CN114244514B - Data security processing method based on Internet of vehicles - Google Patents

Data security processing method based on Internet of vehicles Download PDF

Info

Publication number
CN114244514B
CN114244514B CN202210154836.1A CN202210154836A CN114244514B CN 114244514 B CN114244514 B CN 114244514B CN 202210154836 A CN202210154836 A CN 202210154836A CN 114244514 B CN114244514 B CN 114244514B
Authority
CN
China
Prior art keywords
data
negotiation
user
automobile
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210154836.1A
Other languages
Chinese (zh)
Other versions
CN114244514A (en
Inventor
龙利民
***
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tuling Artificial Intelligence Institute Nanjing Co ltd
Original Assignee
Tuling Artificial Intelligence Institute Nanjing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tuling Artificial Intelligence Institute Nanjing Co ltd filed Critical Tuling Artificial Intelligence Institute Nanjing Co ltd
Priority to CN202210154836.1A priority Critical patent/CN114244514B/en
Publication of CN114244514A publication Critical patent/CN114244514A/en
Application granted granted Critical
Publication of CN114244514B publication Critical patent/CN114244514B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data security processing method based on the Internet of vehicles, which comprises the steps of generating a main key for authorization decryption from a user side to an automobile side according to an acquired user side request for a credit and credit granting center; after a private key, a public key and a negotiation public key of a target file during encryption are obtained through the calculation of a master key granted by a user side, corresponding calculation information is respectively returned to the user side and an automobile side; and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key to complete data decryption at the automobile side. Based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain, so that the data content is ensured to be public, transparent and traceable, and the specific execution of the user for using data authorization can be inquired.

Description

Data security processing method based on Internet of vehicles
Technical Field
The invention relates to the technical field of vehicle-mounted information equipment, in particular to a data security processing method based on the Internet of vehicles.
Background
With the rapid development of new energy automobiles, unmanned vehicles, 5G and Internet of things, automobiles are more and more intelligent, and sensor equipment on the automobiles is more and more provided with cameras, positioning devices, network communication devices, millimeter wave sensors, laser radars and the like. Along with the intellectualization, the automobile generates huge amount of user information every day, including where the automobile often goes, who has a conversation with the automobile, a driving route and songs of love to listen, which are all mastered as a finger, and the privacy information of the daily behaviors of the user is recorded.
The data is used, so that the risk of stealing the data by people exists, the data can be used in a trusted environment, the purpose and the amount of the data can be limited, the safe use of the data at an algorithm level is realized, the purpose that the data can be used and cannot be seen is realized, and the purpose and the amount of the data are specified, so that the method becomes a research hotspot.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a data security processing method based on the Internet of vehicles, which realizes the purpose and the usage of associated data in a secure and credible environment by utilizing the uniqueness of block chain distributed storage, controlling the usage of the data by an authorization mechanism based on rules while ensuring the consistency of the storage by a consensus mechanism, and controlling the usage of the data by an access amount; the purposes that the data can be used but can not be seen and the purpose and the dosage of the data are specified are achieved; meanwhile, the method has the advantages of meeting the requirements of universality, performance and safety, and solves the problems in the background technology.
In order to achieve the purpose, the invention is realized by the following technical scheme: a data security processing method based on Internet of vehicles comprises the following steps:
generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the user side request comprises user side private key information and negotiation public key information;
after a private key, a public key and a negotiation public key of a target file during encryption are obtained through the calculation of the master key granted by the user side, corresponding calculation information is respectively returned to the user side and the automobile side;
and acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system, and using the negotiation key at the automobile side to complete data decryption.
As an improvement of the data security processing method based on the internet of vehicles in the present invention, the processing method of the vehicle-mounted interconnection system on the ciphertext data includes:
configuring and starting a processing process containing a TEE application program environment at the automobile end;
based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein,
if the corresponding program instruction does not exist in the vehicle-mounted interconnection system, pulling a corresponding execution program from a data storage area block chain of the vehicle end; and meanwhile, judging whether other system data except the program is needed in the corresponding execution program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the execution program, otherwise, obtaining an authorization application from the user side.
As an improvement of the data security processing method based on the internet of vehicles in the present invention, when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side;
secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request;
thirdly, judging the authorization result of the user, wherein if the user is not authorized, directly returning the result to the automobile end; otherwise, calculating the usage and usage authorization information corresponding to the zero-knowledge-based certificate, and synchronously starting a service process waiting for negotiation;
and finally, returning the authorized usage and usage authorization information obtained through authorization and calculation to the automobile end, and judging the validity of the authorization information.
As an improvement of the data security processing method based on the internet of vehicles, when the validity of the authorization information is judged by the vehicle end and the authorization information returned to the vehicle end does not exist, marking the data as a data decryption failure and ending the instruction;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end negotiates with the user end based on the synchronously started service process waiting for negotiation,
if the negotiation fails, quitting the negotiation service process, marking the negotiation service process as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
Compared with the prior art, the invention has the beneficial effects that:
1. based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain to ensure the data content to be public, transparent and traceable, so that the specific execution of the user for using data authorization can be inquired;
2. configuring a processing process containing a TEE application program environment at an automobile end to ensure that data is encrypted outside the Tee environment and the data is safe when a secret key cannot be acquired outside the Tee environment;
3. after the negotiation key encryption of the SM9, the negotiation is successful, the automobile end receives the trusted data encryption content to the user end, and the negotiation key is used for data decryption, and in the process of completing the data processing process, the transmission process of the key from the user end to the automobile end is safe;
4. storing the execution file on the chain based on the block chain, wherein the MD5 of the execution file is used as one party of the key negotiation in the SM9, the other party is used as the user party, the purpose of the data is associated with the authorization in the algorithm level, and meanwhile, in order to reach one intelligent automobile to match one user.
Drawings
The disclosure of the present invention is illustrated with reference to the accompanying drawings. It is to be understood that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which like reference numerals are used to indicate like parts. Wherein:
fig. 1 is a flowchart illustrating information transmission between a vehicle end and a user end in a car networking based data security process according to an embodiment of the present invention;
fig. 2 is a flowchart of a time sequence of processing ciphertext data obtained by calculating a master key granted by a user side in a vehicle-mounted interconnection system according to an embodiment of the present invention.
Detailed Description
It is easily understood that according to the technical solution of the present invention, a person skilled in the art can propose various alternative structures and implementation ways without changing the spirit of the present invention. Therefore, the following detailed description and the accompanying drawings are merely illustrative of the technical aspects of the present invention, and should not be construed as all of the present invention or as limitations or limitations on the technical aspects of the present invention.
As for understanding the technical conception and the implementation principle of the invention, in the prior art, the basic idea of trusted computing is to construct a root of trust in a computer system at first, and the credibility of the root of trust is ensured by physical security, technical security and management security; and establishing a trust chain from a trust root to a software and hardware platform, to an operating system, to an application, a first-level measurement authentication level, a first-level trust level and expanding the trust to the whole computer system so as to ensure the trust of the whole computer system, wherein the SM9 provided by the invention specifies an identification-based key exchange protocol realized by an elliptic curve pair for adopting a general identification cryptographic standard (GM/T0044 and 2016 SM9 identification cryptographic algorithm). The initiator user A and the responder user B participating in the key exchange respectively hold an identifier and a corresponding encryption private key, and the encryption private keys are generated by combining an encryption main private key and the identifier of the user through a key generation center. The users A and B use the identification and the respective encryption private keys to agree a secret key only known to them through interactive information transfer, and both users can realize key confirmation through an option. This shared secret key is typically used in some symmetric cryptographic algorithm. The key exchange protocol can be used for key management and negotiation. And will not be described in detail herein.
In view of the above, as shown in fig. 1, the present invention provides a data security processing method based on internet of vehicles, including the following steps:
firstly, generating a master key for authorizing decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the specific implementation mode is as follows:
firstly, a user is granted to request a certificate storing center to acquire private key information and negotiation public key information, and the user keeps a long connection relationship with the certificate storing center and waits for the certificate storing center to return request information; secondly, the certificate storing center sends a request for confirming the association to the (intelligent) automobile end, and finally, after the (intelligent) automobile end confirms the association, the certificate storing center maintains a long connection relation;
secondly, after obtaining a private key, a public key and a negotiation public key when the target file executes encryption through the calculation of a master key which is trusted by the user side, the certificate storage center respectively returns corresponding calculation information to the user side and the automobile side, wherein the corresponding calculation information returned to the user side comprises the private key when the target file executes encryption, the negotiation public key and ID information corresponding to the automobile side, and the corresponding calculation information returned to the automobile side comprises the public key when the target file executes encryption, the negotiation public key and ID information corresponding to the user side;
and thirdly, acquiring the credit granting content from the user side to the ciphertext data contained in the calculation information in a time sequence step mode based on the vehicle-mounted interconnection system (vehicle side), and using the negotiation key to finish data decryption at the vehicle side, wherein the negotiation key is encrypted through SM9 to ensure that the negotiation is successful, the vehicle side receives the data encryption content granted with the credit from the user side and uses the negotiation key to decrypt the data, and the transmission process of the key from the user side to the vehicle side is safe in the process of finishing the data processing process.
As shown in fig. 2, based on the above technical concept, it should be noted that the cryptograph data processing method of the vehicle-mounted interconnection system includes:
firstly, configuring and starting a processing process containing a TEE application program environment at an automobile end, and aiming at ensuring that an execution code for the purpose of ciphertext data is stored on a block chain, ensuring that the content carried by the ciphertext data is public, transparent and traceable, and simultaneously meeting the requirement that a user can inquire the specific execution authorized by the used data, and on the other hand, ensuring that the ciphertext data is encrypted outside the TEE application program environment, and simultaneously ensuring that the data is safe when the key cannot be acquired outside the TEE application program environment;
secondly, based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, wherein at this time, it can be understood that if no corresponding program instruction exists in the vehicle-mounted interconnection system, the corresponding execution program needs to be pulled from a data storage block chain of the vehicle end (at this time, the corresponding execution program stores an executed target file on the chain through the block chain, and the MD5 of the executed file is used as one party of negotiating a key in the SM9, and the other party is a user party, so that the purpose of the data is related to the authorization in the algorithm level); and meanwhile, judging whether other system data except the program is needed in the corresponding executive program of the vehicle-mounted interconnection system, if not, ending the module corresponding to the executive program, otherwise, continuously obtaining an authorization application from the user side: and, instead,
when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side; secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request; thirdly, judging an authorization result of the user side, wherein if the user side is not authorized, the result is directly returned to the automobile side; on the contrary, the usage and usage authorization information corresponding to the zero-knowledge proof is calculated, and a service process waiting for negotiation is started synchronously, so that the method can be understood that one user is matched for reaching one intelligent automobile, all applications on the intelligent automobile only need one negotiation key, and the method also has the characteristic of meeting the requirements of the usage and the usage; and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end, and judging the validity of the authorization information:
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end does not exist, marking the authorization information as data decryption failure, and ending the instruction at the moment;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end and the user end negotiate based on the synchronously started service process waiting for negotiation, and at the moment,
if the negotiation fails, quitting the module corresponding to the negotiation service process, marking the module as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
Based on the characteristics of a trusted environment, SM9 and a block chain technology, the execution code for data use is stored on the block chain, so that the data content is ensured to be public, transparent and traceable, and the specific execution queryability of the user for using data authorization is met.
The technical scope of the present invention is not limited to the above description, and those skilled in the art can make various changes and modifications to the above-described embodiments without departing from the technical spirit of the present invention, and such changes and modifications should fall within the protective scope of the present invention.

Claims (2)

1. A data security processing method based on Internet of vehicles is characterized in that: the method comprises the following steps:
generating a master key for authorization decryption from a user side to an automobile side according to an acquired user side request for a credit and credit authorization center, wherein the user side request comprises user side private key information and negotiation public key information, and the specific mode for generating the master key is as follows: firstly, a user is granted to request a certificate storing center to acquire private key information and negotiation public key information, and the user keeps a long connection relationship with the certificate storing center and waits for the certificate storing center to return request information; secondly, the certificate storing center sends a request for confirming the association to the automobile end, and finally, after the automobile end confirms the association, the certificate storing center keeps a long connection relation;
after obtaining a private key, a public key and a negotiation public key when a target file executes encryption through the calculation of the master key granted by the user side, respectively returning corresponding calculation information to the user side and the automobile side, wherein the corresponding calculation information returned to the user side comprises the private key when the target file executes encryption, the negotiation public key and ID information corresponding to the automobile side, and the corresponding calculation information returned to the automobile side comprises the public key when the target file executes encryption, the negotiation public key and the ID information corresponding to the user side;
on the basis of a vehicle-mounted interconnection system, ciphertext data contained in the calculation information is acquired to a user side in a time sequence step mode, and data decryption is completed at an automobile side by using a negotiation key, wherein the vehicle-mounted interconnection system comprises the following steps of:
configuring and starting a processing process containing a TEE application program environment at the automobile end; based on the processing requirement of the ciphertext data, executing and calling a corresponding execution program of the vehicle-mounted interconnection system, and if no corresponding program instruction exists in the vehicle-mounted interconnection system, pulling the corresponding execution program from a data storage block chain of the automobile end; meanwhile, whether other system data except the program is needed in the corresponding execution program of the vehicle-mounted interconnection system is judged, if not, the module corresponding to the execution program is ended, otherwise, an authorization application is obtained from the user side;
when the vehicle-mounted interconnection system obtains an authorization application from a user side:
firstly, a user trust process needs to be configured and started at a user side;
secondly, checking the data use range and the data compliance use authentication condition of the application program based on the data storage block chain request;
thirdly, judging the authorization result of the user, wherein if the user is not authorized, directly returning the result to the automobile end; otherwise, calculating the usage and usage authorization information corresponding to the zero-knowledge-based certificate, and synchronously starting a service process waiting for negotiation;
and finally, returning the authorized use and usage authorization information obtained through authorization and calculation to the automobile end to judge the validity of the authorization information.
2. The data security processing method based on the internet of vehicles according to claim 1, wherein: when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end does not exist, marking the authorization information as data decryption failure and ending the instruction;
when the automobile end judges the validity of the authorization information and finds that the authorization information returned to the automobile end exists, the automobile end negotiates with the user end based on the synchronously started service process waiting for negotiation,
if the negotiation fails, quitting the negotiation service process, marking the negotiation service process as data decryption failure, and ending the instruction;
if the negotiation is successful, returning to the private key information when the user end encrypts the data by using the negotiation key for decryption, and meanwhile, receiving the trusted data encryption content from the automobile end to the user end, and decrypting the data by using the negotiation key to complete the data processing process.
CN202210154836.1A 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles Active CN114244514B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210154836.1A CN114244514B (en) 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210154836.1A CN114244514B (en) 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles

Publications (2)

Publication Number Publication Date
CN114244514A CN114244514A (en) 2022-03-25
CN114244514B true CN114244514B (en) 2022-05-24

Family

ID=80747597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210154836.1A Active CN114244514B (en) 2022-02-21 2022-02-21 Data security processing method based on Internet of vehicles

Country Status (1)

Country Link
CN (1) CN114244514B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108471351A (en) * 2018-06-27 2018-08-31 西南交通大学 Car networking certifiede-mail protocol method based on no certificate aggregate signature
CN109922475A (en) * 2019-04-19 2019-06-21 郑州轻工业学院 Vehicle authentication and message verification method under In-vehicle networking environment
CN110830555A (en) * 2019-10-15 2020-02-21 图灵人工智能研究院(南京)有限公司 Data processing method, control device and storage medium for unmanned equipment
US10673617B1 (en) * 2018-04-24 2020-06-02 George Antoniou Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
CN113630243A (en) * 2021-07-13 2021-11-09 暨南大学 Authentication key agreement method with key exposure resistance characteristic in Internet of vehicles environment

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8996868B2 (en) * 2010-12-15 2015-03-31 Electronics And Telecommunications Research Institute Method of authenticating vehicle communication
CN110601830B (en) * 2019-09-16 2021-08-31 腾讯科技(深圳)有限公司 Key management method, device, equipment and storage medium based on block chain
CN111431713B (en) * 2020-03-27 2023-03-28 财付通支付科技有限公司 Private key storage method and device and related equipment
CN116113936A (en) * 2020-06-30 2023-05-12 交互数字专利控股公司 Methods, architectures, devices, and systems for transaction management in blockchain-enabled wireless systems
CN112584350B (en) * 2020-12-10 2023-02-28 阿波罗智联(北京)科技有限公司 Method, device and equipment for processing information and readable storage medium
CN113395159B (en) * 2021-01-08 2024-03-12 腾讯科技(深圳)有限公司 Data processing method based on trusted execution environment and related device
CN112733107B (en) * 2021-04-02 2021-06-22 腾讯科技(深圳)有限公司 Information verification method, related device, equipment and storage medium
CN113300836B (en) * 2021-04-23 2022-02-22 暨南大学 Vehicle-mounted network message authentication method and system based on block chain and ECC
CN113596778A (en) * 2021-07-28 2021-11-02 国家电网有限公司 Vehicle networking node anonymous authentication method based on block chain
CN113783696A (en) * 2021-08-14 2021-12-10 西安电子科技大学 Internet of things perception data sharing transaction platform, control method, equipment and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10673617B1 (en) * 2018-04-24 2020-06-02 George Antoniou Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
CN108471351A (en) * 2018-06-27 2018-08-31 西南交通大学 Car networking certifiede-mail protocol method based on no certificate aggregate signature
CN109922475A (en) * 2019-04-19 2019-06-21 郑州轻工业学院 Vehicle authentication and message verification method under In-vehicle networking environment
CN110830555A (en) * 2019-10-15 2020-02-21 图灵人工智能研究院(南京)有限公司 Data processing method, control device and storage medium for unmanned equipment
CN113630243A (en) * 2021-07-13 2021-11-09 暨南大学 Authentication key agreement method with key exposure resistance characteristic in Internet of vehicles environment

Also Published As

Publication number Publication date
CN114244514A (en) 2022-03-25

Similar Documents

Publication Publication Date Title
US20220078029A1 (en) System Access Using a Mobile Device
CN110637328B (en) Vehicle access method based on portable equipment
CN111884805B (en) Data hosting method and system based on blockchain and distributed identity
CN1714529B (en) Domain-based digital-rights management system with easy and secure device enrollment
CN110324335B (en) Automobile software upgrading method and system based on electronic mobile certificate
TW201927601A (en) Method for generating and using virtual key of vehicle, system for same, and user terminal
CN111200496B (en) Digital key implementation method based on vehicle
US20140075186A1 (en) Multiple Access Key Fob
CN110099037A (en) Control unit remote-control key pairing based on certificate
US11722529B2 (en) Method and apparatus for policy-based management of assets
CN113347133B (en) Authentication method and device of vehicle-mounted equipment
CN110148239A (en) A kind of authorization method and system of Intelligent key
CN108141444A (en) Improved authentication method and authentication device
CN103974255A (en) System and method for vehicle access
CN111159766A (en) Network car booking service method and system with privacy protection function and storage medium
CN110519238B (en) Internet of things security system and communication method based on cryptographic technology
CN110932846B (en) Vehicle-mounted virtual key communication method
KR102521936B1 (en) Method of secured sharing of vehicle key
CN114244514B (en) Data security processing method based on Internet of vehicles
CN114095919A (en) Certificate authorization processing method based on Internet of vehicles and related equipment
KR20020006985A (en) Certification service method in two different certifying system using certification gate way
CN116015906B (en) Node authorization method, node communication method and device for privacy calculation
CN116830628A (en) Method and apparatus for providing authorization to access interactive items
CN117475533A (en) Data transmission method and device, equipment and computer readable storage medium
CN117318944A (en) Method, system and storage medium for issuing group key in advance in vehicle-road cooperative scene

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant