CN111447601B - Implementation method and device of automobile Bluetooth key - Google Patents
Implementation method and device of automobile Bluetooth key Download PDFInfo
- Publication number
- CN111447601B CN111447601B CN202010264107.2A CN202010264107A CN111447601B CN 111447601 B CN111447601 B CN 111447601B CN 202010264107 A CN202010264107 A CN 202010264107A CN 111447601 B CN111447601 B CN 111447601B
- Authority
- CN
- China
- Prior art keywords
- vehicle
- key
- bluetooth
- user identifier
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000012795 verification Methods 0.000 claims abstract description 33
- 230000008569 process Effects 0.000 description 13
- 230000005540 biological transmission Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 101150025733 pub2 gene Proteins 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000002457 bidirectional effect Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an implementation method of an automobile Bluetooth key, which is applied to a server side, a mobile phone side and an automobile machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is issued to the automobile machine side, and the second public key is uploaded to the server side, and the implementation method comprises the following steps: encrypting the second public key and the Bluetooth key by the first private key to obtain an encrypted Bluetooth key, and receiving the encrypted Bluetooth key; the encrypted Bluetooth key is sent to the vehicle-mounted terminal for verification; when the verification is passed, the vehicle-mounted terminal encrypts a user identifier and a target key according to the second public key to obtain a user ciphertext; and receiving the user ciphertext, authenticating the user ciphertext, and issuing a blue tooth control instruction when the authentication is passed. In the implementation method, only authentication is needed at the mobile phone end and the vehicle phone end, and the related function of the Bluetooth key can still be realized under the condition of no connection with the Internet.
Description
Technical Field
The invention relates to the technical field of Internet, in particular to an implementation method and device of an automobile Bluetooth key.
Background
In the unlocking process of the automobile, the Bluetooth key can be adopted for unlocking, and the realization process is as follows: the Bluetooth key function can be completed by sending an instruction according to a customized transmission protocol through a connection channel of BLE Bluetooth of the vehicle-mounted device and the mobile phone. In order to ensure the safety of the interaction channel between the mobile phone and the car phone, the traditional mode is to check the mobile phone and the car phone with the server under the networking condition, so that the Bluetooth key is prevented from being damaged, eavesdropped and modified.
The inventor researches the realization process of the existing Bluetooth key, and discovers that under the condition of networking, the mobile phone and the car phone are respectively checked with the background, and the check times are more.
Disclosure of Invention
In view of the above, the invention provides a method and a device for implementing an automobile Bluetooth key, which are used for solving the problem that the mobile phone and the automobile are respectively checked with the background under the condition of networking, and the check times are more.
The specific scheme is as follows:
the implementation method of the automobile Bluetooth key is applied to a server side, a mobile phone side and an automobile machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is issued to the automobile machine side, and the second public key is uploaded to the server side, and the implementation method comprises the following steps:
encrypting the second public key and the Bluetooth key by the first private key to obtain an encrypted Bluetooth key, and receiving the encrypted Bluetooth key;
the encrypted Bluetooth key is sent to the vehicle-mounted terminal for verification;
when the verification is passed, the vehicle-mounted terminal encrypts a user identifier and a target key according to the second public key to obtain a user ciphertext;
and receiving the user ciphertext, authenticating the user ciphertext, and issuing a blue tooth control instruction when the authentication is passed.
The method, optionally, further comprises:
the server side is enabled to send a preset white list and vehicle related information to the vehicle side, wherein the preset white list comprises all user identifiers allowing the vehicle side to be controlled, and the vehicle related information comprises: the vehicle Bluetooth system comprises a vehicle frame number, a vehicle Bluetooth chip mac address, a user identifier and a temporary user identifier.
The method, optionally, further comprises:
searching each Bluetooth device and acquiring MacAdress of each Bluetooth device;
selecting a target MacAdress matched with the mobile phone end from each MacAdress;
and taking a terminal of the Bluetooth module corresponding to the target MacAdress as the vehicle-mounted terminal.
The method, optionally, sends the encrypted bluetooth key to the vehicle machine end for verification, including:
decrypting the encrypted Bluetooth key according to the first public key to obtain a frame number;
acquiring a first user identification of the current user;
and judging whether each user identifier in the preset white list has the same target user identifier as the first user identifier and whether the frame number is the same as the default frame number of the vehicle machine side.
The above method, optionally, receives the user ciphertext, and authenticates the user ciphertext, including:
decrypting the user ciphertext according to the second private key to obtain a second user identifier;
when the second user identifier is the same as the user identifier, a first authentication instruction is sent to the vehicle-mounted terminal;
and receiving a second authentication instruction sent by the vehicle machine end to finish authentication.
The utility model provides an implementation device of car bluetooth key, is applied to server side, cell-phone end and car machine end, wherein, server side generates first public key and first private key, cell-phone end generates second public key and second private key, will first public key is issued car machine end, will the second public key is uploaded to the server side includes:
the first encryption module is used for enabling the first private key to encrypt the second public key and the Bluetooth key to obtain an encrypted Bluetooth key and receiving the encrypted Bluetooth key;
the verification module is used for sending the encrypted Bluetooth key to the vehicle machine end for verification;
the second encryption module is used for enabling the vehicle-mounted terminal to encrypt the user identifier and the target key according to the second public key when the verification passes, so as to obtain a user ciphertext;
and the authentication module is used for receiving the user ciphertext, authenticating the user ciphertext, and issuing a blue tooth control instruction when the authentication is passed.
The above device, optionally, further comprises:
the issuing module is configured to cause the server side to issue a preset whitelist and vehicle-related information to the vehicle-mounted side, where the preset whitelist includes all user identifiers that allow control of the vehicle-mounted side, and the vehicle-related information includes: the vehicle Bluetooth system comprises a vehicle frame number, a vehicle Bluetooth chip mac address, a user identifier and a temporary user identifier.
The above device, optionally, further comprises:
the acquisition module is used for searching each Bluetooth device and acquiring MacAdress of each Bluetooth device;
the selecting module is used for selecting target MacAdress matched with the mobile phone end from each MacAdress;
and the determining module is used for taking the terminal of the Bluetooth module corresponding to the target MacAdress as the vehicle terminal.
The above apparatus, optionally, the verification module includes:
the first decryption unit is used for decrypting the encrypted Bluetooth key according to the first public key to obtain a frame number;
the acquisition unit is used for acquiring a first user identification of the current user;
and the judging unit is used for judging whether each user identifier in the preset white list has the same target user identifier as the first user identifier and whether the frame number is the same as the default frame number of the vehicle machine side.
The above apparatus, optionally, the authentication module includes:
the second decryption unit is used for decrypting the user ciphertext according to the second private key to obtain a second user identifier;
the sending unit is used for sending a first authentication instruction to the vehicle machine end when the second user identifier is the same as the user identifier;
and the receiving unit is used for receiving the second authentication instruction sent by the vehicle machine end to finish authentication.
Compared with the prior art, the invention has the following advantages:
the invention discloses an implementation method of an automobile Bluetooth key, which is applied to a server side, a mobile phone side and an automobile machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is issued to the automobile machine side, and the second public key is uploaded to the server side, and the implementation method comprises the following steps: encrypting the second public key and the Bluetooth key by the first private key to obtain an encrypted Bluetooth key, and receiving the encrypted Bluetooth key; the encrypted Bluetooth key is sent to the vehicle-mounted terminal for verification; when the verification is passed, the vehicle-mounted terminal encrypts a user identifier and a target key according to the second public key to obtain a user ciphertext; and receiving the user ciphertext, authenticating the user ciphertext, and issuing a blue tooth control instruction when the authentication is passed. In the implementation method, only authentication is needed at the mobile phone end and the vehicle phone end, and the related function of the Bluetooth key can still be realized under the condition of no connection with the Internet.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a connection relationship between a server side, a mobile phone side and a vehicle-mounted side according to an embodiment of the present application;
fig. 2 is a flowchart of an implementation method of an automobile bluetooth key disclosed in an embodiment of the present application;
fig. 3 is a schematic implementation diagram of an implementation method of an automobile bluetooth key disclosed in an embodiment of the present application;
fig. 4 is a block diagram of an implementation device of an automobile bluetooth key according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The invention discloses a realization method and a device of an automobile Bluetooth key, which are applied to the starting of Bluetooth and the effective range of Bluetooth signals, wherein a mobile phone mobile terminal is used as an automobile key to replace all the use scenes of a physical key of a vehicle, such as: the car door can be automatically unlocked, whistle and flashing light, air conditioner, window opening and the like. In the prior art, a BLE Bluetooth based method for transmitting data is provided. In the transmission process of data, the Bluetooth key is easy to eavesdrop and modify, so that the Bluetooth key is copied by a hacker, the problems of man-in-the-middle attack and the like are caused, and potential safety hazards are caused. Moreover, the mobile phone and the car machine are respectively checked with the background, the check times are more, and the real-time performance of the Bluetooth key use and the normal use under the condition of no network can not be met. Therefore, the invention provides a realization method of the automobile Bluetooth key, which adopts RSA, AES, MD and other technologies to establish a safe Bluetooth channel and completes the application of the Bluetooth key function by reducing the network access times and other modes. The implementation method is applied to a server side, a mobile phone side and a vehicle-to-vehicle side, wherein a connection schematic diagram of the server side, the mobile phone side and the vehicle-to-vehicle side is shown in figure 1, and the implementation method is used for providing available background service environments and terminal SDKs for the projects of the same type,
the server side: the K-Server and the TSP form a management system of the Bluetooth key together, and the TSP interacts with the mobile phone end and the vehicle phone end through HTTPS and TLS respectively to ensure the safety of data transmission. The server side generates a first public key and a first private key, and issues the first public key to the vehicle machine side. The server side stores a preset white list and vehicle related information, wherein the preset white list can be designated by a user, can be updated and changed according to the addition and deletion of temporary users, and is a dynamic list. Such as: and (3) the vehicle renting function is to add a vehicle renting user or delete a user with a vehicle renting expiration, and the TSP updates the white list to the vehicle terminal.
The preset white list comprises the following steps: all user identifications allowing control on the vehicle machine side, wherein the vehicle related information comprises: and issuing the preset white list and the vehicle related information to the vehicle machine side.
The mobile phone terminal comprises: the Bluetooth hardware is screened and checked through the uniqueness of MacAddress, and the checking process is as follows: searching each Bluetooth device, acquiring MacAdress of each Bluetooth device, selecting a target MacAdress matched with the mobile phone terminal from each MacAdress, and taking a terminal of a Bluetooth module corresponding to the target MacAdress as the vehicle terminal.
The vehicle terminal verifies non-vehicle owner information connected each time through a preset white list, confirms the use authority of a vehicle owner, and allows a Bluetooth key to be used when the preset white list contains the non-vehicle owner information, and does not allow the Bluetooth key to be used otherwise, wherein the non-vehicle owner information is a user ID, and the user ID is a unique identification for distinguishing different users. And the mobile phone terminal generates a second public key and a second private key, and uploads the second public key to the server terminal.
The implementation flow of the implementation method is shown in fig. 2, and the implementation flow comprises the following steps:
s101, encrypting the second public key and the Bluetooth key by the first private key to obtain an encrypted Bluetooth key, and receiving the encrypted Bluetooth key;
in the embodiment of the invention, the vehicle owner and the vehicle information are bound at the server, the first public key is issued to the vehicle machine end, the second public key is uploaded to the server at the mobile phone end, and the Bluetooth key and the second public key are encrypted according to the first public key to obtain the encrypted Bluetooth key, wherein the Bluetooth key comprises a vehicle frame number Vin, and the vehicle frame number is used for identifying the vehicle. And sending the encrypted Bluetooth key to the mobile phone end, and receiving the encrypted Bluetooth key by the mobile phone end.
S102, sending the encrypted Bluetooth key to the vehicle machine end for verification;
in the embodiment of the invention, the encrypted Bluetooth key is sent to the vehicle terminal for verification, the verification process at the vehicle terminal is as follows, the encrypted Bluetooth key is decrypted by adopting the first public key, the second public key to be verified and the Bluetooth key to be verified are adopted, the vehicle frame number is obtained in the Bluetooth key to be verified, the first user identification of the current user is obtained, the first user identification is compared with each user identification in the preset white list, the vehicle frame number is compared with the default vehicle frame number at the vehicle terminal, and whether the target user identification identical to the first user identification exists in each user identification in the preset white list and whether the vehicle frame number identical to the default vehicle frame number at the vehicle terminal is judged, wherein the default vehicle frame number is the vehicle frame number of the current vehicle. And when the two keys are both authenticated, the second public key to be authenticated is the second public key, the Bluetooth key to be authenticated is the Bluetooth key, and the first user identifier is the user identifier. When at least one of the two is different, the verification is not passed.
S103, when the verification is passed, the vehicle-mounted terminal encrypts a user identifier and a target key according to the second public key to obtain a user ciphertext;
in the embodiment of the invention, when receiving the verification passing instruction, the user identifier and the target key are encrypted according to the second public key to obtain the user ciphertext, wherein the target key is obtained by adopting an RSA encryption algorithm, the target key is obtained by encrypting an AES key randomly generated and is used for encrypting the instruction after identity authentication, the user ciphertext is sent to the mobile phone end,
s104, receiving the user ciphertext, authenticating the user ciphertext, and issuing a blue tooth control instruction when the authentication is passed.
In the embodiment of the invention, the mobile phone end receives the user ciphertext, decrypts the user ciphertext by adopting the second private key to obtain a second user identifier and a target key to be verified, compares the second user identifier with the user identifier, judges whether the second user identifier is the same as the user identifier, and when the second user identifier is the same as the user identifier, the target key to be verified is the target key, and sends a first authentication instruction after encrypting the user identifier by adopting the target key to the mobile phone end, so that the mobile phone end knows that the mobile phone end successfully unlocks the ciphertext encrypted by the second public key and takes the target key.
The invention discloses an implementation method of an automobile Bluetooth key, which is applied to a server side, a mobile phone side and an automobile machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is issued to the automobile machine side, and the second public key is uploaded to the server side, and the implementation method comprises the following steps: encrypting the second public key and the Bluetooth key by the first private key to obtain an encrypted Bluetooth key, and receiving the encrypted Bluetooth key; the encrypted Bluetooth key is sent to the vehicle-mounted terminal for verification; when the verification is passed, the vehicle-mounted terminal encrypts a user identifier and a target key according to the second public key to obtain a user ciphertext; and receiving the user ciphertext, authenticating the user ciphertext, and issuing a blue tooth control instruction when the authentication is passed. In the implementation method, only authentication is needed at the mobile phone end and the vehicle phone end, and the related function of the Bluetooth key can still be realized under the condition of no connection with the Internet.
After the vehicle-mounted terminal receives the first authentication instruction, the vehicle-mounted terminal also replies the user identification encrypted by the target key to the mobile phone terminal, so that the mobile phone terminal knows that the vehicle-mounted terminal can decrypt the target key and the vehicle can trust the mobile phone terminal, and can start issuing the bluetooth control instruction.
In the embodiment of the present invention, the implementation process is illustrated, and the specific implementation process is shown in fig. 3, where it is assumed that the implementation process is performed in APP of the mobile phone, an integral service provider TSP (Telematics Service Provider) at the server side, and TBox (Telematics BOX) at the vehicle end, and public-private key pair public key pub2, private key pte2, public key pub1, and private key pte1 are generated in APP and TSP, respectively, where public key pub2 is 512 bits, and public key pub1 is 2048 bits. Binding owner information and vehicles in the TSP, issuing a public key pub1, a preset white list and vehicle related information to a TBox end, uploading a public key pub2 to the TSP in the APP, encrypting a Bluetooth key bleKey and the public key pub2 by using a private key pte1 to generate a ciphertext bleKey Sec, issuing the bleKey Sec to the APP, and respectively storing the private keys at two ends without transmission.
The APP segment sends the bleKeySec issued by TSP to the TBox, decrypts the bleKeySec according to the public key Pub1 to obtain bleKey, obtains bleKeyzhong frame number, obtains current user ID, verifies the frame number and the current user ID, and when verification passes, encrypts a randomly generated AES key (encrypted instruction after identity authentication) by using the public key Pub2 at the TBox end to confirm one-way authentication: the user id is encrypted by using the received random AES key and sent to the TBox, so that the vehicle knows that the App has successfully unwrapped the ciphertext encrypted by the public key pub2 and has taken the AES key. Confirming bidirectional authentication: the Tbox also replies the user id encrypted by the AES key to the App, so that the App knows that the TBox can decrypt the AES and the vehicle trusts the App and can start to send the blue tooth control instruction.
Aiming at the mobile phone terminal, in the process of data transmission with the mobile phone terminal, the integrity check of the data is realized by adopting md5 encryption on the data, wherein the check process is as follows, the integrity check is carried out in a signature mode, the ciphertext of the data encrypted by the md5 is spliced behind the original data to be transmitted together, the data receiving party also carries out md5 encryption on the original data, the received ciphertext is compared with the ciphertext generated by encryption of the data, and if the ciphertext is consistent, the data is proved to be complete and not lost.
In the embodiment of the invention, the security, consistency and traceability of the Bluetooth key are ensured by storing the key and the vehicle related data at the server side. And adopting an RSA asymmetric encryption mode to perform bidirectional authentication on identities of the mobile phone end and the vehicle phone end. Preventing man-in-the-middle attacks. And after the identity authentication, in order to improve the data interaction performance, the data interaction is performed by adopting an AES symmetric encryption mode. By carrying out RSA asymmetric encryption on the Bluetooth key, the problem of local storage of the Bluetooth key can be solved, and the Bluetooth key is not required to be stolen, copied and destroyed. Further, a white list mechanism of the vehicle is introduced. Under the condition that the Bluetooth key is revoked for sharing, the user is prevented from maliciously continuing to use the Bluetooth key. The occurrence of the situation can be effectively reduced or reduced by controlling the white list preset at the vehicle machine side.
Preferably, in the embodiment of the invention, the SDK is provided for a vehicle-mounted terminal (Linux) and a mobile phone terminal (Android and iOS), and is directly integrated for different platforms.
Based on the implementation method of the automobile bluetooth key, the embodiment of the invention provides an implementation device of the automobile bluetooth key, which is applied to a server side, a mobile phone side and an automobile machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is sent to the automobile machine side, the second public key is uploaded to the server side, and the structural block diagram of the implementation device is shown in fig. 4 and comprises:
a first encryption module 201, a verification module 202, a second encryption module 203, and an authentication module 204.
Wherein,,
the first encryption module 201 is configured to enable the first private key to encrypt the second public key and the bluetooth key to obtain an encrypted bluetooth key, and receive the encrypted bluetooth key;
the verification module 202 is configured to send the encrypted bluetooth key to the vehicle machine end for verification;
the second encryption module 203 is configured to, when the verification passes, cause the vehicle-mounted terminal to encrypt the user identifier and the target key according to the second public key, so as to obtain a user ciphertext;
the authentication module 204 is configured to receive the user ciphertext, authenticate the user ciphertext, and issue a bluetooth control instruction when authentication is passed.
The invention discloses an implementation device of an automobile Bluetooth key, which is applied to a server side, a mobile phone side and an automobile machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is issued to the automobile machine side, and the second public key is uploaded to the server side, and the implementation device comprises the following steps: encrypting the second public key and the Bluetooth key by the first private key to obtain an encrypted Bluetooth key, and receiving the encrypted Bluetooth key; the encrypted Bluetooth key is sent to the vehicle-mounted terminal for verification; when the verification is passed, the vehicle-mounted terminal encrypts a user identifier and a target key according to the second public key to obtain a user ciphertext; and receiving the user ciphertext, authenticating the user ciphertext, and issuing a blue tooth control instruction when the authentication is passed. In the implementation device, authentication is only needed at the mobile phone end and the vehicle phone end, and the related function of the Bluetooth key can still be realized under the condition of no connection with the Internet.
In an embodiment of the present invention, the implementation apparatus further includes: and a issuing module 205.
Wherein,,
the issuing module 205 is configured to cause the server side to issue a preset whitelist and vehicle related information to the vehicle side, where the preset whitelist includes all user identifiers that allow control of the vehicle side, and the vehicle related information includes: the vehicle Bluetooth system comprises a vehicle frame number, a vehicle Bluetooth chip mac address, a user identifier and a temporary user identifier.
In an embodiment of the present invention, the implementation apparatus further includes:
an acquisition module 206, a selection module 207 and a determination module 208.
Wherein,,
the acquiring module 206 is configured to search each bluetooth device, and acquire MacAdress of each bluetooth device;
the selecting module 207 is configured to select a target MacAdress matched with the mobile phone end from the MacAdress;
the determining module 208 is configured to take, as the vehicle terminal, a terminal where a bluetooth module corresponding to the target MacAdress is located.
In an embodiment of the present invention, the verification module 202 includes:
a first decryption unit 209, an acquisition unit 210, and a judgment unit 211.
Wherein,,
the first decryption unit 209 is configured to decrypt the encrypted bluetooth key according to the first public key to obtain a frame number;
the obtaining unit 210 is configured to obtain a first user identifier of the current user;
the determining unit 211 is configured to determine whether each user identifier in the preset whitelist has the same target user identifier as the first user identifier and whether the frame number is the same as a default frame number of the vehicle machine.
In an embodiment of the present invention, the authentication module 204 includes:
a second decryption unit 212, a transmission unit 213, and a reception unit 214.
Wherein,,
the second decryption unit 212 is configured to decrypt the user ciphertext according to the second private key to obtain a second user identifier;
the sending unit 213 is configured to send a first authentication instruction to the vehicle machine end when the second user identifier is the same as the user identifier;
the receiving unit 214 is configured to receive the second authentication instruction sent by the vehicle machine end, and complete authentication.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described as different from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other. For the apparatus class embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference is made to the description of the method embodiments for relevant points.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in the same piece or pieces of software and/or hardware when implementing the present invention.
From the above description of embodiments, it will be apparent to those skilled in the art that the present invention may be implemented in software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments or some parts of the embodiments of the present invention.
The above describes in detail the implementation method and apparatus of the bluetooth key for an automobile provided by the present invention, and specific examples are applied to illustrate the principle and implementation of the present invention, and the description of the above examples is only used to help understand the method and core idea of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.
Claims (6)
1. The implementation method of the automobile Bluetooth key is characterized by being applied to a server side, a mobile phone side and an automobile machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is issued to the automobile machine side, and the second public key is uploaded to the server side, and the implementation method comprises the following steps:
the server encrypts the second public key and the Bluetooth key by using the first private key to obtain an encrypted Bluetooth key and sends the encrypted Bluetooth key to the mobile phone terminal, and the mobile phone terminal receives the encrypted Bluetooth key;
the mobile phone end sends the encrypted Bluetooth key to the vehicle phone end for verification;
the vehicle-mounted terminal receives the encrypted Bluetooth key, decrypts the encrypted Bluetooth key by adopting the first public key, obtains a vehicle frame number, and judges whether each user identifier in a preset white list has the same target user identifier as the first user identifier and whether the vehicle frame number is the same as a default vehicle frame number of the vehicle-mounted terminal;
when it is determined that each user identifier in the preset white list exists, and whether the target user identifier and the frame number which are the same as the first user identifier are the same as the default frame number of the vehicle-mounted terminal or not, determining that verification is passed, encrypting the user identifier and the target key by the vehicle-mounted terminal according to the second public key to obtain a user ciphertext, and sending the user ciphertext to the mobile phone terminal;
the mobile phone terminal receives the user ciphertext, and decrypts the user ciphertext according to the second private key to obtain a second user identifier; and when the second user identifier is the same as the user identifier, a first authentication instruction is sent to the vehicle-mounted terminal, and the vehicle-mounted terminal receives the first authentication instruction and completes authentication of the vehicle-mounted terminal to send a bluetooth control instruction to the mobile phone terminal.
2. The method as recited in claim 1, further comprising:
the server side is enabled to send a preset white list and vehicle related information to the vehicle side, wherein the preset white list comprises all user identifiers allowing the vehicle side to be controlled, and the vehicle related information comprises: the vehicle Bluetooth system comprises a vehicle frame number, a vehicle Bluetooth chip mac address, a user identifier and a temporary user identifier.
3. The method as recited in claim 1, further comprising:
searching each Bluetooth device and acquiring MacAdress of each Bluetooth device;
selecting a target MacAdress matched with the mobile phone end from each MacAdress;
and taking a terminal of the Bluetooth module corresponding to the target MacAdress as the vehicle-mounted terminal.
4. The system is characterized by comprising a server side, a mobile phone side and a vehicle machine side, wherein the server side generates a first public key and a first private key, the mobile phone side generates a second public key and a second private key, the first public key is issued to the vehicle machine side, and the second public key is uploaded to the server side, and the system comprises:
the server includes: the first encryption module is used for encrypting the second public key and the Bluetooth key by utilizing the first private key, so as to obtain an encrypted Bluetooth key and sending the encrypted Bluetooth key to the mobile phone terminal, and the mobile phone terminal receives the encrypted Bluetooth key;
the mobile phone terminal comprises: the verification module comprises a module for sending the encrypted Bluetooth key to the vehicle machine end for verification;
the vehicle-mounted terminal comprises a receiving module, wherein the receiving module is used for receiving the encrypted Bluetooth key, decrypting the encrypted Bluetooth key by adopting the first public key, obtaining a vehicle frame number, and judging whether each user identifier in a preset white list has the same target user identifier as the first user identifier and whether the vehicle frame number is the same as a default vehicle frame number of the vehicle-mounted terminal;
when it is determined that each user identifier in the preset white list exists, and whether the target user identifier and the frame number which are the same as the first user identifier are the same as the default frame number of the vehicle-mounted terminal or not, determining that verification is passed;
the vehicle-mounted terminal comprises: the second encryption module is used for encrypting the user identifier and the target key according to the second public key when the verification is confirmed to pass, obtaining a user ciphertext and sending the user ciphertext to the mobile phone terminal;
the mobile phone terminal comprises: the authentication module is used for receiving the user ciphertext, decrypting the user ciphertext according to the second private key and obtaining a second user identifier; when the second user identifier is the same as the user identifier, a first authentication instruction is sent to the vehicle-mounted terminal, the vehicle-mounted terminal receives the first authentication instruction and completes authentication, and the vehicle-mounted terminal sends a bluetooth control instruction to the mobile phone terminal.
5. The system of claim 4, further comprising:
the issuing module is configured to cause the server side to issue a preset whitelist and vehicle-related information to the vehicle-mounted side, where the preset whitelist includes all user identifiers that allow control of the vehicle-mounted side, and the vehicle-related information includes: the vehicle Bluetooth system comprises a vehicle frame number, a vehicle Bluetooth chip mac address, a user identifier and a temporary user identifier.
6. The system of claim 4, further comprising:
the acquisition module is used for searching each Bluetooth device and acquiring MacAdress of each Bluetooth device;
the selecting module is used for selecting target MacAdress matched with the mobile phone end from each MacAdress;
and the determining module is used for taking the terminal of the Bluetooth module corresponding to the target MacAdress as the vehicle terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010264107.2A CN111447601B (en) | 2020-04-07 | 2020-04-07 | Implementation method and device of automobile Bluetooth key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010264107.2A CN111447601B (en) | 2020-04-07 | 2020-04-07 | Implementation method and device of automobile Bluetooth key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111447601A CN111447601A (en) | 2020-07-24 |
CN111447601B true CN111447601B (en) | 2023-06-20 |
Family
ID=71652841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010264107.2A Active CN111447601B (en) | 2020-04-07 | 2020-04-07 | Implementation method and device of automobile Bluetooth key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111447601B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039951A (en) * | 2020-08-05 | 2020-12-04 | 华人运通(上海)云计算科技有限公司 | Safe distribution method, device and system of vehicle Bluetooth key and storage medium |
CN112637136A (en) * | 2020-12-03 | 2021-04-09 | 北京北信源软件股份有限公司 | Encrypted communication method and system |
CN112887948B (en) * | 2021-01-15 | 2023-04-18 | 英华达(上海)科技有限公司 | Method and system for binding Bluetooth device |
CN114885328B (en) * | 2021-01-21 | 2024-01-16 | 华为技术有限公司 | Vehicle-computer connection method and device |
CN115134381A (en) * | 2021-03-25 | 2022-09-30 | 上海博泰悦臻网络技术服务有限公司 | Internet of vehicles data transmission method and device and electronic equipment |
CN113347597B (en) * | 2021-05-27 | 2022-07-15 | 江铃汽车股份有限公司 | Communication encryption method and system of Bluetooth key |
CN113676316B (en) * | 2021-07-06 | 2024-03-22 | 惠州市德赛西威汽车电子股份有限公司 | Method for opening debugging tool of vehicle system based on website access mode |
CN113781678B (en) * | 2021-09-01 | 2023-06-13 | 上汽通用五菱汽车股份有限公司 | Vehicle Bluetooth key generation and authentication method and system in networking-free environment |
CN114374950B (en) * | 2022-01-14 | 2024-07-19 | 重庆长安汽车股份有限公司 | Bluetooth-based short-range car control system, car control method and car |
CN115002683A (en) * | 2022-05-13 | 2022-09-02 | 上海汽车集团股份有限公司 | Bluetooth key connection method and device, central gateway of automobile and storage medium |
CN115019423B (en) * | 2022-06-27 | 2023-10-24 | 无锡融卡科技有限公司 | Bluetooth car key distribution system and implementation method thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105991643A (en) * | 2015-03-20 | 2016-10-05 | 现代自动车美国技术研究所 | Method and apparatus for performing secure Bluetooth communication |
CN106792440A (en) * | 2016-11-29 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method of opening car door, mobile terminal, car-mounted terminal and system |
CN107685714A (en) * | 2017-08-30 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | Intelligent vehicle key system and its control method |
WO2018040641A1 (en) * | 2016-08-31 | 2018-03-08 | 长城汽车股份有限公司 | Mobile terminal, vehicle terminal, and virtual key sharing method and system |
CN109727358A (en) * | 2019-02-21 | 2019-05-07 | 深圳四海万联科技有限公司 | Vehicle share system based on bluetooth key |
CN110177354A (en) * | 2019-06-21 | 2019-08-27 | 湖北亿咖通科技有限公司 | A kind of wireless control method and system of vehicle |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SG10201704077UA (en) * | 2017-05-18 | 2018-12-28 | Huawei Int Pte Ltd | Electronic key system for vehicles access based on portable devices |
-
2020
- 2020-04-07 CN CN202010264107.2A patent/CN111447601B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105991643A (en) * | 2015-03-20 | 2016-10-05 | 现代自动车美国技术研究所 | Method and apparatus for performing secure Bluetooth communication |
WO2018040641A1 (en) * | 2016-08-31 | 2018-03-08 | 长城汽车股份有限公司 | Mobile terminal, vehicle terminal, and virtual key sharing method and system |
CN106792440A (en) * | 2016-11-29 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method of opening car door, mobile terminal, car-mounted terminal and system |
CN107685714A (en) * | 2017-08-30 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | Intelligent vehicle key system and its control method |
CN109727358A (en) * | 2019-02-21 | 2019-05-07 | 深圳四海万联科技有限公司 | Vehicle share system based on bluetooth key |
CN110177354A (en) * | 2019-06-21 | 2019-08-27 | 湖北亿咖通科技有限公司 | A kind of wireless control method and system of vehicle |
Also Published As
Publication number | Publication date |
---|---|
CN111447601A (en) | 2020-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111447601B (en) | Implementation method and device of automobile Bluetooth key | |
CN107085870B (en) | Regulating vehicle access using encryption methods | |
WO2019109727A1 (en) | Identity verification method and apparatus | |
JP6731887B2 (en) | Maintenance system and maintenance method | |
CN110324335B (en) | Automobile software upgrading method and system based on electronic mobile certificate | |
JP5579938B2 (en) | Authentication of access terminal identification information in roaming networks | |
CN110572418B (en) | Vehicle identity authentication method and device, computer equipment and storage medium | |
KR100843072B1 (en) | Wireless network system and communication method using wireless network system | |
CN110290525A (en) | A kind of sharing method and system, mobile terminal of vehicle number key | |
CN110177354A (en) | A kind of wireless control method and system of vehicle | |
CN110637328A (en) | Vehicle access method based on portable equipment | |
KR20170139093A (en) | A method for a network access device to access a wireless network access point, a network access device, an application server, and a non-volatile computer readable storage medium | |
JP2004274193A (en) | Radio communication system, terminal, processing method therein and program for executing the method by terminal | |
WO2017150270A1 (en) | Communication system, hardware security module, terminal device, communication method, and program | |
CN112396735B (en) | Internet automobile digital key safety authentication method and device | |
CN111080858A (en) | Bluetooth key logout method and device | |
KR20060077444A (en) | User authentication method and system being in home network | |
CN105636037B (en) | Authentication method, device and electronic equipment | |
CN111083696B (en) | Communication verification method and system, mobile terminal and vehicle machine side | |
CN111601280B (en) | Access verification method and device | |
CN111163091A (en) | Cloud server of Bluetooth key and communication method thereof | |
CN111147501A (en) | Bluetooth key inquiry method and device | |
WO2017020530A1 (en) | Enhanced wlan certificate authentication method, device and system | |
CN103152326A (en) | Distributed authentication method and authentication system | |
CN111200807B (en) | Bluetooth-based information interaction method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |