CN111970115A - Method, device, system and terminal for checking digital key - Google Patents

Method, device, system and terminal for checking digital key Download PDF

Info

Publication number
CN111970115A
CN111970115A CN201910419145.8A CN201910419145A CN111970115A CN 111970115 A CN111970115 A CN 111970115A CN 201910419145 A CN201910419145 A CN 201910419145A CN 111970115 A CN111970115 A CN 111970115A
Authority
CN
China
Prior art keywords
digital key
key
terminal
information
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910419145.8A
Other languages
Chinese (zh)
Other versions
CN111970115B (en
Inventor
潘蓝兰
陈洁
郑士岑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Geely Holding Group Co Ltd
Zhejiang Geely Automobile Research Institute Co Ltd
Original Assignee
Zhejiang Geely Holding Group Co Ltd
Zhejiang Geely Automobile Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Geely Holding Group Co Ltd, Zhejiang Geely Automobile Research Institute Co Ltd filed Critical Zhejiang Geely Holding Group Co Ltd
Priority to CN201910419145.8A priority Critical patent/CN111970115B/en
Publication of CN111970115A publication Critical patent/CN111970115A/en
Application granted granted Critical
Publication of CN111970115B publication Critical patent/CN111970115B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses a method, a device, a system and a terminal for checking a digital key, wherein the method comprises the following steps: the control server sends a first digital key to a second terminal based on the first terminal; the second terminal decrypts the first digital key and extracts first key information, wherein the first key information comprises control information of the second terminal; the control server sends a second digital key to the second terminal based on the first terminal; the second terminal judges whether the second digital key meets a non-first-time use condition; if so, the second terminal decrypts the second digital key to obtain second key information; the second terminal verifies the second key information and judges whether the second key information is the same as the first key information or not; if yes, the second terminal receives control of the second digital key; the invention can enable the second terminal to receive the digital key in a network-free state, reduce the verification time delay and increase the available scenes.

Description

Method, device, system and terminal for checking digital key
Technical Field
The invention relates to the technical field of digital key verification, in particular to a digital key verification method, a digital key verification device, a digital key verification system and a digital key verification terminal.
Background
The digital key service is a key basic service of the internet of vehicles and is responsible for helping a user to open and close the door of the vehicle, allowing the vehicle to start and the like by using a mobile phone. The digital key service of the internet of vehicles usually requires the participation of components such as an internet of vehicles cloud Control server, an intelligent terminal, and an Electronic Control Unit (ECU) of the vehicle;
most of the existing digital key services can only issue digital keys in a vehicle networking state, and are difficult to meet the functional scene of sharing vehicles, for example, vehicle owners start vehicle sharing in mobile phones, and shared user mobile phones can control vehicles in a vehicle network-free environment (such as underground parking lots) after receiving the digital keys. In addition, because the digital key is checked every time, the whole digital key is required to be transmitted to the vehicle from the intelligent terminal, the key attribute information can be continuously transmitted repeatedly, the time delay of Bluetooth transmission is caused, and the actual vehicle control experience of a user is influenced.
Disclosure of Invention
In order to solve the technical problems, the invention discloses a digital key verification method, which can enable a second terminal to receive a digital key in a network-free state by acquiring the digital key through a first terminal, and reduce the digital key verification time delay, thereby effectively expanding the available scenes of the digital key and optimizing the user experience.
In order to achieve the above object, the present invention provides a method for verifying a digital key, the method comprising:
the control server sends a first digital key to a second terminal based on the first terminal;
the second terminal decrypts the first digital key and extracts first key information, wherein the first key information comprises control information of the second terminal;
the control server sends a second digital key to the second terminal based on the first terminal;
the second terminal judges whether the second digital key meets a non-first-time use condition;
if so, the second terminal decrypts the second digital key to obtain second key information;
the second terminal verifies the second key information and judges whether the second key information is the same as the first key information or not;
if yes, the second terminal accepts control of the second digital key.
The invention also provides a method for verifying the digital key, which comprises the following steps:
acquiring a first digital key based on a first terminal;
decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal;
acquiring a second digital key based on the first terminal;
judging whether the second digital key meets a non-first-time use condition;
if yes, decrypting the second digital key to obtain second key information;
checking the second key information and judging whether the second key information is the same as the first key information or not;
if so, control of the second digital key is accepted.
Further, after determining whether the second digital key satisfies the condition of non-first use, the method further includes:
if the first terminal does not meet the first requirement, acquiring a second digital key signature, a second digital key abstract and attribute information of the second digital key based on the first terminal;
judging whether the second digital key signature and the second digital key abstract meet a first preset condition;
if so, storing the attribute information of the second digital key, and decrypting the second digital key to obtain second key information of the second digital key;
checking second key information of the second digital key, and judging whether the second key information is the same as the first key information;
if so, control of the second digital key is accepted.
Further, the determining whether the second digital key signature and the second digital key digest satisfy a first preset condition includes:
reading a first digital key certificate to obtain a digest and a signature corresponding to the first digital key certificate;
judging whether the second digital key signature and the second digital key abstract are the same as the abstract and the signature corresponding to the first digital key certificate;
and if so, judging that the second digital key signature and the second digital key abstract meet a first preset condition.
Further, before decrypting the first digital key, the method further comprises:
acquiring a first digital key signature and a first digital key abstract;
judging whether the first digital key signature and the first digital key abstract meet a third preset condition;
if yes, the first digital key is decrypted.
Further, the determining whether the second digital key satisfies a condition of non-first use includes:
acquiring a second digital key serial number, and acquiring second data attribute information corresponding to the second digital key serial number according to the second digital key serial number;
judging whether the second data attribute information meets a second preset condition or not;
and if so, determining that the second digital key meets the condition of non-first-time use.
Further, the determining whether the second data attribute information satisfies a second preset condition includes:
reading pre-stored attribute information of the digital key;
judging whether the attribute information of the second digital key is the same as the attribute information of a pre-stored digital key or not;
and if so, judging that the second data attribute information meets a second preset condition.
The invention provides a checking device of a digital key, which comprises:
the first digital key acquisition module is used for acquiring a first digital key based on a first terminal;
the first digital key decryption module is used for decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal;
the second digital key acquisition module is used for acquiring a second digital key based on the first terminal;
the first judgment module is used for judging whether the second digital key meets the non-first-time use condition;
the second digital key decryption module is used for decrypting the second digital key to obtain second key information;
the verification judging module is used for verifying the second key information and judging whether the second key information is the same as the first key information;
and the execution module is used for receiving the control of the second digital key.
The invention provides a digital key checking system, which comprises a control server, a first terminal and a second terminal,
the control server is used for sending the first digital key and the second digital key to the first terminal;
the first terminal is used for sending a first digital key and a second digital key to the second terminal;
the second terminal is used for decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of the second terminal; and for determining whether the second digital key satisfies a non-first use condition; and for decrypting the second digital key if satisfied to obtain second key information; the second key information is used for verifying the second key information and judging whether the second key information is the same as the first key information or not; and for accepting control of the second digital key if so.
The invention provides a digital key checking terminal, which comprises a processor and a memory, wherein the processor is used for processing a digital key;
the processor adapted to implement one or more instructions;
the memory stores one or more instructions, and the one or more instructions are suitable for being loaded and executed by the processor to realize the digital key verification method.
The embodiment of the invention has the following beneficial effects:
according to the digital key verification method disclosed by the invention, the digital key is obtained through the first terminal, so that the second terminal can receive the digital key in a network-free state, and the digital key verification time delay is reduced, thereby effectively expanding the available scene of the digital key and optimizing the user experience.
Drawings
In order to more clearly illustrate the method, device, system and terminal for verifying a digital key according to the present invention, the drawings required for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for verifying a digital key according to an embodiment of the present invention;
FIG. 2 is a schematic flowchart of a method for verifying a preferred digital key according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a second method for determining a digital key according to an embodiment of the present invention;
FIG. 4 is a schematic flow chart illustrating another preferred method for verifying a digital key according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a second method for determining a digest and a signature of a digital key according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a verification apparatus for a digital key according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a verification terminal of a digital key according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The invention can be applied to the control of the digital key to the vehicle; especially, the digital key is used for controlling the vehicle in a netless state of the vehicle.
Referring to fig. 1, which is a flow chart illustrating a method for verifying a digital key according to an embodiment of the present invention, the present specification provides the method operation steps as described in the embodiment or the flow chart, but may include more or less operation steps based on conventional or non-inventive labor. The sequence of steps recited in the embodiments is only one of the execution sequences of the steps, and does not represent the only execution sequence, and when the vehicle is in a netless state in practice, the steps can be executed according to the method sequence shown in the embodiments or the figures. Specifically, as shown in fig. 1, the method includes:
s101, a control server sends a first digital key to a second terminal based on a first terminal;
in the embodiment of the present specification, the control Server may be a Cloud control Server of an internet of vehicles, which may be referred to as Cloud-Server in the present application;
the first terminal can be an intelligent mobile terminal such as a smart phone; hereinafter, this application may be referred to as Mobile;
the second terminal may be a vehicle terminal;
specifically, the second terminal may be an ECU (Electronic Control Unit) at the vehicle end, which is responsible for receiving the first digital key, and may be referred to as a Download-ECU in the following of the application;
the second terminal may be an ECU (electronic control unit) which is responsible for receiving and controlling the vehicle terminal by the vehicle terminal, and may be referred to as Target-ECU in the present application;
the first digital key may be an encrypted digital key, which may be referred to hereinafter as DK-D;
in the embodiment of the present specification, the Download-ECU, which may be a vehicle side, acquires the first digital key DK-D transmitted from the Cloud-Server through the Mobile.
S103, the second terminal decrypts the first digital key and extracts first key information, wherein the first key information comprises control information of the second terminal;
in the embodiment of the specification, the second terminal, which may be a Download-ECU at the vehicle end, decrypts the first digital key, DK-D; so as to obtain the decrypted first digital key DK-DP and extract key information (which can be recorded as DK-DP-KeyInfo in the following of the application) required by the vehicle control end from the DK-DP; and the downlink-ECU at the vehicle end transmits the DK-DP-KeyInfo to the Target-ECU at the vehicle end and stores the DK-DP-KeyInfo.
S105, the control server sends a second digital key to the second terminal based on the first terminal;
in the embodiment of the present specification, the second digital key may be an encrypted digital key, which may be referred to as DK-N in the following of the present application;
the second terminal can be an ECU (electronic control unit) which is used for receiving the second digital key at the vehicle end, and the second terminal can be called as a NearField-ECU in the application;
specifically, in the embodiment of the present specification, the NearField-ECU on the vehicle side acquires the second digital key DK-N transmitted from the Cloud-Server through the Mobile.
S107, the second terminal judges whether the second digital key meets the non-first-time use condition;
in the embodiment of the specification, a NearField-ECU at the vehicle end acquires a second digital key serial number; judging whether attribute information of a second digital key corresponding to the second digital key serial number exists at the vehicle end;
and if so, judging that the second digital key DK-N meets the condition of non-first use.
In a preferred embodiment of the present description, if not present, the second digital key does not satisfy the non-first-use condition;
specifically, the second digital key may be DK-N, and at this time, the NearField-ECU at the vehicle end acquires the digest and the signature of the second digital key, and determines whether the digest and the signature of the second digital key are the same as the digest and the signature corresponding to the first digital key certificate; if yes, the NearField-ECU at the vehicle end decrypts the second digital key DK-N to obtain the decrypted second digital key DK-NP, extracts attribute information (which can be recorded as DK-NP-Attrinfo hereinafter) of the digital key from the DK-NP to check, stores the attribute information into the NearField-ECU at the vehicle end for key management after the attribute information passes the check, extracts key information (which can be recorded as DK-NP-KeyInfo hereinafter) required by controlling the vehicle from the DK-NP, and transmits the DK-NP-KeyInfo to the Target-ECU at the vehicle end to request the check.
S109, if yes, the second terminal decrypts the second digital key to obtain second key information;
in the embodiment of the specification, the second digital key may be DK-Lite-N, in this case, the NearField-ECU at the vehicle end collates the attribute information of the DK-Lite-N with the attribute information prestored in the NearField-ECU, and if the collated result is consistent, the NearField-ECU is used to decrypt the DK-Lite-N, so as to directly obtain the key information DK-NP-KeyInfo required for controlling the vehicle, and the NearField-ECU transmits the DK-NP-KeyInfo to the Target-ECU at the vehicle end to request the verification.
S111, the second terminal verifies the second key information and judges whether the second key information is the same as the first key information or not;
in the examples of the present specification, DK-NP-Attrinfo and DK-DP-KeyInfo were used for the calibration; judging whether the DK-NP-Attrinfo and the DK-DP-KeyInfo are the same or not;
and S113, if yes, the second terminal receives the control of the second digital key.
In the embodiment of the specification, the second terminal can be a vehicle terminal which allows the control of the second digital key DK-N; in particular, the vehicle door may be controlled as well as the ignition of the vehicle.
Referring to fig. 2, which is a schematic flow chart illustrating a method for verifying a preferred digital key according to an embodiment of the present invention, the present specification provides the method operation steps as described in the embodiment or the flow chart, but may include more or less operation steps based on conventional or non-inventive labor. The sequence of steps recited in the embodiments is only one of the execution sequences of the steps, and does not represent the only execution sequence, and when the vehicle is in a netless state in practice, the steps can be executed according to the method sequence shown in the embodiments or the figures. Specifically, as shown in fig. 2, the method includes:
s201, acquiring a first digital key based on a first terminal;
it should be noted that, in the embodiment of the present specification, the first terminal may be a smart phone Mobile;
the first digital key may be DK-D;
s203, decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal;
in an embodiment of the present specification, before decrypting the first digital key, the method further includes:
a1, acquiring a first digital key signature and a first digital key abstract;
a2, judging whether the first digital key signature and the first digital key abstract meet a third preset condition;
in an embodiment of the present specification, the third preset condition may be that the first digital key signature and the first digital key digest are the same as a digest and a signature corresponding to a preset digital key certificate;
specifically, the preset digital key certificate may be a digital key certificate corresponding to a digital key capable of controlling the second terminal.
A3, if yes, decrypting the first digital key.
S205, acquiring a second digital key based on the first terminal;
s207, judging whether the second digital key meets a non-first-use condition;
as shown in fig. 3, in the embodiment of the present disclosure, fig. 3 is a schematic flowchart of a second method for determining a digital key according to an embodiment of the present disclosure; specifically, the following is:
s301, acquiring a second digital key serial number, and acquiring second data attribute information corresponding to the second digital key serial number according to the second digital key serial number;
s303, judging whether the second data attribute information meets a second preset condition;
in the embodiment of the present specification, the second preset condition may be that the attribute information of the second digital key is the same as the pre-stored attribute information of the digital key; judging whether the attribute information of the second digital key is the same as the attribute information of the pre-stored digital key; the pre-stored attribute information of the digital key may be attribute information of the second digital key that is stored when the second digital key is first verified and that passes the first verification.
In an embodiment of this specification, the determining whether the second data attribute information satisfies a second preset condition includes:
s1, reading the pre-stored attribute information of the digital key;
in the embodiment of the specification, the second terminal (which may be a vehicle terminal) obtains attribute information of the first-verified digital key sent by the control Server (which may be a Cloud-Server) in advance through the first terminal (which may be a Mobile);
s2, judging whether the attribute information of the second digital key is the same as the attribute information of a pre-stored digital key;
specifically, prestored digital key attribute information existing in a second terminal, namely a NearField-ECU of a vehicle end is read, and whether the attribute information of the second digital key is the same as the prestored digital key attribute information is judged.
S3, if yes, judging that the second data attribute information meets a second preset condition;
and S305, if yes, judging that the second digital key meets the condition of non-first use.
S209, if yes, decrypting the second digital key to obtain second key information;
specifically, the second digital key can be decrypted by using a NearField-ECU at the vehicle end;
s211, verifying the second key information and judging whether the second key information is the same as the first key information;
and S213, if yes, receiving the control of the second digital key.
As can be seen from the embodiments of the method, the device, the system and the terminal for verifying a digital key provided by the present invention, the embodiment of the present invention obtains a first digital key based on a first terminal; decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal; acquiring a second digital key based on the first terminal; judging whether the second digital key meets a non-first-time use condition; if yes, decrypting the second digital key to obtain second key information; checking the second key information and judging whether the second key information is the same as the first key information or not; if yes, the control of the second digital key is accepted; by utilizing the technical scheme provided by the embodiment of the specification, the digital key is acquired through the first terminal, so that the second terminal can receive the digital key in a network-free state, and the time delay of digital key verification is reduced, thereby effectively expanding the available scene of the digital key and optimizing the user experience.
As shown in fig. 4, in another preferred embodiment of the present disclosure, fig. 4 is a schematic flow chart illustrating another preferred digital key verification method provided in an embodiment of the present invention; specifically, the following is:
s401, acquiring a first digital key based on a first terminal;
s403, decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal;
s405, acquiring a second digital key based on the first terminal;
s407, judging whether the second digital key meets a non-primary use condition;
s409, if the first terminal does not meet the requirement, acquiring a second digital key signature, a second digital key abstract and attribute information of the second digital key based on the first terminal;
in the embodiment of the specification, the second terminal (which may be a vehicle side) obtains the second digital key signature, the second digital key digest and the attribute information of the second digital key sent by the control Server (which may be a Cloud-Server) through the first terminal (which may be a Mobile);
s411, judging whether the second digital key signature and the second digital key abstract meet a first preset condition;
the first preset condition may be that the second digital key signature and the second digital key digest are the same as the digest and signature corresponding to the first digital key certificate;
specifically, as shown in fig. 5, in the embodiment of the present specification, fig. 5 is a schematic flow chart of a second digital key digest and signature determination method provided in the embodiment of the present invention; specifically, the following is:
501, reading a first digital key certificate to obtain a digest and a signature corresponding to the first digital key certificate;
in the embodiment of the present specification, the second terminal reads the first digital key certificate in the second terminal (which may be a NearField-ECU of the second terminal);
503, determining whether the second digital key signature and the second digital key digest are the same as the digest and the signature corresponding to the first digital key certificate;
and 505, if yes, determining that the second digital key signature and the second digital key abstract meet a first preset condition.
S413, if yes, saving the attribute information of the second digital key, and decrypting the second digital key to obtain second key information of the second digital key;
the attribute information of the second digital key is the digital key attribute information prestored at the vehicle side.
S415, verifying second key information of the second digital key, and determining whether the second key information is the same as the first key information;
and S417, if yes, receiving the control of the second digital key.
In a preferred embodiment of the present specification, in a vehicle wireless environment, a Download-ECU that transmits a digital key to a vehicle side is taken as an example: selecting an AES algorithm to encrypt key information (KeyInfo) of the digital key, selecting an ECC algorithm to encrypt a random key (SecretKey), selecting an SHA256 algorithm to calculate a digital key abstract, and selecting an ECDSA algorithm to generate a digital key signature; specifically, the following is:
a control Server (which can be Cloud-Server) randomly generates a random key (which can be secret key) for encrypting the key information of the digital key;
the Cloud-Server encrypts the SecretKey through the Download-ECU public key to obtain an Encrypted SecretKey;
the Cloud-Server encrypts key information (KeyInfo) of the digital key through the SecretKey to obtain Encrypted Keylnfo;
the Cloud-Server generates a digital key Digest (Digest) by using an SHA256 algorithm according to the serial number ID, Attrinfo, Encrypted KeyInfo and Encrypted SecretKey of the first digital key;
the Cloud-Server generates a digital key Signature (Signature) by adopting an ECDSA algorithm according to a private key corresponding to the digital key certificate and the digital key abstract;
the Cloud-Server transmits the digital key { ID, AtttrInfo, Encrypted KeyInfo, Encrypted SecretKey, Digest, Signature } to the first terminal (Mobile); the Mobile sends the digital key to a NearField-ECU of the vehicle end, and then the digital key is forwarded to a Download-ECU of the vehicle end through the NearField-ECU;
the Download-ECU adopts a digital key certificate to verify the abstract and the signature of the received digital key; if the abstract and the signature of the digital key pass verification, decrypting the Encrypted SecretKey by using a private key of a Download-ECU to obtain the SecretKey;
the Download-ECU decrypts Encrypted KeyInfo by using SecretKey to obtain KeyInfo;
and the Download-ECU transmits the obtained KeyInfo to a Target-ECU at the vehicle end for storage.
In another preferred embodiment of the present specification, in the present application, regarding the processing method for performing the first verification of the digital key in the vehicle wireless environment, the difference from the above-mentioned downlink-ECU transmitting the digital key to the vehicle side is that,
when the first verification is carried out, the secret key of the NearField-ECU is encrypted through the public key, the secret key of the NearField-ECU is decrypted through the private key of the NearField-ECU, the NearField-ECU is used for receiving and verifying the digital key, and meanwhile, the attribute information Attrinfo of the digital key is stored, so that the subsequent verification of the digital key is facilitated.
In another preferred embodiment of the present specification, in the present application, in a vehicle wireless environment, regarding a processing method for verifying the digital key for the second time or more, the digital key at this time may be defined as a lightweight digital key; the method comprises the following specific steps:
the Cloud-Server randomly generates a random key SecretKey of the key information of the digital key.
The Cloud-Server uses the NearField-ECU public key to encrypt the secretKey to obtain an Encrypted secretKey;
the Cloud-Server encrypts digital key information KeyInfo by using the SecretKey to obtain Encrypted KeyInfo;
the Cloud-Server issues the lightweight digital key { ID, Encrypted KeyInfo, Encrypted SecretKey } to Mobile.
Mobile forwards the lightweight digital key to the NearField-ECU.
The NearField-ECU confirms and checks the Attrinfo corresponding to the digital key ID, and decrypts Encrypted SecretKey by using the private key of the NearField-ECU to obtain the SecretKey:
the NearField-ECU decrypts Encrypted KeyInfo using secretekey to get KeyInfo:
the Download-ECU transmits KeyInfo to the Target-ECU check.
The Target-ECU compares whether KeyInfo is consistent with KeyInfo stored in advance, and if the KeyInfo is consistent with the KeyInfo, the vehicle is allowed to be controlled.
The embodiment of the present invention further provides a verification apparatus for a digital key, as shown in fig. 6, which is a schematic structural diagram of the verification apparatus for a digital key provided in the embodiment of the present invention; specifically, the device comprises:
a first digital key acquisition module 610, configured to acquire a first digital key based on a first terminal;
a first digital key decryption module 620, configured to decrypt the first digital key and extract first key information of the first digital key, where the first key information includes control information of a second terminal;
a second digital key acquisition module 630, configured to acquire a second digital key based on the first terminal;
a first determining module 640, configured to determine whether the second digital key meets a non-first-use condition;
a second digital key decryption module 650 for decrypting the second digital key to obtain second key information;
a verification judging module 660, configured to verify the second key information and judge whether the second key information is the same as the first key information;
and an execution module 670 for accepting control of the second digital key.
In the embodiment of this specification, still include:
the first acquisition module is used for acquiring a second digital key signature, a second digital key abstract and attribute information of a second digital key based on a first terminal;
the second judgment module is used for judging whether the second digital key signature and the second digital key abstract meet a first preset condition or not;
the first control module is used for storing the attribute information of the second digital key and decrypting the second digital key to obtain second key information of the second digital key;
the third judgment module is used for verifying second key information of the second digital key and judging whether the second key information is the same as the first key information;
and the second execution module is used for receiving the control of the second digital key.
In an embodiment of the present specification, the second determination module includes:
the first reading unit is used for reading a first digital key certificate so as to obtain a digest and a signature corresponding to the first digital key certificate;
the first judgment unit is used for judging whether the second digital key signature and the second digital key abstract are the same as the abstract and the signature corresponding to the first digital key certificate;
and the first judgment unit is used for judging that the second digital key signature and the second digital key abstract meet a first preset condition.
In the embodiment of this specification, still include:
and the second decryption module is used for decrypting the first digital key to obtain the first digital key signature.
In this embodiment, the first determining module 640 includes:
the first acquisition unit is used for acquiring a second digital key number and second data attribute information corresponding to the second digital key number;
a second judging unit, configured to judge whether the second data attribute information satisfies a second preset condition;
and a second determination unit configured to determine that the second digital key satisfies a non-primary use condition.
In an embodiment of the present specification, the second determination unit includes:
the first reading subunit is used for reading prestored digital key attribute information;
the first judgment subunit is used for judging whether the attribute information of the second digital key is the same as the attribute information of a pre-stored digital key;
and the first judging subunit is used for judging that the second data attribute information meets a second preset condition.
The embodiment of the invention also provides a system for checking the digital key, which is characterized in that: the system comprises a control server, a first terminal and a second terminal,
the control server is used for sending the first digital key and the second digital key to the first terminal;
the first terminal is used for sending a first digital key and a second digital key to the second terminal;
the second terminal is used for decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of the second terminal; and for determining whether the second digital key satisfies a non-first use condition; and for decrypting the second digital key if satisfied to obtain second key information; the second key information is used for verifying the second key information and judging whether the second key information is the same as the first key information or not; and for accepting control of the second digital key if so.
The embodiment of the invention provides a digital key verification terminal, which comprises a processor and a memory;
the processor adapted to implement one or more instructions; the memory stores one or more instructions suitable for being loaded and executed by the processor to realize the digital key verification method according to the method embodiment.
The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.
Fig. 7 is a schematic structural diagram of a verification terminal of a digital key according to an embodiment of the present invention, where the internal configuration of the verification terminal of the digital key may include, but is not limited to: the processor, the network interface and the memory in the verification terminal of the digital key may be connected by a bus or in other manners, and the connection by the bus is taken as an example in fig. 7 shown in the embodiment of the present specification.
The processor (or CPU) is a computing core and a control core of the verification terminal of the digital key. The network interface may optionally include a standard wired interface, a wireless interface (e.g., WI-FI, mobile communication interface, etc.). The Memory (Memory) is a Memory device in the verification terminal of the digital key and is used for storing programs and data. It is understood that the memory herein may be a high-speed RAM storage device, or may be a non-volatile storage device (non-volatile memory), such as at least one magnetic disk storage device; optionally, at least one memory device located remotely from the processor. The memory provides a storage space storing an operating system of the verification terminal of the digital key, which may include but is not limited to: windows system (an operating system), Linux (an operating system), etc., which are not limited thereto; also, one or more instructions, which may be one or more computer programs (including program code), are stored in the memory space and are adapted to be loaded and executed by the processor. In this embodiment, the processor loads and executes one or more instructions stored in the memory to implement the method for verifying the digital key provided in the above method embodiment.
Embodiments of the present invention also provide a storage medium, which may be disposed in a verification terminal of a digital key to store at least one instruction, at least one program, a code set, or an instruction set related to implementing a verification method of the digital key in the method embodiments, where the at least one instruction, the at least one program, the code set, or the instruction set may be loaded and executed by a processor of an electronic device to implement the verification method of the digital key provided in the method embodiments.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
As can be seen from the embodiments of the method, the device, the system and the terminal for verifying a digital key provided by the present invention, the embodiment of the present invention obtains a first digital key based on a first terminal; decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal; decrypting the first digital key to obtain a first digital key signature; acquiring a second digital key based on the first terminal; judging whether the second digital key meets a non-first-time use condition; specifically, a second digital key number and second data attribute information corresponding to the second digital key number are obtained; judging whether the second data attribute information meets a second preset condition or not; specifically, reading pre-stored attribute information of the digital key; judging whether the attribute information of the second digital key is the same as the attribute information of a pre-stored digital key or not; and if so, judging that the second data attribute information meets a second preset condition. And if so, determining that the second digital key meets the condition of non-first-time use. If yes, decrypting the second digital key to obtain second key information; checking the second key information and judging whether the second key information is the same as the first key information or not; if so, control of the second digital key is accepted.
If the first terminal does not meet the first requirement, acquiring a second digital key signature, a second digital key abstract and attribute information of the second digital key based on the first terminal; judging whether the second digital key signature and the second digital key abstract meet a first preset condition; specifically, a first digital key certificate is read to obtain a digest and a signature corresponding to the first digital key certificate; judging whether the second digital key signature and the second digital key abstract are the same as the abstract and the signature corresponding to the first digital key certificate; and if so, judging that the second digital key signature and the second digital key abstract meet a first preset condition. If so, storing the attribute information of the second digital key, and decrypting the second digital key to obtain second key information of the second digital key; checking second key information of the second digital key, and judging whether the second key information is the same as the first key information; if yes, the control of the second digital key is accepted; by utilizing the technical scheme provided by the embodiment of the specification, the digital key is acquired through the first terminal, so that the second terminal can receive the digital key in a network-free state, and the time delay of digital key verification is reduced, thereby effectively expanding the available scene of the digital key and optimizing the user experience.
It should be noted that: the precedence order of the above embodiments of the present invention is only for description, and does not represent the merits of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Especially, as for the device and terminal embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for the relevant points, refer to the partial description of the method embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. A method for verifying a digital key, comprising: the method comprises the following steps:
the control server sends a first digital key to a second terminal based on the first terminal;
the second terminal decrypts the first digital key and extracts first key information, wherein the first key information comprises control information of the second terminal;
the control server sends a second digital key to the second terminal based on the first terminal;
the second terminal judges whether the second digital key meets a non-first-time use condition;
if so, the second terminal decrypts the second digital key to obtain second key information;
the second terminal verifies the second key information and judges whether the second key information is the same as the first key information or not;
if yes, the second terminal accepts control of the second digital key.
2. A method for verifying a digital key, comprising: the method comprises the following steps:
acquiring a first digital key based on a first terminal;
decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal;
acquiring a second digital key based on the first terminal;
judging whether the second digital key meets a non-first-time use condition;
if yes, decrypting the second digital key to obtain second key information;
checking the second key information and judging whether the second key information is the same as the first key information or not;
if so, control of the second digital key is accepted.
3. The method for verifying a digital key according to claim 2, wherein: after the determining whether the second digital key satisfies the condition of non-first use, the method further includes:
if the first terminal does not meet the first requirement, acquiring a second digital key signature, a second digital key abstract and attribute information of the second digital key based on the first terminal;
judging whether the second digital key signature and the second digital key abstract meet a first preset condition;
if so, storing the attribute information of the second digital key, and decrypting the second digital key to obtain second key information of the second digital key;
checking second key information of the second digital key, and judging whether the second key information is the same as the first key information;
if so, control of the second digital key is accepted.
4. The method for verifying a digital key according to claim 3, wherein: the determining whether the second digital key signature and the second digital key digest satisfy a first preset condition includes:
reading a first digital key certificate to obtain a digest and a signature corresponding to the first digital key certificate;
judging whether the second digital key signature and the second digital key abstract are the same as the abstract and the signature corresponding to the first digital key certificate;
and if so, judging that the second digital key signature and the second digital key abstract meet a first preset condition.
5. The method for verifying a digital key according to claim 2, wherein: before decrypting the first digital key, the method further comprises:
acquiring a first digital key signature and a first digital key abstract;
judging whether the first digital key signature and the first digital key abstract meet a third preset condition;
if yes, the first digital key is decrypted.
6. The method for verifying a digital key according to claim 2, wherein: the judging whether the second digital key meets the condition of non-first use includes:
acquiring a second digital key serial number, and acquiring second data attribute information corresponding to the second digital key serial number according to the second digital key serial number;
judging whether the second data attribute information meets a second preset condition or not;
and if so, determining that the second digital key meets the condition of non-first-time use.
7. The method for verifying a digital key according to claim 6, wherein: the judging whether the second data attribute information meets a second preset condition includes:
reading pre-stored attribute information of the digital key;
judging whether the attribute information of the second digital key is the same as the attribute information of a pre-stored digital key or not;
and if so, judging that the second data attribute information meets a second preset condition.
8. A digital key verification device is characterized in that: the device comprises:
the first digital key acquisition module is used for acquiring a first digital key based on a first terminal;
the first digital key decryption module is used for decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of a second terminal;
the second digital key acquisition module is used for acquiring a second digital key based on the first terminal;
the first judgment module is used for judging whether the second digital key meets the non-first-time use condition;
the second digital key decryption module is used for decrypting the second digital key to obtain second key information;
the verification judging module is used for verifying the second key information and judging whether the second key information is the same as the first key information;
and the execution module is used for receiving the control of the second digital key.
9. A system for verifying a digital key, comprising: the system comprises a control server, a first terminal and a second terminal,
the control server is used for sending the first digital key and the second digital key to the first terminal;
the first terminal is used for sending a first digital key and a second digital key to the second terminal;
the second terminal is used for decrypting the first digital key and extracting first key information of the first digital key, wherein the first key information comprises control information of the second terminal; and for determining whether the second digital key satisfies a non-first use condition; and for decrypting the second digital key if satisfied to obtain second key information; the second key information is used for verifying the second key information and judging whether the second key information is the same as the first key information or not; and for accepting control of the second digital key if so.
10. A check terminal of a digital key, characterized in that: the terminal comprises a processor and a memory;
the processor adapted to implement one or more instructions;
the memory storing one or more instructions adapted to be loaded and executed by the processor to implement the method of verifying a digital key according to any one of claims 2 to 7.
CN201910419145.8A 2019-05-20 2019-05-20 Digital key verification method, device, system and terminal Active CN111970115B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910419145.8A CN111970115B (en) 2019-05-20 2019-05-20 Digital key verification method, device, system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910419145.8A CN111970115B (en) 2019-05-20 2019-05-20 Digital key verification method, device, system and terminal

Publications (2)

Publication Number Publication Date
CN111970115A true CN111970115A (en) 2020-11-20
CN111970115B CN111970115B (en) 2024-02-02

Family

ID=73358154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910419145.8A Active CN111970115B (en) 2019-05-20 2019-05-20 Digital key verification method, device, system and terminal

Country Status (1)

Country Link
CN (1) CN111970115B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003343133A (en) * 2002-03-20 2003-12-03 Matsushita Electric Ind Co Ltd System and device for digital key
JP2012172325A (en) * 2011-02-18 2012-09-10 Kddi Corp Smart key system of vehicle, vehicle operation method by smart key, and program
CN106301781A (en) * 2016-07-27 2017-01-04 山东尼格电子技术有限公司 A kind of Digital Automobile cloud key share system
CN106408702A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Authorization method of virtual keys, server and authorization system
CN106553617A (en) * 2015-09-25 2017-04-05 上海汽车集团股份有限公司 Control method for vehicle, sharing method and device
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
CN109515384A (en) * 2018-11-15 2019-03-26 浙江吉利汽车研究院有限公司 Vehicle shared system and method based on digital key
CN112440935A (en) * 2019-09-04 2021-03-05 宁波吉利汽车研究开发有限公司 Vehicle Bluetooth key authorization method, device, system and storage medium
CN115396893A (en) * 2022-08-26 2022-11-25 江苏先安科技有限公司 Digital key issuing and verifying method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003343133A (en) * 2002-03-20 2003-12-03 Matsushita Electric Ind Co Ltd System and device for digital key
JP2012172325A (en) * 2011-02-18 2012-09-10 Kddi Corp Smart key system of vehicle, vehicle operation method by smart key, and program
CN106553617A (en) * 2015-09-25 2017-04-05 上海汽车集团股份有限公司 Control method for vehicle, sharing method and device
CN106301781A (en) * 2016-07-27 2017-01-04 山东尼格电子技术有限公司 A kind of Digital Automobile cloud key share system
CN106408702A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Authorization method of virtual keys, server and authorization system
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
CN109515384A (en) * 2018-11-15 2019-03-26 浙江吉利汽车研究院有限公司 Vehicle shared system and method based on digital key
CN112440935A (en) * 2019-09-04 2021-03-05 宁波吉利汽车研究开发有限公司 Vehicle Bluetooth key authorization method, device, system and storage medium
CN115396893A (en) * 2022-08-26 2022-11-25 江苏先安科技有限公司 Digital key issuing and verifying method and system

Also Published As

Publication number Publication date
CN111970115B (en) 2024-02-02

Similar Documents

Publication Publication Date Title
EP3723399A1 (en) Identity verification method and apparatus
US10708062B2 (en) In-vehicle information communication system and authentication method
US9515829B2 (en) Information distribution method, information distribution system and in-vehicle terminal
CN109471865B (en) Offline data management method, system, server and storage medium
EP3648396B1 (en) Maintenance system and maintenance method
CN108762791B (en) Firmware upgrading method and device
CN110719173B (en) Information processing method and device
CN111107073B (en) Application automatic login method and device, computer equipment and storage medium
CN112559993B (en) Identity authentication method, device and system and electronic equipment
CN109145628B (en) Data acquisition method and system based on trusted execution environment
CN107733652B (en) Unlocking method and system for shared vehicle and vehicle lock
CN111586671B (en) Embedded user identification card configuration method and device, communication equipment and storage medium
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN106131021B (en) Request authentication method and system
CN110690956A (en) Bidirectional authentication method and system, server and terminal
CN113329041A (en) Method, apparatus, electronic device and storage medium for controlling a secure element
EP2829996A1 (en) Authentication method, authentication apparatus and authentication device
CN111405016A (en) User information acquisition method and related equipment
CN107818255B (en) Method for enhancing system security based on fingerprint identification encryption
KR102389727B1 (en) Method and apparatus for evaluating security of electronic controller in vehicle
CN111444496A (en) Application control method, device, equipment and storage medium
CN115527292B (en) Mobile phone terminal remote vehicle unlocking method of security chip and security chip device
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN105100030B (en) Access control method, system and device
CN111970115B (en) Digital key verification method, device, system and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant