CN115701158A - Method and device for realizing vehicle control function of Bluetooth entity key RKE - Google Patents

Method and device for realizing vehicle control function of Bluetooth entity key RKE Download PDF

Info

Publication number
CN115701158A
CN115701158A CN202211339702.3A CN202211339702A CN115701158A CN 115701158 A CN115701158 A CN 115701158A CN 202211339702 A CN202211339702 A CN 202211339702A CN 115701158 A CN115701158 A CN 115701158A
Authority
CN
China
Prior art keywords
rke
instruction
bluetooth
broadcast packet
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211339702.3A
Other languages
Chinese (zh)
Inventor
刘洋
张鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Changan Automobile Co Ltd
Original Assignee
Chongqing Changan Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Changan Automobile Co Ltd filed Critical Chongqing Changan Automobile Co Ltd
Priority to CN202211339702.3A priority Critical patent/CN115701158A/en
Publication of CN115701158A publication Critical patent/CN115701158A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application provides a method and a device for realizing a vehicle control function of a Bluetooth entity key RKE, wherein the method comprises the following steps: when the Bluetooth entity key detects that the key is pressed down, whether the filtering anti-shake time is met or not is judged, and if the filtering anti-shake time is not met, the filtering anti-shake time is discarded; if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command; broadcasting and sending a ciphertext RKE instruction to the Bluetooth module; monitoring a broadcast packet sent by a Bluetooth entity key by Bluetooth; judging whether the broadcast packet is in a white list and whether the broadcast packet contains an RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet; if the condition is met, a WorkKey verifies the signature RKE instruction; verifying whether the verification passes, and if the verification fails, discarding the processing; if the verification is successful, the WorkKey decrypts the RKE instruction. The technical scheme of the embodiment of the application safely solves the problem of RKE function failure in the process of Bluetooth disconnection or connection.

Description

Method and device for realizing vehicle control function of Bluetooth entity key RKE
Technical Field
The application relates to the technical field of vehicle keys, in particular to a method and a device for realizing a vehicle control function of a Bluetooth entity key RKE.
Background
In recent years, with the rapid development of intelligent and new energy automobiles, the traditional radio frequency entity key is gradually abandoned by the automobile end and replaced by a mobile phone digital key. More users are accustomed to using the entity key or pursuing the quality of the entity key, and a bluetooth entity key is usually selected and matched in the whole car factory under the consideration. The RKE function refers to remote key entry, after connection is established by Bluetooth, a general Bluetooth RKE needs to send an RKE instruction through a GATT or an L2CAP layer, and the scheme has the defect that when a user presses a key in the process of disconnection or connection of the Bluetooth, the operation cannot be responded.
At present, chinese patent publication No. CN114694280A discloses a technology entitled "a connection method of bluetooth key, storage medium, electronic device, and connection system", which requires that a vehicle can be controlled after bluetooth connection.
Disclosure of Invention
In order to solve the above technical problems, embodiments of the present application provide a method and an apparatus for implementing a bluetooth entity key RKE car control function, an electronic device, a computer readable storage medium, and a computer program product, which solve the technical problems: when the Bluetooth is not connected or in the connection process, the operation cannot be responded when the user presses the key of the Bluetooth entity key.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned by practice of the application.
According to an aspect of an embodiment of the present application, a method for implementing a bluetooth entity key RKE vehicle control function is provided, including: when the key is detected to be pressed down, judging whether the filtering anti-shake time is met, and if the filtering anti-shake time is not met, discarding the processing;
if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command;
and broadcasting and sending the encrypted RKE command to the Bluetooth module.
According to an aspect of an embodiment of the present application, a method for implementing a bluetooth entity key RKE vehicle control function is provided, including:
monitoring a broadcast packet sent by a Bluetooth entity key;
judging whether the broadcast packet is in a white list and whether the broadcast packet contains an RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet;
if the condition is met, checking a signature RKE instruction by using a WorkKey;
verifying whether the verification is passed or not, and if the verification comparison fails, discarding the processing;
if the verification is successful, the WrokKey decrypts the RKE instruction;
and judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction and sending the CAN message instruction to the automobile body controller.
According to an aspect of the embodiments of the present application, there is provided a method for implementing a bluetooth entity key RKE car control function, including:
when the Bluetooth entity key detects that the key is pressed down, whether the filtering anti-shake time is met or not is judged, and if the filtering anti-shake time is not met, the filtering anti-shake time is discarded;
if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command;
broadcasting and sending a ciphertext RKE instruction to the Bluetooth module;
monitoring a broadcast packet sent by a Bluetooth entity key by Bluetooth;
judging whether the broadcast packet is in a white list and whether the broadcast packet contains an RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet;
if the condition is met, checking a signature RKE instruction by using a WorkKey;
verifying whether the verification is passed or not, and if the verification comparison fails, discarding the processing;
if the verification is successful, the WorkKey decrypts the RKE instruction;
and judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction to send the CAN message instruction to the automobile body controller.
In the technical solution provided by the embodiment of the present application, the method includes: the filtering anti-shake time is 30, 40 or 50ms.
In the technical solution provided in the embodiment of the present application, if the filtering anti-shake time is satisfied, the instruction sending counter +1,workkey encrypts and signs the RKE instruction, and broadcasts and sends the ciphertext RKE instruction to the bluetooth module, including: the command sending counter TXCounter +1 obtains an RKE command ciphertext RKEInfo by using WorkKey encryption key information KeyStsInfo and the command sending counter TXCounter, and then signs the RKE command ciphertext by using WorkKey; the correlation algorithm used is: RKEInfo = AES _ CBC (WorkKey, BLEPhy _ TUID, keyStsInfo | | TXCounter); MAC = AES _ CMAC (RKEInfo), and is sent by multiple broadcasts at 37, 38, and 39 after completion of the calculation.
In the technical solution provided in the embodiment of the present application, if the condition is satisfied, the WorkKey signature verification RKE instruction includes: the Bluetooth module receives the MAC in the broadcast packet by using WorkKey signature, and the signature verification algorithm is MAC = AES _ CMAC (RKEInfo).
In the technical solution provided in the embodiment of the present application, the broadcast packet includes an entity key device name and an RKE command, where a total length of a cipher text of the RKE command and the MAC satisfies 31 bytes required for BLE broadcast.
According to an aspect of an embodiment of the present application, there is provided a device for implementing a bluetooth entity key RKE car control function, including:
the first judgment module is used for judging whether the filtering anti-shake time is met or not when the tooth entity key detection key is pressed down, and discarding the filtering anti-shake time if the filtering anti-shake time is not met; if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command;
the broadcasting module is used for broadcasting and sending the ciphertext RKE instruction to the Bluetooth module;
the monitoring module is used for monitoring a broadcast packet sent by a Bluetooth entity key through Bluetooth;
the second judgment module is used for judging whether the broadcast packet is in a white list and contains an RKE instruction or not, and discarding if the broadcast packet does not meet the conditions; if the condition is met, checking a signature RKE instruction by using a WorkKey;
the third judgment module is used for judging whether the signature checking RKE instruction passes or not, and discarding the signature checking RKE instruction if the verification comparison fails; if the verification is successful, the WorkKey decrypts the RKE instruction;
and the fourth judgment module is used for judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction to send to the automobile body controller.
According to an aspect of an embodiment of the present application, there is provided an electronic device including:
one or more processors;
a storage device for storing one or more programs which, when executed by the one or more processors, cause the electronic device to implement the method of implementing a bluetooth entity key, RKE, car control function as described above.
According to an aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored thereon computer-readable instructions, which, when executed by a processor of a computer, cause the computer to execute the above-mentioned method for implementing the bluetooth entity key, RKE, car control function.
According to an aspect of an embodiment of the present application, there is provided a computer program product comprising a computer program, wherein the computer program is configured to implement the above-mentioned method for implementing the function of controlling the vehicle by using the bluetooth entity key RKE when being executed by a processor.
In the technical scheme provided by some embodiments of the application, the problem of RKE function failure in the process of Bluetooth disconnection or connection is safely solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and, together with the description, serve to explain the principles of the application. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. In the drawings:
FIG. 1 is a block diagram of a system shown in an exemplary embodiment of the present application;
FIG. 2 is a flow diagram illustrating an RKE command issue flowchart in accordance with an exemplary embodiment of the present application;
FIG. 3 is a RKE broadcast architecture instruction diagram shown in an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The Bluetooth entity key is responsible for detecting whether the key is pressed down and carrying out filtering anti-shake processing, when the key is pressed down, firstly carrying out encryption processing on the RKE instruction, then carrying out an MAC algorithm, and then sending out RKE instruction information according to a connectable non-directional broadcast channel. Preferably, the encryption algorithm uses an AES _ CBC mode, the MAC algorithm uses an AES _ CMAC mode, the key length uses 128 bits, and the encryption key and the initialization vector use a root key WorkKey and a key unique number BLEPhy _ TUID which are stored in a learning stage.
The Bluetooth module is responsible for monitoring broadcast packets, when Bluetooth broadcast packets of MAC addresses in an internal storage white list are monitored, when an RKE instruction exists, the RKE instruction is decrypted and verified, a root key WorkKey and a key unique number BLEPhy _ TUID of the white list are used for encrypting keys and initializing vectors, and finally a vehicle control instruction is sent to a vehicle body controller through a CAN.
Preferably, the broadcast packet needs to be broadcast on channels 37, 38, and 39 multiple times, such as 3, 4, etc., in case the bluetooth module does not listen to the broadcast packet. In order to achieve the playback purpose, the RKE command sent by the bluetooth entity key includes key information, a command sending counter and the like, and the bluetooth module end needs to compare the size of the command receiving counter and the size of the command sending counter.
The vehicle body controller is responsible for receiving CAN instructions of the Bluetooth module and completing control functions such as unlocking, locking and the like.
FIG. 1 is a block diagram of a system shown in an exemplary embodiment of the present application.
FIG. 2 is a flow diagram illustrating an RKE command issuance process in accordance with an exemplary embodiment of the present application.
Referring to fig. 1 and fig. 2, the present embodiment provides a method for implementing a bluetooth entity key RKE car control function, including: when the key is detected to be pressed down, judging whether the filtering anti-shake time is met, and if the filtering anti-shake time is not met, discarding the processing; if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command; and broadcasting and sending the encrypted RKE command to the Bluetooth module.
The embodiment also provides a method for realizing the vehicle control function of the bluetooth entity key RKE, which comprises the following steps: monitoring a broadcast packet sent by a Bluetooth entity key; judging whether the broadcast packet is in a white list and whether the broadcast packet contains an RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet; if the condition is met, checking a signature RKE instruction by using a WorkKey; verifying whether the verification is passed or not, and if the verification comparison fails, discarding the processing; if the verification is successful, the WrokKey decrypts the RKE instruction; and judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction to send the CAN message instruction to the automobile body controller.
The embodiment also provides a method for realizing the vehicle control function of the bluetooth entity key RKE, which comprises the following steps: when the Bluetooth entity key detects that the key is pressed down, judging whether the filtering anti-shake time is met, and if the filtering anti-shake time is not met, discarding; if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command; broadcasting and sending a ciphertext RKE instruction to the Bluetooth module; monitoring a broadcast packet sent by a Bluetooth entity key by Bluetooth; judging whether the broadcast packet is in a white list and whether the broadcast packet contains an RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet; if the condition is met, checking a signature RKE instruction by using a WorkKey; verifying whether the verification passes, and if the verification fails, discarding the processing;
if the verification is successful, the WorkKey decrypts the RKE instruction; and judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction and sending the CAN message instruction to the automobile body controller.
In this embodiment, the method includes: the filtering anti-shake time is 30, 40 or 50ms.
In this embodiment, if the filtering anti-shake time is satisfied, the command sending counter +1, the work key encrypts and signs the RKE command, and broadcasts and sends the ciphertext RKE command to the bluetooth module, including: the command sending counter TXCounter +1 obtains an RKE command ciphertext RKEInfo by using WorkKey encryption key information KeyStsInfo and the command sending counter TXCounter, and then uses WorkKey to sign the RKE command ciphertext; the correlation algorithm used is: RKEInfo = AES _ CBC (WorkKey, BLEPhy _ TUID, keyStsInfo | | TXCounter); MAC = AES _ CMAC (RKEInfo), and is sent by multiple broadcasts at 37, 38, and 39 after completion of the calculation.
In this embodiment, if the condition is satisfied, the WorkKey signature-checking RKE instruction includes: the Bluetooth module receives the MAC in the broadcast packet by using WorkKey signature, and the signature verification algorithm is MAC = AES _ CMAC (RKEInfo).
In this embodiment, the broadcast packet includes an entity key device name and an RKE command, where a total length of an RKE command cryptograph and the MAC satisfies 31 bytes required by BLE broadcast.
Further, as shown in fig. 1, the bluetooth entity key S101: the remote control device is responsible for detecting key messages, safely sending RKE broadcast packets and communicating with the Bluetooth module through BLE; s102, a Bluetooth module: the RKE broadcast packet which is sent by the Bluetooth entity key is monitored, and the RKE command is analyzed, verified and forwarded; and S103, the vehicle body controller is connected with the Bluetooth module through the CAN to execute the CAN command of the Bluetooth module and complete control functions such as unlocking and locking.
As shown in fig. 2, the method of the embodiment of the present application includes: s201, detecting that a key is pressed down, S202, judging whether filtering anti-shake time is met, if yes, S203, an instruction sending counter +1, a work key encryption RKE instruction, a work key signature RKE instruction, S204, broadcasting a ciphertext RKE instruction, S205, bluetooth monitoring a broadcast packet, S206, judging whether the broadcast packet is in a white list and contains the RKE instruction, if yes, S207, a work key signature checking RKE instruction, S208, judging whether the signature passes, if the signature passes, performing the next step, S209, a work decryption E instruction, S210, judging whether the instruction sending counter is larger than an instruction receiving counter, S211, an instruction receiving counter +1, S212, sending a CAN message instruction to a vehicle body controller, and S213, the vehicle body controller executing the CAN message instruction.
Specifically, when detecting that a key is pressed, a bluetooth entity key performs filtering anti-shake processing, wherein the filtering time is generally limited to 30, 40, 50ms and the like, and if the filtering condition is not met, the filtering processing is discarded; if the filtering condition is met, entering the next step; the Bluetooth entity key sends the command to the counter (TXCounter) +1, obtains the RKE command ciphertext (RKEInfo) by using WorkKey encryption key information (KeyStsInfo) and the command sending counter (TXCounter), and then signs the RKE command ciphertext by using WorkKey. The correlation algorithm used is: RKEInfo = AES _ CBC (wortkey, BLEPhy _ TUID, keyStsInfo | | | TXCounter); MAC = AES _ CMAC (rkenfo). After the calculation is finished, broadcasting and transmitting for multiple times, such as 3 times, 4 times and the like, on channels 37, 38 and 39; after monitoring the broadcast packet, the Bluetooth module judges whether the broadcast packet is in a key management white list or not, whether the command contains an RKE command or not, and if the command does not meet the condition, discarding the broadcast packet; if the conditions are met, entering the next step; the Bluetooth module receives the MAC in the broadcast packet by using WorkKey signature verification, and if verification and comparison fail, discarding processing is carried out; if the signature verification is successful, the next step is carried out, wherein the signature verification algorithm is MAC = AES _ CMAC (RKEInfo); the Bluetooth module decrypts and receives an RKE instruction ciphertext (RKEInfo), key information (KeyStsInfo) and an instruction sending counter (TXCounter) in the broadcast packet by using WorkKey, compares the instruction sending counter (TXCounter) with an instruction receiving counter (RXCounter), and discards the command if the TXCounter < = RXCounter; if TXCounter is greater than RXCounter, processing RXCounter by +1, converting key information into a corresponding CAN command and sending the CAN command to the vehicle body controller; and the automobile body controller executes the CAN message after receiving the corresponding CAN message instruction.
FIG. 3 is a diagram of RKE broadcast structure commands shown in an exemplary embodiment of the present application.
Referring to fig. 3, after the RKE command is triggered, the broadcast packet includes the name of the entity key device and the RKE command, where the command cryptograph and the MAC have a total length that meets the broadcast requirement of BLE specification of 31 bytes. Such as an example device name with a total length of 7 bytes, RKE command 24 bytes (command cryptogram 16 bytes, MAC 6 bytes).
The core of the invention is to send the RKE command through a BLE broadcast channel when the RKE operation is triggered in the process of the disconnection or connection of the Bluetooth, and the safety, the legality and the anti-replay of the command need to be considered.
The embodiment of the present application further provides a device for implementing the function of controlling the vehicle by using the bluetooth entity key RKE, including:
the first judgment module is used for judging whether the filtering anti-shake time is met or not when the key is pressed down by the tooth entity key detection key, and discarding the key if the filtering anti-shake time is not met; if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command;
the broadcasting module is used for broadcasting and sending the ciphertext RKE instruction to the Bluetooth module;
the monitoring module is used for monitoring the broadcast packet sent by the Bluetooth entity key through Bluetooth;
the second judgment module is used for judging whether the broadcast packet is in a white list and whether the broadcast packet contains the RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet; if the condition is met, checking a signature RKE instruction by using a WorkKey;
the third judgment module is used for judging whether the signature checking RKE instruction passes or not, and discarding the signature checking RKE instruction if the verification comparison fails; if the verification is successful, the WorkKey decrypts the RKE instruction;
and the fourth judgment module is used for judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction to send the CAN message instruction to the automobile body controller.
It should be noted that the device for implementing the vehicle control function of the bluetooth entity key RKE provided in the foregoing embodiment and the method for implementing the vehicle control function of the bluetooth entity key RKE provided in the foregoing embodiment belong to the same concept, and specific manners of operations executed by each module and unit have been described in detail in the method embodiment, and are not described herein again. In practical applications, the device for implementing the function of controlling the vehicle by using the bluetooth entity key RKE provided in the foregoing embodiment may distribute the above functions by different function modules according to needs, that is, the internal structure of the device is divided into different function modules to implement all or part of the above described functions, which is not limited herein.
An embodiment of the present application further provides an electronic device, including: one or more processors; the storage device is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the electronic device is enabled to implement the method for implementing the bluetooth entity key RKE car control function provided in the foregoing embodiments.
The computer system includes a Central Processing Unit (CPU), which can perform various appropriate actions and processes, such as executing the methods described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) or a program loaded from a storage part into a Random Access Memory (RAM). In the RAM, various programs and data necessary for system operation are also stored. The CPU, ROM, and RAM are connected to each other via a bus. An Input/Output (I/O) interface is also connected to the bus.
The following components are connected to the I/O interface: an input section including a keyboard, a mouse, and the like; an output section including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section including a hard disk and the like; and a communication section including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section performs communication processing via a network such as the internet. The drive is also connected to the I/O interface as needed. A removable medium such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive as needed, so that the computer program read out therefrom is mounted into the storage section as needed.
In particular, according to embodiments of the present application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication section, and/or installed from a removable medium. The computer program, when executed by a Central Processing Unit (CPU), performs various functions defined in the system of the present application.
It should be noted that the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. The computer readable storage medium may be, for example, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer-readable signal medium may comprise a propagated data signal with a computer-readable computer program embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer program embodied on the computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
Yet another aspect of the application provides a computer readable storage medium having stored thereon a computer program which, when being executed by a processor, implements the method of implementing the bluetooth entity key, RKE, car control function as described above. The computer-readable storage medium may be included in the electronic device described in the above embodiment, or may exist separately without being incorporated in the electronic device.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Another aspect of the application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method for realizing the vehicle control function of the bluetooth entity key RKE provided in the above embodiments.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, and may also be implemented by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present application.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains.
It should be understood that the above-mentioned disclosure is only a preferred exemplary embodiment of the present application, and is not intended to limit the embodiments of the present application, and that those skilled in the art can easily make various changes and modifications according to the main concept and spirit of the present application, so that the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. A method for realizing a Bluetooth entity key RKE vehicle control function is characterized by comprising the following steps:
when the key is detected to be pressed down, judging whether the filtering anti-shake time is met, and if the filtering anti-shake time is not met, discarding the processing;
if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command;
and broadcasting and sending the encrypted RKE command to the Bluetooth module.
2. A method for realizing the vehicle control function of a Bluetooth entity key RKE is characterized by comprising the following steps:
monitoring a broadcast packet sent by a Bluetooth entity key;
judging whether the broadcast packet is in a white list and whether the broadcast packet contains an RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet;
if the condition is met, checking a signature RKE instruction by using a WorkKey;
verifying whether the verification is passed or not, and if the verification comparison fails, discarding the processing;
if the verification is successful, the WrokKey decrypts the RKE instruction;
and judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction to send the CAN message instruction to the automobile body controller.
3. A method for realizing the vehicle control function of a Bluetooth entity key RKE is characterized by comprising the following steps:
when the Bluetooth entity key detects that the key is pressed down, whether the filtering anti-shake time is met or not is judged, and if the filtering anti-shake time is not met, the filtering anti-shake time is discarded;
if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command;
broadcasting and sending a ciphertext RKE instruction to the Bluetooth module;
monitoring a broadcast packet sent by a Bluetooth entity key by Bluetooth;
judging whether the broadcast packet is in a white list and whether the broadcast packet contains an RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet;
if the condition is met, checking a signature RKE instruction by using a WorkKey;
verifying whether the verification passes, and if the verification fails, discarding the processing;
if the verification is successful, the WorkKey decrypts the RKE instruction;
and judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction and sending the CAN message instruction to the automobile body controller.
4. The method for implementing the function of controlling the vehicle by using the bluetooth entity key RKE as claimed in claim 3, comprising: the filtering anti-shake time is 30, 40 or 50ms.
5. The method for implementing the car control function of the bluetooth entity key RKE as claimed in claim 3, wherein if the filtering anti-shake time is satisfied, the command transmission counter +1,WorkKey encrypts and signs the RKE command, and broadcasts and transmits the ciphertext RKE command to the bluetooth module, comprising: the command sending counter TXCounter +1 obtains an RKE command ciphertext RKEInfo by using WorkKey encryption key information KeyStsInfo and the command sending counter TXCounter, and then signs the RKE command ciphertext by using WorkKey; the correlation algorithm used is: RKEInfo = AES _ CBC (wortkey, BLEPhy _ TUID, keyStsInfo | | | TXCounter); MAC = AES _ CMAC (RKEInfo), and is sent by multiple broadcasts at 37, 38, and 39 after completion of the calculation.
6. The method for realizing the vehicle control function of the Bluetooth entity key RKE as claimed in claim 3, wherein if the condition is satisfied, the WorkKey signature verification RKE instruction comprises: the Bluetooth module receives the MAC in the broadcast packet by using WorkKey signature verification, and the signature verification algorithm is MAC = AES _ CMAC (RKEInfo).
7. The method for realizing the RKE vehicle control function of the Bluetooth entity key according to claim 3, wherein the broadcast packet comprises an entity key device name and an RKE command, and the total length of the RKE command cryptograph and the MAC meets the BLE broadcast requirement of 31 bytes.
8. The utility model provides a realize device of bluetooth entity key RKE accuse car function which characterized in that includes:
the first judgment module is used for judging whether the filtering anti-shake time is met or not when the tooth entity key detection key is pressed down, and discarding the filtering anti-shake time if the filtering anti-shake time is not met; if the filtering anti-shake time is met, the command sending counter +1 is used, and the WorkKey encrypts and signs the RKE command;
the broadcasting module is used for broadcasting and sending the ciphertext RKE instruction to the Bluetooth module;
the monitoring module is used for monitoring the broadcast packet sent by the Bluetooth entity key through Bluetooth;
the second judgment module is used for judging whether the broadcast packet is in a white list and whether the broadcast packet contains the RKE instruction, and if the broadcast packet does not meet the conditions, discarding the broadcast packet; if the condition is met, checking a signature RKE instruction by using a WorkKey;
the third judgment module is used for judging whether the signature checking RKE instruction passes or not, and discarding the signature checking RKE instruction if the verification comparison fails; if the verification is successful, the WorkKey decrypts the RKE instruction;
and the fourth judgment module is used for judging whether the instruction sending counter is larger than the instruction receiving counter or not, if so, judging that the instruction receiving counter is plus 1, and simultaneously converting the key information into a corresponding CAN message instruction to send to the automobile body controller.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs that, when executed by the one or more processors, cause the electronic device to implement the method of implementing a bluetooth entity key, RKE, car control function as claimed in any one of claims 3 to 8.
10. A computer-readable storage medium, having stored thereon computer-readable instructions, which, when executed by a processor of a computer, cause the computer to execute the method of implementing a bluetooth entity key, RKE, vehicle control function of any of claims 3 to 8.
11. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, carries out the method of carrying out the function of controlling a vehicle by a bluetooth entity key, RKE, of any one of claims 3 to 8.
CN202211339702.3A 2022-10-28 2022-10-28 Method and device for realizing vehicle control function of Bluetooth entity key RKE Pending CN115701158A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211339702.3A CN115701158A (en) 2022-10-28 2022-10-28 Method and device for realizing vehicle control function of Bluetooth entity key RKE

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211339702.3A CN115701158A (en) 2022-10-28 2022-10-28 Method and device for realizing vehicle control function of Bluetooth entity key RKE

Publications (1)

Publication Number Publication Date
CN115701158A true CN115701158A (en) 2023-02-07

Family

ID=85120956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211339702.3A Pending CN115701158A (en) 2022-10-28 2022-10-28 Method and device for realizing vehicle control function of Bluetooth entity key RKE

Country Status (1)

Country Link
CN (1) CN115701158A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158640A1 (en) * 1999-07-30 2003-08-21 Oshkosh Truck Corporation Equipment service vehicle with network-assisted vehicle service and repair
CN107153786A (en) * 2017-05-26 2017-09-12 北京奇点数聚科技有限公司 A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing
CN107867262A (en) * 2016-09-28 2018-04-03 福特全球技术公司 Interference intercepts and the detection and defence of Replay Attack
CN109920102A (en) * 2019-02-02 2019-06-21 江门市新会区博上科技有限公司 A kind of smart lock method, apparatus, equipment and storage medium that bluetooth enters without spoon
DE102018002157A1 (en) * 2018-03-16 2019-09-19 Zf Active Safety Gmbh Device and method for the encrypted transmission of a digital control signal from a motor vehicle key to a motor vehicle
CN112085872A (en) * 2019-06-12 2020-12-15 华为技术有限公司 NFC-based unlocking method, related device and system
CN113053001A (en) * 2021-03-31 2021-06-29 雅迪科技集团有限公司 Electric vehicle Bluetooth unlocking system and method and power-on and power-off method using knob lock
CN113891290A (en) * 2021-09-29 2022-01-04 重庆长安汽车股份有限公司 Method and system for logging in vehicle-mounted system based on remote control key and vehicle
CN216161140U (en) * 2021-08-02 2022-04-01 上海沐申信息技术有限公司 PKE system and host and key thereof
US20220139137A1 (en) * 2013-02-07 2022-05-05 Ikeyless, Llc System, method and apparatus for multi-vendor rolling code keyless entry and for identifying and storing key information and creating duplicate keys and remote entry devices

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158640A1 (en) * 1999-07-30 2003-08-21 Oshkosh Truck Corporation Equipment service vehicle with network-assisted vehicle service and repair
US20220139137A1 (en) * 2013-02-07 2022-05-05 Ikeyless, Llc System, method and apparatus for multi-vendor rolling code keyless entry and for identifying and storing key information and creating duplicate keys and remote entry devices
CN107867262A (en) * 2016-09-28 2018-04-03 福特全球技术公司 Interference intercepts and the detection and defence of Replay Attack
CN107153786A (en) * 2017-05-26 2017-09-12 北京奇点数聚科技有限公司 A kind of man-machine recognition methods, system and terminal device, readable storage medium storing program for executing
DE102018002157A1 (en) * 2018-03-16 2019-09-19 Zf Active Safety Gmbh Device and method for the encrypted transmission of a digital control signal from a motor vehicle key to a motor vehicle
CN109920102A (en) * 2019-02-02 2019-06-21 江门市新会区博上科技有限公司 A kind of smart lock method, apparatus, equipment and storage medium that bluetooth enters without spoon
CN112085872A (en) * 2019-06-12 2020-12-15 华为技术有限公司 NFC-based unlocking method, related device and system
CN113053001A (en) * 2021-03-31 2021-06-29 雅迪科技集团有限公司 Electric vehicle Bluetooth unlocking system and method and power-on and power-off method using knob lock
CN216161140U (en) * 2021-08-02 2022-04-01 上海沐申信息技术有限公司 PKE system and host and key thereof
CN113891290A (en) * 2021-09-29 2022-01-04 重庆长安汽车股份有限公司 Method and system for logging in vehicle-mounted system based on remote control key and vehicle

Similar Documents

Publication Publication Date Title
CN110177354B (en) Wireless control method and system for vehicle
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN108347331B (en) Method and device for safe communication between T _ Box device and ECU device in Internet of vehicles system
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN112543927B (en) Equipment upgrading method and related equipment
CN111400727B (en) Block chain access control method and device and electronic equipment
US20130138961A1 (en) Communication terminal, communication system, communication method and communication program
CN108306727A (en) For encrypting, decrypting and the method and apparatus of certification
CN113794734A (en) Vehicle-mounted CAN bus encryption communication method, control device and readable storage medium
CN101810017A (en) Selective security termination in next generation mobile networks
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN115208697A (en) Adaptive data encryption method and device based on attack behavior
CN115277219A (en) Message encryption method, message decryption method, message encryption device, message decryption device, and storage medium
CN115396191A (en) Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium
CN112003697A (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
WO2021170049A1 (en) Method and apparatus for recording access behavior
US20240073020A1 (en) Digital key pairing method, pairing system, and vehicle
CN115701158A (en) Method and device for realizing vehicle control function of Bluetooth entity key RKE
CN113961931A (en) Adb tool using method and device and electronic equipment
CN111885510B (en) Attendance checking method, attendance checking client and attendance checking system
CN115334480A (en) Bluetooth peripheral and central equipment and verification method
CN111654731A (en) Key information transmission method and device, electronic equipment and computer storage medium
CN112055952B (en) Vehicle-mounted equipment upgrading method and related equipment
CN111314320B (en) Communication method, terminal, server and system based on HTTP
CN116738472B (en) Task data encryption method, device and equipment applied to task data interaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination