CN113783687A - Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile - Google Patents
Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile Download PDFInfo
- Publication number
- CN113783687A CN113783687A CN202111044883.2A CN202111044883A CN113783687A CN 113783687 A CN113783687 A CN 113783687A CN 202111044883 A CN202111044883 A CN 202111044883A CN 113783687 A CN113783687 A CN 113783687A
- Authority
- CN
- China
- Prior art keywords
- code
- algorithm
- encryption
- key
- plaintext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides a method and a system for generating, encrypting and decrypting an electronic anti-theft code of an automobile, and belongs to the technical field of vehicle encryption and decryption. The method comprises the following steps: acquiring a VIN code and a base user key of a vehicle; identifying a target vehicle production base corresponding to the VIN code according to the VIN code; judging whether a target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code; if not, the VIN code and the base user key are combined into a first plaintext with a first character length; if yes, calling a first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with a first character length according to a preset character conversion algorithm; generating an electronic security key with a preset character length by the first plain text or the second plain text according to a first encryption algorithm; the electronic security key is stored to a control unit of the vehicle. The method and the system for generating, encrypting and decrypting the electronic anti-theft code of the automobile can solve the problem that algorithms of different brands cannot be compatible.
Description
Technical Field
The invention belongs to the technical field of vehicle encryption and decryption, and particularly relates to a method and a system for generating, encrypting and decrypting an electronic anti-theft code of an automobile.
Background
When many host factories at home and abroad have own production and manufacturing management systems, most of the anti-theft codes of the automobile engines are generated in the systems according to the rules designed by the automobile enterprises. However, with the increase of the number of products of vehicle enterprises and the development of numerous brands and the rise of flexible online production of intelligent manufacturing, the demands of producing vehicle types of different brands in the same factory are increasing day by day, and even the vehicle types of multiple brands at home and abroad need to be trial-manufactured mutually or manufactured in mass production.
The traditional ESK code (Electronic security key) is composed of a 4-digit PIN code, 26-digit English letters and 2-digit numbers, and because a factory can produce various brands of vehicle types, the problem that the factory is difficult to be compatible with other multi-brand ESKs under the same enterprise exists.
Disclosure of Invention
An object of the first aspect of the present invention is to provide a method for generating, encrypting and decrypting an electronic anti-theft code for an automobile, which is compatible with algorithms of different brands.
It is a further object of the invention to increase the difficulty of cracking the electronic security key.
It is a further object of the invention to increase the security of data transfer.
It is an object of the second aspect of the present invention to provide a vehicle data encryption and decryption system that is compatible with different brands of algorithms.
Particularly, the invention provides a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile, which comprises the following steps:
acquiring a VIN code and a base user key of a vehicle;
identifying a target vehicle production base corresponding to the VIN code according to the VIN code;
judging whether the target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code;
if not, combining the VIN code and the base user key into a first plaintext with a first character length;
if yes, calling the first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with the first character length according to a preset character conversion algorithm;
generating an electronic security key with a preset character length by the first plaintext or the second plaintext according to a first encryption algorithm;
and storing the electronic security key to a control unit of the vehicle as an electronic anti-theft code of the data of the target vehicle production base.
Optionally, the first encryption algorithm is a symmetric encryption algorithm.
Optionally, the step of generating the electronic security key with a preset character length according to the first encryption algorithm with the first plaintext or the second plaintext includes:
generating a plurality of alternative security keys of a plurality of character lengths according to character length requirements of different vehicle production bases and the first encryption algorithm;
and selecting a key with a corresponding character length from the plurality of optional security keys as the electronic security key according to the character length of the target vehicle production base.
Optionally, after the step of generating the electronic security key with a preset character length according to the first encryption algorithm by using the first plaintext or the second plaintext, the method further includes:
and taking the home subscriber key as a third plaintext of an asymmetric encryption algorithm, and encrypting the home subscriber key by using the asymmetric encryption algorithm so as to decrypt by using the asymmetric algorithm and the electronic security key when data of the vehicle needs to be interacted.
Optionally, the asymmetric encryption algorithm is an RSA algorithm.
Optionally, the step of using the home user key as a third plaintext of an asymmetric encryption algorithm and encrypting the home user key by using the asymmetric encryption algorithm further includes:
receiving an RSA public key of a sending end;
generating an RSA ciphertext according to the third plaintext, the RSA public key and the RSA algorithm;
and sending the RSA ciphertext and the electronic security key to the sending end so that the sending end can decrypt according to the RSA ciphertext and the electronic security key.
Optionally, the base user key is generated by encrypting a base user password through a second sub-encryption algorithm of the target vehicle production base.
Optionally, the base user password is preset and stored in a storage unit of the vehicle.
Optionally, the control unit comprises an electronic control unit and a keyless entry and start unit of the vehicle.
Particularly, the invention further provides an encryption and decryption system, which comprises a control unit, wherein the control unit comprises a memory and a processor, the memory stores a control program, and the control program is used for realizing the generation, encryption and decryption method of the automobile electronic anti-theft code when being executed by the processor.
When a target vehicle base corresponding to a vehicle is provided with a first encryption sub-algorithm for encrypting a VIN, the first encryption sub-algorithm can be called to encrypt the VIN and then participate in an encryption program for subsequently generating the electronic security key, and vehicles of the base without the VIN encryption sub-algorithm can also be directly encrypted by using the VIN, so that new and old algorithms can be compatible, and the generation of the electronic security key with unified multi-brand algorithms can be realized.
Furthermore, the ESK code with a longer length can be generated by encrypting the first plaintext or the second plaintext according to the AES algorithm, and compared with the traditional ESK code with 32 characters formed by 4-bit PIN codes, 26-bit English letters and 2-bit numbers, the ESK code is more difficult to crack.
Further, in this embodiment, a symmetric encryption algorithm and an asymmetric encryption algorithm are combined, the symmetric encryption algorithm (for example, AES algorithm) is used for encryption to generate the ESK code, and then the asymmetric encryption algorithm (RSA algorithm) is used for encryption and decryption operations on the key of the symmetric encryption algorithm, so that the security of data transmission of the remote system between the server and the server or between the server and the client system can be increased.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. In the drawings:
FIG. 1 is a flow chart of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention;
FIG. 2 is a flow chart of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to another embodiment of the invention;
fig. 3 is a schematic diagram of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention.
Detailed Description
Fig. 1 is a flowchart of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention. As shown in fig. 1, in an embodiment, the method for generating, encrypting and decrypting the electronic anti-theft code of the automobile of the present invention includes:
step S100, obtaining the VIN code and the base user key of the vehicle.
And step S200, identifying the corresponding target vehicle production base according to the VIN code. Since the production bases of vehicles produced by different brands or different items of each brand may be different, the production base corresponding to the vehicle, which is generally referred to as an assembly plant, i.e., the target production base, can be determined by the VIN code. Generally, the VIN code has 17 bits, wherein the 11 th bit is an abbreviation of its production base, so that the production base of the target vehicle can be determined by reading the 11 th bit character of the VIN code.
And step S300, judging whether the target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code, if so, entering step S400, otherwise, entering step S500. Due to old and new replacement or brand difference, some production bases have VIN code encryption algorithm, and some production bases do not.
And step S400, calling a first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with a first character length according to a preset character conversion algorithm. This is because even if the destination vehicle production base has a corresponding VIN code encryption algorithm (i.e., the first encryption sub-algorithm), since the sub-algorithms of each base may be different, for the generality of the subsequent algorithm, it is necessary to unify the character lengths of the base antitheft codes obtained by encrypting each base by the first encryption sub-algorithm.
S500, the VIN code and the base user key are combined into a first plaintext having a first character length. The combination here may be a simple combination, such as directly following the VIN code with the base user key (typically 16 bits), so that a VIN code of 17 bits (i.e., of the VIS type) is combined with the base user key of 16 bits into a plaintext of 33 bits. The second plaintext above needs to remain the same length as the first plaintext for general execution of the following algorithm.
Step S600, generating an electronic security key (ESK code) with a preset character length from the first plaintext or the second plaintext according to a first encryption algorithm. The first encryption algorithm here may be an encryption algorithm commonly used in the art.
Step S700, storing the electronic security key to the control unit of the vehicle as an electronic anti-theft code of the data of the target vehicle production base. The control unit can be an Electronic Control Unit (ECU) and a keyless entry and start unit (PEPS) of the vehicle, a management and control department writes a unique ESK code generated by each vehicle into the PEPS and the ECU respectively in the production and manufacturing process, and the electronic security key needs to be decrypted first when production line equipment or terminal equipment such as a diagnostic instrument and other devices or systems need to communicate with the vehicle in other life cycle process applications such as trial production and mass production manufacturing of the whole vehicle, for example, after-sale replacement, for example, the vehicle owner client key/fingerprint switch of the vehicle door, and the checking application and the security identification of ignition starting of the vehicle.
When a target vehicle base corresponding to a vehicle is provided with a first encryption sub-algorithm for encrypting a VIN, the first encryption sub-algorithm can be called to encrypt the VIN and then participate in an encryption program for subsequently generating the electronic security key, and vehicles of the base without the VIN encryption sub-algorithm can also be directly encrypted by using the VIN, so that new and old algorithms can be compatible, and the generation of the electronic security key with unified multi-brand algorithms can be realized.
In one embodiment, the first Encryption algorithm is a symmetric Encryption algorithm, and further, the first Encryption algorithm is an AES (Advanced Encryption Standard) algorithm.
In the embodiment, the first plaintext or the second plaintext is encrypted according to the AES algorithm, so that the ESK code with a long length can be generated, and compared with the conventional ESK code with 32 characters formed by 4-bit PIN code, 26-bit english alphabet and 2-bit number, the ESK code of the embodiment is more difficult to crack.
Taking the second plaintext as an example, the VIN code with 17 bits of second plaintext and the base user key with 16 bits of second plaintext are combined into a plaintext with 33 bits, and then the second plaintext is encrypted by AES algorithm, the length of the final ESK code can be set by setting the cyclic redundancy value, for example, when the cyclic redundancy value is set to 16 bits, the length of the ESK code is 128 characters, and when the cyclic redundancy value is set to 32 bits, the ESK code is 256 characters, which is obviously more difficult to crack than the conventional ESK code with 32 characters.
The AES algorithm is an existing encryption algorithm, and a detailed description of a specific procedure thereof is omitted here. The inventive circular array set in the AES algorithm may be formed by any 8 ascii codes from 0-9 ascii codes, for example, circular array byte [ ] [ {49,50,51,52,53,54,55,56,49,50,51,52,53,54,55,56}, which is used to fill in the number of characters, where circular array byte [ ] is the symmetric array vector formed by the ascii codes of numbers 1-8. When the AES algorithm is used to perform byte shifting and replacing, the last digit ascii code vin [16] of the vin code may be taken out first and compared with the ascii code of digit 0 to obtain the offset value, the offset value is used to modulo 16 to obtain the specific preferred position, and then the position is set to 0. Here 16 refers to the values 0, 1, 2, 3, 4,5, 6, 7, 8, 9 and the length of the upper and lower case letters a, b, c, d, e, f. Of course, the above embodiment shows a specific way of setting up the loop array and replacing the byte movement, but the invention is not limited to the above embodiment.
Fig. 2 is a flowchart of a method for generating, encrypting and decrypting an electronic anti-theft code for a vehicle according to another embodiment of the invention. As shown in fig. 2, in another embodiment, step S600 includes:
step S602, a plurality of alternative security keys of a plurality of character lengths are generated according to the character length requirements of different vehicle production bases and the first encryption algorithm.
Step S604, selecting a key with a corresponding character length from a plurality of optional security keys as an electronic security key according to the character length of the target vehicle production base.
The output character length can be controlled by setting the size of the cyclic redundancy value, after the character lengths of different vehicle production bases are obtained, the cyclic redundancy value can be determined accordingly, encryption of the AES algorithm is carried out once by each cyclic redundancy value, and therefore alternative security keys of each character length are generated, and the alternative security keys can be 10 characters, 32 characters, 64 characters, 128 characters and 256 characters. Each base can then extract the required character length of the electronic security key according to its own requirements.
In another embodiment, as shown in fig. 2, after step S600, the method further includes:
and step S800, the base user key is used as a third plaintext of the asymmetric encryption algorithm, and the asymmetric encryption algorithm is used for encrypting the base user key so as to decrypt the base user key by using the asymmetric encryption algorithm and the electronic security key when the base user key needs to interact with the data of the vehicle. In one embodiment, the asymmetric encryption algorithm is the RSA algorithm. The execution order of step S800 and step S700 is not limited herein.
The RSA encryption step generally includes:
1. defining two larger prime numbers p and q (which can be set from a database, a cloud or a configuration file);
2. calculating n ═ p × q;
3. calculating a public key index e which is a number relatively prime to (p-1) × (q-1);
4. the RSA encryption C is M ^ e mod n, wherein M is the ESK code generated by the AES algorithm, C is the generated RSA secret key, and mod is a modulus operator;
the decryption step generally comprises:
1. similar to encryption steps 1-3;
2. calculating a public key index d derived from (d × e) mod ((p-1) × (q-1)) ═ 1;
3. decryption yields the plaintext M ═ C ^ d mod n, where C is the key generated by the encryption step 4.
Fig. 3 is a schematic diagram of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention. In a further embodiment, as shown in fig. 3, the encryption and decryption process after step S650 is as follows:
receiving an RSA public key of a sending end;
generating an RSA ciphertext according to a third plaintext, an RSA public key and an RSA algorithm;
and sending the RSA ciphertext and the electronic security key to the sending end so that the sending end can decrypt according to the RSA ciphertext and the electronic security key.
The 11 th digit value in the VIN code can be used to extract a corresponding RSA key pair, a public key in the key pair is used to encrypt the key of the AES algorithm, a private key is used to decrypt the key of the AES algorithm, and the data provided after the encryption and decryption by the RSA algorithm is the encryption key of the AES algorithm.
One disadvantage of symmetric encryption and decryption is that both encryption and decryption require the use of the same key. In the manufacturing process, if data information is stolen by an illegal user when an ESK code is interacted among multiple systems or distributed systems, the secret leakage is caused, and troubles and potential safety hazards are brought. The asymmetric algorithm RSA is different from the symmetric algorithm AES in that the secret key is divided into two parts, one part is a public key and the other part is a private key. The public key is short for a public key and is transmitted through a network; and the private key, short the private key, is retained by the generator. This will solve the problem of key management for generating ESK codes. However, if only the RSA algorithm is used for encryption and decryption, the encryption speed will be slower and slower as the model data is larger.
In this embodiment, a symmetric encryption algorithm and an asymmetric encryption algorithm are combined, an ESK code is generated by encrypting using the symmetric encryption algorithm (e.g., AES algorithm), and then an encryption and decryption operation is performed on a key of the symmetric encryption algorithm using the asymmetric encryption algorithm (RSA algorithm), so that security of data transmission between the server and the remote system or between the server and the client system can be increased.
In one embodiment, the first sub-encryption algorithm may expand the 17-bit VIN code into 32-byte characters according to the following padding rule, i.e. the base security code:
1) designating the character to be filled as a 0 character;
2) 15 0 characters are needed to be filled;
3) and one of the 0 characters is processed differently according to the last character of the VIN number, and the method specifically comprises the following steps: if the last character is 0, filling to the 0 th bit, if the last character is 1, filling to the 1 st bit, and so on, if the last character is 9, filling to the 9 th bit;
4) and the other 14 characters 0, filled to the rearmost of the VIN number.
In one embodiment, the base user key is generated by encrypting the base user password using a second sub-encryption algorithm of the target vehicle production base. For example, the destination vehicle production base, encrypts the user password (which may be a chip code or key code) to a 16-bit base user key using the AES algorithm.
In another embodiment, the base user password is preset and stored in the storage unit of the vehicle, so that the base user key of the target vehicle production base does not need to be called, and the base user key can be used for participating in the subsequent ESK code production process more conveniently and flexibly.
The invention also provides an encryption and decryption system, which comprises a control unit, wherein the control unit comprises a memory and a processor, the memory stores a control program, and the control program is used for realizing the generation, encryption and decryption method of the automobile electronic anti-theft code in any embodiment or the combination of the embodiments when being executed by the processor. The processor may be a Central Processing Unit (CPU), a digital processing unit, or the like. The processor receives and transmits data through the communication interface. The memory is used for storing programs executed by the processor. The memory is any medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by the computer, or a combination of memories. The above-described computing program may be downloaded from a computer-readable storage medium to a corresponding computing/processing device or to a computer or external storage device via a network (e.g., the internet, a local area network, a wide area network, and/or a wireless network).
When the target vehicle base corresponding to the vehicle is provided with the first encryption sub-algorithm for encrypting the VIN, the first encryption sub-algorithm can be called to encrypt the VIN and then participate in the subsequent encryption program for generating the electronic security key, and vehicles of some base which is not provided with the VIN encryption algorithm can be directly encrypted by using the VIN, so that the new and old algorithms can be compatible, and the generation of the electronic security key with unified multi-brand algorithms can be realized.
Thus, it should be appreciated by those skilled in the art that while a number of exemplary embodiments of the invention have been illustrated and described in detail herein, many other variations or modifications consistent with the principles of the invention may be directly determined or derived from the disclosure of the present invention without departing from the spirit and scope of the invention. Accordingly, the scope of the invention should be understood and interpreted to cover all such other variations or modifications.
Claims (10)
1. A generation, encryption and decryption method of an electronic anti-theft code of an automobile is characterized by comprising the following steps:
acquiring a VIN code and a base user key of a vehicle;
identifying a target vehicle production base corresponding to the VIN code according to the VIN code;
judging whether the target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code;
if not, combining the VIN code and the base user key into a first plaintext with a first character length;
if yes, calling the first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with the first character length according to a preset character conversion algorithm;
generating an electronic security key with a preset character length by the first plaintext or the second plaintext according to a first encryption algorithm;
and storing the electronic security key to a control unit of the vehicle as an electronic anti-theft code of the data of the target vehicle production base.
2. The method for generating, encrypting and decrypting the electronic anti-theft code for automobiles according to claim 1,
the first encryption algorithm is a symmetric encryption algorithm.
3. The method for generating, encrypting and decrypting the electronic anti-theft code for the automobile according to claim 2, wherein the step of generating the electronic security key with a preset character length by the first plaintext or the second plaintext according to a first encryption algorithm comprises:
generating a plurality of alternative security keys of a plurality of character lengths according to character length requirements of different vehicle production bases and the first encryption algorithm;
and selecting a key with a corresponding character length from the plurality of optional security keys as the electronic security key according to the character length of the target vehicle production base.
4. The method for generating, encrypting and decrypting the electronic anti-theft code for the automobile according to claim 3, wherein the step of generating the electronic security key with a preset character length by the first plaintext or the second plaintext according to the first encryption algorithm further comprises the following steps:
and taking the home subscriber key as a third plaintext of an asymmetric encryption algorithm, and encrypting the home subscriber key by using the asymmetric encryption algorithm so as to decrypt by using the asymmetric algorithm and the electronic security key when data of the vehicle needs to be interacted.
5. The method for generating, encrypting and decrypting the electronic anti-theft code for automobiles according to claim 4,
the asymmetric encryption algorithm is an RSA algorithm.
6. The method for generating, encrypting and decrypting the electronic anti-theft code for automobiles according to claim 5, wherein the step of using the home subscriber key as a third plaintext of an asymmetric encryption algorithm and encrypting the home subscriber key by using the asymmetric encryption algorithm further comprises:
receiving an RSA public key of a sending end;
generating an RSA ciphertext according to the third plaintext, the RSA public key and the RSA algorithm;
and sending the RSA ciphertext and the electronic security key to the sending end so that the sending end can decrypt according to the RSA ciphertext and the electronic security key.
7. The generation, encryption and decryption method of the electronic anti-theft code for automobiles according to any one of claims 1 to 5,
and the base user secret key is generated by encrypting a base user password through a second sub-encryption algorithm of the target vehicle production base.
8. The generation, encryption and decryption method of the electronic anti-theft code for automobiles according to any one of claims 1 to 5,
the base user password is preset and stored in a storage unit of the vehicle.
9. The generation, encryption and decryption method of the electronic anti-theft code for automobiles according to any one of claims 1 to 5,
the control unit comprises an electronic control unit and a keyless entry and start unit of the vehicle.
10. An encryption and decryption system, comprising a control unit, wherein the control unit comprises a memory and a processor, the memory stores a control program, and the control program is used for realizing the generation and encryption and decryption method of the electronic anti-theft code of the automobile according to any one of claims 1-9 when being executed by the processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111044883.2A CN113783687B (en) | 2021-09-07 | 2021-09-07 | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111044883.2A CN113783687B (en) | 2021-09-07 | 2021-09-07 | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113783687A true CN113783687A (en) | 2021-12-10 |
CN113783687B CN113783687B (en) | 2023-08-29 |
Family
ID=78841513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111044883.2A Active CN113783687B (en) | 2021-09-07 | 2021-09-07 | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113783687B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114944936A (en) * | 2022-04-24 | 2022-08-26 | 华控清交信息科技(北京)有限公司 | Privacy routing server, encryption protocol conversion method and machine readable storage medium |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004040273A (en) * | 2002-07-01 | 2004-02-05 | Cosmo:Kk | Data security maintaining method and apparatus in network camera, home gateway, and home automation apparatus |
EP1480145A1 (en) * | 2003-05-22 | 2004-11-24 | Toyota Jidosha Kabushiki Kaisha | Vehicle identification code storing device and method for storing vehicle identification code |
CN104243160A (en) * | 2014-07-24 | 2014-12-24 | 秦锋 | Identity authentication management method and identity authentication method and device |
CN105262586A (en) * | 2015-10-28 | 2016-01-20 | 铁将军汽车电子有限公司 | Key distribution method and apparatus for automobile theftproof equipment |
CN105635147A (en) * | 2015-12-30 | 2016-06-01 | 深圳市图雅丽特种技术有限公司 | Vehicle-mounted-special-equipment-system-based secure data transmission method and system |
CN107610278A (en) * | 2017-07-31 | 2018-01-19 | 宁波远景汽车零部件有限公司 | Intelligent key learning method and system |
CN108476136A (en) * | 2016-01-18 | 2018-08-31 | 三菱电机株式会社 | Encryption device, ciphertext conversion equipment, encipheror, ciphertext conversion program, encryption method and ciphertext conversion method |
CN108810113A (en) * | 2018-05-29 | 2018-11-13 | 上海博泰悦臻电子设备制造有限公司 | A kind of data communications method and system between vehicle and vehicle |
CN108944784A (en) * | 2018-08-02 | 2018-12-07 | 安徽江淮汽车集团股份有限公司 | The authentication method and system of engine anti-theft unit |
CN109624919A (en) * | 2018-12-25 | 2019-04-16 | 爱驰汽车有限公司 | VATS Vehicle Anti-Theft System configuration method, computer readable storage medium and terminal |
US20200013241A1 (en) * | 2018-07-09 | 2020-01-09 | Ikeyless, Llc | Systems and methods for creating key backups by identifying and storing unique key information and for replicating unique keys from key backups |
WO2020232854A1 (en) * | 2019-05-22 | 2020-11-26 | 平安科技(深圳)有限公司 | Vehicle unlocking method and apparatus, and computer device and storage medium |
CN112339707A (en) * | 2019-08-09 | 2021-02-09 | 广州汽车集团股份有限公司 | ETC vehicle-mounted unit anti-disassembly method and system and automobile |
CN112383899A (en) * | 2020-09-23 | 2021-02-19 | 芜湖莫森泰克汽车科技股份有限公司 | Method for remotely upgrading vehicle window anti-pinch ECU (electronic control unit) program based on 5G network |
CN113276801A (en) * | 2021-06-28 | 2021-08-20 | 东风汽车集团股份有限公司 | Vehicle anti-theft identification matching method and system |
-
2021
- 2021-09-07 CN CN202111044883.2A patent/CN113783687B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004040273A (en) * | 2002-07-01 | 2004-02-05 | Cosmo:Kk | Data security maintaining method and apparatus in network camera, home gateway, and home automation apparatus |
EP1480145A1 (en) * | 2003-05-22 | 2004-11-24 | Toyota Jidosha Kabushiki Kaisha | Vehicle identification code storing device and method for storing vehicle identification code |
CN104243160A (en) * | 2014-07-24 | 2014-12-24 | 秦锋 | Identity authentication management method and identity authentication method and device |
CN105262586A (en) * | 2015-10-28 | 2016-01-20 | 铁将军汽车电子有限公司 | Key distribution method and apparatus for automobile theftproof equipment |
CN105635147A (en) * | 2015-12-30 | 2016-06-01 | 深圳市图雅丽特种技术有限公司 | Vehicle-mounted-special-equipment-system-based secure data transmission method and system |
CN108476136A (en) * | 2016-01-18 | 2018-08-31 | 三菱电机株式会社 | Encryption device, ciphertext conversion equipment, encipheror, ciphertext conversion program, encryption method and ciphertext conversion method |
CN107610278A (en) * | 2017-07-31 | 2018-01-19 | 宁波远景汽车零部件有限公司 | Intelligent key learning method and system |
CN108810113A (en) * | 2018-05-29 | 2018-11-13 | 上海博泰悦臻电子设备制造有限公司 | A kind of data communications method and system between vehicle and vehicle |
US20200013241A1 (en) * | 2018-07-09 | 2020-01-09 | Ikeyless, Llc | Systems and methods for creating key backups by identifying and storing unique key information and for replicating unique keys from key backups |
CN108944784A (en) * | 2018-08-02 | 2018-12-07 | 安徽江淮汽车集团股份有限公司 | The authentication method and system of engine anti-theft unit |
CN109624919A (en) * | 2018-12-25 | 2019-04-16 | 爱驰汽车有限公司 | VATS Vehicle Anti-Theft System configuration method, computer readable storage medium and terminal |
WO2020232854A1 (en) * | 2019-05-22 | 2020-11-26 | 平安科技(深圳)有限公司 | Vehicle unlocking method and apparatus, and computer device and storage medium |
CN112339707A (en) * | 2019-08-09 | 2021-02-09 | 广州汽车集团股份有限公司 | ETC vehicle-mounted unit anti-disassembly method and system and automobile |
CN112383899A (en) * | 2020-09-23 | 2021-02-19 | 芜湖莫森泰克汽车科技股份有限公司 | Method for remotely upgrading vehicle window anti-pinch ECU (electronic control unit) program based on 5G network |
CN113276801A (en) * | 2021-06-28 | 2021-08-20 | 东风汽车集团股份有限公司 | Vehicle anti-theft identification matching method and system |
Non-Patent Citations (1)
Title |
---|
胡展国 等: "基于RSA与AES组合算法在汽车领域应用研究", ELECTRONICS WORLD・技术交流 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114944936A (en) * | 2022-04-24 | 2022-08-26 | 华控清交信息科技(北京)有限公司 | Privacy routing server, encryption protocol conversion method and machine readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN113783687B (en) | 2023-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8660266B2 (en) | Method of delivering direct proof private keys to devices using an on-line service | |
JP6345157B2 (en) | In-vehicle information communication system and authentication method | |
AU2008327506B2 (en) | Method and system for encryption of data | |
CN113691502B (en) | Communication method, device, gateway server, client and storage medium | |
WO2006025952A2 (en) | Method of delivering direct proof private keys to devices using a distribution cd | |
CN110855616B (en) | Digital key generation system | |
CN112738051B (en) | Data information encryption method, system and computer readable storage medium | |
CN112532580B (en) | Data transmission method and system based on block chain and proxy re-encryption | |
US7620186B2 (en) | Method for establishing an encrypted communication by means of keys | |
CN112840683B (en) | Vehicle key management method, device and system | |
CN115632880B (en) | Reliable data transmission and storage method and system based on state cryptographic algorithm | |
CN115665138A (en) | Automobile OTA (over the air) upgrading system and method | |
CN103117850B (en) | A kind of method for building up of the cryptographic system based on random sequence database | |
CN113783687B (en) | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code | |
CN117318941B (en) | Method, system, terminal and storage medium for distributing preset secret key based on in-car network | |
CN111008400A (en) | Data processing method, device and system | |
CN116318784B (en) | Identity authentication method, identity authentication device, computer equipment and storage medium | |
CN113518244B (en) | Digital television signal data transmission method and device based on substitute text combination | |
CN107872312B (en) | Method, device, equipment and system for dynamically generating symmetric key | |
CN116232639A (en) | Data transmission method, device, computer equipment and storage medium | |
CN115174083A (en) | Internet of vehicles information encryption method and device and Internet of vehicles system | |
US7327845B1 (en) | Transmission of encrypted messages between a transmitter and a receiver utilizing a one-time cryptographic pad | |
US12026259B2 (en) | Method and system for securely provisioning electronic devices | |
CN114584321B (en) | Data information encryption deployment method based on PUF device | |
CN110830414B (en) | Encryption method and device, decryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |