A T-BOX encryption system and method

A technology of T-BOX and encryption system, applied in the transmission system, data exchange through path configuration, electrical components, etc., can solve the problems of no separate protection measures, no data communication encryption protection, no protection against detection and self-destruction, etc.

Inactive Publication Date: 2019-05-10
ZOTYE INT AUTOMOBILE TRADING CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. It is impossible to encrypt and protect the data communication in T-BOX;
[0010] 2. The certificate is stored in the existing ARM core without separate protection measures;
[0011] 3. There is no detection protection and self-destruction function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A T-BOX encryption system and method
  • A T-BOX encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Referring to the accompanying drawings, through the description of the embodiments, the specific embodiments of the present invention include the shape, structure, mutual position and connection relationship of each part, the function and working principle of each part, and the manufacturing process of the various components involved. And the method of operation and use, etc., are described in further detail to help those skilled in the art have a more complete, accurate and in-depth understanding of the inventive concepts and technical solutions of the present invention.

[0037] Such as figure 1 The structure diagram of the encryption method shown, the functions of each module, system, and program are as follows:

[0038] Security management services: provide services such as key generation, identity verification, and certificate management;

[0039] Security operation and maintenance platform: including certificate registration and approval system, secret key manage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a T-BOX encryption system and method. the SOC, the HSM, the MCU and the CAN transceiver form the T-BOX body. a CAN transceiver is used for receiving a CAN network signal of thewhole vehicle and transmitting the signal to the MCU through a CAN network; The MCU encrypts the received network signal through a built-in security suite pair and then transmits the encrypted network signal to the HSM; the HSM is used for carrying out encryption operation on the obtained encrypted signal and then transmitting the encrypted signal to the SOC; And the SOC transmits the signal tothe security operation and maintenance platform through the established security encryption channel. a hardware encryption technology is introduced, a software encryption technology is fused, and theproblem of T-is solved; And the information security problem in the BOX is solved.

Description

technical field [0001] The invention relates to the field of vehicle communication safety, and provides information encryption and information storage functions for T-BOX. Background technique [0002] With the development of vehicle communication technology, more and more important information such as in-vehicle information and personal privacy are collected and transmitted, and the rise of cloud computing has also boosted the demand for such information by more and more businesses and individuals. In addition to being converted into commercial profits, this information will also be used by individual hackers to engage in illegal activities, such as maliciously intercepting and leaking personal information, maliciously attacking and controlling vehicles. come higher. [0003] In order to meet the needs of vehicle information security, in addition to the widely used software protection, hardware encryption protection is becoming more and more important. [0004] At present...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/40
Inventor 杨干朋宋立彬方吕根周雷雷
Owner ZOTYE INT AUTOMOBILE TRADING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products