WO2021135999A1 - V2x通信方法、装置及车辆 - Google Patents
V2x通信方法、装置及车辆 Download PDFInfo
- Publication number
- WO2021135999A1 WO2021135999A1 PCT/CN2020/137935 CN2020137935W WO2021135999A1 WO 2021135999 A1 WO2021135999 A1 WO 2021135999A1 CN 2020137935 W CN2020137935 W CN 2020137935W WO 2021135999 A1 WO2021135999 A1 WO 2021135999A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- application
- processor
- execution environment
- communication
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
Definitions
- This application relates to the field of vehicle network technology, and in particular to a vehicle-to-everything (V2X) communication method, device, and vehicle.
- V2X vehicle-to-everything
- V2X vehicle-to-everything
- V2X vehicle-to-everything
- X vehicle, People, traffic roadside infrastructure and network
- the V2X communication device that sends the data can use the key to encrypt the V2X data and then send it.
- the V2X communication device that receives the data can use the key to decrypt the V2X data and then process it.
- other applications inside the V2X communication device may provide an entrance to applications that threaten the V2X communication device to perform V2X communication, thereby reducing the security of the V2X communication.
- two different processors can be set in the V2X communication device. One processor handles V2X communication-related applications, and the other processor handles other applications to physically isolate the V2X communication. But this technology greatly increases the hardware cost of the V2X communication device.
- the present application provides a V2X communication method, device, and vehicle to solve the technical problem that the V2X communication device in the prior art cannot reduce the hardware cost while improving the safety performance.
- the first aspect of the present application provides a V2X communication device, including: an AP processor, and a first communication module and a second communication module respectively connected to the AP processor, and a trusted execution environment and a non-trusted execution environment are running on the AP processor.
- Execution environment the trusted execution environment is used to run V2X applications
- the non-trusted execution environment is used to run applications other than V2X applications.
- V2X applications running in the trusted execution environment of the AP processor can send or receive V2X applications by calling the first communication module; while other applications running in the non-trusted execution environment of the AP processor can be Send or receive data from other applications by calling the second communication module.
- the V2X communication device runs TEE and REE simultaneously in the AP processor, and all V2X applications used for V2X communication in the AP processor run in the TEE. Therefore, the V2X application is combined with other V2X applications.
- Application isolation enables V2X applications to independently process V2X data in TEE.
- TEE ensures that V2X applications will not be affected or attacked by other applications when processing V2X data; at the same time, V2X applications running in TEE
- the program can also call the first communication module that is also independently set to receive or send V2X data, so that the data transceiver module used by the V2X application can only be called by the application in the TEE, and thus can be called by other applications in the REE.
- the isolation of the two communication modules further ensures the safety of V2X applications running in the TEE when sending and receiving V2X data.
- the V2X communication device provided in this embodiment can improve the security performance of V2X applications when V2X communication is performed by a TEE running on an AP processor, and there is no need to set up a separate processor, thus simplifying V2X
- the structure of the communication device can also reduce hardware costs.
- the V2X application in addition to receiving or sending the V2X application in the trusted execution environment, can also respond to the V2X application received by the first communication module in the trusted execution environment.
- the first V2X data of the application program performs security verification; and when the security verification passes, the V2X application program processes the first V2X data; when the security verification fails, the V2X application program does not continue to process the first V2X data .
- the V2X application can also encrypt the second V2X data to be sent in a trusted execution environment, and send the encrypted second V2X data through the first communication module.
- the V2X communication device when the V2X communication device provided by this embodiment receives or sends data in the TEE, it can further encrypt and sign the data in the TEE, or decrypt and verify the security in the TEE. The operation can further ensure the safety of the V2X data processed by the V2X application.
- the V2X communication device further includes: an HSM connected to the AP processor, configured to perform security verification on the first V2X data of the V2X application received by the first communication module; that is, , The V2X communication device can call the HSM connected to the AP processor to perform security verification on the received first V2X data; and when the security verification passes, the V2X application processes the first V2X data; when the security verification fails, The V2X application will not continue to process the first V2X data.
- the V2X application can also call the HSM in the trusted execution environment to encrypt the second V2X data to be sent, and send the encrypted second V2X data through the first communication module.
- the V2X communication device provided by this embodiment can set up an independent HSM outside the AP processor according to actual usage conditions to perform security operations such as encryption, decryption, signature, and verification of V2X data, thereby reducing the calculation of the AP processor.
- the HSM is configured to be called only by applications in the TEE, which can further ensure the security performance of the V2X application when performing secure operations on the V2X data.
- the HSM set in the V2X communication device is connected to the V2X baseband processing unit in the first communication module, and is called when the V2X baseband processing unit processes V2X data; that is, the V2X baseband processing unit After receiving the first V2X data, call the HSM to perform security verification on the received first V2X data; and when the security verification passes, the V2X baseband processing unit sends the first V2X data to the V2X application for processing; If the verification fails, the V2X application will not send the first V2X data to the V2X application.
- the V2X baseband processing unit may also encrypt the second V2X data to be sent by the V2X application, and send the encrypted second V2X data through the first communication module.
- the V2X communication device can also set an independent HSM in the V2X communication baseband processing unit outside the AP processor according to actual usage, so that the V2X communication baseband processing unit is in the process of sending or receiving V2X data. It can perform security operations such as encryption, decryption, signature, and verification of V2X data, thereby reducing the amount of calculation of the AP processor, and the HSM is only connected to the V2X communication baseband processing unit in the first communication module, and the first communication module is configured as Only being able to be called by the application in the TEE can further ensure the safety performance of the V2X application during the safe operation of the V2X data.
- security operations such as encryption, decryption, signature, and verification of V2X data
- the V2X communication device further includes: a first external interface and a second external interface respectively connected to the AP processor; wherein, when the first external interface is called by the V2X application in the TEE , The V2X application can transmit data between the first external interface and the first external device. When the second external interface is called by other applications in the REE, other applications can transfer data between the second external interface and the second external device.
- the external interface that can be called by the V2X application running in the TEE is different from the external interface that can be called by the application running in the REE, so that the TEE and the application running in the REE can be called differently.
- the external interface used by the program to send data to the external device is physically isolated, so that the physical interface that the V2X application can call is safe, thereby further ensuring the safety of the V2X application when sending V2X data to the outside.
- the V2X communication device further includes: a data acquisition unit, which can be called by the trusted execution environment, and is used to acquire state data representing the state of the vehicle.
- a data acquisition unit which can be called by the trusted execution environment, and is used to acquire state data representing the state of the vehicle.
- the V2X communication device provided in this embodiment enables the V2X application running in the TEE environment to individually call the secure data acquisition unit to obtain status data, and the data acquisition unit will not be called by the application in the REE, thus The security of the state data obtained by the V2X application program is ensured through TEE, which further ensures the safety of the V2X application program when processing the V2X data.
- the V2X application program is specifically used to generate a processing result according to the status data and the first V2X data, and send the processing result through the first external interface.
- this embodiment requires the V2X application to process the first V2X data received by the V2X communication device, and the V2X application can obtain the state data of the vehicle while ensuring the safety of the state data obtained by the V2X application through the TEE.
- the processing result can be generated when the first V2X data is secured by TEE, so that the V2X application can further call the first external interface that can guarantee security to send the processing result, so as to process the whole process of V2X data in the V2X application Protection through TEE further ensures the safety of V2X applications when processing V2X data.
- the V2X application program is specifically used for, and the V2X application program is specifically used for sending the first V2X data through the first external interface.
- the first V2X data received by the V2X communication device in this embodiment does not need to be processed by the V2X application, but is directly forwarded, and the V2X application can directly call the first external interface that can ensure the security to be received.
- the first V2X data forwarding ensures the safety of V2X applications when forwarding V2X data.
- the V2X application program is specifically used for, and the V2X application program is specifically used for generating the second V2X data through the state data.
- this embodiment is directed to the process in which the V2X communication device itself generates the second V2X data to be sent according to the state data of the vehicle, where the V2X application can be obtained under the condition that the state data obtained by the V2X application is secured through the TEE.
- the state data of the vehicle can also generate second V2X data in the TEE, and then send it. Therefore, the entire process of V2X application generating and sending V2X data is protected by TEE, which further ensures the safety of V2X application processing V2X data.
- the second aspect of the present application provides a V2X communication method, which can be applied to the AP processor in the V2X communication device provided in the first aspect of the present application, wherein the method includes: the AP processor uses a V2X application program running in a trusted execution environment , Calling the first communication module to send or receive data of the V2X application; and/or, the AP processor calls the second communication module to send or receive data of other applications through other applications running in the untrusted execution environment.
- the method further includes: the AP processor performs security verification on the first V2X data of the V2X application received by the first communication module through the trusted execution environment.
- the method further includes: the AP processor invokes the hardware security module HSM through the trusted execution environment to perform security verification on the first V2X data of the V2X application received by the first communication module Test.
- the method further includes: the AP processor encrypts the second V2X data generated by the V2X application program through the trusted execution environment.
- the method further includes: the AP processor invokes the hardware security module HSM through the trusted execution environment to encrypt the second V2X data generated by the V2X application.
- the V2X communication device further includes: a first external interface and a second external interface respectively connected to the AP processor; the method further includes: the AP processor runs in a trusted execution environment The V2X application program calls the first external interface, and transmits the data of the V2X application program to the external device connected to the first external interface; and/or, the AP processor calls the second application program through other applications running in the untrusted execution environment The external interface transmits data of other applications to the external device connected to the second external interface.
- the V2X communication device further includes: a data acquisition unit connected to the AP processor, configured to acquire state data that identifies the state of the vehicle; the method further includes: the AP processor performs trusted execution
- the V2X application program running in the environment generates processing results based on the status data and the first V2X data, and calls the first external interface to send the processing results.
- the method further includes: the AP processor sends the first V2X data through the V2X application program running in the trusted execution environment, and the first external interface.
- the method further includes: the AP processor generates the second V2X data through the state data through the V2X application program running in the trusted execution environment.
- the third aspect of the present application provides a V2X communication device, which is used to implement the functions in the foregoing method.
- the function can be realized by hardware, or by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above-mentioned functions.
- the fourth aspect of the present application provides a computer program product containing instructions, which when run enables the V2X communication device to execute the foregoing second aspect or the methods in the various possible implementation manners of the second aspect.
- a fifth aspect of the present application provides a computer-readable storage medium that stores instructions in the computer-readable storage medium, and when it runs, causes the V2X communication device to execute the foregoing first aspect or various possible implementations of the first aspect The method in the way.
- a sixth aspect of the present application provides a chip system.
- the chip system includes a processor and may also include a memory for implementing the functions of the V2X communication device in the foregoing method.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- a seventh aspect of the present application provides a vehicle, including the V2X communication device as in any embodiment of the first aspect of the present application.
- this application provides a V2X communication method, device, and vehicle, in which TEE and REE are simultaneously run in the AP processor, and all V2X applications used for V2X communication in the AP processor run in the TEE. Isolate V2X applications from other applications so that V2X applications can independently process V2X data in TEE. Through TEE, it is ensured that V2X applications will not be affected or attacked by other applications when processing V2X data; at the same time, run The V2X application in TEE can also call the first communication module that is also independently set to receive or send V2X data, so that the data transceiver module used by the V2X application can only be called by the application in the TEE, which is compatible with other REEs.
- the isolation of the second communication module that the application can call further ensures the safety of the V2X application running in the TEE when sending and receiving V2X data.
- the V2X communication device provided in this embodiment can improve the security performance of V2X applications when V2X communication is performed by a TEE running on an AP processor, and there is no need to set up a separate processor, thus simplifying V2X
- the structure of the communication device can also reduce hardware costs.
- Figure 1 is a schematic diagram of the application scenario of this application.
- Figure 2 is a schematic structural diagram of a V2X communication device
- FIG. 3 is a schematic structural diagram of another V2X communication device
- FIG. 4 is a schematic structural diagram of an embodiment of a V2X communication device provided by this application.
- FIG. 5 is a schematic diagram of the software architecture of the application processor provided by this application.
- FIG. 6 is a schematic structural diagram of an embodiment of a V2X communication device provided by this application.
- FIG. 7 is a schematic structural diagram of an embodiment of a V2X communication device provided by this application.
- FIG. 8 is a schematic diagram of the software structure in the TEE provided by this application.
- FIG. 9 shows a V2X data receiving processing flow
- FIG. 10 shows a V2X data sending processing flow
- FIG. 11 is a schematic structural diagram of an embodiment of a V2X communication device provided by this application.
- FIG. 12 is a schematic diagram of the software structure in the TEE provided by this application.
- FIG. 13 shows a V2X data receiving processing flow
- Figure 14 shows a V2X data transmission processing flow.
- Fig. 1 is a schematic diagram of the application scenario of this application. As shown in Fig. 1, this application can be applied to the application scenario of vehicle network communication.
- V2X communication can be set on the vehicle.
- Device or called: vehicle network terminal
- the vehicle in the picture can communicate with other vehicles (vehicle to vehicle, V2V), and communicate with other pedestrians.
- V2X communication can realize all-round connection and efficient information interaction between vehicles and pedestrians, other vehicles, roadside equipment, and networks, and realize functions such as information services, traffic safety, and traffic efficiency.
- V2X communication devices can obtain various information services through V2I and V2N communication, including traffic signal information, and nearby areas. Vehicle information, vehicle navigation information, emergency rescue information, entertainment service information, etc.; through V2V and V2P communication, the V2X communication device can obtain real-time information about the speed, location, driving situation and pedestrian activity of surrounding vehicles, and realize the collision warning function through intelligent algorithms , To avoid vehicle traffic accidents; V2X communication device can realize functions such as vehicle speed guidance through V2I communication to improve traffic efficiency.
- V2X communication devices Since the services provided by the V2X communication device through V2X communication are closely related to safety performance, once the data transmitted by the V2X communication device used by the vehicle is illegally tampered with or counterfeited during the communication process, or the V2X application and algorithm process running on the V2X communication device is Attacks will seriously affect the normal driving of vehicles and even threaten the safety of other vehicles and pedestrians on the road. Therefore, V2X communication devices need to ensure their data security when conducting V2X communication and providing related services.
- the V2X communication device may encrypt the transmitted data to ensure data security when performing V2X communication.
- Figure 2 is a schematic structural diagram of a V2X communication device.
- a V2X application capable of V2X communication can run on the application processor in the V2X communication device.
- the V2X communication device is used as the sender When sending V2X data, the V2X application uses the key to sign and encrypt the V2X data and then send it through the communication module; when the V2X communication device is the receiver receiving the V2X data, the V2X application receives the V2X data through the communication module Later, it is also necessary to obtain the symmetric key through the identity authentication server to decrypt the V2X data. Therefore, in the entire transmission process of V2X data transmission and reception, the V2X data is protected from being tampered with through the security mechanism of signature and encryption.
- the application processor in the V2X communication device runs other applications at the same time in addition to running V2X applications, such as application A and application B in the example in the figure, the application A and B will also call the communication module to send or receive A data and B data respectively.
- the V2X application program running on the application processor is vulnerable to attack threats brought by other applications during the calculation process, resulting in the abnormality of the V2X application program and threatening the safety of the vehicle.
- FIG. 3 is a schematic structural diagram of another V2X communication device.
- the V2X communication device is equipped with at least two application processors, application processor 1 and application processor 2, which can carry out V2X communication.
- the program runs in the application processor 1, and other applications except the V2X application program run in the application processor 2.
- the V2X application program sends or receives V2X data by calling the communication module 1.
- the communication module 1 may be integrated in the application processor 1, or set independently.
- the application programs A and B in the application processor 2 can call the communication module to send or receive A data and B data.
- the V2X communication device has poor security performance in the technology shown in Figure 2, while the hardware cost of the technology shown in Figure 3 is higher. Both of the above two technologies have their own shortcomings. How to make the V2X communication device While reducing the cost of parts, it can also improve the safety performance, which is an urgent technical problem in this field.
- the present application provides a V2X communication method and device to solve the technical problem that the V2X communication device in the prior art cannot reduce the hardware cost while improving the safety performance.
- FIG. 4 is a schematic structural diagram of an embodiment of the V2X communication device provided by this application.
- the V2X communication device provided by this application can be installed on the vehicle shown in FIG.
- the vehicle conducts V2X communication.
- the V2X communication device includes: an application (AP) processor, and a trusted execution environment (TEE) and a non-trusted execution environment (REE) run on the AP processor.
- AP application
- TEE trusted execution environment
- REE non-trusted execution environment
- the TEE is based on the security technology of ARM Trustzone, which separates the operating system into two worlds, namely the secure world and the non-secure world.
- the hardware achieves security isolation, including the isolation of peripherals.
- TEE is the software operating environment of the secure world.
- the applications running in the REE cannot directly access the applications running in the TEE.
- the TEE running in the AP processor is used to run V2X applications for V2X communication.
- the AP processor may include one or more V2X applications, and all V2X applications in the AP processor
- the programs are all running in TEE, in Figure 4 the V2X application is taken as an example.
- the REE running in the AP processor is used to run applications other than V2X applications in the AP processor, that is, applications that do not perform V2X communication.
- applications other than V2X applications are recorded as Other applications, in Figure 4, other applications include: application A, application B... as an example.
- the V2X communication device further includes: a first communication module and a second communication module, wherein the first communication module is connected to the AP processor, and the first communication module is configured to be called only by the V2X application running in the TEE, but not Called by other applications running in the REE, and when called, send or receive V2X data of the V2X application; the second communication module is also connected to the AP processor, and the second communication module is configured to be only able to be run in the REE Called by other applications, but cannot be called by the V2X application running in the TEE, and send or receive data from other applications when called.
- the first communication module may include: a V2X communication baseband processing unit and a V2X communication radio frequency unit, where the V2X communication baseband processing unit supports the baseband processing function of the V2X communication technology, and the V2X communication radio frequency unit supports the radio frequency of the V2X communication technology.
- Signal processing function When the first communication module is used to send or receive V2X data, the supported technical standard can be the DSRC standard based on WAVE technology (also known as IEEE 802.11p), or the cellular C-V2X standard based on cellular technology .
- the second communication module may include: a cellular communication baseband processing unit and a cellular communication radio frequency unit, where the cellular communication baseband processing unit: supports the baseband processing function of the cellular communication technology (2G/3G/4G/5G), and the cellular communication radio frequency unit : Support the radio frequency signal processing function of cellular communication technology (2G/3G/4G/5G).
- the AP processor and the cellular baseband processor unit in the second communication module may be integrated on the same chip, and the chip may be a system-on chip (SoC) or a baseband Chip; or, the cellular baseband processor unit and AP processor can also be set on separate chips.
- SoC system-on chip
- the AP processor, the cellular baseband processing unit in the second communication module, and the V2X baseband processing unit in the first communication module may be integrated on the same chip, and the chip may be a SoC or a baseband chip ;
- the cellular baseband processor unit, the V2X baseband processing unit and the AP processor can also be set on separate chips.
- the V2X communication radio frequency unit may be arranged on an independent chip and connected to the V2X communication baseband processing unit; or, the V2X communication radio frequency unit and the cellular communication radio frequency unit may also be arranged on the same chip, and the chip may be SoC can also be a cellular communication radio frequency chip.
- FIG. 5 is a schematic diagram of the software architecture of the application processor provided by this application, where the V2X application running in the TEE runs in an independent secure OS, the V2X application at the application layer, or the V2X algorithm
- the V2X protocol stack and security services can be used to further call the first communication module to send or receive V2X data.
- the application program at the application layer can also use the middleware to call the second communication module to send or receive data.
- an AP processor can be set in the V2X communication device provided in this embodiment, and the AP processor runs TEE and REE at the same time, and the AP processor is used for V2X communication All of the V2X applications run in the TEE, so the V2X application is isolated from other applications, so that the V2X application can independently process the V2X data in the TEE. Through the TEE, it is guaranteed that the V2X application will not be processed when the V2X data is processed.
- the V2X application running in the TEE can also call the first communication module that is also independently set to receive or send V2X data, so that the data transceiver module used by the V2X application can only be used by the TEE
- the application call in the TEE is thus isolated from the second communication module that can be called by other applications in the REE, which further ensures the safety of the V2X application running in the TEE when receiving and sending V2X data.
- the TEE that can run on an AP processor can improve the security performance of V2X applications during V2X communication, and there is no need to set up a separate processor, thereby simplifying the V2X communication device
- the structure can also reduce hardware costs.
- the V2X application program running in the TEE of the V2X communication device may also perform encryption or security verification processing on the V2X data when the V2X application program is processed.
- the V2X application running in the TEE serves as the data receiver, remember that the data received by the V2X application by calling the first communication module is the first V2X data, then the V2X application first performs a security check on the first V2X data and Decryption processing.
- the V2X application program further processes the first V2X data that has passed the security check and decryption; when the V2X application program running in the TEE serves as the data sender, the V2X application program can determine that the data that needs to be sent is For the second V2X data, the V2X application first encrypts and signs the second V2X data, and then the V2X application calls the first communication module to send the encrypted and signed second V2X data.
- the V2X communication device when the V2X communication device provided by this embodiment receives or sends data in the TEE, it can further encrypt and sign the data in the TEE, or decrypt and secure the data in the TEE.
- the verification operation can further ensure the security of the V2X data processed by the V2X application.
- a hardware security module may also be provided in the V2X communication device, and the V2X application program may verify the received V2X data by calling the HSM.
- the HSM supports secure algorithm processing, secure storage of keys and data.
- FIG. 6 is a schematic structural diagram of an embodiment of a V2X communication device provided by this application.
- the V2X communication device shown in FIG. 4 The HSM is configured to be able to be called by the application in the TEE, but not in the REE.
- the HSM is called to perform security verification and decryption processing on the first V2X data, and the HSM sends the processed first V2X data
- the first V2X data can be directly processed without decryption and security verification of the first V2X data; similarly, when the V2X communication device shown in Figure 6 is used as the data
- the sender generates the second V2X data to be sent, it calls the HSM to encrypt and sign the second V2X data.
- the HSM sends the processed second V2X data to the V2X application, which is not necessary for the V2X application in the TEE.
- the first communication module can be directly called to send the second V2X data.
- the V2X communication device provided by this embodiment can set up an independent HSM outside the AP processor according to actual usage conditions to perform security operations such as encryption, decryption, signature, and verification of V2X data, thereby reducing the calculation of the AP processor.
- the HSM is configured to be called only by applications in the TEE, which can further ensure the security performance of the V2X application when performing secure operations on the V2X data.
- the HSM set in the V2X communication device is connected to the V2X baseband processing unit in the first communication module, and is called when the V2X baseband processing unit processes V2X data.
- the V2X communication device serves as the data receiver
- the V2X baseband processing unit receives the first V2X data
- the HSM is called to perform security verification and decryption processing on the first V2X data
- the HSM sends the processed first V2X data to The V2X baseband processing unit, and then the V2X baseband processing unit sends the first V2X data to the V2X application in the TEE for processing
- the V2X communication device is the data sender, the V2X application generates the second V2X data to be sent, and calls the V2X baseband
- the V2X baseband processing unit first calls the HSM to encrypt and sign the second V2X data.
- the HSM sends the processed second V2X data to the V2X baseband
- the V2X communication device can also set an independent HSM in the V2X communication baseband processing unit outside the AP processor according to actual usage, so that the V2X communication baseband processing unit is in the process of sending or receiving V2X data. It can perform security operations such as encryption, decryption, signature, and verification of V2X data, thereby reducing the amount of calculation of the AP processor, and the HSM is only connected to the V2X communication baseband processing unit in the first communication module, and the first communication module is configured as Only being able to be called by the application in the TEE can further ensure the safety performance of the V2X application during the safe operation of the V2X data.
- security operations such as encryption, decryption, signature, and verification of V2X data
- the foregoing embodiments are directed to the process of running V2X applications in a TEE to receive, send, and process V2X data in a V2X communication device, so as to ensure the safety of the V2X application during V2X communication.
- the V2X application needs to further send data to devices other than the V2X communication device, or needs to receive data sent by devices other than the V2X communication device, because the V2X application is set in the TEE, it also needs to send data to other devices.
- the physical interface or communication interface of the V2X can be configured accordingly to further ensure the safety of V2X applications when processing V2X data.
- FIG. 7 is a schematic structural diagram of an embodiment of a V2X communication device provided by this application.
- the V2X communication device shown in FIG. 6 The external physical interface is further divided into a first external interface and a second external interface.
- the specific implementation form of the external physical interface includes, but is not limited to: an Ethernet (ethernet) interface, a wireless fidelity (Wi-Fi) interface, and a universal serial bus (USB) interface.
- the external device connected to the first external interface is recorded as the first external device, and the first external interface is configured to be called by the application in the TEE, but not by the application in the REE; when the first external interface When called by the V2X application in the TEE, the V2X application can transmit data between the first external interface and the first external device.
- the external device connected to the second external interface is marked as the second external device.
- the second external interface is configured to be called by the application in the REE, but not by the application in the TEE; when the second external interface is called by the REE When called by other applications in, the other applications can transmit data between the second external interface and the second external device. That is, in the embodiment of the present application, the external interface of the V2X communication device is divided into TEE and REE calls, so that the external interface used when the application program running in the TEE and REE sends data to the external device is physically isolated.
- the V2X communication unit shown in FIG. 7 may further include: a data acquisition unit, which is configured to be called only by an application in the TEE, but not by an application in the REE; when the data acquisition unit is called by the TEE When the V2X application in the V2X application is called, the V2X application can obtain the state data used to represent the vehicle state through the data acquisition unit.
- a data acquisition unit which is configured to be called only by an application in the TEE, but not by an application in the REE; when the data acquisition unit is called by the TEE
- the V2X application in the V2X application is called, the V2X application can obtain the state data used to represent the vehicle state through the data acquisition unit.
- the data acquisition unit that can be called by the V2X application in the TEE may include: controller area network (CAN) data unit, global navigation satellite system (global navigation satellite system) , GNSS) data unit and sensor unit.
- CAN controller area network
- global navigation satellite system global navigation satellite system
- GNSS global navigation satellite system
- the CAN data unit includes a CAN-supported microcontroller unit (MCU) and a CAN data unit composed of a CAN transceiver, which is used to obtain the vehicle speed, steering, braking and other driving data of the vehicle where the V2X communication device is located;
- the GNSS data unit supports For GNSS positioning function, the GNSS data unit can be an independent chip, or can also be integrated in the chip where the application processor is located;
- the sensor data unit can include, for example: gyroscopes and acceleration sensors, etc., used to obtain real-time status data of the vehicle,
- the sensor data unit can be an independent chip, or can also be integrated in the chip where the application processor is located, or connected to the GNSS chip.
- the external interface that can be called by the V2X application running in the TEE is different from the external interface that can be called by the application running in the REE, so that the TEE and the application running in the REE can be called differently.
- the external interface used by the program to send data to the external device is physically isolated, so that the physical interface that the V2X application can call is safe, thereby further ensuring the safety of the V2X application when sending V2X data to the outside.
- FIG. 8 is a schematic diagram of the software structure in the TEE provided by this application, which shows the software modules in the V2X communication device as shown in FIG. 7 where the V2X application running in the TEE calls related modules for data transmission. relationship.
- the V2X application processing module is used to run V2X applications
- the V2X network transmission protocol processing module is used to process V2X data
- the V2X network transmission protocol processing module can call the secure server module (HSM) through the V2X security module to perform secure operations on V2X data.
- HSM secure server module
- the V2X access layer protocol processing module is used to send or receive V2X data
- the V2X algorithm processing module is used to obtain vehicle status data through data acquisition units such as vehicle data modules and vehicle location modules.
- FIG. 9 shows a V2X data receiving process flow, where, when the process starts, the V2X access layer protocol
- the processing module receives the first V2X data, and sends the received first V2X data to the V2X network transmission protocol processing module running in the TEE through the physical interface or the inter-core communication interface.
- the V2X network transmission protocol processing module sends the first V2X data to the V2X security module for signature verification and decryption.
- the V2X security module can call the security server block to perform signature verification and decryption on the first V2X data. If the V2X data signature verification fails, the process ends; when the first V2X data signature verification is passed, the first V2X data that has passed the signature verification and decryption is sent to the V2X application processing module for further processing.
- the V2X application processing module After receiving the first V2X data, the V2X application processing module needs to determine whether the first V2X data needs to be processed locally. For example, for some notification information data that needs to be directly forwarded by the V2X communication device to other vehicles or equipment, the V2X application processing module determines that no calculation processing is required locally, and then directly sends the received first V2X data to the external device by calling the external interface .
- the V2X application processing module will send the received first V2X data to the V2X algorithm processing module after determining the local need for calculation processing, and the V2X algorithm processing module After calculating the vehicle speed, steering, braking, position and other data obtained from the vehicle data module and the position data module, the calculated processing result such as collision warning information is obtained and returned to the V2X application processing module. Finally, the V2X application processing module sends the obtained processing result to the external device through the external communication interface, thereby ending the process.
- FIG. 10 shows a sending process flow of V2X data, in which, when the process starts, the V2X application processing module
- the second V2X data to be sent can be generated according to a certain cycle.
- the V2X algorithm processing module obtains data such as vehicle speed and location from the vehicle data module and the position data module, and then generates a piece of second V2X data to be sent.
- the V2X application processing module sends the second V2X data to the V2X network transmission protocol processing module for sending, and the V2X network transmission protocol processing module calls the security service module through the V2X security module to sign and encrypt the second V2X data.
- the V2X network transmission protocol module sends the processed second V2X data to the V2X access layer protocol processing module through the physical interface or the inter-core communication interface. Finally, the V2X access layer protocol processing module sends the second V2X data on the air interface, thereby ending the process.
- the HSM set by the V2X communication device provided in the embodiment shown in Figures 8-10 is connected to the TEE of the AP processor and can be invoked by the V2X application running in the TEE.
- the HSM set by the V2X communication device can be connected to the V2X baseband processing unit in the first communication module, and can be called by the V2X baseband processing unit.
- FIG. 11 is a schematic structural diagram of an embodiment of a V2X communication device provided by this application. The difference between the V2X communication device shown in FIG. 11 and the V2X communication device shown in FIG. 7 is that the HSM and the first communication module The V2X baseband processing unit is connected.
- FIG. 12 is a schematic diagram of the software structure in the TEE provided by this application, which shows the software module relationship in the V2X communication device shown in FIG. 11 in which the V2X application running in the TEE calls related modules for data transmission.
- the V2X application processing module is used to run V2X applications
- the V2X network transmission protocol processing module is used to process V2X data
- the V2X access layer protocol processing module is used to send or receive V2X data
- the V2X access layer protocol processing module can call V2X
- the security module HSM
- the V2X algorithm processing module is used to obtain vehicle status data through data acquisition units such as the vehicle data module and the vehicle location module.
- FIG. 12 A specific application of the software structure shown in Figure 12 is the first V2X data receiving process.
- Figure 13 shows a V2X data receiving process flow, where, when the process starts, the V2X access layer protocol The processing module receives the first V2X data, and calls the received first V2X data to the V2X security module for decryption and signature verification.
- the first V2X data signature verification fails, the process ends; when the first V2X data signature verification is passed, the first V2X data that has passed the signature verification and decryption is sent through the physical interface or the inter-core communication interface To the V2X network transmission protocol processing module running in the TEE.
- the V2X network transmission protocol processing module further sends the first V2X data to the V2X application processing module for further processing. Similarly, after receiving the first V2X data, the V2X application processing module needs to determine whether the first V2X data needs to be processed locally. For the processing of the first V2X data performed by the V2X application processing module, please refer to the embodiment shown in FIG. 9, which will not be repeated.
- FIG. 14 shows a sending process flow of V2X data, in which, when the process starts, the V2X application processing module
- the second V2X data to be sent can be generated according to a certain cycle.
- the V2X algorithm processing module obtains data such as vehicle speed and location from the vehicle data module and the position data module, and then generates a piece of second V2X data to be sent.
- the V2X application processing module sends the second V2X data to the V2X network transmission protocol processing module for sending, and the V2X network transmission protocol processing module sends the second V2X data to the V2X access layer protocol processing through the physical interface or the inter-core communication interface.
- the V2X access layer protocol processing module can use the V2X security module to call the security service module to sign and encrypt the second V2X data, and then send the second V2X data over the air interface, thereby ending the process.
- the present application also provides a V2X communication method, which can be executed by the AP processor in any of the above embodiments.
- the V2X communication method may include: the AP processor uses V2X running in a trusted execution environment.
- the application program calls the first communication module to send or receive data of the V2X application; and/or, the AP processor calls the second communication module to send or receive data of other applications through other applications running in the untrusted execution environment .
- the method further includes: the AP processor performs security verification on the first V2X data of the V2X application received by the first communication module through the trusted execution environment.
- the method further includes: the AP processor invokes the hardware security module HSM through the trusted execution environment to perform security verification on the first V2X data of the V2X application program received by the first communication module.
- the method further includes: the AP processor encrypts the second V2X data generated by the V2X application program through the trusted execution environment.
- the method further includes: the AP processor invokes the hardware security module HSM through the trusted execution environment to encrypt the second V2X data generated by the V2X application.
- the method may further include: the AP processor calls the first external interface through the V2X application running in the trusted execution environment, and transmits the data of the V2X application to the external device connected to the first external interface; and/ Or, the AP processor calls the second external interface through other applications running in the non-trusted execution environment, and transmits data of other applications to the external device connected to the second external interface.
- the method further includes: the method further includes: the AP processor generates a processing result based on the state data and the first V2X data through the V2X application program running in the trusted execution environment, and calls the first external interface to send the processing result result.
- the method further includes: the AP processor sends the first V2X data through the first external interface through the V2X application program running in the trusted execution environment.
- the method further includes: the AP processor generates the second V2X data through the state data through the V2X application program running in the trusted execution environment.
- the execution subject of the above method executed by the AP processor may also be a corresponding V2X application in the AP processor, or other corresponding applications in the AP processor.
- the memory of the AP processor may store computer executable program code, the program code includes instructions; when the AP processor executes the instructions, the instructions cause the AP processor to execute the above
- each module in the V2X communication device except the AP processor may also store computer executable program code, for example, the V2X communication shown in FIG. 11
- the baseband processing unit can store program codes including instructions. When the V2X communication baseband processing unit executes the instructions, it can make it execute related actions such as calling HSM executed by the V2X communication baseband processing unit.
- the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
- each function module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
- the first communication module and the second communication module may be two different modules or integrated into one module.
- the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
- plural herein refers to two or more than two.
- the term “and/or” in this article is only an association relationship describing the associated objects, which means that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, exist alone B these three situations.
- the character “/” in this article generally indicates that the associated objects before and after are in an “or” relationship; in the formula, the character "/" indicates that the associated objects before and after are in a "division" relationship.
- the size of the sequence numbers of the foregoing processes does not mean the order of execution.
- the execution order of the processes should be determined by their functions and internal logic, and should not be used for the implementation of this application.
- the implementation process of the example constitutes any limitation.
- the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or may also be a volatile memory. (volatile memory), such as random-access memory (random-access memory, RAM).
- the memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this.
- the memory in the embodiments of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
- the disclosed device and method may be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be divided. It can be combined or integrated into another device, or some features can be omitted or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate parts may or may not be physically separate.
- the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- software When implemented by software, it can be implemented in the form of a computer program product in whole or in part.
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, a network device, a terminal, or other programmable devices.
- the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
- the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a digital video disc (DVD)), or a semiconductor medium (for example, SSD).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请提供一种V2X通信方法、装置及车辆,其中在V2X通信装置的AP处理器中同时运行TEE和REE,AP处理器中的用于进行V2X通信的V2X应用程序全都运行在TEE中,从而将V2X应用程序与其他应用程序隔离,使得V2X应用程序能够在TEE中独立地处理V2X数据,通过TEE保证了V2X应用程序在处理V2X数据时不会被其他应用程序所影响或攻击,从而保证了运行在TEE中的V2X应用程序收发V2X数据时的安全,由于本申请提供的V2X通信装置能够在一个AP处理器上运行的TEE即可提高V2X应用程序进行V2X通信时的安全性能,并且不需要再设置单独的处理器,从而简化了V2X通信装置的结构,还能够降低硬件成本。
Description
本申请要求于2019年12月31日提交中国专利局、申请号为201911403731.X、申请名称为“V2X通信方法、装置及车辆”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及车辆网技术领域,尤其涉及一种车辆到一切(vehicle to everything,V2X)通信方法、装置及车辆。
随着网络技术及智能车辆技术的发展,车联网越来越受到广泛关注。目前,在车联网通信系统中,车辆到一切(vehicle to everything,V2X)通信装置(或称为车联网终端)设置在车辆内部,通过车用无线通信技术实现V(车)与X(车、人、交通路侧基础设施和网络)智能信息的交互。
由于V2X通信数据与车辆的安全密切相关,也就需要保证V2X通信装置进行V2X通信时数据的安全。在一种技术中,发送数据的V2X通信装置可以使用密钥对V2X数据加密后进行发送,相应地,接收数据的V2X通信装置可以使用密钥对V2X数据解密后进行处理,但是在这种技术中由于V2X通信装置本身的安全性能较低,在V2X通信装置内部其他应用程序可能提供威胁V2X通信装置进行V2X通信的应用程序的入口,从而降低了V2X通信的安全。而在另一种技术中,V2X通信装置内可以设置两个不同的处理器,一个处理器处理V2X通信相关的应用程序,另一个处理器处理其他应用程序,从物理上对V2X通信进行隔离,但是这种技术极大地提高了V2X通信装置的硬件成本。
因此,如何使V2X通信装置降低硬件成本的同时还能够提高安全性能,是本领域亟需解决的技术问题。
发明内容
本申请提供一种V2X通信方法、装置及车辆,以解决现有技术中V2X通信装置不能在降低硬件成本的同时,还能够提高安全性能的技术问题。
本申请第一方面提供一种V2X通信装置,包括:AP处理器,以及分别与AP处理器连接的第一通信模块和第二通信模块,AP处理器上运行有可信执行环境和非可信执行环境,可信执行环境用于运行V2X应用程序,非可信执行环境用于运行除V2X应用程序外的其他应用程序。具体地,AP处理器的可信执行环境中运行的V2X应用程序,可以通过调用第一通信模块发送或接收V2X应用程序;而AP处理器的非可信执行环境中运行的其他应用程序,可以通过调用第二通信模块发送或接收其他应用程序的数据。
因此,本实施例提供的V2X通信装置,在AP处理器中同时运行TEE和REE,而AP处理器中的用于进行V2X通信的V2X应用程序全都运行在TEE中,因此将V2X应用程序与其他应用程序隔离,使得V2X应用程序能够在TEE中独立地处理V2X数据,通过TEE保证了 V2X应用程序在处理V2X数据时不会被其他应用程序所影响或攻击;同时,运行在TEE中的V2X应用程序还可以调用同样独立设置的第一通信模块实现V2X数据的接收或发送,使得V2X应用程序使用的数据收发模块只能被TEE中的应用程序调用,从而与REE中其他应用程序能够调用的第二通信模块隔离,进一步保证了运行在TEE中的V2X应用程序收发V2X数据时的安全。综上,本实施例提供的V2X通信装置,能够在一个AP处理器上运行的TEE即可提高V2X应用程序进行V2X通信时的安全性能,并且不需要再设置单独的处理器,从而简化了V2X通信装置的结构,还能够降低硬件成本。
在本申请第一方面一实施例中,所述可信执行环境中V2X应用程序除了接收或发送V2X应用程序,V2X应用程序还可以在可信执行环境中,对第一通信模块接收到的V2X应用程序的第一V2X数据进行安全校验;而当安全校验通过,V2X应用程序对第一V2X数据进行处理;当安全校验不通过,V2X应用程序不会继续对第一V2X数据进行处理。可选地,同时,V2X应用程序还可以在可信执行环境中,对待发送的第二V2X数据进行加密,并将加密后的第二V2X数据通过第一通信模块发送。
因此,本实施例提供的V2X通信装置,当V2X应用程序在TEE中进行数据的接收或发送时,能够进一步在TEE中对数据进行加密、签名,或者在TEE中对数据进行解密、安全校验的操作,能够进一步保证了V2X应用程序所处理的V2X数据的安全。
在本申请第一方面一实施例中,V2X通信装置中还包括:与AP处理器连接的HSM,用于对第一通信模块接收到的V2X应用程序的第一V2X数据进行安全校验;即,V2X通信装置可以调用AP处理器连接的HSM对接收到的第一V2X数据进行安全校验;而当安全校验通过,V2X应用程序对第一V2X数据进行处理;当安全校验不通过,V2X应用程序不会继续对第一V2X数据进行处理。可选地,同时,V2X应用程序还可以在可信执行环境中,调用HSM对待发送的第二V2X数据进行加密,并将加密后的第二V2X数据通过第一通信模块发送。
综上,本实施例提供的V2X通信装置,可以根据实际使用情况,在AP处理器之外设置独立的HSM,进行V2X数据的加密解密、签名以及验证等安全操作,从而减少AP处理器的运算量,并且HSM被配置为仅仅能够被TEE中的应用程序调用,还能够进一步保证了V2X应用程序在对V2X数据进行安全操作时的安全性能。
在本申请第一方面一实施例中,V2X通信装置中所设置的HSM与第一通信模块中的V2X基带处理单元连接,并在V2X基带处理单元处理V2X数据时调用;即,V2X基带处理单元接收到第一V2X数据后,调用HSM对接收到的第一V2X数据进行安全校验;而当安全校验通过,V2X基带处理单元将第一V2X数据发送至V2X应用程序进行处理;当安全校验不通过,V2X应用程序不会将第一V2X数据发送至V2X应用程序。可选地,同时,V2X基带处理单元还可以对V2X应用程序待发送的第二V2X数据进行加密,并将加密后的第二V2X数据通过第一通信模块发送。
综上,本实施例提供的V2X通信装置,同样可以根据实际使用情况,在AP处理器之外的V2X通信基带处理单元设置独立的HSM,使得V2X通信基带处理单元在V2X数据发送或接收过程中即可进行V2X数据的加密解密、签名以及验证等安全操作,从而减少AP处理器的运算量,并且HSM仅与第一通信模块中的V2X通信基带处理单元连接,而第一通信模块被配置为仅仅能够被TEE中的应用程序调用,还能够进一步保证了V2X应用程序在对 V2X数据进行安全操作时的安全性能。
在本申请第一方面一实施例中,V2X通信装置还包括:分别与AP处理器连接的第一外部接口和第二外部接口;其中,当第一外部接口被TEE中的V2X应用程序调用时,V2X应用程序可以通过该第一外部接口与第一外部设备之间传输数据。当第二外部接口被REE中的其他应用程序调用时,其他应用程序可以通过该第二外部接口与第二外部设备之间传输数据。
综上,本实施例提供的V2X通信装置中,TEE中运行的V2X应用程序所能够调用的外部接口与REE中运行的应用程序所能够调用的外部接口不同,从而将TEE和REE中运行的应用程序向外部设备发送数据时使用的外部接口进行物理隔离,使得V2X应用程序能够调用的物理接口本身是安全的,从而进一步保证了V2X应用程序在向外部发送V2X数据时的安全。
在本申请第一方面一实施例中,V2X通信装置还包括:数据获取单元,能够被可信执行环境调用,用于获取表示车辆状态的状态数据。
综上,本实施例提供的V2X通信装置,使得TEE环境中运行的V2X应用程序能够单独地调用确保安全的数据获取单元获取状态数据,该数据获取单元不会被REE中的应用程序调用,从而通过TEE保障V2X应用程序获取的状态数据安全,进一步保证了V2X应用程序处理V2X数据时的安全。
在本申请第一方面一实施例中,V2X应用程序具体用于,根据状态数据和第一V2X数据,生成处理结果,并通过第一外部接口发送处理结果。
综上,本实施例针对V2X通信装置接收到的第一V2X数据需要V2X应用程序处理,则V2X应用程序可以在通过TEE保障V2X应用程序获取的状态数据安全的情况下获取车辆的状态数据,还可以在通过TEE保障的第一V2X数据安全的情况下,生成处理结果,从而使得V2X应用程序能够进一步调用能够保障安全的第一外部接口发送处理结果,从而在V2X应用程序处理V2X数据的全过程通过TEE进行保护,进一步保证了V2X应用程序处理V2X数据时的安全。
在本申请第一方面一实施例中,V2X应用程序具体用于,V2X应用程序具体用于,通过第一外部接口发送第一V2X数据。
综上,本实施例针对V2X通信装置接收到的第一V2X数据是不需要V2X应用程序处理,而是直接进行转发,则V2X应用程序可以直接调用能够保障安全的第一外部接口将接收到的第一V2X数据转发,从而保证了V2X应用程序在转发V2X数据时的安全。
在本申请第一方面一实施例中,V2X应用程序具体用于,V2X应用程序具体用于,通过状态数据生成第二V2X数据。
综上,本实施例针对V2X通信装置自己根据车辆的状态数据生成待发送的第二V2X数据的过程,其中,由于V2X应用程序可以在通过TEE保障V2X应用程序获取的状态数据安全的情况下获取车辆的状态数据,还能够在TEE中生成第二V2X数据,随后进行发送。因此,在V2X应用程序生成、发送V2X数据的全过程通过TEE进行保护,进一步保证了V2X应用程序处理V2X数据时的安全。
本申请第二方面提供一种V2X通信方法,可应用于本申请第一方面提供的V2X通信装置中的AP处理器,其中,方法包括:AP处理器通过可信执行环境中运行的V2X应用程序, 调用第一通信模块发送或接收V2X应用程序的数据;和/或,AP处理器通过非可信执行环境中运行的其他应用程序,调用第二通信模块发送或接收其他应用程序的数据。
在本申请第二方面一实施例中,所述方法还包括:AP处理器通过可信执行环境对第一通信模块接收到的V2X应用程序的第一V2X数据进行安全校验。
在本申请第二方面一实施例中,所述方法还包括:AP处理器通过可信执行环境调用硬件安全模块HSM,对第一通信模块接收到的V2X应用程序的第一V2X数据进行安全校验。
在本申请第二方面一实施例中,所述方法还包括:AP处理器通过可信执行环境,对V2X应用程序生成的第二V2X数据进行加密。
在本申请第二方面一实施例中,所述方法还包括:AP处理器通过可信执行环境,调用硬件安全模块HSM,对V2X应用程序生成的第二V2X数据进行加密。
在本申请第二方面一实施例中,V2X通信装置还包括:分别与AP处理器连接的第一外部接口和第二外部接口;所述方法还包括:AP处理器通过可信执行环境中运行的V2X应用程序,调用第一外部接口,向第一外部接口连接的外部设备传输V2X应用程序的数据;和/或,AP处理器通过非可信执行环境中运行的其他应用程序,调用第二外部接口,向第二外部接口连接的外部设备传输其他应用程序的数据。
在本申请第二方面一实施例中,V2X通信装置还包括:与AP处理器连接的数据获取单元,用于获取标识车辆状态的状态数据;所述方法还包括:AP处理器通过可信执行环境中运行的V2X应用程序,根据状态数据和第一V2X数据,生成处理结果,并调用第一外部接口发送处理结果。
在本申请第二方面一实施例中,所述方法还包括:AP处理器通过可信执行环境中运行的V2X应用程序,第一外部接口发送第一V2X数据。
在本申请第二方面一实施例中,所述方法还包括:AP处理器通过可信执行环境中运行的V2X应用程序,通过状态数据生成第二V2X数据。
有关第二方面提供的V2X通信方法的具体实现方式及有益效果,可参照本申请第一方面对于V2X通信装置的描述,不再赘述。
本申请第三方面提供一种V2X通信装置,该V2X通信装置用于实现上述方法中的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
本申请第四方面提供一种包含指令的计算机程序产品,当其运行时,使得V2X通信装置执行上述第二方面或第二方面的各种可能的实现方式中的方法。
本申请第五方面提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其运行时,使得V2X通信装置执行上述第一方面或第一方面的各种可能的实现方式中的方法。
本申请第六方面提供一种芯片系统,该芯片系统包括处理器,还可以包括存储器,用于实现上述方法中V2X通信装置的功能。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。
本申请第七方面提供一种车辆,包括如本申请第一方面任一实施例中的V2X通信装置。
综上,本申请提供一种V2X通信方法、装置及车辆,其中在AP处理器中同时运行TEE和REE,而AP处理器中的用于进行V2X通信的V2X应用程序全都运行在TEE中,因此将 V2X应用程序与其他应用程序隔离,使得V2X应用程序能够在TEE中独立地处理V2X数据,通过TEE保证了V2X应用程序在处理V2X数据时不会被其他应用程序所影响或攻击;同时,运行在TEE中的V2X应用程序还可以调用同样独立设置的第一通信模块实现V2X数据的接收或发送,使得V2X应用程序使用的数据收发模块只能被TEE中的应用程序调用,从而与REE中其他应用程序能够调用的第二通信模块隔离,进一步保证了运行在TEE中的V2X应用程序收发V2X数据时的安全。综上,本实施例提供的V2X通信装置,能够在一个AP处理器上运行的TEE即可提高V2X应用程序进行V2X通信时的安全性能,并且不需要再设置单独的处理器,从而简化了V2X通信装置的结构,还能够降低硬件成本。
图1为本申请所应用场景的示意图;
图2为一种V2X通信装置的结构示意图;
图3为另一种V2X通信装置的结构示意图;
图4为本申请提供的V2X通信装置一实施例的结构示意图;
图5为本申请提供的应用处理器的软件架构示意图;
图6为本申请提供的V2X通信装置一实施例的结构示意图;
图7为本申请提供的V2X通信装置一实施例的结构示意图;
图8为本申请提供的TEE中的软件结构示意图;
图9示出了一种V2X数据的接收处理流程;
图10示出了一种V2X数据的发送处理流程;
图11为本申请提供的V2X通信装置一实施例的结构示意图;
图12为本申请提供的TEE中的软件结构示意图;
图13示出了一种V2X数据的接收处理流程;
图14示出了一种V2X数据的发送处理流程。
下面在介绍本申请实施例之前,先结合附图,对本申请应用的场景以及该应用场景中存在的技术问题进行说明。
图1为本申请所应用场景的示意图,如图1所示,本申请可应用在车辆网通信的应用场景中,其中,如图1所示的车辆为了进行通信,可以在车辆上设置V2X通信装置(或称为:车辆网终端),通过所设置的V2X通信装置,图中的车辆可以与其他车辆进行车与车(vehicle to vehicle,V2V)通信,与其他行人进行车与行人(vehicle to pedestrian,V2P)通信,与其他路侧基础设备进行车与基础设施(vehicle to infrastructure,V2I)通信,或者通信网络进行车与网络(vehicle to network,V2N)通信。V2X通信能够实现车辆与行人、其他车辆、路侧设备、网络之间的全方位连接和高效信息交互,实现信息服务、交通安全、交通效率等功能。
随着网络技术以及智能车辆技术的发展,车辆通过V2X通信装置能够实现的功能也越来越丰富,例如,V2X通信装置通过V2I和V2N通信可以获取各种信息服务,包括交通信号灯信息,附近区域车辆信息,车辆导航信息,紧急救援信息,娱乐服务信息等;V2X通 信装置通过V2V和V2P通信可以实时获取周围车辆的车速、位置、行车情况及行人活动等信息,并通过智能算法实现碰撞预警功能,避免车辆发生交通事故;V2X通信装置通过V2I通信可以实现车速引导等功能以提高交通效率。
由于V2X通信装置通过V2X通信所提供的服务与安全性能息息相关,一旦车辆使用的V2X通信装置在通信过程中传输的数据被非法篡改或被仿冒,或者V2X通信装置上运行的V2X应用和算法过程被攻击,会严重影响车辆的正常行驶,甚至威胁道路上其他车辆和行人的安全,因此V2X通信装置需要在进行V2X通信以及提供相关服务时,保证其数据安全。
在一些技术中,V2X通信装置在进行V2X通信时,可以对所传输的数据进行加密以保证数据安全。例如,图2为一种V2X通信装置的结构示意图,如图2所示,能够进行V2X通信的V2X应用程序可以运行在V2X通信装置中的应用处理器上,当所述V2X通信装置作为发送方发送V2X数据时,V2X应用程序通过密钥对V2X数据进行签名和加密后再通过通信模块进行发送;当所述V2X通信装置作为接收方接收V2X数据时,V2X应用程序通过通信模块接收到V2X数据后,还需要通过身份认证服务器获取对称密钥对V2X数据进行解密。从而在整个V2X数据的发送和接收的传输过程中,通过签名和加密的安全机制保护V2X数据不被篡改。
然而,在如图2所示的技术中,由于V2X通信装置中的应用处理器除了运行V2X应用程序,还会同时运行其他应用程序,例如图中示例的应用程序A和应用程序B,应用程序A和B也会分别调用通信模块发送或接收A数据以及B数据。从而造成了应用处理器上运行的V2X应用程序在计算处理过程中,容易受到其他应用程序带来的攻击威胁,导致V2X应用程序异常而威胁车辆的安全。
在另一些技术中,V2X通信装置中可以设置不同的应用处理器,使V2X应用程序与其他应用程序运行在不同的应用处理器内,实现V2X应用程序的隔离。例如,图3为另一种V2X通信装置的结构示意图,如图3所示,V2X通信装置中设置有应用处理器1和应用处理器2至少两个应用处理器,能够进行V2X通信的V2X应用程序在应用处理器1中运行,除V2X应用程序之外的其他应用程序在应用程序处理器2中运行。则当所述V2X通信装置发送或接收V2X数据时,V2X应用程序通过调用通信模块1发送或接收V2X数据,所述通信模块1可以集成在应用处理器1中,或者独立设置。相应地,应用处理器2中应用程序A和B可以调用通信模块发送或接收A数据和B数据。
然而,在如图3所示的技术中,为了确保V2X应用程序的独立运行,V2X通信装置中需要设置至少两个应用处理器实现应用程序之间的硬件隔离,而由于目前处理器高昂的成本,V2X通信装置中设置的多个处理器极大地提高了整个V2X通信装置的成本。
综上,V2X通信装置在如图2所示的技术中安全性能较差,而在图3所示的技术中硬件成本较高,上述两种技术都存在各自的不足,而如何使V2X通信装置降低件成本的同时,还能够提高安全性能,是本领域亟需解决的技术问题。
因此,为了解决上述技术问题,本申请提供一种V2X通信方法及装置,以解决现有技术中V2X通信装置不能在降低硬件成本的同时,还能够提高安全性能的技术问题。下面结合附图,以具体地实施例对本申请的技术方案进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例不再赘述。
图4为本申请提供的V2X通信装置一实施例的结构示意图,如图4所示,本申请提供 的V2X通信装置可以设置在如图1所示的车辆上,用于如图1所示的车辆进行V2X通信。所述V2X通信装置包括:应用(application,AP)处理器,所述AP处理器上运行有可信执行环境(trusted execution environment,TEE)和非可信执行环境(rich execution environment,REE)。
其中,所述TEE基于ARM Trustzone的安全技术,将操作系统隔离成两个世界,即安全世界和非安全世界,通过硬件实现安全隔离,包括对外设的隔离,TEE是安全世界的软件运行环境,与非安全世界的软件运行环境REE之间具有类似于硬件级别的安全隔离机制,REE中运行的应用程序无法直接访问TEE中运行的应用程序。在本实施例中,AP处理器中运行的TEE用于运行用于进行V2X通信的V2X应用程序,同时,AP处理器中可以包括一个或多个V2X应用程序,AP处理器中的所有V2X应用程序都运行在TEE中,在图4中以V2X应用程序作为示例。AP处理器中运行的REE用于运行AP处理器中除V2X应用程序之外的应用程序,也就是不进行V2X通信的应用程序,本实施例中将除V2X应用程序之外的应用程序记为其他应用程序,在图4中以其他应用程序包括:应用程序A、应用程序B……作为示例。
所述V2X通信装置还包括:第一通信模块和第二通信模块,其中,第一通信模块连接AP处理器,并且第一通信模块被配置为仅能够被TEE中运行的V2X应用程序调用、不能被REE中运行的其他应用程序调用,并在被调用时发送或接收V2X应用程序的V2X数据;第二通信模块也连接AP处理器,并且第二通信模块被配置为仅能够被REE中运行的其他应用程序调用、而不能被TEE中运行的V2X应用程序调用,并在被调用时发送或接收其他应用程序的数据。
可选地,所述第一通信模块可以包括:V2X通信基带处理单元和V2X通信射频单元,其中,V2X通信基带处理单元支持V2X通信技术的基带处理功能,V2X通信射频单元支持V2X通信技术的射频信号处理功能。所述第一通信模块用于发送或接收V2X数据时,所支持的技术标准可以是基于WAVE技术(又称IEEE 802.11p)的DSRC标准,也可以是基于蜂窝技术的(cellular)C-V2X标准。所述第二通信模块可以包括:蜂窝通信基带处理单元和蜂窝通信射频单元,其中,蜂窝通信基带处理单元:支持蜂窝通信技术(2G/3G/4G/5G)的基带处理功能,蜂窝通信射频单元:支持蜂窝通信技术(2G/3G/4G/5G)的射频信号处理功能。
进一步可选地,所述AP处理器和第二通信模块中的蜂窝基带处理器单元可以集成在同一个芯片上,所述芯片可以是系统级芯片(system on chip,SoC),也可以是基带芯片;或者,蜂窝基带处理器单元和AP处理器还可以设置在独立的芯片上。或者,所述AP处理器、第二通信模块中的蜂窝基带处理单元,以及第一通信模块中的V2X基带处理单元可以集成在同一个芯片上,所述芯片可以是SoC,也可以是基带芯片;或者,蜂窝基带处理器单元、V2X基带处理单元和AP处理器还可以设置在独立的芯片上。所述V2X通信射频单元,可以设置在独立的芯片上,与V2X通信基带处理单元连接;或者,所述V2X通信射频单元还可以与蜂窝通信射频单元设置在同一个芯片上,所述芯片可以是SoC,也可以是蜂窝通信射频芯片。
更为具体地,图5为本申请提供的应用处理器的软件架构示意图,其中,对于TEE中运行的V2X应用程序,运行在独立的安全OS中,处于应用层的V2X应用程序,或者V2X 算法可以通过V2X协议栈以及安全服务,进一步调用第一通信模块发送或接收V2X数据。对于REE中运行的应用程序,运行在独立的OS中,处于应用层的应用程序同样可以通过中间件调用第二通信模块发送或接收数据。
通过图4和图5可以看出,本实施例提供的V2X通信装置中可以设置一个AP处理器,而在该AP处理器中同时运行TEE和REE,而AP处理器中的用于进行V2X通信的V2X应用程序全都运行在TEE中,因此将V2X应用程序与其他应用程序隔离,使得V2X应用程序能够在TEE中独立地处理V2X数据,通过TEE保证了V2X应用程序在处理V2X数据时不会被其他应用程序所影响或攻击;同时,运行在TEE中的V2X应用程序还可以调用同样独立设置的第一通信模块实现V2X数据的接收或发送,使得V2X应用程序使用的数据收发模块只能被TEE中的应用程序调用,从而与REE中其他应用程序能够调用的第二通信模块隔离,进一步保证了运行在TEE中的V2X应用程序收发V2X数据时的安全。因此,本申请提供的V2X通信装置,能够在一个AP处理器上运行的TEE即可提高V2X应用程序进行V2X通信时的安全性能,并且不需要再设置单独的处理器,从而简化了V2X通信装置的结构,还能够降低硬件成本。
进一步地,在上述实施例中,V2X通信装置的TEE中运行的V2X应用程序在处理器V2X应用程序时,还可以对V2X数据进行加密或者安全校验的处理。其中,当TEE中运行的V2X应用程序作为数据接收方时,记V2X应用程序通过调用第一通信模块接收到的数据为第一V2X数据,则V2X应用程序首先对第一V2X数据进行安全检验以及解密处理,随后,V2X应用程序进一步对通过安全校验以及解密后的第一V2X数据进行处理;当TEE中运行的V2X应用程序作为数据发送方时,记V2X应用程序可以确定需要发送的数据为第二V2X数据,则V2X应用程序首先对第二V2X数据进行加密以及签名处理,随后,V2X应用程序调用第一通信模块将加密签名后的第二V2X数据进行发送。
综上,本实施例提供的V2X通信装置,当V2X应用程序在TEE中进行数据的接收或发送时,能够进一步在TEE中对数据进行加密、签名,或者在TEE中对数据进行解密、安全校验的操作,能够进一步保证了V2X应用程序所处理的V2X数据的安全。
或者,在另一种可能的实现方式中,V2X通信装置中还可以设置硬件安全模块(hardware security module,HSM),V2X应用程序可以通过调用HSM对接收到的V2X数据进行校验。其中,所述HSM支持安全算法处理、密钥以及数据的安全存储。例如,图6为本申请提供的V2X通信装置一实施例的结构示意图,如图6所示的V2X通信装置在图4所示实施例的基础上,还包括与AP处理器连接的HSM,所述HSM被配置为能够被TEE中的应用程序调用,而不能对REE中的应用程序调用。则对于如图6所示的V2X通信装置,作为数据接收方在接收到第一V2X数据后,调用HSM对第一V2X数据进行安全校验以及解密处理,HSM将处理后的第一V2X数据发送至V2X应用程序,对于TEE中的V2X应用程序即可不需要对第一V2X数据进行解密以及安全校验,可以直接处理第一V2X数据;同样地,当如图6所示的V2X通信装置作为数据发送方生成待发送的第二V2X数据后,调用HSM对第二V2X数据进行加密以及签名处理,HSM将处理后的第二V2X数据发送至V2X应用程序,对于TEE中的V2X应用程序即可不需要对第二V2X数据进行加密以及签名,可以直接调用第一通信模块发送所述第二V2X数据。
综上,本实施例提供的V2X通信装置,可以根据实际使用情况,在AP处理器之外设 置独立的HSM,进行V2X数据的加密解密、签名以及验证等安全操作,从而减少AP处理器的运算量,并且HSM被配置为仅仅能够被TEE中的应用程序调用,还能够进一步保证了V2X应用程序在对V2X数据进行安全操作时的安全性能。
或者,在又一种可能的实现方式中,V2X通信装置中所设置的HSM与第一通信模块中的V2X基带处理单元连接,并在V2X基带处理单元处理V2X数据时调用。例如,当V2X通信装置作为数据接收方,在V2X基带处理单元接收到第一V2X数据后,调用HSM对第一V2X数据进行安全校验以及解密处理,HSM将处理后的第一V2X数据发送至V2X基带处理单元,再由V2X基带处理单元将第一V2X数据发送至TEE中的V2X应用程序处理;当V2X通信装置作为数据发送方,V2X应用程序生成待发送的第二V2X数据,调用V2X基带处理单元进行发送时,V2X基带处理单元首先调用HSM对第二V2X数据进行加密以及签名处理,HSM将处理后的第二V2X数据发送至V2X基带处理单元,则V2X基带处理单元将处理后的第二V2X数据发送至V2X射频单元发送。
综上,本实施例提供的V2X通信装置,同样可以根据实际使用情况,在AP处理器之外的V2X通信基带处理单元设置独立的HSM,使得V2X通信基带处理单元在V2X数据发送或接收过程中即可进行V2X数据的加密解密、签名以及验证等安全操作,从而减少AP处理器的运算量,并且HSM仅与第一通信模块中的V2X通信基带处理单元连接,而第一通信模块被配置为仅仅能够被TEE中的应用程序调用,还能够进一步保证了V2X应用程序在对V2X数据进行安全操作时的安全性能。
进一步地,上述各实施例针对V2X通信装置中,针对在TEE中运行V2X应用程序接收、发送V2X数据以及处理V2X数据的过程,以保证V2X应用程序进行V2X通信时的安全。而当V2X应用程序需要进一步向V2X通信装置之外的设备发送数据,或者需要接收V2X通信装置之外的设备发送的数据时,由于V2X应用程序设置在TEE之中,因此也还需要对其他设备的物理接口或者通信接口进行相应的配置,以进一步保证V2X应用程序在处理V2X数据时的安全。
例如,图7为本申请提供的V2X通信装置一实施例的结构示意图,如图7所示的V2X通信装置在如图6所示实施例的基础上,还将V2X通信装置所具有的多个外部物理接口进一步划分为第一外部接口和第二外部接口。其中,所述外部物理接口的具体实现形式包括但不限于:以太网(ethernet)接口、无线保真(wireless fidelity,Wi-Fi)接口以及通用串行总线(universal serial bus,USB)接口。
其中,将第一外部接口连接的外部设备记为第一外部设备,第一外部接口被配置为能够被TEE中的应用程序调用,而不能够被REE中的应用程序调用;当第一外部接口被TEE中的V2X应用程序调用时,V2X应用程序可以通过该第一外部接口与第一外部设备之间传输数据。将第二外部接口连接的外部设备记为第二外部设备,第二外部接口被配置为能够被REE中的应用程序调用,而不能够被TEE中的应用程序调用;当第二外部接口被REE中的其他应用程序调用时,其他应用程序可以通过该第二外部接口与第二外部设备之间传输数据。即,本申请实施例中将V2X通信装置的外部接口分别划分给TEE和REE调用,从而将TEE和REE中运行的应用程序向外部设备发送数据时使用的外部接口进行物理隔离。
如图7所示的V2X通信单元还可以包括:数据获取单元,数据获取单元被配置为仅能够被TEE中的应用程序调用,而不能够被REE中的应用程序调用;当数据获取单元被TEE 中的V2X应用程序调用时,V2X应用程序可以通过数据获取单元获取用于表示车辆状态的状态数据。
可选地,在图7所示的示例中,TEE中V2X应用程序可以调用的数据获取单元可以包括:控制器局域网络(controller area network,CAN)数据单元、全球导航卫星系统(global navigation satellite system,GNSS)数据单元以及传感器单元。其中,CAN数据单元包括支持CAN的微控制单元(microcontroller unit,MCU)和CAN收发器组成的CAN数据单元,用于获取V2X通信装置所在车辆的车速,转向,刹车等行驶数据;GNSS数据单元支持GNSS定位功能,GNSS数据单元可以是独立的芯片,或者还可以集成在应用处理器所在的芯片中;传感器数据单元,可以包括例如:陀螺仪和加速度传感器等,用于获取车辆的实时状态数据,所述传感器数据单元可以是独立的芯片,或者还可以集成在应用处理器所在的芯片中,又或者与GNSS芯片连接。
综上,本实施例提供的V2X通信装置中,TEE中运行的V2X应用程序所能够调用的外部接口与REE中运行的应用程序所能够调用的外部接口不同,从而将TEE和REE中运行的应用程序向外部设备发送数据时使用的外部接口进行物理隔离,使得V2X应用程序能够调用的物理接口本身是安全的,从而进一步保证了V2X应用程序在向外部发送V2X数据时的安全。
更为具体地,图8为本申请提供的TEE中的软件结构示意图,其中示出了如图7所示的V2X通信装置中,TEE中运行的V2X应用程序调用相关模块进行数据传输的软件模块关系。其中,V2X应用处理模块用于运行V2X应用程序,V2X网络传输协议处理模块用于处理V2X数据,V2X网络传输协议处理模块可以通过V2X安全模块调用安全服务器模块(HSM)对V2X数据进行安全操作,V2X接入层协议处理模块用于发送或接收V2X数据,V2X算法处理模块用于通过车辆数据模块、车辆位置模块等数据获取单元获取车辆的状态数据。
如图8所示的软件结构一种具体的应用为第一V2X数据的接收过程,例如,图9示出了一种V2X数据的接收处理流程,其中,当流程开始后,V2X接入层协议处理模块接收第一V2X数据,并将接收到的第一V2X数据通过物理接口或者核间通信接口发送至TEE中运行的V2X网络传输协议处理模块。V2X网络传输协议处理模块将第一V2X数据发送至V2X安全模块进行签名验证和解密,具体地,V2X安全模块可以调用安全服务器块对第一V2X数据进行签名验证和解密,其中,当对第一V2X数据签名验证未通过,则结束流程;当对第一V2X数据签名验证通过后,将通过签名验证以及解密后的第一V2X数据发送至V2X应用处理模块进行进一步处理。
V2X应用处理模块在接收到第一V2X数据之后,需要对该第一V2X数据是否需要本地处理进行判断。例如,对于一些需要V2X通信装置直接转发给其他车辆或者设备的通知信息数据,V2X应用处理模块判断本地不需要进行计算处理,则直接将接收到的第一V2X数据通过调用外部接口发送给外部设备。对于一些需要V2X通信装置进一步结合自身车辆状态进行处理的数据,V2X应用处理模块在判断本地需要将进行计算处理后,将接收到的第一V2X数据发送至V2X算法处理模块,由V2X算法处理模块结合从车辆数据模块、位置数据模块获取的本车车速、转向、刹车、位置等数据进行计算后,得到计算后的处理结果例如碰撞预警信息,并返回V2X应用处理模块。最终,V2X应用处理模块将得到的处理结果通过外部通信接口发送至外部设备,从而结束流程。
如图8所示的软件结构另一种具体的应用为第二V2X数据的发送过程,例如,图10示出了一种V2X数据的发送处理流程,其中,当流程开始后,V2X应用处理模块可以按照一定的周期生成待发送的第二V2X数据,具体由V2X算法处理模块从车辆数据模块和位置数据模块获取车速、位置等数据后,生成一条待发送的第二V2X数据。随后,由V2X应用处理模块将第二V2X数据发送给V2X网络传输协议处理模块进行发送,而V2X网络传输协议处理模块通过V2X安全模块调用安全服务模块对第二V2X数据进行签名和加密处理后,V2X网络传输协议模块将处理后的第二V2X数据通过物理接口或者核间通信接口发送给V2X接入层协议处理模块。最终,由V2X接入层协议处理模块在空口发送所述第二V2X数据,从而结束流程。
可选地,上述如图8-10所示的实施例中提供的V2X通信装置所设置的HSM与AP处理器的TEE连接并能够被TEE中运行的V2X应用程序调用,在本申请其他可能的实现方式中,V2X通信装置所设置的HSM可以与第一通信模块中的V2X基带处理单元连接,并能够被V2X基带处理单元调用。例如,图11为本申请提供的V2X通信装置一实施例的结构示意图,如图11所示的V2X通信装置与如图7所示的V2X通信装置存在的区别在于,HSM与第一通信模块中的V2X基带处理单元连接。
具体地,图12为本申请提供的TEE中的软件结构示意图,其中示出了如图11所示的V2X通信装置中,TEE中运行的V2X应用程序调用相关模块进行数据传输的软件模块关系。其中,V2X应用处理模块用于运行V2X应用程序,V2X网络传输协议处理模块用于处理V2X数据,V2X接入层协议处理模块用于发送或接收V2X数据,V2X接入层协议处理模块可以调用V2X安全模块(HSM)对V2X数据进行安全操作,V2X算法处理模块用于通过车辆数据模块、车辆位置模块等数据获取单元获取车辆的状态数据。
如图12所示的软件结构一种具体的应用为第一V2X数据的接收过程,例如,图13示出了一种V2X数据的接收处理流程,其中,当流程开始后,V2X接入层协议处理模块接收第一V2X数据,并将接收到的第一V2X数据调用V2X安全模块进行解密和签名验证。其中,当对第一V2X数据签名验证未通过,则结束流程;当对第一V2X数据签名验证通过后,通过物理接口或者核间通信接口,将通过签名验证以及解密后的第一V2X数据发送至TEE中运行的V2X网络传输协议处理模块。V2X网络传输协议处理模块进一步将第一V2X数据发送至V2X应用处理模块进行进一步处理。同样地,V2X应用处理模块在接收到第一V2X数据之后,需要对该第一V2X数据是否需要本地处理进行判断。有有关V2X应用处理模块进对第一V2X数据进行的处理可参照如图9所示的实施例,不再赘述。
如图12所示的软件结构另一种具体的应用为第二V2X数据的发送过程,例如,图14示出了一种V2X数据的发送处理流程,其中,当流程开始后,V2X应用处理模块可以按照一定的周期生成待发送的第二V2X数据,具体由V2X算法处理模块从车辆数据模块和位置数据模块获取车速、位置等数据后,生成一条待发送的第二V2X数据。随后,由V2X应用处理模块将第二V2X数据发送给V2X网络传输协议处理模块进行发送,V2X网络传输协议处理模块将第二V2X数据通过物理接口或者核间通信接口发送至V2X接入层协议处理模块。V2X接入层协议处理模块能够通过V2X安全模块调用安全服务模块对第二V2X数据进行签名和加密处理后,在空口发送所述第二V2X数据,从而结束流程。
进一步地,本申请还提供一种V2X通信方法,可以由上述任意实施例中的AP处理器 执行,示例性地,所述V2X通信方法可以包括:AP处理器通过可信执行环境中运行的V2X应用程序,调用第一通信模块发送或接收V2X应用程序的数据;和/或,AP处理器通过非可信执行环境中运行的其他应用程序,调用第二通信模块发送或接收其他应用程序的数据。
或者,可选地,所述方法还包括:AP处理器通过可信执行环境对第一通信模块接收到的V2X应用程序的第一V2X数据进行安全校验。
可选地,所述方法还包括:AP处理器通过可信执行环境调用硬件安全模块HSM,对第一通信模块接收到的V2X应用程序的第一V2X数据进行安全校验。
可选地,所述方法还包括:AP处理器通过可信执行环境,对V2X应用程序生成的第二V2X数据进行加密。
可选地,所述方法还包括:AP处理器通过可信执行环境,调用硬件安全模块HSM,对V2X应用程序生成的第二V2X数据进行加密。
可选地,所述方法还可以包括:AP处理器通过可信执行环境中运行的V2X应用程序,调用第一外部接口,向第一外部接口连接的外部设备传输V2X应用程序的数据;和/或,AP处理器通过非可信执行环境中运行的其他应用程序,调用第二外部接口,向第二外部接口连接的外部设备传输其他应用程序的数据。
可选地,所述方法还包括:方法还包括:AP处理器通过可信执行环境中运行的V2X应用程序,根据状态数据和第一V2X数据,生成处理结果,并调用第一外部接口发送处理结果。
可选地,所述方法还包括:AP处理器通过可信执行环境中运行的V2X应用程序,第一外部接口发送第一V2X数据。
可选地,所述方法还包括:AP处理器通过可信执行环境中运行的V2X应用程序,通过状态数据生成第二V2X数据。
需要说明的是,上述由AP处理器执行的方法,其执行主体还可以是AP处理器中对应的V2X应用程序,或者AP处理器中对应的其他应用程序。
上述各实施例提供的V2X通信方法,其实现方式与原理可以参照本申请实施例中对于V2X通信装置所进行的说明,不再赘述。
为了实现本申请实施例中提供的V2X通信方法,AP处理器的存储器中,可以存储计算机可执行程序代码,所述程序代码包括指令;当AP处理器执行指令时,指令使AP处理器执行上述实施例或可选实施例中AP处理器的处理动作,其实现原理和技术效果类似,在此不再赘述。或者,可选地,为了实现本申请实施例中的V2X通信方法,V2X通信装置中除AP处理器之外的各模块也可以存储计算机可执行程序代码,例如,如图11所示的V2X通信基带处理单元可以存储程序代码包括指令,当V2X通信基带处理单元执行指令时,可以使其执行由V2X通信基带处理单元执行的调用HSM等相关动作。
本领域技术人员应该很容易意识到,结合本申请中所公开的实施例描述的各实施例的算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述示例对V2X通信装置中模块的划分时,可以对应各个功能 划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。例如,第一通信模块和第二通信模块可以是两个不同的模块,或者集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
本文中的术语“多个”是指两个或两个以上。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系;在公式中,字符“/”,表示前后关联对象是一种“相除”的关系。
可以理解的是,在本申请的实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请的实施例的实施过程构成任何限定。
可以理解的是,在本申请的实施例中,存储器可以是非易失性存储器,比如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM)。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
本申请实施例提供的方法中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、终端或者其他可编程装置。所述计算机指令可以存 储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机可以存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,SSD)等。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (21)
- 一种车辆到一切V2X通信装置,设置在车辆上,其特征在于,所述装置包括:应用AP处理器,所述AP处理器上运行有可信执行环境和非可信执行环境,所述可信执行环境用于运行V2X应用程序,所述非可信执行环境用于运行除所述V2X应用程序外的其他应用程序;第一通信模块,用于被所述可信执行环境中运行的所述V2X应用程序调用时,发送或接收所述V2X应用程序的数据;第二通信模块,用于被所述非可信执行环境中运行的所述其他应用程序调用时,发送或接收所述其他应用程序的数据。
- 根据权利要求1所述的装置,其特征在于,所述可信执行环境还用于,对所述第一通信模块接收到的所述V2X应用程序的第一V2X数据进行安全校验;若安全校验通过,所述V2X应用程序对所述第一V2X数据进行处理。
- 根据权利要求1所述的装置,其特征在于,还包括:硬件安全模块HSM,与所述AP处理器连接,用于对所述第一通信模块接收到的所述V2X应用程序的第一V2X数据进行安全校验;若安全校验通过,所述V2X应用程序对所述第一V2X数据进行处理。
- 根据权利要求1所述的装置,其特征在于,还包括:硬件安全模块HSM,与所述第一通信模块连接,用于对所述第一通信模块接收到的所述V2X应用程序的第一V2X数据进行安全校验;若安全校验通过,所述第一通信模块将所述第一V2X数据发送至所述可信执行环境。
- 根据权利要求2所述的装置,其特征在于,所述可信执行环境还用于,对所述V2X应用程序生成的第二V2X数据进行加密;所述第一通信模块具体用于发送经过加密后的所述第二V2X数据。
- 根据权利要求3所述的装置,其特征在于,所述HSM还用于对所述V2X应用程序生成的第二V2X数据进行加密;所述第一通信模块具体用于发送经过加密后的所述第二V2X数据。
- 根据权利要求4所述的装置,其特征在于,所述HSM还用于对所述V2X应用程序生成的第二V2X数据进行加密;所述第一通信模块具体用于发送经过加密后的所述第二V2X数据。
- 根据权利要求1-7任一项所述的装置,其特征在于,还包括:第一外部接口和第二外部接口;所述第一外部接口用于被所述可信执行环境调用时,向连接的外部设备传输所述V2X应用程序的数据;所述第二外部接口用于被所述非可信执行环境调用时,向连接的外部设备传输所述其他应用程序的数据。
- 根据权利要求8所述的装置,其特征在于,还包括:数据获取单元,能够被所述可信执行环境调用,用于获取表示所述车辆状态的状态数据。
- 根据权利要求9所述的装置,其特征在于,所述V2X应用程序具体用于,根据所述状态数据和第一V2X数据,生成处理结果,并通过所述第一外部接口发送所述处理结果。
- 根据权利要求8所述的装置,其特征在于,所述V2X应用程序具体用于,通过所述第一外部接口发送第一V2X数据。
- 根据权利要求9所述的装置,其特征在于,所述V2X应用程序具体用于,通过所述状态数据生成第二V2X数据。
- 一种车辆到一切V2X通信方法,其特征在于,应用于V2X通信装置中的AP处理器,其中,所述V2X通信装置包括:所述AP处理器,以及分别与所述AP处理器连接的第一通信模块和第二通信模块,所述AP处理器上运行有可信执行环境和非可信执行环境,所述可信执行环境用于运行V2X应用程序,所述非可信执行环境用于运行除所述V2X应用程序外的其他应用程序;所述方法包括:所述AP处理器通过所述可信执行环境中运行的V2X应用程序,调用所述第一通信模块发送或接收所述V2X应用程序的数据;和/或,所述AP处理器通过所述非可信执行环境中运行的所述其他应用程序,调用所述第二通信模块发送或接收所述其他应用程序的数据。
- 根据权利要求13所述的方法,其特征在于,所述方法还包括:所述AP处理器通过所述可信执行环境对所述第一通信模块接收到的所述V2X应用程序的第一V2X数据进行安全校验。
- 根据权利要求13所述的方法,其特征在于,所述方法还包括:所述AP处理器通过所述可信执行环境调用硬件安全模块HSM,对所述第一通信模块接收到的所述V2X应用程序的第一V2X数据进行安全校验。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:所述AP处理器通过所述可信执行环境,对所述V2X应用程序生成的第二V2X数据进行加密。
- 根据权利要求15所述的方法,其特征在于,所述方法还包括:所述AP处理器通过所述可信执行环境,调用硬件安全模块HSM,对所述V2X应用程序生成的第二V2X数据进行加密。
- 根据权利要求13-17任一项所述的方法,其特征在于,所述V2X通信装置还包括:分别与所述AP处理器连接的第一外部接口和第二外部接口;所述方法还包括:所述AP处理器通过所述可信执行环境中运行的所述V2X应用程序,调用所述第一外部接口,向所述第一外部接口连接的外部设备传输所述V2X应用程序的数据;和/或,所述AP处理器通过所述非可信执行环境中运行的所述其他应用程序,调用所述第二外部接口,向所述第二外部接口连接的外部设备传输所述其他应用程序的数据。
- 根据权利要求18所述的方法,其特征在于,所述V2X通信装置还包括:与所述AP处理器连接的数据获取单元,用于获取标识所述车辆状态的状态数据;所述方法还包括:所述AP处理器通过所述可信执行环境中运行的所述V2X应用程序,根据所述状态数据和第一V2X数据,生成处理结果,并调用所述第一外部接口发送所述处理结果。
- 一种车辆,包括如权利要求1-12任一项所述的车辆到一切V2X通信装置。
- 一种程序产品,其特征在于,所述程序产品包括计算机程序,所述计算机程序存储在可读存储介质中,通信装置的至少一个处理器可以从所述可读存储介质读取所述计算机程序,所述至少一个处理器执行所述计算机程序使得通信装置实施如权利要求13-19任意一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911403731.X | 2019-12-31 | ||
CN201911403731.XA CN111148070B (zh) | 2019-12-31 | 2019-12-31 | V2x通信方法、装置及车辆 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021135999A1 true WO2021135999A1 (zh) | 2021-07-08 |
Family
ID=70522395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/137935 WO2021135999A1 (zh) | 2019-12-31 | 2020-12-21 | V2x通信方法、装置及车辆 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111148070B (zh) |
WO (1) | WO2021135999A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116170803A (zh) * | 2021-11-24 | 2023-05-26 | 瑞伟安知识产权控股有限公司 | 用于安全管理车辆信息的系统和方法 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111148070B (zh) * | 2019-12-31 | 2021-06-15 | 华为技术有限公司 | V2x通信方法、装置及车辆 |
CN111726784A (zh) * | 2020-06-10 | 2020-09-29 | 桑德科技(重庆)有限公司 | 一种基于v2x的车辆行驶安全管理方法 |
CN112953909B (zh) * | 2021-01-28 | 2023-03-14 | 北京豆荚科技有限公司 | 一种基于tee实现车载内外网安全隔离的方法 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105447406A (zh) * | 2015-11-10 | 2016-03-30 | 华为技术有限公司 | 一种用于访问存储空间的方法与装置 |
US20160134660A1 (en) * | 2014-11-11 | 2016-05-12 | Oracle International Corporation | Securely operating a process using user-specific and device-specific security constraints |
CN105590201A (zh) * | 2015-04-23 | 2016-05-18 | 中国银联股份有限公司 | 移动支付装置及移动支付系统 |
CN106200891A (zh) * | 2015-05-08 | 2016-12-07 | 阿里巴巴集团控股有限公司 | 显示用户界面的方法、装置及系统 |
US20160364341A1 (en) * | 2015-06-15 | 2016-12-15 | Intel Corporation | Virtualization-based platform protection technology |
CN109522754A (zh) * | 2018-11-28 | 2019-03-26 | 中国科学院信息工程研究所 | 一种移动终端可信隔离环境核心控制方法 |
CN109787943A (zh) * | 2017-11-14 | 2019-05-21 | 华为技术有限公司 | 一种抵御拒绝服务攻击的方法及设备 |
CN110618847A (zh) * | 2018-06-20 | 2019-12-27 | 华为技术有限公司 | 一种用户界面的显示方法和终端设备 |
CN111148070A (zh) * | 2019-12-31 | 2020-05-12 | 华为技术有限公司 | V2x通信方法、装置及车辆 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105260663B (zh) * | 2015-09-15 | 2017-12-01 | 中国科学院信息工程研究所 | 一种基于TrustZone技术的安全存储服务系统及方法 |
CN105791284B (zh) * | 2016-02-29 | 2019-04-05 | 华为技术有限公司 | 一种数据安全传输装置及方法 |
CN105678191B (zh) * | 2016-03-02 | 2018-11-13 | 上海瓶钵信息科技有限公司 | 利用SoC内部存储提高系统安全性的方法、终端与系统 |
EP3293656A1 (en) * | 2016-09-13 | 2018-03-14 | Gemalto Sa | Method for controlling access to a trusted application in a terminal |
CN106845279A (zh) * | 2017-02-17 | 2017-06-13 | 宇龙计算机通信科技(深圳)有限公司 | 安全服务管理实体ssme模块的校验方法及装置 |
CN107392055A (zh) * | 2017-07-20 | 2017-11-24 | 深圳市金立通信设备有限公司 | 一种双系统安全芯片控制方法、终端、计算机可读存储介质及基于安全芯片的双系统架构 |
US11157635B2 (en) * | 2018-04-08 | 2021-10-26 | Qualcomm Incorporated | Secure interface disablement |
CN110366130B (zh) * | 2018-04-09 | 2021-01-29 | 华为技术有限公司 | 一种v2x业务授权方法、装置及设备 |
CN110532766B (zh) * | 2018-05-25 | 2023-09-08 | 华为技术有限公司 | 一种基于多容器的可信应用程序的处理方法及相关设备 |
CN108881486A (zh) * | 2018-08-01 | 2018-11-23 | 北京航空航天大学 | 基于可信技术的智能网联汽车远程通信方法及系统 |
CN109348509B (zh) * | 2018-09-21 | 2022-05-03 | 斑马网络技术有限公司 | 通信方法以及装置、电子设备及存储介质 |
CN109714344B (zh) * | 2018-12-28 | 2021-08-03 | 国汽(北京)智能网联汽车研究院有限公司 | 基于“端-管-云”的智能网联汽车信息安全平台 |
-
2019
- 2019-12-31 CN CN201911403731.XA patent/CN111148070B/zh active Active
-
2020
- 2020-12-21 WO PCT/CN2020/137935 patent/WO2021135999A1/zh active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160134660A1 (en) * | 2014-11-11 | 2016-05-12 | Oracle International Corporation | Securely operating a process using user-specific and device-specific security constraints |
CN105590201A (zh) * | 2015-04-23 | 2016-05-18 | 中国银联股份有限公司 | 移动支付装置及移动支付系统 |
CN106200891A (zh) * | 2015-05-08 | 2016-12-07 | 阿里巴巴集团控股有限公司 | 显示用户界面的方法、装置及系统 |
US20160364341A1 (en) * | 2015-06-15 | 2016-12-15 | Intel Corporation | Virtualization-based platform protection technology |
CN105447406A (zh) * | 2015-11-10 | 2016-03-30 | 华为技术有限公司 | 一种用于访问存储空间的方法与装置 |
CN109787943A (zh) * | 2017-11-14 | 2019-05-21 | 华为技术有限公司 | 一种抵御拒绝服务攻击的方法及设备 |
CN110618847A (zh) * | 2018-06-20 | 2019-12-27 | 华为技术有限公司 | 一种用户界面的显示方法和终端设备 |
CN109522754A (zh) * | 2018-11-28 | 2019-03-26 | 中国科学院信息工程研究所 | 一种移动终端可信隔离环境核心控制方法 |
CN111148070A (zh) * | 2019-12-31 | 2020-05-12 | 华为技术有限公司 | V2x通信方法、装置及车辆 |
Non-Patent Citations (1)
Title |
---|
LEE SEUNGHO; CHOI WONSUK; JO HYO JIN; LEE DONG HOON: "T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method", IEEE ACCESS, IEEE, USA, vol. 7, 1 January 1900 (1900-01-01), USA, pages 49738 - 49755, XP011721305, DOI: 10.1109/ACCESS.2019.2910865 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116170803A (zh) * | 2021-11-24 | 2023-05-26 | 瑞伟安知识产权控股有限公司 | 用于安全管理车辆信息的系统和方法 |
Also Published As
Publication number | Publication date |
---|---|
CN111148070B (zh) | 2021-06-15 |
CN111148070A (zh) | 2020-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021135999A1 (zh) | V2x通信方法、装置及车辆 | |
WO2021179331A1 (zh) | 一种通信方法、装置以及系统 | |
WO2019128028A1 (zh) | 一种道路交通数据的记录方法及车载设备 | |
US20170180330A1 (en) | Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium | |
US20160323741A1 (en) | Method and apparatus for transmitting vehicle accident information based on interaction between devices and method and vehicle accident information collection apparatus | |
US11088997B2 (en) | Secure communication method and apparatus for vehicle, multimedia system for vehicle, and vehicle | |
US11769402B2 (en) | Augmenting mobile device operation with intelligent external sensors | |
US10372656B2 (en) | System, apparatus and method for providing trusted input/output communications | |
US20190089681A1 (en) | Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle | |
JP2017508379A (ja) | 証明可能なジオロケーション | |
CN110149611A (zh) | 一种身份验证方法、设备及系统 | |
US20220408245A1 (en) | Session key generation for autonomous vehicle operation | |
US20190026478A1 (en) | Vehicle secure communication method and apparatus, vehicle multimedia system, and vehicle | |
KR20180086934A (ko) | 차량의 인증서 생성 방법 및 장치 | |
US20230096370A1 (en) | Cross platform credential sharing | |
WO2019149168A1 (zh) | 一种消息保护方法及装置 | |
US11792644B2 (en) | Session key generation for autonomous vehicle operation | |
KR20180012658A (ko) | 근접-기반 서비스 직접 통신에 기반하여 v2x 서비스를 제공하는 장치 및 방법 | |
US20230006843A1 (en) | Data transmission method, apparatus, and system, computer device, and storage medium | |
CN114301967B (zh) | 窄带物联网控制方法、装置及设备 | |
CN115442807A (zh) | 一种用于5g系统的用户安全性提升方法及装置 | |
WO2022194009A1 (zh) | 一种通信方法、装置及设备 | |
CN106888451B (zh) | 可信执行环境tee初始化方法及设备 | |
WO2023006028A1 (zh) | 信息处理方法、电子系统、电子设备及存储介质 | |
US20240275581A1 (en) | Data storage system, mobile object, and non-transitory computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20911021 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20911021 Country of ref document: EP Kind code of ref document: A1 |