Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium

A login method and industrial computer technology, applied in the field of security certification, can solve problems such as hacker cracking, technology leakage of self-driving vehicles, and impact on the safety of self-driving vehicles, so as to ensure security, increase the difficulty of cracking, and improve user experience.

Active Publication Date: 2019-01-04
APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious login will lead to the leakage of self-driving vehicle technology and seriously affect the safety of self-driving vehicles
[0004] At present, when the staff log in to the industrial computer of the self-driving vehicle for R&D or maintenance, they generally use a fixed user name and password to log in, which is easy to be cracked by hackers. If the user name and password are leaked, anyone can log in, which poses a security risk
If the universal QR code scan code login mechanism is adopted, the authentication process is initiated by the industrial computer, and the authentication unit is located in the cloud. The industrial computer needs to be connected to the Internet, and cannot be performed in an environment where the network is disconnected (such as a vehicle failure or a bad external environment, etc.). Log in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium
  • Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium
  • Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] figure 1 It is a flow chart of the login method of the vehicle-mounted industrial computer provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of logging into the vehicle-mounted industrial computer for operation during the development or maintenance of the vehicle. The method can be executed by the vehicle-mounted industrial computer login device , the device can be implemented by software and / or hardware, and generally can be integrated in the vehicle-mounted industrial computer. Such as figure 1 As shown, the method specifically includes:

[0052] S110. Generate a random password in response to the login request of the first terminal, where the first terminal is in the same local area network as the vehicle-mounted industrial computer.

[0053]Among them, remote login can be performed through SSH (Secure Shell, Secure Shell Protocol), the vehicle-mounted industrial computer is used as an SSH server, and the first termin...

Embodiment 2

[0074] This embodiment provides a method for logging in to a vehicle-mounted industrial computer. This embodiment is applicable to the situation of logging in to a vehicle-mounted industrial computer for operation during vehicle research and development or maintenance. The method can be performed by a vehicle-mounted industrial computer login device, which can It is implemented by software and / or hardware, and generally can be integrated in the second terminal. The second terminal may be a user's mobile terminal capable of scanning two-dimensional codes, such as a mobile phone. In this embodiment, the first terminal and the vehicle-mounted industrial computer are in the same local area network, and the second terminal is connected to the external network. For technical details that are not described in detail in this embodiment, refer to the login method for a vehicle-mounted industrial computer provided in Embodiment 1 of the present invention.

[0075] figure 2 It is a fl...

Embodiment 3

[0098] image 3 It is a schematic diagram of the structure of the vehicle-mounted industrial computer login device provided by the third embodiment of the present invention. This device can be applied to the vehicle-mounted industrial computer, such as image 3 As shown, the device includes:

[0099] A password generating module 310, configured to generate a random password in response to a login request of a first terminal, wherein the first terminal and the vehicle-mounted industrial computer are in the same local area network;

[0100] A two-dimensional code generation module 320, configured to generate a two-dimensional code according to the random password and the cloud URL, and send the two-dimensional code to the first terminal;

[0101] A password verification module 330, configured to receive a login password input by the user through the first terminal, and verify the login password according to the random password, and if the verification passes, the login is succe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a vehicle-mounted industrial control computer login method, a device, a system, computer equipment a d a medium. The method comprises the following steps: generating a random password in response to a login request of a first terminal, wherein the first terminal and the vehicle-mounted industrial control computer are located in the same local area network;generating a two-dimensional code according to the random password and the cloud network address, and sending the two-dimensional code to the first terminal; receiving the login password input by theuser through the first terminal, verifying the login password according to the random password, and if the verification is passed, the login is successful; wherein the login password is obtained after scanning the two-dimensional code displayed on the first terminal by the second terminal and visiting the cloud network address for decryption and / or authentication, and the second terminal is connected with the external network. The method, the device, the system, the computer equipment and the medium can realize one secret at a time for the login of the industrial control computer on the vehicle without networking of the vehicle, thereby effectively preventing malicious login of hackers.

Description

technical field [0001] Embodiments of the present invention relate to security authentication technology, and in particular to a login method, device, system, computer equipment and media for a vehicle-mounted industrial computer. Background technique [0002] With the development of automobile intelligence and networking, the degree of vehicle informatization is getting higher and higher. The central control system, T-BOX system (Telematics BOX), and industrial computer of various vehicles are all realized based on modern operating systems. However, a series of cracking and attack incidents targeting the intelligent networked vehicle system occurred subsequently, and information security technology is becoming a key factor for the success of intelligent networked vehicles. [0003] During the development and maintenance of vehicles, R&D personnel and maintenance personnel need to log in to the industrial computer of the self-driving vehicle to obtain information and execute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0838H04L63/168
Inventor 刘德文曹亮
Owner APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products