[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115296815B - Identity authentication method for vehicle-mounted controller - Google Patents

Identity authentication method for vehicle-mounted controller Download PDF

Info

Publication number
CN115296815B
CN115296815B CN202210903731.1A CN202210903731A CN115296815B CN 115296815 B CN115296815 B CN 115296815B CN 202210903731 A CN202210903731 A CN 202210903731A CN 115296815 B CN115296815 B CN 115296815B
Authority
CN
China
Prior art keywords
key
ecu
gateway
uid
vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210903731.1A
Other languages
Chinese (zh)
Other versions
CN115296815A (en
Inventor
舒畅
孙伟
蔡艳波
王闯
吴戈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongfeng Motor Group Co Ltd
Original Assignee
Dongfeng Motor Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongfeng Motor Group Co Ltd filed Critical Dongfeng Motor Group Co Ltd
Priority to CN202210903731.1A priority Critical patent/CN115296815B/en
Publication of CN115296815A publication Critical patent/CN115296815A/en
Application granted granted Critical
Publication of CN115296815B publication Critical patent/CN115296815B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses an identity authentication method of a vehicle-mounted controller, which comprises the following steps: key injection: when the vehicle is off line, MASTERKEY is injected into the gateway by using a key injection tool; and (5) key distribution: the gateway uses a CMAC algorithm to generate a key for the UID responded by the ECU, and the key is finer into the HSM of the gateway after the ECU is verified successfully; identity authentication: when the whole vehicle is electrified, the gateway verifies the identity of the ECU through the stored UID of the ECU, so that the ECU is ensured to be legal. The invention uses the vehicle gateway as a trusted center, establishes a whole vehicle key management and distribution mechanism, provides a feasible method for identity authentication of the vehicle controller, and reduces the implementation difficulty of the original technical scheme.

Description

Identity authentication method for vehicle-mounted controller
Technical Field
The invention belongs to the technical field of automobile information safety, and particularly relates to an identity authentication method of a vehicle-mounted controller.
Background
In order to ensure the application safety of the Internet of vehicles and the safety of the whole vehicle communication and data, a management system of a whole vehicle secret key and a certificate needs to be constructed. The system generally comprises a PKI infrastructure, an encryption authentication module, an algorithm generation module, a key generation module and the like. And constructing a whole vehicle trust chain system through generating, distributing and managing the identification key.
The prior art scheme is generally based on a PKI infrastructure of a cloud, and 1) key injection is carried out on an ECU (electronic control unit) when the ECU is offline by using a production line tool; 2) When the whole vehicle is off line, network connection is established between the vehicle and the PKI infrastructure through the T-Box, and after certificates/keys are acquired from the PKI infrastructure, the certificates/keys are distributed in the vehicle through a CAN bus network; the basic mechanism of the vehicle key management architecture is shown in fig. 1. It has the following disadvantages:
1) The production line tool needs to be coupled with the development and manufacturing flow of each ECU provider, so that the influence is large, and the coordination difficulty is high;
2) The connection of the T-Box and the PKI infrastructure depends on wireless network communication, and uncertainty exists in the production line environment of the vehicle offline;
3) The key is distributed through the CAN bus network, so that a safe key interaction communication protocol needs to be additionally designed, and a large pressure is brought to the CAN bus load.
Disclosure of Invention
Aiming at the problems existing in the background technology, the invention aims to provide an identity authentication method of a vehicle-mounted controller, which utilizes a hardware encryption module (HSM) built in a vehicle-mounted gateway to establish a whole vehicle key management and distribution mechanism of key generation, safe storage and autonomous distribution; the vehicle-mounted gateway is used as a trusted center, and a system mechanism for identity authentication of the vehicle-mounted controller is established.
In order to achieve the above purpose, the identity authentication method of the vehicle-mounted controller designed by the invention is characterized in that:
S1, key injection: when the vehicle is off line, MASTERKEY, namely, a root key is injected into the gateway by using a key injection tool;
s2, key distribution: the gateway uses a CMAC algorithm to generate a key for the UID responded by the ECU, and the key is finer into the HSM of the gateway after the ECU is verified successfully;
S3, identity authentication: when the whole vehicle is electrified, the gateway verifies the identity of the ECU through the stored UID of the ECU, so that the ECU is ensured to be legal.
Preferably, step S1 is specifically as follows:
S101, a key injection tool requests to read the identity ID of a gateway;
S102, the gateway responds to the UID of the gateway;
S103, calculating key parameters M1-M5 by the key injection tool through the UID in S102 and sending the key parameters to the gateway; the key parameters M1-M3 are used for writing keys, and M4 and M5 are used for verifying writing results;
s104, after receiving the key parameters, the gateway uses M1, M2 and M3 as parameters and calls a key load function of the HSM to generate MASTERKEY;
S105, the gateway verifies that returned values M4 and M5 of the key load function are consistent with each other, and if so, the key injection is successful by comparing the returned values M4 and M5 with the returned values M4 and M4.
Preferably, step S2 is specifically as follows:
s201, the gateway sends a UID reading request, and the request data comprises a key state Mode field;
s202, the ECU sends UID response according to the key state Mode, and response data comprise self address and UID information;
S203, the gateway stores the UID after receiving the UID information; generating a master_Key for the UID of each ECU by using a CMAC algorithm to obtain M1-M5 parameters, and sending a Key update message to the ECU, wherein the data comprises a Key state Mode, a target ECU address and M1-M5;
S204, the ECU calculates and verifies M4 and M5 using the same method, and if successful, updates its key to the HSM, and returns a response, where the response data includes a key status Mode, a destination ECU address, and a success or failure status.
Further preferably, in S201, the key state includes an initial state, an updated key state, an erased key state; wherein, the initial state has no key.
Further preferably, in S202, the own address is the lower 8 bits of the ECU diagnostic ID.
Further preferably, in S202, a plaintext UID is used; or this uses the transmission ciphertext UID, and the decryption is performed accordingly in S203.
Preferably, in S3, the validity of the ECU is verified using a CMAC algorithm calculation based on the random number sent by the gateway and the UID of the ECU.
Further preferably, step S3 is specifically as follows:
S301, when the whole vehicle is powered on, the gateway generates a random number, and sends an identity authentication request, wherein the request data comprises the random number and an ECU destination address to be verified;
s302, the ECU calculates the UID of the ECU and the received gateway random number by using an AES_CMAC algorithm and a secure storage key during key distribution to obtain the MAC;
S303, the ECU responds to the gateway, and response data comprise MAC;
s304, the gateway calculates the random number and the UID of the stored ECU by using the same method to obtain MAC, compares whether the MAC and the MAC are consistent, and if the MAC and the MAC are consistent, the ECU is a legal ECU, so that normal communication can be realized; if the verification is inconsistent, the ECU is illegal, and the gateway alarms or blocks communication.
Further preferably, in S301, the gateway generates a 16-byte random number when the whole vehicle is powered on.
Further preferably, in S301, the authentication request data is required according to a field in the vehicle-mounted network communication security protocol.
The beneficial effects of the invention are as follows: the invention uses the vehicle gateway as a trusted center, establishes a whole vehicle key management and distribution mechanism, provides a feasible method for identity authentication of the vehicle controller, and reduces the implementation difficulty of the original technical scheme.
And MASTERKEY is injected into the gateway by using a key injection tool (diagnostic instrument), the gateway generates and distributes keys to each ECU, and the whole flow and mechanism of identity authentication between the gateway and each ECU.
Drawings
FIG. 1 is a prior art vehicle key management architecture
FIG. 2 is a schematic diagram of key injection according to the present invention
FIG. 3 is a schematic diagram of key distribution according to the present invention
FIG. 4 is a schematic diagram of identity authentication according to the present invention
Detailed Description
The following describes the invention in further detail, including preferred embodiments, by way of the accompanying drawings and by way of examples of some alternative embodiments of the invention. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
The invention relates to an identity authentication method of a vehicle-mounted controller, which comprises the following specific processes:
1) MASTERKEY-root key injection, as shown in figure 2,
When the vehicle is off line, MASTERKEY is injected into the gateway by using a key injection tool (diagnostic instrument), and the flow is as follows:
a) A key injection tool (diagnostic instrument) requests to read an identity ID (UID) of the gateway;
b) The gateway responds to the UID of the gateway;
c) The key injection tool (diagnostic instrument) calculates key parameters M1-M5 through UID and sends the key parameters M1-M5 to the gateway;
d) Key parameters M1 to M5: M1-M3 are used for writing secret keys, and M4 and M5 are used for verifying writing results;
e) After receiving the key parameters, the gateway uses M1, M2 and M3 as parameters and calls a key load function of the HSM to generate MASTERKEY;
f) Verifying the returned values M4, M5 of the key load function, comparing M4 with M4, and if the comparison is consistent, then the key loader is successful.
2) Key distribution, as shown in figure 3,
Keys are generated and distributed by the gateway to the various ECUs (controllers).
A) The gateway sends a UID reading request, and the request data comprises a key state Mode field, wherein the key state comprises an initial state (no key), an updated key state and an erased key state;
b) The ECU sends a UID response according to the key state Mode, response data comprise an address (8 bits lower than the ECU diagnosis ID) and a plaintext UID, the UID can be confused to obtain the UID, and the ciphertext UID is transmitted);
c) The gateway receives the plaintext UID, if the plaintext UID is the ciphertext UID, the anti-confusion UID obtains the UID, and then the UID is stored; generating a master_Key for the UID of each ECU by using a CMAC algorithm to obtain M1-M5 parameters, and sending a Key update message to the ECU, wherein the data comprises a Key state Mode, a target ECU address and M1-M5;
d) The ECU uses the same method to calculate and verify M4 and M5, if successful, the key is updated to the HSM, and a response is returned, wherein the response data comprises a key state Mode, a target ECU address and a success or failure state;
3) Identity authentication
And when the whole vehicle is electrified, the identity of the whole vehicle ECU is verified, and the communication ECU is ensured to be a legal ECU.
A) When the whole vehicle is electrified, the gateway generates 16 byte random numbers, sends an identity authentication request, wherein the request data comprises the random numbers and an ECU destination address to be verified, and the identity authentication request data is required according to fields in a vehicle-mounted network communication security protocol;
b) The ECU calculates the UID of the ECU and the received gateway random number by using an AES_CMAC algorithm and a secure storage key pair during key distribution to obtain an MAC;
c) The ECU responds to the gateway, and the response data comprises MAC;
d) The gateway uses the same method to calculate the random number and the UID of the stored ECU to obtain MAC, compares whether the random number and the UID are consistent, and if the random number and the UID are verified to be consistent, the ECU is a legal ECU, and can normally communicate; if the verification is inconsistent, the ECU is illegal, and the gateway alarms or blocks communication. Generally, alarm processing in the development testing stage and communication blocking in the mass production stage.
Device ID requires the use of UID (globally unique identification code) inside the HSM module;
the gateway of the present invention has a storage space for storing a plurality of UIDs, and each UID occupies 15 bytes.
The key update occurs when the gateway, ECU device is replaced. After the ECU is replaced, if the ECU is a legal ECU, a key distribution mechanism program is injected into the ECU, but the key state is an initial keyless state, the key injection tool is required to send key distribution request data, and the step S2 is directly executed, so that the key distribution is only required.
It will be readily understood by those skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention and that various modifications, combinations, substitutions, improvements, etc. may be made without departing from the spirit and principles of the invention.

Claims (7)

1. The identity authentication method of the vehicle-mounted controller is characterized by comprising the following steps of:
S1, key injection: when the vehicle is off line, the key injection tool is used for injecting the root key into the gateway;
S101, a key injection tool requests to read the identity ID of a gateway;
S102, the gateway responds to the UID of the gateway;
S103, calculating key parameters M1-M5 by the key injection tool through the UID in S102 and sending the key parameters to the gateway; the key parameters M1-M3 are used for writing keys, and M4 and M5 are used for verifying writing results;
s104, after receiving the key parameters, the gateway uses M1, M2 and M3 as parameters and calls a key load function of the HSM to generate MASTERKEY;
s105, the gateway verifies that returned values M4 and M5 of the key load function are compared with M4 and M4, whether M5 and M5 are consistent or not is judged, and if so, the key injection is successful;
S2, key distribution: the gateway uses a CMAC algorithm to generate a key for the UID responded by the ECU, and the key is updated to the HSM of the gateway after the ECU is verified successfully;
s201, the gateway sends a UID reading request, and the request data comprises a key state Mode field;
s202, the ECU sends UID response according to the key state Mode, and response data comprise self address and UID information;
S203, the gateway stores the UID after receiving the UID information; generating a master_Key for the UID of each ECU by using a CMAC algorithm to obtain M1-M5 parameters, and sending a Key update message to the ECU, wherein the data comprises a Key state Mode, a target ECU address and M1-M5;
S204, the ECU calculates and verifies M4 and M5 by using the same method, if successful, the key is updated to the HSM, and a response is returned, wherein the response data comprises a key state Mode, a target ECU address and a success or failure state;
S3, identity authentication: when the whole vehicle is electrified, the gateway verifies the identity of the ECU through the stored UID of the ECU, so that the ECU is ensured to be legal;
S301, when the whole vehicle is powered on, the gateway generates a random number, and sends an identity authentication request, wherein the request data comprises the random number and an ECU destination address to be verified;
s302, the ECU calculates the UID of the ECU and the received gateway random number by using an AES_CMAC algorithm and a secure storage key during key distribution to obtain the MAC;
S303, the ECU responds to the gateway, and response data comprise MAC;
s304, the gateway calculates the random number and the UID of the stored ECU by using the same method to obtain MAC, compares whether the MAC and the MAC are consistent, and if the MAC and the MAC are consistent, the ECU is a legal ECU, so that normal communication can be realized; if the verification is inconsistent, the ECU is illegal, and the gateway alarms or blocks communication.
2. The vehicle-mounted controller identity authentication method according to claim 1, characterized in that: in S201, the key state includes an initial state, an updated key state, an erased key state; wherein, the initial state has no key.
3. The vehicle-mounted controller identity authentication method according to claim 1, characterized in that: in S202, the own address is the lower 8 bits of the ECU diagnostic ID.
4. The vehicle-mounted controller identity authentication method according to claim 1, characterized in that: in S202, a plaintext UID is used; or this uses the transmission ciphertext UID, and the decryption is performed accordingly in S203.
5. The vehicle-mounted controller identity authentication method according to claim 1, characterized in that: and S3, calculating and verifying the validity of the ECU by using a CMAC algorithm according to the random number sent by the gateway and the UID of the ECU.
6. The vehicle-mounted controller identity authentication method according to claim 1, characterized in that: in S301, when the whole vehicle is powered on, the gateway generates a 16-byte random number.
7. The vehicle-mounted controller identity authentication method according to claim 1, characterized in that: in S301, the authentication request data is required according to a field in the vehicle network communication security protocol.
CN202210903731.1A 2022-07-28 2022-07-28 Identity authentication method for vehicle-mounted controller Active CN115296815B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210903731.1A CN115296815B (en) 2022-07-28 2022-07-28 Identity authentication method for vehicle-mounted controller

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210903731.1A CN115296815B (en) 2022-07-28 2022-07-28 Identity authentication method for vehicle-mounted controller

Publications (2)

Publication Number Publication Date
CN115296815A CN115296815A (en) 2022-11-04
CN115296815B true CN115296815B (en) 2024-07-05

Family

ID=83826898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210903731.1A Active CN115296815B (en) 2022-07-28 2022-07-28 Identity authentication method for vehicle-mounted controller

Country Status (1)

Country Link
CN (1) CN115296815B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106647723A (en) * 2017-02-08 2017-05-10 宝沃汽车(中国)有限公司 Vehicle condition monitoring method based on Internet of vehicles, vehicle condition monitoring system based on Internet of vehicles, and vehicle
CN107104791A (en) * 2017-03-29 2017-08-29 江苏大学 A kind of in-vehicle network one-time pad communication means hidden based on ECU identity

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6197000B2 (en) * 2015-07-03 2017-09-13 Kddi株式会社 System, vehicle, and software distribution processing method
JP6260066B2 (en) * 2016-01-18 2018-01-17 Kddi株式会社 In-vehicle computer system and vehicle
CN109314640B (en) * 2016-08-29 2021-11-12 Kddi株式会社 Vehicle information collection system, vehicle-mounted computer, vehicle information collection device, vehicle information collection method, and recording medium
CN114599028A (en) * 2022-03-21 2022-06-07 南通大学 Vehicle networking pseudonym management method based on homomorphic encryption mechanism

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106647723A (en) * 2017-02-08 2017-05-10 宝沃汽车(中国)有限公司 Vehicle condition monitoring method based on Internet of vehicles, vehicle condition monitoring system based on Internet of vehicles, and vehicle
CN107104791A (en) * 2017-03-29 2017-08-29 江苏大学 A kind of in-vehicle network one-time pad communication means hidden based on ECU identity

Also Published As

Publication number Publication date
CN115296815A (en) 2022-11-04

Similar Documents

Publication Publication Date Title
CN111131313B (en) Safety guarantee method and system for replacing ECU (electronic control Unit) of intelligent networked automobile
CN109672538B (en) Lightweight vehicle-mounted bus secure communication method and system
US9577997B2 (en) Authentication system and authentication method
CN102546155B (en) On-demand safe key generates method and system
CN112543927B (en) Equipment upgrading method and related equipment
CN106685653B (en) Vehicle remote firmware updating method and device based on information security technology
CN111279310A (en) Vehicle-mounted equipment upgrading method and related equipment
CN110708388B (en) Vehicle body safety anchor node device, method and network system for providing safety service
CN105187376A (en) Safe communication method of internal automobile network in Telematics
CN113613214B (en) In-vehicle message authentication key management method and readable storage medium
JP2013017140A (en) On-vehicle network system
CN104118392A (en) Engine anti-theft authentication method and device of engine anti-theft system
CN113016201B (en) Key provisioning method and related product
CN113114699A (en) Vehicle terminal identity certificate application method
US20230015877A1 (en) Certificate list update method and apparatus
CN115665138A (en) Automobile OTA (over the air) upgrading system and method
CN113766450A (en) Vehicle virtual key sharing method, mobile terminal, server and vehicle
CN112182551B (en) PLC equipment identity authentication system and PLC equipment identity authentication method
CN116094833A (en) Key management method and system for whole vehicle key distribution
US20220182248A1 (en) Secure startup method, controller, and control system
CN115296815B (en) Identity authentication method for vehicle-mounted controller
KR102576894B1 (en) Method for managing encryption keys inside the vehicle
CN110830243A (en) Symmetric key distribution method, device, vehicle and storage medium
CN114157489B (en) Communication domain controller safety communication method based on periodic authentication handshake mechanism
CN111736868B (en) Automobile remote updating method based on identity identification and bidirectional verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant