Symmetric key distribution method and device, vehicle and storage medium

A symmetric key and key technology, applied in the field of automobile information security, can solve the problems of high complexity of distribution keys, low distribution efficiency and high cost, and achieve the effects of low computing performance, high distribution efficiency and low cost

Active Publication Date: 2020-02-21
CHINA FIRST AUTOMOBILE
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a symmetric key distribution method, device, vehicle and storage medium to solve the current technical problems of high complexity, high cost and low distribution efficiency when distributing keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric key distribution method and device, vehicle and storage medium
  • Symmetric key distribution method and device, vehicle and storage medium
  • Symmetric key distribution method and device, vehicle and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings but not all structures.

[0040] figure 1 It is a schematic diagram of the application scenario of the symmetric key distribution method provided by the present invention. Such as figure 1 As shown, the Internet of Vehicles server 11 needs to send a key to the controller 12 on the vehicle, so that the controller can decrypt the received information according to the key in the subsequent interaction with the Internet of Vehicles server 11, or, according to This key encrypts the information sent. Considering the computing performance of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a symmetric key distribution method and device, a vehicle and a storage medium. The method comprises the following steps: 1, ; obtaining a mapping relationship between a key ciphertext generated by an Internet of Vehicles server and the controller identifier, acquiring a target identifier of the target controller; obtaining a target key ciphertext corresponding to the target identifier from the mapping relationship, compared with the prior art, the target controller does not need complex operation, the requirement for the operation performance of the target controller is low, extra hardware is not added. Meanwhile, manual password card transmission is avoided, and therefore the symmetric key distribution method is low in complexity, low in cost and high in distribution efficiency.

Description

technical field [0001] The embodiments of the present invention relate to the field of automobile information security, and in particular, to a symmetric key distribution method, device, vehicle and storage medium. Background technique [0002] With the development of the automobile industry, the field of Internet of Vehicles has received more and more attention. In the field of Internet of Vehicles, information security design is very important. In information security design, it is very important how to send the key of the controller from the Internet of Vehicles server to the vehicle controller. [0003] Currently, the keys of the vehicle controller are distributed in the following two ways. Method 1: The Internet of Vehicles server and the vehicle controller use a set of public and private key information respectively. The Internet of Vehicles server uses the public key to encrypt the key of the controller and sends it to the vehicle controller. The vehicle controller ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0822H04L9/0838H04L9/0894H04L9/0891
Inventor 李木犀闫鹏陈博宁矣许传斌吴淼陈明刘孝雷刘毅
Owner CHINA FIRST AUTOMOBILE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products