Security chip communication method and device based on third-party key management node

A key management and security chip technology, applied in the field of security chip communication methods and devices, can solve problems such as easy cracking and data leakage, and achieve the effect of improving the difficulty of cracking and ensuring security

Active Publication Date: 2022-07-26
广州万协通信息技术有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a secure chip communication method and device based on a third-party key management node, which improves the difficulty of cracking communication key i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip communication method and device based on third-party key management node
  • Security chip communication method and device based on third-party key management node
  • Security chip communication method and device based on third-party key management node

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0037] Example 1:

[0038] figure 1 A flowchart of a third-party key management node-based security chip communication method provided in Embodiment 1 of the present application is given. The third-party key management node-based security chip communication method provided in this embodiment can be used by the Internet of Vehicles. The business service system is executed, the car networking business service system can be implemented by means of software and / or hardware, and the car networking business service system can be composed of two or more physical entities.

[0039] The following description will be given by taking the Internet of Vehicles business service system as the subject of executing the third-party key management node-based security chip communication method as an example. refer to figure 1 , the security chip communication method based on the third-party key management node specifically includes:

[0040] S110. The IoV node sends a key request to a third-pa...

Example Embodiment

[0085] Embodiment 2:

[0086] On the basis of the above-mentioned embodiment, Figure 5 This is a schematic structural diagram of a security chip communication device based on a third-party key management node provided in Embodiment 2 of the present application. refer to Figure 5 , the security chip communication device based on the third-party key management node provided by this embodiment specifically includes: a request module 21 , a configuration module 22 , a processing module 23 and a decryption module 24 .

[0087] The request module 21 is configured to send a key request to a third-party key management node through the IoV node, where the key request includes the first node identifier of the IoV node and the second node identifier of the corresponding service node;

[0088] The configuration module 22 is configured to respond to the key request through the third-party key management node, perform identity authentication of the IoV node based on the first node ident...

Example Embodiment

[0096] Embodiment three:

[0097] The third embodiment of the present application provides an electronic device, refer to Image 6 , the electronic device includes: a processor 31 , a memory 32 , a communication module 33 , an input device 34 and an output device 35 . The number of processors in the electronic device may be one or more, and the number of memories in the electronic device may be one or more. The processor, memory, communication module, input device, and output device of the electronic device may be connected by a bus or in other ways.

[0098] The memory 32, as a computer-readable storage medium, can be used to store software programs, computer-executable programs and modules, such as program instructions / Modules (eg, a request module, a configuration module, a processing module, and a decryption module in a third-party key management node-based secure chip communication device). The memory may mainly include a storage program area and a storage data area, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a security chip communication method and device based on a third-party key management node. According to the technical scheme provided by the embodiment of the invention, the private key information and the corresponding public key information are generated through the third-party key management node, the public key information is configured to the service node according to the second node identifier, the private key information is processed by setting the randomized processing data to obtain the key processing information, and the key processing information is sent to the Internet of Vehicles node; the Internet of Vehicles node processes the key processing information based on set de-randomization processing data to obtain corresponding private key information, and the de-randomization processing data is configured corresponding to randomization processing data in advance; and the Internet of Vehicles node decrypts the encrypted data sent by the service node based on the private key information, wherein the encrypted data is encrypted through the public key information. By adopting the technical means, the cracking difficulty of the communication key information can be improved, the security of communication key information configuration is ensured, and the security of data transmission is further improved.

Description

technical field [0001] The embodiments of the present application relate to the field of communication technologies, and in particular, to a method and device for communication of a security chip based on a third-party key management node. Background technique [0002] At present, when the business data interaction is performed in the application scenario of the Internet of Vehicles, since the data content may involve the user's personal information, private information, etc., during the business data interaction process, the transmitted data is usually encrypted to avoid data leakage. , causing unnecessary losses to users. The traditional IoV data transmission method is generally that the sender uses the key information provided by the receiver to encrypt the data, and then sets the corresponding decryption key at the data receiver, and uses the decryption key to decrypt the received encrypted data. , so as to realize the secure transmission of data. [0003] However, thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L67/12H04L9/30H04L9/32
CPCH04L63/0442H04L63/062H04L63/0869H04L67/12H04L9/3273H04L9/3247H04L9/30H04L2209/84
Inventor 张奇惠王立峰刘家明
Owner 广州万协通信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products