CN106627489A - Method and system for anti-theft authentication of pure electric vehicle - Google Patents

Method and system for anti-theft authentication of pure electric vehicle Download PDF

Info

Publication number
CN106627489A
CN106627489A CN201611128986.6A CN201611128986A CN106627489A CN 106627489 A CN106627489 A CN 106627489A CN 201611128986 A CN201611128986 A CN 201611128986A CN 106627489 A CN106627489 A CN 106627489A
Authority
CN
China
Prior art keywords
vcu
peps
antitheft
key
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611128986.6A
Other languages
Chinese (zh)
Inventor
王辰欣
赖瑞福
杨土超
杨佩君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Automobile Group Co Ltd
Original Assignee
Guangzhou Automobile Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Automobile Group Co Ltd filed Critical Guangzhou Automobile Group Co Ltd
Priority to CN201611128986.6A priority Critical patent/CN106627489A/en
Publication of CN106627489A publication Critical patent/CN106627489A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a method and system for anti-theft authentication of pure electric vehicle, wherein the method for anti-theft authentication comprises the steps that a whole vehicle controller VCU generates a set of random numbers whichareforwarded to the keyless boot / intelligent access system PEPS through a gateway module GWM, and simultaneously the VCU encrypts and calculates a fixed code,an anti-theft key and the random numbers according to the original stored data to generate first data;PEPS encrypts and calculates the fixed code, the anti-theft key and the received random numbers according to the original stored data to generatesecond data and is forwarded to the VCU through the GWM;the VCU performs a checksum comparison between the first data and the second data returned. If matching, the anti-theft authentication is determined to be successful, otherwise the anti-theft authentication fails. The method and system for anti-theft authentication of pure electric vehiclecan effectively improve the security and reliability of the anti-theft system of pure electric vehicle by designing an interactive process of anti-theft authentication between a pure electric vehicle model VCU and PEPS.

Description

A kind of pure electric automobile anti-theft authentication method and system
Technical field
Technical field of new energy of the present invention, more particularly to a kind of pure electric automobile anti-theft authentication method and system.
Background technology
With the popular feeling that deepens continuously of environmental protection concept, pure electric automobile is becoming increasingly popular.Pure electric automobile is not because have Electromotor, cannot just continue to use the engine theftproof system of traditional vehicle, how realize that car load is antitheft, be a critically important ring.Pure electricity Motor-car type would generally employ new technology and newly configure, and carry without spoon startup/smart entry system(Abbreviation PEPS), so car load is antitheft Need by starting without spoon/smart entry system and entire car controller(VCU)Between interaction realizing.
In the existing related art scheme antitheft with regard to pure electric automobile, the frame of burglary-resisting system is mostly simply simply introduced Structure, flow process and basic function, or the antitheft interaction of alarm and dynamo battery system is directed to, it is not specific to without spoon Startup/smart entry system and entire car controller(VCU)Between interaction realizing antitheft certification.
The content of the invention
The technical problem to be solved is, there is provided a kind of pure electric automobile anti-theft authentication method and system, with Effectively improve the antitheft safety and reliability of pure electric automobile.
In order to solve above-mentioned technical problem, the present invention provides a kind of pure electric automobile anti-theft authentication method, including:
Step S1, entire car controller VCU produces one group of random number, is transmitted to by gateway module GWM and starts/intelligence entrance without spoon System PEPS, while fixed code, antitheft key and the random number that the VCU prestores according to itself are encrypted calculating generating First data;
Step S2, fixed code that PEPS prestores according to itself, antitheft key and the random number for receiving are encrypted calculating, The second data are generated, and the VCU is transmitted to by the GWM;
First data are carried out verification and are compared by step S3, the VCU with second data for returning, and are judged if matching Antitheft certification success, otherwise judges antitheft authentification failure.
Wherein, after the VCU forwards the random number to the PEPS by the GWM, if waiting the very first time The response of the PEPS is not received afterwards, then the random number is transmitted to into institute again by the GWM after waiting for the second time PEPS is stated, repeats aforementioned process, if until reaching the response that upper limit number of retries does not all receive the PEPS, judgement is anti- Steal authentification failure.
Wherein, in step S2, if the PEPS is in lookup key or calculates in second data procedures, It is busy to the VCU return authentications state by the GWM, the VCU wait after the second time by the random number again by The GWM is transmitted to the PEPS, repeats aforementioned process, if until reaching the response that upper limit number of retries receives the PEPS It is authentication state to hurry, then judges antitheft authentification failure.
Wherein, in step S3, if the antitheft keys that itself prestore of the VCU and first data with return The verification of second data is compared and mismatched, and is further included:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries Still mismatch, then judge antitheft authentification failure.
Wherein, in step S2, if the PEPS has found that key is mismatched, returned to the VCU by the GWM The unmatched response of key is returned, the VCU judges antitheft authentification failure.
Wherein, in step S3, if the authentication state that the VCU reads the PEPS returns is space-time, one is entered Step includes:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries Still mismatch, then judge antitheft authentification failure.
Wherein, also included before step S1:
When the PEPS power supply status are in IGN(Equivalent to ON, in the state when can be to electricity on motor circuit)When, such as Really described VCU has been received by key power on signal, then perform step S1.
Wherein, if key certification is overtime, when the PEPS power supply status are in START, the VCU judges receiving Step S1 is performed during to key enabling signal.
Wherein, fixed code, antitheft key and the random number that the VCU prestores according to itself is added by the miniature of extension Close algorithm XTEA is encrypted calculating, generates first data, fixed code, antitheft key that the PEPS prestores according to itself Calculating is encrypted also by the Tiny Encryption Algorithm XTEA of extension with the random number for receiving, second number is generated According to.
Wherein, the fixed code that the fixed code and antitheft key that the VCU itself prestores itself prestores respectively with the PEPS It is consistent with antitheft key.
The present invention also provides a kind of pure electric automobile antitheft Verification System, including:
Entire car controller VCU, gateway module GWM and without spoon startup/smart entry system PEPS, wherein,
The VCU is used to produce one group of random number, the PEPS is transmitted to by the GWM, while what is prestored according to itself consolidates Determine code, antitheft key and the random number and be encrypted calculating the first data of generation;
Based on the PEPS is encrypted by the fixed code, antitheft key and the random number that receives that are prestored according to itself Calculate, generate the second data, and the VCU is transmitted to by the GWM;
The VCU is additionally operable to the antitheft key that itself prestores and first data carries out school with second data for returning Comparison is tested, if matching antitheft certification success is judged, otherwise judge antitheft authentification failure.
Wherein, after the VCU forwards the random number to the PEPS by the GWM, if waiting the very first time The response of the PEPS is not received afterwards, then the random number is transmitted to into institute again by the GWM after waiting for the second time PEPS is stated, repeats aforementioned process, if until reaching the response that upper limit number of retries does not all receive the PEPS, judgement is anti- Steal authentification failure.
Wherein, if the PEPS is in searching key or calculate in second data procedures, by the GWM to The VCU return authentications state is hurried, and the VCU is transmitted to the random number again by the GWM after waiting for the second time The PEPS, repeats aforementioned process, if being authentication state until reaching upper limit number of retries and receiving the response of the PEPS It is busy, then judge antitheft authentification failure.
Wherein, if first data compare mismatch with the verification of second data for returning, the VCU is used After waiting for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while according to certainly Fixed code, antitheft key and the new random number that body prestores is encrypted to calculate and generates the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, if the PEPS has found that key is mismatched, key is returned to the VCU by the GWM and is mismatched Response, the VCU judges antitheft authentification failure.
Wherein, if it is space-time that the VCU reads the authentication state of the PEPS returns, the VCU is used to wait After second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while prestoring according to itself Fixed code, antitheft key and the new random number be encrypted to calculate and generate the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, when the PEPS power supply status are in IGN, the VCU is additionally operable to having been received by key power on signal When produce one group of random number, the PEPS is transmitted to by the GWM, while the fixed code prestored according to itself, antitheft key Calculating is encrypted with the random number generate the first data.
Wherein, if key certification is overtime, when the PEPS power supply status are in START, the VCU is additionally operable to connecing One group of random number is produced when receiving key enabling signal, the PEPS is transmitted to by the GWM, while prestored according to itself Fixed code, antitheft key and the random number are encrypted calculating and generate the first data.
Wherein, the VCU is used for the fixed code, antitheft key and the random number that prestore according to itself by the micro- of extension Type AES XTEA is encrypted calculating, generates first data, fixed code that the PEPS is used to being prestored according to itself, Antitheft key and the random number for receiving are encrypted calculating also by the Tiny Encryption Algorithm XTEA of extension, generate described Second data.
Wherein, the fixed code that the fixed code and antitheft key that the VCU itself prestores itself prestores respectively with the PEPS It is consistent with antitheft key.
The beneficial effect of the embodiment of the present invention is:By designing antitheft certification between pure electric vehicle type VCU and PEPS Interaction flow, the perfect anti-theft authentication method of pure electric vehicle type can effectively improve pure electric automobile burglary-resisting system safety Property and reliability.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of pure electric automobile anti-theft authentication method of the embodiment of the present invention one.
Fig. 2 is the successful antitheft identifying procedure schematic diagram of certification in the embodiment of the present invention one.
Fig. 3 be in the embodiment of the present invention one PEPS without response when antitheft identifying procedure schematic diagram.
Fig. 4 is the antitheft identifying procedure schematic diagram that PEPS responds busy in the embodiment of the present invention one.
The schematic flow sheet of Fig. 5 antitheft certifications when being communication failure in the embodiment of the present invention one.
Fig. 6 is antitheft identifying procedure schematic diagram when key is mismatched in the embodiment of the present invention one.
Fig. 7 is the antitheft identifying procedure schematic diagram that authentication state is space-time in the embodiment of the present invention one.
Fig. 8 is a kind of structural representation of the antitheft Verification System of the pure electric automobile of the embodiment of the present invention two.
Specific embodiment
The explanation of following embodiment is refer to the attached drawing, can be to the specific embodiment implemented to the example present invention.
Due in pure electric automobile, electromotor is not abundant and necessary power resources:Pure electric vehicle type is not configured and started Machine, hybrid electric vehicle can still provide for pure electricity traveling in the case of electromotor is idle.Therefore it is original by engine management system System EMS, gateway module GWM, an anti-theft locking system of engine IMMO without spoon startup/smart entry system PEPS compositions prevent Certification ring is stolen, needs to be changed to VCU, GWM, PEPS three composition, be i.e. entire car controller VCU needs to substitute original EMS in IMMO The responsibility of antitheft authenticated connection, realizes corresponding antitheft identifying procedure.
Refer to shown in Fig. 2, the embodiment of the present invention one provides a kind of pure electric automobile anti-theft authentication method, including:
Step S1, entire car controller VCU produces one group of random number, is transmitted to by gateway module GWM and starts/intelligence entrance without spoon System PEPS, while fixed code, antitheft key and the random number that the VCU prestores according to itself are encrypted calculating generating First data;
Step S2, fixed code that PEPS prestores according to itself, antitheft key and the random number for receiving are encrypted calculating, The second data are generated, and the VCU is transmitted to by the GWM;
First data are carried out verification and are compared by step S3, the VCU with second data for returning, and are judged if matching Antitheft certification success, otherwise judges antitheft authentification failure.
Due to being interacted by CAN signal between VCU and PEPS in the present embodiment, therefore CAN in antitheft verification process is believed Number carry out defined below:
VCU ends:
Antitheft certification mode signal(Challenge Code):VCU->GWM-PEPS
Message name(Message Name):VCU_IMMO
Message-length(Message Length):8 bytes
ID:0x31
Signal name(Signal Name):VCU_ChallengeCode
Wherein, the random number that VCU sends in the present embodiment is 8 bytes, and it is invalid random that all 8 bytes are all 0x00 or 0xFF Number, in normal antitheft certification, VCU should not send invalid random number.But when antitheft key is matched without key in VCU, 8 bytes of VCU_ChallengeCode should entirely be set to 0xFF.
Antitheft authentication result signal(VCU released status): VCU->GWM-PEPS
Message name(Message Name):VCU_10_P
Message-length(Message Length):8 bytes
ID: 0x38B
Signal name(Signal Name):VCU_Released
PEPS ends:
PEPS response signals(Response): PEPS->GWM->VCU
Message name(Message Name): GW_IMMO_P
Message-length(Message Length): 8 bytes
ID:0x38
Signal name(Signal Name): GW_IMMO_P
Wherein authentication state(Authentication Status)Implication it is as follows:
According to second data and the check results of VCU of PEPS feedbacks, the antitheft certification of the present embodiment is it is possible that 6 kinds of differences Situation:Certification success(Successful release), PEPS is without response(PEPS no response), PEPS responses it is busy (PEPS response busy), communication failure(Communication failure), key mismatch(PEPS failure) And authentication state is sky(PEPS authentication state error), this 6 kinds of different situations may be in once school It is alternately present during testing.Illustrate individually below.
As shown in Fig. 2 being the successful flow process of antitheft certification, it is described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, by the miniature of extension plus Close algorithm XTEA(Extend Tiny Encryption Algorithm)Calculating is encrypted, the second data are generated, is sent PEPS_ImmoCode = authentication status + 6 bytes response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)It is valid key that VCU reads authentication state authentication status, then call inside PepsKeyCal functions, the fixed code prestored by itself, antitheft key ESK and random number are generated again by XTEA algorithms First data, the second data returned with PEPS are compared, and have passed through verification comparison;
(6)VCU transmission CAN signals VCU_Released=' VCU released', represent eventually through antitheft certification.
Again as shown in figure 3, being that VCU is sent out after random number, can not receive always PEPS response situation, illustrate as Under:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)VCU waits the very first time(Time sequence parameter tKeyStatusRx)Afterwards, still without the feedback for receiving PEPS, then VCU thinks PEPS is without response;
(4)VCU again waited for for the second time(Time sequence parameter tECMAuthDelayRetry)Afterwards, using last time generate that The random number of 8 bytes of group is constant, and CAN signal VCU_ChallengeCode=8 Bytes Random are sent again Numbers;
(5)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(6)VCU waits the very first time(Time sequence parameter tKeyStatusRx)Afterwards, the feedback of PEPS is not still received, is then repeated The(4)Extremely(6)Step, until reaching upper limit number of retries;
(7)VCU send CAN signal VCU_Released=' VCU locked', represent antitheft certification finally not over.
As shown in figure 4, being that VCU is sent out after random number, the response that PEPS is received always is that authentication state is hurried(busy)'s Situation, is described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)PEPS due to also key or calculating in the second data searching, therefore send PEPS_ImmoCode= authentication status(: busy) + 6 bytes response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)It is busy(busy), then waited for the second time(Sequential Parameter tECMAuthDelayRetry)Afterwards, the random number of that 8 byte of group for being generated using last time is constant, sends CAN signal VCU_ChallengeCode = 8 Bytes Random Numbers;
(6)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(7)PEPS is still in searching and key or is calculating in the second data, send again PEPS_ImmoCode= authentication status(: busy) + 6 bytes response;
(8)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(9)VCU receives the authentication state of PEPS(authentication status)It is busy(busy), then VCU repeat the(5) Extremely(9)Step, until reaching upper limit number of retries;
(10)VCU send CAN signal VCU_Released=' VCU locked', represent antitheft certification finally not over.
As shown in figure 5, being the authentication state that VCU receives PEPS(Authentication status)For Valid Key, but verify occur when comparing not over situation, i.e. communication failure is described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms Computations, generate the second data, send the bytes of PEPS_ImmoCode=authentication status+6 response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)Pass through for key certification(valid key), then adjust With internal pepsKeyCal functions, by the fixed code prestored by itself, antitheft key and random number again by XTEA algorithms The first data for generating, the second data returned with PEPS are compared, but compare not over verification;
(6)VCU waited for the second time(Time sequence parameter tECMAuthDelayRetry)Afterwards, one group of new 8 byte is regenerated Random number, send the Bytes Random Numbers of CAN signal VCU_ChallengeCode=New 8;
(7)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(8)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms Computations, after the part digit key authentication result in result of calculation is replaced the second data are generated, and send PEPS_ ImmoCode = authentication status + 6 bytes response;
(9)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(10)It is valid key that VCU reads authentication status, then call pepsKeyCal functions, will be by certainly The first data that fixed code, antitheft key and the new random number that body prestores is generated again by XTEA algorithms, return with PEPS The second data be compared, if passed through verification compared, be transferred to the(11)Step, if not validated comparison, weighs Multiple the(6)Extremely(10)Step, until reaching upper limit number of retries, then VCU send CAN signal VCU_Released=' VCU Locked, represents burglary-resisting system finally not by antitheft certification, and flow process terminates;
(11)VCU transmission CAN signals VCU_Released=' VCU released', represent burglary-resisting system eventually through antitheft Certification.
As shown in fig. 6, being the authentication state that VCU receives PEPS(authentication status)For key not Match somebody with somebody(no valid KEY)Situation, be described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)PEPS has found that key is mismatched, transmission PEPS_ImmoCode=authentication status (: no valid KEY) + 6 bytes response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)For key mismatch(no valid KEY), then Send CAN signal VCU_Released=' VCU locked', represent antitheft certification finally not over.
It should be noted that the present embodiment antitheft certification occur after key certification, by after key certification Carry out antitheft certification.Example shown in Fig. 6 is after into antitheft identifying procedure, to be lost shape outside car in the event of key Condition, then need incidentally to carry out key certification.
As shown in fig. 7, being the authentication state that VCU receives PEPS(authentication status)For sky(not defined)Situation, be described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms Computations, generate the second data, send the bytes of PEPS_ImmoCode=authentication status+6 response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)For sky(not defined);
(6)VCU waited for the second time(Time sequence parameter tECMAuthDelayRetry)Afterwards, one group of new 8 byte is regenerated Random number, send the Bytes Random Numbers of CAN signal VCU_ChallengeCode=New 8;
(7)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(8)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms Computations, after the part digit key authentication result in result of calculation is replaced the second data are generated, and send PEPS_ ImmoCode = authentication status + 6 bytes response;
(9)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(10)VCU reads authentication state(authentication status)For sky(not defined), then call PepsKeyCal functions, the fixed code prestored by itself, antitheft key ESK and new random number are given birth to again by XTEA algorithms Into the first data, the second data returned with PEPS are compared, if passed through verification compared, are transferred to the(11)Step, If not validated comparison, repeatedly(6)Extremely(10)Step, until reaching upper limit number of retries, then VCU sends CAN signal VCU_Released=' VCU locked, burglary-resisting system is represented finally not by antitheft certification, flow process terminates;
(11)VCU transmission CAN signals VCU_Released=' VCU released', represent burglary-resisting system eventually through antitheft Certification.
It is understood that the fixed code that the fixed codes that prestore of VCU itself and antitheft key prestore respectively with PEPS itself It is consistent with antitheft key, by writing under line.
As it was previously stated, above-mentioned 6 kinds of situation conditions may be alternately present in a checking procedure, and when being alternately present, one Denier reaches certification success(Successful release)Or key is mismatched(PEPS failure)Condition, directly by VCU_ Released set is ' VCU released' or ' VCU locked';And when constantly replacing under the conditions of other four kinds, need Constantly repeat to initiate verification, because the repetition initiation upper limit number of times of these four situations is not identical, therefore have identical weight The situation for having recurred upper limit number of times is multiplexed an identical repetition initiation counting, and any one repetition is initiated counting and reached thereon All should be by VCU_Released set during limit number of times ' VCU locked'.
It should be noted that, before step S1, user operation activate switch, PEPS set IGN ON relays are in IGN ON states, VCU detection KeyOn pin voltages, voltage reaches certain value, then starts identifying procedure.If certification does not pass through Or key certification time-out, in IGN ON states, user operation activate switch, during PEPS set Start Relay, VCU detects Key Start pin voltages, voltage reaches certain value, and VCU should again initiate the identifying procedure with PEPS.
Thus, the present embodiment also included before step S1:
When the PEPS power supply status are in IGN, if the VCU has been received by key power on signal, execution step S1.
If key certification is overtime, when the PEPS power supply status are in START, the VCU is opened receiving key Execution step S1 during dynamic signal.
Referring again to shown in Fig. 8, based on the embodiment of the present invention one, the embodiment of the present invention two provides the present invention and also provides a kind of The antitheft Verification System of pure electric automobile, including:
Entire car controller VCU, gateway module GWM and without spoon startup/smart entry system PEPS, wherein,
The VCU is used to produce one group of random number, the PEPS is transmitted to by the GWM, while what is prestored according to itself consolidates Determine code, antitheft key and the random number and be encrypted calculating the first data of generation;
Based on the PEPS is encrypted by the fixed code, antitheft key and the random number that receives that are prestored according to itself Calculate, generate the second data, and the VCU is transmitted to by the GWM;
The VCU is additionally operable to that first data are carried out verification and compared with second data for returning, and judges if matching Antitheft certification success, otherwise judges antitheft authentification failure.
Wherein, after the VCU forwards the random number to the PEPS by the GWM, if waiting the very first time The response of the PEPS is not received afterwards, then the random number is transmitted to into institute again by the GWM after waiting for the second time PEPS is stated, repeats aforementioned process, if until reaching the response that upper limit number of retries does not all receive the PEPS, judgement is anti- Steal authentification failure.
Wherein, if the PEPS is in searching key or calculate in second data procedures, by the GWM to The VCU return authentications state is hurried, and the VCU is transmitted to the random number again by the GWM after waiting for the second time The PEPS, repeats aforementioned process, if being authentication state until reaching upper limit number of retries and receiving the response of the PEPS It is busy, then judge antitheft authentification failure.
Wherein, if first data compare mismatch with the verification of second data for returning, the VCU is used After waiting for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while according to certainly Fixed code, antitheft key and the new random number that body prestores is encrypted to calculate and generates the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, if the PEPS has found that key is mismatched, key is returned to the VCU by the GWM and is mismatched Response, the VCU judges antitheft authentification failure.
Wherein, if it is space-time that the VCU reads the authentication state of the PEPS returns, the VCU is used to wait After second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while prestoring according to itself Fixed code, antitheft key and the new random number be encrypted to calculate and generate the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, when the PEPS power supply status are in IGN, the VCU is additionally operable to having been received by key power on signal When produce one group of random number, the PEPS is transmitted to by the GWM, while calculating is encrypted to the random number generates the One data.
Wherein, if key certification is overtime, when the PEPS power supply status are in START, the VCU is additionally operable to connecing One group of random number is produced when receiving key enabling signal, the PEPS is transmitted to by the GWM, while entering to the random number Row computations generate the first data.
Wherein, the VCU is used for the fixed code, antitheft key and the random number that prestore according to itself by the micro- of extension Type AES XTEA is encrypted calculating, generates first data, fixed code that the PEPS is used to being prestored according to itself, Antitheft key and the random number for receiving are encrypted calculating also by the Tiny Encryption Algorithm XTEA of extension, generate described Second data.
Wherein, fixed code that the fixed code and antitheft key that VCU itself prestores prestores respectively with PEPS itself and antitheft close Key is consistent.
Operation principle about the present embodiment and the beneficial effect brought refer to the explanation of the embodiment of the present invention one, Here is omitted.
By described above, the beneficial effect that the present invention is brought is:By in pure electric vehicle type VCU and Design the interaction flow of antitheft certification between PEPS, the perfect anti-theft authentication method of pure electric vehicle type can be effectively improved pure Anti-theft system for electric automobiles safety and reliability.
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.

Claims (18)

1. a kind of pure electric automobile anti-theft authentication method, including:
Step S1, entire car controller VCU produces one group of random number, is transmitted to by gateway module GWM and starts/intelligence entrance without spoon System PEPS, while fixed code, antitheft key and the random number that the VCU prestores according to itself are encrypted calculating generating First data;
Step S2, fixed code that PEPS prestores according to itself, antitheft key and the random number for receiving are encrypted calculating, The second data are generated, and the VCU is transmitted to by the GWM;
First data are carried out verification and are compared by step S3, the VCU with second data for returning, and are judged if matching Antitheft certification success, otherwise judges antitheft authentification failure.
2. method according to claim 1, it is characterised in that the VCU forwards the random number to institute by the GWM After stating PEPS, if not receiving the response of the PEPS after waiting the very first time, wait after the second time by it is described with Machine number is transmitted to the PEPS again by the GWM, repeats aforementioned process, if all do not had until reaching upper limit number of retries The response of the PEPS is received, then judges antitheft authentification failure.
3. method according to claim 1, it is characterised in that in step S2, if the PEPS is in searching key Spoon is calculated in second data procedures, then busy to the VCU return authentications state by the GWM, and the VCU waits the The random number is transmitted to into the PEPS again by the GWM after two times, repeats aforementioned process, if until reached Limit number of retries receive the PEPS response be authentication state hurry, then judge antitheft authentification failure.
4. method according to claim 1, it is characterised in that in step S3, if first data with return Second data verification compare mismatch, further include:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries Still mismatch, then judge antitheft authentification failure.
5. method according to claim 1, it is characterised in that in step S2, if the PEPS has found key not Matching, then return the unmatched response of key by the GWM to the VCU, and the VCU judges antitheft authentification failure.
6. method according to claim 1, it is characterised in that in step S3, if the VCU read it is described The authentication state that PEPS is returned is space-time, is further included:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries Still mismatch, then judge antitheft authentification failure.
7. method according to claim 1, it is characterised in that also included before step S1:
When the PEPS power supply status are in IGN, if the VCU has been received by key power on signal, the step is performed Rapid S1.
8. method according to claim 7, it is characterised in that if key certification is overtime, when the PEPS power supply status In START when, the VCU performs step S1 when key enabling signal is received.
9. method according to claim 1, it is characterised in that fixed code, antitheft key that the VCU prestores according to itself Calculating is encrypted by the Tiny Encryption Algorithm XTEA for extending with the random number, first data, the PEPS is generated The fixed code that prestored according to itself, antitheft key and the random number that receives also by extension Tiny Encryption Algorithm XTEA Calculating is encrypted, second data are generated.
10. the antitheft Verification System of a kind of pure electric automobile, it is characterised in that include:
Entire car controller VCU, gateway module GWM and without spoon startup/smart entry system PEPS, wherein,
The VCU is used to produce one group of random number, the PEPS is transmitted to by the GWM, while what is prestored according to itself consolidates Determine code, antitheft key and the random number and be encrypted calculating the first data of generation;
Based on the PEPS is encrypted by the fixed code, antitheft key and the random number that receives that are prestored according to itself Calculate, generate the second data, and the VCU is transmitted to by the GWM;
The VCU is additionally operable to that first data are carried out verification and compared with second data for returning, and judges if matching Antitheft certification success, otherwise judges antitheft authentification failure.
11. systems according to claim 10, it is characterised in that the VCU by the GWM forward the random number to After the PEPS, if not receiving the response of the PEPS after waiting the very first time, waiting will be described after the second time Random number is transmitted to the PEPS again by the GWM, repeats aforementioned process, if all do not had until reaching upper limit number of retries There is the response for receiving the PEPS, then judge antitheft authentification failure.
12. systems according to claim 10, it is characterised in that if the PEPS is in lookup key or calculates described It is in second data procedures, then busy to the VCU return authentications state by the GWM, by institute after VCU second times of wait State random number and be transmitted to the PEPS again by the GWM, repeat aforementioned process, if until reaching upper limit number of retries receipts To the PEPS response be authentication state hurry, then judge antitheft authentification failure.
13. systems according to claim 10, it is characterised in that if first data and second number for returning According to verification compare mismatch, then the VCU be used for wait the second time after, one group of new random number is regenerated, by institute State GWM and be transmitted to the PEPS, while the fixed code prestored according to itself, antitheft key and the new random number are encrypted Calculate and generate the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit Number of times is still mismatched, then judge antitheft authentification failure.
14. systems according to claim 10, it is characterised in that if the PEPS has found that key is mismatched, pass through The GWM to the VCU returns the unmatched response of key, and the VCU judges antitheft authentification failure.
15. systems according to claim 10, it is characterised in that if the VCU reads recognizing for the PEPS returns Card state is space-time, then after the VCU is used to wait for the second time, regenerate one group of new random number, is turned by the GWM The PEPS is issued, while the fixed code prestored according to itself, antitheft key and the new random number are encrypted calculating life First data of Cheng Xin;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit Number of times is still mismatched, then judge antitheft authentification failure.
16. systems according to claim 10, it is characterised in that described when the PEPS power supply status are in IGN VCU is additionally operable to produce one group of random number when key power on signal is had been received by, and is transmitted to the PEPS by the GWM, together When the fixed code, antitheft key and the random number that are prestored according to itself be encrypted calculating and generate the first data.
17. systems according to claim 16, it is characterised in that if key certification is overtime, the PEPS power supply status In START when, the VCU is additionally operable to receiving key enabling signal, one group of random number is then produced in this way, by described GWM is transmitted to the PEPS, while the fixed code prestored according to itself, antitheft key and the random number are encrypted calculating life Into the first data.
18. systems according to claim 10, it is characterised in that fixed code that the VCU is used to being prestored according to itself, anti- Steal key and the random number and calculating is encrypted by the Tiny Encryption Algorithm XTEA for extending, generate first data, institute State PEPS for the fixed code, antitheft key and the random number that receives that are prestored according to itself also by the miniature of extension plus Close algorithm XTEA is encrypted calculating, generates second data.
CN201611128986.6A 2016-12-09 2016-12-09 Method and system for anti-theft authentication of pure electric vehicle Pending CN106627489A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611128986.6A CN106627489A (en) 2016-12-09 2016-12-09 Method and system for anti-theft authentication of pure electric vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611128986.6A CN106627489A (en) 2016-12-09 2016-12-09 Method and system for anti-theft authentication of pure electric vehicle

Publications (1)

Publication Number Publication Date
CN106627489A true CN106627489A (en) 2017-05-10

Family

ID=58825442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611128986.6A Pending CN106627489A (en) 2016-12-09 2016-12-09 Method and system for anti-theft authentication of pure electric vehicle

Country Status (1)

Country Link
CN (1) CN106627489A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108001407A (en) * 2017-12-12 2018-05-08 江铃汽车股份有限公司 A kind of antitheft and powering method of plug-in hybrid-power automobile
CN108482308A (en) * 2018-03-30 2018-09-04 宝沃汽车(中国)有限公司 Safety control method for electric automobile, device, storage medium and electric vehicle
CN109080582A (en) * 2018-08-20 2018-12-25 北京新能源汽车股份有限公司 A kind of control method of vehicle launch, control device and automobile
CN109094516A (en) * 2018-09-30 2018-12-28 安徽江淮汽车集团股份有限公司 A kind of automobile anti-theft method and burglary-resisting system
CN109194758A (en) * 2018-09-13 2019-01-11 江西江铃集团新能源汽车有限公司 Electric car remote authentication control method and system
CN109614770A (en) * 2018-12-24 2019-04-12 苏州思必驰信息科技有限公司 Authoring system and method applied to embedded device
CN109728899A (en) * 2017-10-30 2019-05-07 北京长城华冠汽车科技股份有限公司 A kind of pure electric vehicle authentication key method for managing security and system
CN110843729A (en) * 2019-11-29 2020-02-28 安徽江淮汽车集团股份有限公司 Vehicle anti-theft method and system
CN111469803A (en) * 2020-05-06 2020-07-31 浙江吉利新能源商用车集团有限公司 Anti-theft system and anti-theft method for vehicle
CN111746464A (en) * 2020-06-30 2020-10-09 湖南行必达网联科技有限公司 Matching code generation method and device for anti-theft verification
CN112339707A (en) * 2019-08-09 2021-02-09 广州汽车集团股份有限公司 ETC vehicle-mounted unit anti-disassembly method and system and automobile
CN112622822A (en) * 2020-12-29 2021-04-09 江苏吉麦新能源车业有限公司 Vehicle anti-theft system
CN112693425A (en) * 2021-01-15 2021-04-23 江西江铃集团新能源汽车有限公司 Vehicle anti-theft method, device, storage medium, vehicle control unit and vehicle
CN113335226A (en) * 2021-04-27 2021-09-03 江铃汽车股份有限公司 Anti-theft matching method and system for hybrid electric vehicle
CN114248722A (en) * 2020-09-24 2022-03-29 长城汽车股份有限公司 Control method and device and vehicle
CN115107701A (en) * 2022-07-26 2022-09-27 合众新能源汽车有限公司 Automobile anti-theft authentication method and system
CN116653854A (en) * 2023-07-11 2023-08-29 浙江春风动力股份有限公司 motorcycle

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130066525A1 (en) * 2011-09-12 2013-03-14 Filip Tomik Vehicle shut-down functionality for peps-equipped vehicles
CN104118392A (en) * 2013-04-28 2014-10-29 广州汽车集团股份有限公司 Engine anti-theft authentication method and device of engine anti-theft system
CN104590204A (en) * 2013-10-31 2015-05-06 北汽福田汽车股份有限公司 Rotary knob type passive starting method and system for vehicle
CN106043231A (en) * 2016-07-13 2016-10-26 深圳市赛格导航科技股份有限公司 Automobile remote control system and method based on PEPS

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130066525A1 (en) * 2011-09-12 2013-03-14 Filip Tomik Vehicle shut-down functionality for peps-equipped vehicles
CN104118392A (en) * 2013-04-28 2014-10-29 广州汽车集团股份有限公司 Engine anti-theft authentication method and device of engine anti-theft system
CN104590204A (en) * 2013-10-31 2015-05-06 北汽福田汽车股份有限公司 Rotary knob type passive starting method and system for vehicle
CN106043231A (en) * 2016-07-13 2016-10-26 深圳市赛格导航科技股份有限公司 Automobile remote control system and method based on PEPS

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109728899A (en) * 2017-10-30 2019-05-07 北京长城华冠汽车科技股份有限公司 A kind of pure electric vehicle authentication key method for managing security and system
CN108001407A (en) * 2017-12-12 2018-05-08 江铃汽车股份有限公司 A kind of antitheft and powering method of plug-in hybrid-power automobile
CN108482308A (en) * 2018-03-30 2018-09-04 宝沃汽车(中国)有限公司 Safety control method for electric automobile, device, storage medium and electric vehicle
CN109080582A (en) * 2018-08-20 2018-12-25 北京新能源汽车股份有限公司 A kind of control method of vehicle launch, control device and automobile
CN109080582B (en) * 2018-08-20 2020-06-09 北京新能源汽车股份有限公司 Vehicle starting control method and device and automobile
CN109194758A (en) * 2018-09-13 2019-01-11 江西江铃集团新能源汽车有限公司 Electric car remote authentication control method and system
CN109094516A (en) * 2018-09-30 2018-12-28 安徽江淮汽车集团股份有限公司 A kind of automobile anti-theft method and burglary-resisting system
CN109614770A (en) * 2018-12-24 2019-04-12 苏州思必驰信息科技有限公司 Authoring system and method applied to embedded device
CN112339707A (en) * 2019-08-09 2021-02-09 广州汽车集团股份有限公司 ETC vehicle-mounted unit anti-disassembly method and system and automobile
CN110843729B (en) * 2019-11-29 2021-06-18 安徽江淮汽车集团股份有限公司 Vehicle anti-theft method and system
CN110843729A (en) * 2019-11-29 2020-02-28 安徽江淮汽车集团股份有限公司 Vehicle anti-theft method and system
CN111469803A (en) * 2020-05-06 2020-07-31 浙江吉利新能源商用车集团有限公司 Anti-theft system and anti-theft method for vehicle
CN111746464A (en) * 2020-06-30 2020-10-09 湖南行必达网联科技有限公司 Matching code generation method and device for anti-theft verification
CN114248722A (en) * 2020-09-24 2022-03-29 长城汽车股份有限公司 Control method and device and vehicle
CN112622822A (en) * 2020-12-29 2021-04-09 江苏吉麦新能源车业有限公司 Vehicle anti-theft system
CN112693425A (en) * 2021-01-15 2021-04-23 江西江铃集团新能源汽车有限公司 Vehicle anti-theft method, device, storage medium, vehicle control unit and vehicle
CN113335226A (en) * 2021-04-27 2021-09-03 江铃汽车股份有限公司 Anti-theft matching method and system for hybrid electric vehicle
CN115107701A (en) * 2022-07-26 2022-09-27 合众新能源汽车有限公司 Automobile anti-theft authentication method and system
CN115107701B (en) * 2022-07-26 2024-02-23 合众新能源汽车股份有限公司 Automobile anti-theft authentication method and system
CN116653854A (en) * 2023-07-11 2023-08-29 浙江春风动力股份有限公司 motorcycle

Similar Documents

Publication Publication Date Title
CN106627489A (en) Method and system for anti-theft authentication of pure electric vehicle
US8957760B2 (en) Electric vehicle theft preventing device
CN110126782B (en) Vehicle intelligent key application method and device
CN105844749B (en) A kind of Automobile handset system for unlocking and its unlocking method
CN104118392B (en) A kind of engine anti-theft authentication method of engine theftproof system and device
US5596317A (en) Vehicle safety device with electronically coded access authorization
CN105313837B (en) Intelligent key matching process and system
CN111572493B (en) Vehicle keyless entry and starting system and method based on Internet of vehicles
CN104002765B (en) A kind of automobile no-key enters startup system and starts method
WO2019042128A1 (en) Anti-theft authentication method for motor vehicle, key-free entrance and start system and anti-theft authentication system
CN109862040A (en) A kind of safety certifying method and Verification System
US8978109B2 (en) Electronic control device for a vehicle
CN107187326A (en) The locked assembly and method of certification unblock comprising electric vehicle power supply equipment
US7813773B2 (en) Electronic key apparatus for vehicle
CN101393658A (en) Central controlled anti-theft method and system for automobile
JP2013017140A (en) On-vehicle network system
CN104724057B (en) A kind of hybrid vehicle electronic locking theft preventing method of high security
CN106515657B (en) A kind of method and system of anti-theft security certification
CN113613214A (en) In-vehicle message authentication key management method and readable storage medium
JP2014087198A (en) Unlock control device
CN113830027A (en) Vehicle control method based on digital key system
CN113954681A (en) Plug-and-charge function authentication system and control method for electric vehicle
CN109131218A (en) Starting method, apparatus, vehicle and the computer readable storage medium of vehicle
CN113039747B (en) Authentication system and authentication method
CN104802881A (en) Motorcycle burglary protection system with remote controller and motorcycle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication