CN110099037B - 基于证书的控制单元遥控钥匙配对 - Google Patents

基于证书的控制单元遥控钥匙配对 Download PDF

Info

Publication number
CN110099037B
CN110099037B CN201811581311.6A CN201811581311A CN110099037B CN 110099037 B CN110099037 B CN 110099037B CN 201811581311 A CN201811581311 A CN 201811581311A CN 110099037 B CN110099037 B CN 110099037B
Authority
CN
China
Prior art keywords
key
certificate
control unit
public key
key fob
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811581311.6A
Other languages
English (en)
Other versions
CN110099037A (zh
Inventor
何金梦
埃里克·佩特斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Texas Instruments Inc
Original Assignee
Texas Instruments Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Texas Instruments Inc filed Critical Texas Instruments Inc
Publication of CN110099037A publication Critical patent/CN110099037A/zh
Application granted granted Critical
Publication of CN110099037B publication Critical patent/CN110099037B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • B60K35/213
    • B60K35/23
    • B60K35/60
    • GPHYSICS
    • G02OPTICS
    • G02FOPTICAL DEVICES OR ARRANGEMENTS FOR THE CONTROL OF LIGHT BY MODIFICATION OF THE OPTICAL PROPERTIES OF THE MEDIA OF THE ELEMENTS INVOLVED THEREIN; NON-LINEAR OPTICS; FREQUENCY-CHANGING OF LIGHT; OPTICAL LOGIC ELEMENTS; OPTICAL ANALOGUE/DIGITAL CONVERTERS
    • G02F1/00Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics
    • G02F1/01Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour 
    • G02F1/13Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour  based on liquid crystals, e.g. single liquid crystal display cells
    • G02F1/133Constructional arrangements; Operation of liquid crystal cells; Circuit arrangements
    • G02F1/1333Constructional arrangements; Manufacturing methods
    • G02F1/1335Structural association of cells with optical devices, e.g. polarisers or reflectors
    • G02F1/133528Polarisers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • B60K2360/23
    • B60K2360/25
    • B60K2360/27
    • B60K2360/31
    • B60K2360/334
    • B60K2360/349
    • B60K2360/77
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60KARRANGEMENT OR MOUNTING OF PROPULSION UNITS OR OF TRANSMISSIONS IN VEHICLES; ARRANGEMENT OR MOUNTING OF PLURAL DIVERSE PRIME-MOVERS IN VEHICLES; AUXILIARY DRIVES FOR VEHICLES; INSTRUMENTATION OR DASHBOARDS FOR VEHICLES; ARRANGEMENTS IN CONNECTION WITH COOLING, AIR INTAKE, GAS EXHAUST OR FUEL SUPPLY OF PROPULSION UNITS IN VEHICLES
    • B60K35/00Arrangement of adaptations of instruments
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/108Encryption
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B27/00Optical systems or apparatus not provided for by any of the groups G02B1/00 - G02B26/00, G02B30/00
    • G02B27/01Head-up displays
    • G02B27/0101Head-up displays characterised by optical features
    • G02B2027/0118Head-up displays characterised by optical features comprising devices for improving the contrast of the display / brillance control visibility
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B26/00Optical devices or arrangements for the control of light using movable or deformable optical elements
    • G02B26/08Optical devices or arrangements for the control of light using movable or deformable optical elements for controlling the direction of light
    • G02B26/0816Optical devices or arrangements for the control of light using movable or deformable optical elements for controlling the direction of light by means of one or more reflecting elements
    • G02B26/0833Optical devices or arrangements for the control of light using movable or deformable optical elements for controlling the direction of light by means of one or more reflecting elements the reflecting element being a micromechanical device, e.g. a MEMS mirror, DMD
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B27/00Optical systems or apparatus not provided for by any of the groups G02B1/00 - G02B26/00, G02B30/00
    • G02B27/01Head-up displays
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B27/00Optical systems or apparatus not provided for by any of the groups G02B1/00 - G02B26/00, G02B30/00
    • G02B27/01Head-up displays
    • G02B27/0101Head-up displays characterised by optical features
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B5/00Optical elements other than lenses
    • G02B5/30Polarising elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10198Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves setting parameters for the interrogator, e.g. programming parameters and operating modes
    • G06K7/10227Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves setting parameters for the interrogator, e.g. programming parameters and operating modes loading programming parameters or programs into the interrogator, e.g. for configuring the interrogator
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01SDEVICES USING THE PROCESS OF LIGHT AMPLIFICATION BY STIMULATED EMISSION OF RADIATION [LASER] TO AMPLIFY OR GENERATE LIGHT; DEVICES USING STIMULATED EMISSION OF ELECTROMAGNETIC RADIATION IN WAVE RANGES OTHER THAN OPTICAL
    • H01S5/00Semiconductor lasers
    • H01S5/40Arrangement of two or more semiconductor lasers, not provided for in groups H01S5/02 - H01S5/30
    • H01S5/4012Beam combining, e.g. by the use of fibres, gratings, polarisers, prisms
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01SDEVICES USING THE PROCESS OF LIGHT AMPLIFICATION BY STIMULATED EMISSION OF RADIATION [LASER] TO AMPLIFY OR GENERATE LIGHT; DEVICES USING STIMULATED EMISSION OF ELECTROMAGNETIC RADIATION IN WAVE RANGES OTHER THAN OPTICAL
    • H01S5/00Semiconductor lasers
    • H01S5/40Arrangement of two or more semiconductor lasers, not provided for in groups H01S5/02 - H01S5/30
    • H01S5/4025Array arrangements, e.g. constituted by discrete laser diodes or laser bar
    • H01S5/4087Array arrangements, e.g. constituted by discrete laser diodes or laser bar emitting more than one wavelength
    • H01S5/4093Red, green and blue [RGB] generated directly by laser action or by a combination of laser action with nonlinear frequency conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/12Picture reproducers
    • H04N9/31Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
    • H04N9/3129Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM] scanning a light beam on the display screen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/12Picture reproducers
    • H04N9/31Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
    • H04N9/3141Constructional details thereof
    • H04N9/315Modulator illumination systems
    • H04N9/3155Modulator illumination systems for controlling the light source
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N9/00Details of colour television systems
    • H04N9/12Picture reproducers
    • H04N9/31Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
    • H04N9/3141Constructional details thereof
    • H04N9/315Modulator illumination systems
    • H04N9/3167Modulator illumination systems for polarizing the light beam
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05BELECTRIC HEATING; ELECTRIC LIGHT SOURCES NOT OTHERWISE PROVIDED FOR; CIRCUIT ARRANGEMENTS FOR ELECTRIC LIGHT SOURCES, IN GENERAL
    • H05B47/00Circuit arrangements for operating light sources in general, i.e. where the type of light source is not relevant
    • H05B47/10Controlling the light source
    • H05B47/105Controlling the light source in response to determined parameters
    • H05B47/11Controlling the light source in response to determined parameters by determining the brightness or colour temperature of ambient light
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05BELECTRIC HEATING; ELECTRIC LIGHT SOURCES NOT OTHERWISE PROVIDED FOR; CIRCUIT ARRANGEMENTS FOR ELECTRIC LIGHT SOURCES, IN GENERAL
    • H05B47/00Circuit arrangements for operating light sources in general, i.e. where the type of light source is not relevant
    • H05B47/10Controlling the light source
    • H05B47/105Controlling the light source in response to determined parameters
    • H05B47/14Controlling the light source in response to determined parameters by determining electrical parameters of the light source
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B20/00Energy efficient lighting technologies, e.g. halogen lamps or gas discharge lamps
    • Y02B20/40Control techniques providing energy savings, e.g. smart controller or presence detection

Abstract

本揭露涉及基于证书的控制单元遥控钥匙配对。一种遥控钥匙‑控制单元配对装置(302),其包含:收发器(406),其用以发射及接收信号;存储器(404),其用以存储与所述配对装置相关联的真实性证书(CertVD)及公共密钥PKVM;及处理器(402),其耦合到所述收发器及存储器。所述处理器(402)经配置以:接收来自遥控钥匙且与所述遥控钥匙相关联的公共密钥PKKF及与所述遥控钥匙相关联的真实性证书CertKF;借助所述PKVM检验所述CertKF;及将经加密PKKF发射到控制单元。

Description

基于证书的控制单元遥控钥匙配对
本申请是申请日为2013年07月16日,申请号为“201380035153.3”,而发明名称为“基于证书的控制单元遥控钥匙配对”的申请的分案申请。
背景技术
无线遥控钥匙及其相应交通工具可使用经加密操作密钥来验证在所述两者之间发生的通信。为了使遥控钥匙与交通工具能够通信,必须在制造或销售过程中的某一时刻对其进行配对。无线遥控钥匙与其相应交通工具的配对按惯例要求交通工具制造商向各种交通工具经销商递送与每一遥控钥匙相关联的秘密密钥,其中所述秘密密钥为密码密钥。可接着使用遥控钥匙的秘密密钥来使遥控钥匙与交通工具相关联,或将遥控钥匙与交通工具配对。通常,将多个遥控钥匙与每一交通工具配对。然而,此向交通工具经销商递送秘密密钥的步骤可能给秘密密钥的盗窃开放了导致未经授权遥控钥匙及潜在盗窃的途径,且这些遥控钥匙中的每一者必须存储秘密密钥的事实开放所述途径。
发明内容
上文所述的问题在很大程度上通过一种遥控钥匙-控制单元配对装置来解决,所述配对装置包含:收发器,其用以发射及接收信号;存储器,其用以存储与所述配对装置相关联的真实性证书(CertVD)及公共密钥(PKVM);及处理器,其耦合到所述收发器及存储器。所述处理器用以:接收来自遥控钥匙且与所述遥控钥匙相关联的公共密钥(PKKF)及与所述遥控钥匙相关联的真实性证书(CertKF);借助所述PKVM检验所述CertKF;及将经加密PKKF发射到控制单元。
所述解决方案还可涉及一种遥控钥匙,其包含:收发器,其用以接收及发送信号;存储器,其用以存储与所述遥控钥匙相关联的公共密钥(PKKF)及真实性证书(CertKF);及处理器,其耦合到所述收发器及存储器。所述处理器用以:将所述PKKF及所述CertKF发射到配对装置;执行公共密钥协商协议以产生共用秘密加密密钥;及从控制单元接收借助所述共用秘密加密密钥加密的操作密钥。
以上问题的另一解决方案可为一种用以将遥控钥匙与交通工具的控制单元配对的方法,其包含:由配对装置从遥控钥匙读取公共加密密钥(PKKF)及真实性证书(CertKF);由所述配对装置使用交通工具制造商的公共加密密钥(PKVM)检验所述CertKF;由所述配对装置将真实性证书(CertVD)发射到控制单元;由所述控制单元使用所述PKVM检验所述CertVD;由所述配对装置及所述控制单元执行公共密钥协商以产生加密密钥DHKey1;由所述配对装置使用所述DHKey1将所述PKKF加密;由所述配对装置将所述经加密PKKF发射到所述控制单元;由所述控制单元及所述遥控钥匙执行公共密钥协商以产生加密密钥DHKey2;由所述控制单元使用所述DHKey2将操作密钥加密;及由所述控制单元将所述经加密操作密钥发射到所述遥控钥匙。
附图说明
图1展示根据如本文中所论述的各种实例从子单元制造到交通工具经销商实施基于证书的验证遥控钥匙-控制单元配对的实例性交通工具制造流程;
图2是根据如本文中所描述的各种实例用于基于证书的验证的实例性遥控钥匙与控制单元预配对调节过程;
图3展示根据如本文中所论述的各种实施例使用基于证书的验证对控制单元与遥控钥匙的初始配对过程的实例;
图4是根据本文中所论述的各种实例的实例性配对装置的框图;
图5是根据本文中所论述的各种实例的实例性遥控钥匙的框图;
图6是根据本文中所论述的各种实例的实例性控制单元的框图;
图7展示根据如本文中所论述的各种实例的在配对之后的经配对遥控钥匙与控制单元的实例性操作;
图8展示根据如本文中所论述的各种实例的由CU进行的操作密钥改变的实例;
图9是根据本文中所论述的各种实例用于基于证书的验证的方法的实例性流程图;且
具体实施方式
遥控钥匙与交通工具(例如,汽车、摩托车、船、小型摩托车等)的配对可需要安全信息的输送及使用以确保假冒遥控钥匙不与交通工具配对,假冒遥控钥匙与交通工具的配对可导致盗窃。所述完整常规过程可由交通工具制造商保密以确保其交通工具的安全性。然而,此过程可要求制造商开发昂贵且专用IT系统来产生秘密密钥且维持其安全性。然而,当交通工具被递送到代理商时,秘密密钥被传递下去使得可在最后目的地处对多个遥控钥匙进行配对。秘密密钥从制造商到经销商的输送可呈现导致伪劣及假冒遥控钥匙的秘密密钥被盗的机会。
除交通工具之外,所揭示方法还可用于将遥控钥匙与允许无线连接性及控制的任何类型的控制单元配对。例如,所揭示技术及装置可为车库门系统、酒店入口系统或家庭的远程进入的部分。如此,本发明的范围不限于交通工具的控制单元。交通工具及遥控钥匙与交通工具的一个或所有控制单元的配对的使用主要出于描述性目的。
本文中揭示用于将遥控钥匙与交通工具配对的装置及方法,其可避免秘密信息向代理商的输送且可减少交通工具制造商的IT要求。一种方法(基于证书的验证过程)可涉及使用与在配对过程中所涉及的各种组件及行动者相关联的经验证证书及公共/私密密钥对。在基于证书的方法中,配对装置可从相关联遥控钥匙接收公共密钥及证书。所述配对装置还可由交通工具控制单元验证并在配对装置与控制单元之间建立秘密密钥。所述配对装置可接着借助秘密密钥将遥控钥匙的公共密钥加密并将经加密公共密钥发射到控制单元。控制单元可接着知晓将与何种遥控钥匙配对。所述控制单元及遥控钥匙可接着产生待在其自身之间使用的另一秘密密钥,所述另一秘密密钥可接着由控制单元用以将操作密钥加密。可接着将经加密操作密钥传达到遥控钥匙以便将两个装置配对。
用以将遥控钥匙与控制单元配对的基于证书的方法可涉及所有行动者(制造商、组装者、经销商等)获得公共及秘密(私密)加密密钥,所述加密密钥可用以在配对过程中彼此验证。这可意味着每一交通工具经销商(或经销商/配对装置)、交通工具制造商、制造及组装的每一遥控钥匙及制造并安装于交通工具中的每一控制单元将具有其自身的相关联公共/秘密密钥对。一旦所涉及的组件已获取其密钥对,便可由可信的第三方或证书授权机构(CA)认证公共密钥。所述CA可从相关联组件接收公共密钥及标识以证明其识别码。在其识别码被证明之后,CA可接着借助可信第三方的秘密密钥来签署所述方的公共密钥。经签署公共密钥变为请求方的真实性证书。为了检验证书的识别码,另一方需要使用可信第三方的公共密钥将证书解锁。举例来说,所述CA可为交通工具制造商或由汽车制造商指定的第三方。
各种组件(遥控钥匙、配对装置及控制单元)可使用某些公共/秘密密钥及证书来彼此验证且产生将用于在彼此之间传递信息的秘密加密密钥。秘密密钥的产生可使用公共密钥协商协议,例如椭圆曲线迪菲-赫尔曼(Diffie-Hellman)(ECDH)或椭圆曲线密码术(ECC)。作为配对过程的部分,一对组件(例如遥控钥匙与控制单元)可使用秘密加密密钥。
图1展示根据如本文中所论述的各种实例从子单元制造到交通工具经销商实施基于证书的验证遥控钥匙-控制单元配对的实例性交通工具制造流程100。流程100可包含遥控钥匙制造商102、遥控钥匙组装104(展示潜在地多个层中的层1)、控制单元(CU)制造商106、CU组装108(展示潜在地多个层中的层1)、交通工具制造商110及交通工具经销商112。流程100展示最终可经配对以用于操作及进入到对应交通工具中的组件的进展。每一交通工具可具有多个CU,其中每一CU控制不同功能,即,点火、制动、进入、行李厢等。个别遥控钥匙可与对应交通工具的一个、几个或所有CU配对。另外,每一交通工具及各种数目的CU可与多个遥控钥匙配对。此外,与交通工具相关联的每一遥控钥匙可在丢失或被盗的情况下被去激活,而不会影响与所述同一交通工具相关联的任何其它遥控钥匙。
每一遥控钥匙可具有指派给其且存储在内部的公共密钥(PKKF)与秘密密钥(SKKF)对。可由遥控钥匙制造商102、遥控钥匙组装104或交通工具制造商110针对每一遥控钥匙产生PKKF/SKKF对并安装于所述每一遥控钥匙中。交通工具制造商110可选择最可信的实体来产生及安装PKKF/SKKF对以确保秘密性及安全性。这同样适用于经制造并安装于交通工具中的每一控制单元-每一控制单元将具有由可信方(CU制造商106、CU组装108或交通工具制造商110)产生并安装到相关联CU中的密钥对(PKCU/SKCU)。
除遥控钥匙及CU包含其相应PK/SK对之外,每一单元还可包含验证组件的识别码的真实性证书(Cert)。按惯例,Cert为经检验及签署的公共密钥,其中Cert由CA签署。CA可借助其秘密密钥签署Cert。出于安全性原因,交通工具制造商110可为可信的第三方,因此其可控制制造及遥控钥匙-汽车配对过程中的流程及Cert有效性。如此,交通工具制造商110可借助其秘密密钥(SKVM)签署所有公共密钥以产生对应证书。举例来说,CertKF将被插入到相关联遥控钥匙中。CertCU可对应于CU。
交通工具经销商112还可获得密钥对(PKVD及SKVD)以便在遥控钥匙-CU配对过程中加以检验。交通工具经销商112的密钥对(及也由交通工具制造商110签署的相关联CertVD)可与经销商配对装置或简单地配对装置相关联。为论述简明起见,遥控钥匙-汽车配对将描述为在交通工具经销商112处发生,但所述配对还可在交通工具制造商110处发生而不偏离本发明的界限。
在任何遥控钥匙-CU配对可开始之前,一些调节步骤可在各种制造及/或组装位置处发生。所述调节可经执行以准备好单独的组件(遥控钥匙、CU、经销商(配对装置)),使得配对功能为既定的。然而,可连续地进行调节及配对步骤。举例来说,如果如本文中所描述,在交通工具经销商112处执行配对,那么调节可在交通工具制造商110处发生。
图2是根据如本文中所描述的各种实例用于基于证书的验证的实例性遥控钥匙与控制单元预配对调节过程200。调节过程200可涉及交通工具制造商110、交通工具经销商112、CU 202及遥控钥匙204。调节过程200的步骤是以某一次序展示,但对所述次序的改变在本发明的范围内。所展示的次序仅出于说明性目的。调节过程200的目标可为调节或准备好相应组件以促进遥控钥匙与CU的初始配对,此可在交通工具制造商110的位置处或在交通工具经销商112处发生。
调节过程200可在步骤1a处以交通工具经销商112产生其加密密钥对(PKVD及SKVD,如上文所论述)而开始。经销商112可接着将其PKVD以真实方式发射到交通工具制造商110。以真实方式发射可向交通工具制造商110确保交通工具经销商112的识别码,且真实发射可为物理上邮寄PKVD或通过快递员或某一其它形式的经检验发射递送PKVD。在接收到PKVD后,交通工具制造商110可接着通过借助交通工具制造商110的秘密密钥SKVM签署PKVD来认证PKVD,从而为交通工具经销商112产生真实性证书(CertVD)。交通工具制造商110接着将CertVD发送回到经销商112,CertVD可被插入到经销商的相关联配对装置中。
调节过程200还可包含交通工具制造商110将其公共密钥PKVM插入到每一交通工具的CU202中且还插入到每一遥控钥匙204中。插入到遥控钥匙204及CU 202中的PKVM可在稍后时间用以检验另一装置的真实性/识别码,因为所有真实性证书应由交通工具制造商110签署,这可使用PKVM来检验。
最后,作为调节过程200的部分,经销商112可读取每一遥控钥匙204的PKKF,其并非秘密的。经销商可一次接收众多遥控钥匙204且可决定立刻读取所有其相关联公共密钥以存储在配对装置中。或者,作为初始配对过程的部分,经销商112可读取单个遥控钥匙的PKKF,下文将描述。
图3展示根据如本文中所论述的各种实施例使用基于证书的验证对控制单元与遥控钥匙的初始配对过程300的实例。初始配对过程300可在交通工具制造商的位置处或如所展示在交通工具经销商处发生。初始配对过程300可包含交通工具制造商110、与交通工具经销商112相关联的配对装置302、遥控钥匙204及CU 202。配对装置302可能已含有PKVM,两者均可用以检验其它组件(CU 202及遥控钥匙204)的识别码。配对装置302可经由无线连接(例如借助蓝牙、超高频(UHF)或低频(LF))与遥控钥匙204及控制单元202通信,或其可经由导线连接。组件之间的无线及有线连接均在本发明的范围内。另外或替代地,配对装置302可与一个组件(例如,遥控钥匙204)无线地通信且经由导线与另一组件(例如,CU 202)通信。
此外,配对装置302可为手持式装置、固定终端或交通工具经销商112或交通工具制造商110(取决于配对过程将在何处发生)的安全位置中的安全计算机。在任一实施例中,配对装置302可具有与交通工具制造商110的安全通信信道。安全通信信道可为永久连接或可经周期性地建立(例如,每夜)以更新列表并接收安全通信。
初始配对过程300可通过配对装置302从遥控钥匙204接收与遥控钥匙相关联的PKKF及CertKF而开始,步骤1a。可由于由配对装置302发送的请求而将信息从遥控钥匙204发送到配对装置302。或者,遥控钥匙204可周期性地广播其PKKF及CertKF。配对装置302可接着通过检验Cert KF的真实性而检验遥控钥匙204的识别码,步骤1b。CertKF可由配对装置使用所存储PKVM来检验。可通过将CertKF与PKVM进行散列运算来执行CertKF的检验。
如果配对装置302不能够检验CertKF,那么可将与所述CertKF相关联的遥控钥匙204视为伪劣品且停止进一步的配对步骤。另外或替代地,配对装置302可检验所接收CertKF不在由交通工具制造商110维持的证书撤销列表(CRL)上,步骤1c。此检验步骤可确保特定CertKF在之前尚未被多次使用,被多次使用可用信号通知欺骗性的遥控钥匙。所述CRL可存储于配对装置302的存储器中且经周期性地更新,或配对装置302可不断地存取在交通工具制造商110处的服务器上维持的CRL。
配对装置302可在检验遥控钥匙204之前、之后或与之同时地开始与CU 202的通信,使得CU 202可检验配对装置302的识别码。配对装置302将其CertVD发送到CU 202,步骤2a。CU 202使用PKVM检验CertVD的真实性。另外或替代地,CU 202可检验CertVD不在也由交通工具制造商110维持的CRL上。举例来说,CU 202可使用交通工具经销商112处的无线接入点来接入因特网及交通工具制造商110处的服务器以确定CertVD是否在撤销列表上。
如果CertVD为无法检验的或在CRL上,那么CU 202可确定配对装置302及/或经销商112为欺骗性的。如果被视为欺骗性的,那么CU 202可终止与配对装置302通信且可警示交通工具制造商110。
如果CU 202能够检验配对装置302,那么CU 202及配对装置302两者执行密钥协商协议以产生可仅被配对装置302及CU 202知晓的共用秘密密钥DHKey1,步骤3a。在产生DHKey1之后,配对装置302可将遥控钥匙202的PKKF加密并将经加密PKKF发射到CU 202。由于CU 202知晓DHKey1且可将揭露PKKF的消息解密,因此CU 202知晓将与何种遥控钥匙204通信及配对。
CU 202可经由无线方式直接地或通过配对装置302起始与遥控钥匙202的通信。一旦在遥控钥匙204与CU 202之间建立通信链路,两个组件202、204便可执行密钥协商协议以产生仅被CU 202及遥控钥匙204知晓的共用秘密密钥DHKey2,步骤4a。CU 204可接着产生操作密钥(OpKey),使用DHKey2将OpKey加密并将经加密OpKey发射到遥控钥匙204,步骤4b。OpKey可为随机产生的128位数。
遥控钥匙204可接着将消息解密以获悉OpKey。此时,可将遥控钥匙204及CU 202视为配对的且正常操作可开始。遥控钥匙204及CU 202可使用OpKey基于任何标准私密或公共密钥验证技术(例如,ISO 9798-2)在正常操作中彼此验证。
还可使用基于标识(ID)的验证方法来执行将遥控钥匙与控制单元配对。基于ID的方法可使用与遥控钥匙及CU相关联的可用于既彼此验证又产生装置之间的秘密密钥的唯一标识字。所述秘密密钥将接着用以将在两个组件之间发送的信息加密及解密。再次,遥控钥匙与CU的配对可由位于交通工具经销商处或位于交通工具制造商处且可类似于配对装置302的配对装置来促进。
图4、5及6分别展示根据本文中所论述的各种实例的实例性配对装置302、遥控钥匙204及CU 202的框图。三个装置/组件-配对装置、遥控钥匙及CU-均可包括处理器(402、502、602),存储器(404、504、604)及收发器(406、506、606)。三个装置/组件的处理器可用于执行与基于证书的验证配对及基于ID的验证配对相关联的验证计算及共用秘密密钥产生计算。处理器可为标准CPU、微控制器、低功率数字信号处理器等且可能够在短时间内执行复杂计算。
三个装置的存储器可用于存储公共与私密密钥对及与其用于基于证书的验证配对的相应装置相关联的真实性证书。替代地或另外,三个装置的存储器可用于存储其自身或其它装置的ID。举例来说,在基于ID的验证配对中,配对装置302可在起始配对序列之前存储KFID及CUID两者。用于那两个相关联装置的KFID及CUID可存储于配对装置302的存储器404中。存储器可为非易失性存储装置,例如快闪存储器或EEPROM。
用于三个装置的收发器可为有线的(未展示)、无线的或能够进行两者。收发器可由装置用以在用于任一验证方法的调节步骤及初始配对步骤期间传达ID、公共密钥及/或真实性证书。允许交通工具的远程进入与控制的遥控钥匙可使用无线技术(例如,蓝牙、LF或UHF)进行那些发射,但还可能够在初始配对过程期间经由导线与配对装置及/或CU通信。
另外,配对装置302可包含到交通工具制造商110的有线连接使得配对装置302可安全地接收递送到经销商112的CU 202的CUID以用于基于ID的验证配对。对于基于证书的验证配对,配对装置302可在存取证书撤销列表时与交通工具制造商110通信。另外,CU 202还可在检查配对装置302的CertVD的有效性时经由配对装置302或某一其它连接存取交通工具制造商110处的CRL。
图7展示根据如本文中所论述的各种实例的经配对遥控钥匙与CU的实例性正常操作。图9中所描绘的正常操作展示遥控钥匙204与CU 202在通过过程300(基于证书)的初始配对之后的互动。遥控钥匙与CU在于用户与遥控钥匙(举例来说)的互动时彼此通信时,可通过基于AES-128(举例来说)执行OpKey验证质询-响应协议而首先彼此验证。遥控钥匙对CU的操作可仅在响应有效时被允许。无效响应可表示伪劣遥控钥匙,且CU可不执行从无效遥控钥匙发送的命令。
图8展示根据如本文中所论述的各种实例由CU进行的OpKey改变的实例。CU 202可在遥控钥匙206被错放或被盗时改变OpKey。通过改变OpKey,CU可防止丢失或被盗的遥控钥匙206接入CU 202。CU 202可通过期望新OpKey的外部信号起始。外部信号可通过执行与其余遥控钥匙204及交通工具的预设置序列而来自所述遥控钥匙的所有者,或外部信号可来自经销商112的配对装置302。在接收到外部信号后,CU 202可即刻使用旧OpKey将新OpKey加密且接着将经加密新OpKey发射到其余遥控钥匙204。在接收到新OpKey之后,可由所有CU202及其余遥控钥匙204将旧OpKey擦除。装置之间的正常操作可接着继续而无需担心伪劣遥控钥匙可与CU互动。
图9是根据本文中所论述的各种实例用于基于证书的验证的实例性方法900的流程图。方法900A可为关于图3所描述的初始配对过程300的一个实施方案。方法900在步骤902处以配对装置302从遥控钥匙204读取公共加密密钥(PKKF)及真实性证书(CertKF)而开始。方法900在步骤904处以配对装置302使用交通工具制造商110的公共加密密钥(PKVM)检验CertKF而继续。步骤906以配对装置302将真实性证书(CertVD)发射到CU 202而使方法900继续。在步骤908处,CU 202使用可存储于CU 202的存储器804中的PKVM检验CertKF。在步骤910处,配对装置302及CU 202执行公共密钥协商协议以产生可仅被配对装置及CU知晓的共用秘密加密密钥DHKey1。
方法900接着在步骤912处以配对装置302使用DHKey1将PKKF加密而继续,之后方法900以配对装置302将经加密PKKF发射到控制单元202而执行步骤914。在步骤916处,CU 202及遥控钥匙204执行公共密钥协商协议以产生待在CU 202与遥控钥匙204之间共享的共用秘密加密密钥DHKey2。方法900以步骤918及920结束,其中CU 202借助DHKey2将操作密钥(OpKey)加密且接着将经加密OpKey发射到遥控钥匙204。在已将OpKey与遥控钥匙204共享之后,可将CU 202及遥控钥匙204视为配对的。
所属领域的技术人员将了解,在所主张发明的范围内,可对所描述实施例做出修改,并且许多其它实施例也为可能的。

Claims (16)

1.一种控制单元,其包括:
收发器;
存储器,以存储指令;及
处理器,其耦合到所述收发器和存储器,其中所述处理器经配置以执行所述指令,以使所述控制单元:
接收包含证书的第一发射;
检验所述证书的真实性;
在检验所述证书的真实性之后,使用收发器建立第一通信链路以执行公共密钥协商协议以产生第一共用秘密加密密钥;
接收包含经加密第一公共密钥的第二发射,其中所述经加密第一公共密钥通过所述第一共用秘密加密密钥被加密;
使用所述第一共用秘密加密密钥解密所述经加密第一公共密钥以确定所述第一公共密钥;
在确定所述第一公共密钥之后,使用所述收发器建立第二通信链路以执行公共密钥协商协议以产生第二共用秘密加密密钥;
产生操作密钥;
使用所述第二共用秘密加密密钥对所述操作密钥进行加密;及
发射经加密操作密钥。
2.如权利要求1所述的控制单元,其中所述证书与交通工具经销商相关联,并且检验所述证书的真实性是使用存储于所述存储器中的第二公共密钥执行的。
3.如权利要求2所述的控制单元,其中所述第一公共密钥与遥控钥匙装置相关联,所述控制单元经配置以被配对到所述遥控钥匙装置,且所述第二公共密钥与交通工具制造商相关联。
4.如权利要求1所述的控制单元,其中检验所述证书的真实性包含确定所述证书不在证书撤销列表上。
5.如权利要求1所述的控制单元,其中所述操作密钥以随机数的方式生成。
6.如权利要求5所述的控制单元,其中所述随机数为128位随机数。
7.如权利要求1所述的控制单元,其中通过建立所述第一通信链路和所述第二通信链路执行的所述公共密钥协商协议中的至少一者为椭圆曲线迪菲-赫尔曼(ECDH)密钥协商协议或椭圆曲线密码术(ECC)密钥协商协议。
8.如权利要求1所述的控制单元,其中至少部分基于所述第一公共密钥而建立所述第二通信链路。
9.如权利要求8所述的控制单元,其中包含于所述第一公共密钥中的所述信息识别遥控钥匙装置,所述控制单元经配置以被配对到所述遥控钥匙装置。
10.一种产生经加密的操作密钥的方法,所述方法包括:
接收包含证书的第一发射;
检验所述证书的真实性;
在检验所述证书的真实性之后,执行公共密钥协商协议以产生第一共用秘密加密密钥;
接收包含经加密第一公共密钥的第二发射,其中所述经加密第一公共密钥通过所述第一共用秘密加密密钥被加密;
使用所述第一共用秘密加密密钥以解密所述经加密第一公共密钥;
在确定所述第一公共密钥之后,执行公共密钥协商协议以产生第二共用秘密加密密钥;
产生操作密钥;
使用所述第二共用秘密加密密钥对所述操作密钥进行加密;及
发射经加密操作密钥。
11.如权利要求10所述的方法,其中检验所述证书的真实性包括使用第二公共密钥。
12.如权利要求11所述的方法,其中:
所述证书与交通工具经销商相关联;
所述第一公共密钥与遥控钥匙装置相关联,控制单元经配置以被配对到所述遥控钥匙装置;及
所述第二公共密钥与交通工具制造商相关联。
13.如权利要求10所述的方法,其中检验所述证书的真实性包含确定所述证书不在证书撤销列表上。
14.如权利要求10所述的方法,其中所述操作密钥以随机数的方式生成。
15.如权利要求14所述的方法,其中所述随机数为128位随机数。
16.如权利要求10所述的方法,其中被执行以产生所述第一共用秘密加密密钥的所述公共密钥协商协议和被执行以产生所述第二共用秘密加密密钥的所述公共密钥协商协议中的至少一者为椭圆曲线迪菲-赫尔曼(ECDH)密钥协商协议或椭圆曲线密码术(ECC)密钥协商协议中的一者。
CN201811581311.6A 2012-07-17 2013-07-16 基于证书的控制单元遥控钥匙配对 Active CN110099037B (zh)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US201261672474P 2012-07-17 2012-07-17
US201261672463P 2012-07-17 2012-07-17
US61/672,463 2012-07-17
US61/672,474 2012-07-17
US13/942,367 2013-07-15
US13/942,367 US9654968B2 (en) 2012-07-17 2013-07-15 Certified-based control unit-key fob pairing
CN201380035153.3A CN104429042B (zh) 2012-07-17 2013-07-16 基于证书的控制单元遥控钥匙配对

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201380035153.3A Division CN104429042B (zh) 2012-07-17 2013-07-16 基于证书的控制单元遥控钥匙配对

Publications (2)

Publication Number Publication Date
CN110099037A CN110099037A (zh) 2019-08-06
CN110099037B true CN110099037B (zh) 2021-10-01

Family

ID=49947582

Family Applications (4)

Application Number Title Priority Date Filing Date
CN201811581311.6A Active CN110099037B (zh) 2012-07-17 2013-07-16 基于证书的控制单元遥控钥匙配对
CN201811588335.4A Active CN110072231B (zh) 2012-07-17 2013-07-16 用于配对的方法、配对装置以及遥控钥匙
CN201380035153.3A Active CN104429042B (zh) 2012-07-17 2013-07-16 基于证书的控制单元遥控钥匙配对
CN201380035187.2A Active CN104412537B (zh) 2012-07-17 2013-07-16 用于配对的方法、配对装置以及遥控钥匙

Family Applications After (3)

Application Number Title Priority Date Filing Date
CN201811588335.4A Active CN110072231B (zh) 2012-07-17 2013-07-16 用于配对的方法、配对装置以及遥控钥匙
CN201380035153.3A Active CN104429042B (zh) 2012-07-17 2013-07-16 基于证书的控制单元遥控钥匙配对
CN201380035187.2A Active CN104412537B (zh) 2012-07-17 2013-07-16 用于配对的方法、配对装置以及遥控钥匙

Country Status (4)

Country Link
US (12) US9654968B2 (zh)
JP (3) JP6212120B2 (zh)
CN (4) CN110099037B (zh)
WO (2) WO2014014934A1 (zh)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9654968B2 (en) 2012-07-17 2017-05-16 Texas Instruments Incorporated Certified-based control unit-key fob pairing
US20140064488A1 (en) * 2012-08-30 2014-03-06 Texas Instruments Incorporated One-Way Key Fob and Vehicle Pairing
US10251059B2 (en) 2014-01-21 2019-04-02 Everykey Inc. Authentication device and method
US9666005B2 (en) * 2014-02-14 2017-05-30 Infinitekey, Inc. System and method for communicating with a vehicle
FR3024255B1 (fr) * 2014-07-23 2016-11-25 Valeo Comfort & Driving Assistance Procede d'appairage entre un appareil mobile et un module electronique d'un vehicule
CN106447832B (zh) * 2015-08-07 2018-12-07 广州汽车集团股份有限公司 一种汽车遥控钥匙学习方法
EP3419862B1 (de) * 2016-02-26 2021-04-07 HUF Hülsbeck & Fürst GmbH & Co. KG Verfahren für eine aktivierung mindestens einer sicherheitsfunktion eines sicherheitssystems eines fahrzeugs
US9892076B2 (en) * 2016-03-04 2018-02-13 Facebook, Inc. Mobile hardware fob with device ecosystem for modular I/O extension devices
KR102098137B1 (ko) 2016-04-15 2020-04-08 가부시키가이샤 덴소 실시간 로케이션을 설정하기 위한 시스템 및 방법
FR3050301B1 (fr) * 2016-04-19 2018-03-30 Dura Operating, Llc Methode et systeme d'acces securise a un vehicule
KR101831134B1 (ko) * 2016-05-17 2018-02-26 현대자동차주식회사 암호화를 적용한 제어기 보안 방법 및 그 장치
DE102016212230A1 (de) * 2016-07-05 2018-01-11 Bayerische Motoren Werke Aktiengesellschaft Verfahren zur sicheren Authentifizierung von Steuervorrichtungen in einem Kraftfahrzeug
CN107798749A (zh) * 2016-09-07 2018-03-13 国民技术股份有限公司 车辆及其识别系统、方法及智能管理系统
CN106485814B (zh) * 2016-09-23 2019-01-01 奇瑞汽车股份有限公司 一种汽车遥控匹配方法
EP4354926A2 (en) * 2016-12-08 2024-04-17 GN Hearing A/S Hearing device system, devices and method of creating a trusted bond between a hearing device and a user application
EP3556119A4 (en) 2016-12-14 2020-01-22 Denso Corporation METHOD AND SYSTEM FOR ESTABLISHING MICROLOCATION AREAS
CN110291754B (zh) 2017-03-01 2022-02-15 苹果公司 使用移动设备的系统访问
US10505917B2 (en) * 2017-06-05 2019-12-10 Amazon Technologies, Inc. Secure device-to-device process for granting access to a physical space
CN107508797B (zh) * 2017-07-28 2020-08-25 广州亿程交通信息有限公司 车联网平台数据传输保密方法
US10505732B2 (en) 2017-08-14 2019-12-10 Nxp B.V. Method for generating a public/private key pair and public key certificate for an internet of things device
EP3471334B1 (en) * 2017-10-10 2023-07-26 Nxp B.V. Method for configuring a transponder, transponder and base station
FR3075537B1 (fr) * 2017-12-20 2019-12-27 Valeo Comfort And Driving Assistance Procede d'echange de donnees entre une entite electronique et une unite electronique equipant un vehicule
KR102490395B1 (ko) * 2018-04-02 2023-01-19 삼성전자 주식회사 외부 전자 장치의 키를 공유하는 전자 장치 및 전자 장치의 동작 방법
US10911949B2 (en) * 2018-07-23 2021-02-02 Byton Limited Systems and methods for a vehicle authenticating and enrolling a wireless device
US11102203B1 (en) * 2018-10-02 2021-08-24 Silego Technology Inc. Method of authenticating a device
US20200115931A1 (en) * 2018-10-10 2020-04-16 GM Global Technology Operations LLC Vehicle key detection and storage
CN109472903A (zh) * 2018-11-20 2019-03-15 北京千丁互联科技有限公司 一种蓝牙门禁控制方法及其装置
US11463263B2 (en) * 2019-03-25 2022-10-04 Micron Technology, Inc. Secure emergency vehicular communication
US11356281B2 (en) 2019-04-11 2022-06-07 Lg Electronics, Inc. Systems and methods for countering co-existence attack
US11343106B2 (en) 2019-04-11 2022-05-24 Lg Electronics, Inc. Systems and methods for accelerated certificate provisioning
KR20200124909A (ko) * 2019-04-25 2020-11-04 현대자동차주식회사 차량용 무선 접속 시스템 및 그 제어 방법
CN110189442A (zh) * 2019-05-28 2019-08-30 上海银基信息安全技术股份有限公司 认证方法及装置
US10826945B1 (en) * 2019-06-26 2020-11-03 Syniverse Technologies, Llc Apparatuses, methods and systems of network connectivity management for secure access
EP4024244A4 (en) * 2019-08-30 2022-10-19 Panasonic Intellectual Property Corporation of America AUTHENTICATION METHOD, AUTHENTICATION SYSTEM AND AUTHENTICATION DEVICE
US11738725B2 (en) 2019-12-31 2023-08-29 Adrian Herrera Electronic parachute deployment system
WO2022035653A2 (en) 2020-08-10 2022-02-17 E. I. Du Pont De Nemours And Company Compositions and methods for enhancing resistance to northern leaf blight in maize
CN111923863B (zh) * 2020-08-25 2021-09-17 东信和平科技股份有限公司 一种基于数字车钥匙的车辆控制方法
CN116508393A (zh) * 2020-10-22 2023-07-28 苹果公司 侧链路发现
CA3198940A1 (en) 2020-11-24 2022-06-02 Rebekah Deter Kelly Pesticidal genes and methods of use
WO2022236060A1 (en) 2021-05-06 2022-11-10 AgBiome, Inc. Pesticidal genes and methods of use
US20220385481A1 (en) * 2021-06-01 2022-12-01 International Business Machines Corporation Certificate-based multi-factor authentication
CN114973454B (zh) * 2021-07-26 2023-07-07 长城汽车股份有限公司 提高钥匙与模组配对成功率的方法、装置与电子设备
CN115700855A (zh) * 2021-07-26 2023-02-07 长城汽车股份有限公司 钥匙重新配对的方法、装置、电子设备与存储介质
WO2023107943A1 (en) 2021-12-07 2023-06-15 AgBiome, Inc. Pesticidal genes and methods of use

Family Cites Families (125)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578530A (en) * 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US6005487A (en) 1990-05-11 1999-12-21 Medeco Security Locks, Inc. Electronic security system with novel electronic T-handle lock
JP3119494B2 (ja) * 1991-04-03 2000-12-18 日本電信電話株式会社 カード類の所有者確認方法
US20050285716A1 (en) * 2001-12-27 2005-12-29 Triteq Lock And Security, Llc Electronic key control and management system for vending machines and the like
US6085320A (en) * 1996-05-15 2000-07-04 Rsa Security Inc. Client/server protocol for proving authenticity
US6377691B1 (en) * 1996-12-09 2002-04-23 Microsoft Corporation Challenge-response authentication and key exchange for a connectionless security protocol
JP2000305880A (ja) * 1999-04-20 2000-11-02 Hitachi Ltd 情報配信システム
US6386007B1 (en) 1999-06-14 2002-05-14 Siemens Automotive Corporation Key fob with valet and car locator feature
US7194620B1 (en) * 1999-09-24 2007-03-20 Verizon Business Global Llc Method for real-time data authentication
US6823454B1 (en) * 1999-11-08 2004-11-23 International Business Machines Corporation Using device certificates to authenticate servers before automatic address assignment
US7203834B1 (en) * 1999-12-02 2007-04-10 International Business Machines Corporation Method of updating encryption keys in a data communication system
US6986046B1 (en) * 2000-05-12 2006-01-10 Groove Networks, Incorporated Method and apparatus for managing secure collaborative transactions
GB0028278D0 (en) 2000-11-20 2001-01-03 Tao Group Ltd Personal authentication system
JP2002207427A (ja) * 2001-01-10 2002-07-26 Sony Corp 公開鍵証明書発行システム、公開鍵証明書発行方法、および情報処理装置、情報記録媒体、並びにプログラム記憶媒体
US7181017B1 (en) * 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US20030037237A1 (en) * 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
US7483411B2 (en) * 2001-06-04 2009-01-27 Nec Corporation Apparatus for public access mobility LAN and method of operation thereof
FI111494B (fi) 2001-06-29 2003-07-31 Nokia Corp Langaton käyttöliittymän laajennus
US20030078987A1 (en) * 2001-10-24 2003-04-24 Oleg Serebrennikov Navigating network communications resources based on telephone-number metadata
US7181615B2 (en) * 2002-06-28 2007-02-20 Motorola, Inc. Method and system for vehicle authentication of a remote access device
US6931133B2 (en) * 2002-09-03 2005-08-16 Verisign, Inc. Method and system of securely escrowing private keys in a public key infrastructure
EP1561299B1 (en) * 2002-10-28 2009-09-16 Nokia Corporation Device keys
JP2004186814A (ja) * 2002-11-29 2004-07-02 Fujitsu Ltd 共通鍵暗号化通信システム
US8749345B2 (en) 2003-03-25 2014-06-10 Milton Thompson Security authorization system
US7831519B2 (en) 2003-12-17 2010-11-09 First Data Corporation Methods and systems for electromagnetic initiation of secure transactions
JP4489024B2 (ja) * 2004-01-26 2010-06-23 東芝ソリューション株式会社 セキュリティ装置、車両用認証装置、方法及びプログラム
US7778422B2 (en) 2004-02-27 2010-08-17 Microsoft Corporation Security associations for devices
JP4688426B2 (ja) * 2004-03-09 2011-05-25 富士通株式会社 無線通信システム
US20050273629A1 (en) * 2004-06-04 2005-12-08 Vitalsource Technologies System, method and computer program product for providing digital rights management of protected content
US20060159260A1 (en) * 2005-01-14 2006-07-20 Eaton Corporation Method and communication system employing secure key exchange for encoding and decoding messages between nodes of a communication network
JP4514134B2 (ja) * 2005-01-24 2010-07-28 株式会社コナミデジタルエンタテインメント ネットワークシステム、サーバ装置、不正利用検出方法、ならびに、プログラム
US7698556B2 (en) * 2005-02-25 2010-04-13 Hewlett-Packard Development Company, L.P. Secure spontaneous associations between networkable devices
US7463861B2 (en) 2005-03-07 2008-12-09 Broadcom Corporation Automatic data encryption and access control based on bluetooth device proximity
US7975140B2 (en) * 2005-04-08 2011-07-05 Nortel Networks Limited Key negotiation and management for third party access to a secure communication session
US8126145B1 (en) 2005-05-04 2012-02-28 Marvell International Ltd. Enhanced association for access points
JP2008541163A (ja) * 2005-05-11 2008-11-20 エヌエックスピー ビー ヴィ 通信プロトコル及び電気通信システム、特に認証管理システム及び対応する方法
US7805615B2 (en) 2005-07-15 2010-09-28 Tyfone, Inc. Asymmetric cryptography with user authentication
JP4728754B2 (ja) 2005-09-22 2011-07-20 日本放送協会 コンテンツ送信装置およびコンテンツ送信プログラム、並びに、コンテンツ受信装置およびコンテンツ受信プログラム
US20070074046A1 (en) * 2005-09-23 2007-03-29 Czajkowski David R Secure microprocessor and method
US20100191959A1 (en) * 2005-09-23 2010-07-29 Space Micro Inc. Secure microprocessor and method
US7688179B2 (en) * 2005-12-12 2010-03-30 Denso International America, Inc. Hands-free vehicle door opener
US8386782B2 (en) * 2006-02-02 2013-02-26 Nokia Corporation Authenticated group key agreement in groups such as ad-hoc scenarios
US9137012B2 (en) 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
US8245052B2 (en) 2006-02-22 2012-08-14 Digitalpersona, Inc. Method and apparatus for a token
US7961076B2 (en) 2006-02-28 2011-06-14 International Business Machines Corporation Methods and apparatuses for remote control of vehicle devices and vehicle lock-out notification
JP2007241513A (ja) 2006-03-07 2007-09-20 Japan Lucida Co Ltd 機器監視装置
US20070216517A1 (en) * 2006-03-14 2007-09-20 Denso International America, Inc. Automatic vehicle door locking with seat occupant sensor
JP4859493B2 (ja) * 2006-03-15 2012-01-25 オムロンオートモーティブエレクトロニクス株式会社 認証処理システムおよび認証処理方法、並びに認証装置および認証方法
US9002018B2 (en) * 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
US8301906B2 (en) 2006-05-10 2012-10-30 Nero Ag Apparatus for writing information on a data content on a storage medium
JP5065387B2 (ja) * 2006-07-10 2012-10-31 コンティネンタル オートモーティブ システムズ ユーエス, インコーポレイティッド 共通の送信器による量販車両群の制御方法
EP2057819B1 (en) * 2006-08-31 2011-08-31 Encap AS Method for synchronising between a server and a mobile device
JP2008059450A (ja) 2006-09-01 2008-03-13 Denso Corp 車両情報書換えシステム
US7990255B2 (en) * 2006-11-02 2011-08-02 Audiovox Corporation Range extending positive repeater
JP5073307B2 (ja) 2007-02-07 2012-11-14 株式会社東海理化電機製作所 暗号データ通信システム
US7831051B2 (en) * 2007-03-13 2010-11-09 Aladdin Europe Gmbh Secure communication between a hardware device and a computer
US9185123B2 (en) * 2008-02-12 2015-11-10 Finsphere Corporation System and method for mobile identity protection for online user authentication
EP2003813B1 (en) * 2007-06-15 2009-03-18 NTT DoCoMo, Inc. Method and Apparatus for Authentication
US20090049307A1 (en) * 2007-08-13 2009-02-19 Authennex, Inc. System and Method for Providing a Multifunction Computer Security USB Token Device
JP2009135688A (ja) 2007-11-29 2009-06-18 Fujitsu Ten Ltd 認証方法、認証システムおよび車載装置
US8918643B2 (en) * 2007-11-16 2014-12-23 Fujitsu Ten Limited Authentication method, authentication system, in-vehicle device, and authentication apparatus
US20090160607A1 (en) * 2007-12-21 2009-06-25 General Motors Corporation Vehicle key fob having a communications circuit
WO2009100411A2 (en) * 2008-02-08 2009-08-13 Trident Security Concepts, Llc Wireless security system
US9158896B2 (en) * 2008-02-11 2015-10-13 Nvidia Corporation Method and system for generating a secure key
US20090328189A1 (en) * 2008-05-05 2009-12-31 Gm Global Technology Operations, Inc. Secure wireless communication initialization system and method
US8531268B2 (en) * 2008-05-15 2013-09-10 Lear Corporation Passive entry system for an automotive vehicle
JP2009278506A (ja) 2008-05-16 2009-11-26 Panasonic Corp 受信装置
US20100014671A1 (en) 2008-06-19 2010-01-21 General Instrument Corporation Secure interchip transport interface
US8156334B2 (en) * 2008-08-12 2012-04-10 Texas Instruments Incorporated Public key out-of-band transfer for mutual authentication
US9800413B2 (en) * 2008-08-15 2017-10-24 Gm Global Technology Operations, Inc. System and method for performing an asymmetric key exchange between a vehicle and a remote device
US20100042841A1 (en) * 2008-08-15 2010-02-18 Neal King Updating and Distributing Encryption Keys
US8756666B1 (en) 2008-09-30 2014-06-17 Emc Corporation Generating authentication codes
US9185109B2 (en) * 2008-10-13 2015-11-10 Microsoft Technology Licensing, Llc Simple protocol for tangible security
US8897448B2 (en) * 2008-10-31 2014-11-25 Ciena Corporation Controlling session keys through in-band signaling
JP5390844B2 (ja) * 2008-12-05 2014-01-15 パナソニック株式会社 鍵配布システム、鍵配布方法
US9860275B2 (en) * 2008-12-30 2018-01-02 Ebay Inc. Systems and methods to rotate security assets used for secure communications
US8989383B2 (en) * 2009-01-05 2015-03-24 Imation Corp. Data authentication using plural electronic keys
US20100199095A1 (en) * 2009-01-30 2010-08-05 Texas Instruments Inc. Password-Authenticated Association Based on Public Key Scrambling
US8782408B2 (en) * 2009-03-25 2014-07-15 Pacid Technologies, Llc Method and system for securing communication
US10395054B2 (en) * 2011-06-06 2019-08-27 Pure Storage, Inc. Updating distributed storage network software
US8638211B2 (en) * 2009-04-30 2014-01-28 Icontrol Networks, Inc. Configurable controller and interface for home SMA, phone and multimedia
US8350721B2 (en) * 2009-07-21 2013-01-08 Verizon Patent And Licensing Inc. Geographically specific emergency notification
US8850203B2 (en) 2009-08-28 2014-09-30 Alcatel Lucent Secure key management in multimedia communication system
EP2474143B1 (en) * 2009-08-31 2019-03-20 Telcordia Technologies, Inc. System and methods to perform public key infrastructure (pki) operations in vehicle networks using one-way communications infrastructure
US8547253B2 (en) 2009-09-04 2013-10-01 GM Global Technology Operations LLC Method of determining vehicle location from key fob
US8346432B2 (en) * 2009-09-23 2013-01-01 Ford Global Technologies, Llc System and method for remotely controlling vehicle components from a nomadic communication device or computer
US8433918B2 (en) * 2009-10-14 2013-04-30 Texas Instruments Incorporated Methods and systems for improving the security of password-based authentication protocols for IEEE 802.11 networks
US8344850B2 (en) * 2009-10-30 2013-01-01 Lear Corporation System and method for authorizing a remote device
US20110102146A1 (en) * 2009-11-04 2011-05-05 Giron Stephen J System and method for wirelessly pairing and enabling the reciprocal locating of keys and handheld communication devices
US9178363B2 (en) * 2010-01-26 2015-11-03 Broadcom Corporation Smart powering and pairing system and related method
EP2365456B1 (en) 2010-03-11 2016-07-20 CompuGroup Medical SE Data structure, method and system for predicting medical conditions
JP5590953B2 (ja) 2010-04-15 2014-09-17 三菱電機株式会社 鍵生成装置及びデータ提供装置及び端末装置及びプログラム
JP5333785B2 (ja) 2010-06-07 2013-11-06 トヨタ自動車株式会社 鍵装置、錠制御装置、制御用プログラムおよび制御方法
US10104183B2 (en) * 2010-06-22 2018-10-16 Microsoft Technology Licensing, Llc Networked device authentication, pairing and resource sharing
US9768956B2 (en) * 2010-07-28 2017-09-19 General Motors Llc Methods and systems for facilitating communications between vehicles and service providers
US8644515B2 (en) * 2010-08-11 2014-02-04 Texas Instruments Incorporated Display authenticated security association
JP5707783B2 (ja) 2010-08-30 2015-04-30 トヨタ自動車株式会社 暗号鍵更新システム、スマートキーシステムおよび暗号鍵更新方法
US8907760B2 (en) * 2010-09-09 2014-12-09 Nxp B.V. Multiple-frequency solutions for remote access systems
US8335502B2 (en) * 2010-09-21 2012-12-18 General Motors Llc Method for controlling mobile communications
FR2965434B1 (fr) * 2010-09-28 2015-12-11 Valeo Securite Habitacle Procede d'appairage d'un telephone mobile avec un vehicule automobile et ensemble de verrouillage/deverrouillage
JP5120437B2 (ja) * 2010-10-19 2013-01-16 トヨタ自動車株式会社 車載機、車両用認証システム及びデータ通信方法
US8326259B2 (en) 2010-11-05 2012-12-04 GM Global Technology Operations LLC Remote application of vehicle component settings
US8996868B2 (en) * 2010-12-15 2015-03-31 Electronics And Telecommunications Research Institute Method of authenticating vehicle communication
US8706350B2 (en) * 2010-12-17 2014-04-22 GM Global Technology Operations LLC Secondary sensing for intelligent passive entry passive start polling
KR101867558B1 (ko) 2010-12-21 2018-06-15 퀄컴 인코포레이티드 뷰이미지의 적어도 하나의 피처에 주석을 달기 위한 컴퓨터화 방법 및 장치
US8659414B1 (en) * 2010-12-22 2014-02-25 Chad Schuk Wireless object-proximity monitoring and alarm system
US8933782B2 (en) * 2010-12-28 2015-01-13 Toyota Motor Engineering & Manufaturing North America, Inc. Mobile device connection system
US20120179323A1 (en) * 2011-01-06 2012-07-12 Ford Global Technologies, Llc Method and Apparatus for Charging Station Guidance
US20120201379A1 (en) * 2011-02-04 2012-08-09 Motorola Solutions, Inc. Method and apparatus for protecting security parameters used by a security module
US20130042112A1 (en) * 2011-02-12 2013-02-14 CertiVox Ltd. Use of non-interactive identity based key agreement derived secret keys with authenticated encryption
ES2530870T3 (es) * 2011-03-11 2015-03-06 Telit Automotive Solutions Nv Sistema y procedimiento de peaje de carreteras
JP5960678B2 (ja) 2011-03-15 2016-08-02 パナソニック株式会社 改ざん監視システム、管理装置、保護制御モジュール及び検知モジュール
TW201628371A (zh) 2011-03-23 2016-08-01 內數位專利控股公司 確寶網路通訊系統及方法
US8965287B2 (en) * 2011-04-01 2015-02-24 Tony Lam Battery powered passive keyless entry system for premise entry
US9098865B2 (en) * 2011-04-07 2015-08-04 Facebook, Inc. Ultrasonic near-field communication
US20120303178A1 (en) 2011-05-26 2012-11-29 Hendry Jeffrey C Method and system for establishing user settings of vehicle components
US20120322380A1 (en) * 2011-06-16 2012-12-20 Owen Nannarone Localized tracking of items with electronic labels
US9303442B2 (en) * 2011-06-21 2016-04-05 GM Global Technology Operations LLC Passive verification of operator presence in handling requests for vehicle features
US8976028B2 (en) * 2011-07-15 2015-03-10 Okkola Technologies, Llc Apparatus and method of using a computing device to track items
US8473153B1 (en) * 2011-12-22 2013-06-25 Honda Motor Co., Ltd. Key fob battery life preservation system and method
US8494165B1 (en) 2012-01-18 2013-07-23 Square, Inc. Secure communications between devices using a trusted server
US8594616B2 (en) * 2012-03-08 2013-11-26 Ford Global Technologies, Llc Vehicle key fob with emergency assistant service
US9642005B2 (en) * 2012-05-21 2017-05-02 Nexiden, Inc. Secure authentication of a user using a mobile device
US9654968B2 (en) 2012-07-17 2017-05-16 Texas Instruments Incorporated Certified-based control unit-key fob pairing
US9425968B2 (en) * 2013-11-15 2016-08-23 Landis+Gyr Innovations, Inc. System and method for updating an encryption key across a network

Also Published As

Publication number Publication date
US10293785B2 (en) 2019-05-21
US20210114556A1 (en) 2021-04-22
JP6549664B2 (ja) 2019-07-24
US20240106630A1 (en) 2024-03-28
CN110099037A (zh) 2019-08-06
US20160014599A1 (en) 2016-01-14
JP6212120B2 (ja) 2017-10-11
WO2014014934A1 (en) 2014-01-23
US9516500B2 (en) 2016-12-06
US10005429B2 (en) 2018-06-26
US11876896B2 (en) 2024-01-16
US20220009444A9 (en) 2022-01-13
WO2014014945A3 (en) 2014-03-20
US10358113B2 (en) 2019-07-23
JP2018023140A (ja) 2018-02-08
CN104429042A (zh) 2015-03-18
WO2014014945A2 (en) 2014-01-23
US10857975B2 (en) 2020-12-08
JP2019180099A (ja) 2019-10-17
US20190344756A1 (en) 2019-11-14
JP2015530007A (ja) 2015-10-08
US9479932B2 (en) 2016-10-25
CN104412537A (zh) 2015-03-11
US20170048701A1 (en) 2017-02-16
US20140025951A1 (en) 2014-01-23
US11909863B2 (en) 2024-02-20
US20140025950A1 (en) 2014-01-23
US20180304857A1 (en) 2018-10-25
US20160006565A1 (en) 2016-01-07
US20230208620A1 (en) 2023-06-29
US20190270429A1 (en) 2019-09-05
US9166958B2 (en) 2015-10-20
JP6903834B2 (ja) 2021-07-14
US20170203720A1 (en) 2017-07-20
CN104412537B (zh) 2019-01-18
CN110072231A (zh) 2019-07-30
CN104429042B (zh) 2019-01-18
CN110072231B (zh) 2023-07-25
US9654968B2 (en) 2017-05-16

Similar Documents

Publication Publication Date Title
US10293785B2 (en) Certificate-based pairing of key fob device and control unit
US9218700B2 (en) Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs
US10477402B2 (en) One-way key fob and vehicle pairing
US20200382313A1 (en) Authentication system
JP7003832B2 (ja) 車両用電子制御システムおよび車両用電子制御装置
CN117439740A (zh) 一种车内网络身份认证与密钥协商方法、系统及终端

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant