[go: up one dir, main page]

CN119485282B - Vehicle startup method, system, computer equipment and medium based on dynamic encryption - Google Patents

Vehicle startup method, system, computer equipment and medium based on dynamic encryption

Info

Publication number
CN119485282B
CN119485282B CN202411580707.4A CN202411580707A CN119485282B CN 119485282 B CN119485282 B CN 119485282B CN 202411580707 A CN202411580707 A CN 202411580707A CN 119485282 B CN119485282 B CN 119485282B
Authority
CN
China
Prior art keywords
vehicle
verification
client
verification code
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411580707.4A
Other languages
Chinese (zh)
Other versions
CN119485282A (en
Inventor
李蛟
朱玖琳
李纪文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beidou Zhilian Nanjing Technology Co ltd
Beidou Zhilian Technology Co ltd
Original Assignee
Beidou Zhilian Nanjing Technology Co ltd
Beidou Zhilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beidou Zhilian Nanjing Technology Co ltd, Beidou Zhilian Technology Co ltd filed Critical Beidou Zhilian Nanjing Technology Co ltd
Priority to CN202411580707.4A priority Critical patent/CN119485282B/en
Publication of CN119485282A publication Critical patent/CN119485282A/en
Application granted granted Critical
Publication of CN119485282B publication Critical patent/CN119485282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/23Means to switch the anti-theft system on or off using manual input of alphanumerical codes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/108Encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本申请实施例公开了一种基于动态加密的车机启动方法、系统、计算机设备及介质,方法包括若接收到用户所输入的原始固定密码,车机客户端根据预设的校验模型生成验证码;通过固定密码对原始固定密码中的数据信息进行验证;判断验证结果信息是否符合预设的验证规则;根据预设的动态加密规则生成动态密钥,动态密钥包括车机验证码以及客户验证码;车机客户端通过动态密钥中的车机验证码对固定密码进行再次验证得到通用固定密码;将通用固定密码发送至云端;根据通用固定密码及动态加密规则进行运算获取与接收到的车机验证码所对应的最终验证码。本申请实施例的方法通过层层加码的验证方式提升了安全性,有效防止了未授权访问和潜在的安全威胁。

The embodiments of the present application disclose a vehicle computer startup method, system, computer device, and medium based on dynamic encryption. The method includes: upon receiving the original fixed password entered by the user, the vehicle computer client generates a verification code according to a preset verification model; verifies the data information in the original fixed password using the fixed password; determines whether the verification result information complies with the preset verification rules; generates a dynamic key according to the preset dynamic encryption rules, the dynamic key including the vehicle computer verification code and the customer verification code; the vehicle computer client re-verifies the fixed password using the vehicle computer verification code in the dynamic key to obtain a universal fixed password; sends the universal fixed password to the cloud; and performs calculations based on the universal fixed password and the dynamic encryption rules to obtain a final verification code corresponding to the received vehicle computer verification code. The method of the embodiments of the present application improves security through a layered verification method, effectively preventing unauthorized access and potential security threats.

Description

Vehicle-mounted machine starting method, system, computer equipment and medium based on dynamic encryption
Technical Field
The application relates to the technical field of intelligent driving, in particular to a vehicle-machine starting method, a system, computer equipment and a medium based on dynamic encryption.
Background
With the continuous progress of automobile technology, the functions of the vehicle-mounted system are increased increasingly, and the vehicle-mounted system covers various aspects of navigation, entertainment, communication and the like. These systems typically require connection to the internet to provide a more comprehensive service, but at the same time expose the risk of information security. Hackers may use unsafe interfaces or communication channels to attack the vehicle-mounted systems, resulting in data leakage, service interruption, and even in extreme cases compromising the vehicle's driving safety. To address these challenges, on-board system password protection techniques have evolved. The key of the vehicle-mounted system password protection technology is that the security of data transmission and the integrity of a system are guaranteed through an encryption and authentication mechanism, so that information security threat is effectively prevented, but the existing vehicle-mounted machine starting verification method has the problem of low security.
Disclosure of Invention
The embodiment of the application provides a vehicle machine starting method, a system, computer equipment and a medium based on dynamic encryption, which aim to solve the problem of low safety in a vehicle machine starting verification process.
In a first aspect, an embodiment of the present application provides a vehicle starting method based on dynamic encryption, which is applied to a vehicle starting system based on dynamic encryption, where the vehicle starting system includes a vehicle client and a cloud, the vehicle client and the cloud establish network connection to implement transmission of data information, so as to implement dynamic encryption verification between the vehicle client and the cloud, the method includes that if an original fixed password input by a user is received, the vehicle client generates a verification code according to a preset verification model, the vehicle client verifies the data information in the original fixed password through the fixed password to obtain verification result information, and judges whether the verification result information accords with a preset verification rule, if the verification result information accords with the verification rule, the vehicle client generates a dynamic key according to a preset dynamic encryption rule, the dynamic key includes a vehicle verification code and a client verification code, the vehicle client verifies the fixed password again through the vehicle verification code in the dynamic key to obtain a general fixed password, the general fixed password is sent to the vehicle client, the general machine client verifies the data information in the original fixed password through a preset verification model, and the general password is received by the vehicle client and the general password enters a final verification code, and the general page is controlled to finally, and the vehicle is authenticated and finally the vehicle is verified.
The vehicle-mounted starting system based on dynamic encryption comprises a verification code generation unit, a verification result generation unit, a judgment unit and an opening unit, wherein the verification code generation unit is used for generating a verification code according to a preset verification model if an original fixed password input by a user is received, the verification result generation unit is used for verifying data information in the original fixed password through the fixed password to obtain verification result information, the judgment unit is used for judging whether the verification result information accords with preset verification rules, the key generation unit is used for generating a dynamic key according to the preset dynamic encryption rules if the verification result information accords with the verification rules, the dynamic key comprises a vehicle-mounted verification code and a client verification code, the verification unit is used for re-verifying the fixed password through the vehicle-mounted verification code in the dynamic key to obtain a universal fixed password, the password transmission unit is used for transmitting the universal fixed password to a cloud end, the operation unit is used for performing operation according to the universal fixed password and the dynamic encryption rules to obtain a final verification code corresponding to the received vehicle-mounted verification code, and the opening unit is used for enabling the universal fixed password to enter a vehicle-mounted client to control page of a user to be opened.
In a third aspect, an embodiment of the present application further provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the method when executing the computer program.
In a fourth aspect, embodiments of the present application also provide a computer readable storage medium storing a computer program comprising program instructions which, when executed by a processor, implement the above-described method.
The embodiment of the application provides a vehicle-mounted machine starting method, a system, computer equipment and a medium based on dynamic encryption. The method comprises the steps that if an original fixed password input by a user is received, a vehicle client generates a verification code according to a preset verification model, the vehicle client verifies data information in the original fixed password through the fixed password to obtain verification result information, whether the verification result information accords with preset verification rules is judged, if the verification result information accords with the verification rules, the vehicle client generates a dynamic key according to preset dynamic encryption rules, the dynamic key comprises the vehicle verification code and a client verification code, the vehicle client verifies the fixed password again through the vehicle verification code in the dynamic key to obtain a general fixed password, the vehicle client sends the general fixed password to a cloud, the cloud calculates according to the general fixed password and the dynamic encryption rules to obtain a final verification code corresponding to the received vehicle verification code, and the cloud uses the final verification code and the general fixed password to open an entrance of the vehicle client so that the user enters a vehicle control page. According to the method, through a verification mode of layer-by-layer coding, the core advantages of the traditional encryption method are reserved, and safety is improved through an innovative mode (such as a time sequence dynamic secret key), so that the old encryption mode is revived. The whole flow is fine in design, so that access rights to the vehicle-mounted system can be obtained only by multiple authenticated users, and unauthorized access and potential security threat are effectively prevented.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a vehicle-mounted machine starting method based on dynamic encryption provided by an embodiment of the application;
fig. 2 is a schematic sub-flowchart of a vehicle-mounted device starting method based on dynamic encryption according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another sub-flowchart of a vehicle-mounted device starting method based on dynamic encryption according to an embodiment of the present application;
FIG. 4 is a schematic block diagram of a vehicle-mounted starting system based on dynamic encryption provided by an embodiment of the application;
Fig. 5 is a schematic block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
The embodiment of the application provides a vehicle-mounted machine starting method, a system, computer equipment and a medium based on dynamic encryption.
The execution main body of the vehicle starting method based on dynamic encryption can be a vehicle starting system based on dynamic encryption, the vehicle starting system comprises a vehicle client and a cloud, and the vehicle client and the cloud are connected in a network mode to achieve data information transmission, and therefore dynamic encryption verification between the vehicle client and the cloud is achieved.
The vehicle-mounted starting method based on dynamic encryption is applied to the computer equipment 500 in fig. 5.
Fig. 1 is a flow chart of a vehicle-mounted device starting method based on dynamic encryption, which includes the following steps S110-S180.
S110, if the original fixed password input by the user is received, the vehicle client generates a verification code according to a preset verification model.
And S120, the vehicle client verifies the data information in the original fixed password through the fixed password to obtain verification result information.
S130, judging whether the verification result information accords with a preset verification rule.
And S140, if the verification result information accords with the verification rule, the vehicle client generates a dynamic key according to a preset dynamic encryption rule.
The dynamic key includes a vehicle-to-machine authentication code and a customer authentication code.
And S150, the vehicle-mounted client verifies the fixed password again through the vehicle-mounted verification code in the dynamic key to obtain the universal fixed password.
And S160, the vehicle client sends the universal fixed password to the cloud.
And S170, the cloud end calculates according to the universal fixed password and the dynamic encryption rule to obtain a final verification code corresponding to the received vehicle-mounted machine verification code.
And S180, the cloud uses the final verification code and the universal fixed password to open an entrance of the client of the vehicle so that a user enters a control page of the vehicle.
In a more specific implementation process, a user inputs a preset original fixed password on a user interface of the vehicle-mounted system. The password is a simple password preset between the user and the vehicle-mounted system and is used for preliminary identity authentication. After receiving an original fixed password input by a user, the vehicle client generates a verification code according to a preset verification model. The verification model may be an algorithm based on a time stamp, device identification, or other factors. And the vehicle client uses the fixed password to verify the data information in the original fixed password to obtain verification result information. The system judges whether the verification result information meets the requirements according to a preset verification rule. If the verification result does not meet the rules, the system will refuse further operations and prompt the user to re-enter the password or perform other error handling. And after the verification result accords with the rule, the vehicle client generates a dynamic key according to a preset dynamic encryption rule. The dynamic key comprises a vehicle-mounted verification code and a client verification code, and the two verification codes are dynamically generated, so that the security of the password is improved. And the vehicle-mounted client-side uses the vehicle-mounted verification code in the dynamic key to verify the fixed password again so as to generate a universal fixed password. The universal fixed password is a fixed password combined with a dynamic key and used for subsequent cloud verification. And the vehicle client sends the universal fixed password to the cloud server. The cloud server is a remote control and management center of the vehicle-mounted system and is responsible for processing password verification and other security related operations. And after the cloud server receives the universal fixed password, carrying out operation according to the dynamic encryption rule to generate a final verification code. The final verification code corresponds to the vehicle-mounted verification code, and the consistency of password verification is ensured. And the cloud server uses the final verification code and the universal fixed password to verify the request of the vehicle client. After the verification is passed, the cloud server uses the final verification code and the universal fixed password to open the entrance of the vehicle client. The user can enter the vehicle control page, and the complete access right to the vehicle-mounted system is obtained. By the multiple password protection mechanism, the scheme remarkably improves the safety of the vehicle-mounted system and prevents unauthorized access and data leakage. The dynamic password is introduced to enable the vehicle to start each time, different passwords are needed, and the safety of the system is greatly improved. The cloud verification link ensures the authenticity and effectiveness of the password, and is convenient for remote management and monitoring.
Specifically, in the implementation process, the user may first input a preset fixed password in the phone App of the vehicle-mounted device. When the input fixed password is correct and correct, the vehicle system activates the built-in password middleware. The password middleware then pops up an interface to require the user to perform the next dynamic verification. The popped middleware interface exposes a 6-digit dynamic verification mechanism. The user needs to manually calculate and input the correct 6-digit check code according to a certain algorithm (possibly related to a time stamp, a personal password, etc.). After entering the correct check code, the system will activate the factory mode and generate the unique identification code of the vehicle. This unique identification code is indicative of the identity of the vehicle and ensures the safety and uniqueness of subsequent operations. And the user inputs the unique identification code of the vehicle machine obtained in the previous step through a password system of the PC side. And after receiving the identification code, the cloud server verifies and generates a temporary dynamic password. The temporary dynamic password is then sent to the user and the vehicle side for further verification. The user enters the temporary password into the vehicle system using ADB (Android Debug Bridge) commands or other authorization means. After the vehicle-mounted system receives the temporary password, the temporary password is compared and checked with the dynamic password fed back to the vehicle-mounted system by the cloud. After the verification is passed, the vehicle-mounted system feeds back the corresponding verification result, confirms the identity of the user and allows access or execution of subsequent operations. The fixed cipher is a preset simple cipher between the user and the vehicle system as the initial identity verification. And the time sequence dynamic key ensures that each verification is unique through a 6-bit number dynamic verification mechanism of the middleware and a time sequence algorithm, and enhances the security of the password. In the traditional MD5 random bit differentiation, random bit differentiation processing of encryption algorithms such as MD5 and the like can be adopted in the process of generating the temporary dynamic password, so that the complexity and unpredictability of the password are further improved.
In conclusion, the verification mode of layer-by-layer encryption not only maintains the core advantages of the traditional encryption method, but also improves the safety through an innovative mode (such as a time sequence dynamic secret key), so that the old encryption mode is revived. The whole flow is fine in design, so that access rights to the vehicle-mounted system can be obtained only by multiple authenticated users, and unauthorized access and potential security threat are effectively prevented.
In a more specific embodiment, as shown in FIG. 2, method S110 is performed, which further specifically includes performing steps S111-S114.
S111, generating a random character string corresponding to the login account information in the vehicle-to-machine client according to the verification code coding rule in the verification model.
S112, performing Base64 coding on the random character string to obtain a random coding sequence.
S113, converting the random coding sequence according to a sequence conversion rule in the check model to obtain a dynamic coding sequence.
S114, splicing the random coding sequence and the dynamic coding sequence to obtain the verification code.
In a specific embodiment, the system generates a random character string corresponding to the login account information of the vehicle-to-machine client according to a predetermined verification code encoding rule in the verification model. This step ensures that each generated verification code is unique, thereby improving security. The generated random character string is converted into a random code sequence through Base64 coding. Base64 coding is a common coding scheme that ensures the security of binary data during transmission, while maintaining the readability of the coded string. And then, the system converts the random coding sequence according to a sequence conversion rule in the check model to obtain a dynamic coding sequence. This conversion process increases the complexity and unpredictability of the captcha, further enhancing security. Finally, the system splices the random code sequence and the dynamic code sequence together to form a final verification code. The splicing mode combines static and dynamic elements, so that the verification code is difficult to guess and copy, and unauthorized access is effectively prevented. Through the specific implementation steps, the password protection mechanism of the vehicle-mounted system not only ensures the authenticity of the user identity and the safety of the data, but also improves the overall operation efficiency of the system through efficient coding and conversion processes. The method considers the safety and the user experience, and is an important means for intelligent network-connected automobile safety protection.
In a more specific embodiment, as shown in FIG. 3, method S140 is performed, further specifically including performing steps S141-S142.
S141, generating a vehicle-mounted verification code and a corresponding client verification code according to login account information in the vehicle-mounted client.
S142, combining the vehicle-mounted verification code and the client verification code to obtain a dynamic key.
Specifically, the system utilizes login account information in the vehicle client to generate a pair of associated verification codes, namely a vehicle verification code and a client verification code through a specific algorithm. The two verification codes are uniquely corresponding, the vehicle-mounted verification code is used for verifying the vehicle-mounted terminal, and the client verification code is provided for a user to perform subsequent operation. This way of generation ensures personalization of the verification code while improving security of the system, since each verification code is uniquely generated based on the account information of the user. And then, the system combines the vehicle-mounted verification code and the client verification code according to a certain rule to form a dynamic key. The dynamic key is the key for the safety communication between the vehicle machine side and the user side, and is used in the encryption and decryption process to ensure the safety of data transmission. The combination of the dynamic keys makes each verification unique, and even under the same login account information, each generated dynamic key is different, so that replay attacks and other security threats are effectively prevented. The login account information is processed by using a hash function or an encryption algorithm to generate an initial verification code. And applying a time stamp or other dynamic factors to ensure timeliness of the verification code. The vehicle-mounted verification code and the client verification code are combined through an encryption algorithm (such as AES) to generate a dynamic key. Through the steps, the dynamic password protection mechanism of the vehicle-mounted system not only improves the safety of data transmission, but also ensures the legality of the user identity, and provides an efficient and safe data protection scheme for the intelligent network-connected automobile.
In a more specific embodiment, the execution method S180 further specifically includes symmetric verifying the universal fixed password according to the final verification code to obtain a pass code, and performing pass authentication on the entrance of the client of the vehicle according to the pass code to enable the user to enter the control page of the vehicle.
Specifically, the system uses the final verification code to perform symmetric verification on the universal fixed password. Symmetric authentication is an encryption process in which the same key (in this case the final authentication code) is used for both encryption and decryption operations. A specific operation may include encrypting the universal fixed password using the final authentication code as a key by an encryption algorithm (e.g., AES or DES) to generate an encrypted ciphertext, i.e., a passcode. Once the passcode is generated, the system will use the passcode to authenticate the entry of the vehicle client. This process verifies whether the user has the correct final verification code and is authorized to access the vehicle system. If the pass code is successfully verified, the user is granted access rights and can enter the car control page. This process ensures that only properly authenticated users can control the system, thereby protecting the vehicle from unauthorized access. And encrypting the universal fixed password by using the final verification code to generate the pass code. And comparing the generated pass code with the pass code expected by the vehicle-mounted system. If the passcodes match, the system will allow the user to enter the car control page, and if not, access is denied. Through the steps, the dynamic password protection mechanism of the vehicle-mounted system not only ensures the authenticity of the user identity and the safety of the data, but also provides an efficient user access control method. The method ensures the safe transmission and verification of the password through the symmetric encryption technology, simplifies the user login process and improves the user experience.
In a more specific embodiment, the method comprises the steps of carrying out pass authentication on an entrance of a client of a vehicle machine according to a pass code to enable a user to enter a vehicle machine control page, and further specifically comprises the steps of verifying the pass code according to a verification rule in a dynamic encryption rule to obtain a verification result, decrypting the entrance password of the client of the vehicle machine according to the pass code to obtain a data information character string corresponding to the entrance password if the verification result is passed, and carrying out format conversion on the obtained decryption information character string according to a conversion rule in the dynamic encryption rule to obtain a vehicle machine control page identification code corresponding to the entrance password.
Specifically, the system verifies the pass code according to the verification rule in the dynamic encryption rule. This step verifies the validity and correctness of the passcode. The check rules may include checking the length, format, whether the pass code is within a validity period, etc. If the passcode passes the verification, the system will obtain a "pass" verification result, and if it does not, the user may be required to reenter the verification information or take other security measures. Once the verification result is "pass", the system will decrypt the entry password of the vehicle client using the pass code. The decryption process uses the pass code as a key to recover the original entry password data information string. The system carries out format conversion on the decrypted information character string according to the conversion rule in the dynamic encryption rule. Such conversion may be to convert the string into a specific identification code, such as a UUID or other unique identifier. The conversion rules ensure that the information string can be properly converted into the identification code required for the vehicle control page. Finally, the system obtains the identification code of the vehicle-mounted control page corresponding to the entry password, wherein the identification code is a key certificate for the user to enter the vehicle-mounted control page. Through these steps, the vehicle-mounted system can ensure that only the correctly authenticated user can access the vehicle control page. The whole process not only ensures the safety, but also improves the reliability of the system and the convenience of user access through accurate verification and decryption steps. Such embodiments provide a safe, efficient and convenient interactive experience for users of intelligent networked automobiles.
Fig. 4 is a schematic block diagram of a vehicle-mounted starting system based on dynamic encryption according to an embodiment of the present application. As shown in the figure, the present application also provides a vehicle starting system 100 based on dynamic encryption, corresponding to the above vehicle starting method based on dynamic encryption. The vehicle starting system based on dynamic encryption comprises a unit for executing the vehicle starting method based on dynamic encryption, and the system comprises a plurality of unit modules configured in a vehicle client and a cloud, wherein the vehicle client can be terminal equipment configured in a vehicle-mounted intelligent vehicle. Specifically, referring to fig. 4, the dynamic encryption-based vehicle-mounted starting system 100 includes a verification code generating unit 110 configured to generate a verification code according to a preset verification model by a vehicle-mounted client if an original fixed password input by a user is received, a verification result generating unit 120 configured to verify data information in the original fixed password by the vehicle-mounted client to obtain verification result information, a judging unit 130 configured to judge whether the verification result information conforms to a preset verification rule, a key generating unit 140 configured to generate a dynamic key according to the preset dynamic encryption rule if the verification result information conforms to the verification rule, the dynamic key including a vehicle-mounted verification code and a client verification code, a verifying unit 150 configured to re-verify the fixed password by the vehicle-mounted client through the vehicle-mounted verification code in the dynamic key to obtain a general fixed password, a password transmitting unit 160 configured to transmit the general fixed password to the vehicle-mounted client, an operation unit 170 configured to operate according to the general fixed password and the dynamic encryption rule to obtain a final verification code corresponding to the received vehicle-mounted verification code, and an opening unit 180 configured to finally verify the general fixed password and to control the vehicle-mounted client to enter a vehicle-mounted page to the vehicle-mounted client. In addition, the system further comprises a character string generating unit, a coding unit, a sequence converting unit and a client verification code generating unit, wherein the character string generating unit is used for generating a random character string corresponding to login account information in a vehicle client according to verification code coding rules in a verification model, the coding unit is used for performing Base64 coding on the random character string to obtain a random coding sequence, the sequence converting unit is used for converting the random coding sequence according to sequence conversion rules in the verification model to obtain a dynamic coding sequence, and the client verification code generating unit is used for generating a vehicle authentication code and a corresponding client verification code according to the login account information in the vehicle client.
It should be noted that, as those skilled in the art can clearly understand, the specific implementation process of the vehicle-mounted starting system and each unit based on dynamic encryption may refer to the corresponding description in the foregoing method embodiment, and for convenience and brevity of description, the description is omitted here.
The dynamic encryption-based vehicle start-up system described above may be implemented in the form of a computer program that is executable on a computer device as shown in fig. 5.
Referring to fig. 5, a schematic block diagram of a computer device according to an embodiment of the present application is shown. The computer device 500 may be an electronic device with communication functions that is interconnected with an on-board smart car machine.
The computer device 500 includes a processor 502, a memory, and a network interface 505, connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer program 5032 includes program instructions that, when executed, cause the processor 502 to perform a dynamic encryption-based vehicle start-up method.
The processor 502 is used to provide computing and control capabilities to support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the execution of a computer program 5032 in the non-volatile storage medium 503, which computer program 5032, when executed by the processor 502, causes the processor 502 to perform a vehicle start-up method based on dynamic encryption.
The network interface 505 is used for network communication with other devices. It will be appreciated by those skilled in the art that the architecture shown in fig. 5 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting of the computer device 500 to which the present inventive arrangements may be implemented, as a particular computer device 500 may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
It should be appreciated that in embodiments of the present application, the Processor 502 may be a central processing unit (Central Processing Unit, CPU), the Processor 502 may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL processors, DSPs), application SPECIFIC INTEGRATED Circuits (ASICs), off-the-shelf Programmable gate arrays (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those skilled in the art will appreciate that all or part of the flow in a method embodying the above described embodiments may be accomplished by computer programs instructing the relevant hardware. The computer program comprises program instructions, and the computer program can be stored in a storage medium, which is a computer readable storage medium. The program instructions are executed by at least one processor in the computer system to implement the flow steps of the embodiments of the method described above.
Accordingly, the present application also provides a storage medium. The storage medium may be a computer readable storage medium. The storage medium stores a computer program, wherein the computer program includes program instructions. The program instruction is executed by a processor to enable the processor to execute the following steps of generating a verification code according to a preset verification model if an original fixed password input by a user is received, verifying data information in the original fixed password through the fixed password to obtain verification result information by the vehicle client, judging whether the verification result information accords with preset verification rules, generating a dynamic key according to preset dynamic encryption rules by the vehicle client if the verification result information accords with the verification rules, verifying the fixed password again through the vehicle authentication code in the dynamic key to obtain a universal fixed password by the vehicle client, sending the universal fixed password to a cloud, calculating according to the universal fixed password and the dynamic encryption rules by the cloud to obtain a final verification code corresponding to the received vehicle authentication code, and starting an inlet of the vehicle client by utilizing the final verification code and the universal fixed password so as to enable the user to enter a vehicle control page.
The storage medium may be a U-disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk, or other various computer-readable storage media that can store program codes.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs. The units in the device of the embodiment of the application can be combined, divided and deleted according to actual needs. In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The integrated unit may be stored in a storage medium if implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application is essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a terminal, a network device, or the like) to perform all or part of the steps of the methods of the embodiments of the present application.
The present application is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the present application, and these modifications and substitutions are intended to be included in the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (10)

1.一种基于动态加密的车机启动方法,应用于基于动态加密的车机启动系统,所述车机启动系统包括车机客户端及云端,所述车机客户端与所述云端建立网络连接以实现数据信息的传输,从而实现车机客户端与云端间的动态加密校验,其特征在于,包括:1. A vehicle startup method based on dynamic encryption, applied to a vehicle startup system based on dynamic encryption, wherein the vehicle startup system includes a vehicle client and a cloud. The vehicle client establishes a network connection with the cloud to enable data information transmission, thereby implementing dynamic encryption verification between the vehicle client and the cloud. The method is characterized by comprising: 若接收到用户所输入的原始固定密码,所述车机客户端根据预设的校验模型生成验证码;If the original fixed password entered by the user is received, the vehicle client generates a verification code according to a preset verification model; 所述车机客户端通过固定密码对所述原始固定密码中的数据信息进行验证得到验证结果信息;The vehicle client verifies the data information in the original fixed password using the fixed password to obtain verification result information; 所述车机客户端判断所述验证结果信息是否符合预设的验证规则;The vehicle client determines whether the verification result information complies with a preset verification rule; 若所述验证结果信息符合所述验证规则,所述车机客户端根据预设的动态加密规则生成动态密钥,动态密钥包括车机验证码以及客户验证码;If the verification result information complies with the verification rules, the vehicle client generates a dynamic key according to a preset dynamic encryption rule, where the dynamic key includes a vehicle verification code and a customer verification code; 所述车机客户端通过所述动态密钥中的车机验证码对固定密码进行再次验证,得到通用固定密码;The vehicle client verifies the fixed password again using the vehicle verification code in the dynamic key to obtain a universal fixed password; 所述车机客户端将通用固定密码发送至所述云端;The vehicle client sends the universal fixed password to the cloud; 所述云端根据所述通用固定密码及动态加密规则进行运算,获取与接收到的所述车机验证码所对应的最终验证码;The cloud performs calculations based on the universal fixed password and dynamic encryption rules to obtain a final verification code corresponding to the received vehicle verification code; 所述云端运用所述最终验证码及所述通用固定密码对所述车机客户端的入口进行开启,以使用户进入车机控制页面。The cloud uses the final verification code and the universal fixed password to open the entrance of the vehicle client to allow the user to enter the vehicle control page. 2.根据权利要求1所述的基于动态加密的车机启动方法,其特征在于,所述车机客户端根据预设的校验模型生成验证码,包括:2. The vehicle computer startup method based on dynamic encryption according to claim 1, characterized in that the vehicle computer client generates a verification code according to a preset verification model, comprising: 根据所述校验模型中的验证码编码规则生成与所述车机客户端中的登录账户信息对应的随机字符串;Generate a random string corresponding to the login account information in the vehicle client according to the verification code encoding rules in the verification model; 对所述随机字符串进行Base64编码以得到随机编码序列;Performing Base64 encoding on the random string to obtain a random code sequence; 根据所述校验模型中的序列转换规则对所述随机编码序列进行转换以得到动态编码序列;Converting the random coding sequence according to the sequence conversion rule in the verification model to obtain a dynamic coding sequence; 对所述随机编码序列及所述动态编码序列进行拼接以得到所述验证码。The random coding sequence and the dynamic coding sequence are concatenated to obtain the verification code. 3.根据权利要求1所述的基于动态加密的车机启动方法,其特征在于,所述车机客户端根据预设的动态加密规则生成动态密钥,包括:3. The vehicle computer startup method based on dynamic encryption according to claim 1, wherein the vehicle computer client generates a dynamic key according to a preset dynamic encryption rule, comprising: 根据所述车机客户端中的登录账户信息生成车机验证码及其对应的客户验证码;Generate a vehicle verification code and its corresponding customer verification code according to the login account information in the vehicle client; 将所述车机验证码及所述客户验证码进行组合,得到所述动态密钥。The vehicle verification code and the customer verification code are combined to obtain the dynamic key. 4.根据权利要求1所述的基于动态加密的车机启动方法,其特征在于,所述云端运用所述最终验证码及所述通用固定密码对所述车机客户端的入口进行开启,以使用户进入车机控制页面,包括:4. The vehicle computer startup method based on dynamic encryption according to claim 1, characterized in that the cloud uses the final verification code and the universal fixed password to open the entrance of the vehicle computer client to allow the user to enter the vehicle computer control page, including: 根据所述最终验证码对所述通用固定密码进行对称验证以得到通行码;Performing symmetrical verification on the universal fixed password according to the final verification code to obtain a pass code; 根据所述通行码对所述车机客户端的入口进行通行认证以使用户进入车机控制页面。The entrance of the vehicle computer client is authenticated according to the pass code to enable the user to enter the vehicle computer control page. 5.根据权利要求4所述的基于动态加密的车机启动方法,其特征在于,所述根据所述通行码对所述车机客户端的入口进行通行认证以使用户进入车机控制页面,包括:5. The vehicle computer startup method based on dynamic encryption according to claim 4, characterized in that the authentication of the vehicle computer client entrance according to the pass code so that the user can enter the vehicle computer control page comprises: 根据所述动态加密规则中的校验规则对所述通行码进行校验,得到校验结果;Verifying the passcode according to the verification rule in the dynamic encryption rule to obtain a verification result; 若所述校验结果为通过,根据所述通行码对所述车机客户端的入口密码进行解密,以得到所述入口密码所对应的数据信息字符串;If the verification result is passed, the entry password of the vehicle client is decrypted according to the pass code to obtain a data information string corresponding to the entry password; 根据所述动态加密规则中的转制规则对所得到的解密信息字符串进行格式转换以得到所述入口密码所对应的车机控制页面标识码。The obtained decrypted information character string is format-converted according to the conversion rule in the dynamic encryption rule to obtain the vehicle control page identification code corresponding to the entry password. 6.一种基于动态加密的车机启动系统,应用权利要求1-5任一项所述的基于动态加密的车机启动方法,其特征在于,所述车机启动系统包括配置于车机客户端中的以下单元:6. A vehicle startup system based on dynamic encryption, applying the vehicle startup method based on dynamic encryption according to any one of claims 1 to 5, characterized in that the vehicle startup system includes the following units configured in the vehicle client: 校验码生成单元,用于若接收到用户所输入的原始固定密码,根据预设的校验模型生成验证码;A verification code generating unit, configured to generate a verification code according to a preset verification model upon receiving an original fixed password input by a user; 校验结果生成单元,用于通过固定密码对所述原始固定密码中的数据信息进行验证得到验证结果信息;a verification result generating unit, configured to verify the data information in the original fixed password using the fixed password to obtain verification result information; 判断单元,用于判断所述验证结果信息是否符合预设的验证规则;A judgment unit, configured to judge whether the verification result information complies with a preset verification rule; 密钥生成单元,用于若所述验证结果信息符合所述验证规则,根据预设的动态加密规则生成动态密钥;A key generation unit, configured to generate a dynamic key according to a preset dynamic encryption rule if the verification result information meets the verification rule; 验证单元,用于通过所述动态密钥中的车机验证码对固定密码进行再次验证,得到通用固定密码;A verification unit, configured to re-verify the fixed password using the vehicle computer verification code in the dynamic key to obtain a universal fixed password; 密码发送单元,用于将通用固定密码发送至所述云端;A password sending unit, configured to send the universal fixed password to the cloud; 所述车机启动系统还包括配置于云端中的以下单元:The vehicle startup system further includes the following units configured in the cloud: 运算单元,用于根据所述通用固定密码及动态加密规则进行运算,获取与接收到的所述车机验证码所对应的最终验证码;a calculation unit, configured to perform calculations based on the universal fixed password and the dynamic encryption rule to obtain a final verification code corresponding to the received vehicle computer verification code; 开启单元,用于运用所述最终验证码及所述通用固定密码对所述车机客户端的入口进行开启,以使用户进入车机控制页面。The opening unit is used to use the final verification code and the universal fixed password to open the entrance of the vehicle computer client to allow the user to enter the vehicle computer control page. 7.根据权利要求6所述的基于动态加密的车机启动系统,其特征在于,所述校验码生成单元包括:7. The vehicle startup system based on dynamic encryption according to claim 6, wherein the verification code generation unit comprises: 字符串生成单元,用于根据所述校验模型中的验证码编码规则生成与所述车机客户端中的登录账户信息对应的随机字符串;A character string generating unit, configured to generate a random character string corresponding to the login account information in the vehicle computer client according to the verification code encoding rule in the verification model; 编码单元,用于对所述随机字符串进行Base64编码以得到随机编码序列;An encoding unit, configured to perform Base64 encoding on the random string to obtain a random encoding sequence; 序列转换单元,用于根据所述校验模型中的序列转换规则对所述随机编码序列进行转换以得到动态编码序列。A sequence conversion unit is used to convert the random code sequence according to the sequence conversion rule in the verification model to obtain a dynamic code sequence. 8.根据权利要求6所述的基于动态加密的车机启动系统,其特征在于,所述密钥生成单元还包括:8. The vehicle startup system based on dynamic encryption according to claim 6, wherein the key generation unit further comprises: 客户验证码生成单元,用于根据所述车机客户端中的登录账户信息生成车机验证码及其对应的客户验证码。The client verification code generating unit is used to generate a vehicle computer verification code and its corresponding client verification code according to the login account information in the vehicle computer client. 9.一种计算机设备,其特征在于,所述计算机设备包括存储器及处理器,所述存储器上存储有计算机程序,所述处理器执行所述计算机程序时实现如权利要求1-5中任一项所述的方法。9. A computer device, characterized in that the computer device comprises a memory and a processor, the memory stores a computer program, and the processor implements the method according to any one of claims 1 to 5 when executing the computer program. 10.一种计算机可读存储介质,其特征在于,所述存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时可实现如权利要求1-5中任一项所述的方法。10. A computer-readable storage medium, characterized in that the storage medium stores a computer program, wherein the computer program comprises program instructions, and when the program instructions are executed by a processor, the method according to any one of claims 1 to 5 can be implemented.
CN202411580707.4A 2024-11-07 2024-11-07 Vehicle startup method, system, computer equipment and medium based on dynamic encryption Active CN119485282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411580707.4A CN119485282B (en) 2024-11-07 2024-11-07 Vehicle startup method, system, computer equipment and medium based on dynamic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411580707.4A CN119485282B (en) 2024-11-07 2024-11-07 Vehicle startup method, system, computer equipment and medium based on dynamic encryption

Publications (2)

Publication Number Publication Date
CN119485282A CN119485282A (en) 2025-02-18
CN119485282B true CN119485282B (en) 2025-10-03

Family

ID=94593067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411580707.4A Active CN119485282B (en) 2024-11-07 2024-11-07 Vehicle startup method, system, computer equipment and medium based on dynamic encryption

Country Status (1)

Country Link
CN (1) CN119485282B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083696A (en) * 2019-12-31 2020-04-28 智车优行科技(北京)有限公司 Communication verification method and system, mobile terminal and vehicle terminal
CN116264512A (en) * 2021-12-14 2023-06-16 广州汽车集团股份有限公司 In-vehicle engineering mode entry method and system, cloud server, in-vehicle terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766014A (en) * 2022-05-19 2023-03-07 惠州市德赛西威汽车电子股份有限公司 A controller safety management method, device, vehicle and storage medium
CN116846683B (en) * 2023-08-30 2023-11-28 中汽智联技术有限公司 Communication authentication method, device and medium for vehicle-mounted terminal and cloud

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083696A (en) * 2019-12-31 2020-04-28 智车优行科技(北京)有限公司 Communication verification method and system, mobile terminal and vehicle terminal
CN116264512A (en) * 2021-12-14 2023-06-16 广州汽车集团股份有限公司 In-vehicle engineering mode entry method and system, cloud server, in-vehicle terminal

Also Published As

Publication number Publication date
CN119485282A (en) 2025-02-18

Similar Documents

Publication Publication Date Title
CN106612180B (en) Method and device for realizing session identification synchronization
US8590024B2 (en) Method for generating digital fingerprint using pseudo random number code
US11743053B2 (en) Electronic signature system and tamper-resistant device
EP2905719B1 (en) Device and method certificate generation
US8775794B2 (en) System and method for end to end encryption
CN110990827A (en) Identity information verification method, server and storage medium
CN112396735B (en) Internet automobile digital key safety authentication method and device
US8423766B2 (en) Authentication method, authentication apparatus, and computer product
CN115834077B (en) Control method, control system, electronic device and storage medium
CN113766450A (en) Vehicle virtual key sharing method and mobile terminal, server and vehicle
JP6723422B1 (en) Authentication system
CN109743283B (en) Information transmission method and equipment
JP4998314B2 (en) Communication control method and communication control program
CN118944878A (en) Vehicle computer password random generation verification method, device, equipment and storage medium
CN116866093B (en) Identity authentication method, identity authentication device, and readable storage medium
CN119485282B (en) Vehicle startup method, system, computer equipment and medium based on dynamic encryption
EP4510499A1 (en) Remote signature system and tamper resistant device
CN115761954B (en) A Bluetooth key connection method and device for a vehicle
CN112702304A (en) Vehicle information verification method and device and automobile
CN117097520A (en) Access verification method and device for Internet of things equipment and storage medium
CN106789060B (en) Data transmission method and device, data processing method and device, data transmission system
CN115604034A (en) Encryption and decryption method and system for communication connection and electronic equipment
CN116912985B (en) Door lock control method, device, system, equipment and medium based on dynamic password
CN119382888B (en) User authentication method, intelligent service system, device, medium, and program
CN113672898B (en) Service authorization method, authorization device, system, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant