CN114357432A - Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used - Google Patents
Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used Download PDFInfo
- Publication number
- CN114357432A CN114357432A CN202111678306.9A CN202111678306A CN114357432A CN 114357432 A CN114357432 A CN 114357432A CN 202111678306 A CN202111678306 A CN 202111678306A CN 114357432 A CN114357432 A CN 114357432A
- Authority
- CN
- China
- Prior art keywords
- adb
- tbox
- task
- control system
- background
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000006854 communication Effects 0.000 claims description 42
- 238000004891 communication Methods 0.000 claims description 40
- 238000012545 processing Methods 0.000 claims description 5
- 230000002457 bidirectional effect Effects 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims description 2
- 238000007726 management method Methods 0.000 description 25
- 238000012795 verification Methods 0.000 description 9
- 230000007246 mechanism Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 1
- 230000008260 defense mechanism Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention requests to protect a method and a system for preventing vehicle ADB from being maliciously used, a web login management unit uses TUID of a vehicle machine as a unique identifier, an ADB opening object is designated, a result is fed back to a background management control system, the background control system issues an instruction according to the state of a TBOX network, the ADB is opened by directly issuing the instruction to an online TBOX, and the TBOX feeds back the instruction execution condition to the background control system; and for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within a preset time. And the new task covers the old task corresponding to the condition that the old task does not accept the new task. The interface of the soft switch ADB is not reserved at the vehicle end, so that the vehicle end is prevented from being used maliciously.
Description
Technical Field
The invention belongs to the technical field of automobile control, and particularly relates to a technology for protecting an ADB of an automobile machine.
Background
The ADB is a multifunctional command line tool, which allows a user to communicate with the device, perform various device operations (e.g., installing and debugging applications), and run various commands on the device, and the user using the ADB should be a developer and a debugger, and should not be a user.
Patent application No.: CN202010493578.0, name: a debugging interface management method, a debugging interface management device and electronic equipment are described. The method reflects the mode that the verification code is usually used at present to ensure that the ADB authority is legally obtained to be used on the vehicle, and the method opens the ADB authority to the user, so that the user can also obtain the verification code by himself, and the safety risk is increased; the identity of the user is not verified, and any person can bind the equipment and cannot be prevented from being used maliciously; the device end, the background, the mobile phone of the user or other communication equipment are required to be matched for use, and more modifying parties are involved; the use of operator supplied authentication codes may involve charging, increasing cost consumption.
Disclosure of Invention
Aiming at the problem that in the prior art, after an android Debug bridge ADB (android Debug bridge) is opened to a user, whether the identity of a user is legal cannot be effectively judged, anyone can go to bind a number to obtain the ADB, and a third party can maliciously destroy or obtain sensitive data after obtaining the ADB. Therefore, a system and a method for preventing the vehicle ADB from being used maliciously are provided, and vehicle-machine internal communication and vehicle-cloud connection are adopted to ensure the internal communication safety and realize the communication safety of a vehicle-machine end and a background.
Vehicle machine internal communication: the vehicle end does not reserve an interface of the soft-cutting ADB, so that the vehicle end is prevented from being discovered and utilized. Most of the ADB ports are illegally used currently because developers reserve a soft-cut interface, which may be used maliciously once discovered. In order to avoid the problem of malicious use and meet the requirements of development and debugging personnel, the interface of the soft switch adb is directly cancelled, and only remote opening is used. The ADB is actually controlled by a module for controlling conversion between the ADB and the USB, for example, the ADB and the USB are controlled by a multi-point control unit (MCU) (multi control unit) in the car, and the conversion signal is encrypted and transmitted to the MCU by a communication module after the car receives a remote command to ensure the transmission safety in the car. Communication keys (for example, symmetric keys and the like can be adopted) are negotiated between the communication module and the MCU before data transmission, and the communication keys need to be encrypted for transmission. The specific process can be as follows: the communication module randomly generates a communication key, encrypts the communication key by using the MCU public key and then sends the encrypted communication key to the MCU, and the MCU decrypts the encrypted communication key by using a private key of the MCU to obtain a communication key plaintext. After the communication key is obtained, both parties use the communication key to encrypt and decrypt. Vehicle cloud connection: HTTPS (TLS 1.2 and above) is adopted for communication between the vehicle end and the background, so that the safety of the communication process is ensured; and a bidirectional authentication mechanism is adopted to ensure the validity of the communication end. The method specifically comprises the following steps:
a method for preventing a vehicle ADB from being maliciously used comprises the steps that a web page login management unit uses a TUID of a vehicle machine as a unique identifier, an ADB opening object is designated, a result is fed back to a background management control system, the background control system issues an instruction according to a TBOX network state, the ADB is opened by directly issuing the instruction to an online TBOX, and the TBOX feeds back an instruction execution condition to the background control system; and for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within a preset time. And the new task covers the old task corresponding to the condition that the old task does not accept the new task.
Further, the communication between the background control management system and the TBOX adopts a two-way authentication mode to confirm that the two communication parties are credible, and an HTTPS is adopted to protect a communication channel.
Further, when the TBOX is online, the TBOX judges the effectiveness of the received commands issued by the background control system, if the commands are effective, the TBOX changes the initial state, the HU keeps the USB route continuously opened and accesses the UCS to acquire new message content, the HU returns to the task background to open the vehicle ADB, and when the vehicle HU feedback success acquisition message signal is not received within the preset time, the TBOX returns to the initial state; the TBOX informs the vehicle machine to acquire a new message; and the vehicle machine acquires UCS from the TBOX, visits and acquires a task, opens the ADB and feeds back a processing result to the background control system.
Further, when the TBOX is not on line, the vehicle is started for the first time and networked to obtain the UCS, the ADB is opened, the UCS is automatically obtained, a task is accessed and obtained, the ADB is opened, and the ADB is automatically closed when the vehicle end is closed.
Further, the HU is automatically discarded beyond the preset time and the start overtime is recorded in the webpage management unit, the HU is connected with the network for the first time after being started, UCS is automatically accessed, the message content is obtained, the HU obtains a task, and the ADB is started.
The invention also provides a system for preventing the vehicle ADB from being maliciously used, which comprises a web login management unit, a background control system, a vehicle networking system TBOX (telematics BOX), and a vehicle HU (vehicle-mounted entertainment system), wherein all parts are connected by a wireless network, the web login management unit implements login authority management, the TUID of the vehicle is used as a unique identifier to designate an ADB opening object, the result is fed back to the background management control system, the background control system issues an instruction according to the network state of the TBOX, the HU implements USB connection, provides a hardware interface, acquires a background instruction, and controls to automatically close the ADB; directly issuing an instruction to open an ADB for an online TBOX, and feeding back the instruction execution condition to a background control system by the TBOX; for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within preset time; and the new task covers the old task corresponding to the condition that the old task does not accept the new task.
The present invention also claims an electronic device, including: one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the method of the present invention for preventing malicious use of a car ADB.
The invention also claims a computer readable storage medium, on which a computer program is stored, the program being capable of being loaded and executed by a processor to implement the method for preventing malicious use of the car ADB according to the invention.
The webpage login management unit prevents a webpage from being used by any person through basic protection measures such as account login, verification code verification and the like, and simultaneously needs to be provided with a simple security detection and defense mechanism, such as account password login, password intensity limitation, login delay or prohibition processing for actions of logging in an account incorrectly for many times, prevention of explosion by other people, attack of a dictionary and the like to guess a password, and illegal operation is carried out. The webpage password is not required to be stored and transmitted in a plaintext, the password is required to be subjected to hash or encryption processing, the password input by a user is processed by adopting the same mechanism during login verification, and then the password is verified with a stored value, so that the situation that the password is verified by directly using the plaintext password is avoided, and data is prevented from being intercepted by a third party to obtain the password is avoided.
And entering the authority management after the webpage login is completed. And using a terminal IDTUID (terminal Unit identity) of the vehicle machine as a unique identifier, designating an ADB opening object, and feeding the result back to the background control system.
And the background control system issues an instruction according to the state of the TBOX network. TBOX includes two network states, online and offline. The instructions can be directly issued for the on-line TBOX, and then whether the instructions are successfully issued or not is judged according to the feedback condition of the TBOX; and for the off-line TBOX, opening the ADB task for caching, hanging the ADB task on a background control system, automatically acquiring the ADB task after the TBOX is on line, timing the cached task, and cancelling the task if the ADB task is not received within preset time. And the new task covers the old task corresponding to the condition that the old task does not accept the new task. The background control system and the TBOX communication process adopt a bidirectional authentication mode to confirm that two communication parties are credible, and adopt HTTPS to protect a communication channel, so as to prevent the communication content from being forged, eavesdropped or tampered by a third party.
After that, after-sales personnel, customer service personnel and a safety manager need to call the ADB, the safety manager manages the ADB permission to be opened, and the safety manager issues an ADB opening instruction and related work to the corresponding vehicle machine.
Each end needs to realize the following functions: the webpage realizes UI interface display, realizes ADB authority management visualization and login identity authentication; the background management system realizes ADB instruction issuing, starts ADB task cache, receives administrator commands and is in safe communication with the TBOX; TBOX realizes secure network communication and instruction validity judgment; HU realizes USB connection, hardware interface provides, and the automatic acquisition backstage instruction closes the ADB automatically.
The ADB is closed by default to limit the utilization of the ADB by malicious personnel, so that the malicious personnel cannot acquire the ADB by conventional means, and the ADB is prevented from being used maliciously. The webpage uses an identity authentication mode to log in an ADB authority management interface, and a reliable identity authentication mode is adopted to prevent illegal personnel from utilizing the webpage. And on the aspect of a background to a vehicle machine, safety measures such as https, message authentication and the like are added, the safety of the method is improved by utilizing the safety mechanisms, and finally, corresponding roles are added for systematic management, so that the whole system is operated.
Drawings
FIG. 1 remote enablement of an ADB global relationship diagram;
FIG. 2 is a flow chart of turning on ADB while TBOX is online;
FIG. 3 is a flow chart for turning on ADB when TBOX is not online.
Detailed Description
For a further understanding of the invention, reference will now be made in detail to the embodiments of the invention illustrated in the accompanying drawings and specific examples.
Vehicle cloud connection: the server side presets the terminal certificate and the root certificate in the vehicle, encrypts and stores the certificate by adopting a symmetric key, and stores a private key in an encryption module (SE or HSM). The communication modules at the automobile control system and the automobile end use preset certificates and private keys for bidirectional authentication, and an HTTPS protocol is adopted to ensure the whole communication safety. Vehicle machine internal communication: after receiving an ADB opening instruction, a communication module of the vehicle machine performs key negotiation with the MCU, and transmits a negotiated communication key encryption instruction to a multipoint control unit MCU (multi control unit) through a serial Peripheral interface SPI (serial Peripheral interface); and after the MCU receives the instruction, the client decrypts by using the communication key, executes the decrypted instruction and opens the ADB.
The scheme of remotely turning on the ADB may specifically include the following two cases: under the condition that the TBOX is on line, after a background control system issues an ADB opening instruction, the TBOX judges the effectiveness of the received instruction; if the instruction is valid, the TBOX changes the initial state, the USB route is continuously started and accesses the domain name UCS of the acquisition message to acquire new message content, and when the vehicle machine feedback success acquisition message signal is not received within the preset time, the TBOX returns to the initial state; the TBOX informs the vehicle machine to acquire a new message; the vehicle machine acquires UCS from TBOX, visits and acquires tasks; and after obtaining, the vehicle machine successfully opens the ADB and feeds back a processing result to the background control system. Under the condition that TBOX is not on line, the vehicle machine starts a parallel network for the first time to obtain UCS, and opens ADB. After the vehicle machine is started and networked, the UCS is automatically acquired, then the tasks are accessed and acquired, and the ADB is opened. The vehicle end has the function of automatically closing the ADB, so that the ADB is prevented from being reused by others after authorized use. The following is specifically described for TBOX online and offline cases:
ADB was turned on when TBOX was online.
Fig. 2 is a flowchart of starting the ADB when the TBOX is online, sending an ADB start instruction, determining whether the TBOX is online, if the TBOX is online, the TBOX receives the start instruction, and verifies whether the instruction is valid, if the instruction is valid, the USB route is kept open and a request signal is sent, the HU maintains the USB network and accesses the UCS to obtain new message content, returns to the task background to start the car ADB, and the HU receives the start instruction to immediately start the ADB mode. If the confirmation signal returned by the HU is not received within the preset time, the HU starts the ADB to complete, and automatically closes after shutdown, the initial state is recovered, and the process is ended.
If TBOX is on-line, ADB instruction cache is turned on. The method specifically comprises the following steps that a server side completes authentication in an account, password, verification code and other identity verification modes, and remotely starts ADB according to a client side request TUID; the server side sends an ADB starting instruction to the automobile control system; the vehicle control system judges whether the TBOX is online after receiving the request command, if the TBOX is online, the adb starting task is hung to the HU (for example, a certain interface address is specified as a new information storage address, the vehicle machine acquires a task at the specific address, and the vehicle machine is ensured to be capable of receiving the task at a legal position), and simultaneously sends a 'new message notification command of other terminals' instruction to the TBOX; after receiving the command of 'other terminal new message notification command', the TBOX judges whether the command is valid, if the command is invalid, the TBOX feeds an error code back to a background, the background feeds back to a webpage, and a safety manager is prompted on a webpage interface: setting fails; if the current state is valid, keeping or changing the USB routing channel to be opened (keeping unchanged if the initial state of the USB routing channel is opened, and changing the initial state to be closed) and sending a periodic request CAN message to the HU; after receiving the message from the TBOX, the HU connects the router and accesses the UCS to acquire new message content; HU obtains task (starts adb), if no task is obtained within preset time t, the HU cannot connect background, because TBOX recovers after the time; after receiving the data, the HU immediately starts the ADB and feeds back a state message to the TBOX; after receiving the HU message, the TBOX returns to the initial state; if the TBOX does not receive the state message fed back by the HU within the time t, the TBOX can automatically return to the initial state;
turning on ADB when TBOX is not online
Fig. 3 is a flowchart showing that the ADB is turned on when the TBOX is not online, the HU actively connects to the network when it is turned on, accesses the UCS to acquire a new message, the background system returns to the task, sends an ADB turn-on instruction for turning on the car, turns on immediately after receiving the ADB turn-on instruction, and turns off automatically after it is turned off.
The security administrator enters a login page, a login management unit carries out identity verification such as an account, a password, a verification code and the like to complete authentication, enters an authority management webpage, and remotely starts an ADB according to the TUID notified by customer service personnel; after receiving the request of logging in the management unit, the background control system judges whether the TBOX is online; if TBOX is not online, the background management control system feeds back a corresponding error code to the login management unit, the login management unit prompts a security administrator, setting fails, please detect HU faults, meanwhile, an ADB task cache is started, the cache has a task limit of preset time, if the preset time h is exceeded, the cache is automatically discarded, the startup timeout is recorded in a webpage management unit, after HU is started, the HU is firstly connected with a network, UCS is automatically accessed, message content is acquired, the HU acquires a task, and the ADB is started; after receiving the data, HU starts ADB immediately; other operations are started when the ADB is on line with TBOX; when the old task is not issued and the new task is received, the new instruction directly covers the old instruction.
Claims (10)
1. A method for preventing vehicle ADB from being used maliciously is characterized by comprising the steps that a webpage login management unit uses TUID of a vehicle machine as a unique identifier, cancels a soft switch ADB interface, designates an ADB opening object, feeds back a result to a background management control system, the background management control system issues an instruction according to a TBOX network state, directly issues the instruction to open the ADB for an online TBOX, and feeds back an instruction execution condition to the background control system by the TBOX; and for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, canceling the task if the ADB task cache is not accepted within a preset time, and covering the old task by the new task corresponding to the condition that the old task is not accepted and a new task comes.
2. The method of claim 1, wherein the communication between the background control management system and the TBOX adopts a bidirectional authentication method to confirm that both parties are trusted, and HTTPS is used to protect a communication channel.
3. The method according to claim 1, wherein when TBOX is on-line, TBOX judges validity of a received command issued by a background control system, if the command is valid, TBOX changes an initial state, HU keeps USB routing continuously on and accesses UCS to acquire new message content, returns to task background to start car ADB, and when a successful acquisition message signal fed back by car HU is not received within a predetermined time, TBOX returns to the initial state; the TBOX informs the vehicle machine to acquire a new message; and the vehicle machine acquires UCS from the TBOX, visits and acquires a task, opens the ADB and feeds back a processing result to the background control system.
4. The method of claim 1, wherein when TBOX is off-line, the car machine starts for the first time and accesses UCS on-line, opens ADB, automatically acquires UCS, accesses and acquires tasks, opens ADB, and automatically closes ADB when the car end is closed.
5. The method of claim 4, wherein the predetermined time is exceeded and the automatic discard is performed and the start timeout is recorded in the web page management unit, after the HU is powered on, the HU first connects to the network, automatically accesses the UCS, obtains the message content, and the HU obtains the task and starts the ADB.
6. A system for preventing vehicle ADB from being used maliciously is characterized by comprising a web login management unit, a background control system, a TBOX (tunnel boring oxide sensor) and a HU (home agent), wherein all parts are connected by a wireless network, the web login management unit implements login authority management, a TUID (tunnel identifier) of a vehicle is used as a unique identifier to designate an ADB opening object, a result is fed back to the background management control system, the background control system issues an instruction according to the network state of the TBOX, the HU realizes USB (universal serial bus) connection, provides a hardware interface, acquires a background instruction and controls to automatically close the ADB; directly issuing an instruction to open an ADB for an online TBOX, and feeding back the instruction execution condition to a background control system by the TBOX; for the offline TBOX, opening an ADB task cache, hanging the ADB task cache to a background management control system, automatically acquiring and timing the cached task after the TBOX is online, and canceling the task if the ADB task cache is not received within preset time; and the new task covers the old task corresponding to the condition that the old task does not accept the new task.
7. The system of claim 6, wherein the communication between the background control management system and the TBOX adopts a two-way authentication mode to confirm that the two parties are trusted, and adopts HTTPS to protect the communication channel.
8. The system of claim 6, wherein the end of the car is not reserved with an interface for soft switching the ADB, the conversion between the ADB and the USB is controlled by the MCU inside the car, the car receives the remote command, the communication module encrypts and transmits the converted signal to the MCU, and the communication module and the MCU perform data transmission by using the negotiated communication key.
9. An electronic device, comprising: one or more processors; a memory; one or more applications stored in the memory and configured to be loaded and executed by the one or more processors to perform the method of preventing malicious use of a car machine ADB of any of claims 1 to 5.
10. A computer readable storage medium having stored thereon a computer program which can be loaded and executed by a processor to perform the method of preventing malicious use of a car machine ADB according to any of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111678306.9A CN114357432A (en) | 2021-12-31 | 2021-12-31 | Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111678306.9A CN114357432A (en) | 2021-12-31 | 2021-12-31 | Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114357432A true CN114357432A (en) | 2022-04-15 |
Family
ID=81105484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111678306.9A Pending CN114357432A (en) | 2021-12-31 | 2021-12-31 | Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114357432A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114979230A (en) * | 2022-05-26 | 2022-08-30 | 重庆长安汽车股份有限公司 | Vehicle-mounted terminal remote debugging system and method |
CN117319085A (en) * | 2023-11-28 | 2023-12-29 | 深圳市蓝鲸智联科技股份有限公司 | Method for starting ADB of vehicle-mounted information entertainment system and authentication device |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104978248A (en) * | 2014-10-15 | 2015-10-14 | 武汉安天信息技术有限责任公司 | Method and system for remotely managing mobile terminal APP on basis of ADB |
CN105048610A (en) * | 2015-08-11 | 2015-11-11 | 奇瑞汽车股份有限公司 | Remote charging control system and control method |
CN105491084A (en) * | 2014-09-16 | 2016-04-13 | 钛马信息网络技术有限公司 | IOV (Internet of vehicles) system based on OTA protocol, and control method therefor |
CN106210047A (en) * | 2016-07-11 | 2016-12-07 | 北京长安汽车工程技术研究有限责任公司 | A kind of vehicle information management method, system and car networked system |
CN107360175A (en) * | 2017-07-28 | 2017-11-17 | 广州亿程交通信息有限公司 | Car networking control car safety method |
CN107483526A (en) * | 2016-12-23 | 2017-12-15 | 宝沃汽车(中国)有限公司 | Car networking system and its control method |
WO2019114578A1 (en) * | 2017-12-15 | 2019-06-20 | 蔚来汽车有限公司 | Method for generating and using virtual key of vehicle, system for same, and user terminal |
CN109936497A (en) * | 2017-12-15 | 2019-06-25 | 蔚来汽车有限公司 | A kind of vehicle-mounted instant communication method and vehicle-mounted instant communicating system |
CN111711652A (en) * | 2020-04-28 | 2020-09-25 | 江西江铃集团新能源汽车有限公司 | Vehicle remote control method, system, readable storage medium and device |
CN111949954A (en) * | 2020-07-10 | 2020-11-17 | 深圳市信锐网科技术有限公司 | Login verification method, system and computer storage medium |
CN112037379A (en) * | 2020-08-31 | 2020-12-04 | 东风商用车有限公司 | Remote vehicle door control system |
CN112256299A (en) * | 2020-10-16 | 2021-01-22 | 中国第一汽车股份有限公司 | Upgrading method, device, equipment and storage medium |
US20210291985A1 (en) * | 2020-03-23 | 2021-09-23 | Panasonic Avionics Corporation | Systems and methods for modifying control of a device within a vehicle |
CN114461289A (en) * | 2022-02-21 | 2022-05-10 | 重庆长安汽车股份有限公司 | Method and system for remotely starting ADB tool of vehicle-mounted information entertainment system |
-
2021
- 2021-12-31 CN CN202111678306.9A patent/CN114357432A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105491084A (en) * | 2014-09-16 | 2016-04-13 | 钛马信息网络技术有限公司 | IOV (Internet of vehicles) system based on OTA protocol, and control method therefor |
CN104978248A (en) * | 2014-10-15 | 2015-10-14 | 武汉安天信息技术有限责任公司 | Method and system for remotely managing mobile terminal APP on basis of ADB |
CN105048610A (en) * | 2015-08-11 | 2015-11-11 | 奇瑞汽车股份有限公司 | Remote charging control system and control method |
CN106210047A (en) * | 2016-07-11 | 2016-12-07 | 北京长安汽车工程技术研究有限责任公司 | A kind of vehicle information management method, system and car networked system |
CN107483526A (en) * | 2016-12-23 | 2017-12-15 | 宝沃汽车(中国)有限公司 | Car networking system and its control method |
CN107360175A (en) * | 2017-07-28 | 2017-11-17 | 广州亿程交通信息有限公司 | Car networking control car safety method |
WO2019114578A1 (en) * | 2017-12-15 | 2019-06-20 | 蔚来汽车有限公司 | Method for generating and using virtual key of vehicle, system for same, and user terminal |
CN109936497A (en) * | 2017-12-15 | 2019-06-25 | 蔚来汽车有限公司 | A kind of vehicle-mounted instant communication method and vehicle-mounted instant communicating system |
US20210291985A1 (en) * | 2020-03-23 | 2021-09-23 | Panasonic Avionics Corporation | Systems and methods for modifying control of a device within a vehicle |
CN111711652A (en) * | 2020-04-28 | 2020-09-25 | 江西江铃集团新能源汽车有限公司 | Vehicle remote control method, system, readable storage medium and device |
CN111949954A (en) * | 2020-07-10 | 2020-11-17 | 深圳市信锐网科技术有限公司 | Login verification method, system and computer storage medium |
CN112037379A (en) * | 2020-08-31 | 2020-12-04 | 东风商用车有限公司 | Remote vehicle door control system |
CN112256299A (en) * | 2020-10-16 | 2021-01-22 | 中国第一汽车股份有限公司 | Upgrading method, device, equipment and storage medium |
CN114461289A (en) * | 2022-02-21 | 2022-05-10 | 重庆长安汽车股份有限公司 | Method and system for remotely starting ADB tool of vehicle-mounted information entertainment system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114979230A (en) * | 2022-05-26 | 2022-08-30 | 重庆长安汽车股份有限公司 | Vehicle-mounted terminal remote debugging system and method |
CN114979230B (en) * | 2022-05-26 | 2024-02-02 | 重庆长安汽车股份有限公司 | Remote debugging system and method for vehicle-mounted terminal |
CN117319085A (en) * | 2023-11-28 | 2023-12-29 | 深圳市蓝鲸智联科技股份有限公司 | Method for starting ADB of vehicle-mounted information entertainment system and authentication device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111194028B (en) | Safety control method based on vehicle | |
EP3365825B1 (en) | Secure access control to an embedded device through a networked computer | |
CN114357432A (en) | Method, system, equipment and storage medium for preventing vehicle ADB from being maliciously used | |
US20170295018A1 (en) | System and method for securing privileged access to an electronic device | |
WO2017167188A1 (en) | Secure communication method and apparatus for vehicle, multimedia system for vehicle, and vehicle | |
KR20010075411A (en) | Adapter having secure function and computer secure system using it | |
CN109714171B (en) | Safety protection method, device, equipment and medium | |
KR20060077444A (en) | User authentication method and system being in home network | |
CN109088848A (en) | A kind of intelligent network connection automobile information method for security protection | |
CN105187442A (en) | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system | |
CN110222485B (en) | Industrial control white list management system and method based on SGX software protection extended instruction | |
CN112055344A (en) | Engineering machinery Bluetooth equipment identity authentication system and method | |
CN109547402B (en) | Data protection method and device, electronic equipment and readable storage medium | |
CN105325021B (en) | Method and apparatus for remote portable wireless device authentication | |
CN111147740B (en) | Method and device for controlling intelligent camera | |
US8132021B2 (en) | Information processing apparatus, control method therefor and computer-readable storage medium | |
EP3472719A1 (en) | Method and apparatus of implementing a vpn tunnel | |
CN111611620B (en) | Access request processing method and related device of access platform | |
CN114333113B (en) | Bluetooth key shortcut control method based on negative one screen and computer readable storage medium | |
US20160036590A1 (en) | Methods and systems for controlling medical device usage | |
CN109359450B (en) | Security access method, device, equipment and storage medium of Linux system | |
CN104852904B (en) | A kind of Server remote method for restarting applied based on cell phone application and Encrypted short message ceases | |
CN114157489B (en) | Communication domain controller safety communication method based on periodic authentication handshake mechanism | |
JP2022178229A (en) | Vehicle control device, vehicle, vehicle control method and program | |
CN113641535A (en) | Data backup system, data backup method, electronic device, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |