CN112837448A - Vehicle sharing system of multifunctional Bluetooth key - Google Patents

Vehicle sharing system of multifunctional Bluetooth key Download PDF

Info

Publication number
CN112837448A
CN112837448A CN202011638981.4A CN202011638981A CN112837448A CN 112837448 A CN112837448 A CN 112837448A CN 202011638981 A CN202011638981 A CN 202011638981A CN 112837448 A CN112837448 A CN 112837448A
Authority
CN
China
Prior art keywords
vehicle
client
virtual key
mounted module
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011638981.4A
Other languages
Chinese (zh)
Inventor
张杨
朱志凌
万海涛
向劲松
陈亚川
殷凡
李迎春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Sihai Wanlian Intelligent Electronic Equipment Co ltd
Original Assignee
Chengdu Sihai Wanlian Intelligent Electronic Equipment Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Sihai Wanlian Intelligent Electronic Equipment Co ltd filed Critical Chengdu Sihai Wanlian Intelligent Electronic Equipment Co ltd
Priority to CN202011638981.4A priority Critical patent/CN112837448A/en
Publication of CN112837448A publication Critical patent/CN112837448A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

According to the vehicle sharing system of the multifunctional Bluetooth key, the vehicle-mounted module is used for obtaining an authentication challenge problem according to the current time and the generated random number combination after the validity and the safety of the virtual key are verified, and sending the authentication challenge problem to the vehicle owner client; the vehicle owner client is used for receiving an authentication challenge reply aiming at the authentication challenge problem and input by a vehicle owner, and sending the authentication challenge reply to the vehicle-mounted module; the vehicle-mounted module is also used for monitoring whether correct authentication challenge responses are received within the preset challenge time, and if not, the Bluetooth connection with the vehicle owner client is disconnected. The vehicle sharing system provides more diversified key management functions.

Description

Vehicle sharing system of multifunctional Bluetooth key
Technical Field
The invention belongs to the technical field of Internet of things, and particularly relates to a vehicle sharing system of a multifunctional Bluetooth key.
Background
With the development of science and technology, automobiles have begun to walk into ordinary families as important travel vehicles for people. However, the problems of air pollution caused by automobile exhaust and road congestion caused by too many automobiles are more and more prominent, and therefore, in order to alleviate the problems, shared automobiles are gradually seen in the field of vision of people.
In order to overcome the defects that the existing shared automobile still stays in a short time and the departure place and the destination are determined, the applicant provides a vehicle sharing system (application number 2019101291257) based on a Bluetooth key, the Bluetooth technology is utilized to realize the control between a borrower and a vehicle, and thus, the vehicle-mounted module does not need to participate in the sharing process of the vehicle, and the vehicle sharing function can be realized even in a garage with a poor network. Meanwhile, in the process of borrowing the automobile, the automobile owner does not need to give the automobile key to the automobile borrower, and the automobile borrower can use the automobile key. According to the system, a vehicle owner sends a sharing request through the TSP service platform, a borrower receives the sharing request through the TSP service platform, private vehicle sharing service is provided for the vehicle owner, and after the current vehicle sharing is completed, the borrower can drive the vehicle through a vehicle borrowing client side without the participation of the TSP service platform, so that the system is convenient to use. The system can drive the vehicle only after the authorization of the vehicle borrowing client, thereby improving the use safety of private cars. But the key management function of the system is single.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a vehicle sharing system of a multifunctional Bluetooth key, and provides more diversified key management functions.
A vehicle sharing system of a multifunctional Bluetooth key comprises a vehicle owner client, a service platform, a vehicle borrowing client and a vehicle-mounted module; the vehicle-mounted module is used for receiving a virtual key from the owner client after the Bluetooth connection with the owner client is established, and verifying the validity and the safety of the virtual key;
the vehicle-mounted module is used for obtaining an authentication challenge problem according to the current time and the generated random number combination after the validity and the safety of the virtual key are verified, and sending the authentication challenge problem to the vehicle owner client;
the vehicle owner client is used for receiving an authentication challenge reply aiming at the authentication challenge problem and input by a vehicle owner, and sending the authentication challenge reply to the vehicle-mounted module;
the vehicle-mounted module is also used for monitoring whether correct authentication challenge responses are received within the preset challenge time, and if not, the Bluetooth connection with the vehicle owner client is disconnected.
Preferably, the vehicle-mounted module is further configured to, when receiving a request from the vehicle owner client, analyze the request to obtain a timestamp, where the timestamp is a local time when the request is generated by the vehicle owner client;
the vehicle-mounted module is also used for judging whether the difference between the timestamp and the current local time of the vehicle-mounted module is greater than the preset maximum time difference, and if so, the request verification fails; if not, the request is verified successfully.
Preferably, the service platform is further configured to destroy the virtual key or the virtual key associated with the vehicle lending client when receiving a key destruction instruction including the virtual key or the vehicle lending client.
Preferably, the destroying mode of the virtual key comprises the following steps:
1) when detecting that the vehicle borrowing client is networked, the service platform generates a destruction task containing the virtual key and sends the destruction task to the vehicle borrowing client; when the car borrowing client receives the destruction task, destroying the virtual key in the locally stored destruction task;
2) when the service platform detects that the vehicle borrowing client is disconnected and the vehicle-mounted module is connected to the network, the service platform sends a blacklist containing the vehicle borrowing client to the vehicle-mounted module; the vehicle-mounted module receives and stores the blacklist, and refuses the request when receiving the request initiated by the vehicle borrowing client in the blacklist;
3) when the service platform detects that the vehicle-mounted module and the vehicle borrowing client are disconnected, a virtual key destruction task is newly established, and connection with the vehicle-mounted module or the vehicle borrowing client is waited; when connecting with the borrowing client, executing the step 1); when the on-board module is connected, step 2) is executed.
Preferably, the service platform is further configured to remove the virtual key or the virtual key associated with the vehicle borrowing client from a blacklist locally stored in the vehicle module when a blacklist removal instruction including the virtual key or the vehicle borrowing client is received.
Preferably, the service platform is specifically configured to generate a removal task including a virtual key or a vehicle borrowing client when receiving a blacklist removal instruction including the virtual key or the vehicle borrowing client, and send the removal task to the vehicle-mounted module;
the vehicle-mounted module is specifically used for removing the virtual key or the virtual key associated with the vehicle borrowing client from a locally stored blacklist when the removal task is received.
Preferably, the service platform is specifically configured to generate the removal task when the destruction task is successfully sent to the vehicle borrowing client, or when it is detected that the owner user side shares the virtual key with the vehicle borrowing client again.
Preferably, the owner client and the borrowing client can log in on different types of equipment at the same time, and only one equipment can log in on the same type of equipment.
Preferably, the verification of the validity and security of the virtual key comprises two modes: full mode and top speed mode;
the vehicle-mounted module is also used for receiving a user name, a certificate file, a virtual key and a platform signature of a vehicle owner from a client of the vehicle owner when the vehicle-mounted module is in a complete mode, calculating MD5 values of the certificate file and the virtual key after the validity and safety of the virtual key are verified, and storing the obtained MD5 value;
the vehicle-mounted module is also used for receiving the certificate file of the vehicle owner from the client of the vehicle owner and the MD5 value of the virtual key when the vehicle-mounted module is in the top speed mode, verifying whether the MD5 value is stored locally, and finishing the verification of the validity and the safety of the virtual key if the MD5 value is stored locally; if not, switching to the complete mode.
Preferably, the vehicle-mounted module is further configured to set the verification mode to be a complete mode when the vehicle owner client verifies the validity and security of the virtual key for the first time, and set the verification mode to be an extremely fast mode when the vehicle owner client verifies the validity and security of the virtual key for the non-first time.
According to the technical scheme, the vehicle sharing system of the multifunctional Bluetooth key provided by the invention provides more diversified key management functions.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a block diagram of a vehicle sharing system according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby. It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The first embodiment is as follows:
a vehicle sharing system of a multifunctional Bluetooth key is disclosed, and referring to fig. 1, the vehicle sharing system comprises a vehicle owner client, a service platform, a vehicle borrowing client and a vehicle-mounted module; the vehicle-mounted module is used for receiving a virtual key from the owner client after the Bluetooth connection with the owner client is established, and verifying the validity and the safety of the virtual key;
specifically, the vehicle-mounted module comprises a Bluetooth module which is arranged in a vehicle independently, or a hardware module which is combined with a T-Box module in the vehicle. The service platform may comprise a platform in combination with the TSP platform, or may be a separate platform. See patent application No. 2019101291257 for a method of verification of virtual key legitimacy and security. Other interactions between the owner's client, the service platform, the borrowing client, and the on-board module are described in application number 2019101291257.
The vehicle-mounted module is used for obtaining an authentication challenge problem according to the current time and the generated random number combination after the validity and the safety of the virtual key are verified, and sending the authentication challenge problem to the vehicle owner client;
the vehicle owner client is used for receiving an authentication challenge reply aiming at the authentication challenge problem and input by a vehicle owner, and sending the authentication challenge reply to the vehicle-mounted module;
the vehicle-mounted module is also used for monitoring whether correct authentication challenge responses are received within the preset challenge time, and if not, the Bluetooth connection with the vehicle owner client is disconnected.
In particular, since replay attacks are a common attack mode faced by bluetooth keys. The vehicle sharing system provides an authentication challenge procedure to prevent replay attacks. After the vehicle-mounted module verifies the validity of the virtual key from the vehicle owner client, an authentication challenge problem is constructed according to the current time and the random number combination, the vehicle owner client calculates the authentication challenge reply within 2 seconds and replies to the vehicle-mounted module, the vehicle-mounted module continues to receive subsequent messages of the vehicle owner client after the verification is passed, and otherwise, the connection between the vehicle-mounted module and the vehicle owner client is disconnected. In specific use, different authentication challenge problems can be generated after each Bluetooth connection, so that the authentication challenge reply before the hacker replays cannot pass the verification of the vehicle-mounted module.
The vehicle sharing system verifies the effectiveness of the message through an authentication challenge method, prevents replay attack, improves the stability and the safety of the system, and provides more diversified key management functions.
In order to further prevent replay attack and improve the stability and the safety of the system, the system is additionally provided with a timestamp verification method on the basis of an authentication challenge method, and the function of double verification is realized.
The vehicle-mounted module is also used for analyzing the request to obtain a timestamp when receiving the request from the vehicle owner client, wherein the timestamp is the local time when the request is generated by the vehicle owner client;
the vehicle-mounted module is also used for judging whether the difference between the timestamp and the current local time of the vehicle-mounted module is greater than the preset maximum time difference, and if so, the request verification fails; if not, the request is verified successfully.
Specifically, all requests sent by the owner client to the vehicle-mounted module carry time stamps when being generated, if the difference between the time stamp in the request and the local time of the vehicle-mounted module is greater than 10 seconds, it is indicated that the time for generating the request is too long, and the request may be a failed request, and at this time, the request cannot pass the verification of the vehicle-mounted module, so that a hacker can reject the vehicle control message initiated by the owner client before replaying.
In addition, if the mobile device is only used as a key, the vehicle can be unlocked and started by approaching the vehicle, and the vehicle can be immediately threatened by theft if the device is lost. Therefore, the system also supports the PIN code vehicle control function in order to improve the safety of the vehicle. I.e., the password for operation in the patent application No. 2019101291257 is set to a PIN code. The system allows a user to create a custom PIN code and store the custom PIN code in a Bluetooth key when binding a vehicle, accepting a shared vehicle and initiating a vehicle borrowing request. Therefore, when a user unlocks the vehicle door and starts the vehicle, the correct PIN code must be input, the vehicle-mounted module completes the verification of the PIN code by comparing the Bluetooth key, and a service platform is not required to participate. If the user thinks it is cumbersome, the user can also choose to let the client remember the PIN code to simplify the operation when controlling the vehicle.
Example two:
the second embodiment is based on the first embodiment, and the functions of key recovery and equipment loss report are added.
The vehicle sharing system carries out virtual key recovery under the condition that a passenger maliciously continues to use the vehicle or the equipment is lost.
The service platform is further used for destroying the virtual key or the virtual key associated with the vehicle borrowing client when receiving a key destroying instruction containing the virtual key or the vehicle borrowing client.
Specifically, the key destruction instruction is uniformly received by the service platform, and after the service platform receives the key destruction instruction, the service platform controls the vehicle-mounted module and the vehicle borrowing client to perform related destruction operation.
Preferably, the destroying mode of the virtual key comprises the following steps:
1) when detecting that the vehicle borrowing client is networked, the service platform generates a destruction task containing the virtual key and sends the destruction task to the vehicle borrowing client; when the car borrowing client receives the destruction task, destroying the virtual key in the locally stored destruction task;
specifically, if the mobile device of the borrower is in a networking state, that is, the borrower client is networked, the service platform pushes a message to the borrower client, so that the borrower client automatically destroys the locally stored virtual key, and the virtual key is recovered.
2) When the service platform detects that the vehicle borrowing client is disconnected and the vehicle-mounted module is connected to the network, the service platform sends a blacklist containing the vehicle borrowing client to the vehicle-mounted module; the vehicle-mounted module receives and stores the blacklist, and refuses the request when receiving the request initiated by the vehicle borrowing client in the blacklist;
specifically, if the mobile device of the borrower is not networked, that is, the borrower client is disconnected, the service platform uses a special blacklist mechanism to issue a blacklist containing the borrower account to the vehicle-mounted module, and the vehicle-mounted module rejects the subsequent connection request of the virtual key.
3) When the service platform detects that the vehicle-mounted module and the vehicle borrowing client are disconnected, a virtual key destruction task is newly established, and connection with the vehicle-mounted module or the vehicle borrowing client is waited; when connecting with the borrowing client, executing the step 1); when the on-board module is connected, step 2) is executed.
Specifically, if the vehicle-mounted module is always in a non-network state, the blacklist of the service platform cannot be received, and the vehicle owner intentionally does not enable the mobile device to be networked so as to keep the key from being destroyed. For the behaviors of malicious continuous vehicle use, a protection mechanism is arranged in the service platform, a new virtual key destroying task is established, a person using the vehicle needs to be connected with the service platform once after using the key for a plurality of times or exceeding a certain time limit, and otherwise, the Bluetooth key function of the person is suspended. If the vehicle borrowing client is connected firstly, the service platform issues a destroying instruction to the vehicle borrowing client; if the vehicle-mounted module is connected firstly, the service platform issues a blacklist containing the vehicle borrowing client to the vehicle-mounted module, and the vehicle borrowing client is prevented from continuing to connect and use the vehicle until the vehicle borrowing client is connected with the service platform and the virtual key destruction process is completed.
When the vehicle sharing system is applied to equipment hang-up, after a user finds that own mobile equipment is lost, the user can log in a client on another equipment, and the lost equipment is added into a blacklist in the 'equipment management' function of the client. The service platform can issue the corresponding user name and the corresponding equipment name to the vehicle-mounted module in the form of a blacklist, so that the vehicle is prevented from being illegally controlled by a person who picks up the mobile equipment.
Preferably, the service platform is further configured to remove the virtual key or the virtual key associated with the vehicle borrowing client from a blacklist locally stored in the vehicle module when a blacklist removal instruction including the virtual key or the vehicle borrowing client is received.
Preferably, the service platform is specifically configured to generate a removal task including a virtual key or a vehicle borrowing client when receiving a blacklist removal instruction including the virtual key or the vehicle borrowing client, and send the removal task to the vehicle-mounted module;
the vehicle-mounted module is specifically used for removing the virtual key or the virtual key associated with the vehicle borrowing client from a locally stored blacklist when the removal task is received.
Specifically, when the device is lost, the user finds the lost device again, or the owner shares the destroyed virtual key with the borrower again, the device or the virtual key can be removed from the blacklist, so that the device or the virtual key can be used continuously. And when the vehicle-mounted module receives the blacklist removal instruction, removing the virtual key or the virtual key associated with the vehicle borrowing client from the blacklist locally stored in the vehicle-mounted module.
Preferably, the service platform is specifically configured to generate the removal task when the destruction task is successfully sent to the vehicle borrowing client, or when it is detected that the owner user side shares the virtual key with the vehicle borrowing client again.
Specifically, after the vehicle borrowing client is disconnected from the network, the service platform issues a destruction task to the vehicle-mounted module, and if the vehicle borrowing client recovers the network and completes the destruction process of the virtual key, the service platform issues a removal task for removing the vehicle borrowing client from the blacklist to the vehicle-mounted module, so that the vehicle-mounted module can be connected again after the vehicle borrowing client acquires a new sharing key again. The system can complete key destruction at the client of the vehicle borrower, or the service platform can inform the vehicle-mounted module to remove the blacklist after the vehicle owner shares the vehicle to the vehicle borrower again.
For the sake of brief description, the embodiments of the present invention do not refer to the corresponding contents in the foregoing embodiments of the present invention.
Example three:
embodiment three on the basis of the above embodiment, the following contents are added:
the vehicle owner client and the vehicle borrowing client can log in on different types of equipment at the same time, and only one equipment can log in on the same type of equipment.
In particular, the system supports multiple, multiple mobile device controlled vehicle functions. The user can install corresponding customer end as the bluetooth key on different grade type equipment such as cell-phone, intelligent wrist-watch, bracelet, Pad, uses same user account to log in, flexibly connects and control the vehicle.
The system has the functions of equipment type detection and account login control. For the same type of equipment, only one account can be logged in, for example, a user logs in an account on a new mobile phone, and the previously logged-in mobile phone automatically logs out. For different types of devices, one account may be logged in simultaneously: for example, a user may log in to an account on a cell phone or a watch at the same time. The system can also check all the device names and types logged in by the account in the 'device management' function of the client.
Preferably, the verification of the validity and security of the virtual key comprises two modes: full mode and top speed mode;
the vehicle-mounted module is also used for receiving a user name, a certificate file, a virtual key and a platform signature of a vehicle owner from a client of the vehicle owner when the vehicle-mounted module is in a complete mode, calculating MD5 values of the certificate file and the virtual key after the validity and safety of the virtual key are verified, and storing the obtained MD5 value;
the vehicle-mounted module is also used for receiving the certificate file of the vehicle owner from the client of the vehicle owner and the MD5 value of the virtual key when the vehicle-mounted module is in the top speed mode, verifying whether the MD5 value is stored locally, and finishing the verification of the validity and the safety of the virtual key if the MD5 value is stored locally; if not, switching to the complete mode.
Specifically, because the time length of the authentication process of the bluetooth key directly determines the experience of the user, if the authentication time is too long, the user cannot unlock the vehicle door or ignite in time, and the user experience is remarkably reduced. And the authentication process time of the common key is usually longer due to the limitations of low transmission rate of a Bluetooth transmission channel, serious packet loss retransmission phenomenon under the interference condition, various authentication message parameters, further enlarged volume of the encrypted message and the like. The system provides two authentication modes for this purpose: the complete mode and the extremely fast mode greatly improve the user experience.
The complete mode is suitable for the condition that the vehicle owner client obtains the virtual key and is connected with the vehicle-mounted module for the first time. The full mode needs to send full request information to the vehicle-mounted module, including a user name, a certificate file, a virtual key, a platform signature, and the like. The authentication request data is about 4500 bytes, and is transmitted in 18 packets, which takes 6-8 seconds on average. After the vehicle-mounted module passes the verification, the MD5 values of the certificate file and the virtual key are calculated and stored locally.
The top speed mode is suitable for the condition that the user subsequently uses the Bluetooth key to connect the vehicle-mounted module. In the top speed mode, the vehicle owner client only sends the certificate file and the MD5 of the virtual key to the vehicle-mounted module, and the vehicle-mounted module queries a local database according to the user name and judges the legality of the user identity and the legality of the virtual key. The data after the super-speed mode is simplified is about 500 bytes, the data is divided into 2 packets to be sent, the average time consumption is 800 milliseconds, and the authentication time is obviously shortened. The super-speed mode not only reduces the length of the message, but also has higher efficiency than the complete mode due to less transmission packets and low probability of packet loss retransmission.
Preferably, the vehicle-mounted module is further configured to set the verification mode to be a complete mode when the vehicle owner client verifies the validity and security of the virtual key for the first time, and set the verification mode to be an extremely fast mode when the vehicle owner client verifies the validity and security of the virtual key for the non-first time.
Specifically, the system also supports an automatic switching function of an authentication mode, namely when the vehicle owner client uses a top speed mode to connect the vehicle-mounted module but no corresponding certificate file or virtual key exists in a local database of the vehicle-mounted module, the vehicle-mounted module informs the vehicle owner client that the vehicle owner client is switched to a complete mode, and the vehicle owner client automatically re-initiates complete authentication.
For the sake of brief description, the embodiments of the present invention do not refer to the corresponding contents in the foregoing embodiments of the present invention.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (10)

1. A vehicle sharing system of a multifunctional Bluetooth key comprises a vehicle owner client, a service platform, a vehicle borrowing client and a vehicle-mounted module; the vehicle-mounted module is used for receiving a virtual key from the owner client after the Bluetooth connection with the owner client is established, and verifying the validity and the safety of the virtual key; the method is characterized in that:
the vehicle-mounted module is used for obtaining an authentication challenge problem according to the current time and the generated random number combination after the validity and the safety of the virtual key are verified, and sending the authentication challenge problem to the vehicle owner client;
the vehicle owner client is used for receiving an authentication challenge reply aiming at the authentication challenge problem and input by a vehicle owner, and sending the authentication challenge reply to the vehicle-mounted module;
the vehicle-mounted module is also used for monitoring whether correct authentication challenge responses are received within the preset challenge time, and if not, the Bluetooth connection with the vehicle owner client is disconnected.
2. The vehicle sharing system of the multifunctional bluetooth key of claim 1, wherein:
the vehicle-mounted module is also used for analyzing the request to obtain a timestamp when receiving the request from the vehicle owner client, wherein the timestamp is the local time when the request is generated by the vehicle owner client;
the vehicle-mounted module is also used for judging whether the difference between the timestamp and the current local time of the vehicle-mounted module is greater than the preset maximum time difference, and if so, the request verification fails; if not, the request is verified successfully.
3. The vehicle sharing system of the multifunctional bluetooth key of claim 1, wherein:
the service platform is further used for destroying the virtual key or the virtual key associated with the vehicle borrowing client when receiving a key destroying instruction containing the virtual key or the vehicle borrowing client.
4. The vehicle sharing system of the multifunctional bluetooth key of claim 3, wherein:
the destruction mode of the virtual key comprises the following steps:
1) when detecting that the vehicle borrowing client is networked, the service platform generates a destruction task containing the virtual key and sends the destruction task to the vehicle borrowing client; when the car borrowing client receives the destruction task, destroying the virtual key in the locally stored destruction task;
2) when the service platform detects that the vehicle borrowing client is disconnected and the vehicle-mounted module is connected to the network, the service platform sends a blacklist containing the vehicle borrowing client to the vehicle-mounted module; the vehicle-mounted module receives and stores the blacklist, and refuses the request when receiving the request initiated by the vehicle borrowing client in the blacklist;
3) when the service platform detects that the vehicle-mounted module and the vehicle borrowing client are disconnected, a virtual key destruction task is newly established, and connection with the vehicle-mounted module or the vehicle borrowing client is waited; when connecting with the borrowing client, executing the step 1); when the on-board module is connected, step 2) is executed.
5. The multifunctional bluetooth key vehicle sharing system according to claim 4, wherein:
the service platform is further used for removing the virtual key or the virtual key associated with the vehicle borrowing client from the blacklist locally stored in the vehicle-mounted module when a blacklist removing instruction containing the virtual key or the vehicle borrowing client is received.
6. The multifunctional bluetooth key vehicle sharing system according to claim 5, wherein:
the service platform is specifically used for generating a removal task containing a virtual key or a vehicle borrowing client when receiving a blacklist removal instruction containing the virtual key or the vehicle borrowing client and sending the removal task to the vehicle-mounted module;
the vehicle-mounted module is specifically used for removing the virtual key or the virtual key associated with the vehicle borrowing client from a locally stored blacklist when the removal task is received.
7. The multifunctional bluetooth key vehicle sharing system according to claim 5, wherein:
the service platform is specifically configured to generate the removal task when the destruction task is successfully sent to the vehicle borrowing client, or when it is detected that the owner user side shares the virtual key to the vehicle borrowing client again.
8. The vehicle sharing system of the multifunctional bluetooth key of claim 1, wherein:
the vehicle owner client and the vehicle borrowing client can log in on different types of equipment at the same time, and only one equipment can log in on the same type of equipment.
9. The vehicle sharing system of the multifunctional bluetooth key of claim 1, wherein:
the verification of the validity and the safety of the virtual key comprises two modes: full mode and top speed mode;
the vehicle-mounted module is also used for receiving a user name, a certificate file, a virtual key and a platform signature of a vehicle owner from a client of the vehicle owner when the vehicle-mounted module is in a complete mode, calculating MD5 values of the certificate file and the virtual key after the validity and safety of the virtual key are verified, and storing the obtained MD5 value;
the vehicle-mounted module is also used for receiving the certificate file of the vehicle owner from the client of the vehicle owner and the MD5 value of the virtual key when the vehicle-mounted module is in the top speed mode, verifying whether the MD5 value is stored locally, and finishing the verification of the validity and the safety of the virtual key if the MD5 value is stored locally; if not, switching to the complete mode.
10. The vehicle sharing system of the multifunctional bluetooth key of claim 9, wherein:
the vehicle-mounted module is also used for setting the verification mode to be a complete mode when the vehicle owner client side verifies the validity and the safety of the virtual key for the first time, and setting the verification mode to be an extremely high speed mode when the vehicle owner client side verifies the validity and the safety of the virtual key for the non-first time.
CN202011638981.4A 2020-12-31 2020-12-31 Vehicle sharing system of multifunctional Bluetooth key Pending CN112837448A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011638981.4A CN112837448A (en) 2020-12-31 2020-12-31 Vehicle sharing system of multifunctional Bluetooth key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011638981.4A CN112837448A (en) 2020-12-31 2020-12-31 Vehicle sharing system of multifunctional Bluetooth key

Publications (1)

Publication Number Publication Date
CN112837448A true CN112837448A (en) 2021-05-25

Family

ID=75926827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011638981.4A Pending CN112837448A (en) 2020-12-31 2020-12-31 Vehicle sharing system of multifunctional Bluetooth key

Country Status (1)

Country Link
CN (1) CN112837448A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE602004002272D1 (en) * 2004-03-30 2006-10-19 Fiat Ricerche Multi-user system for motor vehicle and electronic key for the like
CN104283851A (en) * 2013-07-08 2015-01-14 中国电信股份有限公司 Illegal automatic call shielding method and system and voice authentication equipment
US20150191933A1 (en) * 2012-06-20 2015-07-09 Continental Automotive Gmbh Electronic Key for a Vehicle
CN105608804A (en) * 2014-11-14 2016-05-25 福特全球技术公司 Method and apparatus for automated rental key dispensal and return
CN105931100A (en) * 2016-04-18 2016-09-07 宁波轩悦行电动汽车服务有限公司 Electric vehicle time sharing lease system WEB background lease management platform
CN106056778A (en) * 2016-07-25 2016-10-26 北京易始通达科技有限公司 Vehicle renting and returning method, apparatus and system
CN106162645A (en) * 2016-09-27 2016-11-23 广州赛意信息科技股份有限公司 A kind of Mobile solution quickly reconnect method for authenticating and system
CN106408775A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Method and system for returning vehicles and server
US20170093866A1 (en) * 2015-09-25 2017-03-30 Argus Cyber Security Ltd. System and method for controlling access to an in-vehicle communication network
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
CN108288325A (en) * 2017-01-09 2018-07-17 曾玮 Bicycle management system and its control device
CN108665337A (en) * 2017-04-01 2018-10-16 重庆无线绿洲通信技术有限公司 A kind of Vehicular system and its virtual key authentication method
CN109484355A (en) * 2018-11-16 2019-03-19 深圳市元征科技股份有限公司 A kind of method and device disabling car key
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key
CN109830018A (en) * 2019-02-21 2019-05-31 深圳四海万联科技有限公司 Vehicle based on bluetooth key borrows system
CN110932846A (en) * 2019-06-25 2020-03-27 南京汽车集团有限公司 Vehicle-mounted virtual key communication method

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE602004002272D1 (en) * 2004-03-30 2006-10-19 Fiat Ricerche Multi-user system for motor vehicle and electronic key for the like
US20150191933A1 (en) * 2012-06-20 2015-07-09 Continental Automotive Gmbh Electronic Key for a Vehicle
CN104283851A (en) * 2013-07-08 2015-01-14 中国电信股份有限公司 Illegal automatic call shielding method and system and voice authentication equipment
CN105608804A (en) * 2014-11-14 2016-05-25 福特全球技术公司 Method and apparatus for automated rental key dispensal and return
US20170093866A1 (en) * 2015-09-25 2017-03-30 Argus Cyber Security Ltd. System and method for controlling access to an in-vehicle communication network
CN105931100A (en) * 2016-04-18 2016-09-07 宁波轩悦行电动汽车服务有限公司 Electric vehicle time sharing lease system WEB background lease management platform
CN106056778A (en) * 2016-07-25 2016-10-26 北京易始通达科技有限公司 Vehicle renting and returning method, apparatus and system
CN106408775A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Method and system for returning vehicles and server
CN106162645A (en) * 2016-09-27 2016-11-23 广州赛意信息科技股份有限公司 A kind of Mobile solution quickly reconnect method for authenticating and system
CN108288325A (en) * 2017-01-09 2018-07-17 曾玮 Bicycle management system and its control device
CN108665337A (en) * 2017-04-01 2018-10-16 重庆无线绿洲通信技术有限公司 A kind of Vehicular system and its virtual key authentication method
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
CN109484355A (en) * 2018-11-16 2019-03-19 深圳市元征科技股份有限公司 A kind of method and device disabling car key
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key
CN109830018A (en) * 2019-02-21 2019-05-31 深圳四海万联科技有限公司 Vehicle based on bluetooth key borrows system
CN110932846A (en) * 2019-06-25 2020-03-27 南京汽车集团有限公司 Vehicle-mounted virtual key communication method

Similar Documents

Publication Publication Date Title
CN104363266B (en) Method, TSP background systems and the car-mounted terminal of remote control vehicle
CN105844749B (en) A kind of Automobile handset system for unlocking and its unlocking method
US9866570B2 (en) On-vehicle communication system
CN106899404B (en) Vehicle-mounted CAN FD bus communication system and method based on pre-shared key
US7093127B2 (en) System and method for computer storage security
CN109830018B (en) Vehicle borrowing system based on Bluetooth key
CN108833122A (en) Awakening method, device and the storage medium of vehicle-carrying communication controller
CN111432374B (en) Network-connected automobile network node identity authentication method and device and readable storage medium
CN108569250A (en) The automatic authorization method of bluetooth key based on shared automobile
CN111479244B (en) V2I Internet of vehicles identity authentication system and method
CN111422163B (en) Vehicle ignition method and system based on face recognition and vehicle
US11757911B2 (en) Method and system for providing security on in-vehicle network
CN111049803A (en) Data encryption and platform security access method based on vehicle-mounted CAN bus communication system
CN106850680A (en) A kind of intelligent identity identification method and device for Transit Equipment
GB2516939A (en) Access authorisation system and secure data communications system
CN103746969A (en) Vehicle terminal authentication method and authentication server
CN112837448A (en) Vehicle sharing system of multifunctional Bluetooth key
CN114358755A (en) Charging pile management system and method
CN114157489A (en) Communication domain controller safety communication method based on periodic authentication handshake mechanism
CN1567859A (en) A method of access authentication for WLAN
KR102411797B1 (en) Hardware-based vehicle cyber security system
CN113115260B (en) Block chain assisted cloud-side cooperative Internet of vehicles communication method, equipment and storage medium
CN113872764B (en) Vehicle digital certificate management method and device
CN114866982A (en) Method and system for data interaction by accessing public network through vehicle-end ECU
TWI699987B (en) Control method of vehicle-mounted networked electronic system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination