Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium

A login method and industrial computer technology, applied in the field of security certification, can solve problems such as hacker cracking, technology leakage of self-driving vehicles, and impact on the safety of self-driving vehicles, so as to ensure security, increase the difficulty of cracking, and improve user experience.

Active Publication Date: 2019-01-04
APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious login will lead to the leakage of self-driving vehicle technology and seriously affect the safety of self-driving vehicles
[0004] At present, when the staff log in to the industrial computer of the self-driving vehicle for R&D or maintenance, they generally use a fixed user name and password to log in, which is easy to be cracked by hackers. If the user name and password are leaked, anyone can log in, whic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium
  • Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium
  • Vehicle-mounted industrial control computer login method, device, system, computer equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] Example one

[0051] figure 1 It is a flowchart of the login method for a vehicle-mounted industrial computer provided by the first embodiment of the present invention. This embodiment is applicable to the case of logging in to the vehicle-mounted industrial computer for operation during vehicle development or maintenance. The method can be executed by the vehicle-mounted industrial computer login device The device can be implemented by software and / or hardware, and can generally be integrated in a vehicle-mounted industrial computer. Such as figure 1 As shown, the method specifically includes:

[0052] S110. Generate a random password in response to the login request of the first terminal, where the first terminal and the vehicle-mounted industrial computer are in the same local area network.

[0053] Among them, you can log in remotely through SSH (Secure Shell, secure shell protocol), the vehicle-mounted industrial computer is used as an SSH server, and the first terminal ...

Example Embodiment

[0073] Example two

[0074] This embodiment provides a method for logging in a vehicle-mounted industrial computer. This embodiment is applicable to a situation where the vehicle-mounted industrial computer is logged in for operation during vehicle development or maintenance. The method can be executed by the vehicle-mounted industrial computer login device, which can It is implemented by software and / or hardware, and can generally be integrated in the second terminal. The second terminal may be a user's mobile terminal with a function of scanning a QR code, such as a mobile phone. In this embodiment, the first terminal and the vehicle-mounted industrial computer are in the same local area network, and the second terminal is connected to the external network. For technical details that are not described in detail in this embodiment, please refer to the on-board industrial computer login method provided in the first embodiment of the present invention.

[0075] figure 2 It is a f...

Example Embodiment

[0097] Example three

[0098] image 3 It is a schematic structural diagram of the login device for a vehicle-mounted industrial computer provided in the third embodiment of the present invention. The device can be applied to a vehicle-mounted industrial computer, such as image 3 As shown, the device includes:

[0099] The password generation module 310 is configured to generate a random password in response to the login request of the first terminal, wherein the first terminal and the vehicle-mounted industrial computer are in the same local area network;

[0100] A two-dimensional code generation module 320, configured to generate a two-dimensional code according to the random password and a cloud website address, and send the two-dimensional code to the first terminal;

[0101] The password verification module 330 is configured to receive the login password input by the user through the first terminal, and verify the login password according to the random password, and the login is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a vehicle-mounted industrial control computer login method, a device, a system, computer equipment a d a medium. The method comprises the following steps: generating a random password in response to a login request of a first terminal, wherein the first terminal and the vehicle-mounted industrial control computer are located in the same local area network;generating a two-dimensional code according to the random password and the cloud network address, and sending the two-dimensional code to the first terminal; receiving the login password input by theuser through the first terminal, verifying the login password according to the random password, and if the verification is passed, the login is successful; wherein the login password is obtained after scanning the two-dimensional code displayed on the first terminal by the second terminal and visiting the cloud network address for decryption and/or authentication, and the second terminal is connected with the external network. The method, the device, the system, the computer equipment and the medium can realize one secret at a time for the login of the industrial control computer on the vehicle without networking of the vehicle, thereby effectively preventing malicious login of hackers.

Description

technical field [0001] Embodiments of the present invention relate to security authentication technology, and in particular to a login method, device, system, computer equipment and media for a vehicle-mounted industrial computer. Background technique [0002] With the development of automobile intelligence and networking, the degree of vehicle informatization is getting higher and higher. The central control system, T-BOX system (Telematics BOX), and industrial computer of various vehicles are all realized based on modern operating systems. However, a series of cracking and attack incidents targeting the intelligent networked vehicle system occurred subsequently, and information security technology is becoming a key factor for the success of intelligent networked vehicles. [0003] During the development and maintenance of vehicles, R&D personnel and maintenance personnel need to log in to the industrial computer of the self-driving vehicle to obtain information and execute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0838H04L63/168
Inventor 刘德文曹亮
Owner APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products