CN117478708B - Intelligent networking automobile asset fingerprint generation and identification method and system - Google Patents

Intelligent networking automobile asset fingerprint generation and identification method and system Download PDF

Info

Publication number
CN117478708B
CN117478708B CN202311823459.7A CN202311823459A CN117478708B CN 117478708 B CN117478708 B CN 117478708B CN 202311823459 A CN202311823459 A CN 202311823459A CN 117478708 B CN117478708 B CN 117478708B
Authority
CN
China
Prior art keywords
vehicle
asset
data
current
asset fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311823459.7A
Other languages
Chinese (zh)
Other versions
CN117478708A (en
Inventor
李鉴
卢旭
种统洪
李忠月
潘成龙
刘平一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongqi Zhilian Technology Co ltd
Original Assignee
Zhongqi Zhilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongqi Zhilian Technology Co ltd filed Critical Zhongqi Zhilian Technology Co ltd
Priority to CN202311823459.7A priority Critical patent/CN117478708B/en
Publication of CN117478708A publication Critical patent/CN117478708A/en
Application granted granted Critical
Publication of CN117478708B publication Critical patent/CN117478708B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24553Query execution of query operations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/008Registering or indicating the working of vehicles communicating information to a remotely located station
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method and a system for generating intelligent network-connected automobile asset fingerprint, which are used for establishing automobile asset fingerprint data in a cloud system, realizing automatic updating of the automobile asset fingerprint data and realizing informationized management of automobile assets; meanwhile, the transmission data of the vehicle-mounted system and the cloud system are encrypted through an encryption technology, so that the safety in the data transmission process is improved, and the safety of private data is guaranteed.

Description

Intelligent networking automobile asset fingerprint generation and identification method and system
Technical Field
The application belongs to the field of electric digital processing, and particularly relates to an intelligent network connection automobile asset fingerprint generation and identification method and system.
Background
In the field of automotive information security, as the number of vehicles increases and the needs of vehicle use diversify, many organizations and individuals have difficulty in efficiently managing and tracking vehicle assets due to the lack of a centralized control system. This makes it difficult to continuously monitor and protect the safety of the vehicle. Without an appropriate system, it is difficult to know the location, status and use of the vehicle in real time. Based on the above problems, an intelligent networking automobile asset fingerprint generation and identification method and system are provided.
Disclosure of Invention
Aiming at the problem that effective management of automobile assets is lacking and real-time automatic monitoring of the positions and states of the automobiles is difficult, the application provides an intelligent network automobile asset fingerprint generation and identification method.
In a first aspect, the present application provides a method for generating and identifying an intelligent network-connected automobile asset fingerprint, including:
s1, a vehicle collects vehicle log data and transmits the vehicle log data to a cloud system through a message release engine;
s2, the cloud system analyzes the vehicle log data and extracts first vehicle characteristic data and second vehicle characteristic data in the vehicle log data;
s3, the cloud system generates a vehicle asset fingerprint ID according to the first vehicle characteristic data, and the vehicle asset fingerprint ID is added into an asset fingerprint database;
s4, the internet of vehicles management system collects asset data of the current vehicle, generates asset fingerprint IDs of the current vehicle according to the asset data, compares the asset fingerprint IDs of the current vehicle in an asset fingerprint database, and identifies current running state data and current position data of the current vehicle.
In a second aspect, the present application provides an intelligent networked automotive asset fingerprint generation and identification system, comprising:
the vehicle is used for collecting vehicle log data and transmitting the vehicle log data to the cloud system through the message release engine;
the cloud system is used for analyzing the vehicle log data and extracting first vehicle characteristic data and second vehicle characteristic data in the vehicle log data; generating a vehicle asset fingerprint ID according to the first vehicle characteristic data, and adding the vehicle asset fingerprint ID into an asset fingerprint database;
and the vehicle networking management system is used for collecting asset data of the current vehicle, generating asset fingerprint IDs of the current vehicle according to the asset data, comparing the asset fingerprint IDs of the current vehicle in an asset fingerprint database, and identifying current running state data and current position data of the current vehicle.
The beneficial effects of this application are as follows:
1) By constructing the fingerprint information of the automobile asset at the cloud, the automatic management of the automobile asset is realized, the automobile can be automatically identified, whether the automobile is attacked maliciously or not is discriminated, the use state of the automobile can be monitored, and the automatic monitoring and scheduling of the automobile can be realized.
2) When the vehicle-mounted system transmits log data to the cloud system, the log data are secondarily packed, the log data are encrypted according to the size of a secondarily packed file, and an encryption function and a decryption function are flexibly switched, so that the safety of data transmission is improved, and a hacker is prevented from attacking the vehicle-mounted system in the communication process of the vehicle-mounted system and the cloud system;
3) When the vehicle machine system sends the log data to the cloud system, the current moment is sent together, and the time distance between the moment when the cloud system receives the log data and the moment when the log data is sent is used for judging that the vehicle machine system possibly suffers from hacking attack when the vehicle machine system sends the log data, and suspending the current operation so as to improve the safety of data transmission;
4) The vehicle networking management system calculates the asset fingerprint ID of the vehicle by collecting the first characteristic data of the vehicle, compares the asset fingerprint ID with the asset fingerprint ID in the asset fingerprint database, acquires the state information of the vehicle, judges whether the vehicle is subjected to hacking, improves the vehicle management efficiency, and monitors the vehicle safety.
The foregoing description is only an overview of the technical solutions of the present application, and may be implemented according to the content of the specification, and in order to make the above description and other objects, features and advantages of the present application more understandable, the following detailed description of the preferred embodiments is given.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to designate like parts throughout the figures.
FIG. 1 is a flow chart of a method for generating and identifying fingerprints of intelligent network-connected automotive assets;
fig. 2 is a block diagram of an intelligent networked automotive asset fingerprint generation and identification system.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In the description of the present application, unless explicitly stated and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly, and may be, for example, connected, detachably connected, or integrated; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communicated with the inside of two elements or the interaction relationship of the two elements. The specific meaning of the terms in this application will be understood by those of ordinary skill in the art as the case may be.
Example 1
The application provides an intelligent network-connected automobile asset fingerprint generation and identification method, which comprises the following steps:
s1, a vehicle collects vehicle log data and transmits the vehicle log data to a cloud system through a message release engine;
further, the step S1 specifically includes the following steps:
s11, the vehicle collects vehicle log data through a vehicle machine system, terminal monitoring and response equipment EDR, a vehicle-mounted intrusion monitoring defense system IDPS, an intrusion detection and defense system CAN-IDPS of a CAN bus network and a GPS system;
s12, a vehicle machine system of the vehicle distributes the vehicle log data to a message queue telemetry transmission protocol assembly through a message distribution engine;
s13, the cloud system receives the vehicle log data through a message subscription engine.
Further, the step S12 includes the steps of:
s1201, the vehicle machine system packs the log data to form a packed file, and acquires the size of the packed file;
the size unit of the packed file is KB;
the size of the packing file is an integer;
s1202, acquiring the current moment by a vehicle machine system
The current timeThe specific format is as follows: date-time-minutes;
s1203, secondarily packaging the packaged file and the current moment by using a vehicle machine system to form a secondarily packaged file;
the secondary packaging specifically comprises the following steps: splicing the packaging file with the current moment to form a secondary packaging file;
s1204, acquiring a bit number of the size of the secondary packaging file by a vehicle machine system, and encrypting the secondary packaging file by adopting a first encryption function when the bit number is one of 1-3; encrypting the secondary packaging file by adopting a second encryption function when the bit number is one of 4-6; when the bit number is one of 7-9, encrypting the secondary packaging file by adopting a third encryption function;
wherein the first encryption function, the second encryption function and the third encryption function are all conventional encryption functions in the field.
The vehicle-mounted system encrypts the size of the secondary packaging file by using a first encryption function;
the encrypting the size of the secondary packaging file by using the first encryption function specifically comprises the following steps:
wherein D is the size of the secondary packaging file;the result is obtained after encrypting the size of the secondary packaging file;
s1205, the vehicle machine system combines the encrypted secondary packaging file in the step S124The message is released to a message queue telemetry transmission protocol assembly through a message release engine;
s1206, the cloud system receives the encrypted secondary packaging file and the encrypted secondary packaging file through a message subscription engine
The cloud system acquires the received encrypted secondary packaging file and the received encrypted secondary packaging fileCurrent time +.>
S1207, comparing the sizes of the two received data by the cloud system, and judging the data with small data size asJudging the data with large data volume as an encrypted secondary packaging file;
s1208, the cloud system adopts a first decryption function to the cloud systemDecrypting to obtain the size D of the secondary packaging file;
wherein said applying a first decryption function to saidThe decryption method specifically comprises the following steps:
s1209, the cloud system obtains the bit number of D, and when the bit number is one of 1-3, the secondary packaging file is decrypted by adopting a first decryption function; when the bit number is one of 4-6, decrypting the secondary packaging file by adopting a second decryption function; when the bit number is one of 7-9, decrypting the secondary packaging file by adopting a third decryption function;
the first decryption function, the second decryption function and the third decryption function correspond to the first encryption function, the second encryption function and the third encryption function respectively;
for example, if the data Q is encrypted by using the first encryption function, the data Q may be decrypted by using the first decryption function.
S1210, the cloud system acquires the decrypted secondary packaging file, and extracts the packaging file and the current moment in the secondary packaging file
S1211, the cloud system judges the current momentIs +_o from the current time>When the time distance is greater than a preset threshold +.>When the cloud system terminates the current operation, the cloud system sends a resending instruction to the cloud system, and the cloud system waits for receiving the next encrypted secondary packaging file and +.>
Wherein the time distance is specifically a time length, such as a current timeFor 8 months, 27 days, 3 hours and 2 minutes; current time->32 minutes for 8 months 27 days 3; then current moment +.>Is +_o from the current time>Is 30 minutes.
When the time distance is smaller than a preset threshold valueAnd the cloud system takes the packed file as the received vehicle log data.
Wherein, the threshold value is presetMay be 5 minutes, or 10 minutes, or 15 minutes, or other values as may be practical.
Further, the step S12 further includes the following steps:
three encryption functions are prestored in a vehicle-mounted system、/>、/>The method comprises the steps of carrying out a first treatment on the surface of the Three decryption functions are prestored in the cloud system>、/>、/>
S121, the vehicle system and the cloud system change or rotate encryption functions and decryption functions every day;
s122, before the vehicle log data are released, the vehicle machine system encrypts the log data by adopting an encryption function stored at the current moment.
Further, the step S121 specifically includes the following steps:
when the current date is divided by 3 and the remainder is 0, the vehicle system will、/>、/>Respectively serving as a first encryption function, a second encryption function and a third encryption function; the cloud system will->、/>、/>Respectively serving as a first decryption function, a second decryption function and a third decryption function;
when the current date is divided by 3 and the remainder is 1, the vehicle system will、/>、/>Respectively as a first encryption function and a second encryption functionA third encryption function; the cloud system will->、/>、/>Respectively serving as a first decryption function, a second decryption function and a third decryption function;
when the current date is divided by 3 and the remainder is 2, the vehicle-mounted system will、/>Respectively serving as a first encryption function, a second encryption function and a third encryption function; the cloud system will->、/>Respectively as a first decryption function, a second decryption function and a third decryption function.
S2, the cloud system analyzes the vehicle log data and extracts first vehicle characteristic data and second vehicle characteristic data in the vehicle log data;
further, the step S2 specifically includes the following steps:
s21, the cloud system analyzes the vehicle log data and extracts first vehicle characteristic data and second vehicle characteristic data in the vehicle log data;
the first vehicle characteristic data includes: the vehicle identification number VIN, the vehicle model code, the main machine factory code, the vehicle engine number, the version number of each subsystem software in the vehicle-mounted system, the code of each subsystem software provider in the vehicle-mounted system and the number of code rows corresponding to each subsystem software in the vehicle-mounted system;
the code line number acquisition mode corresponding to each subsystem software in the vehicle-mounted system is as follows:
the vehicle-mounted system acquires code files in the subsystem, and adds the code line numbers corresponding to each code file, wherein the addition result is the code line number corresponding to the subsystem software;
the second vehicle characteristic data includes: current running state data of the vehicle and current position data of the vehicle;
the current running state data of the vehicle comprises: vehicle operation or flameout, vehicle fault code, vehicle mileage, last maintenance date of the vehicle, remaining oil or electricity of the vehicle.
S3, the cloud system generates a vehicle asset fingerprint ID according to the first vehicle characteristic data, and adds the vehicle asset fingerprint ID into an asset fingerprint database;
further, the step S3 specifically includes the following steps:
s31, the cloud system splices the first characteristic data according to a preset sequence to form an asset characteristic character string;
wherein, the preset sequence may be: the vehicle identification number VIN, the vehicle model code, the host factory code, the vehicle engine number, the version number of each subsystem software in the vehicle-to-machine system, the vendor code of each subsystem software in the vehicle-to-machine system, the order of the number of code lines corresponding to each subsystem software in the vehicle-to-machine system, or other orders.
S32, calculating a hash value of the asset characteristic character string by utilizing an MD5 hash algorithm;
s33, converting the hash value of the asset characteristic character string into a 16-system character string;
s34, judging whether the length of the 16-system character string reaches 32 bits, if so, executing a step S35; if the length of the 16-ary character string is not up to 32 bits, 0 is added in front of the 16-ary character string, so that the length of the 16-ary character string is up to 32 bits, and step S35 is executed;
s35, taking the 32-bit 16-system character string as a vehicle asset fingerprint ID;
s36, associating the vehicle asset fingerprint ID with the first characteristic data and the second characteristic data, and storing the vehicle asset fingerprint ID in an asset fingerprint database.
S4, the internet of vehicles management system collects asset data of the current vehicle, generates asset fingerprint IDs of the current vehicle according to the asset data, compares the asset fingerprint IDs of the current vehicle in an asset fingerprint database, and identifies current running state data and current position data of the current vehicle.
Further, the step S4 specifically includes the following steps:
s41, acquiring asset data of a current vehicle from a vehicle-to-machine system of the current vehicle by the vehicle networking management system, wherein the asset data comprises a vehicle identification number VIN, a vehicle model code, a host factory code, a vehicle engine number, a software version number of each subsystem in the vehicle-to-machine system, a software provider code of each subsystem in the vehicle-to-machine system and a code line number corresponding to each subsystem software in the vehicle-to-machine system of the current vehicle;
s42, the vehicle networking management system generates an asset fingerprint ID of the current vehicle according to the asset data of the current vehicle;
the car networking management system is deployed at the cloud end and is communicated with the car machine system in real time;
s43, the vehicle networking management system compares the asset fingerprint ID of the current vehicle with the vehicle asset fingerprint ID in the asset fingerprint database in the cloud system, and searches whether the ID identical with the asset fingerprint ID of the current vehicle exists or not, and if so, the step S45 is executed; if not, executing step S44;
s44, the vehicle networking management system judges that the current vehicle is attacked, and marks the current vehicle in the cloud system;
s45, the vehicle networking management system acquires current running state data and current position data of the current vehicle from an asset fingerprint database of the cloud system.
Further, before step S1, the method further includes:
when the vehicle system is networked with the cloud system for the first time, the vehicle system issues vehicle log data to a message queue telemetry transmission protocol assembly through a message issuing engine;
after the cloud system calculates and obtains the vehicle asset fingerprint ID, the vehicle asset fingerprint ID is synchronized to the vehicle machine system, and the vehicle VIN number is transmitted to the vehicle networking management system, so that the registration of the vehicle in the vehicle networking management system is completed.
Further, the intelligent network-connected automobile asset fingerprint generation and identification method further comprises the following steps:
the vehicle machine system of the vehicle A transmits second vehicle characteristic data of the vehicle A to the cloud system through a message release engine at intervals of fixed Time;
the fixed Time is 30 minutes, or 60 minutes, or 90 minutes, or other value.
When the cloud system receives the second vehicle characteristic data of the vehicle A, updating the second vehicle characteristic data corresponding to the vehicle A in the asset fingerprint database;
when a software version of a subsystem C in a vehicle-mounted system of a vehicle B is updated, the vehicle-mounted system obtains the updated software version number of the subsystem C and a code line number difference value between a code file replaced during the update of the software version and an original code file, and the vehicle-mounted system transmits the updated software version number of the subsystem C and the difference value to a cloud system through a message release engine;
the cloud system receives the updated software version number and the difference value, replaces the software version number of the subsystem C corresponding to the vehicle B in the asset fingerprint database with the updated software version number, adds the code line number of the subsystem C corresponding to the asset fingerprint database with the difference value to obtain an updated code line number, replaces the code line number of the subsystem C corresponding to the asset fingerprint database with the updated code line number, and forms updated first vehicle characteristic data;
wherein the difference is a positive or negative number.
The cloud system recalculates the asset fingerprint ID of the vehicle B according to the updated first vehicle characteristic data, and updates the original asset fingerprint ID into the recalculated asset fingerprint ID;
and the cloud system synchronizes the updated asset fingerprint ID to the vehicle machine system of the vehicle B.
Further, when the vehicle-mounted system sends the second vehicle characteristic data to the cloud system, a three-bit instruction identifier M is added in front of the second vehicle characteristic data, and the three-bit instruction identifier M indicates that the sent data is the second vehicle characteristic data;
when the vehicle-mounted system sends the updated software version number and the difference value to the cloud system, a three-bit instruction identifier N is added in front of the updated software version number and the data of the difference value, and the three-bit instruction identifier N indicates that the sent data is the updated software version number and the difference value.
Example 2
The application further provides an intelligent network connection automobile asset fingerprint generation and identification system, referring to fig. 2, the system executes the steps of the intelligent network connection automobile asset fingerprint generation and identification method in the first embodiment, and the method comprises the following steps:
the vehicle is used for collecting vehicle log data and transmitting the vehicle log data to the cloud system through the message release engine;
the cloud system is used for analyzing the vehicle log data and extracting first vehicle characteristic data and second vehicle characteristic data in the vehicle log data; generating a vehicle asset fingerprint ID according to the first vehicle characteristic data, and adding the vehicle asset fingerprint ID into an asset fingerprint database;
and the vehicle networking management system is used for collecting asset data of the current vehicle, generating asset fingerprint IDs of the current vehicle according to the asset data, comparing the asset fingerprint IDs of the current vehicle in an asset fingerprint database, and identifying current running state data and current position data of the current vehicle.
The beneficial effects of this application are as follows:
1) By constructing the fingerprint information of the automobile asset at the cloud, the automatic management of the automobile asset is realized, the automobile can be automatically identified, whether the automobile is attacked maliciously or not is discriminated, the use state of the automobile can be monitored, and the automatic monitoring and scheduling of the automobile can be realized.
2) When the vehicle-mounted system transmits log data to the cloud system, the log data are secondarily packed, the log data are encrypted according to the size of a secondarily packed file, and an encryption function and a decryption function are flexibly switched, so that the safety of data transmission is improved, and a hacker is prevented from attacking the vehicle-mounted system in the communication process of the vehicle-mounted system and the cloud system;
3) When the vehicle machine system sends the log data to the cloud system, the current moment is sent together, and the time distance between the moment when the cloud system receives the log data and the moment when the log data is sent is used for judging that the vehicle machine system possibly suffers from hacking attack when the vehicle machine system sends the log data, and suspending the current operation so as to improve the safety of data transmission;
4) The vehicle networking management system calculates the asset fingerprint ID of the vehicle by collecting the first characteristic data of the vehicle, compares the asset fingerprint ID with the asset fingerprint ID in the asset fingerprint database, acquires the state information of the vehicle, judges whether the vehicle is subjected to hacking, improves the vehicle management efficiency, and monitors the vehicle safety.

Claims (6)

1. The intelligent network-connected automobile asset fingerprint generation and identification method is characterized by comprising the following steps of:
s1, a vehicle collects vehicle log data and transmits the vehicle log data to a cloud system through a message release engine; the step S1 specifically comprises the following steps:
s11, collecting vehicle log data by the vehicle through a vehicle machine system, a terminal monitoring and response device EDR, a vehicle-mounted intrusion monitoring and defending system IDPS, an intrusion detection and defending system CAN-IDPS of a CAN bus network and a GPS system;
s12, the vehicle machine system of the vehicle distributes the vehicle log data to a message queue telemetry transmission protocol assembly through a message distribution engine;
s13, the cloud system receives the vehicle log data through a message subscription engine;
s2, the cloud system analyzes the vehicle log data and extracts first vehicle characteristic data and second vehicle characteristic data in the vehicle log data;
the first vehicle characteristic data includes: the vehicle identification number VIN, the vehicle model code, the main machine factory code, the vehicle engine number, the version number of each subsystem software in the vehicle-mounted system, the code of each subsystem software provider in the vehicle-mounted system and the number of code rows corresponding to each subsystem software in the vehicle-mounted system;
the code line number corresponding to each subsystem software in the vehicle-mounted system is obtained as follows:
the vehicle-mounted system acquires code files in a subsystem, and adds the code line numbers corresponding to each code file, wherein the addition result is the code line number corresponding to the subsystem software;
the second vehicle characteristic data includes: current running state data of the vehicle and current position data of the vehicle;
the current running state data of the vehicle comprises: vehicle operation or flameout, vehicle fault code, vehicle mileage, last maintenance date of the vehicle, and vehicle residual oil or electricity;
s3, the cloud system generates a vehicle asset fingerprint ID according to the first vehicle characteristic data, and the vehicle asset fingerprint ID is added into an asset fingerprint database; the step S3 specifically includes the following steps:
s31, the cloud system splices the first characteristic data according to a preset sequence to form an asset characteristic character string;
s32, calculating the hash value of the asset characteristic character string by utilizing an MD5 hash algorithm;
s33, converting the hash value of the asset characteristic character string into a 16-system character string;
s34, judging whether the length of the 16-system character string reaches 32 bits, if so, executing a step S35; if the length of the 16-ary character string is not up to 32 bits, 0 is added in front of the 16-ary character string, so that the length of the 16-ary character string is up to 32 bits, and step S35 is executed;
s35, taking the 32-bit 16-system character string as a vehicle asset fingerprint ID;
s36, associating the vehicle asset fingerprint ID with the first characteristic data and the second characteristic data, and storing the vehicle asset fingerprint ID into an asset fingerprint database;
s4, acquiring asset data of the current vehicle by the vehicle networking management system, generating an asset fingerprint ID of the current vehicle according to the asset data, comparing the asset fingerprint IDs of the current vehicle in an asset fingerprint database, and identifying current running state data and current position data of the current vehicle;
the step S4 specifically includes the following steps:
s41, acquiring asset data of a current vehicle from a vehicle-to-machine system of the current vehicle by the vehicle networking management system, wherein the asset data comprises a vehicle identification number VIN, a vehicle model code, a host factory code, a vehicle engine number, a software version number of each subsystem in the vehicle-to-machine system, a software provider code of each subsystem in the vehicle-to-machine system and a code line number corresponding to each subsystem software in the vehicle-to-machine system of the current vehicle;
s42, the vehicle networking management system generates an asset fingerprint ID of the current vehicle according to the asset data of the current vehicle; the car networking management system is deployed at the cloud end and is communicated with the car machine system in real time;
s43, the vehicle networking management system compares the asset fingerprint ID of the current vehicle with the vehicle asset fingerprint ID in the asset fingerprint database in the cloud system, and searches whether the ID identical with the asset fingerprint ID of the current vehicle exists or not, and if so, the step S45 is executed; if not, executing step S44;
s44, the vehicle networking management system judges that the current vehicle is attacked, and marks the current vehicle in the cloud system;
s45, the vehicle networking management system acquires current running state data and current position data of the current vehicle from an asset fingerprint database of the cloud system.
2. The method for generating and identifying the intelligent network-connected automobile asset fingerprint according to claim 1, wherein the step S12 comprises the steps of:
s1201, the vehicle machine system packs the log data to form a packed file, and acquires the size of the packed file;
the size unit of the packed file is KB; the size of the packing file is an integer;
s1202, acquiring the current moment by a vehicle machine system
The current timeThe specific format is as follows: date-time-minutes;
s1203, secondarily packaging the packaged file and the current moment by using a vehicle machine system to form a secondarily packaged file;
the secondary packaging specifically comprises the following steps: splicing the packaging file with the current moment to form a secondary packaging file;
s1204, acquiring a bit number of the size of the secondary packaging file by a vehicle machine system, and encrypting the secondary packaging file by adopting a first encryption function when the bit number is one of 1-3; encrypting the secondary packaging file by adopting a second encryption function when the bit number is one of 4-6; when the bit number is one of 7-9, encrypting the secondary packaging file by adopting a third encryption function;
the vehicle-mounted system encrypts the size of the secondary packaging file by using a first encryption function, and specifically adopts the following steps:
wherein D is the size of the secondary packaging file;the result is obtained after encrypting the size of the secondary packaging file;
s1205, the vehicle machine system combines the encrypted secondary packaging file in the step S1204The message is released to a message queue telemetry transmission protocol assembly through a message release engine;
s1206, the cloud system receives the encrypted secondary packaging file and the encrypted secondary packaging file through a message subscription engine
The cloud system acquires the received encrypted secondary packaging file and the received encrypted secondary packaging fileCurrent time +.>
S1207, comparing the sizes of the two received data by the cloud system, and judging the data with small data size asJudging the data with large data volume as an encrypted secondary packaging file;
s1208, the cloud system adopts a first decryption function to the cloud systemDecrypting to obtain the size D of the secondary packaging file;
wherein said applying a first decryption function to saidDecrypting, specifically using the following formula:
s1209, the cloud system obtains the bit number of D, and when the bit number is one of 1-3, the secondary packaging file is decrypted by adopting a first decryption function; when the bit number is one of 4-6, decrypting the secondary packaging file by adopting a second decryption function; when the bit number is one of 7-9, decrypting the secondary packaging file by adopting a third decryption function;
the first decryption function, the second decryption function and the third decryption function correspond to the first encryption function, the second encryption function and the third encryption function respectively;
s1210, the cloud system acquires the decrypted secondary packaging file, and extracts the packaging file and the current moment in the secondary packaging file
S1211, the cloud system judges the current momentIs +_o from the current time>When the time distance is greater than a preset threshold +.>When the cloud system terminates the current operation, the cloud system sends a resending instruction to the cloud system, and the cloud system waits for receiving the next encrypted secondary packaging file and +.>
When the time distance is smaller than a preset threshold valueAnd the cloud system takes the packed file as the received vehicle log data.
3. The method for generating and identifying the intelligent network-connected vehicle asset fingerprint according to claim 1, wherein the step S12 further comprises the steps of:
three encryption functions are prestored in a vehicle-mounted system、/>、/>The method comprises the steps of carrying out a first treatment on the surface of the Three decryption functions are prestored in the cloud system>、/>、/>
S121, the vehicle machine system and the cloud system change or rotate encryption functions and decryption functions every day;
s122, before the vehicle log data are released, the vehicle log data are encrypted by the aid of an encryption function stored at the current moment.
4. The method for generating and identifying an intelligent network-connected automotive asset fingerprint according to claim 1, further comprising, before step S1:
when the vehicle system is networked with the cloud system for the first time, the vehicle system issues vehicle log data to a message queue telemetry transmission protocol assembly through a message issuing engine;
after the cloud system calculates and obtains the vehicle asset fingerprint ID, the vehicle asset fingerprint ID is synchronized to the vehicle machine system, and the vehicle VIN number is transmitted to the vehicle networking management system, so that the registration of the vehicle in the vehicle networking management system is completed.
5. The intelligent network-connected automotive asset fingerprint generation and identification method according to claim 1, further comprising:
the vehicle machine system of the vehicle A transmits second vehicle characteristic data of the vehicle A to the cloud system through a message release engine at intervals of fixed Time;
when the cloud system receives second vehicle characteristic data of the vehicle A, updating the second vehicle characteristic data corresponding to the vehicle A in an asset fingerprint database;
when the software version of a subsystem C in a vehicle-mounted system of a vehicle B is updated, the vehicle-mounted system obtains the updated software version number of the subsystem C and the code line number difference value between a code file and an original code file, which are replaced when the software version is updated, and the vehicle-mounted system transmits the updated software version number of the subsystem C and the difference value to a cloud system through a message release engine;
the cloud system receives the updated software version number and the difference value, replaces the software version number of the subsystem C corresponding to the vehicle B in the asset fingerprint database with the updated software version number, adds the code line number of the subsystem C corresponding to the asset fingerprint database with the difference value to obtain an updated code line number, replaces the code line number of the subsystem C corresponding to the asset fingerprint database with the updated code line number, and forms updated first vehicle characteristic data;
the cloud system recalculates the asset fingerprint ID of the vehicle B according to the updated first vehicle characteristic data, and updates the original asset fingerprint ID into the recalculated asset fingerprint ID;
and the cloud system synchronizes the updated asset fingerprint ID to the vehicle machine system of the vehicle B.
6. An intelligent networked automotive asset fingerprint generation and identification system, the system comprising:
the vehicle is used for collecting vehicle log data and transmitting the vehicle log data to the cloud system through the message release engine;
the vehicle acquires vehicle log data through a vehicle machine system, terminal monitoring and response equipment EDR, a vehicle-mounted intrusion monitoring defense system IDPS, an intrusion detection and defense system CAN-IDPS of a CAN bus network and a GPS system; the vehicle machine system of the vehicle distributes the vehicle log data to a message queue telemetry transmission protocol assembly through a message distribution engine; the cloud system receives the vehicle log data through a message subscription engine;
the cloud system is used for analyzing the vehicle log data and extracting first vehicle characteristic data and second vehicle characteristic data in the vehicle log data; generating a vehicle asset fingerprint ID according to the first vehicle characteristic data, and adding the vehicle asset fingerprint ID into an asset fingerprint database;
the first vehicle characteristic data includes: the vehicle identification number VIN, the vehicle model code, the main machine factory code, the vehicle engine number, the version number of each subsystem software in the vehicle-mounted system, the code of each subsystem software provider in the vehicle-mounted system and the number of code rows corresponding to each subsystem software in the vehicle-mounted system; the code line number corresponding to each subsystem software in the vehicle-mounted system is obtained as follows:
the vehicle-mounted system acquires code files in a subsystem, and adds the code line numbers corresponding to each code file, wherein the addition result is the code line number corresponding to the subsystem software;
the second vehicle characteristic data includes: current running state data of the vehicle and current position data of the vehicle;
the current running state data of the vehicle comprises: vehicle operation or flameout, vehicle fault code, vehicle mileage, last maintenance date of the vehicle, and vehicle residual oil or electricity;
the cloud system splices the first characteristic data according to a preset sequence to form an asset characteristic character string; calculating the hash value of the asset characteristic character string by utilizing an MD5 hash algorithm; converting the hash value of the asset characteristic string into a 16-ary string; judging whether the length of the 16-system character string reaches 32 bits, if so, executing step S35; if the length of the 16-bit string is not up to 32 bits, 0 is added in front of the 16-bit string, so that the length of the 16-bit string is up to 32 bits, and the 32-bit 16-bit string is taken as a vehicle asset fingerprint ID; associating the vehicle asset fingerprint ID with the first characteristic data and the second characteristic data, and storing the vehicle asset fingerprint ID into an asset fingerprint database;
the vehicle networking management system is used for collecting asset data of a current vehicle, generating asset fingerprint ID of the current vehicle according to the asset data, comparing the asset fingerprint ID of the current vehicle in an asset fingerprint database, and identifying current running state data and current position data of the current vehicle, and comprises the following steps:
s41, acquiring asset data of a current vehicle from a vehicle-to-machine system of the current vehicle by the vehicle networking management system, wherein the asset data comprises a vehicle identification number VIN, a vehicle model code, a host factory code, a vehicle engine number, a software version number of each subsystem in the vehicle-to-machine system, a software provider code of each subsystem in the vehicle-to-machine system and a code line number corresponding to each subsystem software in the vehicle-to-machine system of the current vehicle;
s42, the vehicle networking management system generates an asset fingerprint ID of the current vehicle according to the asset data of the current vehicle; the car networking management system is deployed at the cloud end and is communicated with the car machine system in real time;
s43, the vehicle networking management system compares the asset fingerprint ID of the current vehicle with the vehicle asset fingerprint ID in the asset fingerprint database in the cloud system, and searches whether the ID identical with the asset fingerprint ID of the current vehicle exists or not, and if so, the step S45 is executed; if not, executing step S44;
s44, the vehicle networking management system judges that the current vehicle is attacked, and marks the current vehicle in the cloud system;
s45, the vehicle networking management system acquires current running state data and current position data of the current vehicle from an asset fingerprint database of the cloud system.
CN202311823459.7A 2023-12-28 2023-12-28 Intelligent networking automobile asset fingerprint generation and identification method and system Active CN117478708B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311823459.7A CN117478708B (en) 2023-12-28 2023-12-28 Intelligent networking automobile asset fingerprint generation and identification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311823459.7A CN117478708B (en) 2023-12-28 2023-12-28 Intelligent networking automobile asset fingerprint generation and identification method and system

Publications (2)

Publication Number Publication Date
CN117478708A CN117478708A (en) 2024-01-30
CN117478708B true CN117478708B (en) 2024-04-09

Family

ID=89635144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311823459.7A Active CN117478708B (en) 2023-12-28 2023-12-28 Intelligent networking automobile asset fingerprint generation and identification method and system

Country Status (1)

Country Link
CN (1) CN117478708B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106844701A (en) * 2017-01-03 2017-06-13 宁波亿拍客网络科技有限公司 A kind of specific markers and application method that identification is perceived based on computer vision
CN207198571U (en) * 2017-09-29 2018-04-06 北京新能源汽车股份有限公司 Vehicle-mounted fingerprint identification intelligent networking device and automobile
CN110035408A (en) * 2019-04-01 2019-07-19 江苏迪纳数字科技股份有限公司 A kind of public safety wisdom detection system and method based on wisdom net connection automobile
CN111694592A (en) * 2020-06-24 2020-09-22 深圳壹账通智能科技有限公司 Management method and system for project version release
CN113709104A (en) * 2021-07-19 2021-11-26 英博超算(南京)科技有限公司 Automobile fingerprint encryption identification method
US11321399B1 (en) * 2021-03-23 2022-05-03 Geotab Inc. Systems and methods for asset type fingerprinting and data message decoding
EP4064652A1 (en) * 2021-03-23 2022-09-28 GEOTAB Inc. Systems and methods for asset type fingerprinting and data message decoding
CN115174645A (en) * 2022-06-30 2022-10-11 北京新能源汽车股份有限公司 Automobile OTA (over the air) vehicle cloud interaction method and system
CN116385028A (en) * 2023-04-13 2023-07-04 晓数绿景(北京)科技发展有限公司 Carbon asset data management method, device and server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11423712B2 (en) * 2018-08-16 2022-08-23 Car Iq Inc. Blockchain based hardware appliance authentication
CN117370296A (en) * 2023-10-12 2024-01-09 惠州市德赛西威汽车电子股份有限公司 Method and system for acquiring log file of vehicle-mounted device and vehicle-mounted terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106844701A (en) * 2017-01-03 2017-06-13 宁波亿拍客网络科技有限公司 A kind of specific markers and application method that identification is perceived based on computer vision
CN207198571U (en) * 2017-09-29 2018-04-06 北京新能源汽车股份有限公司 Vehicle-mounted fingerprint identification intelligent networking device and automobile
CN110035408A (en) * 2019-04-01 2019-07-19 江苏迪纳数字科技股份有限公司 A kind of public safety wisdom detection system and method based on wisdom net connection automobile
CN111694592A (en) * 2020-06-24 2020-09-22 深圳壹账通智能科技有限公司 Management method and system for project version release
US11321399B1 (en) * 2021-03-23 2022-05-03 Geotab Inc. Systems and methods for asset type fingerprinting and data message decoding
EP4064652A1 (en) * 2021-03-23 2022-09-28 GEOTAB Inc. Systems and methods for asset type fingerprinting and data message decoding
CN113709104A (en) * 2021-07-19 2021-11-26 英博超算(南京)科技有限公司 Automobile fingerprint encryption identification method
CN115174645A (en) * 2022-06-30 2022-10-11 北京新能源汽车股份有限公司 Automobile OTA (over the air) vehicle cloud interaction method and system
CN116385028A (en) * 2023-04-13 2023-07-04 晓数绿景(北京)科技发展有限公司 Carbon asset data management method, device and server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NTA大流量采集分析技术在广电5G工业互联网网络安全公共服务平台的应用与研究;焦清文;《5G for Radio and Television》;20231130;全文 *

Also Published As

Publication number Publication date
CN117478708A (en) 2024-01-30

Similar Documents

Publication Publication Date Title
Trenwith et al. Digital forensic readiness in the cloud
KR101453379B1 (en) Method of securely downloading from distributed download sources
US20080083011A1 (en) Protocol/API between a key server (KAP) and an enforcement point (PEP)
CN108377264A (en) Vehicular ad hoc network quorum-sensing system data report De-weight method
CN110581839B (en) Content protection method and device
CN106790045B (en) distributed virtual machine agent device based on cloud environment and data integrity guarantee method
US11239999B1 (en) Blockchain network communications system
KR20200004528A (en) Monitoring system comprising function of transaction tracking for block-chain system, and method of monitoring for the same
CN115665138A (en) Automobile OTA (over the air) upgrading system and method
CN115396121A (en) Security authentication method for security chip OTA data packet and security chip device
CN111274594A (en) Block chain-based secure big data privacy protection sharing method
CN112749232A (en) Production data monitoring method and device, block chain node and storage medium
CN111597250A (en) Visualization method of block chain system
CN104717644A (en) Two-tiered wireless sensor network range query method capable of verifying privacy protection
CN117478708B (en) Intelligent networking automobile asset fingerprint generation and identification method and system
CN112202773B (en) Computer network information security monitoring and protection system based on internet
CN117439799A (en) Anti-tampering method for http request data
Feng et al. Autonomous vehicles' forensics in smart cities
EP3718284B1 (en) Extending encrypted traffic analytics with traffic flow data
CN114095521A (en) Storage method, device, equipment and storage medium of remote sensing data
CN116506154A (en) Safe verifiable federal learning scheme
CN113051585B (en) Data verification method and device, electronic equipment and storage medium
CN114125774A (en) Vehicle key dynamic updating method based on Internet of vehicles
CN113239402A (en) Power network data analysis method based on block chain and electronic equipment
CN114463000A (en) Block processing method, block chain network architecture, node and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant