CN106627489A - Method and system for anti-theft authentication of pure electric vehicle - Google Patents
Method and system for anti-theft authentication of pure electric vehicle Download PDFInfo
- Publication number
- CN106627489A CN106627489A CN201611128986.6A CN201611128986A CN106627489A CN 106627489 A CN106627489 A CN 106627489A CN 201611128986 A CN201611128986 A CN 201611128986A CN 106627489 A CN106627489 A CN 106627489A
- Authority
- CN
- China
- Prior art keywords
- vcu
- peps
- antitheft
- key
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides a method and system for anti-theft authentication of pure electric vehicle, wherein the method for anti-theft authentication comprises the steps that a whole vehicle controller VCU generates a set of random numbers whichareforwarded to the keyless boot / intelligent access system PEPS through a gateway module GWM, and simultaneously the VCU encrypts and calculates a fixed code,an anti-theft key and the random numbers according to the original stored data to generate first data;PEPS encrypts and calculates the fixed code, the anti-theft key and the received random numbers according to the original stored data to generatesecond data and is forwarded to the VCU through the GWM;the VCU performs a checksum comparison between the first data and the second data returned. If matching, the anti-theft authentication is determined to be successful, otherwise the anti-theft authentication fails. The method and system for anti-theft authentication of pure electric vehiclecan effectively improve the security and reliability of the anti-theft system of pure electric vehicle by designing an interactive process of anti-theft authentication between a pure electric vehicle model VCU and PEPS.
Description
Technical field
Technical field of new energy of the present invention, more particularly to a kind of pure electric automobile anti-theft authentication method and system.
Background technology
With the popular feeling that deepens continuously of environmental protection concept, pure electric automobile is becoming increasingly popular.Pure electric automobile is not because have
Electromotor, cannot just continue to use the engine theftproof system of traditional vehicle, how realize that car load is antitheft, be a critically important ring.Pure electricity
Motor-car type would generally employ new technology and newly configure, and carry without spoon startup/smart entry system(Abbreviation PEPS), so car load is antitheft
Need by starting without spoon/smart entry system and entire car controller(VCU)Between interaction realizing.
In the existing related art scheme antitheft with regard to pure electric automobile, the frame of burglary-resisting system is mostly simply simply introduced
Structure, flow process and basic function, or the antitheft interaction of alarm and dynamo battery system is directed to, it is not specific to without spoon
Startup/smart entry system and entire car controller(VCU)Between interaction realizing antitheft certification.
The content of the invention
The technical problem to be solved is, there is provided a kind of pure electric automobile anti-theft authentication method and system, with
Effectively improve the antitheft safety and reliability of pure electric automobile.
In order to solve above-mentioned technical problem, the present invention provides a kind of pure electric automobile anti-theft authentication method, including:
Step S1, entire car controller VCU produces one group of random number, is transmitted to by gateway module GWM and starts/intelligence entrance without spoon
System PEPS, while fixed code, antitheft key and the random number that the VCU prestores according to itself are encrypted calculating generating
First data;
Step S2, fixed code that PEPS prestores according to itself, antitheft key and the random number for receiving are encrypted calculating,
The second data are generated, and the VCU is transmitted to by the GWM;
First data are carried out verification and are compared by step S3, the VCU with second data for returning, and are judged if matching
Antitheft certification success, otherwise judges antitheft authentification failure.
Wherein, after the VCU forwards the random number to the PEPS by the GWM, if waiting the very first time
The response of the PEPS is not received afterwards, then the random number is transmitted to into institute again by the GWM after waiting for the second time
PEPS is stated, repeats aforementioned process, if until reaching the response that upper limit number of retries does not all receive the PEPS, judgement is anti-
Steal authentification failure.
Wherein, in step S2, if the PEPS is in lookup key or calculates in second data procedures,
It is busy to the VCU return authentications state by the GWM, the VCU wait after the second time by the random number again by
The GWM is transmitted to the PEPS, repeats aforementioned process, if until reaching the response that upper limit number of retries receives the PEPS
It is authentication state to hurry, then judges antitheft authentification failure.
Wherein, in step S3, if the antitheft keys that itself prestore of the VCU and first data with return
The verification of second data is compared and mismatched, and is further included:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together
Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the
One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter
Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute
The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as
Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries
Still mismatch, then judge antitheft authentification failure.
Wherein, in step S2, if the PEPS has found that key is mismatched, returned to the VCU by the GWM
The unmatched response of key is returned, the VCU judges antitheft authentification failure.
Wherein, in step S3, if the authentication state that the VCU reads the PEPS returns is space-time, one is entered
Step includes:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together
Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the
One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter
Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute
The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as
Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries
Still mismatch, then judge antitheft authentification failure.
Wherein, also included before step S1:
When the PEPS power supply status are in IGN(Equivalent to ON, in the state when can be to electricity on motor circuit)When, such as
Really described VCU has been received by key power on signal, then perform step S1.
Wherein, if key certification is overtime, when the PEPS power supply status are in START, the VCU judges receiving
Step S1 is performed during to key enabling signal.
Wherein, fixed code, antitheft key and the random number that the VCU prestores according to itself is added by the miniature of extension
Close algorithm XTEA is encrypted calculating, generates first data, fixed code, antitheft key that the PEPS prestores according to itself
Calculating is encrypted also by the Tiny Encryption Algorithm XTEA of extension with the random number for receiving, second number is generated
According to.
Wherein, the fixed code that the fixed code and antitheft key that the VCU itself prestores itself prestores respectively with the PEPS
It is consistent with antitheft key.
The present invention also provides a kind of pure electric automobile antitheft Verification System, including:
Entire car controller VCU, gateway module GWM and without spoon startup/smart entry system PEPS, wherein,
The VCU is used to produce one group of random number, the PEPS is transmitted to by the GWM, while what is prestored according to itself consolidates
Determine code, antitheft key and the random number and be encrypted calculating the first data of generation;
Based on the PEPS is encrypted by the fixed code, antitheft key and the random number that receives that are prestored according to itself
Calculate, generate the second data, and the VCU is transmitted to by the GWM;
The VCU is additionally operable to the antitheft key that itself prestores and first data carries out school with second data for returning
Comparison is tested, if matching antitheft certification success is judged, otherwise judge antitheft authentification failure.
Wherein, after the VCU forwards the random number to the PEPS by the GWM, if waiting the very first time
The response of the PEPS is not received afterwards, then the random number is transmitted to into institute again by the GWM after waiting for the second time
PEPS is stated, repeats aforementioned process, if until reaching the response that upper limit number of retries does not all receive the PEPS, judgement is anti-
Steal authentification failure.
Wherein, if the PEPS is in searching key or calculate in second data procedures, by the GWM to
The VCU return authentications state is hurried, and the VCU is transmitted to the random number again by the GWM after waiting for the second time
The PEPS, repeats aforementioned process, if being authentication state until reaching upper limit number of retries and receiving the response of the PEPS
It is busy, then judge antitheft authentification failure.
Wherein, if first data compare mismatch with the verification of second data for returning, the VCU is used
After waiting for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while according to certainly
Fixed code, antitheft key and the new random number that body prestores is encrypted to calculate and generates the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted
Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM
The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned
It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit
Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, if the PEPS has found that key is mismatched, key is returned to the VCU by the GWM and is mismatched
Response, the VCU judges antitheft authentification failure.
Wherein, if it is space-time that the VCU reads the authentication state of the PEPS returns, the VCU is used to wait
After second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while prestoring according to itself
Fixed code, antitheft key and the new random number be encrypted to calculate and generate the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted
Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM
The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned
It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit
Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, when the PEPS power supply status are in IGN, the VCU is additionally operable to having been received by key power on signal
When produce one group of random number, the PEPS is transmitted to by the GWM, while the fixed code prestored according to itself, antitheft key
Calculating is encrypted with the random number generate the first data.
Wherein, if key certification is overtime, when the PEPS power supply status are in START, the VCU is additionally operable to connecing
One group of random number is produced when receiving key enabling signal, the PEPS is transmitted to by the GWM, while prestored according to itself
Fixed code, antitheft key and the random number are encrypted calculating and generate the first data.
Wherein, the VCU is used for the fixed code, antitheft key and the random number that prestore according to itself by the micro- of extension
Type AES XTEA is encrypted calculating, generates first data, fixed code that the PEPS is used to being prestored according to itself,
Antitheft key and the random number for receiving are encrypted calculating also by the Tiny Encryption Algorithm XTEA of extension, generate described
Second data.
Wherein, the fixed code that the fixed code and antitheft key that the VCU itself prestores itself prestores respectively with the PEPS
It is consistent with antitheft key.
The beneficial effect of the embodiment of the present invention is:By designing antitheft certification between pure electric vehicle type VCU and PEPS
Interaction flow, the perfect anti-theft authentication method of pure electric vehicle type can effectively improve pure electric automobile burglary-resisting system safety
Property and reliability.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of pure electric automobile anti-theft authentication method of the embodiment of the present invention one.
Fig. 2 is the successful antitheft identifying procedure schematic diagram of certification in the embodiment of the present invention one.
Fig. 3 be in the embodiment of the present invention one PEPS without response when antitheft identifying procedure schematic diagram.
Fig. 4 is the antitheft identifying procedure schematic diagram that PEPS responds busy in the embodiment of the present invention one.
The schematic flow sheet of Fig. 5 antitheft certifications when being communication failure in the embodiment of the present invention one.
Fig. 6 is antitheft identifying procedure schematic diagram when key is mismatched in the embodiment of the present invention one.
Fig. 7 is the antitheft identifying procedure schematic diagram that authentication state is space-time in the embodiment of the present invention one.
Fig. 8 is a kind of structural representation of the antitheft Verification System of the pure electric automobile of the embodiment of the present invention two.
Specific embodiment
The explanation of following embodiment is refer to the attached drawing, can be to the specific embodiment implemented to the example present invention.
Due in pure electric automobile, electromotor is not abundant and necessary power resources:Pure electric vehicle type is not configured and started
Machine, hybrid electric vehicle can still provide for pure electricity traveling in the case of electromotor is idle.Therefore it is original by engine management system
System EMS, gateway module GWM, an anti-theft locking system of engine IMMO without spoon startup/smart entry system PEPS compositions prevent
Certification ring is stolen, needs to be changed to VCU, GWM, PEPS three composition, be i.e. entire car controller VCU needs to substitute original EMS in IMMO
The responsibility of antitheft authenticated connection, realizes corresponding antitheft identifying procedure.
Refer to shown in Fig. 2, the embodiment of the present invention one provides a kind of pure electric automobile anti-theft authentication method, including:
Step S1, entire car controller VCU produces one group of random number, is transmitted to by gateway module GWM and starts/intelligence entrance without spoon
System PEPS, while fixed code, antitheft key and the random number that the VCU prestores according to itself are encrypted calculating generating
First data;
Step S2, fixed code that PEPS prestores according to itself, antitheft key and the random number for receiving are encrypted calculating,
The second data are generated, and the VCU is transmitted to by the GWM;
First data are carried out verification and are compared by step S3, the VCU with second data for returning, and are judged if matching
Antitheft certification success, otherwise judges antitheft authentification failure.
Due to being interacted by CAN signal between VCU and PEPS in the present embodiment, therefore CAN in antitheft verification process is believed
Number carry out defined below:
VCU ends:
Antitheft certification mode signal(Challenge Code):VCU->GWM-PEPS
Message name(Message Name):VCU_IMMO
Message-length(Message Length):8 bytes
ID:0x31
Signal name(Signal Name):VCU_ChallengeCode
Wherein, the random number that VCU sends in the present embodiment is 8 bytes, and it is invalid random that all 8 bytes are all 0x00 or 0xFF
Number, in normal antitheft certification, VCU should not send invalid random number.But when antitheft key is matched without key in VCU,
8 bytes of VCU_ChallengeCode should entirely be set to 0xFF.
Antitheft authentication result signal(VCU released status): VCU->GWM-PEPS
Message name(Message Name):VCU_10_P
Message-length(Message Length):8 bytes
ID: 0x38B
Signal name(Signal Name):VCU_Released
PEPS ends:
PEPS response signals(Response): PEPS->GWM->VCU
Message name(Message Name): GW_IMMO_P
Message-length(Message Length): 8 bytes
ID:0x38
Signal name(Signal Name): GW_IMMO_P
Wherein authentication state(Authentication Status)Implication it is as follows:
According to second data and the check results of VCU of PEPS feedbacks, the antitheft certification of the present embodiment is it is possible that 6 kinds of differences
Situation:Certification success(Successful release), PEPS is without response(PEPS no response), PEPS responses it is busy
(PEPS response busy), communication failure(Communication failure), key mismatch(PEPS failure)
And authentication state is sky(PEPS authentication state error), this 6 kinds of different situations may be in once school
It is alternately present during testing.Illustrate individually below.
As shown in Fig. 2 being the successful flow process of antitheft certification, it is described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes
Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, by the miniature of extension plus
Close algorithm XTEA(Extend Tiny Encryption Algorithm)Calculating is encrypted, the second data are generated, is sent
PEPS_ImmoCode = authentication status + 6 bytes response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)It is valid key that VCU reads authentication state authentication status, then call inside
PepsKeyCal functions, the fixed code prestored by itself, antitheft key ESK and random number are generated again by XTEA algorithms
First data, the second data returned with PEPS are compared, and have passed through verification comparison;
(6)VCU transmission CAN signals VCU_Released=' VCU released', represent eventually through antitheft certification.
Again as shown in figure 3, being that VCU is sent out after random number, can not receive always PEPS response situation, illustrate as
Under:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes
Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)VCU waits the very first time(Time sequence parameter tKeyStatusRx)Afterwards, still without the feedback for receiving PEPS, then VCU thinks
PEPS is without response;
(4)VCU again waited for for the second time(Time sequence parameter tECMAuthDelayRetry)Afterwards, using last time generate that
The random number of 8 bytes of group is constant, and CAN signal VCU_ChallengeCode=8 Bytes Random are sent again
Numbers;
(5)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(6)VCU waits the very first time(Time sequence parameter tKeyStatusRx)Afterwards, the feedback of PEPS is not still received, is then repeated
The(4)Extremely(6)Step, until reaching upper limit number of retries;
(7)VCU send CAN signal VCU_Released=' VCU locked', represent antitheft certification finally not over.
As shown in figure 4, being that VCU is sent out after random number, the response that PEPS is received always is that authentication state is hurried(busy)'s
Situation, is described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes
Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)PEPS due to also key or calculating in the second data searching, therefore send PEPS_ImmoCode=
authentication status(: busy) + 6 bytes response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)It is busy(busy), then waited for the second time(Sequential
Parameter tECMAuthDelayRetry)Afterwards, the random number of that 8 byte of group for being generated using last time is constant, sends CAN signal
VCU_ChallengeCode = 8 Bytes Random Numbers;
(6)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(7)PEPS is still in searching and key or is calculating in the second data, send again PEPS_ImmoCode=
authentication status(: busy) + 6 bytes response;
(8)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(9)VCU receives the authentication state of PEPS(authentication status)It is busy(busy), then VCU repeat the(5)
Extremely(9)Step, until reaching upper limit number of retries;
(10)VCU send CAN signal VCU_Released=' VCU locked', represent antitheft certification finally not over.
As shown in figure 5, being the authentication state that VCU receives PEPS(Authentication status)For Valid
Key, but verify occur when comparing not over situation, i.e. communication failure is described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes
Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms
Computations, generate the second data, send the bytes of PEPS_ImmoCode=authentication status+6
response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)Pass through for key certification(valid key), then adjust
With internal pepsKeyCal functions, by the fixed code prestored by itself, antitheft key and random number again by XTEA algorithms
The first data for generating, the second data returned with PEPS are compared, but compare not over verification;
(6)VCU waited for the second time(Time sequence parameter tECMAuthDelayRetry)Afterwards, one group of new 8 byte is regenerated
Random number, send the Bytes Random Numbers of CAN signal VCU_ChallengeCode=New 8;
(7)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(8)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms
Computations, after the part digit key authentication result in result of calculation is replaced the second data are generated, and send PEPS_
ImmoCode = authentication status + 6 bytes response;
(9)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(10)It is valid key that VCU reads authentication status, then call pepsKeyCal functions, will be by certainly
The first data that fixed code, antitheft key and the new random number that body prestores is generated again by XTEA algorithms, return with PEPS
The second data be compared, if passed through verification compared, be transferred to the(11)Step, if not validated comparison, weighs
Multiple the(6)Extremely(10)Step, until reaching upper limit number of retries, then VCU send CAN signal VCU_Released=' VCU
Locked, represents burglary-resisting system finally not by antitheft certification, and flow process terminates;
(11)VCU transmission CAN signals VCU_Released=' VCU released', represent burglary-resisting system eventually through antitheft
Certification.
As shown in fig. 6, being the authentication state that VCU receives PEPS(authentication status)For key not
Match somebody with somebody(no valid KEY)Situation, be described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes
Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)PEPS has found that key is mismatched, transmission PEPS_ImmoCode=authentication status (: no
valid KEY) + 6 bytes response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)For key mismatch(no valid KEY), then
Send CAN signal VCU_Released=' VCU locked', represent antitheft certification finally not over.
It should be noted that the present embodiment antitheft certification occur after key certification, by after key certification
Carry out antitheft certification.Example shown in Fig. 6 is after into antitheft identifying procedure, to be lost shape outside car in the event of key
Condition, then need incidentally to carry out key certification.
As shown in fig. 7, being the authentication state that VCU receives PEPS(authentication status)For sky(not
defined)Situation, be described as follows:
(1)VCU produces the random number of one group of 8 byte, sends CAN signal VCU_ChallengeCode=8 Bytes
Random Numbers;
(2)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(3)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms
Computations, generate the second data, send the bytes of PEPS_ImmoCode=authentication status+6
response;
(4)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(5)VCU reads authentication state(authentication status)For sky(not defined);
(6)VCU waited for the second time(Time sequence parameter tECMAuthDelayRetry)Afterwards, one group of new 8 byte is regenerated
Random number, send the Bytes Random Numbers of CAN signal VCU_ChallengeCode=New 8;
(7)GWM forwards GWM_ImmoCode=VCU_ChallengeCode to PEPS;
(8)Fixed code that PEPS prestores according to itself, antitheft key and this group of random number for receiving, are carried out by XTEA algorithms
Computations, after the part digit key authentication result in result of calculation is replaced the second data are generated, and send PEPS_
ImmoCode = authentication status + 6 bytes response;
(9)GWM forwards GW_IMMO_P=PEPS_ImmoCode to VCU;
(10)VCU reads authentication state(authentication status)For sky(not defined), then call
PepsKeyCal functions, the fixed code prestored by itself, antitheft key ESK and new random number are given birth to again by XTEA algorithms
Into the first data, the second data returned with PEPS are compared, if passed through verification compared, are transferred to the(11)Step,
If not validated comparison, repeatedly(6)Extremely(10)Step, until reaching upper limit number of retries, then VCU sends CAN signal
VCU_Released=' VCU locked, burglary-resisting system is represented finally not by antitheft certification, flow process terminates;
(11)VCU transmission CAN signals VCU_Released=' VCU released', represent burglary-resisting system eventually through antitheft
Certification.
It is understood that the fixed code that the fixed codes that prestore of VCU itself and antitheft key prestore respectively with PEPS itself
It is consistent with antitheft key, by writing under line.
As it was previously stated, above-mentioned 6 kinds of situation conditions may be alternately present in a checking procedure, and when being alternately present, one
Denier reaches certification success(Successful release)Or key is mismatched(PEPS failure)Condition, directly by VCU_
Released set is ' VCU released' or ' VCU locked';And when constantly replacing under the conditions of other four kinds, need
Constantly repeat to initiate verification, because the repetition initiation upper limit number of times of these four situations is not identical, therefore have identical weight
The situation for having recurred upper limit number of times is multiplexed an identical repetition initiation counting, and any one repetition is initiated counting and reached thereon
All should be by VCU_Released set during limit number of times ' VCU locked'.
It should be noted that, before step S1, user operation activate switch, PEPS set IGN ON relays are in
IGN ON states, VCU detection KeyOn pin voltages, voltage reaches certain value, then starts identifying procedure.If certification does not pass through
Or key certification time-out, in IGN ON states, user operation activate switch, during PEPS set Start Relay, VCU detects Key
Start pin voltages, voltage reaches certain value, and VCU should again initiate the identifying procedure with PEPS.
Thus, the present embodiment also included before step S1:
When the PEPS power supply status are in IGN, if the VCU has been received by key power on signal, execution step S1.
If key certification is overtime, when the PEPS power supply status are in START, the VCU is opened receiving key
Execution step S1 during dynamic signal.
Referring again to shown in Fig. 8, based on the embodiment of the present invention one, the embodiment of the present invention two provides the present invention and also provides a kind of
The antitheft Verification System of pure electric automobile, including:
Entire car controller VCU, gateway module GWM and without spoon startup/smart entry system PEPS, wherein,
The VCU is used to produce one group of random number, the PEPS is transmitted to by the GWM, while what is prestored according to itself consolidates
Determine code, antitheft key and the random number and be encrypted calculating the first data of generation;
Based on the PEPS is encrypted by the fixed code, antitheft key and the random number that receives that are prestored according to itself
Calculate, generate the second data, and the VCU is transmitted to by the GWM;
The VCU is additionally operable to that first data are carried out verification and compared with second data for returning, and judges if matching
Antitheft certification success, otherwise judges antitheft authentification failure.
Wherein, after the VCU forwards the random number to the PEPS by the GWM, if waiting the very first time
The response of the PEPS is not received afterwards, then the random number is transmitted to into institute again by the GWM after waiting for the second time
PEPS is stated, repeats aforementioned process, if until reaching the response that upper limit number of retries does not all receive the PEPS, judgement is anti-
Steal authentification failure.
Wherein, if the PEPS is in searching key or calculate in second data procedures, by the GWM to
The VCU return authentications state is hurried, and the VCU is transmitted to the random number again by the GWM after waiting for the second time
The PEPS, repeats aforementioned process, if being authentication state until reaching upper limit number of retries and receiving the response of the PEPS
It is busy, then judge antitheft authentification failure.
Wherein, if first data compare mismatch with the verification of second data for returning, the VCU is used
After waiting for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while according to certainly
Fixed code, antitheft key and the new random number that body prestores is encrypted to calculate and generates the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted
Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM
The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned
It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit
Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, if the PEPS has found that key is mismatched, key is returned to the VCU by the GWM and is mismatched
Response, the VCU judges antitheft authentification failure.
Wherein, if it is space-time that the VCU reads the authentication state of the PEPS returns, the VCU is used to wait
After second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, while prestoring according to itself
Fixed code, antitheft key and the new random number be encrypted to calculate and generate the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted
Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM
The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned
It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit
Number of times is still mismatched, then judge antitheft authentification failure.
Wherein, when the PEPS power supply status are in IGN, the VCU is additionally operable to having been received by key power on signal
When produce one group of random number, the PEPS is transmitted to by the GWM, while calculating is encrypted to the random number generates the
One data.
Wherein, if key certification is overtime, when the PEPS power supply status are in START, the VCU is additionally operable to connecing
One group of random number is produced when receiving key enabling signal, the PEPS is transmitted to by the GWM, while entering to the random number
Row computations generate the first data.
Wherein, the VCU is used for the fixed code, antitheft key and the random number that prestore according to itself by the micro- of extension
Type AES XTEA is encrypted calculating, generates first data, fixed code that the PEPS is used to being prestored according to itself,
Antitheft key and the random number for receiving are encrypted calculating also by the Tiny Encryption Algorithm XTEA of extension, generate described
Second data.
Wherein, fixed code that the fixed code and antitheft key that VCU itself prestores prestores respectively with PEPS itself and antitheft close
Key is consistent.
Operation principle about the present embodiment and the beneficial effect brought refer to the explanation of the embodiment of the present invention one,
Here is omitted.
By described above, the beneficial effect that the present invention is brought is:By in pure electric vehicle type VCU and
Design the interaction flow of antitheft certification between PEPS, the perfect anti-theft authentication method of pure electric vehicle type can be effectively improved pure
Anti-theft system for electric automobiles safety and reliability.
Above disclosed is only present pre-ferred embodiments, can not limit the right model of the present invention with this certainly
Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.
Claims (18)
1. a kind of pure electric automobile anti-theft authentication method, including:
Step S1, entire car controller VCU produces one group of random number, is transmitted to by gateway module GWM and starts/intelligence entrance without spoon
System PEPS, while fixed code, antitheft key and the random number that the VCU prestores according to itself are encrypted calculating generating
First data;
Step S2, fixed code that PEPS prestores according to itself, antitheft key and the random number for receiving are encrypted calculating,
The second data are generated, and the VCU is transmitted to by the GWM;
First data are carried out verification and are compared by step S3, the VCU with second data for returning, and are judged if matching
Antitheft certification success, otherwise judges antitheft authentification failure.
2. method according to claim 1, it is characterised in that the VCU forwards the random number to institute by the GWM
After stating PEPS, if not receiving the response of the PEPS after waiting the very first time, wait after the second time by it is described with
Machine number is transmitted to the PEPS again by the GWM, repeats aforementioned process, if all do not had until reaching upper limit number of retries
The response of the PEPS is received, then judges antitheft authentification failure.
3. method according to claim 1, it is characterised in that in step S2, if the PEPS is in searching key
Spoon is calculated in second data procedures, then busy to the VCU return authentications state by the GWM, and the VCU waits the
The random number is transmitted to into the PEPS again by the GWM after two times, repeats aforementioned process, if until reached
Limit number of retries receive the PEPS response be authentication state hurry, then judge antitheft authentification failure.
4. method according to claim 1, it is characterised in that in step S3, if first data with return
Second data verification compare mismatch, further include:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together
Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the
One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter
Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute
The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as
Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries
Still mismatch, then judge antitheft authentification failure.
5. method according to claim 1, it is characterised in that in step S2, if the PEPS has found key not
Matching, then return the unmatched response of key by the GWM to the VCU, and the VCU judges antitheft authentification failure.
6. method according to claim 1, it is characterised in that in step S3, if the VCU read it is described
The authentication state that PEPS is returned is space-time, is further included:
After the VCU waited for the second time, one group of new random number is regenerated, the PEPS is transmitted to by the GWM, together
Fixed code, antitheft key and the new random number that Shi Suoshu VCU prestore according to itself is encrypted to calculate and generates new the
One data;
Fixed code that the PEPS prestores according to itself, antitheft key and the described new random number for receiving are encrypted meter
Calculate, part digit key authentication result that will be in result of calculation generates the second new data after replacing, by the GWM by institute
The second new data forwarding is stated to the VCU;
The first new data are carried out verification and are compared by the VCU with the second new data that the PEPS is returned, such as
Fruit matches, and judges antitheft certification success, foregoing schemes is repeated if mismatching, if until reaching upper limit number of retries
Still mismatch, then judge antitheft authentification failure.
7. method according to claim 1, it is characterised in that also included before step S1:
When the PEPS power supply status are in IGN, if the VCU has been received by key power on signal, the step is performed
Rapid S1.
8. method according to claim 7, it is characterised in that if key certification is overtime, when the PEPS power supply status
In START when, the VCU performs step S1 when key enabling signal is received.
9. method according to claim 1, it is characterised in that fixed code, antitheft key that the VCU prestores according to itself
Calculating is encrypted by the Tiny Encryption Algorithm XTEA for extending with the random number, first data, the PEPS is generated
The fixed code that prestored according to itself, antitheft key and the random number that receives also by extension Tiny Encryption Algorithm XTEA
Calculating is encrypted, second data are generated.
10. the antitheft Verification System of a kind of pure electric automobile, it is characterised in that include:
Entire car controller VCU, gateway module GWM and without spoon startup/smart entry system PEPS, wherein,
The VCU is used to produce one group of random number, the PEPS is transmitted to by the GWM, while what is prestored according to itself consolidates
Determine code, antitheft key and the random number and be encrypted calculating the first data of generation;
Based on the PEPS is encrypted by the fixed code, antitheft key and the random number that receives that are prestored according to itself
Calculate, generate the second data, and the VCU is transmitted to by the GWM;
The VCU is additionally operable to that first data are carried out verification and compared with second data for returning, and judges if matching
Antitheft certification success, otherwise judges antitheft authentification failure.
11. systems according to claim 10, it is characterised in that the VCU by the GWM forward the random number to
After the PEPS, if not receiving the response of the PEPS after waiting the very first time, waiting will be described after the second time
Random number is transmitted to the PEPS again by the GWM, repeats aforementioned process, if all do not had until reaching upper limit number of retries
There is the response for receiving the PEPS, then judge antitheft authentification failure.
12. systems according to claim 10, it is characterised in that if the PEPS is in lookup key or calculates described
It is in second data procedures, then busy to the VCU return authentications state by the GWM, by institute after VCU second times of wait
State random number and be transmitted to the PEPS again by the GWM, repeat aforementioned process, if until reaching upper limit number of retries receipts
To the PEPS response be authentication state hurry, then judge antitheft authentification failure.
13. systems according to claim 10, it is characterised in that if first data and second number for returning
According to verification compare mismatch, then the VCU be used for wait the second time after, one group of new random number is regenerated, by institute
State GWM and be transmitted to the PEPS, while the fixed code prestored according to itself, antitheft key and the new random number are encrypted
Calculate and generate the first new data;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted
Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM
The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned
It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit
Number of times is still mismatched, then judge antitheft authentification failure.
14. systems according to claim 10, it is characterised in that if the PEPS has found that key is mismatched, pass through
The GWM to the VCU returns the unmatched response of key, and the VCU judges antitheft authentification failure.
15. systems according to claim 10, it is characterised in that if the VCU reads recognizing for the PEPS returns
Card state is space-time, then after the VCU is used to wait for the second time, regenerate one group of new random number, is turned by the GWM
The PEPS is issued, while the fixed code prestored according to itself, antitheft key and the new random number are encrypted calculating life
First data of Cheng Xin;
Fixed code, antitheft key and the described new random number that receives that the PEPS is used to be prestored according to itself is encrypted
Calculate, after the part digit key authentication result in result of calculation is replaced the second new data are generated, will by the GWM
The second new data forwarding gives the VCU;
The VCU is additionally operable to for the first new data to carry out verification ratio with the second new data that the PEPS is returned
It is right, antitheft certification success is judged if matching, foregoing schemes are repeated if mismatching, if retried until reaching the upper limit
Number of times is still mismatched, then judge antitheft authentification failure.
16. systems according to claim 10, it is characterised in that described when the PEPS power supply status are in IGN
VCU is additionally operable to produce one group of random number when key power on signal is had been received by, and is transmitted to the PEPS by the GWM, together
When the fixed code, antitheft key and the random number that are prestored according to itself be encrypted calculating and generate the first data.
17. systems according to claim 16, it is characterised in that if key certification is overtime, the PEPS power supply status
In START when, the VCU is additionally operable to receiving key enabling signal, one group of random number is then produced in this way, by described
GWM is transmitted to the PEPS, while the fixed code prestored according to itself, antitheft key and the random number are encrypted calculating life
Into the first data.
18. systems according to claim 10, it is characterised in that fixed code that the VCU is used to being prestored according to itself, anti-
Steal key and the random number and calculating is encrypted by the Tiny Encryption Algorithm XTEA for extending, generate first data, institute
State PEPS for the fixed code, antitheft key and the random number that receives that are prestored according to itself also by the miniature of extension plus
Close algorithm XTEA is encrypted calculating, generates second data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611128986.6A CN106627489A (en) | 2016-12-09 | 2016-12-09 | Method and system for anti-theft authentication of pure electric vehicle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611128986.6A CN106627489A (en) | 2016-12-09 | 2016-12-09 | Method and system for anti-theft authentication of pure electric vehicle |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106627489A true CN106627489A (en) | 2017-05-10 |
Family
ID=58825442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611128986.6A Pending CN106627489A (en) | 2016-12-09 | 2016-12-09 | Method and system for anti-theft authentication of pure electric vehicle |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106627489A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108001407A (en) * | 2017-12-12 | 2018-05-08 | 江铃汽车股份有限公司 | A kind of antitheft and powering method of plug-in hybrid-power automobile |
CN108482308A (en) * | 2018-03-30 | 2018-09-04 | 宝沃汽车(中国)有限公司 | Safety control method for electric automobile, device, storage medium and electric vehicle |
CN109080582A (en) * | 2018-08-20 | 2018-12-25 | 北京新能源汽车股份有限公司 | A kind of control method of vehicle launch, control device and automobile |
CN109094516A (en) * | 2018-09-30 | 2018-12-28 | 安徽江淮汽车集团股份有限公司 | A kind of automobile anti-theft method and burglary-resisting system |
CN109194758A (en) * | 2018-09-13 | 2019-01-11 | 江西江铃集团新能源汽车有限公司 | Electric car remote authentication control method and system |
CN109614770A (en) * | 2018-12-24 | 2019-04-12 | 苏州思必驰信息科技有限公司 | Authoring system and method applied to embedded device |
CN109728899A (en) * | 2017-10-30 | 2019-05-07 | 北京长城华冠汽车科技股份有限公司 | A kind of pure electric vehicle authentication key method for managing security and system |
CN110843729A (en) * | 2019-11-29 | 2020-02-28 | 安徽江淮汽车集团股份有限公司 | Vehicle anti-theft method and system |
CN111469803A (en) * | 2020-05-06 | 2020-07-31 | 浙江吉利新能源商用车集团有限公司 | Anti-theft system and anti-theft method for vehicle |
CN111746464A (en) * | 2020-06-30 | 2020-10-09 | 湖南行必达网联科技有限公司 | Matching code generation method and device for anti-theft verification |
CN112339707A (en) * | 2019-08-09 | 2021-02-09 | 广州汽车集团股份有限公司 | ETC vehicle-mounted unit anti-disassembly method and system and automobile |
CN112622822A (en) * | 2020-12-29 | 2021-04-09 | 江苏吉麦新能源车业有限公司 | Vehicle anti-theft system |
CN112693425A (en) * | 2021-01-15 | 2021-04-23 | 江西江铃集团新能源汽车有限公司 | Vehicle anti-theft method, device, storage medium, vehicle control unit and vehicle |
CN113335226A (en) * | 2021-04-27 | 2021-09-03 | 江铃汽车股份有限公司 | Anti-theft matching method and system for hybrid electric vehicle |
CN114248722A (en) * | 2020-09-24 | 2022-03-29 | 长城汽车股份有限公司 | Control method and device and vehicle |
CN115107701A (en) * | 2022-07-26 | 2022-09-27 | 合众新能源汽车有限公司 | Automobile anti-theft authentication method and system |
CN116653854A (en) * | 2023-07-11 | 2023-08-29 | 浙江春风动力股份有限公司 | motorcycle |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130066525A1 (en) * | 2011-09-12 | 2013-03-14 | Filip Tomik | Vehicle shut-down functionality for peps-equipped vehicles |
CN104118392A (en) * | 2013-04-28 | 2014-10-29 | 广州汽车集团股份有限公司 | Engine anti-theft authentication method and device of engine anti-theft system |
CN104590204A (en) * | 2013-10-31 | 2015-05-06 | 北汽福田汽车股份有限公司 | Rotary knob type passive starting method and system for vehicle |
CN106043231A (en) * | 2016-07-13 | 2016-10-26 | 深圳市赛格导航科技股份有限公司 | Automobile remote control system and method based on PEPS |
-
2016
- 2016-12-09 CN CN201611128986.6A patent/CN106627489A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130066525A1 (en) * | 2011-09-12 | 2013-03-14 | Filip Tomik | Vehicle shut-down functionality for peps-equipped vehicles |
CN104118392A (en) * | 2013-04-28 | 2014-10-29 | 广州汽车集团股份有限公司 | Engine anti-theft authentication method and device of engine anti-theft system |
CN104590204A (en) * | 2013-10-31 | 2015-05-06 | 北汽福田汽车股份有限公司 | Rotary knob type passive starting method and system for vehicle |
CN106043231A (en) * | 2016-07-13 | 2016-10-26 | 深圳市赛格导航科技股份有限公司 | Automobile remote control system and method based on PEPS |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109728899A (en) * | 2017-10-30 | 2019-05-07 | 北京长城华冠汽车科技股份有限公司 | A kind of pure electric vehicle authentication key method for managing security and system |
CN108001407A (en) * | 2017-12-12 | 2018-05-08 | 江铃汽车股份有限公司 | A kind of antitheft and powering method of plug-in hybrid-power automobile |
CN108482308A (en) * | 2018-03-30 | 2018-09-04 | 宝沃汽车(中国)有限公司 | Safety control method for electric automobile, device, storage medium and electric vehicle |
CN109080582A (en) * | 2018-08-20 | 2018-12-25 | 北京新能源汽车股份有限公司 | A kind of control method of vehicle launch, control device and automobile |
CN109080582B (en) * | 2018-08-20 | 2020-06-09 | 北京新能源汽车股份有限公司 | Vehicle starting control method and device and automobile |
CN109194758A (en) * | 2018-09-13 | 2019-01-11 | 江西江铃集团新能源汽车有限公司 | Electric car remote authentication control method and system |
CN109094516A (en) * | 2018-09-30 | 2018-12-28 | 安徽江淮汽车集团股份有限公司 | A kind of automobile anti-theft method and burglary-resisting system |
CN109614770A (en) * | 2018-12-24 | 2019-04-12 | 苏州思必驰信息科技有限公司 | Authoring system and method applied to embedded device |
CN112339707A (en) * | 2019-08-09 | 2021-02-09 | 广州汽车集团股份有限公司 | ETC vehicle-mounted unit anti-disassembly method and system and automobile |
CN110843729B (en) * | 2019-11-29 | 2021-06-18 | 安徽江淮汽车集团股份有限公司 | Vehicle anti-theft method and system |
CN110843729A (en) * | 2019-11-29 | 2020-02-28 | 安徽江淮汽车集团股份有限公司 | Vehicle anti-theft method and system |
CN111469803A (en) * | 2020-05-06 | 2020-07-31 | 浙江吉利新能源商用车集团有限公司 | Anti-theft system and anti-theft method for vehicle |
CN111746464A (en) * | 2020-06-30 | 2020-10-09 | 湖南行必达网联科技有限公司 | Matching code generation method and device for anti-theft verification |
CN114248722A (en) * | 2020-09-24 | 2022-03-29 | 长城汽车股份有限公司 | Control method and device and vehicle |
CN112622822A (en) * | 2020-12-29 | 2021-04-09 | 江苏吉麦新能源车业有限公司 | Vehicle anti-theft system |
CN112693425A (en) * | 2021-01-15 | 2021-04-23 | 江西江铃集团新能源汽车有限公司 | Vehicle anti-theft method, device, storage medium, vehicle control unit and vehicle |
CN113335226A (en) * | 2021-04-27 | 2021-09-03 | 江铃汽车股份有限公司 | Anti-theft matching method and system for hybrid electric vehicle |
CN115107701A (en) * | 2022-07-26 | 2022-09-27 | 合众新能源汽车有限公司 | Automobile anti-theft authentication method and system |
CN115107701B (en) * | 2022-07-26 | 2024-02-23 | 合众新能源汽车股份有限公司 | Automobile anti-theft authentication method and system |
CN116653854A (en) * | 2023-07-11 | 2023-08-29 | 浙江春风动力股份有限公司 | motorcycle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106627489A (en) | Method and system for anti-theft authentication of pure electric vehicle | |
US8957760B2 (en) | Electric vehicle theft preventing device | |
CN110126782B (en) | Vehicle intelligent key application method and device | |
CN105844749B (en) | A kind of Automobile handset system for unlocking and its unlocking method | |
CN104118392B (en) | A kind of engine anti-theft authentication method of engine theftproof system and device | |
US5596317A (en) | Vehicle safety device with electronically coded access authorization | |
CN105313837B (en) | Intelligent key matching process and system | |
CN111572493B (en) | Vehicle keyless entry and starting system and method based on Internet of vehicles | |
CN104002765B (en) | A kind of automobile no-key enters startup system and starts method | |
WO2019042128A1 (en) | Anti-theft authentication method for motor vehicle, key-free entrance and start system and anti-theft authentication system | |
CN109862040A (en) | A kind of safety certifying method and Verification System | |
US8978109B2 (en) | Electronic control device for a vehicle | |
CN107187326A (en) | The locked assembly and method of certification unblock comprising electric vehicle power supply equipment | |
US7813773B2 (en) | Electronic key apparatus for vehicle | |
CN101393658A (en) | Central controlled anti-theft method and system for automobile | |
JP2013017140A (en) | On-vehicle network system | |
CN104724057B (en) | A kind of hybrid vehicle electronic locking theft preventing method of high security | |
CN106515657B (en) | A kind of method and system of anti-theft security certification | |
CN113613214A (en) | In-vehicle message authentication key management method and readable storage medium | |
JP2014087198A (en) | Unlock control device | |
CN113830027A (en) | Vehicle control method based on digital key system | |
CN113954681A (en) | Plug-and-charge function authentication system and control method for electric vehicle | |
CN109131218A (en) | Starting method, apparatus, vehicle and the computer readable storage medium of vehicle | |
CN113039747B (en) | Authentication system and authentication method | |
CN104802881A (en) | Motorcycle burglary protection system with remote controller and motorcycle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |
|
RJ01 | Rejection of invention patent application after publication |