CN114613042A - Software configuration method and device for universal automobile key - Google Patents

Software configuration method and device for universal automobile key Download PDF

Info

Publication number
CN114613042A
CN114613042A CN202210176952.3A CN202210176952A CN114613042A CN 114613042 A CN114613042 A CN 114613042A CN 202210176952 A CN202210176952 A CN 202210176952A CN 114613042 A CN114613042 A CN 114613042A
Authority
CN
China
Prior art keywords
authentication information
instruction
identity authentication
software
theft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210176952.3A
Other languages
Chinese (zh)
Other versions
CN114613042B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xhorse Electronics Co Ltd
Original Assignee
Shenzhen Xhorse Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xhorse Electronics Co Ltd filed Critical Shenzhen Xhorse Electronics Co Ltd
Priority to CN202210176952.3A priority Critical patent/CN114613042B/en
Publication of CN114613042A publication Critical patent/CN114613042A/en
Application granted granted Critical
Publication of CN114613042B publication Critical patent/CN114613042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a software configuration method and a device of a universal automobile key, belonging to the technical field of automobile electronics and comprising the following steps: receiving a first instruction; acquiring first identity authentication information according to the first instruction, and sending the first identity authentication information to initialization equipment; receiving a second instruction; and acquiring second identity authentication information according to the second instruction, sending the second identity authentication information to the initialization device so that the initialization device matches the first identity authentication information with target identity authentication information corresponding to the second identity authentication information, and if the matching is successful, the initialization device configures software to the automobile key. The method can be used for realizing software configuration of various vehicle types, the anti-theft software and the remote control software are both stored in an erasable memory, when the vehicle type controlled by the vehicle key needs to be replaced, the existing anti-theft software and the existing remote control software are erased, and the method is reused for configuring the software corresponding to the target vehicle type in the vehicle key, so that hardware does not need to be replaced, and resource occupation is reduced.

Description

Software configuration method and device for universal automobile key
Technical Field
The invention belongs to the technical field of automobile electronics, and particularly relates to a wireless configuration method of a universal automobile key.
Background
With the annual increase of the automobile holding capacity, the damage and loss quantity of automobile keys are also increased year by year, and the difference of different automobile anti-theft systems and the continuous update of automobile anti-theft technologies lead the automobile keys to have various types and different functions, so that the automobile key serving as a consumable material brings difficulty to the automobile maintenance market.
At present, a typical automobile key mainly comprises an anti-theft chip and a wireless remote control part, wherein the anti-theft chip usually has a unique chip identification number and an authentication key, when an ignition switch is turned on or an automobile is started, the anti-theft chip responds to engine challenge data, and if the response data is correct, the automobile can be started. Different anti-theft chips generally use different hardware communication schemes and different authentication algorithms, and the types of the anti-theft chips are as many as dozens of types. The wireless remote control is usually realized by using an ISM frequency range one-way radio frequency transmitter and a rolling code algorithm scheme, remote control rolling codes are increased in a one-way mode in the using process and are synchronous with data of an automobile body control unit, the transmitting frequency, the code element rate, the rolling code algorithm and the like in remote control systems of different automobile types have various differences, and an automobile key with single frequency and a fixed coding algorithm cannot be matched with different automobile types, so that a user needs to increase the stock quantity of single varieties and occupy a large amount of resources.
Disclosure of Invention
The invention aims to provide a software configuration method and a software configuration device for a universal automobile key, and aims to solve the technical problem that resources are wasted because the automobile key cannot be matched with different automobile types.
In order to achieve the above object, in a first aspect, the present invention provides a software configuration method for a universal car key, including the steps of:
receiving a first instruction sent by initialization equipment, wherein the first instruction is used for requesting first identity authentication information of a remote control unit of the automobile key;
acquiring the first identity authentication information according to the first instruction, and sending the first identity authentication information to the initialization equipment;
receiving a second instruction sent by the initialization device, wherein the second instruction is used for requesting second identity authentication information stored in a storage unit of the automobile key;
and acquiring the second identity authentication information according to the second instruction, and sending the second identity authentication information to the initialization device so that the initialization device matches the first identity authentication information with target identity authentication information corresponding to the second identity authentication information, and if the matching is successful, the initialization device configures software to the automobile key.
In a second aspect, an embodiment of the present invention provides a software configuration device for a universal car key, where the device includes:
the wireless radio frequency module is used for receiving a first instruction and a second instruction sent by initialization equipment and forwarding the first instruction and the second instruction to the anti-theft authentication unit, wherein the first instruction is used for requesting first identity authentication information of a remote control unit of the automobile key, and the second instruction is used for requesting second identity authentication information stored in a storage unit of the automobile key; the initialization device is used for sending the first identity authentication information and the second identity authentication information to the initialization device so that the initialization device matches target identity authentication information corresponding to the first identity authentication information and the second identity authentication information, and if matching is successful, the initialization device configures software to the automobile key;
and the anti-theft authentication unit is used for acquiring the first identity authentication information according to the first instruction forwarded by the wireless radio frequency module, acquiring the second identity authentication information according to the second instruction forwarded by the wireless radio frequency module, and sending the acquired first identity authentication information and the acquired second identity authentication information to the wireless radio frequency module. In a third aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange; the aforementioned computer program causes a computer to perform some or all of the steps as described in the first or second aspect of the embodiments of the present invention.
In a fourth aspect, embodiments of the present invention provide a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program, the computer program being operable to cause a computer to perform some or all of the steps as described in the first or second aspect of embodiments of the present invention. The computer program product may be a software installation package.
The software configuration method and the device for the universal automobile key have the advantages that: by acquiring first identity authentication information and second identity authentication information which have a mapping relation, the initialization equipment matches target identity authentication information corresponding to the first identity authentication information and the second identity authentication information to verify whether hardware is matched, and when the hardware is matched, software is configured on an automobile key; the method can be used for realizing software configuration of various vehicle types, the anti-theft software and the remote control software are both stored in an erasable memory, when the vehicle type controlled by the vehicle key needs to be replaced, the existing anti-theft software and the existing remote control software are erased, and then the anti-theft software and the remote control software corresponding to the target vehicle type are configured in the vehicle key by using the method, hardware does not need to be replaced, only the software needs to be replaced, and the resource occupation is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural view of a universal car key;
FIG. 2 is a flow chart illustrating a software configuration method for a universal car key;
FIG. 3 is a flow chart of key and base station interaction;
FIG. 4 is a data type diagram of the interaction of a base station and an NXP chip;
FIG. 5 is a flow chart illustrating the configuration of the anti-theft software and the remote control software;
FIG. 6 is a timing diagram of a software configuration of a generic car key;
fig. 7 is a schematic structural diagram of a software configuration device of a general car key.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from the embodiments given herein without making any creative effort shall fall within the protection scope of the present application.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
First, the wireless configuration method of the universal automobile key provided in the present application can be applied, but is not limited to, the automobile key having the structure shown in fig. 1, where the automobile key includes an anti-theft authentication unit, a remote control unit, and a storage unit, and preferably, the anti-theft authentication unit is an NXP chip, the remote control unit is an Si4010 chip, and the storage unit is Flash. Firstly, a low-frequency channel in the air is shown in fig. 1 and is used for data interaction between initialization equipment and an NXP chip; the second representation is a custom data line Si4010_ TO _ NXP, and the custom data line Si4010_ TO _ NXP is used for sending data TO NXP; the third is that the user-defined data line NXP _ TO _ Si4010 is used for transmitting data TO Si4010 through NXP; the I2C data bus for connecting the NXP with the Flash is used for reading and writing the Flash by the NXP; and fifthly, the Si4010 is connected with an I2C data bus of the Flash and is used for reading and writing the Flash by the Si 4010. The following embodiment will describe in detail a software configuration method of a general-purpose car key provided in the present application, taking a car key having a structure as shown in fig. 1 as an example.
In an embodiment, as shown in fig. 2, a flowchart of a software configuration method for a universal car key in this embodiment is shown, where the method includes:
step 101: and receiving a first instruction sent by initialization equipment, wherein the first instruction is used for requesting first identity authentication information of a remote control unit of the automobile key.
Specifically, in this embodiment, the car key is further provided with a wireless radio frequency module, which is not used for receiving a wireless radio frequency signal sent by the initialization device and transmitting the wireless radio frequency signal to the anti-theft authentication unit. The first instruction is sent by the initialization device and received by the wireless radio frequency module. The first instruction is used for requesting first identity authentication information of a remote control unit of the automobile key, wherein the remote control unit is a part of the automobile key for realizing the automobile remote control function.
Step 102: and acquiring the first identity authentication information according to the first instruction, and sending the first identity authentication information to the initialization equipment.
Specifically, after receiving a first instruction, the wireless radio frequency module sends the first instruction to the modulation and demodulation unit, the modulation and demodulation unit converts the first instruction into a corresponding digital signal and sends the digital signal to the anti-theft authentication unit, the anti-theft authentication unit wakes up the remote control unit after receiving the digital signal and then forwards the digital signal corresponding to the first instruction to the remote control unit, after receiving the instruction, the remote control unit sends first identity authentication information to the anti-theft authentication unit, and the anti-theft authentication unit sends the first identity authentication information to the initialization device through the modulation and demodulation unit and the wireless radio frequency module. Wherein, the first identity authentication information is an identity identification number of the remote control unit.
Step 103: and receiving a second instruction sent by the initialization equipment, wherein the second instruction is used for requesting second identity authentication information of the storage unit of the automobile key.
Similarly, the second command is sent by the initialization device and received by the radio frequency module. The second instruction is used for requesting second identity authentication information stored in a storage unit of the automobile key, the storage unit is a memory used for storing a remote control program of the remote control unit on the automobile key, preferably, the storage unit adopts a Flash memory, and the remote control program of the remote control unit is stored in Flash. When a remote control function is realized on a vehicle, a remote control unit loads a remote control program from Flash through a serial bus, wherein the remote control program comprises a remote control basic program and a remote control application program, the remote control basic program is used for controlling the remote control unit to run the remote control application program or controlling the remote control unit to enter a configuration mode, the configuration mode is a mode in which a vehicle key can be configured with software, and the software can be configured with the vehicle key only in the configuration mode; the remote control application program is used for generating remote control waveforms with different vehicle type frequencies, coding formats and algorithms and sending the remote control waveforms to the vehicle to realize a remote control function on the vehicle, and the remote control waveforms with different vehicle type frequencies, coding formats and algorithms enable the vehicle key to be suitable for different vehicle types.
Step 104: and acquiring the second identity authentication information according to the second instruction, and sending the second identity authentication information to the initialization device, so that the initialization device matches the first identity authentication information with target identity authentication information corresponding to the second identity authentication information, and if the matching is successful, the initialization device configures software to the automobile key.
Specifically, after receiving the second instruction, the wireless radio frequency module sends the second instruction to the modulation and demodulation unit, the modulation and demodulation unit converts the second instruction into a corresponding digital signal and sends the digital signal to the anti-theft authentication unit, and after receiving the digital signal, the anti-theft authentication unit reads the second identity authentication information from the storage unit and then sends the second identity authentication information to the initialization device through the modulation and demodulation unit and the wireless radio frequency module.
The second identity authentication information is a signature stored in Flash, the signature has a specific mapping relation with the first identity authentication information of the remote control unit, the initialization device obtains target identity authentication information corresponding to the second identity authentication information according to the mapping relation after receiving the second identity authentication information sent by the radio frequency module, then matches the target identity authentication information with the first identity authentication information obtained previously, if the matching is successful, the hardware is matched, and the initialization device starts to configure corresponding software for the automobile key.
In one embodiment, the interaction between the key and the base station is realized by the direct interaction between the key and the NXP chip (here, the processing of the wireless radio frequency module and the modem unit on the signal is omitted). The coprocessor in the NXP chip simultaneously comprises Hitag2/Hitag3, 11,12,13 and other arithmetic logics, so that the NXP chip can be set as a common anti-theft chip which can be compatible with various vehicle types; the NXP chip is provided with two memories of an EEPROM and an Erom, the internal EEPROM is used for storing anti-theft data and is matched with an internal algorithm coprocessor of the chip to realize an anti-theft function, the internal Erom stores an anti-theft user program, the anti-theft user program comprises an anti-theft basic program and an anti-theft application program, the anti-theft basic program controls the NXP chip to enter a configuration mode or run the anti-theft application program, and the NXP chip can be configured with software in the configuration mode; the anti-theft application program realizes the anti-theft function adapting to different vehicle types.
Specifically, as shown in fig. 4, the data types of the base station interacting with the NXP chip may be classified into the following categories (for convenience of description, the initialization apparatus is referred to as the base station in the following description):
1) function instructions
The functional instruction is an instruction which is sent by the base station, received by the NXP chip and required to be executed by the NXP chip; the first byte of the functional instruction is a header; the second byte is an instruction name sent to the NXP chip by the base station; the intermediate data is specific operation data, and the length of the intermediate data is variable; the last 2 bytes are check bits for checking whether the instruction is legal.
2) End instruction
The end instruction is sent by the base station, the NXP chip receives the end instruction and requires the NXP chip to quit the interaction process with the base station; after the software configuration is completed or error reporting information of the NXP chip is received, the base station can send an ending instruction, and the length of the ending instruction is 1 byte.
3) Answer signal
In one embodiment, after receiving a first instruction or a second instruction sent by a base station, an NXP chip sends a response signal to the base station to indicate that a corresponding instruction is received;
the response signal is sent by the NXP chip and received by the base station; after receiving the functional instruction sent by the base station, the NXP chip first replies a response signal, which indicates that the command has been received, wherein the length of the response signal is 1 byte, and the bit sequence of the response signal is the inverse of the bit sequence of the received functional instruction.
4) Query instructions
In one embodiment, the NXP chip sends a response signal, the base station sends a query command at regular time after receiving the response signal, the NXP chip waits for the base station to query after completing a task, and replies base station data after receiving the query command, namely, returns a query result to the initialization device; the query instruction is used for querying whether the corresponding instruction is executed completely. The length of the query instruction is 1 byte.
The base station needs to send different instructions to the NXP chip in the process of completing software configuration, and because task completion time required by each instruction is unequal, if a method that the base station waits for the NXP chip to complete a task and then replies data is adopted, the base station needs to be in a waiting state all the time; however, if the reply data is acquired by adopting the base station timing query mode, on one hand, the base station can perform other work during the task corresponding to the key execution instruction, and on the other hand, after the key completes the task, the base station query can immediately respond, so that the real-time performance of the system is ensured.
5) Error reporting during operation
The operation error report is sent by the NXP chip and received by the base station; when receiving an illegal command or encountering read-write errors and other conditions in the running process, the NXP chip can send an error signal to the base station, so that the robustness of the system is ensured. In one embodiment, the bit sequence of the error signal is run at 0101010111111111.
6) Instruction recovery
The command reply is sent by the NXP chip, the functional command sent by the base station is received by the base station, and after the functional command is obtained, the functional command is replied to the base station through the command reply signal. The head of the command reply signal is 1 byte, the data of the middle part is variable, and the last 2 bytes are check bits according to specific functional commands.
According to the specific data types of the above interaction between the base station and the key, fig. 3 shows the interaction flow of the automobile key and the initialization device, and the base station sends corresponding instructions to the key to arrange the tasks of each step of the software configuration and obtains the current key state by receiving the response of the key. Specifically as shown in fig. 3. Firstly, the base station wakes up the key, and the key enters a configuration mode after confirming that the base station wakes up, and then the base station sends an instruction to the key and the key receives the instruction. The method comprises the steps that a base station sends instructions to a key, wherein the instructions comprise a functional instruction and other instructions such as an end instruction, the functional instruction comprises the first instruction and the second instruction, after the key receives the instructions, whether the instructions are the end instruction is judged, if yes, the key exits from the interaction process with the base station, namely exits from a configuration mode, and returns an operation result of exiting interaction to the base station; if the instruction is not the ending instruction, the key further judges whether the instruction is legal or not, if the judgment result is illegal, the key exits the interaction process with the base station, and if the judgment result is legal, the key executes the instruction. For example, when the instruction is a first instruction in the function command, the key executes the first instruction, the anti-theft authentication unit wakes up the remote control unit after receiving a digital signal converted from the first instruction, then forwards the digital signal to the remote control unit, the remote control unit sends the first identity authentication information to the anti-theft authentication unit after receiving the instruction, and the anti-theft authentication unit sends the first identity authentication information to the initialization device through the modulation and demodulation unit and the wireless radio frequency module. In the instruction executing process, if the NXP chip receives an illegal instruction or encounters the conditions of reading and writing errors and the like in the operation process, an error is reported to the base station to ensure the robustness of the system, the key feeds back the fault state to the base station, and the base station sends the instruction to the key again; if no error is reported in the execution process, the key replies the data to the base station after receiving the inquiry command of the base station, then executes the next command, and after the software configuration is completed, the base station sends an ending command to the key.
In an embodiment, with reference to fig. 4, the functional instruction sent by the base station to the NXP chip specifically includes the following instruction (the first half after the corresponding serial number is an instruction name, and the second half is a specific operation):
(1) reading an EEPROM appointed page of the NXP chip; the method comprises the steps of commanding to read a designated page in an EEPROM memory of an NXP chip, wherein specific operation data in the middle of the command are 1 byte, and are the address and the write-in content of the designated page; the length of the intermediate data in the command reply is 4 bytes, and the intermediate data is read content;
(2) reading a designated storage block of an EEPROM memory in the NXP chip; the method comprises the steps of commanding to read a specified block of an NXP EEPROM, wherein the length of middle specific operation data is 1 byte, and the middle specific operation data is the initial address of the specified storage block; the length of the intermediate data in the command reply is 16 bytes, and the intermediate data is read content;
(3) writing the specified page of the EEPROM memory in the chip; the command is written into an EEPROM designated page in the NXP chip, the length of the middle specific operation data is 5 bytes, and the middle specific operation data is the address and the writing content of the designated storage page; the length of the intermediate data in the instruction reply is 0 byte;
(4) acquiring an anti-theft ID; the method comprises the steps of commanding to read 32-bit ID of an NXP chip, wherein the length of middle specific operation data is 1 byte, and the middle specific operation data is a specified page; the length of the intermediate data in the command reply is 4 bytes, and the intermediate data is read content;
(5) obtaining an APP version of the NXP chip; the method comprises the steps of commanding to obtain a program version of the NXP chip; the length of the middle specific operation data is 0 byte; the length of the intermediate data in the command reply is 4 bytes, and the intermediate data is NXP program version information;
(6) reading data in Flash; the method comprises the steps of commanding to read 16 bytes of content of a Flash current operation address; the length of the intermediate data in the instruction reply is 16 bytes, and the intermediate data is 16 bytes of content of the current operating address of the Flash;
(7) setting a Flash current operation address; setting a Flash current operation address by a command, wherein the length of the middle specific operation data is 2 bytes and is a 16-bit Flash current operation address;
(8) writing data in Flash; the method comprises the steps of commanding to write contents into a current Flash operation address, wherein the length of middle specific operation data is 17 bytes, and first byte mark data is 16 bytes at the front or 16 bytes at the back; when writing the back 16 bytes, writing the current address of the Flash together with the first 16 bytes;
(9) acquiring an ID of Si4010 (namely acquiring first identity authentication information); the command obtains the ID of Si4010, and the NXP chip forwards the command content to Si4010 to obtain the ID; the length of the middle specific operation data in the command is 4 bytes, and the command is a forwarding Si4010 command; the length of the intermediate data in the command reply is 4 bytes, and the intermediate data is the ID of Si 4010;
(10) data are encrypted and written into an Erom memory of the NXP chip; the method comprises the steps of commanding to write data to an operation address of the current Erom of the NXP chip; encrypting data during writing, and updating the final verification during writing; the length of specific operation data in the middle of the command is variable;
(11) checking Erom content of the NXP chip; the command is used for acquiring the verification information of the Erom memory of the NXP chip and replying the verification information to the base station; the data in the reply is 6 bytes, and is check information;
(12) reading firmware version information of the NXP chip; commanding to read Erom version information and replying the Erom version information to the base station; the data in the reply is 4 bytes, and is Erom version information;
(13) configuring Erom operation address of the NXP chip; the command sets the Erom current operation address, with the middle specific operation data being 2 bytes, a 16-bit address.
In one embodiment, the software configured to the key by the base station comprises remote control software installed in the storage unit and anti-theft software installed in the anti-theft authentication unit. In this embodiment, the remote control software for implementing the vehicle remote control function is installed in the storage unit (Flash), the anti-theft software for implementing the vehicle anti-theft function is installed in the anti-theft authentication unit (NXP chip), the specific flow of the Base station to the key configuration software is shown in fig. 5, the timing chart of the software configuration process is shown in fig. 6, Base refers to the Base station, LF, NXPToSi, SiToNXP, I2C: SiToFlash and I2C: NXPToFlash is the data path shown in FIG. 1, and ACK/NAK is the acknowledgement signal. Referring to fig. 1, first, the base station acquires an ID (i.e., first identity authentication information) of Si 4010: the base station sends a functional instruction (9) to the NXP chip through a channel (I) to request Si4010 ID; after receiving the request, the NXP chip responds through the first step and awakens the Si4010 through the third path; the NXP chip sends an ID command for reading Si4010 after the Si4010 is awakened for a period of time delay; after Si4010 receives the command, replying ID from the path (II); after the base station sends the command, the reply data is obtained by sending the query instruction, and the NXP chip enters a waiting state after finishing the command and waits for the query request of the base station; after receiving a base station query request, the NXP chip replies data to the base station from a first path; secondly, the base station acquires a Flash signature (namely second identity authentication information): the base station sends functional instructions (6) and (7) to the NXP chip through a channel (i) to request a Flash signature; after receiving the request, the NXP chip responds through the first channel and reads the signature from the Flash through the second channel; the NXP chip enters a waiting state and replies data to the base station from a first path after receiving a base station query instruction; then, the signature is verified: the base station checks the signature according to the ID of Si4010, if the signature passes the verification, the following steps are continued, otherwise, the configuration process is quitted; further, Si4010 application data is configured: after the base station verifies that the hardware is matched, a channel I sends functional instructions (9) and (10) to the NXP chip, and specific Si4010 application data can be written into Flash through the NXP chip for multiple times; and finally, configuring application data of the NXP chip: the base station sends functional instructions (13) and (10) to the NXP chip through a channel (i), specific NXP chip application data are written into Erom of the NXP chip through the NXP chip for multiple times, and the functional instructions are finally sent (11) for verification.
In one embodiment, the remote control software configured by the base station to the storage unit and the anti-theft software configured by the base station to the anti-theft authentication unit are encrypted to improve the security level and prevent the universal car key from being copied due to the copying of the content of the storage chip.
In one embodiment, when a program needs to be loaded, the NXP application is stored in the Erom of the NXP application, and the application is loaded from a specified starting position during loading; si4010 obtains APP data signature part including program length and program signature from path # in FIG. 1; si4010 checks the signature through a channel (v), the verification rule passes, Si4010 sets the initial address of the application program as the current Flash operation address through the channel (v), and Si4010 loads the application program through the channel (v).
According to the software configuration method of the universal automobile key, the first identity authentication information and the second identity authentication information are obtained and have a mapping relation, so that the initialization equipment matches the target identity authentication information corresponding to the first identity authentication information and the second identity authentication information to verify whether hardware is matched, and when the hardware is matched, software is configured on the automobile key; the method can be used for realizing software configuration of various vehicle types, the anti-theft software and the remote control software are both stored in an erasable memory, when the vehicle type controlled by the vehicle key needs to be replaced, the existing anti-theft software and the existing remote control software are erased, and then the anti-theft software and the remote control software corresponding to the target vehicle type are configured in the vehicle key by using the method, hardware does not need to be replaced, only the software needs to be replaced, and the resource occupation is reduced.
The method embodiments according to the embodiments of the present invention are explained in detail above, and an apparatus embodiment according to the present invention is described below.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a software configuration device of a universal car key according to an embodiment of the present invention; as shown in fig. 7, the apparatus may include a radio frequency module 701, an anti-theft authentication unit 703:
the wireless radio frequency module 701 is used for receiving a first instruction and a second instruction sent by the initialization device and forwarding the first instruction and the second instruction to the anti-theft authentication unit, wherein the first instruction is used for requesting first identity authentication information of a remote control unit of the automobile key, and the second instruction is used for requesting second identity authentication information stored in a storage unit of the automobile key; the first identity authentication information and the second identity authentication information are sent to the initialization equipment, so that the initialization equipment matches target identity authentication information corresponding to the first identity authentication information and the second identity authentication information, and if the matching is successful, the initialization equipment configures software to the automobile key;
the anti-theft authentication unit 703 is configured to obtain first identity authentication information according to the first instruction forwarded by the radio frequency module, obtain second identity authentication information according to the second instruction forwarded by the radio frequency module, and send the obtained first identity authentication information and the obtained second identity authentication information to the radio frequency module.
As shown in fig. 7, the software configuration apparatus of the universal car key may further include:
a modulation and demodulation unit 702, configured to convert the first instruction and the second instruction into corresponding digital signals, and convert the first identity authentication information and the second identity authentication information into corresponding radio frequency signals;
a remote control unit 704 for storing first identity authentication information;
the storage unit 705 is configured to store the second identity authentication information.
The wireless radio frequency module 701 receives a first instruction and a second instruction from the initialization device, and then forwards the first instruction and the second instruction to the modulation and demodulation unit 702, the modulation and demodulation unit 702 converts the first instruction and the second instruction into corresponding digital signals, and then sends the digital signals to the anti-theft authentication unit 703, the anti-theft authentication unit 703 reads corresponding identity authentication information from the remote control unit 704 and the storage unit 705 respectively according to the first instruction and the second instruction, and sends the first identity authentication information and the second identity authentication information to the modulation and demodulation unit 702 for processing, and then the wireless radio frequency module 701 sends the identity authentication information and the second identity authentication information to the initialization device. The software configuration device of the universal automobile key can be used for realizing software configuration of various automobile types, anti-theft software and remote control software are stored in an erasable memory, when the automobile type controlled by the automobile key needs to be replaced, the existing anti-theft software and remote control software are erased, and the anti-theft software and the remote control software corresponding to the target automobile type are configured in the automobile key by using the method, so that hardware does not need to be replaced, only the software needs to be replaced, and resource occupation is reduced.
It should be noted that, in the embodiment of the device of the present invention, the functions of each functional unit of the software configuration device of the universal car key and the technical effects that the device can bring are referred to the related description in the above embodiment of the method, and are not described herein again.
The embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium may store a program, and when the program is executed, the program may include some or all of the steps of any one of the method embodiments described above.
Embodiments of the present invention also provide a computer program or a computer program product, where the computer program may include instructions that, when executed by a computer, enable the computer to perform some or all of the steps including any one of the method embodiments described above.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It should be noted that for simplicity of description, the above-mentioned method embodiments are described as a series of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus can be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. The elements of the above device embodiments may or may not be physically separated, and some or all of the elements may be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product.
Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and may include several instructions to enable a computer device (which may be a personal computer, a server, a network device, or the like, and may specifically be a processor in the computer device) to execute all or part of the steps of the above methods according to the embodiments of the present invention. Among them, the aforementioned storage medium may include: a U-disk, a removable hard disk, a magnetic disk, an optical disk, a Read-Only Memory (ROM) or a Random Access Memory (RAM), and other various media capable of storing program codes. The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (11)

1. A software configuration method for a universal car key, the method comprising:
receiving a first instruction sent by initialization equipment, wherein the first instruction is used for requesting first identity authentication information of a remote control unit of the automobile key;
acquiring the first identity authentication information according to the first instruction, and sending the first identity authentication information to the initialization equipment;
receiving a second instruction sent by the initialization device, wherein the second instruction is used for requesting second identity authentication information stored in a storage unit of the automobile key;
and acquiring the second identity authentication information according to the second instruction, and sending the second identity authentication information to the initialization device so that the initialization device matches the first identity authentication information with target identity authentication information corresponding to the second identity authentication information, and if the matching is successful, the initialization device configures software to the automobile key.
2. The method of claim 1, wherein the car key communicates with the initialization device via a wireless radio frequency module.
3. The method according to claim 1, wherein the software includes remote control software installed in a storage unit of the car key and anti-theft software installed in an anti-theft authentication unit of the car key.
4. The method of claim 3, wherein the anti-theft software and the remote control software are both encrypted.
5. The method of claim 1, wherein obtaining the first authentication information according to the first instruction, and sending the first authentication information to the initialization device comprises:
the wireless radio frequency module of the automobile key sends the received first instruction to the anti-theft authentication unit;
according to the first instruction, the anti-theft authentication unit reads the first identity authentication information from the remote control unit;
the anti-theft authentication unit sends the first identity authentication information read from the remote control unit to the wireless radio frequency module;
and the wireless radio frequency module sends the first identity authentication information to the initialization equipment.
6. The method of claim 1, wherein the obtaining the second authentication information according to the second instruction, and the sending the second authentication information to the initialization device comprises:
the wireless radio frequency module of the automobile key sends the received second instruction to the anti-theft authentication unit;
according to the second instruction, the anti-theft authentication unit reads the second identity authentication information from the storage unit;
the anti-theft authentication unit sends the second identity authentication information read from the storage unit to the wireless radio frequency module;
and the wireless radio frequency module sends the second identity authentication information to the initialization equipment.
7. The method of claim 1, further comprising sending a response signal to the initialization device indicating that the corresponding instruction has been received after receiving the first instruction or the second instruction sent by the initialization device.
8. The method of claim 7, further comprising: after the response signal is sent, receiving a query instruction sent by the initialization equipment at regular time, and returning a query result to the initialization equipment; the query instruction is used for querying whether the corresponding instruction is executed completely.
9. A software configuration apparatus for a universal car key, comprising:
the wireless radio frequency module is used for receiving a first instruction and a second instruction sent by initialization equipment and forwarding the first instruction and the second instruction to the anti-theft authentication unit, wherein the first instruction is used for requesting first identity authentication information of a remote control unit of the automobile key, and the second instruction is used for requesting second identity authentication information stored in a storage unit of the automobile key; the initialization device is used for sending the first identity authentication information and the second identity authentication information to the initialization device so that the initialization device matches target identity authentication information corresponding to the first identity authentication information and the second identity authentication information, and if matching is successful, the initialization device configures software to the automobile key;
and the anti-theft authentication unit is used for acquiring the first identity authentication information according to the first instruction forwarded by the wireless radio frequency module, acquiring the second identity authentication information according to the second instruction forwarded by the wireless radio frequency module, and sending the acquired first identity authentication information and the acquired second identity authentication information to the wireless radio frequency module.
10. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 8.
11. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 8.
CN202210176952.3A 2022-02-25 2022-02-25 Software configuration method and device for general automobile key Active CN114613042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210176952.3A CN114613042B (en) 2022-02-25 2022-02-25 Software configuration method and device for general automobile key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210176952.3A CN114613042B (en) 2022-02-25 2022-02-25 Software configuration method and device for general automobile key

Publications (2)

Publication Number Publication Date
CN114613042A true CN114613042A (en) 2022-06-10
CN114613042B CN114613042B (en) 2023-11-28

Family

ID=81859241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210176952.3A Active CN114613042B (en) 2022-02-25 2022-02-25 Software configuration method and device for general automobile key

Country Status (1)

Country Link
CN (1) CN114613042B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116546459A (en) * 2023-07-05 2023-08-04 小米汽车科技有限公司 Pairing method, device, storage medium and system for car keys

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011039712A (en) * 2009-08-07 2011-02-24 Tokai Rika Co Ltd Car sharing system
US20150235487A1 (en) * 2014-02-14 2015-08-20 GM Global Technology Operations LLC Method for enabling peps key to operate multiple vehicles
DE102015207852A1 (en) * 2015-04-29 2016-11-03 Bayerische Motoren Werke Aktiengesellschaft Method and vehicle key for updating vehicle software
CN107797810A (en) * 2016-08-30 2018-03-13 比亚迪股份有限公司 Update the method and apparatus of the program in car key
CN207441002U (en) * 2017-11-03 2018-06-01 深圳数马电子技术有限公司 The RF general automobile keys configured and its system can be passed through
CN108170051A (en) * 2017-12-23 2018-06-15 深圳市轩宇车鼎科技有限公司 A kind of matching process of automotive universal RFID key chip matching different automobile types
CN207657788U (en) * 2017-12-27 2018-07-27 深圳数马电子技术有限公司 Pass through the universal anti-theft automotive key and its system of radio configuration
US20180307955A1 (en) * 2017-04-24 2018-10-25 Konica Minolta, Inc. Information processing apparatus, information processing system and a non-transitory computer readable medium including programmed instructions
CN111176681A (en) * 2019-12-26 2020-05-19 深圳市中裕精密技术有限公司 Intelligent locking firmware upgrading method based on wireless connection
US20200322134A1 (en) * 2019-04-04 2020-10-08 Micron Technology, Inc. Onboarding Software on Secure Devices to Generate Device Identities for Authentication with Remote Servers
EP3772863A1 (en) * 2019-08-06 2021-02-10 Continental Automotive GmbH Electronic key and method for wireless flashing of an electronic key

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011039712A (en) * 2009-08-07 2011-02-24 Tokai Rika Co Ltd Car sharing system
US20150235487A1 (en) * 2014-02-14 2015-08-20 GM Global Technology Operations LLC Method for enabling peps key to operate multiple vehicles
DE102015207852A1 (en) * 2015-04-29 2016-11-03 Bayerische Motoren Werke Aktiengesellschaft Method and vehicle key for updating vehicle software
CN107797810A (en) * 2016-08-30 2018-03-13 比亚迪股份有限公司 Update the method and apparatus of the program in car key
US20180307955A1 (en) * 2017-04-24 2018-10-25 Konica Minolta, Inc. Information processing apparatus, information processing system and a non-transitory computer readable medium including programmed instructions
CN207441002U (en) * 2017-11-03 2018-06-01 深圳数马电子技术有限公司 The RF general automobile keys configured and its system can be passed through
CN108170051A (en) * 2017-12-23 2018-06-15 深圳市轩宇车鼎科技有限公司 A kind of matching process of automotive universal RFID key chip matching different automobile types
CN207657788U (en) * 2017-12-27 2018-07-27 深圳数马电子技术有限公司 Pass through the universal anti-theft automotive key and its system of radio configuration
US20200322134A1 (en) * 2019-04-04 2020-10-08 Micron Technology, Inc. Onboarding Software on Secure Devices to Generate Device Identities for Authentication with Remote Servers
EP3772863A1 (en) * 2019-08-06 2021-02-10 Continental Automotive GmbH Electronic key and method for wireless flashing of an electronic key
CN111176681A (en) * 2019-12-26 2020-05-19 深圳市中裕精密技术有限公司 Intelligent locking firmware upgrading method based on wireless connection

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116546459A (en) * 2023-07-05 2023-08-04 小米汽车科技有限公司 Pairing method, device, storage medium and system for car keys
CN116546459B (en) * 2023-07-05 2023-09-12 小米汽车科技有限公司 Pairing method, device, storage medium and system for car keys

Also Published As

Publication number Publication date
CN114613042B (en) 2023-11-28

Similar Documents

Publication Publication Date Title
US8290660B2 (en) Data access to electronic control units
US7650388B2 (en) Wireless identification protocol with confirmation of successful transmission
US9332430B2 (en) Method of identifying and authenticating a radio tag by a reader
CN108491224A (en) A kind of vehicle-mounted Oftware updating method and system
CN102446280B (en) A kind of method of verification msg, Apparatus and system
CN110716727B (en) Software upgrading method and system
US8436716B2 (en) Method of upgrading an operation program of a radio frequency identification system
US7769963B1 (en) RF tag system with single step read and write commands
JPH10312443A (en) Ic card
US20070232281A1 (en) Wireless communication device and method of setting individual information therein
CN108407556A (en) Identity configuration method, device and terminal
US9584502B1 (en) Transfer dongle for stored vehicle information
CN114613042A (en) Software configuration method and device for universal automobile key
CN112540778A (en) Vehicle data flashing method, diagnostic equipment and flashing system
CN113448604B (en) OTA (over the air) flashing method, OTA flashing system, readable storage medium and vehicle
CN114443106A (en) Firmware upgrading method of automobile key and automobile key
US8327036B2 (en) Method of passing instructions between a host station and a portable electronic device, and device for implementation
CN108920299B (en) Storage medium
JP4445718B2 (en) IC card and IC card program
CN112540798A (en) Awakening method, device and system for vehicle operating system
CN110990313B (en) Method, equipment and storage medium for processing clock stretching of I3C bus
CN101197959A (en) Terminal control method, system and equipment
JP2015210669A (en) Program rewrite method
CN113918187A (en) Automobile instrument multi-chip upgrading system and method based on CAN bus
CN113485734A (en) Automatic vehicle configuration flashing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant