CN108039946A - A kind of automobile intelligent key safety control system and control method - Google Patents

A kind of automobile intelligent key safety control system and control method Download PDF

Info

Publication number
CN108039946A
CN108039946A CN201711322931.3A CN201711322931A CN108039946A CN 108039946 A CN108039946 A CN 108039946A CN 201711322931 A CN201711322931 A CN 201711322931A CN 108039946 A CN108039946 A CN 108039946A
Authority
CN
China
Prior art keywords
center
key
module
drive
drive authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711322931.3A
Other languages
Chinese (zh)
Other versions
CN108039946B (en
Inventor
杨玉龙
郑少波
朱义杰
李帅
成建宏
杨义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Aerospace Institute of Measuring and Testing Technology
Original Assignee
Guizhou Aerospace Institute of Measuring and Testing Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Aerospace Institute of Measuring and Testing Technology filed Critical Guizhou Aerospace Institute of Measuring and Testing Technology
Priority to CN201711322931.3A priority Critical patent/CN108039946B/en
Publication of CN108039946A publication Critical patent/CN108039946A/en
Application granted granted Critical
Publication of CN108039946B publication Critical patent/CN108039946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/005Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a random code

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Power Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of automobile intelligent key safety control system,Including application program module,Application program module is connected with drive authorization center,It need to be connected during initialization with key controller center,Key controller center is connected with key transceiver module,Key transceiver module is with driving transceiver module wireless connection,Transceiver module is driven to be connected with drive authorization center,Drive authorization center is connected with audio driver module,Audio driver module is connected with Hardware drive module,By using carrier of the elliptic curve cipher system as the authentication calculations between Intelligent key and automobile,Realize the two-way authentication at key controller center and drive authorization center,Random number is added in information bidirectional transmittance process,It ensure that the otherness and freshness of every wheel information,Command code is not easy to be replaced,Step 1 carries out identity the point multiplication operation on elliptic curve,Even if interactive information is stolen,Also automobile intelligent key can not be forged,Ensure that control verification process safety and authentication result it is reliable.

Description

A kind of automobile intelligent key safety control system and control method
Technical field
The present invention relates to automobile intelligent safety control technology field, more particularly to a kind of automobile intelligent key security control system System and control method.
Background technology
With the continuous development of auto technology, intelligent, networking becomes the indispensable attribute of automobile, automobile intelligent key Spoon is the Typical Representative of auto technology, by automobile intelligent key, can realize the automatic locking of car door, engine, vehicle window, day The automatic opening or closing at the positions such as window, boot, automobile intelligent key progressively become the standard configuration of current all kinds of automobiles.
With widely using, its security is particularly important, can by automobile intelligent key for the popularization of automobile intelligent key Realize the use mandate to automobile, automobile intelligent key sends or receives by unsafe radio communication channel and Driving control Interactive information between system is authenticated authorizing, this can cause automotive safety to face unprecedented challenge.
At present, the security control of automobile intelligent key uses rolling code method more, in Intelligent key and automobile verification process, The key signal that each automobile intelligent key is sent is different, can only be attacked to resist simple playback, this kind of technology provides Automobile intelligent key safety control system there are security risk, it is such as equal using reproducing process, command code replacement technology is intercepted and captured It can make certification of the key signal after camouflage by Ride Control System.
The content of the invention
Present invention solves the technical problem that:A kind of automobile intelligent key safety control system and control method are provided, to Solve the certification between current automobile intelligent key and automobile and use rolling code method, authentication security can difference the problem of.
Technical scheme:
A kind of automobile intelligent key safety control system, including application program module, key controller center, key transmitting-receiving mould Block, drive transceiver module, drive authorization center, audio driver module and Hardware drive module, the application program module point It is not connected with drive authorization center and the connection of key controller center, the key controller center is connected with key transceiver module, The key transceiver module connects with driving transceiver module wireless connection, the driving transceiver module with drive authorization center Connect, the drive authorization center is connected with audio driver module, and the audio driver module is connected with Hardware drive module.
A kind of automobile intelligent key safety control system, using elliptic curve cipher system as certification meter in control method The carrier of calculation, ensures reliable, the described control of the safety and authentication result of verification process by difficult sex chromosome mosaicism mathematically Method comprises the following steps:
Step 1:Application program module initializes key controller center and drive authorization center;
Step 2:Motorist touch-control automobile intelligent key, generation bid value N pass to key controller center;
Step 3:Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and computing is become Measure B0It is sent to drive authorization center;
Step 4:Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1, Drive authorization center is by computing variable C0,C1Return to key controller center;
Step 5:Key controller center receives computing variable C0,C1, carry out calculating verification;
Step 6:One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2It is sent to Drive authorization center;
Step 7:All data in drive authorization central database are calculated, calculates and meets C2=B0The one of condition Group data, N is to audio driver module for feedback command value;
Step 8:Audio driver module provides prompt tone;
Step 9:Bid value N is sent to Hardware drive module by audio driver module;
Step 10:Hardware drive module is corresponding hardware-initiated according to bid value N, driving.
Application program module described in step 1 initializes key controller center and drive authorization center, including following step Suddenly:
Step 1.1:Application control module selects a finite field Fq
Step 1.2:In finite field FqDatum mark P on upper definition one elliptic curve G and elliptic curve G, the wherein rank of P For n;
Step 1.3:Any is randomly selected on elliptic curve G and is defined as key controller center identification TID
Step 1.4:By bid value N respectively with TIDDot product is carried out, obtains dot product result X;
Step 1.5:By the datum mark P and the public affairs at drive authorization center on dot product result X and bid value N, elliptic curve G Key Y shape combines the memory unit at { X, N, P, Y) } write-in key controller center into cartesian product;
Step 1.6:By dot product result X and bid value N, the public key Y at drive authorization center, drive authorization center private key y And the datum mark p-shaped on elliptic curve G writes drive authorization center, wherein X=into cartesian product combination { X, N, Y, y, P } NTID, Y=yP.
Key controller center described in step 3 receives bid value N and is calculated, and obtains one group of computing variable B0, and will Computing variable B0Drive authorization center is sent to, it is further comprising the steps of:
Step 3.1:Key controller centre data pair is contrasted with bid value N, determines to participate in operational data pair;
Step 3.2:Key controller center produces random number s, wherein s ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 3.3:Calculate computing variable B0, calculating formula B0=sP, wherein B0It is computing variable, P is on elliptic curve Datum mark, s are random numbers;
Step 3.4:Key controller center is by B0Give drive authorization center.
Drive authorization center described in step 4 receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1, drive authorization center is by computing variable C0,C1Key controller center is returned to, is comprised the following steps:
Step 4.1:Drive authorization center produces random number r, wherein r ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 4.2:Calculate data operation variable C0, calculating formula C0=rB0, wherein r is random number, B0For computing variable;
Step 4.3:Calculate data operation variable C1, calculating formula C1=h (B0, rP), wherein h is from G × G to ZqList To hash function, B0For computing variable, r is random number, and P is the datum mark on elliptic curve;
Step 4.4:Drive authorization center is by computing variable C0,C1It is sent to key controller center.
Key controller center described in step 5 receives computing variable C0,C1, calculating verification is carried out, it is further comprising the steps of:
Step 5.1:Calculate computing variable B1, calculating formula B1=s-1C0, wherein s-1For inverse, the C of random number s0Become for computing Amount;
Step 5.2:Verify h (B0,B1)=C1Whether set up, wherein B0、B1、C1For computing variable, h is from G × G to Zq's One-way hash function;
One group of computing variable B is calculated after being verified described in step 62, key controller center is by computing variable B2Hair Give drive authorization center, calculating formula B2=sY+NTID, wherein s is random number, and Y is the public key at drive authorization center, and N is life Make value, TIDKey controller center identification.
Calculating all data in drive authorization central database described in step 7, calculates and meets C2=B0Condition One group of data, feedback command value is further comprising the steps of to audio driver module:
Step 7.1:First of every group of data centering of drive authorization center search cartesian product combination { X, N, Y, y, P } Element X ';
Step 7.2:Calculate computing variable C2, calculating formula C2=y-1(B2- X '), wherein B2For computing variable, X ' is flute card First element of every group of data centering of your product combination { X, N, Y, y, P }, y-1For drive authorization center private key y it is inverse.
Step 7.3:Whether verification X ' meets C2=B0, wherein B0、C2For computing variable;
Step 7.4:N is to audio driver module for feedback command value.
Beneficial effects of the present invention:A kind of automobile intelligent key safety control system and control method are provided, by using Elliptic curve cipher system realizes key as the authentication calculations carrier between Intelligent key and automobile, wherein step 3 to step 7 Two-way authentication between spoon control centre and drive authorization center, key controller center and drive authorization center were transmitted in information Random number is added in journey, ensure that the otherness and freshness of every wheel information, command code is not easy during interactive authentication It is replaced, while the identity at key controller center is concealed in Intelligent key and automobile interaction, step 1 is to identity Mark carries out the point multiplication operation on elliptic curve, even if interactive information is stolen, can not also forge automobile intelligent key, the present invention By difficult sex chromosome mosaicism mathematically ensure that control verification process safety and authentication result it is reliable.
Brief description of the drawings
Fig. 1 is automobile intelligent key safety control system function module attachment structure schematic diagram of the present invention;
Fig. 2 is automobile intelligent key safety control system work flow diagram of the present invention;
Fig. 3 is the authentication method flow chart of automobile intelligent key safety control system of the present invention;
Embodiment
A kind of automobile intelligent key safety control system, including application program module, key controller center, key transmitting-receiving mould Block, drive transceiver module, drive authorization center, audio driver module and Hardware drive module, the application program module with Drive authorization center connects, and when initialization need to be connected with key controller center, and mould is received and dispatched in the key controller center with key Block connects, and the key transceiver module is with driving transceiver module wireless connection, the driving transceiver module and drive authorization Center connects, and the drive authorization center is connected with audio driver module, the audio driver module and hardware driving mould Block connects.
Application program module, for the initialization operation to automobile intelligent key safety control system, initialization operation is Key controller center in automobile intelligent key safety control system and the internal storage location at drive authorization center are initialized, The memory unit is only used for the data at key controller center and drive authorization center to storage, is driven with automobile intelligent key and automobile It can be independent to sail the memory unit of control system in itself, can also be shared, and the data X of key controller central store is bid value N respectively with TIDDot product is carried out as a result, the data of drive authorization central store are the public key Y at drive authorization center, in key controller After computing is good when center and drive authorization center initialize, respectively by data command value N respectively with TIDCarry out dot product result X, drive Sail the public key Y write-in data pair of authorization center.
Key controller center, for carrying out computing to the data of write-in, and carries out preliminary certification to drive authorization center, The data of write-in are the bid value that driver's touch-control automobile intelligent key produces, which can be numeral or word Symbol (takes its ASCII character decimal system to participate in) during computing, by carrying out computing comparison to the data at drive authorization center, realize to driving The preliminary certification of authorization center is sailed, can prevent Replay Attack.
Key transceiver module, for launching the operation information of key controller center feedback, and receives and drives transceiver module The information launched, the size of key transceiver module transmitting boundary is related with used wireless communication technique, for example, radio frequency Identify that the radio frequency identification distance of RFID (Radio Frequency Identification) is different according to application scenarios selection Label, short distance can arrive 1m to 3m, over long distances can be to more than 30m, and key transceiver module is used to receive the transmitting of drive authorization center The information to come over, receives distance and is determined by driving transceiver module, and key transceiver module uses one in principle with driving transceiver module The wireless communication technique of cause.
Transceiver module is driven, for launching the operation information of drive authorization center feedback, and receives key transceiver module The information launched, the information passed over forms of broadcasting transmitting drive authorization center, the automobile intelligent in range of receiving Embedded key transceiver module can receive in key.
Drive authorization center, for carrying out computing to the data of write-in, is authenticated key controller center, feeds back through fortune Calculate definite bid value, by the data of reception participate in computing and feedback op as a result, final authentication by, then feedback command value N, The data of reception are only involved in drive authorization center current operation step.
Audio driver module, for receiving certification by order, drives car audio hardware, makes a sound, receive and recognize Card is by order, and the audio driver module driving automobile of automobile itself makes a sound, while devolved authentication is by ordering to hardware Drive module, after audio driver module receives certification by order, transmits order to Hardware drive module immediately, accordingly even when Audio sonification system breaks down, and nor affects on Hardware drive module operation.
Hardware drive module, passes through order, the corresponding hardware module of driving automobile, generation action, hardware for receiving certification Drive module is the function of automobile itself, and only receiving certification in automobile intelligent safety control system passes through order.
A kind of automobile intelligent key safety control system, using elliptic curve cipher system as certification meter in control method The carrier of calculation, ensures reliable, the described control of the safety and authentication result of verification process by difficult sex chromosome mosaicism mathematically Method comprises the following steps:
Step 1:Application program module initializes key controller center and drive authorization center, also comprises the following steps:
Step 1.1 application control module selects a finite field Fq
Step 1.2 is in finite field FqDatum mark P on upper definition one elliptic curve G and elliptic curve G, the wherein rank of P For n;
Step 1.3 randomly selects any on elliptic curve G and is defined as key controller center identification TID
Step 1.4 by bid value N respectively with TIDDot product is carried out, obtains dot product result X;
Step 1.5 is by the datum mark P and the public affairs at drive authorization center on dot product result X and bid value N, elliptic curve G Key Y shape combines the memory unit at { X, N, P, Y) } write-in key controller center into cartesian product;
Step 1.6 by the private key y at dot product result X and bid value N, the public key Y at drive authorization center, drive authorization center with And the datum mark p-shaped on elliptic curve G writes drive authorization center, wherein X=NT into cartesian product combination { X, N, Y, y, P }ID, Y=yP;
Step 2:Motorist touch-control automobile intelligent key, generation bid value N pass to key controller center;
Step 3:Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and computing is become Measure B0Drive authorization center is sent to, is also comprised the following steps:
Step 3.1:Key controller centre data pair is contrasted with bid value N, determines to participate in operational data pair;
Step 3.2:Key controller center produces random number s, wherein s ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 3.3:Calculate computing variable B0, calculating formula B0=sP, wherein B0It is computing variable, P is on elliptic curve Datum mark, s are random numbers;
Step 3.4:Key controller center is by B0Give drive authorization center;
Step 4:Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1, Drive authorization center is by computing variable C0,C1Key controller center is returned to, it is further comprising the steps of:
Step 4.1:Drive authorization center produces random number r, wherein r ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 4.2:Calculate data operation variable C0, calculating formula C0=rB0, wherein r is random number, B0For computing variable;
Step 4.3:Calculate data operation variable C1, calculating formula C1=h (B0, rP), wherein h is from G × G to ZqList To hash function, B0For computing variable, r is random number, and P is the datum mark on elliptic curve;
Step 4.4:Drive authorization center is by computing variable C0,C1It is sent to key controller center;
Step 5:Key controller center receives computing variable C0,C1, calculating verification is carried out, it is further comprising the steps of:
Step 5.1:Calculate computing variable B1, calculating formula B1=s-1C0, wherein s-1For inverse, the C of random number s0Become for computing Amount;
Step 5.2:Verify h (B0,B1) whether it is equal to C1If equal, step 6 is carried out, otherwise terminates dialogue, wherein B0、B1、C1For computing variable, h is from G × G to ZqOne-way hash function;
Step 6:One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2It is sent to Drive authorization center, calculating formula B2=sY+NTID, wherein s is random number, and Y is the public key at drive authorization center, and N is order Value, TIDKey controller center identification;
Step 7:All data in drive authorization central database are calculated, calculates and meets C2=B0The one of condition Group data, feedback command value N are further comprising the steps of to audio driver module:
Step 7.1:First of every group of data centering of drive authorization center search cartesian product combination { X, N, Y, y, P } Element X ';
Step 7.2:Calculate computing variable C2, calculating formula C2=y-1(B2- X '), wherein B2For computing variable, X ' is flute card First element of every group of data centering of your product combination { X, N, Y, y, P }, y-1For drive authorization center private key y it is inverse.
Step 7.3:Whether verification X ' meets C2=B0, if it is satisfied, then certification is by carrying out step 7.4, otherwise terminating Session, wherein B0、C2For computing variable;
Step 7.4:N is to audio driver module for feedback command value;
Step 8:Audio driver module provides prompt tone:It is verified, then feedback command value is to audio driver module, audio Drive module is received then sends corresponding prompt tone by instruction;
Step 9:Bid value N is sent to Hardware drive module by audio driver module;
Step 10:Hardware drive module is corresponding hardware-initiated according to bid value N, driving.

Claims (8)

  1. A kind of 1. automobile intelligent key safety control system, it is characterised in that:Including application program module, key controller center, Key transceiver module, drive transceiver module, drive authorization center, audio driver module and Hardware drive module, the application Program module is connected with drive authorization center respectively and the connection of key controller center, the key controller center are received and dispatched with key Module connects, and the key transceiver module is awarded with driving transceiver module wireless connection, the driving transceiver module with driving Power center connects, and the drive authorization center is connected with audio driver module, the audio driver module and hardware driving Module connects.
  2. A kind of 2. automobile intelligent key safety control system, it is characterised in that:The control method comprises the following steps:
    Step 1:Application program module initializes key controller center and drive authorization center;
    Step 2:Motorist touch-control automobile intelligent key, generation bid value N pass to key controller center;
    Step 3:Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and by computing variable B0 It is sent to drive authorization center;
    Step 4:Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1, drive Authorization center is by computing variable C0,C1Return to key controller center;
    Step 5:Key controller center receives computing variable C0,C1, carry out calculating verification;
    Step 6:One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2It is sent to driving Authorization center;
    Step 7:All data in drive authorization central database are calculated, calculates and meets C2=B0One group of number of condition According to N is to audio driver module for feedback command value;
    Step 8:Audio driver module provides prompt tone;
    Step 9:Bid value N is sent to Hardware drive module by audio driver module;
    Step 10:Hardware drive module is corresponding hardware-initiated according to bid value N, driving.
  3. A kind of 3. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 1 Application program module initializes key controller center and drive authorization center, comprises the following steps:
    Step 1.1 application control module selects a finite field Fq
    Step 1.2 is in finite field FqDatum mark P on upper definition one elliptic curve G and elliptic curve G, the wherein rank of P is n;
    Step 1.3 randomly selects any on elliptic curve G and is defined as key controller center identification TID
    Step 1.4 by bid value N respectively with TIDDot product is carried out, obtains dot product result X;
    Step 1.5 is by the datum mark P and the public key Y shape at drive authorization center on dot product result X and bid value N, elliptic curve G Into the memory unit at cartesian product combination { X, N, P, Y) } write-in key controller center;
    Step 1.6 is by dot product result X and bid value N, the public key Y at drive authorization center, the private key y at drive authorization center and ellipse Datum mark p-shaped on circular curve G writes drive authorization center, wherein X=NT into cartesian product combination { X, N, Y, y, P }ID, Y= yP。
  4. A kind of 4. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 3 Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and by computing variable B0It is sent to driving Authorization center, it is further comprising the steps of:
    Step 3.1:Key controller centre data pair is contrasted with bid value N, determines to participate in operational data pair;
    Step 3.2:Key controller center produces random number s, wherein s ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
    Step 3.3:Calculate computing variable B0, calculating formula B0=sP, wherein B0It is computing variable, P is the benchmark on elliptic curve Point, s are random numbers;
    Step 3.4:Key controller center is by B0Give drive authorization center.
  5. A kind of 5. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 4 Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1, drive authorization center will Computing variable C0,C1Key controller center is returned to, is comprised the following steps:
    Step 4.1:Drive authorization center produces random number r, wherein r ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
    Step 4.2:Calculate data operation variable C0, calculating formula C0=rB0, wherein r is random number, B0For computing variable;
    Step 4.3:Calculate data operation variable C1, calculating formula C1=h (B0, rP), it is that wherein h is from G × G to ZqUnidirectional dissipate Array function, B0For computing variable, r is random number, and P is the datum mark on elliptic curve;
    Step 4.4:Drive authorization center is by computing variable C0,C1It is sent to and gives key controller center.
  6. A kind of 6. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 5 Key controller center receives computing variable C0,C1, calculating verification is carried out, it is further comprising the steps of:
    Step 5.1:Calculate computing variable B1, calculating formula B1=s-1C0, wherein s-1For inverse, the C of random number s0For computing variable;
    Step 5.2:Verify h (B0,B1)=C1Whether set up, wherein B0、B1、C1For computing variable, h is from G × G to ZqIt is unidirectional Hash function.
  7. A kind of 7. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 6 One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2Drive authorization center is sent to, is counted Formula is B2=sY+NTID, wherein s is random number, and Y is the public key at drive authorization center, and N is bid value, TIDKey controller center Mark.
  8. A kind of 8. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 7 To all data in drive authorization central database to calculating, calculate and meet C2=B0One group of data of condition, feedback life Order is worth to audio driver module, further comprising the steps of:
    Step 7.1:First element of every group of data centering of drive authorization center search cartesian product combination { X, N, Y, y, P } X′;
    Step 7.2:Calculate computing variable C2, calculating formula C2=y-1(B2- X '), wherein B2For computing variable, X ' is cartesian product Combine first element of every group of data centering of { X, N, Y, y, P }, y-1For drive authorization center private key y it is inverse.
    Step 7.3:Whether verification X ' meets C2=B0, wherein B0、C2For computing variable;
    Step 7.4:N is to audio driver module for feedback command value.
CN201711322931.3A 2017-12-12 2017-12-12 Automobile intelligent key safety control system and control method Active CN108039946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711322931.3A CN108039946B (en) 2017-12-12 2017-12-12 Automobile intelligent key safety control system and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711322931.3A CN108039946B (en) 2017-12-12 2017-12-12 Automobile intelligent key safety control system and control method

Publications (2)

Publication Number Publication Date
CN108039946A true CN108039946A (en) 2018-05-15
CN108039946B CN108039946B (en) 2020-12-08

Family

ID=62102559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711322931.3A Active CN108039946B (en) 2017-12-12 2017-12-12 Automobile intelligent key safety control system and control method

Country Status (1)

Country Link
CN (1) CN108039946B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014075A (en) * 2007-03-02 2007-08-08 中兴通讯股份有限公司 Anti-theft system and method realized by mobile terminal
US20100286846A1 (en) * 2008-02-27 2010-11-11 Chongqing Changan Automobile Co., Ltd. Vehicle Central Lock Antitheft Method and System
CN104118392A (en) * 2013-04-28 2014-10-29 广州汽车集团股份有限公司 Engine anti-theft authentication method and device of engine anti-theft system
CN104527576A (en) * 2014-08-22 2015-04-22 东风小康汽车有限公司重庆分公司 WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal
CN104724005A (en) * 2015-01-27 2015-06-24 刘波 Intelligent automobile key
CN104796430A (en) * 2015-05-05 2015-07-22 深圳市聚电电子有限公司 Composite PKE (passive keyless entry) automobile encryption and antitheft system
CN106274796A (en) * 2016-08-08 2017-01-04 清华大学 A kind of automobile no-key control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101014075A (en) * 2007-03-02 2007-08-08 中兴通讯股份有限公司 Anti-theft system and method realized by mobile terminal
US20100286846A1 (en) * 2008-02-27 2010-11-11 Chongqing Changan Automobile Co., Ltd. Vehicle Central Lock Antitheft Method and System
CN104118392A (en) * 2013-04-28 2014-10-29 广州汽车集团股份有限公司 Engine anti-theft authentication method and device of engine anti-theft system
CN104527576A (en) * 2014-08-22 2015-04-22 东风小康汽车有限公司重庆分公司 WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal
CN104724005A (en) * 2015-01-27 2015-06-24 刘波 Intelligent automobile key
CN104796430A (en) * 2015-05-05 2015-07-22 深圳市聚电电子有限公司 Composite PKE (passive keyless entry) automobile encryption and antitheft system
CN106274796A (en) * 2016-08-08 2017-01-04 清华大学 A kind of automobile no-key control system

Also Published As

Publication number Publication date
CN108039946B (en) 2020-12-08

Similar Documents

Publication Publication Date Title
US11489665B2 (en) Systems and methods for a cryptographically guaranteed vehicle identity
CN108171430A (en) Data processing method, mobile unit and UBI analysis centers server
WO2019125756A1 (en) Vehicle secure messages based on a vehicle private key
CN104118392B (en) A kind of engine anti-theft authentication method of engine theftproof system and device
CN107085870A (en) Accessed using encryption method regulation vehicle
CN109547972B (en) Method and apparatus for authenticating vehicles in an inter-vehicle communication environment
WO2020211016A1 (en) Device upgrade method and related device
US20190371176A1 (en) Transferring control of vehicles
CN106603470A (en) Vehicle control method, apparatus, vehicle key generation method and system
KR20120057602A (en) Method, vehicle terminal, biometrics card and system for controlling vehicle through authenticating driver, and method for providing passenger protecting/tracking function using biometrics card and terminal
EP3050762B1 (en) Electronic key registration system
CN108401243B (en) Vehicular ad hoc network message authentication method and system
CN113347133B (en) Authentication method and device of vehicle-mounted equipment
CN107483393A (en) Communication means, server and the communication system of car networking
CN114205091A (en) Chaos mapping-based network authentication and key agreement method for automatic driving vehicle
US9912475B2 (en) Vehicular entropy for random number generation
US20230389095A1 (en) Enhanced wireless connectivity
CN111179470A (en) Virtual key sharing method, device, equipment, system and storage medium
CN107640124B (en) Onboard safety systems
CN108039946A (en) A kind of automobile intelligent key safety control system and control method
US9656630B2 (en) Control system and control method for vehicle anti-theft
CN112440935A (en) Vehicle Bluetooth key authorization method, device, system and storage medium
CN116155579A (en) Secure communication method, system, storage medium and vehicle
US20190371104A1 (en) Temporary and customized vehicle access
CN116170803A (en) System and method for securely managing vehicle information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant