CN114025329A - Method for realizing standby NFC key in CCC application mobile terminal - Google Patents

Method for realizing standby NFC key in CCC application mobile terminal Download PDF

Info

Publication number
CN114025329A
CN114025329A CN202111306067.4A CN202111306067A CN114025329A CN 114025329 A CN114025329 A CN 114025329A CN 202111306067 A CN202111306067 A CN 202111306067A CN 114025329 A CN114025329 A CN 114025329A
Authority
CN
China
Prior art keywords
nfc
key
vehicle
mobile phone
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111306067.4A
Other languages
Chinese (zh)
Inventor
施柳超
倪键
顾蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Youqing Iot Technology Co ltd
Original Assignee
Shanghai Youqing Iot Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Youqing Iot Technology Co ltd filed Critical Shanghai Youqing Iot Technology Co ltd
Priority to CN202111306067.4A priority Critical patent/CN114025329A/en
Publication of CN114025329A publication Critical patent/CN114025329A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method for realizing a standby NFC key in a CCC application mobile terminal, wherein a vehicle enterprise provides a legal authorization NFC card to a vehicle owner; when a vehicle owner shares a key through a mobile phone APP, setting a mobile phone NFC as a card reader mode, and starting a frequency field and an NFC card for interaction; the mobile phone NFC requests a random number, and a signature result and a certificate chain are returned; the mobile phone verifies the signature result and the certificate chain information, and the upper card issuing sheet is identified to the cloud of the vehicle enterprise; the vehicle enterprise returns a public key of a vehicle end certificate of the bound vehicle and special data of NFCID; the NFC mobile phone and the NFC card generate standard shareinfo and shareinfo | PD as data sources to generate an AESKEY symmetric key through a standard ECDH mode. The method for realizing the standby NFC key in the CCC application mobile terminal facilitates simple and rapid vehicle NFC key sharing, ensures encryption manufacturing and avoids data leakage.

Description

Method for realizing standby NFC key in CCC application mobile terminal
Technical Field
The invention relates to the technical field of vehicle networks and intelligent automobile digital keys, in particular to a method for realizing a standby NFC key in a CCC application mobile terminal.
Background
In the current CCC (Car Connectivity association-automotive alliance) alliance, the current CCC alliance comprises two protocol versions of Digital Key specifications (Car Connectivity association Digital Key Release 2-automotive alliance Digital Key protocol 2.0 specification) and CCC3.0(Car Connectivity association Digital Key Release 3-automotive alliance Digital Key protocol 3.0 specification), wherein the former supports the NFC use function, and the latter adds the BLE communication and UWB positioning functions on the basis of the former;
in the CCC2.0 protocol specification, all digital keys must be carried by mobile phones, and no matter whether the mobile phones of car owners are activated or the keys are shared, data interaction must be performed in an on _ line mode. When the proportion of the number of the functional modules supporting the NFC is less than 20 percent, such as when keys are shared by family or friends, the other party must be a mobile phone supporting the functions of the NFC module, and otherwise the mobile phone cannot be used. More times, when selling the automobile with the digital key, the automobile enterprises can prepare a matched spare key (NFC card) for the automobile owner, and can use the automobile under some emergency situations. Due to the obvious technical and regulatory definition of CCC2.0 on the key sharing policy, it is difficult for a vehicle enterprise to provide a spare NFC key that can be used for unbound factory vehicles.
Therefore, we propose a method for implementing a standby NFC key in a mobile end of a CCC application in order to solve the problems proposed in the above.
Disclosure of Invention
The invention aims to provide a method for realizing a standby NFC key in a CCC application mobile terminal, so as to solve the problem that a vehicle enterprise is difficult to provide a usable standby NFC key for unbound factory vehicles due to the obvious technical and rule definition of CCC2.0 on a key sharing strategy in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme: a method for realizing a standby NFC key in a CCC application mobile terminal comprises the following steps:
the method comprises the following steps: providing, by the vehicle enterprise, a legally authorized NFC card to the vehicle owner;
step two: when the car owner shares the key through the mobile phone APP, the mobile phone NFC is set to be in a card reader mode, and the frequency field and the NFC card are started for interaction.
Step three: and (3) requesting a random number (a) by the NFC of the mobile phone, enabling the NFC card to perform standard SHA256with ECDSA, and returning a signature result and a certificate chain.
Step four: the mobile phone verifies the signature result and the certificate chain information, and the card sending sheet is identified to the cloud of the vehicle enterprise.
Step five: the vehicle enterprise returns a public key of a vehicle end certificate of the bound vehicle and special data of NFCID;
step six: the NFC mobile phone and the NFC card generate a standard shareinfo, shareinfo | PD is used as a data source to generate an AESKEY symmetric key, and the AESKEY symmetric key is issued for standard sharing key data (sharing) to be encrypted through an AES _ CBC mode and sent to the NFC card.
Step seven: the NFC card generates ECC _ KP, uses ECC _ SK to sign sharing, shares format response according to standard format and encrypts through AES _ CBC mode
Step eight: the NFC mobile phone selects CFA, calls a standard CCC instruction < < Automizeredpoint > >, forms private mailbox standby NFC key for sharing verification to realize method attack data in a CCC application mobile terminal, and the result is encrypted and sent to the NFC card through an AES _ CBC mode.
Step nine: the method of storing the standby NFC key of the mailbox by the NFC in the CCC application mobile terminal is attestion, and the standby NFC key can be used as a key for a standard sharer user subsequently.
Preferably, the PD includes a vehicle identification code, a vehicle end certificate, a vehicle end public key, an anti-theft token, an apparatus public and private key, a vehicle number, and key slot position information.
Compared with the prior art, the invention has the beneficial effects that: the method for realizing the standby NFC key in the CCC application mobile terminal facilitates simple and rapid sharing of the vehicle NFC key, can ensure encryption manufacturing, and avoids data leakage and the like.
Drawings
FIG. 1 is a schematic flow chart of the system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: a method for realizing a standby NFC key in a CCC application mobile terminal comprises the following steps:
the method comprises the following steps: providing a legally authorized NFC (Near Field Communication) card to the vehicle owner by the vehicle enterprise;
step two: when the car owner shares the key through the mobile phone APP, the mobile phone NFC is set to be in a card reader mode, and the frequency field and the NFC card are started for interaction.
Step three: and (3) requesting a random number (a) by the NFC of the mobile phone, enabling the NFC card to perform standard SHA256with ECDSA, and returning a signature result and a certificate chain.
Step four: the mobile phone verifies the signature result and the certificate chain information, and the card issuing sheet is identified to the cloud of the vehicle enterprise by an identification Number (NFCID).
Step five: the Vehicle enterprise returns a Vehicle end certificate Public Key (Vehicle Public Key-V _ PK) of the bound Vehicle and NFCID special proprietary Data (Prop Data-PD);
step six: the NFC mobile phone and the NFC card generate a Standard shareinfo in an ECDH (Elliptic Curve Diffie-Hellman key Exchange-Elliptic Curve Diffie-Hellman key Exchange) mode, the shareinfo | PD serves as a data source to generate an AESKEY symmetric key, and the shared key data (sharing) used for the Standard is sent to the NFC card in an AES _ CBC (Advanced Encryption Standard) mode for Encryption and sending to the NFC card.
Step seven: the NFC card generates ECC _ KP (ECC Key Pair-elliptic curve Key Pair), signs the sharing by using ECC _ SK (ECC Public Key-Public Key), shares format response according to standard format and encrypts by AES _ CBC mode
Step eight: the NFC mobile phone selects CFA (CCC Framework AID-CCC component application AID), calls a standard CCC instruction < < authorization endpoint > >, forms private mailbox standby NFC key for sharing verification to realize method attack data in a CCC application mobile terminal, and sends the result to the NFC card through AES-CBC mode encryption.
Step nine: the method of storing the standby NFC key of the mailbox by the NFC in the CCC application mobile terminal is attestion, and the standby NFC key can be used as a key for a standard sharer user subsequently.
Further, the PD includes a vehicle identification code, a vehicle end certificate, a vehicle end public key, an antitheft token, an equipment public and private key, a vehicle number, and key slot position information.
When key sharing is carried out through a mobile phone APP specifically, a mobile phone NFC is set to be in a card reader mode, and a frequency field is started to interact with an NFC card;
and requesting a random number (a) through the NFC of the mobile phone, enabling the NFC card to perform standard SHA256withECDSA (elliptic curve signature), and returning a signature result (signature) and a certificate chain (chain) to the mobile phone.
Verifying the signature result (signature) and certificate chain (chain) information by the mobile phone, sending a card issuing NFCID to the cloud of the vehicle enterprise, and inquiring card special information;
the vehicle enterprise returns a vehicle end certificate public key (V _ PK) and NFCID special Private Data (PD) of the bound vehicle; the NFC mobile phone and the NFC card generate a standard shareinfo, shareinfo | PD is used as a data source to generate an AESKEY symmetric key, and the AESKEY symmetric key is issued for standard sharing key data (sharing) to be encrypted through an AES _ CBC mode and sent to the NFC card.
The NFC card generates ECC _ KP, uses ECC _ SK to sign (sharing), responds according to a standard format sharing format and is encrypted through an AES _ CBC mode, the NFC mobile phone selects CFA, calls a standard CCC instruction < < Autoorize end > >, forms private mailbox authentication data for sharing verification, and sends the result to the NFC card through the AES _ CBC mode in an encrypted mode.
The NFC holds the mailbox authentication, which can subsequently be used as a standard sharer user to use the key.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and all the changes or substitutions should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (2)

1. A method for realizing a standby NFC key in a CCC application mobile terminal is characterized by comprising the following steps:
the method comprises the following steps: providing, by the vehicle enterprise, a legally authorized NFC card to the vehicle owner;
step two: when a vehicle owner shares a key through a mobile phone APP, setting a mobile phone NFC as a card reader mode, and starting a frequency field and an NFC card for interaction;
step three: the NFC of the mobile phone requests a random number (a), the NFC card carries out standard SHA256withECDSA on the random number, and a signature result and a certificate chain are returned;
step four: the mobile phone verifies the signature result and the certificate chain information, and the upper card issuing sheet is identified to the cloud of the vehicle enterprise;
step five: the vehicle enterprise returns a public key of a vehicle end certificate of the bound vehicle and special data of NFCID;
step six: the NFC mobile phone and the NFC card generate a standard shareinfo in a standard ECDH mode, the shareinfo | PD serves as a data source to generate an AESKEY symmetric key, and data (sharing) used for the standard is sent to the NFC card in an AES _ CBC mode in an encrypted mode;
step seven: the NFC card generates ECC _ KP, uses ECC _ SK to sign sharing, and shares format response according to a standard format and encrypts through an AES _ CBC mode;
step eight: the NFC mobile phone selects CFA, calls a standard CCC instruction < < authorization end > >, forms private mailbox standby NFC key for sharing verification to realize method attack data in a CCC application mobile terminal, and sends the result to an NFC card through AES-CBC mode encryption;
step nine: the method of storing the standby NFC key of the mailbox by the NFC in the CCC application mobile terminal is attestion, and the standby NFC key can be used as a key for a standard sharer user subsequently.
2. A method for implementing the standby NFC key in a mobile terminal for CCC application according to claim 1, wherein: the PD comprises a vehicle identification code, a vehicle end certificate, a vehicle end public key, an anti-theft token, an equipment public and private key, a vehicle number and key slot position information.
CN202111306067.4A 2021-11-05 2021-11-05 Method for realizing standby NFC key in CCC application mobile terminal Pending CN114025329A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111306067.4A CN114025329A (en) 2021-11-05 2021-11-05 Method for realizing standby NFC key in CCC application mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111306067.4A CN114025329A (en) 2021-11-05 2021-11-05 Method for realizing standby NFC key in CCC application mobile terminal

Publications (1)

Publication Number Publication Date
CN114025329A true CN114025329A (en) 2022-02-08

Family

ID=80061552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111306067.4A Pending CN114025329A (en) 2021-11-05 2021-11-05 Method for realizing standby NFC key in CCC application mobile terminal

Country Status (1)

Country Link
CN (1) CN114025329A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115273289A (en) * 2022-09-20 2022-11-01 上海银基信息安全技术股份有限公司 Physical key activation method, system, device, equipment and medium
CN115675361A (en) * 2022-11-30 2023-02-03 成都赛力斯科技有限公司 Cabin state adjusting method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110136306A (en) * 2019-05-16 2019-08-16 广州小鹏汽车科技有限公司 Vehicle key control method and system
US20200148168A1 (en) * 2018-11-09 2020-05-14 Ford Global Technologies, Llc System and method for distributing digital vehicle keys to passive nfc devices via nfc
US20200160635A1 (en) * 2018-11-19 2020-05-21 Aisin Seiki Kabushiki Kaisha Door lock system and handle of door for vehicle
CN112509180A (en) * 2019-09-13 2021-03-16 福特全球技术公司 Spare key with wireless function
CN113301167A (en) * 2021-06-30 2021-08-24 深圳市雪球科技有限公司 Cross-specification sharing method, device and equipment of digital key

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200148168A1 (en) * 2018-11-09 2020-05-14 Ford Global Technologies, Llc System and method for distributing digital vehicle keys to passive nfc devices via nfc
US20200160635A1 (en) * 2018-11-19 2020-05-21 Aisin Seiki Kabushiki Kaisha Door lock system and handle of door for vehicle
CN110136306A (en) * 2019-05-16 2019-08-16 广州小鹏汽车科技有限公司 Vehicle key control method and system
CN112509180A (en) * 2019-09-13 2021-03-16 福特全球技术公司 Spare key with wireless function
CN113301167A (en) * 2021-06-30 2021-08-24 深圳市雪球科技有限公司 Cross-specification sharing method, device and equipment of digital key

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115273289A (en) * 2022-09-20 2022-11-01 上海银基信息安全技术股份有限公司 Physical key activation method, system, device, equipment and medium
CN115675361A (en) * 2022-11-30 2023-02-03 成都赛力斯科技有限公司 Cabin state adjusting method and system

Similar Documents

Publication Publication Date Title
KR102219756B1 (en) Method for managing the state of connected devices
CN1251549C (en) Method for enabling PKI functionsin a smart card
CN101978675B (en) System and method for securely issuing subscription credentials to communication devices
CN109842862A (en) Secure short range wireless communication connection is established in the car
Förster et al. PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET)
CN101765105B (en) Method for realizing communication encryption as well as system and mobile terminal therefor
CN114025329A (en) Method for realizing standby NFC key in CCC application mobile terminal
CN109874125A (en) The car owner&#39;s authorization method and system of bluetooth key, storage medium and vehicle Cloud Server
CN102118246A (en) System and method for performing an asymmetric key exchange between a vehicle and a remote device
HRP20160140T1 (en) A qualified electronic signature system, associated method and mobile phone device for a qualified electronic signature
CN101990201B (en) Method, system and device for generating general bootstrapping architecture (GBA) secret key
CN103037366A (en) Mobile terminal user authentication method and mobile terminal based on asymmetric cryptographic technique
WO2019056971A1 (en) Authentication method and device
WO2011076102A1 (en) Implementing method, system of universal card system and smart card
CN114764956B (en) Control method and device for vehicle and readable storage medium
CN104506527A (en) Multidimensional information pointer platform and data access method thereof
CN104994006A (en) Back-to-back instant communication method and device based on WeChat public number
CN114867011A (en) Vehicle-mounted data transmission device and method, vehicle and vehicle-mounted data transmission system
CN111247770B (en) Method and related system for protecting vehicle external communication by using IBC
CN103916851A (en) Safety certification method, device and system
CN108933761A (en) A kind of the control flow encryption method and system of Intelligent hardware product
CN107396359A (en) A kind of method and apparatus for controlling access mobile data network
CN104639326B (en) A kind of method of controlling security based on certification, apparatus and system
KR20140071843A (en) Method and system for providing a genuine certification service based on nfc tag
CN102013979A (en) Anti-counterfeiting authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination