WO2024012517A1 - 端到端的数据传输方法、设备和介质 - Google Patents

端到端的数据传输方法、设备和介质 Download PDF

Info

Publication number
WO2024012517A1
WO2024012517A1 PCT/CN2023/107170 CN2023107170W WO2024012517A1 WO 2024012517 A1 WO2024012517 A1 WO 2024012517A1 CN 2023107170 W CN2023107170 W CN 2023107170W WO 2024012517 A1 WO2024012517 A1 WO 2024012517A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
information
seed key
seed
data transmission
Prior art date
Application number
PCT/CN2023/107170
Other languages
English (en)
French (fr)
Inventor
卢龙
孙瀛
李正玉
Original Assignee
蔚来汽车科技(安徽)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 蔚来汽车科技(安徽)有限公司 filed Critical 蔚来汽车科技(安徽)有限公司
Publication of WO2024012517A1 publication Critical patent/WO2024012517A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to the technical field of communication security, and specifically provides an end-to-end data transmission method, equipment and medium. .
  • both the car terminal and the mobile terminal usually use the HKDF key derivation algorithm, and combine the seed keys stored by both parties to directly derive the required keys, and then use The derived key is used to encrypt, decrypt, and sign the data to ensure data security.
  • the security of the seed key when synchronizing between the car terminal and the mobile terminal has a direct impact on the security of the data. Therefore, how to ensure the security of the seed key is an urgent technology that needs to be solved by those skilled in the art. question.
  • the present invention is proposed to provide a vehicle monitoring method, equipment and storage medium that solve or at least partially solve the technical problem that vehicle monitoring information is easily leaked, resulting in low reliability of vehicle monitoring.
  • the present invention is proposed to provide an end-to-end technical problem that solves or at least partially solves the technical problem of low security of seed keys when synchronizing between the car terminal and the mobile terminal.
  • Data transmission methods, equipment and media are proposed to provide an end-to-end technical problem that solves or at least partially solves the technical problem of low security of seed keys when synchronizing between the car terminal and the mobile terminal.
  • the present invention provides an end-to-end data transmission method.
  • the end-to-end data transmission method is applied to the vehicle end.
  • the method includes:
  • the present invention provides an end-to-end data transmission method.
  • the end-to-end data transmission method is applied to mobile terminals.
  • the method includes:
  • the seed key is stored.
  • the present invention provides an end-to-end data transmission method.
  • the end-to-end data transmission method is applied to a data transmission system including a vehicle terminal and a mobile terminal.
  • the method includes:
  • the car terminal After generating the seed key and the signature information of the seed key, the car terminal splices the signature information, the seed key and the current timestamp information to obtain the first splicing information; based on the mobile terminal identification provided by the user code, encrypt the first splicing information to obtain an encryption seed key; generate an identification code corresponding to the encryption seed key;
  • the mobile terminal scans the identification code corresponding to the encrypted seed key generated by the vehicle terminal to obtain the encryption seed key; uses the mobile terminal identification code to process the encryption seed key to obtain the corresponding seed key the first splicing information; extract from the first splicing information Signature information and seed key; based on the device identification code of the vehicle and the signature information, the seed key is verified; when the verification result indicates that it is passed, the seed key is stored.
  • the present invention provides an end-to-end data transmission device, including a processor and a storage device.
  • the storage device is adapted to store a plurality of program codes.
  • the program codes are adapted to be loaded and run by the processor. To perform any of the above end-to-end data transmission methods.
  • a computer-readable storage medium which stores a plurality of program codes, and the program codes are suitable for being loaded and run by a processor to execute any one of the above technical solutions. end-to-end data transmission method.
  • the signature information, the seed key and the current timestamp information can be spliced to obtain the first spliced information. , and then encrypts the first splicing information based on the mobile terminal identification code provided by the user, obtains an encryption seed key, and further generates an identification code corresponding to the encryption seed key.
  • the signature information can be used to sign the seed key to prevent the seed key from being tampered with, and through the process of splicing the signature information, the seed key and the current timestamp information, the seed key can be further prevented from being tampered with.
  • after using the mobile terminal identification code to encrypt the first splicing information it can prevent third parties from snooping on the seed key, increase the difficulty of cracking the seed key, and further improve the security of the seed key.
  • Figure 1 is a schematic flowchart of the main steps of an end-to-end data transmission method according to an embodiment of the present invention
  • Figure 2 is a schematic flowchart of the main steps of an end-to-end data transmission method according to another embodiment of the present invention.
  • Figure 3 is a schematic diagram of the end-to-end data transmission device on the vehicle side
  • Figure 4 is a schematic diagram of the end-to-end data transmission device of the mobile terminal
  • Figure 5 is a main structural block diagram of a key generation device according to an embodiment of the present invention.
  • module and “processor” may include hardware, software, or a combination of both.
  • a module can include hardware circuits, various suitable sensors, communication ports, and memory. It can also include software parts, such as program code, or it can be a combination of software and hardware.
  • the processor may be a central processing unit, a microprocessor, an image processor, a digital signal processor, or any other suitable processor.
  • the processor has data and/or signal processing functions.
  • the processor can be implemented in software, hardware, or a combination of both.
  • Non-transitory computer-readable storage media include any suitable media that can store program code, such as magnetic disks, hard disks, optical disks, flash memory, read-only memory, random access memory, etc.
  • a and/or B means all possible combinations of A and B, such as just A, just B, or A and B.
  • the terms "at least one A or B” or “at least one of A and B” have a similar meaning to “A and/or B” and may include just A, just B or A and B.
  • the singular forms “a,” “the” and “the” may also include the plural form.
  • both the car terminal and the mobile terminal mostly use the HKDF key derivation algorithm, and combine the seed keys stored by both parties to directly derive the required keys, and then use The derived key is used to encrypt, decrypt, and sign the data to ensure data security. That is to say, the security of the seed key when synchronizing the car terminal and the mobile terminal has a direct impact on the security of the data. Therefore, in order to improve the security of the seed key, the present invention provides the following technical solutions.
  • FIG. 1 is a schematic flowchart of the main steps of an end-to-end data transmission method according to an embodiment of the present invention.
  • This end-to-end data transmission method can be applied to the vehicle end.
  • the end-to-end data transmission method in the embodiment of the present invention mainly includes the following steps 101 to 104.
  • Step 101 Generate a seed key and signature information of the seed key
  • the process of generating a seed key may include the following steps:
  • the vehicle's master key, vehicle's device identification code, preset context information and random information can be obtained.
  • the master key of the vehicle terminal can be generated by the hardware security module of the vehicle terminal, and the life cycle of the master key of the vehicle terminal is consistent with the life cycle of the hardware of the vehicle terminal.
  • the master key of the car can be generated based on the relevant information of the hardware of the car. If the hardware of the car is replaced, the master key of the car needs to be regenerated.
  • a key derivation algorithm can be used to process the master key of the vehicle terminal, the device identification code of the vehicle terminal, the preset context information and the random information, derive a seed key, and The seed key is stored.
  • the HMAC algorithm when generating the signature information of the seed key, can be used to process the device identification code in and out of the vehicle to obtain the signature information of the seed key, and use the signature information to sign the seed key to prevent The seed key has been tampered with.
  • Step 102 Splice the signature information, the seed key and the current timestamp information to obtain first splicing information
  • the signature information, the seed key and the current timestamp information can be spliced according to preset splicing rules to obtain the first splicing information.
  • the splicing rules can be set according to actual needs.
  • the signature information, the seed key and the current timestamp information can be directly combined, or the order of at least one of them can be scrambled and then spliced together, which will not be explained one by one here.
  • Step 103 Encrypt the first splicing information based on the mobile terminal identification code provided by the user to obtain an encryption seed key
  • the mobile terminal identification code provided by the user can be used to encrypt the first splicing information to obtain the encrypted seed key.
  • the mobile terminal identification code is unique, only the mobile terminal that transmits data with the car terminal can decrypt the encrypted seed key, which improves the security of the seed key. Decryption difficulty effectively prevents third parties from obtaining the seed key.
  • Step 104 Generate an identification code corresponding to the encrypted seed key, so that after the mobile terminal scans the identification code, the mobile terminal identification code is used to process the encrypted seed key to obtain the seed key. .
  • an identification code corresponding to the encryption seed key can be generated, so that after the mobile terminal scans the identification code, the mobile terminal identification code is used to process the encryption seed key to obtain The seed key.
  • the identification code may be but is not limited to a QR code. In this way, even if the QR code is accidentally leaked, the encryption seed key cannot be decrypted without the mobile terminal identification code.
  • the mobile terminal can scan the identification code corresponding to the encryption seed key generated by the vehicle terminal to obtain the encryption seed key; use the mobile terminal identification code to process the encryption seed key to obtain the encryption seed key.
  • the first splicing information corresponding to the seed key extract the signature information and the seed key from the first splicing information; verify the signature of the seed key based on the device identification code of the vehicle and the signature information; when When the signature verification result indicates that it is passed, the seed key is stored.
  • the signature information, the seed key and the current timestamp information can be spliced to obtain the first splicing information, and then encrypting the first splicing information based on the mobile terminal identification code provided by the user, obtaining an encryption seed key, and further generating an identification code corresponding to the encryption seed key.
  • the signature information can be used to sign the seed key to prevent the seed key from being tampered with, and through the process of splicing the signature information, the seed key and the current timestamp information, the seed key can be further prevented from being tampered with.
  • it can prevent third parties from snooping on the seed key, increase the difficulty of cracking the seed key, and further improve the security of the seed key.
  • the generated seed key can be used to derive the required target derived key, and the target derived key can be used to process the session data to obtain After receiving the target data, respond to the target data, or send the target data to the mobile terminal.
  • At least one tag information corresponding to the session data can be further extracted.
  • at least one tag information may include timestamp information, random information, predefined information and other information of the session data.
  • the session data needs to be encrypted, and at least one tag information corresponding to the session data is transmitted in plain text.
  • the implementation process of this step can refer to the following steps:
  • a key derivation algorithm can be used to hash the tag information to obtain the processed first hash value, and the processed first hash value can be obtained according to the preset interception rules. The value is intercepted to obtain the intercepted part of the first hash value.
  • the preset interception rules can be selected according to actual needs, and are not specifically limited in this embodiment.
  • the HKDF key derivation algorithm can be used to process the seed key and the intercepted part of the first hash value to obtain a derived key of a preset length.
  • the implementation process of this step can refer to the following steps:
  • all tag information can be spliced to obtain the first splicing information.
  • all tag information can include timestamp information "10101100”, random information "10001001”, and predefined information "11001011". After splicing, the first spliced information can be obtained as "10101100 10001001 11001011".
  • the first splicing information is hashed to obtain the processed second hash value, and the processed second hash value is intercepted according to the preset interception rules. Get the intercepted part of the second hash value.
  • the preset interception rules can be selected according to actual needs, and are not specifically limited in this embodiment.
  • the HKDF key derivation algorithm can be used to process the seed key and the intercepted part of the second hash value to obtain a derived key of a preset length.
  • the session data corresponding to the session data can be extracted from the derived key of the preset length based on the preset extraction rules.
  • Target derived key the session data corresponding to the session data.
  • the target derived key may include a one-time encryption key and a one-time authentication key.
  • the one-time encryption key is used to encrypt or decrypt the session data
  • the one-time authentication key is used to sign or verify the session data.
  • the preset extraction rules can be customized. For example, the length of the key derived from the HKDF key derivation algorithm is 512 bytes, and the length of the one-time encryption key and one-time authentication key is both 256 bytes. Extraction can be defined. The rule is split in the middle, the first part can be a one-time encryption key, and the second part can be a one-time authentication key.
  • extraction rules can also be used, such as extracting 256 bytes of data from 512 bytes to form a one-time encryption key, and the remaining bytes are spliced in sequence into a one-time authentication key.
  • This embodiment will not illustrate each example one by one. In this way, after extracting the derived key of the preset length and obtaining the target derived key corresponding to the session data, even if the tag information and seed key corresponding to the session data are leaked, the key can still be effectively prevented from being cracked.
  • the target derived key may include a one-time encryption key and/or a one-time authentication key.
  • the session data is initiated by the car terminal, after the car terminal obtains the one-time encryption key, it can use the one-time encryption key to encrypt the session data and then send the encrypted session data to the mobile terminal as target data. Get the one-time encryption key The one-time encryption key can then be used to decrypt the encrypted session data to obtain the session data.
  • the car terminal can use the one-time authentication key to sign the session data, obtain the signature data as target data, and send it to the mobile terminal.
  • the mobile terminal After obtaining the one-time authentication key, the mobile terminal can use the one-time authentication key to verify the signed session data to obtain the session data.
  • the vehicle terminal can use the one-time encryption key to decrypt the encrypted session data sent by the vehicle terminal, obtain the session data as the target data, and respond session data.
  • the vehicle terminal can use the one-time authentication key to verify the signed session data sent by the vehicle terminal, obtain the session data as target data, and respond to the session data.
  • the end-to-end data transmission method of this embodiment during the session with the mobile terminal, obtains at least one tag information corresponding to the session data; uses the key according to the at least one tag information and the seed key.
  • the derivation algorithm generates a derivation key of a preset length; extracts the target derivation key corresponding to the session data from the derivation key of the preset length; uses the target derivation key to process the session data, Obtain the target data; respond to the target data, or send the target data to the mobile terminal, realizing further derivation based on the key derivation algorithm generating a derivation key of a preset length, and extracting the target derivation In this way, even if the tag information and seed key corresponding to the session data are leaked, the key can still be effectively prevented from being cracked, thus improving the security during data transmission.
  • the target derived key includes a one-time encryption key used for symmetric encryption
  • the one-time encryption key can also be combined with Used in conjunction with one-time initialization vectors, session data is encrypted with salt to enhance encryption security.
  • the generation process of one-time initial vector can refer to the following steps:
  • the HmacSha1 algorithm can be used to encrypt the timestamp information and return the first encrypted ciphertext.
  • the extracted first target information can be encrypted with Sha256 and the second encrypted ciphertext can be returned.
  • the second target information can be extracted from the second encrypted ciphertext as a one-time initial vector according to customized extraction rules.
  • the second target information is obtained as a one-time initial vector, which improves the difficulty of cracking the one-time initial vector and further improves the data quality. security.
  • FIG. 2 is a schematic flowchart of the main steps of an end-to-end data transmission method according to another embodiment of the present invention.
  • This end-to-end data transmission method can be applied to mobile terminals.
  • the end-to-end data transmission method in the embodiment of the present invention mainly includes the following steps 201 to 205.
  • Step 201 Scan the identification code corresponding to the encryption seed key generated by the vehicle terminal to obtain the encryption seed key;
  • Step 202 Use the mobile terminal identification code to process the encrypted seed key to obtain the first splicing information corresponding to the seed key;
  • Step 203 Extract signature information and seed key from the first splicing information
  • Step 204 Verify the signature of the seed key based on the device identification code of the vehicle and the signature information
  • Step 205 When the signature verification result indicates passing, store the seed key.
  • the generated seed key can be used to derive the required target derived key, and the target derived key can be used to process the session data to obtain after the target data, respond to the target data, or Or, send the target data to the mobile terminal.
  • the present invention also provides an end-to-end data transmission method.
  • This end-to-end data transmission method can be applied to data transmission systems including vehicle terminals and mobile terminals.
  • the method includes:
  • the car terminal After generating the seed key and the signature information of the seed key, the car terminal splices the signature information, the seed key and the current timestamp information to obtain the first splicing information; based on the mobile terminal identification provided by the user code, encrypt the first splicing information to obtain an encryption seed key; generate an identification code corresponding to the encryption seed key;
  • the mobile terminal scans the identification code corresponding to the encrypted seed key generated by the vehicle terminal to obtain the encryption seed key; uses the mobile terminal identification code to process the encryption seed key to obtain the corresponding seed key
  • the first splicing information extract the signature information and seed key from the first splicing information; verify the seed key based on the device identification code of the vehicle and the signature information; when the signature verification result indicates When passed, the seed key is stored.
  • Figure 3 is a schematic diagram of the end-to-end data transmission device on the vehicle end.
  • the key generation device on the vehicle end can include a first QR code module 31, a first session management module 32, and a first key generation module. 33 and the first hardware security module 34.
  • the first QR code module 31 is used to generate a QR code corresponding to the encrypted seed key information for scanning by the mobile terminal.
  • the first session management module 32 provides two types of session management: offline session and real-time session. Session management is mainly used to generate and manage session content and label information of the session content. These label information can be disclosed in the network in plain text.
  • the first key generation module 33 provides the following functions: encryption, decryption, key derivation, master key management, seed key management, session key management, etc.
  • the implementation process can be referred to the relevant records of the above-mentioned end-to-end data transmission method, and will not be described again here.
  • the first hardware security module 34 is an abstraction layer of the vehicle-side underlying security hardware module HSM, which provides key generation, management, and data encryption and decryption capabilities.
  • this end-to-end data transmission method is applied to the mobile terminal,
  • the seed key is obtained by scanning the QR code on the car terminal via the mobile terminal as an example:
  • Figure 4 is a schematic diagram of the end-to-end data transmission device of the mobile terminal.
  • the key generation device of the mobile terminal may include a second QR code module 41, a second session management module 42, and a second key generation module. 43 and the second hardware security module 44.
  • the second QR code module 41 is used to scan the QR code on the car side to obtain the encrypted seed password.
  • the second session management module 42 provides two types of session management: offline session and real-time session. Session management is mainly used to generate and manage session content and label information of the session content. These label information can be disclosed in the network in plain text.
  • the second key generation module 43 provides the following functions: encryption, decryption, key derivation, seed key management, session key management, etc.
  • the implementation process can be referred to the relevant records of the above-mentioned end-to-end data transmission method, and will not be described again here.
  • the second hardware security module 44 is an abstraction layer of the vehicle-side underlying security hardware module HSM, providing key generation, management, and data encryption and decryption capabilities.
  • the mobile terminal can also generate a seed key, and the vehicle terminal can scan to obtain the seed key.
  • This embodiment does not impose specific limitations.
  • the present invention can implement all or part of the process in the method of the above-mentioned embodiment, and can also be completed by instructing relevant hardware through a computer program.
  • the computer program can be stored in a computer-readable file. In the storage medium, when the computer program is executed by the processor, the steps of each of the above method embodiments can be implemented.
  • the computer program includes computer program code, which may be in the form of source code, object code, executable file or some intermediate form.
  • the computer-readable storage medium may include: any entity or device capable of carrying the computer program code, media, USB flash drive, mobile hard disk, magnetic disk, optical disk, computer memory, read-only memory, random access memory, electrical carrier wave signals, telecommunications signals, and software distribution media, etc.
  • computer-readable storage media Storage media does not include electrical carrier signals and telecommunications signals.
  • the present invention also provides a key generation device.
  • FIG. 5 is a main structural block diagram of a key generation device according to an embodiment of the present invention.
  • the key generation device in the embodiment of the present invention may include processing
  • the storage device 52 is adapted to store a plurality of program codes, and the program codes are adapted to be loaded and run by the processor 51 to execute the program of the above-mentioned end-to-end data transmission method.
  • the key generation device may be a control device formed including various electronic devices.
  • the present invention also provides a computer-readable storage medium.
  • the computer-readable storage medium may be configured to store a program for executing the end-to-end data transmission method of the above method embodiment, and the program may be loaded and run by a processor to Implement the above end-to-end data transmission method.
  • the computer-readable storage medium may be a storage device formed by various electronic devices.
  • the computer-readable storage medium is a non-transitory computer-readable storage medium.
  • each module is only to illustrate the functional units of the device of the present invention
  • the physical devices corresponding to these modules may be the processor itself, or a part of the software in the processor, a part of the hardware, or Part of the combination of software and hardware. Therefore, the number of individual modules in the figure is only illustrative.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种端到端的数据传输方法、设备和介质,包括生成种子密钥和所述种子密钥的签名信息;对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息;基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥;生成所述加密种子密钥对应的识别码,以便所述移动端扫描所述识别码后,利用所述移动端标识码对所述加密种子密钥进行处理,得到所述种子密钥。这样,可以防止第三方窥探种子密钥,提高了种子密钥的破解难度,进而提高了种子密钥的安全性。

Description

端到端的数据传输方法、设备和介质
本申请要求2022年7月14日提交的、发明名称为“端到端的数据传输方法、设备和介质”的中国专利申请202210832976.X的优先权,上述中国专利申请的全部内容通过引用并入本申请中。
技术领域
本发明涉及通信安全技术领域,具体提供一种端到端的数据传输方法、设备和介质。。
背景技术
随着智能网联汽车的发展,相关安全性也越来越得到用户的重视。在智能电动汽车行业,非常重要的一个安全领域就是数据安全,背后是用户隐私、财产甚至生命安全。如果这些数据发生泄露对用户的隐私、财产甚至生命安全都会产生严重影响。
相关技术中,车端在与移动端进行数据传输过程中,车端和移动端均通常采用HKDF密钥衍生算法,并结合双方存储的种子密钥,直接衍生出所需要的密钥,然后对利用衍生出的密钥对数据进行加解密、签名认证等,以保证数据的安全性。也就是说,种子密钥在车端和移动端进行同步时的安全性,对数据的安全性有直接的影响,因此,如何保证种子密钥的安全性,是本领域技术人员亟待解决的技术问题。
发明内容
为了克服上述缺陷,提出了本发明,以提供解决或至少部分地解决车辆的监控信息容易被泄露,造成车辆监控的可靠性较低的技术问题的车辆监控方法、设备和存储介质。
为了克服上述缺陷,提出了本发明,以提供解决或至少部分地解决种子密钥在车端和移动端进行同步时的安全性较低的技术问题的端到端 的数据传输方法、设备和介质。
在第一方面,本发明提供一种端到端的数据传输方法,所述端到端的数据传输方法应用于车端,所述方法包括:
生成种子密钥和所述种子密钥的签名信息;
对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息;
基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥;
生成所述加密种子密钥对应的识别码,以便所述移动端扫描所述识别码后,利用所述移动端标识码对所述加密种子密钥进行处理,得到所述种子密钥。
在第二方面,本发明提供一种端到端的数据传输方法,所述端到端的数据传输方法应用于移动端,所述方法包括:
扫描所述车端生成的加密种子密钥对应的识别码,以获取所述加密种子密钥;
利用移动端标识码,对所述加密种子密钥进行处理,得到所述种子密钥对应的第一拼接信息;
从所述第一拼接信息中提取出签名信息和种子密钥;
基于车端的设备识别码和所述签名信息,对所述种子密钥进行验签;
当验签结果表示通过时,存储所述种子密钥。
在第三方面,本发明提供一种端到端的数据传输方法,所述端到端的数据传输方法应用于包括车端和移动端的数据传输系统,所述方法包括:
车端在生成种子密钥和所述种子密钥的签名信息后,对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息;基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥;生成所述加密种子密钥对应的识别码;
移动端扫描所述车端生成的加密种子密钥对应的识别码,以获取所述加密种子密钥;利用移动端标识码,对所述加密种子密钥进行处理,得到所述种子密钥对应的第一拼接信息;从所述第一拼接信息中提取出 签名信息和种子密钥;基于车端的设备识别码和所述签名信息,对所述种子密钥进行验签;当验签结果表示通过时,存储所述种子密钥。
在第四方面,本发明提供一种端到端的数据传输设备,包括处理器和存储装置,所述存储装置适于存储多条程序代码,所述程序代码适于由所述处理器加载并运行以执行上述任一项所述的端到端的数据传输方法。
在第五方面,提供一种计算机可读存储介质,该计算机可读存储介质其中存储有多条程序代码,所述程序代码适于由处理器加载并运行以执行上述任一项技术方案所述的端到端的数据传输方法。
本发明上述一个或多个技术方案,至少具有如下一种或多种有益效果:
在实施本发明的技术方案中,在生成种子密钥和所述种子密钥的签名信息后,可以对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息,然后基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥,并进一步生成所述加密种子密钥对应的识别码。这样,可以利用签名信息对种子密钥进行签名,防止种子密钥被篡改,并经过对所述签名信息、所述种子密钥和当前时间戳信息进行拼接的过程,进一步防止种子密钥被篡改,同时,利用移动端标识码对第一拼接信息加密后,可以防止第三方窥探种子密钥,提高了种子密钥的破解难度,进一步提高了种子密钥的安全性。
附图说明
参照附图,本发明的公开内容将变得更易理解。本领域技术人员容易理解的是:这些附图仅仅用于说明的目的,而并非意在对本发明的保护范围组成限制。此外,图中类似的数字用以表示类似的部件,其中:
图1是根据本发明的一个实施例的端到端的数据传输方法的主要步骤流程示意图;
图2是根据本发明的另一个实施例的端到端的数据传输方法的主要步骤流程示意图;
图3是车端的端到端数据传输装置的构示意图;
图4是移动端的端到端数据传输装置的构示意图;
图5是根据本发明的一个实施例的密钥生成设备的主要结构框图。
具体实施方式
下面参照附图来描述本发明的一些实施方式。本领域技术人员应当理解的是,这些实施方式仅仅用于解释本发明的技术原理,并非旨在限制本发明的保护范围。
在本发明的描述中,“模块”、“处理器”可以包括硬件、软件或者两者的组合。一个模块可以包括硬件电路,各种合适的感应器,通信端口,存储器,也可以包括软件部分,比如程序代码,也可以是软件和硬件的组合。处理器可以是中央处理器、微处理器、图像处理器、数字信号处理器或者其他任何合适的处理器。处理器具有数据和/或信号处理功能。处理器可以以软件方式实现、硬件方式实现或者二者结合方式实现。非暂时性的计算机可读存储介质包括任何合适的可存储程序代码的介质,比如磁碟、硬盘、光碟、闪存、只读存储器、随机存取存储器等等。术语“A和/或B”表示所有可能的A与B的组合,比如只是A、只是B或者A和B。术语“至少一个A或B”或者“A和B中的至少一个”含义与“A和/或B”类似,可以包括只是A、只是B或者A和B。单数形式的术语“一个”、“这个”也可以包含复数形式。
通常情况下,车端在与移动端进行数据传输过程中,车端和移动端均大多采用HKDF密钥衍生算法,并结合双方存储的种子密钥,直接衍生出所需要的密钥,然后对利用衍生出的密钥对数据进行加解密、签名认证等,以保证数据的安全性。也就是说,种子密钥在车端和移动端进行同步时的安全性,对数据的安全性有直接的影响,因此,为了提高种子密钥的安全性,本发明提供了以下技术方案。
参阅附图1,图1是根据本发明的一个实施例的端到端的数据传输方法的主要步骤流程示意图。该端到端的数据传输方法可以应用于车端。如图1所示,本发明实施例中的端到端的数据传输方法主要包括下列步骤101-步骤104。
步骤101、生成种子密钥和所述种子密钥的签名信息;
在一个具体实现过程中,生成种子密钥的过程可以包括如下步骤:
(1)获取车端的主密钥、车端的设备识别码、预设的上下文信息和随机信息;
在一个具体实现过程中,可以获取车端的主密钥、车端的设备识别码、预设的上下文信息和随机信息。其中,车端的主密钥可以有车端的硬件安全模块生成,且车端的主密钥的生命周期与车端的硬件生命周期一致。也就是说,可以根据车端的硬件的相关信息,生成车端的主密钥,如果车端的硬件被更换后,需要重新生成车端的主密钥。
(2)基于所述车端的主密钥、所述车端的设备识别码、所述预设的上下文信息和所述随机信息,利用密钥衍生算法,生成所述种子密钥,并存储所述种子密钥。
具体地,可以利用密钥衍生算法,对所述车端的主密钥、所述车端的设备识别码、所述预设的上下文信息和所述随机信息进行处理,衍生出种子密钥,并对种子密钥进行存储。
在一个具体实现过程中,在生成种子密钥的签名信息时,可以使用HMAC算法,对车端的设备识别码进出处理,得到种子密钥的签名信息,并利用签名信息对种子密钥签名,防止种子密钥被篡改。
步骤102、对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息;
在一个具体实现过程中,可以按照预设的拼接规则对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息。其中,该拼接规则可以根据实际需求设定。例如,可以直接将签名信息、所述种子密钥和当前时间戳信息组合,也可以打乱至少其中一个的顺序后进行拼接,在此不再一一举例说明。
步骤103、基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥;
在一个具体实现过程中,为了防止第三方窥探种子密码,可以利用用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥。这样,由于移动端标识码具有唯一性,因此,只有与车端进行数据传输的移动端才能够对加密种子密钥进行解密,提高了种子密钥的 解密难度,有效防止第三方获取到种子密钥。
步骤104、生成所述加密种子密钥对应的识别码,以便所述移动端扫描所述识别码后,利用所述移动端标识码对所述加密种子密钥进行处理,得到所述种子密钥。
在一个具体实现过程中,可以生成所述加密种子密钥对应的识别码,以便所述移动端扫描所述识别码后,利用所述移动端标识码对所述加密种子密钥进行处理,得到所述种子密钥。其中,该标识码可以为但不限制于二维码,这样,即使二维码被无意泄露,在没有移动端标识码的情况下也无法对加密种子密钥进行解密。
具体地,移动端可以扫描所述车端生成的加密种子密钥对应的识别码,以获取所述加密种子密钥;利用移动端标识码,对所述加密种子密钥进行处理,得到所述种子密钥对应的第一拼接信息;从所述第一拼接信息中提取出签名信息和种子密钥;基于车端的设备识别码和所述签名信息,对所述种子密钥进行验签;当验签结果表示通过时,存储所述种子密钥。
本实施例的端到端的数据传输方法,在生成种子密钥和所述种子密钥的签名信息后,可以对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息,然后基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥,并进一步生成所述加密种子密钥对应的识别码。这样,可以利用签名信息对种子密钥进行签名,防止种子密钥被篡改,并经过对所述签名信息、所述种子密钥和当前时间戳信息进行拼接的过程,进一步防止种子密钥被篡改,同时,利用移动端标识码对第一拼接信息加密后,可以防止第三方窥探种子密钥,提高了种子密钥的破解难度,进一步提高了种子密钥的安全性。
在一个具体实现过程中,车端与移动端进行会话过程中,可以利用生成的种子密钥,衍生出所需要的目标衍生密钥,利用所述目标衍生密钥对所述会话数据进行处理,得到目标数据后,响应所述目标数据,或者,将所述目标数据发送给所述移动终端。
具体地,车端与移动端进行会话过程中,可以执行如下步骤:
(11)获取会话数据对应的至少一个标签信息;
在一个具体实现过程中,在获取到的车端与移动端的会话数据后,可以进一步提取会话数据对应的至少一个标签信息。其中,至少一个标签信息可以包括会话数据的时间戳信息、随机信息、预定义信息等信息。其中,会话数据需要进行加密,而会话数据对应的至少一个标签信息则以明文形式进行传输。
(12)根据至少一个所述标签信息和所述种子密钥,利用密钥衍生算法,生成预设长度的衍生密钥;
在一个具体实现过程中,若所述标签信息的数目为1个,该步骤的实现过程可以参考如下步骤:
a1、将所述标签信息进行哈希处理,并对处理后的第一哈希值进行截取,得到第一哈希值截取部分;
在一个具体实现过程中,可以利用密钥衍生算法,对所述标签信息进行哈希处理,得到处理后的第一哈希值,并按照预设的截取规则,对处理后的第一哈希值进行截取,得到第一哈希值截取部分。其中,预设的截取规则可以根据实际需求选择,本实施例不做具体限制。
b1、基于所述种子密钥和所述第一哈希值截取部分,利用密钥衍生算法,生成所述预设长度的衍生密钥。
可以利用HKDF密钥衍生算法,对所述种子密钥和所述第一哈希值截取部分进行处理,得到预设长度的衍生密钥。
在一个具体实现过程中,若所述标签信息的数目至少为2个,该步骤的实现过程可以参考如下步骤:
a2、将所有所述标签信息进行拼接,得到第一拼接信息;
在一个具体实现过程中,可以对所有的标签信息进行拼接,得到第一拼接信息。例如,所有的标签信息可以包括时间戳信息“10101100”、随机信息“10001001”、预定义信息“11001011”,拼接后可以得到第一拼接信息为“10101100 10001001 11001011”。
b2、将所述第一拼接信息进行哈希处理,并对处理后的第二哈希值进行截取,得到第二哈希值截取部分;
在得到第一拼接后,对第一拼接信息进行哈希处理,得到处理后的第而哈希值,并按照预设的截取规则,对处理后的第二哈希值进行截取, 得到第二哈希值截取部分。其中,预设的截取规则可以根据实际需求选择,本实施例不做具体限制。
c2、基于所述种子密钥和所述第二哈希值截取部分,利用密钥衍生算法,生成所述预设长度的衍生密钥。
可以利用HKDF密钥衍生算法,对所述种子密钥和所述第二哈希值截取部分进行处理,得到预设长度的衍生密钥。
(13)从所述预设长度的衍生密钥抽取出所述会话数据对应的目标衍生密钥;
在一个具体实现过程中,在得到预设长度的衍生密钥后,为了进一步提高密钥破解难度,可以基于预设的抽取规则,从预设长度的衍生密钥抽取出所述会话数据对应的目标衍生密钥。
在一个具体实现过程中,目标衍生密钥可以包括一次性加密密钥和一次性认证密钥。其中,一次性加密密钥用于对会话数据进行加密或解密,一次性认证密钥用于对所述会话数据进行签名或验签。预设的抽取规则可以自定义,例如,HKDF密钥衍生算法衍生的密钥的长度为512字节,一次性加密密钥和一次性认证密钥的长度都为256字节,可以定义的抽取规则为中间切分,第一部分可以为一次性加密密钥,第二部分可以为一次性认证密钥。也可以采用其他抽取规则,如从512字节中抽取256字节数据组成一次性加密密钥,剩下的字节按顺序再拼接成一次性认证密钥。本实施例不再一一举例说明。这样,从预设长度的衍生密钥进行抽取后,得到会话数据对应的目标衍生密钥后,即使会话数据对应的标签信息和种子密钥被泄露后,仍可以有效防止密钥被破解。
(14)利用所述目标衍生密钥对所述会话数据进行处理,得到目标数据;
(15)响应所述目标数据,或者,将所述目标数据发送给所述移动终端。
在一个具体实现过程中,目标衍生密钥可以包括一次性加密密钥和/或一次性认证密钥。若会话数据由车端发起,车端在得到一次性加密密钥后,可以利用所述一次性加密密钥对所述会话数据进行加密后,将加密会话数据作为目标数据发送给移动端,移动端在得到一次性加密密钥 后可以利用所述一次性加密密钥对所述加密会话数据进行解密,得到所述会话数据。或者,车端在得到一次性认证密钥后,可以利用所述一次性认证密钥对所述会话数据进行签名,得到签名数据作为目标数据,发送给移动端。移动端在得到一次性认证密钥后可以利用所述一次性认证密钥对所述签名会话数据进行验签,得到所述会话数据。
若会话数据由移动端发起,车端在得到一次性加密密钥后,可以利用所述一次性加密密钥对所述车端发送的加密会话数据进行解密,得到会话数据作为目标数据,并响应会话数据。或者,车端在得到一次性认证密钥后,可以利用所述一次性认证密钥对所述车端发送的签名会话数据进行验签,得到会话数据作为目标数据,并响应会话数据。
本实施例的端到端的数据传输方法,在与所述移动终端进行会话过程中,通过获取会话数据对应的至少一个标签信息;根据至少一个所述标签信息和所述种子密钥,利用密钥衍生算法,生成预设长度的衍生密钥;从所述预设长度的衍生密钥抽取出所述会话数据对应的目标衍生密钥;利用所述目标衍生密钥对所述会话数据进行处理,得到目标数据;响应所述目标数据,或者,将所述目标数据发送给所述移动终端,实现了在密钥衍生算法生成预设长度的衍生密钥的基础上,进一步衍生,抽取到目标衍生密钥,这样,即使会话数据对应的标签信息和种子密钥被泄露后,仍可以有效防止密钥被破解,从而提高了数据传输过程中的安全性。
在一个具体实现过程中,当所述目标衍生密钥包括用于对称加密使用的一次性加密密钥时,为了进一步提高数据加密的安全性,在加密时,还可以将一次性加密密钥与一次性初始向量结合使用,对会话数据进行带盐加密,增强加密的安全性。其中,一次性初始向量的生成过程可以参照如下步骤:
(21)对至少一个所述标签信息进行加密,得到第一加密密文;
在一个具体实现过程中,以标签信息为时间戳信息为例,可以使用HmacSha1算法对时间戳信息加密并返回第一加密密文。
(22)从所述第一加密密文中抽取第一目标信息;
在一个具体实现过程中,可以按照自定义的抽取规则,从所述第一 加密密文中抽取第一目标信息。
(23)对所述第一目标信息进行加密,得到第二加密密文;
可以对抽取后的第一目标信息再进行Sha256加密并返回第二加密密文。
(24)从所述第二加密密文中抽取第二目标信息作为一次性初始向量。
可以按照自定义的抽取规则,从所述第二加密密文中抽取第二目标信息作为一次性初始向量。
本实施例中,在生成一次性初始向量时,根据自定义的抽取规则进行两次抽取后,得到第二目标信息作为一次性初始向量,提高了一次性初始向量的破解难度,进一步提高了数据的安全性。
需要指出的是,尽管上述实施例中将各个步骤按照特定的先后顺序进行了描述,但是本领域技术人员可以理解,为了实现本发明的效果,不同的步骤之间并非必须按照这样的顺序执行,其可以同时(并行)执行或以其他顺序执行,这些变化都在本发明的保护范围之内。
参阅附图2,图2是根据本发明的另一个实施例的端到端的数据传输方法的主要步骤流程示意图。该端到端的数据传输方法可以应用于移动端。如图2所示,本发明实施例中的端到端的数据传输方法主要包括下列步骤201-步骤205。
步骤201、扫描所述车端生成的加密种子密钥对应的识别码,以获取所述加密种子密钥;
步骤202、利用移动端标识码,对所述加密种子密钥进行处理,得到所述种子密钥对应的第一拼接信息;
步骤203、从所述第一拼接信息中提取出签名信息和种子密钥;
步骤204、基于车端的设备识别码和所述签名信息,对所述种子密钥进行验签;
步骤205、当验签结果表示通过时,存储所述种子密钥。
在一个具体实现过程中,移动端与车端进行会话过程中,可以利用生成的种子密钥,衍生出所需要的目标衍生密钥,利用所述目标衍生密钥对所述会话数据进行处理,得到目标数据后,响应所述目标数据,或 者,将所述目标数据发送给所述移动终端。
具体地,移动端与车端进行会话过程中,同样可以执行上述步骤(11)-(15)以及步骤(21)-(24)的过程,详细请参考上述相关记载,在此不赘述。
在一个具体实现过程中,本发明还提供了一种端到端的数据传输方法。该到端的数据传输方法可以应用于包括车端和移动端的数据传输系统,所述方法包括:
车端在生成种子密钥和所述种子密钥的签名信息后,对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息;基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥;生成所述加密种子密钥对应的识别码;
移动端扫描所述车端生成的加密种子密钥对应的识别码,以获取所述加密种子密钥;利用移动端标识码,对所述加密种子密钥进行处理,得到所述种子密钥对应的第一拼接信息;从所述第一拼接信息中提取出签名信息和种子密钥;基于车端的设备识别码和所述签名信息,对所述种子密钥进行验签;当验签结果表示通过时,存储所述种子密钥。
图3是车端的端到端数据传输装置的构示意图,如图3所示,车端的密钥生成装置可以包括第一二维码模块31、第一会话管理模块32、第一密钥生成模块33和第一硬件安全模块34。
第一二维码模块31用于生成加密种子密钥信息对应的二维码,以供移动端扫描。
第一会话管理模块32提供了离线会话和实时会话两种会话管理,会话管理主要用于生成和管理会话内容和会话内容的标签信息,这些标签信息可以以明文方式在网络中公开。
第一密钥生成模块33提供了如下功能:加密,解密,密钥衍生,主密钥管理,种子密钥管理,会话密钥管理等。其实现过程可以参照上述端到端的数据传输方法的相关记载,在此不再赘述。
第一硬件安全模块34是车端底层安全硬件模块HSM的抽象层,提供密钥生成、管理和数据加解密能力。
在一个具体实现过程中,以该端到端的数据传输方法应用在移动端, 种子密钥由移动端扫描车端的二维码获取为例进行说明:
图4是移动端的端到端数据传输装置的构示意图,如图4所示,移动端的密钥生成装置可以包括第二二维码模块41、第二会话管理模块42、第二密钥生成模块43和第二硬件安全模块44。
第二二维码模块41用于扫描车端的二维码,以获取加密种子密码。
第二会话管理模块42提供了离线会话和实时会话两种会话管理,会话管理主要用于生成和管理会话内容和会话内容的标签信息,这些标签信息可以以明文方式在网络中公开。
第二密钥生成模块43提供了如下功能:加密,解密,密钥衍生,种子密钥管理,会话密钥管理等。其实现过程可以参照上述端到端的数据传输方法的相关记载,在此不再赘述。
第二硬件安全模块44是车端底层安全硬件模块HSM的抽象层,提供密钥生成、管理和数据加解密能力。
需要说明的是,在实际应用中,也可以由移动端生成种子密钥,车端进行扫描获取种子密钥,本实施例不做具体限制。
本领域技术人员能够理解的是,本发明实现上述一实施例的方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读存储介质可以包括:能够携带所述计算机程序代码的任何实体或装置、介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器、随机存取存储器、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读存储介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读存储介质不包括电载波信号和电信信号。
进一步,本发明还提供了一种密钥生成设备。
参阅附图5,图5是根据本发明的一个实施例的密钥生成设备的主要结构框图。如图5所示,本发明实施例中的密钥生成设备可以包括处理 器51和存储装置52,所述存储装置52适于存储多条程序代码,所述程序代码适于由所述处理器51加载并运行以执行上述所述的端到端的数据传输方法的程序。
为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该密钥生成设备可以是包括各种电子设备形成的控制设备。
进一步,本发明还提供了一种计算机可读存储介质。在根据本发明的一个计算机可读存储介质实施例中,计算机可读存储介质可以被配置成存储执行上述方法实施例的端到端的数据传输方法的程序,该程序可以由处理器加载并运行以实现上述端到端的数据传输方法。为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该计算机可读存储介质可以是包括各种电子设备形成的存储装置设备,可选的,本发明实施例中计算机可读存储介质是非暂时性的计算机可读存储介质。
进一步,应该理解的是,由于各个模块的设定仅仅是为了说明本发明的装置的功能单元,这些模块对应的物理器件可以是处理器本身,或者处理器中软件的一部分,硬件的一部分,或者软件和硬件结合的一部分。因此,图中的各个模块的数量仅仅是示意性的。
本领域技术人员能够理解的是,可以对装置中的各个模块进行适应性地拆分或合并。对具体模块的这种拆分或合并并不会导致技术方案偏离本发明的原理,因此,拆分或合并之后的技术方案都将落入本发明的保护范围内。
至此,已经结合附图所示的优选实施方式描述了本发明的技术方案,但是,本领域技术人员容易理解的是,本发明的保护范围显然不局限于这些具体实施方式。在不偏离本发明的原理的前提下,本领域技术人员可以对相关技术特征作出等同的更改或替换,这些更改或替换之后的技术方案都将落入本发明的保护范围之内。

Claims (13)

  1. 一种端到端的数据传输方法,其特征在于,应用于车端,所述方法包括:
    生成种子密钥和所述种子密钥的签名信息;
    对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息;
    基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥;
    生成所述加密种子密钥对应的识别码,以便所述移动端扫描所述识别码后,利用所述移动端标识码对所述加密种子密钥进行处理,得到所述种子密钥。
  2. 根据权利要求1所述的端到端的数据传输方法,其特征在于,生成种子密钥和所述种子密钥的签名信息包括:
    基于所述车端的主密钥、所述车端的设备识别码、所述预设的上下文信息和所述随机信息,利用密钥衍生算法,生成所述种子密钥;以及,基于所述车端的设备识别码,生成所述签名信息。
  3. 根据权利要求1所述的端到端的数据传输方法,其特征在于,生成种子密钥和所述种子密钥的签名信息之后,还包括:
    在与所述移动终端进行会话过程中,获取会话数据对应的至少一个标签信息;
    根据至少一个所述标签信息和所述种子密钥,利用密钥衍生算法,生成预设长度的衍生密钥;
    从所述预设长度的衍生密钥抽取出所述会话数据对应的目标衍生密钥;
    利用所述目标衍生密钥对所述会话数据进行处理,得到目标数据;
    响应所述目标数据,或者,将所述目标数据发送给所述移动终端。
  4. 根据权利要求3所述的端到端的数据传输方法,其特征在于,所述目标衍生密钥包括用于对称加密使用的一次性加密密钥,所述方法还包括:
    对至少一个所述标签信息进行加密,得到第一加密密文;
    从所述第一加密密文中抽取第一目标信息;
    对所述第一目标信息进行加密,得到第二加密密文;
    从所述第二加密密文中抽取第二目标信息作为一次性初始向量;其中,所述一次性初始向量与所述一次性加密密钥共同用于对所述会话数据进行对称加密或解密。
  5. 根据权利要求3所述的端到端的数据传输方法,其特征在于,根据至少一个所述标签信息和预存储的种子密钥,利用密钥衍生算法,生成预设长度的衍生密钥,包括:
    若所述标签信息的数目为1个,将所述标签信息进行哈希处理,并对处理后的第一哈希值进行截取,得到第一哈希值截取部分;基于所述种子密钥和所述第一哈希值截取部分,利用密钥衍生算法,生成所述预设长度的衍生密钥;
    若所述标签信息的数目至少为2个,将所有所述标签信息进行拼接,得到第二拼接信息;将所述第二拼接信息进行哈希处理,并对处理后的第二哈希值进行截取,得到第二哈希值截取部分;基于所述种子密钥和所述第二哈希值截取部分,利用密钥衍生算法,生成所述预设长度的衍生密钥。
  6. 根据权利要求1所述的端到端的数据传输方法,其特征在于,所述目标衍生密钥还包括一次性认证密钥;
    所述一次性认证密钥用于对所述待处理数据进行签名或验签。
  7. 一种端到端的数据传输方法,其特征在于,应用于移动端,所述方法包括:
    扫描所述车端生成的加密种子密钥对应的识别码,以获取所述加密 种子密钥;
    利用移动端标识码,对所述加密种子密钥进行处理,得到所述种子密钥对应的第一拼接信息;
    从所述第一拼接信息中提取出签名信息和种子密钥;
    基于车端的设备识别码和所述签名信息,对所述种子密钥进行验签;
    当验签结果表示通过时,存储所述种子密钥。
  8. 根据权利要求7所述的端到端的数据传输方法,其特征在于,还包括:
    在与所述车端进行会话过程中,获取会话数据对应的至少一个标签信息;
    根据至少一个所述标签信息和所述种子密钥,利用密钥衍生算法,生成预设长度的衍生密钥;
    从所述预设长度的衍生密钥抽取出所述会话数据对应的目标衍生密钥;
    利用所述目标衍生密钥对所述会话数据进行处理,得到目标数据;
    响应所述目标数据,或者,将所述目标数据发送给所述车端。
  9. 根据权利要求8所述的端到端的数据传输方法,其特征在于,所述目标衍生密钥包括用于对称加密使用的一次性加密密钥,所述方法还包括:
    对至少一个所述标签信息进行加密,得到第一加密密文;
    从所述第一加密密文中抽取第一目标信息;
    对所述第一目标信息进行加密,得到第二加密密文;
    从所述第二加密密文中抽取第二目标信息作为一次性初始向量;其中,所述一次性初始向量与所述一次性加密密钥共同用于对所述会话数据进行对称加密或解密。
  10. 根据权利要求8所述的端到端的数据传输方法,其特征在于,根据至少一个所述标签信息和预存储的种子密钥,利用密钥衍生算法,生 成预设长度的衍生密钥,包括:
    若所述标签信息的数目为1个,将所述标签信息进行哈希处理,并对处理后的第一哈希值进行截取,得到第一哈希值截取部分;基于所述种子密钥和所述第一哈希值截取部分,利用密钥衍生算法,生成所述预设长度的衍生密钥;
    若所述标签信息的数目至少为2个,将所有所述标签信息进行拼接,得到第二拼接信息;将所述第二拼接信息进行哈希处理,并对处理后的第二哈希值进行截取,得到第二哈希值截取部分;基于所述种子密钥和所述第二哈希值截取部分,利用密钥衍生算法,生成所述预设长度的衍生密钥。
  11. 一种端到端的数据传输方法,其特征在于,应用于包括车端和移动端的数据传输系统,所述方法包括:
    车端在生成种子密钥和所述种子密钥的签名信息后,对所述签名信息、所述种子密钥和当前时间戳信息进行拼接,得到第一拼接信息;基于用户提供的移动端标识码,对所述第一拼接信息进行加密,得到加密种子密钥;生成所述加密种子密钥对应的识别码;
    移动端扫描所述车端生成的加密种子密钥对应的识别码,以获取所述加密种子密钥;利用移动端标识码,对所述加密种子密钥进行处理,得到所述种子密钥对应的第一拼接信息;从所述第一拼接信息中提取出签名信息和种子密钥;基于车端的设备识别码和所述签名信息,对所述种子密钥进行验签;当验签结果表示通过时,存储所述种子密钥。
  12. 一种端到端的数据传输设备,包括处理器和存储装置,所述存储装置适于存储多条程序代码,其特征在于,所述程序代码适于由所述处理器加载并运行以执行权利要求1至11中任一项所述的端到端的数据传输方法。
  13. 一种计算机可读存储介质,其中存储有多条程序代码,其特征在于,所述程序代码适于由处理器加载并运行以执行权利要求1至11中任 一项所述的端到端的数据传输方法。
PCT/CN2023/107170 2022-07-14 2023-07-13 端到端的数据传输方法、设备和介质 WO2024012517A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210832976.X 2022-07-14
CN202210832976.XA CN115225672A (zh) 2022-07-14 2022-07-14 端到端的数据传输方法、设备和介质

Publications (1)

Publication Number Publication Date
WO2024012517A1 true WO2024012517A1 (zh) 2024-01-18

Family

ID=83611982

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/107170 WO2024012517A1 (zh) 2022-07-14 2023-07-13 端到端的数据传输方法、设备和介质

Country Status (2)

Country Link
CN (1) CN115225672A (zh)
WO (1) WO2024012517A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225672A (zh) * 2022-07-14 2022-10-21 蔚来汽车科技(安徽)有限公司 端到端的数据传输方法、设备和介质
CN115225673A (zh) * 2022-07-14 2022-10-21 蔚来汽车科技(安徽)有限公司 车辆监控方法、设备和存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105163309A (zh) * 2015-09-10 2015-12-16 电子科技大学 一种基于组合密码的无线传感器网络安全通信的方法
US20150378634A1 (en) * 2014-06-27 2015-12-31 Samsung Electronics Co., Ltd. Methods and systems for generating host keys for storage devices
CN107181770A (zh) * 2017-07-31 2017-09-19 北京深思数盾科技股份有限公司 数据同步方法及系统
CN109041205A (zh) * 2018-08-23 2018-12-18 刘高峰 客户端注册方法、装置及系统
CN111917538A (zh) * 2020-07-08 2020-11-10 北京汽车研究总院有限公司 基于车载设备的密钥衍生方法、装置及车载设备
CN115225672A (zh) * 2022-07-14 2022-10-21 蔚来汽车科技(安徽)有限公司 端到端的数据传输方法、设备和介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103944715B (zh) * 2014-04-25 2017-09-19 天地融科技股份有限公司 一种基于协商密钥的数据处理方法
CN107154916A (zh) * 2016-03-02 2017-09-12 阿里巴巴集团控股有限公司 一种认证信息获取方法、提供方法及装置
US10541814B2 (en) * 2017-11-08 2020-01-21 Wickr Inc. End-to-end encryption during a secure communication session
CN112449326A (zh) * 2019-08-30 2021-03-05 华为技术有限公司 一种通信、更新密钥的方法及装置
CN114301613B (zh) * 2020-09-22 2023-08-22 华为技术有限公司 安全通信的方法和装置
CN115225673A (zh) * 2022-07-14 2022-10-21 蔚来汽车科技(安徽)有限公司 车辆监控方法、设备和存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150378634A1 (en) * 2014-06-27 2015-12-31 Samsung Electronics Co., Ltd. Methods and systems for generating host keys for storage devices
CN105163309A (zh) * 2015-09-10 2015-12-16 电子科技大学 一种基于组合密码的无线传感器网络安全通信的方法
CN107181770A (zh) * 2017-07-31 2017-09-19 北京深思数盾科技股份有限公司 数据同步方法及系统
CN109041205A (zh) * 2018-08-23 2018-12-18 刘高峰 客户端注册方法、装置及系统
CN111917538A (zh) * 2020-07-08 2020-11-10 北京汽车研究总院有限公司 基于车载设备的密钥衍生方法、装置及车载设备
CN115225672A (zh) * 2022-07-14 2022-10-21 蔚来汽车科技(安徽)有限公司 端到端的数据传输方法、设备和介质

Also Published As

Publication number Publication date
CN115225672A (zh) 2022-10-21

Similar Documents

Publication Publication Date Title
CN110324143B (zh) 数据传输方法、电子设备及存储介质
CN109309565B (zh) 一种安全认证的方法及装置
US20220191012A1 (en) Methods For Splitting and Recovering Key, Program Product, Storage Medium, and System
CN107294937B (zh) 基于网络通信的数据传输方法、客户端及服务器
EP3324572B1 (en) Information transmission method and mobile device
WO2024012517A1 (zh) 端到端的数据传输方法、设备和介质
KR20220117211A (ko) 비접촉식 카드 개인 식별 시스템
CN107733636B (zh) 认证方法以及认证系统
CN108809633B (zh) 一种身份认证的方法、装置及系统
CN111130798B (zh) 一种请求鉴权方法及相关设备
CN109274644A (zh) 一种数据处理方法、终端和水印服务器
CN112232814A (zh) 支付密钥的加密和解密方法、支付认证方法及终端设备
CN112766962A (zh) 证书的接收、发送方法及交易系统、存储介质、电子装置
CN113204760B (zh) 用于软件密码模块的安全通道建立方法及系统
WO2023142440A1 (zh) 一种图像加密、图像处理方法、装置、设备及介质
WO2024012515A1 (zh) 车辆监控方法、设备和存储介质
CN105407467A (zh) 短消息加密方法、装置和系统
CN111010399A (zh) 一种数据传输方法、装置、电子设备及存储介质
CN114786160B (zh) 一种nfc标签密钥管理系统
CN112600667B (zh) 一种密钥协商方法、装置、设备及存储介质
CN112769789B (zh) 一种加密通信方法及系统
WO2024017255A1 (zh) 车辆通信方法和终端、车辆以及计算机可读存储介质
WO2024017256A1 (zh) 车辆通信方法和终端、车辆以及计算机可读存储介质
CN113115255A (zh) 证书下发、密钥认证、车辆解锁方法、设备及存储介质
CN111865602A (zh) 一种智慧能源服务系统异构终端多方认证方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23839007

Country of ref document: EP

Kind code of ref document: A1