CN108039946A - A kind of automobile intelligent key safety control system and control method - Google Patents
A kind of automobile intelligent key safety control system and control method Download PDFInfo
- Publication number
- CN108039946A CN108039946A CN201711322931.3A CN201711322931A CN108039946A CN 108039946 A CN108039946 A CN 108039946A CN 201711322931 A CN201711322931 A CN 201711322931A CN 108039946 A CN108039946 A CN 108039946A
- Authority
- CN
- China
- Prior art keywords
- center
- key
- module
- drive
- drive authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
- G07C2009/005—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a random code
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Power Engineering (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of automobile intelligent key safety control system,Including application program module,Application program module is connected with drive authorization center,It need to be connected during initialization with key controller center,Key controller center is connected with key transceiver module,Key transceiver module is with driving transceiver module wireless connection,Transceiver module is driven to be connected with drive authorization center,Drive authorization center is connected with audio driver module,Audio driver module is connected with Hardware drive module,By using carrier of the elliptic curve cipher system as the authentication calculations between Intelligent key and automobile,Realize the two-way authentication at key controller center and drive authorization center,Random number is added in information bidirectional transmittance process,It ensure that the otherness and freshness of every wheel information,Command code is not easy to be replaced,Step 1 carries out identity the point multiplication operation on elliptic curve,Even if interactive information is stolen,Also automobile intelligent key can not be forged,Ensure that control verification process safety and authentication result it is reliable.
Description
Technical field
The present invention relates to automobile intelligent safety control technology field, more particularly to a kind of automobile intelligent key security control system
System and control method.
Background technology
With the continuous development of auto technology, intelligent, networking becomes the indispensable attribute of automobile, automobile intelligent key
Spoon is the Typical Representative of auto technology, by automobile intelligent key, can realize the automatic locking of car door, engine, vehicle window, day
The automatic opening or closing at the positions such as window, boot, automobile intelligent key progressively become the standard configuration of current all kinds of automobiles.
With widely using, its security is particularly important, can by automobile intelligent key for the popularization of automobile intelligent key
Realize the use mandate to automobile, automobile intelligent key sends or receives by unsafe radio communication channel and Driving control
Interactive information between system is authenticated authorizing, this can cause automotive safety to face unprecedented challenge.
At present, the security control of automobile intelligent key uses rolling code method more, in Intelligent key and automobile verification process,
The key signal that each automobile intelligent key is sent is different, can only be attacked to resist simple playback, this kind of technology provides
Automobile intelligent key safety control system there are security risk, it is such as equal using reproducing process, command code replacement technology is intercepted and captured
It can make certification of the key signal after camouflage by Ride Control System.
The content of the invention
Present invention solves the technical problem that:A kind of automobile intelligent key safety control system and control method are provided, to
Solve the certification between current automobile intelligent key and automobile and use rolling code method, authentication security can difference the problem of.
Technical scheme:
A kind of automobile intelligent key safety control system, including application program module, key controller center, key transmitting-receiving mould
Block, drive transceiver module, drive authorization center, audio driver module and Hardware drive module, the application program module point
It is not connected with drive authorization center and the connection of key controller center, the key controller center is connected with key transceiver module,
The key transceiver module connects with driving transceiver module wireless connection, the driving transceiver module with drive authorization center
Connect, the drive authorization center is connected with audio driver module, and the audio driver module is connected with Hardware drive module.
A kind of automobile intelligent key safety control system, using elliptic curve cipher system as certification meter in control method
The carrier of calculation, ensures reliable, the described control of the safety and authentication result of verification process by difficult sex chromosome mosaicism mathematically
Method comprises the following steps:
Step 1:Application program module initializes key controller center and drive authorization center;
Step 2:Motorist touch-control automobile intelligent key, generation bid value N pass to key controller center;
Step 3:Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and computing is become
Measure B0It is sent to drive authorization center;
Step 4:Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1,
Drive authorization center is by computing variable C0,C1Return to key controller center;
Step 5:Key controller center receives computing variable C0,C1, carry out calculating verification;
Step 6:One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2It is sent to
Drive authorization center;
Step 7:All data in drive authorization central database are calculated, calculates and meets C2=B0The one of condition
Group data, N is to audio driver module for feedback command value;
Step 8:Audio driver module provides prompt tone;
Step 9:Bid value N is sent to Hardware drive module by audio driver module;
Step 10:Hardware drive module is corresponding hardware-initiated according to bid value N, driving.
Application program module described in step 1 initializes key controller center and drive authorization center, including following step
Suddenly:
Step 1.1:Application control module selects a finite field Fq;
Step 1.2:In finite field FqDatum mark P on upper definition one elliptic curve G and elliptic curve G, the wherein rank of P
For n;
Step 1.3:Any is randomly selected on elliptic curve G and is defined as key controller center identification TID;
Step 1.4:By bid value N respectively with TIDDot product is carried out, obtains dot product result X;
Step 1.5:By the datum mark P and the public affairs at drive authorization center on dot product result X and bid value N, elliptic curve G
Key Y shape combines the memory unit at { X, N, P, Y) } write-in key controller center into cartesian product;
Step 1.6:By dot product result X and bid value N, the public key Y at drive authorization center, drive authorization center private key y
And the datum mark p-shaped on elliptic curve G writes drive authorization center, wherein X=into cartesian product combination { X, N, Y, y, P }
NTID, Y=yP.
Key controller center described in step 3 receives bid value N and is calculated, and obtains one group of computing variable B0, and will
Computing variable B0Drive authorization center is sent to, it is further comprising the steps of:
Step 3.1:Key controller centre data pair is contrasted with bid value N, determines to participate in operational data pair;
Step 3.2:Key controller center produces random number s, wherein s ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 3.3:Calculate computing variable B0, calculating formula B0=sP, wherein B0It is computing variable, P is on elliptic curve
Datum mark, s are random numbers;
Step 3.4:Key controller center is by B0Give drive authorization center.
Drive authorization center described in step 4 receives computing variable B0After calculated, obtain other two groups of computing variables
C0,C1, drive authorization center is by computing variable C0,C1Key controller center is returned to, is comprised the following steps:
Step 4.1:Drive authorization center produces random number r, wherein r ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 4.2:Calculate data operation variable C0, calculating formula C0=rB0, wherein r is random number, B0For computing variable;
Step 4.3:Calculate data operation variable C1, calculating formula C1=h (B0, rP), wherein h is from G × G to ZqList
To hash function, B0For computing variable, r is random number, and P is the datum mark on elliptic curve;
Step 4.4:Drive authorization center is by computing variable C0,C1It is sent to key controller center.
Key controller center described in step 5 receives computing variable C0,C1, calculating verification is carried out, it is further comprising the steps of:
Step 5.1:Calculate computing variable B1, calculating formula B1=s-1C0, wherein s-1For inverse, the C of random number s0Become for computing
Amount;
Step 5.2:Verify h (B0,B1)=C1Whether set up, wherein B0、B1、C1For computing variable, h is from G × G to Zq's
One-way hash function;
One group of computing variable B is calculated after being verified described in step 62, key controller center is by computing variable B2Hair
Give drive authorization center, calculating formula B2=sY+NTID, wherein s is random number, and Y is the public key at drive authorization center, and N is life
Make value, TIDKey controller center identification.
Calculating all data in drive authorization central database described in step 7, calculates and meets C2=B0Condition
One group of data, feedback command value is further comprising the steps of to audio driver module:
Step 7.1:First of every group of data centering of drive authorization center search cartesian product combination { X, N, Y, y, P }
Element X ';
Step 7.2:Calculate computing variable C2, calculating formula C2=y-1(B2- X '), wherein B2For computing variable, X ' is flute card
First element of every group of data centering of your product combination { X, N, Y, y, P }, y-1For drive authorization center private key y it is inverse.
Step 7.3:Whether verification X ' meets C2=B0, wherein B0、C2For computing variable;
Step 7.4:N is to audio driver module for feedback command value.
Beneficial effects of the present invention:A kind of automobile intelligent key safety control system and control method are provided, by using
Elliptic curve cipher system realizes key as the authentication calculations carrier between Intelligent key and automobile, wherein step 3 to step 7
Two-way authentication between spoon control centre and drive authorization center, key controller center and drive authorization center were transmitted in information
Random number is added in journey, ensure that the otherness and freshness of every wheel information, command code is not easy during interactive authentication
It is replaced, while the identity at key controller center is concealed in Intelligent key and automobile interaction, step 1 is to identity
Mark carries out the point multiplication operation on elliptic curve, even if interactive information is stolen, can not also forge automobile intelligent key, the present invention
By difficult sex chromosome mosaicism mathematically ensure that control verification process safety and authentication result it is reliable.
Brief description of the drawings
Fig. 1 is automobile intelligent key safety control system function module attachment structure schematic diagram of the present invention;
Fig. 2 is automobile intelligent key safety control system work flow diagram of the present invention;
Fig. 3 is the authentication method flow chart of automobile intelligent key safety control system of the present invention;
Embodiment
A kind of automobile intelligent key safety control system, including application program module, key controller center, key transmitting-receiving mould
Block, drive transceiver module, drive authorization center, audio driver module and Hardware drive module, the application program module with
Drive authorization center connects, and when initialization need to be connected with key controller center, and mould is received and dispatched in the key controller center with key
Block connects, and the key transceiver module is with driving transceiver module wireless connection, the driving transceiver module and drive authorization
Center connects, and the drive authorization center is connected with audio driver module, the audio driver module and hardware driving mould
Block connects.
Application program module, for the initialization operation to automobile intelligent key safety control system, initialization operation is
Key controller center in automobile intelligent key safety control system and the internal storage location at drive authorization center are initialized,
The memory unit is only used for the data at key controller center and drive authorization center to storage, is driven with automobile intelligent key and automobile
It can be independent to sail the memory unit of control system in itself, can also be shared, and the data X of key controller central store is bid value
N respectively with TIDDot product is carried out as a result, the data of drive authorization central store are the public key Y at drive authorization center, in key controller
After computing is good when center and drive authorization center initialize, respectively by data command value N respectively with TIDCarry out dot product result X, drive
Sail the public key Y write-in data pair of authorization center.
Key controller center, for carrying out computing to the data of write-in, and carries out preliminary certification to drive authorization center,
The data of write-in are the bid value that driver's touch-control automobile intelligent key produces, which can be numeral or word
Symbol (takes its ASCII character decimal system to participate in) during computing, by carrying out computing comparison to the data at drive authorization center, realize to driving
The preliminary certification of authorization center is sailed, can prevent Replay Attack.
Key transceiver module, for launching the operation information of key controller center feedback, and receives and drives transceiver module
The information launched, the size of key transceiver module transmitting boundary is related with used wireless communication technique, for example, radio frequency
Identify that the radio frequency identification distance of RFID (Radio Frequency Identification) is different according to application scenarios selection
Label, short distance can arrive 1m to 3m, over long distances can be to more than 30m, and key transceiver module is used to receive the transmitting of drive authorization center
The information to come over, receives distance and is determined by driving transceiver module, and key transceiver module uses one in principle with driving transceiver module
The wireless communication technique of cause.
Transceiver module is driven, for launching the operation information of drive authorization center feedback, and receives key transceiver module
The information launched, the information passed over forms of broadcasting transmitting drive authorization center, the automobile intelligent in range of receiving
Embedded key transceiver module can receive in key.
Drive authorization center, for carrying out computing to the data of write-in, is authenticated key controller center, feeds back through fortune
Calculate definite bid value, by the data of reception participate in computing and feedback op as a result, final authentication by, then feedback command value N,
The data of reception are only involved in drive authorization center current operation step.
Audio driver module, for receiving certification by order, drives car audio hardware, makes a sound, receive and recognize
Card is by order, and the audio driver module driving automobile of automobile itself makes a sound, while devolved authentication is by ordering to hardware
Drive module, after audio driver module receives certification by order, transmits order to Hardware drive module immediately, accordingly even when
Audio sonification system breaks down, and nor affects on Hardware drive module operation.
Hardware drive module, passes through order, the corresponding hardware module of driving automobile, generation action, hardware for receiving certification
Drive module is the function of automobile itself, and only receiving certification in automobile intelligent safety control system passes through order.
A kind of automobile intelligent key safety control system, using elliptic curve cipher system as certification meter in control method
The carrier of calculation, ensures reliable, the described control of the safety and authentication result of verification process by difficult sex chromosome mosaicism mathematically
Method comprises the following steps:
Step 1:Application program module initializes key controller center and drive authorization center, also comprises the following steps:
Step 1.1 application control module selects a finite field Fq;
Step 1.2 is in finite field FqDatum mark P on upper definition one elliptic curve G and elliptic curve G, the wherein rank of P
For n;
Step 1.3 randomly selects any on elliptic curve G and is defined as key controller center identification TID;
Step 1.4 by bid value N respectively with TIDDot product is carried out, obtains dot product result X;
Step 1.5 is by the datum mark P and the public affairs at drive authorization center on dot product result X and bid value N, elliptic curve G
Key Y shape combines the memory unit at { X, N, P, Y) } write-in key controller center into cartesian product;
Step 1.6 by the private key y at dot product result X and bid value N, the public key Y at drive authorization center, drive authorization center with
And the datum mark p-shaped on elliptic curve G writes drive authorization center, wherein X=NT into cartesian product combination { X, N, Y, y, P }ID,
Y=yP;
Step 2:Motorist touch-control automobile intelligent key, generation bid value N pass to key controller center;
Step 3:Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and computing is become
Measure B0Drive authorization center is sent to, is also comprised the following steps:
Step 3.1:Key controller centre data pair is contrasted with bid value N, determines to participate in operational data pair;
Step 3.2:Key controller center produces random number s, wherein s ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 3.3:Calculate computing variable B0, calculating formula B0=sP, wherein B0It is computing variable, P is on elliptic curve
Datum mark, s are random numbers;
Step 3.4:Key controller center is by B0Give drive authorization center;
Step 4:Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1,
Drive authorization center is by computing variable C0,C1Key controller center is returned to, it is further comprising the steps of:
Step 4.1:Drive authorization center produces random number r, wherein r ∈ Zq, ZqFor set of integers in the range of 1~(q-1);
Step 4.2:Calculate data operation variable C0, calculating formula C0=rB0, wherein r is random number, B0For computing variable;
Step 4.3:Calculate data operation variable C1, calculating formula C1=h (B0, rP), wherein h is from G × G to ZqList
To hash function, B0For computing variable, r is random number, and P is the datum mark on elliptic curve;
Step 4.4:Drive authorization center is by computing variable C0,C1It is sent to key controller center;
Step 5:Key controller center receives computing variable C0,C1, calculating verification is carried out, it is further comprising the steps of:
Step 5.1:Calculate computing variable B1, calculating formula B1=s-1C0, wherein s-1For inverse, the C of random number s0Become for computing
Amount;
Step 5.2:Verify h (B0,B1) whether it is equal to C1If equal, step 6 is carried out, otherwise terminates dialogue, wherein
B0、B1、C1For computing variable, h is from G × G to ZqOne-way hash function;
Step 6:One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2It is sent to
Drive authorization center, calculating formula B2=sY+NTID, wherein s is random number, and Y is the public key at drive authorization center, and N is order
Value, TIDKey controller center identification;
Step 7:All data in drive authorization central database are calculated, calculates and meets C2=B0The one of condition
Group data, feedback command value N are further comprising the steps of to audio driver module:
Step 7.1:First of every group of data centering of drive authorization center search cartesian product combination { X, N, Y, y, P }
Element X ';
Step 7.2:Calculate computing variable C2, calculating formula C2=y-1(B2- X '), wherein B2For computing variable, X ' is flute card
First element of every group of data centering of your product combination { X, N, Y, y, P }, y-1For drive authorization center private key y it is inverse.
Step 7.3:Whether verification X ' meets C2=B0, if it is satisfied, then certification is by carrying out step 7.4, otherwise terminating
Session, wherein B0、C2For computing variable;
Step 7.4:N is to audio driver module for feedback command value;
Step 8:Audio driver module provides prompt tone:It is verified, then feedback command value is to audio driver module, audio
Drive module is received then sends corresponding prompt tone by instruction;
Step 9:Bid value N is sent to Hardware drive module by audio driver module;
Step 10:Hardware drive module is corresponding hardware-initiated according to bid value N, driving.
Claims (8)
- A kind of 1. automobile intelligent key safety control system, it is characterised in that:Including application program module, key controller center, Key transceiver module, drive transceiver module, drive authorization center, audio driver module and Hardware drive module, the application Program module is connected with drive authorization center respectively and the connection of key controller center, the key controller center are received and dispatched with key Module connects, and the key transceiver module is awarded with driving transceiver module wireless connection, the driving transceiver module with driving Power center connects, and the drive authorization center is connected with audio driver module, the audio driver module and hardware driving Module connects.
- A kind of 2. automobile intelligent key safety control system, it is characterised in that:The control method comprises the following steps:Step 1:Application program module initializes key controller center and drive authorization center;Step 2:Motorist touch-control automobile intelligent key, generation bid value N pass to key controller center;Step 3:Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and by computing variable B0 It is sent to drive authorization center;Step 4:Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1, drive Authorization center is by computing variable C0,C1Return to key controller center;Step 5:Key controller center receives computing variable C0,C1, carry out calculating verification;Step 6:One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2It is sent to driving Authorization center;Step 7:All data in drive authorization central database are calculated, calculates and meets C2=B0One group of number of condition According to N is to audio driver module for feedback command value;Step 8:Audio driver module provides prompt tone;Step 9:Bid value N is sent to Hardware drive module by audio driver module;Step 10:Hardware drive module is corresponding hardware-initiated according to bid value N, driving.
- A kind of 3. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 1 Application program module initializes key controller center and drive authorization center, comprises the following steps:Step 1.1 application control module selects a finite field Fq;Step 1.2 is in finite field FqDatum mark P on upper definition one elliptic curve G and elliptic curve G, the wherein rank of P is n;Step 1.3 randomly selects any on elliptic curve G and is defined as key controller center identification TID;Step 1.4 by bid value N respectively with TIDDot product is carried out, obtains dot product result X;Step 1.5 is by the datum mark P and the public key Y shape at drive authorization center on dot product result X and bid value N, elliptic curve G Into the memory unit at cartesian product combination { X, N, P, Y) } write-in key controller center;Step 1.6 is by dot product result X and bid value N, the public key Y at drive authorization center, the private key y at drive authorization center and ellipse Datum mark p-shaped on circular curve G writes drive authorization center, wherein X=NT into cartesian product combination { X, N, Y, y, P }ID, Y= yP。
- A kind of 4. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 3 Key controller center receives bid value N and is calculated, and obtains one group of computing variable B0, and by computing variable B0It is sent to driving Authorization center, it is further comprising the steps of:Step 3.1:Key controller centre data pair is contrasted with bid value N, determines to participate in operational data pair;Step 3.2:Key controller center produces random number s, wherein s ∈ Zq, ZqFor set of integers in the range of 1~(q-1);Step 3.3:Calculate computing variable B0, calculating formula B0=sP, wherein B0It is computing variable, P is the benchmark on elliptic curve Point, s are random numbers;Step 3.4:Key controller center is by B0Give drive authorization center.
- A kind of 5. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 4 Drive authorization center receives computing variable B0After calculated, obtain other two groups of computing variables C0,C1, drive authorization center will Computing variable C0,C1Key controller center is returned to, is comprised the following steps:Step 4.1:Drive authorization center produces random number r, wherein r ∈ Zq, ZqFor set of integers in the range of 1~(q-1);Step 4.2:Calculate data operation variable C0, calculating formula C0=rB0, wherein r is random number, B0For computing variable;Step 4.3:Calculate data operation variable C1, calculating formula C1=h (B0, rP), it is that wherein h is from G × G to ZqUnidirectional dissipate Array function, B0For computing variable, r is random number, and P is the datum mark on elliptic curve;Step 4.4:Drive authorization center is by computing variable C0,C1It is sent to and gives key controller center.
- A kind of 6. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 5 Key controller center receives computing variable C0,C1, calculating verification is carried out, it is further comprising the steps of:Step 5.1:Calculate computing variable B1, calculating formula B1=s-1C0, wherein s-1For inverse, the C of random number s0For computing variable;Step 5.2:Verify h (B0,B1)=C1Whether set up, wherein B0、B1、C1For computing variable, h is from G × G to ZqIt is unidirectional Hash function.
- A kind of 7. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 6 One group of computing variable B is calculated after being verified2, key controller center is by computing variable B2Drive authorization center is sent to, is counted Formula is B2=sY+NTID, wherein s is random number, and Y is the public key at drive authorization center, and N is bid value, TIDKey controller center Mark.
- A kind of 8. automobile intelligent key safety control system according to claim 2, it is characterised in that:Described in step 7 To all data in drive authorization central database to calculating, calculate and meet C2=B0One group of data of condition, feedback life Order is worth to audio driver module, further comprising the steps of:Step 7.1:First element of every group of data centering of drive authorization center search cartesian product combination { X, N, Y, y, P } X′;Step 7.2:Calculate computing variable C2, calculating formula C2=y-1(B2- X '), wherein B2For computing variable, X ' is cartesian product Combine first element of every group of data centering of { X, N, Y, y, P }, y-1For drive authorization center private key y it is inverse.Step 7.3:Whether verification X ' meets C2=B0, wherein B0、C2For computing variable;Step 7.4:N is to audio driver module for feedback command value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711322931.3A CN108039946B (en) | 2017-12-12 | 2017-12-12 | Automobile intelligent key safety control system and control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711322931.3A CN108039946B (en) | 2017-12-12 | 2017-12-12 | Automobile intelligent key safety control system and control method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108039946A true CN108039946A (en) | 2018-05-15 |
CN108039946B CN108039946B (en) | 2020-12-08 |
Family
ID=62102559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711322931.3A Active CN108039946B (en) | 2017-12-12 | 2017-12-12 | Automobile intelligent key safety control system and control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108039946B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101014075A (en) * | 2007-03-02 | 2007-08-08 | 中兴通讯股份有限公司 | Anti-theft system and method realized by mobile terminal |
US20100286846A1 (en) * | 2008-02-27 | 2010-11-11 | Chongqing Changan Automobile Co., Ltd. | Vehicle Central Lock Antitheft Method and System |
CN104118392A (en) * | 2013-04-28 | 2014-10-29 | 广州汽车集团股份有限公司 | Engine anti-theft authentication method and device of engine anti-theft system |
CN104527576A (en) * | 2014-08-22 | 2015-04-22 | 东风小康汽车有限公司重庆分公司 | WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal |
CN104724005A (en) * | 2015-01-27 | 2015-06-24 | 刘波 | Intelligent automobile key |
CN104796430A (en) * | 2015-05-05 | 2015-07-22 | 深圳市聚电电子有限公司 | Composite PKE (passive keyless entry) automobile encryption and antitheft system |
CN106274796A (en) * | 2016-08-08 | 2017-01-04 | 清华大学 | A kind of automobile no-key control system |
-
2017
- 2017-12-12 CN CN201711322931.3A patent/CN108039946B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101014075A (en) * | 2007-03-02 | 2007-08-08 | 中兴通讯股份有限公司 | Anti-theft system and method realized by mobile terminal |
US20100286846A1 (en) * | 2008-02-27 | 2010-11-11 | Chongqing Changan Automobile Co., Ltd. | Vehicle Central Lock Antitheft Method and System |
CN104118392A (en) * | 2013-04-28 | 2014-10-29 | 广州汽车集团股份有限公司 | Engine anti-theft authentication method and device of engine anti-theft system |
CN104527576A (en) * | 2014-08-22 | 2015-04-22 | 东风小康汽车有限公司重庆分公司 | WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal |
CN104724005A (en) * | 2015-01-27 | 2015-06-24 | 刘波 | Intelligent automobile key |
CN104796430A (en) * | 2015-05-05 | 2015-07-22 | 深圳市聚电电子有限公司 | Composite PKE (passive keyless entry) automobile encryption and antitheft system |
CN106274796A (en) * | 2016-08-08 | 2017-01-04 | 清华大学 | A kind of automobile no-key control system |
Also Published As
Publication number | Publication date |
---|---|
CN108039946B (en) | 2020-12-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11489665B2 (en) | Systems and methods for a cryptographically guaranteed vehicle identity | |
CN108171430A (en) | Data processing method, mobile unit and UBI analysis centers server | |
WO2019125756A1 (en) | Vehicle secure messages based on a vehicle private key | |
CN104118392B (en) | A kind of engine anti-theft authentication method of engine theftproof system and device | |
CN107085870A (en) | Accessed using encryption method regulation vehicle | |
CN109547972B (en) | Method and apparatus for authenticating vehicles in an inter-vehicle communication environment | |
WO2020211016A1 (en) | Device upgrade method and related device | |
US20190371176A1 (en) | Transferring control of vehicles | |
CN106603470A (en) | Vehicle control method, apparatus, vehicle key generation method and system | |
KR20120057602A (en) | Method, vehicle terminal, biometrics card and system for controlling vehicle through authenticating driver, and method for providing passenger protecting/tracking function using biometrics card and terminal | |
EP3050762B1 (en) | Electronic key registration system | |
CN108401243B (en) | Vehicular ad hoc network message authentication method and system | |
CN113347133B (en) | Authentication method and device of vehicle-mounted equipment | |
CN107483393A (en) | Communication means, server and the communication system of car networking | |
CN114205091A (en) | Chaos mapping-based network authentication and key agreement method for automatic driving vehicle | |
US9912475B2 (en) | Vehicular entropy for random number generation | |
US20230389095A1 (en) | Enhanced wireless connectivity | |
CN111179470A (en) | Virtual key sharing method, device, equipment, system and storage medium | |
CN107640124B (en) | Onboard safety systems | |
CN108039946A (en) | A kind of automobile intelligent key safety control system and control method | |
US9656630B2 (en) | Control system and control method for vehicle anti-theft | |
CN112440935A (en) | Vehicle Bluetooth key authorization method, device, system and storage medium | |
CN116155579A (en) | Secure communication method, system, storage medium and vehicle | |
US20190371104A1 (en) | Temporary and customized vehicle access | |
CN116170803A (en) | System and method for securely managing vehicle information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |