CN115174645B - Automobile OTA cloud interaction method and system - Google Patents

Automobile OTA cloud interaction method and system Download PDF

Info

Publication number
CN115174645B
CN115174645B CN202210768503.8A CN202210768503A CN115174645B CN 115174645 B CN115174645 B CN 115174645B CN 202210768503 A CN202210768503 A CN 202210768503A CN 115174645 B CN115174645 B CN 115174645B
Authority
CN
China
Prior art keywords
result
data
signature
rule
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210768503.8A
Other languages
Chinese (zh)
Other versions
CN115174645A (en
Inventor
谢明维
吕国伟
杨建英
易迪华
梁海强
代康伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Electric Vehicle Co Ltd
Original Assignee
Beijing Electric Vehicle Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Electric Vehicle Co Ltd filed Critical Beijing Electric Vehicle Co Ltd
Priority to CN202210768503.8A priority Critical patent/CN115174645B/en
Publication of CN115174645A publication Critical patent/CN115174645A/en
Application granted granted Critical
Publication of CN115174645B publication Critical patent/CN115174645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an automobile OTA cloud interaction method and system, which are applied to the technical field of automobile mobile communication, and the method comprises the following steps: and carrying out format encapsulation processing on the data to be processed by acquiring the data to be processed, and acquiring an encapsulation processing result. And carrying out package processing result algorithm signing through a signing rule to obtain a signing result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching the key according to the interface type of the data to be processed, encrypting the second encapsulation processing result through an encryption algorithm based on the key, and converting the encryption result into a character string. And sending the character string to an automobile OTA platform, verifying the data returned by the OTA platform, and completing OTA-cloud interaction of the data to be processed after the verification is completed, so that the safety of vehicle-cloud interaction data is ensured. The technical problem that in the prior art, a vehicle cloud interaction protocol is developed in a customized mode, so that the vehicle cloud interaction system is poor in use universality and low in safety is solved.

Description

Automobile OTA cloud interaction method and system
Technical Field
The application relates to the technical field of automobile mobile communication, in particular to an automobile OTA cloud interaction method and system.
Background
With the popularization of automobile intellectualization, networking, electric and sharing, the application of software in automobiles is increasing, and faults caused by software problems are increasing while providing good product experience for automobile owners. Under the background, the use of the automobile space downloading Technology (OTA for short) is increasingly important, and when a software fault occurs in a vehicle or the vehicle performs function iteration, an automobile owner does not need to drive the vehicle to a maintenance shop, and only simple operation is performed in the vehicle to finish upgrading. Not only saving the expense of car manufacturer, but also greatly improving user experience simultaneously.
However, in the prior art, the OTA technical vehicle-cloud interaction protocol is developed in a customized manner, and the vehicle-cloud interaction protocol adopted by each brand of vehicle type can be used only by the brand of vehicle type. The vehicle cloud interaction protocol has poor universality, and the vehicle cloud interaction protocol with high universality has the problem of low safety.
Therefore, in the prior art, the vehicle cloud interaction protocol is developed in a customized mode, so that the technical problem of poor use universality and low safety of the vehicle cloud interaction system is caused.
Disclosure of Invention
The technical aim to be achieved by the embodiment of the application is to provide an automobile OTA automobile cloud interaction method and system, which are used for solving the technical problems that in the prior art, an automobile cloud interaction protocol is developed in a customized mode, so that the automobile cloud interaction system is poor in use universality and low in safety.
In order to solve the technical problems, an embodiment of the present application provides an automobile OTA cloud interaction method, where the method includes:
obtaining first data to be processed, and carrying out packaging processing of a first preset format on the first data to be processed to obtain a first packaging processing result;
constructing a first signature rule, carrying out algorithm signature on the first packaging processing result based on the first signature rule, and obtaining a first signature result;
packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
matching a first key according to the interface type of the first data to be processed, encrypting the second encapsulation processing result through a preset encryption algorithm based on the first key, and converting the encryption result into a first character string in a second preset format;
the first character string is sent to an automobile OTA platform, and a first response result of the automobile OTA platform is obtained, wherein the first response result comprises a verification signature;
decrypting the first response result through the first secret key to obtain first decrypted data;
signing the first decrypted data based on the first signing rule to obtain a second signing result;
And when the second signature result is consistent with the verification signature data, the signature verification is successful, and OTA cloud interaction of the first data to be processed is completed.
Preferably, the method as described above, the constructing a first signature rule further includes:
constructing an ordering rule, wherein the ordering rule is an ordering rule from small to large of ASCII codes of American information exchange standard codes of parameter names, and the parameter names are distinguished in case and case;
constructing a parameter value checking rule, wherein the parameter value checking rule is a rule for checking the parameter value, and the signature is not participated when the parameter value is null or null character string;
constructing a format check rule, wherein the format check rule comprises a check rule for performing files and fields, and the files or the fields do not participate in signature when identified as files or fields;
constructing a new field rule, and when the interface request message is not a registered interface, adding a device identifier field to the request message signature;
and constructing the first signature rule according to the ordering rule, the parameter value checking rule, the format checking rule and the newly added field rule.
Specifically, the method as described above, wherein the matching the first key according to the interface type of the first data to be processed further includes:
Judging whether the interface type is a first type interface or not;
and when the interface type is the first type interface, directly sending the second encapsulation processing result to an automobile OTA platform without encryption processing.
Further, the method as described above, the method further comprising:
when the interface type is not the first type interface, judging whether the interface type is a registered interface or not;
when the interface type is the registered interface, a first default value is obtained;
taking the first preset value as the first key;
and when the interface type is not the registration interface, obtaining a vehicle secret value, and taking the vehicle secret value as the first key.
Specifically, the method as described above, the method further comprising:
when the interface type is not the registration interface, judging whether the automobile OTA platform successfully receives the first key serving as a secret value or not;
and prompting abnormality when the automobile OTA platform does not successfully receive the first key as a secret value, and adjusting the first key to the first preset value.
Preferably, the method as described above, the method further comprises:
Judging whether the first data to be processed is a downloading request or not;
when the first data to be processed is a downloading request, downloading the file of the automobile OTA platform to obtain a first downloading result;
judging whether the first downloading result is successful or not, calculating the hash value of the first downloading result when the downloading is successful, comparing the calculated result with a preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Specifically, the method as described above, wherein the obtaining the first signature result further includes:
splicing the first character string into a second character string by using a format corresponding to a Uniform Resource Locator (URL) key value according to the first signature rule;
and carrying out algorithm signature on the second character string by using a second key to obtain the first signature result.
Another embodiment of the present application further provides an automobile OTA cloud interaction system, the system including:
the first obtaining unit is used for obtaining first data to be processed, and carrying out packaging processing of a first preset format on the first data to be processed to obtain a first packaging processing result;
the first construction unit is used for constructing a first signature rule, carrying out algorithm signature on the first packaging processing result based on the first signature rule, and obtaining a first signature result;
The second obtaining unit is used for packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
the first processing unit is used for matching a first key according to the interface type of the first data to be processed, encrypting the second encapsulation processing result through a preset encryption algorithm based on the first key, and converting the encryption result into a first character string in a second preset format;
the third obtaining unit is used for sending the first character string to an automobile OTA platform to obtain a first response result of the automobile OTA platform, wherein the first response result comprises a verification signature;
a fourth obtaining unit, configured to decrypt the first response result by using the first key, to obtain first decrypted data;
a fifth obtaining unit, configured to sign the first decrypted data based on the first signing rule, and obtain a second signing result;
and the second processing unit is used for successfully checking the signature when the second signature result is consistent with the verification signature data, and completing OTA cloud interaction of the first data to be processed.
Further, the system further comprises:
the first construction unit is used for constructing an ordering rule, wherein the ordering rule is an ordering rule of parameter names ASCII codes from small to large, and the parameter names are distinguished in case and case;
The second construction unit is used for constructing a parameter value checking rule, wherein the parameter value checking rule is a rule for checking the parameter value, and the signature is not participated when the parameter value is null or an empty character string;
a third construction unit, configured to construct a format verification rule, where the format verification rule includes a verification rule for performing a file and a field, and does not participate in a signature when the file or the field is identified;
a fourth construction unit, configured to construct a rule of a newly added field, and when the interface request message is not a registration interface, sign the request message to add a device identifier field;
and a fifth construction unit, configured to construct the first signature rule according to the ordering rule, the parameter value checking rule, the format checking rule, and the newly added field rule.
Further, the system further comprises:
the first judging unit is used for judging whether the interface type is a first type interface or not;
and the first sending unit is used for directly sending the second encapsulation processing result to the automobile OTA platform without encryption processing when the interface type is the first type interface.
Further, the system further comprises:
a second judging unit, configured to judge whether the interface type is a registration interface when the interface type is not the first type interface;
A sixth obtaining unit, configured to obtain a first default value when the interface type is the registration interface;
a third processing unit configured to take the first constraint value as the first key;
and the fourth processing unit is used for obtaining a vehicle secret value when the interface type is not the registration interface, and taking the vehicle secret value as the first key.
Further, the system further comprises:
a fifth processing unit, configured to determine whether the first key as a secret value is successfully received by the automobile OTA platform when the interface type is not the registration interface;
and the sixth processing unit is used for prompting abnormality when the first key serving as the secret value is not successfully received by the automobile OTA platform, and adjusting the first key to the first default value.
Further, the system further comprises:
a third judging unit, configured to judge whether the first data to be processed is a download request;
a seventh obtaining unit, configured to, when the first data to be processed is a download request, perform file downloading of the automobile OTA platform, and obtain a first downloading result;
and the seventh processing unit is used for judging whether the first downloading result is successful, calculating the hash value of the first downloading result when the downloading is successful, comparing the calculated result with a preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Further, the system further comprises:
an eighth processing unit, configured to splice, according to the first signature rule, a format corresponding to a URL key value into a second string;
and an eighth obtaining unit, configured to perform an algorithm signature on the second string using a second key, to obtain the first signature result.
Still another embodiment of the present application provides an electronic device, including: a processor and a memory, the processor coupled with the memory; the memory is used for storing a program and the processor is used for executing the steps of the method by calling.
Yet another embodiment of the present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method as described above.
Compared with the prior art, the automobile OTA cloud interaction method and system provided by the embodiment of the application have the following beneficial effects:
the method provided by the embodiment of the application carries out format encapsulation processing on the data to be processed by acquiring the data to be processed, and acquires an encapsulation processing result. And signing by a first encapsulation processing result algorithm through a first signing rule to obtain a signing result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching the key according to the interface type of the data to be processed, encrypting the second encapsulation processing result through an encryption algorithm based on the key, and converting the encryption result into a character string. And sending the character string to an automobile OTA platform, verifying the data returned by the OTA platform, and completing OTA-vehicle-cloud interaction of the data to be processed after the verification is completed. Through various vehicle cloud interaction requirements, standardized and platform software modules of the vehicle cloud protocol are realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved. The technical problem that in the prior art, a vehicle cloud interaction protocol is developed in a customized mode, so that the vehicle cloud interaction system is poor in use universality and low in safety is solved.
Drawings
Fig. 1 is a schematic flow chart of an automobile OTA cloud interaction method provided by the application;
fig. 2 is a schematic flow chart of obtaining a first signature rule in an automobile OTA cloud interaction method provided by the application;
fig. 3 is a schematic flow chart of validity verification of a first downloading result in an automobile OTA cloud interaction method provided by the application;
fig. 4 is a schematic structural diagram of an automobile OTA cloud interaction system provided in the present application;
fig. 5 is a schematic structural diagram of an exemplary electronic device of the present application.
Detailed Description
In order to make the technical problems, technical solutions and advantages to be solved by the present application more apparent, the following detailed description will be given with reference to the accompanying drawings and the specific embodiments. In the following description, specific details such as specific configurations and components are provided merely to facilitate a thorough understanding of embodiments of the present application. It will therefore be apparent to those skilled in the art that various changes and modifications can be made to the embodiments described herein without departing from the scope and spirit of the application. In addition, descriptions of well-known functions and constructions are omitted for clarity and conciseness.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
In various embodiments of the present application, it should be understood that the sequence numbers of the following processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In the examples provided herein, it should be understood that "B corresponding to a" means that B is associated with a from which B may be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information.
The application provides an automobile OTA automobile cloud interaction method and system, which are used for solving the technical problems that in the prior art, an automobile cloud interaction protocol is developed in a customized mode, so that the automobile cloud interaction system is poor in use universality and low in safety.
Aiming at the technical problems, the technical scheme provided by the application has the following overall thought:
the method provided by the embodiment of the application carries out format encapsulation processing on the data to be processed by acquiring the data to be processed, and acquires an encapsulation processing result. And signing by a first encapsulation processing result algorithm through a first signing rule to obtain a signing result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching the key according to the interface type of the data to be processed, encrypting the second encapsulation processing result through an encryption algorithm based on the key, and converting the encryption result into a character string. Through various vehicle cloud interaction requirements, standardized and platform software modules of the vehicle cloud protocol are realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved. The technical problem that in the prior art, a vehicle cloud interaction protocol is developed in a customized mode, so that the vehicle cloud interaction system is poor in use universality and low in safety is solved.
Having introduced the basic principles of the present application, the technical solutions herein will now be clearly and fully described with reference to the accompanying drawings, it being apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments of the present application, and it is to be understood that the present application is not limited by the example embodiments described herein. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application. It should be further noted that, for convenience of description, only some, but not all of the drawings related to the present application are shown.
Example 1
As shown in fig. 1, the present application provides an automobile OTA cloud interaction method, which includes:
s100: obtaining first data to be processed, and carrying out packaging processing of a first preset format on the first data to be processed to obtain a first packaging processing result;
s200: constructing a first signature rule, carrying out algorithm signature on the first packaging processing result based on the first signature rule, and obtaining a first signature result;
specifically, the OTA vehicle-to-cloud interaction module is used for communicating with an OTA platform, and is composed of a UPC module, a secure socket protocol (Secure Sockets Layer, SSL for short) module and a libcur module connected with different protocols, and is used for performing data interaction with the OTA platform, realizing a server registration function, a vehicle configuration information reporting function, a new version detection function, a file downloading function, an upgrading result reporting function, a file uploading function and the like. The UPC module is used for acquiring first data to be processed and processing the first data to be processed, wherein the first data to be processed comprises parameter data which needs to be processed such as a vehicle registration function, a server configuration information acquisition function, a vehicle configuration information reporting function, a new version detection function, a file downloading function, an upgrading result reporting function, a file uploading function and the like. The method comprises the steps of signing a package in a first preset format for processing a first package processing result, wherein the package in the first preset format is a data exchange format, preferably a JS object numbered musical notation (JavaScript Object Notation, JSON) format, and signing the data processing mode serving as a plaintext through a first signing rule, wherein when first data to be processed is a file downloading function, no signing is performed. The first signing rule is used for signing the plaintext, the UPC packages related data into data in a first preset format, and the SSL module signs the data in the JSON format according to the signing rule to obtain a first signing result. The signature rule comprises a sorting rule, a parameter value checking rule, a format checking rule and a newly added field rule, and the first signature rule is constructed and used for signing the plaintext.
S300: packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
specifically, the signed first signature result is packaged to a first packaging processing result, and a second packaging processing result is obtained, wherein the second packaging processing result contains a data form of the first packaging processing result and first data to be processed through the data form. By acquiring the second encapsulation processing result, the processing result cannot know what kind of functions the processing result is used for, and different processing modes are needed to be adopted for realizing different functions, so that the first encapsulation processing result needs to be judged before the second encapsulation processing result is acquired, and interface data in the first encapsulation processing result is acquired. And the encapsulation of the data processing algorithm is realized through the second encapsulation processing result, so that the safety of the data is ensured.
S400: matching a first key according to the interface type of the first data to be processed, encrypting the second encapsulation processing result through a preset encryption algorithm based on the first key, and converting the encryption result into a first character string in a second preset format;
specifically, since the first data to be processed is used for realizing different functions, different processing modes need to be adopted for realizing different functions, for example, when the interface type of the first data to be processed is an upgrade log file uploading interface request and a diagnosis log file uploading interface request, the first data to be processed is actually a file uploading function at this time, and encryption of a file is not needed when the file uploading function is realized, so that a key is not needed to be acquired. When the first data to be processed is other than the file uploading function and the file downloading function, the first data to be processed needs to be encrypted, the function which the first data to be processed needs to realize is judged according to the interface type of the first data to be processed, the corresponding key data, namely the first key, is obtained, wherein the first key used for registering the interface encryption is a default value, a vehicle configuration information function is reported, a new version function is detected, a file downloading function is carried out, an upgrading result function is reported, and the key used for encrypting the data by the functional interfaces such as the file uploading function is a vehicle secret value which is issued by a server after the registration is successful. Encrypting the second encapsulation processing result through a preset encryption algorithm (preferably an AES-256 algorithm) according to the first key data, converting the encryption result into a first character string in a second preset format (preferably a BASE64 format), and uploading the first character string to the automobile OTA platform.
S500: the first character string is sent to an automobile OTA platform, and a first response result of the automobile OTA platform is obtained, wherein the first response result comprises a verification signature;
s600: decrypting the first response result through the first secret key to obtain first decrypted data;
specifically, after the encryption result is converted into a first character string with a second preset format, the first character string is sent to an automobile OTA platform through a libcur module, the OTA platform returns corresponding data after receiving the data sent by the libcur module, and the returned data sent by the OTA platform is the first response result. The first response result contains verification signature data, and the verification signature data is OTA platform business signature. Because the return data of all interfaces of the OTA platform are encrypted, the return data is decrypted, wherein a first key used for encrypting the registered interfaces is a preset value, a vehicle configuration information function is reported, a new version function is detected, a file downloading function is carried out, an upgrading result function is reported, and a first key used for encrypting the data by the functional interfaces such as a file uploading function is a vehicle secret value. The OTA platform server may return data to the vehicle end before the vehicle secret is not acquired, for example, the OTA platform server fails to acquire the secret, and at this time, a first key used for encrypting the data returned by the OTA platform server is an about value. Decrypting the first response result by a first key, wherein the first key is a key matched according to the interface type of the first data to be processed. And decrypting the first response result through the first key to obtain decrypted data.
S700: signing the first decrypted data based on the first signing rule to obtain a second signing result;
s800: and when the second signature result is consistent with the verification signature data, the signature verification is successful, and OTA cloud interaction of the first data to be processed is completed.
Specifically, the JSON data of the plaintext in the decrypted data is obtained, and whether the JSON data is correct or not cannot be determined, so that signature verification operation is required, and the JSON data of the plaintext is subjected to re-signing through a first signing rule, so that a signing result, namely a second signing result, is obtained. And verifying the second signature result and the verification signature data returned by the OTA platform server, and if the second signature result is consistent with the verification signature data returned by the OTA platform server, successful verification is achieved, and OTA vehicle-to-cloud interaction of the first data to be processed is completed. Through various vehicle cloud interaction requirements, standardized and platform software modules of the vehicle cloud protocol are realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved.
As shown in fig. 2, a method step S200 provided in the embodiment of the present application includes:
s210: constructing an ordering rule, wherein the ordering rule is an ordering rule of parameter names ASCII codes from small to large, and the parameter names are distinguished in case and case;
S220: constructing a parameter value checking rule, wherein the parameter value checking rule is a rule for checking the parameter value, and the signature is not participated when the parameter value is null or null character string;
s230: constructing a format check rule, wherein the format check rule comprises a check rule for performing files and fields, and the files or the fields do not participate in signature when identified as files or fields;
s240: constructing a new field rule, and when the interface request message is not a registered interface, adding a device identifier field to the request message signature;
s250: and constructing the first signature rule according to the ordering rule, the parameter value checking rule, the format checking rule and the newly added field rule.
Specifically, the signature rule includes an ordering rule, wherein the ordering rule arranges the parameter names ASCII codes from small to large, and distinguishes the parameter names from small. And the parameter value checking rule is used for checking the validity of the parameter, such as checking whether the parameter value is null or null character string, and the signature is not participated when the parameter value is null or null character string. And the format verification rule is used for verifying the file and the field, and does not participate in signature when the file or the field is identified. And adding a field rule, wherein the field rule is used for adding a device identifier field to the signature of the request message when the interface request message is not a registered interface, and the device identifier field represents a device ID. And constructing the first signature rule by the sorting rule, the parameter value checking rule, the format checking rule and the newly added field rule, wherein the first signature rule is used for signing the plaintext. And transmitting the signed data to the UPC processing module in a second preset format. And the signature rule is acquired to carry out signature processing on the plaintext, so that the safety of the data is further improved.
The method provided by the embodiment of the application comprises the following step S300:
s310: judging whether the interface type is a first type interface or not;
s320: and when the interface type is the first type interface, directly sending the second encapsulation processing result to an automobile OTA platform based on a libcurl module without encryption processing.
Specifically, before the second encapsulation processing result is obtained, judging the interface type of the first data to be processed, obtaining the interface type of the first data to be processed, and when the interface type of the first data to be processed is an upgrade log file uploading and diagnosis log file uploading interface request, not performing encryption processing on the second encapsulation processing result. And at the moment, directly uploading the second encapsulation processing result to the OTA platform through the libcurl module. And then judging whether the function is successful or not based on a function Curl_easy_performance in libcurl. Wherein libcurl is used for connecting and communicating with different servers through different protocols.
The method provided in the embodiment of the present application includes step S310:
s311: when the interface type is not the first type interface, judging whether the interface type is a registered interface or not;
s312: when the interface type is the registered interface, a first default value is obtained;
S313: taking the first preset value as the first key;
s314: and when the interface type is not the registration interface, obtaining a vehicle secret value, and taking the vehicle secret value as the first key.
Specifically, when the interface type of the first data to be processed is not the upgrade log file uploading and the diagnostic log file uploading interface request, encryption processing is needed to be performed on the second encapsulation processing result. Because the first secret key used by the encryption of the registration interface is an appointment value, the function of reporting the vehicle configuration information, the function of detecting a new version, the function of downloading a file, the function of reporting an upgrade result and the like are performed, the secret key used by the function interfaces such as the function of uploading the file and the like when the data are encrypted is a vehicle secret value, and the secret value is issued by a server after the registration is successful. Therefore, it is necessary to determine the interface type, and when the interface type is the registered interface, the encryption key adopted at this time is a first agreed value. The data is encrypted using the first constraint value as a first key. When the interface type is not the registration interface, the key used when the interface encrypts the data is the vehicle secret value which is issued by the server after the registration is successful, and the vehicle secret value is used as the first key to encrypt the data.
The method provided in the embodiment of the present application, step S311 includes:
s311-1: when the interface type is not the registration interface, judging whether the automobile OTA platform successfully receives the first key serving as a secret value or not;
s311-2: and prompting abnormality when the automobile OTA platform does not successfully receive the first key as a secret value, and adjusting the first key to the first preset value.
Specifically, when the interface type of the first data to be processed is not the registration interface, the key used when the interface encrypts the data is a vehicle secret value, the secret value is issued by the OTA platform server after the registration is successful, and the vehicle secret value is used as the first key to encrypt the data. Because the OTA platform server may not obtain the vehicle secret yet, the vehicle end still needs to perform data transmission on the automobile OTA platform, for example, the OTA platform server fails to obtain the vehicle secret, and at this time, the first key used for encrypting the vehicle end data is an encryption key agreed when the vehicle end data is registered with the interface, that is, the first default value.
As shown in fig. 3, a method step S400 provided in the embodiment of the present application includes:
s410: judging whether the first data to be processed is a downloading request or not;
S420: when the first data to be processed is a downloading request, downloading the file of the automobile OTA platform to obtain a first downloading result;
s430: judging whether the first downloading result is successful or not, calculating the hash value of the first downloading result when the downloading is successful, comparing the calculated result with a preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Specifically, whether the first data to be processed is a downloading request or not is judged, namely whether the first data to be processed is data realizing the file downloading function or not is judged, and when the first data to be processed is data realizing the file downloading function, namely the downloading request is judged. And downloading the file of the automobile OTA platform through a libcurl module to obtain a first downloading result, wherein the first downloading result is file data downloaded through the libcurl module. Judging whether the downloaded file is successful or not through a libcurl function curl_easy_performance, after the downloaded file is finished but whether the downloaded file is effective or not can not be determined yet, calculating a HASH value (HASH) of the downloaded file, comparing the HASH value with a file HASH value contained in the downloaded file, namely a preset HASH value, and judging the file to be an effective file when the HASH value of the calculated downloaded file is identical to the file HASH value contained in the downloaded file. The hash value is calculated according to the size, time, type, creation, machine and the like of the file, and the validity of the downloaded file is judged. By judging the validity of the downloaded file, the security of the vehicle cloud protocol is further improved.
The method provided in the embodiment of the application includes the following step S200:
s260: splicing the first character string into a second character string by using a format corresponding to the URL key value according to the first signature rule;
s270: and carrying out algorithm signature on the second character string by using a second key to obtain the first signature result.
Specifically, the format of URL key value pairs (i.e., ke1=value1 & ke2=value2 …) is used to splice into a second string according to the signature rule. The second character string is the signature content, and the signature content is encrypted by using a second key to obtain the first signature result. Wherein the second key used for encryption at the registration interface is a reduced value; and the second key used by the function interfaces such as the vehicle configuration information reporting function, the new version detection function, the file downloading function, the upgrading result reporting function, the file uploading function and the like for encrypting data is a vehicle secret value. The security of the data is further improved by performing key encryption on the signed content.
In summary, the method provided by the embodiment of the application performs format encapsulation processing on the data to be processed by acquiring the data to be processed, and acquires the encapsulation processing result. And signing by a first encapsulation processing result algorithm through a first signing rule to obtain a signing result. And packaging the signature result to a packaging processing result to obtain a second packaging processing result. And matching the key according to the interface type of the data to be processed, encrypting the second encapsulation processing result through an encryption algorithm based on the key, and converting the encryption result into a character string. And sending the character string to an automobile cloud interaction platform, verifying the data returned by the automobile cloud interaction platform, and completing automobile cloud interaction of the data to be processed after the verification is completed, so that the safety of the automobile cloud interaction data is ensured. Through various vehicle cloud interaction requirements, standardized and platform software modules of the vehicle cloud protocol are realized, and the technical effects of the universality and the safety of the vehicle cloud protocol are further improved. The technical problem that in the prior art, a vehicle cloud interaction protocol is developed in a customized mode, so that the vehicle cloud interaction system is poor in use universality and low in safety is solved.
Example two
Based on the same inventive concept as the method for vehicle-over-a-air interaction in the foregoing embodiment, as shown in fig. 4, the present application provides an vehicle-over-a-air interaction system, where the system includes:
a first obtaining unit 11, configured to obtain first data to be processed, and perform a first preset format packaging process on the first data to be processed, to obtain a first packaging process result;
a first construction unit 12, configured to construct a first signature rule, perform an algorithm signature on the first packaging processing result based on the first signature rule, and obtain a first signature result;
a second obtaining unit 13, configured to encapsulate the first signature result to the first encapsulation result, and obtain a second encapsulation result;
a first processing unit 14, configured to match a first key according to an interface type of the first data to be processed, encrypt the second encapsulation result by using a preset encryption algorithm based on the first key, and convert the encrypted result into a first string in a second preset format;
a third obtaining unit 15, configured to send the first string to an automobile OTA platform, and obtain a first response result of the automobile OTA platform, where the first response result includes a verification signature;
A fourth obtaining unit 16, configured to decrypt the first response result by using the first key, and obtain first decrypted data;
a fifth obtaining unit 17, configured to sign the first decrypted data based on the first signature rule, and obtain a second signature result;
and the second processing unit 18 is configured to, when the second signature result is consistent with the verification signature data, check the signature successfully, and complete OTA cloud interaction of the first data to be processed.
Further, the system further comprises:
the first construction unit is used for constructing an ordering rule, wherein the ordering rule is an ordering rule of parameter names ASCII codes from small to large, and the parameter names are distinguished in case and case;
the second construction unit is used for constructing a parameter value checking rule, wherein the parameter value checking rule is a rule for checking the parameter value, and the signature is not participated when the parameter value is null or an empty character string;
a third construction unit, configured to construct a format verification rule, where the format verification rule includes a verification rule for performing a file and a field, and does not participate in a signature when the file or the field is identified;
a fourth construction unit, configured to construct a rule of a newly added field, and when the interface request message is not a registration interface, sign the request message to add a device identifier field;
And a fifth construction unit, configured to construct the first signature rule according to the ordering rule, the parameter value checking rule, the format checking rule, and the newly added field rule.
Further, the system further comprises:
the first judging unit is used for judging whether the interface type is a first type interface or not;
and the first sending unit is used for directly sending the second encapsulation processing result to the automobile OTA platform without encryption processing when the interface type is the first type interface.
Further, the system further comprises:
a second judging unit, configured to judge whether the interface type is a registration interface when the interface type is not the first type interface;
a sixth obtaining unit, configured to obtain a first default value when the interface type is the registration interface;
a third processing unit configured to take the first constraint value as the first key;
and the fourth processing unit is used for obtaining a vehicle secret value when the interface type is not the registration interface, and taking the vehicle secret value as the first key.
Further, the system further comprises:
a fifth processing unit, configured to determine whether the first key as a secret value is successfully received by the automobile OTA platform when the interface type is not the registration interface;
And the sixth processing unit is used for prompting abnormality when the first key serving as the secret value is not successfully received by the automobile OTA platform, and adjusting the first key to the first default value.
Further, the system further comprises:
a third judging unit, configured to judge whether the first data to be processed is a download request;
a seventh obtaining unit, configured to, when the first data to be processed is a download request, perform file downloading of the automobile OTA platform, and obtain a first downloading result;
and the seventh processing unit is used for judging whether the first downloading result is successful, calculating the hash value of the first downloading result when the downloading is successful, comparing the calculated result with a preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
Further, the system further comprises:
an eighth processing unit, configured to splice, according to the first signature rule, a format corresponding to a URL key value into a second string;
and an eighth obtaining unit, configured to perform an algorithm signature on the second string using a second key, to obtain the first signature result.
Example III
Based on the same inventive concept as the method of vehicle-over-a-air (OTA) interaction in the foregoing embodiments, the present application further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method as in the first embodiment.
Exemplary electronic device
The electronic device of the present application is described below with reference to fig. 5.
Based on the same inventive concept as the method for vehicle-over-a-air (OTA) interaction in the foregoing embodiment, the present application further provides an electronic device, including: a processor and a memory, the processor coupled with the memory; the memory is used for storing programs, and the processor is used for executing the steps of the method in the first embodiment through calling.
The electronic device 300 includes: a processor 302, a communication interface 303, a memory 301. Optionally, the electronic device 300 may also include a bus architecture 304. Wherein the communication interface 303, the processor 302 and the memory 301 may be interconnected by a bus architecture 304; the bus architecture 304 may be a peripheral component interconnect (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry Standard architecture, EISA) bus, among others. The bus architecture 304 may be divided into address buses, data buses, control buses, and the like. For ease of illustration, only one thick line is shown in fig. 5, but not only one bus or one type of bus.
Processor 302 may be a CPU, microprocessor, ASIC, or one or more integrated circuits for controlling the execution of the programs of the present application.
The communication interface 303 uses any transceiver-like system for communicating with other devices or communication networks, such as ethernet, radio access network (radio access network, RAN), wireless local area network (wireless local area networks, WLAN), wired access network, etc.
The memory 301 may be, but is not limited to, ROM or other type of static storage device, RAM or other type of dynamic storage device, which may store static information and instructions, or may be an electrically erasable programmable read-only memory (electrically erasable Programmable read only memory, EEPROM), a compact disk read-only memory (compact discread only memory, CD ROM) or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be self-contained and coupled to the processor through bus architecture 304. The memory may also be integrated with the processor.
The memory 301 is used for storing computer-executable instructions for executing the embodiments of the present application, and is controlled by the processor 302 to execute the instructions. The processor 302 is configured to execute computer-implemented instructions stored in the memory 301, so as to implement an automobile OTA cloud interaction method provided in the foregoing embodiments of the present application.
Those of ordinary skill in the art will appreciate that: the various numbers of first, second, etc. referred to in this application are merely for ease of description and are not intended to limit the scope of this application nor to indicate any order. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one" means one or more. At least two means two or more. "at least one," "any one," or the like, refers to any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one of a, b, or c (species ) may represent: a, b, c, ab, ac, bc, or abc, wherein a, b, c may be single or multiple.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable system. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers, data centers, etc. that can be integrated with the available medium. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
The various illustrative logical blocks and circuits described herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic system, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the general purpose processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing systems, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in the present application may be embodied directly in hardware, in a software element executed by a processor, or in a combination of the two. The software elements may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD ROM, or any other form of storage medium known in the art. In an example, a storage medium may be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may reside in a terminal. In the alternative, the processor and the storage medium may reside in different components in a terminal. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Furthermore, the present application may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
It is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprise," "include," or any other variation thereof, are intended to cover a non-exclusive inclusion.
While the foregoing is directed to the preferred embodiments of the present application, it should be noted that modifications and adaptations to those embodiments may occur to one skilled in the art and that such modifications and adaptations are intended to be comprehended within the scope of the present application without departing from the principles set forth herein.

Claims (10)

1. An automobile OTA cloud interaction method, which is characterized by comprising the following steps:
obtaining first data to be processed, and carrying out packaging processing of a first preset format on the first data to be processed to obtain a first packaging processing result;
Constructing a first signature rule, and carrying out algorithm signature on the first encapsulation processing result based on the first signature rule to obtain a first signature result;
packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
judging a first packaging processing result before obtaining a second packaging processing result, obtaining interface data in the first packaging processing result, matching a first key according to the interface type of the first data to be processed, encrypting the second packaging processing result through a preset encryption algorithm based on the first key, and converting the encryption result into a first character string in a second preset format;
the first key is a function which is judged to be realized according to the interface type of the first data to be processed, and corresponding key data is obtained;
the first character string is sent to an automobile OTA platform, and a first response result of the automobile OTA platform is obtained, wherein the first response result comprises a verification signature;
decrypting the first response result through the first secret key to obtain first decrypted data;
signing the first decrypted data based on the first signing rule to obtain a second signing result;
And when the second signature result is consistent with the verification signature data, the signature verification is successful, and OTA cloud interaction of the first data to be processed is completed.
2. The method of claim 1, wherein the constructing a first signature rule further comprises:
constructing an ordering rule, wherein the ordering rule is an ordering rule from small to large of ASCII codes of American information exchange standard codes of parameter names, and the parameter names are distinguished in case and case;
constructing a parameter value checking rule, wherein the parameter value checking rule is a rule for checking the parameter value, and the signature is not participated when the parameter value is null or null character string;
constructing a format check rule, wherein the format check rule comprises a check rule for performing files and fields, and the files or the fields do not participate in signature when identified as files or fields;
constructing a new field rule, and when the interface request message is not a registered interface, adding a device identifier field to the request message signature;
and constructing the first signature rule according to the ordering rule, the parameter value checking rule, the format checking rule and the newly added field rule.
3. The method of claim 1, wherein the matching the first key according to the interface type of the first data to be processed further comprises:
Judging whether the interface type is a first type interface or not;
and when the interface type is the first type interface, directly sending the second encapsulation processing result to an automobile OTA platform without encryption processing.
4. A method as claimed in claim 3, wherein the method further comprises:
when the interface type is not the first type interface, judging whether the interface type is a registered interface or not;
when the interface type is the registered interface, a first default value is obtained;
taking the first preset value as the first key;
and when the interface type is not the registration interface, obtaining a vehicle secret value, and taking the vehicle secret value as the first key.
5. The method of claim 4, wherein the method further comprises:
when the interface type is not the registration interface, judging whether the automobile OTA platform successfully receives the first key serving as a secret value or not;
and prompting abnormality when the automobile OTA platform does not successfully receive the first key as a secret value, and adjusting the first key to the first preset value.
6. The method of claim 1, wherein the method further comprises:
Judging whether the first data to be processed is a downloading request or not;
when the first data to be processed is a downloading request, downloading the file of the automobile OTA platform to obtain a first downloading result;
judging whether the first downloading result is successful or not, calculating the hash value of the first downloading result when the downloading is successful, comparing the calculated result with a preset hash value in the first downloading result, and checking the validity of the first downloading result according to the comparison result.
7. The method of claim 1, wherein the obtaining the first signature result further comprises:
splicing the first character string into a second character string by using a format corresponding to a Uniform Resource Locator (URL) key value according to the first signature rule;
and carrying out algorithm signature on the second character string by using a second key to obtain the first signature result.
8. An automobile OTA cloud interaction system, the system comprising:
the first obtaining unit is used for obtaining first data to be processed, and carrying out packaging processing of a first preset format on the first data to be processed to obtain a first packaging processing result;
the first construction unit is used for constructing a first signature rule, and carrying out algorithm signature on the first encapsulation processing result based on the first signature rule to obtain a first signature result;
The second obtaining unit is used for packaging the first signature result to the first packaging processing result to obtain a second packaging processing result;
the first processing unit is used for judging a first packaging processing result before acquiring a second packaging processing result, acquiring interface data in the first packaging processing result, matching a first key according to the interface type of the first data to be processed, encrypting the second packaging processing result through a preset encryption algorithm based on the first key, and converting the encryption result into a first character string in a second preset format;
the first key is a function which is judged to be realized according to the interface type of the first data to be processed, and corresponding key data is obtained;
the third obtaining unit is used for sending the first character string to an automobile OTA platform to obtain a first response result of the automobile OTA platform, wherein the first response result comprises a verification signature;
a fourth obtaining unit, configured to decrypt the first response result by using the first key, to obtain first decrypted data;
a fifth obtaining unit, configured to sign the first decrypted data based on the first signing rule, and obtain a second signing result;
And the second processing unit is used for successfully checking the signature when the second signature result is consistent with the verification signature data, and completing OTA cloud interaction of the first data to be processed.
9. An electronic device, comprising: a processor and a memory, the processor coupled with the memory; the memory is adapted to store a program and the processor is adapted to perform the steps of the method according to any of claims 1 to 7 by means of a call.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the method according to any of claims 1 to 7.
CN202210768503.8A 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system Active CN115174645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210768503.8A CN115174645B (en) 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210768503.8A CN115174645B (en) 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system

Publications (2)

Publication Number Publication Date
CN115174645A CN115174645A (en) 2022-10-11
CN115174645B true CN115174645B (en) 2024-03-26

Family

ID=83489970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210768503.8A Active CN115174645B (en) 2022-06-30 2022-06-30 Automobile OTA cloud interaction method and system

Country Status (1)

Country Link
CN (1) CN115174645B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117478708B (en) * 2023-12-28 2024-04-09 中汽智联技术有限公司 Intelligent networking automobile asset fingerprint generation and identification method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
WO2017030517A1 (en) * 2015-08-18 2017-02-23 Idea Teknoloji Cozumleri Bilgisayar Sanayi Ve Ticaret Anonim Sirketi Safe e-document synchronisation, analysis and management system
CN108235152A (en) * 2018-03-07 2018-06-29 北京视博数字电视科技有限公司 The transmission method of DRM application systems and DRM private datas
CN111629002A (en) * 2020-05-28 2020-09-04 爱瑟福信息科技(上海)有限公司 OTA (over the air) safety upgrading method and system of vehicle ECU (electronic control Unit)
CN112882750A (en) * 2021-03-23 2021-06-01 东软睿驰汽车技术(沈阳)有限公司 OTA upgrade package processing method and device and electronic equipment
CN114327532A (en) * 2021-10-11 2022-04-12 浙江零跑科技股份有限公司 Automobile OTA (over the air) upgrade information security implementation method based on digital signature and encryption

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080147268A1 (en) * 2006-12-14 2008-06-19 Fuller Michael G Method and apparatus for alternative performance of automobile features
FR3079045B1 (en) * 2018-03-19 2021-12-03 Psa Automobiles Sa METHOD OF SENDING DATA FROM A MOTOR VEHICLE AND METHOD OF RECEIVING SUCH DATA BY ANOTHER VEHICLE, THROUGH A RADIO COMMUNICATION CHANNEL.
EP3913880A1 (en) * 2020-05-19 2021-11-24 Continental Teves AG & Co. OHG Method of and system for secure data export from an automotive engine control unit

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017030517A1 (en) * 2015-08-18 2017-02-23 Idea Teknoloji Cozumleri Bilgisayar Sanayi Ve Ticaret Anonim Sirketi Safe e-document synchronisation, analysis and management system
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN108235152A (en) * 2018-03-07 2018-06-29 北京视博数字电视科技有限公司 The transmission method of DRM application systems and DRM private datas
CN111629002A (en) * 2020-05-28 2020-09-04 爱瑟福信息科技(上海)有限公司 OTA (over the air) safety upgrading method and system of vehicle ECU (electronic control Unit)
CN112882750A (en) * 2021-03-23 2021-06-01 东软睿驰汽车技术(沈阳)有限公司 OTA upgrade package processing method and device and electronic equipment
CN114327532A (en) * 2021-10-11 2022-04-12 浙江零跑科技股份有限公司 Automobile OTA (over the air) upgrade information security implementation method based on digital signature and encryption

Also Published As

Publication number Publication date
CN115174645A (en) 2022-10-11

Similar Documents

Publication Publication Date Title
JP7139424B2 (en) Vehicle-mounted equipment upgrade method and related equipment
CN109977086B (en) Method for sharing application between terminals and terminal
CN110766408A (en) Cross-chain transaction verification method, engine, equipment and storage medium for heterogeneous block chain
CN110086755B (en) Method for realizing service of Internet of things, application server, Internet of things equipment and medium
JP2019524016A (en) Methods for managing the status of connected devices
CN110740044B (en) Data processing method, device, system and storage medium
CN113094062A (en) Upgrading method and device
CN115174645B (en) Automobile OTA cloud interaction method and system
CN114281573A (en) Workflow data interaction method and device, electronic device and readable storage medium
CN111565179B (en) Identity verification method and device, electronic equipment and storage medium
CN111988418B (en) Data processing method, device, equipment and computer readable storage medium
CN111314309B (en) Data transmission method and device, electronic equipment and computer readable storage medium
CN111614731A (en) Method and system for accessing block chain to Internet of things equipment, aggregation gateway and storage medium
CN114125812A (en) Data synchronization method, device, server and storage medium
CN111050326B (en) Block chain-based short message verification method, device, equipment and medium
CN112887199A (en) Gateway, cloud platform, configuration method and device thereof, and computer-readable storage medium
CN112804284A (en) Data chaining device, data verification device and data verification method
CN114338795B (en) Data communication method and device of blockchain client
CN111459899B (en) Log sharing method and device and terminal equipment
CN114765552B (en) Data processing method, medium system, storage medium and electronic equipment
CN110460446B (en) Method and device for acquiring message authentication code
CN114710362A (en) Identity authentication method and device based on block chain and electronic equipment
CN113271320B (en) Terminal authentication method, device, system, medium and equipment
KR20200080846A (en) Device ownership certification system and method of determining device ownership certification using the same
CN110827018A (en) Method for two-dimensional code intercommunication use between public traffic APP clients

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant