WO2019205857A1 - 诊断设备及诊断设备的安全访问方法 - Google Patents

诊断设备及诊断设备的安全访问方法 Download PDF

Info

Publication number
WO2019205857A1
WO2019205857A1 PCT/CN2019/079516 CN2019079516W WO2019205857A1 WO 2019205857 A1 WO2019205857 A1 WO 2019205857A1 CN 2019079516 W CN2019079516 W CN 2019079516W WO 2019205857 A1 WO2019205857 A1 WO 2019205857A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption unit
authentication
factory information
controller
diagnostic device
Prior art date
Application number
PCT/CN2019/079516
Other languages
English (en)
French (fr)
Inventor
瞿松松
罗青华
蔡雪峰
Original Assignee
深圳市道通科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市道通科技股份有限公司 filed Critical 深圳市道通科技股份有限公司
Publication of WO2019205857A1 publication Critical patent/WO2019205857A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Definitions

  • the present application relates to the field of secure access technologies, and in particular, to a secure access method for a diagnostic device and a diagnostic device.
  • the core components of the diagnostic device include an MCU (Micro Control Unit), a memory, and a key authentication chip, wherein the key is stored in the MCU.
  • MCU Micro Control Unit
  • the key is stored in the MCU.
  • the existing diagnostic equipment cannot guarantee its security, and important information therein is easily stolen.
  • the embodiment of the invention provides a method for securely accessing a diagnostic device and a diagnostic device, so as to solve the problem that the existing diagnostic device cannot guarantee its security and the important information therein is easily stolen.
  • an embodiment of the present invention provides a diagnostic device, including: a controller, and a first encryption unit and a second encryption unit respectively connected to the controller, where the first encryption unit includes a first identity authentication key. And a first security algorithm, the second encryption unit includes a second identity authentication key and a second security algorithm;
  • the controller is configured to control the first encryption unit to generate a first authentication value according to the first identity authentication key and the first security algorithm, and control the second encryption unit to control the second identity according to the second identity
  • the authentication key and the second security algorithm generate a second authentication value, and when the first authentication value and the second authentication value match, determine that the security authentication is successful.
  • an embodiment of the present invention provides a method for securely accessing a diagnostic device, where the method is applicable to a controller in a diagnostic device, and the method includes:
  • the controller is configured to send a first authentication instruction to the first encryption unit and the second encryption unit, where the first encryption unit is configured to generate the first authentication according to the first identity authentication key and the first security algorithm. a value, the first authentication value is sent to the controller; the second encryption unit is configured to generate a second authentication value according to the second identity authentication key and the second security algorithm, and send the second authentication value to the controller; Whether the authentication value matches the second authentication value.
  • the security authentication is determined to be successful.
  • the security authentication fails. Avoiding theft of diagnostic logic in the controller, or stealing critical data in the memory, etc., thereby improving the security accessibility to the diagnostic device.
  • FIG. 1 is a schematic structural diagram of a diagnostic device according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic structural diagram of a diagnostic device according to Embodiment 2 of the present invention.
  • FIG. 3 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 1 of the present invention
  • FIG. 4 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 2 of the present invention.
  • FIG. 5 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 3 of the present invention.
  • FIG. 6 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 4 of the present invention.
  • FIG. 7 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 1 of the present invention.
  • FIG. 8 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 2 of the present invention.
  • FIG. 9 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 1 of the present invention.
  • FIG. 10 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 2 of the present invention.
  • FIG. 11 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 3 of the present invention.
  • FIG. 12 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 4 of the present invention.
  • the diagnostic device provided by the embodiment of the present invention sets the first encryption unit and the second encryption unit, and saves the identity authentication key in the first encryption unit and the second encryption unit, respectively, and the controller itself does not store the identity authentication key.
  • the first encryption unit and the second encryption unit with high security perform identity verification, and the identity authentication key is more secure, which can greatly improve product security.
  • FIG. 1 is a schematic structural diagram of a diagnostic device according to Embodiment 1 of the present invention.
  • the diagnostic apparatus of this embodiment includes: a controller 10, a first encryption unit 20, and a second encryption unit 30, and the first encryption unit 20 and the second encryption unit 30 respectively perform the control.
  • the device 10 is connected.
  • the first encryption unit 20 stores a first identity authentication key and a first security algorithm
  • the second encryption unit 30 stores a second identity authentication key and a second security algorithm.
  • the controller 10 is configured to control the first encryption unit 20 to generate a first authentication value according to the first identity authentication key and the first security algorithm, and control the second encryption unit 30 to perform the The second identity authentication key and the second security algorithm generate a second authentication value, and when the first authentication value and the second authentication value match, determine that the security authentication is successful.
  • the controller 10 of the present embodiment can generate random values, such as generating a random value upon receiving the power-on signal, and the random values generated each time the identity authentication process is generated are not the same.
  • the first encryption unit 20 stores a preset identity authentication key (ie, a first identity authentication key) and a preset first security algorithm, and the first security algorithm may be SHA-256, SHA-0, SHA- 1. Security algorithms such as SHA-512.
  • the second encryption unit 30 stores a preset identity authentication key (ie, a second identity authentication key) and a preset second security algorithm, and the second security algorithm may also be SHA-256, SHA-0, and SHA. -1, SHA-512 and other security algorithms.
  • a preset identity authentication key ie, a second identity authentication key
  • the second security algorithm may also be SHA-256, SHA-0, and SHA. -1, SHA-512 and other security algorithms.
  • the security algorithms set in the first encryption unit 20 and the second encryption unit 30 in the same diagnostic device are the same, that is, the first security algorithm and the second security algorithm are the same.
  • the controller 10 when identity authentication is required, for example, when the diagnostic device is powered on, the controller 10 generates a random value, and the random value is a randomly generated value (for example, a random number of 4 bytes), and the random value is respectively
  • the first encryption unit 20 and the second encryption unit 30 are sent.
  • the connection between the controller 10 and the first encryption unit 20 and the second encryption unit 30 may be a wired connection, that is, a direct connection communication through a data line.
  • the connection between the controller 10 and the first encryption unit 20 and the second encryption unit 30 may also be a wireless connection, for example, by way of WIFI, Bluetooth, infrared, or the like.
  • the first encryption unit 20 After receiving the random value, the first encryption unit 20 generates a first authentication value according to the first identity authentication key, the random value, and the first security algorithm saved by itself, and the first authentication value may be a string of numbers or a string. character. Next, the first encryption unit 20 transmits the generated first authentication value to the controller 10. It should be noted that, according to the first identity authentication key and the first security algorithm, the process of generating the first authentication value is the same as the existing method, and details are not described herein again.
  • the second encryption unit 30 After receiving the random value, the second encryption unit 30 generates a second authentication value according to the second identity authentication key and the second security algorithm saved by itself, and the second authentication value may also be a string of numbers or one. String character. Next, the second encryption unit 30 transmits the generated second authentication value to the controller 10. It should be noted that, according to the second identity authentication key and the second security algorithm, the process of generating the second authentication value is the same as the existing method, and details are not described herein again.
  • the controller 10 After receiving the first authentication value sent by the first encryption unit 20 and the second authentication value sent by the second encryption unit 30, the controller 10 determines whether the first authentication value and the second authentication value match. When it is determined that the first authentication value matches the second authentication value, it may be determined that the security authentication is successful, and the user can securely access the diagnostic device. When it is determined that the first authentication value does not match the second authentication value, it is determined that the security authentication fails, the related program in the controller 10 is locked, and the user is not allowed to access the diagnostic device, thereby avoiding stealing the diagnostic logic in the controller 10. Or steal critical data in the memory, etc., to achieve secure access to the diagnostic device.
  • the first authentication value generated by the first encryption unit 20 is The second authentication value generated by the second encryption unit 30 is the same. At this time, it is determined whether the first authentication value and the second authentication value match, and specifically whether the first authentication value and the second authentication value are the same. When the first authentication value is the same as the second authentication value, it is determined that the identity authentication is passed. When the first authentication value is different from the second authentication value, it is determined that the identity authentication fails.
  • the first encryption unit 20 and the second encryption unit 30 of the present embodiment are chips or single-chip microcomputers having an encryption function.
  • the first encryption unit 20 of the embodiment is an encryption chip
  • the second encryption unit 30 is an encryption single-chip unit.
  • the diagnostic device includes a controller, a first encryption unit, and a second encryption unit.
  • the first encryption unit and the second encryption unit are respectively connected to the controller; wherein the controller is configured to respectively perform the first encryption unit and the first encryption unit.
  • the second encryption unit sends a first authentication command, and the first encryption unit is configured to generate a first authentication value according to the first identity authentication key and the first security algorithm, and send the first authentication value to the controller; Generating a second authentication value according to the second identity authentication key and the second security algorithm, and sending the second authentication value to the controller; the controller determining whether the first authentication value matches the second authentication value, when the first authentication value is When the authentication value is matched, the security authentication is determined to be successful. When the first authentication value does not match the second authentication, the security authentication fails, thereby avoiding stealing the diagnostic logic in the controller or stealing key data in the memory. Thereby improving the security accessibility to the diagnostic device.
  • the first embodiment needs to determine whether the first factory information and the second factory information match, and the specific process may be It is implemented in the following two ways:
  • the first possible implementation manner is that the first factory information of the diagnostic device is saved in the first encryption unit 20 or the second encryption unit 30, and the controller 10 stores the second factory information of the diagnostic device. .
  • the controller 10 is further configured to acquire the first factory information from the first encryption unit 20 or the second encryption unit 30, and use the first factory information and the second The factory information is matched.
  • the security authentication is determined to be successful.
  • the controller 10 after determining that the first authentication value generated by the first encryption unit 20 matches the second authentication value generated by the second encryption unit 30, the controller 10 further needs to determine the first factory information and the first Second, the factory information is matched. Specifically, the controller 10 acquires the first factory information from the first encryption unit 20 or the second encryption unit 30 that stores the first factory information, and then performs the first factory information with the second factory information saved by itself. Compare to judge the match between the two.
  • the controller 10 can determine that the security authentication is successful, and the user can securely access the diagnostic device. If the first authentication value does not match the second authentication value, or the first factory information and the second factory information do not match, it is determined that the security authentication fails, and the user cannot securely access the diagnostic device, thereby further improving the security of the diagnostic device. Accessibility.
  • the first factory information and the second factory information may include at least one of a factory date, a product model number, a factory serial number (identity ID), a company name, and the like.
  • the second possible implementation manner is that the first encryption unit 20 stores the first factory information, and the second encryption unit 30 stores the second factory information.
  • the controller 10 is further configured to acquire the first factory information from the first encryption unit 20, acquire the second factory information from the second encryption unit 30, and The first factory information is matched with the second factory information, and when the first authentication value matches the second authentication value, and the first factory information matches the second factory information, determining The safety certification was successful.
  • the controller 10 further needs to determine the first factory information and the first Second, the factory information is matched. Specifically, the controller 10 acquires the first factory information from the first encryption unit 20, and acquires the second factory information from the second encryption unit 30. Then, the first factory information is compared with the second factory information to determine the matching between the two.
  • the controller 10 determines that the security authentication is successful, and the user can securely access the diagnostic device. If the first authentication value does not match the second authentication value, or the first factory information and the second factory information do not match, it is determined that the security authentication is successful, and the user cannot access the diagnostic device securely, thereby further improving the secure access of the diagnostic device. Sex.
  • the controller 10 may first determine whether the first factory information and the second factory information match, and if the first factory information and the second factory information match, determine the first authentication value and the first Whether the two authentication values match. That is, the controller 10 first determines whether the first authentication value and the second authentication value match, or determines whether the first sequence of the first factory information and the second factory information match, and does not limit the specific order, and specifically determines according to actual needs. .
  • the matching of the first factory information with the second factory information may mean that the first factory information is the same as the information included in the second factory information, or the first factory information is the same as the key information in the second factory information.
  • the controller 10 not only determines the matching between the first authentication value and the second authentication value, but also determines the matching between the first factory information and the second factory information, when the first authentication value and the first When the two authentication values match, and the first factory information and the second factory information match, it is determined that the user can securely access the diagnostic device, thereby further improving the security accessibility of the diagnostic device.
  • FIG. 2 is a schematic structural diagram of a diagnostic device according to Embodiment 2 of the present invention. Based on the above embodiment, the diagnostic apparatus of the present embodiment further includes a memory 40 connected to the controller 10, in which the encrypted data is stored.
  • the data encryption algorithm is stored in the second encryption unit 30 of the embodiment.
  • an instruction is sent to the diagnostic device to indicate that the key data is acquired.
  • the diagnostic device typically encrypts and stores critical data to form encrypted data.
  • the controller 10 of the embodiment retrieves the encrypted data corresponding to the key data from the memory 40, and controls the second encryption unit 30 to perform the encrypted data using the data decryption algorithm. Decrypting, obtaining decrypted data, which can be understood as the key data required above.
  • the key data may be data required by the user or the vehicle, or may be data that the diagnostic device needs to call or process when the application is running.
  • the second encryption unit 30 decrypts the encrypted data according to the data decryption algorithm saved by itself, generates decrypted data, and transmits the decrypted information to the controller 10. .
  • the controller 10 sends the decrypted data to the car bus.
  • the controller 10 converts the decrypted data into identifiable data of the car bus according to a communication protocol with the car bus. a vehicle to cause the vehicle to perform a corresponding operation based on the decrypted data.
  • the diagnostic device of the embodiment encrypts the key data and stores it in the memory 40.
  • the key data needs to be decrypted by the second encryption unit 30. This separates the critical data from the controller 10, which increases the difficulty of cracking critical data, thereby improving the security of critical data.
  • the diagnostic apparatus of the present embodiment further includes a communication unit 50 that is coupled to the controller 10, the communication unit 50 for controlling the controller 10 and the vehicle Communicate
  • the controller 10 is further configured to send the decrypted data to the vehicle by using the communication unit.
  • the communication unit 50 of the embodiment may be a communication circuit, and the communication circuit may be a physical channel connecting the controller 10 and the car bus to complete data transmission of links such as CAN bus, K line, VPW/PWM.
  • the communication unit 50 of this embodiment may also be a wireless communication unit 50, such as a WIFI module, a Bluetooth module, or an infrared module.
  • a wireless communication unit 50 such as a WIFI module, a Bluetooth module, or an infrared module.
  • the diagnostic device of the present embodiment may further include a human-machine interaction unit 60 coupled to the controller 10.
  • the human-machine interaction unit 60 is configured to implement a display of the diagnostic device software function interface and related diagnostic results, and provide an operation method for the user to implement human-computer interaction.
  • the human-computer interaction unit 60 further includes an input device and an output device, wherein the output device may be a display screen or a printer, etc., and the input device may be a button, a sound recorder, a touch screen, or the like for the user to input an operation command to the human-machine interaction unit 60. s installation.
  • the diagnostic device of the embodiment further includes at least one communication interface 70, which may include, for example, a USB interface, a diagnostic interface, etc., wherein the USB interface can communicate with the PC to implement firmware upgrade and printing functions of the device, and the diagnostic interface. Can be connected to the car bus.
  • at least one communication interface 70 may include, for example, a USB interface, a diagnostic interface, etc., wherein the USB interface can communicate with the PC to implement firmware upgrade and printing functions of the device, and the diagnostic interface. Can be connected to the car bus.
  • the diagnostic device provided by the embodiment of the present invention includes a memory, the memory stores encrypted data, and the second encryption unit stores a data decryption algorithm.
  • the controller needs to retrieve the encrypted data from the memory, the controller controls the second encryption.
  • the unit decrypts the encrypted data using a data decryption algorithm to obtain decrypted data, and transmits the decrypted data to the vehicle through the communication unit. That is, the embodiment separates the key data from the controller, thereby improving the difficulty of cracking the key data, thereby improving the security of the key data.
  • FIG. 3 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 1 of the present invention.
  • the execution subject of this embodiment is the controller in the diagnostic device described in the above embodiment. As shown in FIG. 3, this embodiment may include:
  • the controller sends the first authentication instruction to the first encryption unit and the second encryption unit, respectively.
  • the diagnostic device of this embodiment includes a controller, a first encryption unit, and a second encryption unit, and the first encryption unit and the second encryption unit are respectively connected to the controller.
  • the controller detects the power-on signal, and at this time, the controller generates a random value. And sending the random value to the first encryption unit and the second encryption unit in the diagnostic device, so that the first encryption unit generates the first authentication value according to the first identity authentication key and the first security algorithm, The second encryption unit generates a second authentication value according to the second identity authentication key and the second security algorithm.
  • the first encryption unit After the controller sends the first authentication command to the first encryption unit, the first encryption unit generates the first authentication value according to the first authentication instruction and the first identity authentication key and the first security algorithm saved by itself. The controller acquires the first authentication value from the first encryption unit.
  • the second encryption unit After the controller sends the first authentication command to the second encryption unit, the second encryption unit generates a second authentication value according to the first authentication command and the second identity authentication key and the second security algorithm saved by itself. The controller acquires the second authentication value from the second encryption unit.
  • the controller determines whether the first authentication value and the second authentication value match.
  • the controller determines whether the first authentication value and the second authentication value match. When it is determined that the first authentication value matches the second authentication value, it is determined that the security authentication is successful, and the user can securely access the diagnostic device. When it is determined that the first authentication value does not match the second authentication value, the security authentication failure may be determined.
  • the diagnostic device cannot be used by the user to lock up the diagnostics in the controller, thereby improving the security accessibility of the diagnostic device.
  • the controller sends the first authentication instruction to the first encryption unit and the second encryption unit, and obtains the first authentication value generated by the first encryption unit, and acquires the second encryption.
  • the second authentication value generated by the unit and determining whether the first authentication value matches the second authentication value; if yes, determining that the security authentication is successful, thereby improving the security accessibility of the diagnostic device.
  • FIG. 4 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 2 of the present invention.
  • the first encryption unit or the second encryption unit of the embodiment stores the first factory information of the diagnostic device
  • the controller stores the second factory information of the diagnostic device.
  • the method in this embodiment may include:
  • the controller sends a first request instruction to the first encryption unit or the second encryption unit that stores the first factory information.
  • the first request instruction is used to request to acquire the first factory information.
  • the controller receives the first response information sent by the first encryption unit or the second encryption unit.
  • the first response information carries the first factory information.
  • the controller determines whether the first factory information matches the pre-stored second factory information.
  • the controller determines that the security authentication succeeds if the first factory information matches the second factory information, and the first authentication value matches the second authentication value.
  • the first embodiment needs to determine whether the first factory information and the second factory information match.
  • the controller sends the information to the first encryption unit or the second encryption unit.
  • the first request instruction is to obtain the first factory information.
  • the controller sends a first request instruction to the first encryption unit, and the first encryption unit carries the saved first factory information according to the first request instruction.
  • the first response message is sent to the controller.
  • the controller sends a first request instruction to the second encryption unit, and the second encryption unit carries the saved first factory information in the first response according to the first request instruction.
  • the information is sent to the controller.
  • the controller determines that the first factory information is matched with the second factory information.
  • S203 can be executed after S103, that is, when S103 determines that the first authentication value matches the second authentication value, S203 is performed.
  • S203 may be performed before S103, that is, when S203 determines that the first factory information is matched with the second factory information, S103 is executed, which is not limited in this embodiment.
  • the first request instruction in the foregoing S201 may be carried in the first authentication instruction in S101.
  • the method for securely accessing the diagnostic device provided by the embodiment of the present invention, when the first factory information of the diagnostic device is stored in the first encryption unit or the second encryption unit, and the second factory information of the diagnostic device is saved in the controller, then the control is performed. Transmitting the first request instruction to the first encryption unit or the second encryption unit; and receiving the first response information sent by the first encryption unit or the second encryption unit; and then determining whether the first factory information and the second factory information match; When the first factory information matches the second factory information, and the first authentication value matches the second authentication value, the security authentication is determined to be successful, and the access security of the diagnostic device is further improved.
  • FIG. 5 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 3 of the present invention.
  • the embodiment is The methods can include:
  • the controller sends a first request instruction to the first encryption unit, and sends a second request instruction to the second encryption unit.
  • the first request instruction is used to request to acquire first factory information
  • the second request instruction is used to request to acquire second factory information
  • the controller receives the first response information sent by the first encryption unit, and receives the second response information sent by the second encryption unit.
  • the first response information carries the first factory information
  • the second response information carries the second factory information.
  • S303 can be executed after S103, that is, when S103 determines that the first authentication value matches the second authentication value, S303 is performed.
  • S303 may be performed before S103, that is, when S304 determines that the first factory information matches the second factory information, S103 is executed, which is not limited in this embodiment.
  • the first request instruction and the second request instruction in the foregoing S301 may be carried in the first authentication instruction in S101.
  • the method for securely accessing the diagnostic device when the first encryption unit stores the first factory information of the diagnostic device, and the second encryption unit stores the second factory information, the controller sends the first encryption unit to the first encryption unit. Sending a first request instruction, sending a second request instruction to the second encryption unit; receiving the first response information sent by the first encryption unit, receiving the second response information sent by the second encryption unit; and then determining the first factory information and the first If the first factory information matches the second factory information, and the first authentication value matches the second authentication value, the security authentication is determined to be successful, and the access security of the diagnostic device is further improved.
  • FIG. 6 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 4 of the present invention.
  • the method in this embodiment may further include:
  • the controller retrieves the encrypted data from the memory.
  • the diagnostic apparatus of this embodiment further includes a memory in which encrypted data is stored.
  • the controller can extract encrypted data from the memory, for example, the controller receives a user command for instructing transmission of critical data to the car bus, at which point the controller can retrieve the encrypted data from the memory.
  • the controller sends the encrypted data to the second encryption unit.
  • the controller receives the decrypted data sent by the second encryption unit, and sends the decrypted data to the vehicle.
  • the data encryption algorithm is stored in the second encryption unit, and the controller sends the encrypted data to the second encryption unit.
  • the second encryption unit decrypts the encrypted data to generate decrypted data.
  • the controller then transmits the decrypted data to the vehicle.
  • the controller acquires the encrypted data from the memory; then, sends the encrypted data to the second encryption unit, and receives the second encryption unit to decrypt the encrypted data to generate the decrypted data. And then receiving the decrypted data sent by the second encryption unit and transmitting the decrypted data to the vehicle. That is, the embodiment separates the key data from the controller, thereby improving the difficulty of cracking the key data, thereby improving the security of the key data.
  • FIG. 7 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 1 of the present invention.
  • the execution body of this embodiment is the first encryption unit in the diagnostic device described in the above embodiment.
  • the method in this embodiment may include:
  • the first encryption unit receives the first authentication instruction sent by the controller.
  • the first encryption unit generates a first authentication value according to the first identity authentication key and the first security algorithm.
  • the first encryption unit sends the first authentication value to the controller.
  • the diagnostic apparatus of this embodiment includes a processor, a first encryption unit and a second encryption unit, wherein the first encryption unit and the second encryption unit are respectively connected to the controller.
  • the controller when identity authentication is required, sends a first authentication instruction to the first encryption unit.
  • the first encryption unit performs an operation to generate a first authentication value according to the random value and the previously saved first identity authentication key and the first security algorithm.
  • the generated first authentication value is sent to the controller to enable the controller to perform identity authentication.
  • the first encryption unit stores an identity authentication key, so that the first encryption unit performs body authentication to generate a first authentication value, and the controller does not store the identity authentication key.
  • the authentication key is made more secure, which improves the access security of the diagnostic device.
  • FIG. 8 is a schematic flowchart of a method for securely accessing a diagnostic device according to Embodiment 2 of the present invention.
  • the method in this embodiment may include:
  • the first encryption unit receives the first request instruction sent by the controller.
  • the first request instruction is used to request to acquire the first factory information.
  • the first encryption unit sends the first response information to the controller according to the first request instruction.
  • the first response information carries the first factory information.
  • the controller in order to further improve the security accessibility of the diagnostic device, it is also required to determine the factory information of the diagnostic device.
  • the first encryption unit stores the first factory information of the diagnostic device
  • the controller sends the first request information to the first encryption unit to obtain the first factory information.
  • the first encryption unit After receiving the first request information, the first encryption unit carries the first factory information in the first response information and sends the signal to the controller, so that the controller determines the access security of the diagnostic device according to the first factory information.
  • FIG. 9 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 1 of the present invention.
  • the execution body of this embodiment is the second encryption unit in the diagnostic device described in the above embodiment.
  • the method in this embodiment may include:
  • the second encryption unit receives the first authentication instruction sent by the controller.
  • the second encryption unit generates a second authentication value according to the second identity authentication key and the second security algorithm.
  • the second encryption unit sends the second authentication value to the controller.
  • the diagnostic apparatus of this embodiment includes a processor, a first encryption unit and a second encryption unit, wherein the first encryption unit and the second encryption unit are respectively connected to the controller.
  • the controller when the identity authentication is required, the controller sends a first authentication command to the second encryption unit, where the first authentication command carries a random value generated by the controller.
  • the second encryption unit performs an operation to generate a second authentication value according to the previously saved second identity authentication key and the second security algorithm.
  • the generated second authentication value is sent to the controller to enable the controller to perform identity authentication.
  • the second encryption unit stores an identity authentication key, so that the second encryption unit performs body authentication to generate a second authentication value, and the controller does not store the identity authentication key.
  • the authentication key is made more secure, which improves the access security of the diagnostic device.
  • FIG. 10 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 2 of the present invention.
  • the method in this embodiment may include:
  • the second encryption unit receives the first request instruction sent by the controller.
  • the first request instruction is used to request to acquire the first factory information.
  • the second encryption unit sends the first response information to the controller according to the first request instruction.
  • the first response information carries the first factory information.
  • the controller in order to further improve the security accessibility of the diagnostic device, it is also required to determine the factory information of the diagnostic device.
  • the second encryption unit stores the first factory information of the diagnostic device
  • the controller sends the first request information to the second encryption unit to obtain the first factory information.
  • the second encryption unit After receiving the first request information, the second encryption unit carries the first factory information in the first response information and sends the signal to the controller, so that the controller determines the access security of the diagnostic device according to the first factory information.
  • FIG. 11 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 3 of the present invention.
  • the method in this embodiment may include:
  • the second encryption unit receives the second request instruction sent by the controller.
  • the second request instruction is used to request to acquire the second factory information
  • the second encryption unit sends the second response information to the controller according to the second request instruction, where the second response information carries the second factory information.
  • the controller sends a second request to the second encryption unit.
  • the second encryption unit After receiving the second request command, the second encryption unit carries the second factory information in the second response message and sends the message to the controller, so that the controller performs the security judgment of the diagnostic device according to the second factory information, thereby further improving Diagnose the safety of the device.
  • FIG. 12 is a schematic flowchart diagram of a method for securely accessing a diagnostic device according to Embodiment 4 of the present invention.
  • the method in this embodiment may include:
  • the second encryption unit receives the encrypted data sent by the controller.
  • the second encryption unit decrypts the encrypted data according to a data decryption algorithm to obtain decrypted data.
  • the second encryption unit sends the decrypted data to the controller.
  • the encryption and decryption algorithm when the encryption and decryption algorithm is stored in the second encryption unit, after the controller receives the user instruction and reads the encrypted data from the memory, the data decryption data is sent to the first encryption unit. . After receiving the encrypted data, the second encryption unit decrypts the encrypted data according to the saved data decryption algorithm to generate decrypted data. Then, the second encryption unit sends the decrypted data to the controller, so that the controller sends the decrypted data to the vehicle, thereby implementing interaction with the vehicle, and improving the preservation security of the key data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Selective Calling Equipment (AREA)

Abstract

本发明实施例公开了一种诊断设备及诊断设备的安全访问方法,该诊断设备包括:包括:控制器,第一加密单元和第二加密单元,第一加密单元包括第一身份认证密钥和第一安全算法,第二加密单元包括第二身份认证密钥和第二安全算法;控制器,用于控制第一加密单元生成第一认证值,控制第二加密单元生成第二认证值,并在第一认证值和第二认证值匹配时,确定安全认证成功,进而避免窃取控制器中的诊断逻辑,或窃取存储器中的关键数据等,从而提高了对诊断设备的安全访问性。同时,存储器保存关键数据的加密信息,第二加密单元中保持有加解密算法,将关键数据分离放置,进而提高了关键数据的安全性。

Description

诊断设备及诊断设备的安全访问方法
本申请要求于2018年4月25日提交中国专利局、申请号为201810377992.8、申请名称为“诊断设备及诊断设备的安全访问方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及安全访问技术领域,尤其涉及一种诊断设备及诊断设备的安全访问方法。
背景技术
随着汽车的日益普及,汽车安全性显得尤为重要,随之出现了各种对汽车进行诊断的诊断设备。而每一款诊断设备的研发都需要投入大量的人力和时间,才能达到兼容不同车型、不同车款的效果。为了保护诊断设备的研发成果,则需要对诊断设备进行安全认证。
目前的诊断设备,其核心部件包括MCU(Micro Control Unit,微控制单元)、存储器和密钥认证芯片等,其中,密钥存放于MCU中。这样,当窃取MCU中的诊断逻辑时,只需要破解MCU中的源文件,通过逆向代码获得语言程序,则可以通过修改语言程序中的语句,避免通过身份认证流程来检测产品合法性。
由上述可知,现有的诊断设备无法保证其安全性,其中的重要信息容易被盗窃。
发明内容
本发明实施例提供一种诊断设备及诊断设备的安全访问方法,以解决现有的诊断设备无法保证其安全性,使得其中的重要信息容易被盗窃的问题。
第一方面,本发明实施例提供一种诊断设备,包括:控制器,以及分别与所述控制器连接的第一加密单元和第二加密单元,所述第一加密单元包括第一身份认证密钥和第一安全算法,所述第二加密单元包括第二身份认证密钥和第二安全算法;
所述控制器,用于控制所述第一加密单元根据所述第一身份认证密钥和所述第一安全算法,生成第一认证值,控制所述第二加密单元根据所述第二身份认证密钥和所述第二安全算法,生成第二认证值,并在所述第一认证值和所述第二认证值匹配时,确定安全认证成功。
第二方面,本发明实施例提供一种诊断设备的安全访问方法,所述方法适用于诊断设备中的控制器,所述方法包括:
分别向第一加密单元和第二加密单元发送第一认证指令;
获取所述第一加密单元生成的第一认证值,所述第一认证值是所述第一加密单元根据所述第一认证指令、第一身份认证密钥和第一安全算法生成的;
获取所述第二加密单元生成的第二认证值,所述第二认证值是所述第二加密单元根据所述第一认证指令、第二身份认证密钥和第二安全算法生成的;
判断所述第一认证值与所述第二认证值是否匹配;
若是,则确定安全认证成功。
本发明实施例的有益效果如下:
在本发明实施例中,控制器用于分别向第一加密单元和第二加密单元发送第一认证指令,第一加密单元,用于根据第一身份认证密钥和第一安全算法生成第一认证值,将第一认证值发送给控制器;第二加密单元用于根据第二身份认证密钥和第二安全算法生成第二认证值,将第二认证值发送给控制器;控制器判断第一认证值与第二认证值是否匹配,当第一认证值与第二认证值匹配时,则确定安全认证成功,当第一认证值与第二认证中不匹配时,确定安全认证失败,进而避免窃取控制器中的诊断逻辑,或窃取存储器中的关键数据等,从而提高了对诊断设备的安全访问性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例一提供的诊断设备的结构示意图;
图2为本发明实施例二提供的诊断设备的结构示意图;
图3为本发明实施例一提供的诊断设备的安全访问方法的流程示意图;
图4为本发明实施例二提供的诊断设备的安全访问方法的流程示意图;
图5为本发明实施例三提供的诊断设备的安全访问方法的流程示意图;
图6为本发明实施例四提供的诊断设备的安全访问方法的流程示意图;
图7为本发明实施例一提供的诊断设备的安全访问方法的流程示意图;
图8为本发明实施例二提供的诊断设备的安全访问方法的流程示意图;
图9为本发明实施例一提供的诊断设备的安全访问方法的流程示意图;
图10为本发明实施例二提供的诊断设备的安全访问方法的流程示意图;
图11为本发明实施例三提供的诊断设备的安全访问方法的流程示意图;
图12为本发明实施例四提供的诊断设备的安全访问方法的流程示意图。
附图标记说明:
10:控制器;
20:第一加密单元;
30:第二加密单元;
40:存储器;
50:通信单元;
60:人机交互单元;
70:通信接口。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明实施例提供的诊断设备,通过设置第一加密单元和第二加密单元,并将身份认证密钥分别保存在第一加密单元和第二加密单元,而控制器本身不存放身份认证密钥,进而通过安全性高的第一加密单元和第二加密单元进行身份验证,身份认证密钥更加安全,可大幅提升产品安全性。
下面以具体地实施例对本发明的技术方案进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例不再赘述。
图1为本发明实施例一提供的诊断设备的结构示意图。如图1所示,本实施例的诊断设备包括:控制器10、第一加密单元20和第二加密单元30,所述第一加密单元20和所述第二加密单元30分别与所述控制器10连接。第一加密单元20中存储有第一身份认证密钥和第一安全算法,所述第二加密单元30中存储有第二身份认证密钥和第二安全算法。
所述控制器10,用于控制所述第一加密单元20根据所述第一身份认证密钥和所述第一安全算法,生成第一认证值,控制所述第二加密单元30根据所述第二身份认证密钥和所述第二安全算法,生成第二认证值,并在所述第一认证值和所述第二认证值匹配时,确定安全认证成功。
本实施例的控制器10可以产生随机值,例如在接收到开机信号时生成随机值,并且每次身份认证过程生成的随机值不相同。
第一加密单元20中保存有预设的身份认证密钥(即第一身份认证密钥)和预设的第一安全算法,该第一安全算法可以是SHA-256、SHA-0、SHA-1、SHA-512等安全算法。
第二加密单元30中保存有预设的身份认证密钥(即第二身份认证密钥)和预设的第二安全算法,该第二安全算法也可以是SHA-256、SHA-0、SHA-1、SHA-512等安全算法。
为了便于后续的数据匹配,则同一诊断设备中的第一加密单元20和第二加密单元30中设置的安全算法相同,即第一安全算法和第二安全算法相同。
在实际使用时,需要进行身份认证时,例如诊断设备开机时,控制器10生成随机值,该随机值为随机产生的值(例如为4个字节的随机数),并将该随机值分别发送给第一加密单元20和第二加密单元30。其中,控制器10与第一加密单元20及第二加密单元30之间的连接可以是有线连接,即通过数据线直接连接通信。可选的,控制器10与第一加密单元20及第二加密单元30之间的连接还可以是无线连接,例如通过WIFI、蓝牙、红外等方式连接通信。
第一加密单元20接收到随机值后,根据自身保存的第一身份认证密钥、随机值和第一安全算法,生成第一认证值,该第一认证值可以为一串数字或者为一串字符。接着,第一加密单元20将生成的第一认证值发送给控制器10。需要说明的是,根据第一身份认证密钥和第一安全算法,生成第一认证值的过程与现有方法相同,本实施例在此不再赘述。
同理,第二加密单元30接收到随机值后,根据自身保存的第二身份认证密钥和第二安全算法,生成第二认证值,该第二认证值也可以为一串数字或者为一串字符。接着,第二加密单元30将生成的第二认证值发送给控制器10。需要说明的是,根据第二身份认证密钥和第二安全算法,生成第二认证值的过程与现有方法相同,本实施例在此不再赘述。
控制器10接收到第一加密单元20发送的第一认证值和第二加密单元30发送的第二认证值后,判断第一认证值与第二认证值是否匹配。当判断第一认证值与第二认证值匹配时,则可确定安全认证成功,用户可以安全访问该诊断设备。当判断第一认证值与第二认证值不匹配时,则确定安全认证未通过,控制器10中的相关程序锁死,不允许用户访问该诊断设备,避免窃取控制器10中的诊断逻辑,或窃取存储器中的关键数据等,进而实现对诊断设备的安全访问。
可选的,在本实施例中,当第一加密单元20中的第一安全算法与第二加密单元30中的第二安全算法相同时,则第一加密单元20生成的第一认证值与第二加密单元30生成的第二认证值相同。此时,判断第一认证值与第二认证值是否匹配,具体可以是判断第一认证值与第二认证值是否相同。当第一认证值与第二认证值相同时,确定身份认证通过,当第一认证值与第二认证值不相同时,则确定身份认证未通过。
本实施例的第一加密单元20和第二加密单元30为具有加密功能的芯片或单片机,可选的,本实施例的第一加密单元20为加密芯片,第二加密单元30为加密单片机。
本发明实施例提供的诊断设备,包括控制器、第一加密单元和第二加密单元,第一加密单元和第二加密单元分别与控制器连接;其中控制器用于分别向第一加密单元和第二加密单元发送第一认证指令,第一加密单元,用于根据第一身份认证密钥和第一安全算法生成第一认证值,将第一认证值发送给控制器;第二加密单元用于根据第二身份认证密钥和第二安全算法生成第二认证值,将第二认证值发送给控制器;控制器判断第一认证值与第二认证值是否匹 配,当第一认证值与第二认证值匹配时,则确定安全认证成功,当第一认证值与第二认证中不匹配时,确定安全认证失败,进而避免窃取控制器中的诊断逻辑,或窃取存储器中的关键数据等,从而提高了对诊断设备的安全访问性。
为了进一步提高诊断设备的访问安全性,则本实施例除了上述判断第一认证值和第二认证值是否匹配之外,还需要判断第一出厂信息和第二出厂信息是否匹配,其具体过程可以根据下列两种方式实现:
第一种可能的实现方式为,在第一加密单元20或第二加密单元30中保存所述诊断设备的第一出厂信息,所述控制器10中保存有所述诊断设备的第二出厂信息。
此时,所述控制器10,还用于从所述第一加密单元20或所述第二加密单元30中获取所述第一出厂信息,并将所述第一出厂信息与所述第二出厂信息进行匹配,当所述第一认证值与所述第二认证值匹配,且所述第一出厂信息与所述第二出厂信息匹配时,则确定所述安全认证成功。
具体的,在该实现方式中,控制器10在确定第一加密单元20生成的第一认证值与第二加密单元30生成的第二认证值匹配后,则还需要判断第一出厂信息和第二出厂信息是否匹配。具体是,控制器10从保存有第一出厂信息的第一加密单元20或第二加密单元30中获取该第一出厂信息,接着,将该第一出厂信息与自身保存的第二出厂信息进行比对,以判断两者的匹配性。
控制器10在第一认证值与第二认证值匹配,且第一出厂信息和第二出厂信息匹配时,方可确定安全认证成功,用户可以安全访问该诊断设备。若第一认证值与第二认证值不匹配,或第一出厂信息和第二出厂信息不匹配时,则确定安全认证失败,用户不可以安全访问该诊断设备,进而进一步提高了诊断设备的安全访问性。
上述第一出厂信息和第二出厂信息可以包括:出厂日期、产品型号、出厂序列号(身份ID)、公司名称等中至少一个。
第二种可能的实现方式为,所述第一加密单元20中保存有第一出厂信息,所述第二加密单元30中保存有第二出厂信息。
此时,所述控制器10,还用于从所述第一加密单元20中获取所述第一出厂信息,从所述第二加密单元30中获取所述第二出厂信息,并将所述第一出厂信息与所述第二出厂信息进行匹配,当所述第一认证值与所述第二认证值匹配,且所述第一出厂信息与所述第二出厂信息匹配时,则确定所述安全认证成功。
具体的,在该实现方式中,控制器10在确定第一加密单元20生成的第一认证值与第二加密单元30生成的第二认证值匹配后,则还需要判断第一出厂信息和第二出厂信息是否匹配。具体是,控制器10从第一加密单元20中获取第一出厂信息,从第二加密单元30中获取第二出厂信息。接着,将该第一出厂信息与第二出厂信息进行比对,以判断两者的匹配性。
控制器10在第一认证值与第二认证值匹配,且第一出厂信息和第二出厂信息匹配时,方确定安全认证成功,用户可安全访问该诊断设备。若第一认证值与第二认证值不匹配,或第一出厂信息和第二出厂信息不匹配时,则确定安全认证成功,用户不可安全访问该诊断设备,进而进一步提高了诊断设备的安全访问性。
可选的,在本实施例中,控制器10还可以首先判断第一出厂信息和第二出厂信息是否匹配,若第一出厂信息和第二出厂信息匹配时,再判断第一认证值与第二认证值是否匹配。即本实施例对控制器10是先判断第一认证值与第二认证值是否匹配,还是先判断第一出厂信息和第二出厂信息是否匹配的具体顺序不做限制,具体根据实际需要进行确定。
上述第一出厂信息与第二出厂信息匹配可以是指第一出厂信息与第二出厂信息包括的各信息相同,或者,第一出厂信息与第二出厂信息中的关键信息相同。
本发明实施例提供的诊断设备,控制器10不仅判断第一认证值与第二认证值的匹配性,同时还判断第一出厂信息与第二出厂信息的匹配性,当第一认证值与第二认证值匹配,且第一出厂信息和第二出厂信息匹配时,方确定用户可安全访问该诊断设备,进一步提高了诊断设备的安全访问性。
图2为本发明实施例二提供的诊断设备的结构示意图。在上述实施例的基础上,本实施例的诊断设备还包括与所述控制器10连接的存储器40,所述存储器40中保存有加密数据。
其中,本实施例的第二加密单元30中保存有数据解密算法。
在实际使用时,当需要某一关键数据时,则向诊断设备发送指令,以指示获取该关键数据。该诊断设备通常对关键数据进行加密存储,进而形成加密数据。
此时,本实施例的控制器10接收到指示发送关键数据的指令时,从存储器40中调取关键数据对应的加密数据,并控制第二加密单元30使用数据解密算法对所述加密数据进行解密,获得解密数据,该解密数据即可以理解为是上述所需要的关键数据。其中,该关键数据可以是用户或车辆需求的数据,也可以是诊断设备在运行应用程序时,需要调用或处理的数据。
具体是,当第二加密单元30中保存有数据解密算法,则第二加密单元30根据自身保存的数据解密算法对该加密数据进行解密,生成解密数据,并将该解密信息发送给控制器10。
一种实现方式中,控制器10将所述解密数据发送给汽车总线,该步骤中,控制器10根据与汽车总线之间的通信协议,将该解密数据转换成汽车总线可识别的数据发送给车辆,以使车辆根据该解密数据进行相应的操作。
即本实施例的诊断设备,将关键数据进行加密,并保存在存储器40中,当需要该关键数据时,需要经过第二加密单元30对该关键数据进行解密。这 样使得关键数据与控制器10分离,进而提高了关键数据的破解难度,从而提高了关键数据的安全性。
继续参照图2所示,本实施例的诊断设备还包括通信单元50,该通信单元50与所述控制器10连接,所述通信单元50用于受控于所述控制器10与所述车辆进行通信;
所述控制器10,还用于通过所述通信单元将所述解密数据发送给所述车辆。
其中,本实施例的通信单元50可以是通信电路,该通信电路可以是连接控制器10与汽车总线的物理通道,完成CAN总线、K线、VPW/PWM等链路的数据传输。
可选的,本实施例的通信单元50还可以是无线通信单元50,例如WIFI模块、蓝牙模块或红外模块等
继续参照图2所示,本实施例的诊断设备还可以包括与所述控制器10连接的人机交互单元60。该人机交互单元60用于实现诊断设备软件功能界面及相关诊断结果的展示,并提供操作方法给用户以实现人机交互。
可选的,人机交互单元60还包括输入装置和输出装置,其中输出装置可以是显示屏或打印机等,输入装置可以是按键、录音器、触摸屏等供用户向人机交互单元60输入操作命令的装置。
可选的,本实施例的诊断设备还包括至少一个通信接口70,例如可以包括USB接口、诊断接口等,其中,USB接口可以与PC进行通信,实现设备的固件升级及打印等功能,诊断接口可以连接汽车总线。
本发明实施例提供的诊断设备,包括存储器,该存储器中保存有加密数据,第二加密单元中保存有数据解密算法,控制器当需要从存储器中调取加密数据时,控制器控制第二加密单元使用数据解密算法对加密数据进行解密,获得解密数据,并通过通信单元将该解密数据发送给车辆。即本实施例将关键数据与控制器分离,进而提高了关键数据的破解难度,从而提高了关键数据的安全性。
图3为本发明实施例一提供的诊断设备的安全访问方法的流程示意图。本实施例的执行主体为上述实施例所述的诊断设备中的控制器。如图3所示,本实施例可以包括:
S101、控制器分别向第一加密单元和第二加密单元发送第一认证指令。
如图1所示,本实施例的诊断设备包括控制器、第一加密单元和第二加密单元,且第一加密单元和第二加密单元分别与控制器连接。
具体的,在诊断设备开机时,控制器检测到开机信号,此时,控制器生成一随机值。接着将该随机值发送给诊断设备中的第一加密单元和第二加密单元,以使第一加密单元根据第一身份认证密钥和第一安全算法生成第一认证值,同时以使所述第二加密单元根据第二身份认证密钥和第二安全算法生成第二认证值。其具体过程可参照上述实施例的描述,在此不再赘述。
S102、获取所述第一加密单元生成的第一认证值,所述第一认证值是所述第一加密单元根据所述第一认证指令、第一身份认证密钥和第一安全算法生成的。
具体的,控制器将第一认证指令发送给第一加密单元后,第一加密单元根据该第一认证指令和自身保存的第一身份认证密钥和第一安全算法生成第一认证值。控制器从第一加密单元中获取该第一认证值。
S103、获取所述第二加密单元生成的第二认证值,所述第二认证值是所述第二加密单元根据所述第一认证指令、第二身份认证密钥和第二安全算法生成的。
具体的,控制器将第一认证指令发送给第二加密单元后,第二加密单元根据该第一认证指令和自身保存的第二身份认证密钥和第二安全算法生成第二认证值。控制器从第二加密单元中获取该第二认证值。
S104、控制器判断所述第一认证值与所述第二认证值是否匹配。
S105、若是,则控制器确定安全认证成功。
具体的,控制器获取到第一认真值和第二认证值后,判断第一认证值与第二认证值是否匹配。当判断第一认证值与第二认证值匹配时,则确定安全认证成功,用户可以安全访问该诊断设备,当判断第一认证值与第二认证值不匹配时,则可以确定安全认证失败,用户不可以使用该诊断设备,锁死控制器中的诊断程序,进而提高了诊断设备的安全访问性。
其具体过程可参照上述实施例的描述,在此不再赘述。
本发明实施例提供的诊断设备的安全访问方法,控制器分别向第一加密单元和第二加密单元发送第一认证指令,并获取第一加密单元生成的第一认证值,以及获取第二加密单元生成的第二认证值;并判断第一认证值与第二认证值是否匹配;若是,则确定安全认证成功,进而提高了诊断设备的安全访问性。
图4为本发明实施例二提供的诊断设备的安全访问方法的流程示意图。在上述实施例的基础上,本实施例的第一加密单元或第二加密单元中保存有诊断设备的第一出厂信息,所述控制器中保存有诊断设备的第二出厂信息。此时,如图4所示,本实施例的方法可以包括:
S201、控制器向保存有第一出厂信息的所述第一加密单元或所述第二加密单元发送第一请求指令。
其中,所述第一请求指令用于请求获取所述第一出厂信息。
S202、控制器接收所述第一加密单元或所述第二加密单元发送的第一应答信息。
其中,所述第一应答信息中携带所述第一出厂信息。
S203、控制器判断所述第一出厂信息与预存的第二出厂信息是否匹配。
S204、控制器若所述第一出厂信息与所述第二出厂信息匹配,且所述第一认证值与所述第二认证值匹配时,则确定安全认证成功。
为了进一步提高诊断设备的访问安全性,则本实施例除了上述判断第一认证值和第二认证值是否匹配之外,还需要判断第一出厂信息和第二出厂信息是否匹配。
具体的,当第一加密单元或第二加密单元中保存诊断设备的第一出厂信息,控制器中保存有诊断设备的第二出厂信息时,控制器向第一加密单元或第二加密单元发送第一请求指令,以获取第一出厂信息。具体是,当第一加密单元中保存有第一出厂信息时,控制器向第一加密单元发送第一请求指令,第一加密单元根据该第一请求指令,将保存的第一出厂信息携带在第一应答信息中发送给控制器。当第二加密单元中保存第一出厂信息时,则控制器向第二加密单元发送第一请求指令,第二加密单元根据该第一请求指令,将保存的第一出厂信息携带在第一应答信息中发送给控制器。
接着,控制器判断第一出厂信息与第二出厂信息适配匹配。
需要说明的是,上述S203与上述S103之间没有先后顺序,即S203可以在S103之后执行,即当S103判断第一认证值与第二认证值匹配时,执行S203。可选的,S203还可以在S103之前执行,即当S203判断第一出厂信息与第二出厂信息匹配时,执行S103,本实施例对此不做限制。
可选的,上述S201中的第一请求指令可以携带在S101中的第一认证指令中。
本实施例的具体执行过程可参照上述实施例的描述,在此不再赘述。
本发明实施例提供的诊断设备的安全访问方法,当第一加密单元或第二加密单元中保存有诊断设备的第一出厂信息,控制器中保存有诊断设备的第二出厂信息时,则控制器向第一加密单元或第二加密单元发送第一请求指令;并接收第一加密单元或第二加密单元发送的第一应答信息;然后判断第一出厂信息与第二出厂信息是否匹配;若第一出厂信息与第二出厂信息匹配,且第一认证值与第二认证值匹配时,则确定安全认证成功,进一步提高了诊断设备的访问安全性。
图5为本发明实施例三提供的诊断设备的安全访问方法的流程示意图。在上述实施例的基础上,当所述第一加密单元中保存有诊断设备的第一出厂信息,所述第二加密单元中保存有第二出厂信息时,如图5所示,本实施例的方法可以包括:
S301、控制器向所述第一加密单元发送第一请求指令,向所述第二加密单元发送第二请求指令。
其中,所述第一请求指令用于请求获取第一出厂信息,所述第二请求指令用于请求获取第二出厂信息。
S302、控制器接收所述第一加密单元发送的第一应答信息,接收所述第二加密单元发送的第二应答信息。
其中,所述第一应答信息中携带所述第一出厂信息,所述第二应答信息中 携带所述第二出厂信息。
S303、判断所述第一出厂信息与所述第二出厂信息是否匹配。
S304、若所述第一出厂信息与所述第二出厂信息匹配,且所述第一认证值与所述第二认证值匹配时,则确定安全认证成功。
需要说明的是,上述S303与上述S103之间没有先后顺序,即S303可以在S103之后执行,即当S103判断第一认证值与第二认证值匹配时,执行S303。可选的,S303还可以在S103之前执行,即当S304判断第一出厂信息与第二出厂信息匹配时,执行S103,本实施例对此不做限制。
可选的,上述S301中的第一请求指令和第二请求指令可以携带在S101中的第一认证指令中。
本实施例的具体执行过程可参照上述实施例的描述,在此不再赘述。
本发明实施例提供的诊断设备的安全访问方法,当第一加密单元中保存有诊断设备的第一出厂信息,第二加密单元中保存有第二出厂信息时,则控制器向第一加密单元发送第一请求指令,向第二加密单元发送第二请求指令;并接收第一加密单元发送的第一应答信息,接收第二加密单元发送的第二应答信息;然后判断第一出厂信息与第二出厂信息是否匹配;若第一出厂信息与第二出厂信息匹配,且第一认证值与第二认证值匹配时,则确定安全认证成功,进一步提高了诊断设备的访问安全性。
图6为本发明实施例四提供的诊断设备的安全访问方法的流程示意图。在上述实施例的基础上,如图6所示,本实施例的方法还可以包括:
S401、控制器从存储器中调取加密数据;
如图2所示,本实施例的诊断设备还包括存储器,该存储器中保存有加密数据。
控制器可以从该存储器中提取加密数据,例如,控制器接收到用户指令,该用户指令用于指示向汽车总线发送关键数据,此时,控制器可以从存储器中调取加密数据。
S402、控制器将所述加密数据发送给所述第二加密单元。
S403、控制器接收所述第二加密单元发送的解密数据,并将所述解密数据发送给所述车辆。
本实施例中,第二加密单元中保存有数据解密算法,则控制器将加密数据发送给第二加密单元。第二加密单元对该加密数据进行解密,生成解密数据。接着,控制器将该解密数据发送给车辆。
本实施例的具体执行过程可参照上述实施例的描述,在此不再赘述。
本发明实施例提供的诊断设备的安全访问方法,控制器从存储器中获取加密数据;接着,将该加密数据发送给第二加密单元,接收第二加密单元对该加密数据进行解密,生成解密数据;然后接收第二加密单元发送的解密数据,并将该解密数据发送给车辆。即本实施例将关键数据与控制器进行分离,进而提 高了关键数据的破解难度,从而提高了关键数据的安全性。
图7为本发明实施例一提供的诊断设备的安全访问方法的流程示意图。本实施例的执行主体为上述实施例所述的诊断设备中的第一加密单元。如图7所示,本实施例的方法可以包括:
S501、第一加密单元接收控制器发送的第一认证指令。
S502、第一加密单元根据第一身份认证密钥和第一安全算法,生成第一认证值。
S503、第一加密单元将所述第一认证值发送给所述控制器。
参照图1所示,本实施例的诊断设备包括处理器,第一加密单元和第二加密单元,其中第一加密单元和第二加密单元分别与控制器连接。
具体的,参照上述实施例所述,在需要进行身份认证时,控制器向第一加密单元发送第一认证指令。第一加密单元根据该随机值,以及之前保存的第一身份认证密钥和第一安全算法,进行运算生成第一认证值。接着,将生成的第一认证值发送给控制器,以使控制器进行身份认证。其具体过程参照上述实施例的描述,在此不再赘述。
本发明实施例提供的诊断设备的安全访问方法,第一加密单元中保存有身份认证密钥,使得第一加密单元进行身体认证,生成第一认证值,而控制器中不存放身份认证密钥,使得身份认证密钥更加安全,进而提高了诊断设备的访问安全性。
图8为本发明实施例二提供的诊断设备的安全访问方法的流程示意图。在上述实施例的基础上,当所述第一加密单元中保存有诊断设备的第一出厂信息时,如图8所示,本实施例的方法可以包括:
S601、第一加密单元接收所述控制器发送的第一请求指令。
其中,所述第一请求指令用于请求获取所述第一出厂信息。
S602、第一加密单元根据所述第一请求指令,向所述控制器发送第一应答信息。
其中,所述第一应答信息中携带所述第一出厂信息。
具体的,本实施例中,为了进一步提高诊断设备的安全访问性,则还需要对诊断设备的出厂信息进行判断,具体是,当第一加密单元保存有诊断设备的第一出厂信息时,则控制器向第一加密单元发送第一请求信息,以获取第一出厂信息。第一加密单元接收到该第一请求信息后,将第一出厂信息携带在第一应答信息中发送给控制器,以使控制器根据第一出厂信息判断诊断设备的访问安全性。
本实施例的具体执行过程可参照上述实施例的描述,在此不再赘述。
图9为本发明实施例一提供的诊断设备的安全访问方法的流程示意图。本实施例的执行主体为上述实施例所述的诊断设备中的第二加密单元。如图9 所示,本实施例的方法可以包括:
S701、第二加密单元接收控制器发送的第一认证指令。
S702、第二加密单元根据第二身份认证密钥和第二安全算法,生成第二认证值。
S703、第二加密单元将所述第二认证值发送给所述控制器。
参照图1所示,本实施例的诊断设备包括处理器,第一加密单元和第二加密单元,其中第一加密单元和第二加密单元分别与控制器连接。
具体的,参照上述实施例所述,在需要进行身份认证时,控制器向第二一加密单元发送第一认证指令,该第一认证指令中携带有控制器生成的随机值。第二加密单元根据以及之前保存的第二身份认证密钥和第二安全算法,进行运算生成第二认证值。接着,将生成的第二认证值发送给控制器,以使控制器进行身份认证。其具体过程参照上述实施例的描述,在此不再赘述。
本发明实施例提供的诊断设备的安全访问方法,第二加密单元中保存有身份认证密钥,使得第二加密单元进行身体认证,生成第二认证值,而控制器中不存放身份认证密钥,使得身份认证密钥更加安全,进而提高了诊断设备的访问安全性。
图10为本发明实施例二提供的诊断设备的安全访问方法的流程示意图。在上述实施例的基础上,当所述第二加密单元中保存有诊断设备的第一出厂信息时,如图10所示,本实施例的方法可以包括:
S801、第二加密单元接收所述控制器发送的第一请求指令。
其中,所述第一请求指令用于请求获取所述第一出厂信息。
S802、第二加密单元根据所述第一请求指令,向所述控制器发送第一应答信息。
其中,所述第一应答信息中携带所述第一出厂信息。
具体的,本实施例中,为了进一步提高诊断设备的安全访问性,则还需要对诊断设备的出厂信息进行判断,具体是,当第二加密单元保存有诊断设备的第一出厂信息时,则控制器向第二加密单元发送第一请求信息,以获取第一出厂信息。第二加密单元接收到该第一请求信息后,将第一出厂信息携带在第一应答信息中发送给控制器,以使控制器根据第一出厂信息判断诊断设备的访问安全性。
本实施例的具体执行过程可参照上述实施例的描述,在此不再赘述。
图11为本发明实施例三提供的诊断设备的安全访问方法的流程示意图。在上述实施例的基础上,当所述第二加密单元中保存有诊断设备的第二出厂信息时,如图11所示,本实施例的方法可以包括:
S901、第二加密单元接收所述控制器发送的第二请求指令。
其中,所述第二请求指令用于请求获取所述第二出厂信息;
S902、第二加密单元根据所述第二请求指令,向所述控制器发送第二应答信息,所述第二应答信息中携带所述第二出厂信息。
具体的,当第一加密单元保存第一出厂信息,第二加密单元保存第二出厂信息时,则当需要对诊断设备的出厂信息进行判断时,则控制器向第二加密单元发送第二请求指令,该第二请求指令用于请求获取第二出厂信息。第二加密单元接收到第二请求指令后,将第二出厂信息携带在第二应答信息中发送给控制器,以使控制器根据该第二出厂信息进行诊断设备的安全性判断,进一步提高了诊断设备的安全性。
本实施例的具体执行过程可参照上述实施例的描述,在此不再赘述。
图12为本发明实施例四提供的诊断设备的安全访问方法的流程示意图。在上述实施例的基础上,当第二加密单元中包括预设的加解密算法,如图12所示,本实施例的方法可以包括:
S110、第二加密单元接收所述控制器发送的加密数据。
S111、第二加密单元根据数据解密算法对所述加密数据进行解密,获得解密数据。
S112、第二加密单元将所述解密数据发送给所述控制器。
具体的,本实施例中,当第二加密单元中保存有加解密算法时,在控制器接收到用户指令,从存储器中读取加密数据后,则将该数据解密数据发送给第一加密单元。第二加密单元接收到该加密数据后,根据保存的数据解密算法对该加密数据进行解密,生成解密数据。接着,第二加密单元将该解密数据发送给控制器,以使控制器将该解密数据发送给车辆,进而实现与车辆的交互,且提高了关键数据的保存安全性。
本实施例的具体执行过程可参照上述实施例的描述,在此不再赘述。
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims (13)

  1. 一种诊断设备,其特征在于,包括:控制器,以及分别与所述控制器连接的第一加密单元和第二加密单元,所述第一加密单元包括第一身份认证密钥和第一安全算法,所述第二加密单元包括第二身份认证密钥和第二安全算法;
    所述控制器,用于控制所述第一加密单元根据所述第一身份认证密钥和所述第一安全算法,生成第一认证值,控制所述第二加密单元根据所述第二身份认证密钥和所述第二安全算法,生成第二认证值,并在所述第一认证值和所述第二认证值匹配时,确定安全认证成功。
  2. 根据权利要求1所述的诊断设备,其特征在于,所述第一加密单元或所述第二加密单元中保存有所述诊断设备的第一出厂信息,所述控制器中保存有所述诊断设备的第二出厂信息;
    所述控制器,还用于从所述第一加密单元或所述第二加密单元中获取所述第一出厂信息,并将所述第一出厂信息与所述第二出厂信息进行匹配,当所述第一认证值与所述第二认证值匹配,且所述第一出厂信息与所述第二出厂信息匹配时,则确定所述安全认证成功。
  3. 根据权利要求1所述的诊断设备,其特征在于,所述第一加密单元中保存有第一出厂信息,所述第二加密单元中保存有第二出厂信息;
    所述控制器,还用于从所述第一加密单元中获取所述第一出厂信息,从所述第二加密单元中获取所述第二出厂信息,并将所述第一出厂信息与所述第二出厂信息进行匹配,当所述第一认证值与所述第二认证值匹配,且所述第一出厂信息与所述第二出厂信息匹配时,则确定所述安全认证成功。
  4. 根据权利要求1-3任一项所述的诊断设备,其特征在于,还包括:
    与所述控制器连接的存储器,所述存储器中保存有加密数据。
  5. 根据权利要求4所述的诊断设备,其特征在于,所述第二加密单元中保存有数据解密算法;
    所述控制器,还用于当需要从所述存储器中调取所述加密数据时,控制所述第二加密单元使用所述数据解密算法对所述加密数据进行解密,获得解密数据。
  6. 根据权利要求5所述的诊断设备,其特征在于,还包括通信单元,所述通信单元与所述控制器连接,所述通信单元用于受控于所述控制器与所述车辆进行通信;
    所述控制器,还用于通过所述通信单元将所述解密数据发送给车辆。
  7. 根据权利要求1所述的诊断设备,其特征在于,还包括:
    与所述控制器连接的人机交互单元。
  8. 根据权利要求7所述的诊断设备,其特征在于,所述人机交互单元包括输入装置和输出装置。
  9. 根据权利要求1所述的诊断设备,其特征在于,所述第一加密单元为加密芯片,所述第二加密单元为加密单片机。
  10. 一种诊断设备的安全认证方法,其特征在于,所述方法适用于诊断设备中的控制器,所述方法包括:
    分别向第一加密单元和第二加密单元发送第一认证指令;
    获取所述第一加密单元生成的第一认证值,所述第一认证值是所述第一加密单元根据所述第一认证指令、第一身份认证密钥和第一安全算法生成的;
    获取所述第二加密单元生成的第二认证值,所述第二认证值是所述第二加密单元根据所述第一认证指令、第二身份认证密钥和第二安全算法生成的;
    判断所述第一认证值与所述第二认证值是否匹配;
    若是,则确定安全认证成功。
  11. 根据权利要求10所述的方法,其特征在于,所述方法还包括:
    向保存有第一出厂信息的所述第一加密单元或所述第二加密单元发送第一请求指令,所述第一请求指令用于请求获取所述第一出厂信息;
    接收所述第一加密单元或所述第二加密单元发送的第一应答信息,所述第一应答信息中携带所述第一出厂信息;
    判断所述第一出厂信息与预存的第二出厂信息是否匹配;
    若所述第一出厂信息与所述第二出厂信息匹配,且所述第一认证值与所述第二认证值匹配时,则确定安全认证成功。
  12. 根据权利要求10所述的方法,其特征在于,所述方法还包括:
    向所述第一加密单元发送第一请求指令,向所述第二加密单元发送第二请求指令,所述第一请求指令用于请求获取第一出厂信息,所述第二请求指令用于请求获取第二出厂信息;
    接收所述第一加密单元发送的第一应答信息,接收所述第二加密单元发送的第二应答信息,所述第一应答信息中携带所述第一出厂信息,所述第二应答信息中携带所述第二出厂信息;
    判断所述第一出厂信息与所述第二出厂信息是否匹配;
    若所述第一出厂信息与所述第二出厂信息匹配,且所述第一认证值与所述第二认证值匹配时,则确定安全认证成功。
  13. 根据权利要求10至12任一项所述的方法,其特征在于,所述方法还包括:
    从存储器中调取加密数据;
    将所述加密数据发送给所述第二加密单元;
    接收所述第二加密单元发送的解密数据,所述解密数据是所述第二加密单元使用解密算法对所述加密数据进行解密获得的;
    将所述解密数据发送给车辆。
PCT/CN2019/079516 2018-04-25 2019-03-25 诊断设备及诊断设备的安全访问方法 WO2019205857A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810377992.8 2018-04-25
CN201810377992.8A CN108600224B (zh) 2018-04-25 2018-04-25 诊断设备及诊断设备的安全访问方法

Publications (1)

Publication Number Publication Date
WO2019205857A1 true WO2019205857A1 (zh) 2019-10-31

Family

ID=63609192

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/079516 WO2019205857A1 (zh) 2018-04-25 2019-03-25 诊断设备及诊断设备的安全访问方法

Country Status (2)

Country Link
CN (1) CN108600224B (zh)
WO (1) WO2019205857A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113840266A (zh) * 2020-06-24 2021-12-24 华为技术有限公司 蓝牙配对方法、装置、系统、电子设备和存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600224B (zh) * 2018-04-25 2022-02-22 深圳市道通科技股份有限公司 诊断设备及诊断设备的安全访问方法
CN109347871B (zh) * 2018-11-29 2021-10-08 深圳市智能机器人研究院 一种用于工业设备检修的加密方法及系统
CN109450954B (zh) * 2018-12-29 2021-01-15 深圳市道通科技股份有限公司 汽车通信接口设备及其认证方法
CN110572400B (zh) * 2019-09-10 2022-02-22 阿波罗智联(北京)科技有限公司 车辆obd接口的认证方法、装置、电子设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105700509A (zh) * 2014-11-28 2016-06-22 奇点新源国际技术开发(北京)有限公司 基于can总线的车载终端检测方法及装置
CN106059754A (zh) * 2016-06-23 2016-10-26 北京汽车股份有限公司 车辆数据处理方法、系统及其设备
CN106155043A (zh) * 2016-07-28 2016-11-23 北京新能源汽车股份有限公司 车辆数据获取方法、装置及设备
US20170324558A1 (en) * 2014-12-12 2017-11-09 Kddi Corporation Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program
CN108600224A (zh) * 2018-04-25 2018-09-28 深圳市道通科技股份有限公司 诊断设备及诊断设备的安全访问方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378201A (zh) * 2013-08-12 2015-02-25 国家电网公司 排污数据安全传输的方法、终端及系统
CN106696888B (zh) * 2015-07-22 2019-05-17 大陆汽车电子(长春)有限公司 一种发动机控制单元配置策略
CN105631298B (zh) * 2015-12-22 2018-10-19 北京握奇智能科技有限公司 一种加解密装置及方法
KR101838511B1 (ko) * 2016-05-17 2018-03-14 현대자동차주식회사 암호화를 적용한 제어기 보안 방법 및 그 장치

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105700509A (zh) * 2014-11-28 2016-06-22 奇点新源国际技术开发(北京)有限公司 基于can总线的车载终端检测方法及装置
US20170324558A1 (en) * 2014-12-12 2017-11-09 Kddi Corporation Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program
CN106059754A (zh) * 2016-06-23 2016-10-26 北京汽车股份有限公司 车辆数据处理方法、系统及其设备
CN106155043A (zh) * 2016-07-28 2016-11-23 北京新能源汽车股份有限公司 车辆数据获取方法、装置及设备
CN108600224A (zh) * 2018-04-25 2018-09-28 深圳市道通科技股份有限公司 诊断设备及诊断设备的安全访问方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113840266A (zh) * 2020-06-24 2021-12-24 华为技术有限公司 蓝牙配对方法、装置、系统、电子设备和存储介质
CN113840266B (zh) * 2020-06-24 2024-05-03 华为技术有限公司 蓝牙配对方法、装置、系统、电子设备和存储介质

Also Published As

Publication number Publication date
CN108600224B (zh) 2022-02-22
CN108600224A (zh) 2018-09-28

Similar Documents

Publication Publication Date Title
WO2019205857A1 (zh) 诊断设备及诊断设备的安全访问方法
KR102328725B1 (ko) 하나의 장치를 이용하여 다른 장치를 언로크하는 방법
US10904007B2 (en) Authentication device based on biometric information, control server connected to the same, and login method based on biometric information thereof
WO2017193741A1 (zh) 机载终端支付鉴权方法、装置以及系统
CN106572106B (zh) 一种tbox终端和tsp平台之间报文传输的方法
KR101966379B1 (ko) 생체 정보 기반 인증 장치, 이와 연동하는 제어 서버 및 어플리케이션 서버, 그리고 이들의 동작 방법
KR102557263B1 (ko) 차량탑승 확인이 가능한 차량 운행 제어 시스템 및 차량 단말 장치의 제어 방법
EP4322464A1 (en) Information transmission method, storage medium and electronic device
US10658864B2 (en) Multifunctional wireless charging system and its data transmission method
US10474804B2 (en) Login mechanism for operating system
WO2018228061A1 (zh) 数据传输方法、装置及系统
TW201608408A (zh) Usb儲存裝置之無線認證系統及方法
CN111901117A (zh) 基于jtag接口的安全认证方法及系统
TR201807814T4 (tr) Kendi kendini doğrulama cihazı ve yöntemi.
US20140025946A1 (en) Audio-security storage apparatus and method for managing certificate using the same
KR102348078B1 (ko) 사용자 단말 장치, 전자 장치, 이를 포함하는 시스템 및 제어 방법
KR102389727B1 (ko) 차량 내 전자식 제어기 보안성 평가 방법 및 그 장치
US20240073020A1 (en) Digital key pairing method, pairing system, and vehicle
US11443071B2 (en) Secure debug architecture
KR102530441B1 (ko) 전자 장치와 외부 전자 장치 및 이를 포함하는 시스템
US20140156994A1 (en) Information processing apparatus and method for activating computer
KR101934461B1 (ko) 신뢰된 실행 환경 기반의 차량 제어를 위한 사용자 단말기 및 그의 차량 제어 방법
CN112425116A (zh) 一种智能门锁无线通信方法、智能门锁、网关及通信设备
KR101349698B1 (ko) 휴대형 저장매체를 이용한 인증시스템 및 방법, 그 단말기, 인증서버 및 휴대형 저장매체
WO2011006295A1 (zh) 用户识别设备认证方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19793126

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19793126

Country of ref document: EP

Kind code of ref document: A1