[go: up one dir, main page]

CN112383897B - Information transmission method, device, medium and electronic equipment based on intelligent network - Google Patents

Information transmission method, device, medium and electronic equipment based on intelligent network Download PDF

Info

Publication number
CN112383897B
CN112383897B CN202011119835.0A CN202011119835A CN112383897B CN 112383897 B CN112383897 B CN 112383897B CN 202011119835 A CN202011119835 A CN 202011119835A CN 112383897 B CN112383897 B CN 112383897B
Authority
CN
China
Prior art keywords
authentication
information
key
internet
vehicles
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011119835.0A
Other languages
Chinese (zh)
Other versions
CN112383897A (en
Inventor
杨名非
孙士坤
朱峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN202011119835.0A priority Critical patent/CN112383897B/en
Publication of CN112383897A publication Critical patent/CN112383897A/en
Application granted granted Critical
Publication of CN112383897B publication Critical patent/CN112383897B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Traffic Control Systems (AREA)

Abstract

The disclosure relates to an information transmission method, device, medium and electronic equipment based on intelligent networking, wherein the method comprises the following steps: generating internet of vehicles information according to a first authentication token sent by an authentication node, encrypting the internet of vehicles information according to a first key to obtain target internet of vehicles information, and sending the target internet of vehicles information to an intelligent internet-of-vehicles cloud control platform so that the intelligent internet-of-vehicles cloud control platform can determine whether the first authentication token is matched with the second authentication token or not under the condition that the internet of vehicles information is successfully decrypted according to a second key to obtain the internet of vehicles information, and processing the internet of vehicles information under the condition that the first authentication token is matched with the second authentication token. According to the method and the device, the validity of the terminal equipment accessing the intelligent network cloud control platform is authenticated through the first authentication token and the second authentication token, the credibility and the safety of the internet of vehicles information are improved, the internet of vehicles information is encrypted and decrypted through the first secret key and the second secret key, and the safety of the internet of vehicles information transmission process is improved.

Description

Information transmission method, device, medium and electronic equipment based on intelligent network
Technical Field
The disclosure relates to the technical field of information transmission, in particular to an information transmission method, device, medium and electronic equipment based on intelligent networking.
Background
Along with the continuous increase of the quantity of vehicles in China, the situation of road traffic safety is more serious. In order to reduce traffic safety accidents, improve driving experience and increase traffic efficiency, V2X (English: vihicle to Everything, chinese: vehicle-to-outside information exchange) technology has received a great deal of attention. In the scene of V2X communication, the intelligent network terminal equipment can carry out V2X communication with the intelligent network cloud control platform based on a Uu interface (namely a cellular communication interface) so as to report traffic real-time information such as real-time road conditions, road information, pedestrian information and the like to the intelligent network cloud control platform. In the related art, a Uu interface provides a cellular network up and down through an eNB (Chinese: base station) to realize communication among road side sensing equipment, vehicles and an intelligent network connection cloud control platform. However, based on Uu interface for V2X communication, any device can perform information transmission with the intelligent network cloud control platform, and the security and the credibility are low.
Disclosure of Invention
In order to solve the problems in the related art, the present disclosure provides an information transmission method, device, medium and electronic equipment based on intelligent networking.
To achieve the above object, according to a first aspect of embodiments of the present disclosure, there is provided an information transmission method based on an intelligent network, applied to a terminal device, the method including:
generating internet of vehicles information according to a first authentication token included in first authentication information sent by an authentication node, wherein the first authentication token is used for identifying the terminal equipment;
encrypting the Internet of vehicles information according to a first secret key included in the first authentication information to obtain target Internet of vehicles information;
and sending the target internet of vehicles information to an intelligent network cloud control platform, so that the intelligent network cloud control platform decrypts the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node, and determining whether a first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information or not under the condition that the internet of vehicles information is successfully decrypted to obtain the internet of vehicles information, and processing the internet of vehicles information under the condition that the first authentication token is matched with the second authentication token.
Optionally, the method further comprises:
Sending an authentication request to the authentication node so that the authentication node generates the first key, generates the first authentication token according to the authentication request, and encrypts the first authentication token and the first key into the first authentication information according to a first rule;
and receiving the first authentication information sent by the authentication node, and decrypting the first authentication information according to the first rule to obtain the first authentication token and the first key.
Optionally, the method further comprises:
receiving key updating information sent by the authentication node, wherein the key updating information is obtained by encrypting a third key by the authentication node according to a second rule;
decrypting the key updating information according to the second rule to obtain the third key, and updating the first key to the third key.
According to a second aspect of the embodiments of the present disclosure, there is provided an information transmission method based on an intelligent network, applied to an intelligent network cloud control platform, the method including:
receiving target internet of vehicles information sent by target terminal equipment, wherein the target internet of vehicles information is obtained by encrypting the internet of vehicles information by the target terminal equipment according to a first key included in first authentication information sent by an authentication node, the internet of vehicles information is generated by the target terminal equipment according to a first authentication token included in the first authentication information, and the first authentication token is used for identifying the target terminal equipment;
Decrypting the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node;
if the target internet of vehicles information is successfully decrypted, acquiring the internet of vehicles information;
determining whether the first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information;
and if the first authentication token is matched with the second authentication token, processing the Internet of vehicles information.
Optionally, the method further comprises:
and receiving the second authentication information sent by the authentication node, wherein the second authentication information comprises a second key generated by the authentication node and a second authentication token generated by the authentication node according to an authentication request sent by a terminal device, and the terminal device is the target terminal device or other terminal devices except the target terminal device.
Optionally, the method further comprises:
and receiving a fourth key sent by the authentication node, and updating the second key to the fourth key.
According to a third aspect of embodiments of the present disclosure, there is provided an information transmission method based on intelligent networking, applied to an authentication node, the method including:
Receiving an authentication request sent by a terminal device;
generating a first key and a second key, and generating a first authentication token and a second authentication token according to the authentication request, wherein the first authentication token is used for identifying the terminal equipment, and the second authentication token is used for identifying the terminal equipment;
encrypting the first authentication token and the first key into first authentication information according to a first rule, and sending the first authentication information to the terminal equipment;
and sending the second key and the second authentication token to an intelligent networking cloud control platform.
Optionally, the method further comprises:
generating a third key and a fourth key;
encrypting the third key according to a second rule to obtain key updating information;
the key updating information is sent to the terminal equipment, so that the terminal equipment decrypts the key updating information according to the second rule to obtain the third key, and the first key is updated to the third key;
and sending the fourth key to the intelligent networking cloud control platform so that the intelligent networking cloud control platform updates the second key to the fourth key.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an information transmission apparatus based on an intelligent network, applied to a terminal device, the apparatus including:
the first generation module is used for generating internet of vehicles information according to a first authentication token included in first authentication information sent by the authentication node, and the first authentication token is used for identifying the terminal equipment;
the first encryption module is used for encrypting the internet of vehicles information according to a first secret key included in the first authentication information so as to obtain target internet of vehicles information;
the first sending module is configured to send the target internet of vehicles information to an intelligent internet-of-vehicles cloud control platform, so that the intelligent internet-of-vehicles cloud control platform decrypts the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node, and when the target internet of vehicles information is successfully decrypted, whether a first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information is determined, and when the first authentication token is matched with the second authentication token, the internet of vehicles information is processed.
Optionally, the first sending module is further configured to send an authentication request to the authentication node, so that the authentication node generates the first key, generates the first authentication token according to the authentication request, and encrypts the first authentication token and the first key into the first authentication information according to a first rule;
the apparatus further comprises:
and the first processing module is used for receiving the first authentication information sent by the authentication node and decrypting the first authentication information according to the first rule so as to obtain the first authentication token and the first key.
Optionally, the apparatus further comprises:
the third receiving module is used for receiving key update information sent by the authentication node, wherein the key update information is obtained by encrypting a third key by the authentication node according to a second rule;
and the second decryption module is used for decrypting the key updating information according to the second rule so as to obtain the third key, and updating the first key into the third key.
According to a fifth aspect of the embodiments of the present disclosure, there is provided an information transmission device based on an intelligent network, which is applied to an intelligent network cloud control platform, the device including:
The first receiving module is used for receiving target internet of vehicles information sent by target terminal equipment, wherein the target internet of vehicles information is obtained by encrypting the internet of vehicles information by the target terminal equipment according to a first key included in first authentication information sent by an authentication node, the internet of vehicles information is generated by the target terminal equipment according to a first authentication token included in the first authentication information, and the first authentication token is used for identifying the target terminal equipment;
the first decryption module is used for decrypting the target internet of vehicles information according to a second key included in the second authentication information sent by the authentication node;
the acquisition module is used for acquiring the internet of vehicles information if the target internet of vehicles information is successfully decrypted;
a determining module, configured to determine whether the first authentication token included in the internet of vehicles information and the second authentication token included in the second authentication information are matched;
and the second processing module is used for processing the Internet of vehicles information if the first authentication token is matched with the second authentication token.
Optionally, the first receiving module is further configured to:
and receiving the second authentication information sent by the authentication node, wherein the second authentication information comprises a second key generated by the authentication node and a second authentication token generated by the authentication node according to an authentication request sent by a terminal device, and the terminal device is the target terminal device or other terminal devices except the target terminal device.
Optionally, the first receiving module is further configured to:
and receiving a fourth key sent by the authentication node, and updating the second key to the fourth key.
According to a sixth aspect of embodiments of the present disclosure, there is provided an intelligent networking-based information transmission apparatus applied to an authentication node, the apparatus including:
the second receiving module is used for receiving an authentication request sent by the terminal equipment;
the second generation module is used for generating a first key and a second key, and generating a first authentication token and a second authentication token according to the authentication request, wherein the first authentication token is used for identifying the terminal equipment, and the second authentication token is used for identifying the terminal equipment;
the second encryption module is used for encrypting the first authentication token and the first key into first authentication information according to a first rule and sending the first authentication information to the terminal equipment;
and the second sending module is used for sending the second secret key and the second authentication token to the intelligent networking cloud control platform.
Optionally, the second generation module is further configured to generate a third key and a fourth key;
the second encryption module is further used for encrypting the third key according to a second rule to obtain key updating information;
The second sending module is further configured to send the key update information to the terminal device, so that the terminal device decrypts the key update information according to the second rule to obtain the third key, and updates the first key to the third key;
the second sending module is further configured to send the fourth key to the intelligent network cloud control platform, so that the intelligent network cloud control platform updates the second key to the fourth key.
According to a seventh aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the intelligent networking based information transmission method provided in the first aspect.
According to an eighth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the intelligent networking based information transmission method provided in the second aspect.
According to a ninth aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the intelligent networking based information transmission method provided in the third aspect.
According to a tenth aspect of embodiments of the present disclosure, there is provided an electronic device, comprising:
a memory having a computer program stored thereon;
and a processor for executing the computer program in the memory to implement the steps of the intelligent networking-based information transmission method provided in the first aspect.
According to an eleventh aspect of embodiments of the present disclosure, there is provided an electronic device, including:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the intelligent networking based information transmission method provided in the second aspect.
According to a twelfth aspect of embodiments of the present disclosure, there is provided an electronic device, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the intelligent networking based information transmission method provided in the third aspect.
According to the technical scheme, firstly, the internet of vehicles information is generated according to the first authentication token contained in the first authentication information sent by the authentication node, wherein the first authentication token is used for identifying the terminal equipment, then the internet of vehicles information is encrypted according to the first secret key contained in the first authentication information to obtain the target internet of vehicles information, the target internet of vehicles information is sent to the intelligent internet of vehicles cloud control platform, the intelligent internet of vehicles cloud control platform decrypts the target internet of vehicles information according to the second secret key contained in the second authentication information sent by the authentication node, and under the condition that the internet of vehicles information is successfully decrypted, whether the first authentication token contained in the internet of vehicles information is matched with the second authentication token contained in the second authentication information is determined, and then under the condition that the first authentication token is matched with the second authentication token, the internet of vehicles information is processed. According to the method and the device, the validity of the terminal equipment accessing the intelligent network cloud control platform is authenticated through the first authentication token and the second authentication token, the credibility and the safety of the internet of vehicles information are improved, the internet of vehicles information is encrypted and decrypted through the first secret key and the second secret key, and the safety of the internet of vehicles information transmission process is improved.
Additional features and advantages of the present disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification, illustrate the disclosure and together with the description serve to explain, but do not limit the disclosure. In the drawings:
FIG. 1 is a flow chart illustrating a method of intelligent networking based information transfer, according to an exemplary embodiment;
FIG. 2 is a flow chart illustrating another intelligent networking based information transfer method in accordance with an exemplary embodiment;
FIG. 3 is a flowchart illustrating yet another intelligent networking based information transfer method, according to an exemplary embodiment;
FIG. 4 is a flowchart illustrating a method of intelligent networking based information transfer, according to an exemplary embodiment;
FIG. 5 is a flowchart illustrating another intelligent networking based information transfer method, according to an exemplary embodiment;
FIG. 6 is a flowchart illustrating yet another intelligent networking based information transfer method, according to an exemplary embodiment;
FIG. 7 is a flowchart illustrating a method of intelligent networking based information transfer, according to an exemplary embodiment;
FIG. 8 is a flowchart illustrating another intelligent networking based information transfer method, according to an exemplary embodiment;
FIG. 9 is a block diagram illustrating an intelligent networking based information transfer apparatus, according to an exemplary embodiment;
FIG. 10 is a block diagram of another intelligent networking based information transfer apparatus, according to an exemplary embodiment;
FIG. 11 is a block diagram illustrating yet another intelligent networking-based information transfer apparatus, according to an exemplary embodiment;
FIG. 12 is a block diagram illustrating an intelligent networking based information transfer apparatus, according to an exemplary embodiment;
FIG. 13 is a block diagram illustrating an intelligent networking based information transfer apparatus, according to an exemplary embodiment;
FIG. 14 is a block diagram of an electronic device shown in accordance with an exemplary embodiment;
fig. 15 is a block diagram of another electronic device, shown in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Before introducing the information transmission method, device, medium and electronic equipment based on the intelligent network provided by the disclosure, an application scenario involved in each embodiment of the disclosure is first described, where the application scenario may include a terminal device, an intelligent network cloud control platform and an authentication node. The terminal equipment, the intelligent network cloud control platform and the authentication node can communicate through any protocol of 5G (English: the 5th Generation mobile communication technology, chinese: fifth generation mobile communication technology) and 4G (English: the 4th Generation mobile communication technology, chinese: fourth generation mobile communication technology), WLAN (English: wireless Local Area Networks, chinese: wireless local area network), telematics (Chinese: automobile information service), V2X (English: vehicle to Everything, chinese: internet of vehicles). For example, the terminal device, the intelligent network cloud control platform and the authentication node can perform V2X communication based on LTE (english: long Term Evolution, chinese: long term evolution) -Uu mode in a 5G scenario. The terminal device may be an intelligent network terminal device disposed On a vehicle, for example, an OBU (On board Unit, chinese: vehicle Unit), a camera, a millimeter wave radar, a lidar, and various environmental sensing devices, where the vehicle may be an automobile, and the automobile is not limited to a conventional automobile, a pure electric automobile, or a hybrid automobile, but may be other types of automobiles or non-automobiles. The terminal device can also be other intelligent network terminal devices, such as RSU (Road Side Unit, english), traffic signal lamps, marks, graticules, guardrails and other intelligent traffic control facilities. The authentication nodes can be one or more, and the intelligent networking cloud control platform and the authentication nodes are both deployed on the server. The intelligent network cloud control platform and the authentication node can be deployed on the same server or on different servers, and the disclosure is not limited in particular. The server may include, but is not limited to: entity servers, server clusters, cloud servers, and the like.
Fig. 1 is a flowchart illustrating an intelligent networking-based information transmission method according to an exemplary embodiment. As shown in fig. 1, the method may include the following steps applied to the terminal device:
and step 101, generating internet of vehicles information according to a first authentication token contained in the first authentication information sent by the authentication node, wherein the first authentication token is used for identifying the terminal equipment.
For example, in order to improve the security and the credibility of the internet of vehicles information, a special authentication node may be provided to allocate an authentication token and a key to the terminal device and the intelligent network cloud control platform, so as to authenticate the validity of the terminal device that needs to be accessed to the intelligent network cloud control platform by using the allocated authentication token, and encrypt the internet of vehicles information transmitted between the terminal device and the intelligent network cloud control platform by using the allocated key. Specifically, before the terminal device and the intelligent network cloud control platform perform information communication, an authentication request can be sent to the authentication node by the terminal device, wherein the authentication request includes terminal identification information corresponding to the terminal device. For example, when the terminal device is an OBU, the terminal identification information may include owner information, vehicle number information, a registration ID (English: identity document) of the terminal device, and the like.
After receiving the authentication request, the authentication node may send first authentication information including a first authentication token and a first key to the terminal device, and send second authentication information including a second authentication token and a second key to the intelligent network cloud control platform. After receiving the first authentication information, the terminal device can update the acquired internet of vehicles information according to the first authentication token to obtain updated internet of vehicles information. The internet of vehicles information may include: at least one of BSM (English: basic Safety Message, chinese: basic safety message), RSI (English: road Side Information, chinese: road side information), RSM (English: road Safety Message, chinese: road side safety message), SPAT (English: signal phase timing message, chinese: traffic light phase and timing message) and MAP (Chinese: MAP message). The method for updating the internet of vehicles information according to the first authentication token may be: the first authentication token is added to the internet of vehicles information. For example, when the internet of vehicles information is a BSM, the terminal device may extend a communication protocol of the BSM, and newly add an optional field token (an optional field may be represented by, for example, 16-ary characters with a fixed length of 8 bits) based on the original national standard BSM message set, so as to record the first authentication token, so as to add the first authentication token to the BSM message set. The structure of the updated BSM message set may be as shown in table 1:
TABLE 1
And 102, encrypting the Internet of vehicles information according to a first key included in the first authentication information to obtain target Internet of vehicles information.
In this step, the terminal device may first encode the internet of vehicles information by using a preset encoding and decoding manner, so as to obtain encoded internet of vehicles information. Since the asn.1 (english: abstract Syntax Notation One, chinese: abstract syntax notation) codec is associated with multiple standardized coding rules, it is capable of supporting fast and reliable transmission of scalable information. Therefore, the preset encoding and decoding mode can adopt ASN.1 encoding and decoding. Then, the terminal equipment can encrypt the encoded internet of vehicles information according to the first secret key to obtain target internet of vehicles information, so that the security of the internet of vehicles information is ensured. For example, the terminal device may encrypt the internet of vehicles information by using a 16-bit MD5 Message-Digest Algorithm (MD 5 for short) and using a first key to obtain the target internet of vehicles information by AES (english Advanced Encryption Standard, chinese advanced encryption standard).
Step 103, the target internet of vehicles information is sent to the intelligent internet of things cloud control platform, so that the intelligent internet of vehicles cloud control platform decrypts the target internet of vehicles information according to a second secret key included in the second authentication information sent by the authentication node, under the condition that the target internet of vehicles information is successfully decrypted, whether a first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information is determined, and under the condition that the first authentication token is matched with the second authentication token, the internet of vehicles information is processed.
For example, after obtaining the target internet of vehicles information, the terminal device may send the target internet of vehicles information to the intelligent internet cloud control platform. And decrypting the target internet of vehicles information by the intelligent network cloud control platform according to the second secret key, and if the target internet of vehicles information is successfully decrypted, obtaining the internet of vehicles information in the target internet of vehicles information. When the information is to be encrypted, the first key is used for encrypting the information, the second key is used for decrypting the corresponding information, and the first key and the second key may be the same or different, for example, the first key is a public key, and the second key is a corresponding private key. And then the intelligent networking cloud control platform decodes the internet of vehicles information (for example, ASN.1 encoding and decoding can be adopted to decode the internet of vehicles information) so as to obtain the decoded internet of vehicles information. And then the intelligent network cloud control platform can acquire the first authentication token and the terminal identification information included in the decoded internet of vehicles information, and determine whether the first authentication token is matched with the second authentication token received by the intelligent network cloud control platform according to the first authentication token and the terminal identification information. If the first authentication token is matched with the second authentication token, the intelligent network cloud control platform can determine that the terminal equipment is legal equipment. Under the condition that the terminal equipment is determined to be legal equipment, the intelligent networking cloud control platform can process (e.g. store, calculate and analyze) the internet of vehicles information, so that the intelligent networking cloud control platform can push the service to the terminal equipment based on the internet of vehicles information.
In summary, the present disclosure firstly generates internet of vehicles information according to a first authentication token included in first authentication information sent by an authentication node, then encrypts the internet of vehicles information according to a first key included in the first authentication information to obtain target internet of vehicles information, sends the target internet of vehicles information to an intelligent internet of vehicles cloud control platform, so that the intelligent internet of vehicles cloud control platform decrypts the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node, and determines whether the first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information when the target internet of vehicles information is successfully decrypted, and processes the internet of vehicles information when the first authentication token is matched with the second authentication token. According to the method and the device, the validity of the terminal equipment accessing the intelligent network cloud control platform is authenticated through the first authentication token and the second authentication token, the credibility and the safety of the internet of vehicles information are improved, the internet of vehicles information is encrypted and decrypted through the first secret key and the second secret key, and the safety of the internet of vehicles information transmission process is improved.
Fig. 2 is a flow chart illustrating another intelligent networking-based information transfer method according to an exemplary embodiment. As shown in fig. 2, the method further comprises the steps of:
step 104, sending an authentication request to the authentication node so that the authentication node generates a first key, generates a first authentication token according to the authentication request, and encrypts the first authentication token and the first key into first authentication information according to a first rule.
Step 105, receiving the first authentication information sent by the authentication node, and decrypting the first authentication information according to the first rule to obtain a first authentication token and a first key.
For example, the terminal device may send an authentication request including terminal identification information to the authentication node. After receiving the authentication request, the authentication node can determine whether target terminal identification information matched with the terminal identification information exists from a plurality of pieces of identification information included in a preset identification information base. For example, in the case where the terminal identification information includes the vehicle owner information, the vehicle number information, and the registration ID of the terminal device, the authentication node may determine whether there is identification information in which the vehicle owner information, the vehicle number information, and the registration ID of the terminal device are identical to the terminal identification information, respectively, among the plurality of identification information included in the identification information base. If the target identification information exists, the authentication node can take the identification information as the target identification information, and if the target identification information does not exist, the authentication node determines that the target identification information does not exist. If the target terminal identification information exists, the terminal equipment is legal equipment, the authentication node can generate a first key which is agreed with the terminal equipment in advance, and a first authentication token is generated by combining the terminal identification information by using a preset algorithm. Wherein the first authentication token is a unique random string (the random string may be a 64-bit, 128-bit or 256-bit string) for identifying the terminal device, and the preset algorithm may be a hash algorithm. The specific implementation manner of generating the first authentication token may refer to the manner described in the related art, and will not be described in detail herein.
Then, the authentication node may encrypt the first authentication token and the first key according to a first preset rule agreed with the terminal device to form first authentication information according to the first rule, and send the first authentication information to the terminal device. After receiving the first authentication information sent by the authentication node, the terminal device may decrypt the first authentication information according to a first rule to obtain a first authentication token and a first key. The first preset rule may be set according to a registration ID of the terminal device, a preset key change period and an offset, for example, and the change rule of the target key used for encrypting the first authentication token and the first key, that is, the authentication node and the terminal device node may determine the currently used target key through the first preset rule.
Fig. 3 is a flow chart illustrating yet another intelligent networking-based information transfer method, according to an exemplary embodiment. As shown in fig. 3, the method further comprises the steps of:
and step 106, receiving key updating information sent by the authentication node, wherein the key updating information is obtained by encrypting the third key by the authentication node according to the second rule.
And step 107, decrypting the key updating information according to the second rule to obtain a third key, and updating the first key to the third key.
In one scenario, in order to further improve the security of the internet of vehicles information, the first key and the first rule may be updated periodically, so as to avoid leakage of the first key and the first rule. For example, the authentication node may generate a new third key agreed in advance with the terminal device, then encrypt the third key according to the second rule to obtain key update information, and send the key update information to the terminal device. After receiving the key updating information sent by the authentication node, the terminal device may decrypt the key updating information according to the second rule to obtain a third key, and update the first key in the terminal device to the third key. The second preset rule may be a rule pre-agreed with the terminal device, and the target key change rule obtained after the registration ID, the preset key change period and the offset of the terminal device in the first preset rule are adjusted, that is, the authentication node and the terminal device node may determine the target key used after updating through the second preset rule. The second preset rule may be the same as or different from the first preset rule, which is not specifically limited in this disclosure.
In summary, the present disclosure firstly generates internet of vehicles information according to a first authentication token included in first authentication information sent by an authentication node, then encrypts the internet of vehicles information according to a first key included in the first authentication information to obtain target internet of vehicles information, sends the target internet of vehicles information to an intelligent internet of vehicles cloud control platform, so that the intelligent internet of vehicles cloud control platform decrypts the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node, and determines whether the first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information when the target internet of vehicles information is successfully decrypted, and processes the internet of vehicles information when the first authentication token is matched with the second authentication token. According to the method and the device, the validity of the terminal equipment accessing the intelligent network cloud control platform is authenticated through the first authentication token and the second authentication token, the credibility and the safety of the internet of vehicles information are improved, the internet of vehicles information is encrypted and decrypted through the first secret key and the second secret key, and the safety of the internet of vehicles information transmission process is improved.
Fig. 4 is a flowchart illustrating a method of intelligent networking based information transfer, according to an exemplary embodiment. As shown in fig. 4, the method may include the following steps:
step 201, receiving target internet of vehicles information sent by target terminal equipment. The target internet of vehicles information is obtained by encrypting the internet of vehicles information by the target terminal equipment according to a first key included in first authentication information sent by the authentication node, the internet of vehicles information is generated by the target terminal equipment according to a first authentication token included in the first authentication information, and the first authentication token is used for identifying the target terminal equipment.
And step 202, decrypting the target internet of vehicles information according to a second key included in the second authentication information sent by the authentication node.
And 203, if the target internet of vehicles information is successfully decrypted, acquiring the internet of vehicles information.
For example, after receiving the first authentication token and the first key sent by the authentication node, the target terminal device may update the acquired internet of vehicles information according to the first authentication token, and encode the updated internet of vehicles information by adopting a preset encoding and decoding manner, so as to acquire encoded internet of vehicles information. And the target terminal equipment can encrypt the encoded internet of vehicles information according to the first key to acquire target internet of vehicles information and send the target internet of vehicles information to the intelligent internet cloud control platform. And decrypting the target Internet of vehicles information by the intelligent Internet cloud control platform according to the second key. If the intelligent network cloud control platform successfully decrypts the target internet of vehicles information, the internet of vehicles information in the target internet of vehicles information can be obtained, and the internet of vehicles information is further decoded by using a preset encoding and decoding mode, so that the decoded internet of vehicles information is obtained. If the intelligent network cloud control platform does not successfully decrypt the target internet of vehicles information, the intelligent network cloud control platform indicates that the target terminal equipment is not legal equipment, and the intelligent network cloud control platform can directly discard the target internet of vehicles information.
Step 204, determining whether the first authentication token included in the internet of vehicles information matches the second authentication token included in the second authentication information.
And step 205, if the first authentication token is matched with the second authentication token, processing the internet of vehicles information.
For example, the intelligent network cloud control platform may store second authentication tokens corresponding to a plurality of terminal devices and second terminal identification information corresponding to each second authentication token. After the internet of vehicles information is acquired, the intelligent internet of things cloud control platform can acquire a first authentication token and first terminal identification information corresponding to the first authentication token, which are included in the decoded internet of vehicles information, and determine whether the first authentication token is matched with the second authentication token according to the first authentication token and the first terminal identification information. The manner of determining whether the first authentication token matches the second authentication token may be: first, whether second terminal identification information identical to first terminal identification information exists or not is determined, and if the second terminal identification information identical to the first terminal identification information exists, whether a second authentication token corresponding to the second terminal identification information is identical to the first authentication token or not is determined. And if the second authentication token corresponding to the second terminal identification information is the same as the first authentication token, determining that the first authentication token is matched with the second authentication token, otherwise, determining that the first authentication token is not matched with the second authentication token. If the first authentication token is matched with the second authentication token, the intelligent network cloud control platform can determine that the terminal equipment is legal equipment. And under the condition that the terminal equipment is legal equipment, the intelligent network cloud control platform can process the Internet of vehicles information so that the intelligent network cloud control platform can push the service to the terminal equipment based on the Internet of vehicles information. If the first authentication token is not matched with the second authentication token, the target terminal device is not legal device, and the intelligent networking cloud control platform can directly discard the Internet of vehicles information.
Fig. 5 is a flow chart illustrating another intelligent networking-based information transfer method according to an exemplary embodiment. As shown in fig. 5, the method further comprises the steps of:
and step 206, receiving second authentication information sent by the authentication node. The second authentication information comprises a second key generated by the authentication node and a second authentication token generated by the authentication node according to an authentication request sent by the terminal equipment, wherein the terminal equipment is target terminal equipment or other terminal equipment except the target terminal equipment.
For example, after receiving an authentication request sent by the terminal device, the authentication node may generate a second key that is agreed in advance with the intelligent network cloud control platform, then combine the terminal identification information with a preset algorithm to generate a second authentication token, and send the second key, the second authentication token and the terminal identification information corresponding to the terminal device to the intelligent network cloud control platform as second authentication information. And the intelligent network cloud control platform receives the second authentication information sent by the authentication node and stores the second secret key, the second authentication token and the terminal identification information. Wherein the second authentication token is a unique random string for identifying the terminal device.
If the second authentication information is transmitted by the authentication node after receiving the authentication request transmitted by the target terminal device, the first authentication token and the second authentication token are the same. If the second authentication information is transmitted by the authentication node after receiving the authentication request transmitted by the terminal device other than the target terminal device, the first authentication token and the second authentication token are different.
Fig. 6 is a flowchart illustrating yet another intelligent networking-based information transfer method, according to an exemplary embodiment. As shown in fig. 6, the method further comprises the steps of:
step 207, receiving the fourth key sent by the authentication node, and updating the second key to the fourth key.
In one scenario, in order to further improve the security of the internet of vehicles information, the second key may be updated periodically, so as to avoid leakage of the second key. For example, the authentication node may send the fourth key that is pre-agreed with the intelligent network cloud control platform to the intelligent network cloud control platform, so that the intelligent network cloud control platform updates the second key to the fourth key.
In summary, the present disclosure first receives target internet of vehicles information sent by a target terminal device, where the target internet of vehicles information is obtained by encrypting the internet of vehicles information by the target terminal device according to a first key included in first authentication information sent by an authentication node, the internet of vehicles information is generated by the target terminal device according to a first authentication token included in the first authentication information, the first authentication token is used to identify the target terminal device, then decrypts the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node, if decryption of the target internet of vehicles information is successful, obtains the internet of vehicles information, and then determines whether the first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information, and if the first authentication token is matched with the second authentication token, processes the internet of vehicles information. According to the method and the device, the validity of the terminal equipment accessing the intelligent network cloud control platform is authenticated through the first authentication token and the second authentication token, the credibility and the safety of the internet of vehicles information are improved, the internet of vehicles information is encrypted and decrypted through the first secret key and the second secret key, and the safety of the internet of vehicles information transmission process is improved.
Fig. 7 is a flowchart illustrating a method of intelligent networking based information transfer, according to an exemplary embodiment. Applied to an authentication node, as shown in fig. 7, the method may comprise the steps of:
step 301, receiving an authentication request sent by a terminal device.
Step 302, generating a first key and a second key, and generating a first authentication token and a second authentication token according to the authentication request, wherein the first authentication token is used for identifying the terminal equipment, and the second authentication token is used for identifying the terminal equipment.
For example, after receiving an authentication request sent by a terminal device, the authentication node may generate a first key and a second key that are pre-agreed with the terminal device, and generate a first authentication token and a second authentication token by combining terminal identification information with a preset algorithm.
In this scenario, after receiving an authentication request sent by a terminal device, the authentication node sends a first authentication token to the terminal device, which is the same as a second authentication token sent to the intelligent network cloud control platform, that is, both the first authentication token and the second authentication token are used to identify the terminal device. Accordingly, the first key and the second key may be the same or different. For example, when AES is used to encrypt the internet of vehicles information, the first key and the second key are the same, and at this time, the first key corresponding to each terminal device is the same for a plurality of different terminal devices. When the RSA is adopted to encrypt the Internet of vehicles information, the first secret key and the second secret key are different, the first secret key can be a public key, the second secret key can be a private key, and at the moment, for a plurality of different terminal devices, the first secret key corresponding to each terminal device is different.
Step 303, encrypting the first authentication token and the first key into first authentication information according to a first rule, and transmitting the first authentication information to the terminal device.
And step 304, the second secret key and the second authentication token are sent to the intelligent networking cloud control platform.
For example, the authentication node may encrypt the first authentication token and the first key to the first authentication information according to a first preset rule agreed with the terminal device, and send the first authentication information to the terminal device. After receiving the first authentication information sent by the authentication node, the terminal device may decrypt the first authentication information according to a first rule to obtain a first authentication token and a first key. The first preset rule may be, for example, a change rule of a target key used for encrypting the first authentication token and the first key, which is set according to a registration ID of the terminal device, a preset key change period, and an offset. The authentication node may then send the second key and the second authentication token to the intelligent networked cloud control platform.
It should be noted that, the authentication node may directly send the second key and the second authentication token to the intelligent network cloud control platform, or may encrypt the second key and the second authentication token according to a predetermined rule and then send the encrypted second key and the encrypted second authentication token to the intelligent network cloud control platform, which is not specifically limited in the disclosure.
Fig. 8 is a flowchart illustrating another intelligent networking-based information transfer method, according to an exemplary embodiment. As shown in fig. 8, the method further comprises the steps of:
in step 305, a third key and a fourth key are generated.
In one scenario, in order to further improve the security of the internet of vehicles information, the first key, the second key, the first rule and the second rule may be updated periodically, so as to avoid leakage of the first key, the second key, the first rule and the second rule. For example, the authentication node may generate a new third key according to a rule pre-agreed with the terminal device to update the first key in the terminal device, and may generate a new fourth key according to a rule pre-agreed with the intelligent network cloud control platform to update the second key in the intelligent network cloud control platform.
Step 306, encrypting the third key according to the second rule to obtain the key update information.
Step 307, the key update information is sent to the terminal device, so that the terminal device decrypts the key update information according to the second rule to obtain the third key, and updates the first key to the third key.
And step 308, the fourth key is sent to the intelligent network cloud control platform, so that the intelligent network cloud control platform updates the second key to the fourth key.
For example, after acquiring the third key and the fourth key, the authentication node may encrypt the third key according to the second rule to obtain key update information, and send the key update information to the terminal device. After receiving the key updating information sent by the authentication node, the terminal device may decrypt the key updating information according to the second rule to obtain a third key, and update the first key to the third key. The second preset rule may be a change rule of the target key, which is pre-agreed with the terminal device, and is obtained after the registration ID, the preset key change period and the offset of the terminal device in the first preset rule are adjusted. And then, the authentication node can send the fourth key to the intelligent network cloud control platform, and the intelligent network cloud control platform updates the second key to the fourth key.
In summary, the disclosure first receives an authentication request sent by a terminal device, then generates a first key and a second key, and generates a first authentication token according to the authentication request, where the first authentication token is used to identify the terminal device, the second authentication token is used to identify the terminal device, encrypts the first authentication token and the first key according to a first rule to form first authentication information, sends the first authentication information to the terminal device, and finally sends the second key and the first authentication token to the intelligent network cloud control platform. According to the method and the device, the validity of the terminal equipment accessing the intelligent network cloud control platform is authenticated through the first authentication token and the second authentication token, the credibility and the safety of the internet of vehicles information are improved, the internet of vehicles information is encrypted and decrypted through the first secret key and the second secret key, and the safety of the internet of vehicles information transmission process is improved.
Fig. 9 is a block diagram illustrating an intelligent networking-based information transfer apparatus according to an exemplary embodiment. Applied to a terminal device, as shown in fig. 9, the apparatus 400 includes:
the first generating module 401 is configured to generate internet of vehicles information according to a first authentication token included in the first authentication information sent by the authentication node, where the first authentication token is used to identify the terminal device.
The first encryption module 402 is configured to encrypt the internet of vehicles information according to a first key included in the first authentication information, so as to obtain target internet of vehicles information.
The first sending module 403 is configured to send the target internet of vehicles information to the intelligent internet of things cloud control platform, so that the intelligent internet of vehicles cloud control platform decrypts the target internet of vehicles information according to a second key included in the second authentication information sent by the authentication node, and when the target internet of vehicles information is successfully decrypted, it is determined whether a first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information, and when the first authentication token is matched with the second authentication token, the internet of vehicles information is processed.
Fig. 10 is a block diagram illustrating another intelligent networking-based information transfer apparatus according to an exemplary embodiment. As shown in fig. 10, the first sending module 403 is further configured to send an authentication request to the authentication node, so that the authentication node generates a first key, generates a first authentication token according to the authentication request, and encrypts the first authentication token and the first key into first authentication information according to a first rule.
The apparatus 400 further comprises:
the first processing module 404 is configured to receive the first authentication information sent by the authentication node, and decrypt the first authentication information according to a first rule to obtain a first authentication token and a first key.
Fig. 11 is a block diagram illustrating yet another intelligent networking-based information transfer apparatus according to an exemplary embodiment. As shown in fig. 11, the apparatus 400 further includes:
and the third receiving module 405 is configured to receive key update information sent by the authentication node, where the key update information is obtained by encrypting, by the authentication node, the third key according to the second rule.
The second decryption module 406 is configured to decrypt the key update information according to the second rule to obtain a third key, and update the first key to the third key.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 12 is a block diagram illustrating an intelligent networking-based information transfer apparatus according to an exemplary embodiment. As shown in fig. 12, the apparatus 500 includes:
the first receiving module 501 is configured to receive target internet of vehicles information sent by a target terminal device.
The target internet of vehicles information is obtained by encrypting the internet of vehicles information by the target terminal equipment according to a first key included in first authentication information sent by the authentication node, the internet of vehicles information is generated by the target terminal equipment according to a first authentication token included in the first authentication information, and the first authentication token is used for identifying the target terminal equipment.
The first decryption module 502 is configured to decrypt the target internet of vehicles information according to a second key included in the second authentication information sent by the authentication node.
And the obtaining module 503 is configured to obtain the internet of vehicles information if the decryption of the target internet of vehicles information is successful.
A determining module 504 is configured to determine whether the first authentication token included in the internet of vehicles information matches the second authentication token included in the second authentication information.
And the second processing module 505 is configured to process the internet of vehicles information if the first authentication token matches the second authentication token.
Optionally, the first receiving module 501 is further configured to:
and receiving second authentication information sent by the authentication node, wherein the second authentication information comprises a second key generated by the authentication node and a second authentication token generated by the authentication node according to an authentication request sent by the terminal equipment, and the terminal equipment is target terminal equipment or other terminal equipment except the target terminal equipment.
Optionally, the first receiving module 501 is further configured to:
and receiving the fourth key sent by the authentication node, and updating the second key to the fourth key.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 13 is a block diagram illustrating an intelligent networking-based information transfer apparatus according to an exemplary embodiment. Applied to an authentication node, as shown in fig. 13, the apparatus 600 includes:
a second receiving module 601 is configured to receive an authentication request sent by a terminal device.
The second generation module 602 is configured to generate a first key and a second key, and generate a first authentication token and a second authentication token according to the authentication request, where the first authentication token is used to identify the terminal device, and the second authentication token is used to identify the terminal device.
The second encryption module 603 is configured to encrypt the first authentication token and the first key according to a first rule to obtain first authentication information, and send the first authentication information to the terminal device.
And the second sending module 604 is configured to send the second key and the second authentication token to the intelligent network cloud control platform.
Optionally, the second generation module 602 is further configured to generate a third key and a fourth key.
The second encryption module 603 is further configured to encrypt the third key according to a second rule to obtain key update information.
The second sending module 604 is further configured to send the key update information to the terminal device, so that the terminal device decrypts the key update information according to the second rule to obtain a third key, and updates the first key to the third key.
The second sending module 604 is further configured to send the fourth key to the intelligent network cloud control platform, so that the intelligent network cloud control platform updates the second key to the fourth key.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 14 is a block diagram of an electronic device 700, according to an example embodiment. As shown in fig. 14, the electronic device 700 may be a terminal device in the above embodiment, and the electronic device 700 may include: a processor 701, a memory 702. The electronic device 700 may also include one or more of a multimedia component 703, an input/output (I/O) interface 704, and a communication component 705.
The processor 701 is configured to control the overall operation of the electronic device 700 to perform all or part of the steps in the intelligent network-based information transmission method described above. The memory 702 is used to store various types of data to support operation on the electronic device 700, which may include, for example, instructions for any application or method operating on the electronic device 700, as well as application-related data, such as contact data, messages sent and received, pictures, audio, video, and so forth. The Memory 702 may be implemented by any type or combination of volatile or non-volatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM for short), electrically erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM for short), erasable programmable Read-Only Memory (Erasable Programmable Read-Only Memory, EPROM for short), programmable Read-Only Memory (Programmable Read-Only Memory, PROM for short), read-Only Memory (ROM for short), magnetic Memory, flash Memory, magnetic disk, or optical disk. The multimedia component 703 can include a screen and an audio component. Wherein the screen may be, for example, a touch screen, the audio component being for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signals may be further stored in the memory 702 or transmitted through the communication component 705. The audio assembly further comprises at least one speaker for outputting audio signals. The I/O interface 704 provides an interface between the processor 701 and other interface modules, which may be a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 705 is for wired or wireless communication between the electronic device 700 and other devices. Wireless communication, such as Wi-Fi, bluetooth, near field communication (Near Field Communication, NFC for short), 2G, 3G, 4G, NB-IOT, eMTC, or other 5G, etc., or one or a combination of more of them, is not limited herein. The corresponding communication component 705 may thus comprise: wi-Fi module, bluetooth module, NFC module, etc.
In an exemplary embodiment, the electronic device 700 may be implemented by one or more application specific integrated circuits (Application Specific Integrated Circuit, abbreviated ASIC), digital signal processor (Digital Signal Processor, abbreviated DSP), digital signal processing device (Digital Signal Processing Device, abbreviated DSPD), programmable logic device (Programmable Logic Device, abbreviated PLD), field programmable gate array (Field Programmable Gate Array, abbreviated FPGA), controller, microcontroller, microprocessor, or other electronic components for performing the intelligent networking-based information transmission method described above.
In another exemplary embodiment, a computer readable storage medium is also provided, comprising program instructions which, when executed by a processor, implement the steps of the intelligent networking based information transfer method described above. For example, the computer readable storage medium may be the memory 702 including program instructions described above, which are executable by the processor 701 of the electronic device 700 to perform the intelligent networking-based information transmission method described above.
Fig. 15 is a block diagram illustrating an electronic device 1900 according to an example embodiment. For example, electronic device 1900 may be provided as a server. The electronic device 1900 may be an intelligent networked cloud control platform or an authentication node in the above embodiments, referring to fig. 15, the electronic device 1900 includes a processor 1922, which may be one or more in number, and a memory 1932 for storing a computer program executable by the processor 1922. The computer program stored in memory 1932 may include one or more modules each corresponding to a set of instructions. Further, the processor 1922 may be configured to execute the computer program to perform the intelligent networking-based information transfer method described above.
In addition, the electronic device 1900 may further include a power component 1926 and a communication component 1950, the power component 1926 may be configured to perform power management of the electronic device 1900, and the communication component 1950 may be configured to enable communication of the electronic device 1900, e.g., wired or wireless communication. In addition, the electronic device 1900 may also include an input/output (I/O) interface 1958. The electronic device 1900 may operate an operating system based on a memory 1932, such as Windows Server TM ,Mac OS X TM ,Unix TM ,Linux TM Etc.
In another exemplary embodiment, a computer readable storage medium is also provided, comprising program instructions which, when executed by a processor, implement the steps of the intelligent networking based information transfer method described above. For example, the computer readable storage medium may be the memory 1932 including program instructions that are executable by the processor 1922 of the electronic device 1900 to perform the intelligent networking-based information transfer method described above.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described intelligent networking based information transfer method when executed by the programmable apparatus.
The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings, but the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solutions of the present disclosure within the scope of the technical concept of the present disclosure, and all the simple modifications belong to the protection scope of the present disclosure.
In addition, the specific features described in the foregoing embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, the present disclosure does not further describe various possible combinations.
Moreover, any combination between the various embodiments of the present disclosure is possible as long as it does not depart from the spirit of the present disclosure, which should also be construed as the disclosure of the present disclosure.

Claims (13)

1. An information transmission method based on intelligent networking is characterized by being applied to terminal equipment, and comprises the following steps:
generating internet of vehicles information according to a first authentication token included in first authentication information sent by an authentication node, wherein the first authentication token is used for identifying the terminal equipment;
encrypting the Internet of vehicles information according to a first secret key included in the first authentication information to obtain target Internet of vehicles information;
And sending the target internet of vehicles information to an intelligent network cloud control platform, so that the intelligent network cloud control platform decrypts the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node, and determining whether a first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information or not under the condition that the internet of vehicles information is successfully decrypted to obtain the internet of vehicles information, and processing the internet of vehicles information under the condition that the first authentication token is matched with the second authentication token.
2. The method according to claim 1, wherein the method further comprises:
sending an authentication request to the authentication node so that the authentication node generates the first key, generates the first authentication token according to the authentication request, and encrypts the first authentication token and the first key into the first authentication information according to a first rule;
and receiving the first authentication information sent by the authentication node, and decrypting the first authentication information according to the first rule to obtain the first authentication token and the first key.
3. The method according to claim 1, wherein the method further comprises:
receiving key updating information sent by the authentication node, wherein the key updating information is obtained by encrypting a third key by the authentication node according to a second rule;
decrypting the key updating information according to the second rule to obtain the third key, and updating the first key to the third key.
4. An information transmission method based on intelligent network connection is characterized by being applied to an intelligent network connection cloud control platform, and comprises the following steps:
receiving target internet of vehicles information sent by target terminal equipment, wherein the target internet of vehicles information is obtained by encrypting the internet of vehicles information by the target terminal equipment according to a first key included in first authentication information sent by an authentication node, the internet of vehicles information is generated by the target terminal equipment according to a first authentication token included in the first authentication information, and the first authentication token is used for identifying the target terminal equipment;
decrypting the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node;
If the target internet of vehicles information is successfully decrypted, acquiring the internet of vehicles information;
determining whether the first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information;
and if the first authentication token is matched with the second authentication token, processing the Internet of vehicles information.
5. The method according to claim 4, wherein the method further comprises:
and receiving the second authentication information sent by the authentication node, wherein the second authentication information comprises a second key generated by the authentication node and a second authentication token generated by the authentication node according to an authentication request sent by a terminal device, and the terminal device is the target terminal device or other terminal devices except the target terminal device.
6. The method according to claim 4, wherein the method further comprises:
and receiving a fourth key sent by the authentication node, and updating the second key to the fourth key.
7. An information transmission method based on intelligent networking, which is applied to an authentication node, the method comprising:
Receiving an authentication request sent by a terminal device;
generating a first key and a second key, and generating a first authentication token and a second authentication token according to the authentication request, wherein the first authentication token is used for identifying the terminal equipment, and the second authentication token is used for identifying the terminal equipment;
encrypting the first authentication token and the first key into first authentication information according to a first rule, and sending the first authentication information to the terminal equipment;
and sending the second key and the second authentication token to an intelligent networking cloud control platform.
8. The method of claim 7, wherein the method further comprises:
generating a third key and a fourth key;
encrypting the third key according to a second rule to obtain key updating information;
the key updating information is sent to the terminal equipment, so that the terminal equipment decrypts the key updating information according to the second rule to obtain the third key, and the first key is updated to the third key;
and sending the fourth key to the intelligent networking cloud control platform so that the intelligent networking cloud control platform updates the second key to the fourth key.
9. An intelligent networking-based information transmission device, which is applied to a terminal device, comprising:
the first generation module is used for generating internet of vehicles information according to a first authentication token included in first authentication information sent by the authentication node, and the first authentication token is used for identifying the terminal equipment;
the first encryption module is used for encrypting the internet of vehicles information according to a first secret key included in the first authentication information so as to obtain target internet of vehicles information;
the first sending module is configured to send the target internet of vehicles information to an intelligent internet-of-vehicles cloud control platform, so that the intelligent internet-of-vehicles cloud control platform decrypts the target internet of vehicles information according to a second key included in second authentication information sent by the authentication node, and when the target internet of vehicles information is successfully decrypted, whether a first authentication token included in the internet of vehicles information is matched with a second authentication token included in the second authentication information is determined, and when the first authentication token is matched with the second authentication token, the internet of vehicles information is processed.
10. An information transmission device based on intelligent network allies oneself with, its characterized in that is applied to intelligent network allies oneself with cloud accuse platform, the device includes:
the first receiving module is used for receiving target internet of vehicles information sent by target terminal equipment, wherein the target internet of vehicles information is obtained by encrypting the internet of vehicles information by the target terminal equipment according to a first key included in first authentication information sent by an authentication node, the internet of vehicles information is generated by the target terminal equipment according to a first authentication token included in the first authentication information, and the first authentication token is used for identifying the target terminal equipment;
the first decryption module is used for decrypting the target internet of vehicles information according to a second key included in the second authentication information sent by the authentication node;
the acquisition module is used for acquiring the internet of vehicles information if the target internet of vehicles information is successfully decrypted;
a determining module, configured to determine whether the first authentication token included in the internet of vehicles information and the second authentication token included in the second authentication information are matched;
and the second processing module is used for processing the Internet of vehicles information if the first authentication token is matched with the second authentication token.
11. An intelligent networking-based information transmission apparatus, applied to an authentication node, comprising:
the second receiving module is used for receiving an authentication request sent by the terminal equipment;
the second generation module is used for generating a first key and a second key, and generating a first authentication token and a second authentication token according to the authentication request, wherein the first authentication token is used for identifying the terminal equipment, and the second authentication token is used for identifying the terminal equipment;
the second encryption module is used for encrypting the first authentication token and the first key into first authentication information according to a first rule and sending the first authentication information to the terminal equipment;
and the second sending module is used for sending the second secret key and the first authentication token to the intelligent networking cloud control platform.
12. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, carries out the steps of the method according to any one of claims 1-3, 4-6 or 7-8.
13. An electronic device, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to implement the steps of the method of any one of claims 1-3, 4-6 or 7-8.
CN202011119835.0A 2020-10-19 2020-10-19 Information transmission method, device, medium and electronic equipment based on intelligent network Active CN112383897B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011119835.0A CN112383897B (en) 2020-10-19 2020-10-19 Information transmission method, device, medium and electronic equipment based on intelligent network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011119835.0A CN112383897B (en) 2020-10-19 2020-10-19 Information transmission method, device, medium and electronic equipment based on intelligent network

Publications (2)

Publication Number Publication Date
CN112383897A CN112383897A (en) 2021-02-19
CN112383897B true CN112383897B (en) 2023-09-22

Family

ID=74580154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011119835.0A Active CN112383897B (en) 2020-10-19 2020-10-19 Information transmission method, device, medium and electronic equipment based on intelligent network

Country Status (1)

Country Link
CN (1) CN112383897B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113660269B (en) * 2021-08-17 2022-06-21 上海交通大学 Information credibility recognition processing method for centralized networking cloud control platform
CN115296808B (en) * 2022-10-10 2023-03-10 深圳市西昊智能家具有限公司 Secret key replacement method, device, computer equipment and storage medium
CN116528228B (en) * 2023-07-03 2023-08-25 合肥工业大学 A method, communication method, and system for Internet of Vehicles preset and session key distribution

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170017455A (en) * 2015-08-07 2017-02-15 주식회사 엘지씨엔에스 Mutual authentication method between mutual authentication devices based on session key and token, mutual authentication devices
CN106453269A (en) * 2016-09-21 2017-02-22 东软集团股份有限公司 Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system
CN106452762A (en) * 2016-11-25 2017-02-22 东南大学 Identity-based high-efficiency data transmission method in vehicular ad hoc network
CN106792681A (en) * 2016-11-28 2017-05-31 北京洋浦伟业科技发展有限公司 For the intrusion detection method and device and equipment of car networking
CN106789925A (en) * 2016-11-25 2017-05-31 北京洋浦伟业科技发展有限公司 Information of vehicles safe transmission method and device in car networking
CN109756336A (en) * 2017-11-03 2019-05-14 中国移动通信有限公司研究院 An authentication method, V2X computing system and V2X computing node

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200029209A1 (en) * 2018-07-23 2020-01-23 Henrik Ferdinand Nölscher Systems and methods for managing wireless communications by a vehicle

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170017455A (en) * 2015-08-07 2017-02-15 주식회사 엘지씨엔에스 Mutual authentication method between mutual authentication devices based on session key and token, mutual authentication devices
CN106453269A (en) * 2016-09-21 2017-02-22 东软集团股份有限公司 Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system
CN106452762A (en) * 2016-11-25 2017-02-22 东南大学 Identity-based high-efficiency data transmission method in vehicular ad hoc network
CN106789925A (en) * 2016-11-25 2017-05-31 北京洋浦伟业科技发展有限公司 Information of vehicles safe transmission method and device in car networking
CN106792681A (en) * 2016-11-28 2017-05-31 北京洋浦伟业科技发展有限公司 For the intrusion detection method and device and equipment of car networking
CN109756336A (en) * 2017-11-03 2019-05-14 中国移动通信有限公司研究院 An authentication method, V2X computing system and V2X computing node

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
车联网云端平台安全策略;高夕冉;王文扬;张东伟;;汽车电器(第12期);全文 *

Also Published As

Publication number Publication date
CN112383897A (en) 2021-02-19

Similar Documents

Publication Publication Date Title
EP3840327B1 (en) Method for applying for digital certificate
CN110678770B (en) Positioning information verification
CN113966625B (en) Techniques for certificate handling in the core network domain
WO2019158028A1 (en) Communication method and device
CN112383897B (en) Information transmission method, device, medium and electronic equipment based on intelligent network
CN103096302B (en) An encryption method, decryption method and related device
CN103281191B (en) The method and system communicated is carried out based on car networking
CN108323229B (en) Secure BLE broadcast system for location-based services
JP5587239B2 (en) Vehicle-to-vehicle / road-vehicle communication system
CN110545252B (en) A method, terminal, control function entity and application server for authentication and information protection
CN109845185B (en) A data transmission method, terminal, node device and system
CN101742508A (en) System and method for transferring files between WAPI terminal and application server
JP2016178668A (en) Methods and apparatus for enhanced system access control for peer-to-peer wireless communication networks
US10484187B2 (en) Cellular network authentication
US11588622B2 (en) Securing outside-vehicle communication using IBC
CN116633698B (en) Data transmission method, apparatus, computer device, storage medium, and program product
WO2024045680A1 (en) Device authentication method and related device
CN111656729B (en) System and method for computing escrow and private session keys for encoding digital communications between two devices
CN115379414A (en) Certificate issuing method and device
CN111428279B (en) Explicit certificate generation method, device, equipment and storage medium
CN116074028A (en) Access control method, device and system for encrypted traffic
WO2025129502A1 (en) Method and apparatus for post-quantum cryptography communication
CN118870352B (en) Vehicle network security communication method, user terminal, equipment and medium
CN118265031B (en) Information security method, apparatus, communication device and storage medium
CN115695469A (en) Internet of things communication method and system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant