Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A vehicle-mounted t-box and user mobile phone information interaction security authentication system and method

A technology of security authentication and information interaction, which is applied in the field of information security during the communication process between the vehicle T-Box and the corresponding mobile app, which can solve problems such as loss, neglect of information security, and weak information protection, so as to protect information security and avoid dangerous behaviors , the effect of simplifying the design

Active Publication Date: 2018-01-12
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing vehicle T-Box technology, convenience is basically the core of the design, but information security is ignored, and the operation process lacks a strict information security protection mechanism
Even the T-Box equipment of some car manufacturers grants advanced authority to the control commands of the mobile phone App, which can directly control the vehicle power system, but lacks a relatively safe authentication link, and the information protection is relatively weak, which will directly make the vehicle very easy to be serviced remotely. The network is cracked through the network, thus encountering security threats such as loss, theft, and loss of control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vehicle-mounted t-box and user mobile phone information interaction security authentication system and method
  • A vehicle-mounted t-box and user mobile phone information interaction security authentication system and method
  • A vehicle-mounted t-box and user mobile phone information interaction security authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with accompanying drawing:

[0026] Such as figure 1 As shown, the present invention provides a new vehicle T-Box architecture system, including: vehicle 2, vehicle T-Box3, T-Box cloud server 4 and mobile terminal App5.

[0027] Among them, the vehicle-mounted T-Box3 has a built-in 4G communication network card for communicating with the T-Box cloud server 4; the vehicle-mounted T-Box3 is connected to the air conditioner and entertainment equipment in the vehicle 2, and as a control terminal, it can send instructions to these devices to Realize the control function; the vehicle T-Box3 is connected with the vehicle computer control system, and communicates through the CAN bus protocol. The automotive computer control system is isolated from the air conditioner and entertainment system at T-Box3. T-Box3 communicates with the two systems using different protocols to prevent information security threats t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety certification system for information interaction between a vehicle-mounted T-Box and a user cellphone, and the system comprises a vehicle, the vehicle-mounted T-Box, a T-Box cloud server, and a mobile terminal. The invention also discloses a safety certification method for information interaction between the vehicle-mounted T-Box and the user cellphone, and the method comprises the following steps: 1, inputting the fingerprint of a user through the mobile terminal, enabling the mobile terminal to generate encryption data through the instruction data and fingerprint data and a downloaded APP, carrying out the random ordering of the encryption data, packaging the encryption data, and transmitting the packaged encryption data to a T-Box server; 2, enabling the T-Box server to search the corresponding vehicle-mounted T-Box according to a VIN code linked with an instruction source account, and then transmitting the information to the corresponding vehicle-mounted T-Box; 3, enabling the corresponding vehicle-mounted T-Box to carry out the authentication of the fingerprint information in the data in a safety mode: switching to a normal mode and carrying out the execution of the instruction if the authentication is successful, or else carrying out no operation.

Description

technical field [0001] The invention relates to the field of vehicle information security, in particular to a technology for protecting the information security of the communication process between the vehicle T-Box and the corresponding mobile phone App, and prevents malicious control behaviors by using the mobile phone App to intrude into the vehicle T-Box through a fingerprint authentication system. Background technique [0002] With the development of science and technology, cars are no longer just a means of transportation. At present, the automobile industry is in the era of scientific and technological innovation, and the Internet of Vehicles technology has emerged in response to the situation. The communication between vehicles makes the connection between people and vehicles closer. Car owners can locate, access and control the car through remote services. In addition, vehicle-to-vehicle communication realizes the sharing of behavior information such as speed, posit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0869H04L63/0435H04L63/0442H04L63/08H04L63/083H04L63/0861H04L63/1441H04L67/025H04L67/12
Inventor 余贵珍王云鹏李欣旭王章宇张钊
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products