CN114684070A - Safe vehicle control method and device, vehicle system and storage medium - Google Patents

Safe vehicle control method and device, vehicle system and storage medium Download PDF

Info

Publication number
CN114684070A
CN114684070A CN202210293493.7A CN202210293493A CN114684070A CN 114684070 A CN114684070 A CN 114684070A CN 202210293493 A CN202210293493 A CN 202210293493A CN 114684070 A CN114684070 A CN 114684070A
Authority
CN
China
Prior art keywords
vehicle
remote control
target
key
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210293493.7A
Other languages
Chinese (zh)
Other versions
CN114684070B (en
Inventor
杨彦召
马佳仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Automotive Innovation Co Ltd
Original Assignee
China Automotive Innovation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Automotive Innovation Co Ltd filed Critical China Automotive Innovation Co Ltd
Priority to CN202210293493.7A priority Critical patent/CN114684070B/en
Publication of CN114684070A publication Critical patent/CN114684070A/en
Application granted granted Critical
Publication of CN114684070B publication Critical patent/CN114684070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/246Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user characterised by the challenge triggering
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a safe vehicle control method, a safe vehicle control device, a vehicle system and a storage medium, relates to the field of vehicle information safety, and improves vehicle authentication and vehicle information safety in the process of controlling a vehicle by using a vehicle remote control key. The method comprises the following steps: sending first state verification information to a vehicle, and receiving first verification information sent by the vehicle, wherein the first verification information comprises a first public key and first identity information; if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, second verification information is sent to the vehicle, the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key; receiving a target algorithm identification sent by a vehicle, wherein the target algorithm identification is used for indicating a target encryption algorithm; generating a random number, and sending the random number encrypted by the first public key to the vehicle; generating a target instruction according to the random number, the target algorithm identification and the vehicle control instruction; and sending the target instruction to the vehicle.

Description

Safety vehicle control method, device, vehicle system and storage medium
Technical Field
The invention relates to the field of vehicle information safety, in particular to a safety vehicle control method, a safety vehicle control device, a vehicle system and a storage medium.
Background
At present, a vehicle remote control key adopts a wireless remote control function of a central lock to remotely control unlocking or locking of a vehicle door. When a user clicks a button on the vehicle remote control key, the vehicle remote control key transmits a vehicle control signal to the vehicle. And after the vehicle receives the vehicle control signal, executing an operation instruction corresponding to the vehicle control signal to control unlocking or locking of the vehicle door.
However, since the car control signal transmitted by the vehicle key fob is a Radio signal with unidirectional transmission, it is open, so that the car control signal can be easily intercepted by a Software Defined Radio (SDR) device, and a signal replay attack is performed on the vehicle according to the intercepted car control signal. At present, the uniqueness of the vehicle remote control key is ensured according to the transmission frequency of the vehicle control signal, the specific address code and other fixed information, and the safety level of the safety mechanism is low.
Disclosure of Invention
The invention provides a safe vehicle control method, a safe vehicle control device, a vehicle system and a storage medium, which improve the safety of vehicle authentication and vehicle information in the process of controlling a vehicle by using a vehicle remote control key.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, the present invention provides a method for controlling a vehicle safely, the method comprising:
sending first state verification information to the vehicle, wherein the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
receiving first verification information sent by a vehicle, wherein the first verification information comprises a first public key and first identity information, the first identity information is used for identifying the identity of the vehicle, and the first verification information is sent under the condition that the vehicle determines that the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key according to the first state verification information;
if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, sending second verification information to the vehicle, wherein the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
receiving a target algorithm identifier sent by the vehicle, wherein the target algorithm identifier is an identifier encrypted by a second public key and used for indicating a target encryption algorithm;
generating a random number, and sending the random number encrypted by the first public key to the vehicle;
encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate a target instruction;
sending a target instruction to the vehicle;
and updating the first state verification information according to the target instruction.
By the adoption of the safe vehicle control method, in the process of controlling the vehicle by the vehicle remote control key, the vehicle remote control key can send first state verification information to the vehicle, and after the vehicle verification is consistent with the current state of the vehicle remote control key, the vehicle remote control key can also verify the identity of the vehicle so as to determine whether the vehicle is matched with the vehicle remote control key. And when the vehicle is determined to be matched with the vehicle remote control key, sending second verification information to the vehicle so that the vehicle can verify the identity of the vehicle remote control key. After the bidirectional authentication is passed, the vehicle remote control key and the vehicle jointly negotiate a target encryption algorithm and a key, and the key is a random number, so that the security of the key can be improved. And then, the vehicle remote control key encrypts a vehicle control instruction generated by the vehicle remote control key according to the key and a target encryption algorithm to obtain a target instruction, and sends the target instruction to the vehicle. Compared with the prior art that the vehicle remote control key can only transmit the encrypted vehicle control command to the vehicle in a one-way mode, and the encrypted vehicle control command is generated by encrypting the vehicle control command according to the transmission frequency of the radio signal and the specific address code, the vehicle authentication security is improved through the vehicle and the vehicle remote control key after the vehicle authentication is consistent with the current state of the vehicle remote control key, and the difficulty of the vehicle being attacked by replay is increased. And after the bidirectional verification is passed, the vehicle control instruction is encrypted by using the negotiated target encryption algorithm and the random number to obtain a target instruction, and the target instruction is sent to the vehicle, so that the safety of vehicle information is improved, and the first state verification information is updated according to the target instruction, so that the next verification is facilitated.
In a possible implementation manner, the first state verification information includes a first timestamp, information of a first historical instruction, and information of a first historical identity;
the first timestamp is the time for generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the historical identity information is matched or not.
In a possible implementation manner, the encrypting the vehicle control instruction according to the random number and the target algorithm identifier to generate the target instruction includes:
and if the vehicle control instruction is obtained within the preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate the target instruction.
In a possible implementation manner, the safety vehicle control method further includes:
if the vehicle control instruction is not acquired within a preset time period after the random number is generated, deleting the first verification information, the random number and the target algorithm identification, and executing a first preset operation;
wherein the first preset operation comprises at least one of: and outputting first warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the first warning information is used for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted.
In a possible implementation manner, the safety vehicle control method further includes:
if the vehicle is determined not to be matched with the vehicle remote control key according to the first identity information and the prestored identity information, executing a second preset operation, wherein the second preset operation comprises at least one of the following operations: and outputting second warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the second warning information is used for prompting the user that the vehicle remote control key is not matched with the vehicle.
In one possible implementation, the vehicle remote control key described above includes a receiving unit. The receiving of the first verification information sent by the vehicle includes:
receiving first verification information sent by a vehicle through a receiving unit;
the target algorithm for receiving the vehicle transmission comprises the following steps:
and receiving the target algorithm identification transmitted by the unit vehicle.
In a possible implementation manner, the encrypting the vehicle control instruction according to the random number and the target algorithm identifier to generate the target instruction includes:
decrypting the target algorithm identification by using a private key corresponding to the second public key to obtain a target encryption algorithm;
and encrypting the vehicle control instruction by using a target encryption algorithm by taking the random number as a secret key to obtain a target instruction.
In a second aspect, the present invention provides a method for controlling a vehicle safely, the method comprising:
receiving first state verification information sent by the vehicle remote control key, wherein the first state verification information is used for vehicle verification and whether the current state of the vehicle remote control key is consistent or not;
if the first state verification information is consistent with the prestored second state verification information, sending first verification information to the vehicle remote control key, wherein the first verification information comprises a first public key and first identity information, and the first identity information is used for identifying the identity of the vehicle;
receiving second verification information sent by the vehicle remote control key, wherein the second verification information comprises a second public key and second identity information, the second identity information is used for identifying the identity of the vehicle remote control key, and the second verification information is sent under the condition that the vehicle is determined to be matched with the vehicle remote control key;
if the fact that the vehicle remote control key is matched with the vehicle is determined according to the second identity information and the pre-stored identity information, encrypting the identification of the target encryption algorithm by adopting a second public key to generate a target algorithm identification;
sending a target algorithm identification to a vehicle remote control key;
receiving an encrypted random number sent by a vehicle remote control key, wherein the encrypted random number is encrypted by adopting a first public key;
decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
executing operation corresponding to the vehicle control instruction;
and updating the second state verification information according to the target instruction.
By adopting the safe vehicle control method, in the process of controlling the vehicle by using the vehicle remote control key, after the vehicle verifies that the current state of the vehicle remote control key is consistent with that of the vehicle remote control key, the vehicle can send first verification information to the vehicle remote control key so that the vehicle remote control key can verify the identity of the vehicle. And when the matching between the vehicle and the vehicle remote control key is determined, the vehicle receives second verification information sent by the vehicle remote control key, and determines whether the vehicle remote control key is matched with the vehicle or not according to the second verification information and the pre-stored identity information. After the matching of the vehicle remote control key and the vehicle is determined, namely the two-way authentication is passed, the vehicle remote control key and the vehicle jointly negotiate a target encryption algorithm and a key, and the key is a random number, so that the security of the key can be improved. And then, the vehicle receives the target instruction sent by the vehicle remote control key, decrypts the target instruction according to the commonly negotiated target encryption algorithm and the key to obtain a vehicle control instruction, and executes the operation corresponding to the vehicle control instruction. Compared with the encrypted vehicle control instruction received by the vehicle in the prior art and generated by encrypting the vehicle control instruction according to the transmission frequency of the radio signal and the specific address code, the vehicle authentication security is improved by the vehicle and the vehicle remote control key bidirectional authentication after the vehicle authentication is consistent with the current state of the vehicle remote control key, and the difficulty of the vehicle being attacked by replay is increased. And after the bidirectional verification is passed, the target instruction received by the vehicle is encrypted by using the negotiated encryption algorithm and the random number, so that the safety of vehicle information is improved, and after the operation corresponding to the vehicle control instruction is executed, the second state verification information is updated according to the target instruction, so that the next verification is facilitated.
In a possible implementation manner, the second state verification information includes a second timestamp, information of a second historical instruction, and information of a second historical identity;
the second timestamp is the time for receiving the first historical instruction, the second historical instruction is the second historical vehicle control instruction, and the second historical identity information is used for verifying whether the historical identity information is matched or not.
In a possible implementation manner, the decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction includes:
and if the target instruction is received within the preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and a target encryption algorithm to obtain a vehicle control instruction.
In a possible implementation manner, the decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction includes:
decrypting the encrypted random number by adopting a private key corresponding to the first public key to obtain a random number;
and decrypting the target instruction by adopting a target encryption algorithm by taking the random number as a secret key to obtain the vehicle control instruction.
In a possible implementation manner, the safety vehicle control method further includes:
if the target instruction is not received within a preset time period after the encrypted random number is received, deleting the second verification information and the encrypted random number, and executing a third preset operation;
wherein the third preset operation comprises at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
In a possible implementation manner, the safety vehicle control method further includes:
if the fact that the vehicle remote control key is not matched with the vehicle is determined according to the second identity information and the prestored identity information, executing fourth preset operation, wherein the fourth preset operation comprises at least one of the following operations: and outputting fourth warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the fourth warning information is used for prompting the user that the vehicle is not matched with the vehicle remote control key.
In a possible implementation manner, the safety vehicle control method further includes:
and if a new target instruction is not received within a preset time period after the operation corresponding to the vehicle control instruction is executed, deleting the second verification information, the encrypted random number and the target algorithm identification.
In a third aspect, the present invention provides a vehicle remote control key including:
a transmitting unit for transmitting first state verification information to the vehicle, the first state verification information being used for vehicle verification as to whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key;
a receiving unit: the vehicle remote control key system comprises a first state verification information module, a second state verification information module and a third verification information module, wherein the first state verification information module is used for receiving first verification information sent by a vehicle, the first verification information comprises a first public key and first identity information, the first identity information is used for identifying the identity of the vehicle, and the first verification information is sent under the condition that the vehicle determines that the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key according to the first state verification information;
a transmission unit: the vehicle remote control key management system is also used for sending second verification information to the vehicle if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, wherein the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
a receiving unit: the system is also used for receiving a target algorithm identifier sent by the vehicle, wherein the target algorithm identifier is encrypted by adopting a second public key and is used for indicating a target encryption algorithm;
a transmission unit: the vehicle public key encryption device is also used for generating a random number and sending the random number encrypted by the first public key to the vehicle;
a processing unit: the vehicle control command is encrypted according to the random number and the target algorithm identifier to generate a target command;
a transmission unit: the system is also used for sending a target instruction to the vehicle;
and the processing unit is also used for updating the first state verification information according to the target instruction.
In a possible implementation manner, the first state verification information includes a first timestamp, information of the first historical instruction, and information of the first historical identity. The first timestamp is the time for generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the historical identity information is matched or not.
In a possible implementation manner, the processing unit is specifically configured to:
and if the vehicle control instruction is obtained within the preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate the target instruction.
In a possible implementation manner, the processing unit is further configured to delete the first verification information, the random number, and the target algorithm identifier and execute a first preset operation if the vehicle control instruction is not obtained within a preset time period after the random number is generated;
wherein the first preset operation comprises at least one of: and outputting first warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the first warning information is used for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted.
In a possible implementation manner, the processing unit is further configured to execute a second preset operation if it is determined that the vehicle is not matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, where the second preset operation includes at least one of: and outputting second warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the second warning information is used for prompting the user that the vehicle remote control key is not matched with the vehicle.
In a possible implementation manner, the receiving unit is specifically configured to:
and receiving the first verification information transmitted by the vehicle through the receiving unit, and receiving the target algorithm identification transmitted by the vehicle through the receiving unit.
In a possible implementation manner, the processing unit is specifically configured to:
decrypting the target algorithm identification by using a private key corresponding to the second public key to obtain a target encryption algorithm;
and encrypting the vehicle control instruction by using a target encryption algorithm by taking the random number as a secret key to obtain a target instruction.
In a fourth aspect, the present invention provides a vehicle comprising:
the receiving unit is used for receiving first state verification information sent by the vehicle remote control key, and the first state verification information is used for vehicle verification to determine whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key;
the sending unit is used for sending first verification information to the vehicle remote control key if the first state verification information is consistent with second state verification information which is prestored, wherein the first verification information comprises a first public key and first identity information, and the first identity information is used for identifying the identity of the vehicle;
the receiving unit is used for receiving second verification information sent by the vehicle remote control key, the second verification information comprises a second public key and second identity information, the second identity information is used for identifying the identity of the vehicle remote control key, and the second verification information is sent under the condition that the vehicle is determined to be matched with the vehicle remote control key;
the processing unit is used for encrypting the identification of the target encryption algorithm by adopting a second public key to generate a target algorithm identification if the matching of the vehicle remote control key and the vehicle is determined according to the second identity information and the pre-stored identity information;
the sending unit is also used for sending the target algorithm identification to the vehicle remote control key;
the receiving unit is also used for receiving the encrypted random number sent by the vehicle remote control key, and the encrypted random number is the random number encrypted by adopting the first public key;
the processing unit is also used for decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
the execution unit is used for executing the operation corresponding to the vehicle control instruction;
and the processing unit is also used for updating the second state verification information according to the target instruction.
In a possible implementation manner, the second state verification information includes a second timestamp, information of a second historical instruction, and information of a second historical identity. The second timestamp is the time for receiving the first historical instruction, the second historical instruction is the second historical vehicle control instruction, and the second historical identity information is used for verifying whether the historical identity information is matched or not.
In a possible implementation manner, the processing unit is specifically configured to:
and if the target instruction is received within the preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction.
In a possible implementation manner, the processing unit is specifically configured to:
decrypting the encrypted random number by adopting a private key corresponding to the first public key to obtain a random number;
and decrypting the target instruction by adopting a target encryption algorithm by taking the random number as a secret key to obtain the vehicle control instruction.
In a possible implementation manner, the processing unit is further configured to delete the second verification information and the encrypted random number and execute a third preset operation if the target instruction is not received within a preset time period after the encrypted random number is received;
wherein the third preset operation comprises at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle and the vehicle remote control key.
In a possible implementation manner, the processing unit is further configured to execute a fourth preset operation if it is determined that the vehicle key fob is not matched with the vehicle according to the second identity information and the pre-stored identity information, where the fourth preset operation includes at least one of: and outputting fourth warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the fourth warning information is used for prompting the user that the vehicle is not matched with the vehicle remote control key.
In a possible implementation manner, the processing unit is further configured to delete the second verification information, the encrypted random number, and the target algorithm identifier if a new target instruction is not received within a preset time period after the operation corresponding to the vehicle control instruction is executed.
In a fifth aspect, the present invention provides a vehicle system comprising: a vehicle key fob as in the third aspect and any one of its possible implementations, and a vehicle as in the fourth aspect and any one of its possible implementations.
In a sixth aspect, the present invention provides a safety vehicle control device, including: a processor and a memory. The memory is for storing computer program code, the computer program code including computer instructions. When the processor executes the computer instructions, the safety vehicle control device performs the safety vehicle control method according to the first aspect and any one of the possible implementations thereof, or performs the safety vehicle control method according to the second aspect and any one of the possible implementations thereof.
In a seventh aspect, the present invention provides a computer-readable storage medium having stored thereon computer instructions that, when run on a vehicle key fob, cause the vehicle key fob to perform the secure vehicle control method of any one of the first aspect or possible implementations of the first aspect; alternatively, the computer instructions, when executed on the vehicle, cause the vehicle to perform a method of safety control as in the second aspect and any possible implementation thereof.
Drawings
FIG. 1 is a schematic diagram of a vehicle system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a safety vehicle control device according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of a safety vehicle control method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a vehicle remote control key according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a vehicle according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the embodiments of the present disclosure, "a plurality" means two or more unless otherwise specified. Additionally, the use of "based on" or "according to" means open and inclusive, as a process, step, calculation, or other action that is "based on" or "according to" one or more stated conditions or values may in practice be based on additional conditions or exceeding the stated values.
In order to improve the safety of vehicle authentication and vehicle information in the process of controlling a vehicle by using a vehicle remote control key, the embodiment of the invention provides a safe vehicle control method, a safe vehicle control device, a vehicle system and a storage medium. After the vehicle is verified and the current state of the vehicle remote control key is verified, the security of identity authentication is improved between the vehicle remote control key and the vehicle in a bidirectional identity authentication mode, so that the difficulty that a vehicle control command sent by the vehicle remote control key is replayed and attacked is increased, and the security of vehicle information is improved. And the target instruction sent by the vehicle remote control key every time is obtained by encrypting the vehicle control instruction through a target encryption algorithm and a random secret key after negotiation between the vehicle and the vehicle remote control key, so that the safety of vehicle information is further improved.
The safe vehicle control method provided by the embodiment of the invention can be suitable for a vehicle system. Fig. 1 shows a schematic configuration of the vehicle system. As shown in fig. 1, the vehicle system may include: a vehicle key fob 11 and a vehicle 12. The connection between the vehicle key fob 11 and the vehicle 12 is established by way of radio communication within a preset distance range.
The vehicle remote control key 11 is configured to send first state verification information to the vehicle after sending the link establishment signal to the vehicle, receive first verification information including first identity information and a first public key sent by the vehicle, and determine whether the vehicle and the vehicle remote control key are matched according to the first identity information and pre-stored identity information. When the vehicle is determined to be matched with the vehicle remote control key, the vehicle remote control key is further used for sending second verification information to the vehicle and receiving a target algorithm identification which is sent by the vehicle and encrypted through a second public key, and the target algorithm identification is used for indicating a target encryption algorithm. The vehicle remote control key is also used for generating a random number, encrypting the vehicle control instruction according to the target algorithm identification and the random number to generate a target instruction, sending the target instruction to the vehicle, and updating the first state verification information according to the target instruction.
And the vehicle 12 is used for verifying whether the current states of the vehicle and the vehicle remote control key are consistent after receiving the first state verification information sent by the vehicle remote control key, if so, sending the first verification information to the vehicle remote control key, and receiving second verification information which is sent by the vehicle remote control key and comprises second identity information and a second public key after the vehicle remote control key determines that the vehicle is matched with the vehicle remote control key. When the vehicle remote control key is determined to be matched with the vehicle, the vehicle is further used for encrypting the identification of the target encryption algorithm by adopting the second public key to generate a target algorithm identification, and the target algorithm identification is sent to the vehicle remote control key. The vehicle is also used for receiving the target instruction and the random number, decrypting the target instruction according to the target encryption algorithm and the random number, determining a vehicle control instruction, executing the operation corresponding to the vehicle control instruction, and updating the second state verification information according to the target instruction.
Fig. 2 is a schematic structural diagram of a safety vehicle control device, and as shown in fig. 2, the safety vehicle control device may include: processor 21, memory 22, communication interface 23. The processor 21, the memory 22, and the communication interface 23 may be connected by a communication bus. For example, the safety vehicle control device may be a vehicle or a vehicle remote control key.
The processor 21 is a control center of the safety vehicle control device, and may be a single processor or a collective term for multiple processing elements. For example, the processor 21 may be a general-purpose Central Processing Unit (CPU), or may be another general-purpose processor 21. The general purpose processor 21 may be, among other things, a microprocessor 21 or any conventional processor 21.
The memory 22 may include, but is not limited to, a read-only memory 22 (ROM) and a random access memory 22 (RAM), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Illustratively, in the embodiment of the present invention, the ROM of the vehicle is used to store the first authentication information and the encryption algorithm, and the RAM of the vehicle is used to store the second authentication information, and the negotiated key and the target algorithm identification and the like are generated during communication with the vehicle key fob. The ROM of the vehicle remote control key is used for storing second authentication information, and the RAM of the vehicle remote control key is used for storing data generated in the process of communicating with the vehicle, such as first authentication information, a key after negotiation, target algorithm identification and the like.
And a communication interface 23 for connecting the vehicle and the vehicle key fob through radio signal communication. The communication interface 23 may comprise a receiving unit for receiving radio signals and a transmitting unit for transmitting radio signals.
Illustratively, in the embodiment of the present invention, the receiving unit may be an Ultra High Frequency (UHF) receiving unit, and the transmitting unit may be a UHF transmitting unit.
It should be noted that the structure shown in fig. 2 does not constitute a limitation on the vehicle or vehicle key fob, which may include more or fewer components than shown, or a combination of certain components, or a different arrangement of components, in addition to the components shown in fig. 2. For example, the vehicle remote control key is additionally provided with a button battery in addition to the components shown in fig. 2.
The execution main body of the safe vehicle control method provided by the embodiment of the invention is a vehicle and a vehicle remote control key. The vehicle and the vehicle remote control key can be a CPU in the vehicle and the vehicle remote control key, and can also be a control module for safely controlling the vehicle in the vehicle and the vehicle remote control key. The embodiment of the invention takes a vehicle and a method for executing safe vehicle control by a vehicle remote control key as an example, and explains the safe vehicle control method provided by the invention.
The following describes a safety vehicle control method provided by an embodiment of the invention with reference to the accompanying drawings.
As shown in fig. 3, the safety vehicle control method provided in the embodiment of the present invention includes the following steps 301 to 3017.
301. The vehicle key fob transmits first status verification information to the vehicle.
The first state verification information is used for vehicle verification whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key.
Optionally, the first status verification information includes a first timestamp, information of the first historical instruction, and information of the first historical identity. The first timestamp is the time for generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the historical identity information is matched or not.
For example, the first state verification information may be stored in a synchronization flag memory of the vehicle remote control key, and the information of the first history command and the information of the first history identity may be binary numbers, respectively.
For example, the first history command includes "door unlock", "door lock", "car search", and "trunk open", and the first history identification information is the first information of the first status verification information. That is, the information of the first history instruction and the information of the first history identity are 5-bit binary numbers. In the initial state, all the 5-bit binary numbers are 0.
Optionally, because the vehicle remote control key and the vehicle are in communication connection through a radio signal, and a receiving range of the radio signal is limited, when the vehicle is controlled by using the vehicle remote control key, a user needs to stand within a preset range taking the vehicle as a circle center and taking a preset distance as a radius and use the vehicle remote control key to send a signal to the vehicle. Before the vehicle sends the first verification information to the vehicle remote control key, the user sends a link establishment signal to the vehicle through the vehicle remote control key, so that the vehicle remote control key establishes communication with the vehicle link, and the link establishment signal is a radio signal.
302. The vehicle receives first state verification information sent by the vehicle key fob.
303. And if the first state verification information is consistent with the pre-stored second state verification information, the vehicle sends the first verification information to the vehicle remote control key.
Optionally, the second status verification information includes a second timestamp, information of a second historical instruction, and information of a second historical identity. The second timestamp is the time for receiving the first historical instruction, the second historical instruction is a second historical vehicle control instruction, and the second historical identity information is used for verifying whether the historical identity information is matched.
After the vehicle remote control key generates the first historical instruction, the first historical instruction is sent to the vehicle until the time when the vehicle receives the first historical instruction is negligible. Therefore, the time at which the vehicle remote control key generates the first history command coincides with the time at which the vehicle receives the first history command.
The second state verification information is stored in the synchronization flag memory of the vehicle, and has the same composition as the first verification state information, and is not described herein again.
The vehicle receives first state verification information sent by the vehicle remote control key, and the first state verification information is matched with second verification information which is prestored. And when the vehicle verifies that the first state verification information is consistent with the second state information, the vehicle actively sends the first verification information to the vehicle remote control key.
It should be understood that the first status verification information is consistent with the second status verification information, which means that each item of information in the first status verification information is respectively consistent with each item of information in the second status verification information.
Illustratively, the first timestamp corresponds to the second timestamp, the first historical instruction corresponds to the second historical instruction, and the first historical identity information corresponds to the second historical identity information. For example, the first state verification information is "1111000000 + the first timestamp", and if the second state verification information is "1111000000 + the second timestamp", and the first timestamp is consistent with the second timestamp, it indicates that the first state verification information is consistent with the second state verification information; if the second status validation message is 1100110000, indicating that the first status validation message is inconsistent with the second status validation message, the vehicle may issue an alert to alert the user and the vehicle may terminate communication with the vehicle key fob.
Alternatively, the first authentication information is stored in a ROM of the vehicle, and the first authentication information may include the first public key and the first identity information. The first identity information is used for identifying the identity of the vehicle, and the first public key is the public key of the vehicle. For example, the first authentication information may be a digital certificate of the vehicle.
304. The vehicle remote control key receives first authentication information sent by a vehicle.
Alternatively, the vehicle key fob may store the received first authentication information in the random access memory RAM for easy purging.
Alternatively, the vehicle remote control key may include a receiving unit. The vehicle remote control key may receive the first authentication information transmitted by the vehicle through the receiving unit.
305. And if the vehicle remote control key determines that the vehicle is matched with the vehicle remote control key according to the first identity information and the prestored identity information, sending second verification information to the vehicle.
Alternatively, the second authentication information is stored in a ROM of the vehicle key fob, and the second authentication information may include the second public key and the second identity information. The second identity information is used for identifying the identity of the vehicle remote control key, and the second public key is the public key of the vehicle remote control key. For example, the second authentication information may be a digital certificate of the vehicle key fob.
Optionally, the vehicle remote control key is pre-stored with identity information of a vehicle matched with the vehicle remote control key. After the vehicle remote control key receives the first identity information, the first identity information can be matched with the pre-stored vehicle identity information. If the first identity information is consistent with the pre-stored vehicle identity information, the vehicle remote control key is successfully matched with the vehicle remote control key, and then the vehicle remote control key can send second verification information to the vehicle.
Optionally, if the vehicle key fob determines that the vehicle is not matched with the vehicle key fob according to the first identity information and the pre-stored identity information, a second preset operation is performed. The second preset operation may include at least one of: and outputting second warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the second warning information is used for prompting the user that the vehicle remote control key is not matched with the vehicle. At this time, the vehicle remote controller may also clear the first authentication information stored in the RAM of the vehicle remote controller.
For example, the first warning information may be a warning blinking light, or the first warning information may be a warning bell.
306. The vehicle receives second authentication information sent by the vehicle remote control key.
307. And if the vehicle determines that the vehicle remote control key is matched with the vehicle according to the second identity information and the pre-stored identity information, encrypting the identifier of the target encryption algorithm by adopting a second public key to generate the identifier of the target algorithm.
Optionally, the vehicle is pre-stored with identity information of a vehicle remote control key matched with the vehicle and a plurality of encryption algorithms, and each encryption algorithm corresponds to one identifier. After the vehicle receives the second identity information, the second identity information can be matched with the pre-stored key identity information. If the second identity information is consistent with the prestored identity information, the matching between the vehicle remote control key sending the second identity information and the vehicle is successful, the vehicle selects an encryption algorithm as a target encryption algorithm, and encrypts the identifier of the target encryption algorithm by adopting a second public key to generate the identifier of the target algorithm.
Optionally, in the process of generating the target algorithm identifier, the adopted encryption algorithm is an asymmetric encryption algorithm. Illustratively, the asymmetric encryption algorithm may be an RSA algorithm.
Optionally, if the vehicle determines that the vehicle key fob is not matched with the vehicle according to the second identity information and the pre-stored identity information, a fourth preset operation is performed. The fourth preset operation includes at least one of: and outputting fourth warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the fourth warning information is used for prompting the user that the vehicle is not matched with the vehicle remote control key. At this time, the vehicle may also clear the second validation information and the target algorithm identification stored in the RAM of the vehicle.
308. The vehicle sends the target algorithm identification to the vehicle key fob.
309. And the vehicle remote control key receives the target algorithm identification sent by the vehicle.
Optionally, the target algorithm identifier is an identifier obtained by encrypting the vehicle by using the second public key, and is used for indicating a target encryption algorithm, and the target algorithm identifier may be stored in the RAM of the vehicle remote control key. Because the target algorithm identification is the encryption algorithm encrypted by the second public key, only the vehicle remote control key can decrypt the target algorithm identification.
Optionally, the vehicle key fob may receive the target algorithm identification transmitted by the vehicle via the receiving unit.
310. The vehicle key fob generates a random number and transmits the random number encrypted with the first public key to the vehicle.
Optionally, the vehicle key fob has a random number generation unit therein for generating a random number. After the random number is generated, it is stored in the RAM of the vehicle key fob. After the vehicle remote control key generates the random number, the first public key is used for encryption, and the random number is ensured to be obtained only by the vehicle when the encrypted random number is sent to the vehicle. In the process of controlling the vehicle by using the vehicle remote key each time, the random numbers generated by the vehicle remote key may be different, which improves the security of information transmitted between the vehicle-controlling vehicle and the vehicle remote key.
For example, when the random number generation unit generates the random number, the random number may be generated according to any element in the physical environment. Such as current temperature data, or noise data, etc.
Optionally, in the process of encrypting the random number, the encryption algorithm used is an asymmetric encryption algorithm. Illustratively, the asymmetric encryption algorithm may be an RSA algorithm.
311. The vehicle receives the encrypted random number transmitted by the vehicle key fob.
Alternatively, the encrypted random number may be stored in the RAM of the vehicle.
312. And the vehicle remote control key encrypts the vehicle control command according to the random number and the target algorithm identification to generate a target command.
Optionally, the vehicle remote control key may obtain the vehicle control instruction in response to a click operation of a user on a corresponding button on the vehicle remote control key. And encrypting the vehicle control instruction according to the random number and the target algorithm identification to obtain the target instruction as long as the vehicle remote control key obtains the random number, the target algorithm identification and the vehicle control instruction.
Optionally, the vehicle remote control key encrypts the vehicle control instruction according to the random number and the target algorithm identifier to generate the target instruction, or the vehicle remote control key encrypts the vehicle control instruction according to the random number and the target algorithm identifier to generate the target instruction when the vehicle control instruction is acquired within a preset time period after the random number is generated.
Optionally, a plurality of encryption algorithms are also stored in the vehicle remote control key, each encryption algorithm corresponds to one identifier, and the plurality of encryption algorithms are the same as the plurality of encryption algorithms stored in the vehicle. Then, the vehicle remote control key encrypts the vehicle control command according to the random number and the target algorithm identification. Specifically, firstly, the vehicle remote control key decrypts the target algorithm identifier by using a private key corresponding to the second public key to obtain the target encryption algorithm. Secondly, the vehicle remote control key uses the random number as a secret key and adopts a target encryption algorithm to encrypt the vehicle control command to obtain a target command.
Optionally, in order to ensure timeliness of the random number and the target algorithm, so that the vehicle remote control key has better efficiency, flexibility and information security in the vehicle control process, if the vehicle remote control key does not acquire the vehicle control instruction within a preset time period after the random number is generated, the first verification information, the random number and the target algorithm identifier stored in the random access memory RAM are deleted, and a first preset operation is executed. The first preset operation includes at least one of: and outputting first warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the first warning information is used for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted.
Optionally, the target encryption algorithm for encrypting the vehicle control instruction may be a symmetric encryption algorithm. The symmetric encryption algorithm is an advanced encryption standard in cryptography, adopts a symmetric block cipher system, and a secret key is a group of random numbers generated by encryption processing, so that the risk of secret key crypto-encoding is avoided, and the data security of the vehicle and the vehicle remote control key in the communication process is further improved.
Illustratively, the symmetric encryption algorithm may be an AES algorithm, which is mature, easy to implement in software, and has a low requirement on the performance of a hardware system, which can save cost, and has a high feasibility.
313. The vehicle key fob sends a target command to the vehicle.
314. And the vehicle remote control key updates the first state verification information according to the target instruction.
And the vehicle remote control key sends out a target instruction, which indicates that the vehicle verifies that the first state verification information is consistent with the second state verification information, and the vehicle remote control key can update the first state verification information. Updating the first state verification information may be inverting a corresponding binary number in the first state verification information and updating the first timestamp.
For example, the current first state verification information is 0000000000, the bidirectional authentication is passed, and the car control command corresponding to the target command is "door unlock", and then the updated first state verification information is "1111000000 + time of generating the" door unlock "command.
315. And the vehicle decrypts the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction.
Optionally, after the vehicle acquires the encrypted random number, the target encryption algorithm and the target instruction, the target instruction may be decrypted according to the encrypted random number and the target encryption algorithm to obtain the target instruction.
Optionally, the vehicle decrypts the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction, or the vehicle may decrypt the target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction when receiving the target instruction within a preset time period after receiving the encrypted random number.
For example, the vehicle decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction may include: firstly, the vehicle decrypts the encrypted random number by using a private key corresponding to the first public key to obtain the random number. And secondly, the vehicle decrypts the target instruction by using the random number as a secret key and adopting a target encryption algorithm to obtain a vehicle control instruction.
Optionally, in order to ensure timeliness of the random number and information security in the vehicle control process, if the vehicle does not receive the target instruction within the preset time period after receiving the encrypted random number, the second verification information, the encrypted random number, and the target algorithm identifier are deleted, and a third preset operation is executed. The third preset operation includes at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
316. And the vehicle executes the operation corresponding to the vehicle control instruction.
Optionally, after the vehicle acquires the vehicle control instruction, whether the vehicle control instruction is legal or not can be judged. And if the vehicle control instruction is legal, the vehicle executes the operation corresponding to the vehicle control instruction. When judging whether the vehicle control instruction is legal, the vehicle control instruction, the current state of the vehicle and a command list prestored in the vehicle are combined.
For example, if the vehicle control command contradicts the current state of the vehicle or the command list does not include the vehicle control command, the vehicle may determine that the vehicle control command is an illegal command. The instructions in the instruction list may include locking doors, unlocking doors, controlling vehicle start, and the like. The current state of the vehicle may include: the vehicle is in a key-off state, the vehicle is in a start state, the doors are in a locked state, and the doors are in an unlocked state, etc.
For example, if the vehicle control command is used for unlocking the vehicle door and the current state of the vehicle is that the vehicle door is in a locked state, the vehicle may determine that the vehicle control command is a legal command and execute the control command to lock the vehicle door.
Optionally, after the vehicle acquires the vehicle control instruction, if it is determined that the vehicle control instruction is an illegal instruction, the vehicle may execute the second preset operation. At this time, the second warning information in the second preset operation may be used to prompt the user that the vehicle control instruction is an illegal instruction.
For example, if the vehicle control instruction is used for unlocking the vehicle door, and the current state of the vehicle is that the vehicle door is in the unlocked state, the vehicle may determine that the vehicle control instruction is an illegal instruction, and execute the second preset operation.
Optionally, if the vehicle does not receive a new target instruction within a preset time period after executing an operation corresponding to the vehicle control instruction, the second verification information, the encrypted random number, and the target algorithm identifier are deleted, so that timeliness of the key and the target encryption algorithm and information security in the vehicle control process can be ensured.
317. The vehicle updates the second state verification information according to the target instruction.
And the vehicle receives the target instruction, which indicates that the vehicle has verified that the first state verification information is consistent with the second state verification information, and the vehicle can update the second state verification information. Updating the second state verification information may be inverting a corresponding binary number in the second state verification information and updating the second timestamp.
For example, when the current second status verification information is 0000000000, the bidirectional authentication is passed, and the car control command corresponding to the target command is "door unlock", the updated second status verification information is "1111000000 + time for receiving the" door unlock "command.
By adopting the safe vehicle control method, in the process of controlling the vehicle by using the vehicle remote control key, the vehicle firstly verifies whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key, and after the current state is determined to be consistent with the current state, the vehicle sends first verification information to the vehicle remote control key so that the vehicle remote control key can verify the identity of the vehicle and determine whether the vehicle is matched with the vehicle remote control key. And when the vehicle is determined to be matched with the vehicle remote control key, the vehicle remote control key sends second verification information to the vehicle so that the vehicle can verify the identity of the vehicle remote control key. After the two-way authentication is passed, the vehicle remote control key and the vehicle jointly negotiate a target encryption algorithm and a secret key, and the secret key is a random number, so that the safety of the secret key can be improved. And then, the vehicle remote control key encrypts a vehicle control instruction generated by the vehicle remote control key according to the key and a target encryption algorithm to obtain a target instruction, and sends the target instruction to the vehicle. And the vehicle receives the target instruction sent by the vehicle remote control key, decrypts the target instruction according to the commonly negotiated target encryption algorithm and the key to obtain a vehicle control instruction, and executes the operation corresponding to the vehicle control instruction. Compared with the prior art that the vehicle remote control key can only transmit the encrypted vehicle control command to the vehicle in a one-way mode, and the encrypted vehicle control command is generated by encrypting the vehicle control command according to the transmission frequency of the radio signal and the specific address code, the vehicle authentication security is improved through the vehicle and the vehicle remote control key after the vehicle authentication is consistent with the current state of the vehicle remote control key, and the difficulty of the vehicle being attacked by replay is increased. And after the bidirectional verification is passed, the vehicle control instruction is encrypted by using the negotiated target encryption algorithm and the random number to obtain a target instruction, and the target instruction is sent to the vehicle, so that the safety of vehicle information is improved, and the first state verification information and the second state verification information are respectively updated to facilitate the next state verification.
The scheme provided by the embodiment of the invention is mainly introduced from the perspective of equipment. It will be appreciated that the apparatus, in order to carry out the above-described functions, comprises corresponding hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the present invention can be implemented in hardware or a combination of hardware and computer software, in conjunction with the exemplary algorithm steps described in connection with the embodiments disclosed herein. Whether a function is performed in hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
Fig. 4 shows a schematic diagram of a possible composition of the vehicle key fob 400 involved in the above-described embodiment, and as shown in fig. 4, the vehicle key fob 400 may include: a transmitting unit 401, a receiving unit 402 and a processing unit 403.
The sending unit 401 is configured to send first state verification information to the vehicle, where the first state verification information is used for vehicle verification to determine whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key. The receiving unit 402 is configured to receive first verification information sent by the vehicle, where the first verification information includes a first public key and first identity information, the first identity information is used to identify an identity of the vehicle, and the first verification information is sent when the vehicle determines that the first verification information is consistent with a current state of the vehicle remote control key according to the first state verification information. The sending unit 401 is further configured to send second verification information to the vehicle if it is determined that the vehicle is matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, where the second verification information includes a second public key and second identity information, and the second identity information is used to identify the identity of the vehicle remote control key. The receiving unit 402 is further configured to receive a target algorithm identifier sent by the vehicle, where the target algorithm identifier is an identifier encrypted by using a second public key and is used to indicate a target encryption algorithm. The sending unit 401 is further configured to generate a random number and send the random number encrypted with the first public key to the vehicle. And the processing unit 403 is configured to encrypt the vehicle control instruction according to the random number and the target algorithm identifier, so as to generate a target instruction. The sending unit 401 is further configured to send the target instruction to the vehicle. The processing unit 403 is further configured to update the first state verification information according to the target instruction.
Optionally, the first status verification information includes a first timestamp, information of the first historical instruction, and information of the first historical identity. The first timestamp is the time for generating a first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the historical identity information is matched or not.
Optionally, the processing unit 403 is specifically configured to:
and if the vehicle control instruction is obtained within a preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate a target instruction.
Optionally, the processing unit 403 is further configured to delete the first verification information, the random number, and the target algorithm identifier and execute a first preset operation if the vehicle control instruction is not obtained within a preset time period after the random number is generated. Wherein the first preset operation comprises at least one of: and outputting first warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the first warning information is used for prompting a user that the communication between the vehicle remote control key and the vehicle is interrupted.
Optionally, the processing unit 403 is further configured to execute a second preset operation if it is determined that the vehicle is not matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, where the second preset operation includes at least one of: and outputting second warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the second warning information is used for prompting the user that the vehicle remote control key is not matched with the vehicle.
Optionally, the receiving unit 402 is specifically configured to:
and receiving first verification information sent by the vehicle, and receiving a target algorithm identification sent by the vehicle.
Optionally, the processing unit 403 is specifically configured to:
decrypting the target algorithm identification by using a private key corresponding to the second public key to obtain a target encryption algorithm;
and encrypting the vehicle control instruction by using a target encryption algorithm by taking the random number as a secret key to obtain a target instruction.
Of course, the vehicle key fob 400 provided by the embodiments of the invention includes, but is not limited to, the above-described modules.
Fig. 5 shows a schematic diagram of a possible composition of the vehicle 500 involved in the above embodiment, and as shown in fig. 5, the vehicle 500 may include: a receiving unit 501, a transmitting unit 502, a processing unit 503 and an executing unit 504.
The receiving unit 501 is configured to receive first state verification information sent by the vehicle remote control key, where the first state verification information is used for vehicle verification to determine whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key. A sending unit 502, configured to send first verification information to the vehicle remote control key if the first state verification information is consistent with second state verification information that is pre-stored, where the first verification information includes a first public key and first identity information, and the first identity information is used to identify an identity of the vehicle. The receiving unit 501 is configured to receive second verification information sent by the vehicle key fob, where the second verification information includes a second public key and second identity information, the second identity information is used to identify an identity of the vehicle key fob, and the second verification information is sent when it is determined that the vehicle is matched with the vehicle key fob. And the processing unit 503 is configured to encrypt the identifier of the target encryption algorithm by using the second public key to generate the target algorithm identifier if it is determined that the vehicle remote control key is matched with the vehicle according to the second identity information and the pre-stored identity information. The sending unit 502 is further configured to send the target algorithm identifier to the vehicle key fob. The receiving unit 501 is further configured to receive an encrypted random number sent by the vehicle remote control key, where the encrypted random number is encrypted by using the first public key. The processing unit 503 is further configured to decrypt the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction. And the execution unit 504 is used for executing the operation corresponding to the vehicle control instruction. The processing unit 503 is further configured to update the second state verification information according to the target instruction.
Optionally, the second status verification information includes a second timestamp, information of a second historical instruction, and information of a second historical identity. The second timestamp is the time for receiving the first historical instruction, the second historical instruction is the second historical vehicle control instruction, and the second historical identity information is used for verifying whether the historical identity information is matched or not.
Optionally, the processing unit 503 is specifically configured to:
and if the target instruction is received within the preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction.
Optionally, the processing unit 503 is specifically configured to:
decrypting the encrypted random number by adopting a private key corresponding to the first public key to obtain a random number;
and decrypting the target instruction by adopting a target encryption algorithm by taking the random number as a secret key to obtain the vehicle control instruction.
Optionally, the processing unit 503 is further configured to delete the second verification information and the encrypted random number and execute a third preset operation if the target instruction is not received within a preset time period after the encrypted random number is received. Wherein the third preset operation comprises at least one of: and outputting third warning information for prompting the user that the communication between the vehicle and the vehicle remote control key is interrupted, and interrupting the communication between the vehicle remote control key and the vehicle.
Optionally, the processing unit 503 is further configured to execute a fourth preset operation if it is determined that the vehicle key fob is not matched with the vehicle according to the second identity information and the pre-stored identity information, where the fourth preset operation includes at least one of the following: and outputting fourth warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the fourth warning information is used for prompting the user that the vehicle is not matched with the vehicle remote control key.
Optionally, the processing unit 503 is further configured to delete the second verification information and the encrypted random number if a new target instruction is not received within a preset time period after the operation corresponding to the vehicle control instruction is executed.
Of course, the vehicle 500 provided by the embodiment of the present invention includes, but is not limited to, the above modules.
Another embodiment of the present invention further provides a computer-readable storage medium, which stores computer instructions that, when executed on a vehicle key fob, cause the vehicle key fob to perform the steps performed by the vehicle key fob in the method flows shown in the above-described method embodiments. The computer instructions, when executed on the vehicle, cause the vehicle to perform the steps performed by the vehicle in the method flow illustrated in the above-described method embodiment.
In another embodiment of the present invention, there is also provided a computer program product comprising instructions which, when run on a vehicle key fob, cause the vehicle key fob to perform the steps performed by the vehicle key fob in the method flows shown in the above-described method embodiments. When the instructions are executed on the vehicle, the instructions cause the vehicle to perform the steps performed by the vehicle in the method flow illustrated in the method embodiments described above.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The processes or functions according to embodiments of the present invention occur, in whole or in part, when computer-executable instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer-readable storage media can be any available media that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only an embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (17)

1. A safe vehicle control method is applied to a vehicle remote control key and is characterized by comprising the following steps:
sending first state verification information to a vehicle, wherein the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
receiving first verification information sent by the vehicle, wherein the first verification information comprises a first public key and first identity information, the first identity information is used for identifying the identity of the vehicle, and the first verification information is sent when the vehicle determines that the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key according to the first state verification information;
if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and the pre-stored identity information, sending second verification information to the vehicle, wherein the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
receiving a target algorithm identifier sent by the vehicle, wherein the target algorithm identifier is encrypted by using the second public key and is used for indicating a target encryption algorithm;
generating a random number and sending the random number encrypted by the first public key to the vehicle;
encrypting a vehicle control instruction according to the random number and the target algorithm identifier to generate a target instruction;
sending the target instruction to the vehicle;
and updating the first state verification information according to the target instruction.
2. The safe vehicle control method according to claim 1, wherein the first state verification information comprises a first time stamp, information of a first historical command and information of a first historical identity;
the first timestamp is the time for generating the first historical instruction, the first historical instruction is a first historical vehicle control instruction, and the information of the first historical identity is used for verifying whether the historical identity information is matched or not.
3. The safe vehicle control method according to claim 1 or 2, wherein the encrypting the vehicle control command according to the random number and the target algorithm identifier to generate the target command comprises:
and if the vehicle control instruction is acquired within a preset time period after the random number is generated, encrypting the vehicle control instruction according to the random number and the target algorithm identification to generate the target instruction.
4. The secure vehicle control method according to claim 1 or 2, wherein the vehicle remote control key includes a receiving unit;
the receiving of the first verification information sent by the vehicle includes:
receiving, by the receiving unit, the first authentication information transmitted by the vehicle;
the target algorithm for receiving the vehicle transmission comprises the following steps:
and receiving the target algorithm identification sent by the vehicle through the receiving unit.
5. The safe vehicle control method according to claim 1 or 2, wherein the encrypting the vehicle control command according to the random number and the target algorithm identifier to generate a target command comprises:
decrypting the target algorithm identification by using a private key corresponding to the second public key to obtain the target encryption algorithm;
and encrypting the vehicle control instruction by using the target encryption algorithm by using the random number as a key to obtain the target instruction.
6. A safe vehicle control method is applied to a vehicle and is characterized by comprising the following steps:
receiving first state verification information sent by a vehicle remote control key, wherein the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
if the first state verification information is consistent with second state verification information which is prestored, first verification information is sent to a vehicle remote control key, the first verification information comprises a first public key and first identity information, and the first identity information is used for identifying the identity of the vehicle;
receiving second verification information sent by the vehicle remote control key, wherein the second verification information comprises a second public key and second identity information, the second identity information is used for identifying the identity of the vehicle remote control key, and the second verification information is sent under the condition that the vehicle is determined to be matched with the vehicle remote control key;
if the vehicle remote control key is determined to be matched with the vehicle according to the second identity information and the prestored identity information, encrypting the identifier of the target encryption algorithm by using the second public key to generate a target algorithm identifier;
sending the target algorithm identification to the vehicle key fob;
receiving an encrypted random number sent by the vehicle remote control key, wherein the encrypted random number is encrypted by adopting the first public key;
decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
executing the operation corresponding to the vehicle control instruction;
and updating the second state verification information according to the target instruction.
7. The safety vehicle control method according to claim 6, wherein the second status verification information comprises a second timestamp, information of a second historical command, and information of a second historical identity;
the second timestamp is the time for receiving the first historical instruction, the second historical instruction is a second historical vehicle control instruction, and the information of the second historical identity is used for verifying whether the historical identity information is matched or not.
8. The safe vehicle control method according to claim 6 or 7, wherein the decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction comprises:
and if the target instruction is received within a preset time period after the encrypted random number is received, decrypting the target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction.
9. The safe vehicle control method according to claim 6 or 7, wherein the decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain the vehicle control instruction comprises:
decrypting the encrypted random number by using a private key corresponding to the first public key to obtain a random number;
and decrypting the target instruction by adopting the target encryption algorithm by taking the random number as a secret key to obtain the vehicle control instruction.
10. The safety vehicle control method according to claim 6 or 7, further comprising:
if the target instruction is not received within a preset time period after the encrypted random number is received, deleting the second verification information and the encrypted random number, and executing a third preset operation;
wherein the third preset operation comprises at least one of: and outputting third warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the third warning information is used for prompting a user that the communication between the vehicle and the vehicle remote control key is interrupted.
11. The safety vehicle control method according to claim 6 or 7, further comprising:
if the fact that the vehicle remote control key is not matched with the vehicle is determined according to the second identity information and the pre-stored identity information, executing fourth preset operation, wherein the fourth preset operation comprises at least one of the following operations: and outputting fourth warning information and interrupting the communication between the vehicle remote control key and the vehicle, wherein the fourth warning information is used for prompting a user that the vehicle is not matched with the vehicle remote control key.
12. The safety vehicle control method according to claim 6 or 7, further comprising:
and if a new target instruction is not received within a preset time period after the operation corresponding to the vehicle control instruction is executed, deleting the second verification information, the encrypted random number and the target algorithm identification.
13. A vehicle remote control key, characterized by comprising:
a transmitting unit, configured to transmit first state verification information to a vehicle, where the first state verification information is used for verifying whether the vehicle verification is consistent with a current state of the vehicle remote control key;
a receiving unit: the vehicle remote control key management system comprises a first state verification information module, a second state verification information module and a third verification information module, wherein the first state verification information module is used for receiving first verification information sent by the vehicle, the first verification information comprises a first public key and first identity information, the first identity information is used for identifying the identity of the vehicle, and the first verification information is sent when the vehicle determines that the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key according to the first state verification information;
the transmission unit: the vehicle remote control key management system is further used for sending second verification information to the vehicle if the vehicle is determined to be matched with the vehicle remote control key according to the first identity information and prestored identity information, wherein the second verification information comprises a second public key and second identity information, and the second identity information is used for identifying the identity of the vehicle remote control key;
the receiving unit: the vehicle is also used for receiving a target algorithm identifier sent by the vehicle, wherein the target algorithm identifier is encrypted by adopting the second public key and is used for indicating a target encryption algorithm;
the transmission unit: the vehicle public key encryption device is also used for generating a random number and sending the random number encrypted by the first public key to the vehicle;
a processing unit: the vehicle control command is encrypted according to the random number and the target algorithm identifier to generate a target command;
the sending unit: further for sending the target instruction to the vehicle;
the processing unit: and is further configured to update the first state verification information according to the target instruction.
14. A vehicle, characterized by comprising:
the vehicle remote control device comprises a receiving unit, a judging unit and a judging unit, wherein the receiving unit is used for receiving first state verification information sent by a vehicle remote control key, and the first state verification information is used for verifying whether the current state of the vehicle remote control key is consistent with the current state of the vehicle remote control key or not;
a sending unit, configured to send first verification information to a vehicle key fob if the first state verification information is consistent with second state verification information that is pre-stored, where the first verification information includes a first public key and first identity information, and the first identity information is used to identify an identity of the vehicle;
the receiving unit is further configured to receive second verification information sent by the vehicle remote control key, where the second verification information includes a second public key and second identity information, the second identity information is used to identify an identity of the vehicle remote control key, and the second verification information is sent when it is determined that the vehicle matches the vehicle remote control key;
the processing unit is used for encrypting the identification of the target encryption algorithm by adopting the second public key to generate a target algorithm identification if the vehicle remote control key is determined to be matched with the vehicle according to the second identity information and the pre-stored identity information;
the sending unit is further used for sending the target algorithm identification to the vehicle remote control key;
the receiving unit is further configured to receive an encrypted random number sent by the vehicle remote control key, where the encrypted random number is a random number encrypted by using the first public key;
the processing unit is further used for decrypting the received target instruction according to the encrypted random number and the target encryption algorithm to obtain a vehicle control instruction;
the execution unit is used for executing the operation corresponding to the vehicle control instruction;
the processing unit is further configured to update the second state verification information according to the target instruction.
15. A vehicle system, characterized in that the vehicle system comprises: the vehicle key fob of claim 13, and the vehicle of claim 14.
16. The utility model provides a safe accuse car device which characterized in that includes: a processor and a memory; the memory for storing computer program code, the computer program code comprising computer instructions; when the processor executes the computer instructions, the safety vehicle control device executes the safety vehicle control method according to any one of claims 1 to 5, or executes the safety vehicle control method according to any one of claims 6 to 12.
17. A computer readable storage medium comprising computer instructions that, when run on a vehicle key fob, cause the vehicle key fob to perform the secure vehicle control method of any one of claims 1-5; alternatively, when the computer instructions are run on a vehicle, the vehicle is caused to perform the safety control method of any one of claims 6 to 12.
CN202210293493.7A 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium Active CN114684070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210293493.7A CN114684070B (en) 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210293493.7A CN114684070B (en) 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium

Publications (2)

Publication Number Publication Date
CN114684070A true CN114684070A (en) 2022-07-01
CN114684070B CN114684070B (en) 2023-07-25

Family

ID=82138645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210293493.7A Active CN114684070B (en) 2022-03-23 2022-03-23 Safety vehicle control method and device, vehicle system and storage medium

Country Status (1)

Country Link
CN (1) CN114684070B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115285064A (en) * 2022-08-05 2022-11-04 重庆金康赛力斯新能源汽车设计院有限公司 Vehicle control method, system and computer equipment
CN115909550A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 NFC key verification method, device and system and computer readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050041813A1 (en) * 2003-08-19 2005-02-24 Forest Thomas M. Method, device, and system for secure motor vehicle remote keyless entry
JP2015059397A (en) * 2013-09-20 2015-03-30 株式会社デンソー Electronic key system, control device, and electronic key
CN108202695A (en) * 2016-12-16 2018-06-26 比亚迪股份有限公司 Anti-stealing method for vehicles, device and vehicle
CN110103883A (en) * 2019-05-16 2019-08-09 广州小鹏汽车科技有限公司 A kind of control method and device of car key
CN110111472A (en) * 2019-05-16 2019-08-09 广州小鹏汽车科技有限公司 Vehicle key control method and device
CN111703396A (en) * 2020-06-22 2020-09-25 中国第一汽车股份有限公司 Automobile two-way starting system and method and automobile
CN111923863A (en) * 2020-08-25 2020-11-13 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN111976650A (en) * 2020-07-29 2020-11-24 上海果通通信科技股份有限公司 Non-contact automobile key implementation method and device
CN113613197A (en) * 2021-07-08 2021-11-05 中汽创智科技有限公司 Vehicle and digital key pairing method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050041813A1 (en) * 2003-08-19 2005-02-24 Forest Thomas M. Method, device, and system for secure motor vehicle remote keyless entry
JP2015059397A (en) * 2013-09-20 2015-03-30 株式会社デンソー Electronic key system, control device, and electronic key
CN108202695A (en) * 2016-12-16 2018-06-26 比亚迪股份有限公司 Anti-stealing method for vehicles, device and vehicle
CN110103883A (en) * 2019-05-16 2019-08-09 广州小鹏汽车科技有限公司 A kind of control method and device of car key
CN110111472A (en) * 2019-05-16 2019-08-09 广州小鹏汽车科技有限公司 Vehicle key control method and device
CN111703396A (en) * 2020-06-22 2020-09-25 中国第一汽车股份有限公司 Automobile two-way starting system and method and automobile
CN111976650A (en) * 2020-07-29 2020-11-24 上海果通通信科技股份有限公司 Non-contact automobile key implementation method and device
CN111923863A (en) * 2020-08-25 2020-11-13 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN113613197A (en) * 2021-07-08 2021-11-05 中汽创智科技有限公司 Vehicle and digital key pairing method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115285064A (en) * 2022-08-05 2022-11-04 重庆金康赛力斯新能源汽车设计院有限公司 Vehicle control method, system and computer equipment
CN115285064B (en) * 2022-08-05 2023-11-21 重庆金康赛力斯新能源汽车设计院有限公司 Vehicle control method, system and computer equipment
CN115909550A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 NFC key verification method, device and system and computer readable storage medium

Also Published As

Publication number Publication date
CN114684070B (en) 2023-07-25

Similar Documents

Publication Publication Date Title
CN106453269B (en) Internet of vehicles safety communication method, vehicle-mounted terminal, server and system
JP6549664B2 (en) ID-based control unit key fob pairing
CN109862040B (en) Security authentication method and authentication system
CN109076078B (en) Method for establishing and updating a key for secure on-board network communication
CN111447601B (en) Implementation method and device of automobile Bluetooth key
CN110572418B (en) Vehicle identity authentication method and device, computer equipment and storage medium
CN102546155B (en) On-demand safe key generates method and system
CN114684070B (en) Safety vehicle control method and device, vehicle system and storage medium
CN110708388B (en) Vehicle body safety anchor node device, method and network system for providing safety service
US10477402B2 (en) One-way key fob and vehicle pairing
US20220368542A1 (en) Key fob authentication, retention, and revocation
JP5333785B2 (en) KEY DEVICE, LOCK CONTROL DEVICE, CONTROL PROGRAM, AND CONTROL METHOD
CN108605034B (en) Wireless firmware update
CN111080845B (en) Temporary unlocking method, system, door lock, administrator terminal and readable storage medium
CN109618334B (en) Control method and related equipment
CN113114668B (en) Information transmission method, mobile terminal, storage medium and electronic equipment
US10931458B2 (en) Authentication system
CN110505619B (en) Data transmission method in eSIM remote configuration
CN112396735A (en) Internet automobile digital key safety authentication method and device
CN110868294A (en) Key updating method, device and equipment
US10805276B2 (en) Device and methods for safe control of vehicle equipment secured by encrypted channel
JP2021145205A (en) Authentication system
CN112184960B (en) Intelligent lock control method and device, intelligent lock system and storage medium
CN110061894B (en) Household control method and system and household master control device
CN113766450A (en) Vehicle virtual key sharing method, mobile terminal, server and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant