Vehicle-mounted terminal file encryption upgrading method and device, terminal equipment and storage medium
A vehicle terminal and file encryption technology, applied in computer security devices, software deployment, instruments, etc., can solve problems such as hidden dangers, tampering, and easy leakage of secret keys, and achieve the effect of preventing leakage, leakage and tampering.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The present invention will now be further described with reference to the accompanying drawings and specific embodiments.
[0041] like figure 1 As shown, a method for encrypting and upgrading a vehicle terminal file includes the following steps:
[0042] S1. Registration: The vehicle-mounted terminal registers the pre-assigned terminal identifier and chip identifier to the server platform, and the server platform conducts unified management. Only vehicle terminals with terminal identifiers and chip identifiers can authenticate and download the corresponding files.
[0043] S2. Filing: The vehicle terminal uses the encryption chip to generate the corresponding public-private key pair, extracts the public key, and records the public key, the terminal identifier and the chip identifier to the server platform. After the record is passed, the public-private key pair can be used for download and authentication Corresponding encryption and decryption and signature verificat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


