CN108791190A - 单向密钥卡和交通工具配对的验证、保留及撤销 - Google Patents

单向密钥卡和交通工具配对的验证、保留及撤销 Download PDF

Info

Publication number
CN108791190A
CN108791190A CN201810651002.5A CN201810651002A CN108791190A CN 108791190 A CN108791190 A CN 108791190A CN 201810651002 A CN201810651002 A CN 201810651002A CN 108791190 A CN108791190 A CN 108791190A
Authority
CN
China
Prior art keywords
control unit
key card
opkey
counter
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810651002.5A
Other languages
English (en)
Other versions
CN108791190B (zh
Inventor
J-M·霍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Texas Instruments Inc
Original Assignee
Texas Instruments Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Texas Instruments Inc filed Critical Texas Instruments Inc
Publication of CN108791190A publication Critical patent/CN108791190A/zh
Application granted granted Critical
Publication of CN108791190B publication Critical patent/CN108791190B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mechanical Engineering (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本发明实施例提供了用于密钥卡进行控制单元验证、保留和撤销的方法。在密钥卡(201,202)与控制单元(204)之间的初始配对之后,设备就共享秘密的操作密钥(OpKey1,2)。对于验证,密钥卡将128位计数器的8个最低阶位和计数器(208,209)的AES‑128OpKey加密值的一些位发送到控制单元(204)。对于密钥撤销和保留,控制单元(204)经提示进入OpKey保留和撤销模式。随后,由用户提示剩余的或新的密钥卡(201,202)中的每一个将验证消息(105)发送到控制单元(204)。当控制单元(204)经提示离开OpKey保留和撤销模式时,其仅保留刚好在进入和离开OpKey保留和撤销模式之前发送有效验证消息(105)的密钥卡(201,202)的OpKey。

Description

单向密钥卡和交通工具配对的验证、保留及撤销
本申请是分案申请,原申请的申请日为2013年08月30日,申请号为201380043120.3,发明名称为“单向密钥卡和交通工具配对的验证、保留及撤销”。
技术领域
本发明总体涉及安全性,并且更具体地涉及用于密钥卡(key fob)交通工具操作的密钥验证、保留及撤销的方法。
背景技术
密钥卡可以与控制单元诸如交通工具控制单元配对,以执行众所周知的动作,诸如打开/关闭和锁定/解锁交通工具门。密钥卡可以仅能够发送,由于不能双向通信,所以其限制了通过从控制单元发送的询问消息来验证由密钥卡所发送的命令可用的认证过程。控制单元必须能够验证所接收命令的有效性并且拒绝未授权命令,包括回放来自有效密钥卡的较早发送。
偶尔,密钥卡将丢失,或者其持有人可能不再被授权访问控制单元。在这种情况下,就必须有允许控制单元识别哪些密钥卡仍然有效以及哪些密钥卡应被忽略的过程。
发明内容
所描述的实施例提供了用于密钥卡进行控制单元验证、保留及撤销的方法。在初始配对之后,密钥卡和交通工具单元共享秘密的操作密钥(OpKey)。对于验证,密钥卡将标识符发送到控制单元,该标识符可以为128位计数器的8个最低阶位以及计数器的AES-128OpKey加密值的一些位(bit)。
在一个或多个密钥卡与诸如交通工具控制单元的控制单元配对之后,密钥卡各自具有与控制单元秘密共享的它们自己的OpKey。密钥卡需要验证共享的OpKey对控制单元的占有,以便控制单元采取指定的动作,诸如锁定/解锁或打开/关闭交通工具门。即使密钥卡能够发送但不能接收,该发明仍然解决了这个问题。此外,在此描述的实施例防止第三方通过回放更早发送的消息来模仿合法的密钥卡。另外,在密钥卡丢失之后,其OpKey可以被撤销,而剩余的或新的密钥卡的OpKey则可以被保留。
对于OpKey撤销和保留,合法的控制单元用户提示剩余的或新的密钥卡将验证消息发送到控制单元。然后,控制单元经提示进入OpKey保留和撤销模式。随后,用户提示剩余的或新的密钥卡中的每一个将验证消息发送到控制单元。控制单元最终经提示退出OpKey保留和撤销模式,仅保留其分别在刚好进入OpKey保留与撤销模式之前和在OpKey保留与撤销模式期间从中接收有效验证消息的密钥卡的OpKey。
附图说明
已经这样概括地描述了该发明,现在将参考附图,其中:
图1示出密钥卡和控制单元的正常操作。
图2示出在一个实施例中可以用于使密钥卡无效的密钥卡保留和撤销过程。
图3为示出根据一个实施例使用OpKey验证的密钥卡和控制单元的正常操作的流程图。
图4为示出OpKey的保留和撤销过程的流程图。
图5为根据一个实施例的示例密钥卡的方框图。
图6为根据一个实施例的示例控制单元的方框图。
具体实施方式
现在将参照附图在下文中更完整地描述本发明。然而,本发明可以以许多不同的形式呈现,并且不应被解释为局限于在此阐述的实施例。确切地说,提供这些实施例以使得本公开将是全面且完整的,并且将本发明的范围完整地传达给本领域技术人员。本领域技术人员可以能够使用该发明的各种实施例。
这些实施例使密钥卡(key fob)能够发送但不能接收,以验证秘密OpKey对交通工具控制单元的占有,同时防止第三方通过回放由密钥卡较早发送给控制单元用于验证的消息来模仿合法密钥卡。另外,本发明也允许合法的交通工具用户撤销已丢失或过期的密钥卡的OpKey,但保留每个依然有效的密钥卡的OpKey。
图1示出密钥卡101和控制单元102的正常操作。在初始配对之后,密钥卡101和控制单元102共享秘密的OpKey。例如,密钥卡101和控制单元102可以使用在于2013年8月16日提交的题为“One-Way Key Fob and VehiclePairing”的在审的美国专利申请第13/969,154号中所公开的系统和方法来配对,该申请的公开内容在此通过引用以其整体并入本申请。
除了在密钥卡101与控制单元102两者之间共享的OpKey之外,这两个设备均具有128位计数器103,104。在其他实施例中,可以使用不同大小的计数器。在正常操作中,密钥卡101创建计数器103的AES-128OpKey加密值。然后,密钥卡101将128位计数器103的8个最低阶位和计数器103的AES-128OpKey加密值的一些预定位发送(105)给控制单元102。从初始计数器值(例如1)开始,在每次发送之后,密钥卡就将其计数器值递增1。消息105本身的发送可以表示来自密钥卡101的命令,诸如解锁/锁定交通工具门。可选地,在消息105中可以包括单独的命令数据字段以识别来自密钥卡101的期望命令。
当接收到消息105时,控制单元102使用从密钥卡101接收的8个计数器位来设定128位计数器104的8个最低阶位,并且如果所接收的8位的值不大于计数器104的8个最低阶位的值,就将计数器104的剩余位的值递增1。另外,控制单元102创建计数器104的AES-128OpKey加密值。然后,控制单元102将来自计数器104的其OpKey加密值的预定位与表示计数器103的OpKey加密值的位进行比较。控制单元102验证消息105,并且因此如果这些位匹配则验证OpKey。
如果验证失败,则控制单元102将计数器104恢复到变化之前的值。
如果非法的或假的密钥卡106试图在不配对的情况下将消息107发送至控制单元,则控制单元102将拒绝该消息107。假密钥卡106不具有用于控制单元102的有效OpKey。另外,假密钥卡106不知道用于有效消息的控制单元102的正确计时器值。
图2示出在一个实施例中可用于使密钥卡无效的密钥卡保留和撤销过程。在该示例中,三个密钥卡201-203与相同的控制单元204配对。每个配对的密钥卡201-203具有与控制单元204共享的唯一的、秘密的OpKey(OpKey1,OpKey2,OpKey3)。另外,每个密钥卡201-203具有它自己的计数器205-207。对于每个密钥卡201-203,控制单元204保持单独的计数器208-210。
当密钥卡203丢失或需要撤销时,用户可以执行以下步骤。首先,用户提示控制单元204进入OpKey撤销模式。OpKey撤销模式可以通过来自剩余密钥卡201、202的消息或/和通过到控制单元204的一些其它输入来触发。
当控制单元204处于OpKey撤销模式时,用户提示每个剩余密钥卡201、202用控制单元204执行正常操作。例如,每个密钥卡201、202将来源于其OpKey的消息(诸如消息105(图1))发送至控制单元204。在每个剩余密钥卡201、202已经发送其消息或已经用控制单元204执行操作之后,用户提示控制单元退出OpKey保留模式。因为密钥卡203丢失或不再被授权,所以它在撤销模式期间将不发送消息。
控制单元204仅保留在退出撤销模式之前接收到的OpKey。在一个实施例中,控制单元204保留在进入撤销模式之前接收到的最后OpKey和在撤销模式期间接收到的所有OpKey。在其他实施例中,控制单元204仅保留在撤销模式期间接收到的OpKey。所有其他的OpKey(例如,OpKey 3)均被控制单元204删除。这就防止丢失或未授权的密钥卡在撤销程序之后对控制单元204进行操作。
图3为示出使用OpKey验证的密钥和控制单元的正常操作过程的流程图。在步骤301中,密钥卡读取128位计数器的8个最低阶位。在步骤302中,密钥卡生成密钥卡计数器的AES-128OpKey加密值。在步骤303中,所述8个最低阶位和来自密钥卡计数器的AES-128OpKey加密值的一些选定位被发送给控制单元。这个信息可以与密钥卡的特定命令或请求相关联。
在步骤304中,控制单元基于从密钥卡接收到的8个最低阶位更新控制单元计数器。根据一个实施例,通过将控制单元计数器的8个最低阶位设定为接收到的密钥卡计数器的8个最低阶位,并且如果密钥卡计数器的接收位的值不大于控制单元计数器的对应位的值,则将控制单元计数器的剩余位的值递增1,由此来完成所述更新。在步骤305中,控制单元生成已更新的控制单元计数器的AES-128OpKey加密值。控制单元将控制单元计数器的AES-128OpKey加密值的选定位与从密钥卡接收到的密钥卡计数器的AES-128OpKey加密值的选定位进行比较。
如果这些选定位匹配,其表明两个设备均使用相同的OpKey和计数器值,则控制单元验证来自密钥卡的命令或请求。
图4是示出OpKey的保留和撤销过程的流程图。在步骤401中,紧随着在剩余的(即未丢失的)或新的密钥卡完成正常操作之后,用户提示控制单元进入OpKey撤销模式。然后,用户提示每个剩余的或核准的密钥卡使用控制单元执行正常操作。正常操作可以包括如图1和图3所示的发送或者允许密钥卡将OpKey加密值发送给控制单元的任何操作。
在步骤403中,在所有剩余的或核准的密钥卡已经完成正常操作之后,用户提示控制单元退出OpKey撤销模式。例如,用户可以激活“结束”按钮以退出撤销模式,或者撤销模式可以在设定的一段时间之后结束。
在步骤404中,除了与在进入OpKey撤销模式之前操作的最后密钥卡相关的OpKey以及与在撤销模式结束之前使用的密钥卡相关的任何OpKey之外,控制单元删除所有的OpKey。因为丢失的或未核准的密钥卡不可能在短暂的撤销模式持续期间操作,所以丢失的或未核准的设备的OpKey将从控制单元中删除。因此丢失的或未核准的设备不再与控制单元配对并且不再能够用于向控制单元发送命令。在另一个实施例中,仅保留与在撤销模式期间操作的密钥卡相关的OpKey,并且删除在撤销模式期间不执行操作的所有其他OpKey。
图5和图6分别为示例密钥卡500和控制单元600的方框图。密钥卡400和控制单元600各自包括处理器501、601、存储器502、602和收发器603或发送器503。设备的处理器501、601可以用于执行正常操作,诸如保持和更新计数器、生成OpKey加密值以及比较此类值以验证仅来自配对设备的OpKey被使用。处理器可以是标准的CPU、微控制器、低功率数字信号处理器等,并且可以能够在短时间内执行复杂的计算。
设备的存储器502、602可以用于储存OpKey、计数器值、加密值和在密钥卡与控制单元之间交换的其他位。存储器可以是非易失性存储设备,诸如闪存或EEPROM。
密钥卡发送器503和控制单元收发器603可以是有线的(未示出)、无线的或两者均可。在正常操作期间和在撤销模式期间,设备可以使用收发器和发送器来传达计数器值、OpKey加密数据和其他的位。密钥卡允许远程进入和控制交通工具或其他设备,并且可以使用无线技术如蓝牙、LF或UHF来进行那些发送。密钥卡发送器503能够仅发送,而不从控制单元600接收信号。
本领域的技术人员将认识到,可以对所描述的实施例做出修改,并且还将认识到,在所要求保护的发明范围内,许多其他实施例是可能的。

Claims (10)

1.一种密钥卡设备,其包括:
发送器,其被配置为将信号发送至控制单元;
存储器,其被配置为储存密钥卡计数器和操作密钥即OpKey;以及
耦合到所述发送器和存储器的处理器,所述处理器被配置为:
生成所述密钥卡计数器的AES-128 OpKey加密值;以及
将消息发送至所述控制单元,所述消息包括所述密钥卡计数器的预定最低阶位数和所述密钥卡计数器的所述AES-128 OpKey加密值的预定位数。
2.根据权利要求1所述的密钥卡设备,其中所述密钥卡计数器的所述预定最低阶位数为8位。
3.根据权利要求1所述的密钥卡设备,其中所述密钥卡计数器为128位计数器。
4.根据权利要求1所述的密钥卡设备,所述处理器进一步被配置为在将所述消息发送至所述控制单元之后将所述密钥卡计数器递增一。
5.根据权利要求1所述的密钥卡设备,其中所述消息进一步包括识别将由所述控制单元执行的命令的数据字段。
6.一种控制单元设备,其包括:
接收器,其被配置为从密钥卡接收信号;
存储器,其被配置为储存控制单元计数器和操作密钥即OpKey;以及
耦合到所述接收器和存储器的处理器,所述处理器被配置为:
从所述密钥卡接收消息,所述消息包括密钥卡计数器的AES-128 OpKey加密值的预定位数;
生成所述控制单元计数器的AES-128 OpKey加密值;以及
验证密钥卡计数器的AES-128 OpKey加密值的所述预定位数是否匹配来自所述控制单元计数器的所述AES-128 OpKey加密值的预定位数。
7.根据权利要求6所述的控制单元设备,所述处理器进一步被配置为:
从所述密钥卡接收所述密钥卡计数器的选定最低阶位数;以及
在生成所述控制单元计数器的AES-128 OpKey加密值之前,基于所述控制单元计数器的所述接收位和所述对应位,更新所述控制单元计数器。
8.根据权利要求7所述的控制单元设备,其中所述控制单元计数器的所述选定最低阶位数为8位。
9.根据权利要求6所述的控制单元设备,所述处理器进一步被配置为如果所述密钥卡计数器的AES-128 OpKey加密值的所述预定位数匹配来自所述控制单元计数器的所述AES-128 OpKey加密值的所述预定位数,则启动控制操作。
10.根据权利要求6所述的控制单元设备,其中所述控制单元计数器为128位计数器。
CN201810651002.5A 2012-08-30 2013-08-30 单向密钥卡和交通工具配对的验证、保留及撤销 Active CN108791190B (zh)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201261695155P 2012-08-30 2012-08-30
US61/695,155 2012-08-30
US13/969,133 US9306743B2 (en) 2012-08-30 2013-08-16 One-way key fob and vehicle pairing verification, retention, and revocation
US13/969,133 2013-08-16
CN201380043120.3A CN104583026B (zh) 2012-08-30 2013-08-30 单向密钥卡和交通工具配对的验证、保留及撤销

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201380043120.3A Division CN104583026B (zh) 2012-08-30 2013-08-30 单向密钥卡和交通工具配对的验证、保留及撤销

Publications (2)

Publication Number Publication Date
CN108791190A true CN108791190A (zh) 2018-11-13
CN108791190B CN108791190B (zh) 2021-12-10

Family

ID=50184438

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810651002.5A Active CN108791190B (zh) 2012-08-30 2013-08-30 单向密钥卡和交通工具配对的验证、保留及撤销
CN201380043120.3A Active CN104583026B (zh) 2012-08-30 2013-08-30 单向密钥卡和交通工具配对的验证、保留及撤销

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201380043120.3A Active CN104583026B (zh) 2012-08-30 2013-08-30 单向密钥卡和交通工具配对的验证、保留及撤销

Country Status (4)

Country Link
US (5) US9306743B2 (zh)
JP (4) JP6353836B2 (zh)
CN (2) CN108791190B (zh)
WO (1) WO2014036453A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9106409B2 (en) * 2006-03-28 2015-08-11 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for handling keys used for encryption and integrity
US9306743B2 (en) * 2012-08-30 2016-04-05 Texas Instruments Incorporated One-way key fob and vehicle pairing verification, retention, and revocation
US10099635B2 (en) * 2014-12-16 2018-10-16 Wolo Mfg. Corp. Wireless remote controlled electronic system for a vehicle
US10223849B2 (en) * 2017-03-16 2019-03-05 Robert Bosch Gmbh Intelligent wireless access system and method for a vehicle
US10083556B1 (en) * 2017-03-16 2018-09-25 Robert Bosch Gmbh Intelligent access system and method for a vehicle
FR3075537B1 (fr) * 2017-12-20 2019-12-27 Valeo Comfort And Driving Assistance Procede d'echange de donnees entre une entite electronique et une unite electronique equipant un vehicule
JP7343857B2 (ja) 2019-06-25 2023-09-13 国立大学法人大阪大学 分析装置
CN111127678A (zh) * 2019-11-29 2020-05-08 惠州市德赛西威汽车电子股份有限公司 一种车辆etc绑定方法、系统及etc设备
CN113472594A (zh) * 2021-08-06 2021-10-01 上海海事大学 一种车辆自组织网络中支持撤销的共享数据审计系统及方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1575474A (zh) * 2001-08-28 2005-02-02 皇家飞利浦电子股份有限公司 消费者及其设备的撤消
US20060126848A1 (en) * 2004-12-15 2006-06-15 Electronics And Telecommunications Research Institute Key authentication/service system and method using one-time authentication code
JP2006233530A (ja) * 2005-02-24 2006-09-07 Denso Corp 携帯電話置き忘れ防止装置
CN101300776A (zh) * 2005-11-25 2008-11-05 三星电子株式会社 使用外部装置或服务和撤销机制的解密方法和设备以及解密支持方法和设备
CN201570073U (zh) * 2009-08-12 2010-09-01 成都成电亿赛科技股份有限公司 汽车遥控钥匙

Family Cites Families (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5377270A (en) * 1993-06-30 1994-12-27 United Technologies Automotive, Inc. Cryptographic authentication of transmitted messages using pseudorandom numbers
JPH08149127A (ja) * 1994-11-25 1996-06-07 Naldec Kk トランスミッタ及び受信ユニット
TW302588B (en) * 1996-03-05 1997-04-11 Microchip Tech Inc Method and apparatus for electronic encoding and decoding
US6377173B1 (en) * 1999-10-01 2002-04-23 Siemens Automotive Corporation Garage door opener signal incorporated into vehicle key/fob combination
US20050160272A1 (en) * 1999-10-28 2005-07-21 Timecertain, Llc System and method for providing trusted time in content of digital data files
US6829357B1 (en) * 1999-12-14 2004-12-07 Trw Inc. Communication system having a transmitter and a receiver that engage in reduced size encrypted data communication
US6715078B1 (en) * 2000-03-28 2004-03-30 Ncr Corporation Methods and apparatus for secure personal identification number and data encryption
US6968458B1 (en) * 2000-04-28 2005-11-22 Ian Ruddle Apparatus and method for providing secure communication on a network
JP4056685B2 (ja) * 2000-08-03 2008-03-05 カルソニックカンセイ株式会社 無線装置
JP3803958B2 (ja) * 2000-08-04 2006-08-02 Jfeエンジニアリング株式会社 シールド掘進機のカッタビット交換方法及びその装置
US8472627B2 (en) * 2000-10-30 2013-06-25 Geocodex Llc System and method for delivering encrypted information in a communication network using location indentity and key tables
US7149311B2 (en) * 2001-02-08 2006-12-12 Lucent Technologies Inc. Methods and apparatus for providing networked cryptographic devices resilient to capture
US7728870B2 (en) * 2001-09-06 2010-06-01 Nice Systems Ltd Advanced quality management and recording solutions for walk-in environments
JP4291970B2 (ja) * 2001-12-20 2009-07-08 富士通株式会社 暗号処理装置
US7050947B2 (en) * 2002-01-04 2006-05-23 Siemens Vdo Automotive Corporation Remote control communication including secure synchronization
US6718240B1 (en) * 2002-08-28 2004-04-06 Honda Giken Kogyo Kabushiki Kaisha Remote keyless entry system
US8132024B2 (en) * 2003-03-11 2012-03-06 Panasonic Corporation Digital work protection system, recording apparatus, reproduction apparatus, and recording medium
US7231041B2 (en) * 2003-08-19 2007-06-12 General Motors Corporation Method, device, and system for secure motor vehicle remote keyless entry
US7590840B2 (en) * 2003-09-26 2009-09-15 Randy Langer Method and system for authorizing client devices to receive secured data streams
US20070260777A1 (en) * 2003-11-25 2007-11-08 Timpe Barrie R Queues for information processing and methods thereof
US8048174B2 (en) 2003-12-10 2011-11-01 Panasonic Corporation Theft prevention system
US7194438B2 (en) * 2004-02-25 2007-03-20 Nokia Corporation Electronic payment schemes in a mobile environment for short-range transactions
US8527755B2 (en) * 2004-03-04 2013-09-03 Sony Corporation Methods and systems for effecting transmitter and receiver synchronization between a transmitter and a receiver of a transmitter/receiver network
US7392381B2 (en) * 2004-04-13 2008-06-24 Intel Corporation Proactive forced renewal of content protection implementations
US20050248436A1 (en) * 2004-05-10 2005-11-10 Hohmann Richard A Programmable, eletronic, keyless entry, key fob signal receiver, storage and transmission device for multiple vehicles
WO2006003675A2 (en) * 2004-07-12 2006-01-12 Syed Ibrahim Abdul Hameed Khan System, method of generation and use of bilaterally generated variable instant passwords
KR100579515B1 (ko) * 2004-10-08 2006-05-15 삼성전자주식회사 브로드캐스트 암호화를 위한 키 생성 장치 및 방법
US8090105B2 (en) * 2004-11-24 2012-01-03 International Business Machines Corporation Broadcast encryption with dual tree sizes
US7870382B2 (en) * 2004-12-30 2011-01-11 Intel Corporation Auditable and track-able key distribution and installation system and method for wireless networks
KR100717005B1 (ko) * 2005-04-06 2007-05-10 삼성전자주식회사 폐기 키를 결정하는 방법 및 장치와 이것을 이용하여복호화하는 방법 및 장치
JP2008541163A (ja) 2005-05-11 2008-11-20 エヌエックスピー ビー ヴィ 通信プロトコル及び電気通信システム、特に認証管理システム及び対応する方法
US7805615B2 (en) 2005-07-15 2010-09-28 Tyfone, Inc. Asymmetric cryptography with user authentication
US20070036296A1 (en) * 2005-07-22 2007-02-15 Texas Instruments Incorporated Methods and systems for securely providing and retaining phone numbers
US9137012B2 (en) 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
WO2007109524A1 (en) * 2006-03-16 2007-09-27 Continental Automotive Systems Us, Inc. Method to reduce authentication latency in an immobilizer system
JP4449934B2 (ja) * 2006-03-31 2010-04-14 ブラザー工業株式会社 通信装置及びプログラム
US20070230702A1 (en) * 2006-04-04 2007-10-04 Research In Motion Limited Method, system and apparatus for updating encryption keys on a mobile communication device
US7936878B2 (en) * 2006-04-10 2011-05-03 Honeywell International Inc. Secure wireless instrumentation network system
US8806586B2 (en) * 2006-04-24 2014-08-12 Yubico Inc. Device and method for identification and authentication
US8301906B2 (en) * 2006-05-10 2012-10-30 Nero Ag Apparatus for writing information on a data content on a storage medium
US8074078B2 (en) * 2006-05-15 2011-12-06 Research In Motion Limited System and method for remote reset of password and encryption key
JP4946266B2 (ja) 2006-08-25 2012-06-06 株式会社デンソー 車両用認証装置
WO2008105944A2 (en) * 2006-09-29 2008-09-04 Linx Technologies, Inc. Encoder and decoder apparatus and methods
EP2080134B1 (en) * 2006-11-02 2018-01-17 Koninklijke Philips N.V. Distributed device revocation
JP5073307B2 (ja) * 2007-02-07 2012-11-14 株式会社東海理化電機製作所 暗号データ通信システム
US20080218373A1 (en) * 2007-03-06 2008-09-11 Lanigan William P Intelligent keyfob management system
JP4973292B2 (ja) 2007-04-10 2012-07-11 大日本印刷株式会社 認証装置、認証プログラム、認証システム、パスワード生成装置、携帯型セキュリティデバイス、およびパスワード生成プログラム
HUE058067T2 (hu) * 2007-09-17 2022-06-28 Ericsson Telefon Ab L M Eljárás és elrendezés távközlési rendszerben
US20090232310A1 (en) * 2007-10-05 2009-09-17 Nokia Corporation Method, Apparatus and Computer Program Product for Providing Key Management for a Mobile Authentication Architecture
JP5241818B2 (ja) * 2008-02-29 2013-07-17 三菱電機株式会社 端末
US8531268B2 (en) * 2008-05-15 2013-09-10 Lear Corporation Passive entry system for an automotive vehicle
US8037296B2 (en) * 2008-05-23 2011-10-11 Honeywell International Inc. Apparatus and method for counter-based communications in wireless sensor networks and other networks
KR101485460B1 (ko) * 2008-06-09 2015-01-23 삼성전자주식회사 브로드캐스트 암호화에서 디바이스 키를 추적하는 방법
US8051085B1 (en) * 2008-07-18 2011-11-01 Netlogic Microsystems, Inc. Determining regular expression match lengths
US8487743B2 (en) * 2008-08-18 2013-07-16 GM Global Technology Operations LLC Valet keyfob system
US20100199095A1 (en) 2009-01-30 2010-08-05 Texas Instruments Inc. Password-Authenticated Association Based on Public Key Scrambling
JP2010179834A (ja) * 2009-02-06 2010-08-19 Tokai Rika Co Ltd 操作無効化システム及び操作無効化方法
GB0910897D0 (en) * 2009-06-24 2009-08-05 Vierfire Software Ltd Authentication method and system
JP5720668B2 (ja) * 2010-02-16 2015-05-20 日本電気株式会社 パケット転送装置、通信システム、処理規則の更新方法およびプログラム
JP5865358B2 (ja) * 2010-06-04 2016-02-17 ボード・オブ・リージエンツ,ザ・ユニバーシテイ・オブ・テキサス・システム 無線通信方式、システムおよびコンピュータプログラム製品
JP5333785B2 (ja) * 2010-06-07 2013-11-06 トヨタ自動車株式会社 鍵装置、錠制御装置、制御用プログラムおよび制御方法
US9267797B2 (en) 2010-06-22 2016-02-23 Ricoh Company, Ltd. Range-finding device and imaging apparatus
US8423764B2 (en) * 2010-06-23 2013-04-16 Motorola Solutions, Inc. Method and apparatus for key revocation in an attribute-based encryption scheme
US8453258B2 (en) * 2010-09-15 2013-05-28 Bank Of America Corporation Protecting an electronic document by embedding an executable script
JP5437958B2 (ja) * 2010-09-22 2014-03-12 株式会社東海理化電機製作所 車両の電子キーシステム
FR2965434B1 (fr) * 2010-09-28 2015-12-11 Valeo Securite Habitacle Procede d'appairage d'un telephone mobile avec un vehicule automobile et ensemble de verrouillage/deverrouillage
US20120124374A1 (en) * 2010-11-12 2012-05-17 Nxp B.V. Secured acknowledge protocol for automotive remote keyless entry systems and for networked sensor devices
US8966289B2 (en) * 2010-12-17 2015-02-24 Nxp B.V. Pairing of angle sensor and electronic control unit
US8933782B2 (en) * 2010-12-28 2015-01-13 Toyota Motor Engineering & Manufaturing North America, Inc. Mobile device connection system
US8863256B1 (en) * 2011-01-14 2014-10-14 Cisco Technology, Inc. System and method for enabling secure transactions using flexible identity management in a vehicular environment
CN102114826B (zh) * 2011-01-26 2012-12-26 牛全营 多功能远程控制汽车防盗报警器
WO2012135861A1 (en) * 2011-04-01 2012-10-04 Tony Lam Battery powered passive keyless entry system for premise entry
US20120280790A1 (en) * 2011-05-02 2012-11-08 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US9003492B2 (en) * 2011-06-21 2015-04-07 Qualcomm Incorporated Secure client authentication and service authorization in a shared communication network
CN202300776U (zh) 2011-10-10 2012-07-04 上汽通用五菱汽车股份有限公司 一种发动机的调温装置
US8494165B1 (en) * 2012-01-18 2013-07-23 Square, Inc. Secure communications between devices using a trusted server
US8700899B1 (en) * 2012-06-27 2014-04-15 Emc Corporation Forward-secure key unlocking for cryptographic devices
US9306743B2 (en) * 2012-08-30 2016-04-05 Texas Instruments Incorporated One-way key fob and vehicle pairing verification, retention, and revocation
US8933778B2 (en) * 2012-09-28 2015-01-13 Intel Corporation Mobile device and key fob pairing for multi-factor security
US9110772B2 (en) * 2012-11-08 2015-08-18 GM Global Technology Operations LLC Mobile device-activated vehicle functions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1575474A (zh) * 2001-08-28 2005-02-02 皇家飞利浦电子股份有限公司 消费者及其设备的撤消
US20060126848A1 (en) * 2004-12-15 2006-06-15 Electronics And Telecommunications Research Institute Key authentication/service system and method using one-time authentication code
JP2006233530A (ja) * 2005-02-24 2006-09-07 Denso Corp 携帯電話置き忘れ防止装置
CN101300776A (zh) * 2005-11-25 2008-11-05 三星电子株式会社 使用外部装置或服务和撤销机制的解密方法和设备以及解密支持方法和设备
CN201570073U (zh) * 2009-08-12 2010-09-01 成都成电亿赛科技股份有限公司 汽车遥控钥匙

Also Published As

Publication number Publication date
US20200052910A1 (en) 2020-02-13
JP7343740B2 (ja) 2023-09-13
JP6353836B2 (ja) 2018-07-04
US20220368542A1 (en) 2022-11-17
CN104583026B (zh) 2018-07-20
JP2018164283A (ja) 2018-10-18
US9306743B2 (en) 2016-04-05
JP7157107B2 (ja) 2022-10-19
WO2014036453A1 (en) 2014-03-06
JP6769686B2 (ja) 2020-10-14
US20140161252A1 (en) 2014-06-12
JP2015534322A (ja) 2015-11-26
JP2020030425A (ja) 2020-02-27
US20170288882A1 (en) 2017-10-05
JP2020174392A (ja) 2020-10-22
CN108791190B (zh) 2021-12-10
CN104583026A (zh) 2015-04-29
US9698980B2 (en) 2017-07-04
US10432408B2 (en) 2019-10-01
US20160218870A1 (en) 2016-07-28
US11405221B2 (en) 2022-08-02

Similar Documents

Publication Publication Date Title
CN104583026B (zh) 单向密钥卡和交通工具配对的验证、保留及撤销
JP6908451B2 (ja) カーシェアリングシステム及びカーシェアリング方法
CN105976466B (zh) 一种汽车门禁开门方法
EP1411477B1 (en) Handling device and method of security data
CN107650863A (zh) 车辆共享方法及系统
EP2743868A1 (en) Virtual vehicle key
WO2013114971A1 (ja) 無線通信システム
JP2013234520A (ja) 電子キー登録システム
EP3453578B1 (en) Unlocking control system and unlocking control method
CN103580853A (zh) 移动电子设备
US9542713B2 (en) Systems and methods for securing the manufacturing supply chain
JP2016035133A (ja) キーレスエントリー装置およびその制御方法
CN112188431A (zh) 车辆智能进入系统及其方法
EP3336736B1 (de) Hilfs-id-token zur multi-faktor-authentifizierung
JP5462146B2 (ja) 電子キーシステム
WO2019136332A1 (en) Multilane message counters to ensure order
JP7428995B2 (ja) 認証システム、及び認証方法
US20220086631A1 (en) Verfahren zur Nutzungsfreigabe sowie Funktionsfreigabeeinrichtung hierzu
US9530003B2 (en) Computer system and method of securely booting a computer system
CN113544671A (zh) 通信系统和通信机
JP2016000549A (ja) 電子キーシステム

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant