acquired at the same time, and the current system time, the current vehicle acquisition data and the current vehicle positioning information acquired on the intelligent vehicle are in a current or clear state and cannot be directly uploaded to a background server.
And S120, if the current vehicle positioning information is determined to meet the first preset condition, encrypting the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data.
The first preset condition comprises a plurality of allowed passing areas.
In this embodiment, the encryption mode adopted is different from the existing vehicle data that is encrypted once and then uploaded to the background server, in that when it is determined that the current vehicle positioning information meets the first preset condition, the current vehicle positioning information is encrypted by adopting a first preset encryption algorithm, so as to obtain first encrypted data. And whether the current vehicle positioning information meets the first preset condition is judged, and whether the intelligent automobile is currently driven to a sensitive area in which the positioning data cannot be uploaded is also determined. If the current vehicle positioning information is determined to meet the first preset condition, the positioning position corresponding to the current vehicle positioning information is indicated to belong to one of a plurality of allowed passing areas included in the first preset condition, and at this time, the current vehicle positioning information can be encrypted based on a first preset encryption algorithm to obtain first encrypted data. The first encrypted data functions not only as encrypted data of the current vehicle positioning information but also as an encryption key for encrypting the current vehicle collected data later.
In one embodiment, as shown in fig. 3, step S120 includes:
s121, acquiring an asymmetric encryption model corresponding to the first preset encryption algorithm;
s122, acquiring current longitude and latitude information corresponding to the current vehicle positioning information;
s123, encrypting the current longitude and latitude information based on the asymmetric encryption model to obtain the first encrypted data.
In this embodiment, in order to encrypt the current vehicle positioning information, an asymmetric encryption model such as an RSA encryption algorithm corresponding to the first preset encryption algorithm may be obtained first, then current latitude and longitude information corresponding to the current vehicle positioning information is obtained (that is, the current latitude and longitude information in the current vehicle positioning information is obtained by analyzing the current latitude and longitude information instead of directly using the original current vehicle positioning information as data to be encrypted later), and finally the current latitude and longitude information is encrypted according to the asymmetric encryption model to obtain the first encrypted data.
The first encrypted data is encrypted for the first time, so that the first encrypted data is obtained to be safer, and then the first encrypted data is used as an encryption key to be more difficult to crack. After the intelligent automobile runs to one position, the intelligent automobile can correspond to different positioning positions, namely different vehicle positioning information, so that the first encryption data generated each time is continuously changed, and the cracking difficulty is higher.
For example, the intelligent automobile travels to the place a, and the place a corresponds to the latitude and longitude information A1, and the latitude and longitude information A1 is encrypted by an asymmetric encryption model to obtain encrypted data A2. The intelligent automobile runs to a place B (the place B is different from the place A, and the place A and the place B both belong to one of a plurality of allowed passing areas), the intelligent automobile corresponds to longitude and latitude information B1, and the longitude and latitude information B1 is encrypted by an asymmetric encryption model to obtain encrypted data B2. The encrypted data B2 and the encrypted data A2 are different encrypted data, the encrypted data A2 and the encrypted data B2 encrypt corresponding data to be encrypted respectively, and the two obtained encrypted results are different. And then the two encryption results are decrypted, the same decryption key is not used any more, but different decryption keys are used. Therefore, even if the encryption result is intercepted and obtained, the decryption difficulty is extremely high because the corresponding decryption key is difficult to obtain, and the data security is effectively ensured.
S130, taking the first encrypted data as an encryption key, encrypting the current vehicle collected data based on a second preset encryption algorithm to obtain second encrypted data, and sending the current system time, the first encrypted data and the second encrypted data to a background server.
In this embodiment, since the current vehicle positioning information is encrypted to obtain the first encrypted data, in order to improve the data security level of the current vehicle collected data, the first encrypted data may be used as an encryption key of a second preset encryption algorithm to encrypt the current vehicle collected data to obtain the second encrypted data. At this time, the current vehicle collected data and the current vehicle positioning information are no longer in a plaintext form, and at this time, the current system time, the first encrypted data and the second encrypted data are sent to a background server, so that the first encrypted data and the second encrypted data corresponding to the current system time of the intelligent automobile are stored in the background server. Therefore, the second encrypted data stored in the mode is a double encrypted result, and the first encrypted data is encrypted data subjected to primary encryption, so that the data security of the intelligent automobile is greatly improved.
In an embodiment, as shown in fig. 4, as a first specific embodiment in step S130, step S130 includes:
s131a, a symmetrical encryption model and an antagonistic neural network corresponding to the second preset encryption algorithm are obtained;
S132a, using the first encryption data as an encryption key and encrypting the current vehicle acquisition data through the symmetrical encryption model to obtain a current acquisition data encryption result;
s133a, performing operation by taking the first encrypted data as the input of the antagonistic neural network to obtain a first network output result;
and S134a, connecting the encryption result of the current acquired data with the output result of the first network to form the second encrypted data.
In this embodiment, after the first encrypted data is obtained locally in the smart car, when the first encrypted data is encrypted for the second time, a symmetric encryption model (such as DES encryption algorithm) and an antagonistic neural network corresponding to the second preset encryption algorithm may be obtained first. And then, the first encryption data is used as an encryption key, the current vehicle collected data is encrypted through the symmetrical encryption model, so that a current collected data encryption result is obtained, and the obtained current collected data encryption result can be regarded as a secondary encryption result. However, in order to improve the cracking difficulty, some interference data can be spliced in the encryption result of the current acquired data. The first encrypted data is used as input of the anti-neural network to operate, so that a first network output result is obtained, the result can be regarded as interference data processed by the anti-neural network, and the interference data is spliced with the current acquired data encryption result, so that second encrypted data which is extremely high in safety coefficient and difficult to crack can be obtained.
Of course, in order to decrypt the first encrypted data, the background server also needs to store a decryption key corresponding to the asymmetric encryption model in the background server, and decrypt the first encrypted data based on the decryption key and the decryption model corresponding to the asymmetric encryption model, so as to restore the current longitude and latitude information in a plaintext form, and convert the current longitude and latitude information in a data format so as to restore the current longitude and latitude information to obtain the front vehicle positioning information.
In order for the background server to decrypt the second encrypted data, a challenge sample recovery algorithm (such as a recovery algorithm at a CLEVER distance) corresponding to the challenge neural network needs to be stored in the background server, and the process of recovering the first encrypted data from the second encrypted data is specifically as follows:
the first step is to acquire the first encrypted data and the second encrypted data corresponding to a certain stored system time from a background server;
encrypting the first encrypted data based on a symmetric encryption model in a background server to obtain current encrypted data, and comparing the current encrypted data with the second encrypted data to obtain a difference comparison result;
the third step is to input the difference comparison result to an countermeasure sample recovery algorithm to obtain sample recovery data;
And the fourth step is to compare whether the sample recovery data is the same as the current encrypted data or not, if so, the recovery is successful, and one of the difference comparison result or the current encrypted data is used as the first encrypted data recovered by the second encrypted data instead of the first encrypted data stored by the background server.
In one embodiment, as shown in fig. 5, as a second specific embodiment in step S130, step S130 includes:
s131b, acquiring an isomorphic encryption model corresponding to the second preset encryption algorithm;
and S132b, encrypting the current vehicle acquisition data based on the homomorphic encryption model and the encryption key to obtain the second encrypted data.
In the present embodiment, the difference from the first embodiment of step S130 is that the expandable availability of the second encrypted data is sufficiently taken into consideration. The method adopts the full homomorphic encryption model to encrypt the current vehicle collected data, and fully utilizes the encryption result in the form of ciphertext after full homomorphic encryption to still participate in various operations, so as to obtain the same result as the result directly participating in the operations in the form of plaintext. In the background server, an isohomomorphic encryption model corresponding to a second preset encryption algorithm is stored, and then the isomorphic encryption model corresponding to the second preset encryption algorithm is directly stored. Therefore, the second encrypted data with extremely high security coefficient and capable of participating in ciphertext calculation to safely expand the application can be obtained based on the encryption process.
For example, the background server also stores a data processing model for performing operation on the second encrypted data, and in this case, the second encrypted data is not required to be restored to plaintext to obtain the driving speed, the remaining electric energy, the driving mileage, the operating parameters of the vehicle equipment, and the like, but the second encrypted data is directly input into the data processing model to perform operation to obtain the processing result.
In one embodiment, after step S110, the method further includes:
and if the current vehicle positioning information meets the second preset condition, encrypting the current vehicle collected data based on a third preset encryption algorithm to obtain third encrypted data, and storing the third encrypted data into a local first private storage space.
The second preset condition comprises a plurality of traffic forbidden and communication areas.
In this embodiment, when the intelligent automobile determines that the current vehicle positioning information meets the second preset condition, it indicates that the user may drive the intelligent automobile to a certain traffic prohibition and communication area, and at this moment, a vehicle data uploading instruction is generated in the intelligent automobile and a data uploading requirement is triggered. In order to more quickly check whether the current vehicle collected data can be uploaded to the background server at this time, it is required to determine whether the positioning position corresponding to the current vehicle positioning information belongs to one of the traffic-forbidden and communication areas in the second preset condition. If the positioning position corresponding to the current vehicle positioning information belongs to one of the traffic-forbidden and communication areas in the second preset condition, the current vehicle acquisition data cannot be uploaded to the background server. At this time, the current vehicle collected data may be encrypted based on a third preset encryption algorithm (such as an asymmetric encryption algorithm) local to the intelligent vehicle, so as to obtain third encrypted data, and the third encrypted data is stored in a local first private storage space. This third encrypted data may be automatically purged from the first private storage space after a predetermined data retention time (e.g., 30 days) is stored in the first private storage space. Therefore, the current vehicle acquired data which can be obtained by the intelligent vehicle in the traffic forbidden and communication area through the mode can not be uploaded to a background server, but is stored locally in a private mode. Meanwhile, the first encrypted data of the same intelligent automobile and the same system time corresponding to the current vehicle collected data cannot be uploaded to the background server, and the first encrypted data is stored in the first private storage space and can be cleared periodically (the clearing process can refer to the clearing process of the third encrypted data in the first private storage space).
In an embodiment, step S130 further includes:
if the time interval between the latest system time and the current system time exceeds the preset encrypted data storage time, deleting the local current system time, the first encrypted data and the second encrypted data.
In this embodiment, in step S130, the smart car sends the current system time, the first encrypted data and the second encrypted data to the background server to upload to the background server for storage and subsequent data application, and at the same time, the smart car can store the current system time, the first encrypted data and the second encrypted data locally. In order to realize regular cleaning of data in the intelligent automobile, if it is determined that the time interval between the latest system time and the current system time exceeds the preset encrypted data storage time in the intelligent automobile, deleting the local current system time, the first encrypted data and the second encrypted data.
In one embodiment, step S110 further includes:
and acquiring intelligent automobile user identity information corresponding to the current vehicle acquisition data and the current vehicle positioning information, and establishing a binding relationship with the current system time, the current vehicle acquisition data and the current vehicle positioning information.
In this embodiment, after acquiring the current vehicle acquisition data and the current vehicle positioning information of a certain intelligent vehicle in step S110, in order to make the background server know which intelligent vehicle is the data uploaded by, it is necessary to acquire the user identity information of the intelligent vehicle (for example, the identity information of the logged-in user corresponding to the vehicle-to-vehicle system of the intelligent vehicle) first, and then establish a binding relationship between the user identity information of the intelligent vehicle and the current system time, the current vehicle acquisition data and the current vehicle positioning information. And then, the intelligent automobile user identity information and the first encrypted data and the second encrypted data which are obtained by the intelligent automobile corresponding to the current system time are also in a binding relation, and the background server can more quickly determine the intelligent automobile for uploading the first encrypted data and the second encrypted data.
Therefore, the embodiment of the method can encrypt the current vehicle positioning information acquired by the intelligent automobile for the first time and then encrypt the current vehicle acquisition data for the second time, so that the first encrypted data and the second encrypted data which are higher in data security and difficult to crack are obtained and uploaded to the background server.
Fig. 6 is a schematic block diagram of an intelligent traffic message encryption transmission device according to an embodiment of the present invention. As shown in fig. 6, the present invention also provides an intelligent traffic message encryption transmission device 100 corresponding to the above intelligent traffic message encryption transmission method. The intelligent transportation message encryption transmission apparatus 100 includes a unit for performing the above intelligent transportation message encryption transmission method, and is configured in a smart car. Referring to fig. 6, the smart traffic message encryption transmission apparatus 100 includes: a data acquisition unit 110, a first encryption unit 120, and a second encryption unit 130.
The data acquisition unit 110 is configured to acquire the current system time, the current vehicle acquisition data, and the current vehicle positioning information in response to the vehicle data uploading instruction.
In this embodiment, the technical scheme is described by using the intelligent automobile as an execution subject. In order to acquire some key vehicle data (such as driving speed, residual electric energy, driving mileage, working parameters of automobile equipment and the like) of the intelligent automobile, the key vehicle data are not sent to the background server in a clear text mode, when the intelligent automobile has a requirement for uploading data at a certain moment, the current system time, the current vehicle acquisition data and the current vehicle positioning information are acquired firstly at the local of the intelligent automobile, and the data can be uploaded to the background server after encryption processing.
At the corresponding moment of generating the vehicle data uploading instruction, the current vehicle acquisition data (such as driving speed, residual electric energy, driving mileage, vehicle equipment working parameters and the like), the current system time and the current vehicle positioning information of the intelligent vehicle are acquired and acquired at the same time, and the current system time, the current vehicle acquisition data and the current vehicle positioning information acquired on the intelligent vehicle are in a current or clear state and cannot be directly uploaded to a background server.
The first encryption unit 120 is configured to encrypt the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data if it is determined that the current vehicle positioning information meets a first preset condition.
The first preset condition comprises a plurality of allowed passing areas.
In this embodiment, the encryption mode adopted is different from the existing vehicle data that is encrypted once and then uploaded to the background server, in that when it is determined that the current vehicle positioning information meets the first preset condition, the current vehicle positioning information is encrypted by adopting a first preset encryption algorithm, so as to obtain first encrypted data. And whether the current vehicle positioning information meets the first preset condition is judged, and whether the intelligent automobile is currently driven to a sensitive area in which the positioning data cannot be uploaded is also determined. If the current vehicle positioning information is determined to meet the first preset condition, the positioning position corresponding to the current vehicle positioning information is indicated to belong to one of a plurality of allowed passing areas included in the first preset condition, and at this time, the current vehicle positioning information can be encrypted based on a first preset encryption algorithm to obtain first encrypted data. The first encrypted data functions not only as encrypted data of the current vehicle positioning information but also as an encryption key for encrypting the current vehicle collected data later.
In one embodiment, the first encryption unit 120 is specifically configured to:
acquiring an asymmetric encryption model corresponding to the first preset encryption algorithm;
acquiring current longitude and latitude information corresponding to the current vehicle positioning information;
and encrypting the current longitude and latitude information based on the asymmetric encryption model to obtain the first encrypted data.
In this embodiment, in order to encrypt the current vehicle positioning information, an asymmetric encryption model such as an RSA encryption algorithm corresponding to the first preset encryption algorithm may be obtained first, then current latitude and longitude information corresponding to the current vehicle positioning information is obtained (that is, the current latitude and longitude information in the current vehicle positioning information is obtained by analyzing the current latitude and longitude information instead of directly using the original current vehicle positioning information as data to be encrypted later), and finally the current latitude and longitude information is encrypted according to the asymmetric encryption model to obtain the first encrypted data.
The first encrypted data is encrypted for the first time, so that the first encrypted data is obtained to be safer, and then the first encrypted data is used as an encryption key to be more difficult to crack. After the intelligent automobile runs to one position, the intelligent automobile can correspond to different positioning positions, namely different vehicle positioning information, so that the first encryption data generated each time is continuously changed, and the cracking difficulty is higher.
For example, the intelligent automobile travels to the place a, and the place a corresponds to the latitude and longitude information A1, and the latitude and longitude information A1 is encrypted by an asymmetric encryption model to obtain encrypted data A2. The intelligent automobile runs to a place B (the place B is different from the place A, and the place A and the place B both belong to one of a plurality of allowed passing areas), the intelligent automobile corresponds to longitude and latitude information B1, and the longitude and latitude information B1 is encrypted by an asymmetric encryption model to obtain encrypted data B2. The encrypted data B2 and the encrypted data A2 are different encrypted data, the encrypted data A2 and the encrypted data B2 encrypt corresponding data to be encrypted respectively, and the two obtained encrypted results are different. And then the two encryption results are decrypted, the same decryption key is not used any more, but different decryption keys are used. Therefore, even if the encryption result is intercepted and obtained, the decryption difficulty is extremely high because the corresponding decryption key is difficult to obtain, and the data security is effectively ensured.
The second encryption unit 130 is configured to encrypt the current vehicle collected data based on a second preset encryption algorithm with the first encrypted data as an encryption key, obtain second encrypted data, and send the current system time, the first encrypted data, and the second encrypted data to a background server.
In this embodiment, since the current vehicle positioning information is encrypted to obtain the first encrypted data, in order to improve the data security level of the current vehicle collected data, the first encrypted data may be used as an encryption key of a second preset encryption algorithm to encrypt the current vehicle collected data to obtain the second encrypted data. At this time, the current vehicle collected data and the current vehicle positioning information are no longer in a plaintext form, and at this time, the current system time, the first encrypted data and the second encrypted data are sent to a background server, so that the first encrypted data and the second encrypted data corresponding to the current system time of the intelligent automobile are stored in the background server. Therefore, the second encrypted data stored in the mode is a double encrypted result, and the first encrypted data is encrypted data subjected to primary encryption, so that the data security of the intelligent automobile is greatly improved.
In an embodiment, as a first specific embodiment of the second encryption unit 130, the second encryption unit 130 is specifically configured to:
obtaining a symmetrical encryption model and an antagonistic neural network corresponding to the second preset encryption algorithm;
Encrypting the current vehicle collected data by taking the first encrypted data as an encryption key and using the symmetric encryption model to obtain a current collected data encryption result;
calculating by taking the first encrypted data as the input of the antagonistic neural network to obtain a first network output result;
and connecting the current acquired data encryption result with the first network output result to form the second encrypted data.
In this embodiment, after the first encrypted data is obtained locally in the smart car, when the first encrypted data is encrypted for the second time, a symmetric encryption model (such as DES encryption algorithm) and an antagonistic neural network corresponding to the second preset encryption algorithm may be obtained first. And then, the first encryption data is used as an encryption key, the current vehicle collected data is encrypted through the symmetrical encryption model, so that a current collected data encryption result is obtained, and the obtained current collected data encryption result can be regarded as a secondary encryption result. However, in order to improve the cracking difficulty, some interference data can be spliced in the encryption result of the current acquired data. The first encrypted data is used as input of the anti-neural network to operate, so that a first network output result is obtained, the result can be regarded as interference data processed by the anti-neural network, and the interference data is spliced with the current acquired data encryption result, so that second encrypted data which is extremely high in safety coefficient and difficult to crack can be obtained.
Of course, in order to decrypt the first encrypted data, the background server also needs to store a decryption key corresponding to the asymmetric encryption model in the background server, and decrypt the first encrypted data based on the decryption key and the decryption model corresponding to the asymmetric encryption model, so as to restore the current longitude and latitude information in a plaintext form, and convert the current longitude and latitude information in a data format so as to restore the current longitude and latitude information to obtain the front vehicle positioning information.
In order for the background server to decrypt the second encrypted data, a challenge sample recovery algorithm (such as a recovery algorithm at a CLEVER distance) corresponding to the challenge neural network needs to be stored in the background server, and the process of recovering the first encrypted data from the second encrypted data is specifically as follows:
the first step is to acquire the first encrypted data and the second encrypted data corresponding to a certain stored system time from a background server;
encrypting the first encrypted data based on a symmetric encryption model in a background server to obtain current encrypted data, and comparing the current encrypted data with the second encrypted data to obtain a difference comparison result;
the third step is to input the difference comparison result to an countermeasure sample recovery algorithm to obtain sample recovery data;
And the fourth step is to compare whether the sample recovery data is the same as the current encrypted data or not, if so, the recovery is successful, and one of the difference comparison result or the current encrypted data is used as the first encrypted data recovered by the second encrypted data instead of the first encrypted data stored by the background server.
In an embodiment, as a second specific embodiment of the second encryption unit 130, the second encryption unit 130 is specifically configured to:
acquiring an isomorphic encryption model corresponding to the second preset encryption algorithm;
and encrypting the current vehicle collected data based on the homomorphic encryption model and the encryption key to obtain the second encrypted data.
In the present embodiment, the difference from the first specific embodiment of the second encryption unit 130 is that the expandable availability of the second encrypted data is sufficiently taken into consideration. The method adopts the full homomorphic encryption model to encrypt the current vehicle collected data, and fully utilizes the encryption result in the form of ciphertext after full homomorphic encryption to still participate in various operations, so as to obtain the same result as the result directly participating in the operations in the form of plaintext. In the background server, an isohomomorphic encryption model corresponding to a second preset encryption algorithm is stored, and then the isomorphic encryption model corresponding to the second preset encryption algorithm is directly stored. Therefore, the second encrypted data with extremely high security coefficient and capable of participating in ciphertext calculation to safely expand the application can be obtained based on the encryption process.
For example, the background server also stores a data processing model for performing operation on the second encrypted data, and in this case, the second encrypted data is not required to be restored to plaintext to obtain the driving speed, the remaining electric energy, the driving mileage, the operating parameters of the vehicle equipment, and the like, but the second encrypted data is directly input into the data processing model to perform operation to obtain the processing result.
In one embodiment, the smart traffic message encryption transmission apparatus 100 further comprises:
and the third encryption unit is used for encrypting the current vehicle collected data based on a third preset encryption algorithm to obtain third encrypted data if the current vehicle positioning information meets the second preset condition, and storing the third encrypted data into a local first private storage space.
The second preset condition comprises a plurality of traffic forbidden and communication areas.
In this embodiment, when the intelligent automobile determines that the current vehicle positioning information meets the second preset condition, it indicates that the user may drive the intelligent automobile to a certain traffic prohibition and communication area, and at this moment, a vehicle data uploading instruction is generated in the intelligent automobile and a data uploading requirement is triggered. In order to more quickly check whether the current vehicle collected data can be uploaded to the background server at this time, it is required to determine whether the positioning position corresponding to the current vehicle positioning information belongs to one of the traffic-forbidden and communication areas in the second preset condition. If the positioning position corresponding to the current vehicle positioning information belongs to one of the traffic-forbidden and communication areas in the second preset condition, the current vehicle acquisition data cannot be uploaded to the background server. At this time, the current vehicle collected data may be encrypted based on a third preset encryption algorithm (such as an asymmetric encryption algorithm) local to the intelligent vehicle, so as to obtain third encrypted data, and the third encrypted data is stored in a local first private storage space. This third encrypted data may be automatically purged from the first private storage space after a predetermined data retention time (e.g., 30 days) is stored in the first private storage space. Therefore, the current vehicle acquired data which can be obtained by the intelligent vehicle in the traffic forbidden and communication area through the mode can not be uploaded to a background server, but is stored locally in a private mode. Meanwhile, the first encrypted data of the same intelligent automobile and the same system time corresponding to the current vehicle collected data cannot be uploaded to the background server, and the first encrypted data is stored in the first private storage space and can be cleared periodically (the clearing process can refer to the clearing process of the third encrypted data in the first private storage space).
In one embodiment, the smart transportation message encryption transmission apparatus 100 further includes:
and the data periodic clearing unit is used for deleting the local current system time, the first encrypted data and the second encrypted data if the time interval between the latest system time and the current system time exceeds the preset encrypted data storage time.
In this embodiment, the smart car in the second encryption unit 130 sends the current system time, the first encrypted data and the second encrypted data to the background server to upload to the background server for storage and subsequent data application, and meanwhile, the smart car can store the current system time, the first encrypted data and the second encrypted data locally. In order to realize regular cleaning of data in the intelligent automobile, if it is determined that the time interval between the latest system time and the current system time exceeds the preset encrypted data storage time in the intelligent automobile, deleting the local current system time, the first encrypted data and the second encrypted data.
In one embodiment, the smart transportation message encryption transmission apparatus 100 further includes:
And the data binding unit is used for acquiring intelligent automobile user identity information corresponding to the current vehicle acquisition data and the current vehicle positioning information, and establishing a binding relationship with the current system time, the current vehicle acquisition data and the current vehicle positioning information.
In this embodiment, after acquiring the current vehicle acquisition data and the current vehicle positioning information of a certain intelligent vehicle, in order to make the background server know which intelligent vehicle is the data uploaded by, it is necessary to acquire the user identity information of the intelligent vehicle (for example, the identity information of the login user corresponding to the vehicle machine system of the intelligent vehicle) first, and then establish a binding relationship between the user identity information of the intelligent vehicle and the current system time, the current vehicle acquisition data and the current vehicle positioning information. And then, the intelligent automobile user identity information and the first encrypted data and the second encrypted data which are obtained by the intelligent automobile corresponding to the current system time are also in a binding relation, and the background server can more quickly determine the intelligent automobile for uploading the first encrypted data and the second encrypted data.
Therefore, the embodiment of the device can encrypt the current vehicle positioning information acquired by the intelligent automobile once and then encrypt the current vehicle acquisition data for the second time, so that the first encrypted data and the second encrypted data which are higher in data security and difficult to crack are obtained and uploaded to the background server.
The intelligent traffic message encryption transmission apparatus described above may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 7.
Referring to fig. 7, fig. 7 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer equipment integrates any intelligent traffic message encryption transmission device provided by the embodiment of the invention.
With reference to fig. 7, the computer device includes a processor 402, a memory, and a network interface 405, which are connected by a system bus 401, wherein the memory may include a storage medium 403 and an internal memory 404.
The storage medium 403 may store an operating system 4031 and a computer program 4032. The computer program 4032 includes program instructions that, when executed, cause the processor 402 to perform a method of intelligent traffic message encryption transmission.
The processor 402 is used to provide computing and control capabilities to support the operation of the overall computer device.
The internal memory 404 provides an environment for the execution of the computer program 4032 in the storage medium 403, which computer program 4032, when executed by the processor 402, causes the processor 402 to perform the intelligent traffic message encryption transmission method described above.
The network interface 405 is used for network communication with other devices. It will be appreciated by those skilled in the art that the structure shown in FIG. 7 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
The processor 402 is configured to execute the computer program 4032 stored in the memory to implement the intelligent traffic message encryption transmission method as described above.
It should be appreciated that in embodiments of the present invention, the processor 402 may be a central processing unit (Central Processing Unit, CPU), the processor 402 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSPs), application specific integrated circuits (Application Specific Integrated Circuit, ASICs), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those skilled in the art will appreciate that all or part of the flow in a method embodying the above described embodiments may be accomplished by computer programs instructing the relevant hardware. The computer program comprises program instructions, and the computer program can be stored in a storage medium, which is a computer readable storage medium. The program instructions are executed by at least one processor in the computer system to implement the flow steps of the embodiments of the method described above.
Accordingly, the present invention also provides a computer-readable storage medium. The computer readable storage medium stores a computer program, wherein the computer program includes program instructions. The program instructions, when executed by the processor, cause the processor to perform the intelligent transportation message encryption transmission method as described above.
The storage medium may be a U-disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk, or other various computer-readable storage media that can store program codes.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the several embodiments provided by the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs. The units in the device of the embodiment of the invention can be combined, divided and deleted according to actual needs. In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The integrated unit may be stored in a storage medium if implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention is essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a terminal, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (10)

1. An intelligent traffic message encryption transmission method is applied to an intelligent automobile and is characterized by comprising the following steps:
responding to a vehicle data uploading instruction, and acquiring current system time, current vehicle acquisition data and current vehicle positioning information;
if the current vehicle positioning information is determined to meet the first preset condition, encrypting the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data; the first preset condition comprises a plurality of allowed passing areas;
and encrypting the current vehicle collected data based on a second preset encryption algorithm by taking the first encrypted data as an encryption key to obtain second encrypted data, and sending the current system time, the first encrypted data and the second encrypted data to a background server.
2. The method of claim 1, wherein after the step of acquiring the current system time, the current vehicle acquisition data, and the current vehicle positioning information in response to the vehicle data upload instruction, the method further comprises:
if the current vehicle positioning information meets the second preset condition, encrypting the current vehicle collected data based on a third preset encryption algorithm to obtain third encrypted data, and storing the third encrypted data into a local first private storage space; the second preset condition comprises a plurality of traffic forbidden and communication areas.
3. The method of claim 1, wherein encrypting the current vehicle positioning information based on a first predetermined encryption algorithm to obtain first encrypted data comprises:
acquiring an asymmetric encryption model corresponding to the first preset encryption algorithm;
acquiring current longitude and latitude information corresponding to the current vehicle positioning information;
and encrypting the current longitude and latitude information based on the asymmetric encryption model to obtain the first encrypted data.
4. The method of claim 3, wherein encrypting the current vehicle acquisition data with the first encryption data as an encryption key and based on a second predetermined encryption algorithm to obtain second encryption data comprises:
Obtaining a symmetrical encryption model and an antagonistic neural network corresponding to the second preset encryption algorithm;
encrypting the current vehicle collected data by taking the first encrypted data as an encryption key and using the symmetric encryption model to obtain a current collected data encryption result;
calculating by taking the first encrypted data as the input of the antagonistic neural network to obtain a first network output result;
and connecting the current acquired data encryption result with the first network output result to form the second encrypted data.
5. The method of claim 3, wherein encrypting the current vehicle acquisition data with the first encryption data as an encryption key and based on a second predetermined encryption algorithm to obtain second encryption data comprises:
acquiring an isomorphic encryption model corresponding to the second preset encryption algorithm;
and encrypting the current vehicle collected data based on the homomorphic encryption model and the encryption key to obtain the second encrypted data.
6. The method according to claim 1, wherein after the step of encrypting the current vehicle collected data with the first encrypted data as an encryption key and based on a second preset encryption algorithm to obtain second encrypted data, and transmitting the current system time, the first encrypted data, and the second encrypted data to a background server, the method further comprises:
If the time interval between the latest system time and the current system time exceeds the preset encrypted data storage time, deleting the local current system time, the first encrypted data and the second encrypted data.
7. The method of claim 1, wherein after the step of obtaining the current system time, the current vehicle acquisition data, and the current vehicle positioning information, the method further comprises:
and acquiring intelligent automobile user identity information corresponding to the current vehicle acquisition data and the current vehicle positioning information, and establishing a binding relationship with the current system time, the current vehicle acquisition data and the current vehicle positioning information.
8. An intelligent traffic message encryption transmission device is configured in an intelligent automobile and is characterized by comprising:
the data acquisition unit is used for responding to the vehicle data uploading instruction and acquiring the current system time, the current vehicle acquisition data and the current vehicle positioning information;
the first encryption unit is used for encrypting the current vehicle positioning information based on a first preset encryption algorithm to obtain first encrypted data if the current vehicle positioning information is determined to meet a first preset condition; the first preset condition comprises a plurality of allowed passing areas;
The second encryption unit is used for encrypting the current vehicle collected data based on a second preset encryption algorithm by taking the first encrypted data as an encryption key to obtain second encrypted data, and sending the current system time, the first encrypted data and the second encrypted data to a background server.
9. A computer device, characterized in that it comprises a memory and a processor, the memory having stored thereon a computer program, the processor implementing the intelligent traffic message encryption transmission method according to any one of claims 1-7 when executing the computer program.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, can implement the intelligent traffic message encryption transmission method according to any one of claims 1-7.
CN202410035734.7A 2024-01-10 2024-01-10 Intelligent traffic message encryption transmission method, device, equipment and storage medium Active CN117560227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410035734.7A CN117560227B (en) 2024-01-10 2024-01-10 Intelligent traffic message encryption transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410035734.7A CN117560227B (en) 2024-01-10 2024-01-10 Intelligent traffic message encryption transmission method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117560227A true CN117560227A (en) 2024-02-13
CN117560227B CN117560227B (en) 2024-04-09

Family

ID=89815023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410035734.7A Active CN117560227B (en) 2024-01-10 2024-01-10 Intelligent traffic message encryption transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117560227B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008228051A (en) * 2007-03-14 2008-09-25 Toyota Infotechnology Center Co Ltd Encode communication system, encode communication method, encode communication program, in-vehicle terminal and server
US20170156054A1 (en) * 2015-11-30 2017-06-01 Beijing Zhigu Rui Tuo Tech Co., Ltd. Information processing method and device
CN109447292A (en) * 2018-12-11 2019-03-08 江苏常发农业装备股份有限公司 A kind of vehicle supervision device and method
CN109831272A (en) * 2019-02-11 2019-05-31 杭州乾博科技有限公司 A kind of selective communication screen method and system based on the position MS
CN113259401A (en) * 2021-07-15 2021-08-13 国汽智控(北京)科技有限公司 Vehicle data control method, device, equipment and storage medium
CN113254947A (en) * 2020-02-13 2021-08-13 宁波吉利汽车研究开发有限公司 Vehicle data protection method, system, equipment and storage medium
CN115470533A (en) * 2022-09-14 2022-12-13 重庆长安汽车股份有限公司 Storage method and device of vehicle sensitive data, electronic equipment and storage medium
CN116434373A (en) * 2022-12-26 2023-07-14 浙江安吉智电控股有限公司 Method, device, system and component for processing vehicle monitoring data

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008228051A (en) * 2007-03-14 2008-09-25 Toyota Infotechnology Center Co Ltd Encode communication system, encode communication method, encode communication program, in-vehicle terminal and server
US20170156054A1 (en) * 2015-11-30 2017-06-01 Beijing Zhigu Rui Tuo Tech Co., Ltd. Information processing method and device
CN109447292A (en) * 2018-12-11 2019-03-08 江苏常发农业装备股份有限公司 A kind of vehicle supervision device and method
CN109831272A (en) * 2019-02-11 2019-05-31 杭州乾博科技有限公司 A kind of selective communication screen method and system based on the position MS
CN113254947A (en) * 2020-02-13 2021-08-13 宁波吉利汽车研究开发有限公司 Vehicle data protection method, system, equipment and storage medium
CN113259401A (en) * 2021-07-15 2021-08-13 国汽智控(北京)科技有限公司 Vehicle data control method, device, equipment and storage medium
CN115470533A (en) * 2022-09-14 2022-12-13 重庆长安汽车股份有限公司 Storage method and device of vehicle sensitive data, electronic equipment and storage medium
CN116434373A (en) * 2022-12-26 2023-07-14 浙江安吉智电控股有限公司 Method, device, system and component for processing vehicle monitoring data

Also Published As

Publication number Publication date
CN117560227B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
US10728229B2 (en) Method and device for communicating securely between T-box device and ECU device in internet of vehicles system
US11228438B2 (en) Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
EP2856695B1 (en) A method and system for transferring firmware or software to a plurality of devices
CN111770017B (en) Power distribution Internet of things cluster management system and method based on trusted block chain
EP3429158A1 (en) Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle
CN116913071A (en) Automatic driving vehicle formation method based on vehicle Lu Yun cooperation
EP4080818A1 (en) Communication method and device, ecu, vehicle and storage medium
DE102021133346A1 (en) SESSION KEY GENERATION FOR AN OPERATION OF AUTONOMOUS VEHICLES
CN117560227B (en) Intelligent traffic message encryption transmission method, device, equipment and storage medium
TW202018591A (en) Verification system, verification method and non-transitory computer readable storage medium
Zhou et al. EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs
CN113545022A (en) Data processing method, data encryption method, data decryption method, data encryption equipment, data decryption equipment and storage medium
CN111064736A (en) Data transmission method and equipment
CN114362997B (en) Data transmission method and device for intelligent equipment of transformer substation, intelligent equipment and medium
US20190305939A1 (en) Vehicle communication system and vehicle communication method
Gupta et al. An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles
CN114978688A (en) Method and device for data transmission, router and Internet of things equipment
DE102021133367A1 (en) SESSION KEY GENERATION FOR AN OPERATION OF AUTONOMOUS VEHICLES
Biron A resilient control approach to secure cyber physical systems (CPS) with an application on connected vehicles
Yang et al. A robust CACC scheme against cyberattacks via multiple vehicle-to-vehicle networks
CN114499958A (en) Control method and device, vehicle and storage medium
Kathiresh et al. Vehicle diagnostics over internet protocol and over-the-air updates
CN117294437B (en) Communication encryption and decryption method and device, terminal equipment and storage medium
CN114501343B (en) Multi-node scanning implementation method, system, electronic equipment and storage medium
CN112740726B (en) Data transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant