CN110909315B - Matlab-based encryption method and device for verification model of automobile anti-theft function - Google Patents

Matlab-based encryption method and device for verification model of automobile anti-theft function Download PDF

Info

Publication number
CN110909315B
CN110909315B CN201811061670.9A CN201811061670A CN110909315B CN 110909315 B CN110909315 B CN 110909315B CN 201811061670 A CN201811061670 A CN 201811061670A CN 110909315 B CN110909315 B CN 110909315B
Authority
CN
China
Prior art keywords
verification model
verification
theft
model
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811061670.9A
Other languages
Chinese (zh)
Other versions
CN110909315A (en
Inventor
谢众玉
张武学
丁雪容
徐远新
伊海霞
韦昌宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GAC Aion New Energy Automobile Co Ltd
Original Assignee
GAC Aion New Energy Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GAC Aion New Energy Automobile Co Ltd filed Critical GAC Aion New Energy Automobile Co Ltd
Priority to CN201811061670.9A priority Critical patent/CN110909315B/en
Publication of CN110909315A publication Critical patent/CN110909315A/en
Application granted granted Critical
Publication of CN110909315B publication Critical patent/CN110909315B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Testing And Monitoring For Control Systems (AREA)

Abstract

The invention provides an encryption method and a device of a verification model of an electronic anti-theft function of an automobile based on Matlab, wherein the method comprises the following steps: s1, according to the anti-theft check function requirement document, the anti-theft check control strategy and the interaction document, confirming the anti-theft algorithm and the check algorithm; s2, respectively realizing an anti-theft model and a verification model based on a Simulink platform of Matlab; s3, encrypting the verification model to obtain an encrypted verification model and an executable file; s4, confirming the equivalence of the encryption verification model and the verification model; s5 copies the encryption verification model and the files of c, h and mexw32 or mexw64 under the directory for outsourcing test. The encryption verification model of the invention reserves the advantages of model development without the risk of secret divulgence of an anti-theft algorithm, and is very convenient to modify and debug the verification model.

Description

Matlab-based encryption method and device for verification model of automobile anti-theft function
Technical Field
The invention relates to the field of automobile anti-theft, in particular to an encryption method and device of a verification model of an automobile anti-theft function based on Matlab.
Background
With the stricter and stricter fuel consumption and emission standards, the reduction of fuel consumption becomes the key research and development point of various automobile manufacturers, and the development of new energy automobiles becomes the current important trend. New energy vehicles mainly comprise pure electric vehicles and hybrid electric vehicles at present. The anti-theft function of the hybrid electric vehicle is similar to that of the traditional vehicle because the hybrid electric vehicle is provided with the engine and the controller thereof. The pure electric vehicle is not provided with an engine and a controller thereof, so an anti-theft function must be developed on a vehicle control unit VCU to ensure the safety of the vehicle. How to develop the anti-theft function of the VCU and simultaneously keep secret and prevent theft algorithm is important for new energy automobile factories, especially pure electric automobile factories, which do not have the function test condition and need to be tested outsourcing. The automobile anti-theft function is realized based on the interaction of an anti-theft check algorithm among different controllers, has the characteristics of high real-time performance, data randomness and the like, and various tests must be carried out on the interactive controllers at each stage of anti-theft function development in order to ensure the safety and reliability of the anti-theft function. The controllers are not products of a manufacturer, and before a loading test, a calibration model needs to be built for individual test according to interaction requirements and an anti-theft algorithm. Different from the encryption and decryption of the current PC or the Internet, the anti-theft algorithm of the automotive electronics is limited by hardware, and only a symmetric encryption and decryption algorithm (the encryption algorithm and the decryption algorithm are the same or reversible) can be adopted, so once the encryption or decryption algorithm of a certain project is leaked in the anti-theft function development process, the failure of the anti-theft function development of the project is declared, the mass production time after the re-development is delayed, and the vehicle is easy to be stolen and needs to be recalled if the re-development is repeated. Therefore, an encryption method that is difficult to be broken and does not affect the function of the verification model is particularly important for the development of the anti-theft function.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an encryption method of a verification model of an electronic anti-theft function of an automobile based on Matlab, which is difficult to crack and does not influence the encryption of the function of the verification model.
The invention provides an encryption method of a verification model of an electronic anti-theft function of an automobile based on Matlab, which comprises the following steps:
s1, confirming an anti-theft algorithm and a verification algorithm according to the anti-theft verification function requirement document, the anti-theft verification control strategy and the interaction document;
s2, acquiring an anti-theft model and a verification model based on a Simulink platform of Matlab according to the anti-theft algorithm and the verification algorithm;
s3, encrypting the verification model to obtain an encrypted verification model and an executable file.
Wherein the method further comprises the steps of:
s4, confirming the equivalence of the encryption verification model and the verification model, if the encryption verification model is not equivalent to the verification model, carrying out encryption operation on the verification model again until the encryption verification model is equivalent to the verification model.
Wherein, before the step S1, the method further includes:
according to the anti-theft function development requirement of an automobile model project, an anti-theft verification function control strategy capable of being tested and interaction logic of a participating controller are determined, and an anti-theft verification function requirement document, an anti-theft verification control strategy and an interaction document are compiled based on the anti-theft function development requirement.
Wherein the step S1 further includes: and acquiring a random number test data set which accords with the anti-theft function according to the anti-theft algorithm, and extracting the anti-theft function test requirement based on the test data set.
Wherein, the step S3 specifically includes:
setting simulation running time, Solver algorithm type and step size in a Solver (Solver) tab of Configuration Parameters (Configuration Parameters);
the system object file is set in the Real-Time Workshop (Real-Time Workshop) tab of the Configuration Parameters (Configuration Parameters) and the new Build (Build) button is clicked after the creation of the new model (Create new) is selected in its child tab Real-Time Workshop S-Function code generator (Real-Time Workshop S-Function code generation).
Wherein: the type of the solver algorithm adopts a fixed step length, the solver algorithm adopts ODE3, and the step length is the same as or in the same order of magnitude as the running time step length of the controller carrying the anti-theft function.
Wherein the confirming equivalence between the encryption verification model and the verification model specifically comprises:
respectively inputting random numbers which accord with the anti-theft function into the encryption verification model and the verification model, and simulating to obtain output results of the encryption verification model and the verification model;
and if the output result of the encryption verification model is the same as the output result of the verification model, the encryption verification model is equivalent to the verification model, otherwise, the encryption verification model is not equivalent.
Wherein the method further comprises the steps of:
s5, exporting the encryption verification model and the executable file to carry out outsourcing test, wherein the encryption verification model and the executable file comprise: the encryption check model file and the c,. h and the mexw32 or mexw64 files under the same directory.
The anti-theft model and the verification model are respectively provided with a reserved interface and interface information.
The invention also provides an encryption device of the verification model of the electronic anti-theft function of the automobile based on Matlab, which comprises the following components:
the confirming unit is used for confirming the anti-theft algorithm and the verification algorithm according to the anti-theft verification function requirement document, the anti-theft verification control strategy and the interaction document;
the model generating unit is used for obtaining an anti-theft model and a verification model based on a Simulink platform of Matlab according to the anti-theft algorithm and the verification algorithm;
and the encryption unit is used for encrypting the verification model to obtain an encrypted verification model and an executable file.
Wherein the apparatus further comprises: and the verification unit is used for confirming the equivalence of the encryption verification model and the verification model, and if the encryption verification model is not equivalent to the verification model, the encryption operation is carried out on the verification model again until the encryption verification model is equivalent to the verification model.
And the export unit is used for exporting the encryption verification model and the executable file to carry out outsourcing test.
The embodiment of the invention has the beneficial effects that: the verification model established based on the anti-theft function test requirement of the model development is mutually equivalent to the original verification model after being encrypted by adopting the steps, and can be used for outsourcing test. Meanwhile, the verification model is compiled into a binary executable file after being encrypted and can only be called through a corresponding interface, so that the advantages of model development are kept by using the encrypted verification model, and the risk of secret leakage of an anti-theft algorithm is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of an encryption method for a verification model of an electronic anti-theft function of an automobile based on Matlab according to an embodiment of the present invention;
FIG. 2 is a flow chart of an encryption method for a verification model of an electronic anti-theft function of an automobile based on Matlab according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an encryption apparatus of a verification model of an electronic anti-theft function of an automobile based on Matlab according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments refers to the accompanying drawings, which are included to illustrate specific embodiments in which the invention may be practiced.
Referring to fig. 1, the present invention provides an encryption method for a verification model of an automobile anti-theft function based on Matlab, including:
the method comprises the steps of determining an anti-theft verification function control strategy capable of being tested and interaction logic of a participating controller according to anti-theft function development requirements of automobile type projects, and compiling an anti-theft verification function requirement document, an anti-theft verification control strategy and an interaction document based on the anti-theft function development requirements.
Specifically, at the initial stage of project development, according to the anti-theft function requirement of a vehicle type project, a control strategy of the anti-theft function and interaction logic of a participating controller are determined, and for the convenience of later testing, the control strategy and the interaction logic are required to be concise and clear and can be tested.
Generally, the flow and timing of the whole anti-theft interaction will be agreed upon in the requirement document or the interaction document, including the flow chart, for example, in a simple example, the requirement document or the interaction document will include the following:
a. powering up the whole vehicle;
b. after 50ms, the VCU sends a message containing the anti-theft check random number;
c. the PEPS is required to reply the anti-theft check response message after the operation within 80 ms;
d. the VCU judges whether the response message data replied by the PEPS is consistent with the data calculated by the VCU according to the algorithm mentioned in the interactive document;
e. if the CAN is matched with the anti-theft check passing flag bit, the anti-theft check passing flag bit is sent to the CAN;
f. if the two signals do not coincide, an anti-theft check failure flag bit is sent to the CAN.
It will be appreciated that the actual situation may be more complex than that listed above, and that this interaction process will generally be described in detail in either the requirements or the interaction document.
In this embodiment, the anti-theft algorithm and the verification algorithm each include a mathematical Encryption algorithm, where the Encryption algorithm may be Advanced Encryption Standard (AES) or WIFI Protected Access second (Wi-Fi Protected Access II, WPA 2) algorithm, and the like;
wherein the step S1 further includes sorting out a part of the test data set based on the anti-theft algorithm, and extracting a specific anti-theft function test requirement based on the test data set, wherein the test data set includes a random number and an unlocking key.
And step S2, acquiring an anti-theft model and a verification model based on a Simulink platform of Matlab according to the anti-theft algorithm and the verification algorithm.
Specifically, according to the determined anti-theft algorithm and the verification algorithm, a corresponding anti-theft model and a corresponding verification model are built in the Simulink, and the simulation of the anti-theft model and the verification model is completed, so that the accuracy of the built anti-theft model and the built verification model is ensured.
Wherein, the check model and the anti-theft model are respectively provided with a reserved interface and detailed interface information.
And step S3, encrypting the verification model to obtain an encrypted verification model and an executable file.
Setting a running time, a step length, a Solver algorithm type and a Solver algorithm in a Solver (Solver) tab of Configuration Parameters (Configuration Parameters) for the verification model; it will be appreciated that the solver algorithm types may include fixed step size, variable step size, etc.; and solver algorithms can be classified as continuous, discrete, ODE1, ODE2, ODE3, and the like.
In this embodiment, setting the runtime includes setting a start time, an end time, and a step size of the simulation, where the step size should be the same as or in the same order of magnitude as the runtime step size of the controller carrying the function, the solver algorithm type should be a fixed step size, and the solver algorithm may be an ODE algorithm or other algorithms according to the required accuracy.
Setting a system target file for a verification model in a Real-Time workshops (Real-Time Workshop) with Configuration Parameters (Configuration Parameters), selecting a new model (Create new model) from a sub-tab Real-Time workshops S-Function Generation Options, and clicking a new (Build) button to complete encryption of the verification model, wherein the newly generated model is an encrypted verification model.
After clicking new building (Build) operation, the system generates Simulink model of the encryption verification model and simultaneously generates C, H and mexw32 or mexw64 files of the encryption model.
As shown in fig. 2, the encryption method may further include, in addition to the above steps S1-S3:
step S4: and confirming the equivalence of the encryption verification model and the verification model, if the encryption verification model is not equivalent to the verification model, carrying out encryption operation on the verification model again until the encryption verification model is equivalent to the verification model.
Specifically, the step of confirming the equivalence of the encryption verification model and the verification model specifically includes:
selecting several groups of random numbers which accord with the anti-theft function, inputting the random numbers into the encryption verification model and the original verification model respectively for simulation to obtain output data of the encryption verification model and output data of the original verification model respectively, if the output data of the encryption verification model is the same as the output data of the original verification model, considering that the encryption verification model is equivalent to the original verification model, and otherwise, considering that the encryption model is not equivalent to the original verification model.
The encryption method further includes step S5:
s5, exporting the encrypted verification model and the executable file in the directory for outsourcing test, where the encrypted verification model and the executable file include: the encryption check model file and the c,. h and the mexw32 or mexw64 files under the same directory.
The mex file is a derivative program of C language called in Matlab environment, and the suffix of the mex file is Mexw32 and Mexw64 according to 32 bits/64 bits. The mex file is a binary file generated by processing of a Matlab compiler, and the file can only be debugged through a corresponding interface. It is a dynamic link program that can be automatically loaded and executed by the Matlab interpreter.
The files C and h are source files of C language, and particularly, the files h are required to be used for mathematical operation.
According to the anti-theft function development requirement of a vehicle type project, a control strategy of an anti-theft function and interaction logic of a participating controller are determined, and for convenience of understanding and testing, the control strategy and the interaction logic are required to be concise and clear and can be tested. Compiling an anti-theft verification function requirement document, an anti-theft verification control strategy and an interaction document according to the development requirement; and determining an anti-theft algorithm and a verification algorithm according to the document of the step S1, respectively building an anti-theft model and a verification model on the Simulink platform according to the anti-theft algorithm and the verification algorithm, and simulating the anti-theft model and the verification model to ensure the accuracy of the anti-theft model and the verification model. After confirming the anti-theft algorithm, a developer can arrange a part of the test data set according to the anti-theft algorithm and put forward a specific anti-theft function test requirement according to the test data set. Wherein the data set includes a random number and an unlock key.
In order to facilitate testing and debugging, the anti-theft model and the verification model require reserved interfaces and have detailed interface information.
Setting the running time, the step length, the type of the Solver algorithm and the specific Solver algorithm in the Solver (solution) option of the Configuration Parameters (Configuration Parameters) for the verification model.
In one embodiment of the invention, the start time of the simulation is selected to be 0, the end time is selected to be 10, the algorithm type is set to Fixed-step, the algorithm is set to ODE3, and the simulation step size is set to 0.001 s.
The verification model is set with relevant Parameters in a Real-Time Workshop (tab) of Configuration Parameters (Configuration Parameters).
Selecting a system target file as follows: tlc, setting Compiler optimization level as optimization off (fast files), selecting a new model (Create new model) in a sub-tab Real-Time Workshop S Function Code generator option (Real-Time Workshop S-Function Generation Options), and then performing new operation to complete encryption of the verification model, wherein the newly generated model is the encryption verification model.
In order to ensure the consistency between the encryption verification model and the original verification model, several groups of random verification numbers conforming to the anti-theft Function are required to be used for verification, wherein the encryption verification model RTW S-Function and the original verification model PEPSRcode can be used for verification, and the random numbers conforming to the anti-theft Function are 744977766 and 1118158781. Respectively inputting random numbers 744977766 and 1118158781, ESKdata and pepSDELTdata into an encryption verification model RTW S-Function and an original verification model pepSRespone Code for simulation, and observing the result output by a display. However, in the RTW S-Function model, the data output by the display is hex 00002E 02 and hex 00014378, and the data output by the model PEPSRespone Code is hex 00004 EDF and hex 738B DBB2, and it can be seen that when the same random number is input, the output results of the verification model and the encryption verification model are different, and therefore, the encryption verification model and the original verification model are not equivalent models, and therefore, the encryption and equivalence tests need to be performed on the original verification model again until the encryption verification model is equivalent to the original verification model.
After the encryption of the verification model is completed, the encrypted verification model PEPS _20171117_ en.mdl and PEPS _20171117_ sf.c, PEPS _20171117_ sf.h and PEPS _20171117_ sf.mexw32 files in the directory are copied to perform an outsourcing MIL test and a bench test.
According to the invention, an anti-theft model and a verification model are respectively realized on a Simulink platform, then an encryption verification model is generated by encrypting the verification model through the RTW of Matlab, and after the consistency of the encryption verification model and an original verification model is confirmed, the encryption verification model and files c, h and mexw32 or mexw64 under a directory are copied for carrying out an MIL test and a bench test outside the commission. The verification model constructed based on the anti-theft function test requirement of the model development is mutually equivalent to the original verification model after being encrypted by adopting the steps, meanwhile, the verification model is compiled into a binary executable file after being encrypted and can only be called through a corresponding interface, so that the advantages of the model development are kept and the risk of disclosure of an anti-theft algorithm is avoided by using the encrypted verification model.
An embodiment of the present invention further provides an encryption apparatus for a verification model of an automobile anti-theft function based on Matlab, as shown in fig. 3, the apparatus includes:
a confirming unit 71, configured to confirm the anti-theft algorithm and the verification algorithm according to the anti-theft verification function requirement document, the anti-theft verification control policy, and the interaction document;
the model generating unit 72 is used for obtaining an anti-theft model and a verification model based on a Simulink platform of Matlab according to the anti-theft algorithm and the verification algorithm;
and the encryption unit 73 is configured to encrypt the verification model to obtain an encrypted verification model and an executable file.
In one embodiment, the apparatus further comprises: and the verification unit 74 is configured to confirm equivalence of the encryption verification model and the verification model, and if the encryption verification model and the verification model are not equivalent, perform encryption operation on the verification model again until the encryption verification model and the verification model are equivalent.
In a specific embodiment, the apparatus further includes an export unit 75 configured to export the cryptographic verification model and the executable file for performing the outsourcing test, where the cryptographic verification model and the executable file include: the encryption check model file and the c,. h and the mexw32 or mexw64 files under the same directory.
For the working principle and the advantageous effects thereof, please refer to the description of the first embodiment of the present invention, which will not be described herein again.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (10)

1. An encryption method for a verification model of an automobile anti-theft function based on Matlab is characterized by comprising the following steps:
s1, confirming an anti-theft algorithm and a verification algorithm according to the anti-theft verification function requirement document, the anti-theft verification control strategy and the interaction document;
s2, acquiring an anti-theft model and a verification model based on a Simulink platform of Matlab according to the anti-theft algorithm and the verification algorithm;
s3, encrypting the verification model to obtain an encrypted verification model and an executable file;
s4, confirming the equivalence of the encryption verification model and the verification model, if the encryption verification model is not equivalent to the verification model, carrying out encryption operation on the verification model again until the encryption verification model is equivalent to the verification model.
2. The encryption method according to claim 1, further comprising, before the step S1:
according to the anti-theft function development requirement of an automobile model project, an anti-theft verification function control strategy capable of being tested and interaction logic of a participating controller are determined, and an anti-theft verification function requirement document, an anti-theft verification control strategy and an interaction document are compiled based on the anti-theft function development requirement.
3. The method according to claim 1, wherein the step S1 further comprises:
and acquiring a random number test data set which accords with the anti-theft function according to the anti-theft algorithm, and extracting the anti-theft function test requirement based on the test data set.
4. The encryption method according to claim 2, wherein the step S3 specifically includes:
setting simulation running time, Solver algorithm type and step size in a Solver (Solver) tab of Configuration Parameters (Configuration Parameters);
the system object file is set in the Real-Time Workshop (Real-Time Workshop) tab of the Configuration Parameters (Configuration Parameters) and the new Build (Build) button is clicked after the creation of the new model (Create new) is selected in its child tab Real-Time Workshop S-Function code generator (Real-Time Workshop S-Function code generation).
5. The encryption method according to claim 4, wherein:
the type of the solver algorithm adopts a fixed step length, the solver algorithm adopts ODE3, and the step length is the same as or in the same order of magnitude as the running time step length of the controller carrying the anti-theft function.
6. The encryption method according to claim 1, wherein said confirming equivalence of the encrypted verification model to the verification model specifically comprises:
respectively inputting random numbers which accord with the anti-theft function into the encryption verification model and the verification model, and simulating to obtain output results of the encryption verification model and the verification model;
and if the output result of the encryption verification model is the same as the output result of the verification model, the encryption verification model is equivalent to the verification model, otherwise, the encryption verification model is not equivalent.
7. The encryption method according to claim 6, wherein said method further comprises the steps of:
s5, exporting the encryption verification model and the executable file to carry out outsourcing test, wherein the encryption verification model and the executable file comprise: the encryption check model file and the c,. h and the mexw32 or mexw64 files under the same directory.
8. The encryption method according to claim 7, wherein:
the anti-theft model and the verification model are respectively provided with a reserved interface and interface information.
9. An encryption device of a verification model of an automobile anti-theft function based on Matlab is characterized by comprising:
the confirming unit is used for confirming the anti-theft algorithm and the verification algorithm according to the anti-theft verification function requirement document, the anti-theft verification control strategy and the interaction document;
the model generating unit is used for obtaining an anti-theft model and a verification model based on a Simulink platform of Matlab according to the anti-theft algorithm and the verification algorithm;
the encryption unit is used for encrypting the verification model to obtain an encrypted verification model and an executable file;
and the verification unit is used for confirming the equivalence of the encryption verification model and the verification model, and if the encryption verification model is not equivalent to the verification model, the encryption operation is carried out on the verification model again until the encryption verification model is equivalent to the verification model.
10. The encryption device of claim 9, wherein: further comprising:
and the export unit is used for exporting the encryption verification model and the executable file to carry out outsourcing test.
CN201811061670.9A 2018-09-12 2018-09-12 Matlab-based encryption method and device for verification model of automobile anti-theft function Active CN110909315B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811061670.9A CN110909315B (en) 2018-09-12 2018-09-12 Matlab-based encryption method and device for verification model of automobile anti-theft function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811061670.9A CN110909315B (en) 2018-09-12 2018-09-12 Matlab-based encryption method and device for verification model of automobile anti-theft function

Publications (2)

Publication Number Publication Date
CN110909315A CN110909315A (en) 2020-03-24
CN110909315B true CN110909315B (en) 2022-03-11

Family

ID=69812117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811061670.9A Active CN110909315B (en) 2018-09-12 2018-09-12 Matlab-based encryption method and device for verification model of automobile anti-theft function

Country Status (1)

Country Link
CN (1) CN110909315B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101055673A (en) * 2007-06-08 2007-10-17 倚天资讯股份有限公司 Vehicular theft-prevention system and vehicular theft-prevention monitoring method
CN101602358A (en) * 2009-06-18 2009-12-16 奇瑞汽车股份有限公司 A kind of engine anti-theft authentication method based on the AES128 cryptographic algorithm
CN104029654A (en) * 2014-05-30 2014-09-10 江苏大学 Car anti-theft method and system based on fingerprint secret key encryption technology
CN104318510A (en) * 2014-11-14 2015-01-28 西北农林科技大学 Image encryption and interpretation method based on Matlab
CN105760736A (en) * 2016-02-19 2016-07-13 北京奇虎科技有限公司 Unlocking method and unlocking device of application program
CN107566353A (en) * 2017-08-21 2018-01-09 浙江大学 A kind of industrial control system safety experiment platform for encrypted master experimental study

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101055673A (en) * 2007-06-08 2007-10-17 倚天资讯股份有限公司 Vehicular theft-prevention system and vehicular theft-prevention monitoring method
CN101602358A (en) * 2009-06-18 2009-12-16 奇瑞汽车股份有限公司 A kind of engine anti-theft authentication method based on the AES128 cryptographic algorithm
CN104029654A (en) * 2014-05-30 2014-09-10 江苏大学 Car anti-theft method and system based on fingerprint secret key encryption technology
CN104318510A (en) * 2014-11-14 2015-01-28 西北农林科技大学 Image encryption and interpretation method based on Matlab
CN105760736A (en) * 2016-02-19 2016-07-13 北京奇虎科技有限公司 Unlocking method and unlocking device of application program
CN107566353A (en) * 2017-08-21 2018-01-09 浙江大学 A kind of industrial control system safety experiment platform for encrypted master experimental study

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
动态密钥机制AES算法在汽车门禁系统中的应用;蒋少华等;《合肥工业大学学报》;20150228;第38卷(第2期);第199-203页 *

Also Published As

Publication number Publication date
CN110909315A (en) 2020-03-24

Similar Documents

Publication Publication Date Title
Lochau et al. Incremental model-based testing of delta-oriented software product lines
CN102779089B (en) Automobile ECU key Simulation Methods and system thereof and verification method
Heffernan et al. Runtime verification monitoring for automotive embedded systems using the ISO 26262 functional safety standard as a guide for the definition of the monitored properties
Keränen et al. Model-based testing of embedded systems in hardware in the loop environment
Dhadyalla et al. Combinatorial testing for an automotive hybrid electric vehicle control system: a case study
CN115437915A (en) Vehicle-based version testing method and device and electronic equipment
CN110909315B (en) Matlab-based encryption method and device for verification model of automobile anti-theft function
WO2016017560A1 (en) Software validation system and controller
Sommer et al. Survey of model-based security testing approaches in the automotive domain
Oka Fuzz testing virtual ECUs as part of the continuous security testing process
CN116132186B (en) Verification method and device of security algorithm module, electronic equipment and storage medium
Ouimet et al. The TASM Toolset: Specification, Simulation, and Formal Verification of Real-Time Systems: (Tool Paper)
Lee et al. Collecting big data from automotive ECUs beyond the CAN bandwidth for fault visualization
KR20140061040A (en) Bms test method using emulator
Lauber et al. Virtual test method for complex and variant-rich automotive systems
Kurachi et al. Proposal of hils-based in-vehicle network security verification environment
Valle et al. Towards the Isolation of Failure-Inducing Inputs in Cyber-Physical Systems: is Delta Debugging Enough?
US9477800B1 (en) System, method, and computer program product for automatically selecting a constraint solver algorithm in a design verification environment
CN111143227A (en) Data operation method, device, terminal and storage medium
Fowler et al. Automating fuzz test generation to improve the security of the controller area network
CN115409194B (en) Quantum program generation system and quantum computer operation system
CN117891229A (en) Power anti-theft simulation test method, device, equipment and storage medium
Khastgir et al. Incorporating ISO 26262 Concepts in an Automated Testing Toolchain Using Simulink Design Verifier™
Oresjo Unpowered opens test with x-ray laminography
Letichevsky et al. Symbolic modelling in white-box model-based testing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211229

Address after: 511434 No. 36, Longying Road, Shilou Town, Panyu District, Guangzhou City, Guangdong Province

Applicant after: GAC AION New Energy Vehicle Co.,Ltd.

Address before: 510030 23 building, Cheng Yue mansion 448-458, Dongfeng Middle Road, Yuexiu District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU AUTOMOBILE GROUP Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: No. 36 Longying Road, Shilou Town, Panyu District, Guangzhou City, Guangdong Province

Patentee after: GAC AION NEW ENERGY AUTOMOBILE Co.,Ltd.

Country or region after: China

Address before: No. 36 Longying Road, Shilou Town, Panyu District, Guangzhou City, Guangdong Province

Patentee before: GAC AION New Energy Vehicle Co.,Ltd.

Country or region before: China