WO2022062712A1 - Procédé et appareil de transmission de données - Google Patents

Procédé et appareil de transmission de données Download PDF

Info

Publication number
WO2022062712A1
WO2022062712A1 PCT/CN2021/110886 CN2021110886W WO2022062712A1 WO 2022062712 A1 WO2022062712 A1 WO 2022062712A1 CN 2021110886 W CN2021110886 W CN 2021110886W WO 2022062712 A1 WO2022062712 A1 WO 2022062712A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
control system
central control
sensitive data
information
Prior art date
Application number
PCT/CN2021/110886
Other languages
English (en)
Chinese (zh)
Inventor
刘治锋
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022062712A1 publication Critical patent/WO2022062712A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present application relates to the field of communication technology, and more particularly, to a data transmission method and apparatus in the field of communication technology.
  • data transmission is performed between the mobile terminal and the central control system by means of a combination of the terminal and the cloud.
  • the user can choose to upload part of the data stored in the mobile terminal to the user's account in the service server on the cloud side.
  • the central control system needs to log in to the user's account in the service server, download this part of the data stored under the account, and display this part of the data.
  • the mobile terminal since the mobile terminal is a private device of the user, the data stored in the mobile terminal, such as the phone book, photo album, short message, and fund information, are usually considered by the user as relatively private and private sensitive data. Therefore, the mobile terminal adopts the existing data The transmission method transmits these sensitive data to the central control system and displays the sensitive data, and the data security and timeliness are poor.
  • the present application provides a data transmission method and device, which are beneficial to improve the security and timeliness of data.
  • an embodiment of the present application provides a data transmission method, which is applied to a central control system of a vehicle, where a communication connection exists between the central control system and a first terminal device, and the method may include: the first terminal device and The central control system performs identity verification and determines that the identity verification is passed; the first terminal device encrypts the first sensitive data with the first key to obtain the encrypted first sensitive data; the first terminal device reports to the central control system Send the encrypted first sensitive data and first key information, where the first key information is used to indicate the first key used for the first sensitive data; accordingly, the central control system receives information from the first key The encrypted first sensitive data and the first key information of a terminal device; the central control system decrypts the encrypted first sensitive data through the first key indicated by the first key information , and obtain the first sensitive data; the central control system displays the first target data, and the first target data is obtained based on the first sensitive data.
  • the first terminal device can directly use the end-to-end method to transfer the encrypted first sensitive data and the encrypted first sensitive data to the first terminal device for the second terminal device.
  • a first key information of sensitive data is transmitted to the central control system, and the central control system decrypts the encrypted first sensitive data based on the first key information to obtain and display the first sensitive data.
  • the first sensitive data does not need to be transmitted between the first terminal device and the central control system through the service server, which can prevent the service server from storing and storing the sensitive data.
  • the security of the data can be improved.
  • the first sensitive data adopts an end-to-end transmission mode between the first terminal device and the central control system, so the timeliness of the data can be improved.
  • the first terminal device performs identity verification with the central control system, and determines that the identity verification is passed, which may include: the first terminal device performs identity verification on the central control system, and determines the central control system.
  • the system passes the identity verification; the central control system performs identity verification on the first terminal device, and determines that the first terminal device passes the identity verification.
  • the identity verification between the first terminal device and the central control system may be performed in various manners, which is not limited in this embodiment of the present application.
  • the relationship between the first terminal device and the central control system may be based on a digital certificate (including the digital certificate of the first terminal device and the digital certificate issued by a public key infrastructure, PKI).
  • the digital certificate of the central control system for authentication.
  • the first terminal device and the central control system may apply to a certification center (certificate authority, CA) through PKI respectively to obtain a digital certificate, which is used as a certificate of their own identity. If the digital certificate of the first terminal device is verified to be valid by the central control system, the central control system trusts the first terminal device; similarly, if the digital certificate of the central control system is verified to be valid by the first terminal device, then the central control system trusts the first terminal device; The first terminal device trusts the central control system.
  • a certification center certificate authority, CA
  • CA certificate authority
  • a trust relationship is established between the first terminal device and the central control system, and secure communication can be performed based on the trust relationship.
  • the first terminal device and the central control system need to enable the sensitive data transmission function.
  • the first terminal device may need to establish a communication connection with the central control system.
  • the mobile phone and the central control system may establish a communication connection through various communication networks, which is not limited in this embodiment of the present application.
  • the first sensitive data in the first terminal device is set by the user and considered to be relatively private and private, encryption needs to be performed to improve the security of this part of the sensitive data.
  • the first terminal device may send the encrypted first sensitive data and the first key information to the central control system in various ways, which are not limited in this embodiment of the present application.
  • the first terminal device may send the encrypted first sensitive data and the first key information to the central control system in one step.
  • the first terminal device may carry the first key information in the unencrypted field of the encrypted first sensitive data.
  • the first terminal device may send the encrypted first sensitive data and the first key information to the central control system through two steps, respectively.
  • the first terminal device generates an authorization certificate
  • the authorization certificate is used to authorize the processing authority of the first sensitive data
  • the authorization certificate includes the first key information
  • the authorization certificate is sent to the central control system
  • the central control system sends the encrypted first sensitive data.
  • the first key may include one key or a combination of multiple keys, which is not limited in this embodiment of the present application.
  • the first terminal device may send the first key information to the central control system in various manners, which is not limited in this embodiment of the present application.
  • the first terminal device may generate an authorization certificate, where the authorization certificate is used to authorize the processing authority of the sensitive data, and the authorization certificate includes the first key information; send the authorization certificate to the central control system Certificate of Authorization.
  • the authorization certificate may further include validity period information, where the validity period information is used to indicate the validity period of the authorization certificate.
  • the mobile phone may carry the first key information in an unencrypted field of the encrypted sensitive data.
  • the central control system can save the first key information and the first sensitive data .
  • the storage data area of the memory of the central control system may include at least one first storage area, the at least one first storage area is in one-to-one correspondence with at least one terminal device, and the at least one terminal device includes the first terminal device.
  • the first storage area corresponding to the first terminal device is used to store the encrypted sensitive data and the first key information of the first terminal device.
  • the first target data may be the first sensitive data; or, the first target data is obtained by data fusion of the first sensitive data and the vehicle data of the vehicle where the central control system is located, and the vehicle The data includes driving data and/or application data.
  • the central control system may stop displaying the first target data under various circumstances, so as to prevent others from seeing the first target data displayed by the central control system.
  • a target data thereby improving data security and privacy.
  • the central control system may stop displaying the first target data under various circumstances, which is not limited in this embodiment of the present application.
  • the central control system may stop displaying the first target data after there is no interaction with the first terminal device within a preset first time period.
  • the central control system may stop displaying the first target data after detecting the fifth indication information.
  • the central control system may stop displaying the first target data after detecting that a new device establishes a communication connection with the central control system.
  • the central control system may stop displaying the first target data after detecting that the communication connection between the central control system and the first terminal device is disconnected.
  • the central control system may stop displaying the first target data after receiving the sixth indication information of the first terminal device.
  • the central control system can delete the stored first key information and the encrypted first sensitive data, that is, as long as the display of the first target data is stopped. Once the target data is reached, the central control system can delete the stored first sensitive data, which can improve the security of the data.
  • the central control system can also obtain the first sensitive data according to the first sensitive data and/or Or the vehicle data, obtain portrait information, the portrait information includes user portrait information and/or vehicle portrait information, the user portrait information is used to describe the user of the first terminal device, and the vehicle portrait information is used to describe the central control system The status of the vehicle you are in, and display reminder information based on the portrait information.
  • the central control system may obtain the portrait information according to the first sensitive data and/or the vehicle data in various ways, which is not limited in this embodiment of the present application.
  • the central control system can input the first sensitive data and/or the vehicle data into a preset portrait model to obtain the portrait information
  • the portrait model is a neural network algorithm for big data. obtained by training.
  • the central control system may perform desensitization processing on the first sensitive data to obtain characteristic data, and send the characteristic data and/or the vehicle data to the service server.
  • the service server receives the feature data and/or the vehicle data from the central control system to obtain the portrait information; and sends the portrait information to the central control system.
  • the central control system receives the portrait information from the service server.
  • the central control system and the service server can perform secure communication based on the first trust relationship, that is, the central control system and the service server can perform secure communication based on the first trust relationship.
  • the system may send the first sensitive data and/or vehicle data to the service server based on the trusted identity, and the service server may determine portrait information based on the first sensitive data and/or vehicle data. In this way, the central control system does not need to determine the portrait information based on the first sensitive data and/or the vehicle data, which can reduce the capability requirement and calculation amount of the central control system.
  • the central control system may send the feature data and/or the vehicle data to the service server in various ways, which are not limited in this embodiment of the present application.
  • the central control system and the service server may establish a first trust relationship through a trust ring technology, where the first trust relationship is used to indicate mutual trust between the central control system and the service server, and the The first trust relationship corresponds to the first key pair of the central control system, the first key pair includes the first private key and the first public key of the central control system, and the first private key is used to identify the central control system and send the feature data and/or the vehicle data to the service server through the first private key.
  • the central control system and the service server transmit the first sensitive data and/or vehicle data based on the first trust relationship, which can improve data security.
  • the first terminal device and the service server may establish a second trust relationship through a trust ring technology, and the second trust relationship is used to indicate the mutual relationship between the first terminal device and the service server.
  • the second trust relationship corresponds to the second key pair of the first terminal device, the second key pair includes the second private key and the second public key of the first terminal device, and the second private key is used for Identify the trusted identity of the first terminal device;
  • the first terminal device sends second key information to the central control system, where the second key information is used to indicate the second private key.
  • the central control system receives the second key information from the first terminal device; and sends the feature data and/or the vehicle data to the service server through the second private key.
  • the sending, by the first terminal device, the second key information to the central control system may include: the first terminal device may send an identity certificate to the central control system, where the identity certificate is used to authorize the access control of the first terminal device. identity, and the second key information is included in the identity certificate.
  • the first terminal device After establishing the second trust relationship, the first terminal device authorizes the trusted identity of the first terminal device to the central control system, so that the central control system can use the first
  • the trusted identity of a terminal device communicates securely with the service server without establishing additional trust relationship with the service server, thereby reducing the capability requirement and calculation amount of the central control system.
  • the central control system may save the portrait information.
  • the first storage area corresponding to the first terminal device in the storage data area of the memory of the central control system is further used to store the portrait information.
  • the central control system can stop displaying the reminder information under various circumstances, so as to prevent others from seeing the reminder information displayed by the central control system, thereby improving the performance of the central control system.
  • the central control system can stop displaying the reminder information under various circumstances, so as to prevent others from seeing the reminder information displayed by the central control system, thereby improving the performance of the central control system.
  • the security and privacy of data please refer to the various situations in which the display of the first target data is stopped.
  • the central control system can delete the stored portrait information, that is, as long as the reminder information is stopped, the central control system will store the portrait information. Delete it, which can improve the security of the data.
  • the method further includes: acquiring, by the central control system, second sensitive data of the second terminal device; acquiring a display strategy; displaying the first target data and/or the second target data according to the display strategy, the second The target data is derived based on the second sensitive data.
  • the second target data may be the second sensitive data; or, the second target data may be obtained by data fusion of the second sensitive data and the vehicle data.
  • the central control system may acquire the display strategy in various ways, which is not limited in this embodiment of the present application.
  • the display strategy may be preconfigured in the central control system.
  • the central control system may display a presentation strategy request to the user, where the presentation strategy request is used to request the first target data of the first terminal device and the second target data of the second terminal device Display strategy of target data; get the display strategy entered by the user.
  • displaying the first target data and/or the second target data by the central control system according to the display strategy may include: when the display strategy indicates that only the first target data of the first terminal device is displayed When a target data is displayed, the central control system continues to display the first target data of the first terminal device without displaying the second target data; or, when the display strategy indicates to display the first target data of the first terminal device at the same time When the target data and the second target data of the second terminal device are displayed, the central control system simultaneously displays the first target data of the first terminal device and the second target data of the second terminal device; or, when the When the display policy instructs to display only the second target data of the second terminal device, the central control system stops displaying the first target data of the first terminal device; and displays the second target data of the second terminal device.
  • the central control system can display the sensitive data of multiple mobile phones according to the display strategy, and the display data is more flexible.
  • an embodiment of the present application further provides a data transmission apparatus, configured to execute the method executed by the first terminal device in the first aspect or any possible implementation manner thereof.
  • the data transmission apparatus may include a unit for performing the method performed by the first terminal device in the first aspect or any possible implementation manner thereof.
  • an embodiment of the present application further provides a data transmission device for executing the method executed by the central control system in the first aspect or any possible implementation manner thereof.
  • the data transmission apparatus may include a unit for performing the method performed by the central control system in the first aspect or any possible implementation manner thereof.
  • an embodiment of the present application further provides a data transmission device, including: a communication interface and at least one processor, when the at least one processor executes program codes or instructions, the above-mentioned first aspect or any possible possibility thereof is implemented A method executed by the first terminal device in an implementation manner.
  • an embodiment of the present application further provides a data transmission device, including: a communication interface and at least one processor, when the at least one processor executes program codes or instructions, the above-mentioned first aspect or any possible possibility thereof is implemented A method executed by the central control system in an implementation manner.
  • the data transmission device described in the second aspect and/or the fourth aspect may be a terminal device, or a chip device or an integrated circuit in the terminal device.
  • the data transmission device described in the third aspect and/or the fifth aspect may be a central control system, or a chip device or an integrated circuit in the central control system.
  • an embodiment of the present application further provides a vehicle on which the data transmission device described in the third aspect or the fifth aspect is installed or included.
  • an embodiment of the present application further provides a communication system, where the communication system includes at least one terminal device described in the second aspect and/or the fourth aspect and the vehicle described in the sixth aspect.
  • the present application further provides a computer-readable storage medium for storing a computer program, where the computer program includes a method for implementing the above-mentioned first aspect or any possible implementation manners thereof.
  • embodiments of the present application further provide a computer program product including instructions, which, when run on a computer, enables the computer to implement the method described in the first aspect or any possible implementation manner thereof.
  • the data transmission device, communication system, vehicle, computer storage medium, computer program product, and communication system provided in the embodiments of the present application are all used to implement the data transmission method provided above. Therefore, the beneficial effects that can be achieved can be referred to above. The beneficial effects of the data transmission method provided in this article will not be repeated here.
  • FIG. 1 is a schematic block diagram of a communication system 100 provided by an embodiment of the present application.
  • FIG. 2 is a schematic block diagram of a central control system 200 provided by an embodiment of the present application.
  • FIG. 3 is a schematic block diagram of a mobile phone 300 provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a data transmission method 400 provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of an interface provided by an embodiment of the present application.
  • Fig. 6 is another interface schematic diagram provided by the embodiment of the present application.
  • Fig. 7 is another interface schematic diagram provided by the embodiment of the present application.
  • FIG. 9 is a schematic diagram of a mobile phone provided by an embodiment of the present application.
  • Fig. 10 is another interface schematic diagram provided by the embodiment of the present application.
  • FIG. 11 is another schematic diagram of an interface provided by an embodiment of the present application.
  • FIG. 12 is a schematic diagram of a central control system provided by an embodiment of the present application.
  • FIG. 13 is a schematic diagram of a memory provided by an embodiment of the present application.
  • FIG. 16 is another schematic diagram of an interface provided by an embodiment of the present application.
  • FIG. 17 is another interface schematic diagram provided by an embodiment of the present application.
  • FIG. 18 is a schematic diagram of another interface provided by an embodiment of the present application.
  • FIG. 20 is a schematic flowchart of a data transmission method 600 provided by an embodiment of the present application.
  • 21 is a schematic diagram of another memory provided by an embodiment of the present application.
  • Fig. 22 is another interface schematic diagram provided by the embodiment of the present application.
  • FIG. 24 is a schematic flowchart of a data transmission method 700 provided by an embodiment of the present application.
  • FIG. 25 is a first trust relationship list provided by an embodiment of the present application.
  • 26 is a schematic diagram of another memory provided by an embodiment of the present application.
  • FIG. 27 is a schematic flowchart of a data transmission method 800 provided by an embodiment of the present application.
  • FIG. 28 is a schematic diagram of another memory provided by an embodiment of the present application.
  • FIG. 29 is a schematic flowchart of a data transmission method 900 provided by an embodiment of the present application.
  • FIG. 30 is a schematic diagram of another memory provided by an embodiment of the present application.
  • FIG. 31 is another interface schematic diagram provided by an embodiment of the present application.
  • FIG. 32 is another interface schematic diagram provided by an embodiment of the present application.
  • FIG. 33 is a schematic flowchart of a data transmission method 1000 provided by an embodiment of the present application.
  • FIG. 34 is a schematic block diagram of a data transmission apparatus 1100 provided by an embodiment of the present application.
  • FIG. 1 shows a schematic block diagram of a communication system 100 to which the data transmission method provided in this embodiment of the present application is applied.
  • the system 100 may be applicable to a vehicle cabin scene of a motor vehicle (eg, a smart car, an electric car, a digital car, etc.).
  • the communication system 100 may include a central control system 110 of a motor vehicle and at least one cell phone 120 .
  • the central control system 110 may communicate with the at least one mobile phone 120 and display data transmitted by the at least one mobile phone 120 .
  • the central control system 110 may communicate with the at least one mobile phone 120 in a wireless manner.
  • the above wireless manner may be to implement communication through a wireless communication network.
  • the wireless communication network may be a local area network, or a wide area network switched by a relay device, or includes a local area network and a wide area network.
  • the wireless communication network may be wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), wifi P2P network, Bluetooth (bluetooth, BT) network, zigbee network, near field communication (near field communication, NFC) network, infrared technology (infrared, IR) or possible general short-range communication network in the future.
  • the wireless communication network may be a global system of mobile communication (GSM) system, a code division multiple access (CDMA) system, a wideband code division Multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system , LTE time division duplex (time division duplex, TDD), universal mobile telecommunication system (universal mobile telecommunication system, UMTS), global interconnection microwave access (worldwide interoperability for microwave access, WiMAX) communication system, the future fifth generation (5th generation, 5G) system or new radio (new radio, NR), etc., which are not limited in this embodiment of the present application.
  • GSM global system of mobile communication
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • LTE long term evolution
  • LTE frequency division duplex frequency division du
  • system 100 may further include a cloud-side server 130, and the central control system 110, the at least one mobile phone 120 and the cloud server 130 may communicate wirelessly.
  • the server 130 on the cloud side may be a computer device with communication and computing capabilities.
  • the central control system 110 and/or the mobile phone 120 can complete all data processing processes on the terminal side, and the server 130 is only used to store the results of the above data processing and/or the central control system 110 and the mobile phone. 120 transmit the results of the above data processing; or, because the server 130 has strong computing power and storage capacity, the central control system 110 and/or the mobile phone 120 can only complete a part of the data processing process on the terminal side, the The server 130 is configured to complete the remaining part of the data processing process, and store the data processing result and/or transmit the data processing result between the central control system 110 and the mobile phone 120, which is not limited in this embodiment of the present application.
  • FIG. 2 shows a schematic structural diagram of a central control system 200 provided by an embodiment of the present application, and the central control system 200 may be the central control system 110 described in FIG. 1 .
  • the central control system 200 may include: a processor 210 , a memory 220 , an antenna 1 , an antenna 2 , a USB interface 230 , a mobile communication circuit 240 , a wireless communication circuit 250 , an audio circuit 260 , a speaker 261 , and a microphone 262 and display screen 270.
  • the processor 210 executes various functions of the central control system 200 and processes data by running or executing the software programs and/or modules stored in the memory 220, and calling the data stored in the memory 220, thereby integrating the central control system. monitor.
  • processor 210 may include one or more general-purpose processors and/or one or more special-purpose processors, and when processor 210 includes multiple processors, the multiple processors may operate individually or in combination Work.
  • a memory may also be provided in the processor 210 for storing instructions and data.
  • the memory in the processor 210 may be a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 210 . If the processor 210 needs to use the instruction or data again, it can be called directly from the memory. In this way, repeated access is avoided, and the waiting time of the processor 210 is reduced, thereby improving the efficiency of the central control system 200 in processing data or executing instructions.
  • the processor 210 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller , digital signal processor (DSP), application specific integrated circuit (ASIC), field-programmable gate array (FPGA), baseband processor, and/or neural network processing At least one of the neural-network processing unit (NPU).
  • application processor application processor, AP
  • modem processor graphics processor
  • GPU graphics processor
  • image signal processor image signal processor
  • ISP image signal processor
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field-programmable gate array
  • NPU neural-network processing unit
  • a memory may also be provided in the processor 210 for storing instructions and data.
  • the memory in the processor 210 may be a cache memory.
  • the memory may hold instructions or data that have just been used or recycled by the processor 210 . If the processor 210 needs to use the instruction or data again, it can be called directly from the memory. In this way, repeated access is avoided, and the waiting time of the processor 210 is reduced, thereby improving the efficiency of the central control system 200 in processing data or executing instructions.
  • Memory 220 may be used to store one or more computer programs including instructions.
  • the memory 220 may include a stored program area and a stored data area.
  • the stored program area may store the operating system; the stored program area may also store one or more applications (such as gallery, contacts, etc.) and the like.
  • the storage data area can store data (such as driving data, application data, etc.) created during the use of the central control system 200, as well as data and other data and/or information transmitted by other devices (such as mobile phones). Sensitive data, key information, authorization certificate, etc. transmitted by the data transmission method provided in the embodiment.
  • memory 220 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage components, flash memory components, universal flash storage (UFS), and the like.
  • the processor 210 may cause the central control system 200 to execute the instructions provided in the embodiments of the present application by executing the instructions stored in the memory 220 and/or the instructions stored in the memory provided in the processor 210 Data transfer methods, and other applications and data processing.
  • the USB interface is a serial bus standard and a technical specification of an input and output interface. It can be used to connect the central control system with peripherals, such as mobile phones, to transmit data.
  • the mobile communication circuit 240 may provide a wireless communication solution including 2G/3G/4G/5G and the like applied to the central control system 200 .
  • the mobile communication circuit 240 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), and the like.
  • the mobile communication circuit 240 can receive electromagnetic waves from the antenna 1, filter, amplify, etc. the received electromagnetic waves, and transmit them to the modulation and demodulation processor for demodulation.
  • the mobile communication circuit 240 can also amplify the signal modulated by the modulation and demodulation processor, and then turn it into an electromagnetic wave and radiate it out through the antenna 1 .
  • the wireless communication circuit 250 may provide a wireless communication solution including Wi-Fi network, BT network, GNSS, FM, NFC, IR, or other possible general transmission technologies applied on the central control system 200 .
  • the wireless communication circuit 250 can receive electromagnetic waves from the antenna 2 , frequency modulate and filter the electromagnetic wave signals, and send the processed signals to the processor 210 .
  • the wireless communication circuit 250 can also receive the signal to be sent from the processor 210 , perform frequency modulation on it, amplify it, and then convert it into electromagnetic waves for radiation through the antenna 2 .
  • the central control system 200 can implement audio functions through an audio circuit 260, a speaker 261, a microphone 262, an application processor, and the like. Such as music playback, recording, etc.
  • the central control system 200 may implement a display function through a GPU, a display screen 270, an application processor, and the like.
  • the GPU is a microprocessor for image processing, and is connected to the display screen 270 and the application processor.
  • the GPU is used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 210 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the display screen 270 is used to display images, videos, and the like.
  • the display screen 270 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode, or an active matrix organic light emitting diode (active-matrix organic light).
  • emitting diode, AMOLED flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed or quantum dot light-emitting diode (quantum dot light emitting diodes, QLED) and so on.
  • the central control system 200 may include one or more display screens 270 .
  • the central control system 200 may display the display interface and/or target data in the data transmission method provided in the embodiments of the present application through the one or more display screens 270 .
  • the central control system 200 may include more or less components than shown, or some components may be combined, or some components may be separated, or different components may be arranged.
  • the components shown in Figure 2 may be implemented in hardware, software or a combination of software and hardware.
  • At least one vehicle-mounted device may be installed on the vehicle where the central control system 200 is located, such as a vehicle-mounted display screen, a vehicle-mounted speaker, and a vehicle-mounted microphone.
  • the central control system 200 The display screen may not be included, and the central control system 200 can control the vehicle display screen to realize the function of the display screen.
  • FIG. 3 shows a schematic structural diagram of a mobile phone 300 provided by an embodiment of the present application, and the mobile phone 300 may be the mobile phone 120 described in FIG. 1 .
  • the mobile phone 300 may include: an RF circuit 310, a memory 320, other input devices 330, a display screen 340, a sensor 350, an audio circuit 360, a speaker 361, a microphone 362, an I/O subsystem 370, a processor 380 and Power 390.
  • the RF circuit 310 can be used to send and receive data or to receive and send signals during a call.
  • RF circuits include, but are not limited to, antennas, at least one amplifier, transceivers, couplers, low noise amplifiers (LNAs), duplexers, and the like.
  • the RF circuit 310 may also communicate with other devices through a wireless communication network.
  • the wireless communication network may use any communication standard or protocol, and the wireless communication network may be a local area network, or a wide area network switched by a relay device, or includes a local area network and a wide area network.
  • the RF circuit 310 may use the data transmission method provided by the embodiments of the present application to perform data transmission with the central control system through a wireless communication network.
  • the memory 320 may be used to store software programs and modules, and the processor 280 executes various functional applications and data processing of the mobile phone 300 by running the software programs and modules stored in the memory 320 .
  • the memory 320 mainly includes a stored program area and a stored data area, wherein the stored program area can store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), etc.;
  • the use of the mobile phone 300 creates data (such as audio data, phonebook, images, etc.), etc. or stores data transmitted from other devices.
  • the memory 320 may include random access memory (RAM), read-only memory (ROM) or cache (cache), etc., and may also include non-volatile memory (non-volatile random memory) access memory, NVRAM), such as at least one disk storage device, flash memory (FS), or other volatile solid-state storage device.
  • RAM random access memory
  • ROM read-only memory
  • cache cache
  • NVRAM non-volatile random memory access memory
  • FS flash memory
  • Other input devices 330 may be used to receive input numerical or character information, and to generate key signal input related to user settings and function control of the cell phone 300 .
  • other input devices 330 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, optical mice (optical mice are touch-sensitive mice that do not display visual output) surface, or an extension of a touch-sensitive surface formed by a touch screen), etc.
  • the other input device 330 is connected to the other device input controller 371 of the I/O subsystem 360 , and performs signal interaction with the processor 380 under the control of the other device input controller 371 .
  • the display screen 340 may be used to display information input by or provided to the user and various menus of the mobile phone 300, and may also accept user input.
  • the specific display screen 340 may include a display panel 341 and a touch panel 342 .
  • the display panel 341 can be configured in the form of a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (organic light-emitting diode, OLED) or the like.
  • the touch panel 342 also known as a touch screen, touch sensitive screen, etc., can collect contact or non-contact operations (such as the user using a finger, a stylus, etc., any suitable object or accessory on or near the touch panel 342 by the user) Or the operation near the touch panel 342 may also include a somatosensory operation; the operation includes operation types such as single-point control operation, multi-point control operation, etc.), and the corresponding connection device is driven according to a preset program.
  • the display screen 340 may be used to display various display interfaces described in the data transmission methods provided in the embodiments of the present application.
  • the touch panel 342 may include two parts, a touch detection device and a touch controller.
  • the touch detection device detects the user's touch orientation and posture, detects the signal brought by the touch operation, and transmits the signal to the touch controller;
  • the touch controller receives the touch information from the touch detection device, and converts it into a processor capable of The processed information is then sent to the processor 380, and the commands sent by the processor 380 can be received and executed.
  • the touch panel 342 can be realized by various types of resistive, capacitive, infrared, and surface acoustic waves, and can also be realized by any technology developed in the future.
  • the touch panel 342 can cover the display panel 341, and the user can cover the display panel 341 according to the content displayed on the display panel 341 (the display content includes, but is not limited to, a soft keyboard, a virtual mouse, virtual keys, icons, etc.).
  • the touch panel 342 performs an operation on or near the touch panel 342. After the touch panel 342 detects the operation on or near it, the touch panel 342 transmits the operation to the processor 380 through the I/O subsystem 370 to determine the user input, and then the processor 380 determines the user input according to the user input. Corresponding visual outputs are provided on display panel 341 through I/O subsystem 370 .
  • the touch panel 342 and the display panel 341 are used as two independent components to realize the input and input functions of the mobile phone 300, in some embodiments, the touch panel 342 and the display panel 341 may be integrated And realize the input and output functions of the mobile phone 300 .
  • the sensor 350 may be one or more types, for example, the sensor 350 may include an acceleration sensor, a distance sensor, a fingerprint sensor, an ambient light sensor, a gyroscope, and the like.
  • Audio circuit 360 may provide an audio interface between the user and cell phone 300 .
  • the audio circuit 360 can transmit the received audio data converted signal to the speaker 361, and the speaker 361 converts it into a sound signal for output; on the other hand, the microphone 362 converts the collected sound signal into a signal, which is received by the audio circuit 360. Converted to audio data, the audio data is output to the RF circuit 310 for sending to other devices (such as a central control system or other mobile phones), or the audio data is output to the memory 320 for further processing.
  • the I/O subsystem 370 is used to control the input and output of external devices, which may include other device input controller 371 , sensor controller 372 , and display controller 373 .
  • one or more other input control device controllers 371 receive signals from and/or send signals to other input devices 330, which may include physical buttons (push buttons, rocker buttons, etc.) , dial pad, slide switch, click wheel, etc. It should be noted that the other input device control controller 371 may be connected to any one or more of the above-mentioned devices.
  • the display controller 373 in the I/O subsystem 370 receives signals from and/or sends signals to the display screen 340 .
  • the display controller 373 converts the detected user input into interaction with the user interface objects displayed on the display screen 340, that is, to realize human-computer interaction.
  • Sensor controller 372 may receive signals from and/or send signals to one or more sensors 350 .
  • the processor 380 is the control center of the mobile phone 300, using various interfaces and lines to connect various parts of the entire mobile phone 300, by running or executing the software programs and/or modules stored in the memory 320, and calling the data stored in the memory 320. , perform various functions of the mobile phone 300 and process data, so as to monitor the mobile phone as a whole.
  • the processor 380 may include one or more processing units; preferably, the processor 380 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, and application programs, etc. , the modem processor mainly deals with wireless communication. It can be understood that, the above-mentioned modulation and demodulation processor may not be integrated into the processor 380 .
  • the processor 380 may call the data stored in the memory 320, and execute the data transmission method provided by the embodiments of the present application, so as to transmit data (such as target data, key information, authorization certificate, etc.) to the central control system .
  • the mobile phone 300 also includes a power supply 390 (such as a battery) for supplying power to various components.
  • a power supply 390 such as a battery
  • the power supply can be logically connected to the processor 380 through a power management system, so that functions such as managing charging, discharging, and power consumption are implemented through the power management system.
  • the structures illustrated in the embodiments of the present application do not constitute a specific limitation on the mobile phone 300 .
  • the mobile phone 300 may include more or less components than shown, or combine some components, or separate some components, or arrange different components.
  • the components shown in Figure 3 may be implemented in hardware, software or a combination of software and hardware.
  • the mobile phone described in the embodiments of the present application may also be other terminal devices, for example: the terminal device may also be a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable Devices, virtual reality (VR) devices, augmented reality (AR) devices, wireless terminals in self-driving (self driving), cellular phones, cordless phones, session initiation protocol (SIP) Telephones, personal digital assistants (PDAs), handheld devices with wireless communication functions, computing devices, smart home devices, wearable devices, terminal devices in 5G networks, or future evolution of public land mobile communication networks (public land mobile network, PLMN), etc., this is not limited in this embodiment of the present application.
  • the terminal device may also be a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable Devices, virtual reality (VR) devices, augmented reality (AR) devices, wireless terminals in self-driving (self driving), cellular phones, cordless phones, session initiation protocol (
  • a wearable device can also be called a wearable smart device, which is a general term for the intelligent design of daily wear and the development of wearable devices using wearable technology, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories.
  • the data stored in the mobile phone can be set to multiple security levels. Taking two security levels as an example, data with a high security level can be called sensitive data, and data with a low security level can be called non-sensitive data. Sensitive data or general data.
  • the mobile phone can upload the ordinary data to the user's account in the service server on the cloud side.
  • the central control system can log in to the user account of the service server, download the common data stored under the account, and display the common data.
  • Sensitive data is usually relatively private data set by the user and needs to be kept confidential, such as the user's address book, photo album, text message, financial information, itinerary information, etc. If an existing data transmission method is used to transmit sensitive data, the mobile terminal first needs to transmit the sensitive data to the service server, and then the central control system downloads the sensitive data from the service server to the local, and displays it to the user.
  • the sensitive data needs to be stored and transmitted through the service server on the cloud side, and there may be information in the process of storing and transmitting the sensitive data by the service server Risk of leakage and, therefore, less secure data.
  • the process of uploading the sensitive data to the service server by the mobile terminal and downloading the sensitive data from the service server by the central control system takes a long time, the timeliness of the data is poor.
  • the embodiments of the present application provide a data transmission method and apparatus, which can improve the security and timeliness of data.
  • FIG. 4 shows a schematic flowchart of a data transmission method 400 provided by an embodiment of the present application. As shown in FIG. 4 , the method may be applied to the communication system 100 shown in FIG. 1 , and the method 400 may include the following steps 401 Go to step 411 .
  • Step 401 establishing a communication connection between the mobile phone and the central control system.
  • the mobile phone and the central control system may establish a communication connection through various communication networks, which is not limited in this embodiment of the present application.
  • the central control system can establish a Bluetooth communication connection with the mobile phone after detecting the first indication information.
  • a trigger condition for triggering the first indication information may be set on the central control system; when the user wants the central control system to establish a Bluetooth communication connection with the mobile phone, the central control system can be operated to trigger the the first indication information.
  • the central control system detects the first indication information, it establishes a Bluetooth communication connection with the mobile phone.
  • the central control system may be provided with a virtual key that triggers the first indication information.
  • the first indication information can be triggered.
  • FIG. 5 shows a bluetooth function setting interface of the central control system, and a user can manage the bluetooth function through the bluetooth function setting interface.
  • the Bluetooth function setting interface includes function options such as on/off of the “Bluetooth function”.
  • the central control system detects that the user slides the control 501 to the right or clicks the control 501, the central control system enables the Bluetooth function, and displays the interface shown in FIG. 6 .
  • the Bluetooth function setting interface may further include a list of available devices, and the Bluetooth device list includes multiple device options that can be connected.
  • the central control system when it detects the first indication information, it establishes a Bluetooth communication connection with the mobile phone. After the Bluetooth communication connection between the central control system and the mobile phone is successfully established, the display panel of the central control system can display The interface shown in Figure 7.
  • the mobile phone may also establish a Bluetooth communication with the central control system after detecting the second indication information connect.
  • a trigger condition for triggering the second indication information can be set on the mobile phone; when the user wants the mobile phone to establish a Bluetooth communication connection with the central control system, the mobile phone can be operated to trigger the second indication information.
  • the mobile phone detects the second indication information, it establishes a Bluetooth communication connection with the central control system.
  • the mobile phone may be provided with a virtual key for triggering the second indication information.
  • the second indication information can be triggered.
  • the user may also perform operations similar to those shown in FIG. 5 and FIG. 6 above on the mobile phone to trigger the second indication information, which will not be repeated here in order to avoid repetition.
  • the mobile phone when it detects the second indication information, it establishes a Bluetooth communication connection with the central control system. After the Bluetooth communication connection between the mobile phone and the central control system is successfully established, the display panel of the central control system can The interface shown in Figure 8 is displayed.
  • Step 402 the mobile phone and the central control device enable the sensitive data transmission function.
  • the mobile phone may enable the sensitive data transmission function after detecting the third indication information.
  • a trigger condition for triggering the third indication information may be set on the mobile phone; when the user wants the mobile phone to enable the sensitive data transmission function, the mobile phone may be operated to trigger the third indication information.
  • the mobile phone detects the third indication information, the mobile phone enables the sensitive data transmission function.
  • the mobile phone may be provided with a physical button or a virtual button or the like that triggers the third indication information.
  • the third indication information can be triggered.
  • the mobile phone may include a physical button 503 and a physical button 504, the physical button 503 is a volume button, and the physical button 504 is a power button.
  • the mobile phone detects that the user presses the first side and the second side of the volume button 503 simultaneously After the operation on the second side, the third indication information is triggered.
  • the display panel of the mobile phone can display the sensitive data shown in FIG. 11 .
  • Transmission function setting interface As shown in FIG. 11 , the sensitive data transmission function setting interface includes function options such as on/off of “sensitive data transmission function”.
  • the central control system may enable the sensitive data transmission function after detecting the fourth indication information.
  • the central control system may be provided with a triggering condition for triggering the fourth indication information; when the user wants the central control system to enable the sensitive data transmission function, the central control system may be operated to trigger the fourth indication information.
  • the central control system detects the fourth indication information, the central control system enables the sensitive data transmission function.
  • the central control system may include a physical button 507 , and when the central control system detects that the user presses the physical button 507 , the fourth indication information is triggered.
  • the central control system may also be provided with a virtual key that triggers the fourth indication information.
  • the fourth indication information can be triggered.
  • the user can also perform operations similar to the above-mentioned FIG. 10 and FIG. 11 on the mobile phone to trigger the fourth indication information, which is not repeated here in order to avoid repetition.
  • step 403 the identity verification is performed between the mobile phone and the central control system, and it is determined that the identity verification is passed.
  • step 403 includes: the mobile phone performs identity verification on the central control system, and determines that the central control system has passed the identity verification; the central control system performs identity verification on the mobile phone, and determines that the mobile phone has passed the identity verification.
  • step 403 a trust relationship is established between the mobile phone and the central control system, and secure communication can be performed based on the trust relationship.
  • the identity verification between the mobile phone and the central control system may be performed in various manners, which is not limited in this embodiment of the present application.
  • the relationship between the mobile phone and the central control system may be based on a digital certificate issued by a public key infrastructure (PKI) (including the digital certificate of the mobile phone and the digital certificate of the central control system). ) to authenticate.
  • PKI public key infrastructure
  • the PKI system can be used to issue and manage certificates.
  • PKI systems issue digital certificates through a certificate authority (CA).
  • CA certificate authority
  • the mobile phone and the central control system can apply for a digital certificate from the CA through PKI respectively, as a certificate of their own identity. If the digital certificate of the mobile phone is validated by the central control system, the central control system trusts the mobile phone; similarly, if the digital certificate of the central control system is validated by the mobile phone, the mobile phone trusts the central control system.
  • Step 404 the mobile phone encrypts the sensitive data with the first key to obtain encrypted sensitive data.
  • the sensitive data in the mobile phone is set by the user and is considered to be relatively private and private, it needs to be encrypted to improve the security of this part of the sensitive data.
  • Step 405 the mobile phone sends the encrypted sensitive data to the central control system. Accordingly, the central control system receives the encrypted sensitive data from the mobile phone.
  • the mobile phone may use an asymmetric key algorithm to send the encrypted sensitive data to the central control system.
  • the central control system may include a key pair A, which is used for data transmission between the mobile phone and the central control system, the key pair A includes a public key a and a private key a, and the public key pair A is used for data transmission between the mobile phone and the central control system.
  • the key a is disclosed to the mobile phone, and the mobile phone can use the public key a to encrypt the encrypted sensitive data to obtain first encrypted data, and send the first encrypted data to the central control system.
  • the central control system receives the first encrypted data from the mobile phone; decrypts the first encrypted data using the private key a to obtain the encrypted sensitive data.
  • Step 406 the mobile phone sends first key information to the central control system, where the first key information is used to indicate the first key used for the sensitive data.
  • the central control system receives the first key information from the mobile phone.
  • the first key may include one key or a combination of multiple keys, which is not limited in this embodiment of the present application.
  • the mobile phone may send the first key information to the central control system in various ways, which is not limited in this embodiment of the present application.
  • the mobile phone can generate an authorization certificate, the authorization certificate is used to authorize the processing authority of the sensitive data, the authorization certificate includes the first key information; and the authorization certificate is sent to the central control system.
  • steps 405 and 406 may be two independent steps.
  • step 405 and step 406 are two independent steps, the execution order of these two steps is not sequential.
  • the authorization certificate may further include validity period information, where the validity period information is used to indicate the validity period of the authorization certificate.
  • the authorization certificate is valid for a long time from the starting time.
  • the authorization certificate is valid in the time period between the start time and the end time.
  • the validity period information includes validity indication information, where the validity indication is used to indicate that it is valid for only one use.
  • step 406 can only be performed for the first time; or, the authorization certificate is valid within a specified period of time, that is, this step 406 only needs to be performed once within this period of time. After this period of time, step 406 needs to be re-executed; or, the authorization certificate is only valid during one sensitive data transmission process, that is, this step 406 needs to be executed during each sensitive data transmission process, and this embodiment of the present application does this Not limited.
  • step 406 needs to be executed during each sensitive data transmission process, that is, every time step 405 is executed, step 406 needs to be executed once. That is to say, different authorization certificates are generated for different sensitive data, which can improve the security and privacy of the data.
  • the mobile phone may carry the first key information in the unencrypted field of the encrypted sensitive data described in step 405 .
  • steps 405 and 406 may be combined into one step.
  • Step 407 the central control system saves the first key information and the encrypted sensitive data.
  • the storage data area of the memory of the central control system may include at least one first storage area, and the at least one first storage area is in one-to-one correspondence with at least one mobile phone.
  • the first storage area corresponding to the mobile phone is used to store the encrypted sensitive data and the first key information of the mobile phone.
  • the central control system may save the encrypted sensitive data and the first key information of the mobile phone to a first storage area corresponding to the mobile phone in the storage data area of the memory.
  • the first storage area corresponding to the mobile phone is also used to store common data of the mobile phone.
  • the central control system may also store the ordinary data of the mobile phone in the first storage area corresponding to the mobile phone.
  • Step 408 the central control system decrypts the encrypted sensitive data through the first key indicated by the first key information to obtain the sensitive data.
  • step 409 the central control system displays target data, and the target data is obtained based on the sensitive data.
  • the central control system may display the target data in various manners, which is not limited in this embodiment of the present application.
  • the central control system may display the target data through a display panel.
  • the central control system may play the target data through a speaker.
  • the central control system may also control the on-board display screen to display the target data, or control the on-board audio system to play the target data, which is not limited in this embodiment of the present application.
  • the target data may be the sensitive data.
  • the central control system can display the following picture through the display panel. 14 shows the interface.
  • application software can be installed in the central control system, and these application software will generate Application data, such as cache data, update data, communication data, etc.
  • the target data is obtained by data fusion of the sensitive data and vehicle data, where the vehicle data includes the driving data and/or the application data.
  • the navigation device in the central control system For example: take the user's personal short-distance business trip itinerary plan in the mobile phone, such as the destination address 1 and departure time 1 of trip 1, as sensitive data as an example, the navigation device in the central control system generates application data during operation. , the application data includes the current address. If the time difference between the current time and the above-mentioned departure time 1 is less than the preset time threshold, the central control system can display the interface shown in Figure 15 through the display panel. As shown in FIG. 15 , the interface includes a navigation map from the current address to the destination address 1 of the trip 1 .
  • Step 410 the central control system stops displaying the target data.
  • the central control system may stop displaying the target data under various circumstances, which is not limited in this embodiment of the present application.
  • the central control system may stop displaying the target data after not interacting with the mobile phone within a preset first period of time.
  • the central control system may stop displaying the target data after detecting the fifth indication information.
  • the central control system may be provided with a trigger condition for triggering the fifth indication information; when the user wants the central control system to stop displaying the target data, the central control system may be operated to trigger the fifth indication information.
  • a virtual key for triggering the fifth indication information may be provided on the central control system.
  • the fifth indication information is triggered.
  • the sensitive data transmission function setting interface of the central control system includes options such as enabling/disabling of the "sensitive data transmission function".
  • the central control system detects that the user swipes the control 506 to the left or clicks the control After the operation of 506, the fifth indication information is triggered.
  • the drop-down shortcut setting menu of the central control system may include a shortcut control 508 for enabling/disabling the sensitive data transmission function.
  • the central control system detects that the user clicks on the shortcut control 508, the fifth indication information is triggered.
  • the central control system may stop displaying the target data after detecting that a new device establishes a communication connection with the central control system.
  • the central control system stops displaying the target data, which can improve the security and privacy of the data.
  • the central control system may stop displaying the target data after detecting that the communication connection between the central control system and the mobile phone is disconnected.
  • the central control system may stop displaying the target data after receiving the sixth indication information of the mobile phone.
  • the mobile phone may be set with a trigger condition that triggers sending the sixth indication information to the central control system; when the user wants the mobile phone to send the sixth indication information to the central control system, the mobile phone can be operated. , to trigger sending the sixth indication information to the central control system.
  • the mobile phone may be provided with a virtual key that triggers the sixth indication information.
  • the virtual button When the user clicks the virtual button, it triggers the sending of the sixth indication information to the central control system.
  • the sensitive data transmission function setting interface includes function options such as enabling/disabling of “sensitive data transmission function”. Send the sixth indication information to the central control system.
  • the central control system may stop displaying the target data to the user in various manners, which is not limited in this embodiment of the present application.
  • the central control system may shield the target data.
  • the user can block the new messages of the A application shown in FIG. 12 .
  • the central control system may disable the sensitive data transmission function of the central control system.
  • the central control system can display the interface shown in Figure 18 to the user through the display panel, and when the central control system detects that the user clicks the "Yes" option, the sensitive data transmission function of the central control system is turned off.
  • Step 411 the central control system deletes the stored first key information and the encrypted sensitive data.
  • the central control system stops displaying the
  • the central control system may delete the first key information and the encrypted sensitive data after detecting the seventh indication information.
  • the central control system may be provided with a trigger condition for triggering the seventh indication information; when the user wants to instruct the central control system to delete the stored first key information and the encrypted sensitive data, the The control system operates to trigger the seventh indication information.
  • a virtual key for triggering the seventh indication information may be provided on the central control system.
  • the seventh indication information is triggered.
  • the central control system can display the interface shown in Figure 19 to the user through the display panel.
  • the central control system detects that the user clicks the "Yes" option in the interface , triggering the seventh indication information.
  • steps 407 and steps 408 to 409 are executed in no particular order.
  • steps 401 to 411 are all steps for completing a complete display of sensitive data between the mobile phone and the central control system. Some steps are optional, for example, steps 401, 402, 403, 406, 407, 410, and 411 are optional steps.
  • step 401, step 402, and step 403 may only be executed for the first time; or, when there is a communication connection between the mobile phone and the central control system, step 401 may not be executed; or, when the mobile phone and the central control system
  • step 402 may not be performed; or, when a trust relationship has been established between the mobile phone and the central control system, step 403 may not be performed, but performing step 403 every time can improve data security and privacy.
  • step 410 may not be performed, that is, the mobile phone can continue to display the sensitive data of the mobile phone; or, step 410 may be performed under various circumstances described in step 410 to prevent others from seeing the display of the central control system of this sensitive data, thereby improving data security and privacy.
  • step 411 may not be performed, that is, the sensitive data may be kept in the central control system; or, step 411 may be performed after performing step 410 each time, that is, as long as the display of the sensitive data is stopped, The sensitive data stored in the central control system is deleted, which can improve the security of the data.
  • the data transmission method provided in the embodiment of the present application may be used for sensitive data or common data, which is not limited in the embodiment of the present application. That is to say, ordinary data in the mobile phone can also be transmitted by using the data transmission method provided in the embodiment of the present application, so as to improve the security and privacy of the data.
  • the mobile phone can directly transmit the encrypted sensitive data and the first key information used for the sensitive data in an end-to-end manner.
  • the central control system decrypts the encrypted sensitive data based on the first key information to obtain and display the sensitive data.
  • the sensitive data does not need to be transmitted between the mobile phone and the central control system through the service server, which can avoid the information existing in the service server during the storage and transmission process.
  • the leakage problem therefore, can improve the security of the data.
  • the sensitive data is transmitted end-to-end between the mobile phone and the central control system, so the timeliness of the data can be improved.
  • the central control system can also combine sensitive data and vehicle data to provide users with personalized services.
  • FIG. 20 shows a schematic flowchart of a data transmission method 600 provided by an embodiment of the present application.
  • the method 600 may be applied to the communication system shown in FIG. 1 . 100, the method 600 may include the following steps 601 to 616.
  • Step 601 establishing a communication connection between the mobile phone and the central control system.
  • Step 602 the mobile phone and the central control device enable the sensitive data transmission function.
  • step 603 identity verification is performed between the mobile phone and the central control system, and it is determined that the identity verification is passed.
  • Step 604 the mobile phone encrypts the sensitive data with the first key to obtain encrypted sensitive data.
  • Step 605 the mobile phone sends the encrypted sensitive data to the central control system. Accordingly, the central control system receives the encrypted sensitive data from the mobile phone.
  • Step 606 the mobile phone sends first key information to the central control system, where the first key information is used to indicate the first key used for the sensitive data.
  • the central control system receives the first key information from the mobile phone.
  • Step 607 the central control system saves the first key information and the encrypted sensitive data.
  • Step 608 the central control system decrypts the encrypted sensitive data through the first key indicated by the first key information to obtain the sensitive data.
  • step 609 the central control system displays target data, and the target data is obtained based on the sensitive data.
  • Step 610 the central control system obtains portrait information according to the sensitive data and/or the vehicle data.
  • the central control system may obtain portrait information according to the sensitive data and the vehicle data, where the portrait information includes user portrait information and/or vehicle portrait information, and the user portrait information is used to describe the mobile phone The user, the vehicle portrait information is used to describe the state of the vehicle where the central control system is located.
  • the sensitive data includes the user's home address and company address
  • the vehicle data includes the trip records in the navigation application data, such as Monday to Friday: 7:00am to 8:20am, from the home address to the company address, the middle Stop near M Coffee Shop for 15 minutes, from 17:00 to 18:00 in the afternoon, from the company address to the home address, weekends: travel to and from various tourist attractions
  • the corresponding driving data such as speed, refueling records, fuel consumption, mileage
  • the user profile information may include information such as the user being a female, an office worker, a coffee drinker, a traveler, and an introvert.
  • the sensitive data includes at least one of the user's itinerary, the 4S stores that the user frequents, etc.
  • the vehicle data includes car maintenance records, historical maintenance records, refueling records, vehicle speed, fuel consumption, mileage, and rotational speed.
  • the vehicle portrait information may include information such as whether the vehicle is faulty, whether the vehicle needs to be refueled, and whether the vehicle needs to be maintained.
  • the central control system may input the sensitive data and/or the vehicle data into a preset portrait model to obtain the portrait information, wherein the portrait model is a neural network algorithm used to analyze the big data. obtained by training.
  • Step 611 the central control system saves the portrait information.
  • the first storage area corresponding to the mobile phone in the storage data area of the memory of the central control system is also used to store the portrait information.
  • the central control system can store the encrypted sensitive data and the first key information of the mobile phone, and the user's portrait information in the first storage area corresponding to the mobile phone.
  • Step 612 the central control system displays reminder information according to the portrait information, and the reminder information is used to remind the user.
  • the reminder information may include: a reminder to arrive late for get off work, a reminder to leave early after work, a reminder to pass a coffee shop, a reminder to recommend tourist attractions, a reminder of vehicle failure, a reminder of vehicle battery life, a reminder of vehicle refueling, and a reminder of vehicle maintenance.
  • the central control system can display the interface shown in Figure 22 through the display panel.
  • the interface includes reminder information for reminding to go to the coffee shop.
  • the central control system can display the interface shown in FIG. 23 through the display panel. As shown in Figure 23, the interface includes reminder information for reminding vehicle maintenance.
  • Step 613 the central control system stops displaying the target data.
  • Step 614 the central control system deletes the stored first key information and the encrypted sensitive data.
  • Step 615 the central control system stops displaying the reminder information.
  • Step 616 the central control system deletes the stored portrait information.
  • step 613 and step 615 may be two independent steps, or may be combined into one step, which is not limited in this embodiment of the present application.
  • step 613 and step 615 are two independent steps, the execution order of these two steps is not specific.
  • step 614 and step 616 may be two independent steps, or may be combined into one step, which is not limited in this embodiment of the present application.
  • step 614 and step 616 are two independent steps, the execution order of these two steps is not specific.
  • steps 609 and steps 610 to 612 are executed in no particular order, and steps 613 to 614 and steps 615 to 616 are executed in no particular order.
  • steps 611 , 613 , 614 , 615 and 616 are optional steps.
  • step 611 may only be performed for the first time.
  • the central control system can not only obtain the sensitive data in the mobile phone in an end-to-end manner and display the sensitive data, but also can fuse the sensitive data with the vehicle data. Display can improve the diversity of data display.
  • the central control system can also display personalized reminder information to the user according to the portrait information obtained based on the sensitive data and/or the vehicle data, which can further improve the diversity of data display, thereby improving the user experience.
  • step 610 since the computing power and processing power of the central control system are usually relatively limited, and the execution process of step 610 requires relatively high capabilities of the central control system, such as the need to pre-configure the model for determining the portrait information and the needs Based on the model, a large number of operations are performed on the sensitive data and/or the vehicle data to obtain portrait information, etc. Therefore, a central control system with limited capabilities may not be able to meet the above-mentioned capability requirements.
  • the business server on the cloud side usually has strong computing, processing and storage capabilities, so the central control system can directly transmit the sensitive data and/or vehicle data to the business server, and the business server executes the steps
  • the process of 610 is used to reduce the capability requirement and calculation amount of the central control system.
  • FIG. 24 shows a schematic flowchart of a data transmission method 700 provided by an embodiment of the present application. As shown in FIG. 24 , the method 700 may be applied to the communication system 100 shown in FIG. 1 , and the method 700 may include the following steps 701 to step 721.
  • Step 701 establishing a communication connection between the mobile phone and the central control system.
  • Step 702 the mobile phone and the central control device enable the sensitive data transmission function.
  • Step 703 Perform identity verification between the mobile phone and the central control system, and determine to pass the identity verification.
  • Step 704 the mobile phone encrypts the sensitive data with the first key to obtain encrypted sensitive data.
  • Step 705 the mobile phone sends the encrypted sensitive data to the central control system. Accordingly, the central control system receives the encrypted sensitive data from the mobile phone.
  • Step 706 the mobile phone sends first key information to the central control system, where the first key information is used to indicate the first key used for the sensitive data.
  • the central control system receives the first key information from the mobile phone.
  • Step 707 the central control system saves the first key information and the encrypted sensitive data.
  • Step 708 the central control system decrypts the encrypted sensitive data through the first key indicated by the first key information to obtain the sensitive data.
  • Step 709 the central control system displays target data, and the target data is obtained based on the sensitive data.
  • steps 701 to 709 reference may be made to the introduction of steps 401 to 409 in FIG. 4 , and to avoid repetition, details are not repeated here.
  • Step 710 the central control system desensitizes the sensitive data to obtain characteristic data.
  • the central control system removes the information related to user privacy in the sensitive data by performing special processing on the sensitive data, and uses the processed features
  • the data is uploaded to the business server in place of the sensitive data.
  • the sensitive data includes: the user's home address is No. 120, Z Street, District Y, City X, and the user's company address is No. 1, Street D, District M, City X.
  • the feature obtained The data may include: the address of A is No. 120, Street Z, District Y, City X, and the address of Address B is No. 1, Street D, District M, City X.
  • Step 711 the central control system establishes a first trust relationship with the service server through the trust ring technology, the first trust relationship is used to indicate mutual trust between the central control system and the service server, and the first trust relationship corresponds to the central control system.
  • the key pair B i.e. the first key pair
  • the key pair B includes the private key b (i.e. the first private key) and the public key b (i.e. the first public key) of the central control system.
  • the private key b is used to identify the trusted identity of the central control system.
  • the trust ring technology belongs to a technical solution in which a physical device is trusted. After the central control system and the service server trust each other, trusted or secure communication can be performed between the central control system and the service server.
  • Step 712 the central control system and the service server save the first trust relationship.
  • the central control system may store a first trust relationship list, the first trust relationship list includes the first trust relationship, the first trust relationship may include identification information of the service server, the The identification information of the service server is used to identify the service server.
  • the identification information of the service server may include a device name, a device model, a hardware address, and the like of the service server.
  • the central control system may store the first trust relationship list shown in FIG. 25 .
  • the storage data area of the memory of the central control system may also include a second storage area, and the second storage area is used to store at least one trust relationship mutually trusted with the central control system, and the at least one trust relationship includes the first trust relationship.
  • a relationship of trust is used to store at least one trust relationship mutually trusted with the central control system, and the at least one trust relationship includes the first trust relationship.
  • the central control system may save the trust relationship list shown in FIG. 25 to the second storage area.
  • the service server may also store a second trust relationship list, where the second trust relationship list includes the first trust relationship.
  • Step 713 the central control system sends the feature data and/or the vehicle data to the service server through the private key b.
  • the service server receives the characteristic data and/or the vehicle data from the central control system.
  • the central control system may encrypt the feature data and/or the vehicle data through the private key b to obtain second encrypted data; and send the second encrypted data to the service server.
  • the service server receives the second encrypted data from the central control system; decrypts the second encrypted data through the public key b to obtain the characteristic data and/or the vehicle data.
  • step 713 may include: the central control system Through the private key b, the characteristic data and/or the desensitized vehicle data are sent to the service server. Accordingly, the service server receives the characteristic data and/or the desensitized vehicle data from the central control system, and performs subsequent processing based on the characteristic data and/or the desensitized vehicle data.
  • Step 714 the service server obtains portrait information according to the sensitive data and/or the vehicle data.
  • step 714 reference may be made to the step 610 in FIG. 20, and to avoid repetition, details are not repeated here.
  • Step 715 the service server sends the portrait information to the central control system.
  • the central control system receives the portrait information from the service server.
  • Step 716 the central control system saves the portrait information.
  • Step 717 the central control system displays reminder information according to the portrait information, and the reminder information is used to remind the user.
  • Step 718 the central control system stops displaying the target data.
  • Step 719 the central control system deletes the stored first key information and the encrypted sensitive data.
  • Step 720 the central control system stops displaying the reminder information.
  • Step 721 the central control system deletes the stored portrait information.
  • steps 710 and steps 711 to 712 are executed in no particular order.
  • steps 711 and 712 are optional steps.
  • step 711 and step 712 may only be performed for the first time.
  • performing steps 711 and 712 every time can improve the security of the data.
  • the central control system and the service server can perform secure communication based on the first trust relationship, that is, the central control system and the service server can perform secure communication based on the first trust relationship.
  • the system may send the sensitive data and/or vehicle data to the service server based on the trusted identity, and the service server may determine portrait information based on the sensitive data and/or vehicle data.
  • the central control system does not need to determine the portrait information based on the sensitive data and/or vehicle data by itself, which can reduce the capability requirement and calculation amount of the central control system.
  • the central control system and the service server transmit the sensitive data and/or vehicle data based on the first trust relationship, which can improve data security.
  • step 711 requires a high capability of the central control system, such as the need to obtain the key pair B and the need for mutual trust with the business server. Therefore, the central control system with limited capability may not be able to meet the above capability requirements.
  • mobile phones usually have strong computing and processing capabilities. Therefore, it can be considered to establish a trust relationship between the mobile phone and the service server, and authorize the trusted identity of the mobile phone to the central control system to reduce the ability of the central control system. requirements and calculations.
  • FIG. 27 shows a schematic flowchart of a data transmission method 800 provided by an embodiment of the present application.
  • the method 800 may be applied to the communication system 100 shown in FIG. 1 , and the method 800 may include the following steps 801 to step 824.
  • Step 801 the mobile phone establishes a communication connection with the central control system.
  • Step 802 the mobile phone and the central control device enable the sensitive data transmission function.
  • Step 803 Perform identity verification between the mobile phone and the central control system, and determine that the identity verification is passed.
  • Step 804 the mobile phone encrypts the sensitive data with the first key to obtain encrypted sensitive data.
  • Step 805 the mobile phone sends the encrypted sensitive data to the central control system. Accordingly, the central control system receives the encrypted sensitive data from the mobile phone.
  • Step 806 the mobile phone sends first key information to the central control system, where the first key information is used to indicate the first key used for the sensitive data.
  • the central control system receives the first key information from the mobile phone.
  • Step 807 the central control system saves the first key information and the encrypted sensitive data.
  • Step 808 the central control system decrypts the encrypted sensitive data through the first key indicated by the first key information to obtain the sensitive data.
  • Step 809 the central control system displays target data, and the target data is obtained based on the sensitive data.
  • Step 810 the central control system desensitizes the sensitive data to obtain characteristic data.
  • steps 801 to 810 reference may be made to the introduction of steps 701 to 710 in FIG. 24 , and to avoid repetition, details are not repeated here.
  • Step 811 the mobile phone establishes a second trust relationship with the service server through the trust ring technology, the second trust relationship is used to indicate mutual trust between the mobile phone and the service server, and the second trust relationship corresponds to the key pair of the mobile phone C (ie the second key pair), the key pair C includes the private key c (ie the second private key) and the public key c (ie the second public key) of the mobile phone, the private key c is used to identify the mobile phone trusted identity.
  • Step 812 the mobile phone and the service server save the second trust relationship.
  • step 812 reference may be made to the description of step 712 in FIG. 24 , and to avoid repetition, details are not repeated here.
  • Step 813 the mobile phone sends second key information to the central control system, where the second key information is used to indicate the private key c.
  • the central control system receives the second key information from the mobile phone.
  • the mobile phone may send the second key information to the central control system in various ways, which is not limited in this embodiment of the present application.
  • the mobile phone may send an identity certificate to the central control system, where the identity certificate is used to authorize the trusted identity of the mobile phone, and the identity certificate includes the second key information.
  • the mobile phone can authorize the trusted identity to the central control system.
  • Step 814 the central control system saves the second key information.
  • the first storage area corresponding to the mobile phone in the storage data area of the memory of the central control system is further used to store the second key information.
  • the central control system may also store the second key information in the first storage area corresponding to the mobile phone.
  • Step 815 the central control system sends the feature data and/or the vehicle data to the service server through the private key c.
  • the service server receives the characteristic data and/or the vehicle data from the central control system.
  • the central control system can securely communicate with the service server by using the trusted identity of the mobile phone, without establishing a trust relationship with the service server separately.
  • the central control system may encrypt the feature data and/or the vehicle data through the private key c to obtain third encrypted data; and send the third encrypted data to the service server.
  • the service server receives the third encrypted data from the central control system; decrypts the third encrypted data through the public key c to obtain the characteristic data and/or the vehicle data.
  • Step 816 the service server obtains portrait information according to the sensitive data and/or the vehicle data.
  • Step 817 the service server sends the portrait information to the central control system.
  • the central control system receives the portrait information from the service server.
  • Step 818 the central control system saves the portrait information.
  • Step 819 the central control system displays reminder information according to the portrait information, and the reminder information is used to remind the user.
  • Step 820 the central control system stops displaying the target data.
  • Step 821 the central control system deletes the stored first key information and the encrypted sensitive data.
  • Step 822 the central control system deletes the stored third key information.
  • Step 823 the central control system stops displaying the reminder information.
  • Step 824 the central control system deletes the stored portrait information.
  • steps 818 to 821 and steps 823 to 824 reference may be made to the introduction of steps 716 to 721 in FIG. 20 , and to avoid repetition, details are not repeated here.
  • steps 810 and steps 811 to 814 are executed in no particular order.
  • steps 811 to 814 are optional steps.
  • steps 811 to 814 may only be executed for the first time.
  • performing steps 811 to 814 every time can improve data security.
  • the mobile phone After establishing the second trust relationship, the mobile phone authorizes the trusted identity of the mobile phone to the central control system, so that the central control system can use the trusted identity of the mobile phone to communicate with the business
  • the server communicates securely without additionally establishing a trust relationship with the business server, thereby reducing the capability requirement and calculation amount of the central control system.
  • FIG. 29 shows a schematic flowchart of a data transmission method 900 provided by an embodiment of the present application. As shown in FIG. 29 , the method 900 may be applied to the communication system 100 shown in FIG. 1 . The method 900 may include the following steps 901 to 919.
  • Step 901 the first mobile phone establishes a communication connection with the central control system.
  • Step 902 the first mobile phone and the central control system enable the sensitive data transmission function.
  • Step 903 the first mobile phone performs identity verification with the central control system, and it is determined that the identity verification is passed.
  • Step 904 the first mobile phone encrypts the first sensitive data with the first key to obtain the encrypted first sensitive data.
  • Step 905 the first mobile phone sends the encrypted first sensitive data to the central control system. Accordingly, the central control system receives the encrypted first sensitive data from the first mobile phone.
  • Step 906 the first mobile phone sends first key information to the central control system, where the first key information is used to indicate the first key used for the first sensitive data.
  • the central control system receives the first key information from the first mobile phone.
  • Step 907 the central control system saves the first key information and the encrypted first sensitive data.
  • the storage data area of the memory of the central control system may include a first storage area corresponding to the first mobile phone, and the first storage area corresponding to the first mobile phone is used to store the first storage area. key information and the encrypted first sensitive data.
  • the central control system may store the first key information and the encrypted first sensitive data in the first storage area corresponding to the first mobile phone.
  • Step 908 the central control system decrypts the encrypted first sensitive data according to the first key indicated by the first key information to obtain the first sensitive data.
  • Step 909 the central control system displays the first target data, and the first target data is obtained based on the first sensitive data.
  • steps 901 to 909 reference may be made to steps 401 to 409 in FIG. 4 , and to avoid repetition, details are not repeated here.
  • Step 910 the second mobile phone establishes a communication connection with the central control system.
  • Step 911 the second mobile phone enables the sensitive data transmission function.
  • Step 912 the second mobile phone performs identity verification with the central control system, and it is determined that the identity verification is passed.
  • Step 913 the second mobile phone encrypts the second sensitive data with the second key to obtain the encrypted second sensitive data.
  • Step 914 the second mobile phone sends the encrypted second sensitive data to the central control system. Accordingly, the central control system receives the encrypted second sensitive data from the second mobile phone.
  • Step 915 the second mobile phone sends second key information to the central control system, where the second key information is used to indicate the second key used for the second sensitive data.
  • the central control system receives the second key information from the second mobile phone.
  • Step 916 the central control system saves the second key information and the encrypted second sensitive data.
  • the storage data area of the memory of the central control system may include a first storage area corresponding to the second mobile phone, and the first storage area corresponding to the second mobile phone is used to store the second mobile phone. key information and the encrypted second sensitive data.
  • the central control system may store the second key information and the encrypted second sensitive data in the first storage area corresponding to the second mobile phone.
  • Step 917 the central control system decrypts the encrypted second sensitive data according to the second key indicated by the second key information to obtain the second sensitive data.
  • the central control system stores sensitive data of different mobile phones in different regions, which can improve the isolation of data between mobile phones, thereby improving the security and privacy of data.
  • steps 910 to 917 reference may be made to steps 401 to 408 in FIG. 4 , and to avoid repetition, details are not repeated here.
  • Step 918 the central control system acquires the display strategy.
  • the central control system may acquire the display strategy in various ways, which is not limited in this embodiment of the present application.
  • the display strategy may be preconfigured in the central control system.
  • the central control system may display a display policy request to the user, where the display policy request is used to request the first sensitive data of the first mobile phone and the second sensitive data of the second mobile phone display strategy; get the display strategy entered by this user.
  • the central control system can display the display strategy selection interface shown in FIG. 31 through the display interface.
  • the display strategy selection interface includes a plurality of display strategy options. After detecting that the user clicks the option 509 of “show the first mobile phone and the second mobile phone at the same time”, the central control system obtains the corresponding option 509 display strategy.
  • Step 919 the central control system displays the first target data and/or the second target data according to the display strategy, and the second target data is obtained based on the second sensitive data.
  • the central control system continues to display the first target data of the first mobile phone without displaying the first target data of the first mobile phone. Two target data.
  • the central control system simultaneously displays the first mobile phone of the first target data and the second target data of the second mobile phone.
  • the central control system stops displaying the first target data of the first mobile phone; and displays the The second target data of the second mobile phone.
  • the central control system can be displayed on the display panel as shown in Figure 32 interface shown. As shown in FIG. 32 , the interface includes both the first sensitive data and the second sensitive data.
  • the above steps 919 to 919 can be performed after steps 901 to 909, that is, after the central control system displays the first sensitive data of the first mobile phone, if the central control system obtains the data of the second mobile phone again.
  • the central control system can determine how to display the first target data and the second target data according to the display strategy, and the second target data is obtained based on the second sensitive data.
  • steps 912 to 917 are optional steps.
  • step 909 After the central control system displays the first target data of the first mobile phone (ie, step 909 is executed), if the central control system detects that the central control system establishes a connection with the second mobile phone (ie, step 910 is executed) , and the sensitive data function of the second mobile phone has been enabled (ie, step 911 is executed), the display strategy is directly obtained (ie, step 918 is executed); if the display strategy obtained in step 918 indicates that only the first mobile phone of the first mobile phone is displayed If the display strategy obtained in step 918 indicates that the first target data of the first mobile phone and the second target data of the second mobile phone are displayed at the same time, Then, step 912 to step 917 and step 919 are executed.
  • the central control system can display the sensitive data of multiple mobile phones according to the display strategy, and the display data is more flexible.
  • the central control system can also display sensitive data of three or more mobile phones by situation by a method similar to that of FIG. 29 .
  • FIG. 33 shows a schematic flowchart of a data transmission method 1000 provided by an embodiment of the present application. As shown in FIG. 33 , the method 1000 may be applied to the communication system 100 shown in FIG. 1 . The method 1000 may include the following steps 1001 to 1005.
  • Step 1001 the first terminal device and the central control system perform identity verification, and determine that the identity verification is passed.
  • step 1001 may include: the first terminal device performing identity verification on the central control system, and determining that the central control system has passed the identity verification; the central control system identifying the first terminal device verification, and it is determined that the first terminal device has passed the identity verification.
  • the identity verification between the first terminal device and the central control system may be performed in various manners, which is not limited in this embodiment of the present application.
  • identity verification may be performed between the first terminal device and the central control system based on a digital certificate issued by PKI (including the digital certificate of the first terminal device and the digital certificate of the central control system).
  • the first terminal device and the central control system can respectively apply to the CA to obtain a digital certificate through PKI, which is used as a certificate of their own identity. If the digital certificate of the first terminal device is verified to be valid by the central control system, the central control system trusts the first terminal device; similarly, if the digital certificate of the central control system is verified to be valid by the first terminal device, then the central control system trusts the first terminal device; The first terminal device trusts the central control system.
  • step 1001 a trust relationship is established between the first terminal device and the central control system, and secure communication can be performed based on the trust relationship.
  • step 1001 reference may be made to the introduction of step 403 in FIG. 4 .
  • step 1001 the first terminal device and the central control system need to enable the sensitive data transmission function.
  • step 402 in FIG. 4 please refer to the introduction of step 402 in FIG. 4 .
  • the first terminal device may need to establish a communication connection with the central control system, for details, please refer to the introduction of step 401 in FIG. 4 .
  • Step 1002 the first terminal device encrypts the first sensitive data with a first key to obtain the encrypted first sensitive data.
  • the first sensitive data in the first terminal device is set by the user and considered to be relatively private and private, encryption needs to be performed to improve the security of this part of the sensitive data.
  • Step 1003 the first terminal device sends the encrypted first sensitive data and first key information to the central control system, where the first key information is used to indicate the first key used for the first sensitive data. correspondingly, the central control system receives the encrypted first sensitive data and the first key information from the first terminal device.
  • the first terminal device may send the encrypted first sensitive data and the first key information to the central control system in various ways, which are not limited in this embodiment of the present application.
  • the first terminal device may send the encrypted first sensitive data and the first key information to the central control system in one step.
  • the first terminal device may carry the first key information in the unencrypted field of the encrypted first sensitive data.
  • the first terminal device may send the encrypted first sensitive data and the first key information to the central control system through two steps, respectively.
  • the first terminal device generates an authorization certificate
  • the authorization certificate is used to authorize the processing authority of the first sensitive data
  • the authorization certificate includes the first key information
  • the authorization certificate is sent to the central control system
  • the central control system sends the encrypted first sensitive data.
  • step 1003 reference may be made to the introduction of step 405 and step 406 in FIG. 4 .
  • the central control system may save the first key information and the first sensitive data.
  • the central control system may save the first key information and the first sensitive data.
  • Step 1004 the central control system decrypts the encrypted first sensitive data through the first key indicated by the first key information to obtain the first sensitive data.
  • Step 1005 the central control system displays the first target data, and the first target data is obtained based on the first sensitive data.
  • the first target data may be the first sensitive data; or, the first target data is obtained by data fusion of the first sensitive data and the vehicle data of the vehicle where the central control system is located, and the vehicle The data includes driving data and/or application data.
  • step 1005 reference may be made to the introduction of step 409 in FIG. 4 .
  • the first terminal device can directly use the end-to-end method to transfer the encrypted first sensitive data and the encrypted first sensitive data to the first terminal device for the second terminal device.
  • a first key information of sensitive data is transmitted to the central control system, and the central control system decrypts the encrypted first sensitive data based on the first key information to obtain and display the first sensitive data.
  • the first sensitive data does not need to be transmitted between the first terminal device and the central control system through the service server, which can prevent the service server from storing and storing the sensitive data.
  • the security of the data can be improved.
  • the first sensitive data adopts an end-to-end transmission mode between the first terminal device and the central control system, so the timeliness of the data can be improved.
  • the central control system can stop displaying the first sensitive data under various circumstances, so as to prevent others from seeing the first sensitive data displayed by the central control system, thereby improving data
  • the central control system can stop displaying the first sensitive data under various circumstances, so as to prevent others from seeing the first sensitive data displayed by the central control system, thereby improving data
  • the central control system may stop displaying the first sensitive data under various circumstances, which is not limited in this embodiment of the present application.
  • the central control system may stop displaying the first sensitive data after there is no interaction with the first terminal device within a preset first time period.
  • the central control system may stop displaying the first sensitive data after detecting the fifth indication information.
  • the central control system may stop displaying the first sensitive data after detecting that a new device establishes a communication connection with the central control system.
  • the central control system may stop displaying the first target data after detecting that the communication connection between the central control system and the first terminal device is disconnected.
  • the central control system may stop displaying the first target data after receiving the sixth indication information of the first terminal device.
  • the central control system can delete the stored first key information and the encrypted first sensitive data, that is, as long as the display of the first target data is stopped. Once the target data is reached, the central control system can delete the stored first sensitive data, which can improve the security of the data.
  • the central control system can delete the stored first sensitive data, which can improve the security of the data.
  • the central control system can also obtain portrait information according to the first sensitive data and/or the vehicle data, and the portrait information includes user portrait information and/or vehicle portrait information.
  • the user portrait information Used to describe the user of the first terminal device, the vehicle portrait information is used to describe the state of the vehicle where the central control system is located, and display reminder information according to the portrait information, for details, refer to steps 610 and 612 in FIG. 20 's introduction.
  • the central control system may obtain the portrait information according to the first sensitive data and/or the vehicle data in various ways, which is not limited in this embodiment of the present application.
  • the central control system can input the first sensitive data and/or the vehicle data into a preset portrait model to obtain the portrait information
  • the portrait model is a neural network algorithm for big data. obtained by training.
  • the central control system may perform desensitization processing on the first sensitive data to obtain characteristic data, and send the characteristic data and/or the vehicle data to the service server.
  • the service server receives the feature data and/or the vehicle data from the central control system to obtain the portrait information; and sends the portrait information to the central control system.
  • the central control system receives the portrait information from the service server.
  • the central control system and the service server can perform secure communication based on the first trust relationship, that is, the central control system and the service server can perform secure communication based on the first trust relationship.
  • the system may send the first sensitive data and/or vehicle data to the service server based on the trusted identity, and the service server may determine portrait information based on the first sensitive data and/or vehicle data. In this way, the central control system does not need to determine the portrait information based on the first sensitive data and/or the vehicle data, which can reduce the capability requirement and calculation amount of the central control system.
  • the central control system may send the feature data and/or the vehicle data to the service server in various ways, which are not limited in this embodiment of the present application.
  • the central control system and the service server may establish a first trust relationship through a trust ring technology, where the first trust relationship is used to indicate mutual trust between the central control system and the service server, and the The first trust relationship corresponds to the first key pair of the central control system, the first key pair includes the first private key and the first public key of the central control system, and the first private key is used to identify the central control system and send the feature data and/or the vehicle data to the service server through the first private key.
  • the central control system and the service server transmit the first sensitive data and/or vehicle data based on the first trust relationship, which can improve data security.
  • the first terminal device and the service server may establish a second trust relationship through a trust ring technology, and the second trust relationship is used to indicate the mutual relationship between the first terminal device and the service server.
  • the second trust relationship corresponds to the second key pair of the first terminal device, the second key pair includes the second private key and the second public key of the first terminal device, and the second private key is used for Identify the trusted identity of the first terminal device;
  • the first terminal device sends second key information to the central control system, where the second key information is used to indicate the second private key.
  • the central control system receives the second key information from the first terminal device; and sends the feature data and/or the vehicle data to the service server through the second private key.
  • the sending, by the first terminal device, the second key information to the central control system may include: the first terminal device may send an identity certificate to the central control system, where the identity certificate is used to authorize the access control of the first terminal device. identity, and the second key information is included in the identity certificate.
  • the first terminal device After establishing the second trust relationship, the first terminal device authorizes the trusted identity of the first terminal device to the central control system, so that the central control system can use the first
  • the trusted identity of a terminal device communicates securely with the service server without establishing additional trust relationship with the service server, thereby reducing the capability requirement and calculation amount of the central control system.
  • the central control system may save the portrait information.
  • the central control system may save the portrait information.
  • the central control system can stop displaying the reminder information under various circumstances, so as to prevent others from seeing the reminder information displayed by the central control system, thereby improving the performance of the central control system.
  • the central control system can stop displaying the reminder information under various circumstances, so as to prevent others from seeing the reminder information displayed by the central control system, thereby improving the performance of the central control system.
  • the central control system can delete the stored portrait information, that is, as long as the reminder information is stopped, the central control system will store the portrait information. Delete, so that the security of the data can be improved.
  • the central control system can delete the stored portrait information, that is, as long as the reminder information is stopped, the central control system will store the portrait information. Delete, so that the security of the data can be improved.
  • the method further includes: the central control system obtains the second sensitive data of the second terminal device; obtains a display strategy; and displays the first target data and/or the second target according to the display strategy data, the second target data is obtained based on the second sensitive data.
  • the central control system may acquire the display strategy in various ways, which is not limited in this embodiment of the present application.
  • the display strategy may be preconfigured in the central control system.
  • the central control system may display a presentation strategy request to the user, where the presentation strategy request is used to request the first target data of the first terminal device and the second target data of the second terminal device Display strategy of target data; get the display strategy entered by the user.
  • displaying the first target data and/or the second target data by the central control system according to the display strategy may include: when the display strategy indicates that only the first target data of the first terminal device is displayed When a target data is displayed, the central control system continues to display the first target data of the first terminal device without displaying the second target data; or, when the display strategy indicates to display the first target data of the first terminal device at the same time When the target data and the second target data of the second terminal device are displayed, the central control system simultaneously displays the first target data of the first terminal device and the second target data of the second terminal device; or, when the When the display policy instructs to display only the second target data of the second terminal device, the central control system stops displaying the first target data of the first terminal device; and displays the second target data of the second terminal device.
  • the central control system can display the sensitive data of multiple mobile phones according to the display strategy, and the display data is more flexible.
  • the data transmission apparatus may be the terminal device (such as a mobile phone) described in the above method embodiments, and can execute the method implemented by the terminal device (such as a mobile phone) in the above method embodiments; or, the data transmission apparatus may
  • the central control system described in the above method embodiments can execute the methods implemented by the central control system in the above method embodiments.
  • the data transmission apparatus includes corresponding hardware and/or software modules for executing each function.
  • the present application can be implemented in hardware or in the form of a combination of hardware and computer software in conjunction with the algorithm steps of each example described in conjunction with the embodiments disclosed herein. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functionality for each particular application in conjunction with the embodiments, but such implementations should not be considered beyond the scope of this application.
  • the data transmission apparatus may be divided into functional modules according to the above method embodiments.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware. It should be noted that, the division of modules in this embodiment is schematic, and is only a logical function division, and there may be other division manners in actual implementation.
  • FIG. 34 shows a possible schematic diagram of the composition of the data transmission device involved in the above embodiment.
  • the device 1100 may include: a transceiver unit 1110 and processing unit 1120.
  • the processing unit 1120 may control the transceiver unit 1110 to implement the methods performed by the terminal device (eg, mobile phone) or the central control system in the above method embodiments, and/or other processes for the techniques described herein.
  • the terminal device eg, mobile phone
  • the processing unit 1120 may control the transceiver unit 1110 to implement the methods performed by the terminal device (eg, mobile phone) or the central control system in the above method embodiments, and/or other processes for the techniques described herein.
  • the apparatus 1100 may include a processing unit, a storage unit, and a communication unit.
  • the processing unit may be used to control and manage the actions of the apparatus 1100, for example, may be used to support the apparatus 1100 to perform the steps performed by the above-mentioned units.
  • the storage unit may be used to support the execution of the apparatus 1100 to store program codes, data, and the like.
  • the communication unit may be used to support the communication of the apparatus 1100 with other devices.
  • the processing unit may be a processor or a controller. It may implement or execute the various exemplary logical blocks, modules and circuits described in connection with this disclosure.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, such as a combination of a DSP and a microprocessor, and the like.
  • the storage unit may be a memory.
  • the communication unit may specifically be a device that interacts with other electronic devices, such as a radio frequency circuit, a Bluetooth chip, and a Wi-Fi chip.
  • the apparatus 1100 involved in this embodiment of the present application may be a mobile phone.
  • the apparatus 1100 involved in this embodiment of the present application may be a central control system.
  • Embodiments of the present application further provide a computer storage medium, where computer instructions are stored in the computer storage medium, and when the computer instructions are executed on an electronic device, the electronic device executes the above-mentioned relevant method steps to realize the data transmission method in the above-mentioned embodiments .
  • Embodiments of the present application further provide a computer program product, which, when the computer program product runs on a computer, causes the computer to execute the above-mentioned relevant steps, so as to realize the data transmission method in the above-mentioned embodiment.
  • An embodiment of the present application further provides an apparatus, and the apparatus may specifically be a chip, an integrated circuit, a component, or a module.
  • the apparatus may include an associated processor and a memory for storing instructions, or the apparatus may include at least one processor for retrieving instructions from an external memory.
  • the processor can execute the instructions, so that the chip executes the data transmission methods in the foregoing method embodiments.
  • Embodiments of the present application further provide a vehicle, where the vehicle includes the above-mentioned device 1100 or the central control system 200 .
  • the data transmission device, computer storage medium, computer program product, chip, or vehicle provided in this embodiment are all used to execute the corresponding methods provided above. Therefore, for the beneficial effects that can be achieved, reference may be made to the corresponding methods provided above. The beneficial effects of the method are not repeated here.
  • the size of the sequence numbers of the above-mentioned processes does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not be dealt with in the embodiments of the present application. implementation constitutes any limitation.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un appareil de transmission de données, qui sont propices à l'amélioration de la sécurité et de la présentation en temps opportun de données. Le procédé de transmission de données peut être appliqué à un système de commande central d'un véhicule, et il existe une connexion de communication entre le système de commande central et un premier dispositif terminal. Le procédé consiste : à déterminer qu'un premier dispositif terminal a réussi une vérification d'identité ; à recevoir, en provenance du premier dispositif terminal, des premières données sensibles qui ont été chiffrées et des premières informations de clé, les premières informations de clé étant utilisées pour indiquer une première clé des premières données sensibles ; à déchiffrer, au moyen de la première clé indiquée par les premières informations de clé, les premières données sensibles qui ont été chiffrées de façon à obtenir les premières données sensibles ; et à afficher les premières données sensibles.
PCT/CN2021/110886 2020-09-27 2021-08-05 Procédé et appareil de transmission de données WO2022062712A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011036554.9 2020-09-27
CN202011036554.9A CN114363894B (zh) 2020-09-27 2020-09-27 数据传输方法和装置

Publications (1)

Publication Number Publication Date
WO2022062712A1 true WO2022062712A1 (fr) 2022-03-31

Family

ID=80844836

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/110886 WO2022062712A1 (fr) 2020-09-27 2021-08-05 Procédé et appareil de transmission de données

Country Status (2)

Country Link
CN (1) CN114363894B (fr)
WO (1) WO2022062712A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117880519A (zh) * 2024-03-12 2024-04-12 深圳市诚立业科技发展有限公司 基于5g技术的多媒体短信安全传输方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601329A (zh) * 2014-12-26 2015-05-06 深圳市金溢科技股份有限公司 车载终端、车辆信息发布系统及方法
US20190026478A1 (en) * 2016-03-11 2019-01-24 Byd Company Limited Vehicle secure communication method and apparatus, vehicle multimedia system, and vehicle
CN110929266A (zh) * 2019-11-29 2020-03-27 广州小鹏汽车科技有限公司 安全加固架构、加解密方法、车联网终端和车辆

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10437977B2 (en) * 2015-10-13 2019-10-08 Etas Embedded Systems Canada Inc. System and method for digital key sharing for access control
US10104547B1 (en) * 2017-05-24 2018-10-16 GM Global Technology Operations LLC Automatic wireless communication authentication
CN109525989B (zh) * 2017-09-19 2022-09-02 阿里巴巴集团控股有限公司 数据处理、身份认证方法及系统、终端
US11698979B2 (en) * 2018-03-27 2023-07-11 Workday, Inc. Digital credentials for access to sensitive data
CN109617899A (zh) * 2018-12-28 2019-04-12 深圳市元征科技股份有限公司 一种数据传输方法以及系统
CN109698834A (zh) * 2019-01-11 2019-04-30 深圳市元征科技股份有限公司 一种加密传输方法以及系统
CN111107066A (zh) * 2019-12-06 2020-05-05 中国联合网络通信集团有限公司 敏感数据的传输方法和系统、电子设备、存储介质

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601329A (zh) * 2014-12-26 2015-05-06 深圳市金溢科技股份有限公司 车载终端、车辆信息发布系统及方法
US20190026478A1 (en) * 2016-03-11 2019-01-24 Byd Company Limited Vehicle secure communication method and apparatus, vehicle multimedia system, and vehicle
CN110929266A (zh) * 2019-11-29 2020-03-27 广州小鹏汽车科技有限公司 安全加固架构、加解密方法、车联网终端和车辆

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117880519A (zh) * 2024-03-12 2024-04-12 深圳市诚立业科技发展有限公司 基于5g技术的多媒体短信安全传输方法
CN117880519B (zh) * 2024-03-12 2024-05-14 深圳市诚立业科技发展有限公司 基于5g技术的多媒体短信安全传输方法

Also Published As

Publication number Publication date
CN114363894B (zh) 2024-06-04
CN114363894A (zh) 2022-04-15

Similar Documents

Publication Publication Date Title
EP3939342B1 (fr) Dispositif électronique de commutation de connexion réseau entre une pluralité de dispositifs électroniques
US11934505B2 (en) Information content viewing method and terminal
US11488234B2 (en) Method, apparatus, and system for processing order information
AU2018421189B2 (en) Method for quickly opening application or application function, and terminal
WO2020143414A1 (fr) Procédé, dispositif, équipement et système d'accès à un réseau sans fil
JP6448158B2 (ja) 車載インフォテインメントとデータを交換するための方法、サーバ、モバイル端末、及び装置
EP3226463B1 (fr) Procédé de cryptage et de décryptage de données et dispositif de cryptage et de décryptage
WO2019223441A1 (fr) Procédé de partage de fichier, appareil, support de stockage lisible par ordinateur et terminal mobile
WO2018019261A1 (fr) Procédé et appareil de transfert de ressources
CN108809906B (zh) 数据处理方法、系统及装置
KR20150140150A (ko) 이동단말기 및 그 제어방법
EP3585127B1 (fr) Procédé de connexion basé sur une communication sans fil, et terminal
CN108901020B (zh) 网络接入的方法、移动终端及服务器
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
WO2018049971A1 (fr) Procédé de commutation de réseau à point d'accès sans fil et terminaux
CN110941821A (zh) 数据处理方法、装置及存储介质
CN108632454B (zh) 信息处理方法和装置、计算机可读存储介质、终端
CN110462620A (zh) 分解敏感数据存储在不同应用环境中
CN107864086B (zh) 信息快速分享方法、移动终端及计算机可读存储介质
CN106713319B (zh) 终端间的远程控制方法、装置、系统及移动终端
WO2022062712A1 (fr) Procédé et appareil de transmission de données
WO2019109987A1 (fr) Terminal mobile, procédé de traitement pour utilisation d'une empreinte digitale pour effectuer une opération d'enregistrement, et support de stockage
US20150099486A1 (en) Mobile terminal, mobile terminal auxiliary device and method for controlling the same
WO2021180005A1 (fr) Procédé de traitement d'informations et dispositif électronique
US11063929B2 (en) Body area network for authentication and service provision

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21871089

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21871089

Country of ref document: EP

Kind code of ref document: A1