CN114357432A - Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used - Google Patents

Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used Download PDF

Info

Publication number
CN114357432A
CN114357432A CN202111678306.9A CN202111678306A CN114357432A CN 114357432 A CN114357432 A CN 114357432A CN 202111678306 A CN202111678306 A CN 202111678306A CN 114357432 A CN114357432 A CN 114357432A
Authority
CN
China
Prior art keywords
adb
tbox
task
control system
background
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111678306.9A
Other languages
Chinese (zh)
Inventor
张剑雄
汪向阳
何举刚
何文
谭成宇
宋俊男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Changan Automobile Co Ltd
Original Assignee
Chongqing Changan Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Changan Automobile Co Ltd filed Critical Chongqing Changan Automobile Co Ltd
Priority to CN202111678306.9A priority Critical patent/CN114357432A/en
Publication of CN114357432A publication Critical patent/CN114357432A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention requests to protect a method and a system for preventing vehicle ADB from being maliciously used, a web login management unit uses TUID of a vehicle machine as a unique identifier, an ADB opening object is designated, a result is fed back to a background management control system, the background control system issues an instruction according to the state of a TBOX network, the ADB is opened by directly issuing the instruction to an online TBOX, and the TBOX feeds back the instruction execution condition to the background control system; and for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within a preset time. And the new task covers the old task corresponding to the condition that the old task does not accept the new task. The interface of the soft switch ADB is not reserved at the vehicle end, so that the vehicle end is prevented from being used maliciously.

Description

Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used
Technical Field
The invention belongs to the technical field of automobile control, and particularly relates to a technology for protecting an ADB of an automobile machine.
Background
The ADB is a multifunctional command line tool, which allows a user to communicate with the device, perform various device operations (e.g., installing and debugging applications), and run various commands on the device, and the user using the ADB should be a developer and a debugger, and should not be a user.
Patent application No.: CN202010493578.0, name: a debugging interface management method, a debugging interface management device and electronic equipment are described. The method reflects the mode that the verification code is usually used at present to ensure that the ADB authority is legally obtained to be used on the vehicle, and the method opens the ADB authority to the user, so that the user can also obtain the verification code by himself, and the safety risk is increased; the identity of the user is not verified, and any person can bind the equipment and cannot be prevented from being used maliciously; the device end, the background, the mobile phone of the user or other communication equipment are required to be matched for use, and more modifying parties are involved; the use of operator supplied authentication codes may involve charging, increasing cost consumption.
Disclosure of Invention
Aiming at the problem that in the prior art, after an android Debug bridge ADB (android Debug bridge) is opened to a user, whether the identity of a user is legal cannot be effectively judged, anyone can go to bind a number to obtain the ADB, and a third party can maliciously destroy or obtain sensitive data after obtaining the ADB. Therefore, a system and a method for preventing the vehicle ADB from being used maliciously are provided, and vehicle-machine internal communication and vehicle-cloud connection are adopted to ensure the internal communication safety and realize the communication safety of a vehicle-machine end and a background.
Vehicle machine internal communication: the vehicle end does not reserve an interface of the soft-cutting ADB, so that the vehicle end is prevented from being discovered and utilized. Most of the ADB ports are illegally used currently because developers reserve a soft-cut interface, which may be used maliciously once discovered. In order to avoid the problem of malicious use and meet the requirements of development and debugging personnel, the interface of the soft switch adb is directly cancelled, and only remote opening is used. The ADB is actually controlled by a module for controlling conversion between the ADB and the USB, for example, the ADB and the USB are controlled by a multi-point control unit (MCU) (multi control unit) in the car, and the conversion signal is encrypted and transmitted to the MCU by a communication module after the car receives a remote command to ensure the transmission safety in the car. Communication keys (for example, symmetric keys and the like can be adopted) are negotiated between the communication module and the MCU before data transmission, and the communication keys need to be encrypted for transmission. The specific process can be as follows: the communication module randomly generates a communication key, encrypts the communication key by using the MCU public key and then sends the encrypted communication key to the MCU, and the MCU decrypts the encrypted communication key by using a private key of the MCU to obtain a communication key plaintext. After the communication key is obtained, both parties use the communication key to encrypt and decrypt. Vehicle cloud connection: HTTPS (TLS 1.2 and above) is adopted for communication between the vehicle end and the background, so that the safety of the communication process is ensured; and a bidirectional authentication mechanism is adopted to ensure the validity of the communication end. The method specifically comprises the following steps:
a method for preventing a vehicle ADB from being maliciously used comprises the steps that a web page login management unit uses a TUID of a vehicle machine as a unique identifier, an ADB opening object is designated, a result is fed back to a background management control system, the background control system issues an instruction according to a TBOX network state, the ADB is opened by directly issuing the instruction to an online TBOX, and the TBOX feeds back an instruction execution condition to the background control system; and for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within a preset time. And the new task covers the old task corresponding to the condition that the old task does not accept the new task.
Further, the communication between the background control management system and the TBOX adopts a two-way authentication mode to confirm that the two communication parties are credible, and an HTTPS is adopted to protect a communication channel.
Further, when the TBOX is online, the TBOX judges the effectiveness of the received commands issued by the background control system, if the commands are effective, the TBOX changes the initial state, the HU keeps the USB route continuously opened and accesses the UCS to acquire new message content, the HU returns to the task background to open the vehicle ADB, and when the vehicle HU feedback success acquisition message signal is not received within the preset time, the TBOX returns to the initial state; the TBOX informs the vehicle machine to acquire a new message; and the vehicle machine acquires UCS from the TBOX, visits and acquires a task, opens the ADB and feeds back a processing result to the background control system.
Further, when the TBOX is not on line, the vehicle is started for the first time and networked to obtain the UCS, the ADB is opened, the UCS is automatically obtained, a task is accessed and obtained, the ADB is opened, and the ADB is automatically closed when the vehicle end is closed.
Further, the HU is automatically discarded beyond the preset time and the start overtime is recorded in the webpage management unit, the HU is connected with the network for the first time after being started, UCS is automatically accessed, the message content is obtained, the HU obtains a task, and the ADB is started.
The invention also provides a system for preventing the vehicle ADB from being maliciously used, which comprises a web login management unit, a background control system, a vehicle networking system TBOX (telematics BOX), and a vehicle HU (vehicle-mounted entertainment system), wherein all parts are connected by a wireless network, the web login management unit implements login authority management, the TUID of the vehicle is used as a unique identifier to designate an ADB opening object, the result is fed back to the background management control system, the background control system issues an instruction according to the network state of the TBOX, the HU implements USB connection, provides a hardware interface, acquires a background instruction, and controls to automatically close the ADB; directly issuing an instruction to open an ADB for an online TBOX, and feeding back the instruction execution condition to a background control system by the TBOX; for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within preset time; and the new task covers the old task corresponding to the condition that the old task does not accept the new task.
The present invention also claims an electronic device, including: one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the method of the present invention for preventing malicious use of a car ADB.
The invention also claims a computer readable storage medium, on which a computer program is stored, the program being capable of being loaded and executed by a processor to implement the method for preventing malicious use of the car ADB according to the invention.
The webpage login management unit prevents a webpage from being used by any person through basic protection measures such as account login, verification code verification and the like, and simultaneously needs to be provided with a simple security detection and defense mechanism, such as account password login, password intensity limitation, login delay or prohibition processing for actions of logging in an account incorrectly for many times, prevention of explosion by other people, attack of a dictionary and the like to guess a password, and illegal operation is carried out. The webpage password is not required to be stored and transmitted in a plaintext, the password is required to be subjected to hash or encryption processing, the password input by a user is processed by adopting the same mechanism during login verification, and then the password is verified with a stored value, so that the situation that the password is verified by directly using the plaintext password is avoided, and data is prevented from being intercepted by a third party to obtain the password is avoided.
And entering the authority management after the webpage login is completed. And using a terminal IDTUID (terminal Unit identity) of the vehicle machine as a unique identifier, designating an ADB opening object, and feeding the result back to the background control system.
And the background control system issues an instruction according to the state of the TBOX network. TBOX includes two network states, online and offline. The instructions can be directly issued for the on-line TBOX, and then whether the instructions are successfully issued or not is judged according to the feedback condition of the TBOX; and for the off-line TBOX, opening the ADB task for caching, hanging the ADB task on a background control system, automatically acquiring the ADB task after the TBOX is on line, timing the cached task, and cancelling the task if the ADB task is not received within preset time. And the new task covers the old task corresponding to the condition that the old task does not accept the new task. The background control system and the TBOX communication process adopt a bidirectional authentication mode to confirm that two communication parties are credible, and adopt HTTPS to protect a communication channel, so as to prevent the communication content from being forged, eavesdropped or tampered by a third party.
After that, after-sales personnel, customer service personnel and a safety manager need to call the ADB, the safety manager manages the ADB permission to be opened, and the safety manager issues an ADB opening instruction and related work to the corresponding vehicle machine.
Each end needs to realize the following functions: the webpage realizes UI interface display, realizes ADB authority management visualization and login identity authentication; the background management system realizes ADB instruction issuing, starts ADB task cache, receives administrator commands and is in safe communication with the TBOX; TBOX realizes secure network communication and instruction validity judgment; HU realizes USB connection, hardware interface provides, and the automatic acquisition backstage instruction closes the ADB automatically.
The ADB is closed by default to limit the utilization of the ADB by malicious personnel, so that the malicious personnel cannot acquire the ADB by conventional means, and the ADB is prevented from being used maliciously. The webpage uses an identity authentication mode to log in an ADB authority management interface, and a reliable identity authentication mode is adopted to prevent illegal personnel from utilizing the webpage. And on the aspect of a background to a vehicle machine, safety measures such as https, message authentication and the like are added, the safety of the method is improved by utilizing the safety mechanisms, and finally, corresponding roles are added for systematic management, so that the whole system is operated.
Drawings
FIG. 1 remote enablement of an ADB global relationship diagram;
FIG. 2 is a flow chart of turning on ADB while TBOX is online;
FIG. 3 is a flow chart for turning on ADB when TBOX is not online.
Detailed Description
For a further understanding of the invention, reference will now be made in detail to the embodiments of the invention illustrated in the accompanying drawings and specific examples.
Vehicle cloud connection: the server side presets the terminal certificate and the root certificate in the vehicle, encrypts and stores the certificate by adopting a symmetric key, and stores a private key in an encryption module (SE or HSM). The communication modules at the automobile control system and the automobile end use preset certificates and private keys for bidirectional authentication, and an HTTPS protocol is adopted to ensure the whole communication safety. Vehicle machine internal communication: after receiving an ADB opening instruction, a communication module of the vehicle machine performs key negotiation with the MCU, and transmits a negotiated communication key encryption instruction to a multipoint control unit MCU (multi control unit) through a serial Peripheral interface SPI (serial Peripheral interface); and after the MCU receives the instruction, the client decrypts by using the communication key, executes the decrypted instruction and opens the ADB.
The scheme of remotely turning on the ADB may specifically include the following two cases: under the condition that the TBOX is on line, after a background control system issues an ADB opening instruction, the TBOX judges the effectiveness of the received instruction; if the instruction is valid, the TBOX changes the initial state, the USB route is continuously started and accesses the domain name UCS of the acquisition message to acquire new message content, and when the vehicle machine feedback success acquisition message signal is not received within the preset time, the TBOX returns to the initial state; the TBOX informs the vehicle machine to acquire a new message; the vehicle machine acquires UCS from TBOX, visits and acquires tasks; and after obtaining, the vehicle machine successfully opens the ADB and feeds back a processing result to the background control system. Under the condition that TBOX is not on line, the vehicle machine starts a parallel network for the first time to obtain UCS, and opens ADB. After the vehicle machine is started and networked, the UCS is automatically acquired, then the tasks are accessed and acquired, and the ADB is opened. The vehicle end has the function of automatically closing the ADB, so that the ADB is prevented from being reused by others after authorized use. The following is specifically described for TBOX online and offline cases:
ADB was turned on when TBOX was online.
Fig. 2 is a flowchart of starting the ADB when the TBOX is online, sending an ADB start instruction, determining whether the TBOX is online, if the TBOX is online, the TBOX receives the start instruction, and verifies whether the instruction is valid, if the instruction is valid, the USB route is kept open and a request signal is sent, the HU maintains the USB network and accesses the UCS to obtain new message content, returns to the task background to start the car ADB, and the HU receives the start instruction to immediately start the ADB mode. If the confirmation signal returned by the HU is not received within the preset time, the HU starts the ADB to complete, and automatically closes after shutdown, the initial state is recovered, and the process is ended.
If TBOX is on-line, ADB instruction cache is turned on. The method specifically comprises the following steps that a server side completes authentication in an account, password, verification code and other identity verification modes, and remotely starts ADB according to a client side request TUID; the server side sends an ADB starting instruction to the automobile control system; the vehicle control system judges whether the TBOX is online after receiving the request command, if the TBOX is online, the adb starting task is hung to the HU (for example, a certain interface address is specified as a new information storage address, the vehicle machine acquires a task at the specific address, and the vehicle machine is ensured to be capable of receiving the task at a legal position), and simultaneously sends a 'new message notification command of other terminals' instruction to the TBOX; after receiving the command of 'other terminal new message notification command', the TBOX judges whether the command is valid, if the command is invalid, the TBOX feeds an error code back to a background, the background feeds back to a webpage, and a safety manager is prompted on a webpage interface: setting fails; if the current state is valid, keeping or changing the USB routing channel to be opened (keeping unchanged if the initial state of the USB routing channel is opened, and changing the initial state to be closed) and sending a periodic request CAN message to the HU; after receiving the message from the TBOX, the HU connects the router and accesses the UCS to acquire new message content; HU obtains task (starts adb), if no task is obtained within preset time t, the HU cannot connect background, because TBOX recovers after the time; after receiving the data, the HU immediately starts the ADB and feeds back a state message to the TBOX; after receiving the HU message, the TBOX returns to the initial state; if the TBOX does not receive the state message fed back by the HU within the time t, the TBOX can automatically return to the initial state;
turning on ADB when TBOX is not online
Fig. 3 is a flowchart showing that the ADB is turned on when the TBOX is not online, the HU actively connects to the network when it is turned on, accesses the UCS to acquire a new message, the background system returns to the task, sends an ADB turn-on instruction for turning on the car, turns on immediately after receiving the ADB turn-on instruction, and turns off automatically after it is turned off.
The security administrator enters a login page, a login management unit carries out identity verification such as an account, a password, a verification code and the like to complete authentication, enters an authority management webpage, and remotely starts an ADB according to the TUID notified by customer service personnel; after receiving the request of logging in the management unit, the background control system judges whether the TBOX is online; if TBOX is not online, the background management control system feeds back a corresponding error code to the login management unit, the login management unit prompts a security administrator, setting fails, please detect HU faults, meanwhile, an ADB task cache is started, the cache has a task limit of preset time, if the preset time h is exceeded, the cache is automatically discarded, the startup timeout is recorded in a webpage management unit, after HU is started, the HU is firstly connected with a network, UCS is automatically accessed, message content is acquired, the HU acquires a task, and the ADB is started; after receiving the data, HU starts ADB immediately; other operations are started when the ADB is on line with TBOX; when the old task is not issued and the new task is received, the new instruction directly covers the old instruction.

Claims (10)

1. A method for preventing vehicle ADB from being used maliciously is characterized by comprising the steps that a webpage login management unit uses TUID of a vehicle machine as a unique identifier, cancels a soft switch ADB interface, designates an ADB opening object, feeds back a result to a background management control system, the background management control system issues an instruction according to a TBOX network state, directly issues the instruction to open the ADB for an online TBOX, and feeds back an instruction execution condition to the background control system by the TBOX; and for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, canceling the task if the ADB task cache is not accepted within a preset time, and covering the old task by the new task corresponding to the condition that the old task is not accepted and a new task comes.
2. The method of claim 1, wherein the communication between the background control management system and the TBOX adopts a bidirectional authentication method to confirm that both parties are trusted, and HTTPS is used to protect a communication channel.
3. The method according to claim 1, wherein when TBOX is on-line, TBOX judges validity of a received command issued by a background control system, if the command is valid, TBOX changes an initial state, HU keeps USB routing continuously on and accesses UCS to acquire new message content, returns to task background to start car ADB, and when a successful acquisition message signal fed back by car HU is not received within a predetermined time, TBOX returns to the initial state; the TBOX informs the vehicle machine to acquire a new message; and the vehicle machine acquires UCS from the TBOX, visits and acquires a task, opens the ADB and feeds back a processing result to the background control system.
4. The method of claim 1, wherein when TBOX is off-line, the car machine starts for the first time and accesses UCS on-line, opens ADB, automatically acquires UCS, accesses and acquires tasks, opens ADB, and automatically closes ADB when the car end is closed.
5. The method of claim 4, wherein the predetermined time is exceeded and the automatic discard is performed and the start timeout is recorded in the web page management unit, after the HU is powered on, the HU first connects to the network, automatically accesses the UCS, obtains the message content, and the HU obtains the task and starts the ADB.
6. A system for preventing vehicle ADB from being used maliciously is characterized by comprising a web login management unit, a background control system, a TBOX (tunnel boring oxide sensor) and a HU (home agent), wherein all parts are connected by a wireless network, the web login management unit implements login authority management, a TUID (tunnel identifier) of a vehicle is used as a unique identifier to designate an ADB opening object, a result is fed back to the background management control system, the background control system issues an instruction according to the network state of the TBOX, the HU realizes USB (universal serial bus) connection, provides a hardware interface, acquires a background instruction and controls to automatically close the ADB; directly issuing an instruction to open an ADB for an online TBOX, and feeding back the instruction execution condition to a background control system by the TBOX; for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within preset time; and the new task covers the old task corresponding to the condition that the old task does not accept the new task.
7. The system of claim 6, wherein the communication between the background control management system and the TBOX adopts a two-way authentication mode to confirm that the two parties are trusted, and adopts HTTPS to protect the communication channel.
8. The system of claim 6, wherein the end of the car is not reserved with an interface for soft switching the ADB, the conversion between the ADB and the USB is controlled by the MCU inside the car, the car receives the remote command, the communication module encrypts and transmits the converted signal to the MCU, and the communication module and the MCU perform data transmission by using the negotiated communication key.
9. An electronic device, comprising: one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the method of preventing malicious use of a car machine ADB of any of claims 1 to 5.
10. A computer readable storage medium having stored thereon a computer program which can be loaded and executed by a processor to perform the method of preventing malicious use of a car machine ADB according to any of claims 1 to 5.
CN202111678306.9A 2021-12-31 2021-12-31 Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used Pending CN114357432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111678306.9A CN114357432A (en) 2021-12-31 2021-12-31 Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111678306.9A CN114357432A (en) 2021-12-31 2021-12-31 Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used

Publications (1)

Publication Number Publication Date
CN114357432A true CN114357432A (en) 2022-04-15

Family

ID=81105484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111678306.9A Pending CN114357432A (en) 2021-12-31 2021-12-31 Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used

Country Status (1)

Country Link
CN (1) CN114357432A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979230A (en) * 2022-05-26 2022-08-30 重庆长安汽车股份有限公司 Vehicle-mounted terminal remote debugging system and method
CN117319085A (en) * 2023-11-28 2023-12-29 深圳市蓝鲸智联科技股份有限公司 Method for starting ADB of vehicle-mounted information entertainment system and authentication device

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104978248A (en) * 2014-10-15 2015-10-14 武汉安天信息技术有限责任公司 Method and system for remotely managing mobile terminal APP on basis of ADB
CN105048610A (en) * 2015-08-11 2015-11-11 奇瑞汽车股份有限公司 Remote charging control system and control method
CN105491084A (en) * 2014-09-16 2016-04-13 钛马信息网络技术有限公司 IOV (Internet of vehicles) system based on OTA protocol, and control method therefor
CN106210047A (en) * 2016-07-11 2016-12-07 北京长安汽车工程技术研究有限责任公司 A kind of vehicle information management method, system and car networked system
CN107360175A (en) * 2017-07-28 2017-11-17 广州亿程交通信息有限公司 Car networking control car safety method
CN107483526A (en) * 2016-12-23 2017-12-15 宝沃汽车(中国)有限公司 Car networking system and its control method
WO2019114578A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Method for generating and using virtual key of vehicle, system for same, and user terminal
CN109936497A (en) * 2017-12-15 2019-06-25 蔚来汽车有限公司 A kind of vehicle-mounted instant communication method and vehicle-mounted instant communicating system
CN111711652A (en) * 2020-04-28 2020-09-25 江西江铃集团新能源汽车有限公司 Vehicle remote control method, system, readable storage medium and device
CN111949954A (en) * 2020-07-10 2020-11-17 深圳市信锐网科技术有限公司 Login verification method, system and computer storage medium
CN112037379A (en) * 2020-08-31 2020-12-04 东风商用车有限公司 Remote vehicle door control system
CN112256299A (en) * 2020-10-16 2021-01-22 中国第一汽车股份有限公司 Upgrading method, device, equipment and storage medium
US20210291985A1 (en) * 2020-03-23 2021-09-23 Panasonic Avionics Corporation Systems and methods for modifying control of a device within a vehicle
CN114461289A (en) * 2022-02-21 2022-05-10 重庆长安汽车股份有限公司 Method and system for remotely starting ADB tool of vehicle-mounted information entertainment system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491084A (en) * 2014-09-16 2016-04-13 钛马信息网络技术有限公司 IOV (Internet of vehicles) system based on OTA protocol, and control method therefor
CN104978248A (en) * 2014-10-15 2015-10-14 武汉安天信息技术有限责任公司 Method and system for remotely managing mobile terminal APP on basis of ADB
CN105048610A (en) * 2015-08-11 2015-11-11 奇瑞汽车股份有限公司 Remote charging control system and control method
CN106210047A (en) * 2016-07-11 2016-12-07 北京长安汽车工程技术研究有限责任公司 A kind of vehicle information management method, system and car networked system
CN107483526A (en) * 2016-12-23 2017-12-15 宝沃汽车(中国)有限公司 Car networking system and its control method
CN107360175A (en) * 2017-07-28 2017-11-17 广州亿程交通信息有限公司 Car networking control car safety method
WO2019114578A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Method for generating and using virtual key of vehicle, system for same, and user terminal
CN109936497A (en) * 2017-12-15 2019-06-25 蔚来汽车有限公司 A kind of vehicle-mounted instant communication method and vehicle-mounted instant communicating system
US20210291985A1 (en) * 2020-03-23 2021-09-23 Panasonic Avionics Corporation Systems and methods for modifying control of a device within a vehicle
CN111711652A (en) * 2020-04-28 2020-09-25 江西江铃集团新能源汽车有限公司 Vehicle remote control method, system, readable storage medium and device
CN111949954A (en) * 2020-07-10 2020-11-17 深圳市信锐网科技术有限公司 Login verification method, system and computer storage medium
CN112037379A (en) * 2020-08-31 2020-12-04 东风商用车有限公司 Remote vehicle door control system
CN112256299A (en) * 2020-10-16 2021-01-22 中国第一汽车股份有限公司 Upgrading method, device, equipment and storage medium
CN114461289A (en) * 2022-02-21 2022-05-10 重庆长安汽车股份有限公司 Method and system for remotely starting ADB tool of vehicle-mounted information entertainment system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979230A (en) * 2022-05-26 2022-08-30 重庆长安汽车股份有限公司 Vehicle-mounted terminal remote debugging system and method
CN114979230B (en) * 2022-05-26 2024-02-02 重庆长安汽车股份有限公司 Remote debugging system and method for vehicle-mounted terminal
CN117319085A (en) * 2023-11-28 2023-12-29 深圳市蓝鲸智联科技股份有限公司 Method for starting ADB of vehicle-mounted information entertainment system and authentication device

Similar Documents

Publication Publication Date Title
CN111194028B (en) Safety control method based on vehicle
EP3365825B1 (en) Secure access control to an embedded device through a networked computer
CN114357432A (en) Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used
US20170295018A1 (en) System and method for securing privileged access to an electronic device
WO2017167188A1 (en) Secure communication method and apparatus for vehicle, multimedia system for vehicle, and vehicle
KR20010075411A (en) Adapter having secure function and computer secure system using it
CN109714171B (en) Safety protection method, device, equipment and medium
KR20060077444A (en) User authentication method and system being in home network
CN109088848A (en) A kind of intelligent network connection automobile information method for security protection
CN105187442A (en) Vehicle authorization method, device, vehicle-mounted terminal, terminal and system
CN110222485B (en) Industrial control white list management system and method based on SGX software protection extended instruction
CN112055344A (en) Engineering machinery Bluetooth equipment identity authentication system and method
CN109547402B (en) Data protection method and device, electronic equipment and readable storage medium
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
CN111147740B (en) Method and device for controlling intelligent camera
US8132021B2 (en) Information processing apparatus, control method therefor and computer-readable storage medium
EP3472719A1 (en) Method and apparatus of implementing a vpn tunnel
CN111611620B (en) Access request processing method and related device of access platform
CN114333113B (en) Bluetooth key shortcut control method based on negative one screen and computer readable storage medium
US20160036590A1 (en) Methods and systems for controlling medical device usage
CN109359450B (en) Security access method, device, equipment and storage medium of Linux system
CN104852904B (en) A kind of Server remote method for restarting applied based on cell phone application and Encrypted short message ceases
CN114157489B (en) Communication domain controller safety communication method based on periodic authentication handshake mechanism
JP2022178229A (en) Vehicle control device, vehicle, vehicle control method and program
CN113641535A (en) Data backup system, data backup method, electronic device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination