WO2024055303A1 - Procédé de gestion de clé, appareil d'utilisation de clé et appareil de gestion de clé - Google Patents
Procédé de gestion de clé, appareil d'utilisation de clé et appareil de gestion de clé Download PDFInfo
- Publication number
- WO2024055303A1 WO2024055303A1 PCT/CN2022/119399 CN2022119399W WO2024055303A1 WO 2024055303 A1 WO2024055303 A1 WO 2024055303A1 CN 2022119399 W CN2022119399 W CN 2022119399W WO 2024055303 A1 WO2024055303 A1 WO 2024055303A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- area
- location
- management device
- information
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims abstract description 163
- 238000000034 method Methods 0.000 claims abstract description 117
- 230000007704 transition Effects 0.000 claims description 26
- 238000003860 storage Methods 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 14
- 238000013316 zoning Methods 0.000 claims description 14
- 230000001788 irregular Effects 0.000 claims description 10
- 230000001960 triggered effect Effects 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 24
- 238000004891 communication Methods 0.000 description 23
- 230000006870 function Effects 0.000 description 8
- 230000008859 change Effects 0.000 description 6
- 230000002452 interceptive effect Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000012360 testing method Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000007423 decrease Effects 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 206010039203 Road traffic accident Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Definitions
- the present application relates to the technical fields of intelligent transportation and intelligent driving, and in particular to a key management method, usage device and management device.
- V2X Vehicle to Everything
- V2X communication can help autonomous driving achieve lane-level assisted driving, mainly by sending its own location information between vehicles. For example, vehicle position information is broadcast through V2X, so that other vehicles that can obtain V2X messages can determine the position with other vehicles, and realize forward collision warning, blind spot assistance, lane change assistance, emergency braking warning, reverse overtaking warning, etc. function.
- V2X In a V2X scenario, vehicles need to broadcast their own location information at any time and record the trajectory changes of the vehicle based on a certain reference point. This location information needs to be encrypted and protected. At the same time, vehicle historical trajectory information belongs to users’ personal privacy data. In order to prevent malicious vehicles from intentionally monitoring and collecting the broadcast information of surrounding vehicles to obtain sensitive data such as continuous coordinates, the sensitive data in the V2X message or the V2X message needs to be encrypted and protected. How to reduce the impact caused by key leakage and improve the security of keys has become an urgent problem to be solved.
- a key management method, usage device and management device are proposed, which can improve the security of the key.
- embodiments of the present application provide a key management method, which method is applied to a key using device.
- the method includes: determining the location of the key using device; and obtaining at least A key, the at least one key is allocated to a key using device located in the first area, the location is located in the first area, the at least one key includes the first key; using the The first key.
- the key corresponds to the region, and the keys used in different regions are different. This reduces the coverage of the same key to one region, which not only reduces the usage range and number of uses of the same key, In addition, when the key of one area is leaked, it will not affect the security of the keys of other areas, thereby reducing the impact caused by the leakage of the key of one area and improving the security of the key.
- obtaining at least one key according to the location includes: sending location information indicating the location to a key management device; receiving a response to the key management device from the key management device. the at least one key for the location information.
- the key using device can apply to the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the first area when the key is leaked, it will not affect the security of other areas, thereby reducing the impact caused by the leakage of the key corresponding to the first area and improving the security of the key.
- the location information is identification information of the first area; obtaining at least one key according to the location further includes: based on the location and a preset area division method , determine the first area.
- the key usage device calculates the identification information, which can effectively reduce the workload of the key management device.
- the method further includes: receiving a message including the at least one key from a key management device; and obtaining the at least one key according to the location includes: according to the location, It is determined not to discard the at least one key.
- the key management device may send at least one key corresponding to the first region to the key usage device in the first region.
- the coverage of the key is reduced to the first area.
- the key When the key is leaked, it will not affect the security of other areas, thereby reducing the impact caused by the leakage of the key corresponding to the first area. , which improves the security of the key; on the other hand, it saves communication resources.
- the at least one key is a plurality of keys
- the method further includes: selecting the first key from the plurality of keys; using the first key Keying includes using the first key as an encryption key.
- the same area corresponds to multiple keys, which can reduce the number of key uses, thereby reducing the risk of key leakage and further improving the security of the key.
- the selection is random selection, weighted random selection or rotating selection.
- the at least one key is a plurality of keys
- the method further includes: receiving ciphertext from the first device, the ciphertext being encrypted according to the first key; Obtaining a key parameter, the key parameter indicating the first key; using the first key includes: selecting the first key from the plurality of keys according to the key parameter The key serves as the decryption key for the ciphertext.
- the at least one key is a plurality of keys
- the method further includes: receiving ciphertext from the first device, the ciphertext being encrypted according to the first key; Decrypting the ciphertext by traversing the use of the plurality of keys determines that the first key can successfully decrypt the ciphertext; the use of the first key includes: decrypting the ciphertext from the plurality of keys Select the first key as the decryption key of the ciphertext.
- the key using device can reduce the amount of data carried when interacting with the first device and save communication resources.
- the first area is divided based on at least one of the following methods: area division based on regular graphics or irregular graphics; area division based on administrative areas; area division based on road grades; Divide areas based on the autonomous driving levels supported by roads; divide areas based on commercial areas.
- the boundary of the first area is dynamically set.
- obtaining at least one key according to the location includes:
- the at least one key is obtained according to the location, wherein the first preset condition includes at least one of the following situations: the key using device is encrypted The key management device registers; the area where the key using device is located changes; the currently saved key expires; the time interval between the current moment and the last time the key was obtained reaches the first update threshold; the currently saved key is used The key cannot successfully decrypt the received data.
- the method further includes: obtaining a preset second key; when the second preset condition is met, using the second key; wherein the second preset key Assume that the conditions include at least one of the following situations: the key using device is located in a transition area; the key using device is located in a specific area; the key using device does not obtain the at least one key; the at least One key has expired and failed to be updated; the key using device cannot successfully decrypt the received data using the at least one key; the key using device cannot communicate with the key management device.
- the number of the at least one key is related to at least one of the following: the area of the first area; the number of key using devices in the first area; The level of the first area; the update frequency of the at least one key.
- the number of at least one key is fixed or dynamically changed.
- the at least one key is used for geographical location information, vehicle driving information or service content information.
- the method further includes: when registering on the key management device, obtaining third key information from the key management device, the third key information being used for subsequent The message received from the key management device is decrypted.
- the use scope of the key can be limited to registered key using devices, so that unregistered key using devices cannot obtain the key provided by the key management device, thereby further improving key security.
- embodiments of the present application provide a key management method.
- the method is applied to a key management device.
- the method includes: obtaining multiple preset areas through area division.
- the multiple preset areas are The method includes a first area; generating at least one key corresponding to the first area; and sending the at least one key to a key using device in the first area.
- the method before sending the at least one key to the key usage device in the first area, the method further includes: receiving from the key usage device a message indicating the Location information of the location of the key using device; based on the location information, the at least one key is allocated to the key using device for use.
- the location information is identification information of the first area or geographical coordinate information of the key using device.
- sending the at least one key to the key usage device in the first area includes:
- a message including the at least one key is sent within the first area.
- the at least one key is multiple keys, and the method further includes:
- a plurality of key parameters corresponding to the plurality of keys are sent to the key using device.
- the area division is based on at least one of the following ways:
- the boundary of the first area is dynamically set.
- the sending of the at least one key to the key usage device in the first area is triggered by at least one of the following:
- the key usage device is registered with the key management device
- the key using device enters the first area from an area other than the first area;
- the time interval between the current time and the last time the key was sent to the key using device reaches the first update threshold
- the key using device requests an update of the key corresponding to the first area.
- the method further includes:
- the key usage device is located in the transition area
- the key usage device is located in a specific area
- the key using device has not obtained the at least one key
- the at least one key expires and the update fails
- the key using device is unable to successfully decrypt the received data using the at least one key.
- the key using device is unable to communicate with the key management device.
- the number of the at least one key is related to at least one of the following:
- the number of key using devices in the first area is the number of key using devices in the first area
- the level of the first area is the level of the first area
- the update frequency of the at least one key is the update frequency of the at least one key.
- the number of the at least one key is fixed or dynamically changed.
- the at least one key is used for geographical location information, vehicle driving information or service content information.
- the method further includes:
- third key information is sent to the key using device, and the third key information is used for subsequent processing by the key management device to the key using device.
- the message is decrypted.
- a key usage device which includes:
- a first determination module used to determine the location of the key using device
- a first acquisition module configured to acquire at least one key according to the location, the at least one key being allocated to a key using device located in the first area, and the location being located in the first area,
- the at least one key includes a first key
- the first usage module is used to use the first key.
- the first acquisition module is also used to:
- the at least one key responsive to the location information is received from the key management device.
- the location information is the identification information of the first area
- the first acquisition module is also used to:
- the first area is determined according to the location and a preset area division method.
- the device further includes:
- a first receiving module configured to receive a message including the at least one key from the key management device
- the first acquisition module is also used to:
- the at least one key is multiple keys
- the device further includes:
- a first selection module configured to select the first key from the plurality of keys
- the first using module is also configured to use the first key as an encryption key.
- the selection is random selection, weighted random selection or rotating selection.
- the at least one key is multiple keys
- the device further includes:
- a second receiving module configured to receive ciphertext from the first device, where the ciphertext is encrypted according to the first key
- a second acquisition module configured to acquire key parameters, where the key parameters indicate the first key
- the first usage module is also used for:
- the first key is selected from the plurality of keys as the decryption key of the ciphertext.
- the at least one key is multiple keys
- the device further includes:
- a third receiving module configured to receive ciphertext from the first device, where the ciphertext is encrypted according to the first key
- a traversal module configured to decrypt the ciphertext using the plurality of keys through traversal, and determine that the first key can successfully decrypt the ciphertext
- the first usage module is also used for:
- the first key is selected from the plurality of keys as the decryption key of the ciphertext.
- the first area is divided based on at least one of the following methods:
- the boundary of the first area is dynamically set.
- the first acquisition module is also used to:
- the at least one key is obtained according to the location, wherein the first preset condition includes at least one of the following situations:
- the key using device is registered with the key management device
- the area where the key using device is located changes
- the time interval between the current moment and the last time the key was obtained reaches the first update threshold
- the received data could not be successfully decrypted using the currently saved key.
- the device further includes:
- the third acquisition module is used to acquire the preset second key
- the second use module is used to use the second key when the second preset condition is met;.
- the second preset condition includes at least one of the following situations:
- the key usage device is located in the transition area
- the key usage device is located in a specific area
- the key using device has not obtained the at least one key
- the at least one key expires and the update fails
- the key using device is unable to successfully decrypt the received data using the at least one key.
- the key using device is unable to communicate with the key management device.
- the number of the at least one key is related to at least one of the following:
- the number of key using devices in the first area is the number of key using devices in the first area
- the level of the first area is the level of the first area
- the update frequency of the at least one key is the update frequency of the at least one key.
- the number of at least one key is fixed or dynamically changed.
- the at least one key is used for geographical location information, vehicle driving information or service content information.
- the device further includes:
- the fourth acquisition module is used to obtain third key information from the key management device when registering on the key management device.
- the third key information is used for subsequent reception from the key management device.
- the incoming message is decrypted.
- a key management device which includes:
- a dividing module configured to obtain multiple preset areas through area division, where the multiple preset areas include a first area
- a first generation module configured to generate at least one key corresponding to the first area
- the first sending module is configured to send the at least one key to the key using device in the first area.
- the device further includes:
- a first receiving module configured to receive location information indicating the location of the key using device from the key using device
- a first allocation module configured to allocate the at least one key to the key using device based on the location information.
- the location information is identification information of the first area or geographical coordinate information of the key using device.
- the first sending module is also used to:
- a message including the at least one key is sent within the first area.
- the at least one key is multiple keys
- the device further includes:
- the second sending module is configured to send a plurality of key parameters corresponding to the plurality of keys to the key using device.
- the area division is based on at least one of the following ways:
- the boundary of the first area is dynamically set.
- the sending of the at least one key to the key usage device in the first area is triggered by at least one of the following:
- the key usage device is registered with the key management device
- the key using device enters the first area from an area other than the first area;
- the time interval between the current time and the last time the key was sent to the key using device reaches the first update threshold
- the key using device requests an update of the key corresponding to the first area.
- the device further includes:
- a third sending module configured to send a second key to the key using device, where the second key is used by the key using device in at least one of the following situations:
- the key usage device is located in the transition area
- the key usage device is located in a specific area
- the key using device has not obtained the at least one key
- the at least one key expires and the update fails
- the key using device cannot successfully decrypt the received data using the at least one key
- the key using device cannot communicate with the key management device.
- the number of the at least one key is related to at least one of the following:
- the number of key using devices in the first area is the number of key using devices in the first area
- the level of the first area is the level of the first area
- the update frequency of the at least one key is the update frequency of the at least one key.
- the number of at least one key is fixed or dynamically changed.
- the at least one key is used for geographical location information, vehicle driving information or service content information.
- the device further includes:
- the fourth sending module is configured to send third key information to the key using device when the key using device is registered.
- the third key information is used to subsequently send the key information to the key using device.
- the key is used to decrypt the message sent by the device.
- embodiments of the present application provide a key usage device that can perform key management in one or more of the first aspect or multiple possible implementations of the first aspect. method.
- embodiments of the present application provide a key management device that can perform key management in one or more of the above-mentioned second aspects or multiple possible implementations of the second aspect. method.
- embodiments of the present application provide a key management system, which may include the key using device described in the fifth aspect, and the key management device described in the sixth aspect.
- embodiments of the present application provide a non-volatile computer-readable storage medium on which computer program instructions are stored.
- the computer program instructions are executed by a processor, the above-mentioned first aspect or aspects are implemented.
- One or more key management methods are implemented.
- embodiments of the present application provide a computer program product, including a computer readable code, or a non-volatile computer readable storage medium carrying the computer readable code, when the computer readable code is stored electronically
- the processor in the electronic device executes one or more of the key usage methods of the first aspect or multiple possible implementations of the first aspect, or, the processor in the electronic device
- the processor executes one or more of the key management methods of the above-mentioned second aspect or multiple possible implementations of the second aspect.
- embodiments of the present application provide a vehicle, including the key usage device described in the fifth aspect, and/or the key management device described in the sixth aspect.
- Figure 1 shows a schematic structural diagram of an application scenario key management system provided by an embodiment of the present application.
- Figure 2 shows a flow chart of the key management method provided by the embodiment of the present application.
- Figure 3 shows a schematic diagram of area division provided by the embodiment of the present application.
- Figure 4 shows an interactive flow chart of the key management method provided by the embodiment of the present application.
- Figure 5 shows an interactive flow chart of the key management method provided by the embodiment of the present application.
- Figure 6 shows an interactive flow chart of the key management method provided by the embodiment of the present application.
- Figure 7 shows a schematic diagram of area division provided by the embodiment of the present application.
- Figure 8 shows a schematic diagram of the division of specific areas in the embodiment of the present application.
- Figure 9 shows a block diagram of a key usage device provided by an embodiment of the present application.
- Figure 10 shows a block diagram of a key management device provided by an embodiment of the present application.
- Figure 11 shows a schematic structural diagram of an electronic device provided by an embodiment of the present application.
- exemplary means "serving as an example, example, or illustrative.” Any embodiment described herein as “exemplary” is not necessarily to be construed as superior or superior to other embodiments.
- Figure 1 shows a schematic structural diagram of an application scenario key management system provided by an embodiment of the present application.
- the system includes: a key usage device 101 and a key management device 102.
- the key usage device 101 and the key management device 102 can communicate through the network.
- the key management device 102 can generate keys corresponding to each region, and the key using device 101 can use the keys corresponding to the region where it is located.
- the key using device 101 may be an electronic device with communication capabilities and data encryption and decryption capabilities.
- the key usage device 101 may be (or be deployed in) a vehicle with a vehicle communication unit (Telematics box, T-box), a roadside unit (Road Side Unit, RSU), or other terminal equipment.
- vehicle communication unit Telematics box, T-box
- RSU Roadside Unit
- the key management device 102 may be an electronic device with key generation capabilities, may be (or be deployed on) a physical device such as a host, a frame server, a blade server, etc., or may be a virtual device. Devices such as virtual machines, containers, etc.
- the key management device 102 can be deployed in the cloud, in an RSU, or in a vehicle, and the embodiments of this application are not limited to this.
- key management device 102 may also have distribution capabilities.
- the key management device 102 may directly distribute the generated key to the key usage device 101 .
- the key management device 102 may distribute the generated key to the key usage device 101 through a distribution device (eg, a gateway or a router, etc.).
- the key usage device 101 can be deployed in a vehicle, and the key management device 102 can be deployed in the cloud; or the key usage device 101 and the key management device 102 can be deployed in different vehicles; or the key management device 102 can be deployed in a different vehicle.
- the key usage device 101 and the key management device 102 are deployed in the same vehicle; or the key usage device 101 is deployed in the RSU and the key management device 102 is deployed in the cloud, which is not limited in this embodiment of the present application.
- Figure 2 shows a flow chart of the key management method provided by the embodiment of the present application. This method can be applied to the key using device shown in Figure 1. As shown in Figure 2, the method may include:
- Step S401 Determine the location of the key using device.
- the key usage device is located in the first area, and the first area can be any preset area.
- the first area is divided based on at least one of the following methods: area division based on regular graphics or irregular graphics; area division based on administrative areas; area division based on road grades; The regions are divided based on the supported autonomous driving levels; the regions are divided based on commercial areas.
- regular graphics include but are not limited to rectangles, trapezoids, triangles, etc.
- Administrative regions include but are not limited to provinces, cities, counties and streets.
- Road grades include but are not limited to national highways, provincial highways, altitude and autonomous driving lanes, etc.
- the autonomous driving levels supported by roads include but are not limited to pure manual driving (L0), driving automation (L1), assisted driving (L2), automatic assisted driving (L3), automatic driving (L4) and driverless driving (L5).
- Commercial areas include but are not limited to parking lots, shopping malls, supermarkets and wholesale markets.
- Figure 3 shows a schematic diagram of area division provided by the embodiment of the present application. As shown in Figure 3, 9 preset areas are obtained through area division, which are the 0th preset area, the 1st preset area, ... and the 8th preset area. Based on the position (x, y) of the key using device and Formula 1, the identification information Zoneid of the first zone can be obtained.
- x is the longitude geodetic distance (in meters) between the position of the key usage device and the geographic location coordinate (0,0) in the WGS84/GCJ-02 coordinate system
- y is the dimensional geodetic distance (in meters) between the position of the key usage device and the geographic location coordinate (0,0) in the WGS84/GCJ-02 coordinate system
- L represents the length of the preset area
- W represents the width of the preset area.
- the values of L and W can be the same or different. In one example, the values of L and W can be 100 kilometers or 500 kilometers, etc.
- Nx represents the number of preset areas divided in the latitudinal direction
- Ny represents the number of preset areas divided in the longitude direction.
- the values of Nx and Ny can be the same or different. For example, the values of Nx and Ny in Figure 3 are both 3.
- Floor is a rounding-down operation
- Mod is a modulo operation.
- the boundary of the first area is dynamically set. In other words, the boundary of the first area can be changed. This way, flexibility can be increased.
- Step S402 Obtain at least one key according to the location, and the at least one key includes the first key.
- the at least one key is assigned to a key using device located in the first area. That is to say, the keys available to the key using device located in the first area are the same.
- the key distribution method will be explained in detail later and will not be repeated here.
- the first key may represent a key to be used by the key using device.
- the key using device may determine the key as the first key.
- the key using device may determine the first key from the plurality of keys.
- the method of selecting the first key is also different depending on the usage of the first key. The method of selecting the first key will be explained in step S403 and will not be described again here.
- the same area corresponds to multiple keys, which can reduce the number of key uses, thereby reducing the risk of key leakage and further improving the security of the key.
- step S402 may include: when the first preset condition is met, obtaining the at least one key according to the location.
- the first preset condition includes at least one of the following situations: the key using device is registered with the key management device; the area where the key using device is located changes; the currently saved key expires; The time interval between the current moment and the last time the key was obtained reaches the first update threshold; the received data cannot be successfully decrypted using the currently saved key.
- the key using device may obtain the key when the key management device registers. In this way, the key using device can use the key immediately after registration without waiting, which is beneficial to improving business efficiency.
- the key using device can register with the key management device only after completing the payment.
- the paid key-using device such as a vehicle
- the first key and the second key to be introduced later
- the key using device can reacquire the key when the area it is located in changes.
- keys are distributed according to regions. When the region where the key using device is located changes, the keys that can be used by the key using device also change accordingly. At this time, the key needs to be obtained again. key. In this way, the matching degree of the key can be improved and the decryption success rate can be improved.
- the key using device can re-obtain the key when the currently saved key expires. It is understandable that as the existence time of the key increases, the possibility of the key being cracked increases accordingly, and the security of the key decreases accordingly. Therefore, in the embodiment of the present application, a validity period is set for the key so that when the key expires, the key using device can re-obtain the key, thus improving the security of the key.
- the key using device may re-obtain the key when the time interval between the current time and the last time the key was obtained reaches the first update threshold.
- the time interval between the previous moment and the last time the key was obtained reaches the first update threshold, it indicates that the key has not been updated for a long time, and the risk of the key being cracked or leaked is high, so the key needs to be obtained in order to Improve security.
- the first update threshold can be set as needed, for example, it can be set to 1 hour or 1 day.
- the first update threshold may be determined based on the area of the first area or the number of key using devices in the first area. For example, the larger the area of the first area, the smaller the value of the first update threshold (that is, the greater the update frequency), and the greater the number of key using devices in the first area, the smaller the value of the first update threshold. Small (that is, the greater the update frequency).
- the key using device re-obtains the key when the received data cannot be successfully decrypted using the currently saved key. If the key using device cannot successfully decrypt the received data using the currently saved key, it indicates that the current key is incorrect. In order not to affect the business, the key needs to be obtained again.
- the update times of keys in different areas can be different, thereby reducing the pressure on the key management device during key update.
- first preset conditions are only exemplary first preset conditions and are not used to limit the first preset conditions.
- the embodiment of the present application can also obtain the at least one key according to the location in other circumstances.
- Step S403 use the first key.
- the key using device may use the first key for encryption or the first key for decryption.
- the at least one key can be used for first location information, vehicle driving information or service content information. That is to say, in the embodiment of the present application, the first key can be used to encrypt the first location information, vehicle driving information or service content information, or the first key can be used to encrypt the first location information, vehicle driving information and so on. Decrypt the information or service content information.
- the first key can also be used to encrypt the message containing the first location information, vehicle driving information or service content information, or the first key can be used to encrypt the message containing the first location information. , vehicle driving information or service content information.
- the above are only illustrative examples, and at least one key can also be used to encrypt and decrypt other data or messages, which is not limited by the embodiments of this application.
- key using device A and key using device B are located in the same area, at this time, at least one key obtained by key using device A and key using device B is the same.
- the first key used when the key using device A sends the V2X message to the key using device B and the first key used when the key using device B sends the V2X message to the key using device A may be the same or different.
- key using device A and key using device B have obtained key 1, key 2 and key 3.
- key using device A sends a V2X message to key using device B key 1 is randomly selected for encryption.
- key using device B sends a V2X message to key using device A
- key 2 is randomly selected for encryption.
- the at least one key is a plurality of keys
- the method may further include: selecting the first key from the plurality of keys.
- Step S403 may include using the first key as an encryption key.
- the selection may be random selection, weighted random selection or rotation selection.
- the key using device randomly selects a key from a plurality of keys as the first key.
- the key using device may randomly select a key from a plurality of keys as the first key.
- the weighting coefficient of a key can be determined based on the number of times the key has been used.
- the weighting factor of a key is inversely proportional to the number of times the key has been used. That is to say, the more times a key has been used, the lower the weighting coefficient of the key, and the less likely the key is to be selected; the less the number of times a key has been used, the lower the weighting coefficient of the key.
- the higher the weighting factor the more likely the key is to be selected. In this way, the number of uses of each key can be balanced and the impact caused by key leakage can be reduced.
- the key usage device may rotate multiple keys as the first key.
- the key using device can change the first key every once in a while, or change the first key every time it moves a certain distance.
- the key using device can replace the first key according to the speed of the vehicle. When the speed of the vehicle is 0, the first key may not be rotated, or the rotation time may be extended.
- the at least one key is a plurality of keys
- the method may further include: receiving ciphertext from the first device, the ciphertext being encrypted according to the first key ; Obtain a key parameter indicating the first key.
- Step S403 may include: selecting the first key from the plurality of keys as the decryption key of the ciphertext according to the key parameter.
- the first device may be a key management device, or other devices such as vehicles, RSUs, and portable terminals.
- the embodiments of this application do not limit the first device.
- the key using device sends multiple key parameters corresponding to the multiple keys.
- the key using device can obtain the key parameters of each key at the same time.
- the key using device can find the key parameter corresponding to the ciphertext, find the first key, and then use the first key to decrypt the ciphertext. In this way, the speed of determining the first key can be increased and the decryption efficiency can be improved.
- the key parameter can be the id of the key or the derivation time of the key.
- the at least one key is multiple keys
- the method may further include: receiving ciphertext from the first device, where the ciphertext is encrypted according to the first key; by The ciphertext is decrypted by traversing and using the multiple keys, and it is determined that the first key can successfully decrypt the ciphertext.
- Step S403 may include: selecting the first key from the plurality of keys as the decryption key of the ciphertext.
- the key using device can reduce the amount of data carried when interacting with the first device and save communication resources.
- the key corresponds to the region, and the keys used in different regions are different. This reduces the coverage of the same key to one region, which not only reduces the usage range and number of uses of the same key, In addition, when the key of one area is leaked, it will not affect the security of the keys of other areas, thereby reducing the impact caused by the leakage of the key of one area and improving the security of the key.
- the key management device can obtain multiple preset areas through area division, generate at least one key corresponding to the first area, and send the key usage device in the first area. At least one key.
- the first area may represent any preset area among multiple preset areas. Other preset areas can refer to the first area, which will not be described again here.
- the key management device sending at least one key to the key usage device in the first area may be triggered by at least one of the following: the key usage device The device registers; the key using device enters the first area from an area other than the first area; the current key corresponding to the first area expires; the current moment is the same as the last time the key was used. The time interval between the moments when the device sends the key reaches the first update threshold; the key using device requests to update the key corresponding to the first area.
- the key management device may send the key to the key usage device based on the received location information.
- Figure 4 shows an interactive flow chart of the key management method provided by the embodiment of the present application. This method can be applied to the system shown in Figure 1. As shown in Figure 4, the method may include:
- Step S501 The key management device obtains multiple preset areas through area division.
- the multiple preset areas obtained in this step include the first area.
- the regional division is based on at least one of the following methods: regional division based on regular graphics or irregular graphics; regional division based on administrative regions; regional division based on road grades; automatic Divide areas based on driving level; divide areas based on commercial areas.
- step S401 For the specific area division method, please refer to step S401, which will not be described again here.
- Step S502 The key management device generates at least one key corresponding to the first area.
- the key management device may generate at least one key corresponding to the first area, at least one of which is assigned to the key using device located in the first area.
- the number of at least one key corresponding to the first area is related to at least one of the following: the area of the first area; the size of the key using device in the first area. quantity; the level of the first area; the update frequency of the at least one key.
- the area of the first area When the area of the first area is large, it indicates that there may be more key using devices in the first area, and the same key is more likely to be used by too many key using devices, so it can be the first area. Generate more keys to increase key security. When the area of the first area is small, it indicates that there may be fewer key using devices in the first area, and the same key is less likely to be used by too many key using devices, so it can be generated for the first area. Fewer keys to save key resources and communication overhead.
- the same key is more likely to be used by too many key using devices. Therefore, more keys can be generated for the first area to improve the key quality. security.
- the number of key using devices in the first area is small, the same key is less likely to be used by too many key using devices, so fewer keys can be generated for the first area to save passwords. Key resources and communication overhead.
- the level of the first area is relatively high, for example, when the first area is a national, municipal, national highway, autonomous driving (L4) or unmanned driving (L5), or a commercial area with a large passenger flow, it indicates that there may be There are more key using devices, and the same key is more likely to be used by too many key using devices. Therefore, more keys can be generated for the first area to improve the security of the key.
- the level of the first area is low, for example, when the first area is a county, street, national highway, driving automation (L1), assisted driving (L2) or a commercial area with small passenger flow, it indicates that there may be With fewer key using devices, the same key is less likely to be used by too many key using devices. Therefore, fewer keys can be generated for the first area to save key resources and communication overhead.
- the above are only exemplary factors that affect the number of at least one key corresponding to the first area, and do not apply to limit the factors that affect the number of keys.
- the number of keys can also be related to other factors. This application implements There is no restriction on this.
- the number of keys can also be set and modified by the user, or it can be set to a fixed value.
- the update frequency of at least one key can be increased to improve the security of the key.
- the update frequency of at least one key can be reduced to save computing resources.
- the number and duration of key usage can be reduced, and key security can be enhanced.
- the number of at least one key corresponding to the first area may be fixed or dynamically changed. In one example, the number of at least one key corresponding to the first area may be determined based on the area of the first area, such that when the area of the first area is fixed, the number of at least one key corresponding to the first area The number of keys remains unchanged. In yet another example, the number of at least one key corresponding to the first area may be determined based on the number of key using devices in the first area. Since the number of key using devices in the first area changes, therefore The number of at least one key corresponding to the first area will also change accordingly. For example, if the number of key using devices increases, the number of keys will increase accordingly, and if the number of key using devices decreases, the number of keys will decrease accordingly.
- Step S503 The key using device determines the location of the key using device, and the location is located in the first area.
- Step S504 The key usage device sends location information indicating the location to the key management device.
- the location information may be identification information of the first area or geographical coordinate information of the key using device.
- Step S505 The key management device allocates at least one key corresponding to the first area to the key using device based on the location information.
- the location information is identification information of the first area.
- the key using device may first determine the first area based on the location and a preset area division method, and then send the identification information of the first area to the key management device.
- the key management device may find at least one key corresponding to the first area based on the identification information, and allocate the found at least one key to the key using device for use.
- the identification information may be a number, a name, a code, etc., which is not limited by the embodiment of the present application.
- the key usage device calculates the identification information, which can effectively reduce the workload of the key management device.
- the location information is the geographical coordinate information of the key using device.
- the key using device may send the geographical coordinate information of the key using device to the key management device.
- the key management device may determine the first area according to the first coordinate information and a preset area division method, and then allocate at least one key corresponding to the first area to the key using device for use.
- the key using device Since the preset area division method in the key management device may change, when it changes, the key using device may not be able to update the area division method in time due to some reasons (such as poor network or busy business, etc.), thus As a result, the calculated identification information does not match the actual identification information. In this case, the key obtained by the key using device does not match the first area, causing the key using device to be unable to perform normal V2X communication.
- the key using device sends geographical coordinate information to the key management device, and the key management device calculates the identification information, which can avoid the problem of the key using device obtaining the wrong key due to changes in the preset area division method.
- Step S506 The key using device sends the at least one key to the key using device.
- Step S506 The key using device receives the at least one key from the key management device.
- Step S507 The key using device uses the first key included in the at least one key.
- step S402 The process of selecting the first key from at least one key by the key using device and the process of using the first key can refer to step S402 and step S403, which will not be described again here.
- the key using device can apply to the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the key management device for at least one key corresponding to the first area, and then use the first key among the at least one key, thus reducing the coverage of the key.
- the first area when the key is leaked, it will not affect the security of other areas, thereby reducing the impact caused by the leakage of the key corresponding to the first area and improving the security of the key.
- the key management device can push the key.
- Figure 5 shows an interactive flow chart of the key management method provided by the embodiment of the present application. This method can be applied to the system shown in Figure 1. As shown in Figure 5, the method may include:
- Step S601 The key management device obtains multiple preset areas through area division.
- Step S602 The key management device generates at least one key corresponding to the first area.
- step S601 and step S602 may refer to step S501 and step S502, which will not be described again here.
- Step S603 The key management device sends a message including the at least one key in the first area.
- the key management device can send a message including the at least one key in the first area, so that all key using devices located in the first area can obtain at least one key corresponding to the first area.
- the key management device may periodically send messages including the at least one key within the first area.
- the key management device may send a message including the at least one key to the key using device when detecting that a key using device enters the first area. The embodiment of the present application does not limit the timing when the key management device sends a message including the at least one key.
- Step S604 The key using device receives a message including at least one key from the key management device.
- Step S605 The key using device determines the location of the key using device, and the location is located in the first area.
- Step S606 The key using device determines not to discard the at least one key according to the location.
- the key using device may discard the at least one key if the key using device determines that the location is not located in the first area.
- a key using device located outside the first area but close to the first area or a key using device that has just left the first area may also receive a message including at least one key corresponding to the first area. Therefore, after receiving the message including the message, the key using device can determine whether to discard the at least one received key according to the location. If the key using device is located in the first area, the key using device does not discard at least one key corresponding to the first area, thereby enabling the key using device to use the key corresponding to the first area. If the key using device is not located in the first area, the key using device will discard at least one key corresponding to the first area, so that the key using device avoids misuse of the key corresponding to the first area.
- Step S607 The key using device uses the first key included in the at least one key.
- step S607 please refer to step S607, which will not be described again here.
- the key management device may send at least one key corresponding to the first region to the key usage device in the first region.
- the coverage of the key is reduced to the first area.
- the key When the key is leaked, it will not affect the security of other areas, thereby reducing the impact caused by the leakage of the key corresponding to the first area. , which improves the security of the key; on the other hand, it saves communication resources.
- Figure 6 shows an interactive flow chart of the key management method provided by the embodiment of the present application. This method can be applied to the system shown in Figure 1. As shown in Figure 6, the method may include:
- Step S701 The key management device sends the second key to the key using device.
- the key management device may send the second key to the key using device when the key using device registers. In this way, as long as the key using device is registered with the key management device, the same second key will be stored therein.
- the key management device may send a new second key to all registered key using devices after the second key becomes invalid or expires. In this way, the second key can be updated synchronously through all registered key using devices, thereby improving the security of the second key.
- Step S702 The key using device receives the second key.
- Step S703 The key using device uses the second key if the second preset condition is met.
- the second preset condition includes at least one of the following situations: the key using device is located in a transition area; the key using device is located in a specific area; the key using device does not obtain the at least one One key; the at least one key has expired and failed to be updated; the key using device cannot successfully decrypt the received data using the at least one key; the key using device cannot communicate with the key management device communication.
- the method of using the second key may refer to the method of using the first key, which will not be described again here.
- the multiple preset areas obtained by the key management device through area division may include transition areas.
- the transition area may represent a preset area among the plurality of preset areas that can be connected to any other preset area.
- the second key can be used. In this way, the problem of frequent key updates caused by the key using device frequently crossing regions can be avoided.
- Figure 7 shows a schematic diagram of area division provided by the embodiment of the present application.
- 10 preset areas are obtained through area division, which are the 0th preset area, the 1st preset area,... and the 8th preset area, as well as the transition area.
- the transition area can connect any one of the 0th preset area, the 1st preset area, ... and the 8th preset area.
- the area can be divided first through Formula 1 to obtain the identification information of each preset area. Then, based on the division result, the boundary area between two adjacent preset areas is set as a transition area, and each boundary area can constitute the final transition area.
- the preset area divided by Formula 1 is a square, and the distance between adjacent preset areas in the longitude direction and the distance between adjacent preset areas in the latitudinal direction are the same, the location that satisfies any one of the conditions in Formula 2 (x, y) is located in the transition region.
- the value of M is the same as L
- the value of Z is half the length of the transition region
- the value of N is the difference between M and Z.
- x is greater than 400 and less than 600
- the position is in the transition area.
- y is greater than 400 and less than 600
- the position is in the transition region.
- the key management device can demarcate a specific area, and the specific area can be an area with poor communication conditions (that is, it is easy to communicate between the key management device and the key using devices in the area). Interruption occurs or even failure to connect) or busy business areas (that is, key-using devices in this area need to use keys frequently).
- the second key can be used when the key-using device is located in that specific area. In this way, when the key using device determines that the location is located in a specific area, the process of determining whether the location is located in the first area can be omitted and the second key can be used directly. In this way, computing resources can be saved. Especially when the specific area is an area with poor communication conditions, there is no need for the key using device to repeatedly send location information to the key management device to obtain at least one key corresponding to the first area, thus saving a large amount of communication resources.
- the specific area may overlap with multiple preset areas obtained by the key using device through area division. At this time, the key using device may preferentially use the second key.
- Figure 8 shows a schematic diagram of the division of specific areas in the embodiment of the present application. As shown in Figure 7, the specific area overlaps with the 0th preset area and the 3rd preset area. , if the key using device is located in both the specific area and the 0th preset area, the key using device can preferentially use the second key.
- the key using device may use the second key without obtaining at least one key corresponding to the first area.
- the failure of the key management device to obtain at least one key corresponding to the first area may be due to poor communication conditions. At this time, if it waits for at least one key, the sending of service information may be delayed. In order to reduce the need for service information The effect is that a second key can be used.
- the key using device may try to use the second key when the received data cannot be successfully decrypted using currently existing keys. Because this situation may be caused by the sender being located in a transition area, a specific area, or unable to obtain at least one key. In this way, the impact on business information can be reduced.
- the key using device may use the second key when it is unable to communicate with the key management device.
- the key using device cannot communicate with the key management device, which may cause the key using device to be unable to obtain at least one key corresponding to the first area or to update at least one key corresponding to the first area in a timely manner.
- the key using device uses the second key, which can increase the probability of successful decryption by the receiving end and reduce the impact on the business information caused by poor communication conditions with the key management device.
- the key management device may send the third key information to the key using device.
- the third key information may be used to decrypt subsequent messages sent by the key management device to the key usage device. That is to say, the key using device can use the third key information to decrypt subsequent messages received from the key management device.
- the third key information may be the key itself (recorded as: third key), or may be a parameter used to generate the third key, which is not limited in this embodiment of the present application.
- the third key information may be used to decrypt a message from the key management device and including at least one key corresponding to the first area, so as to obtain at least one key corresponding to the first area.
- the third key information can be used to decrypt a message from the key management device and including the second key, so as to obtain the second key.
- the received message cannot be decrypted successfully, and at least one key and the second key corresponding to the first area cannot be obtained, thereby improving the security of the key.
- key protection services can be provided to registered users (such as paid registered users).
- Figure 9 shows a block diagram of a key usage device provided by an embodiment of the present application.
- the device 800 may include:
- the first determination module 801 is used to determine the location of the key using device
- the first acquisition module 802 is configured to acquire at least one key according to the location.
- the at least one key is allocated to a key using device located in the first area, and the location is located in the first area.
- the at least one key includes a first key;
- the first use module 803 is used to use the first key.
- the first acquisition module is also used to:
- the at least one key responsive to the location information is received from the key management device.
- the location information is the identification information of the first area
- the first acquisition module is also used to:
- the first area is determined according to the location and a preset area division method.
- the device further includes:
- a first receiving module configured to receive a message including the at least one key from the key management device
- the first acquisition module is also used to:
- the at least one key is multiple keys
- the device further includes:
- a first selection module configured to select the first key from the plurality of keys
- the first using module is also configured to use the first key as an encryption key.
- the selection is random selection, weighted random selection or rotating selection.
- the at least one key is multiple keys
- the device further includes:
- a second receiving module configured to receive ciphertext from the first device, where the ciphertext is encrypted according to the first key
- a second acquisition module configured to acquire key parameters, where the key parameters indicate the first key
- the first usage module is also used for:
- the first key is selected from the plurality of keys as the decryption key of the ciphertext.
- the at least one key is multiple keys
- the device further includes:
- a third receiving module configured to receive ciphertext from the first device, where the ciphertext is encrypted according to the first key
- a traversal module configured to decrypt the ciphertext using the plurality of keys through traversal, and determine that the first key can successfully decrypt the ciphertext
- the first usage module is also used for:
- the first key is selected from the plurality of keys as the decryption key of the ciphertext.
- the first area is divided based on at least one of the following methods:
- the boundary of the first area is dynamically set.
- the first acquisition module is also used to:
- the at least one key is obtained according to the location, wherein the first preset condition includes at least one of the following situations:
- the key using device is registered with the key management device
- the area where the key using device is located changes
- the time interval between the current moment and the last time the key was obtained reaches the first update threshold
- the received data could not be successfully decrypted using the currently saved key.
- the device further includes:
- the third acquisition module is used to acquire the preset second key
- the second use module is used to use the second key when the second preset condition is met;.
- the second preset condition includes at least one of the following situations:
- the key usage device is located in the transition area
- the key usage device is located in a specific area
- the key using device has not obtained the at least one key
- the at least one key expires and the update fails
- the key using device cannot successfully decrypt the received data using the at least one key
- the key using device cannot communicate with the key management device.
- the number of the at least one key is related to at least one of the following:
- the number of key using devices in the first area is the number of key using devices in the first area
- the level of the first area is the level of the first area
- the update frequency of the at least one key is the update frequency of the at least one key.
- the number of at least one key is fixed or dynamically changed.
- the at least one key is used for geographical location information, vehicle driving information or service content information.
- the device further includes:
- the fourth acquisition module is used to obtain third key information from the key management device when registering on the key management device.
- the third key information is used for subsequent reception from the key management device.
- the incoming message is decrypted.
- Figure 10 shows a block diagram of a key management device provided by an embodiment of the present application.
- the device 900 may include:
- Division module 901 configured to obtain multiple preset areas through area division, where the multiple preset areas include the first area;
- a first generation module 902 configured to generate at least one key corresponding to the first area
- the first sending module 903 is configured to send the at least one key to the key using device in the first area.
- the device further includes:
- a first receiving module configured to receive location information indicating the location of the key using device from the key using device
- a first allocation module configured to allocate the at least one key to the key using device based on the location information.
- the location information is identification information of the first area or geographical coordinate information of the key using device.
- the first sending module is also used to:
- a message including the at least one key is sent within the first area.
- the at least one key is multiple keys
- the device further includes:
- the second sending module is configured to send a plurality of key parameters corresponding to the plurality of keys to the key using device.
- the area division is based on at least one of the following ways:
- the boundary of the first area is dynamically set.
- the sending of the at least one key to the key usage device in the first area is triggered by at least one of the following:
- the key usage device is registered with the key management device
- the key using device enters the first area from an area other than the first area;
- the time interval between the current time and the last time the key was sent to the key using device reaches the first update threshold
- the key using device requests an update of the key corresponding to the first area.
- the device further includes:
- a third sending module configured to send a second key to the key using device, where the second key is used by the key using device in at least one of the following situations:
- the key usage device is located in the transition area
- the key usage device is located in a specific area
- the key using device has not obtained the at least one key
- the at least one key expires and the update fails
- the key using device cannot successfully decrypt the received data using the at least one key
- the key using device cannot communicate with the key management device.
- the number of the at least one key is related to at least one of the following:
- the number of key using devices in the first area is the number of key using devices in the first area
- the level of the first area is the level of the first area
- the update frequency of the at least one key is the update frequency of the at least one key.
- the number of at least one key is fixed or dynamically changed.
- the at least one key is used for geographical location information, vehicle driving information or service content information.
- the fourth sending module is configured to send third key information to the key using device when the key using device is registered.
- the third key information is used to subsequently send the key information to the key using device.
- the key is used to decrypt the message sent by the device.
- FIG 11 shows a schematic structural diagram of an electronic device provided by an embodiment of the present application.
- the electronic device may be a key usage device or a key management device.
- the electronic device can be deployed in terminal devices such as vehicles and RSUs, or in cloud servers.
- the test device may include at least one processor 301, a memory 302, an input and output device 303 and a bus 304.
- processor 301 may include at least one processor 301, a memory 302, an input and output device 303 and a bus 304.
- the processor 301 is the control center of the test device, and may be a processor or a collective name for multiple processing elements.
- the processor 301 is a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the present disclosure. , for example: one or more microprocessors (Digital Signal Processor, DSP), or one or more Field Programmable Gate Array (Field Programmable Gate Array, FPGA).
- DSP Digital Signal Processor
- FPGA Field Programmable Gate Array
- the processor 301 can execute various functions of the test device by running or executing software programs stored in the memory 302 and calling data stored in the memory 302 .
- the processor 301 may include one or more CPUs, such as CPU 0 and CPU 1 shown in the figure.
- the test device may include multiple processors, such as the processor 301 and the processor 305 shown in FIG. 11 .
- processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU).
- a processor here may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
- the memory 302 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, a random access memory (Random Access Memory, RAM) or other types that can store information and instructions. Dynamic storage device, it can also be Electrically Erasable Programmable Read-Only Memory (EEPROM), Compact Disc Read-Only Memory (CD-ROM) or other optical disk storage, optical disk storage (including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other medium for access, but not limited to this.
- the memory 302 may exist independently and be connected to the processor 301 through a bus 304.
- the memory 302 may also be integrated with the processor 301.
- the input and output device 303 used to communicate with other devices or communication networks. Such as used to communicate with Ethernet, Radio access network (Radio access network, RAN), Wireless Local Area Networks (Wireless Local Area Networks, WLAN) and other communication networks.
- the input and output device 303 may include all or part of a baseband processor, and may also optionally include a radio frequency (Radio Frequency, RF) processor.
- the RF processor is used to send and receive RF signals
- the baseband processor is used to implement the processing of the baseband signal converted from the RF signal or the baseband signal to be converted into an RF signal.
- the input and output device 303 may include a transmitter and a receiver.
- the transmitter is used to send signals to other devices or communication networks
- the receiver is used to receive signals sent by other devices or communication networks.
- the transmitter and receiver can exist independently or integrated together.
- the bus 304 may be an Industry Standard Architecture (Industry Standard Architecture, ISA) bus, a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus, etc.
- ISA Industry Standard Architecture
- PCI Peripheral Component Interconnect
- EISA Extended Industry Standard Architecture
- the bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in Figure 11, but it does not mean that there is only one bus or one type of bus.
- the equipment structure shown in Figure 11 does not constitute a limitation of the test device, and may include more or less components than shown, or combine certain components, or arrange different components.
- An embodiment of the present application also provides a key usage device, including: a processor and a memory used to store instructions executable by the processor; wherein the processor is configured to implement the above method when executing the instructions.
- An embodiment of the present application also provides a key management device, including: a processor and a memory used to store instructions executable by the processor; wherein the processor is configured to implement the above method when executing the instructions.
- An embodiment of the present application also provides a key management system, including the above-mentioned key usage device and the above-mentioned key management device.
- An embodiment of the present application also provides a vehicle, including the above key usage device and/or the above key management device.
- Embodiments of the present application also provide a non-volatile computer-readable storage medium on which computer program instructions are stored. When the computer program instructions are executed by a processor, the above method is implemented.
- Embodiments of the present application provide a computer program product, including computer readable code, or a non-volatile computer readable storage medium carrying the computer readable code, when the computer readable code is stored in a processor of an electronic device When running, the processor in the electronic device executes the above method.
- Computer-readable storage media may be tangible devices that can retain and store instructions for use by an instruction execution device.
- the computer-readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the above.
- Non-exhaustive list of computer-readable storage media include: portable computer disks, hard drives, random access memory (RAM), read only memory (ROM), erasable memory Electrically Programmable Read-Only-Memory (EPROM or Flash Memory), Static Random-Access Memory (SRAM), Portable Compact Disc Read-Only Memory (CD) -ROM), Digital Video Disc (DVD), memory stick, floppy disk, mechanical encoding device, such as a punched card or a raised structure in a groove with instructions stored thereon, and any suitable combination of the above .
- RAM random access memory
- ROM read only memory
- EPROM or Flash Memory erasable memory Electrically Programmable Read-Only-Memory
- SRAM Static Random-Access Memory
- CD Portable Compact Disc Read-Only Memory
- DVD Digital Video Disc
- memory stick floppy disk
- mechanical encoding device such as a punched card or a raised structure in a groove with instructions stored thereon, and any suitable combination of the above .
- Computer-readable program instructions or code described herein may be downloaded from a computer-readable storage medium to various computing/processing devices, or to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network.
- the network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage on a computer-readable storage medium in the respective computing/processing device .
- the computer program instructions used to perform the operations of this application can be assembly instructions, instruction set architecture (Instruction Set Architecture, ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, status setting data, or one or more Source code or object code written in any combination of programming languages, including object-oriented programming languages—such as Smalltalk, C++, etc., and conventional procedural programming languages—such as the “C” language or similar programming languages.
- the computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server implement.
- the remote computer can be connected to the user's computer through any kind of network—including a Local Area Network (LAN) or a Wide Area Network (WAN)—or it can be connected to an external computer (such as Use an Internet service provider to connect via the Internet).
- electronic circuits are customized by utilizing state information of computer-readable program instructions, such as programmable logic circuits, field-programmable gate arrays (Field-Programmable Gate Arrays, FPGAs) or programmable logic arrays (Programmable Logic Array (PLA), the electronic circuit can execute computer-readable program instructions to implement various aspects of the present application.
- These computer-readable program instructions may be provided to a processor of a general-purpose computer, a special-purpose computer, or other programmable data processing apparatus, thereby producing a machine that, when executed by the processor of the computer or other programmable data processing apparatus, , resulting in an apparatus that implements the functions/actions specified in one or more blocks in the flowchart and/or block diagram.
- These computer-readable program instructions can also be stored in a computer-readable storage medium. These instructions cause the computer, programmable data processing device and/or other equipment to work in a specific manner. Therefore, the computer-readable medium storing the instructions includes An article of manufacture that includes instructions that implement aspects of the functions/acts specified in one or more blocks of the flowcharts and/or block diagrams.
- Computer-readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other equipment, causing a series of operating steps to be performed on the computer, other programmable data processing apparatus, or other equipment to produce a computer-implemented process. , thereby causing instructions executed on a computer, other programmable data processing apparatus, or other equipment to implement the functions/actions specified in one or more blocks in the flowcharts and/or block diagrams.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions that embody one or more elements for implementing the specified logical function(s).
- Executable instructions may occur out of the order noted in the figures. For example, two consecutive blocks may actually execute substantially in parallel, or they may sometimes execute in the reverse order, depending on the functionality involved.
- each block of the block diagram and/or flowchart illustration, and combinations of blocks in the block diagram and/or flowchart illustration can be implemented by hardware (such as circuits or ASICs) that perform the corresponding function or action. Specific Integrated Circuit), or can be implemented with a combination of hardware and software, such as firmware.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
La présente demande concerne un procédé de gestion de clé, un appareil d'utilisation de clé et un appareil de gestion de clé ; et la présente demande concerne le domaine technique du transport intelligent et de la conduite intelligente. Le procédé est appliqué à un appareil d'utilisation de clé. Le procédé consiste à : déterminer la position d'un appareil d'utilisation de clé ; acquérir au moins une clé en fonction de la position, ladite au moins une clé étant attribuée à un appareil d'utilisation de clé situé dans une première zone, la position étant située dans la première zone, et ladite au moins une clé comprenant une première clé ; et utiliser la première clé. L'appareil d'utilisation de clé et l'appareil de gestion de clé peuvent être appliqués à un véhicule ; et le procédé de gestion de clé, l'appareil d'utilisation de clé et l'appareil de gestion de clé décrits dans les modes de réalisation de la présente invention peuvent améliorer la sécurité d'une clé.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202280062770.1A CN118056376A (zh) | 2022-09-16 | 2022-09-16 | 一种密钥管理方法、使用装置及管理装置 |
PCT/CN2022/119399 WO2024055303A1 (fr) | 2022-09-16 | 2022-09-16 | Procédé de gestion de clé, appareil d'utilisation de clé et appareil de gestion de clé |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/119399 WO2024055303A1 (fr) | 2022-09-16 | 2022-09-16 | Procédé de gestion de clé, appareil d'utilisation de clé et appareil de gestion de clé |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024055303A1 true WO2024055303A1 (fr) | 2024-03-21 |
Family
ID=90273917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/119399 WO2024055303A1 (fr) | 2022-09-16 | 2022-09-16 | Procédé de gestion de clé, appareil d'utilisation de clé et appareil de gestion de clé |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN118056376A (fr) |
WO (1) | WO2024055303A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702786A (zh) * | 2016-03-25 | 2018-10-23 | 华为技术有限公司 | 一种通信方法、装置和系统 |
US20190384320A1 (en) * | 2019-07-24 | 2019-12-19 | Lg Electronics Inc. | Autonomous driving control method in restricted area and autonomous driving system using the same |
WO2021179331A1 (fr) * | 2020-03-13 | 2021-09-16 | 华为技术有限公司 | Procédé, appareil et système de communication |
US20220179972A1 (en) * | 2020-12-04 | 2022-06-09 | Amazon Technologies, Inc. | Highly-available cryptographic keys |
WO2022151478A1 (fr) * | 2021-01-18 | 2022-07-21 | 华为技术有限公司 | Procédé, dispositif et système de gestion de clé de véhicule |
-
2022
- 2022-09-16 WO PCT/CN2022/119399 patent/WO2024055303A1/fr active Application Filing
- 2022-09-16 CN CN202280062770.1A patent/CN118056376A/zh active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702786A (zh) * | 2016-03-25 | 2018-10-23 | 华为技术有限公司 | 一种通信方法、装置和系统 |
US20190384320A1 (en) * | 2019-07-24 | 2019-12-19 | Lg Electronics Inc. | Autonomous driving control method in restricted area and autonomous driving system using the same |
WO2021179331A1 (fr) * | 2020-03-13 | 2021-09-16 | 华为技术有限公司 | Procédé, appareil et système de communication |
US20220179972A1 (en) * | 2020-12-04 | 2022-06-09 | Amazon Technologies, Inc. | Highly-available cryptographic keys |
WO2022151478A1 (fr) * | 2021-01-18 | 2022-07-21 | 华为技术有限公司 | Procédé, dispositif et système de gestion de clé de véhicule |
Also Published As
Publication number | Publication date |
---|---|
CN118056376A (zh) | 2024-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9218740B2 (en) | Enriching driving experience with cloud assistance | |
US10567923B2 (en) | Computation service for mobile nodes in a roadway environment | |
US20220095115A1 (en) | Misbehavior detection for vehicle-to-everything messages | |
US20190051158A1 (en) | Intelligent traffic management for vehicle platoons | |
WO2022042098A1 (fr) | Procédé, appareil et système de conduite à distance, dispositif et support | |
US20170276504A1 (en) | Vehicular Traffic Assistance Based on Traffic Management Decisions | |
WO2022227870A1 (fr) | Procédé et appareil de traitement collaboratif route-véhicules, dispositif électronique et support de stockage | |
EP3114665A1 (fr) | Échange de notifications de véhicules basé sur l'infonuagique pour des événements de transit localisés | |
US11308736B2 (en) | Selecting V2X communications interface | |
US11792687B2 (en) | Message management for cooperative driving among connected vehicles | |
US11395118B2 (en) | Vehicular micro cloud hubs | |
US10843703B2 (en) | Accuracy system for connected vehicles | |
JP2020102840A (ja) | 車両マイクロクラウドにおけるモビリティ指向データ複製 | |
US11709258B2 (en) | Location data correction service for connected vehicles | |
US20220029832A1 (en) | System and methodologies using global electors with regional certificate trust lists | |
CN115004271A (zh) | 用于在蜂窝车辆到一切(c-v2x)消息中嵌入受保护车辆标识符信息的方法 | |
EP3610628B1 (fr) | Transmission et réception d'un message d'intérêt spécifiant un paramètre d'agrégation | |
CN112800156B (zh) | 一种基于路侧单元地图分幅方法、系统、设备和存储介质 | |
WO2024055303A1 (fr) | Procédé de gestion de clé, appareil d'utilisation de clé et appareil de gestion de clé | |
JP2008131361A (ja) | 移動体通信方法、コンテンツ配信方法、移動体通信端末、データ通信装置、移動体通信プログラム、コンテンツ配信プログラムおよび記録媒体 | |
US20230247399A1 (en) | Adaptive sensor data sharing for a connected vehicle | |
JP7515554B2 (ja) | 高度道路交通システム内の道路空間集合知覚メッセージ | |
Ansari | Cloud computing on cooperative cars (C4S): An architecture to support navigation-as-a-service | |
Lu et al. | Vehicular Communication and Networking Technologies | |
US20240321086A1 (en) | Tokenization for on-demand traffic resource allocation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 202280062770.1 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22958493 Country of ref document: EP Kind code of ref document: A1 |