CN109787756A - A kind of car-mounted terminal key distribution management method based on whitepack encryption technology - Google Patents

A kind of car-mounted terminal key distribution management method based on whitepack encryption technology Download PDF

Info

Publication number
CN109787756A
CN109787756A CN201811580794.8A CN201811580794A CN109787756A CN 109787756 A CN109787756 A CN 109787756A CN 201811580794 A CN201811580794 A CN 201811580794A CN 109787756 A CN109787756 A CN 109787756A
Authority
CN
China
Prior art keywords
key
car
mounted terminal
whitepack
firmware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811580794.8A
Other languages
Chinese (zh)
Other versions
CN109787756B (en
Inventor
张宇
拱印生
娄喜超
迟亮
刘凤致
张春婷
于辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Weisi Intelligent Technology Co Ltd
Original Assignee
Jilin Weisi Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Weisi Intelligent Technology Co Ltd filed Critical Jilin Weisi Intelligent Technology Co Ltd
Priority to CN201811580794.8A priority Critical patent/CN109787756B/en
Publication of CN109787756A publication Critical patent/CN109787756A/en
Application granted granted Critical
Publication of CN109787756B publication Critical patent/CN109787756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The car-mounted terminal key distribution management method based on whitepack encryption technology that the invention discloses a kind of comprising following steps: the step of car-mounted terminal key is distributed;The step of generation of car-mounted terminal root key and data encrypting and deciphering.By distribution to car-mounted terminal key, storage, using and more new technological process is comprehensively protected and safety management, can be effectively solved the information security issue during entire key lifetimes, key avoided to leak;And the present invention can be in the case where not using encryption chip, it is ensured that the storage and use on the vehicle-mounted terminal equipment of key are safe, therefore, are promoting the BOM cost that car-mounted terminal can also be effectively reduced while safety, are reducing user's use and maintenance cost.

Description

A kind of car-mounted terminal key distribution management method based on whitepack encryption technology
Technical field
The present invention relates to car-mounted terminal information security field more particularly to a kind of car-mounted terminals based on whitepack encryption technology Key distribution management method.
Background technique
As vehicle is merged with information-based height, an automobile is no longer individual information island, in order to give user Bring more vehicles using service and trip service, automobile is substantially with the trend of external Networking.And guaranteeing safety While communication, how to guarantee that the secure distribution of core key, preservation and use are more and more paid attention in Encryption Algorithm.
There are mainly two types of for current terminal device key management mode:
Disk is directly accessed: simple to save the key distributed when factory using disk, when encryption and decryption, directly reads from disk close Key uses, and can be regularly updated online to key.
Encryption chip access: by the key typing encryption chip of generation before factory, encryption process is directly in encryption core It is completed inside piece, outside can not read or change, to realize complete physical isolation.
But in such a way that disk is directly accessed key, key can be made to be easy to be illegally accessed, there are larger safety is hidden Suffer from.And by the way of encryption chip access keys, it will lead to the key problem that can not regularly update online, and increase terminal BOM cost.
Therefore, the prior art needs further improvement and develops.
Summary of the invention
In view of above-mentioned deficiencies of the prior art, the purpose of the present invention is to provide a kind of based on the vehicle-mounted of whitepack encryption technology Terminal key distribution management method reduces the cost of key distribution management under the premise of ensuring information security.
In order to solve the above technical problems, the present invention program includes:
A kind of car-mounted terminal key distribution management method based on whitepack encryption technology comprising following steps:
The step of car-mounted terminal key is distributed;
The step of generation of car-mounted terminal root key and data encrypting and deciphering.
The car-mounted terminal key distribution management method, wherein above-mentioned car-mounted terminal key are as follows: Key=Keybasic + Keypart, wherein KeybasicIt is foundation, this part of the equipment of same production batch is identical, by whitepack cryptoguard; KeypartIt is unique identification part, the corresponding unique Key of each equipmentpart
The car-mounted terminal key distribution management method, wherein the Key in car-mounted terminalbasicIt injects in whitepack firmware Programming is into equipment together in portion, the Key of same batch equipmentbasicIt is identical, KeypartIt can be obtained by air interface application.
The car-mounted terminal key distribution management method, wherein the step of above-mentioned car-mounted terminal key is distributed specifically wraps It includes:
A, it is manufactured by Key Management Center and generates USBKEY, the Digital Certificate Security of mark USB KEY identity is stored in USB KEY In the unreadable safety chip in an interior outside;
B, the authentication based on USB KEY, Key Management Center receive the whitepack firmware downloading request of production line;
C, production line issues Key to Key Management Center application according to the whitepack firmware version number heldpartKey, and Locally carry out relationship storage;
D, corresponding whitepack firmware programming is entered terminal device according to production batch by production line;
E, production line is according to the equipment unique identifier of car-mounted terminal by corresponding KeypartThe equipment that car-mounted terminal is written;
F, USB KEY is removed after the completion of production, removes local whitepack firmware copies and correlation KeypartKey.
The car-mounted terminal key distribution management method, wherein step A is specific further include: the number of USB KEY identity Word certificate is assigned to production line by the way of physical distribution;Production line security official needs USB KEY being inserted into computer, with key The encrypted tunnel based on SSL is established between administrative center.
The car-mounted terminal key distribution management method, wherein it is white to generate the production line for corresponding software in step B whitepack The version number of box firmware, and by corresponding KeybasicIt is sent to the corresponding software, generating includes KeybasicWhitepack firmware, together When whitepack software the version number of whitepack firmware notice Key Management Center is managed.
The car-mounted terminal key distribution management method, wherein above-mentioned car-mounted terminal root key generates and data add solution Close step includes:
Key is inputted to whitepack firmwarepartAnd plain/cipher text;
Inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted;
Inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key;
Using terminal root key carries out encryption and decryption operation inside whitepack;
Ciphertext/plaintext is exported outside to whitepack.
The car-mounted terminal key distribution management method, wherein the car-mounted terminal key distribution management method further includes Long-range the step of updating car-mounted terminal root key, comprising:
SSL encryption channel is established between car-mounted terminal and center management server;
Center management server issues Key according to the equipment unique identifier of car-mounted terminalpart
Car-mounted terminal generates random code and uses the Key newly issuedpartKey Management Center is sent to after encryption, in key management The heart, which is decrypted after receiving ciphertext and returns to car-mounted terminal and compare, confirms new KeypartIt is legal effective;
With new KeypartReplace current Keypart
The car-mounted terminal key distribution management method based on whitepack encryption technology that the present invention provides a kind of, by vehicle-mounted The distribution of terminal key, storage, using and more new technological process is comprehensively protected and safety management, can be effectively solved entire Information security issue during key lifetimes, avoids key from leaking;And the present invention can be without using encryption chip In the case of, it is ensured that the storage and use on the vehicle-mounted terminal equipment of key are safe, therefore, can also while promoting safety The BOM cost of car-mounted terminal is effectively reduced, reduces user's use and maintenance cost.
Detailed description of the invention
Fig. 1 is key distribution flow schematic diagram in the present invention;
Fig. 2 is encrypting and decrypting flow diagram in the present invention;
Fig. 3 is that medium-long range of the present invention updates key flow diagram;
Fig. 4 is the idiographic flow schematic diagram of car-mounted terminal key ways of distribution in the present invention;
Fig. 5 is the idiographic flow schematic diagram of the generation of car-mounted terminal root key and data encrypting and deciphering in the present invention;
The position Fig. 6 medium-long range of the present invention updates the idiographic flow schematic diagram of car-mounted terminal root key.
Specific embodiment
The car-mounted terminal key distribution management method based on whitepack encryption technology that the present invention provides a kind of, to make the present invention Purpose, technical solution and effect it is clearer, clear, the present invention is described in more detail below.It should be appreciated that this place The specific embodiment of description is only used to explain the present invention, is not intended to limit the present invention.
The car-mounted terminal key distribution management method based on whitepack encryption technology that the present invention provides a kind of, such as Fig. 1 and Fig. 2 Shown in, specifically include the steps that the step of the distribution of car-mounted terminal key and the generation of car-mounted terminal root key and data encrypting and deciphering It suddenly, also may include long-range update car-mounted terminal root key of course for more preferably car-mounted terminal key distribution management side is improved The step of, as shown in Figure 3.
More specifically, above-mentioned car-mounted terminal key are as follows: Key=Keybasic + Keypart, wherein KeybasicIt is base Plinth part, this part of the equipment of same production batch is identical, by whitepack cryptoguard;KeypartIt is unique identification part, each Equipment corresponds to a unique Keypart.And the Key in car-mounted terminalbasicProgramming together is injected inside whitepack firmware to equipment In, the Key of same batch equipmentbasicIt is identical, KeypartIt can be obtained by air interface application.
In another preferred embodiment of the present invention, as shown in Figure 4, the step of above-mentioned car-mounted terminal key is distributed, is specific Include:
A, it is manufactured by Key Management Center and generates USBKEY, the Digital Certificate Security of mark USB KEY identity is stored in USB KEY In the unreadable safety chip in an interior outside;
B, the authentication based on USB KEY, Key Management Center receive the whitepack firmware downloading request of production line;
C, production line issues Key to Key Management Center application according to the whitepack firmware version number heldpartKey, and Locally carry out relationship storage;
D, corresponding whitepack firmware programming is entered terminal device according to production batch by production line;
E, production line is according to the equipment unique identifier of car-mounted terminal by corresponding KeypartThe equipment that car-mounted terminal is written;
F, USB KEY is removed after the completion of production, removes local whitepack firmware copies and correlation KeypartKey.
More specifically, step A is specific further include: the digital certificate of USB KEY identity uses the side of physical distribution Formula is assigned to production line;Production line security official, which needs to be inserted between computer, with Key Management Center to establish by USB KEY, to be based on The encrypted tunnel of SSL.
And corresponding software generates the version number of the production line whitepack firmware in step B whitepack, and by corresponding Keybasic It is sent to the corresponding software, generating includes KeybasicWhitepack firmware, while whitepack software notifies the version number of whitepack firmware Key Management Center is managed.
When car-mounted terminal carries out specifically used, as shown in Figure 5, above-mentioned car-mounted terminal root key generates and data add solution Close step includes:
Key is inputted to whitepack firmwarepartAnd plain/cipher text;
Inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted;
Inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key;
Using terminal root key carries out encryption and decryption operation inside whitepack;
Ciphertext/plaintext is exported outside to whitepack.
It is long-range the step of updating car-mounted terminal root key, as shown in FIG. 6, it specifically includes:
SSL encryption channel is established between car-mounted terminal and center management server;
Center management server issues Key according to the equipment unique identifier of car-mounted terminalpart
Car-mounted terminal generates random code and uses the Key newly issuedpartKey Management Center is sent to after encryption, in key management The heart, which is decrypted after receiving ciphertext and returns to car-mounted terminal and compare, confirms new KeypartIt is legal effective;
With new KeypartReplace current Keypart
In order to which the present invention is described in further detail, it is exemplified below more detailed embodiment and is illustrated.
The key code system of the car-mounted terminal of entirety is a Che Yimi, and car-mounted terminal key Key is made of 2 parts:
Key = Keybasic + Keypart
Keybasic is foundation, this part of the equipment of same production batch is identical, by whitepack cryptoguard;
Keypart is uniquely that the key of each equipment is different.
Key ways of distribution
Key in car-mounted terminalbasicInject whitepack firmware inside together programming into equipment.KeybasicIt is related with product batches, Same batch products KeybasicIt is identical.Due to KeybasicIt is comprised in the whitepack firmware of generation, therefore can ensure producing It is safe during link burning.
KeypartAir interface application can be passed through.Due to individual KeypartRoot key cannot be generated, even if therefore the part Leakage will not cause safety problem.
It is specific as shown in Figure 4;
1. by KMC(key manage center: Key Management Center) generation USBKEY is manufactured, identify the number of USB KEY identity Word Credential-Security is stored in the safety chip that an outside is unreadable in USB KEY.It is (confidential by the way of physical distribution Application etc. that part, information security assistant director carry, supplier visits) it is assigned to production line.Production line security official needs to insert USB KEY Enter computer, the encrypted tunnel based on SSL could be established between KMC.
2. the whitepack firmware that KMC is subjected to production line downloads request based on the authentication of USB KEY.Whitepack software meeting Generate the version number of the production line whitepack firmware, and by corresponding KeybasicIt is sent to the software, generating includes KeybasicIt is white Box firmware, while the version number notice KMC of whitepack firmware is managed by whitepack software.
3. production line can issue Key to KMC application according to the whitepack firmware version number heldpartKey, and in local The storage of the relationship of progress.KeybasicWith KeypartIt is one-to-many relationship, by corresponding Key inside KMCbasicKey encryption is deposited Storage.
4. corresponding whitepack firmware programming is entered terminal device according to production batch by production line.
5. production line is according to terminal device unique identifier by corresponding KeypartTerminal device is written.
6. removing USB KEY after the completion of production, local whitepack firmware copies and correlation Key are removedparT key.
3. terminal root key generates and data encrypting and deciphering, as shown in Figure 5, process is as follows:
1. inputting Key to whitepack firmwarepartAnd plain/cipher text.
2. inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted.
3. inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key.
4. using terminal root key carries out encryption and decryption operation inside whitepack.
5. exporting ciphertext/plaintext outside to whitepack.
4. long-range more new terminal root key, as shown in FIG. 6, process is as follows:
1. terminal and CMS(Content Management System: center management server) between establish SSL encryption channel.
2. CMS issues Key according to terminal device unique identifierpart
3. terminal generates random code and uses the Key newly issuedpartKMS is sent to after encryption, KMS is decrypted after receiving ciphertext And it returns to terminal side and compares and confirm new KeypartIt is legal effective.
4. with new KeypartReplace current Keypart
Certainly, described above is only that presently preferred embodiments of the present invention is answered the present invention is not limited to enumerate above-described embodiment When explanation, anyone skilled in the art is all equivalent substitutes for being made, bright under the introduction of this specification Aobvious variant, all falls within the essential scope of this specification, ought to be by protection of the invention.

Claims (8)

1. a kind of car-mounted terminal key distribution management method based on whitepack encryption technology, is characterized in that comprising following steps:
The step of car-mounted terminal key is distributed;
The step of generation of car-mounted terminal root key and data encrypting and deciphering.
2. car-mounted terminal key distribution management method according to claim 1, which is characterized in that above-mentioned car-mounted terminal key Are as follows: Key=Keybasic + Keypart, wherein KeybasicIt is foundation, this part of the equipment of same production batch is identical, By whitepack cryptoguard;KeypartIt is unique identification part, the corresponding unique Key of each equipmentpart
3. car-mounted terminal key distribution management method according to claim 2, which is characterized in that in car-mounted terminal KeybasicProgramming is into equipment together inside injection whitepack firmware, the Key of same batch equipmentbasicIt is identical, KeypartIt can pass through Air interface application obtains.
4. car-mounted terminal key distribution management method according to claim 2, which is characterized in that above-mentioned car-mounted terminal key The step of distribution, specifically includes:
A, it is manufactured by Key Management Center and generates USBKEY, the Digital Certificate Security of mark USB KEY identity is stored in USB KEY In the unreadable safety chip in an interior outside;
B, the authentication based on USB KEY, Key Management Center receive the whitepack firmware downloading request of production line;
C, production line issues Key to Key Management Center application according to the whitepack firmware version number heldpartKey, and at this Ground carries out relationship storage;
D, corresponding whitepack firmware programming is entered terminal device according to production batch by production line;
E, production line is according to the equipment unique identifier of car-mounted terminal by corresponding KeypartThe equipment that car-mounted terminal is written;
F, USB KEY is removed after the completion of production, removes local whitepack firmware copies and correlation KeypartKey.
5. car-mounted terminal key distribution management method according to claim 4, which is characterized in that step A is specifically also wrapped Include: the digital certificate of USB KEY identity is assigned to production line by the way of physical distribution;Production line security official needs USB KEY, which is inserted between computer, with Key Management Center, establishes the encrypted tunnel based on SSL.
6. car-mounted terminal key distribution management method according to claim 4, which is characterized in that corresponding in step B whitepack The version number of the Software Create production line whitepack firmware, and by corresponding KeybasicIt is sent to the corresponding software, generation includes KeybasicWhitepack firmware, while the version number of whitepack firmware notice Key Management Center is managed by whitepack software.
7. car-mounted terminal key distribution management method according to claim 1, which is characterized in that above-mentioned car-mounted terminal root is close Key generates and the step of data encrypting and deciphering includes:
Key is inputted to whitepack firmwarepartAnd plain/cipher text;
Inside whitepack, with KeybasicFor key pair KeypartOperation is decrypted;
Inside whitepack, KeybasicWith the Key after decryptionbasicCombinatorial operation obtains required terminal root key;
Using terminal root key carries out encryption and decryption operation inside whitepack;
Ciphertext/plaintext is exported outside to whitepack.
8. car-mounted terminal key distribution management method according to claim 1, which is characterized in that the car-mounted terminal key point Hair management method further includes the steps that remotely updating car-mounted terminal root key, comprising:
SSL encryption channel is established between car-mounted terminal and center management server;
Center management server issues Key according to the equipment unique identifier of car-mounted terminalpart
Car-mounted terminal generates random code and uses the Key newly issuedpartKey Management Center is sent to after encryption, in key management The heart, which is decrypted after receiving ciphertext and returns to car-mounted terminal and compare, confirms new KeypartIt is legal effective;
With new KeypartReplace current Keypart
CN201811580794.8A 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology Active CN109787756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811580794.8A CN109787756B (en) 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811580794.8A CN109787756B (en) 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology

Publications (2)

Publication Number Publication Date
CN109787756A true CN109787756A (en) 2019-05-21
CN109787756B CN109787756B (en) 2021-11-26

Family

ID=66498177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811580794.8A Active CN109787756B (en) 2018-12-24 2018-12-24 Vehicle-mounted terminal key distribution management method based on white-box encryption technology

Country Status (1)

Country Link
CN (1) CN109787756B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263526A (en) * 2019-06-13 2019-09-20 惠州市德赛西威汽车电子股份有限公司 A kind of producing line certificate injected system and its method
CN110417548A (en) * 2019-07-26 2019-11-05 交通运输部公路科学研究所 A kind of bus or train route contract network method for security protection based on digital certificates
CN111695166A (en) * 2020-06-11 2020-09-22 北京百度网讯科技有限公司 Disk encryption protection method and device
CN115988488A (en) * 2023-03-21 2023-04-18 北京全路通信信号研究设计院集团有限公司 Method and device for on-line centralized updating of vehicle-mounted key

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007120024A1 (en) * 2006-04-19 2007-10-25 Electronics And Telecommunications Research Institute The efficient generation method of authorization key for mobile communication
US20120137137A1 (en) * 2010-11-30 2012-05-31 Brickell Ernest F Method and apparatus for key provisioning of hardware devices
CN102752635A (en) * 2012-02-23 2012-10-24 中央电视台 Downloadable and replaceable condition receiving system
US9195858B2 (en) * 2009-08-04 2015-11-24 Seagate Technology Llc Encrypted data storage device
CN106230583A (en) * 2016-07-19 2016-12-14 成都安程通科技有限公司 Automobile ecu information monitoring system
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
US20180157804A1 (en) * 2011-09-22 2018-06-07 Sk2Tech, Llc Methods and apparatuses for digital content protection
CN108282467A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 The application process of digital certificate, system
CN108287999A (en) * 2017-01-10 2018-07-17 厦门雅迅网络股份有限公司 A kind of startup method that system based on TrustZone is credible
CN108304722A (en) * 2017-12-21 2018-07-20 广州小鹏汽车科技有限公司 A kind of software installation packet and its generation method, upgrade method and system
CN108629207A (en) * 2017-03-22 2018-10-09 温科尼克斯多夫国际有限公司 The system and method that information based on peripheral equipment generates encryption key
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007120024A1 (en) * 2006-04-19 2007-10-25 Electronics And Telecommunications Research Institute The efficient generation method of authorization key for mobile communication
US9195858B2 (en) * 2009-08-04 2015-11-24 Seagate Technology Llc Encrypted data storage device
US20120137137A1 (en) * 2010-11-30 2012-05-31 Brickell Ernest F Method and apparatus for key provisioning of hardware devices
US20180157804A1 (en) * 2011-09-22 2018-06-07 Sk2Tech, Llc Methods and apparatuses for digital content protection
CN102752635A (en) * 2012-02-23 2012-10-24 中央电视台 Downloadable and replaceable condition receiving system
CN106230583A (en) * 2016-07-19 2016-12-14 成都安程通科技有限公司 Automobile ecu information monitoring system
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
CN108287999A (en) * 2017-01-10 2018-07-17 厦门雅迅网络股份有限公司 A kind of startup method that system based on TrustZone is credible
CN108629207A (en) * 2017-03-22 2018-10-09 温科尼克斯多夫国际有限公司 The system and method that information based on peripheral equipment generates encryption key
CN108304722A (en) * 2017-12-21 2018-07-20 广州小鹏汽车科技有限公司 A kind of software installation packet and its generation method, upgrade method and system
CN108282467A (en) * 2017-12-29 2018-07-13 北京握奇智能科技有限公司 The application process of digital certificate, system
CN108989024A (en) * 2018-06-29 2018-12-11 百度在线网络技术(北京)有限公司 Control method, apparatus, equipment, storage medium and the corresponding vehicle communicated between electronic control unit in the car

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
曹启: ""车联网密钥管理***设计与实现"", 《中国优秀博硕士学位论文全文数据库(硕士)工程科技Ⅱ辑》 *
许涛 等: ""基于白盒密码的DCAS终端安全芯片方案"", 《计算机研究与发展》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263526A (en) * 2019-06-13 2019-09-20 惠州市德赛西威汽车电子股份有限公司 A kind of producing line certificate injected system and its method
CN110263526B (en) * 2019-06-13 2023-08-18 惠州市德赛西威汽车电子股份有限公司 Production line certificate injection system and method thereof
CN110417548A (en) * 2019-07-26 2019-11-05 交通运输部公路科学研究所 A kind of bus or train route contract network method for security protection based on digital certificates
CN111695166A (en) * 2020-06-11 2020-09-22 北京百度网讯科技有限公司 Disk encryption protection method and device
CN111695166B (en) * 2020-06-11 2023-06-06 阿波罗智联(北京)科技有限公司 Disk encryption protection method and device
CN115988488A (en) * 2023-03-21 2023-04-18 北京全路通信信号研究设计院集团有限公司 Method and device for on-line centralized updating of vehicle-mounted key
CN115988488B (en) * 2023-03-21 2023-06-30 北京全路通信信号研究设计院集团有限公司 Method and device for on-line centralized updating of vehicle-mounted secret key

Also Published As

Publication number Publication date
CN109787756B (en) 2021-11-26

Similar Documents

Publication Publication Date Title
CN109787756A (en) A kind of car-mounted terminal key distribution management method based on whitepack encryption technology
CN102246455B (en) Self-authentication communication equipment and equipment authentication system
US8660266B2 (en) Method of delivering direct proof private keys to devices using an on-line service
CN101350718B (en) Method for protecting play content authority range base on user identification module
CN111464301B (en) Key management method and system
CN103067333B (en) The method of proof machine top box access identity and certificate server
CN110463237A (en) Method for the communication between management server and user equipment
CN106464485A (en) System and method for securing content keys delivered in manifest files
US20070083757A1 (en) Authentication system
CN112347453A (en) Data safety writing method and system of automobile electronic identification embedded NFC chip
CN109361669A (en) Identity identifying method, device and the equipment of communication equipment
CN102006171B (en) Method for updating internal clock of dynamic password token, token, authentication equipment and system
CN104868998B (en) A kind of system, apparatus and method that encryption data is supplied to electronic equipment
CN108650261B (en) Mobile terminal system software burning method based on remote encryption interaction
CN106571915A (en) Terminal master key setting method and apparatus
CN111385085B (en) Quantum three-level key system implementation method and system
CN104780445A (en) Method and system for preventing set top box software from malicious upgrade
CN112598827A (en) Intelligent lock authentication method, security chip, intelligent lock and management system thereof
CN115665138A (en) Automobile OTA (over the air) upgrading system and method
CN114267100A (en) Unlocking authentication method and device, security chip and electronic key management system
CN106599697A (en) Method and system for safe upgrade of programs in PCI password card
CN105915345A (en) Realization method for authorized production and reform in home gateway device production testing
CN113115255A (en) Certificate issuing method, secret key authentication method, vehicle unlocking method, equipment and storage medium
CA2553081A1 (en) A method for binding a security element to a mobile device
CN111489462B (en) Personal Bluetooth key system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant