CN113099417B - Differential data broadcasting method and device, electronic equipment and computer storage medium - Google Patents

Differential data broadcasting method and device, electronic equipment and computer storage medium Download PDF

Info

Publication number
CN113099417B
CN113099417B CN202110310474.6A CN202110310474A CN113099417B CN 113099417 B CN113099417 B CN 113099417B CN 202110310474 A CN202110310474 A CN 202110310474A CN 113099417 B CN113099417 B CN 113099417B
Authority
CN
China
Prior art keywords
differential data
encrypted
secret key
target obu
obu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110310474.6A
Other languages
Chinese (zh)
Other versions
CN113099417A (en
Inventor
钭朝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianxun Si Network Zhejiang Co ltd
Original Assignee
Qianxun Si Network Zhejiang Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qianxun Si Network Zhejiang Co ltd filed Critical Qianxun Si Network Zhejiang Co ltd
Priority to CN202110310474.6A priority Critical patent/CN113099417B/en
Publication of CN113099417A publication Critical patent/CN113099417A/en
Application granted granted Critical
Publication of CN113099417B publication Critical patent/CN113099417B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W56/00Synchronisation arrangements
    • H04W56/001Synchronization between nodes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application provides a differential data broadcasting method, a differential data broadcasting device, electronic equipment and a computer storage medium. The differential data broadcasting method is applied to the RSU and comprises the following steps: receiving differential data sent by a server; encrypting the differential data by using a preset secret key to obtain encrypted differential data; encrypting the secret key to obtain an encrypted secret key; after the identity of the target OBU is identified, the encrypted differential data and the encrypted secret key are sent to the target OBU, so that the target OBU sequentially decrypts the encrypted secret key and the encrypted differential data to obtain the differential data. According to the embodiment of the application, the safety of the broadcasting of the differential data can be improved.

Description

Differential data broadcasting method and device, electronic equipment and computer storage medium
Technical Field
The application belongs to the technical field of communication, and particularly relates to a differential data broadcasting method, a differential data broadcasting device, electronic equipment and a computer storage medium.
Background
The vehicle-road cooperation/vehicle networking (vehicle to everything, V2X) communication detects traffic conditions around the vehicle mainly through chip technology such as sensors and communication modules mounted on the vehicle, obtains a series of important information such as system load states, and meanwhile, utilizes a global positioning system (global positioning system, GPS) to obtain the position of the vehicle in real time and guide the vehicle to always run on an optimal route. V2X communications can be divided into 3 modes of vehicle-to-vehicle (vehicle to vehicle, V2V) communications, vehicle-to-infrastructure (vehicle to infrastructure, V2I) communications, and vehicle-to-pedestrian (vehicle to pedestrian, V2P) communications.
A Road Side Unit (RSU) is used for V2I communication, with unique advantages. At present, the process of broadcasting differential data by the RSU is as follows: based On a built-in GPS positioning module, sending a positioning result to a server to obtain differential data, carrying out format coding by a V2X message coding mode, broadcasting in a PC5 channel by the V2X module, and directly decompressing and using the received data by an On Board Unit (OBU). The differential data may be RTCM data, which is differential information data based on standards established by the international maritime service radio technical commission (Radio Technical Commission for Maritime services). As the broadcasted differential data is public and is easy to be attacked by third party interference, the differential data source is not credible, and the security is poor.
Therefore, how to improve the security of the broadcast of the differential data is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The embodiment of the application provides a differential data broadcasting method, a differential data broadcasting device, electronic equipment and a computer storage medium, which can improve the safety of differential data broadcasting.
In a first aspect, an embodiment of the present application provides a differential data broadcasting method, applied to an RSU, including:
receiving differential data sent by a server;
encrypting the differential data by using a preset secret key to obtain encrypted differential data;
encrypting the secret key to obtain an encrypted secret key;
after the identity of the target OBU is identified, the encrypted differential data and the encrypted secret key are sent to the target OBU, so that the target OBU sequentially decrypts the encrypted secret key and the encrypted differential data to obtain the differential data.
Optionally, after identifying the identity of the target OBU, sending the encrypted differential data and the encrypted key to the target OBU, so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data to obtain the differential data, including:
after the identity of the target OBU is identified, generating a random number corresponding to the target OBU;
packaging the encrypted differential data, the encrypted secret key and the random number to generate a binary data message;
and sending a binary data message to the target OBU so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data based on the key negotiation algorithm to obtain the differential data.
Optionally, sending a binary data packet to the target OBU includes:
and sending the binary data message to the target OBU through the PC5 link.
Optionally, before receiving the differential data sent by the server, the method further includes:
acquiring a positioning result of the RSU;
and sending the positioning result to the server.
Optionally, receiving the differential data sent by the server includes:
and receiving differential data corresponding to the positioning result and transmitted by the server.
Optionally, before obtaining the positioning result of the RSU, the method further includes:
network time protocol (Network Time Protocol, NTP) and precision clock protocol (Precision Time Protocol, PTP) time synchronization operations are performed.
Optionally, before identifying the identity of the target OBU, the method further comprises:
acquiring the identity information of the target OBU;
and sending the identification information to a server to identify the identity of the target OBU.
In a second aspect, an embodiment of the present application provides a differential data broadcasting device, which is applied to an RSU, including:
the receiving module is used for receiving the differential data sent by the server;
the encryption module is used for encrypting the differential data by using a preset secret key to obtain encrypted differential data; encrypting the secret key to obtain an encrypted secret key;
and the sending module is used for sending the encrypted differential data and the encrypted secret key to the target OBU after the identity of the target OBU is identified, so that the target OBU can decrypt the encrypted secret key and the encrypted differential data in sequence to obtain the differential data.
Optionally, the sending module is configured to: after the identity of the target OBU is identified, generating a random number corresponding to the target OBU; packaging the encrypted differential data, the encrypted secret key and the random number to generate a binary data message; and sending a binary data message to the target OBU so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data based on the key negotiation algorithm to obtain the differential data.
Optionally, the sending module is configured to: and sending the binary data message to the target OBU through the PC5 link.
Optionally, the sending module is further configured to: acquiring a positioning result of the RSU; and sending the positioning result to the server.
Optionally, the receiving module is configured to: and receiving differential data corresponding to the positioning result and transmitted by the server.
Optionally, the apparatus further comprises:
and the time synchronization module is used for executing NTP and PTP time synchronization operation.
Optionally, the sending module is further configured to: acquiring the identity information of the target OBU; and sending the identification information to a server to identify the identity of the target OBU.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the differential data dissemination method as shown in the first aspect.
In a fourth aspect, embodiments of the present application provide a computer storage medium having stored thereon computer program instructions that, when executed by a processor, implement a differential data broadcasting method as shown in the first aspect.
According to the differential data broadcasting method, device, electronic equipment and computer storage medium, the safety of differential data broadcasting can be improved. The differential data broadcasting method is applied to the RSU and comprises the following steps: receiving differential data sent by a server; encrypting the differential data by using a preset secret key to obtain encrypted differential data; encrypting the secret key to obtain an encrypted secret key; after the identity of the target OBU is identified, the encrypted differential data and the encrypted secret key are sent to the target OBU, so that the target OBU sequentially decrypts the encrypted secret key and the encrypted differential data to obtain the differential data. Therefore, the method encrypts the differential data and the secret key, so that the safety of broadcasting the differential data can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described, and it is possible for a person skilled in the art to obtain other drawings according to these drawings without inventive effort.
Fig. 1 is a flow chart of a differential data broadcasting method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a differential data distribution system according to one embodiment of the present application;
fig. 3 is a flow chart of a method for broadcasting differential data according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of data broadcast by an RSU at a PC5 according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a differential data broadcasting device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application are described in detail below to make the objects, technical solutions and advantages of the present application more apparent, and to further describe the present application in conjunction with the accompanying drawings and the detailed embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative of the application and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by showing examples of the present application.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
As known from the background art, at present, in the process of broadcasting differential data by an RSU, the broadcasted differential data is public and is easy to be attacked by third party interference, so that the differential data source is unreliable, and the security is poor.
In order to solve the problems in the prior art, embodiments of the present application provide a method, an apparatus, an electronic device, and a computer storage medium for broadcasting differential data. The following first describes a differential data broadcasting method provided in the embodiments of the present application.
Fig. 1 shows a flow chart of a differential data broadcasting method according to an embodiment of the present application. As shown in fig. 1, the differential data broadcasting method is applied to an RSU, and includes:
s101, receiving differential data sent by a server.
In one embodiment, before receiving the differential data sent by the server, the method further comprises: acquiring a positioning result of the RSU; and sending the positioning result to the server.
In one embodiment, receiving differential data transmitted by a server includes:
and receiving differential data corresponding to the positioning result and transmitted by the server.
In one embodiment, before obtaining the positioning result of the RSU, the method further comprises: NTP and PTP time synchronization operations are performed.
S102, encrypting the differential data by using a preset secret key to obtain encrypted differential data.
S103, encrypting the secret key to obtain the encrypted secret key.
S104, after the identity of the target OBU is identified, the encrypted differential data and the encrypted secret key are sent to the target OBU, so that the target OBU can decrypt the encrypted secret key and the encrypted differential data in sequence to obtain the differential data.
In one embodiment, after identifying the identity of the target OBU, sending the encrypted differential data and the encrypted key to the target OBU, so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data to obtain the differential data, including:
after the identity of the target OBU is identified, generating a random number corresponding to the target OBU;
packaging the encrypted differential data, the encrypted secret key and the random number to generate a binary data message;
and sending a binary data message to the target OBU so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data based on the key negotiation algorithm to obtain the differential data.
In one embodiment, sending a binary data message to a target OBU includes:
and sending the binary data message to the target OBU through the PC5 link.
In one embodiment, prior to identifying the identity of the target OBU, the method further comprises:
acquiring the identity information of the target OBU;
and sending the identification information to a server to identify the identity of the target OBU.
As described above, the differential data distribution method encrypts both the differential data and the key, and thus can improve the security of the differential data distribution.
The above technical solution is described below with a specific embodiment.
In one embodiment, the differential data broadcasting system is shown in fig. 2, and based on the differential data broadcasting system, the flow of the differential data broadcasting method is shown in fig. 3: safely deploying RSU equipment; the RSU is interconnected with the server; waiting for OBU interaction, identifying the OBU, and generating a key through an algorithm; providing an encrypted RTCM distribution service. The structure of the data broadcast by the RSU in the PC5 is shown in fig. 4, and includes an encrypted data area S1, an encrypted data area S2, and a random number; in the encrypted data area S1 is RTCM data, and in the encrypted data area S2 is a key K1 for decrypting the S1 area data, that is, an encrypted key.
The differential data broadcasting method comprises the following specific steps:
(1) The RSU is installed on a road side rod piece (L rod or F rod) of about 6 meters; and powering on the RSU to start, and automatically starting the built-in NTP and PTP time synchronization service software system.
(2) And finishing the installation and power-on starting of other equipment.
(3) And accessing the RSU and all devices to be time-given into the high-speed Ethernet switch to ensure normal network connection.
(4) The RSU interacts with the cloud to acquire RTCM data, and generates the RTCM data in the encrypted data area S1 and a key K1 for solving the S1 area data in the encrypted data area S2 through encryption of a dynamic key negotiation algorithm, and the OBU starts to report the device ID.
Specifically, the RSU establishes secure communication with the platform through the built-in SDK, establishes a secure communication channel, and acquires RTCM data from the server. When RTCM data are interacted, a local positioning result GGA is returned to the cloud for the platform to judge the positioning position of the equipment, so that RTCM data in a specific area are broadcasted; the RSU encrypts RTCM data through an encryption channel, encrypts a key of the encrypted RTCM to generate two key spaces, prepares a V2X message format, packages the RTCM encrypted data, a key for decrypting the RTCM data and a random number necessary for interaction with the OBU, and generates a binary data message.
(5) The RSU broadcasts binary data messages to the OBU via the PC5 link.
(6) Based on the key negotiation algorithm, the OBU may acquire a key K1 for decrypting the S1 area data in the encrypted data area S2, and then decrypt the encrypted data area S1 by using the key K1.
(7) After obtaining the decrypted RTCM data, the OBU may use the data in a local positioning module for Real-time kinematic (RTK) positioning.
Fig. 5 is a schematic structural diagram of a differential data broadcasting device according to an embodiment of the present application, and as shown in fig. 5, the differential data broadcasting device is applied to an RSU, and includes:
a receiving module 501, configured to receive differential data sent by a server;
the encryption module 502 is configured to encrypt the differential data with a preset key to obtain encrypted differential data; encrypting the secret key to obtain an encrypted secret key;
and the sending module 503 is configured to send the encrypted differential data and the encrypted key to the target OBU after identifying the identity of the target OBU, so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data to obtain the differential data.
In one embodiment, the sending module 503 is configured to: after the identity of the target OBU is identified, generating a random number corresponding to the target OBU; packaging the encrypted differential data, the encrypted secret key and the random number to generate a binary data message; and sending a binary data message to the target OBU so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data based on the key negotiation algorithm to obtain the differential data.
In one embodiment, the sending module 503 is configured to: and sending the binary data message to the target OBU through the PC5 link.
In one embodiment, the sending module 503 is further configured to: acquiring a positioning result of the RSU; and sending the positioning result to the server.
In one embodiment, the receiving module 501 is configured to: and receiving differential data corresponding to the positioning result and transmitted by the server.
In one embodiment, the apparatus further comprises:
and the time synchronization module is used for executing NTP and PTP time synchronization operation.
In one embodiment, the sending module 503 is further configured to: acquiring the identity information of the target OBU; and sending the identification information to a server to identify the identity of the target OBU.
The modules/units in the apparatus shown in fig. 5 have functions of implementing the steps in fig. 1, and achieve corresponding technical effects, which are not described herein for brevity.
Fig. 6 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
The electronic device may include a processor 601 and a memory 602 storing computer program instructions.
In particular, the processor 601 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more integrated circuits of embodiments of the present application.
Memory 602 may include mass storage for data or instructions. By way of example, and not limitation, memory 602 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the above. The memory 602 may include removable or non-removable (or fixed) media, where appropriate. The memory 602 may be internal or external to the electronic device, where appropriate. In particular embodiments, memory 602 may be a non-volatile solid state memory.
In one example, memory 602 may be Read Only Memory (ROM). In one example, the ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory, or a combination of two or more of these.
The processor 601 reads and executes the computer program instructions stored in the memory 602 to implement any one of the differential data broadcasting methods of the above embodiments.
In one example, the electronic device may also include a communication interface 603 and a bus 610. As shown in fig. 6, the processor 601, the memory 602, and the communication interface 603 are connected to each other through a bus 610 and perform communication with each other.
The communication interface 603 is mainly configured to implement communication between each module, apparatus, unit and/or device in the embodiments of the present application.
Bus 610 includes hardware, software, or both, that couple components of the electronic device to one another. By way of example, and not limitation, the buses may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a micro channel architecture (MCa) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus, or a combination of two or more of the above. Bus 610 may include one or more buses, where appropriate. Although embodiments of the present application describe and illustrate a particular bus, the present application contemplates any suitable bus or interconnect.
In addition, embodiments of the present application may be implemented by providing a computer storage medium. The computer storage medium has stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the differential data dissemination methods of the embodiments described above.
It should be clear that the present application is not limited to the particular arrangements and processes described above and illustrated in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions, or change the order between steps, after appreciating the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented in hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine readable medium or transmitted over transmission media or communication links by a data signal carried in a carrier wave. A "machine-readable medium" may include any medium that can store or transfer information. Examples of machine-readable media include electronic circuitry, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and the like. The code segments may be downloaded via computer networks such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be different from the order in the embodiments, or several steps may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to being, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware which performs the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In the foregoing, only the specific embodiments of the present application are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, which are intended to be included in the scope of the present application.

Claims (9)

1. The differential data broadcasting method is characterized by being applied to a road side unit RSU and comprising the following steps:
receiving differential data sent by a server;
encrypting the differential data by using a preset secret key to obtain encrypted differential data;
encrypting the secret key to obtain an encrypted secret key;
after the identity of a target on-board unit (OBU) is identified, sending the encrypted differential data and the encrypted secret key to the target OBU, so that the target OBU sequentially decrypts the encrypted secret key and the encrypted differential data to obtain the differential data;
after the identity of the target OBU is identified, sending the encrypted differential data and the encrypted key to the target OBU, so that the target OBU sequentially decrypts the encrypted key and the encrypted differential data to obtain the differential data, including:
after the identity of the target OBU is identified, generating a random number corresponding to the target OBU;
packaging the encrypted differential data, the encrypted secret key and the random number to generate a binary data message;
and sending the binary data message to the target OBU, so that the target OBU sequentially decrypts the encrypted secret key and the encrypted differential data based on a secret key negotiation algorithm to acquire the differential data.
2. The differential data broadcasting method according to claim 1, wherein said sending the binary data message to the target OBU comprises:
and sending the binary data message to the target OBU through a PC5 link.
3. The differential data dissemination method of claim 1 wherein prior to receiving the differential data transmitted by the server, the method further comprises:
acquiring a positioning result of the RSU;
and sending the positioning result to the server.
4. The differential data broadcasting method as set forth in claim 3, wherein said receiving differential data transmitted from the server comprises:
and receiving differential data corresponding to the positioning result, which is sent by the server.
5. The differential data dissemination method of claim 3 wherein prior to the obtaining the positioning results of the RSU, the method further comprises:
the network time protocol NTP and precision clock protocol PTP time synchronization operations are performed.
6. The differential data dissemination method of claim 1 wherein the method further comprises, prior to identifying the identity of the target OBU:
acquiring the identity information of the target OBU;
and sending the identity identification information to the server to identify the identity of the target OBU.
7. A differential data dissemination device, for use in an RSU, comprising:
the receiving module is used for receiving the differential data sent by the server;
the encryption module is used for encrypting the differential data by using a preset secret key to obtain encrypted differential data; encrypting the secret key to obtain an encrypted secret key;
the sending module is used for sending the encrypted differential data and the encrypted secret key to the target OBU after the identity of the target OBU is identified, so that the target OBU can decrypt the encrypted secret key and the encrypted differential data in sequence to obtain the differential data;
the sending module is specifically configured to:
after the identity of the target OBU is identified, generating a random number corresponding to the target OBU;
packaging the encrypted differential data, the encrypted secret key and the random number to generate a binary data message;
and sending the binary data message to the target OBU, so that the target OBU sequentially decrypts the encrypted secret key and the encrypted differential data based on a secret key negotiation algorithm to acquire the differential data.
8. An electronic device, the electronic device comprising: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements a differential data dissemination method as claimed in any of claims 1 to 6.
9. A computer storage medium having stored thereon computer program instructions which, when executed by a processor, implement the differential data dissemination method of any of claims 1 to 6.
CN202110310474.6A 2021-03-23 2021-03-23 Differential data broadcasting method and device, electronic equipment and computer storage medium Active CN113099417B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110310474.6A CN113099417B (en) 2021-03-23 2021-03-23 Differential data broadcasting method and device, electronic equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110310474.6A CN113099417B (en) 2021-03-23 2021-03-23 Differential data broadcasting method and device, electronic equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN113099417A CN113099417A (en) 2021-07-09
CN113099417B true CN113099417B (en) 2023-06-30

Family

ID=76669145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110310474.6A Active CN113099417B (en) 2021-03-23 2021-03-23 Differential data broadcasting method and device, electronic equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN113099417B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113777634B (en) * 2021-11-12 2022-02-11 深圳华文寰宇信息科技发展有限公司 Satellite differential positioning information security method and related equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040063A (en) * 2018-08-01 2018-12-18 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of vehicle ECU key
WO2020253234A1 (en) * 2019-06-18 2020-12-24 创新先进技术有限公司 Data homomorphic encryption and decryption method and apparatus for implementing privacy protection
CN112131316A (en) * 2020-11-20 2020-12-25 腾讯科技(深圳)有限公司 Data processing method and device applied to block chain system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100484209B1 (en) * 1998-09-24 2005-09-30 삼성전자주식회사 Digital Content Encryption / Decryption Device and Method
GB2428948B (en) * 2005-07-27 2007-09-05 Ingenia Technology Ltd Keys
CN107306261B (en) * 2016-04-22 2021-09-07 中兴通讯股份有限公司 Encryption communication method, device and system
US20180205729A1 (en) * 2017-01-13 2018-07-19 GM Global Technology Operations LLC Method and apparatus for encryption, decryption and authentication
CN107864006A (en) * 2017-11-01 2018-03-30 千寻位置网络有限公司 Broadcast differential data authentication and the system and method for encryption
CN108347437A (en) * 2018-02-05 2018-07-31 长沙智能驾驶研究院有限公司 Differential calibration data transmission method, roadside unit, board units and storage medium
CN110278042A (en) * 2019-06-25 2019-09-24 江西省高速公路联网管理中心 Anti- monkey chatter method and apparatus based on satellite difference positioning
CN111913200B (en) * 2020-06-28 2023-07-14 深圳市金溢科技股份有限公司 Vehicle group differential positioning method, RSU equipment, fusion sensing equipment and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040063A (en) * 2018-08-01 2018-12-18 百度在线网络技术(北京)有限公司 Determination method, apparatus, equipment and the storage medium of vehicle ECU key
WO2020253234A1 (en) * 2019-06-18 2020-12-24 创新先进技术有限公司 Data homomorphic encryption and decryption method and apparatus for implementing privacy protection
CN112131316A (en) * 2020-11-20 2020-12-25 腾讯科技(深圳)有限公司 Data processing method and device applied to block chain system

Also Published As

Publication number Publication date
CN113099417A (en) 2021-07-09

Similar Documents

Publication Publication Date Title
KR102182082B1 (en) V2X communication device and data communication method thereof
US9601016B2 (en) Communication system, vehicle-mounted terminal, roadside device
EP3487197A1 (en) Method and apparatus for secure communication between vehicle-to-everything terminals
CN101277185B (en) Authentication method, system based on wireless identification as well as wireless identification, server
CN112640502B (en) Communication method, device and system
US7742603B2 (en) Security for anonymous vehicular broadcast messages
JP5367917B2 (en) OBE
US10454706B2 (en) Transponder module and access module for activating and configuring such transponder module over a CAN bus
JP2012227672A (en) Inter-vehicle/road-to-vehicle communication system
EP2980759A1 (en) Transponder module and access module for activating and configuring such transponder module
CN110149611A (en) A kind of auth method, equipment and system
US20130288641A1 (en) Wireless communication system providing the verification of the network identify
CN113099417B (en) Differential data broadcasting method and device, electronic equipment and computer storage medium
CN115567197A (en) Digital certificate application method, device, equipment and computer storage medium
CN112383897A (en) Information transmission method, device, medium and electronic equipment based on intelligent network connection
CN114786136B (en) Authentication method and device for road side unit, electronic equipment and storage medium
CN111225358B (en) Identity recognition method and device, electronic equipment and storage medium
JP2011234340A (en) Radio communication apparatus and data communication device
CN115499837A (en) Communication method, device, equipment and storage medium based on secure transport layer protocol
CN111428279B (en) Explicit certificate generation method, device, equipment and storage medium
CN110881176B (en) Method for improving utilization rate of vehicle-to-X communication device and vehicle-to-X communication device
CN103260153B (en) Satellite communication service system
CN110851270A (en) Resource transfer method, device, equipment and medium
CN103257351A (en) Processing method of satellite radio navigation system telegraph text information
CN112291060B (en) Secure communication method, transmitting end and receiving end

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant