CN114684070B - Safety vehicle control method and device, vehicle system and storage medium - Google Patents

Safety vehicle control method and device, vehicle system and storage medium Download PDF

Info

Publication number
CN114684070B
CN114684070B CN202210293493.7A CN202210293493A CN114684070B CN 114684070 B CN114684070 B CN 114684070B CN 202210293493 A CN202210293493 A CN 202210293493A CN 114684070 B CN114684070 B CN 114684070B
Authority
CN
China
Prior art keywords
vehicle
remote control
verification information
key
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210293493.7A
Other languages
Chinese (zh)
Other versions
CN114684070A (en
Inventor
杨彦召
马佳仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Automotive Innovation Co Ltd
Original Assignee
China Automotive Innovation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Automotive Innovation Co Ltd filed Critical China Automotive Innovation Co Ltd
Priority to CN202210293493.7A priority Critical patent/CN114684070B/en
Publication of CN114684070A publication Critical patent/CN114684070A/en
Application granted granted Critical
Publication of CN114684070B publication Critical patent/CN114684070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/246Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user characterised by the challenge triggering
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a safety vehicle control method, a safety vehicle control device, a vehicle system and a storage medium, which relate to the field of vehicle information safety and improve the safety of vehicle authentication and vehicle information in the process of controlling a vehicle by using a vehicle remote control key. Comprising the following steps: transmitting first state verification information to the vehicle, and receiving first verification information transmitted by the vehicle, wherein the first verification information comprises a first public key and first identity information; if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, second verification information is sent to the vehicle, the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key; receiving a target algorithm identifier sent by a vehicle, wherein the target algorithm identifier is used for indicating a target encryption algorithm; generating a random number, and transmitting the random number encrypted by the first public key to a vehicle; generating a target instruction according to the random number, the target algorithm identification and the vehicle control instruction; and sending a target instruction to the vehicle.

Description

Safety vehicle control method and device, vehicle system and storage medium
Technical Field
The present invention relates to the field of vehicle information security, and in particular, to a method and apparatus for safely controlling a vehicle, a vehicle system, and a storage medium.
Background
At present, a vehicle remote control key adopts a wireless remote control function of a central control lock to remotely control unlocking or locking of a vehicle door. When the user clicks a button on the vehicle key fob, the vehicle key fob transmits a vehicle control signal to the vehicle. After the vehicle receives the vehicle control signal, an operation instruction corresponding to the vehicle control signal is executed to control the unlocking or locking of the vehicle door.
However, since the car control signal transmitted by the car key is a unidirectionally transmitted radio signal, the car control signal is easy to intercept by a software defined radio (Software Defined Radio, SDR) device, and a signal replay attack is performed on the car according to the intercepted car control signal. The uniqueness of the remote control key of the vehicle is ensured according to the transmission frequency of the control signal, the specific address code and other fixed information, and the safety level of the safety mechanism is lower.
Disclosure of Invention
The invention provides a safe vehicle control method, a device, a vehicle system and a storage medium, which improve the safety of vehicle authentication and vehicle information in the process of controlling a vehicle by using a vehicle remote control key.
In order to achieve the above purpose, the invention adopts the following technical scheme:
in a first aspect, the present invention provides a method for safely controlling a vehicle, the method comprising:
transmitting first state verification information to the vehicle, wherein the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
receiving first verification information sent by a vehicle, wherein the first verification information comprises a first public key and first identity information, the first identity information is used for identifying the identity of the vehicle, and the first verification information is sent when the vehicle determines that the first verification information is consistent with the current state of a vehicle remote control key according to the first state verification information;
if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, second verification information is sent to the vehicle, the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
receiving a target algorithm identifier sent by a vehicle, wherein the target algorithm identifier is encrypted by a second public key and is used for indicating a target encryption algorithm;
generating a random number and sending the random number encrypted by the first public key to the vehicle;
encrypting the command for controlling the vehicle according to the random number and the target algorithm mark to generate a target command;
Sending a target instruction to the vehicle;
the first state verification information is updated according to the target instruction.
By adopting the safety vehicle control method, in the process of controlling the vehicle by using the vehicle remote control key, the vehicle remote control key can send first state verification information to the vehicle, and when the vehicle verification is consistent with the current state of the vehicle remote control key, the vehicle remote control key can also verify the identity of the vehicle so as to determine whether the vehicle is matched with the vehicle remote control key. And after the vehicle is determined to be matched with the vehicle remote control key, sending second verification information to the vehicle so as to verify the identity of the vehicle remote control key. After the bidirectional verification is passed, the vehicle remote control key and the vehicle negotiate a target encryption algorithm and a key together, and the key is a random number, so that the security of the key can be improved. And then, the vehicle remote control key encrypts a vehicle control instruction generated by the vehicle remote control key according to the key and the target encryption algorithm to obtain a target instruction, and sends the target instruction to the vehicle. Compared with the prior art that the vehicle remote control key can only transmit the encrypted vehicle control instruction to the vehicle in one direction, and the encrypted vehicle control instruction is generated by encrypting the vehicle control instruction according to the transmission frequency of the radio signal and the specific address code, the vehicle remote control key has the advantages that after the vehicle is verified to be consistent with the current state of the vehicle remote control key, the safety of vehicle authentication is improved through bidirectional verification of the vehicle and the vehicle remote control key, and the difficulty of replay attack of the vehicle is increased. And after the bidirectional verification is passed, the vehicle control instruction is encrypted by utilizing the negotiated target encryption algorithm and the random number to obtain a target instruction, the target instruction is sent to the vehicle, the safety of the vehicle information is improved, and the first state verification information is updated according to the target instruction so as to facilitate the next verification.
In one possible implementation manner, the first state verification information includes a first timestamp, information of a first historical instruction, and information of a first historical identity;
the first time stamp is the time of generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the information of the historical identity is matched.
In one possible implementation manner, the encrypting the command according to the random number and the target algorithm identifier to generate the target command includes:
if the vehicle control instruction is acquired in a preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate a target instruction.
In one possible implementation manner, the above safety control method further includes:
if the vehicle control instruction is not acquired within a preset time period after the random number is generated, deleting the first verification information, the random number and the target algorithm identifier, and executing a first preset operation;
wherein the first preset operation includes at least one of: and outputting first alarm information for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
In one possible implementation manner, the above safety control method further includes:
if the vehicle is not matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, executing a second preset operation, wherein the second preset operation comprises at least one of the following steps: and outputting second alarm information for prompting the user that the vehicle remote control key is not matched with the vehicle and interrupting the communication between the vehicle remote control key and the vehicle.
In one possible implementation, the vehicle key fob includes a receiving unit. The receiving the first verification information sent by the vehicle includes:
receiving first verification information sent by a vehicle through a receiving unit;
the target algorithm for receiving the vehicle transmission comprises the following steps:
the target algorithm identification is sent by the receiving unit vehicle.
In one possible implementation manner, the encrypting the command according to the random number and the target algorithm identifier to generate the target command includes:
decrypting the target algorithm identifier by adopting a private key corresponding to the second public key to obtain a target encryption algorithm;
and encrypting the command for controlling the vehicle by using the random number as a secret key and adopting a target encryption algorithm to obtain a target command.
In a second aspect, the present invention provides a method for safely controlling a vehicle, the method comprising:
receiving first state verification information sent by a vehicle remote control key, wherein the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
if the first state verification information is consistent with the pre-stored second state verification information, first verification information is sent to the vehicle remote control key, the first verification information comprises a first public key and first identity information, and the first identity information is used for identifying the identity of the vehicle;
receiving second verification information sent by the vehicle remote control key, wherein the second verification information comprises a second public key and second identity information, the second identity information is used for identifying the identity of the vehicle remote control key, and the second verification information is sent under the condition that the vehicle is determined to be matched with the vehicle remote control key;
if the vehicle remote control key is determined to be matched with the vehicle according to the second identity information and the pre-stored identity information, encrypting the identification of the target encryption algorithm by adopting the second public key to generate a target algorithm identification;
transmitting a target algorithm identification to a vehicle remote control key;
receiving an encrypted random number sent by a vehicle remote control key, wherein the encrypted random number is the random number encrypted by a first public key;
Decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
executing the operation corresponding to the vehicle control instruction;
and updating the second state verification information according to the target instruction.
By adopting the safety vehicle control method, in the process of controlling the vehicle by using the vehicle remote control key, after the vehicle is verified to be consistent with the current state of the vehicle remote control key, the vehicle can send first verification information to the vehicle remote control key, so that the vehicle remote control key can verify the identity of the vehicle. And after the vehicle is determined to be matched with the vehicle remote control key, the vehicle receives second verification information sent by the vehicle remote control key, and whether the vehicle remote control key is matched with the vehicle or not is determined according to the second verification information and the pre-stored identity information. After the vehicle remote control key is determined to be matched with the vehicle, namely after the bidirectional verification is passed, the vehicle remote control key and the vehicle jointly negotiate a target encryption algorithm and a secret key, wherein the secret key is a random number, and the security of the secret key can be improved. Then, the vehicle receives a target instruction sent by the vehicle remote control key, decrypts the target instruction according to the target encryption algorithm and the key after the common negotiation to obtain a vehicle control instruction, and executes operation corresponding to the vehicle control instruction. Compared with an encrypted vehicle control instruction sent by a vehicle remote control key and received by a vehicle in the prior art, the encrypted vehicle control instruction is generated by encrypting the vehicle control instruction according to the transmission frequency of a radio signal and a specific address code, and after the vehicle is verified to be consistent with the current state of the vehicle remote control key, the vehicle is verified in both directions by the vehicle and the vehicle remote control key, so that the safety of vehicle authentication is improved, and the difficulty of replay attack of the vehicle is increased. And after the bidirectional verification is passed, the target instruction received by the vehicle encrypts the vehicle control instruction by utilizing the negotiated encryption algorithm and the random number, so that the safety of the vehicle information is improved, and after the operation corresponding to the vehicle control instruction is executed, the second state verification information is updated according to the target instruction, so that the next verification is facilitated.
In one possible implementation manner, the second state verification information includes a second timestamp, information of a second history instruction, and information of a second history identity;
the second time stamp is the time of receiving the first historical command, the second historical command is a second historical vehicle control command, and the information of the second historical identity is used for verifying whether the information of the historical identity is matched.
In one possible implementation manner, the decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction includes:
and if the target instruction is received within a preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and a target encryption algorithm to obtain the vehicle control instruction.
In one possible implementation manner, the decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction includes:
decrypting the encrypted random number by adopting a private key corresponding to the first public key to obtain the random number;
and decrypting the target instruction by using the random number as a secret key and adopting a target encryption algorithm to obtain the vehicle control instruction.
In one possible implementation manner, the above safety control method further includes:
if the target instruction is not received within a preset time period after the encrypted random number is received, deleting the second verification information and the encrypted random number, and executing a third preset operation;
wherein the third preset operation includes at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
In one possible implementation manner, the above safety control method further includes:
if the vehicle remote control key is not matched with the vehicle according to the second identity information and the pre-stored identity information, executing a fourth preset operation, wherein the fourth preset operation comprises at least one of the following steps: and outputting fourth alarm information for prompting the user that the vehicle is not matched with the vehicle remote control key and interrupting the communication between the vehicle remote control key and the vehicle.
In one possible implementation manner, the above safety control method further includes:
and if a new target instruction is not received within a preset time period after the corresponding operation of the vehicle control instruction is executed, deleting the second verification information, the encrypted random number and the target algorithm identification.
In a third aspect, the present invention provides a vehicle key fob comprising:
the transmitting unit is used for transmitting first state verification information to the vehicle, wherein the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
a receiving unit: the vehicle remote control key comprises a first key and first identity information, wherein the first key is used for identifying the identity of the vehicle, and the first identity information is used for receiving first verification information sent by the vehicle, and is sent when the vehicle determines that the first state verification information is consistent with the current state of the vehicle remote control key;
a transmitting unit: the system is also used for sending second verification information to the vehicle if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, wherein the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
a receiving unit: the target algorithm identification is encrypted by a second public key and used for indicating a target encryption algorithm;
a transmitting unit: the system is also used for generating random numbers and sending the random numbers encrypted by the first public key to the vehicle;
And a processing unit: the method comprises the steps of encrypting a vehicle control instruction according to a random number and a target algorithm identifier to generate a target instruction;
a transmitting unit: the method is also used for sending a target instruction to the vehicle;
the processing unit is further used for updating the first state verification information according to the target instruction.
In one possible implementation, the first state verification information includes a first timestamp, information of a first historical instruction, and information of a first historical identity. The first time stamp is the time of generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the information of the historical identity is matched.
In a possible implementation manner, the processing unit is specifically configured to:
if the vehicle control instruction is acquired in a preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate a target instruction.
In one possible implementation manner, the processing unit is further configured to delete the first verification information, the random number, and the target algorithm identifier and perform a first preset operation if the vehicle control instruction is not acquired within a preset time period after the random number is generated;
Wherein the first preset operation includes at least one of: and outputting first alarm information for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
In a possible implementation manner, the processing unit is further configured to execute a second preset operation if it is determined that the vehicle is not matched with the vehicle remote key according to the first identity information and the pre-stored identity information, where the second preset operation includes at least one of the following: and outputting second alarm information for prompting the user that the vehicle remote control key is not matched with the vehicle and interrupting the communication between the vehicle remote control key and the vehicle.
In one possible implementation manner, the receiving unit is specifically configured to:
and receiving the first verification information sent by the vehicle through the receiving unit, and receiving the target algorithm identification sent by the vehicle through the receiving unit.
In a possible implementation manner, the processing unit is specifically configured to:
decrypting the target algorithm identifier by adopting a private key corresponding to the second public key to obtain a target encryption algorithm;
and encrypting the command for controlling the vehicle by using the random number as a secret key and adopting a target encryption algorithm to obtain a target command.
In a fourth aspect, the present invention provides a vehicle comprising:
the receiving unit is used for receiving first state verification information sent by the vehicle remote control key, wherein the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
the transmitting unit is used for transmitting first verification information to the vehicle remote control key if the first state verification information is consistent with the pre-stored second state verification information, wherein the first verification information comprises a first public key and first identity information, and the first identity information is used for identifying the identity of the vehicle;
the receiving unit is used for receiving second verification information sent by the vehicle remote control key, the second verification information comprises a second public key and second identity information, the second identity information is used for identifying the identity of the vehicle remote control key, and the second verification information is sent under the condition that the vehicle is determined to be matched with the vehicle remote control key;
the processing unit is used for encrypting the identification of the target encryption algorithm by adopting the second public key if the vehicle remote control key is determined to be matched with the vehicle according to the second identity information and the pre-stored identity information, so as to generate the identification of the target algorithm;
the sending unit is also used for sending the target algorithm identification to the vehicle remote control key;
The receiving unit is also used for receiving the encrypted random number sent by the vehicle remote control key, wherein the encrypted random number is the random number encrypted by the first public key;
the processing unit is also used for decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
the execution unit is used for executing the operation corresponding to the vehicle control instruction;
and the processing unit is also used for updating the second state verification information according to the target instruction.
In one possible implementation, the second state verification information includes a second timestamp, information of a second historical instruction, and information of a second historical identity. The second time stamp is the time of receiving the first historical command, the second historical command is a second historical vehicle control command, and the information of the second historical identity is used for verifying whether the information of the historical identity is matched.
In a possible implementation manner, the processing unit is specifically configured to:
and if the target instruction is received within a preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and a target encryption algorithm to obtain the vehicle control instruction.
In a possible implementation manner, the processing unit is specifically configured to:
Decrypting the encrypted random number by adopting a private key corresponding to the first public key to obtain the random number;
and decrypting the target instruction by using the random number as a secret key and adopting a target encryption algorithm to obtain the vehicle control instruction.
In a possible implementation manner, the processing unit is further configured to delete the second authentication information and the encrypted random number and perform a third preset operation if the target instruction is not received within a preset time period after the encrypted random number is received;
wherein the third preset operation includes at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
In a possible implementation manner, the processing unit is further configured to, if it is determined that the vehicle remote key is not matched with the vehicle according to the second identity information and the pre-stored identity information, perform a fourth preset operation, where the fourth preset operation includes at least one of the following: and outputting fourth alarm information for prompting the user that the vehicle is not matched with the vehicle remote control key and interrupting the communication between the vehicle remote control key and the vehicle.
In one possible implementation manner, the processing unit is further configured to delete the second verification information, the encrypted random number, and the target algorithm identifier if a new target instruction is not received within a preset time period after the operation corresponding to the command for controlling the vehicle is performed.
In a fifth aspect, the present invention provides a vehicle system comprising: a vehicle key fob as in the third aspect and any of its possible implementations, and a vehicle as in the fourth aspect and any of its possible implementations.
In a sixth aspect, the present invention provides a safety control device, including: a processor and a memory. The memory is used to store computer program code, which includes computer instructions. When the processor executes the computer instructions, the safety control device performs the safety control method as in the first aspect and any of the possible implementation manners thereof, or performs the safety control method as in the second aspect and any of the possible implementation manners thereof.
In a seventh aspect, the present invention provides a computer readable storage medium having stored thereon computer instructions which, when run on a vehicle key fob, cause the vehicle key fob to perform the method of controlling a vehicle in safety as in the first aspect or any of the possible implementations of the first aspect; alternatively, the computer instructions, when run on a vehicle, cause the vehicle to perform a method of controlling a vehicle safely as in the second aspect and any possible implementation thereof.
Drawings
FIG. 1 is a schematic diagram of a vehicle system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a safety car control device according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart of a method for controlling a vehicle safely according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a vehicle remote control key according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a vehicle according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "first" and "second" are used below for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the embodiments of the present disclosure, unless otherwise indicated, the meaning of "a plurality" is two or more. In addition, the use of "based on" or "according to" is intended to be open and inclusive in that a process, step, calculation, or other action "based on" or "according to" one or more of the stated conditions or values may in practice be based on additional conditions or beyond the stated values.
In order to improve the safety of vehicle authentication and vehicle information in the process of controlling a vehicle by using a vehicle remote control key, the embodiment of the invention provides a safety vehicle control method, a safety vehicle control device, a vehicle system and a storage medium. After the vehicle is verified and the current state of the vehicle remote control key is achieved, the safety of identity authentication is improved in a bidirectional identity authentication mode between the vehicle remote control key and the vehicle, so that the difficulty that a vehicle control instruction sent by the vehicle remote control key is attacked by replay is increased, and the safety of vehicle information is improved. The target command sent by the vehicle remote control key each time is obtained by encrypting the vehicle control command through a target encryption algorithm and a random key after the vehicle and the vehicle remote control key are negotiated, and the safety of vehicle information is further improved.
The safety vehicle control method provided by the embodiment of the invention can be applied to a vehicle system. Fig. 1 shows a schematic diagram of a construction of the vehicle system. As shown in fig. 1, the vehicle system may include: a vehicle key fob 11 and a vehicle 12. Within a preset distance range, a connection is established between the vehicle key fob 11 and the vehicle 12 by way of radio communication.
The vehicle remote control key 11 is configured to send a link establishment signal to a vehicle, then send first status verification information to the vehicle, receive first verification information including first identity information and a first public key sent by the vehicle, and determine whether the vehicle is matched with the vehicle remote control key according to the first identity information and the pre-stored identity information. When the vehicle is determined to be matched with the vehicle remote control key, the vehicle remote control key is further used for sending second verification information to the vehicle and receiving a target algorithm identification which is sent by the vehicle and is encrypted by the second public key, and the target algorithm identification is used for indicating a target encryption algorithm. The vehicle remote control key is also used for generating a random number, encrypting the vehicle control instruction according to the target algorithm identification and the random number, generating a target instruction, sending the target instruction to the vehicle, and updating the first state verification information according to the target instruction.
And the vehicle 12 is configured to verify whether the current states of the vehicle and the vehicle remote key are consistent after receiving the first state verification information sent by the vehicle remote key, and if so, send the first verification information to the vehicle remote key, and receive the second verification information including the second identity information and the second public key sent by the vehicle remote key after the vehicle remote key determines that the vehicle and the vehicle remote key are matched. When the vehicle remote control key is determined to be matched with the vehicle, the vehicle is further used for encrypting the identification of the target encryption algorithm by adopting the second public key, generating a target algorithm identification and sending the target algorithm identification to the vehicle remote control key. The vehicle is also used for receiving the target instruction and the random number, decrypting the target instruction according to the target encryption algorithm and the random number, determining a vehicle control instruction, executing the operation corresponding to the vehicle control instruction, and updating the second state verification information according to the target instruction.
Fig. 2 shows a schematic structural diagram of a safety control device, and as shown in fig. 2, the safety control device may include: a processor 21, a memory 22, a communication interface 23. The processor 21, the memory 22 and the communication interface 23 may be connected by a communication bus. The security control device may be a vehicle or a vehicle key fob, for example.
The processor 21 is a control center of the safety control device, and may be one processor or a collective name of a plurality of processing elements. For example, the processor 21 may be a general-purpose central processing unit (central processing unit, CPU), or may be another general-purpose processor 21. The general-purpose processor 21 may be a microprocessor 21 or any conventional processor 21 or the like.
Memory 22 may include, but is not limited to, read-only memory 22 (ROM) and random access memory 22 (random access memory, RAM) magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Illustratively, in the embodiment of the invention, the ROM of the vehicle is used for storing the first verification information and the encryption algorithm, the RAM of the vehicle is used for storing the second verification information, and the negotiated key, the target algorithm identification and the like are generated in the process of communicating with the vehicle remote control key. The ROM of the vehicle remote control key is used for storing second verification information, and the RAM of the vehicle remote control key is used for storing data generated in the process of communicating with the vehicle, such as the first verification information, the key after negotiation, the target algorithm identification and the like.
And a communication interface 23 for connecting the vehicle with the vehicle remote control key through radio signal communication. The communication interface 23 may include a receiving unit for receiving radio signals, and a transmitting unit for transmitting radio signals.
Illustratively, in an embodiment of the present invention, the receiving unit may be a ultra high frequency (Ultra High Frequency, UHF) receiving unit, and the transmitting unit may be a UHF transmitting unit.
It should be noted that the configuration shown in fig. 2 does not constitute a limitation of the vehicle or vehicle key fob, and that the vehicle or vehicle key fob may include more or less components than shown in fig. 2, or certain components may be combined, or a different arrangement of components. For example, the vehicle key fob is additionally provided with a button battery in addition to the components shown in fig. 2.
The execution main body of the safety control method provided by the embodiment of the invention is a vehicle and a vehicle remote control key. The vehicle and the vehicle remote control key can be the CPU in the vehicle and the vehicle remote control key, and can also be a control module for safety control of the vehicle in the vehicle and the vehicle remote control key. The embodiment of the invention takes a method for executing safety control of a vehicle and a vehicle remote control key as an example, and describes the safety control method provided by the invention.
The following describes a safety control method provided by the embodiment of the invention with reference to the accompanying drawings.
As shown in fig. 3, the method for controlling a vehicle safely provided in the embodiment of the present invention includes the following steps 301 to 3017.
301. The vehicle key fob transmits first status verification information to the vehicle.
The first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not.
Optionally, the first state verification information includes a first timestamp, information of the first historical instructions, and information of the first historical identity. The first time stamp is the time of generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the information of the historical identity is matched.
For example, the first state verification information may be stored in a synchronization flag memory of the vehicle key fob, and the information of the first history command and the information of the first history identity are binary numbers, respectively.
For example, taking the example that the first history command includes "door unlock", "door lock", "seek vehicle", and "open trunk", and the information of the first history identity is the first information of the first state verification information. That is, the information of the first history instruction and the information of the first history identity are 5-bit binary numbers. In the initial state, the 5-bit binary numbers are all set to 0.
Alternatively, since the communication connection is established between the vehicle remote control key and the vehicle through the radio signal, and the receiving range of the radio signal is limited, when the vehicle is controlled by using the vehicle remote control key, the user needs to stand in a preset range with the vehicle as a center and with a preset distance as a radius, and send a signal to the vehicle by using the vehicle remote control key. Before the vehicle sends the first verification information to the vehicle remote control key, the user sends a link establishment signal to the vehicle through the vehicle remote control key, so that the vehicle remote control key and the vehicle are in communication, and the link establishment signal is a radio signal.
302. The vehicle receives first state verification information sent by a vehicle remote control key.
303. If the first state verification information is consistent with the pre-stored second state verification information, the vehicle sends the first verification information to the vehicle remote control key.
Optionally, the second state verification information includes a second timestamp, information of the second historical instructions, and information of the second historical identity. The second time stamp is the time of receiving the first historical command, the second historical command is a second historical vehicle control command, and the information of the second historical identity is used for verifying whether the information of the historical identity is matched.
After the vehicle remote control key generates the first history command, the first history command is sent to the vehicle until the time when the vehicle receives the first history command is negligible. Thus, the time when the vehicle key fob generates the first history command coincides with the time when the vehicle receives the first history command.
The second state verification information is stored in the synchronous flag memory of the vehicle, and has the same composition as the first verification state information, and will not be described again.
And when the vehicle receives the first state verification information sent by the vehicle remote control key, matching the first state verification information with the pre-stored second verification information. And when the vehicle verifies that the first state verification information is consistent with the second state information, actively transmitting the first verification information to the vehicle remote control key.
It should be understood that the first state verification information is consistent with the second state verification information, which means that each item of information in the first state verification information is consistent with each item of information in the second state verification information.
Illustratively, the first timestamp is consistent with the second timestamp, the first historical instructions are consistent with the second historical instructions, and the first historical identity information is consistent with the second historical identity information. For example, the first state verification information is "1111000000 +first timestamp", and if the second state verification information is "1111000000 +second timestamp", the first timestamp is consistent with the second timestamp, it indicates that the first state verification information is consistent with the second state verification information; if the second status verification information is 1100110000, it indicates that the first status verification information is inconsistent with the second status verification information, at which point the vehicle may issue an alarm to alert the user and the vehicle terminates communication with the vehicle key fob.
Alternatively, the first authentication information is stored in a ROM of the vehicle, and the first authentication information may include the first public key and the first identity information. Wherein the first identity information is used to identify the identity of the vehicle and the first public key is a public key of the vehicle. The first verification information may be, for example, a digital certificate of the vehicle.
304. The vehicle remote control key receives first verification information sent by a vehicle.
Optionally, the vehicle remote control key stores the received first verification information in a random access memory RAM, so as to facilitate cleaning.
Alternatively, the vehicle key fob may include a receiving unit. The vehicle remote control key can receive the first verification information sent by the vehicle through the receiving unit.
305. And if the vehicle remote control key determines that the vehicle is matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, sending second verification information to the vehicle.
Alternatively, the second authentication information is stored in a ROM of the vehicle key fob, and the second authentication information may include the second public key and the second identity information. The second identity information is used for identifying the identity of the vehicle remote control key, and the second public key is the public key of the vehicle remote control key. The second authentication information may be, for example, a digital certificate of the vehicle key fob.
Optionally, the vehicle remote control key is pre-stored with the identity information of the vehicle matched with the vehicle remote control key. After the vehicle remote control key receives the first identity information, the first identity information can be matched with the pre-stored vehicle identity information. If the first identity information is consistent with the pre-stored vehicle identity information, the vehicle remote control key indicates that the vehicle sending the first identity information is successfully matched with the vehicle remote control key, and then the vehicle remote control key can send second verification information to the vehicle.
Optionally, if the vehicle remote control key determines that the vehicle is not matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, a second preset operation is performed. The second preset operation may include at least one of: and outputting second alarm information for prompting the user that the vehicle remote control key is not matched with the vehicle and interrupting the communication between the vehicle remote control key and the vehicle. At this time, the vehicle remote controller may also clear the first authentication information stored in the RAM of the vehicle remote controller.
The first alarm information may be an alarm blinking lamp, or the first alarm information may be an alarm bell.
306. And the vehicle receives the second verification information sent by the vehicle remote control key.
307. And if the vehicle determines that the vehicle remote control key is matched with the vehicle according to the second identity information and the pre-stored identity information, encrypting the identification of the target encryption algorithm by adopting the second public key to generate the target algorithm identification.
Optionally, the identity information of the vehicle remote key matched with the vehicle remote key and a plurality of encryption algorithms are prestored in the vehicle, and each encryption algorithm corresponds to one identifier. After the vehicle receives the second identity information, the second identity information can be matched with the pre-stored key identity information. If the second identity information is consistent with the pre-stored identity information, the fact that the vehicle remote control key sending the second identity information is successfully matched with the vehicle is indicated, the vehicle selects an encryption algorithm as a target encryption algorithm, and the second public key is adopted to encrypt the identification of the target encryption algorithm, so that the target algorithm identification is generated.
Optionally, in the process of generating the target algorithm identifier, the encryption algorithm is an asymmetric encryption algorithm. The asymmetric encryption algorithm may be, for example, an RSA algorithm.
Optionally, if the vehicle determines that the vehicle remote control key is not matched with the vehicle according to the second identity information and the pre-stored identity information, a fourth preset operation is performed. The fourth preset operation includes at least one of: and outputting fourth alarm information for prompting the user that the vehicle is not matched with the vehicle remote control key and interrupting the communication between the vehicle remote control key and the vehicle. At this time, the vehicle may also clear the second authentication information and the target algorithm identification stored in the RAM of the vehicle.
308. The vehicle sends the target algorithm identification to the vehicle key fob.
309. The vehicle remote control key receives a target algorithm identification sent by the vehicle.
Optionally, the target algorithm identifier is an identifier obtained by encrypting the vehicle by using the second public key, and is used for indicating the target encryption algorithm, and the target algorithm identifier can be stored in the RAM of the vehicle remote control key. Because the target algorithm identifier is an encryption algorithm encrypted by the second public key, only the vehicle remote control key can decrypt the target algorithm identifier.
Alternatively, the vehicle key fob may receive the target algorithm identification transmitted by the vehicle via the receiving unit.
310. The vehicle remote control key generates a random number and transmits the random number encrypted by the first public key to the vehicle.
Optionally, the vehicle remote control key has a random number generating unit therein for generating a random number. After the random number is generated, the random number is stored in the RAM of the vehicle remote control key. After the vehicle remote control key generates the random number, the first public key is adopted for encryption, so that when the encrypted random number is sent to the vehicle, only the vehicle can obtain the random number. In each process of controlling the vehicle by using the vehicle remote key, the random number generated by the vehicle remote key may be different, which may improve the security of the information transmitted between the vehicle and the vehicle remote key.
For example, when the random number generation unit generates the random number, the random number may be generated according to any element in the physical environment. For example, current temperature data, or noise data, etc.
Optionally, in the process of encrypting the random number, an encryption algorithm is used that is an asymmetric encryption algorithm. The asymmetric encryption algorithm may be, for example, an RSA algorithm.
311. The vehicle receives the encrypted random number sent by the vehicle remote control key.
Alternatively, the encrypted random number may be stored in the RAM of the vehicle.
312. And the vehicle remote control key encrypts the vehicle control instruction according to the random number and the target algorithm mark to generate a target instruction.
Optionally, in response to a clicking operation of a corresponding button on the vehicle remote control key by the user, the vehicle remote control key can acquire the command for controlling the vehicle. After the vehicle remote control key acquires the random number, the target algorithm identification and the vehicle control instruction, the vehicle control instruction can be encrypted according to the random number and the target algorithm identification to obtain the target instruction.
Optionally, the vehicle remote control key encrypts the vehicle control instruction according to the random number and the target algorithm identifier to generate the target instruction, which may also mean that the vehicle remote control key encrypts the vehicle control instruction according to the random number and the target algorithm identifier to generate the target instruction when acquiring the vehicle control instruction within a preset time period after generating the random number.
Optionally, a plurality of encryption algorithms are also stored in the vehicle remote control key, each encryption algorithm corresponds to an identifier, and the plurality of encryption algorithms are the same as a plurality of encryption algorithms stored in the vehicle. Then, the vehicle remote control key encrypts the command according to the random number and the target algorithm identification. Specifically, firstly, the vehicle remote control key adopts a private key corresponding to the second public key to decrypt the target algorithm identifier, and a target encryption algorithm is obtained. Secondly, the vehicle remote control key takes a random number as a key, and a target encryption algorithm is adopted to encrypt the vehicle control instruction to obtain a target instruction.
Optionally, in order to ensure timeliness of the random number and the target algorithm, so that the vehicle remote control key has better efficiency, flexibility and information security in the vehicle control process, if the vehicle remote control key does not acquire the vehicle control instruction within a preset time period after the random number is generated, deleting the first verification information, the random number and the target algorithm identifier stored in the RAM, and executing a first preset operation. The first preset operation includes at least one of: and outputting first alarm information for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
Alternatively, the target encryption algorithm for encrypting the command may be a symmetric encryption algorithm. The symmetric encryption algorithm is an advanced encryption standard in cryptography, adopts a symmetric block cipher system, and the secret key is a group of random numbers generated by encryption, so that the risk of secret key hidden coding is avoided, and the data security of vehicles and vehicle remote control keys in the communication process is further improved.
The symmetric encryption algorithm can be an AES algorithm, is mature, is easy to realize by software, has low performance requirements on a hardware system, can save cost, and has high feasibility.
313. The vehicle key fob transmits a target command to the vehicle.
314. The vehicle remote control key updates the first state verification information according to the target instruction.
And if the vehicle remote control key sends out a target instruction, the vehicle is indicated that the vehicle has verified that the first state verification information is consistent with the second state verification information, and the vehicle remote control key can update the first state verification information. The updating of the first state verification information may be inverting a corresponding binary number in the first state verification information, and updating the first timestamp.
For example, the current first state verification information is 0000000000, the bidirectional identity verification passes, and the vehicle control instruction corresponding to the target instruction is "door unlock", then the updated first state verification information is "1111000000 +the time of generating the" door unlock "instruction.
315. And the vehicle decrypts the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction.
Optionally, as long as the vehicle obtains the encrypted random number, the target encryption algorithm and the target instruction, the target instruction can be decrypted according to the encrypted random number and the target encryption algorithm to obtain the target instruction.
Optionally, the vehicle decrypts the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction, or may decrypt the target instruction according to the encrypted random number and the target encryption algorithm only when the vehicle receives the target instruction in a preset time period after receiving the encrypted random number, to obtain the vehicle control instruction.
Illustratively, the vehicle decrypts the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction, and may include: firstly, the vehicle adopts a private key corresponding to the first public key to decrypt the encrypted random number to obtain the random number. And secondly, the vehicle uses the random number as a secret key, and adopts a target encryption algorithm to decrypt the target instruction to obtain the vehicle control instruction.
Optionally, in order to ensure timeliness of the random number and safety of information in the vehicle control process, if the vehicle does not receive the target instruction within a preset time period after receiving the encrypted random number, deleting the second verification information, the encrypted random number and the target algorithm identifier, and executing a third preset operation. The third preset operation includes at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
316. And the vehicle executes the operation corresponding to the vehicle control instruction.
Optionally, after the vehicle acquires the vehicle control instruction, whether the vehicle control instruction is legal or not is judged. If the control command is legal, the vehicle executes the operation corresponding to the control command. When judging whether the vehicle control instruction is legal, the vehicle control instruction, the current state of the vehicle and a pre-stored instruction list of the vehicle need to be combined.
For example, if the command for controlling the vehicle contradicts the current state of the vehicle, or the command list does not include the command for controlling the vehicle, the vehicle may determine that the command for controlling the vehicle is an illegal command. The instructions in the instruction list may include door locking, door unlocking, controlling vehicle launch, and the like. The current state of the vehicle may include: the vehicle is in a flameout state, the vehicle is in a starting state, the vehicle door is in a locked state, the vehicle door is in an unlocked state, and the like.
For example, the vehicle control command is used as the vehicle door unlocking, the current state of the vehicle is that the vehicle door is in the locking state, and then the vehicle can determine that the vehicle control command is a legal command and execute the control command to lock the vehicle door.
Optionally, after the vehicle acquires the command for controlling the vehicle, if the command for controlling the vehicle is determined to be an illegal command, the vehicle may execute the second preset operation. At this time, the second alarm information in the second preset operation may be used to prompt the user that the vehicle control instruction is an illegal instruction.
For example, the vehicle control command is used as the door unlock, the current state of the vehicle is that the door is in the unlock state, and then the vehicle can determine that the vehicle control command is an illegal command and execute the second preset operation.
Optionally, if the vehicle does not receive a new target instruction within a preset time period after the vehicle executes the operation corresponding to the vehicle control instruction, deleting the second verification information, the encrypted random number and the target algorithm identifier, so that timeliness of the key and the target encryption algorithm and safety of information in the vehicle control process can be ensured.
317. The vehicle updates the second state verification information according to the target instruction.
And when the vehicle receives the target instruction, the vehicle indicates that the vehicle has verified that the first state verification information is consistent with the second state verification information, and the vehicle can update the second state verification information. The updating of the second state verification information may be inverting a corresponding binary number in the second state verification information and updating the second timestamp.
For example, the current second state verification information is 0000000000, the bidirectional identity verification passes, and the vehicle control command corresponding to the target command is "door unlock", then the updated second state verification information is "1111000000 +the time of receiving the" door unlock "command.
By adopting the safety vehicle control method, in the process of controlling the vehicle by using the vehicle remote control key, the vehicle firstly verifies whether the current state of the vehicle remote control key is consistent with that of the vehicle remote control key, and after the fact that the current state is consistent with that of the vehicle remote control key is confirmed, the vehicle sends first verification information to the vehicle remote control key so that the vehicle remote control key can verify the identity of the vehicle and determine whether the vehicle is matched with the vehicle remote control key. And after the vehicle is determined to be matched with the vehicle remote control key, the vehicle remote control key sends second verification information to the vehicle so that the vehicle can verify the identity of the vehicle remote control key. When the two-way verification is passed, the vehicle remote control key and the vehicle negotiate a target encryption algorithm and a key together, and the key is a random number, so that the security of the key can be improved. And then, the vehicle remote control key encrypts a vehicle control instruction generated by the vehicle remote control key according to the key and the target encryption algorithm to obtain a target instruction, and sends the target instruction to the vehicle. The vehicle receives a target instruction sent by the vehicle remote control key, decrypts the target instruction according to the target encryption algorithm and the key after the common negotiation to obtain a vehicle control instruction, and executes operation corresponding to the vehicle control instruction. Compared with the prior art that the vehicle remote control key can only transmit the encrypted vehicle control instruction to the vehicle in one direction, and the encrypted vehicle control instruction is generated by encrypting the vehicle control instruction according to the transmission frequency of the radio signal and the specific address code, the vehicle remote control key has the advantages that after the vehicle is verified to be consistent with the current state of the vehicle remote control key, the safety of vehicle authentication is improved through bidirectional verification of the vehicle and the vehicle remote control key, and the difficulty of replay attack of the vehicle is increased. And after the bidirectional verification is passed, the vehicle control instruction is encrypted by utilizing the negotiated target encryption algorithm and the random number to obtain a target instruction, the target instruction is sent to the vehicle, the safety of the vehicle information is improved, and the first state verification information and the second state verification information are respectively updated so as to facilitate the next state verification.
The above description has been presented mainly in terms of apparatus for the solution provided by the embodiments of the present invention. It will be appreciated that the apparatus, in order to achieve the above-described functions, comprises hardware structures and/or software modules corresponding to the execution of the respective functions. Those of skill in the art will readily appreciate that the various illustrative algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
Fig. 4 shows a schematic diagram of one possible composition of the vehicle remote control key 400 related to the above embodiment, and as shown in fig. 4, the vehicle remote control key 400 may include: a transmitting unit 401, a receiving unit 402, and a processing unit 403.
Wherein, the sending unit 401 is configured to send first state verification information to the vehicle, where the first state verification information is used for verifying whether the vehicle is consistent with the current state of the vehicle remote control key. The receiving unit 402 is configured to receive first verification information sent by the vehicle, where the first verification information includes a first public key and first identity information, the first identity information is used to identify an identity of the vehicle, and the first verification information is sent when the vehicle determines, according to the first status verification information, that the first verification information is consistent with a current status of a remote control key of the vehicle. The sending unit 401 is further configured to send second verification information to the vehicle if it is determined that the vehicle matches the vehicle remote key according to the first identity information and the pre-stored identity information, where the second verification information includes a second public key and second identity information, and the second identity information is used to identify an identity of the vehicle remote key. The receiving unit 402 is further configured to receive a target algorithm identifier sent by the vehicle, where the target algorithm identifier is an identifier encrypted with a second public key, and is used to indicate a target encryption algorithm. The transmitting unit 401 is further configured to generate a random number, and transmit the random number encrypted with the first public key to the vehicle. The processing unit 403 is configured to encrypt the command for controlling the vehicle according to the random number and the target algorithm identifier, and generate a target command. The transmitting unit 401 is further configured to transmit a target instruction to the vehicle. The processing unit 403 is further configured to update the first state verification information according to the target instruction.
Optionally, the first state verification information includes a first timestamp, information of the first historical instructions, and information of the first historical identity. The first time stamp is the time of generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the information of the historical identity is matched.
Optionally, the processing unit 403 is specifically configured to:
if the vehicle control instruction is acquired in a preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate a target instruction.
Optionally, the processing unit 403 is further configured to delete the first verification information, the random number, and the target algorithm identifier if the vehicle control instruction is not acquired within a preset time period after the random number is generated, and execute a first preset operation. Wherein the first preset operation includes at least one of: and outputting first alarm information for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
Optionally, the processing unit 403 is further configured to, if it is determined that the vehicle does not match the vehicle remote key according to the first identity information and the pre-stored identity information, perform a second preset operation, where the second preset operation includes at least one of the following: and outputting second alarm information for prompting the user that the vehicle remote control key is not matched with the vehicle and interrupting the communication between the vehicle remote control key and the vehicle.
Optionally, the receiving unit 402 is specifically configured to:
and receiving the first verification information sent by the vehicle and receiving the target algorithm identification sent by the vehicle.
Optionally, the processing unit 403 is specifically configured to:
decrypting the target algorithm identifier by adopting a private key corresponding to the second public key to obtain a target encryption algorithm;
and encrypting the command for controlling the vehicle by using the random number as a secret key and adopting a target encryption algorithm to obtain a target command.
Of course, the vehicle key fob 400 provided by embodiments of the present invention includes, but is not limited to, the above modules.
Fig. 5 shows a schematic diagram of one possible composition of the vehicle 500 involved in the above embodiment, and as shown in fig. 5, the vehicle 500 may include: a receiving unit 501, a transmitting unit 502, a processing unit 503, and an executing unit 504.
The receiving unit 501 is configured to receive first status verification information sent by the vehicle remote control key, where the first status verification information is used for verifying whether the vehicle status is consistent with a current status of the vehicle remote control key. The sending unit 502 is configured to send, if the first status verification information is consistent with the pre-stored second status verification information, first verification information to the vehicle remote key, where the first verification information includes a first public key and first identity information, and the first identity information is used to identify an identity of the vehicle. The receiving unit 501 is configured to receive second verification information sent by the vehicle remote control key, where the second verification information includes a second public key and second identity information, where the second identity information is used to identify an identity of the vehicle remote control key, and the second verification information is sent when it is determined that the vehicle matches the vehicle remote control key. And the processing unit 503 is configured to encrypt the target encryption algorithm identifier by using the second public key if it is determined that the vehicle remote control key is matched with the vehicle according to the second identity information and the pre-stored identity information, so as to generate the target algorithm identifier. The sending unit 502 is further configured to send the target algorithm identifier to the vehicle remote key. The receiving unit 501 is further configured to receive an encrypted random number sent by the vehicle remote control key, where the encrypted random number is a random number encrypted by using the first public key. The processing unit 503 is further configured to decrypt the received target instruction according to the encrypted random number and the target encryption algorithm, to obtain the vehicle control instruction. And the execution unit 504 is used for executing the operation corresponding to the control command. The processing unit 503 is further configured to update the second state verification information according to the target instruction.
Optionally, the second state verification information includes a second timestamp, information of the second historical instructions, and information of the second historical identity. The second time stamp is the time of receiving the first historical command, the second historical command is a second historical vehicle control command, and the information of the second historical identity is used for verifying whether the information of the historical identity is matched.
Optionally, the processing unit 503 is specifically configured to:
and if the target instruction is received within a preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and a target encryption algorithm to obtain the vehicle control instruction.
Optionally, the processing unit 503 is specifically configured to:
decrypting the encrypted random number by adopting a private key corresponding to the first public key to obtain the random number;
and decrypting the target instruction by using the random number as a secret key and adopting a target encryption algorithm to obtain the vehicle control instruction.
Optionally, the processing unit 503 is further configured to delete the second authentication information and the encrypted random number and perform a third preset operation if the target instruction is not received within a preset time period after the encrypted random number is received. Wherein the third preset operation includes at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
Optionally, the processing unit 503 is further configured to, if it is determined that the vehicle remote key is not matched with the vehicle according to the second identity information and the pre-stored identity information, perform a fourth preset operation, where the fourth preset operation includes at least one of the following: and outputting fourth alarm information for prompting the user that the vehicle is not matched with the vehicle remote control key and interrupting the communication between the vehicle remote control key and the vehicle.
Optionally, the processing unit 503 is further configured to delete the second verification information and the encrypted random number if the new target instruction is not received within a preset time period after the operation corresponding to the command for controlling the vehicle is performed.
Of course, the vehicle 500 provided by the embodiment of the present invention includes, but is not limited to, the above-described modules.
Another embodiment of the present invention further provides a computer readable storage medium, where computer instructions are stored in the computer readable storage medium, and when the computer instructions run on the vehicle remote control key, the computer instructions cause the vehicle remote control key to execute each step executed by the vehicle remote control key in the method flow shown in the foregoing method embodiment. When the computer instructions are run on the vehicle, the vehicle is caused to perform the steps performed by the vehicle in the method flow shown in the method embodiment described above.
In another embodiment of the present invention, there is also provided a computer program product comprising instructions that, when executed on a vehicle key fob, cause the vehicle key fob to perform the steps of the method flow shown in the method embodiments described above. When instructed to run on the vehicle, causes the vehicle to perform the steps performed by the vehicle in the method flow shown in the method embodiment described above.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer-executable instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present invention are fully or partially produced. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, a website, computer, server, or data center via a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. Computer readable storage media can be any available media that can be accessed by a computer or data storage devices including one or more servers, data centers, etc. that can be integrated with the media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
The foregoing is merely illustrative of specific embodiments of the present invention, and the scope of the present invention is not limited thereto, but any changes or substitutions within the technical scope of the present invention should be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (17)

1. A method for safely controlling a vehicle, which is applied to a remote control key of the vehicle, and is characterized by comprising the following steps:
transmitting first state verification information to a vehicle, wherein the first state verification information is used for verifying whether the current states of the vehicle and the vehicle remote control key are consistent; the current state of the vehicle remote control key is a state corresponding to the current state verification information of the vehicle remote control key; the verification of whether the current states of the vehicle and the vehicle remote control key are consistent is specifically to verify whether first state verification information of the vehicle remote control key is consistent with second state verification information prestored in the vehicle; the second state verification information is the current state verification information of the vehicle;
receiving first verification information sent by the vehicle, wherein the first verification information comprises a first public key and first identity information, the first identity information is used for identifying the identity of the vehicle, and the first verification information is sent when the vehicle determines that the first verification information is consistent with the current state of the vehicle remote control key according to the first state verification information;
If the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, second verification information is sent to the vehicle, the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
receiving a target algorithm identifier sent by the vehicle, wherein the target algorithm identifier is an identifier encrypted by adopting the second public key and is used for indicating a target encryption algorithm;
generating a random number and sending the random number encrypted by the first public key to the vehicle;
encrypting the command for controlling the vehicle according to the random number and the target algorithm mark to generate a target command;
transmitting the target instruction to the vehicle;
and updating the first state verification information and the second state verification information according to the target instruction.
2. The method of claim 1, wherein the first status verification information includes a first timestamp, information of a first historical instruction, and information of a first historical identity;
the first timestamp is the time for generating the first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the information of the historical identity is matched.
3. The method for safely controlling vehicles according to claim 1 or 2, wherein encrypting the vehicle control instruction according to the random number and the target algorithm identifier to generate a target instruction comprises:
and if the vehicle control instruction is acquired in a preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identifier to generate the target instruction.
4. The safety control method according to claim 1 or 2, wherein the vehicle key fob includes a receiving unit;
the receiving the first verification information sent by the vehicle includes:
receiving, by the receiving unit, the first verification information transmitted by the vehicle;
the target algorithm for receiving the vehicle transmission comprises the following steps:
and receiving the target algorithm identification sent by the vehicle through the receiving unit.
5. The method for safely controlling vehicles according to claim 1 or 2, wherein encrypting the vehicle control instruction according to the random number and the target algorithm identifier to generate a target instruction comprises:
decrypting the target algorithm identifier by adopting a private key corresponding to the second public key to obtain the target encryption algorithm;
And encrypting the command for controlling the vehicle by using the random number as a secret key and adopting the target encryption algorithm to obtain the target command.
6. A safety control method for a vehicle, comprising:
receiving first state verification information sent by a vehicle remote control key, wherein the first state verification information is used for verifying whether the current states of the vehicle and the vehicle remote control key are consistent; the current state of the vehicle remote control key is a state corresponding to the current state verification information of the vehicle remote control key; the verification of whether the current states of the vehicle and the vehicle remote control key are consistent is specifically to verify whether first state verification information of the vehicle remote control key is consistent with second state verification information prestored in the vehicle; the second state verification information is the current state verification information of the vehicle;
if the first state verification information is consistent with the second state verification information, first verification information is sent to a vehicle remote control key, wherein the first verification information comprises a first public key and first identity information, and the first identity information is used for identifying the identity of the vehicle;
receiving second verification information sent by the vehicle remote control key, wherein the second verification information comprises a second public key and second identity information, the second identity information is used for identifying the identity of the vehicle remote control key, and the second verification information is sent under the condition that the vehicle is determined to be matched with the vehicle remote control key;
If the vehicle remote control key is determined to be matched with the vehicle according to the second identity information and the pre-stored identity information, encrypting the identification of the target encryption algorithm by adopting the second public key to generate a target algorithm identification;
transmitting the target algorithm identification to the vehicle remote control key;
receiving an encrypted random number sent by the vehicle remote control key, wherein the encrypted random number is the random number encrypted by the first public key;
decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
executing the operation corresponding to the vehicle control instruction;
and updating the second state verification information and the first state verification information according to the target instruction.
7. The method of claim 6, wherein the second status verification information includes a second timestamp, information of a second historical instruction, and information of a second historical identity;
the second time stamp is the time of receiving the first historical command, the second historical command is a second historical vehicle control command, and the information of the second historical identity is used for verifying whether the information of the historical identity is matched.
8. The method according to claim 6 or 7, wherein decrypting the received target command according to the encrypted random number and the target encryption algorithm to obtain the command comprises:
and if the target instruction is received within a preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction.
9. The method according to claim 6 or 7, wherein decrypting the received target command according to the encrypted random number and the target encryption algorithm to obtain the command comprises:
decrypting the encrypted random number by adopting a private key corresponding to the first public key to obtain a random number;
and decrypting the target instruction by using the random number as a secret key and adopting the target encryption algorithm to obtain the vehicle control instruction.
10. The safety control method according to claim 6 or 7, characterized in that the safety control method further comprises:
if the target instruction is not received within a preset time period after the encrypted random number is received, deleting the second verification information and the encrypted random number, and executing a third preset operation;
Wherein the third preset operation includes at least one of: and outputting third warning information for prompting a user that the communication between the vehicle and the vehicle remote control key is interrupted, wherein the third warning information is used for stopping the communication between the vehicle and the vehicle remote control key.
11. The safety control method according to claim 6 or 7, characterized in that the safety control method further comprises:
if the vehicle remote control key is determined to be not matched with the vehicle according to the second identity information and the pre-stored identity information, a fourth preset operation is executed, and the fourth preset operation comprises at least one of the following steps: and outputting fourth alarm information for prompting a user that the vehicle is not matched with the vehicle remote control key and interrupting communication between the vehicle remote control key and the vehicle.
12. The safety control method according to claim 6 or 7, characterized in that the safety control method further comprises:
and if a new target instruction is not received within a preset time period after the operation corresponding to the vehicle control instruction is executed, deleting the second verification information, the encrypted random number and the target algorithm identifier.
13. A vehicle key fob, comprising:
the vehicle remote control key comprises a transmitting unit, a remote control key and a remote control key, wherein the transmitting unit is used for transmitting first state verification information to a vehicle, and the first state verification information is used for verifying whether the current states of the vehicle and the remote control key are consistent; the current state of the vehicle remote control key is a state corresponding to the current state verification information of the vehicle remote control key; the verification of whether the current states of the vehicle and the vehicle remote control key are consistent is specifically to verify whether first state verification information of the vehicle remote control key is consistent with second state verification information prestored in the vehicle; the second state verification information is the current state verification information of the vehicle;
a receiving unit: the vehicle remote control key comprises a first key and first identity information, wherein the first key is used for identifying the identity of the vehicle, and the first identity information is transmitted when the vehicle determines that the first state verification information is consistent with the current state of the vehicle remote control key;
the transmitting unit: the vehicle remote control key is further used for sending second verification information to the vehicle if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, wherein the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
The receiving unit: the target algorithm identification is used for receiving a target algorithm identification sent by the vehicle, is encrypted by the second public key and is used for indicating a target encryption algorithm;
the transmitting unit: the method is also used for generating random numbers and sending the random numbers encrypted by the first public key to the vehicle;
and a processing unit: the method comprises the steps of encrypting a vehicle control instruction according to the random number and the target algorithm identifier to generate a target instruction;
the transmitting unit: and is also configured to send the target instruction to the vehicle;
the processing unit: and the first state verification information and the second state verification information are updated according to the target instruction.
14. A vehicle, characterized by comprising:
the receiving unit is used for receiving first state verification information sent by the vehicle remote control key, and the first state verification information is used for verifying whether the current states of the vehicle and the vehicle remote control key are consistent; the current state of the vehicle remote control key is a state corresponding to the current state verification information of the vehicle remote control key; the verification of whether the current states of the vehicle and the vehicle remote control key are consistent is specifically to verify whether first state verification information of the vehicle remote control key is consistent with second state verification information prestored in the vehicle; the second state verification information is the current state verification information of the vehicle;
The sending unit is used for sending first verification information to the vehicle remote control key if the first state verification information is consistent with the second state verification information, wherein the first verification information comprises a first public key and first identity information, and the first identity information is used for identifying the identity of the vehicle;
the receiving unit is further configured to receive second verification information sent by the vehicle remote control key, where the second verification information includes a second public key and second identity information, where the second identity information is used to identify an identity of the vehicle remote control key, and the second verification information is sent when it is determined that the vehicle is matched with the vehicle remote control key;
the processing unit is used for encrypting the identification of the target encryption algorithm by adopting the second public key if the vehicle remote control key is determined to be matched with the vehicle according to the second identity information and the pre-stored identity information, so as to generate the identification of the target algorithm;
the sending unit is further used for sending the target algorithm identification to the vehicle remote control key;
the receiving unit is further configured to receive an encrypted random number sent by the vehicle remote control key, where the encrypted random number is the random number encrypted by the first public key;
The processing unit is further used for decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
the execution unit is used for executing the operation corresponding to the vehicle control instruction;
the processing unit is further configured to update the second state verification information and the first state verification information according to the target instruction.
15. A vehicle system, the vehicle system comprising: the vehicle key fob of claim 13, and the vehicle of claim 14.
16. A safety control device, comprising: a processor and a memory; the memory is used for storing computer program codes, and the computer program codes comprise computer instructions; when the processor executes the computer instructions, the safety control device performs the safety control method according to any one of claims 1 to 5 or performs the safety control method according to any one of claims 6 to 12.
17. A computer readable storage medium comprising computer instructions that, when run on a vehicle key fob, cause the vehicle key fob to perform the method of controlling a safety vehicle of any of claims 1-5; alternatively, the computer instructions, when run on a vehicle, cause the vehicle to perform the safety control method of any one of claims 6-12.
CN202210293493.7A 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium Active CN114684070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210293493.7A CN114684070B (en) 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210293493.7A CN114684070B (en) 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium

Publications (2)

Publication Number Publication Date
CN114684070A CN114684070A (en) 2022-07-01
CN114684070B true CN114684070B (en) 2023-07-25

Family

ID=82138645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210293493.7A Active CN114684070B (en) 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium

Country Status (1)

Country Link
CN (1) CN114684070B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115285064B (en) * 2022-08-05 2023-11-21 重庆金康赛力斯新能源汽车设计院有限公司 Vehicle control method, system and computer equipment
CN115909550A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 NFC key verification method, device and system and computer readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015059397A (en) * 2013-09-20 2015-03-30 株式会社デンソー Electronic key system, control device, and electronic key

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231041B2 (en) * 2003-08-19 2007-06-12 General Motors Corporation Method, device, and system for secure motor vehicle remote keyless entry
CN108202695B (en) * 2016-12-16 2020-02-07 比亚迪股份有限公司 Vehicle anti-theft method and device and vehicle
CN110111472B (en) * 2019-05-16 2022-05-13 广州小鹏汽车科技有限公司 Vehicle key control method and device
CN110103883B (en) * 2019-05-16 2020-12-15 广州小鹏汽车科技有限公司 Vehicle key control method and device
CN111703396B (en) * 2020-06-22 2022-04-05 中国第一汽车股份有限公司 Automobile two-way starting system and method and automobile
CN111976650A (en) * 2020-07-29 2020-11-24 上海果通通信科技股份有限公司 Non-contact automobile key implementation method and device
CN111923863B (en) * 2020-08-25 2021-09-17 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN113613197B (en) * 2021-07-08 2023-09-15 中汽创智科技有限公司 Pairing method and device for vehicle and digital key

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015059397A (en) * 2013-09-20 2015-03-30 株式会社デンソー Electronic key system, control device, and electronic key

Also Published As

Publication number Publication date
CN114684070A (en) 2022-07-01

Similar Documents

Publication Publication Date Title
JP6549664B2 (en) ID-based control unit key fob pairing
CN106453269B (en) Internet of vehicles safety communication method, vehicle-mounted terminal, server and system
CN114684070B (en) Safety vehicle control method and device, vehicle system and storage medium
CN107683583B (en) Vehicle-mounted information communication system and authentication method
CN111447601B (en) Implementation method and device of automobile Bluetooth key
CN102546155B (en) On-demand safe key generates method and system
US20210070252A1 (en) Method and device for authenticating a user to a transportation vehicle
WO2018040643A1 (en) Mobile terminal, server, vehicle and control system thereof
US10477402B2 (en) One-way key fob and vehicle pairing
JP5333785B2 (en) KEY DEVICE, LOCK CONTROL DEVICE, CONTROL PROGRAM, AND CONTROL METHOD
US20220368542A1 (en) Key fob authentication, retention, and revocation
US10931458B2 (en) Authentication system
CN112396735B (en) Internet automobile digital key safety authentication method and device
CN111083696B (en) Communication verification method and system, mobile terminal and vehicle machine side
CN111935672A (en) Information reading method, device, system and storage medium
US10805276B2 (en) Device and methods for safe control of vehicle equipment secured by encrypted channel
JP2021145205A (en) Authentication system
WO2017126471A1 (en) Authentication system, authentication requesting device, on-board electronic device, computer program and authentication processing method
US20170295488A1 (en) Method for generating a key and method for secure communication between a household appliance and an appliance
JP2009284086A (en) Encryption key update system and encryption key update method
CN113839782B (en) Light-weight safe communication method for CAN (controller area network) bus in vehicle based on PUF (physical unclonable function)
CN110061894B (en) Household control method and system and household master control device
US11974123B2 (en) Encrypted communication between an appliance and a device on a motor vehicle
KR20230068803A (en) Vehicle authentication system
CN115811721A (en) Bluetooth communication method, device, equipment and storage medium based on identity authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant