Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
The embodiment of the application provides a vehicle-mounted machine starting method, a system, computer equipment and a medium based on dynamic encryption.
The execution main body of the vehicle starting method based on dynamic encryption can be a vehicle starting system based on dynamic encryption, the vehicle starting system comprises a vehicle client and a cloud, and the vehicle client and the cloud are connected in a network mode to achieve data information transmission, and therefore dynamic encryption verification between the vehicle client and the cloud is achieved.
The vehicle-mounted starting method based on dynamic encryption is applied to the computer equipment 500 in fig. 5.
Fig. 1 is a flow chart of a vehicle-mounted device starting method based on dynamic encryption, which includes the following steps S110-S180.
S110, if the original fixed password input by the user is received, the vehicle client generates a verification code according to a preset verification model.
And S120, the vehicle client verifies the data information in the original fixed password through the fixed password to obtain verification result information.
S130, judging whether the verification result information accords with a preset verification rule.
And S140, if the verification result information accords with the verification rule, the vehicle client generates a dynamic key according to a preset dynamic encryption rule.
The dynamic key includes a vehicle-to-machine authentication code and a customer authentication code.
And S150, the vehicle-mounted client verifies the fixed password again through the vehicle-mounted verification code in the dynamic key to obtain the universal fixed password.
And S160, the vehicle client sends the universal fixed password to the cloud.
And S170, the cloud end calculates according to the universal fixed password and the dynamic encryption rule to obtain a final verification code corresponding to the received vehicle-mounted machine verification code.
And S180, the cloud uses the final verification code and the universal fixed password to open an entrance of the client of the vehicle so that a user enters a control page of the vehicle.
In a more specific implementation process, a user inputs a preset original fixed password on a user interface of the vehicle-mounted system. The password is a simple password preset between the user and the vehicle-mounted system and is used for preliminary identity authentication. After receiving an original fixed password input by a user, the vehicle client generates a verification code according to a preset verification model. The verification model may be an algorithm based on a time stamp, device identification, or other factors. And the vehicle client uses the fixed password to verify the data information in the original fixed password to obtain verification result information. The system judges whether the verification result information meets the requirements according to a preset verification rule. If the verification result does not meet the rules, the system will refuse further operations and prompt the user to re-enter the password or perform other error handling. And after the verification result accords with the rule, the vehicle client generates a dynamic key according to a preset dynamic encryption rule. The dynamic key comprises a vehicle-mounted verification code and a client verification code, and the two verification codes are dynamically generated, so that the security of the password is improved. And the vehicle-mounted client-side uses the vehicle-mounted verification code in the dynamic key to verify the fixed password again so as to generate a universal fixed password. The universal fixed password is a fixed password combined with a dynamic key and used for subsequent cloud verification. And the vehicle client sends the universal fixed password to the cloud server. The cloud server is a remote control and management center of the vehicle-mounted system and is responsible for processing password verification and other security related operations. And after the cloud server receives the universal fixed password, carrying out operation according to the dynamic encryption rule to generate a final verification code. The final verification code corresponds to the vehicle-mounted verification code, and the consistency of password verification is ensured. And the cloud server uses the final verification code and the universal fixed password to verify the request of the vehicle client. After the verification is passed, the cloud server uses the final verification code and the universal fixed password to open the entrance of the vehicle client. The user can enter the vehicle control page, and the complete access right to the vehicle-mounted system is obtained. By the multiple password protection mechanism, the scheme remarkably improves the safety of the vehicle-mounted system and prevents unauthorized access and data leakage. The dynamic password is introduced to enable the vehicle to start each time, different passwords are needed, and the safety of the system is greatly improved. The cloud verification link ensures the authenticity and effectiveness of the password, and is convenient for remote management and monitoring.
Specifically, in the implementation process, the user may first input a preset fixed password in the phone App of the vehicle-mounted device. When the input fixed password is correct and correct, the vehicle system activates the built-in password middleware. The password middleware then pops up an interface to require the user to perform the next dynamic verification. The popped middleware interface exposes a 6-digit dynamic verification mechanism. The user needs to manually calculate and input the correct 6-digit check code according to a certain algorithm (possibly related to a time stamp, a personal password, etc.). After entering the correct check code, the system will activate the factory mode and generate the unique identification code of the vehicle. This unique identification code is indicative of the identity of the vehicle and ensures the safety and uniqueness of subsequent operations. And the user inputs the unique identification code of the vehicle machine obtained in the previous step through a password system of the PC side. And after receiving the identification code, the cloud server verifies and generates a temporary dynamic password. The temporary dynamic password is then sent to the user and the vehicle side for further verification. The user enters the temporary password into the vehicle system using ADB (Android Debug Bridge) commands or other authorization means. After the vehicle-mounted system receives the temporary password, the temporary password is compared and checked with the dynamic password fed back to the vehicle-mounted system by the cloud. After the verification is passed, the vehicle-mounted system feeds back the corresponding verification result, confirms the identity of the user and allows access or execution of subsequent operations. The fixed cipher is a preset simple cipher between the user and the vehicle system as the initial identity verification. And the time sequence dynamic key ensures that each verification is unique through a 6-bit number dynamic verification mechanism of the middleware and a time sequence algorithm, and enhances the security of the password. In the traditional MD5 random bit differentiation, random bit differentiation processing of encryption algorithms such as MD5 and the like can be adopted in the process of generating the temporary dynamic password, so that the complexity and unpredictability of the password are further improved.
In conclusion, the verification mode of layer-by-layer encryption not only maintains the core advantages of the traditional encryption method, but also improves the safety through an innovative mode (such as a time sequence dynamic secret key), so that the old encryption mode is revived. The whole flow is fine in design, so that access rights to the vehicle-mounted system can be obtained only by multiple authenticated users, and unauthorized access and potential security threat are effectively prevented.
In a more specific embodiment, as shown in FIG. 2, method S110 is performed, which further specifically includes performing steps S111-S114.
S111, generating a random character string corresponding to the login account information in the vehicle-to-machine client according to the verification code coding rule in the verification model.
S112, performing Base64 coding on the random character string to obtain a random coding sequence.
S113, converting the random coding sequence according to a sequence conversion rule in the check model to obtain a dynamic coding sequence.
S114, splicing the random coding sequence and the dynamic coding sequence to obtain the verification code.
In a specific embodiment, the system generates a random character string corresponding to the login account information of the vehicle-to-machine client according to a predetermined verification code encoding rule in the verification model. This step ensures that each generated verification code is unique, thereby improving security. The generated random character string is converted into a random code sequence through Base64 coding. Base64 coding is a common coding scheme that ensures the security of binary data during transmission, while maintaining the readability of the coded string. And then, the system converts the random coding sequence according to a sequence conversion rule in the check model to obtain a dynamic coding sequence. This conversion process increases the complexity and unpredictability of the captcha, further enhancing security. Finally, the system splices the random code sequence and the dynamic code sequence together to form a final verification code. The splicing mode combines static and dynamic elements, so that the verification code is difficult to guess and copy, and unauthorized access is effectively prevented. Through the specific implementation steps, the password protection mechanism of the vehicle-mounted system not only ensures the authenticity of the user identity and the safety of the data, but also improves the overall operation efficiency of the system through efficient coding and conversion processes. The method considers the safety and the user experience, and is an important means for intelligent network-connected automobile safety protection.
In a more specific embodiment, as shown in FIG. 3, method S140 is performed, further specifically including performing steps S141-S142.
S141, generating a vehicle-mounted verification code and a corresponding client verification code according to login account information in the vehicle-mounted client.
S142, combining the vehicle-mounted verification code and the client verification code to obtain a dynamic key.
Specifically, the system utilizes login account information in the vehicle client to generate a pair of associated verification codes, namely a vehicle verification code and a client verification code through a specific algorithm. The two verification codes are uniquely corresponding, the vehicle-mounted verification code is used for verifying the vehicle-mounted terminal, and the client verification code is provided for a user to perform subsequent operation. This way of generation ensures personalization of the verification code while improving security of the system, since each verification code is uniquely generated based on the account information of the user. And then, the system combines the vehicle-mounted verification code and the client verification code according to a certain rule to form a dynamic key. The dynamic key is the key for the safety communication between the vehicle machine side and the user side, and is used in the encryption and decryption process to ensure the safety of data transmission. The combination of the dynamic keys makes each verification unique, and even under the same login account information, each generated dynamic key is different, so that replay attacks and other security threats are effectively prevented. The login account information is processed by using a hash function or an encryption algorithm to generate an initial verification code. And applying a time stamp or other dynamic factors to ensure timeliness of the verification code. The vehicle-mounted verification code and the client verification code are combined through an encryption algorithm (such as AES) to generate a dynamic key. Through the steps, the dynamic password protection mechanism of the vehicle-mounted system not only improves the safety of data transmission, but also ensures the legality of the user identity, and provides an efficient and safe data protection scheme for the intelligent network-connected automobile.
In a more specific embodiment, the execution method S180 further specifically includes symmetric verifying the universal fixed password according to the final verification code to obtain a pass code, and performing pass authentication on the entrance of the client of the vehicle according to the pass code to enable the user to enter the control page of the vehicle.
Specifically, the system uses the final verification code to perform symmetric verification on the universal fixed password. Symmetric authentication is an encryption process in which the same key (in this case the final authentication code) is used for both encryption and decryption operations. A specific operation may include encrypting the universal fixed password using the final authentication code as a key by an encryption algorithm (e.g., AES or DES) to generate an encrypted ciphertext, i.e., a passcode. Once the passcode is generated, the system will use the passcode to authenticate the entry of the vehicle client. This process verifies whether the user has the correct final verification code and is authorized to access the vehicle system. If the pass code is successfully verified, the user is granted access rights and can enter the car control page. This process ensures that only properly authenticated users can control the system, thereby protecting the vehicle from unauthorized access. And encrypting the universal fixed password by using the final verification code to generate the pass code. And comparing the generated pass code with the pass code expected by the vehicle-mounted system. If the passcodes match, the system will allow the user to enter the car control page, and if not, access is denied. Through the steps, the dynamic password protection mechanism of the vehicle-mounted system not only ensures the authenticity of the user identity and the safety of the data, but also provides an efficient user access control method. The method ensures the safe transmission and verification of the password through the symmetric encryption technology, simplifies the user login process and improves the user experience.
In a more specific embodiment, the method comprises the steps of carrying out pass authentication on an entrance of a client of a vehicle machine according to a pass code to enable a user to enter a vehicle machine control page, and further specifically comprises the steps of verifying the pass code according to a verification rule in a dynamic encryption rule to obtain a verification result, decrypting the entrance password of the client of the vehicle machine according to the pass code to obtain a data information character string corresponding to the entrance password if the verification result is passed, and carrying out format conversion on the obtained decryption information character string according to a conversion rule in the dynamic encryption rule to obtain a vehicle machine control page identification code corresponding to the entrance password.
Specifically, the system verifies the pass code according to the verification rule in the dynamic encryption rule. This step verifies the validity and correctness of the passcode. The check rules may include checking the length, format, whether the pass code is within a validity period, etc. If the passcode passes the verification, the system will obtain a "pass" verification result, and if it does not, the user may be required to reenter the verification information or take other security measures. Once the verification result is "pass", the system will decrypt the entry password of the vehicle client using the pass code. The decryption process uses the pass code as a key to recover the original entry password data information string. The system carries out format conversion on the decrypted information character string according to the conversion rule in the dynamic encryption rule. Such conversion may be to convert the string into a specific identification code, such as a UUID or other unique identifier. The conversion rules ensure that the information string can be properly converted into the identification code required for the vehicle control page. Finally, the system obtains the identification code of the vehicle-mounted control page corresponding to the entry password, wherein the identification code is a key certificate for the user to enter the vehicle-mounted control page. Through these steps, the vehicle-mounted system can ensure that only the correctly authenticated user can access the vehicle control page. The whole process not only ensures the safety, but also improves the reliability of the system and the convenience of user access through accurate verification and decryption steps. Such embodiments provide a safe, efficient and convenient interactive experience for users of intelligent networked automobiles.
Fig. 4 is a schematic block diagram of a vehicle-mounted starting system based on dynamic encryption according to an embodiment of the present application. As shown in the figure, the present application also provides a vehicle starting system 100 based on dynamic encryption, corresponding to the above vehicle starting method based on dynamic encryption. The vehicle starting system based on dynamic encryption comprises a unit for executing the vehicle starting method based on dynamic encryption, and the system comprises a plurality of unit modules configured in a vehicle client and a cloud, wherein the vehicle client can be terminal equipment configured in a vehicle-mounted intelligent vehicle. Specifically, referring to fig. 4, the dynamic encryption-based vehicle-mounted starting system 100 includes a verification code generating unit 110 configured to generate a verification code according to a preset verification model by a vehicle-mounted client if an original fixed password input by a user is received, a verification result generating unit 120 configured to verify data information in the original fixed password by the vehicle-mounted client to obtain verification result information, a judging unit 130 configured to judge whether the verification result information conforms to a preset verification rule, a key generating unit 140 configured to generate a dynamic key according to the preset dynamic encryption rule if the verification result information conforms to the verification rule, the dynamic key including a vehicle-mounted verification code and a client verification code, a verifying unit 150 configured to re-verify the fixed password by the vehicle-mounted client through the vehicle-mounted verification code in the dynamic key to obtain a general fixed password, a password transmitting unit 160 configured to transmit the general fixed password to the vehicle-mounted client, an operation unit 170 configured to operate according to the general fixed password and the dynamic encryption rule to obtain a final verification code corresponding to the received vehicle-mounted verification code, and an opening unit 180 configured to finally verify the general fixed password and to control the vehicle-mounted client to enter a vehicle-mounted page to the vehicle-mounted client. In addition, the system further comprises a character string generating unit, a coding unit, a sequence converting unit and a client verification code generating unit, wherein the character string generating unit is used for generating a random character string corresponding to login account information in a vehicle client according to verification code coding rules in a verification model, the coding unit is used for performing Base64 coding on the random character string to obtain a random coding sequence, the sequence converting unit is used for converting the random coding sequence according to sequence conversion rules in the verification model to obtain a dynamic coding sequence, and the client verification code generating unit is used for generating a vehicle authentication code and a corresponding client verification code according to the login account information in the vehicle client.
It should be noted that, as those skilled in the art can clearly understand, the specific implementation process of the vehicle-mounted starting system and each unit based on dynamic encryption may refer to the corresponding description in the foregoing method embodiment, and for convenience and brevity of description, the description is omitted here.
The dynamic encryption-based vehicle start-up system described above may be implemented in the form of a computer program that is executable on a computer device as shown in fig. 5.
Referring to fig. 5, a schematic block diagram of a computer device according to an embodiment of the present application is shown. The computer device 500 may be an electronic device with communication functions that is interconnected with an on-board smart car machine.
The computer device 500 includes a processor 502, a memory, and a network interface 505, connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer program 5032 includes program instructions that, when executed, cause the processor 502 to perform a dynamic encryption-based vehicle start-up method.
The processor 502 is used to provide computing and control capabilities to support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the execution of a computer program 5032 in the non-volatile storage medium 503, which computer program 5032, when executed by the processor 502, causes the processor 502 to perform a vehicle start-up method based on dynamic encryption.
The network interface 505 is used for network communication with other devices. It will be appreciated by those skilled in the art that the architecture shown in fig. 5 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting of the computer device 500 to which the present inventive arrangements may be implemented, as a particular computer device 500 may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
It should be appreciated that in embodiments of the present application, the Processor 502 may be a central processing unit (Central Processing Unit, CPU), the Processor 502 may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL processors, DSPs), application SPECIFIC INTEGRATED Circuits (ASICs), off-the-shelf Programmable gate arrays (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those skilled in the art will appreciate that all or part of the flow in a method embodying the above described embodiments may be accomplished by computer programs instructing the relevant hardware. The computer program comprises program instructions, and the computer program can be stored in a storage medium, which is a computer readable storage medium. The program instructions are executed by at least one processor in the computer system to implement the flow steps of the embodiments of the method described above.
Accordingly, the present application also provides a storage medium. The storage medium may be a computer readable storage medium. The storage medium stores a computer program, wherein the computer program includes program instructions. The program instruction is executed by a processor to enable the processor to execute the following steps of generating a verification code according to a preset verification model if an original fixed password input by a user is received, verifying data information in the original fixed password through the fixed password to obtain verification result information by the vehicle client, judging whether the verification result information accords with preset verification rules, generating a dynamic key according to preset dynamic encryption rules by the vehicle client if the verification result information accords with the verification rules, verifying the fixed password again through the vehicle authentication code in the dynamic key to obtain a universal fixed password by the vehicle client, sending the universal fixed password to a cloud, calculating according to the universal fixed password and the dynamic encryption rules by the cloud to obtain a final verification code corresponding to the received vehicle authentication code, and starting an inlet of the vehicle client by utilizing the final verification code and the universal fixed password so as to enable the user to enter a vehicle control page.
The storage medium may be a U-disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk, or other various computer-readable storage media that can store program codes.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs. The units in the device of the embodiment of the application can be combined, divided and deleted according to actual needs. In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The integrated unit may be stored in a storage medium if implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application is essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a terminal, a network device, or the like) to perform all or part of the steps of the methods of the embodiments of the present application.
The present application is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the present application, and these modifications and substitutions are intended to be included in the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.