CN111572493A - Vehicle keyless entry and starting system and method based on Internet of vehicles - Google Patents
Vehicle keyless entry and starting system and method based on Internet of vehicles Download PDFInfo
- Publication number
- CN111572493A CN111572493A CN202010382014.XA CN202010382014A CN111572493A CN 111572493 A CN111572493 A CN 111572493A CN 202010382014 A CN202010382014 A CN 202010382014A CN 111572493 A CN111572493 A CN 111572493A
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- vehicle
- session key
- sig
- vehicle end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 106
- 238000003860 storage Methods 0.000 claims abstract description 289
- 230000006854 communication Effects 0.000 claims abstract description 199
- 238000004891 communication Methods 0.000 claims abstract description 193
- 238000012790 confirmation Methods 0.000 claims description 132
- 238000012795 verification Methods 0.000 claims description 42
- 238000002360 preparation method Methods 0.000 claims description 12
- 238000013459 approach Methods 0.000 claims description 6
- 230000006855 networking Effects 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 abstract description 2
- 101100102624 Drosophila melanogaster Vinc gene Proteins 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/101—Bluetooth
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/103—Near field communication [NFC]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/105—Radio frequency identification data [RFID]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/108—Encryption
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/202—Personal digital assistant [PDA]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides a vehicle keyless entry and starting system and method based on an internet of vehicles, which comprises a cloud, at least one vehicle end and at least one intelligent terminal, wherein the cloud is connected with the vehicle end through a network; the cloud end comprises a trusted cloud server, a certificate server and a third security module; the vehicle end comprises a vehicle entering and starting control module, a vehicle end short-range communication module and a second safety module; the intelligent terminal comprises an intelligent terminal control module, a terminal short-range communication module and a first safety module; when the cloud end, the vehicle end and the intelligent terminal perform identity authentication, the cloud end is used for respectively performing identity authentication on the vehicle end and the intelligent terminal, and then the vehicle end and the intelligent terminal perform identity authentication on the cloud end respectively; the method avoids direct mutual authentication between the intelligent terminal and the vehicle terminal, reduces the consumption of storage and calculation resources of the intelligent terminal, and solves the problem that the vehicle key is not universal between vehicles of different brands.
Description
Technical Field
The invention relates to the technical field of vehicle keyless entry and starting, in particular to a vehicle keyless entry and starting system and method based on an internet of vehicles.
Background
With the increasing popularization of automobiles, people have higher and higher requirements on the aspects of intellectualization, comfort, convenience and the like of the automobiles. Against this background, a Passive Entry Passive Start (PEPS) system for vehicles has come into play. The keyless entry and starting technology enables a vehicle user to finish automatic unlocking entry and starting of the vehicle without operating a vehicle key, and is very convenient to use. However, the current mainstream vehicle keyless entry and start scheme still requires the user to carry the corresponding vehicle key with him, which makes it problematic, for example: (1) the risk that the communication between the vehicle key and the vehicle is cracked exists, so that the vehicle is easy to be stolen or stolen; (2) when the car key is stolen or lost, if the car key needs to be reconfigured, a car user can only go to a professional service station to manufacture a matched new key again, the process is time-consuming and labor-consuming, and particularly certain brands of cars can manufacture the new key only by going to other places or abroad, and the cycle is long; in addition, the key is stolen or lost, so that lawless persons can easily steal the vehicle by using the stolen vehicle key or the picked vehicle key, and the situation can be solved only by adopting a vehicle-changing lock mode at present, and the vehicle-changing lock is more time-consuming and labor-consuming; (3) when the vehicle is stolen, at present, only the insurance can be reported and reported, and then discovery or claim settlement is waited for; (4) each vehicle is usually only provided with two keys, which is very inconvenient for users who own a plurality of vehicles and the same vehicle which often needs to be driven by a plurality of users, and for users who own a plurality of vehicles, the users either need to remind the users of taking the corresponding vehicle key each time or take the vehicle key of all vehicles each time or need to drive which vehicle each time, and for the situation that the same vehicle often needs to be driven by a plurality of users, the users can only take the vehicle key back and forth, and in any case, the situations are very inconvenient; (5) vehicle keys are not commonly used between vehicles of different brands.
The concept of the internet of vehicles is derived from the internet of things, namely the internet of vehicles, and by means of a new generation of information communication technology, network connection between vehicles and everything (namely, between vehicles, people, roads and service platforms) is realized, the overall intelligent driving level of the vehicles is improved, safe, comfortable, intelligent and efficient driving feeling and traffic service are provided for users, meanwhile, the traffic operation efficiency is improved, and the intelligent level of social traffic service is improved. Smart terminals represented by smart phones have also become widespread, and many smart phones have security modules such as built-in security chips and short-range communication modules represented by NFC.
How to get into and start the above-mentioned problem of system according to the vehicle keyless, combine the car networking with take the intelligent terminal of security module for the vehicle keyless entering and the start that carry out the safety based on the car networking is both safe and reliable simple high-efficient, can give the better use experience of vehicle user again, is the problem that needs to solve at present urgently.
The invention content is as follows:
the invention aims to overcome the defects of the prior art, and provides a vehicle keyless entry and starting system and method based on the Internet of vehicles, so that the vehicle keyless entry and starting based on the safety of the Internet of vehicles is safe, reliable, simple and efficient, and better use experience can be provided for vehicle users.
In order to achieve the purpose, the invention adopts the technical scheme that: a vehicle keyless entry and starting system based on the Internet of vehicles comprises a cloud, at least one vehicle end and at least one intelligent terminal; the cloud end comprises a trusted cloud server, a certificate server and a third security module; the vehicle end comprises a vehicle entering and starting control module, a vehicle end short-range communication module and a second safety module; the intelligent terminal comprises an intelligent terminal control module, a terminal short-range communication module and a first safety module; the trusted cloud server is respectively connected with the certificate server and the third security module; the vehicle entering and starting control module is respectively connected with the vehicle-end short-range communication module and the second safety module; the intelligent terminal control module is respectively connected with the terminal short-range communication module and the first safety module; the trusted cloud server is in communication connection with at least one vehicle entry and start control module; the vehicle-end short-range communication module is in communication connection with at least one terminal short-range communication module; the terminal short-range communication module is in communication connection with at least one vehicle-end short-range communication module;
the certificate server generates and stores public key certificates for the cloud end, the vehicle end and the intelligent terminal respectively; the first security module, the second security module and the third security module are used for providing a password service function and a secure storage function; the cryptographic service function comprises random number generation, signature operation, encryption and decryption operation and session key generation; the terminal short-range communication module is used for carrying out two-way communication with the vehicle-end short-range communication module; the vehicle entering and starting control module and the intelligent terminal control module are communicated through the vehicle end short-range communication module and the terminal short-range communication module respectively; the intelligent terminal control module calls a corresponding password service function and a corresponding safe storage function provided by the first safe module; the vehicle entering and starting control module calls a corresponding password service function and a corresponding safe storage function provided by the second safety module; the vehicle entering and starting control module is also communicated with the credible cloud server to receive, transmit and process information and data required by authentication; the trusted cloud server is in communication with the vehicle entry and launch control module; the trusted cloud server calls a corresponding cryptographic service function provided by the third security module; the trusted cloud server is also in communication with the certificate server to obtain digital certificate services; the intelligent terminal control module is also used for generating a keyless entry confirmation instruction and a keyless start confirmation instruction; the vehicle entering and starting control module is also used for generating a keyless entering request instruction and executing the keyless entering confirmation instruction; the vehicle entering and starting control module is also used for generating a keyless starting request instruction and executing the keyless starting confirmation instruction;
a vehicle end information storage area is arranged in the credible cloud server of the cloud end, and information stored in the vehicle end information storage area comprises vehicle end information to be subjected to keyless entry and starting; the vehicle end information comprises a vehicle end number; an intelligent terminal information storage area is arranged in the trusted cloud server of the cloud end, and information stored in the intelligent terminal information storage area comprises intelligent terminal information allowing keyless entry and starting of corresponding vehicles; the intelligent terminal information comprises an intelligent terminal number; the trusted cloud server of the cloud maintains correspondence and association between the vehicle side information and the intelligent terminal information; the vehicle end comprises a keyless entry switch and a keyless starting switch; when the cloud end, the vehicle end and the intelligent terminal perform identity authentication, the cloud end is used for respectively performing identity authentication on the vehicle end and the intelligent terminal, and then the vehicle end and the intelligent terminal perform identity authentication on the cloud end respectively;
preferably, the method comprises a preparation stage, an identity authentication stage and a safe keyless entry and starting stage;
preparation phase
Registering the vehicle side information with the trusted cloud server of the cloud side, wherein the trusted cloud server stores the vehicle side information in the vehicle side information storage area; registering the intelligent terminal information with the trusted cloud server at the cloud end, wherein the trusted cloud server stores the intelligent terminal information in the intelligent terminal information storage area; establishing correspondence and association between the vehicle-side information and the intelligent terminal information in the trusted cloud server;
the certificate server respectively generates and stores respective public key certificates for the cloud terminal, the vehicle terminal and the intelligent terminal; the certificate server writes the public key certificate of the cloud end into the first security module of the intelligent terminal in an off-line mode; the certificate server writes the public key certificate of the cloud end into the second safety module of the vehicle end; the cloud end, the vehicle end and the intelligent terminal respectively store private keys corresponding to public keys in corresponding public key certificates; the private key of the cloud is stored in a security storage area of the certificate server or the third security module; the private key of the vehicle end is stored in a safe storage area of a second safety module; the private key of the intelligent terminal is stored in a security storage area of the first security module;
setting an intelligent terminal session key safe storage area, an intelligent terminal session key existence flag bit and a vehicle end number storage area in the first safety module of the intelligent terminal; the intelligent terminal session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the vehicle end; the intelligent terminal session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the vehicle end exists or not, and when the value of the intelligent terminal session key existence zone bit is true or 1, the intelligent terminal session key indicates that a session key for carrying out secure encrypted communication with the vehicle end exists; the initial value of the intelligent terminal session key existence flag bit is set to be false or 0; the vehicle end number storage area is used for storing a vehicle end number of the vehicle end which communicates with the intelligent terminal;
a vehicle-end session key safe storage area, a vehicle-end session key existence flag bit and an intelligent terminal number storage area are arranged in the second safety module of the vehicle end; the vehicle-side session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the intelligent terminal; the vehicle-end session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the intelligent terminal exists or not, and when the value of the vehicle-end session key existence zone bit is true or 1, the vehicle-end session key existence zone bit indicates that a session key for carrying out secure encrypted communication with the intelligent terminal exists; the initial value of the session key existence flag bit of the vehicle end is set to be false or 0; the intelligent terminal number storage area is used for storing an intelligent terminal number of the intelligent terminal which is communicated with the vehicle end;
identity authentication phase
The authentication protocol is as follows:
C->T: NCT;
T->C: {NCT||PES(NTS,IDT,SIGT(NCT))};
C->S: {PES(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT))};
S->C: {PEC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS))};
C->T: PET(KCT,IDC,SIGS(NTS));
wherein S represents a cloud end, C represents a vehicle end, T represents an intelligent terminal, and IDTIndicating the number, ID, of the intelligent terminalCIndicating vehicle end number, PESIndicating encryption with the public key of S, PECRepresenting encryption with the public key of C, PETRepresenting encryption with the public key of T, SIGSSignature by private key of S, SIGCRepresenting signature by the private key of C, SIGTRepresenting a signature by a private key of T, KCTDenotes a session key, N, for secure encrypted communication between C and T, distributed by SCTAnd NCSDenotes the verification factor, N, generated by CTSRepresenting a verification factor generated by T, and representing splicing operation by | l;
the vehicle terminal number IDCMay be a vehicle identification code VINC and/or a license plate number;
firstly, the intelligent terminal approaches to the vehicle end, and then triggers the keyless entry switch or the keyless starting switch on the vehicle end; the vehicle end judges the value of the flag bit of the session key of the vehicle end, if the value of the flag bit of the session key of the vehicle end is true or 1, the safe keyless entry and starting stage is entered, and the identity authentication process is terminated; otherwise, the vehicle end sends a randomly generated verification factor N to the intelligent terminalCT;
Secondly, the intelligent terminal receives a verification factor N sent by the vehicle terminalCTThen, firstly, judging the value of the zone bit of the session key of the intelligent terminal, if the value of the zone bit of the session key of the intelligent terminal is true or 1, entering a safe keyless entry and starting stage, and terminating the identity authentication process; otherwise, the intelligent terminal verifies the factor N by using the private key pair of the intelligent terminalCTSignature operation is carried out to obtain SIGT(NCT) Then, the intelligent terminal randomly generates a verification factor NTSThen, searching the public key certificate of the cloud end stored in the first security module, and using the public key of the cloud end to convert N into NTSAnd the intelligent terminal ID of the intelligent terminalTAnd SIGT(NCT) Encrypting to obtain PES(NTS,IDT,SIGT(NCT) Then verify factor N) is appliedCTAnd PES(NTS,IDT,SIGT(NCT) The spliced data is sent to the vehicle end;
thirdly, the vehicle end receives the N sent by the intelligent terminalCT||PES(NTS,IDT,SIGT(NCT) B) first judges the received NCTWhether the value of (A) is equal to N sent to the intelligent terminal in the first stepCTThe values of (A) are the same; if two NCTIf the values are different, the identity authentication process is terminated; if two NCTIf the values are the same, the vehicle end uses the private key of the vehicle end to verify the factor NCTSignature operation is carried out to obtain SIGC(NCT) Then a new verification factor N is generatedCSThen, the public key certificate of the cloud end stored in the second security module is searched, and a verification factor N is obtained by using the public key of the cloud endCSVerifying factor NCTThe vehicle end number ID of the vehicle endCAnd a signature value SIGC(NCT) Encrypting to obtain PES(NCS,NCT,IDC,SIGC(NCT) ) and then PES(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) ) send to the cloud after splicing;
fourthly, the cloud end receives the { PE transmitted by the vehicle endS(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT) Etc. } then decrypt the PE with its own private key, respectivelyS(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) To obtain N)CS、NCT、IDC、SIGC(NCT) And NTS、IDTAnd SIGT(NCT) (ii) a The cloud end is according to the vehicle end number ID of the vehicle endCSearching whether the vehicle end is registered in the vehicle end information storage area in the credible cloud server at the cloud end, and if not, terminating the identity authentication process; if the intelligent terminal ID is registered, the cloud end continues to code the intelligent terminal ID according to the intelligent terminalTSearching whether the intelligent terminal is registered in the intelligent terminal information storage area in the trusted cloud server at the cloud end, and if not, terminating the identity authentication process; if the vehicle end ID is registered, the cloud end continues to use the vehicle end ID according to the vehicle end number of the vehicle endCFinding out the public key certificate corresponding to the vehicle terminal from the certificate server, and then using the public key in the public key certificate to SIGC(NCT) Operating to decrypt SIGC(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the vehicle end is not passed, terminating the identity authentication process; if the values are the same, the cloud end continues to use the intelligent terminal serial number ID of the intelligent terminalTFinding out the public key certificate corresponding to the intelligent terminal from the certificate server, and then using the public key in the public key certificate to SIGT(NCT) Perform operation and solutionSealed SIGT(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the intelligent terminal is not passed, terminating the identity authentication process; if the values are the same, the cloud calls the third safety module to generate a session key K for the communication between the vehicle end and the intelligent terminalCTAnd respectively pairing N with own private keysCSAnd NTSSigning to obtain SIGS(NCS) And SIGS(NTS) Then, the session key K is usedCTVehicle end number IDCSignature value SIGS(NTS) Obtaining PE after encrypting by the public key of the intelligent terminalT(KCT,IDC,SIGS(NTS) Next, the cloud end uses the public key pair K of the vehicle endCT、IDTAnd SIGS(NCS) Carrying out encryption to obtain PEC(KCT,IDT,SIGS(NCS) Then, the cloud will PEC(KCT,IDT,SIGS(NCS) ) and PET(KCT,IDC,SIGS(NTS) The spliced data is sent to the vehicle end;
fifthly, the vehicle end receives the { PE from the cloud endC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS) ) } then the PE is paired with its own private keyC(KCT,IDT,SIGS(NCS) Carry out decryption operation to obtain a session key KCTID of intelligent terminalT、SIGS(NCS) (ii) a Then, the vehicle end searches the public key certificate of the cloud end stored in the second security module, and uses the public key of the cloud end to pair SIGS(NCS) Performing operation to obtain NCSThen the N isCSAnd in the third stepN sent to the cloudCSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the vehicle end sends a session key KCTStoring the session key into the vehicle-end session key safe storage area, and setting the flag bit of the vehicle-end session key to be true or 1; the vehicle end numbers the intelligent terminal IDTStoring the intelligent terminal number storage area and establishing an intelligent terminal number IDTWith session key KCTSuch that ID is numbered by the smart terminalTCan find the session key KCT(ii) a The vehicle end then sends the PET(KCT,IDC,SIGS(NTS) Forward to the intelligent terminal;
sixthly, the intelligent terminal receives the PE forwarded by the vehicle terminalT(KCT,IDC,SIGS(NTS) After that), the PE is paired with its own private keyT(KCT,IDC,SIGS(NTS) Carry out decryption operation to obtain KCT、IDCAnd SIGS(NTS) Then, the intelligent terminal searches the public key certificate of the cloud end stored in the first security module, and uses the public key of the cloud end to pair SIGS(NTS) Performing operation to obtain NTSThen the N isTSAnd N generated in the second stepTSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the intelligent terminal sends a session key KCTStoring the session key into the secure storage area of the intelligent terminal, and setting the flag bit of the session key of the intelligent terminal to be true or 1; the intelligent terminal numbers the vehicle terminalCStoring the serial number into the serial number storage area of the vehicle end and establishing the serial number ID of the vehicle endCWith session key KCTBy the association of vehicle-side numbers IDCCan find the session key KCT(ii) a At this point, the identity authentication is successfully completed;
secure keyless entry and start phase
After the identity authentication is successful and a session key is established, the vehicle end and the intelligent terminal pass through a session key KCTCarrying out secure encrypted communication; in the communication process, the vehicle end passes through the intelligent terminal number ID stored in the intelligent terminal number storage areaTFinding out the session key K associated with the session key K and stored in the vehicle-side session key safe storage areaCT(ii) a The intelligent terminal passes through the vehicle end number ID stored in the vehicle end number storage areaCFinding out the session key K which is associated with the session key K and stored in the secure storage area of the session key of the intelligent terminalCT;
The safe keyless entry and starting stage comprises a safe keyless entry stage and a safe keyless starting stage;
secure keyless entry stage
The process of the secure keyless entry stage is as follows:
triggering the keyless entry switch on the vehicle end;
the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
the vehicle end generates a keyless entry request instruction and then uses the session key KCTEncrypting the keyless entry request instruction, and sending the obtained keyless entry request instruction ciphertext to the intelligent terminal;
after receiving the keyless entry request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existing zone bit, and if the value of the intelligent terminal session key existing zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
the session key K for the intelligent terminalCTDecrypting the keyless entry request command ciphertext to obtain the keyless entry request command;
The intelligent terminal responds to the keyless entry request instruction to generate a keyless entry confirmation instruction, and then uses the session key KCTEncrypting the keyless entry confirmation instruction, and sending the obtained keyless entry confirmation instruction ciphertext to the vehicle end;
after the vehicle end receives the keyless entry confirmation instruction ciphertext, the session key K is usedCTDecrypting to obtain the keyless entry confirmation instruction;
the vehicle end executes the keyless entry confirmation instruction, and the vehicle door is unlocked;
safe keyless start phase
The process of the secure keyless start phase is as follows:
triggering the keyless start switch on the vehicle end;
the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
the vehicle end generates a keyless start request instruction and then uses the session key KCTEncrypting the keyless starting request instruction, and sending the obtained keyless starting request instruction ciphertext to the intelligent terminal;
after receiving the keyless start request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existing zone bit, and if the value of the intelligent terminal session key existing zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
the session key K for the intelligent terminalCTDecrypting the keyless starting request command ciphertext to obtain the keyless starting request command;
the intelligent terminal responds to the keyless start request instruction to generate a keyless start confirmation instruction, and then uses the session key KCTEncrypting the keyless starting confirmation instruction, and sending the obtained keyless starting confirmation instruction ciphertext to the vehicle end;
after the vehicle end receives the keyless start confirmation instruction ciphertext, the session key K is usedCTDecrypting to obtain the keyless starting confirmation instruction;
and the vehicle end executes the keyless starting confirmation instruction, so that the vehicle is started.
Preferably, the communication between the vehicle end and the intelligent terminal means that the vehicle entering and starting control module of the vehicle end and the intelligent terminal control module of the intelligent terminal communicate with each other through the vehicle end short-range communication module and the terminal short-range communication module, respectively, and the communication content includes receiving and sending authentication data and encryption and decryption data;
the vehicle end communicates with the cloud end, specifically, the vehicle entering and starting control module of the vehicle end communicates with the trusted cloud server of the cloud end, and communication content comprises receiving and sending authentication data and encryption and decryption data;
the session key generation, the signature operation and the encryption and decryption operation performed by the cloud end specifically mean that the trusted cloud server of the cloud end calls a corresponding cryptographic service function provided by the third security module;
the random number generation, signature operation and encryption and decryption operation performed by the vehicle end specifically mean that the vehicle entering and starting control module of the vehicle end calls a corresponding password service function provided by the second security module;
the random number generation, signature operation and encryption and decryption operation performed by the intelligent terminal specifically mean that the intelligent terminal control module of the intelligent terminal calls a corresponding password service function provided by the first security module;
the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction, specifically, the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction by the vehicle entry and start control module;
the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction, specifically, the vehicle access and start control module of the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction;
the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction, specifically, the intelligent terminal control module of the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction;
setting a vehicle-side session key duration storage area in the second security module of the vehicle side; the vehicle terminal session key storage area is used for storing a vehicle terminal session key storage time value, the vehicle terminal starts to count down by the vehicle terminal session key storage time value from the time when the value of the vehicle terminal session key storage flag bit is set to true or 1, and when the count down is zero, the vehicle terminal sets the value of the vehicle terminal session key storage flag bit to false or 0; the vehicle terminal session key duration value is automatically specified by the vehicle terminal, or specified by the cloud terminal, or determined by negotiation between the vehicle terminal and the intelligent terminal;
setting an intelligent terminal session key storage duration storage area in the first security module of the intelligent terminal; the intelligent terminal session key storage area is used for storing an intelligent terminal session key storage time value, the intelligent terminal starts to count down by the intelligent terminal session key storage time value from the time when the intelligent terminal session key storage flag bit value is set to be true or 1, and when the count down is zero, the intelligent terminal sets the intelligent terminal session key storage flag bit value to be false or 0; the intelligent terminal session key duration value is automatically specified by the intelligent terminal, or specified by the cloud, or determined by negotiation between the intelligent terminal and the vehicle terminal.
Preferably, the first security module, the second security module and the third security module are security smart chips, the commercial cryptographic algorithms supported by the security smart chips include at least one of SM1, SM2 and SM3, and the supported international common cryptographic algorithms include at least one of 3DES, AES, RSA, SHA-1 and SHA-256; the secure intelligent chip supports storing a digital certificate; the safety intelligent chip provides a safety storage area and supports the safety storage of important information; the safety intelligent chip supports generation of random numbers; the certificate server maintains a certificate revocation list and provides a certificate revocation list query function; the terminal short-range communication module and the vehicle-end short-range communication module are one of an NFC communication module, an RFID communication module, a Bluetooth communication module, a WIFI communication module or an infrared communication module; the intelligent terminal is a smart phone, a smart key, a smart card, a tablet computer or a notebook computer.
Preferably, when there are a plurality of vehicle terminals, the vehicle terminal session key secure storage area, the vehicle terminal session key existence flag bit, the intelligent terminal number storage area and the vehicle terminal session key duration storage area are also correspondingly set to a plurality of corresponding groups; when a plurality of intelligent terminals are arranged, the intelligent terminal session key safe storage area, the intelligent terminal session key existing flag bit, the vehicle end number storage area and the intelligent terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups;
when the intelligent terminal is communicated with the vehicle end, firstly, the value of the zone bit of the session key of the intelligent terminal is judged, and if the value of the zone bit of the session key of the intelligent terminal is true or 1, a safe keyless entry and starting stage is started; otherwise, entering an identity authentication stage;
when the vehicle end communicates with the intelligent terminal, firstly, the value of the zone bit of the session key of the vehicle end is judged, and if the value of the zone bit of the session key of the vehicle end is true or 1, a safe keyless entry and starting stage is started; otherwise, entering into the identity authentication stage.
Based on the vehicle keyless entry and starting system based on the Internet of vehicles, the invention also provides a safe vehicle keyless entry and starting method based on the Internet of vehicles, which comprises a preparation stage, an identity authentication stage and a safe keyless entry and starting stage;
preparation phase
Registering the vehicle side information with the trusted cloud server of the cloud side, wherein the trusted cloud server stores the vehicle side information in the vehicle side information storage area; registering the intelligent terminal information with the trusted cloud server at the cloud end, wherein the trusted cloud server stores the intelligent terminal information in the intelligent terminal information storage area; establishing correspondence and association between the vehicle-side information and the intelligent terminal information in the trusted cloud server;
the certificate server generates and stores public key certificates for the cloud end, the vehicle end and the intelligent terminal respectively; the certificate server writes the public key certificate of the cloud end into the first security module of the intelligent terminal in an off-line mode; the certificate server writes the public key certificate of the cloud end into the second safety module of the vehicle end; the cloud end, the vehicle end and the intelligent terminal respectively store private keys corresponding to public keys in corresponding public key certificates; the private key of the cloud is stored in a security storage area of the certificate server or the third security module; the private key of the vehicle end is stored in a safe storage area of a second safety module; the private key of the intelligent terminal is stored in a security storage area of the first security module;
setting an intelligent terminal session key safe storage area, an intelligent terminal session key existence flag bit and a vehicle end number storage area in the first safety module of the intelligent terminal; the intelligent terminal session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the vehicle end; the intelligent terminal session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the vehicle end exists or not, and when the value of the intelligent terminal session key existence zone bit is true or 1, the intelligent terminal session key indicates that a session key for carrying out secure encrypted communication with the vehicle end exists; the initial value of the intelligent terminal session key existence flag bit is set to be false or 0; the vehicle end number storage area is used for storing a vehicle end number of the vehicle end which communicates with the intelligent terminal;
a vehicle-end session key safe storage area, a vehicle-end session key existence flag bit and an intelligent terminal number storage area are arranged in the second safety module of the vehicle end; the vehicle-side session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the intelligent terminal; the vehicle-end session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the intelligent terminal exists or not, and when the value of the vehicle-end session key existence zone bit is true or 1, the vehicle-end session key existence zone bit indicates that a session key for carrying out secure encrypted communication with the intelligent terminal exists; the initial value of the session key existence flag bit of the vehicle end is set to be false or 0; the intelligent terminal number storage area is used for storing an intelligent terminal number of the intelligent terminal which is communicated with the vehicle end;
identity authentication phase
The authentication protocol is as follows:
C->T: NCT;
T->C: {NCT||PES(NTS,IDT,SIGT(NCT))};
C->S: {PES(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT))};
S->C: {PEC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS))};
C->T: PET(KCT,IDC,SIGS(NTS));
wherein S represents a cloud end, C represents a vehicle end, T represents an intelligent terminal, and IDTIndicating the number, ID, of the intelligent terminalCIndicating vehicle end number, PESPublic key representing the expression SEncryption, PECRepresenting encryption with the public key of C, PETRepresenting encryption with the public key of T, SIGSSignature by private key of S, SIGCRepresenting signature by the private key of C, SIGTRepresenting a signature by a private key of T, KCTDenotes a session key, N, for secure encrypted communication between C and T, distributed by SCTAnd NCSDenotes the verification factor, N, generated by CTSRepresenting a verification factor generated by T, and representing splicing operation by | l;
the authentication protocol performs the following detailed steps:
firstly, the intelligent terminal approaches to the vehicle end, and then triggers the keyless entry switch or the keyless starting switch on the vehicle end; the vehicle end judges the value of the flag bit of the session key of the vehicle end, if the value of the flag bit of the session key of the vehicle end is true or 1, the safe keyless entry and starting stage is entered, and the identity authentication process is terminated; otherwise, the vehicle end sends a randomly generated verification factor N to the intelligent terminalCT;
Secondly, the intelligent terminal receives a verification factor N sent by the vehicle terminalCTThen, firstly, judging the value of the zone bit of the session key of the intelligent terminal, if the value of the zone bit of the session key of the intelligent terminal is true or 1, entering a safe keyless entry and starting stage, and terminating the identity authentication process; otherwise, the intelligent terminal verifies the factor N by using the private key pair of the intelligent terminalCTSignature operation is carried out to obtain SIGT(NCT) Then, the intelligent terminal randomly generates a verification factor NTSThen, searching the public key certificate of the cloud end stored in the first security module, and using the public key of the cloud end to convert N into NTSAnd the intelligent terminal ID of the intelligent terminalT、SIGT(NCT) Encrypting to obtain PES(NTS,IDT,SIGT(NCT) Then verify factor N) is appliedCTAnd PES(NTS,IDT,SIGT(NCT) The spliced data is sent to the vehicle end;
thirdly, the vehicle end receives the N sent by the intelligent terminalCT||PES(NTS,IDT,SIGT(NCT) B) first judges the received NCTWhether the value of (A) is equal to N sent to the intelligent terminal in the first stepCTThe values of (A) are the same; if two NCTIf the values are different, terminating the identity authentication process; if two NCTIf the values are the same, the vehicle end uses the private key of the vehicle end to verify the factor NCTSignature operation is carried out to obtain SIGC(NCT) Then a new verification factor N is generatedCSThen, the public key certificate of the cloud end stored in the second security module is searched, and a verification factor N is obtained by using the public key of the cloud endCSVerifying factor NCTThe vehicle end number ID of the vehicle endCAnd a signature value SIGC(NCT) Encrypting to obtain PES(NCS,NCT,IDC,SIGC(NCT) ) and then PES(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) ) send to the cloud after splicing;
fourthly, the cloud end receives the { PE transmitted by the vehicle endS(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT) Etc. } then decrypt the PE with its own private key, respectivelyS(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) To obtain N)CS、NCT、IDC、SIGC(NCT) And NTS、IDTAnd SIGT(NCT) (ii) a The cloud end is according to the vehicle end number ID of the vehicle endCSearching whether the vehicle end is registered in the vehicle end information storage area in the credible cloud server at the cloud end, and if not, terminating the identity authentication process; if it is registeredThe cloud end continues to number the ID according to the intelligent terminal of the intelligent terminalTSearching whether the intelligent terminal is registered in the intelligent terminal information storage area in the trusted cloud server at the cloud end, and if not, terminating the identity authentication process; if the vehicle end ID is registered, the cloud end continues to use the vehicle end ID according to the vehicle end number of the vehicle endCFinding out the public key certificate corresponding to the vehicle terminal from the certificate server, and then using the public key in the public key certificate to SIGC(NCT) Operating to decrypt SIGC(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the vehicle end is not passed, terminating the identity authentication process; if the values are the same, the cloud end continues to use the intelligent terminal serial number ID of the intelligent terminalTFinding out the public key certificate corresponding to the intelligent terminal from the certificate server, and then using the public key in the public key certificate to SIGT(NCT) Operating to decrypt SIGT(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the intelligent terminal is not passed, terminating the identity authentication process; if the values are the same, the cloud calls the third safety module to generate a session key K for the communication between the vehicle end and the intelligent terminalCTAnd respectively pairing N with own private keysCSAnd NTSSigning to obtain SIGS(NCS) And SIGS(NTS) Then, the session key K is usedCTVehicle end number IDCSignature value SIGS(NTS) Obtaining PE after encrypting by the public key of the intelligent terminalT(KCT,IDC,SIGS(NTS) Next, the cloudPublic key pair K of vehicle end for endCT、IDTAnd SIGS(NCS) Carrying out encryption to obtain PEC(KCT,IDT,SIGS(NCS) Then, the cloud will PEC(KCT,IDT,SIGS(NCS) ) and PET(KCT,IDC,SIGS(NTS) The spliced data is sent to the vehicle end;
fifthly, the vehicle end receives the { PE from the cloud endC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS) ) } then the PE is paired with its own private keyC(KCT,IDT,SIGS(NCS) Carry out decryption operation to obtain a session key KCTID of intelligent terminalTAnd SIGS(NCS) (ii) a Then, the vehicle end searches the public key certificate of the cloud end stored in the second security module, and uses the public key of the cloud end to pair SIGS(NCS) Performing operation to obtain NCSThen the N isCSAnd N sent to the cloud in the third stepCSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the vehicle end sends a session key KCTStoring the session key into the vehicle-end session key safe storage area, and setting the flag bit of the vehicle-end session key to be true or 1; the vehicle end numbers the intelligent terminal IDTStoring the intelligent terminal number storage area and establishing an intelligent terminal number IDTWith session key KCTSuch that ID is numbered by the smart terminalTCan find the session key KCT(ii) a The vehicle end then sends the PET(KCT,IDC,SIGS(NTS) Forward to the intelligent terminal;
sixthly, the intelligent terminal receives the PE forwarded by the vehicle terminalT(KCT,IDC,SIGS(NTS))Then, the PE is paired with its own private keyT(KCT,IDC,SIGS(NTS) Carry out decryption operation to obtain KCT、IDCAnd SIGS(NTS) Then, the intelligent terminal searches the public key certificate of the cloud end stored in the first security module, and uses the public key of the cloud end to pair SIGS(NTS) Performing operation to obtain NTSThen the N isTSAnd N generated in the second stepTSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the intelligent terminal sends a session key KCTStoring the session key into the secure storage area of the intelligent terminal, and setting the flag bit of the session key of the intelligent terminal to be true or 1; the intelligent terminal numbers the vehicle terminalCStoring the serial number into the serial number storage area of the vehicle end and establishing the serial number ID of the vehicle endCWith session key KCTBy the association of vehicle-side numbers IDCCan find the session key KCT(ii) a At this point, the identity authentication is successfully completed;
secure keyless entry and start phase
After the identity authentication is successful and a session key is established, the vehicle end and the intelligent terminal pass through the session key KCTCarrying out secure encrypted communication; in the communication process, the vehicle end passes through the intelligent terminal number ID stored in the intelligent terminal number storage areaTFinding out the session key K associated with the session key K and stored in the vehicle-side session key safe storage areaCT(ii) a The intelligent terminal passes through the vehicle end number ID stored in the vehicle end number storage areaCFinding out the session key K which is associated with the session key K and stored in the secure storage area of the session key of the intelligent terminalCT;
The safe keyless entry and starting stage comprises a safe keyless entry stage and a safe keyless starting stage;
secure keyless entry stage
The specific steps of the secure keyless entry stage are as follows:
a first step of triggering the keyless entry switch on the vehicle side;
secondly, the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
thirdly, the vehicle end generates a keyless entry request instruction and then uses the session key KCTEncrypting the keyless entry request instruction, and sending the obtained keyless entry request instruction ciphertext to the intelligent terminal;
fourthly, after receiving the keyless entry request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existence zone bit, and if the value of the intelligent terminal session key existence zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
fifthly, the intelligent terminal uses the session key KCTDecrypting the keyless entry request command ciphertext to obtain the keyless entry request command;
sixthly, the intelligent terminal responds to the keyless entry request instruction to generate a keyless entry confirmation instruction, and then the session key K is usedCTEncrypting the keyless entry confirmation instruction, and sending the obtained keyless entry confirmation instruction ciphertext to the vehicle end;
seventhly, after the vehicle end receives the keyless entry confirmation instruction ciphertext, using the session key KCTDecrypting to obtain the keyless entry confirmation instruction;
eighthly, the vehicle end executes the keyless entry confirmation instruction, and the vehicle door is unlocked;
safe keyless start phase
The specific steps of the safe keyless start phase are as follows:
a first step of triggering the keyless start switch on the vehicle side;
secondly, the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
thirdly, the vehicle end generates a keyless starting request instruction and then uses the session key KCTEncrypting the keyless starting request instruction, and sending the obtained keyless starting request instruction ciphertext to the intelligent terminal;
fourthly, after receiving the keyless start request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existence zone bit, and if the value of the intelligent terminal session key existence zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
fifthly, the intelligent terminal uses the session key KCTDecrypting the keyless starting request command ciphertext to obtain the keyless starting request command;
sixthly, the intelligent terminal responds to the keyless start request instruction to generate a keyless start confirmation instruction, and then the session key K is usedCTEncrypting the keyless starting confirmation instruction, and sending the obtained keyless starting confirmation instruction ciphertext to the vehicle end;
seventhly, after the vehicle end receives the keyless start confirmation instruction ciphertext, using the session key KCTDecrypting to obtain the keyless starting confirmation instruction;
and eighthly, executing the keyless starting confirmation instruction by the vehicle end, and starting the vehicle.
Preferably, the communication between the vehicle end and the intelligent terminal means that the vehicle entering and starting control module of the vehicle end and the intelligent terminal control module of the intelligent terminal communicate with each other through the vehicle end short-range communication module and the terminal short-range communication module, respectively, and the communication content includes receiving and sending authentication data and encryption and decryption data;
the vehicle end communicates with the cloud end, specifically, the vehicle entering and starting control module of the vehicle end communicates with the trusted cloud server of the cloud end, and communication content comprises receiving and sending authentication data and encryption and decryption data;
the session key generation, the signature operation and the encryption and decryption operation performed by the cloud end specifically mean that the trusted cloud server of the cloud end calls a corresponding cryptographic service function provided by the third security module;
the random number generation, signature operation and encryption and decryption operation performed by the vehicle end specifically mean that the vehicle entering and starting control module of the vehicle end calls a corresponding password service function provided by the second security module;
the random number generation, signature operation and encryption and decryption operation performed by the intelligent terminal specifically mean that the intelligent terminal control module of the intelligent terminal calls a corresponding password service function provided by the first security module;
the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction, specifically, the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction by the vehicle entry and start control module;
the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction, specifically, the vehicle access and start control module of the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction;
the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction, specifically, the intelligent terminal control module of the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction;
setting a vehicle-side session key duration storage area in the second security module of the vehicle side; the vehicle terminal session key storage area is used for storing a vehicle terminal session key storage time value, the vehicle terminal starts to count down by the vehicle terminal session key storage time value from the time when the value of the vehicle terminal session key storage flag bit is set to true or 1, and when the count down is zero, the vehicle terminal sets the value of the vehicle terminal session key storage flag bit to false or 0; the vehicle terminal session key duration value is automatically specified by the vehicle terminal, or specified by the cloud terminal, or determined by negotiation between the vehicle terminal and the intelligent terminal;
setting an intelligent terminal session key storage duration storage area in the first security module of the intelligent terminal; the intelligent terminal session key storage area is used for storing an intelligent terminal session key storage time value, the intelligent terminal starts to count down by the intelligent terminal session key storage time value from the time when the intelligent terminal session key storage flag bit value is set to be true or 1, and when the count down is zero, the intelligent terminal sets the intelligent terminal session key storage flag bit value to be false or 0; the intelligent terminal session key duration value is automatically specified by the intelligent terminal, or specified by the cloud, or determined by negotiation between the intelligent terminal and the vehicle terminal.
Preferably, the first security module, the second security module and the third security module are security smart chips, the commercial cryptographic algorithms supported by the security smart chips include at least one of SM1, SM2 and SM3, and the supported international common cryptographic algorithms include at least one of 3DES, AES, RSA, SHA-1 and SHA-256; the secure intelligent chip supports storing a digital certificate; the safety intelligent chip provides a safety storage area and supports the safety storage of important information; the safety intelligent chip supports generation of random numbers; the certificate server maintains a certificate revocation list and provides a certificate revocation list query function; the terminal short-range communication module and the vehicle-end short-range communication module are one of an NFC communication module, an RFID communication module, a Bluetooth communication module, a WIFI communication module or an infrared communication module; the intelligent terminal is a smart phone, a smart key, a smart card, a tablet computer or a notebook computer.
Preferably, when there are a plurality of vehicle terminals, the vehicle terminal session key secure storage area, the vehicle terminal session key existence flag bit, the intelligent terminal number storage area and the vehicle terminal session key duration storage area are also correspondingly set to a plurality of corresponding groups; when a plurality of intelligent terminals are arranged, the intelligent terminal session key safe storage area, the intelligent terminal session key existing flag bit, the vehicle end number storage area and the intelligent terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups;
when the intelligent terminal is communicated with the vehicle end, firstly, the value of the zone bit of the session key of the intelligent terminal is judged, and if the value of the zone bit of the session key of the intelligent terminal is true or 1, a safe keyless entry and starting stage is started; otherwise, entering an identity authentication stage;
when the vehicle end communicates with the intelligent terminal, firstly, the value of the zone bit of the session key of the vehicle end is judged, and if the value of the zone bit of the session key of the vehicle end is true or 1, a safe keyless entry and starting stage is started; otherwise, entering into the identity authentication stage.
The invention has the following positive effects:
according to the invention, authentication is carried out through the cloud end, the vehicle end and the intelligent terminal, firstly, the legal safety of the three-party identity can be ensured, secondly, a session key for encrypting the communication between the vehicle end and the intelligent terminal can be generated by the cloud end in the authentication process, a new session key can be generated in each identity authentication, the risk that the communication between the vehicle key and the vehicle is cracked can be greatly reduced by frequent updating of the session key, and further, the risk that the vehicle is stolen or stolen can be reduced;
by using the intelligent terminal, an original vehicle key can be saved, and the original vehicle key can be stored in a safe place, so that the vehicle key can be prevented from being stolen or lost, and certainly, the intelligent terminal can also be stolen or lost; if the vehicle is stolen, because the legal vehicle end is registered at the cloud end, if the vehicle is stolen, the registration of the stolen vehicle end is cancelled by contacting the cloud end, the vehicle end cannot pass identity authentication next time, so that the vehicle cannot enter or start again, the vehicle cannot be used even if the vehicle is stolen, the vehicle theft rate can be effectively reduced, and the problem that the vehicle is stolen can be partially solved;
according to the authentication of the cloud, the vehicle end and the intelligent terminal are respectively authenticated by the cloud, and then the vehicle end and the intelligent terminal respectively authenticate the cloud, so that the direct mutual authentication of the intelligent terminal and the vehicle end is specially avoided, a public key certificate of the cloud is only required to be stored in a security module of the intelligent terminal, a large amount of public key certificates of different vehicle ends and/or other information related to security authentication and communication are avoided being greatly stored or frequently negotiated and exchanged in the intelligent terminal, and the consumption of storage and calculation resources of the intelligent terminal is reduced; because only the public key certificate of the cloud end needs to be stored in the intelligent terminal, the association and the correspondence between the intelligent terminal and the vehicle are realized by registering the corresponding vehicle and the intelligent terminal at the cloud end, the access and the starting of a plurality of vehicles under the permission of the cloud end by one intelligent terminal can be realized, and the access and the starting of one vehicle by a plurality of intelligent terminals can also be realized, namely, the one-to-many and many-to-one relationship between the intelligent terminal and the vehicle end is realized, so that the problem that the existing vehicle is usually provided with two keys, and the two conditions that a user with a plurality of vehicles and the same vehicle are often driven by a plurality of users are very inconvenient is solved; if vehicles of different brands are registered in the same cloud, the same intelligent terminal can enter and start the vehicles of different brands, so that the problem that vehicle keys are not universal among the vehicles of different brands is solved from the side;
in addition, proper session key storage time is respectively set at the vehicle end and the intelligent terminal, after the identity authentication is successful and the session key is obtained, the vehicle end and the intelligent terminal can encrypt and decrypt mutual communication through the session key for many times, when the session key storage time is counted down to zero, the identity authentication and the distribution of a new session key are required to be carried out again in the next communication, the situation that the session key information of the vehicle end and the intelligent terminal is not changed for a long time can be avoided, the use convenience can be considered, and the communication safety can be ensured. In conclusion, the vehicle keyless entry and starting system and method based on the internet of vehicles, provided by the invention, have the advantages that the safe vehicle keyless entry and starting based on the internet of vehicles is safe, reliable, simple and efficient, better use experience can be provided for vehicle users, and outstanding substantive characteristics and remarkable progress are realized.
Drawings
Fig. 1 is a schematic architecture diagram of a vehicle keyless entry and start system based on the internet of vehicles according to an embodiment of the invention.
Fig. 2 is another schematic diagram of the architecture of the keyless entry and start system of the vehicle based on the internet of vehicles according to one embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the invention provides a vehicle keyless entry and starting system based on an internet of vehicles, which comprises a cloud end, a vehicle end and an intelligent terminal, as shown in figure 1; the cloud end comprises a trusted cloud server, a certificate server and a third security module; the vehicle end comprises a vehicle entering and starting control module, a vehicle end short-range communication module and a second safety module; the intelligent terminal comprises an intelligent terminal control module, a terminal short-range communication module and a first safety module; the trusted cloud server is respectively connected with the certificate server and the third security module; the vehicle entering and starting control module is respectively connected with the vehicle-end short-range communication module and the second safety module; the intelligent terminal control module is respectively connected with the terminal short-range communication module and the first safety module; the trusted cloud server is in communication connection with the vehicle entry and start control module; the vehicle-end short-range communication module is in communication connection with the terminal short-range communication module; the certificate server respectively generates and stores public key certificates for the cloud end, the vehicle end and the intelligent terminal;
the first security module, the second security module and the third security module are used for providing a password service function and a secure storage function; the cryptographic service function comprises random number generation, signature operation, encryption and decryption operation and session key generation; the terminal short-range communication module is used for carrying out two-way communication with the vehicle-end short-range communication module; the vehicle entering and starting control module and the intelligent terminal control module are communicated through the vehicle end short-range communication module and the terminal short-range communication module respectively; the intelligent terminal control module calls a corresponding password service function and a corresponding safe storage function provided by the first safe module; the vehicle entering and starting control module calls a corresponding password service function and a corresponding safe storage function provided by the second safety module; the vehicle entering and starting control module is also communicated with the credible cloud server to receive, transmit and process information and data required by authentication; the trusted cloud server is in communication with the vehicle entry and launch control module; the trusted cloud server calls a corresponding cryptographic service function provided by the third security module; the trusted cloud server is also in communication with the certificate server to obtain digital certificate services; the intelligent terminal control module is also used for generating a keyless entry confirmation instruction and a keyless start confirmation instruction; the vehicle entering and starting control module is also used for generating a keyless entering request instruction and executing the keyless entering confirmation instruction; the vehicle entering and starting control module is also used for generating a keyless starting request instruction and executing the keyless starting confirmation instruction;
a vehicle end information storage area is arranged in the credible cloud server of the cloud end, and information stored in the vehicle end information storage area comprises vehicle end information to be subjected to keyless entry and starting; the vehicle end information comprises a vehicle end number; an intelligent terminal information storage area is arranged in the trusted cloud server of the cloud end, and information stored in the intelligent terminal information storage area comprises intelligent terminal information allowing keyless entry and starting of corresponding vehicles; the intelligent terminal information comprises an intelligent terminal number; the trusted cloud server of the cloud maintains correspondence and association between the vehicle side information and the intelligent terminal information; the vehicle end comprises a keyless entry switch and a keyless starting switch; the cloud end, the vehicle end and the intelligent terminal adopt a mode that the cloud end firstly respectively performs identity authentication on the vehicle end and the intelligent terminal, and then the vehicle end and the intelligent terminal respectively perform identity authentication on the cloud end.
As shown in fig. 2, the vehicle end is one or more; one or more intelligent terminals are provided; the vehicle-end short-range communication module of the vehicle end is in bidirectional communication with the terminal short-range communication modules of one or more intelligent terminals; the terminal short-range communication module of the intelligent terminal is in two-way communication with the vehicle-end short-range communication module of one or more vehicle ends; the trusted cloud server of the cloud communicates with the vehicle entry and launch control modules of one or more of the vehicle ends.
In one embodiment, the method comprises a preparation phase, an identity authentication phase and a safe keyless entry and starting phase;
preparation phase
Registering the vehicle side information with the trusted cloud server of the cloud side, wherein the trusted cloud server stores the vehicle side information in the vehicle side information storage area; registering the intelligent terminal information with the trusted cloud server at the cloud end, wherein the trusted cloud server stores the intelligent terminal information in the intelligent terminal information storage area; establishing correspondence and association between the vehicle-side information and the intelligent terminal information in the trusted cloud server;
the certificate server respectively generates and stores respective public key certificates for the cloud terminal, the vehicle terminal and the intelligent terminal; the certificate server writes the public key certificate of the cloud end into the first security module of the intelligent terminal in an off-line mode; the certificate server writes the public key certificate of the cloud end into the second safety module of the vehicle end; the cloud end, the vehicle end and the intelligent terminal respectively store private keys corresponding to public keys in corresponding public key certificates; the private key of the cloud is stored in a security storage area of the certificate server or the third security module; the private key of the vehicle end is stored in a safe storage area of a second safety module; the private key of the intelligent terminal is stored in a security storage area of the first security module;
setting an intelligent terminal session key safe storage area, an intelligent terminal session key existence flag bit and a vehicle end number storage area in the first safety module of the intelligent terminal; the intelligent terminal session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the vehicle end; the intelligent terminal session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the vehicle end exists or not, and when the value of the intelligent terminal session key existence zone bit is true or 1, the intelligent terminal session key indicates that a session key for carrying out secure encrypted communication with the vehicle end exists; the initial value of the intelligent terminal session key existence flag bit is set to be false or 0; the vehicle end number storage area is used for storing a vehicle end number of the vehicle end which communicates with the intelligent terminal;
a vehicle-end session key safe storage area, a vehicle-end session key existence flag bit and an intelligent terminal number storage area are arranged in the second safety module of the vehicle end; the vehicle-side session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the intelligent terminal; the vehicle-end session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the intelligent terminal exists or not, and when the value of the vehicle-end session key existence zone bit is true or 1, the vehicle-end session key existence zone bit indicates that a session key for carrying out secure encrypted communication with the intelligent terminal exists; the initial value of the session key existence flag bit of the vehicle end is set to be false or 0; the intelligent terminal number storage area is used for storing an intelligent terminal number of the intelligent terminal which is communicated with the vehicle end;
identity authentication phase
The authentication protocol is as follows:
C->T: NCT;
T->C: {NCT||PES(NTS,IDT,SIGT(NCT))};
C->S: {PES(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT))};
S->C: {PEC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS))};
C->T: PET(KCT,IDC,SIGS(NTS));
wherein S represents a cloud end, C represents a vehicle end, T represents an intelligent terminal, and IDTIndicating the number, ID, of the intelligent terminalCIndicating vehicle end number, PESIndicating encryption with the public key of S, PECRepresenting encryption with the public key of C, PETRepresenting encryption with the public key of T, SIGSSignature by private key of S, SIGCRepresenting signature by the private key of C, SIGTRepresenting a signature by a private key of T, KCTDenotes a session key, N, for secure encrypted communication between C and T, distributed by SCTAnd NCSDenotes the verification factor, N, generated by CTSRepresenting a verification factor generated by T, and representing splicing operation by | l;
the vehicle terminal number IDCMay be a vehicle identification code VINC and/or a license plate number;
firstly, the intelligent terminal approaches to the vehicle end, and then triggers the keyless entry switch or the keyless starting switch on the vehicle end; the vehicle end judges the value of the flag bit of the session key of the vehicle end, if the value of the flag bit of the session key of the vehicle end is true or 1, the safe keyless entry and starting stage is entered, and the identity authentication process is terminated; otherwise, the vehicle end sends a randomly generated verification factor N to the intelligent terminalCT;
Secondly, the intelligent terminal receives a verification factor N sent by the vehicle terminalCTThen, firstly, judging the value of the zone bit of the session key of the intelligent terminal, if the value of the zone bit of the session key of the intelligent terminal is true or 1, entering a safe keyless entry and starting stage, and terminating the identity authentication process; otherwise, the intelligent terminal verifies the factor N by using the private key pair of the intelligent terminalCTSignature operation is carried out to obtain SIGT(NCT) Then, the intelligent terminal randomly generates a verification factor NTSThen, searching the public key certificate of the cloud end stored in the first security module, and using the public key of the cloud end to convert N into NTSAnd the intelligent terminal ID of the intelligent terminalTAnd SIGT(NCT) Encrypting to obtain PES(NTS,IDT,SIGT(NCT) Then verify factor N) is appliedCTAnd PES(NTS,IDT,SIGT(NCT) The spliced data is sent to the vehicle end;
thirdly, the vehicle end receives the N sent by the intelligent terminalCT||PES(NTS,IDT,SIGT(NCT) B) first judges the received NCTWhether the value of (A) is equal to N sent to the intelligent terminal in the first stepCTThe values of (A) are the same; if two NCTIf the values are different, the identity authentication process is terminated; if two NCTIf the values are the same, the vehicle end uses the private key of the vehicle end to checkSyndrome factor NCTSignature operation is carried out to obtain SIGC(NCT) Then a new verification factor N is generatedCSThen, the public key certificate of the cloud end stored in the second security module is searched, and a verification factor N is obtained by using the public key of the cloud endCSVerifying factor NCTThe vehicle end number ID of the vehicle endCAnd a signature value SIGC(NCT) Encrypting to obtain PES(NCS,NCT,IDC,SIGC(NCT) ) and then PES(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) ) send to the cloud after splicing;
fourthly, the cloud end receives the { PE transmitted by the vehicle endS(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT) Etc. } then decrypt the PE with its own private key, respectivelyS(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) To obtain N)CS、NCT、IDC、SIGC(NCT) And NTS、IDTAnd SIGT(NCT) (ii) a The cloud end is according to the vehicle end number ID of the vehicle endCSearching whether the vehicle end is registered in the vehicle end information storage area in the credible cloud server at the cloud end, and if not, terminating the identity authentication process; if the intelligent terminal ID is registered, the cloud end continues to code the intelligent terminal ID according to the intelligent terminalTSearching whether the intelligent terminal is registered in the intelligent terminal information storage area in the trusted cloud server at the cloud end, and if not, terminating the identity authentication process; if the vehicle end ID is registered, the cloud end continues to use the vehicle end ID according to the vehicle end number of the vehicle endCFinding out the public key certificate corresponding to the vehicle terminal from the certificate server, and then using the public key in the public key certificateKey pair SIGC(NCT) Operating to decrypt SIGC(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the vehicle end is not passed, terminating the identity authentication process; if the values are the same, the cloud end continues to use the intelligent terminal serial number ID of the intelligent terminalTFinding out the public key certificate corresponding to the intelligent terminal from the certificate server, and then using the public key in the public key certificate to SIGT(NCT) Operating to decrypt SIGT(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the intelligent terminal is not passed, terminating the identity authentication process; if the values are the same, the cloud calls the third safety module to generate a session key K for the communication between the vehicle end and the intelligent terminalCTAnd respectively pairing N with own private keysCSAnd NTSSigning to obtain SIGS(NCS) And SIGS(NTS) Then, the session key K is usedCTVehicle end number IDCSignature value SIGS(NTS) Obtaining PE after encrypting by the public key of the intelligent terminalT(KCT,IDC,SIGS(NTS) Next, the cloud end uses the public key pair K of the vehicle endCT、IDTAnd SIGS(NCS) Carrying out encryption to obtain PEC(KCT,IDT,SIGS(NCS) Then, the cloud will PEC(KCT,IDT,SIGS(NCS) ) and PET(KCT,IDC,SIGS(NTS) The spliced data is sent to the vehicle end;
the fifth stepThe vehicle end receives { PE from the cloud endC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS) ) } then the PE is paired with its own private keyC(KCT,IDT,SIGS(NCS) Carry out decryption operation to obtain a session key KCTID of intelligent terminalT、SIGS(NCS) (ii) a Then, the vehicle end searches the public key certificate of the cloud end stored in the second security module, and uses the public key of the cloud end to pair SIGS(NCS) Performing operation to obtain NCSThen the N isCSAnd N sent to the cloud in the third stepCSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the vehicle end sends a session key KCTStoring the session key into the vehicle-end session key safe storage area, and setting the flag bit of the vehicle-end session key to be true or 1; the vehicle end numbers the intelligent terminal IDTStoring the intelligent terminal number storage area and establishing an intelligent terminal number IDTWith session key KCTSuch that ID is numbered by the smart terminalTCan find the session key KCT(ii) a The vehicle end then sends the PET(KCT,IDC,SIGS(NTS) Forward to the intelligent terminal;
sixthly, the intelligent terminal receives the PE forwarded by the vehicle terminalT(KCT,IDC,SIGS(NTS) After that), the PE is paired with its own private keyT(KCT,IDC,SIGS(NTS) Carry out decryption operation to obtain KCT、IDCAnd SIGS(NTS) Then, the intelligent terminal searches the public key certificate of the cloud end stored in the first security module, and uses the public key of the cloud end to pair SIGS(NTS) Performing operation to obtain NTSThen the N isTSAnd N generated in the second stepTSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the intelligent terminal sends a session key KCTStoring the session key into the secure storage area of the intelligent terminal, and setting the flag bit of the session key of the intelligent terminal to be true or 1; the intelligent terminal numbers the vehicle terminalCStoring the serial number into the serial number storage area of the vehicle end and establishing the serial number ID of the vehicle endCWith session key KCTBy the association of vehicle-side numbers IDCCan find the session key KCT(ii) a At this point, the identity authentication is successfully completed;
secure keyless entry and start phase
After the identity authentication is successful and a session key is established, the vehicle end and the intelligent terminal pass through a session key KCTCarrying out secure encrypted communication; in the communication process, the vehicle end passes through the intelligent terminal number ID stored in the intelligent terminal number storage areaTFinding out the session key K associated with the session key K and stored in the vehicle-side session key safe storage areaCT(ii) a The intelligent terminal passes through the vehicle end number ID stored in the vehicle end number storage areaCFinding out the session key K which is associated with the session key K and stored in the secure storage area of the session key of the intelligent terminalCT;
The safe keyless entry and starting stage comprises a safe keyless entry stage and a safe keyless starting stage;
secure keyless entry stage
The process of the secure keyless entry stage is as follows:
triggering the keyless entry switch on the vehicle end;
the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
the vehicle end generates a keyless entry request command and then enablesUsing said session key KCTEncrypting the keyless entry request instruction, and sending the obtained keyless entry request instruction ciphertext to the intelligent terminal;
after receiving the keyless entry request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existing zone bit, and if the value of the intelligent terminal session key existing zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
the session key K for the intelligent terminalCTDecrypting the keyless entry request command ciphertext to obtain the keyless entry request command;
the intelligent terminal responds to the keyless entry request instruction to generate a keyless entry confirmation instruction, and then uses the session key KCTEncrypting the keyless entry confirmation instruction, and sending the obtained keyless entry confirmation instruction ciphertext to the vehicle end;
after the vehicle end receives the keyless entry confirmation instruction ciphertext, the session key K is usedCTDecrypting to obtain the keyless entry confirmation instruction;
the vehicle end executes the keyless entry confirmation instruction, and the vehicle door is unlocked;
safe keyless start phase
The process of the secure keyless start phase is as follows:
triggering the keyless start switch on the vehicle end;
the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
the vehicle end generates a keyless start request instruction and then uses the session key KCTEncrypting the keyless starting request instruction, and sending the obtained keyless starting request instruction ciphertext to the intelligent terminal;
after receiving the keyless start request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existing zone bit, and if the value of the intelligent terminal session key existing zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
the session key K for the intelligent terminalCTDecrypting the keyless starting request command ciphertext to obtain the keyless starting request command;
the intelligent terminal responds to the keyless start request instruction to generate a keyless start confirmation instruction, and then uses the session key KCTEncrypting the keyless starting confirmation instruction, and sending the obtained keyless starting confirmation instruction ciphertext to the vehicle end;
after the vehicle end receives the keyless start confirmation instruction ciphertext, the session key K is usedCTDecrypting to obtain the keyless starting confirmation instruction;
and the vehicle end executes the keyless starting confirmation instruction, so that the vehicle is started.
In one embodiment, the communication between the vehicle end and the intelligent terminal means that the vehicle entering and starting control module of the vehicle end and the intelligent terminal control module of the intelligent terminal communicate with each other through the vehicle end short-range communication module and the terminal short-range communication module, respectively, and the communication content includes receiving and sending authentication data and encryption and decryption data;
the vehicle end communicates with the cloud end, specifically, the vehicle entering and starting control module of the vehicle end communicates with the trusted cloud server of the cloud end, and communication content comprises receiving and sending authentication data and encryption and decryption data;
the session key generation, the signature operation and the encryption and decryption operation performed by the cloud end specifically mean that the trusted cloud server of the cloud end calls a corresponding cryptographic service function provided by the third security module;
the random number generation, signature operation and encryption and decryption operation performed by the vehicle end specifically mean that the vehicle entering and starting control module of the vehicle end calls a corresponding password service function provided by the second security module;
the random number generation, signature operation and encryption and decryption operation performed by the intelligent terminal specifically mean that the intelligent terminal control module of the intelligent terminal calls a corresponding password service function provided by the first security module;
the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction, specifically, the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction by the vehicle entry and start control module;
the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction, specifically, the vehicle access and start control module of the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction;
the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction, specifically, the intelligent terminal control module of the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction;
setting a vehicle-side session key duration storage area in the second security module of the vehicle side; the vehicle terminal session key storage area is used for storing a vehicle terminal session key storage time value, the vehicle terminal starts to count down by the vehicle terminal session key storage time value from the time when the value of the vehicle terminal session key storage flag bit is set to true or 1, and when the count down is zero, the vehicle terminal sets the value of the vehicle terminal session key storage flag bit to false or 0; the vehicle terminal session key duration value is automatically specified by the vehicle terminal, or specified by the cloud terminal, or determined by negotiation between the vehicle terminal and the intelligent terminal;
setting an intelligent terminal session key storage duration storage area in the first security module of the intelligent terminal; the intelligent terminal session key storage area is used for storing an intelligent terminal session key storage time value, the intelligent terminal starts to count down by the intelligent terminal session key storage time value from the time when the intelligent terminal session key storage flag bit value is set to be true or 1, and when the count down is zero, the intelligent terminal sets the intelligent terminal session key storage flag bit value to be false or 0; the intelligent terminal session key duration value is automatically specified by the intelligent terminal, or specified by the cloud, or determined by negotiation between the intelligent terminal and the vehicle terminal.
In one embodiment, the first security module, the second security module and the third security module are security smart chips, the commercial cryptographic algorithms supported by the security smart chips include at least one of SM1, SM2 and SM3, and the supported international common cryptographic algorithms include at least one of 3DES, AES, RSA, SHA-1 and SHA-256; the secure intelligent chip supports storing a digital certificate; the safety intelligent chip provides a safety storage area and supports the safety storage of important information; the safety intelligent chip supports generation of random numbers; the certificate server maintains a certificate revocation list and provides a certificate revocation list query function; the terminal short-range communication module and the vehicle-end short-range communication module are one of an NFC communication module, an RFID communication module, a Bluetooth communication module, a WIFI communication module or an infrared communication module; the intelligent terminal is a smart phone, a smart key, a smart card, a tablet computer or a notebook computer.
In one embodiment, when the number of the vehicle terminals is multiple, the vehicle terminal session key secure storage area, the vehicle terminal session key existence flag bit, the intelligent terminal number storage area and the vehicle terminal session key existence time storage area are correspondingly set to be a corresponding plurality of groups; when a plurality of intelligent terminals are arranged, the intelligent terminal session key safe storage area, the intelligent terminal session key existing flag bit, the vehicle end number storage area and the intelligent terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups;
when the intelligent terminal is communicated with the vehicle end, firstly, the value of the zone bit of the session key of the intelligent terminal is judged, and if the value of the zone bit of the session key of the intelligent terminal is true or 1, a safe keyless entry and starting stage is started; otherwise, entering an identity authentication stage;
when the vehicle end communicates with the intelligent terminal, firstly, the value of the zone bit of the session key of the vehicle end is judged, and if the value of the zone bit of the session key of the vehicle end is true or 1, a safe keyless entry and starting stage is started; otherwise, entering into the identity authentication stage.
Based on the vehicle keyless entry and start system based on the internet of vehicles, the embodiment of the invention also provides a vehicle keyless entry and start method based on the safety of the internet of vehicles, which can be applied to the environments shown in fig. 1 and 2 and comprises a preparation stage, an identity authentication stage and a safety keyless entry and start stage;
preparation phase
Registering the vehicle side information with the trusted cloud server of the cloud side, wherein the trusted cloud server stores the vehicle side information in the vehicle side information storage area; registering the intelligent terminal information with the trusted cloud server at the cloud end, wherein the trusted cloud server stores the intelligent terminal information in the intelligent terminal information storage area; establishing correspondence and association between the vehicle-side information and the intelligent terminal information in the trusted cloud server;
the certificate server respectively generates and stores respective public key certificates for the cloud terminal, the vehicle terminal and the intelligent terminal; the certificate server writes the public key certificate of the cloud end into the first security module of the intelligent terminal in an off-line mode; the certificate server writes the public key certificate of the cloud end into the second safety module of the vehicle end; the cloud end, the vehicle end and the intelligent terminal respectively store private keys corresponding to public keys in corresponding public key certificates; the private key of the cloud is stored in a security storage area of the certificate server or the third security module; the private key of the vehicle end is stored in a safe storage area of a second safety module; the private key of the intelligent terminal is stored in a security storage area of the first security module;
setting an intelligent terminal session key safe storage area, an intelligent terminal session key existence flag bit and a vehicle end number storage area in the first safety module of the intelligent terminal; the intelligent terminal session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the vehicle end; the intelligent terminal session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the vehicle end exists or not, and when the value of the intelligent terminal session key existence zone bit is true or 1, the intelligent terminal session key indicates that a session key for carrying out secure encrypted communication with the vehicle end exists; the initial value of the intelligent terminal session key existence flag bit is set to be false or 0; the vehicle end number storage area is used for storing a vehicle end number of the vehicle end which communicates with the intelligent terminal;
a vehicle-end session key safe storage area, a vehicle-end session key existence flag bit and an intelligent terminal number storage area are arranged in the second safety module of the vehicle end; the vehicle-side session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the intelligent terminal; the vehicle-end session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the intelligent terminal exists or not, and when the value of the vehicle-end session key existence zone bit is true or 1, the vehicle-end session key existence zone bit indicates that a session key for carrying out secure encrypted communication with the intelligent terminal exists; the initial value of the session key existence flag bit of the vehicle end is set to be false or 0; the intelligent terminal number storage area is used for storing an intelligent terminal number of the intelligent terminal which is communicated with the vehicle end;
identity authentication phase
The authentication protocol is as follows:
C->T: NCT;
T->C: {NCT||PES(NTS,IDT,SIGT(NCT))};
C->S: {PES(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT))};
S->C: {PEC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS))};
C->T: PET(KCT,IDC,SIGS(NTS));
wherein S represents a cloud end, C represents a vehicle end, T represents an intelligent terminal, and IDTIndicating the number, ID, of the intelligent terminalCIndicating vehicle end number, PESIndicating encryption with the public key of S, PECRepresenting encryption with the public key of C, PETRepresenting encryption with the public key of T, SIGSSignature by private key of S, SIGCRepresenting signature by the private key of C, SIGTRepresenting a signature by a private key of T, KCTDenotes a session key, N, for secure encrypted communication between C and T, distributed by SCTAnd NCSDenotes the verification factor, N, generated by CTSRepresenting a verification factor generated by T, and representing splicing operation by | l;
the authentication protocol performs the following detailed steps:
firstly, the intelligent terminal approaches to the vehicle end, and then triggers the keyless entry switch or the keyless starting switch on the vehicle end; the vehicle end judges the value of the flag bit of the session key of the vehicle end, if the value of the flag bit of the session key of the vehicle end is true or 1, the safe keyless entry and starting stage is entered, and the identity authentication process is terminated; otherwise, the vehicle end sends a randomly generated verification factor N to the intelligent terminalCT;
Secondly, the intelligent terminal receives a verification factor N sent by the vehicle terminalCTThen, firstly, judging the value of the zone bit of the session key of the intelligent terminal, if the value of the zone bit of the session key of the intelligent terminal isIf true or 1, entering a safe keyless entry and starting stage, and terminating the identity authentication process; otherwise, the intelligent terminal verifies the factor N by using the private key pair of the intelligent terminalCTSignature operation is carried out to obtain SIGT(NCT) Then, the intelligent terminal randomly generates a verification factor NTSThen, searching the public key certificate of the cloud end stored in the first security module, and using the public key of the cloud end to convert N into NTSAnd the intelligent terminal ID of the intelligent terminalT、SIGT(NCT) Encrypting to obtain PES(NTS,IDT,SIGT(NCT) Then verify factor N) is appliedCTAnd PES(NTS,IDT,SIGT(NCT) The spliced data is sent to the vehicle end;
thirdly, the vehicle end receives the N sent by the intelligent terminalCT||PES(NTS,IDT,SIGT(NCT) B) first judges the received NCTWhether the value of (A) is equal to N sent to the intelligent terminal in the first stepCTThe values of (A) are the same; if two NCTIf the values are different, the identity authentication process is terminated; if two NCTIf the values are the same, the vehicle end uses the private key of the vehicle end to verify the factor NCTSignature operation is carried out to obtain SIGC(NCT) Then a new verification factor N is generatedCSThen, the public key certificate of the cloud end stored in the second security module is searched, and a verification factor N is obtained by using the public key of the cloud endCSVerifying factor NCTThe vehicle end number ID of the vehicle endCAnd a signature value SIGC(NCT) Encrypting to obtain PES(NCS,NCT,IDC,SIGC(NCT) ) and then PES(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) ) send to the cloud after splicing;
fourthly, the cloud end receives the { PE transmitted by the vehicle endS(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT) Etc. } then decrypt the PE with its own private key, respectivelyS(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) To obtain N)CS、NCT、IDC、SIGC(NCT) And NTS、IDTAnd SIGT(NCT) (ii) a The cloud end is according to the vehicle end number ID of the vehicle endCSearching whether the vehicle end is registered in the vehicle end information storage area in the credible cloud server at the cloud end, and if not, terminating the identity authentication process; if the intelligent terminal ID is registered, the cloud end continues to code the intelligent terminal ID according to the intelligent terminalTSearching whether the intelligent terminal is registered in the intelligent terminal information storage area in the trusted cloud server at the cloud end, and if not, terminating the identity authentication process; if the vehicle end ID is registered, the cloud end continues to use the vehicle end ID according to the vehicle end number of the vehicle endCFinding out the public key certificate corresponding to the vehicle terminal from the certificate server, and then using the public key in the public key certificate to SIGC(NCT) Operating to decrypt SIGC(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the vehicle end is not passed, terminating the identity authentication process; if the values are the same, the cloud end continues to use the intelligent terminal serial number ID of the intelligent terminalTFinding out the public key certificate corresponding to the intelligent terminal from the certificate server, and then using the public key in the public key certificate to SIGT(NCT) Operating to decrypt SIGT(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the intelligent terminal is not passed, terminating the identity authentication process; if the values are the same, the cloud calls the third safety module to generate a session key K for the communication between the vehicle end and the intelligent terminalCTAnd respectively pairing N with own private keysCSAnd NTSSigning to obtain SIGS(NCS) And SIGS(NTS) Then, the session key K is usedCTVehicle end number IDCSignature value SIGS(NTS) Obtaining PE after encrypting by the public key of the intelligent terminalT(KCT,IDC,SIGS(NTS) Next, the cloud end uses the public key pair K of the vehicle endCT、IDTAnd SIGS(NCS) Carrying out encryption to obtain PEC(KCT,IDT,SIGS(NCS) Then, the cloud will PEC(KCT,IDT,SIGS(NCS) ) and PET(KCT,IDC,SIGS(NTS) The spliced data is sent to the vehicle end;
fifthly, the vehicle end receives the { PE from the cloud endC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS) ) } then the PE is paired with its own private keyC(KCT,IDT,SIGS(NCS) Carry out decryption operation to obtain a session key KCTID of intelligent terminalTAnd SIGS(NCS) (ii) a Then, the vehicle end searches the public key certificate of the cloud end stored in the second security module, and uses the public key of the cloud end to pair SIGS(NCS) Performing operation to obtain NCSThen the N isCSAnd N sent to the cloud in the third stepCSIf the values are different, the identity authentication of the cloud is not passed, and then the cloud identity authentication is endedTerminating the identity authentication process; if the values are the same, the vehicle end sends a session key KCTStoring the session key into the vehicle-end session key safe storage area, and setting the flag bit of the vehicle-end session key to be true or 1; the vehicle end numbers the intelligent terminal IDTStoring the intelligent terminal number storage area and establishing an intelligent terminal number IDTWith session key KCTSuch that ID is numbered by the smart terminalTCan find the session key KCT(ii) a The vehicle end then sends the PET(KCT,IDC,SIGS(NTS) Forward to the intelligent terminal;
sixthly, the intelligent terminal receives the PE forwarded by the vehicle terminalT(KCT,IDC,SIGS(NTS) After that), the PE is paired with its own private keyT(KCT,IDC,SIGS(NTS) Carry out decryption operation to obtain KCT、IDCAnd SIGS(NTS) Then, the intelligent terminal searches the public key certificate of the cloud end stored in the first security module, and uses the public key of the cloud end to pair SIGS(NTS) Performing operation to obtain NTSThen the N isTSAnd N generated in the second stepTSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the intelligent terminal sends a session key KCTStoring the session key into the secure storage area of the intelligent terminal, and setting the flag bit of the session key of the intelligent terminal to be true or 1; the intelligent terminal numbers the vehicle terminalCStoring the serial number into the serial number storage area of the vehicle end and establishing the serial number ID of the vehicle endCWith session key KCTBy the association of vehicle-side numbers IDCCan find the session key KCT(ii) a At this point, the identity authentication is successfully completed;
secure keyless entry and start phase
After the identity authentication is successful and the session key is established, the vehicle end is communicated with the intelligent terminalPassing the session key KCTCarrying out secure encrypted communication; in the communication process, the vehicle end passes through the intelligent terminal number ID stored in the intelligent terminal number storage areaTFinding out the session key K associated with the session key K and stored in the vehicle-side session key safe storage areaCT(ii) a The intelligent terminal passes through the vehicle end number ID stored in the vehicle end number storage areaCFinding out the session key K which is associated with the session key K and stored in the secure storage area of the session key of the intelligent terminalCT;
The safe keyless entry and starting stage comprises a safe keyless entry stage and a safe keyless starting stage;
secure keyless entry stage
The specific steps of the secure keyless entry stage are as follows:
a first step of triggering the keyless entry switch on the vehicle side;
secondly, the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
thirdly, the vehicle end generates a keyless entry request instruction and then uses the session key KCTEncrypting the keyless entry request instruction, and sending the obtained keyless entry request instruction ciphertext to the intelligent terminal;
fourthly, after receiving the keyless entry request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existence zone bit, and if the value of the intelligent terminal session key existence zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
fifthly, the intelligent terminal uses the session key KCTDecrypting the keyless entry request command ciphertext to obtain the keyless entry request command;
in the sixth step, the first step is carried out,the intelligent terminal responds to the keyless entry request instruction to generate a keyless entry confirmation instruction, and then uses the session key KCTEncrypting the keyless entry confirmation instruction, and sending the obtained keyless entry confirmation instruction ciphertext to the vehicle end;
seventhly, after the vehicle end receives the keyless entry confirmation instruction ciphertext, using the session key KCTDecrypting to obtain the keyless entry confirmation instruction;
eighthly, the vehicle end executes the keyless entry confirmation instruction, and the vehicle door is unlocked;
safe keyless start phase
The specific steps of the safe keyless start phase are as follows:
a first step of triggering the keyless start switch on the vehicle side;
secondly, the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
thirdly, the vehicle end generates a keyless starting request instruction and then uses the session key KCTEncrypting the keyless starting request instruction, and sending the obtained keyless starting request instruction ciphertext to the intelligent terminal;
fourthly, after receiving the keyless start request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existence zone bit, and if the value of the intelligent terminal session key existence zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
fifthly, the intelligent terminal uses the session key KCTDecrypting the keyless starting request command ciphertext to obtain the keyless starting request command;
sixthly, the intelligent terminal responds to the keyless starting request instruction to generate a keyless starting requestA key-actuated confirmation command, then using said session key KCTEncrypting the keyless starting confirmation instruction, and sending the obtained keyless starting confirmation instruction ciphertext to the vehicle end;
seventhly, after the vehicle end receives the keyless start confirmation instruction ciphertext, using the session key KCTDecrypting to obtain the keyless starting confirmation instruction;
and eighthly, executing the keyless starting confirmation instruction by the vehicle end, and starting the vehicle.
In one embodiment, the communication between the vehicle end and the intelligent terminal means that the vehicle entering and starting control module of the vehicle end and the intelligent terminal control module of the intelligent terminal communicate with each other through the vehicle end short-range communication module and the terminal short-range communication module, respectively, and the communication content includes receiving and sending authentication data and encryption and decryption data;
the vehicle end communicates with the cloud end, specifically, the vehicle entering and starting control module of the vehicle end communicates with the trusted cloud server of the cloud end, and communication content comprises receiving and sending authentication data and encryption and decryption data;
the session key generation, the signature operation and the encryption and decryption operation performed by the cloud end specifically mean that the trusted cloud server of the cloud end calls a corresponding cryptographic service function provided by the third security module;
the random number generation, signature operation and encryption and decryption operation performed by the vehicle end specifically mean that the vehicle entering and starting control module of the vehicle end calls a corresponding password service function provided by the second security module;
the random number generation, signature operation and encryption and decryption operation performed by the intelligent terminal specifically mean that the intelligent terminal control module of the intelligent terminal calls a corresponding password service function provided by the first security module;
the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction, specifically, the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction by the vehicle entry and start control module;
the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction, specifically, the vehicle access and start control module of the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction;
the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction, specifically, the intelligent terminal control module of the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction;
setting a vehicle-side session key duration storage area in the second security module of the vehicle side; the vehicle terminal session key storage area is used for storing a vehicle terminal session key storage time value, the vehicle terminal starts to count down by the vehicle terminal session key storage time value from the time when the value of the vehicle terminal session key storage flag bit is set to true or 1, and when the count down is zero, the vehicle terminal sets the value of the vehicle terminal session key storage flag bit to false or 0; the vehicle terminal session key duration value is automatically specified by the vehicle terminal, or specified by the cloud terminal, or determined by negotiation between the vehicle terminal and the intelligent terminal;
setting an intelligent terminal session key storage duration storage area in the first security module of the intelligent terminal; the intelligent terminal session key storage area is used for storing an intelligent terminal session key storage time value, the intelligent terminal starts to count down by the intelligent terminal session key storage time value from the time when the intelligent terminal session key storage flag bit value is set to be true or 1, and when the count down is zero, the intelligent terminal sets the intelligent terminal session key storage flag bit value to be false or 0; the intelligent terminal session key duration value is automatically specified by the intelligent terminal, or specified by the cloud, or determined by negotiation between the intelligent terminal and the vehicle terminal.
In one embodiment, the first security module, the second security module and the third security module are security smart chips, the commercial cryptographic algorithms supported by the security smart chips include at least one of SM1, SM2 and SM3, and the supported international common cryptographic algorithms include at least one of 3DES, AES, RSA, SHA-1 and SHA-256; the secure intelligent chip supports storing a digital certificate; the safety intelligent chip provides a safety storage area and supports the safety storage of important information; the safety intelligent chip supports generation of random numbers; the certificate server maintains a certificate revocation list and provides a certificate revocation list query function; the terminal short-range communication module and the vehicle-end short-range communication module are one of an NFC communication module, an RFID communication module, a Bluetooth communication module, a WIFI communication module or an infrared communication module; the intelligent terminal is a smart phone, a smart key, a smart card, a tablet computer or a notebook computer.
In one embodiment, when the number of the vehicle terminals is multiple, the vehicle terminal session key secure storage area, the vehicle terminal session key existence flag bit, the intelligent terminal number storage area and the vehicle terminal session key existence time storage area are correspondingly set to be a corresponding plurality of groups; when a plurality of intelligent terminals are arranged, the intelligent terminal session key safe storage area, the intelligent terminal session key existing flag bit, the vehicle end number storage area and the intelligent terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups;
when the intelligent terminal is communicated with the vehicle end, firstly, the value of the zone bit of the session key of the intelligent terminal is judged, and if the value of the zone bit of the session key of the intelligent terminal is true or 1, a safe keyless entry and starting stage is started; otherwise, entering an identity authentication stage;
when the vehicle end communicates with the intelligent terminal, firstly, the value of the zone bit of the session key of the vehicle end is judged, and if the value of the zone bit of the session key of the vehicle end is true or 1, a safe keyless entry and starting stage is started; otherwise, entering into the identity authentication stage.
The embodiments of the present invention have been described in detail with reference to the drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention, and these are within the scope of the present invention. Therefore, the protection scope of the present invention should be subject to the appended claims.
Claims (9)
1. The utility model provides a vehicle does not have key entering and start-up system based on car networking which characterized in that: the system comprises a cloud end, at least one vehicle end and at least one intelligent terminal; the cloud end comprises a trusted cloud server, a certificate server and a third security module; the vehicle end comprises a vehicle entering and starting control module, a vehicle end short-range communication module and a second safety module; the intelligent terminal comprises an intelligent terminal control module, a terminal short-range communication module and a first safety module; the trusted cloud server is respectively connected with the certificate server and the third security module; the vehicle entering and starting control module is respectively connected with the vehicle-end short-range communication module and the second safety module; the intelligent terminal control module is respectively connected with the terminal short-range communication module and the first safety module; the trusted cloud server is in communication connection with at least one vehicle entry and start control module; the vehicle-end short-range communication module is in communication connection with at least one terminal short-range communication module; the terminal short-range communication module is in communication connection with at least one vehicle-end short-range communication module;
the certificate server respectively generates and stores public key certificates for the cloud end, the vehicle end and the intelligent terminal; the first security module, the second security module and the third security module are used for providing a password service function and a secure storage function; the cryptographic service function comprises random number generation, signature operation, encryption and decryption operation and session key generation; the terminal short-range communication module is used for carrying out two-way communication with the vehicle-end short-range communication module; the vehicle entering and starting control module and the intelligent terminal control module are communicated through the vehicle end short-range communication module and the terminal short-range communication module respectively; the intelligent terminal control module calls a corresponding password service function and a corresponding safe storage function provided by the first safe module; the vehicle entering and starting control module calls a corresponding password service function and a corresponding safe storage function provided by the second safety module; the vehicle entering and starting control module is also communicated with the credible cloud server to receive, transmit and process information and data required by authentication; the trusted cloud server is in communication with the vehicle entry and launch control module; the trusted cloud server calls a corresponding cryptographic service function provided by the third security module; the trusted cloud server is also in communication with the certificate server to obtain digital certificate services; the intelligent terminal control module is also used for generating a keyless entry confirmation instruction and a keyless start confirmation instruction; the vehicle entering and starting control module is also used for generating a keyless entering request instruction and executing the keyless entering confirmation instruction; the vehicle entering and starting control module is also used for generating a keyless starting request instruction and executing the keyless starting confirmation instruction;
a vehicle end information storage area is arranged in the credible cloud server of the cloud end, and information stored in the vehicle end information storage area comprises vehicle end information to be subjected to keyless entry and starting; the vehicle end information comprises a vehicle end number; an intelligent terminal information storage area is arranged in the trusted cloud server of the cloud end, and information stored in the intelligent terminal information storage area comprises intelligent terminal information allowing keyless entry and starting of corresponding vehicles; the intelligent terminal information comprises an intelligent terminal number; the trusted cloud server of the cloud maintains correspondence and association between the vehicle side information and the intelligent terminal information; the vehicle end comprises a keyless entry switch and a keyless starting switch;
the cloud end, the vehicle end and the intelligent terminal adopt a mode that the cloud end firstly respectively performs identity authentication on the vehicle end and the intelligent terminal, and then the vehicle end and the intelligent terminal respectively perform identity authentication on the cloud end.
2. The internet-of-vehicles based vehicle keyless entry and start system of claim 1, wherein: the method comprises a preparation stage, an identity authentication stage and a safe keyless entry and starting stage;
preparation phase
Registering the vehicle side information with the trusted cloud server of the cloud side, wherein the trusted cloud server stores the vehicle side information in the vehicle side information storage area; registering the intelligent terminal information with the trusted cloud server at the cloud end, wherein the trusted cloud server stores the intelligent terminal information in the intelligent terminal information storage area; establishing correspondence and association between the vehicle-side information and the intelligent terminal information in the trusted cloud server;
the certificate server generates and stores public key certificates for the cloud end, the vehicle end and the intelligent terminal respectively; the certificate server writes the public key certificate of the cloud end into the first security module of the intelligent terminal in an off-line mode; the certificate server writes the public key certificate of the cloud end into the second safety module of the vehicle end; the cloud end, the vehicle end and the intelligent terminal respectively store private keys corresponding to public keys in corresponding public key certificates; the private key of the cloud is stored in a security storage area of the certificate server or the third security module; the private key of the vehicle end is stored in a safe storage area of a second safety module; the private key of the intelligent terminal is stored in a security storage area of the first security module;
setting an intelligent terminal session key safe storage area, an intelligent terminal session key existence flag bit and a vehicle end number storage area in the first safety module of the intelligent terminal; the intelligent terminal session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the vehicle end; the intelligent terminal session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the vehicle end exists or not, and when the value of the intelligent terminal session key existence zone bit is true or 1, the intelligent terminal session key indicates that a session key for carrying out secure encrypted communication with the vehicle end exists; the initial value of the intelligent terminal session key existence flag bit is set to be false or 0; the vehicle end number storage area is used for storing a vehicle end number of the vehicle end which communicates with the intelligent terminal;
a vehicle-end session key safe storage area, a vehicle-end session key existence flag bit and an intelligent terminal number storage area are arranged in the second safety module of the vehicle end; the vehicle-side session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the intelligent terminal; the vehicle-end session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the intelligent terminal exists or not, and when the value of the vehicle-end session key existence zone bit is true or 1, the vehicle-end session key existence zone bit indicates that a session key for carrying out secure encrypted communication with the intelligent terminal exists; the initial value of the session key existence flag bit of the vehicle end is set to be false or 0; the intelligent terminal number storage area is used for storing an intelligent terminal number of the intelligent terminal which is communicated with the vehicle end;
identity authentication phase
The authentication protocol is as follows:
C->T: NCT;
T->C: {NCT||PES(NTS,IDT,SIGT(NCT))};
C->S: {PES(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT))};
S->C: {PEC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS))};
C->T: PET(KCT,IDC,SIGS(NTS));
wherein S represents a cloud end, C represents a vehicle end,t denotes a smart terminal, IDTIndicating the number, ID, of the intelligent terminalCIndicating vehicle end number, PESIndicating encryption with the public key of S, PECRepresenting encryption with the public key of C, PETRepresenting encryption with the public key of T, SIGSSignature by private key of S, SIGCRepresenting signature by the private key of C, SIGTRepresenting a signature by a private key of T, KCTDenotes a session key, N, for secure encrypted communication between C and T, distributed by SCTAnd NCSDenotes the verification factor, N, generated by CTSRepresenting a verification factor generated by T, and representing splicing operation by | l;
firstly, the intelligent terminal approaches to the vehicle end, and then triggers the keyless entry switch or the keyless starting switch on the vehicle end; the vehicle end judges the value of the flag bit of the session key of the vehicle end, if the value of the flag bit of the session key of the vehicle end is true or 1, the safe keyless entry and starting stage is entered, and the identity authentication process is terminated; otherwise, the vehicle end sends a randomly generated verification factor N to the intelligent terminalCT;
Secondly, the intelligent terminal receives a verification factor N sent by the vehicle terminalCTThen, firstly, judging the value of the zone bit of the session key of the intelligent terminal, if the value of the zone bit of the session key of the intelligent terminal is true or 1, entering a safe keyless entry and starting stage, and terminating the identity authentication process; otherwise, the intelligent terminal verifies the factor N by using the private key pair of the intelligent terminalCTSignature operation is carried out to obtain SIGT(NCT) Then, the intelligent terminal randomly generates a verification factor NTSThen, searching the public key certificate of the cloud end stored in the first security module, and using the public key of the cloud end to convert N into NTSAnd the intelligent terminal ID of the intelligent terminalTAnd SIGT(NCT) Encrypting to obtain PES(NTS,IDT,SIGT(NCT) Then verify factor N) is appliedCTAnd PES(NTS,IDT,SIGT(NCT) ) spellingThen sending the data to the vehicle end;
thirdly, the vehicle end receives the N sent by the intelligent terminalCT||PES(NTS,IDT,SIGT(NCT) B) first judges the received NCTWhether the value of (A) is equal to N sent to the intelligent terminal in the first stepCTThe values of (A) are the same; if two NCTIf the values are different, the identity authentication process is terminated; if two NCTIf the values are the same, the vehicle end uses the private key of the vehicle end to verify the factor NCTSignature operation is carried out to obtain SIGC(NCT) Then a new verification factor N is generatedCSThen, the public key certificate of the cloud end stored in the second security module is searched, and a verification factor N is obtained by using the public key of the cloud endCSVerifying factor NCTThe vehicle end number ID of the vehicle endCAnd a signature value SIGC(NCT) Encrypting to obtain PES(NCS,NCT,IDC,SIGC(NCT) ) and then PES(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) ) send to the cloud after splicing;
fourthly, the cloud end receives the { PE transmitted by the vehicle endS(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT) Etc. } then decrypt the PE with its own private key, respectivelyS(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) To obtain N)CS、NCT、IDC、SIGC(NCT) And NTS、IDTAnd SIGT(NCT) (ii) a The cloud end is according to the vehicle end number ID of the vehicle endCSearching whether the vehicle end is registered in the vehicle end information storage area in the credible cloud server at the cloud end, if not,terminating the identity authentication process; if the intelligent terminal ID is registered, the cloud end continues to code the intelligent terminal ID according to the intelligent terminalTSearching whether the intelligent terminal is registered in the intelligent terminal information storage area in the trusted cloud server at the cloud end, and if not, terminating the identity authentication process; if the vehicle end ID is registered, the cloud end continues to use the vehicle end ID according to the vehicle end number of the vehicle endCFinding out the public key certificate corresponding to the vehicle terminal from the certificate server, and then using the public key in the public key certificate to SIGC(NCT) Operating to decrypt SIGC(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the vehicle end is not passed, terminating the identity authentication process; if the values are the same, the cloud end continues to use the intelligent terminal serial number ID of the intelligent terminalTFinding out the public key certificate corresponding to the intelligent terminal from the certificate server, and then using the public key in the public key certificate to SIGT(NCT) Operating to decrypt SIGT(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the intelligent terminal is not passed, terminating the identity authentication process; if the values are the same, the cloud calls the third safety module to generate a session key K for the communication between the vehicle end and the intelligent terminalCTAnd respectively pairing N with own private keysCSAnd NTSSigning to obtain SIGS(NCS) And SIGS(NTS) Then, the session key K is usedCTVehicle end number IDCSignature value SIGS(NTS) Obtaining PE after encrypting by the public key of the intelligent terminalT(KCT,IDC,SIGS(NTS) Next, the cloud end uses the public key pair K of the vehicle endCT、IDTAnd SIGS(NCS) Carrying out encryption to obtain PEC(KCT,IDT,SIGS(NCS) Then, the cloud will PEC(KCT,IDT,SIGS(NCS) ) and PET(KCT,IDC,SIGS(NTS) The spliced data is sent to the vehicle end;
fifthly, the vehicle end receives the { PE from the cloud endC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS) ) } then the PE is paired with its own private keyC(KCT,IDT,SIGS(NCS) Carry out decryption operation to obtain a session key KCTID of intelligent terminalT、SIGS(NCS) (ii) a Then, the vehicle end searches the public key certificate of the cloud end stored in the second security module, and uses the public key of the cloud end to pair SIGS(NCS) Performing operation to obtain NCSThen the N isCSAnd N sent to the cloud in the third stepCSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the vehicle end sends a session key KCTStoring the session key into the vehicle-end session key safe storage area, and setting the flag bit of the vehicle-end session key to be true or 1; the vehicle end numbers the intelligent terminal IDTStoring the intelligent terminal number storage area and establishing an intelligent terminal number IDTWith session key KCTSuch that ID is numbered by the smart terminalTCan find the session key KCT(ii) a The vehicle end then sends the PET(KCT,IDC,SIGS(NTS) Forward to the intelligent terminal;
sixthly, the intelligent terminal receives the PE forwarded by the vehicle terminalT(KCT,IDC,SIGS(NTS) After that), the PE is paired with its own private keyT(KCT,IDC,SIGS(NTS) Carry out decryption operation to obtain KCT、IDCAnd SIGS(NTS) Then, the intelligent terminal searches the public key certificate of the cloud end stored in the first security module, and uses the public key of the cloud end to pair SIGS(NTS) Performing operation to obtain NTSThen the N isTSAnd N generated in the second stepTSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the intelligent terminal sends a session key KCTStoring the session key into the secure storage area of the intelligent terminal, and setting the flag bit of the session key of the intelligent terminal to be true or 1; the intelligent terminal numbers the vehicle terminalCStoring the serial number into the serial number storage area of the vehicle end and establishing the serial number ID of the vehicle endCWith session key KCTBy the association of vehicle-side numbers IDCCan find the session key KCT(ii) a At this point, the identity authentication is successfully completed;
secure keyless entry and start phase
After the identity authentication is successful and a session key is established, the vehicle end and the intelligent terminal pass through a session key KCTCarrying out secure encrypted communication; in the communication process, the vehicle end passes through the intelligent terminal number ID stored in the intelligent terminal number storage areaTFinding out the session key K associated with the session key K and stored in the vehicle-side session key safe storage areaCT(ii) a The intelligent terminal passes through the vehicle end number ID stored in the vehicle end number storage areaCFinding out the session key K which is associated with the session key K and stored in the secure storage area of the session key of the intelligent terminalCT;
The safe keyless entry and starting stage comprises a safe keyless entry stage and a safe keyless starting stage;
secure keyless entry stage
The process of the secure keyless entry stage is as follows:
triggering the keyless entry switch on the vehicle end;
the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
the vehicle end generates a keyless entry request instruction and then uses the session key KCTEncrypting the keyless entry request instruction, and sending the obtained keyless entry request instruction ciphertext to the intelligent terminal;
after receiving the keyless entry request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existing zone bit, and if the value of the intelligent terminal session key existing zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
the session key K for the intelligent terminalCTDecrypting the keyless entry request command ciphertext to obtain the keyless entry request command;
the intelligent terminal responds to the keyless entry request instruction to generate a keyless entry confirmation instruction, and then uses the session key KCTEncrypting the keyless entry confirmation instruction, and sending the obtained keyless entry confirmation instruction ciphertext to the vehicle end;
after the vehicle end receives the keyless entry confirmation instruction ciphertext, the session key K is usedCTDecrypting to obtain the keyless entry confirmation instruction;
the vehicle end executes the keyless entry confirmation instruction, and the vehicle door is unlocked;
safe keyless start phase
The process of the secure keyless start phase is as follows:
triggering the keyless start switch on the vehicle end;
the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
the vehicle end generates a keyless start request instruction and then uses the session key KCTEncrypting the keyless starting request instruction, and sending the obtained keyless starting request instruction ciphertext to the intelligent terminal;
after receiving the keyless start request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existing zone bit, and if the value of the intelligent terminal session key existing zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
the session key K for the intelligent terminalCTDecrypting the keyless starting request command ciphertext to obtain the keyless starting request command;
the intelligent terminal responds to the keyless start request instruction to generate a keyless start confirmation instruction, and then uses the session key KCTEncrypting the keyless starting confirmation instruction, and sending the obtained keyless starting confirmation instruction ciphertext to the vehicle end;
after the vehicle end receives the keyless start confirmation instruction ciphertext, the session key K is usedCTDecrypting to obtain the keyless starting confirmation instruction;
and the vehicle end executes the keyless starting confirmation instruction, so that the vehicle is started.
3. The internet-of-vehicles based vehicle keyless entry and start system of claim 2, wherein: the communication between the vehicle end and the intelligent terminal specifically means that the vehicle entering and starting control module of the vehicle end and the intelligent terminal control module of the intelligent terminal are communicated through the vehicle end short-range communication module and the terminal short-range communication module respectively, and the communication content comprises receiving and sending authentication data and encryption and decryption data;
the vehicle end communicates with the cloud end, specifically, the vehicle entering and starting control module of the vehicle end communicates with the trusted cloud server of the cloud end, and communication content comprises receiving and sending authentication data and encryption and decryption data;
the session key generation, the signature operation and the encryption and decryption operation performed by the cloud end specifically mean that the trusted cloud server of the cloud end calls a corresponding cryptographic service function provided by the third security module;
the random number generation, signature operation and encryption and decryption operation performed by the vehicle end specifically mean that the vehicle entering and starting control module of the vehicle end calls a corresponding password service function provided by the second security module;
the random number generation, signature operation and encryption and decryption operation performed by the intelligent terminal specifically mean that the intelligent terminal control module of the intelligent terminal calls a corresponding password service function provided by the first security module;
the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction, specifically, the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction by the vehicle entry and start control module;
the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction, specifically, the vehicle access and start control module of the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction;
the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction, specifically, the intelligent terminal control module of the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction;
setting a vehicle-side session key duration storage area in the second security module of the vehicle side; the vehicle terminal session key storage area is used for storing a vehicle terminal session key storage time value, the vehicle terminal starts to count down by the vehicle terminal session key storage time value from the time when the value of the vehicle terminal session key storage flag bit is set to true or 1, and when the count down is zero, the vehicle terminal sets the value of the vehicle terminal session key storage flag bit to false or 0; the vehicle terminal session key duration value is automatically specified by the vehicle terminal, or specified by the cloud terminal, or determined by negotiation between the vehicle terminal and the intelligent terminal;
setting an intelligent terminal session key storage duration storage area in the first security module of the intelligent terminal; the intelligent terminal session key storage area is used for storing an intelligent terminal session key storage time value, the intelligent terminal starts to count down by the intelligent terminal session key storage time value from the time when the intelligent terminal session key storage flag bit value is set to be true or 1, and when the count down is zero, the intelligent terminal sets the intelligent terminal session key storage flag bit value to be false or 0; the intelligent terminal session key duration value is automatically specified by the intelligent terminal, or specified by the cloud, or determined by negotiation between the intelligent terminal and the vehicle terminal.
4. The internet-of-vehicles based vehicle keyless entry and start system according to any one of claims 1 to 3, wherein: the first security module, the second security module and the third security module are all security intelligent chips, the commercial cryptographic algorithm supported by the security intelligent chips comprises at least one of SM1, SM2 and SM3, and the supported international common cryptographic algorithm comprises at least one of 3DES, AES, RSA, SHA-1 and SHA-256; the secure intelligent chip supports storing a digital certificate; the safety intelligent chip provides a safety storage area and supports the safety storage of important information; the safety intelligent chip supports generation of random numbers; the certificate server maintains a certificate revocation list and provides a certificate revocation list query function; the terminal short-range communication module and the vehicle-end short-range communication module are one of an NFC communication module, an RFID communication module, a Bluetooth communication module, a WIFI communication module or an infrared communication module; the intelligent terminal is a smart phone, a smart key, a smart card, a tablet computer or a notebook computer.
5. The internet-of-vehicles based vehicle keyless entry and start system according to claim 3, wherein: when a plurality of vehicle terminals are arranged, the vehicle terminal session key safe storage area, the vehicle terminal session key existing flag bit, the intelligent terminal number storage area and the vehicle terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups; when a plurality of intelligent terminals are arranged, the intelligent terminal session key safe storage area, the intelligent terminal session key existing flag bit, the vehicle end number storage area and the intelligent terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups;
when the intelligent terminal is communicated with the vehicle end, firstly, the value of the zone bit of the session key of the intelligent terminal is judged, and if the value of the zone bit of the session key of the intelligent terminal is true or 1, a safe keyless entry and starting stage is started; otherwise, entering an identity authentication stage;
when the vehicle end communicates with the intelligent terminal, firstly, the value of the zone bit of the session key of the vehicle end is judged, and if the value of the zone bit of the session key of the vehicle end is true or 1, a safe keyless entry and starting stage is started; otherwise, entering into the identity authentication stage.
6. A vehicle keyless entry and start method based on the vehicle keyless entry and start system based on the vehicle networking according to claim 1, characterized in that: the method comprises a preparation stage, an identity authentication stage and a safe keyless entry and starting stage;
preparation phase
Registering the vehicle side information with the trusted cloud server of the cloud side, wherein the trusted cloud server stores the vehicle side information in the vehicle side information storage area; registering the intelligent terminal information with the trusted cloud server at the cloud end, wherein the trusted cloud server stores the intelligent terminal information in the intelligent terminal information storage area; establishing correspondence and association between the vehicle-side information and the intelligent terminal information in the trusted cloud server;
the certificate server generates and stores public key certificates for the cloud end, the vehicle end and the intelligent terminal respectively; the certificate server writes the public key certificate of the cloud end into the first security module of the intelligent terminal in an off-line mode; the certificate server writes the public key certificate of the cloud end into the second safety module of the vehicle end; the cloud end, the vehicle end and the intelligent terminal respectively store private keys corresponding to public keys in corresponding public key certificates; the private key of the cloud is stored in a security storage area of the certificate server or the third security module; the private key of the vehicle end is stored in a safe storage area of a second safety module; the private key of the intelligent terminal is stored in a security storage area of the first security module;
setting an intelligent terminal session key safe storage area, an intelligent terminal session key existence flag bit and a vehicle end number storage area in the first safety module of the intelligent terminal; the intelligent terminal session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the vehicle end; the intelligent terminal session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the vehicle end exists or not, and when the value of the intelligent terminal session key existence zone bit is true or 1, the intelligent terminal session key indicates that a session key for carrying out secure encrypted communication with the vehicle end exists; the initial value of the intelligent terminal session key existence flag bit is set to be false or 0; the vehicle end number storage area is used for storing a vehicle end number of the vehicle end which communicates with the intelligent terminal;
a vehicle-end session key safe storage area, a vehicle-end session key existence flag bit and an intelligent terminal number storage area are arranged in the second safety module of the vehicle end; the vehicle-side session key safe storage area is used for storing a session key and is used for carrying out safe encrypted communication with the intelligent terminal; the vehicle-end session key existence zone bit is used for identifying whether a session key for carrying out secure encrypted communication with the intelligent terminal exists or not, and when the value of the vehicle-end session key existence zone bit is true or 1, the vehicle-end session key existence zone bit indicates that a session key for carrying out secure encrypted communication with the intelligent terminal exists; the initial value of the session key existence flag bit of the vehicle end is set to be false or 0; the intelligent terminal number storage area is used for storing an intelligent terminal number of the intelligent terminal which is communicated with the vehicle end;
identity authentication phase
The authentication protocol is as follows:
C->T: NCT;
T->C: {NCT||PES(NTS,IDT,SIGT(NCT))};
C->S: {PES(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT))};
S->C: {PEC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS))};
C->T: PET(KCT,IDC,SIGS(NTS));
wherein S represents a cloud end, C represents a vehicle end, T represents an intelligent terminal, and IDTIndicating the number, ID, of the intelligent terminalCIndicating vehicle end number, PESIndicating encryption with the public key of S, PECRepresenting encryption with the public key of C, PETRepresenting encryption with the public key of T, SIGSSignature by private key of S, SIGCRepresenting signature by the private key of C, SIGTRepresenting a signature by a private key of T, KCTDenotes a session key, N, for secure encrypted communication between C and T, distributed by SCTAnd NCSDenotes the verification factor, N, generated by CTSRepresenting a verification factor generated by T, and representing splicing operation by | l;
the authentication protocol performs the following detailed steps:
firstly, the intelligent terminal approaches to the vehicle end, and then triggers the keyless entry switch or the keyless starting switch on the vehicle end; the vehicle end judges the value of the flag bit of the session key of the vehicle end, if the value of the flag bit of the session key of the vehicle end is true or 1, the safe keyless entry and starting stage is entered, and the identity authentication process is terminated; otherwise, the vehicle end sends a randomly generated verification factor N to the intelligent terminalCT;
Secondly, the intelligent terminal receives a verification factor N sent by the vehicle terminalCTThen, firstly, judging the value of the zone bit of the session key of the intelligent terminal, if the value of the zone bit of the session key of the intelligent terminal is true or 1, entering a safe keyless entry and starting stage, and terminating the identity authentication process; otherwise, the intelligent terminal verifies the factor N by using the private key pair of the intelligent terminalCTSignature operation is carried out to obtain SIGT(NCT) Then, the intelligent terminal randomly generates a verification factor NTSThen, searching the public key certificate of the cloud end stored in the first security module, and using the public key of the cloud end to convert N into NTSAnd the intelligent terminal ID of the intelligent terminalT、SIGT(NCT) Encrypting to obtain PES(NTS,IDT,SIGT(NCT) Then verify factor N) is appliedCTAnd PES(NTS,IDT,SIGT(NCT) The spliced data is sent to the vehicle end;
thirdly, the vehicle end receives the N sent by the intelligent terminalCT||PES(NTS,IDT,SIGT(NCT) B) first judges the received NCTWhether the value of (A) is equal to N sent to the intelligent terminal in the first stepCTThe values of (A) are the same; if two NCTIf the values are different, the identity authentication process is terminated; if two NCTIf the values are the same, the vehicle end uses the private key of the vehicle end to verify the factor NCTSignature operation is carried out to obtain SIGC(NCT) Then a new verification factor N is generatedCSThen, the public key certificate of the cloud end stored in the second security module is searched, and a verification factor N is obtained by using the public key of the cloud endCSVerifying factor NCTThe vehicle end number ID of the vehicle endCAnd a signature value SIGC(NCT) Encrypting to obtain PES(NCS,NCT,IDC,SIGC(NCT) ) and then PES(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) ) send to the cloud after splicing;
fourthly, the cloud end receives the { PE transmitted by the vehicle endS(NCS,NCT,IDC,SIGC(NCT))||PES(NTS,IDT,SIGT(NCT) Etc. } then decrypt the PE with its own private key, respectivelyS(NCS,NCT,IDC,SIGC(NCT) ) and PES(NTS,IDT,SIGT(NCT) To obtain N)CS、NCT、IDC、SIGC(NCT) And NTS、IDTAnd SIGT(NCT) (ii) a The cloud end is according to the vehicle end number ID of the vehicle endCSearching whether the vehicle end is registered in the vehicle end information storage area in the credible cloud server at the cloud end, and if not, terminating the identity authentication process; if the intelligent terminal ID is registered, the cloud end continues to code the intelligent terminal ID according to the intelligent terminalTSearching whether the intelligent terminal is registered in the intelligent terminal information storage area in the trusted cloud server at the cloud end, and if not, terminating the identity authentication process; if the vehicle end ID is registered, the cloud end continues to use the vehicle end ID according to the vehicle end number of the vehicle endCFinding out the public key certificate corresponding to the vehicle terminal from the certificate server, and then using the public key in the public key certificate to SIGC(NCT) Operating to decrypt SIGC(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the vehicle end is not passed, terminating the identity authentication process; if the values are the same, the cloud end continues to use the intelligent terminal serial number ID of the intelligent terminalTFinding out the public key certificate corresponding to the intelligent terminal from the certificate server, and then using the public key in the public key certificate to SIGT(NCT) Operating to decrypt SIGT(NCT) N in (1)CTThen the value of NCTWith the just-from-PES(NCS,NCT,IDC,SIGC(NCT) N obtained in (1)CTComparing the values, if the values are different, indicating that the identity authentication of the intelligent terminal is not passed, terminating the identity authentication process; if the values are the same, the cloud calls the third safety module to generate a session key K for the communication between the vehicle end and the intelligent terminalCTAnd respectively pairing N with own private keysCSAnd NTSSigning to obtain SIGS(NCS) And SIGS(NTS) Then, the session key K is usedCTVehicle end number IDCSignature value SIGS(NTS) Obtaining PE after encrypting by the public key of the intelligent terminalT(KCT,IDC,SIGS(NTS) Next, the cloud end uses the public key pair K of the vehicle endCT、IDTAnd SIGS(NCS) Carrying out encryption to obtain PEC(KCT,IDT,SIGS(NCS) Then, the cloud will PEC(KCT,IDT,SIGS(NCS) ) and PET(KCT,IDC,SIGS(NTS) The spliced data is sent to the vehicle end;
the fifth step, the vehicleThe vehicle end receives the PE from the cloud endC(KCT,IDT,SIGS(NCS))||PET(KCT,IDC,SIGS(NTS) ) } then the PE is paired with its own private keyC(KCT,IDT,SIGS(NCS) Carry out decryption operation to obtain a session key KCTID of intelligent terminalTAnd SIGS(NCS) (ii) a Then, the vehicle end searches the public key certificate of the cloud end stored in the second security module, and uses the public key of the cloud end to pair SIGS(NCS) Performing operation to obtain NCSThen the N isCSAnd N sent to the cloud in the third stepCSComparing the values, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the vehicle end sends a session key KCTStoring the session key into the vehicle-end session key safe storage area, and setting the flag bit of the vehicle-end session key to be true or 1; the vehicle end numbers the intelligent terminal IDTStoring the intelligent terminal number storage area and establishing an intelligent terminal number IDTWith session key KCTSuch that ID is numbered by the smart terminalTCan find the session key KCT(ii) a The vehicle end then sends the PET(KCT,IDC,SIGS(NTS) Forward to the intelligent terminal;
sixthly, the intelligent terminal receives the PE forwarded by the vehicle terminalT(KCT,IDC,SIGS(NTS) After that), the PE is paired with its own private keyT(KCT,IDC,SIGS(NTS) Carry out decryption operation to obtain KCT、IDCAnd SIGS(NTS) Then, the intelligent terminal searches the public key certificate of the cloud end stored in the first security module, and uses the public key of the cloud end to pair SIGS(NTS) Performing operation to obtain NTSThen the N isTSAnd N generated in the second stepTSValue of (A) intoComparing, if the values are different, indicating that the identity authentication on the cloud end is not passed, terminating the identity authentication process; if the values are the same, the intelligent terminal sends a session key KCTStoring the session key into the secure storage area of the intelligent terminal, and setting the flag bit of the session key of the intelligent terminal to be true or 1; the intelligent terminal numbers the vehicle terminalCStoring the serial number into the serial number storage area of the vehicle end and establishing the serial number ID of the vehicle endCWith session key KCTBy the association of vehicle-side numbers IDCCan find the session key KCT(ii) a At this point, the identity authentication is successfully completed;
secure keyless entry and start phase
After the identity authentication is successful and a session key is established, the vehicle end and the intelligent terminal pass through the session key KCTCarrying out secure encrypted communication; in the communication process, the vehicle end passes through the intelligent terminal number ID stored in the intelligent terminal number storage areaTFinding out the session key K associated with the session key K and stored in the vehicle-side session key safe storage areaCT(ii) a The intelligent terminal passes through the vehicle end number ID stored in the vehicle end number storage areaCFinding out the session key K which is associated with the session key K and stored in the secure storage area of the session key of the intelligent terminalCT;
The safe keyless entry and starting stage comprises a safe keyless entry stage and a safe keyless starting stage;
secure keyless entry stage
The specific steps of the secure keyless entry stage are as follows:
a first step of triggering the keyless entry switch on the vehicle side;
secondly, the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
thirdly, the vehicle end generates a keyless entry requestInstruct and then use the session key KCTEncrypting the keyless entry request instruction, and sending the obtained keyless entry request instruction ciphertext to the intelligent terminal;
fourthly, after receiving the keyless entry request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existence zone bit, and if the value of the intelligent terminal session key existence zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless entry process;
fifthly, the intelligent terminal uses the session key KCTDecrypting the keyless entry request command ciphertext to obtain the keyless entry request command;
sixthly, the intelligent terminal responds to the keyless entry request instruction to generate a keyless entry confirmation instruction, and then the session key K is usedCTEncrypting the keyless entry confirmation instruction, and sending the obtained keyless entry confirmation instruction ciphertext to the vehicle end;
seventhly, after the vehicle end receives the keyless entry confirmation instruction ciphertext, using the session key KCTDecrypting to obtain the keyless entry confirmation instruction;
eighthly, the vehicle end executes the keyless entry confirmation instruction, and the vehicle door is unlocked;
safe keyless start phase
The specific steps of the safe keyless start phase are as follows:
a first step of triggering the keyless start switch on the vehicle side;
secondly, the vehicle end judges the value of the flag bit of the session key of the vehicle end, and if the value of the flag bit of the session key of the vehicle end is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
thirdly, the vehicle end generates a keyless starting request instruction and then uses the session key KCTThe keyless start request is referred toEncrypting and sending the obtained keyless starting request command ciphertext to the intelligent terminal;
fourthly, after receiving the keyless start request command ciphertext, the intelligent terminal firstly judges the value of the intelligent terminal session key existence zone bit, and if the value of the intelligent terminal session key existence zone bit is true or 1, the next step is continued; otherwise, entering an identity authentication stage, and terminating the safe keyless starting process;
fifthly, the intelligent terminal uses the session key KCTDecrypting the keyless starting request command ciphertext to obtain the keyless starting request command;
sixthly, the intelligent terminal responds to the keyless start request instruction to generate a keyless start confirmation instruction, and then the session key K is usedCTEncrypting the keyless starting confirmation instruction, and sending the obtained keyless starting confirmation instruction ciphertext to the vehicle end;
seventhly, after the vehicle end receives the keyless start confirmation instruction ciphertext, using the session key KCTDecrypting to obtain the keyless starting confirmation instruction;
and eighthly, executing the keyless starting confirmation instruction by the vehicle end, and starting the vehicle.
7. The vehicle keyless entry and start method based on the internet of vehicles of claim 6, wherein: the communication between the vehicle end and the intelligent terminal specifically means that the vehicle entering and starting control module of the vehicle end and the intelligent terminal control module of the intelligent terminal are communicated through the vehicle end short-range communication module and the terminal short-range communication module respectively, and the communication content comprises receiving and sending authentication data and encryption and decryption data;
the vehicle end communicates with the cloud end, specifically, the vehicle entering and starting control module of the vehicle end communicates with the trusted cloud server of the cloud end, and communication content comprises receiving and sending authentication data and encryption and decryption data;
the session key generation, the signature operation and the encryption and decryption operation performed by the cloud end specifically mean that the trusted cloud server of the cloud end calls a corresponding cryptographic service function provided by the third security module;
the random number generation, signature operation and encryption and decryption operation performed by the vehicle end specifically mean that the vehicle entering and starting control module of the vehicle end calls a corresponding password service function provided by the second security module;
the random number generation, signature operation and encryption and decryption operation performed by the intelligent terminal specifically mean that the intelligent terminal control module of the intelligent terminal calls a corresponding password service function provided by the first security module;
the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction, specifically, the vehicle end generates the keyless entry request instruction and executes the keyless entry confirmation instruction by the vehicle entry and start control module;
the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction, specifically, the vehicle access and start control module of the vehicle end generates the keyless start request instruction and executes the keyless start confirmation instruction;
the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction, specifically, the intelligent terminal control module of the intelligent terminal generates the keyless entry confirmation instruction and the keyless start confirmation instruction;
setting a vehicle-side session key duration storage area in the second security module of the vehicle side; the vehicle terminal session key storage area is used for storing a vehicle terminal session key storage time value, the vehicle terminal starts to count down by the vehicle terminal session key storage time value from the time when the value of the vehicle terminal session key storage flag bit is set to true or 1, and when the count down is zero, the vehicle terminal sets the value of the vehicle terminal session key storage flag bit to false or 0; the vehicle terminal session key duration value is automatically specified by the vehicle terminal, or specified by the cloud terminal, or determined by negotiation between the vehicle terminal and the intelligent terminal;
setting an intelligent terminal session key storage duration storage area in the first security module of the intelligent terminal; the intelligent terminal session key storage area is used for storing an intelligent terminal session key storage time value, the intelligent terminal starts to count down by the intelligent terminal session key storage time value from the time when the intelligent terminal session key storage flag bit value is set to be true or 1, and when the count down is zero, the intelligent terminal sets the intelligent terminal session key storage flag bit value to be false or 0; the intelligent terminal session key duration value is automatically specified by the intelligent terminal, or specified by the cloud, or determined by negotiation between the intelligent terminal and the vehicle terminal.
8. The vehicle keyless entry and start method according to claim 6 or 7, wherein: the first security module, the second security module and the third security module are all security intelligent chips, the commercial cryptographic algorithm supported by the security intelligent chips comprises at least one of SM1, SM2 and SM3, and the supported international common cryptographic algorithm comprises at least one of 3DES, AES, RSA, SHA-1 and SHA-256; the secure intelligent chip supports storing a digital certificate; the safety intelligent chip provides a safety storage area and supports the safety storage of important information; the safety intelligent chip supports generation of random numbers; the certificate server maintains a certificate revocation list and provides a certificate revocation list query function; the terminal short-range communication module and the vehicle-end short-range communication module are one of an NFC communication module, an RFID communication module, a Bluetooth communication module, a WIFI communication module or an infrared communication module; the intelligent terminal is a smart phone, a smart key, a smart card, a tablet computer or a notebook computer.
9. The vehicle keyless entry and start method based on the internet of vehicles of claim 7, wherein: when a plurality of vehicle terminals are arranged, the vehicle terminal session key safe storage area, the vehicle terminal session key existing flag bit, the intelligent terminal number storage area and the vehicle terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups; when a plurality of intelligent terminals are arranged, the intelligent terminal session key safe storage area, the intelligent terminal session key existing flag bit, the vehicle end number storage area and the intelligent terminal session key duration storage area are correspondingly arranged into a plurality of corresponding groups;
when the intelligent terminal is communicated with the vehicle end, firstly, the value of the zone bit of the session key of the intelligent terminal is judged, and if the value of the zone bit of the session key of the intelligent terminal is true or 1, a safe keyless entry and starting stage is started; otherwise, entering an identity authentication stage;
when the vehicle end communicates with the intelligent terminal, firstly, the value of the zone bit of the session key of the vehicle end is judged, and if the value of the zone bit of the session key of the vehicle end is true or 1, a safe keyless entry and starting stage is started; otherwise, entering into the identity authentication stage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010382014.XA CN111572493B (en) | 2020-05-08 | 2020-05-08 | Vehicle keyless entry and starting system and method based on Internet of vehicles |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010382014.XA CN111572493B (en) | 2020-05-08 | 2020-05-08 | Vehicle keyless entry and starting system and method based on Internet of vehicles |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111572493A true CN111572493A (en) | 2020-08-25 |
CN111572493B CN111572493B (en) | 2021-04-13 |
Family
ID=72117318
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010382014.XA Active CN111572493B (en) | 2020-05-08 | 2020-05-08 | Vehicle keyless entry and starting system and method based on Internet of vehicles |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111572493B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112055330A (en) * | 2020-08-31 | 2020-12-08 | 郑州信大捷安信息技术股份有限公司 | V2X Internet of vehicles safety communication system and method based on 5G |
CN112055071A (en) * | 2020-08-31 | 2020-12-08 | 郑州信大捷安信息技术股份有限公司 | Industrial control safety communication system and method based on 5G |
CN113115255A (en) * | 2021-04-09 | 2021-07-13 | 宝能(广州)汽车研究院有限公司 | Certificate issuing method, secret key authentication method, vehicle unlocking method, equipment and storage medium |
CN113442871A (en) * | 2021-06-30 | 2021-09-28 | 重庆长安新能源汽车科技有限公司 | NFC-based keyless entry method and system |
CN113459994A (en) * | 2021-06-25 | 2021-10-01 | 深圳市芯中芯科技有限公司 | Vehicle unlocking method and device based on PEPS system and computer readable storage medium |
CN114143776A (en) * | 2021-10-20 | 2022-03-04 | 的卢技术有限公司 | Encryption method and system for communication between mobile terminal and vehicle |
CN115376226A (en) * | 2022-08-23 | 2022-11-22 | 芜湖雄狮汽车科技有限公司 | NFC vehicle key authentication method and device, vehicle and storage medium |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101720071A (en) * | 2009-12-01 | 2010-06-02 | 郑州信大捷安信息技术有限公司 | Short message two-stage encryption transmission and secure storage method based on safety SIM card |
CN105015489A (en) * | 2015-07-14 | 2015-11-04 | 杭州万好万家新能源科技有限公司 | Intelligent vehicle control system based on digital key |
JP2016163265A (en) * | 2015-03-04 | 2016-09-05 | Kddi株式会社 | Key management system, key management method, and computer program |
CN106375312A (en) * | 2016-08-31 | 2017-02-01 | 长城汽车股份有限公司 | Virtual key authorization method and system, mobile terminal and server |
CN106394486A (en) * | 2016-08-31 | 2017-02-15 | 长城汽车股份有限公司 | Authorization method and system of virtual key and server |
CN106394485A (en) * | 2016-08-31 | 2017-02-15 | 长城汽车股份有限公司 | Authorization method of virtual key, server and authorization system |
US20170132860A1 (en) * | 2015-11-09 | 2017-05-11 | Silvercar, Inc. | Vehicle access systems and methods |
CN107251106A (en) * | 2014-12-23 | 2017-10-13 | 法雷奥舒适驾驶助手公司 | The method securely transmitted for virtual key and the mirror method for distinguishing for mobile terminal |
US9842443B1 (en) * | 2012-04-09 | 2017-12-12 | Google Llc | Computing device as a vehicle key |
US20180009416A1 (en) * | 2016-06-03 | 2018-01-11 | Volkswagen Aktiengesellschaft | Apparatus, system and method for vehicle access and function control utilizing a portable device |
CN107650863A (en) * | 2017-09-19 | 2018-02-02 | 大陆汽车投资(上海)有限公司 | Vehicle sharing method and system |
CN107919956A (en) * | 2018-01-04 | 2018-04-17 | 重庆邮电大学 | End-to-end method for protecting under a kind of internet of things oriented cloud environment |
CN109448195A (en) * | 2018-12-12 | 2019-03-08 | 北京车联天下信息技术有限公司 | The authentication method and device of vehicle virtual key |
US20190080540A1 (en) * | 2017-09-13 | 2019-03-14 | Hyundai Motor Company | System and method for controlling vehicle |
CN109808643A (en) * | 2019-03-04 | 2019-05-28 | 重庆长安汽车股份有限公司 | Bluetooth electronic key system and its control method |
CN110111459A (en) * | 2019-04-16 | 2019-08-09 | 深圳联友科技有限公司 | A kind of virtual key management method and system |
CN110194123A (en) * | 2019-06-28 | 2019-09-03 | 广州小鹏汽车科技有限公司 | Vehicle starting method and system, vehicle under a kind of no key status |
CN110239484A (en) * | 2019-06-28 | 2019-09-17 | 江苏恒宝智能系统技术有限公司 | Vehicle lock telesecurity control system and method |
CN110289958A (en) * | 2019-07-18 | 2019-09-27 | 郑州信大捷安信息技术股份有限公司 | Internet of Vehicles identity authentication method and system |
CN111071203A (en) * | 2019-12-20 | 2020-04-28 | 北京宝沃汽车股份有限公司 | Keyless control system and method for vehicle |
-
2020
- 2020-05-08 CN CN202010382014.XA patent/CN111572493B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101720071A (en) * | 2009-12-01 | 2010-06-02 | 郑州信大捷安信息技术有限公司 | Short message two-stage encryption transmission and secure storage method based on safety SIM card |
US9842443B1 (en) * | 2012-04-09 | 2017-12-12 | Google Llc | Computing device as a vehicle key |
CN107251106A (en) * | 2014-12-23 | 2017-10-13 | 法雷奥舒适驾驶助手公司 | The method securely transmitted for virtual key and the mirror method for distinguishing for mobile terminal |
JP2016163265A (en) * | 2015-03-04 | 2016-09-05 | Kddi株式会社 | Key management system, key management method, and computer program |
CN105015489A (en) * | 2015-07-14 | 2015-11-04 | 杭州万好万家新能源科技有限公司 | Intelligent vehicle control system based on digital key |
US20170132860A1 (en) * | 2015-11-09 | 2017-05-11 | Silvercar, Inc. | Vehicle access systems and methods |
US20180009416A1 (en) * | 2016-06-03 | 2018-01-11 | Volkswagen Aktiengesellschaft | Apparatus, system and method for vehicle access and function control utilizing a portable device |
CN106375312A (en) * | 2016-08-31 | 2017-02-01 | 长城汽车股份有限公司 | Virtual key authorization method and system, mobile terminal and server |
CN106394486A (en) * | 2016-08-31 | 2017-02-15 | 长城汽车股份有限公司 | Authorization method and system of virtual key and server |
CN106394485A (en) * | 2016-08-31 | 2017-02-15 | 长城汽车股份有限公司 | Authorization method of virtual key, server and authorization system |
US20190080540A1 (en) * | 2017-09-13 | 2019-03-14 | Hyundai Motor Company | System and method for controlling vehicle |
CN107650863A (en) * | 2017-09-19 | 2018-02-02 | 大陆汽车投资(上海)有限公司 | Vehicle sharing method and system |
CN107919956A (en) * | 2018-01-04 | 2018-04-17 | 重庆邮电大学 | End-to-end method for protecting under a kind of internet of things oriented cloud environment |
CN109448195A (en) * | 2018-12-12 | 2019-03-08 | 北京车联天下信息技术有限公司 | The authentication method and device of vehicle virtual key |
CN109808643A (en) * | 2019-03-04 | 2019-05-28 | 重庆长安汽车股份有限公司 | Bluetooth electronic key system and its control method |
CN110111459A (en) * | 2019-04-16 | 2019-08-09 | 深圳联友科技有限公司 | A kind of virtual key management method and system |
CN110194123A (en) * | 2019-06-28 | 2019-09-03 | 广州小鹏汽车科技有限公司 | Vehicle starting method and system, vehicle under a kind of no key status |
CN110239484A (en) * | 2019-06-28 | 2019-09-17 | 江苏恒宝智能系统技术有限公司 | Vehicle lock telesecurity control system and method |
CN110289958A (en) * | 2019-07-18 | 2019-09-27 | 郑州信大捷安信息技术股份有限公司 | Internet of Vehicles identity authentication method and system |
CN111071203A (en) * | 2019-12-20 | 2020-04-28 | 北京宝沃汽车股份有限公司 | Keyless control system and method for vehicle |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112055330A (en) * | 2020-08-31 | 2020-12-08 | 郑州信大捷安信息技术股份有限公司 | V2X Internet of vehicles safety communication system and method based on 5G |
CN112055071A (en) * | 2020-08-31 | 2020-12-08 | 郑州信大捷安信息技术股份有限公司 | Industrial control safety communication system and method based on 5G |
CN112055071B (en) * | 2020-08-31 | 2022-02-22 | 郑州信大捷安信息技术股份有限公司 | Industrial control safety communication system and method based on 5G |
CN112055330B (en) * | 2020-08-31 | 2022-03-25 | 郑州信大捷安信息技术股份有限公司 | V2X Internet of vehicles safety communication system and method based on 5G |
CN113115255A (en) * | 2021-04-09 | 2021-07-13 | 宝能(广州)汽车研究院有限公司 | Certificate issuing method, secret key authentication method, vehicle unlocking method, equipment and storage medium |
CN113459994A (en) * | 2021-06-25 | 2021-10-01 | 深圳市芯中芯科技有限公司 | Vehicle unlocking method and device based on PEPS system and computer readable storage medium |
CN113459994B (en) * | 2021-06-25 | 2022-04-26 | 深圳市芯中芯科技有限公司 | Vehicle unlocking method and device based on PEPS system and computer readable storage medium |
CN113442871A (en) * | 2021-06-30 | 2021-09-28 | 重庆长安新能源汽车科技有限公司 | NFC-based keyless entry method and system |
CN114143776A (en) * | 2021-10-20 | 2022-03-04 | 的卢技术有限公司 | Encryption method and system for communication between mobile terminal and vehicle |
CN114143776B (en) * | 2021-10-20 | 2024-06-07 | 的卢技术有限公司 | Encryption method and system for communication between mobile terminal and vehicle |
CN115376226A (en) * | 2022-08-23 | 2022-11-22 | 芜湖雄狮汽车科技有限公司 | NFC vehicle key authentication method and device, vehicle and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111572493B (en) | 2021-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111572493B (en) | Vehicle keyless entry and starting system and method based on Internet of vehicles | |
US11876896B2 (en) | ID-based control unit-key fob pairing | |
CN109862040B (en) | Security authentication method and authentication system | |
CN110637328B (en) | Vehicle access method based on portable equipment | |
US8526606B2 (en) | On-demand secure key generation in a vehicle-to-vehicle communication network | |
US10250687B2 (en) | Vehicle remote operation information provision device, vehicle-mounted remote operation information acquisition device, and vehicle remote operation system comprising these devices | |
US9218700B2 (en) | Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs | |
JP5803724B2 (en) | Authentication system and authentication device | |
TW201927601A (en) | Method for generating and using virtual key of vehicle, system for same, and user terminal | |
CN111479244B (en) | V2I Internet of vehicles identity authentication system and method | |
CN111200496B (en) | Digital key implementation method based on vehicle | |
CN107864124B (en) | Terminal information security protection method, terminal and Bluetooth lock | |
CN111845624B (en) | Method for starting vehicle without key | |
CN112396735B (en) | Internet automobile digital key safety authentication method and device | |
CN111818483B (en) | V2V vehicle networking communication system and method based on 5G | |
CN111083696B (en) | Communication verification method and system, mobile terminal and vehicle machine side | |
WO2019007063A1 (en) | Battery charging and swapping equipment, and authentication method and system for object requesting for battery charging or swapping | |
CN109859362A (en) | A kind of electric motor intelligent key controller method | |
KR102521936B1 (en) | Method of secured sharing of vehicle key | |
US20230071702A1 (en) | Managing communications between a vehicle and a user device | |
CN106559378A (en) | Automobile door lock tripper, system and method and intelligent terminal | |
CN106603486B (en) | Method and system for security authorization of mobile terminal | |
CN117475533A (en) | Data transmission method and device, equipment and computer readable storage medium | |
CN112423298B (en) | Identity authentication system and method for road traffic signal management and control facility | |
CN118694802B (en) | Vehicle remote control method and remote control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A keyless entry and start system and method for vehicles based on the Internet of Vehicles Granted publication date: 20210413 Pledgee: Bank of Zhengzhou Co.,Ltd. Zhongyuan Science and Technology City Sub branch Pledgor: ZHENGZHOU XINDA JIEAN INFORMATION TECHNOLOGY Co.,Ltd. Registration number: Y2024980013861 |