Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system

A vehicle-mounted terminal and secure communication technology, applied in the field of Internet of Vehicles, can solve problems such as increased security costs, increased pressure on the server side, and unguaranteed transmission security, achieving the effect of improving security and reducing resources

Active Publication Date: 2017-02-22
NEUSOFT CORP
View PDF9 Cites 73 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the transmission security is not guaranteed, sensitive data will be stolen, tampered with, and even the vehicle will be remotely controlled, which will greatly threaten the personal safety of the car owner
[0003] At present, some security protocols in network security, such as: Secure Sockets Layer (Secure Sockets Layer, referred to as SSL), IP security (IP security, referred to as IPSec), etc., are difficult to use in vehicle-mounted mobile terminals with limited resources due to the large resource occupation. or popularization, even for vehicle-mounted mobile terminals with relatively abundant resources, if the above-mentioned security protocol is applied, it will not only increase the pressure on the server side, but also increase the security cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system
  • Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system
  • Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0089] The various embodiments of the present application mainly aim at the problem that in the prior art, due to the limited resources of the vehicle-mounted terminal, the existing transmission security protocol cannot be used to ensure the security of data transmission, and a method for secure communication of the Internet of Vehicles, a vehicle-mounted terminal, a server and system. In the secure communication method for the Internet of Vehicles provided by the present application, both the authentication and communicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides an Internet of Vehicles safety communication method, a vehicle-mounted terminal, a server and a system. The Internet of Vehicles safety communication method is characterized by comprising the following steps: the vehicle-mounted terminal sends a handshake authentication request to a server after determining that the transmission control protocol connection with the server has been finished, wherein the handshake authentication request comprises an identifier of the vehicle-mounted terminal and a first Hash value encrypted by use of a symmetrical encryption algorithm same as that adopted by the server; the vehicle-mounted terminal receives an authentication response message returned by the server, wherein the authentication response message is returned by the server after determining that the vehicle-mounted terminal is legal; and the vehicle-mounted terminal establishes a safety authentication transmission protocol connection with the server according to the authentication response message. A lightweight safety authentication transmission protocol is established between the vehicle-mounted terminal and the server by use of less resource, and the security of the data transmission between the vehicle-mounted terminal and the server is improved.

Description

technical field [0001] The present application relates to the technical field of the Internet of Vehicles, and in particular to a secure communication method for the Internet of Vehicles, a vehicle-mounted terminal, a server and a system. Background technique [0002] With the gradual maturity of Internet access technology for automobiles, the functions of network-based in-vehicle applications have also been greatly enriched and expanded, all of which have laid the foundation for the prosperity of the Internet of Vehicles application market. However, a subsequent problem that cannot be ignored is the security issue. How to ensure the security of the sensitive information that the vehicle interacts with the outside world through the network (that is, transmission security) has attracted great attention. If the transmission security is not guaranteed, sensitive data will be stolen, tampered with, and even the vehicle will be remotely controlled, which will greatly threaten the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L29/08
CPCH04L9/0643H04L9/0869H04L63/0435H04L63/0876H04L67/12H04L69/163
Inventor 刘玉涛陈静相
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products