Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium
A login method and industrial computer technology, applied in the field of security certification, can solve problems such as hacker cracking, technology leakage of self-driving vehicles, and impact on the safety of self-driving vehicles, so as to ensure security, increase the difficulty of cracking, and improve user experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0050] Example one
[0051] figure 1 It is a flowchart of the login method for a vehicle-mounted industrial computer provided by the first embodiment of the present invention. This embodiment is applicable to the case of logging in to the vehicle-mounted industrial computer for operation during vehicle development or maintenance. The method can be executed by the vehicle-mounted industrial computer login device The device can be implemented by software and / or hardware, and can generally be integrated in a vehicle-mounted industrial computer. Such as figure 1 As shown, the method specifically includes:
[0052] S110. Generate a random password in response to the login request of the first terminal, where the first terminal and the vehicle-mounted industrial computer are in the same local area network.
[0053] Among them, you can log in remotely through SSH (Secure Shell, secure shell protocol), the vehicle-mounted industrial computer is used as an SSH server, and the first terminal ...
Example Embodiment
[0073] Example two
[0074] This embodiment provides a method for logging in a vehicle-mounted industrial computer. This embodiment is applicable to a situation where the vehicle-mounted industrial computer is logged in for operation during vehicle development or maintenance. The method can be executed by the vehicle-mounted industrial computer login device, which can It is implemented by software and / or hardware, and can generally be integrated in the second terminal. The second terminal may be a user's mobile terminal with a function of scanning a QR code, such as a mobile phone. In this embodiment, the first terminal and the vehicle-mounted industrial computer are in the same local area network, and the second terminal is connected to the external network. For technical details that are not described in detail in this embodiment, please refer to the on-board industrial computer login method provided in the first embodiment of the present invention.
[0075] figure 2 It is a f...
Example Embodiment
[0097] Example three
[0098] image 3 It is a schematic structural diagram of the login device for a vehicle-mounted industrial computer provided in the third embodiment of the present invention. The device can be applied to a vehicle-mounted industrial computer, such as image 3 As shown, the device includes:
[0099] The password generation module 310 is configured to generate a random password in response to the login request of the first terminal, wherein the first terminal and the vehicle-mounted industrial computer are in the same local area network;
[0100] A two-dimensional code generation module 320, configured to generate a two-dimensional code according to the random password and a cloud website address, and send the two-dimensional code to the first terminal;
[0101] The password verification module 330 is configured to receive the login password input by the user through the first terminal, and verify the login password according to the random password, and the login is...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap