WO2022087814A1 - Procédé de transmission d'informations de véhicule-à-tout, et appareil associé à ce procédé - Google Patents

Procédé de transmission d'informations de véhicule-à-tout, et appareil associé à ce procédé Download PDF

Info

Publication number
WO2022087814A1
WO2022087814A1 PCT/CN2020/123925 CN2020123925W WO2022087814A1 WO 2022087814 A1 WO2022087814 A1 WO 2022087814A1 CN 2020123925 W CN2020123925 W CN 2020123925W WO 2022087814 A1 WO2022087814 A1 WO 2022087814A1
Authority
WO
WIPO (PCT)
Prior art keywords
coordinate value
terminal
encrypted
value
field
Prior art date
Application number
PCT/CN2020/123925
Other languages
English (en)
Chinese (zh)
Inventor
潘凯
陈幼雷
李明超
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2020/123925 priority Critical patent/WO2022087814A1/fr
Priority to CN202080004368.9A priority patent/CN112544095B/zh
Publication of WO2022087814A1 publication Critical patent/WO2022087814A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Definitions

  • the present application relates to the field of communication technologies, and in particular, to a method for determining a location based on the Internet of Vehicles and related devices.
  • a vehicle can broadcast its basic safety message (BSM) to inform surrounding vehicles and roadside equipment of its location information, so that surrounding The vehicle and roadside equipment determine the vehicle's position based on the BSM.
  • BSM basic safety message
  • the first terminal Before the first terminal broadcasts the BSM, the first terminal will make the BSM carry a mandatory field for indicating the coordinate value of the first terminal (for example, the latitude, longitude and elevation of the first terminal).
  • the first terminal When encoding the mandatory field, the first terminal usually checks whether the coordinate value of the first terminal is within a preset value range, so as to determine whether the encoding operation of the mandatory field is continued.
  • the coordinate value of the first terminal transmitted in the BSM needs to be encrypted. After the first terminal encrypts its own coordinate value, the encrypted coordinate value may be outside the preset value range. Then, the first terminal will stop the encoding operation, so that the BSM cannot be generated, so the second terminal cannot receive it. The BSM of the first terminal cannot determine the location of the first terminal.
  • the embodiments of the present application provide an information transmission method and related equipment based on the Internet of Vehicles, which can enable the first terminal to smoothly generate a BSM, so that the second terminal can receive the BSM from the first terminal, so as to determine the first terminal based on the BSM s position.
  • a first aspect of the embodiments of the present application provides an information transmission method based on the Internet of Vehicles, the method comprising:
  • the first terminal When the first terminal is ready to broadcast the BSM, the first terminal may first obtain its own original coordinate value, and encrypt the original coordinate value to obtain the encrypted coordinate value of the first terminal.
  • the first terminal can obtain the value range corresponding to the mandatory field in the BSM, and the value range is usually a preset value set.
  • the value range can be ⁇ -90000000, - 89999999, -89999998, ..., 89999999, 90000000, 90000001 ⁇ and so on.
  • the first terminal generates the first coordinate value and the second coordinate value according to the encrypted coordinate value, so that the first coordinate value is located in the value range corresponding to the mandatory field.
  • the first terminal generates a BSM according to the first coordinate value and the second coordinate value, and sends the BSM to the second terminal.
  • the BSM generated by the first terminal includes a mandatory field and an optional field, wherein the mandatory field is used to indicate the first coordinate value, and the optional field is used to indicate the second coordinate value.
  • the second terminal may parse the BSM, and then determine the encrypted coordinate value according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field. After obtaining the encrypted coordinate value, the second terminal decrypts the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal (that is, the original coordinate value of the first terminal), so as to determine according to the decrypted coordinate value. The location of the first terminal.
  • the first terminal after acquiring the encrypted coordinate value of the first terminal, the first terminal can generate the first coordinate value and the second coordinate value according to the encrypted coordinate value. Since the first coordinate value is located in the value range corresponding to the mandatory field, the first terminal can complete the encoding operation of the mandatory field indicating the first coordinate value and the encoding of the optional field indicating the second coordinate value operation, so that the BSM is successfully generated, so that the second terminal can receive the BSM from the first terminal, and determine the position of the first terminal based on the first coordinate value and the second coordinate value indicated by the BSM.
  • generating the first coordinate value and the second coordinate value by the first terminal according to the encrypted coordinate value includes: the first terminal may The bits of the numerical value are split to obtain the first coordinate value and the second coordinate value.
  • the first terminal splits the encrypted coordinate value into two parts according to the bits of the numerical value, that is, the first coordinate value and the second coordinate value since the first terminal splits the encrypted coordinate value into two parts according to the bits of the numerical value, that is, the first coordinate value and the second coordinate value, then the number of digits of the first coordinate value and the second coordinate value are The number of digits is less than that of the encrypted coordinate value, which can make the first coordinate value much smaller than the encrypted coordinate value, so that the first coordinate value is within the value range corresponding to the required field, ensuring that the required field is The encoding operation can be done.
  • the second terminal receives the BSM of the first terminal.
  • the encrypted coordinate value of the first terminal may be determined according to the first coordinate value and the second coordinate value.
  • the second terminal determining the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field includes: when the second terminal receives the After receiving the BSM from the first terminal, the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field may be concatenated, thereby obtaining the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the first coordinate value when the encrypted coordinate value is N digits, after the encrypted coordinate value is split by the bits of the numerical value, the first coordinate value may be the first M digits of the encrypted coordinate value or The last M digits (correspondingly, the second coordinate value is the last N-M digits or the first N-M digits of the encrypted coordinate value), which improves the flexibility and selectivity of the scheme.
  • the first coordinate value may be the odd-digit number of the encrypted coordinate value
  • the second coordinate value may be the even-digit number of the encrypted coordinate value; or, the first coordinate value may be the even number of the encrypted coordinate value.
  • the second coordinate value is the odd-digit number of the encrypted coordinate value. For example, suppose the encrypted coordinate value is 12345678, the first coordinate value can be the odd-digit number of the encrypted coordinate value, that is, 1357, and the second coordinate value can be the even-digit number of the encrypted coordinate value, that is, 2468, etc. .
  • first coordinate value and the second coordinate value may also be the encrypted coordinate value divided by other bits (for example, set the encrypted coordinate value to 8 digits, the first digit of the encrypted coordinate value, The 2nd, 5th, and 6th digits constitute the first coordinate value, and the 3rd, 4th, 7th, and 8th digits of the encrypted coordinate value constitute the second coordinate value, etc.)
  • the information in this splitting manner may be encrypted information, which may be agreed in advance by the first terminal and the second terminal, or may be carried in an optional field of the BSM, which improves the security of information transmission.
  • the generating the first coordinate value and the second coordinate value by the first terminal according to the encrypted coordinate value includes: the first terminal first obtains the first coordinate value located in the value range corresponding to the mandatory field , for example, the first coordinate value may be a preset value (that is, a fixed value set in advance), and the preset coordinate value is located in the value range corresponding to the required field.
  • the first terminal may In the value range corresponding to the selected field, a value is randomly obtained as the first coordinate value, and so on. Then, the first terminal calculates the encrypted coordinate value and the first coordinate value to obtain the second coordinate value.
  • the first terminal can directly obtain the first coordinate value located in the value range corresponding to the mandatory field, so as to ensure that the encoding operation of the mandatory field can be completed. Further, the first terminal can also make a certain calculation relationship exist between the encrypted coordinate value, the first coordinate value indicated by the mandatory field, and the second coordinate value indicated by the optional field, so that the second terminal receives the After the BSM of the first terminal, the encrypted coordinate value of the first terminal may be determined according to the first coordinate value and the second coordinate value.
  • the second terminal determining the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field includes: when the second terminal receives the After receiving the BSM from the first terminal, the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field can be calculated to obtain the encrypted coordinate value of the first terminal.
  • the calculation relationship between the encrypted coordinate value, the first coordinate value and the second coordinate value may be: the encrypted coordinate value is the sum of the first coordinate value and the second coordinate value, The difference, product or quotient improves the flexibility and selectivity of the scheme.
  • the generating the first coordinate value and the second coordinate value by the first terminal according to the encrypted coordinate value includes: the first terminal first obtains the first coordinate value located in the value range corresponding to the mandatory field.
  • the first coordinate value is usually a special value in the value range (that is, under the current protocol, the value is not used to indicate the coordinates of the first terminal, but is used to indicate some special cases), so the first coordinate The value can be used to indicate that the second coordinate value is the encrypted coordinate value. Then, the first terminal determines that the second coordinate value is the encrypted coordinate value.
  • the first terminal can directly obtain the first coordinate value located in the value range corresponding to the mandatory field, so as to ensure that the encoding operation of the mandatory field can be completed.
  • the first terminal can also make a certain relationship exist between the first coordinate value and the second coordinate value (that is, the first coordinate value is used to indicate that the second coordinate value is the encrypted coordinate value of the first terminal) , so that after receiving the BSM of the first terminal, the second terminal can determine the second coordinate value as the encrypted coordinate value of the first terminal according to the first coordinate value.
  • the second terminal determining the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field includes: when the second terminal receives the After receiving the BSM from the first terminal, the second coordinate value indicated by the optional field may be determined as the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field.
  • the first coordinate value when the first terminal sets the first coordinate value as a special value in the value range, the first coordinate value can be set as the maximum value or the minimum value in the value range, which improves the efficiency of the solution. Flexibility and optionality.
  • the length of the encrypted coordinate value is equal to the length of the decrypted coordinate value.
  • a second aspect of the embodiments of the present application provides an information transmission method based on the Internet of Vehicles.
  • the method includes: a first terminal obtains an encrypted coordinate value of the first terminal; and the first terminal generates a first terminal according to the encrypted coordinate value.
  • the required field is used to indicate the first coordinate value, and the optional field is used to Indicates the second coordinate value, and the first coordinate value is in the value range corresponding to the mandatory field; the first terminal sends the BSM to the second terminal.
  • the first terminal after acquiring the encrypted coordinate value of the first terminal, the first terminal can generate the first coordinate value and the second coordinate value according to the encrypted coordinate value. Since the first coordinate value is located in the value range corresponding to the mandatory field, the first terminal can complete the encoding operation of the mandatory field indicating the first coordinate value and the encoding of the optional field indicating the second coordinate value operation, so that the BSM is successfully generated, so that the second terminal can receive the BSM from the first terminal, and determine the position of the first terminal based on the first coordinate value and the second coordinate value indicated by the BSM.
  • the generating the first coordinate value and the second coordinate value by the first terminal according to the encrypted coordinate value includes: the first terminal splits the encrypted coordinate value to obtain the first coordinate value and the second coordinate value. Two coordinate values.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the generating the first coordinate value and the second coordinate value by the first terminal according to the encrypted coordinate value includes: the first terminal acquiring the first coordinate value located in the value range; The latter coordinate value and the first coordinate value are calculated to obtain the second coordinate value.
  • the encrypted coordinate value is the sum, difference, product or quotient of the first coordinate value and the second coordinate value.
  • the generating, by the first terminal, the first coordinate value and the second coordinate value according to the encrypted coordinate value includes: the first terminal acquiring the first coordinate value located in the value range, and the first coordinate value using indicating that the second coordinate value is the encrypted coordinate value; the first terminal determines that the second coordinate value is the encrypted coordinate value.
  • the first coordinate value is the maximum value or the minimum value in the value range.
  • a third aspect of the embodiments of the present application provides an information transmission method based on the Internet of Vehicles, the method includes: the second terminal receives a BSM from the first terminal, the BSM includes mandatory fields and optional fields, and the mandatory fields are used for Indicates the first coordinate value, the optional field is used to indicate the second coordinate value, and the first coordinate value is in the value range corresponding to the required field; the second terminal indicates the first coordinate value indicated by the required field and the optional field.
  • the second coordinate value of the first terminal determines the encrypted coordinate value of the first terminal; the second terminal decrypts the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal.
  • the first terminal can complete the encoding operation of the mandatory field used to indicate the first coordinate value, thereby successfully generating the BSM.
  • the second terminal can parse the BSM, determine the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field, and The encrypted coordinate value is decrypted to obtain the decrypted coordinate value of the first terminal, thereby determining the position of the first terminal.
  • the second terminal determining the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field includes: the second terminal will select the mandatory The first coordinate value indicated by the field and the second coordinate value indicated by the optional field are spliced to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the second terminal determining the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field includes: The first coordinate value indicated by the field and the second coordinate value indicated by the optional field are calculated to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is the sum, difference, product or quotient of the first coordinate value and the second coordinate value.
  • the second terminal determining the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field includes: The first coordinate value indicated by the field, and the second coordinate value indicated by the optional field is determined as the encrypted coordinate value of the first terminal.
  • the first coordinate value is the maximum value or the minimum value in the value range.
  • the length of the encrypted coordinate value is equal to the length of the decrypted coordinate value.
  • a fourth aspect of the embodiments of the present application provides a vehicle networking communication system
  • the vehicle networking communication system includes: a first terminal and a second terminal; the first terminal is used to obtain the encrypted coordinate value of the first terminal; the first terminal The terminal is also used to generate the first coordinate value and the second coordinate value according to the encrypted coordinate value; the first terminal is also used to generate the basic security message BSM according to the first coordinate value and the second coordinate value, and the BSM contains mandatory fields and optional fields.
  • the required field is used to indicate the first coordinate value
  • the optional field is used to indicate the second coordinate value
  • the first coordinate value is in the value range corresponding to the required field
  • the first terminal is also used to send the second terminal to the sending the BSM
  • the second terminal is used to receive the BSM
  • the second terminal is also used to determine the encrypted coordinate value according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field
  • the second terminal is also used for Decrypt the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal.
  • the first terminal is specifically configured to split the encrypted coordinate value to obtain the first coordinate value and the second coordinate value.
  • the second terminal is specifically configured to splicing the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the first terminal is specifically used for: acquiring a first coordinate value located in a value range; and calculating the encrypted coordinate value and the first coordinate value to obtain a second coordinate value.
  • the second terminal is specifically configured to calculate the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is the sum, difference, product or quotient of the first coordinate value and the second coordinate value.
  • the first terminal is specifically used to: acquire a first coordinate value located in a value range, where the first coordinate value is used to indicate that the second coordinate value is an encrypted coordinate value; determine the second coordinate value The value is the encrypted coordinate value.
  • the second terminal is specifically configured to determine the second coordinate value indicated by the optional field as the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field.
  • the first coordinate value is the maximum value or the minimum value in the value range.
  • the length of the encrypted coordinate value is equal to the length of the decrypted coordinate value.
  • a fifth aspect of the embodiments of the present application provides a terminal, where the terminal is a first terminal, and the first terminal includes: a processing module configured to acquire an encrypted coordinate value of the first terminal; The latter coordinate value generates a first coordinate value and a second coordinate value; the processing module is also used to generate a BSM according to the first coordinate value and the second coordinate value, and the BSM includes a required field and an optional field, and the required field is used to indicate The first coordinate value, the optional field is used to indicate the second coordinate value, and the first coordinate value is in the value range corresponding to the mandatory field; the transceiver module is used to send the BSM to the second terminal.
  • the processing module is specifically configured to split the encrypted coordinate value to obtain the first coordinate value and the second coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the processing module is specifically configured to: obtain the first coordinate value located in the value range; and calculate the encrypted coordinate value and the first coordinate value to obtain the second coordinate value.
  • the encrypted coordinate value is the sum, difference, product or quotient of the first coordinate value and the second coordinate value.
  • the processing module is specifically configured to: obtain a first coordinate value located in a value range, where the first coordinate value is used to indicate that the second coordinate value is an encrypted coordinate value; determine the second coordinate value is the encrypted coordinate value.
  • the first coordinate value is the maximum value or the minimum value in the value range.
  • a sixth aspect of the embodiments of the present application provides a terminal, where the terminal is a second terminal, and the second terminal includes: a transceiver module for receiving a BSM from the first terminal.
  • the BSM includes mandatory fields and optional fields.
  • the optional field is used to indicate the first coordinate value
  • the optional field is used to indicate the second coordinate value
  • the first coordinate value is located in the value range corresponding to the required field
  • the processing module is used to indicate the first coordinate according to the required field.
  • the value and the second coordinate value indicated by the optional field determine the encrypted coordinate value of the first terminal; the processing module is further configured to decrypt the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal.
  • the processing module is specifically configured to splicing the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the processing module is specifically configured to calculate the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is the sum, difference, product or quotient of the first coordinate value and the second coordinate value.
  • the processing module is specifically configured to determine the second coordinate value indicated by the optional field as the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field.
  • the first coordinate value is the maximum value or the minimum value in the value range.
  • the length of the encrypted coordinate value is equal to the length of the decrypted coordinate value.
  • a seventh aspect of the embodiments of the present application provides a communication device, the communication device includes: a processor and a memory; the memory is used for storing computer-executed instructions; the processor is used for executing the computer-executed instructions stored in the memory, so that the communication device realizes The method as described in the first aspect, any possible implementation manner of the first aspect, the second aspect, or any one possible implementation manner of the second aspect.
  • An eighth aspect of the embodiments of the present application provides a computer storage medium, which is characterized in that it includes computer-readable instructions, and when the computer-readable instructions are executed, any one of the first aspect and the first aspect is possible.
  • a ninth aspect of the embodiments of the present application provides a computer program product including instructions, which, when run on a computer, enables the computer to execute any of the first aspect, any possible implementation manner of the first aspect, and the second aspect or the method described in any possible implementation manner of the second aspect.
  • the first terminal after acquiring the encrypted coordinate value of the first terminal, the first terminal can generate the first coordinate value and the second coordinate value according to the encrypted coordinate value. Since the first coordinate value is located in the value range corresponding to the mandatory field, the first terminal can complete the encoding operation of the mandatory field indicating the first coordinate value and the encoding of the optional field indicating the second coordinate value operation, so that the BSM is successfully generated, so that the second terminal can receive the BSM from the first terminal, and determine the position of the first terminal based on the first coordinate value and the second coordinate value indicated by the BSM.
  • FIG. 1 is a schematic structural diagram of a vehicle networking communication system provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of an information transmission method based on the Internet of Vehicles provided by an embodiment of the present application;
  • FIG. 3 is another schematic flowchart of the information transmission method based on the Internet of Vehicles provided by an embodiment of the present application;
  • FIG. 4 is another schematic flowchart of the information transmission method based on the Internet of Vehicles provided by an embodiment of the present application;
  • FIG. 5 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 6 is another schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a communication apparatus provided by an embodiment of the present application.
  • FIG. 1 is a schematic structural diagram of a vehicle networking communication system provided by an embodiment of the present application.
  • the IoV communication system may include multiple IoV communication terminals. Among the multiple IoV communication terminals, any two IoV communication terminals can communicate through IoV messages.
  • the communication terminal can send a car networking message to another car networking communication terminal.
  • the mode of transmitting messages between the Internet of Vehicles communication terminals may include modes such as broadcast, unicast, or multicast, which is not limited here.
  • the Internet of Vehicles communication terminal that sends the message may be referred to as the first terminal
  • the Internet of Vehicles communication terminal that receives the message may be referred to as the second terminal.
  • the Internet of Vehicles communication terminal may be an on-board communication unit (OBU) or a roadside communication unit (RSU).
  • OBU on-board communication unit
  • RSU roadside communication unit
  • the first terminal is usually an OBU
  • the second terminal may be either an OBU or an RSU.
  • the Internet of Vehicles message in this application usually refers to the BSM, and the first terminal can send the BSM to the second terminal. Since the BSM carries the encrypted coordinate value of the first terminal, after receiving the BSM, the second terminal can send the BSM to the second terminal.
  • the version field is used to indicate the current version of the standard protocol.
  • the certificate field is used to indicate the certificate corresponding to the private key used to generate the BSM signature.
  • the itsAid field is used to indicate the application field associated with the payload declared by the first terminal.
  • the hashAlg field is used to indicate the hash algorithm.
  • the genTime field is used to indicate the time when the data structure of the BSM was generated.
  • the expiryTime field is used to indicate the time when the BSM's data is no longer considered valid.
  • the location field is used to indicate the location information for generating the signature of the BSM.
  • the digest field is used to indicate the lower 8 bytes of the certificate's hash value.
  • the encKey field is used to indicate the data encryption key of the BSM.
  • the data field is used to indicate the payload of the BSM.
  • the extHash field is used to indicate the BSM's extended data hash, and contains the hash value of the transmitted data that is not displayed in the BSM's data structure.
  • the curve field is used to indicate the curve used by the BSM.
  • the r field is used to indicate a point on the curve.
  • the s field is used to indicate the signature value of the BSM.
  • the fields are mandatory fields, that is, fields that are fixedly carried by the BSM.
  • the BSM generated by the first terminal must contain fields such as a version field, a certificate field, and a data field.
  • Another part of the fields are optional fields, that is, fields that the BSM may or may not carry.
  • the first terminal can make the BSM generated by the first terminal include the location field.
  • the first terminal can make the BSM generated by the first terminal not include the location field. location field.
  • the data field may be used to indicate the load of the BSM, that is, the field may be used to indicate various information of the first terminal.
  • the data field includes multiple subfields such as a location subfield, a status subfield, and a device information subfield (these subfields are also required fields).
  • the location subfield is used to indicate the location information of the first terminal
  • the status subfield is used to indicate the running state information of the first terminal
  • the device information subfield is used to indicate the device information of the first terminal, and so on.
  • the second terminal can determine the location information of the first terminal based on the data field in the BSM, thereby Determine where the first terminal is located.
  • the location information of the first terminal may be a three-dimensional coordinate (including the latitude, longitude and elevation of the first terminal) value of the first terminal.
  • the current standard protocol specifies the value of each coordinate indicated by the location subfield (hereinafter referred to as coordinate value), wherein the value range of latitude is ⁇ -90000000, -89999999, -89999998, ..., 89999999, 90000000, 90000001 ⁇ , the range of longitude is ⁇ -1799999999, -1799999998, ..., 1800000000, 1800000001 ⁇ , the range of elevation is ⁇ -409.5, -409.4, ..., 6143.8, 6143.9, 65535 ⁇ .
  • the current standard protocol has set a value range for the location subfield (that is, the value range corresponding to the location subfield).
  • each field needs to be encoded.
  • the first terminal encodes the location subfield of the data field, if the first terminal finds that its coordinate value is not within the preset value range, it will stop the encoding operation of the location subfield, so that the BSM cannot be generated. It should be noted that, if the first terminal determines that at least one coordinate value of itself is not within the corresponding value range, the encoding operation will be stopped.
  • the first terminal determines that its own latitude value is 90000002, the latitude value is outside the latitude value range, even if its own longitude value and elevation value are both within the corresponding value range, the first terminal will stop encoding. operate.
  • the first terminal In order to ensure information security, the first terminal usually encrypts its own coordinate value, so the location subfield of the data field in the BSM usually indicates the encrypted coordinate value of the first terminal.
  • the original coordinate value of the first terminal is usually within a preset value range.
  • the first terminal will perform an encryption operation on the original coordinate value to a certain extent, so the encrypted coordinate value of the first terminal may be different. If it is outside the preset value range, the encoding operation stops and BSM cannot be generated.
  • FIG. 2 is a schematic flowchart of an information transmission method based on the Internet of Vehicles provided by an embodiment of the present application. As shown in FIG. 2 , the method includes:
  • the first terminal acquires the encrypted coordinate value of the first terminal.
  • the original coordinate value of the first terminal may be obtained first, including the latitude value, the longitude value and the elevation value of the first terminal.
  • the first terminal may encrypt the original coordinate value to obtain the encrypted coordinate value of the first terminal.
  • the first terminal can encrypt the original coordinate value through an algorithm such as a domestic cryptographic algorithm (SM4), an advanced encryption standard (AES) algorithm, and obtain the encrypted coordinate value of the first terminal.
  • SM4 domestic cryptographic algorithm
  • AES advanced encryption standard
  • the first terminal can encrypt the original coordinate value of the first terminal in various ways, which will be introduced separately below:
  • the first terminal may encrypt each of its own original coordinate values respectively, that is, the encryption key streams (such as encryption keys, freshness parameters, etc.) used by different original coordinate values are different .
  • the encryption key stream is used as the encryption key, and the encryption key of each coordinate is different for illustration. It is assumed that the original latitude value of the first terminal is 100, the original longitude value is 200, and the original elevation value is 300.
  • the first terminal can encrypt the three coordinate values with keys 5, 2, and 4, respectively, and obtain an encrypted latitude value of 500, an encrypted longitude value of 400, and an encrypted elevation value of 1200.
  • the first terminal may encrypt multiple original coordinate values of itself together, that is, the encryption key streams of different original coordinate values are the same.
  • the encryption key stream as the encryption key and the encryption keys of each coordinate being the same as an example for illustration
  • the original latitude value of the first terminal is set to 100
  • the original longitude value is 200
  • the original elevation value is 300.
  • the first terminal can encrypt the three coordinate values together with the encryption key 2, and obtain an encrypted latitude value of 200, an encrypted longitude value of 400, and an encrypted elevation value of 600, respectively.
  • the first terminal completes the encryption operation in a counter (CTR) mode, thereby ensuring that the length of the original coordinate value is equal to the length of the encrypted coordinate value.
  • CTR counter
  • the first terminal splits the encrypted coordinate value to obtain a first coordinate value and a second coordinate value.
  • the first terminal After obtaining the encrypted coordinate value of the first terminal, the first terminal can obtain the value range corresponding to the mandatory field. It should be noted that the mandatory fields in this embodiment and subsequent embodiments are all the aforementioned location sub-fields. field, which will not be described in detail later. Regardless of whether the encrypted coordinate value is in the value range corresponding to the required field, the first terminal can split the encrypted coordinate value according to the bits of the numerical value, so that the encrypted coordinate value with a larger number of digits is Split into two parts with smaller number of digits, namely the first coordinate value and the second coordinate value.
  • the first terminal can make the first coordinate value much smaller than the encrypted coordinate value to ensure the first coordinate value.
  • the value is in the value range corresponding to the mandatory field, so that the encoding operation of the mandatory field can be completed.
  • the first terminal can split the encrypted coordinate values in multiple ways, which will be introduced separately below:
  • the first terminal may determine the first M digits of the encrypted coordinate value as the first coordinate value, and set the encrypted coordinate value after the The N-M digits are determined as the second coordinate value, that is, the first terminal counts from front to back, takes the M-th digit of the encrypted coordinate value as the splitting point, and splits the encrypted coordinate value into the first coordinate value and
  • the encrypted latitude value is outside the value range.
  • the first terminal may determine the first latitude value from the first three digits of the latitude value, and determine the last five digits as the second latitude value, that is, split 99999998 into 999 and 99998. It should be understood that, even if the encrypted latitude value is outside the value range, the first terminal can also perform the foregoing splitting operation on it. It should also be understood that the first terminal may also perform the foregoing splitting operation on the encrypted longitude value and the encrypted elevation value, which will not be repeated here.
  • the first terminal may determine the last M digits of the encrypted coordinate value as the first coordinate value, and set the encrypted coordinate value to the first coordinate value.
  • the first N-M digits are determined as the second coordinate value.
  • the first terminal may determine the 1st digit, the 3rd digit, the 5th digit and the 7th digit in the latitude value as the first latitude value, and the 2nd digit, the 4th digit and the 6th digit The number and the 8th digit are determined as the second latitude value, which is to split 12345678 into 1357 and 2468.
  • M and N are positive integers, and N ⁇ M.
  • the first terminal generates a BSM according to the first coordinate value and the second coordinate value.
  • the BSM includes a required field and an optional field, where the required field is used to indicate the first coordinate value, and the optional field is used to indicate the second coordinate value,
  • the first coordinate value is in the value range corresponding to the required field.
  • the first terminal After obtaining the first coordinate value and the second coordinate value, the first terminal generates a BSM according to the first coordinate value and the second coordinate value. Specifically, in the process of generating the BSM, the first terminal needs to encode each field. When encoding the mandatory field for indicating the first coordinate value, since the first coordinate value is within the value range corresponding to the mandatory field, the first terminal can complete the encoding operation of the mandatory field. In addition, the optional fields used to indicate the second coordinate value (for example, the aforementioned location field, etc.) are usually not set with value restrictions, so the first terminal can also complete the encoding operation of the optional fields. After completing the coding of each field, the first terminal can successfully generate the BSM.
  • the first terminal sends the BSM to the second terminal.
  • the second terminal After the second terminal receives the BSM, the second terminal splices the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the second terminal may parse the BSM, thereby determining the first coordinate value and the second coordinate value according to the content indicated by the mandatory field and the content indicated by the optional field in the BSM. Then, the second terminal may splicing the first coordinate value and the second coordinate value to recover the encrypted coordinate value of the first terminal. Still as in the above example, after parsing the BSM, the second terminal can obtain a first latitude value of 999 and a second latitude value of 99998. Then, the second terminal may splicing 999 and 99998 together to obtain the encrypted latitude value of the first terminal as 99999998.
  • the second terminal decrypts the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal.
  • the second terminal After obtaining the encrypted coordinate value of the first terminal, the second terminal decrypts the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal (that is, the original coordinate value of the first terminal), so the second terminal The location of the first terminal can be determined according to the coordinate value.
  • FIG. 3 is another schematic flowchart of the information transmission method based on the Internet of Vehicles provided by an embodiment of the present application. As shown in FIG. 3 , the method includes:
  • the first terminal acquires the encrypted coordinate value of the first terminal.
  • step 301 For the introduction of step 301, reference may be made to the relevant description part of the foregoing step 201, and details are not repeated here.
  • the first terminal acquires the first coordinate value in the value range, and calculates the encrypted coordinate value and the first coordinate value to obtain the second coordinate value.
  • the first terminal may obtain the value range corresponding to the mandatory field. Regardless of whether the encrypted coordinate value is in the value range corresponding to the mandatory field, the first terminal can directly obtain the first coordinate value in the value range, so it can ensure that the first coordinate value is in the value range corresponding to the mandatory field. value range, so that the encoding operation of the mandatory field used to indicate the first coordinate value can be completed.
  • the first terminal can obtain the first coordinate value in multiple ways, which will be introduced separately below:
  • the first coordinate value is a preset value, that is, a fixed value set in advance, and the preset value is in the value range corresponding to the required field.
  • the first terminal may directly obtain the preset value as the first coordinate value. It should be noted that the preset value can be set according to actual needs, and there is no limitation here.
  • the first terminal may randomly obtain a value in the value range corresponding to the required field as the first coordinate value.
  • the first terminal may also calculate the encrypted coordinate value and the first coordinate value to obtain the second coordinate value. It can be understood that there is a certain calculation relationship between the encrypted coordinate value, the first coordinate value, and the second coordinate value by the first terminal, so that after obtaining the first coordinate value and the second coordinate value, the second terminal can Calculation is performed according to the first coordinate value and the second coordinate value, and the encrypted coordinate value is recovered.
  • the encrypted coordinate value is the sum, difference, product or quotient.
  • the first latitude value is 80000000
  • the encrypted coordinate value is the sum of the first latitude value and the second latitude value
  • the second latitude value can be obtained by calculation. 19999999.
  • the encrypted latitude value of the first terminal is 99999999
  • the first latitude value is 3
  • the encrypted coordinate value is the product of the first latitude value and the second latitude value
  • the second latitude value is 33333333.
  • the encrypted latitude value of the first terminal is 99999999
  • the first latitude value is 10000000
  • the encrypted coordinate value is the difference between the first latitude value and the second latitude value
  • the second latitude value is -89999999, etc. .
  • the first terminal generates a BSM according to the first coordinate value and the second coordinate value, and the BSM includes a required field and an optional field, where the required field is used to indicate the first coordinate value, and the optional field is used to indicate the second coordinate value,
  • the first coordinate value is in the value range corresponding to the required field.
  • the first terminal sends the BSM to the second terminal.
  • step 303 and step 304 For the introduction of step 303 and step 304, reference may be made to the relevant description part of the foregoing step 203 and step 204, and details are not repeated here.
  • the second terminal calculates the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the second terminal may parse the BSM, thereby determining the first coordinate value and the second coordinate value according to the content indicated by the mandatory field and the content indicated by the optional field in the BSM. Then, the second terminal may calculate the first coordinate value and the second coordinate value to recover the encrypted coordinate value of the first terminal. Still as in the above example, set the encrypted latitude value to the sum of the second latitude value and the first latitude value. After parsing the BSM, the second terminal can obtain the first latitude value of 80000000 and the second latitude value of 19999999. The second terminal can add 80000000 and 19999999 to obtain the encrypted latitude value of the first terminal of 99999999.
  • the second terminal decrypts the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal.
  • step 306 For the introduction of step 306, reference may be made to the relevant description part of the foregoing step 206, which will not be repeated here.
  • FIG. 4 is another schematic flowchart of the information transmission method based on the Internet of Vehicles provided by the embodiment of the present application. As shown in FIG. 4 , the method includes:
  • the first terminal acquires the encrypted coordinate value of the first terminal.
  • step 401 For the introduction of step 401, reference may be made to the relevant description part of the foregoing step 201, which will not be repeated here.
  • the first terminal acquires the first coordinate value in the value range, and determines that the second coordinate value is an encrypted coordinate value, and the first coordinate value is used to indicate that the second coordinate value is the encrypted coordinate value.
  • the first terminal may obtain the value range corresponding to the mandatory field. Regardless of whether the encrypted coordinate value is in the value range corresponding to the mandatory field, the first terminal can directly obtain the first coordinate value located in the value range, and the first coordinate value is a preset special value, so that the A coordinate value may be used to indicate that the second coordinate value is the encrypted coordinate value. After obtaining the first coordinate value, the first terminal may directly determine the second coordinate value as the encrypted coordinate value of the first terminal.
  • the first coordinate value is usually a special value in the value range corresponding to the required field, and the special value may be the maximum or minimum value in the value range, that is, the first coordinate value may be the The maximum or minimum value in the range of values.
  • the special value is not used to indicate the coordinates of the first terminal (the other values in the value range except the special value are used to indicate the coordinates of the first terminal), but is used to indicate some special situations. For ease of understanding, the following takes latitude as an example to further introduce the special cases indicated by special values:
  • the value range of latitude is ⁇ -90000000, -89999999, -89999998, ..., 89999999, 90000000, 90000001 ⁇ , where the special value of latitude is 90000001, which can indicate different values in different situations.
  • the special value is used to indicate the first latitude value.
  • the second terminal indicates that the first terminal cannot obtain its own latitude value.
  • the BSM contains both a mandatory field for indicating the first latitude value (which is the special value 90000001), and an optional field for indicating the second latitude value
  • the special value is used to send the The second terminal indicates that the second latitude value can be used as the encrypted latitude value of the first terminal.
  • the special value for longitude is 1800000001 and the special value for elevation is 65535. It should be understood that, for the introduction of the special values of longitude and elevation, reference may be made to the above-mentioned relevant descriptions of the special values of latitude, and details are not repeated here.
  • the first terminal generates a BSM according to the first coordinate value and the second coordinate value.
  • the BSM includes a mandatory field and an optional field, where the mandatory field is used to indicate the first coordinate value, and the optional field is used to indicate the second coordinate value,
  • the first coordinate value is in the value range corresponding to the required field.
  • the first terminal sends the BSM to the second terminal.
  • step 403 and step 404 For the introduction of step 403 and step 404, reference may be made to the relevant description part of the foregoing step 203 and step 204, and details are not repeated here.
  • the second terminal determines, according to the first coordinate value indicated by the mandatory field, the second coordinate value indicated by the optional field as the encrypted coordinate value of the first terminal.
  • the second terminal may parse the BSM, thereby determining the first coordinate value and the second coordinate value according to the content indicated by the mandatory field and the content indicated by the optional field in the BSM. Then, the second terminal determines the second coordinate value as the encrypted coordinate value of the first terminal according to the first coordinate value. Still as in the above example, after receiving the BSM, if the second terminal determines that the first latitude value indicated by the mandatory field in the BSM is 90000001, it will determine whether the BSM has an optional field for indicating the second latitude value. If it exists, the second terminal directly determines the second latitude value as the encrypted latitude value of the first terminal; if it does not exist, the second terminal determines that the first terminal cannot obtain the latitude value.
  • the second terminal decrypts the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal.
  • step 406 For the introduction of step 406, reference may be made to the relevant description part of the foregoing step 206, which will not be repeated here.
  • the first terminal may generate the first coordinate value and the second coordinate value according to the encrypted coordinate value. Since the first coordinate value is located in the value range corresponding to the mandatory field, the first terminal can complete the encoding operation of the mandatory field indicating the first coordinate value and the encoding of the optional field indicating the second coordinate value operation, so that the BSM is successfully generated, so that the second terminal can receive the BSM from the first terminal, and determine the position of the first terminal based on the first coordinate value and the second coordinate value indicated by the BSM.
  • FIG. 5 is a schematic structural diagram of a terminal provided by an embodiment of the present application. As shown in FIG. 5 , the terminal is a first terminal, and the first terminal includes:
  • a processing module 501 configured to obtain the encrypted coordinate value of the first terminal
  • the processing module 501 is further configured to generate a first coordinate value and a second coordinate value according to the encrypted coordinate value;
  • the processing module 501 is further configured to generate a BSM according to the first coordinate value and the second coordinate value, the BSM includes a required field and an optional field, the required field is used to indicate the first coordinate value, and the optional field is used to indicate the second coordinate value, the first coordinate value is in the value range corresponding to the required field;
  • the transceiver module 502 is configured to send the BSM to the second terminal.
  • the processing module 501 is specifically configured to split the encrypted coordinate value to obtain the first coordinate value and the second coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the processing module 501 is specifically configured to: obtain a first coordinate value in a value range; and calculate the encrypted coordinate value and the first coordinate value to obtain a second coordinate value.
  • the encrypted coordinate value is the sum, difference, product or quotient of the first coordinate value and the second coordinate value.
  • the processing module 501 is specifically configured to: obtain a first coordinate value located in a value range, where the first coordinate value is used to indicate that the second coordinate value is an encrypted coordinate value; determine the second coordinate value The value is the encrypted coordinate value.
  • the first coordinate value is the maximum value or the minimum value in the value range.
  • FIG. 6 is another schematic structural diagram of a terminal provided by an embodiment of the present application. As shown in FIG. 6 , the terminal is a second terminal, and the second terminal includes:
  • the transceiver module 602 is used for receiving the BSM from the first terminal.
  • the BSM includes a mandatory field and an optional field, the mandatory field is used to indicate the first coordinate value, the optional field is used to indicate the second coordinate value, the first coordinate value It is in the value range corresponding to the required field;
  • a processing module 601, configured to determine the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field;
  • the processing module 601 is further configured to decrypt the encrypted coordinate value to obtain the decrypted coordinate value of the first terminal.
  • the processing module 601 is specifically configured to splicing the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the first M digits of the encrypted coordinate value
  • the second coordinate value is the last N-M digits of the encrypted coordinate value.
  • the encrypted coordinate value is N digits
  • the first coordinate value is the last M digits of the encrypted coordinate value
  • the second coordinate value is the first N-M digits of the encrypted coordinate value; wherein, M and N is a positive integer, N ⁇ M.
  • the processing module 601 is specifically configured to calculate the first coordinate value indicated by the mandatory field and the second coordinate value indicated by the optional field to obtain the encrypted coordinate value of the first terminal.
  • the encrypted coordinate value is the sum, difference, product or quotient of the first coordinate value and the second coordinate value.
  • the processing module 601 is specifically configured to determine the second coordinate value indicated by the optional field as the encrypted coordinate value of the first terminal according to the first coordinate value indicated by the mandatory field.
  • the first coordinate value is the maximum value or the minimum value in the value range.
  • the length of the encrypted coordinate value is equal to the length of the decrypted coordinate value.
  • FIG. 7 is a schematic structural diagram of a communication apparatus provided by an embodiment of the present application.
  • an embodiment of the communication device in this embodiment of the present application may include one or more central processing units 701 , a memory 702 , an input/output interface 703 , a wired or wireless network interface 704 , and a power supply 705 .
  • the memory 702 may be ephemeral storage or persistent storage. Further, the central processing unit 701 may be configured to communicate with the memory 702 to execute a series of instruction operations in the memory 702 on the communication device.
  • the central processing unit 701 may perform the operations performed by the first terminal or the second terminal in the foregoing embodiments shown in FIG. 2 to FIG. 4 , and details are not described herein again.
  • the division of specific functional modules in the central processing unit 701 may be similar to the division of modules such as the processing module and the transceiver module described in FIG. 5 , which is not repeated here.
  • the division of specific functional modules in the central processing unit 701 may also be similar to the division of modules such as the processing module and the transceiver module described in the foregoing FIG. 6 , and details are not described herein again.
  • the embodiment of the present application also relates to a computer storage medium, which is characterized in that it includes computer-readable instructions, and when the computer-readable instructions are executed, the method executed by the first terminal or the second terminal as shown in FIG. 2 to FIG. 4 is implemented. step.
  • the embodiments of the present application also relate to a computer program product containing instructions, which, when run on a computer, cause the computer to perform the method steps performed by the first terminal or the second terminal as shown in FIGS. 2 to 4 .
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé de transmission d'informations basé sur le principe du "véhicule à tout" et un appareil associé à celui-ci, pour faciliter la génération d'un BSM par un premier terminal, de telle sorte qu'un second terminal puisse recevoir le BSM du premier terminal, et déterminer la position du premier terminal sur la base du BSM. Le procédé de la présente invention comprend : un premier terminal acquérant une valeur de coordonnées chiffrée du premier terminal ; le premier terminal générant, selon la valeur de coordonnées chiffrée, une première valeur de coordonnées et une seconde valeur de coordonnées ; le premier terminal générant un message de sécurité de base (BSM) selon la première valeur de coordonnées et la seconde valeur de coordonnées, dans lequel le BSM comprend un champ requis et un champ optionnel, le champ requis est utilisé pour indiquer la première valeur de coordonnées, le champ optionnel est utilisé pour indiquer la seconde valeur de coordonnées, et la première valeur de coordonnées est dans une plage de valeurs correspondant au champ requis ; le premier terminal envoie le BSM à un second terminal ; le second terminal détermine la valeur de coordonnée chiffrée selon la première valeur de coordonnée indiquée par le champ requis et la seconde valeur de coordonnée indiquée par le champ facultatif ; et le second terminal déchiffre la valeur de coordonnée chiffrée pour obtenir la valeur de coordonnée déchiffrée du premier terminal.
PCT/CN2020/123925 2020-10-27 2020-10-27 Procédé de transmission d'informations de véhicule-à-tout, et appareil associé à ce procédé WO2022087814A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/123925 WO2022087814A1 (fr) 2020-10-27 2020-10-27 Procédé de transmission d'informations de véhicule-à-tout, et appareil associé à ce procédé
CN202080004368.9A CN112544095B (zh) 2020-10-27 2020-10-27 一种基于车联网的信息传输方法、系统、终端、通信装置及计算机存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/123925 WO2022087814A1 (fr) 2020-10-27 2020-10-27 Procédé de transmission d'informations de véhicule-à-tout, et appareil associé à ce procédé

Publications (1)

Publication Number Publication Date
WO2022087814A1 true WO2022087814A1 (fr) 2022-05-05

Family

ID=75017388

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/123925 WO2022087814A1 (fr) 2020-10-27 2020-10-27 Procédé de transmission d'informations de véhicule-à-tout, et appareil associé à ce procédé

Country Status (2)

Country Link
CN (1) CN112544095B (fr)
WO (1) WO2022087814A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105246071A (zh) * 2014-07-11 2016-01-13 电信科学技术研究院 一种车联网系统中的消息生成和验证方法、设备
CN108712375A (zh) * 2017-04-07 2018-10-26 宝马股份公司 坐标加密方法、坐标加密系统和具有该系统的车辆
CN109547441A (zh) * 2018-11-27 2019-03-29 上海炬宏信息技术有限公司 一种经纬度坐标加密的方法
US10683083B1 (en) * 2018-10-25 2020-06-16 Survice Engineering Company Satcom based messaging and locator system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105246071A (zh) * 2014-07-11 2016-01-13 电信科学技术研究院 一种车联网系统中的消息生成和验证方法、设备
CN108712375A (zh) * 2017-04-07 2018-10-26 宝马股份公司 坐标加密方法、坐标加密系统和具有该系统的车辆
US10683083B1 (en) * 2018-10-25 2020-06-16 Survice Engineering Company Satcom based messaging and locator system
CN109547441A (zh) * 2018-11-27 2019-03-29 上海炬宏信息技术有限公司 一种经纬度坐标加密的方法

Also Published As

Publication number Publication date
CN112544095A (zh) 2021-03-23
CN112544095B (zh) 2021-12-14

Similar Documents

Publication Publication Date Title
EP2582085A1 (fr) Génération de certificats implicites
CN110912920A (zh) 数据处理方法、设备及介质
JP2020532928A (ja) デジタル署名方法、装置及びシステム
CN102333093A (zh) 一种数据加密传输方法及系统
CN111769934B (zh) 数据传输方法、系统及计算机可读存储介质
US20130091362A1 (en) Generating implicit certificates
CN110166489B (zh) 一种物联网中数据传输方法、系统、设备及计算机介质
CN107534558B (zh) 用于保护经由数据总线传输的数据的信息安全的方法以及数据总线系统
CN109005184A (zh) 文件加密方法及装置、存储介质、终端
CN111555880B (zh) 数据碰撞方法、装置、存储介质及电子设备
CN114493593B (zh) 多区块链隐蔽通信方法
CN106453391A (zh) 一种重复长数据加密传输的方法及系统
CN112738051A (zh) 数据信息加密方法、系统及计算机可读存储介质
CN107249002B (zh) 一种提高智能电能表安全性的方法、系统及装置
KR101533950B1 (ko) 브로드캐스트 암호화 방법 및 시스템
WO2022087814A1 (fr) Procédé de transmission d'informations de véhicule-à-tout, et appareil associé à ce procédé
CN116545676A (zh) 密文处理方法和装置、电子设备及存储介质
CN112929166B (zh) 一种基于Modbus-TCP协议的主站、从站及数据传输系统
CN112689260B (zh) 车载终端的消息验证方法和终端
CN113905359A (zh) 一种银行外设的蓝牙安全通讯方法、装置、设备和介质
CN113455032A (zh) 通信方法及装置
CN115208569B (zh) 密钥动态分配的加密解密方法及装置
CN115225352B (zh) 混合加密方法及系统
CN105515775A (zh) 一种高效且隐私保护的签密方法
CN115664651A (zh) 基于sm9的在线离线加解密方法、系统、设备及介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20958979

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20958979

Country of ref document: EP

Kind code of ref document: A1