CN113783687A - Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile - Google Patents

Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile Download PDF

Info

Publication number
CN113783687A
CN113783687A CN202111044883.2A CN202111044883A CN113783687A CN 113783687 A CN113783687 A CN 113783687A CN 202111044883 A CN202111044883 A CN 202111044883A CN 113783687 A CN113783687 A CN 113783687A
Authority
CN
China
Prior art keywords
code
algorithm
encryption
key
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111044883.2A
Other languages
Chinese (zh)
Other versions
CN113783687B (en
Inventor
胡展国
于兴林
杨贵林
胡珊
王博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Geely Holding Group Co Ltd
Geely Automobile Research Institute Ningbo Co Ltd
Original Assignee
Zhejiang Geely Holding Group Co Ltd
Geely Automobile Research Institute Ningbo Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Geely Holding Group Co Ltd, Geely Automobile Research Institute Ningbo Co Ltd filed Critical Zhejiang Geely Holding Group Co Ltd
Priority to CN202111044883.2A priority Critical patent/CN113783687B/en
Publication of CN113783687A publication Critical patent/CN113783687A/en
Application granted granted Critical
Publication of CN113783687B publication Critical patent/CN113783687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a method and a system for generating, encrypting and decrypting an electronic anti-theft code of an automobile, and belongs to the technical field of vehicle encryption and decryption. The method comprises the following steps: acquiring a VIN code and a base user key of a vehicle; identifying a target vehicle production base corresponding to the VIN code according to the VIN code; judging whether a target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code; if not, the VIN code and the base user key are combined into a first plaintext with a first character length; if yes, calling a first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with a first character length according to a preset character conversion algorithm; generating an electronic security key with a preset character length by the first plain text or the second plain text according to a first encryption algorithm; the electronic security key is stored to a control unit of the vehicle. The method and the system for generating, encrypting and decrypting the electronic anti-theft code of the automobile can solve the problem that algorithms of different brands cannot be compatible.

Description

Method and system for generating, encrypting and decrypting electronic anti-theft code of automobile
Technical Field
The invention belongs to the technical field of vehicle encryption and decryption, and particularly relates to a method and a system for generating, encrypting and decrypting an electronic anti-theft code of an automobile.
Background
When many host factories at home and abroad have own production and manufacturing management systems, most of the anti-theft codes of the automobile engines are generated in the systems according to the rules designed by the automobile enterprises. However, with the increase of the number of products of vehicle enterprises and the development of numerous brands and the rise of flexible online production of intelligent manufacturing, the demands of producing vehicle types of different brands in the same factory are increasing day by day, and even the vehicle types of multiple brands at home and abroad need to be trial-manufactured mutually or manufactured in mass production.
The traditional ESK code (Electronic security key) is composed of a 4-digit PIN code, 26-digit English letters and 2-digit numbers, and because a factory can produce various brands of vehicle types, the problem that the factory is difficult to be compatible with other multi-brand ESKs under the same enterprise exists.
Disclosure of Invention
An object of the first aspect of the present invention is to provide a method for generating, encrypting and decrypting an electronic anti-theft code for an automobile, which is compatible with algorithms of different brands.
It is a further object of the invention to increase the difficulty of cracking the electronic security key.
It is a further object of the invention to increase the security of data transfer.
It is an object of the second aspect of the present invention to provide a vehicle data encryption and decryption system that is compatible with different brands of algorithms.
Particularly, the invention provides a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile, which comprises the following steps:
acquiring a VIN code and a base user key of a vehicle;
identifying a target vehicle production base corresponding to the VIN code according to the VIN code;
judging whether the target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code;
if not, combining the VIN code and the base user key into a first plaintext with a first character length;
if yes, calling the first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with the first character length according to a preset character conversion algorithm;
generating an electronic security key with a preset character length by the first plaintext or the second plaintext according to a first encryption algorithm;
and storing the electronic security key to a control unit of the vehicle as an electronic anti-theft code of the data of the target vehicle production base.
Optionally, the first encryption algorithm is a symmetric encryption algorithm.
Optionally, the step of generating the electronic security key with a preset character length according to the first encryption algorithm with the first plaintext or the second plaintext includes:
generating a plurality of alternative security keys of a plurality of character lengths according to character length requirements of different vehicle production bases and the first encryption algorithm;
and selecting a key with a corresponding character length from the plurality of optional security keys as the electronic security key according to the character length of the target vehicle production base.
Optionally, after the step of generating the electronic security key with a preset character length according to the first encryption algorithm by using the first plaintext or the second plaintext, the method further includes:
and taking the home subscriber key as a third plaintext of an asymmetric encryption algorithm, and encrypting the home subscriber key by using the asymmetric encryption algorithm so as to decrypt by using the asymmetric algorithm and the electronic security key when data of the vehicle needs to be interacted.
Optionally, the asymmetric encryption algorithm is an RSA algorithm.
Optionally, the step of using the home user key as a third plaintext of an asymmetric encryption algorithm and encrypting the home user key by using the asymmetric encryption algorithm further includes:
receiving an RSA public key of a sending end;
generating an RSA ciphertext according to the third plaintext, the RSA public key and the RSA algorithm;
and sending the RSA ciphertext and the electronic security key to the sending end so that the sending end can decrypt according to the RSA ciphertext and the electronic security key.
Optionally, the base user key is generated by encrypting a base user password through a second sub-encryption algorithm of the target vehicle production base.
Optionally, the base user password is preset and stored in a storage unit of the vehicle.
Optionally, the control unit comprises an electronic control unit and a keyless entry and start unit of the vehicle.
Particularly, the invention further provides an encryption and decryption system, which comprises a control unit, wherein the control unit comprises a memory and a processor, the memory stores a control program, and the control program is used for realizing the generation, encryption and decryption method of the automobile electronic anti-theft code when being executed by the processor.
When a target vehicle base corresponding to a vehicle is provided with a first encryption sub-algorithm for encrypting a VIN, the first encryption sub-algorithm can be called to encrypt the VIN and then participate in an encryption program for subsequently generating the electronic security key, and vehicles of the base without the VIN encryption sub-algorithm can also be directly encrypted by using the VIN, so that new and old algorithms can be compatible, and the generation of the electronic security key with unified multi-brand algorithms can be realized.
Furthermore, the ESK code with a longer length can be generated by encrypting the first plaintext or the second plaintext according to the AES algorithm, and compared with the traditional ESK code with 32 characters formed by 4-bit PIN codes, 26-bit English letters and 2-bit numbers, the ESK code is more difficult to crack.
Further, in this embodiment, a symmetric encryption algorithm and an asymmetric encryption algorithm are combined, the symmetric encryption algorithm (for example, AES algorithm) is used for encryption to generate the ESK code, and then the asymmetric encryption algorithm (RSA algorithm) is used for encryption and decryption operations on the key of the symmetric encryption algorithm, so that the security of data transmission of the remote system between the server and the server or between the server and the client system can be increased.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. In the drawings:
FIG. 1 is a flow chart of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention;
FIG. 2 is a flow chart of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to another embodiment of the invention;
fig. 3 is a schematic diagram of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention.
Detailed Description
Fig. 1 is a flowchart of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention. As shown in fig. 1, in an embodiment, the method for generating, encrypting and decrypting the electronic anti-theft code of the automobile of the present invention includes:
step S100, obtaining the VIN code and the base user key of the vehicle.
And step S200, identifying the corresponding target vehicle production base according to the VIN code. Since the production bases of vehicles produced by different brands or different items of each brand may be different, the production base corresponding to the vehicle, which is generally referred to as an assembly plant, i.e., the target production base, can be determined by the VIN code. Generally, the VIN code has 17 bits, wherein the 11 th bit is an abbreviation of its production base, so that the production base of the target vehicle can be determined by reading the 11 th bit character of the VIN code.
And step S300, judging whether the target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code, if so, entering step S400, otherwise, entering step S500. Due to old and new replacement or brand difference, some production bases have VIN code encryption algorithm, and some production bases do not.
And step S400, calling a first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with a first character length according to a preset character conversion algorithm. This is because even if the destination vehicle production base has a corresponding VIN code encryption algorithm (i.e., the first encryption sub-algorithm), since the sub-algorithms of each base may be different, for the generality of the subsequent algorithm, it is necessary to unify the character lengths of the base antitheft codes obtained by encrypting each base by the first encryption sub-algorithm.
S500, the VIN code and the base user key are combined into a first plaintext having a first character length. The combination here may be a simple combination, such as directly following the VIN code with the base user key (typically 16 bits), so that a VIN code of 17 bits (i.e., of the VIS type) is combined with the base user key of 16 bits into a plaintext of 33 bits. The second plaintext above needs to remain the same length as the first plaintext for general execution of the following algorithm.
Step S600, generating an electronic security key (ESK code) with a preset character length from the first plaintext or the second plaintext according to a first encryption algorithm. The first encryption algorithm here may be an encryption algorithm commonly used in the art.
Step S700, storing the electronic security key to the control unit of the vehicle as an electronic anti-theft code of the data of the target vehicle production base. The control unit can be an Electronic Control Unit (ECU) and a keyless entry and start unit (PEPS) of the vehicle, a management and control department writes a unique ESK code generated by each vehicle into the PEPS and the ECU respectively in the production and manufacturing process, and the electronic security key needs to be decrypted first when production line equipment or terminal equipment such as a diagnostic instrument and other devices or systems need to communicate with the vehicle in other life cycle process applications such as trial production and mass production manufacturing of the whole vehicle, for example, after-sale replacement, for example, the vehicle owner client key/fingerprint switch of the vehicle door, and the checking application and the security identification of ignition starting of the vehicle.
When a target vehicle base corresponding to a vehicle is provided with a first encryption sub-algorithm for encrypting a VIN, the first encryption sub-algorithm can be called to encrypt the VIN and then participate in an encryption program for subsequently generating the electronic security key, and vehicles of the base without the VIN encryption sub-algorithm can also be directly encrypted by using the VIN, so that new and old algorithms can be compatible, and the generation of the electronic security key with unified multi-brand algorithms can be realized.
In one embodiment, the first Encryption algorithm is a symmetric Encryption algorithm, and further, the first Encryption algorithm is an AES (Advanced Encryption Standard) algorithm.
In the embodiment, the first plaintext or the second plaintext is encrypted according to the AES algorithm, so that the ESK code with a long length can be generated, and compared with the conventional ESK code with 32 characters formed by 4-bit PIN code, 26-bit english alphabet and 2-bit number, the ESK code of the embodiment is more difficult to crack.
Taking the second plaintext as an example, the VIN code with 17 bits of second plaintext and the base user key with 16 bits of second plaintext are combined into a plaintext with 33 bits, and then the second plaintext is encrypted by AES algorithm, the length of the final ESK code can be set by setting the cyclic redundancy value, for example, when the cyclic redundancy value is set to 16 bits, the length of the ESK code is 128 characters, and when the cyclic redundancy value is set to 32 bits, the ESK code is 256 characters, which is obviously more difficult to crack than the conventional ESK code with 32 characters.
The AES algorithm is an existing encryption algorithm, and a detailed description of a specific procedure thereof is omitted here. The inventive circular array set in the AES algorithm may be formed by any 8 ascii codes from 0-9 ascii codes, for example, circular array byte [ ] [ {49,50,51,52,53,54,55,56,49,50,51,52,53,54,55,56}, which is used to fill in the number of characters, where circular array byte [ ] is the symmetric array vector formed by the ascii codes of numbers 1-8. When the AES algorithm is used to perform byte shifting and replacing, the last digit ascii code vin [16] of the vin code may be taken out first and compared with the ascii code of digit 0 to obtain the offset value, the offset value is used to modulo 16 to obtain the specific preferred position, and then the position is set to 0. Here 16 refers to the values 0, 1, 2, 3, 4,5, 6, 7, 8, 9 and the length of the upper and lower case letters a, b, c, d, e, f. Of course, the above embodiment shows a specific way of setting up the loop array and replacing the byte movement, but the invention is not limited to the above embodiment.
Fig. 2 is a flowchart of a method for generating, encrypting and decrypting an electronic anti-theft code for a vehicle according to another embodiment of the invention. As shown in fig. 2, in another embodiment, step S600 includes:
step S602, a plurality of alternative security keys of a plurality of character lengths are generated according to the character length requirements of different vehicle production bases and the first encryption algorithm.
Step S604, selecting a key with a corresponding character length from a plurality of optional security keys as an electronic security key according to the character length of the target vehicle production base.
The output character length can be controlled by setting the size of the cyclic redundancy value, after the character lengths of different vehicle production bases are obtained, the cyclic redundancy value can be determined accordingly, encryption of the AES algorithm is carried out once by each cyclic redundancy value, and therefore alternative security keys of each character length are generated, and the alternative security keys can be 10 characters, 32 characters, 64 characters, 128 characters and 256 characters. Each base can then extract the required character length of the electronic security key according to its own requirements.
In another embodiment, as shown in fig. 2, after step S600, the method further includes:
and step S800, the base user key is used as a third plaintext of the asymmetric encryption algorithm, and the asymmetric encryption algorithm is used for encrypting the base user key so as to decrypt the base user key by using the asymmetric encryption algorithm and the electronic security key when the base user key needs to interact with the data of the vehicle. In one embodiment, the asymmetric encryption algorithm is the RSA algorithm. The execution order of step S800 and step S700 is not limited herein.
The RSA encryption step generally includes:
1. defining two larger prime numbers p and q (which can be set from a database, a cloud or a configuration file);
2. calculating n ═ p × q;
3. calculating a public key index e which is a number relatively prime to (p-1) × (q-1);
4. the RSA encryption C is M ^ e mod n, wherein M is the ESK code generated by the AES algorithm, C is the generated RSA secret key, and mod is a modulus operator;
the decryption step generally comprises:
1. similar to encryption steps 1-3;
2. calculating a public key index d derived from (d × e) mod ((p-1) × (q-1)) ═ 1;
3. decryption yields the plaintext M ═ C ^ d mod n, where C is the key generated by the encryption step 4.
Fig. 3 is a schematic diagram of a method for generating, encrypting and decrypting an electronic anti-theft code of an automobile according to an embodiment of the invention. In a further embodiment, as shown in fig. 3, the encryption and decryption process after step S650 is as follows:
receiving an RSA public key of a sending end;
generating an RSA ciphertext according to a third plaintext, an RSA public key and an RSA algorithm;
and sending the RSA ciphertext and the electronic security key to the sending end so that the sending end can decrypt according to the RSA ciphertext and the electronic security key.
The 11 th digit value in the VIN code can be used to extract a corresponding RSA key pair, a public key in the key pair is used to encrypt the key of the AES algorithm, a private key is used to decrypt the key of the AES algorithm, and the data provided after the encryption and decryption by the RSA algorithm is the encryption key of the AES algorithm.
One disadvantage of symmetric encryption and decryption is that both encryption and decryption require the use of the same key. In the manufacturing process, if data information is stolen by an illegal user when an ESK code is interacted among multiple systems or distributed systems, the secret leakage is caused, and troubles and potential safety hazards are brought. The asymmetric algorithm RSA is different from the symmetric algorithm AES in that the secret key is divided into two parts, one part is a public key and the other part is a private key. The public key is short for a public key and is transmitted through a network; and the private key, short the private key, is retained by the generator. This will solve the problem of key management for generating ESK codes. However, if only the RSA algorithm is used for encryption and decryption, the encryption speed will be slower and slower as the model data is larger.
In this embodiment, a symmetric encryption algorithm and an asymmetric encryption algorithm are combined, an ESK code is generated by encrypting using the symmetric encryption algorithm (e.g., AES algorithm), and then an encryption and decryption operation is performed on a key of the symmetric encryption algorithm using the asymmetric encryption algorithm (RSA algorithm), so that security of data transmission between the server and the remote system or between the server and the client system can be increased.
In one embodiment, the first sub-encryption algorithm may expand the 17-bit VIN code into 32-byte characters according to the following padding rule, i.e. the base security code:
1) designating the character to be filled as a 0 character;
2) 15 0 characters are needed to be filled;
3) and one of the 0 characters is processed differently according to the last character of the VIN number, and the method specifically comprises the following steps: if the last character is 0, filling to the 0 th bit, if the last character is 1, filling to the 1 st bit, and so on, if the last character is 9, filling to the 9 th bit;
4) and the other 14 characters 0, filled to the rearmost of the VIN number.
In one embodiment, the base user key is generated by encrypting the base user password using a second sub-encryption algorithm of the target vehicle production base. For example, the destination vehicle production base, encrypts the user password (which may be a chip code or key code) to a 16-bit base user key using the AES algorithm.
In another embodiment, the base user password is preset and stored in the storage unit of the vehicle, so that the base user key of the target vehicle production base does not need to be called, and the base user key can be used for participating in the subsequent ESK code production process more conveniently and flexibly.
The invention also provides an encryption and decryption system, which comprises a control unit, wherein the control unit comprises a memory and a processor, the memory stores a control program, and the control program is used for realizing the generation, encryption and decryption method of the automobile electronic anti-theft code in any embodiment or the combination of the embodiments when being executed by the processor. The processor may be a Central Processing Unit (CPU), a digital processing unit, or the like. The processor receives and transmits data through the communication interface. The memory is used for storing programs executed by the processor. The memory is any medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by the computer, or a combination of memories. The above-described computing program may be downloaded from a computer-readable storage medium to a corresponding computing/processing device or to a computer or external storage device via a network (e.g., the internet, a local area network, a wide area network, and/or a wireless network).
When the target vehicle base corresponding to the vehicle is provided with the first encryption sub-algorithm for encrypting the VIN, the first encryption sub-algorithm can be called to encrypt the VIN and then participate in the subsequent encryption program for generating the electronic security key, and vehicles of some base which is not provided with the VIN encryption algorithm can be directly encrypted by using the VIN, so that the new and old algorithms can be compatible, and the generation of the electronic security key with unified multi-brand algorithms can be realized.
Thus, it should be appreciated by those skilled in the art that while a number of exemplary embodiments of the invention have been illustrated and described in detail herein, many other variations or modifications consistent with the principles of the invention may be directly determined or derived from the disclosure of the present invention without departing from the spirit and scope of the invention. Accordingly, the scope of the invention should be understood and interpreted to cover all such other variations or modifications.

Claims (10)

1. A generation, encryption and decryption method of an electronic anti-theft code of an automobile is characterized by comprising the following steps:
acquiring a VIN code and a base user key of a vehicle;
identifying a target vehicle production base corresponding to the VIN code according to the VIN code;
judging whether the target vehicle production base is provided with a first encryption sub-algorithm for encrypting the VIN code;
if not, combining the VIN code and the base user key into a first plaintext with a first character length;
if yes, calling the first encryption sub-algorithm to encrypt the VIN code and generate a base anti-theft code, and converting the base anti-theft code into a second plaintext with the first character length according to a preset character conversion algorithm;
generating an electronic security key with a preset character length by the first plaintext or the second plaintext according to a first encryption algorithm;
and storing the electronic security key to a control unit of the vehicle as an electronic anti-theft code of the data of the target vehicle production base.
2. The method for generating, encrypting and decrypting the electronic anti-theft code for automobiles according to claim 1,
the first encryption algorithm is a symmetric encryption algorithm.
3. The method for generating, encrypting and decrypting the electronic anti-theft code for the automobile according to claim 2, wherein the step of generating the electronic security key with a preset character length by the first plaintext or the second plaintext according to a first encryption algorithm comprises:
generating a plurality of alternative security keys of a plurality of character lengths according to character length requirements of different vehicle production bases and the first encryption algorithm;
and selecting a key with a corresponding character length from the plurality of optional security keys as the electronic security key according to the character length of the target vehicle production base.
4. The method for generating, encrypting and decrypting the electronic anti-theft code for the automobile according to claim 3, wherein the step of generating the electronic security key with a preset character length by the first plaintext or the second plaintext according to the first encryption algorithm further comprises the following steps:
and taking the home subscriber key as a third plaintext of an asymmetric encryption algorithm, and encrypting the home subscriber key by using the asymmetric encryption algorithm so as to decrypt by using the asymmetric algorithm and the electronic security key when data of the vehicle needs to be interacted.
5. The method for generating, encrypting and decrypting the electronic anti-theft code for automobiles according to claim 4,
the asymmetric encryption algorithm is an RSA algorithm.
6. The method for generating, encrypting and decrypting the electronic anti-theft code for automobiles according to claim 5, wherein the step of using the home subscriber key as a third plaintext of an asymmetric encryption algorithm and encrypting the home subscriber key by using the asymmetric encryption algorithm further comprises:
receiving an RSA public key of a sending end;
generating an RSA ciphertext according to the third plaintext, the RSA public key and the RSA algorithm;
and sending the RSA ciphertext and the electronic security key to the sending end so that the sending end can decrypt according to the RSA ciphertext and the electronic security key.
7. The generation, encryption and decryption method of the electronic anti-theft code for automobiles according to any one of claims 1 to 5,
and the base user secret key is generated by encrypting a base user password through a second sub-encryption algorithm of the target vehicle production base.
8. The generation, encryption and decryption method of the electronic anti-theft code for automobiles according to any one of claims 1 to 5,
the base user password is preset and stored in a storage unit of the vehicle.
9. The generation, encryption and decryption method of the electronic anti-theft code for automobiles according to any one of claims 1 to 5,
the control unit comprises an electronic control unit and a keyless entry and start unit of the vehicle.
10. An encryption and decryption system, comprising a control unit, wherein the control unit comprises a memory and a processor, the memory stores a control program, and the control program is used for realizing the generation and encryption and decryption method of the electronic anti-theft code of the automobile according to any one of claims 1-9 when being executed by the processor.
CN202111044883.2A 2021-09-07 2021-09-07 Method and system for generating, encrypting and decrypting automobile electronic anti-theft code Active CN113783687B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111044883.2A CN113783687B (en) 2021-09-07 2021-09-07 Method and system for generating, encrypting and decrypting automobile electronic anti-theft code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111044883.2A CN113783687B (en) 2021-09-07 2021-09-07 Method and system for generating, encrypting and decrypting automobile electronic anti-theft code

Publications (2)

Publication Number Publication Date
CN113783687A true CN113783687A (en) 2021-12-10
CN113783687B CN113783687B (en) 2023-08-29

Family

ID=78841513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111044883.2A Active CN113783687B (en) 2021-09-07 2021-09-07 Method and system for generating, encrypting and decrypting automobile electronic anti-theft code

Country Status (1)

Country Link
CN (1) CN113783687B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114944936A (en) * 2022-04-24 2022-08-26 华控清交信息科技(北京)有限公司 Privacy routing server, encryption protocol conversion method and machine readable storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004040273A (en) * 2002-07-01 2004-02-05 Cosmo:Kk Data security maintaining method and apparatus in network camera, home gateway, and home automation apparatus
EP1480145A1 (en) * 2003-05-22 2004-11-24 Toyota Jidosha Kabushiki Kaisha Vehicle identification code storing device and method for storing vehicle identification code
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN107610278A (en) * 2017-07-31 2018-01-19 宁波远景汽车零部件有限公司 Intelligent key learning method and system
CN108476136A (en) * 2016-01-18 2018-08-31 三菱电机株式会社 Encryption device, ciphertext conversion equipment, encipheror, ciphertext conversion program, encryption method and ciphertext conversion method
CN108810113A (en) * 2018-05-29 2018-11-13 上海博泰悦臻电子设备制造有限公司 A kind of data communications method and system between vehicle and vehicle
CN108944784A (en) * 2018-08-02 2018-12-07 安徽江淮汽车集团股份有限公司 The authentication method and system of engine anti-theft unit
CN109624919A (en) * 2018-12-25 2019-04-16 爱驰汽车有限公司 VATS Vehicle Anti-Theft System configuration method, computer readable storage medium and terminal
US20200013241A1 (en) * 2018-07-09 2020-01-09 Ikeyless, Llc Systems and methods for creating key backups by identifying and storing unique key information and for replicating unique keys from key backups
WO2020232854A1 (en) * 2019-05-22 2020-11-26 平安科技(深圳)有限公司 Vehicle unlocking method and apparatus, and computer device and storage medium
CN112339707A (en) * 2019-08-09 2021-02-09 广州汽车集团股份有限公司 ETC vehicle-mounted unit anti-disassembly method and system and automobile
CN112383899A (en) * 2020-09-23 2021-02-19 芜湖莫森泰克汽车科技股份有限公司 Method for remotely upgrading vehicle window anti-pinch ECU (electronic control unit) program based on 5G network
CN113276801A (en) * 2021-06-28 2021-08-20 东风汽车集团股份有限公司 Vehicle anti-theft identification matching method and system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004040273A (en) * 2002-07-01 2004-02-05 Cosmo:Kk Data security maintaining method and apparatus in network camera, home gateway, and home automation apparatus
EP1480145A1 (en) * 2003-05-22 2004-11-24 Toyota Jidosha Kabushiki Kaisha Vehicle identification code storing device and method for storing vehicle identification code
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN105262586A (en) * 2015-10-28 2016-01-20 铁将军汽车电子有限公司 Key distribution method and apparatus for automobile theftproof equipment
CN105635147A (en) * 2015-12-30 2016-06-01 深圳市图雅丽特种技术有限公司 Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN108476136A (en) * 2016-01-18 2018-08-31 三菱电机株式会社 Encryption device, ciphertext conversion equipment, encipheror, ciphertext conversion program, encryption method and ciphertext conversion method
CN107610278A (en) * 2017-07-31 2018-01-19 宁波远景汽车零部件有限公司 Intelligent key learning method and system
CN108810113A (en) * 2018-05-29 2018-11-13 上海博泰悦臻电子设备制造有限公司 A kind of data communications method and system between vehicle and vehicle
US20200013241A1 (en) * 2018-07-09 2020-01-09 Ikeyless, Llc Systems and methods for creating key backups by identifying and storing unique key information and for replicating unique keys from key backups
CN108944784A (en) * 2018-08-02 2018-12-07 安徽江淮汽车集团股份有限公司 The authentication method and system of engine anti-theft unit
CN109624919A (en) * 2018-12-25 2019-04-16 爱驰汽车有限公司 VATS Vehicle Anti-Theft System configuration method, computer readable storage medium and terminal
WO2020232854A1 (en) * 2019-05-22 2020-11-26 平安科技(深圳)有限公司 Vehicle unlocking method and apparatus, and computer device and storage medium
CN112339707A (en) * 2019-08-09 2021-02-09 广州汽车集团股份有限公司 ETC vehicle-mounted unit anti-disassembly method and system and automobile
CN112383899A (en) * 2020-09-23 2021-02-19 芜湖莫森泰克汽车科技股份有限公司 Method for remotely upgrading vehicle window anti-pinch ECU (electronic control unit) program based on 5G network
CN113276801A (en) * 2021-06-28 2021-08-20 东风汽车集团股份有限公司 Vehicle anti-theft identification matching method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡展国 等: "基于RSA与AES组合算法在汽车领域应用研究", ELECTRONICS WORLD・技术交流 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114944936A (en) * 2022-04-24 2022-08-26 华控清交信息科技(北京)有限公司 Privacy routing server, encryption protocol conversion method and machine readable storage medium

Also Published As

Publication number Publication date
CN113783687B (en) 2023-08-29

Similar Documents

Publication Publication Date Title
US8660266B2 (en) Method of delivering direct proof private keys to devices using an on-line service
JP6345157B2 (en) In-vehicle information communication system and authentication method
AU2008327506B2 (en) Method and system for encryption of data
CN113691502B (en) Communication method, device, gateway server, client and storage medium
WO2006025952A2 (en) Method of delivering direct proof private keys to devices using a distribution cd
CN110855616B (en) Digital key generation system
CN112738051B (en) Data information encryption method, system and computer readable storage medium
CN112532580B (en) Data transmission method and system based on block chain and proxy re-encryption
US7620186B2 (en) Method for establishing an encrypted communication by means of keys
CN112840683B (en) Vehicle key management method, device and system
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN115665138A (en) Automobile OTA (over the air) upgrading system and method
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN113783687B (en) Method and system for generating, encrypting and decrypting automobile electronic anti-theft code
CN117318941B (en) Method, system, terminal and storage medium for distributing preset secret key based on in-car network
CN111008400A (en) Data processing method, device and system
CN116318784B (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN113518244B (en) Digital television signal data transmission method and device based on substitute text combination
CN107872312B (en) Method, device, equipment and system for dynamically generating symmetric key
CN116232639A (en) Data transmission method, device, computer equipment and storage medium
CN115174083A (en) Internet of vehicles information encryption method and device and Internet of vehicles system
US7327845B1 (en) Transmission of encrypted messages between a transmitter and a receiver utilizing a one-time cryptographic pad
US12026259B2 (en) Method and system for securely provisioning electronic devices
CN114584321B (en) Data information encryption deployment method based on PUF device
CN110830414B (en) Encryption method and device, decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant