Movatterモバイル変換


[0]ホーム

URL:


CN108377249B - Information authentication method in new energy automobile based on Internet of things technology - Google Patents

Information authentication method in new energy automobile based on Internet of things technology
Download PDF

Info

Publication number
CN108377249B
CN108377249BCN201810228623.2ACN201810228623ACN108377249BCN 108377249 BCN108377249 BCN 108377249BCN 201810228623 ACN201810228623 ACN 201810228623ACN 108377249 BCN108377249 BCN 108377249B
Authority
CN
China
Prior art keywords
matrix
data
user
information
ecu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810228623.2A
Other languages
Chinese (zh)
Other versions
CN108377249A (en
Inventor
覃士忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ande Space Culture Communication Co.,Ltd.
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to CN201810228623.2ApriorityCriticalpatent/CN108377249B/en
Publication of CN108377249ApublicationCriticalpatent/CN108377249A/en
Application grantedgrantedCritical
Publication of CN108377249BpublicationCriticalpatent/CN108377249B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

An information authentication method in a new energy automobile based on the technology of the Internet of things comprises the following steps: configuring an exclusive storage area for data encryption storage in an automobile ECU; configuring information authentication rules of an automobile ECU and a remote terminal; and the user is authenticated by remote control requested by the remote terminal through the information authentication rule.

Description

Information authentication method in new energy automobile based on Internet of things technology
Technical Field
The invention relates to the technical field of new energy automobile safety, in particular to an information authentication method in a new energy automobile based on the technology of the Internet of things.
Background
Along with the higher and higher intellectualization degree of the automobile and the higher and higher informatization degree of the automobile, more and more functions control the automobile through the automobile ECU to realize corresponding functions, and some technologies for remotely controlling the automobile exist, and the technologies enable the automobile to be more and more convenient to drive. On the other hand, the safety of the automobile is reduced, and the life safety of the user is seriously threatened once a lawless person remotely controls the automobile.
Disclosure of Invention
In order to overcome the defects in the background art, the invention provides an information authentication method in a new energy automobile based on the technology of the internet of things.
An information authentication method in a new energy automobile based on the technology of the Internet of things comprises the following steps:
configuring an exclusive storage area for data encryption storage in an automobile ECU;
configuring information authentication rules of an automobile ECU and a remote terminal;
and the user is authenticated by remote control requested by the remote terminal through the information authentication rule.
The information authentication method in the new energy automobile based on the technology of the Internet of things comprises the following steps:
the exclusive storage area for configuring data encryption storage in the automobile ECU comprises:
s1, dividing a special storage area in the automobile ECU, wherein the special storage area is used for data encryption storage;
the information authentication rule for configuring the automobile ECU and the remote terminal comprises the following steps:
s2, acquiring the identification information of each member with the automobile control authority; sending the identification information of each user to an automobile ECU;
s3, the automobile ECU processes all the identification information according to a first preset algorithm to obtain an identification data set, and then the identification information of each user is deleted; the automobile ECU carries out data grouping on the identification data set according to members;
s4, establishing a mapping relation between each data group and a remote terminal corresponding to the member in the automobile ECU; the mapping relation between each data packet and the user authority is configured in the automobile ECU;
the authentication of the user through remote control requested by the remote terminal through the information authentication rule comprises the following steps:
s5, when a user requests to perform remote control through a remote terminal, acquiring corresponding user information through the remote terminal, processing the user information through a second preset algorithm to obtain verification information, deleting the remote terminal to acquire the corresponding user information, and then sending the verification information to the automobile ECU;
s6, the automobile ECU verifies the verification information, receives the identity authentication request of the user when the verification is passed, and jumps to the step S7; otherwise, the user identity authentication fails, and the step S9 is skipped to;
s7, judging whether the vehicle control authority in the request sent by the user through the remote terminal is matched with the mapping relation between each data packet and the user authority through the mapping relation between each data packet and the user authority, controlling the vehicle to complete the corresponding function by the automobile ECU when the vehicle control authority is matched with the mapping relation between each data packet and the user authority, otherwise, skipping to the step S9;
and S9, the automobile ECU refuses the corresponding functions of the vehicle corresponding to the vehicle control authority in the request sent by the user through the remote terminal.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S3 includes:
the automobile ECU respectively converts the identification information of each user into a data matrix;
generating a compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices;
generating a reference matrix corresponding to each data matrix according to the compensation matrix, encrypting the reference matrix through a secure channel, and sending the encrypted reference matrix to a remote terminal corresponding to the data matrix;
the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set; the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value;
the automobile ECU carries out data grouping on the identification data set according to members and establishes a mapping relation between the matrix association value and the data grouping and matrix association value in the data set;
and the automobile ECU deletes the identification information, the reference matrix and the compensation matrix of the user, and stores the data set, the matrix correlation value and the mapping relation between the data packet and the matrix correlation value in the exclusive storage area.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S5 includes:
when a user requests to carry out remote control through a remote terminal, acquiring corresponding user information through the remote terminal;
the remote terminal converts the user information into a verification data matrix;
the remote terminal processes the verification data matrix and the reference matrix through a second preset algorithm to obtain verification information, and the remote terminal deletes corresponding user information and then sends the verification information to the automobile ECU.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S6 includes:
s61, judging whether the verification information is matched with the matrix correlation value by the automobile ECU; jumping to step S62 upon matching;
s62, the automobile ECU determines the corresponding data packet by establishing the mapping relation between the matrix correlation value and the data packet and the matrix correlation value in the data set;
s63, the automobile ECU confirms whether the identity authentication request of the user passes through the mapping relation between each data group and the mobile terminal corresponding to the member, receives the identity authentication request of the user when the verification passes and jumps to the step S7; otherwise, the user authentication fails, and the process goes to step S9.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the generating of the compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices includes:
screening out other matrixes of which the number of rows and the number of columns are less than or equal to the number of rows and the number of columns corresponding to the data matrix as incidence matrixes according to the number of rows and the number of columns of the data matrix;
and setting a compensation value, and carrying out standardization processing on the incidence matrix according to the compensation value to obtain a compensation matrix.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set, and the data set comprises the following steps:
the automobile ECU obtains a first intermediate matrix by performing product operation on each data matrix and the compensation matrix;
the automobile ECU processes the first intermediate matrix through an SHA512 algorithm to obtain a data set in a serialized form;
the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value, and the matrix correlation value comprises the following steps:
the automobile ECU obtains a second intermediate matrix by performing product operation on each data matrix and the reference matrix;
the automobile ECU processes the second intermediate matrix through an SHA512 algorithm to obtain a reference data set in a serialized form;
and comparing the data set with the reference data set by the automobile ECU to obtain a set difference value, and taking the difference value as a matrix correlation value.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S4 further includes:
configuring a mutual exclusion rule for each user to request for remote control through a remote terminal; accordingly, when matching in the step S7, the vehicle ECU controls the vehicle to complete the corresponding function, otherwise, the step S9 includes:
and during matching, judging whether the request sent by the user through the remote terminal meets the mutual exclusion rule or not through the mutual exclusion rule that each user requests to carry out remote control through the remote terminal, and if so, controlling the vehicle to complete the corresponding function by the automobile ECU, otherwise, skipping to the step S9.
The information authentication method in the new energy automobile based on the technology of the Internet of things has the following beneficial effects: the acquired original user information is not stored in the automobile ECU, only the processed data is reserved for information authentication, and the reserved information and the original user information have a unique determination relation, so that the safety of information storage is met, and the accuracy of authentication identification is improved; and lawless persons can not obtain the verification information in a cracking mode, so that the remote control probability of the automobile is greatly reduced.
Drawings
Fig. 1 is a flowchart of an information authentication method in a new energy vehicle based on the internet of things technology according to an embodiment of the invention.
Detailed Description
As shown in fig. 1, a method for authenticating information in a new energy vehicle based on the technology of internet of things includes the following steps:
configuring an exclusive storage area for data encryption storage in an automobile ECU;
configuring information authentication rules of an automobile ECU and a remote terminal;
and the user is authenticated by remote control requested by the remote terminal through the information authentication rule.
The following is a detailed description: an information authentication method in a new energy automobile based on the technology of the Internet of things comprises the following steps:
and S1, dividing a special storage area in the automobile ECU, wherein the special storage area is used for data encryption storage. Optionally, the exclusive storage area is encrypted in a hardware encryption mode, so that the storage safety of data in the automobile ECU is ensured.
S2, acquiring the identification information of each member with the automobile control authority; sending the identification information of each user to an automobile ECU; the method comprises the steps of obtaining identification information of each member and sending the identification information to the automobile ECU, wherein the identification information of the members is only configured with information for verifying whether a user request is legal or not in the automobile ECU, and therefore the identification information is transmitted at one time and cannot be stolen in subsequent use.
S3, the automobile ECU processes all the identification information according to a first preset algorithm to obtain an identification data set, and then the identification information of each user is deleted; the vehicle ECU groups the identification data sets into data according to the members. By implementing this step, only the data set, the matrix correlation value, and the mapping relationship between the data group and the matrix correlation value are stored in the vehicle ECU, and even if these three different pieces of information can be acquired at the same time, the identification information of the user corresponding to the array group cannot be acquired.
And deleting the identity identification information of each user after obtaining the identification data set, so that the identity identification information of the user is ensured not to be leaked, and the real identification information of the user cannot be obtained even if an exclusive storage area is leaked, wherein the identification information comprises iris identification information, fingerprint information and the like.
In the embodiment of the invention, a plurality of data sets exist, and the data sets have a corresponding relation with the identity identification information of the user; therefore, the automobile ECU groups the identification data sets according to the members, and the correspondence between the array groups and the user identities can be realized. Data grouping is a process of classifying a collection of data according to the identity of a user.
S4, establishing a mapping relation between each data group and a remote terminal corresponding to the member in the automobile ECU; the mapping relation between each data packet and the user authority is configured in the automobile ECU;
s5, when a user requests to perform remote control through a remote terminal, acquiring corresponding user information through the remote terminal, processing the user information through a second preset algorithm to obtain verification information, deleting the remote terminal to acquire the corresponding user information, and then sending the verification information to the automobile ECU; the remote terminal is a terminal for applying for remote control of the automobile, and can be a mobile terminal or a remote server.
S6, the automobile ECU verifies the verification information, receives the identity authentication request of the user when the verification is passed, and jumps to the step S7; otherwise, the user identity authentication fails, and the step S9 is skipped to; in the whole information authentication process, no matter the automobile ECU, the remote terminal or the transmission process, even if the illegal user obtains the information and data in the three links, the identification information of the user cannot be cracked.
S7, judging whether the vehicle control authority in the request sent by the user through the remote terminal is matched with the mapping relation between each data packet and the user authority through the mapping relation between each data packet and the user authority, controlling the vehicle to complete the corresponding function by the automobile ECU when the vehicle control authority is matched with the mapping relation between each data packet and the user authority, otherwise, skipping to the step S9;
and S9, the automobile ECU refuses the corresponding functions of the vehicle corresponding to the vehicle control authority in the request sent by the user through the remote terminal.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S3 includes:
the automobile ECU respectively converts the identification information of each user into a data matrix; because the identity information of the user may include biological identification information such as an iris, a fingerprint and the like, and the identification modes adopted by different users are different, the data matrixes converted from the identity identification information of different users are different, and not only are the values different, but also the number of rows and the number of columns may differ. The embodiment of the invention isomorphically introduces the concept of a data matrix and introduces the concept of obtaining a compensation matrix by carrying out standardized processing on the incidence matrix, so that the compatibility of the invention to various biological identification information of users is better, and the verification information can be crossed and flexibly combined, so that an illegal user cannot analyze the originally collected user information from all information.
Generating a compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices;
and generating a reference matrix corresponding to each data matrix according to the compensation matrix, encrypting the reference matrix through a secure channel, and sending the encrypted reference matrix to the remote terminal corresponding to the data matrix.
Optionally, generating the reference matrix corresponding to each data matrix according to the compensation matrix is obtained by replacing a specific numerical value in the compensation matrix.
The embodiment has the advantages that: the reference matrix is sent to the remote terminal, and the reference matrices corresponding to different data matrices are actually different, and the number of the reference matrices is different, and the number of rows/columns may also be different. Other illegal users cannot finally obtain the data matrix by referring to the matrix, and cannot simultaneously obtain the identity information of all the users.
The automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set;
the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value; the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set; and the automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value. In the embodiment of the invention, whether the request of the user is legal is judged by verifying the matrix correlation value, on one hand, the corresponding relation with the unique identification information (iris information and fingerprint information) of the user can be established, and the information is not directly utilized for verification, thereby greatly improving the safety.
The automobile ECU carries out data grouping on the identification data set according to members and establishes a mapping relation between the matrix association value and the data grouping and matrix association value in the data set;
and the automobile ECU deletes the identification information, the reference matrix and the compensation matrix of the user, and stores the data set, the matrix correlation value and the mapping relation between the data packet and the matrix correlation value in the exclusive storage area.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S5 includes:
when a user requests to carry out remote control through a remote terminal, acquiring corresponding user information through the remote terminal;
the remote terminal converts the user information into a verification data matrix;
the remote terminal processes the verification data matrix and the reference matrix through a second preset algorithm to obtain verification information, and the remote terminal deletes corresponding user information and then sends the verification information to the automobile ECU.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S6 includes:
s61, judging whether the verification information is matched with the matrix correlation value by the automobile ECU; jumping to step S62 upon matching;
s62, the automobile ECU determines the corresponding data packet by establishing the mapping relation between the matrix correlation value and the data packet and the matrix correlation value in the data set;
s63, the automobile ECU confirms whether the identity authentication request of the user passes through the mapping relation between each data group and the mobile terminal corresponding to the member, receives the identity authentication request of the user when the verification passes and jumps to the step S7; otherwise, the user authentication fails, and the process goes to step S9.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the generating of the compensation matrix corresponding to each data matrix according to the incidence relation between each data matrix and other matrices includes:
screening out other matrixes of which the number of rows and the number of columns are less than or equal to the number of rows and the number of columns corresponding to the data matrix as incidence matrixes according to the number of rows and the number of columns of the data matrix;
and setting a compensation value, and carrying out standardization processing on the incidence matrix according to the compensation value to obtain a compensation matrix.
The compensation value can be set autonomously by the user, and preferably can be generated by the identity relationship between different users. A fixed value may be set in advance as the compensation value.
Normalizing the correlation matrix to obtain a compensation matrix may include: and if the row and/or column of the incidence matrix is less than the corresponding data matrix, the row and/or column of the incidence matrix are/is filled by the compensation value to obtain a compensation matrix.
By implementing the embodiment, because the compensation value is set, the subsequent data set is obtained through the standardized compensation matrix, and the operation amount is reduced.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the automobile ECU processes the data matrix and the compensation matrix through a first preset algorithm to obtain a data set, and the data set comprises the following steps:
the automobile ECU obtains a first intermediate matrix by performing product operation on each data matrix and the compensation matrix;
the automobile ECU processes the first intermediate matrix through an SHA512 algorithm to obtain a data set in a serialized form;
since the SHA512 algorithm is an irreversible algorithm, even if a data set is obtained, the corresponding data matrix cannot be cracked, and thus the identification information of the corresponding user cannot be obtained. In the embodiment of the present invention, the first predetermined algorithm refers to all the processing steps described above.
The automobile ECU processes the data set and the reference matrix through a second preset algorithm to obtain a matrix correlation value, and the matrix correlation value comprises the following steps:
the automobile ECU obtains a second intermediate matrix by performing product operation on each data matrix and the reference matrix;
the automobile ECU processes the second intermediate matrix through an SHA512 algorithm to obtain a reference data set in a serialized form;
and comparing the data set with the reference data set by the automobile ECU to obtain a set difference value, and taking the difference value as a matrix correlation value.
Since the SHA512 algorithm is an irreversible algorithm, even if a reference data set is obtained, the corresponding data matrix cannot be cracked, and thus the identification information of the user cannot be obtained. In the embodiment of the present invention, the first predetermined algorithm refers to all the processing steps described above. By setting the matrix correlation value, the problem of different results caused by reference matrix and compensation matrix operation can be solved, and thus the mapping relation between the matrix correlation value and the data grouping and matrix correlation value in the data set can be formed.
In the information authentication method in the new energy automobile based on the technology of the internet of things,
the step S4 further includes:
configuring a mutual exclusion rule for each user to request for remote control through a remote terminal; accordingly, when matching in the step S7, the vehicle ECU controls the vehicle to complete the corresponding function, otherwise, the step S9 includes:
and during matching, judging whether the request sent by the user through the remote terminal meets the mutual exclusion rule or not through the mutual exclusion rule that each user requests to carry out remote control through the remote terminal, and if so, controlling the vehicle to complete the corresponding function by the automobile ECU, otherwise, skipping to the step S9.
Optionally, the mutual exclusion rule may include a time rule, a vehicle state rule. The time rule is a cooling time range of the automobile for completing remote control at the last time, and when the time rule is in the cooling time range, the automobile ECU refuses requests sent by all users through the remote terminal; the vehicle state rule is as follows: by setting the awakening states of different functional components of the automobile, the automobile ECU accepts the requests sent by all users through the remote terminal when the awakening states of the functional components are met, otherwise, the automobile ECU rejects the requests sent by all users through the remote terminal. By setting the awakening state, the remote control request in the normal driving state can be effectively refused, and the safety of automobile driving is improved.
The information authentication method in the new energy automobile based on the technology of the Internet of things has the following beneficial effects: the acquired original user information is not stored in the automobile ECU, only the processed data is reserved for information authentication, and the reserved information and the original user information have a unique determination relation, so that the safety of information storage is met, and the accuracy of authentication identification is improved; and lawless persons can not obtain the verification information in a cracking mode, so that the remote control probability of the automobile is greatly reduced.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in random access memory, read only memory, electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
It is understood that various other changes and modifications may be made by those skilled in the art based on the technical idea of the present invention, and all such changes and modifications should fall within the protective scope of the claims of the present invention.

Claims (7)

Translated fromChinese
1.一种基于物联网技术的新能源汽车中信息认证方法,其特征在于,其包括如下步骤:1. an information authentication method in a new energy vehicle based on Internet of Things technology, is characterized in that, it comprises the steps:在汽车ECU中配置数据加密存储的专属存储区域;Configure a dedicated storage area for encrypted data storage in the car ECU;配置汽车ECU以及远程终端的信息认证规则;Configure information authentication rules for automotive ECUs and remote terminals;通过信息认证规则对用户通过远程终端请求进行远程控制进行认证;Authenticate users who request remote control through remote terminals through information authentication rules;在汽车ECU中配置数据加密存储的专属存储区域包括:Dedicated storage areas for configuring encrypted storage of data in automotive ECUs include:S1、在汽车ECU中划分一专属存储区域,所述专属存储区域用于数据加密存储;S1. Divide an exclusive storage area in the automotive ECU, and the exclusive storage area is used for data encryption storage;配置汽车ECU以及远程终端的信息认证规则包括:Information authentication rules for configuring automotive ECUs and remote terminals include:S2、获取具有汽车控制权限内各个成员的身份识别信息;将各个用户的身份识别信息发送到汽车ECU;S2. Obtain the identification information of each member within the vehicle control authority; send the identification information of each user to the vehicle ECU;S3、汽车ECU将所有身份识别信息按照第一预设算法进行处理得到识别数据集合后删除各个用户的身份识别信息;汽车ECU将识别数据集合根据成员进行数据分组;S3. The automobile ECU processes all the identification information according to the first preset algorithm to obtain the identification data set, and then deletes the identification information of each user; the automobile ECU groups the identification data set according to the members;S4、在汽车ECU中建立各个数据分组与成员对应远程终端的映射关系;并在汽车ECU中配置各个数据分组与用户权限的映射关系;S4. Establish the mapping relationship between each data group and the remote terminal corresponding to the member in the automobile ECU; and configure the mapping relationship between each data group and user authority in the automobile ECU;通过信息认证规则对用户通过远程终端请求进行远程控制进行认证包括:Authenticating users through remote terminal requests for remote control through information authentication rules includes:S5、在用户通过远程终端请求进行远程控制时,通过远程终端获取对应用户信息,通过第二预设算法对用户信息进行处理得到验证信息,删除远程终端获取对应用户信息后将验证信息发送到汽车ECU;S5. When the user requests remote control through the remote terminal, obtain the corresponding user information through the remote terminal, process the user information through the second preset algorithm to obtain verification information, delete the remote terminal to obtain the corresponding user information, and send the verification information to the car ECU;S6、汽车ECU对验证信息进行验证,在验证通过时接受用户的身份认证请求并跳转到步骤S7;否则用户身份验证失败,跳转到步骤S9;S6, the automobile ECU verifies the verification information, and when the verification passes, accepts the user's identity authentication request and jumps to step S7; otherwise, the user identity verification fails, and jumps to step S9;S7、通过各个数据分组与用户权限的映射关系判断用户通过远程终端发送的请求中车辆控制权限是否与各个数据分组与用户权限的映射关系匹配,在匹配时,汽车ECU控制车辆完成相应功能,否则跳转到步骤S9;S7. Determine whether the vehicle control authority in the request sent by the user through the remote terminal matches the mapping relationship between each data group and the user authority through the mapping relationship between each data group and the user authority. When matching, the vehicle ECU controls the vehicle to complete the corresponding function, otherwise Jump to step S9;S9、汽车ECU拒绝用户通过远程终端发送的请求中车辆控制权限对应的车辆相应功能。S9. The vehicle ECU rejects the vehicle corresponding function corresponding to the vehicle control authority in the request sent by the user through the remote terminal.2.如权利要求1所述的基于物联网技术的新能源汽车中信息认证方法,其特征在于,2. the information authentication method in the new energy vehicle based on Internet of Things technology as claimed in claim 1, is characterized in that,所述步骤S3包括:The step S3 includes:汽车ECU将各个用户的身份识别信息分别转换为数据矩阵;The car ECU converts the identification information of each user into a data matrix;根据各个数据矩阵与其他矩阵的关联关系生成各个数据矩阵对应的补偿矩阵;Generate a compensation matrix corresponding to each data matrix according to the relationship between each data matrix and other matrices;根据补偿矩阵生成各个数据矩阵对应的参考矩阵,将参考矩阵通过安全通道加密后发送给数据矩阵对应的远程终端;Generate the reference matrix corresponding to each data matrix according to the compensation matrix, encrypt the reference matrix through the secure channel and send it to the remote terminal corresponding to the data matrix;汽车ECU通过第一预设算法对数据矩阵和补偿矩阵进行处理得到数据集合;汽车ECU通过第二预设算法对数据集合和参考矩阵进行处理后得到矩阵关联值;The automobile ECU processes the data matrix and the compensation matrix through the first preset algorithm to obtain the data set; the automobile ECU obtains the matrix correlation value after processing the data set and the reference matrix through the second preset algorithm;汽车ECU将识别数据集合根据成员进行数据分组,并建立矩阵关联值与数据集合中数据分组与矩阵关联值的映射关系;The automobile ECU groups the identification data set according to the members, and establishes the mapping relationship between the matrix correlation value and the data grouping in the data set and the matrix correlation value;汽车ECU删除用户的身份识别信息、参考矩阵、补偿矩阵,并将数据集合、矩阵关联值以及数据分组与矩阵关联值的映射关系存储在专属存储区域中。The automotive ECU deletes the user's identification information, reference matrix, and compensation matrix, and stores the data set, matrix-related values, and the mapping relationship between data packets and matrix-related values in a dedicated storage area.3.如权利要求2所述的基于物联网技术的新能源汽车中信息认证方法,其特征在于,3. the information authentication method in the new energy vehicle based on Internet of Things technology as claimed in claim 2, is characterized in that,所述步骤S5包括:The step S5 includes:在用户通过远程终端请求进行远程控制时,通过远程终端获取对应用户信息;When the user requests remote control through the remote terminal, obtain the corresponding user information through the remote terminal;远程终端将用户信息转化为验证数据矩阵;The remote terminal converts the user information into a verification data matrix;远程终端通过第二预设算法对验证数据矩阵和参考矩阵进行处理后得到验证信息,远程终端在删除对应用户信息后将验证信息发送到汽车ECU。The remote terminal obtains the verification information after processing the verification data matrix and the reference matrix through the second preset algorithm, and the remote terminal sends the verification information to the automobile ECU after deleting the corresponding user information.4.如权利要求3所述的基于物联网技术的新能源汽车中信息认证方法,其特征在于,4. the information authentication method in the new energy vehicle based on Internet of Things technology as claimed in claim 3, is characterized in that,所述步骤S6包括:The step S6 includes:S61、汽车ECU判断验证信息与矩阵关联值是否匹配;在匹配时跳转步骤S62;S61, the automobile ECU judges whether the verification information matches the matrix correlation value; if it matches, jump to step S62;S62、汽车ECU通过建立矩阵关联值与数据集合中数据分组与矩阵关联值的映射关系确定对应的数据分组;S62, the automobile ECU determines the corresponding data group by establishing the mapping relationship between the matrix correlation value and the data group in the data set and the matrix correlation value;S63、汽车ECU通过各个数据分组与成员对应移动终端的映射关系确认用户的身份认证请求是否通过,在验证通过时接受用户的身份认证请求并跳转到步骤S7;否则用户身份验证失败,跳转到步骤S9。S63, the automobile ECU confirms whether the user's identity authentication request is passed through the mapping relationship between each data group and the member's corresponding mobile terminal, and accepts the user's identity authentication request when the verification is passed and jumps to step S7; otherwise, the user identity authentication fails, and jumps to Go to step S9.5.如权利要求4所述的基于物联网技术的新能源汽车中信息认证方法,其特征在于,5. the information authentication method in the new energy vehicle based on Internet of Things technology as claimed in claim 4, is characterized in that,所述根据各个数据矩阵与其他矩阵的关联关系生成各个数据矩阵对应的补偿矩阵包括:The generating of the compensation matrix corresponding to each data matrix according to the association relationship between each data matrix and other matrices includes:根据数据矩阵的行数、列数,筛选出行数、列数小于或等于数据矩阵对应行数、列数的其他矩阵作为关联矩阵;According to the number of rows and columns of the data matrix, other matrices whose number of rows and columns are less than or equal to the number of rows and columns of the data matrix are selected as the correlation matrix;设置补偿值,根据补偿值,对关联矩阵进行标准化处理得到补偿矩阵。Set the compensation value, and standardize the correlation matrix to obtain the compensation matrix according to the compensation value.6.如权利要求4所述的基于物联网技术的新能源汽车中信息认证方法,其特征在于,6. the information authentication method in the new energy vehicle based on the Internet of Things technology as claimed in claim 4, is characterized in that,汽车ECU通过第一预设算法对数据矩阵和补偿矩阵进行处理得到数据集合包括:The car ECU processes the data matrix and the compensation matrix through the first preset algorithm to obtain a data set including:汽车ECU通过对各个数据矩阵和补偿矩阵进行乘积运算得到第一中间矩阵;The automobile ECU obtains the first intermediate matrix by multiplying each data matrix and the compensation matrix;汽车ECU通过SHA512算法对第一中间矩阵处理得到序列化形式的数据集合;The automobile ECU processes the first intermediate matrix through the SHA512 algorithm to obtain a serialized data set;汽车ECU通过第二预设算法对数据集合和参考矩阵进行处理后得到矩阵关联值包括:After the car ECU processes the data set and the reference matrix through the second preset algorithm, the matrix correlation values obtained include:汽车ECU通过对各个数据矩阵和参考矩阵进行乘积运算得到第二中间矩阵;The automobile ECU obtains the second intermediate matrix by multiplying each data matrix and the reference matrix;汽车ECU通过SHA512算法对第二中间矩阵处理得到序列化形式的参考数据集合;The automotive ECU processes the second intermediate matrix through the SHA512 algorithm to obtain a serialized reference data set;汽车ECU对比数据集合与参考数据集合获得集合差异值,将差异值作为矩阵关联值。The automobile ECU compares the data set with the reference data set to obtain the set difference value, and uses the difference value as the matrix correlation value.7.如权利要求1所述的基于物联网技术的新能源汽车中信息认证方法,其特征在于,7. The information authentication method in a new energy vehicle based on Internet of Things technology as claimed in claim 1, characterized in that,所述步骤S4还包括:The step S4 also includes:配置各个用户通过远程终端请求进行远程控制的互斥规则;相应地,所述步骤S7中在匹配时,汽车ECU控制车辆完成相应功能,否则跳转到步骤S9包括:Configure the mutual exclusion rules that each user requests remote control through the remote terminal; correspondingly, when matching in step S7, the automobile ECU controls the vehicle to complete the corresponding function, otherwise jumping to step S9 includes:在匹配时,通过各个用户通过远程终端请求进行远程控制的互斥规则判断用户通过远程终端发送的请求是否符合互斥规则,在符合时,汽车ECU控制车辆完成相应功能,否则跳转到步骤S9。When matching, it is judged whether the request sent by the user through the remote terminal complies with the mutual exclusion rule according to the mutual exclusion rule that each user requests remote control through the remote terminal. .
CN201810228623.2A2018-03-202018-03-20Information authentication method in new energy automobile based on Internet of things technologyActiveCN108377249B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810228623.2ACN108377249B (en)2018-03-202018-03-20Information authentication method in new energy automobile based on Internet of things technology

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810228623.2ACN108377249B (en)2018-03-202018-03-20Information authentication method in new energy automobile based on Internet of things technology

Publications (2)

Publication NumberPublication Date
CN108377249A CN108377249A (en)2018-08-07
CN108377249Btrue CN108377249B (en)2021-01-12

Family

ID=63019129

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810228623.2AActiveCN108377249B (en)2018-03-202018-03-20Information authentication method in new energy automobile based on Internet of things technology

Country Status (1)

CountryLink
CN (1)CN108377249B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111464570B (en)*2020-06-232020-10-09广州赛瑞科技股份有限公司New energy automobile detection data encryption method and device
CN114650155B (en)*2020-12-182024-11-01北京万集科技股份有限公司Method and system for issuing vehicle-mounted unit, storage medium and electronic device
CN118509218B (en)*2024-05-242024-11-05中国电子科技集团公司第十五研究所Cross-data-center data processing method and device

Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN201622839U (en)*2009-12-162010-11-03比亚迪股份有限公司 A wireless voice car remote control system
CN101934779A (en)*2010-08-312011-01-05中山大学 An intelligent vehicle anti-theft method and system
CN102529888A (en)*2012-03-132012-07-04鸿富锦精密工业(深圳)有限公司Automobile use permission control system and method
WO2012157830A1 (en)*2011-05-182012-11-22목포대학교 산학협력단Method and apparatus for distributing certificate revocation list based on multimedia object transfer protocol
CN102833250A (en)*2012-08-282012-12-19华南理工大学Security management method and system for vehicular mobile Internet
CN103888418A (en)*2012-12-212014-06-25中国电信股份有限公司Strategy authentication method and system
CN104935608A (en)*2015-07-072015-09-23成都睿峰科技有限公司Identity authentication method in cloud computing network
CN106357633A (en)*2016-09-072017-01-25惠州市德赛西威汽车电子股份有限公司Method and device for protecting car TCU data
CN106575454A (en)*2014-06-112017-04-19威尔蒂姆Ip公司System and method for facilitating user access to vehicles based on biometric information
CN106789378A (en)*2017-03-292017-05-31宁夏灵智科技有限公司Information prevents from revealing method and system in smart home
CN106888140A (en)*2017-03-292017-06-23宁夏煜隆科技有限公司Data centralized management method and system in smart home
CN107147646A (en)*2017-05-112017-09-08郑州信大捷安信息技术股份有限公司A kind of automobile function interface security mandate accesses system and security certificate access method
CN107612889A (en)*2017-08-232018-01-19四川长虹电器股份有限公司The method for preventing user profile from revealing

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN201622839U (en)*2009-12-162010-11-03比亚迪股份有限公司 A wireless voice car remote control system
CN101934779A (en)*2010-08-312011-01-05中山大学 An intelligent vehicle anti-theft method and system
WO2012157830A1 (en)*2011-05-182012-11-22목포대학교 산학협력단Method and apparatus for distributing certificate revocation list based on multimedia object transfer protocol
CN102529888A (en)*2012-03-132012-07-04鸿富锦精密工业(深圳)有限公司Automobile use permission control system and method
CN102833250A (en)*2012-08-282012-12-19华南理工大学Security management method and system for vehicular mobile Internet
CN103888418A (en)*2012-12-212014-06-25中国电信股份有限公司Strategy authentication method and system
CN106575454A (en)*2014-06-112017-04-19威尔蒂姆Ip公司System and method for facilitating user access to vehicles based on biometric information
CN104935608A (en)*2015-07-072015-09-23成都睿峰科技有限公司Identity authentication method in cloud computing network
CN106357633A (en)*2016-09-072017-01-25惠州市德赛西威汽车电子股份有限公司Method and device for protecting car TCU data
CN106789378A (en)*2017-03-292017-05-31宁夏灵智科技有限公司Information prevents from revealing method and system in smart home
CN106888140A (en)*2017-03-292017-06-23宁夏煜隆科技有限公司Data centralized management method and system in smart home
CN107147646A (en)*2017-05-112017-09-08郑州信大捷安信息技术股份有限公司A kind of automobile function interface security mandate accesses system and security certificate access method
CN107612889A (en)*2017-08-232018-01-19四川长虹电器股份有限公司The method for preventing user profile from revealing

Also Published As

Publication numberPublication date
CN108377249A (en)2018-08-07

Similar Documents

PublicationPublication DateTitle
US11167723B2 (en)Method for access management of a vehicle
KR101611872B1 (en)An authentication method using FIDO(Fast IDentity Online) and certificates
CN108377249B (en)Information authentication method in new energy automobile based on Internet of things technology
Burton et al.Driver identification and authentication with active behavior modeling
CN110800249A (en) Maintenance system and maintenance method
US9730001B2 (en)Proximity based authentication using bluetooth
CN110784441A (en)Authentication method for client through network
CN112153638B (en)Safety authentication method and equipment for vehicle-mounted mobile terminal
CN106559408A (en)A kind of SDN authentication methods based on trust management
CN110502886A (en) Multi-factor authentication method, device, terminal and computer storage medium
US9853971B2 (en)Proximity based authentication using bluetooth
JP2013541908A (en) User account recovery
CN108447162B (en)Access control method based on face recognition
CN111034116A (en)Key management device, communication apparatus, and key sharing method
CN109067745B (en)Method for authenticating vehicle occupant, apparatus, device and storage medium therefor
WO2018015481A1 (en)Authentication method for authenticating a user of a terminal
CN114510701B (en) Single sign-on method, device, equipment and storage medium
EP3652665B1 (en)Method of registering and authenticating a user of an online system
CN114499999B (en)Identity authentication method, device, platform, vehicle, equipment and medium
CN108490914B (en)New-energy automobile central control system safety verification method
CN108919774B (en)Mixed electrical automobile safety traffic control method
CN114466358B (en)User identity continuous authentication method and device based on zero trust
KR102356836B1 (en)Method for user authentication having enhanced security
CN108322480B (en)Information authentication method in smart home
CN109617898B (en)Remote authentication method, device, equipment and storage medium thereof

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
TA01Transfer of patent application right
TA01Transfer of patent application right

Effective date of registration:20201027

Address after:No.15, building 13, Bajiao Road, Shijingshan District, Beijing 100043

Applicant after:Chen Yinghao

Address before:430000 Wuhan Donghu New Technological Development Zone, Hubei Province, Guannan Science and Technology Industrial Park, Phase I, Level 3, Unit 21, No. 9 (Admitted to Wuhan Chuangyijia Business Secretary Service Co., Ltd; Trusteeship No. 000348)

Applicant before:WUHAN KANGHUIRAN INFORMATION TECHNOLOGY CONSULTING Co.,Ltd.

GR01Patent grant
GR01Patent grant
TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20220208

Address after:100600 No. 7, Paradise West community, Pinggu District, Beijing

Patentee after:Beijing Xuxiu Culture Communication Co.,Ltd.

Address before:100043 No.15, building 13, Bajiao Road, Shijingshan District, Beijing

Patentee before:Chen Yinghao

TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20240227

Address after:Room 302, Unit 7, Building 3, Yaohua Langyuan, Xiadian Town, Dachang Hui Autonomous County, Langfang City, Hebei Province, 065300

Patentee after:Yang Jingliu

Country or region after:China

Address before:100600 No. 7, Paradise West community, Pinggu District, Beijing

Patentee before:Beijing Xuxiu Culture Communication Co.,Ltd.

Country or region before:China

TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20240428

Address after:101100 107, 1st to 2nd floors, Building 3, No. 4 Guanyin'an South Street, Tongzhou District, Beijing

Patentee after:Beijing Xuxiu Culture Communication Co.,Ltd.

Country or region after:China

Address before:Room 302, Unit 7, Building 3, Yaohua Langyuan, Xiadian Town, Dachang Hui Autonomous County, Langfang City, Hebei Province, 065300

Patentee before:Yang Jingliu

Country or region before:China

TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20250511

Address after:101100 107, 1st to 2nd floors, Building 3, No. 4 Guanyin'an South Street, Tongzhou District, Beijing

Patentee after:Beijing Ande Space Culture Communication Co.,Ltd.

Country or region after:China

Address before:101100 107, 1st to 2nd floors, Building 3, No. 4 Guanyin'an South Street, Tongzhou District, Beijing

Patentee before:Beijing Xuxiu Culture Communication Co.,Ltd.

Country or region before:China


[8]ページ先頭

©2009-2025 Movatter.jp