CN105681331A - Method for verifying matching of automobile electronic control parts - Google Patents

Method for verifying matching of automobile electronic control parts Download PDF

Info

Publication number
CN105681331A
CN105681331A CN201610114422.0A CN201610114422A CN105681331A CN 105681331 A CN105681331 A CN 105681331A CN 201610114422 A CN201610114422 A CN 201610114422A CN 105681331 A CN105681331 A CN 105681331A
Authority
CN
China
Prior art keywords
module
message
modules
timer
mid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610114422.0A
Other languages
Chinese (zh)
Other versions
CN105681331B (en
Inventor
姜代平
严彬
李学明
杨文博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North Of Changjiang River Ningbo City Nine Sides And Flourish Electric Applicance Co Ltd
Original Assignee
North Of Changjiang River Ningbo City Nine Sides And Flourish Electric Applicance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North Of Changjiang River Ningbo City Nine Sides And Flourish Electric Applicance Co Ltd filed Critical North Of Changjiang River Ningbo City Nine Sides And Flourish Electric Applicance Co Ltd
Priority to CN201610114422.0A priority Critical patent/CN105681331B/en
Publication of CN105681331A publication Critical patent/CN105681331A/en
Application granted granted Critical
Publication of CN105681331B publication Critical patent/CN105681331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R16/00Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
    • B60R16/02Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses a method for verifying the matching of automobile electronic control parts, for achieving encryption and verification replacement on the electronic control part; if the electronic control part influencing the safety of automobile driver and passengers is replaced by the non-original electronic control part, the automobile cannot start, and emits alarm sound and lights up a trouble light; if the important electronic control part not influencing the safety of automobile driver and passengers is replaced by the non-original electronic control part, the automobile can start and drive normally, and emits the alarm sound and lights up the trouble light; and if the other unimportant electronic control part is replaced by the non-original electronic control part, the automobile can start and drive normally, and intermittently emits the alarm sound.

Description

A kind of Vehicle Electronic Control parts checking matching process
Technical field
The present invention relates to verify matching process field, be specifically related to a kind of Vehicle Electronic Control parts checking matching process.
Background technology
Automotive engineering, Building technology and environmental protection are to weigh three of a national industrialized level height to indicate greatly; Since the eighties, improve automotive performance, save the energy and protection of the environment, depend primarily on electron controls technology; On automobile, electron controls technology is mainly used in vehicle dynamic quality, security, comfortableness and the control of amusement communication information.
The electronic control part of many vehicles of now all has certain general character, vehicle is in the time of repair or upgrade, maintenance person is sometimes for number one, select to change non-original-pack electronic control part, these non-original-pack electronic control parts do not carry out strict coupling customization and test for vehicle, just realize basic function according to general character simply, and quality is uneven, particularly be related to electronic control part (for example air bag and the controller SRS thereof of vehicle and personal security, engine management system ECM, motion control unit TCU, anti-lock braking system ABS, Senior Officer's accessory system ADAS, tire pressure monitoring system TPMS etc.), will there is serious potential safety hazard, easily produce serious accident, and prevent from changing non-former electronic parts by the mode of legal restraint, maintenance channel management and reinforcement publicity, can not stop this phenomenon and occur.
Summary of the invention
The object of this invention is to provide a kind of for prevent from privately changing the Vehicle Electronic Control parts checking matching process of Car Electronic Control parts in unauthorized situation.
The present invention is achieved through the following technical solutions: a kind of Vehicle Electronic Control parts checking matching process, but the MID of module, verification algorithm, matching algorithm and your the encrypting and decrypting algorithm to password MK are burnt in module, and the VIN of the table of comparisons of the MID of module and MK and vehicle is burnt in the erasable nonvolatile storage of module, and the MSF of module is masked as to authentication state;
1) module normally powers on, startup backstage receiving function, and the data message that storage receives is also preserved, and starts the timer of 100 milliseconds, the completely rear random random number x for verification algorithm that produces of this timer;
2) taking the random number x that produces as numerical value, unit is millisecond, starts the timer of an x millisecond, and this timer is random after completely produces a random code RID;
3) the MSF state of detection module itself, if original state enters step 4; If authentication state enters step 12;
4) module is original state, produce one with the random number of the same length of modules password, and this number is stored in nonvolatile storage as the password MR of oneself;
5) by the MID of module self, random number R ID, self password MK together, by the specific algorithm being solidificated in module, production ciphertext MCG;
6) the synthetic checking of the ciphertext MCG of the MID of module self, random number R ID, oneself state mark MSF and generation message is sent in bus;
7) restart the timer of 100 milliseconds, after this timer is full, restarts 100 milliseconds of timers and empty message reception memorizer;
8) module sends request matching message on bus, and start the timer of 200 milliseconds, the data of other modules that after this timer is full, backstage received are taken out, and extract respectively the MID of other modules, the ciphertext MSK of module password MK, and vehicle identification code VIN;
9) utilize decipherment algorithm decrypting ciphertext MSK to obtain the password MK of other modules, the MID of other modules and this module password MK is corresponding and store in nonvolatile storage together with vehicle identification code VIN one by one;
10) the password MK of module itself is encrypted and is obtained ciphertext MSK by irreversible cryptographic algorithm, and mate response message with the MID composition of module itself and send in bus, inform the password of other module these modules self and finish and mate;
11) after having mated, the power-off of all module waiting systems, flow process finishes;
12) module is authentication state, by the MID of module self, random number R ID, self password MK and vehicle identification code VIN together, by the specific verification algorithm being solidificated in module, generating ciphertext MCG;
13) MID of the ciphertext MCG obtaining, random number R ID, oneself state mark MSF and module self is together formed to checking message and send in bus, and open the timer of 100 milliseconds, wait for that this timer is full;
14) after 100 milliseconds of timers in step 13 are expired, the message of other modules that module just receives backstage takes out, extract respectively MID and the random number R ID of each module, and the vehicle identification code VIN of module self internal record and the encrypted message MK of corresponding module, by the specific verification algorithm being solidificated in module, generate the ciphertext MCG of modules, and with bus on the MCG of the respective modules that receives contrast, if unanimously think, this module is authorization module, detect whether there is module in original state if inconsistent, if initial module enters cross-matched flow process, if not enter step 15,
15) whether correctly completely detect ciphertext, if correct complete and all modules that need checking be all authorization module vehicle enter normal mode of operation, flow process finishes, if the incorrect complete step 17 that enters;
16) ciphertext MCG mistake or the MID that do not verify the module of message are filled in warning message and are periodically sent in bus;
17) detect that the checking of key modules is whether wrong or no checking message, if key modules authentication error or without checking message enters shutdown mode, can not do any operation, waiting system power-off, flow process finishes; If the authentication error of non-key module or without checking message, vehicle progress limping pattern, can carry out limited vehicle control function, flow process finishes.
Preferably, the cross-matched flow process in described step 14 is:
A) module starts unlatching backstage receiving function, receive the information from request matching module, and start the timer of 100 milliseconds, the data of other all modules that after this timer is full, backstage received are taken out, extract request matching message, determine the module MID newly adding;
B) module produces the random number y between 0 to 100, and taking the random number y that produces as numerical value, unit be millisecond, starts the timer of a y millisecond, and timer obtains ciphertext MSK by the password MK of self by irreversible cryptographic algorithm after completely;
C), by the MID of module self, the matching message of ciphertext MSK and vehicle identification code VIN composition sends and empties reception memorizer;
D) start 200 milliseconds of timers, wait for that request matching module sends coupling response message; Whether the completely rear detection of timer receives the coupling response message that request matching module sends, if waiting system power-off do not detected, flow process finishes; If detect, the coupling response message that request matching module sends enters step e;
E) just extract the MID of this request matching module and the ciphertext MSK of password MK thereof after receiving the coupling response message that sends of request matching module, obtain the password MK of this module by decipherment algorithm decrypting ciphertext MSK;
F) the password MK of this request matching module is upgraded and stored in nonvolatile storage, waiting system power-off.
Preferably, while synthetic the ciphertext MCG of the MID of module self, random number R ID, oneself state mark MSF and generation checking message being sent in bus in described step 6, other modules can received the original state that is checked through this module after this message, and other modules all can enter into cross-matched flow process and assist this module to mate.
Preferably, described request matching module and other participate in coupling and enter between other cross-matched modules of cross-matched flow process and also can coordinate;
A) request matching module sends request matching message, and open the timer of 100 milliseconds, other cross-matched modules accept request matching module send request matching message, and request matching module wait for 100 milliseconds in complete request matching message reception;
B) any one section period of other cross-matched modules between 0 to 100 millisecond of random wait sends matching message to request matching module, and the matching message that request matching module need to complete all modules in 100 milliseconds receives;
C) other cross-matched modules are opened the timer of 200 milliseconds, and request matching module completes the matching message decryption work of every other module and stores corresponding information in 200 milliseconds of other modules waits, and sends coupling response message; Other cross-matched modules receive at the timer of 200 milliseconds the coupling response message that request matching module sends completely afterwards, and complete the deciphering of coupling response message, information extraction and storage.
The present invention realizes and encrypts and change checking on electronic control part; Be replaced by non-original-pack electronic control part if affect the electronic control part of automobile personal security, vehicle cannot start, and send chimes of doom and light trouble light; Be replaced by as non-original-pack electronic control part if do not affect safe important electronic control part, vehicle can start and normally travel, but can send chimes of doom and light trouble light; If other unessential electronic control parts are replaced by as non-original-pack electronic control part, vehicle can start and normally travel, but can intermittence send chimes of doom.
Usefulness of the present invention is: 1) adopt multilevel security grade, prevent that vehicle is replaced non-original-pack electronic control part in uncommitted situation, causes the security risk of vehicle; 2) module self-encryption, and can with other module cross validations, ensure encrypt validity and reliability; 3) the new module of changing can be mated with other modules automatically, does not need human intervention, convenient and swift; 4) between modules, carry out in real time multimode cross validation, ensure the correctness of checking.
Brief description of the drawings
The frame diagram of Fig. 1 module authentication flow process of the present invention and request coupling flow process.
Fig. 2 is the frame diagram of cross-matched flow process of the present invention.
Fig. 3 is the frame diagram of request matching module of the present invention and other participation cross-matched module cooperating flow processs.
Detailed description of the invention
Below in conjunction with accompanying drawing and detailed description of the invention, the invention will be further described.
See Fig. 1 to Fig. 3, a kind of Vehicle Electronic Control parts checking matching process, but the MID of module, verification algorithm, matching algorithm and your the encrypting and decrypting algorithm to password MK are burnt in module, and the VIN of the table of comparisons of the MID of module and MK and vehicle is burnt in the erasable nonvolatile storage of module, and the MSF of module is masked as to authentication state;
1) module normally powers on, startup backstage receiving function, and the data message that storage receives is also preserved, and starts the timer of 100 milliseconds, the completely rear random random number x for verification algorithm that produces of this timer;
2) taking the random number x that produces as numerical value, unit is millisecond, starts the timer of an x millisecond, and this timer is random after completely produces a random code RID;
3) the MSF state of detection module itself, if original state enters step 4; If authentication state enters step 12;
4) module is original state, produce one with the random number of the same length of modules password, and this number is stored in nonvolatile storage as the password MR of oneself;
5) by the MID of module self, random number R ID, self password MK together, by the specific algorithm being solidificated in module, production ciphertext MCG;
6) the synthetic checking of the ciphertext MCG of the MID of module self, random number R ID, oneself state mark MSF and generation message is sent in bus;
7) restart the timer of 100 milliseconds, after this timer is full, restarts 100 milliseconds of timers and empty message reception memorizer;
8) module sends request matching message on bus, and start the timer of 200 milliseconds, the data of other modules that after this timer is full, backstage received are taken out, and extract respectively the MID of other modules, the ciphertext MSK of module password MK, and vehicle identification code VIN;
9) utilize decipherment algorithm decrypting ciphertext MSK to obtain the password MK of other modules, the MID of other modules and this module password MK is corresponding and store in nonvolatile storage together with vehicle identification code VIN one by one;
10) the password MK of module itself is encrypted and is obtained ciphertext MSK by irreversible cryptographic algorithm, and mate response message with the MID composition of module itself and send in bus, inform the password of other module these modules self and finish and mate;
11) after having mated, the power-off of all module waiting systems, flow process finishes;
12) module is authentication state, by the MID of module self, random number R ID, self password MK and vehicle identification code VIN together, by the specific verification algorithm being solidificated in module, generating ciphertext MCG;
13) MID of the ciphertext MCG obtaining, random number R ID, oneself state mark MSF and module self is together formed to checking message and send in bus, and open the timer of 100 milliseconds, wait for that this timer is full;
14) after 100 milliseconds of timers in step 13 are expired, the message of other modules that module just receives backstage takes out, extract respectively MID and the random number R ID of each module, and the vehicle identification code VIN of module self internal record and the encrypted message MK of corresponding module, by the specific verification algorithm being solidificated in module, generate the ciphertext MCG of modules, and with bus on the MCG of the respective modules that receives contrast, if unanimously think, this module is authorization module, detect whether there is module in original state if inconsistent, if initial module enters cross-matched flow process, if not enter step 15,
15) whether correctly completely detect ciphertext, if correct complete and all modules that need checking be all authorization module vehicle enter normal mode of operation, flow process finishes, if the incorrect complete step 17 that enters;
16) ciphertext MCG mistake or the MID that do not verify the module of message are filled in warning message and are periodically sent in bus;
17) detect that the checking of key modules is whether wrong or no checking message, if key modules authentication error or without checking message enters shutdown mode, can not do any operation, waiting system power-off, flow process finishes; If the authentication error of non-key module or without checking message, vehicle progress limping pattern, can carry out limited vehicle control function, flow process finishes.
In present embodiment, the cross-matched flow process in described step 14 is:
A) module starts unlatching backstage receiving function, receive the information from request matching module, and start the timer of 100 milliseconds, the data of other all modules that after this timer is full, backstage received are taken out, extract request matching message, determine the module MID newly adding;
B) module produces the random number y between 0 to 100, and taking the random number y that produces as numerical value, unit be millisecond, starts the timer of a y millisecond, and timer obtains ciphertext MSK by the password MK of self by irreversible cryptographic algorithm after completely;
C), by the MID of module self, the matching message of ciphertext MSK and vehicle identification code VIN composition sends and empties reception memorizer;
D) start 200 milliseconds of timers, wait for that request matching module sends coupling response message; Whether the completely rear detection of timer receives the coupling response message that request matching module sends, if waiting system power-off do not detected, flow process finishes; If detect, the coupling response message that request matching module sends enters step e;
E) just extract the MID of this request matching module and the ciphertext MSK of password MK thereof after receiving the coupling response message that sends of request matching module, obtain the password MK of this module by decipherment algorithm decrypting ciphertext MSK;
F) the password MK of this request matching module is upgraded and stored in nonvolatile storage, waiting system power-off.
In present embodiment, while synthetic the ciphertext MCG of the MID of module self, random number R ID, oneself state mark MSF and generation checking message being sent in bus in described step 6, other modules can received the original state that is checked through this module after this message, and other modules all can enter into cross-matched flow process and assist this module to mate.
In present embodiment, described request matching module and other participate in coupling and enter between other cross-matched modules of cross-matched flow process and also can coordinate;
A) request matching module sends request matching message, and open the timer of 100 milliseconds, other cross-matched modules accept request matching module send request matching message, and request matching module wait for 100 milliseconds in complete request matching message reception;
B) any one section period of other cross-matched modules between 0 to 100 millisecond of random wait sends matching message to request matching module, and the matching message that request matching module need to complete all modules in 100 milliseconds receives;
C) other cross-matched modules are opened the timer of 200 milliseconds, and request matching module completes the matching message decryption work of every other module and stores corresponding information in 200 milliseconds of other modules waits, and sends coupling response message; Other cross-matched modules receive at the timer of 200 milliseconds the coupling response message that request matching module sends completely afterwards, and complete the deciphering of coupling response message, information extraction and storage.
In present embodiment, electronic control part is exactly module, and the information in module has: MID is unique coding ID of module self; RID is module random random number producing in the time carrying out algorithm certification; MSF is module current state, always total two states, and one is original state, another kind is authentication state; MK is module password, the corresponding unique MK of each MID; VIN is vehicle identification code.
In present embodiment, when all modules roll off the production line in car load entrucking, can the MID of each module, verification algorithm, matching algorithm and the reversible encryption decipherment algorithm burning to password MK be cured in modules by specific purpose tool, again the VIN of the table of comparisons of the MID of all modules and MK and vehicle is burnt in the erasable nonvolatile storage of each module, finally changes the MSF mark of all modules into authentication state. Like this vehicle after rolling off the production line all modules be all authorization identifying state, vehicle can normally be worked.
In present embodiment, in the time changing a certain electronic control part, the specific purpose tool that need to use auto vendor to authorize is cured to the MID of module, verification algorithm, matching algorithm and the reversible encryption decipherment algorithm burning to password MK in new module, then change parts, after replacing completes, automobile is powered on, allow the module and other module Auto-matchings that are replaced, can powered-down after waiting for several seconds, new module can have been mated by automatic Verification.
In present embodiment, verification algorithm, matching algorithm and to the reversible encryption decipherment algorithm of password MK by producer's self-defining, can complexity can be simple, the length Ye Shi producer of random code RID and module password MK defines as required, changeable, various algorithms and data need only all modules and are consistent.
In present embodiment, after module normally powers on, first can start the bus data transmission-receiving function on backstage, the data message receiving is all preserved, then the timer of one 0-100 milliseconds of random starts, produces a random number of using for verification algorithm after timer is full more at random, state or the new original state of changing having authenticated from rear judgement self module, if authentication state, the cross validation flow process of left-hand branch as shown in Figure 1, the random number R ID generating using the MID of oneself, above, the password MK of self and the identifier VIN of vehicle verify calculating as the input parameter of verification algorithm together, draw the ciphertext MCG that cross validation needs, then the ciphertext MCG obtaining together being formed to checking message together with oneself MID, random number R ID, oneself state mark MSF sends in bus, after waiting for that 100 milliseconds of timers opening then above, the message of other all modules that module need to receive backstage takes out, and by searching the vehicle identification code VIN of own internal record and the encrypted message MK of modules, the MID that disparate modules is sent, random number R ID and the each module encrypted message MK finding out, identification of the vehicle VIN verifies calculating by verification algorithm together, the ciphertext that oneself is calculated contrasts with the ciphertext of the respective modules of receiving, if unanimously, think that this module is authorization module, otherwise need to check whether this module is the new initial module of changing, if initial module, cross-matched flow process as shown in Figure 2, if this module both neither initial module by cross validation, this module is unauthorized module, need in bus, send warning message, reports that this module is for sending out an authorization module, judge again whether this module is key modules, if key modules self module enter shutdown mode, if the unauthorized module detecting is non-critical component, self enters limping pattern, and can carry out limited vehicle control function and realize, while only having module that all needs are verified to be all authorization module, self just can enter into normal mode, realizes all vehicle control functions that self module should possess.
In present embodiment, if self module detect from as the new original state of changing powering on, the request of right-hand branch coupling flow process as shown in Figure 1, the random number R ID that equally first module will generate by the MID of oneself, above, password MK (the interim random number generating of module self of self, now do not obtain the accreditation of other modules) verify calculating as the input parameter of verification algorithm together, draw the ciphertext MCG that cross validation needs, then the ciphertext MCG obtaining is together formed to checking message together with oneself MID, random number R ID, oneself state mark MSF (now this state is original state) and send in bus that (other modules are receiving that after this message, can be checked through the state that changes module is original state, other modules can all enter into the cross-matched flow process shown in Fig. 2, assist this self module to mate), then request matching message is sent in bus, wait for again 100 milliseconds of times and (wait for that other modules send matching message, receive request matching message as other modules of Fig. 2 and can send the matching message of encryption), then take out the matching message that other modules that backstage receives are sent, extract vehicle identification code VIN in matching message and the MID of each module, the ciphertext MSK of module password MK, obtain the password MK of module by coupling decrypt operation deciphering MSK, the MID of each module and its password MK is corresponding and store in nonvolatile storage together with identification of the vehicle VIN one by one, then the MK of oneself is encrypted and obtains ciphertext MSK, send in bus with the MID composition " mating response message " of oneself, tell the password of other modules oneself and finish coupling, after having mated, all modules need power-off to re-power again could normal work.
In present embodiment, see Fig. 2, entering after cross-matched flow process, need to open backstage receiving function as the module of cross-matched, receive the information from request matching module, then wait for 100 milliseconds, guarantee to receive the information of request matching module; Then extract the MID of the module of request coupling according to the request matching message of receiving, and start the timer of 0-100 milliseconds, after timer is full, the password MK of oneself is obtained to ciphertext MSK by AES, then MID, MSK, VIN composition matching message are sent to request matching module; Then start 200 milliseconds of timers, wait for that request matching module sends " coupling response message "; After receiving coupling response message, extract the MID of this request matching module and the ciphertext MSK of password MK thereof, by decipherment algorithm, MSK reduction is obtained to MK, finally the password MK of this request matching module is upgraded and stored in nonvolatile storage.
In present embodiment, see Fig. 3, request matching module participates in mating with other and enters coordinating between the module of cross-matched flow process, request matching module sends request matching message, and open the timer of 100 milliseconds, other cross-matched modules accept request matching module send request matching message, and request matching module wait for 100 milliseconds in complete request matching message reception; Any one section period of other cross-matched modules between 0 to 100 millisecond of random wait sends matching message to request matching module, and the matching message that request matching module need to complete all modules in 100 milliseconds receives; Other cross-matched modules are opened the timer of 200 milliseconds, and request matching module completes the matching message decryption work of every other module and stores corresponding information in 200 milliseconds of other modules waits, and sends coupling response message; Other cross-matched modules receive at the timer of 200 milliseconds the coupling response message that request matching module sends completely afterwards, and complete the deciphering of coupling response message, information extraction and storage.
Protection scope of the present invention includes but not limited to above embodiment, and protection scope of the present invention is as the criterion with claims, and any replacement those skilled in the art will find apparent that this technology is made, distortion, improvement all fall into protection scope of the present invention.

Claims (4)

1. a Vehicle Electronic Control parts checking matching process, it is characterized in that: but the MID of module, verification algorithm, matching algorithm and your the encrypting and decrypting algorithm to password MK are burnt in module, and the VIN of the table of comparisons of the MID of module and MK and vehicle is burnt in the erasable nonvolatile storage of module, and the MSF of module is masked as to authentication state;
1) module normally powers on, startup backstage receiving function, and the data message that storage receives is also preserved, and starts the timer of 100 milliseconds, the completely rear random random number x for verification algorithm that produces of this timer;
2) taking the random number x that produces as numerical value, unit is millisecond, starts the timer of an x millisecond, and this timer is random after completely produces a random code RID;
3) the MSF state of detection module itself, if original state enters step 4; If authentication state enters step 12;
4) module is original state, produce one with the random number of the same length of modules password, and this number is stored in nonvolatile storage as the password MR of oneself;
5) by the MID of module self, random number R ID, self password MK together, by the specific algorithm being solidificated in module, production ciphertext MCG;
6) the synthetic checking of the ciphertext MCG of the MID of module self, random number R ID, oneself state mark MSF and generation message is sent in bus;
7) restart the timer of 100 milliseconds, after this timer is full, restarts 100 milliseconds of timers and empty message reception memorizer;
8) module sends request matching message on bus, and start the timer of 200 milliseconds, the data of other modules that after this timer is full, backstage received are taken out, and extract respectively the MID of other modules, the ciphertext MSK of module password MK, and vehicle identification code VIN;
9) utilize decipherment algorithm decrypting ciphertext MSK to obtain the password MK of other modules, the MID of other modules and this module password MK is corresponding and store in nonvolatile storage together with vehicle identification code VIN one by one;
10) the password MK of module itself is encrypted and is obtained ciphertext MSK by irreversible cryptographic algorithm, and mate response message with the MID composition of module itself and send in bus, inform the password of other module these modules self and finish and mate;
11) after having mated, the power-off of all module waiting systems, flow process finishes;
12) module is authentication state, by the MID of module self, random number R ID, self password MK and vehicle identification code VIN together, by the specific verification algorithm being solidificated in module, generating ciphertext MCG;
13) MID of the ciphertext MCG obtaining, random number R ID, oneself state mark MSF and module self is together formed to checking message and send in bus, and open the timer of 100 milliseconds, wait for that this timer is full;
14) after 100 milliseconds of timers in step 13 are expired, the message of other modules that module just receives backstage takes out, extract respectively MID and the random number R ID of each module, and the vehicle identification code VIN of module self internal record and the encrypted message MK of corresponding module, by the specific verification algorithm being solidificated in module, generate the ciphertext MCG of modules, and with bus on the MCG of the respective modules that receives contrast, if unanimously think, this module is authorization module, detect whether there is module in original state if inconsistent, if initial module enters cross-matched flow process, if not enter step 15,
15) whether correctly completely detect ciphertext, if correct complete and all modules that need checking be all authorization module vehicle enter normal mode of operation, flow process finishes, if the incorrect complete step 17 that enters;
16) ciphertext MCG mistake or the MID that do not verify the module of message are filled in warning message and are periodically sent in bus;
17) detect that the checking of key modules is whether wrong or no checking message, if key modules authentication error or without checking message enters shutdown mode, can not do any operation, waiting system power-off, flow process finishes; If the authentication error of non-key module or without checking message, vehicle progress limping pattern, can carry out limited vehicle control function, flow process finishes.
2. a kind of Vehicle Electronic Control parts checking matching process according to claim 1, is characterized in that: the cross-matched flow process in described step 14 is:
A) module starts unlatching backstage receiving function, receive the information from request matching module, and start the timer of 100 milliseconds, the data of other all modules that after this timer is full, backstage received are taken out, extract request matching message, determine the module MID newly adding;
B) module produces the random number y between 0 to 100, and taking the random number y that produces as numerical value, unit be millisecond, starts the timer of a y millisecond, and timer obtains ciphertext MSK by the password MK of self by irreversible cryptographic algorithm after completely;
C), by the MID of module self, the matching message of ciphertext MSK and vehicle identification code VIN composition sends and empties reception memorizer;
D) start 200 milliseconds of timers, wait for that request matching module sends coupling response message; Whether the completely rear detection of timer receives the coupling response message that request matching module sends, if waiting system power-off do not detected, flow process finishes; If detect, the coupling response message that request matching module sends enters step e;
E) just extract the MID of this request matching module and the ciphertext MSK of password MK thereof after receiving the coupling response message that sends of request matching module, obtain the password MK of this module by decipherment algorithm decrypting ciphertext MSK;
F) the password MK of this request matching module is upgraded and stored in nonvolatile storage, waiting system power-off.
3. a kind of Vehicle Electronic Control parts checking matching process according to claim 1, it is characterized in that: while synthetic the ciphertext MCG of the MID of module self, random number R ID, oneself state mark MSF and generation checking message being sent in bus in described step 6, other modules can received the original state that is checked through this module after this message, other modules all can enter into cross-matched flow process and assist this module to mate.
4. a kind of Vehicle Electronic Control parts checking matching process according to claim 2, is characterized in that: described request matching module participates in mating with other and enters between other cross-matched modules of cross-matched flow process and also can coordinate;
A) request matching module sends request matching message, and open the timer of 100 milliseconds, other cross-matched modules accept request matching module send request matching message, and request matching module wait for 100 milliseconds in complete request matching message reception;
B) any one section period of other cross-matched modules between 0 to 100 millisecond of random wait sends matching message to request matching module, and the matching message that request matching module need to complete all modules in 100 milliseconds receives;
C) other cross-matched modules are opened the timer of 200 milliseconds, and request matching module completes the matching message decryption work of every other module and stores corresponding information in 200 milliseconds of other modules waits, and sends coupling response message; Other cross-matched modules receive at the timer of 200 milliseconds the coupling response message that request matching module sends completely afterwards, and complete the deciphering of coupling response message, information extraction and storage.
CN201610114422.0A 2016-03-01 2016-03-01 A kind of Vehicle Electronic Control component verifying matching process Active CN105681331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610114422.0A CN105681331B (en) 2016-03-01 2016-03-01 A kind of Vehicle Electronic Control component verifying matching process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610114422.0A CN105681331B (en) 2016-03-01 2016-03-01 A kind of Vehicle Electronic Control component verifying matching process

Publications (2)

Publication Number Publication Date
CN105681331A true CN105681331A (en) 2016-06-15
CN105681331B CN105681331B (en) 2019-06-11

Family

ID=56305571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610114422.0A Active CN105681331B (en) 2016-03-01 2016-03-01 A kind of Vehicle Electronic Control component verifying matching process

Country Status (1)

Country Link
CN (1) CN105681331B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766458A (en) * 2021-09-29 2021-12-07 重庆长安汽车股份有限公司 IOT-based method for realizing internet connection of vehicle-end afterloading equipment and method and system for interacting with vehicle remote control terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090133121A1 (en) * 2007-11-08 2009-05-21 Continental Automotive Gmbh Method for processing messages and message processing device
CN101559745A (en) * 2009-05-15 2009-10-21 华南理工大学 Vehicle control system for preventing stealing and robbery and implementation method thereof
CN201559614U (en) * 2009-05-15 2010-08-25 华南理工大学 Control system for preventing vehicle from theft
CN104118392A (en) * 2013-04-28 2014-10-29 广州汽车集团股份有限公司 Engine anti-theft authentication method and device of engine anti-theft system
CN204641672U (en) * 2015-02-13 2015-09-16 中国第一汽车股份有限公司 A kind of hybrid vehicle electronic locking anti-theft system of high security

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090133121A1 (en) * 2007-11-08 2009-05-21 Continental Automotive Gmbh Method for processing messages and message processing device
CN101559745A (en) * 2009-05-15 2009-10-21 华南理工大学 Vehicle control system for preventing stealing and robbery and implementation method thereof
CN201559614U (en) * 2009-05-15 2010-08-25 华南理工大学 Control system for preventing vehicle from theft
CN104118392A (en) * 2013-04-28 2014-10-29 广州汽车集团股份有限公司 Engine anti-theft authentication method and device of engine anti-theft system
CN204641672U (en) * 2015-02-13 2015-09-16 中国第一汽车股份有限公司 A kind of hybrid vehicle electronic locking anti-theft system of high security

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766458A (en) * 2021-09-29 2021-12-07 重庆长安汽车股份有限公司 IOT-based method for realizing internet connection of vehicle-end afterloading equipment and method and system for interacting with vehicle remote control terminal
CN113766458B (en) * 2021-09-29 2023-06-02 重庆长安汽车股份有限公司 Method for realizing internet connection by vehicle end back-up equipment based on IOT, method and system for interacting with vehicle remote control terminal

Also Published As

Publication number Publication date
CN105681331B (en) 2019-06-11

Similar Documents

Publication Publication Date Title
CN110065470B (en) Automobile control method and device based on NFC automobile key, automobile and storage medium
CN108536118B (en) Vehicle ECU, system and method for ECU to provide diagnostic information
EP2663018B1 (en) Electronic key registration system
US10637657B2 (en) Update management method, update management system, and non-transitory recording medium
EP3403246B1 (en) A device and method for collecting user-based insurance data in vehicles
WO2019128354A1 (en) Safety authentication apparatus and method for vehicle anti-theft, device and computer program
CN111295862B (en) System and method for cryptographically securing vehicle identity
CN101559745B (en) Vehicle control system for preventing stealing and robbery and implementation method thereof
CN109257374B (en) Security control method and device and computer equipment
US20190092280A1 (en) Vehicle sharing accessory module and system
CN104851161A (en) Method for enabling PEPS key to operate multiple vehicles
CN114095298B (en) System and method for managing secure communication between modules in controller local area network
CN101135905A (en) Vehicle information rewriting system
CN111845624B (en) Method for starting vehicle without key
US20200079319A1 (en) Multi-factor authentication of a hardware assembly
US20180244152A1 (en) System and method for remotely controlling and monitoring vehicle based on iot
CN108482308B (en) Electric vehicle safety control method and device, storage medium and electric vehicle
CN111480141A (en) Method and device for updating software of a motor vehicle control device
CN107968707B (en) Method and system for classified storage of secret keys
US10124766B2 (en) Method for controlling the operation of at least one functional component of a motor vehicle and motor vehicle
KR20070061654A (en) Security system using a car network
CN108116367B (en) Keyless system matching method and keyless matching system
CN112339707A (en) ETC vehicle-mounted unit anti-disassembly method and system and automobile
CN105681331A (en) Method for verifying matching of automobile electronic control parts
JP2011170530A (en) Device for setting encryption of authentication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant