Vehicle-mounted machine terminal data protection method and device and vehicle
A data protection, vehicle-end technology, applied in the computer field, can solve problems such as important data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0100] Preferred embodiments of the present invention are described below with reference to the accompanying drawings. Those skilled in the art should understand that these embodiments are only used to explain the technical principles of the present invention, and are not intended to limit the protection scope of the present invention.
[0101] The degree of encryption of the Android operating system is an important factor that determines whether it can be decompiled. Compared with the Java source code, the C / C++ source code of the Native layer has higher security and is not easy to be decompiled. Based on this, the present invention provides a method for protecting car-machine data based on the Android operating system, which can generate a unique key corresponding to each car-machine in the Native layer of the Android operating system, and use the unique The key encrypts the data on the car terminal, which greatly improves the encryption degree of the car terminal.
[0102]...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


