CN115174645A - Automobile OTA (over the air) vehicle cloud interaction method and system - Google Patents

Automobile OTA (over the air) vehicle cloud interaction method and system Download PDF

Info

Publication number
CN115174645A
CN115174645A CN202210768503.8A CN202210768503A CN115174645A CN 115174645 A CN115174645 A CN 115174645A CN 202210768503 A CN202210768503 A CN 202210768503A CN 115174645 A CN115174645 A CN 115174645A
Authority
CN
China
Prior art keywords
signature
result
data
rule
processed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210768503.8A
Other languages
Chinese (zh)
Other versions
CN115174645B (en
Inventor
谢明维
吕国伟
杨建英
易迪华
梁海强
代康伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Electric Vehicle Co Ltd
Original Assignee
Beijing Electric Vehicle Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Electric Vehicle Co Ltd filed Critical Beijing Electric Vehicle Co Ltd
Priority to CN202210768503.8A priority Critical patent/CN115174645B/en
Publication of CN115174645A publication Critical patent/CN115174645A/en
Application granted granted Critical
Publication of CN115174645B publication Critical patent/CN115174645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an automobile OTA (over the air) automobile cloud interaction method and an automobile OTA automobile cloud interaction system, which are applied to the technical field of automobile mobile communication, and the method comprises the following steps: and performing format encapsulation processing on the data to be processed by acquiring the data to be processed to acquire an encapsulation processing result. And performing package processing result algorithm signature through the signature rule to obtain a signature result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching a secret key according to the interface type of the data to be processed, encrypting the second packaging processing result through an encryption algorithm based on the secret key, and converting the encryption result into a character string. And sending the character string to the OTA platform of the automobile, verifying data returned by the OTA platform, and finishing OTA automobile cloud interaction of the data to be processed after verification is finished, so that the safety of the automobile cloud interaction data is ensured. The method solves the technical problem that the vehicle cloud interaction system has poor use universality and low safety due to the fact that the vehicle cloud interaction protocol is developed in a customized mode in the prior art.

Description

Automobile OTA (over the air) vehicle cloud interaction method and system
Technical Field
The application relates to the technical field of automobile mobile communication, in particular to an automobile OTA (over the air) automobile cloud interaction method and system.
Background
With the popularization of automobile intellectualization, networking, electromotion and sharing, the application of software in the automobile is more and more, and faults caused by software problems are increased while good product experience is provided for an automobile owner. Under the background, the use of an Over-the-Air Technology (OTA for short) is increasingly important, and when a vehicle has a software failure or the vehicle performs function iteration, the vehicle owner does not need to drive the vehicle to a maintenance shop, and can complete upgrading only by performing simple operation in the vehicle. Not only saves the cost of automobile manufacturers, but also greatly improves the user experience.
However, in the prior art, the OTA technology vehicle cloud interaction protocol is developed in a customized mode, and the vehicle cloud interaction protocol adopted by each brand of vehicle type can be used only by the brand of vehicle type. The vehicle cloud interaction protocol is poor in universality, and the vehicle cloud interaction protocol with high universality has the problem of low safety.
Therefore, in the prior art, a vehicle cloud interaction protocol is developed in a customized manner, so that the vehicle cloud interaction system has the technical problems of poor universality and low safety.
Disclosure of Invention
The technical purpose to be achieved by the embodiment of the application is to provide an OTA vehicle cloud interaction method and system, which are used for solving the technical problem that in the prior art, a vehicle cloud interaction protocol is developed in a customized manner, so that the vehicle cloud interaction system is poor in universality and low in safety.
In order to solve the technical problem, an embodiment of the application provides an automobile OTA vehicle cloud interaction method, which includes:
obtaining first data to be processed, and performing encapsulation processing of a first preset format on the first data to be processed to obtain a first encapsulation processing result;
constructing a first signature rule, and performing algorithm signature on the first packaging processing result based on the first signature rule to obtain a first signature result;
packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
matching a first secret key according to the interface type of the first data to be processed, encrypting the second packaging processing result through a preset encryption algorithm based on the first secret key, and converting the encryption result into a first character string in a second preset format;
sending the first character string to an automobile OTA platform to obtain a first response result of the automobile OTA platform, wherein the first response result comprises a verification signature;
decrypting the first response result through the first key to obtain first decrypted data;
signing the first decrypted data based on the first signature rule to obtain a second signature result;
and when the second signature result is consistent with the verification signature data, the signature verification is successful, and the OTA vehicle cloud interaction of the first data to be processed is completed.
Preferably, as in the method above, the constructing a first signature rule further includes:
constructing a sorting rule, wherein the sorting rule is a parameter name American Standard Code for Information Interchange (ASCII) code sorting rule from small to large, and the parameter names are distinguished by case;
constructing a parameter value check rule, wherein the parameter value check rule is a rule for checking a parameter value, and when the parameter value is null or a null character string, the parameter value does not participate in signature;
constructing a format check rule, wherein the format check rule comprises a check rule for files and fields, and does not participate in signature when the files or the fields are identified;
constructing a new field rule, and requesting a message signature to increase the equipment identifier field when the interface request message is not a registration interface;
and constructing the first signature rule according to the sequencing rule, the parameter value check rule, the format check rule and the newly added field rule.
Specifically, the method as described above, where the matching of the first key according to the interface type of the first data to be processed further includes:
judging whether the interface type is a first type interface;
and when the interface type is the first type interface, the second packaging processing result is directly sent to the OTA platform of the automobile without encryption processing.
Further, the method as described above, further comprising:
when the interface type is not the first type interface, judging whether the interface type is a registration interface;
when the interface type is the registration interface, obtaining a first default value;
using the first predetermined value as the first key;
when the interface type is not the registration interface, obtaining a vehicle secret value, and using the vehicle secret value as the first key.
Specifically, the method as described above, further comprising:
when the interface type is not the registration interface, judging whether the vehicle OTA platform successfully receives the first secret key serving as a secret value;
and when the vehicle OTA platform does not successfully receive the first secret key serving as the secret value, prompting exception, and adjusting the first secret key to the first default value.
Preferably, the method as described above, further comprising:
judging whether the first data to be processed is a downloading request;
when the first data to be processed is a downloading request, downloading the file of the OTA platform of the automobile to obtain a first downloading result;
judging whether the first downloading result is successful, when the downloading is successful, calculating the hash value of the first downloading result, comparing the calculated result with the preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Specifically, the method as described above, the obtaining a first signature result, further comprising:
splicing a second character string by using a format corresponding to a Uniform Resource Locator (URL) key value according to the first signature rule;
and performing algorithm signature on the second character string by using a second key to obtain the first signature result.
Another embodiment of the present application further provides an automotive OTA car cloud interaction system, which includes:
the device comprises a first obtaining unit, a second obtaining unit and a processing unit, wherein the first obtaining unit is used for obtaining first data to be processed and packaging the first data to be processed in a first preset format to obtain a first packaging result;
the first constructing unit is used for constructing a first signature rule, and performing algorithm signature on the first packaging processing result based on the first signature rule to obtain a first signature result;
a second obtaining unit, configured to package the first signature result into the first package processing result, and obtain a second package processing result;
the first processing unit is used for matching a first secret key according to the interface type of the first data to be processed, encrypting the second packaging processing result through a preset encryption algorithm based on the first secret key, and converting the encryption result into a first character string in a second preset format;
a third obtaining unit, configured to send the first character string to an automotive OTA platform, and obtain a first response result of the automotive OTA platform, where the first response result includes a verification signature;
a fourth obtaining unit, configured to perform decryption on the first response result through the first key, and obtain first decrypted data;
a fifth obtaining unit, configured to sign the first decrypted data based on the first signature rule, and obtain a second signature result;
and the second processing unit is used for successfully verifying the signature when the second signature result is consistent with the verification signature data, and completing OTA vehicle cloud interaction of the first data to be processed.
Further, the system further comprises:
the device comprises a first construction unit, a second construction unit and a third construction unit, wherein the first construction unit is used for constructing a sorting rule, the sorting rule is a parameter name ASCII code sorting rule from small to large, and the parameter names are distinguished by case;
the second construction unit is used for constructing a parameter value check rule, wherein the parameter value check rule is a rule for checking a parameter value, and when the parameter value is null or a null character string, the parameter value does not participate in signature;
the third construction unit is used for constructing a format check rule, wherein the format check rule comprises a check rule for files and fields, and does not participate in signature when the files or the fields are identified;
the fourth construction unit is used for constructing a new field rule, and when the interface request message is not a registration interface, the signature of the request message is added with the equipment identifier field;
and the fifth construction unit is used for constructing the first signature rule according to the sorting rule, the parameter value check rule, the format check rule and the newly added field rule.
Further, the system further comprises:
the first judging unit is used for judging whether the interface type is a first type interface or not;
and the first sending unit is used for directly sending the second packaging processing result to the OTA platform of the automobile without encryption processing when the interface type is the first type interface.
Further, the system further comprises:
a second judging unit, configured to judge whether the interface type is a registered interface when the interface type is not the first type interface;
a sixth obtaining unit, configured to obtain a first default value when the interface type is the registration interface;
a third processing unit configured to use the first predetermined value as the first key;
a fourth processing unit, configured to obtain a vehicle secret value when the interface type is not the registration interface, and use the vehicle secret value as the first key.
Further, the system further comprises:
a fifth processing unit, configured to determine whether the OTA platform successfully receives the first key as a secret value when the interface type is not the registration interface;
and the sixth processing unit is used for prompting exception and adjusting the first secret key to the first default value when the first secret key which is the secret value is not successfully received by the vehicle OTA platform.
Further, the system further comprises:
a third judging unit, configured to judge whether the first to-be-processed data is a download request;
a seventh obtaining unit, configured to, when the first to-be-processed data is a download request, perform file downloading for the OTA platform of the vehicle, and obtain a first download result;
and the seventh processing unit is used for judging whether the first downloading result is successful, calculating the hash value of the first downloading result when the downloading is successful, comparing the calculated result with the preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Further, the system further comprises:
the eighth processing unit is used for splicing a second character string by using a format corresponding to the URL key value according to the first signature rule;
an eighth obtaining unit, configured to perform algorithm signature on the second character string using a second key, and obtain the first signature result.
Yet another embodiment of the present application further provides an electronic device, including: a processor and a memory, the processor coupled with the memory; the memory is used for storing programs and the processor is used for executing the steps of the method through calling.
Yet another embodiment of the present application also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method as described above.
Compared with the prior art, the vehicle OTA vehicle cloud interaction method and the vehicle OTA vehicle cloud interaction system provided by the embodiment of the application have the following beneficial effects at least:
the method provided by the embodiment of the application obtains the data to be processed, and performs format encapsulation processing on the data to be processed to obtain an encapsulation processing result. And performing first packaging processing result algorithm signature through a first signature rule to obtain a signature result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching a secret key according to the interface type of the data to be processed, encrypting the second packaging processing result through an encryption algorithm based on the secret key, and converting the encryption result into a character string. And sending the character string to the OTA platform of the automobile, verifying data returned by the OTA platform, and completing OTA automobile cloud interaction of the data to be processed after verification is completed. Through various vehicle cloud interaction requirements, the standardized and platform software module of the vehicle cloud protocol is realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved. The technical problem that a vehicle cloud interaction system is poor in universality and low in safety due to the fact that a vehicle cloud interaction protocol is developed in a customized mode in the prior art is solved.
Drawings
Fig. 1 is a schematic flow chart of an automotive OTA car cloud interaction method provided by the present application;
fig. 2 is a schematic flowchart illustrating a process of obtaining a first signature rule in an automotive OTA car cloud interaction method provided by the present application;
fig. 3 is a schematic flowchart illustrating validity checking of a first download result in the vehicle OTA vehicle cloud interaction method provided by the present application;
fig. 4 is a schematic structural diagram of an automotive OTA car cloud interaction system provided in the present application;
fig. 5 is a schematic structural diagram of an exemplary electronic device of the present application.
Detailed Description
To make the technical problems, technical solutions and advantages to be solved by the present application clearer, the following detailed description is made with reference to the accompanying drawings and specific embodiments. In the following description, specific details such as specific configurations and components are provided only to facilitate a thorough understanding of embodiments of the present application. Accordingly, it will be apparent to those skilled in the art that various changes and modifications may be made to the embodiments described herein without departing from the scope and spirit of the present application. In addition, descriptions of well-known functions and constructions are omitted for clarity and conciseness.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
In various embodiments of the present application, it should be understood that the sequence numbers of the following processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter associated objects are in an "or" relationship.
In the embodiments provided herein, it should be understood that "B corresponding to a" means that B is associated with a from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also be determined from a and/or other information.
The application provides an automobile OTA (over the air) automobile cloud interaction method and system, which are used for solving the technical problem that an automobile cloud interaction system is poor in use universality and low in safety due to the fact that an automobile cloud interaction protocol is developed in a customized mode in the prior art.
In view of the above technical problems, the technical solution provided by the present application has the following general idea:
the method provided by the embodiment of the application obtains the data to be processed, and performs format encapsulation processing on the data to be processed to obtain an encapsulation processing result. And performing first packaging processing result algorithm signature through a first signature rule to obtain a signature result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching a secret key according to the interface type of the data to be processed, encrypting the second packaging processing result through an encryption algorithm based on the secret key, and converting the encryption result into a character string. Through various vehicle cloud interaction requirements, the standardized and platform software module of the vehicle cloud protocol is realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved. The method solves the technical problem that the vehicle cloud interaction system has poor use universality and low safety due to the fact that the vehicle cloud interaction protocol is developed in a customized mode in the prior art.
Having described the basic principles of the present application, the technical solutions in the present application will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments of the present application, and the present application is not limited to the exemplary embodiments described herein. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application. It should be further noted that, for the convenience of description, only some but not all of the elements relevant to the present application are shown in the drawings.
Example one
As shown in fig. 1, the application provides an automotive OTA car cloud interaction method, which includes:
s100: obtaining first data to be processed, and performing encapsulation processing of a first preset format on the first data to be processed to obtain a first encapsulation processing result;
s200: constructing a first signature rule, and performing algorithm signature on the first packaging processing result based on the first signature rule to obtain a first signature result;
specifically, the OTA vehicle cloud interaction module is used for communicating with an OTA platform, is composed of a UPC module, a Secure socket Layer (SSL for short) module and different protocol connection libcur modules, and is used for performing data interaction with the OTA platform, achieving a server registration function, reporting a vehicle configuration information function, detecting a new version function, a file downloading function, reporting an upgrade result function, uploading a file function and the like. The UPC module is used for acquiring first data to be processed and processing the first data to be processed, wherein the first data to be processed comprises parameter data which is required to be processed by the functions of realizing a vehicle registration function, acquiring server configuration information, reporting the vehicle configuration information, detecting a new version, downloading a file, reporting an upgrade result, uploading a file and the like. And signing the package in the first preset format of the first package processing result, wherein the package in the first preset format is a data exchange format, preferably a JS Object Notation (JSON) format, and the data processing mode is used as a plaintext to perform signature processing through a first signature rule, wherein the signature processing is not performed when the first to-be-processed data is to realize a file downloading function. The first signature rule is used for signing a plaintext, the UPC encapsulates related data into data in a first preset format, and the SSL module signs the data in the JSON format according to the signature rule to obtain a first signature result. The signature rule comprises a sequencing rule, a parameter value check rule, a format check rule and a newly added field rule to construct the first signature rule, and the first signature rule is used for signing the plaintext.
S300: packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
specifically, the signed first signature result is packaged to the first packaging processing result, and a second packaging processing result is obtained, where the second packaging processing result includes the data format of the first packaging processing result and the first to-be-processed data processed by the data format. By obtaining the second encapsulation processing result, the processing result cannot know what function the processing result is used for implementing, and different processing modes are required for implementing different functions, so that the first encapsulation processing result needs to be judged before obtaining the second encapsulation processing result, and the interface data in the first encapsulation processing result is obtained. The encapsulation of the data processing algorithm is realized through the second encapsulation processing result, and the safety of the data is ensured.
S400: matching a first secret key according to the interface type of the first data to be processed, encrypting the second packaging processing result through a preset encryption algorithm based on the first secret key, and converting the encryption result into a first character string in a second preset format;
specifically, because the first to-be-processed data is used for implementing different functions, different processing manners need to be adopted for implementing the different functions, for example, when the interface type of the first to-be-processed data is an interface request for uploading an upgrade log file and uploading a diagnostic log file, the first to-be-processed data is actually used for implementing a file uploading function, and when the file uploading function is implemented, the file does not need to be encrypted, so that a secret key does not need to be obtained. When the first to-be-processed data is used for realizing other functions except for a file uploading function and a file downloading function, the first to-be-processed data needs to be encrypted, the function needing to be realized is judged according to the interface type of the first to-be-processed data, corresponding key data, namely a first key, is obtained, the first key used for encrypting the registration interface is a default value, a vehicle configuration information function is reported, a new version function is detected, the file downloading function is carried out, an upgrading result function is reported, a key used for uploading the encrypted data of the functional interfaces such as the file function is a vehicle secret value, and the secret value is issued by a server after the registration is successful. And encrypting the second packaging processing result by a preset encryption algorithm (preferably an AES-256 algorithm) according to the first key data, converting the encryption result into a first character string in a second preset format (preferably a BASE64 format), and uploading the first character string to the OTA platform.
S500: sending the first character string to an automobile OTA platform to obtain a first response result of the automobile OTA platform, wherein the first response result comprises a verification signature;
s600: decrypting the first response result through the first key to obtain first decrypted data;
specifically, the encryption result is converted into a first character string in a second preset format and then sent to the automobile OTA platform through the libcurl module, the OTA platform returns corresponding data after receiving the data sent by the libcurl module, and the returned data sent by the OTA platform is the first response result. The first response result comprises verification signature data, and the verification signature data is an OTA platform service signature. Because the returned data of all interfaces of the OTA platform are encrypted, the returned data are decrypted, wherein a first secret key used by the encryption of the registration interface is a default value, and a first secret key used by the encryption of the functional interfaces, such as a vehicle configuration information reporting function, a new version detecting function, a file downloading function, an upgrade result reporting function, a file uploading function and the like, is a vehicle secret value. The OTA platform service end may return data to the vehicle end before the vehicle secret is acquired, for example, the OTA platform service end fails to acquire the secret, and at this time, the first secret key used for encrypting the data returned by the OTA platform service end is a default value. And decrypting the first response result through a first key, wherein the first key is a key matched according to the interface type of the first data to be processed. And decrypting the first response result through the first key to obtain decrypted data.
S700: signing the first decrypted data based on the first signature rule to obtain a second signature result;
s800: and when the second signature result is consistent with the verification signature data, the signature verification is successful, and the OTA vehicle cloud interaction of the first data to be processed is completed.
Specifically, the JSON data in the plaintext in the decrypted data is obtained, and since whether the JSON data is correct or not cannot be determined, signature verification operation is performed, and the JSON data in the plaintext is re-signed according to the first signature rule, so that a signature result, that is, a second signature result, is obtained. And verifying the second signature result and the verification signature data returned by the OTA platform service end, and when the second signature result is consistent with the verification signature data returned by the OTA platform service end, successfully verifying, so that the OTA vehicle cloud interaction of the first data to be processed is completed. Through various vehicle cloud interaction requirements, the standardized and platform software module of the vehicle cloud protocol is realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved.
As shown in fig. 2, the method step S200 provided in the embodiment of the present application includes:
s210: constructing a sorting rule, wherein the sorting rule is a sorting rule of parameter names ASCII codes from small to large, and the parameter names are distinguished by case;
s220: constructing a parameter value check rule, wherein the parameter value check rule is a rule for checking a parameter value, and when the parameter value is null or a null character string, the parameter value does not participate in signature;
s230: constructing a format check rule, wherein the format check rule comprises a check rule for files and fields, and does not participate in signature when the files or the fields are identified;
s240: constructing a new field rule, and requesting a message signature to increase the equipment identifier field when the interface request message is not a registration interface;
s250: and constructing the first signature rule according to the sequencing rule, the parameter value check rule, the format check rule and the newly added field rule.
Specifically, the signature rules include a sort rule, wherein the sort rule arranges parameter name ASCII codes from small to large and distinguishes parameter name cases. And a parameter value checking rule, which is used for checking the validity of the parameter through the parameter value checking rule, for example, checking whether the parameter value is empty or an empty character string, and not participating in signature when the parameter value is empty or an empty character string. And the format checking rule is used for checking the file and the field, and does not participate in signature when the file or the field is identified. And adding a new field rule, wherein the new field rule is used for adding a device identifier field to the signature of the request message when the interface request message is not the registered interface, and the device identifier field represents the device ID. And constructing the first signature rule through the sequencing rule, the parameter value check rule, the format check rule and the newly added field rule, wherein the first signature rule is used for signing the plaintext. And transmitting the signed data to the UPC processing module in a second preset format. And the plaintext is signed by acquiring the signature rule, so that the safety of the data is further improved.
The method provided by the embodiment of the application comprises the following steps of S300:
s310: judging whether the interface type is a first type interface or not;
s320: and when the interface type is the first type interface, the second encapsulation processing result is directly sent to the OTA platform of the automobile based on the libcurl module without encryption processing.
Specifically, before the second encapsulation processing result is obtained, the interface type of the first to-be-processed data is judged, the interface type of the first to-be-processed data is obtained, and when the interface type of the first to-be-processed data is an interface request for uploading an upgrade log file and uploading a diagnosis log file, encryption processing is not performed on the second encapsulation processing result. And at the moment, directly uploading the second encapsulation processing result to the OTA platform through a libcurl module. It is then determined whether it was successful based on the function curl _ easy _ form in libcurl. Wherein libcurl is used for different protocols to connect and communicate with different servers.
The method provided by the embodiment of the application comprises the following steps of S310:
s311: when the interface type is not the first type interface, judging whether the interface type is a registration interface;
s312: when the interface type is the registration interface, obtaining a first default value;
s313: using the first predetermined value as the first key;
s314: when the interface type is not the registration interface, obtaining a vehicle secret value, and using the vehicle secret value as the first key.
Specifically, when the interface type of the first to-be-processed data is not the interface request for uploading the upgrade log file and uploading the diagnostic log file, the second encapsulation processing result needs to be encrypted. The first key used by the encryption of the registration interface is a default value, the vehicle configuration information function is reported, the new version function is detected, the file downloading function, the upgrade result function is reported, the key used by the encryption data of the functional interfaces such as the file function is a vehicle secret value, and the secret value is issued by the server after the successful registration. Therefore, the interface type needs to be determined, and when the interface type is the registered interface, the encryption key used at this time is the agreed first agreed value. The data is encrypted using the first predetermined value as a first key. When the interface type is not the registered interface, the key used when the interface encrypts the data is the vehicle secret value which is issued by the server after the registration is successful, and the vehicle secret value is used as the first key to encrypt the data.
The method provided in the embodiment of the present application includes, in step S311:
s311-1: when the interface type is not the registration interface, judging whether the vehicle OTA platform successfully receives the first secret key serving as a secret value;
s311-2: and when the vehicle OTA platform does not successfully receive the first secret key serving as the secret value, prompting exception, and adjusting the first secret key to the first default value.
Specifically, when the interface type of the first data to be processed is not the registration interface, the key used in the interface encryption of the data under the normal condition is the vehicle secret value, and the secret value is issued by the OTA platform service end after the successful registration, and the vehicle secret value is used as the first key to encrypt the data. Because the OTA platform service end may not obtain the vehicle secret, and the vehicle end still needs to perform data transmission on the vehicle OTA platform, if the OTA platform service end fails to obtain the vehicle secret, the first secret key used for vehicle end data encryption is the encryption secret key agreed when registering the interface, that is, the first agreed value.
As shown in fig. 3, step S400 of the method provided in the embodiment of the present application includes:
s410: judging whether the first data to be processed is a downloading request;
s420: when the first data to be processed is a downloading request, downloading the file of the automobile OTA platform to obtain a first downloading result;
s430: judging whether the first downloading result is successful, when the downloading is successful, calculating the hash value of the first downloading result, comparing the calculated result with the preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Specifically, it is determined whether the first data to be processed is a download request, that is, whether the first data to be processed is data implementing a file download function is determined, and when the first data to be processed is data implementing the file download function, that is, a download request. And downloading the file of the OTA platform of the automobile through a libcurl module to obtain a first downloading result, wherein the first downloading result is file data downloaded through the libcurl module. And then judging whether the file is successful or not through a libcur function curl _ easy _ form, judging whether the downloaded file is valid or not after the downloading is finished, comparing the HASH value (HASH) of the downloaded file with a file HASH value contained in the downloaded file, namely a preset HASH value, and judging that the file is a valid file when the HASH value of the downloaded file is calculated to be the same as the file HASH value contained in the downloaded file. The hash value is calculated according to the size, time, type, creation, machine, etc. of the file, and the validity of the downloaded file is judged. The safety of the vehicle cloud protocol is further improved by judging the effectiveness of the downloaded file.
The method provided by the embodiment of the application comprises the following steps of S200:
s260: splicing a second character string by using a format corresponding to a URL key value according to the first signature rule;
s270: and performing algorithm signature on the second character string by using a second key to obtain the first signature result.
Specifically, the second character string is spliced according to the signature rule using the format of the URL key-value pair (i.e., key1= value1& key2= value2 …). The second character string is the signature content, and then the signature content is encrypted by using a second key to obtain the first signature result. The second key used for encryption at the registration interface is a default value; and a second secret key used by the function of reporting vehicle configuration information, the function of detecting a new version, the function of downloading files, the function of reporting an upgrade result, the function of uploading files and other functional interfaces for encrypting data is a vehicle secret value. The data security is further improved by carrying out key encryption on the signature content.
To sum up, the method provided by the embodiment of the present application obtains the data to be processed, performs format encapsulation processing on the data to be processed, and obtains the encapsulation processing result. And performing first packaging processing result algorithm signature through a first signature rule to obtain a signature result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching a secret key according to the interface type of the data to be processed, encrypting the second packaging processing result through an encryption algorithm based on the secret key, and converting the encryption result into a character string. And sending the character string to the vehicle-vehicle cloud interaction platform, verifying data returned by the vehicle-vehicle cloud interaction platform, and completing vehicle-vehicle cloud interaction of the data to be processed after verification is completed, so that the safety of the vehicle-vehicle cloud interaction data is ensured. Through various vehicle cloud interaction requirements, the standardized and platform software module of the vehicle cloud protocol is realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved. The method solves the technical problem that the vehicle cloud interaction system has poor use universality and low safety due to the fact that the vehicle cloud interaction protocol is developed in a customized mode in the prior art.
Example two
Based on the same inventive concept as the car OTA car cloud interaction method in the foregoing embodiment, as shown in fig. 4, the application provides a car OTA car cloud interaction system, which includes:
the first obtaining unit 11 is configured to obtain first data to be processed, and perform encapsulation processing in a first preset format on the first data to be processed to obtain a first encapsulation processing result;
a first constructing unit 12, configured to construct a first signature rule, perform algorithm signature on the first encapsulation processing result based on the first signature rule, and obtain a first signature result;
a second obtaining unit 13, configured to package the first signature result into the first package processing result, and obtain a second package processing result;
the first processing unit 14 is configured to match a first key according to the interface type of the first to-be-processed data, encrypt the second encapsulation processing result by using a preset encryption algorithm based on the first key, and convert the encryption result into a first character string in a second preset format;
a third obtaining unit 15, configured to send the first character string to the car OTA platform, and obtain a first response result of the car OTA platform, where the first response result includes a verification signature;
a fourth obtaining unit 16, configured to perform decryption on the first response result through the first key, so as to obtain first decrypted data;
a fifth obtaining unit 17, configured to sign the first decrypted data based on the first signature rule, so as to obtain a second signature result;
and the second processing unit 18 is configured to, when the second signature result is consistent with the verification signature data, successfully verify the signature, and complete OTA vehicle cloud interaction of the first data to be processed.
Further, the system further comprises:
the device comprises a first construction unit, a second construction unit and a third construction unit, wherein the first construction unit is used for constructing a sorting rule, the sorting rule is a parameter name ASCII code sorting rule from small to large, and the parameter names are distinguished by case;
the second construction unit is used for constructing a parameter value check rule, wherein the parameter value check rule is a rule for checking a parameter value, and when the parameter value is null or a null character string, the parameter value does not participate in signature;
the third construction unit is used for constructing a format check rule, wherein the format check rule comprises a check rule for files and fields, and does not participate in signature when the files or the fields are identified;
the fourth construction unit is used for constructing a new field rule, and when the interface request message is not a registration interface, the signature of the request message is added with the equipment identifier field;
and the fifth construction unit is used for constructing the first signature rule according to the sorting rule, the parameter value check rule, the format check rule and the newly added field rule.
Further, the system further comprises:
the first judging unit is used for judging whether the interface type is a first type interface or not;
and the first sending unit is used for directly sending the second packaging processing result to the OTA platform of the automobile without encryption processing when the interface type is the first type interface.
Further, the system further comprises:
a second judging unit, configured to judge whether the interface type is a registered interface when the interface type is not the first type interface;
a sixth obtaining unit, configured to obtain a first default value when the interface type is the registration interface;
a third processing unit configured to use the first predetermined value as the first key;
a fourth processing unit, configured to obtain a vehicle secret value when the interface type is not the registration interface, and use the vehicle secret value as the first key.
Further, the system further comprises:
a fifth processing unit, configured to determine whether the OTA platform successfully receives the first key as a secret value when the interface type is not the registration interface;
and the sixth processing unit is used for prompting exception and adjusting the first secret key to the first default value when the first secret key which is the secret value is not successfully received by the vehicle OTA platform.
Further, the system further comprises:
a third judging unit, configured to judge whether the first to-be-processed data is a download request;
a seventh obtaining unit, configured to, when the first to-be-processed data is a download request, perform file downloading for the OTA platform of the vehicle, and obtain a first download result;
and the seventh processing unit is used for judging whether the first downloading result is successful, calculating the hash value of the first downloading result when the downloading is successful, comparing the calculated result with the preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Further, the system further comprises:
the eighth processing unit is used for splicing a second character string by using a format corresponding to the URL key value according to the first signature rule;
an eighth obtaining unit, configured to perform algorithm signature on the second character string using a second key, and obtain the first signature result.
EXAMPLE III
Based on the same inventive concept as the car OTA car cloud interaction method in the foregoing embodiment, the present application further provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the method in the first embodiment.
Exemplary electronic device
The electronic device of the present application is described below with reference to fig. 5.
Based on the same inventive concept as the car OTA car cloud interaction method in the foregoing embodiment, the application also provides an electronic device, including: a processor and a memory, the processor coupled with the memory; the memory is used for storing programs, and the processor is used for executing the steps of the method in the embodiment one through calling.
The electronic device 300 includes: processor 302, communication interface 303, memory 301. Optionally, the electronic device 300 may also include a bus architecture 304. Wherein, the communication interface 303, the processor 302 and the memory 301 may be connected to each other through a bus architecture 304; the bus architecture 304 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus architecture 304 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus.
Processor 302 may be a CPU, microprocessor, ASIC, or one or more integrated circuits configured to control the execution of the programs of the present application.
The communication interface 303 is a system using any transceiver or the like, and is used for communicating with other devices or communication networks, such as ethernet, radio Access Network (RAN), wireless Local Area Network (WLAN), wired access network, and the like.
The memory 301 may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an Electrically Erasable Programmable Read Only Memory (EEPROM), a compact disc read only memory (CD ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be self-contained and coupled to the processor through a bus architecture 304. The memory may also be integral to the processor.
The memory 301 is used for storing computer-executable instructions for implementing the present application, and is controlled by the processor 302 to execute. The processor 302 is configured to execute the computer execution instructions stored in the memory 301, so as to implement the car OTA car cloud interaction method provided by the above embodiments of the present application.
Those of ordinary skill in the art will understand that: the various numbers of the first, second, etc. mentioned in this application are for convenience of description and are not intended to limit the scope of this application nor to indicate the order of precedence. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, a and/or B, which may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one" means one or more. At least two means two or more. "at least one," "any," or similar expressions refer to any combination of these items, including any combination of singular or plural items. For example, at least one (one ) of a, b, or c, may represent: a, b, c, ab, ac, bc, or abc, wherein a, b, and c may be single or plural.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the present application are generated, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable system. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device including one or more available media integrated servers, data centers, and the like. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
The various illustrative logical units and circuits described in this application may be implemented or operated through the design of a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic system, discrete gate or transistor logic, discrete hardware components, or any combination thereof. A general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing systems, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in this application may be embodied directly in hardware, in a software element executed by a processor, or in a combination of the two. The software cells may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be disposed in a terminal. In the alternative, the processor and the storage medium may reside as discrete components in a terminal. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Further, the present application may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion.
While the foregoing is directed to the preferred embodiment of the present application, it will be appreciated by those skilled in the art that various changes and modifications may be made therein without departing from the principles of the application, and it is intended that such changes and modifications be covered by the appended claims.

Claims (10)

1. An automobile OTA (over the air) automobile cloud interaction method is characterized by comprising the following steps:
obtaining first data to be processed, and performing encapsulation processing of a first preset format on the first data to be processed to obtain a first encapsulation processing result;
constructing a first signature rule, and performing algorithm signature on the first packaging processing result based on the first signature rule to obtain a first signature result;
packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
matching a first secret key according to the interface type of the first data to be processed, encrypting the second packaging processing result through a preset encryption algorithm based on the first secret key, and converting the encryption result into a first character string in a second preset format;
sending the first character string to an automobile OTA platform to obtain a first response result of the automobile OTA platform, wherein the first response result comprises a verification signature;
decrypting the first response result through the first key to obtain first decrypted data;
signing the first decrypted data based on the first signature rule to obtain a second signature result;
and when the second signature result is consistent with the verification signature data, the signature verification is successful, and the OTA vehicle cloud interaction of the first data to be processed is completed.
2. The method of claim 1, wherein the constructing the first signature rule further comprises:
constructing a sorting rule, wherein the sorting rule is a parameter name American Standard Code for Information Interchange (ASCII) code sorting rule from small to large, and the parameter names are distinguished from case to case;
constructing a parameter value check rule, wherein the parameter value check rule is a rule for checking a parameter value, and when the parameter value is empty or an empty character string, the parameter value check rule does not participate in signature;
constructing a format check rule, wherein the format check rule comprises a check rule for files and fields, and does not participate in signature when the files or the fields are identified;
constructing a new field rule, and requesting a message signature to increase the equipment identifier field when the interface request message is not a registration interface;
and constructing the first signature rule according to the sequencing rule, the parameter value check rule, the format check rule and the newly added field rule.
3. The method of claim 1, wherein the matching a first key according to the interface type of the first data to be processed further comprises:
judging whether the interface type is a first type interface or not;
and when the interface type is the first type interface, the encryption processing is not carried out, and the second packaging processing result is directly sent to the OTA platform.
4. The method of claim 3, further comprising:
when the interface type is not the first type interface, judging whether the interface type is a registration interface;
when the interface type is the registration interface, obtaining a first default value;
using the first predetermined value as the first key;
when the interface type is not the registration interface, obtaining a vehicle secret value, and using the vehicle secret value as the first key.
5. The method of claim 4, wherein the method further comprises:
when the interface type is not the registration interface, judging whether the vehicle OTA platform successfully receives the first secret key serving as a secret value;
and when the vehicle OTA platform does not successfully receive the first secret key serving as the secret value, prompting exception, and adjusting the first secret key to the first default value.
6. The method of claim 1, wherein the method further comprises:
judging whether the first data to be processed is a downloading request;
when the first data to be processed is a downloading request, downloading the file of the OTA platform of the automobile to obtain a first downloading result;
judging whether the first downloading result is successful, when the downloading is successful, calculating the hash value of the first downloading result, comparing the calculated result with the preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
7. The method of claim 1, wherein the obtaining the first signature result further comprises:
splicing a second character string by using a format corresponding to a Uniform Resource Locator (URL) key value according to the first signature rule;
and performing algorithm signature on the second character string by using a second key to obtain the first signature result.
8. An automotive OTA car cloud interaction system, the system comprising:
the device comprises a first obtaining unit, a second obtaining unit and a processing unit, wherein the first obtaining unit is used for obtaining first data to be processed and packaging the first data to be processed in a first preset format to obtain a first packaging processing result;
the first constructing unit is used for constructing a first signature rule, and performing algorithm signature on the first packaging processing result based on the first signature rule to obtain a first signature result;
a second obtaining unit, configured to package the first signature result into the first package processing result, and obtain a second package processing result;
the first processing unit is used for matching a first secret key according to the interface type of the first data to be processed, encrypting the second packaging processing result through a preset encryption algorithm based on the first secret key, and converting the encryption result into a first character string in a second preset format;
a third obtaining unit, configured to send the first character string to an automotive OTA platform, and obtain a first response result of the automotive OTA platform, where the first response result includes a verification signature;
a fourth obtaining unit, configured to perform decryption on the first response result through the first key, and obtain first decrypted data;
a fifth obtaining unit, configured to sign the first decrypted data based on the first signature rule, and obtain a second signature result;
and the second processing unit is used for successfully verifying the signature when the second signature result is consistent with the verification signature data, and completing OTA vehicle cloud interaction of the first data to be processed.
9. An electronic device, comprising: a processor and a memory, the processor coupled with the memory; the memory is used for storing programs and the processor is used for executing the steps of the method according to any one of claims 1 to 7 through calling.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202210768503.8A 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system Active CN115174645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210768503.8A CN115174645B (en) 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210768503.8A CN115174645B (en) 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system

Publications (2)

Publication Number Publication Date
CN115174645A true CN115174645A (en) 2022-10-11
CN115174645B CN115174645B (en) 2024-03-26

Family

ID=83489970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210768503.8A Active CN115174645B (en) 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system

Country Status (1)

Country Link
CN (1) CN115174645B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117478708A (en) * 2023-12-28 2024-01-30 中汽智联技术有限公司 Intelligent networking automobile asset fingerprint generation and identification method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080147268A1 (en) * 2006-12-14 2008-06-19 Fuller Michael G Method and apparatus for alternative performance of automobile features
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
WO2017030517A1 (en) * 2015-08-18 2017-02-23 Idea Teknoloji Cozumleri Bilgisayar Sanayi Ve Ticaret Anonim Sirketi Safe e-document synchronisation, analysis and management system
CN108235152A (en) * 2018-03-07 2018-06-29 北京视博数字电视科技有限公司 The transmission method of DRM application systems and DRM private datas
CN111629002A (en) * 2020-05-28 2020-09-04 爱瑟福信息科技(上海)有限公司 OTA (over the air) safety upgrading method and system of vehicle ECU (electronic control Unit)
US20210044435A1 (en) * 2018-03-19 2021-02-11 Psa Automobiles Sa Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel
CN112882750A (en) * 2021-03-23 2021-06-01 东软睿驰汽车技术(沈阳)有限公司 OTA upgrade package processing method and device and electronic equipment
US20210367930A1 (en) * 2020-05-19 2021-11-25 Continental Teves Ag & Co . Ohg Method of and system for secure data export from an automotive engine control unit
CN114327532A (en) * 2021-10-11 2022-04-12 浙江零跑科技股份有限公司 Automobile OTA (over the air) upgrade information security implementation method based on digital signature and encryption

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080147268A1 (en) * 2006-12-14 2008-06-19 Fuller Michael G Method and apparatus for alternative performance of automobile features
WO2017030517A1 (en) * 2015-08-18 2017-02-23 Idea Teknoloji Cozumleri Bilgisayar Sanayi Ve Ticaret Anonim Sirketi Safe e-document synchronisation, analysis and management system
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN108235152A (en) * 2018-03-07 2018-06-29 北京视博数字电视科技有限公司 The transmission method of DRM application systems and DRM private datas
US20210044435A1 (en) * 2018-03-19 2021-02-11 Psa Automobiles Sa Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel
US20210367930A1 (en) * 2020-05-19 2021-11-25 Continental Teves Ag & Co . Ohg Method of and system for secure data export from an automotive engine control unit
CN111629002A (en) * 2020-05-28 2020-09-04 爱瑟福信息科技(上海)有限公司 OTA (over the air) safety upgrading method and system of vehicle ECU (electronic control Unit)
CN112882750A (en) * 2021-03-23 2021-06-01 东软睿驰汽车技术(沈阳)有限公司 OTA upgrade package processing method and device and electronic equipment
CN114327532A (en) * 2021-10-11 2022-04-12 浙江零跑科技股份有限公司 Automobile OTA (over the air) upgrade information security implementation method based on digital signature and encryption

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117478708A (en) * 2023-12-28 2024-01-30 中汽智联技术有限公司 Intelligent networking automobile asset fingerprint generation and identification method and system
CN117478708B (en) * 2023-12-28 2024-04-09 中汽智联技术有限公司 Intelligent networking automobile asset fingerprint generation and identification method and system

Also Published As

Publication number Publication date
CN115174645B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
CN110555029B (en) Ticket management method, device and storage medium based on block chain
CN110086755B (en) Method for realizing service of Internet of things, application server, Internet of things equipment and medium
EP3337219A1 (en) Carrier configuration processing method, device and system, and computer storage medium
JP2019524016A (en) Methods for managing the status of connected devices
CN111263352A (en) OTA (over the air) upgrading method and system of vehicle-mounted equipment, storage medium and vehicle-mounted equipment
CN109039654B (en) TBOX identity authentication method and terminal equipment
CN103677892A (en) Authorization scheme to enable special privilege mode in secure electronic control unit
CN103679005A (en) Method to enable development mode of a secure electronic control unit
CN111614731B (en) Method and system for accessing block chain to Internet of things equipment, aggregation gateway and storage medium
CN107682376B (en) Wind control data interaction method and device
CN112632573A (en) Intelligent contract execution method, device and system, storage medium and electronic equipment
CN111565179A (en) Identity verification method and device, electronic equipment and storage medium
CN115174645B (en) Automobile OTA cloud interaction method and system
CN113259910B (en) Activation method and device for vehicle-mounted networking equipment
CN112887199B (en) Gateway, cloud platform, configuration method and device thereof, and computer-readable storage medium
CN114329358A (en) Application signature method and system, transaction terminal and service platform
CN114125812A (en) Data synchronization method, device, server and storage medium
CN111050326B (en) Block chain-based short message verification method, device, equipment and medium
CN109699030B (en) Unmanned aerial vehicle authentication method, device, equipment and computer readable storage medium
CN112804284A (en) Data chaining device, data verification device and data verification method
CN115549984A (en) Cross-chain transaction method, device, equipment and storage medium
CN111459899B (en) Log sharing method and device and terminal equipment
CN114390478A (en) Equipment authentication system, method and terminal equipment
CN114422586A (en) Event notification method and device, computer equipment and storage medium
CN113709849A (en) Network access method and device of equipment to be accessed to network, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant