CN117915324A - Vehicle key processing method and device, vehicle key and storage medium - Google Patents

Vehicle key processing method and device, vehicle key and storage medium Download PDF

Info

Publication number
CN117915324A
CN117915324A CN202410089551.3A CN202410089551A CN117915324A CN 117915324 A CN117915324 A CN 117915324A CN 202410089551 A CN202410089551 A CN 202410089551A CN 117915324 A CN117915324 A CN 117915324A
Authority
CN
China
Prior art keywords
key
vehicle
random number
car
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410089551.3A
Other languages
Chinese (zh)
Inventor
林翌桢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Automobile Technology Co Ltd
Original Assignee
Xiaomi Automobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Automobile Technology Co Ltd filed Critical Xiaomi Automobile Technology Co Ltd
Priority to CN202410089551.3A priority Critical patent/CN117915324A/en
Publication of CN117915324A publication Critical patent/CN117915324A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The disclosure relates to a vehicle key processing method, a device, a vehicle key and a storage medium, and belongs to the technical field of vehicles, wherein the method applied to the vehicle comprises the following steps: the vehicle key to be paired is subjected to trusted verification through a preset target key in the vehicle, wherein the target key is a key of a key system to which the vehicle belongs; under the condition that the credible verification result represents that the vehicle key is credible, deriving a vehicle key based on the vehicle key information and a preset characteristic key in the vehicle; and sending the car key to the car key, wherein the car key is used for the car key to finish pairing with the vehicle. In this way, pairing between the vehicle and the vehicle key is possible. The pairing mode is independent of a network and a cloud server, and has higher freedom degree and higher usability.

Description

Vehicle key processing method and device, vehicle key and storage medium
Technical Field
The disclosure relates to the technical field of vehicles, and in particular relates to a vehicle key processing method and device, a vehicle key and a storage medium.
Background
The car key is an accessory of the vehicle. In general, a vehicle key needs to be paired with a vehicle before the vehicle is controlled using the vehicle key. In the related scene, the use process of the car key also needs to rely on more complex configuration, and the car using experience of a user can be possibly influenced.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a vehicle key processing method, a device, a vehicle key, and a storage medium.
According to a first aspect of an embodiment of the present disclosure, there is provided a processing method of a vehicle key, applied to a vehicle, in which a feature key of the vehicle and a target key of a key system to which the vehicle belongs are preset, the method including:
Performing trusted verification on the car key to be paired through the target key;
Under the condition that the credible verification result represents that the car key is credible, deriving a car key based on the characteristic key and car key information;
And sending the car key to the car key, wherein the car key is used for the car key to finish pairing with the vehicle.
According to a second aspect of embodiments of the present disclosure, there is provided a method for processing a vehicle key, applied to the vehicle key, the method including:
Performing trusted verification with a vehicle, wherein the vehicle performs trusted verification with the vehicle key based on a target key, and the target key is a key of a key system to which the vehicle belongs;
and receiving a vehicle key sent by the vehicle, wherein the vehicle key is sent by the vehicle under the condition that the vehicle is trusted by the trusted verification result to represent the vehicle key, the vehicle key is derived by the vehicle based on vehicle key information and a characteristic key of the vehicle preset in the vehicle, and the vehicle key is used for the vehicle key to finish pairing with the vehicle.
According to a third aspect of the embodiments of the present disclosure, there is provided a processing device of a vehicle key, applied to a vehicle in which a feature key of the vehicle and a target key of a key system to which the vehicle belongs are preset, the device including:
The first module is configured to perform trusted verification on the car keys to be paired through the target key;
the second module is configured to derive a vehicle key based on the characteristic key and the vehicle key information under the condition that the trusted verification result represents that the vehicle key is trusted;
And a third module configured to send the car key to the car key, the car key being used by the car key to complete pairing with the vehicle.
According to a fourth aspect of embodiments of the present disclosure, there is provided a processing device for a vehicle key, applied to the vehicle key, the device comprising:
A fourth module configured to perform a trusted verification with a vehicle, the vehicle performing a trusted verification with the vehicle key based on a target key, the target key being a key of a key system to which the vehicle belongs;
And a fifth module configured to receive a car key sent by the vehicle, where the car key is sent by the vehicle when the trust verification result indicates that the car key is trusted, the car key is derived by the vehicle based on car key information and a characteristic key of the vehicle preset in the vehicle, and the car key is used for the car key to complete pairing with the vehicle.
According to a fifth aspect of embodiments of the present disclosure, there is provided a vehicle comprising:
A processor;
A memory for storing processor-executable instructions;
Wherein the processor is configured to perform the method described in the first aspect.
According to a sixth aspect of embodiments of the present disclosure, there is provided a vehicle key, comprising:
A processor;
A memory for storing processor-executable instructions;
Wherein the processor is configured to perform the method described in the second aspect.
According to a seventh aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of any one of the first to second aspects.
In the scheme, the characteristic key of the vehicle and the target key of the key system to which the vehicle belongs are preset in the vehicle. In this way, the vehicle can perform trusted verification on the vehicle key to be paired through the target key. And under the condition that the credible verification result represents that the vehicle key is credible, the vehicle can derive the vehicle key based on the vehicle key information and the characteristic key. In this way, the car key may be transmitted to the car key, which is used by the car key to complete pairing with the vehicle. By adopting the scheme, the vehicle can generate the vehicle key according to the preset characteristic key in the vehicle. In this way, pairing between the vehicle and the vehicle key is possible. The pairing mode is independent of a network and a cloud server, and has higher freedom degree and higher usability.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart illustrating a method of processing a car key according to an exemplary embodiment.
FIG. 2 is a flow chart illustrating a vehicle key pairing according to an exemplary embodiment.
FIG. 3 is a schematic diagram illustrating communication of a vehicle key and a vehicle lock, according to an exemplary embodiment.
FIG. 4 is a flowchart illustrating a method of disarming a key pairing of a vehicle according to one exemplary embodiment.
FIG. 5 is a flowchart illustrating a vehicle key and a vehicle, according to an exemplary embodiment.
Fig. 6 is a flowchart illustrating a method of processing a car key according to an exemplary embodiment.
Fig. 7 is a block diagram illustrating a processing device for a car key according to an exemplary embodiment.
Fig. 8 is a block diagram illustrating a processing device of a car key according to an exemplary embodiment.
Fig. 9 is a block diagram of a vehicle 600, according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Before describing the processing method, device, vehicle key and storage medium of the present disclosure, related scenarios of the present disclosure will be first described. The car key is an accessory of the car and can comprise various forms such as cards, fobs, mobile phones and the like. In general, a vehicle key needs to be paired with a vehicle before the vehicle is controlled using the vehicle key. In the related scenario, the pairing of the vehicle key and the vehicle also needs to rely on more complex configuration, which may affect the user experience of using the vehicle.
For example, for car keys without networking functions (such as card keys and fob keys), it is common to finish filling and pairing car keys on the production line, thus possibly resulting in increased production processes. Meanwhile, such keys are generally provided to be paired with a certain vehicle. In use, it is difficult for a user to release the pairing state of the car key and apply the car key to other vehicles. Further, in some scenarios, pairing of the car key with the vehicle may also require participation of the vehicle cloud service, making pairing of the car key difficult in an offline scenario.
To this end, an embodiment of the present disclosure provides a processing method of a vehicle key, which is applied to a vehicle, where a feature key of the vehicle and a target key of a key system to which the vehicle belongs are preset in the vehicle. In some implementations, the feature keys for different vehicles may be different. As an example, different feature keys may be configured for different vehicles during the vehicle production phase. The target key can be a key set for a key system of the same vehicle type, and the target key can also be a key set for a key system of the same vehicle enterprise. The target key may be used to verify whether a car key belongs to the key system, thereby determining whether the car key is authentic. In a possible embodiment, the method is applied to a vehicle lock device in a vehicle, wherein the characteristic key and the target key are preset in the vehicle lock device. Fig. 1 is a flowchart of a processing method of a car key according to an exemplary embodiment of the present disclosure, and referring to fig. 1, the method includes:
In step S11, the vehicle key to be paired is verified with the target key for trust.
As an example, the car key may be a car key without networking function, such as a card key, a fob key, etc.
Referring to a flow chart of pairing car keys shown in fig. 2, in one possible implementation, the trusted verification of the car key to be paired by the target key includes:
The method comprises the steps of receiving first information sent by a vehicle key, wherein the first information comprises vehicle key information, a first random number generated by the vehicle key and a first ciphertext, the first ciphertext is obtained by encrypting a second random number generated by a vehicle by the vehicle key based on a first communication key, the first communication key is obtained by key derivation of the vehicle key based on a first parameter and a first derivative key preset by the vehicle key in factory, the first parameter is generated according to the first random number and the second random number, and the first derivative key is obtained by key derivation based on the vehicle key information and a key used for performing vehicle key trusted verification in a key system to which the vehicle key belongs.
As described in connection with fig. 2, in some scenarios, a vehicle key may be coupled to a vehicle in response to a user initiating a key pairing operation. For example, a vehicle key and a vehicle lock device may be connected. The connection mode may be Near Field Communication (NFC), bluetooth, ultra Wideband (UWB), etc. After the connection is established, the vehicle may generate a second random number r, for example, and send an instruction 1 to the vehicle key, where the instruction 1 may include the second random number and vehicle information, and the vehicle information may be, for example, data such as a vehicle identifier. The vehicle key may generate a first random number s after receiving the instruction 1, and generate a first parameter according to the first random number and the second random number. As an example, the first random number s and the second random number R may be spliced and combined to obtain a first parameter, which may be denoted as R, for example.
Furthermore, the vehicle key may obtain a first derivative key, which may be written to the vehicle key, for example, at a production stage of the vehicle key. Referring to a communication schematic diagram of a car key and a car lock shown in fig. 3, in some embodiments, a key for performing a trusted verification of the car key in a key system to which the car key belongs may be obtained during a production phase of the car key. For example, a key system may be set for the same vehicle model, or for the same manufacturer, and may be set, for example, with a target key for performing a vehicle key trust verification, such as the key a. Thus, during the production of the vehicle key, the key a can be obtained, and the key derivation can be performed based on the vehicle key information and the key a, so as to obtain the first derived key a. Referring to fig. 3, the first derivative key a may be written, for example, to a security chip of the vehicle key, and the key a may be written to a security chip of a vehicle lock (device).
Referring to fig. 2, after obtaining the first derivative key a, a first communication key may be obtained by a key derivation method based on the first parameter and the first derivative key, and denoted as aR. The vehicle key may further encrypt the second random number r generated by the vehicle based on the first communication key aR to obtain a first ciphertext c. In this way, the vehicle key may reply to the command 1, and send first information to the vehicle, the first information including the first ciphertext c, the vehicle key information, and the first random number s.
The vehicle can derive a second derived key according to the vehicle key information and the target key in response to receiving the first information; generating a first parameter based on the first random number and the second random number; and deriving a second communication key according to the first parameter and the second derivative key.
As described with reference to fig. 2, the vehicle may, for example, acquire a preset target key a, and derive a second derivative key a' by performing key derivation with the vehicle key information and the target key a. The vehicle may also generate the first parameter R from the first random number s and the second random number R. In this way, the vehicle can derive the second communication key, e.g. denoted as a 'R, by key derivation based on R and the second derivative key a'.
The vehicle may decrypt the first ciphertext according to the second communication key a' R. And under the condition that the second random number r is obtained through decryption, the vehicle determines that the first communication key is consistent with the second communication key, and determines that the vehicle key is credible. That is, the vehicle key belongs to the same key system as the vehicle.
Referring to fig. 1, in step S12, in the case where the trust verification result indicates that the vehicle key is trusted, the vehicle key is derived based on the feature key and the vehicle key information.
In one possible embodiment, the feature key B is also preset in the vehicle or in the vehicle lock device. In this way, in the case that the trust verification result indicates that the vehicle key is trusted, the vehicle can derive the vehicle key B based on the feature key B and the vehicle key information.
In step S13, the car key is transmitted to the car key, and the car key is used for the car key to complete pairing with the vehicle.
In one embodiment, the car key may be sent to the car key.
In one embodiment, the car key may also be encrypted and sent to the car key. For example, step S13 may include:
Encrypting the car key and the first random number through the second communication key to obtain a second ciphertext;
And sending the second ciphertext to the car key, wherein the second ciphertext is used for decrypting the car key according to the first communication key to obtain the car key and the first random number, and the car key receives the car key under the condition that the decrypted first random number is consistent with the first random number in the car key.
As described in connection with fig. 2, the vehicle may derive the vehicle key B from the key B and the vehicle key information. The vehicle may also encrypt the vehicle key b and the first random number s using the second communication key a' R to obtain a second ciphertext d. In this way, the vehicle can send instruction 2 including the second ciphertext d to the vehicle key. In a possible embodiment, the vehicle may also send the second ciphertext d along with other information to the vehicle key. The other information may be information that needs to be sent to the car key, as determined based on the application requirements, which is not limited by the embodiments of the present disclosure.
After the vehicle key receives the second ciphertext d, the first communication key may be used to decrypt d. And under the condition that the decrypted first random number is consistent with the first random number in the car key, the car key can accept the car key, and the car key b is stored in a safety space.
The scheme can transmit the car key to the car key in the form of ciphertext, and is beneficial to improving the safety of the car key.
In one possible embodiment, the vehicle key may also feed back the reception result of the vehicle key to the vehicle. For example, in one embodiment, the vehicle key may calculate a first verification value based on the vehicle key; encrypting the first verification value based on the first communication key to obtain a third ciphertext; and sending second information to the vehicle, wherein the second information comprises the third ciphertext.
As described in connection with fig. 2, the vehicle key may calculate a first verification value bmac based on b, for example. As an example, the vehicle key b may be hashed, and the obtained hash value is used as the first verification value bmac. In a possible embodiment, the mode of calculation of the verification value can be preset in the vehicle key and the vehicle. In this way, the vehicle key may also calculate the first verification value according to b and a preset verification value calculation manner.
Referring to fig. 2, the vehicle key may further encrypt bmac with the first communication key aR to obtain a third ciphertext e. In this way, the vehicle key may send a second message to the vehicle, which may be a reply to instruction 2, the second message including the third ciphertext e.
In this case, the processing method of the car key further includes, on the basis of fig. 1:
receiving second information sent by a vehicle key;
Calculating a second verification value by a vehicle key in the vehicle;
Decrypting the third ciphertext with a second communication key;
under the condition that the decryption result is consistent with the second verification value, determining that the car key successfully receives the car key;
And if the decryption result is inconsistent with the second verification value, sending a first instruction to the car key, wherein the first instruction is used for indicating the car key to clear the received car key.
As described in connection with fig. 2, the vehicle may calculate the second verification value by the vehicle key b in the vehicle. Along with the above example, a hash value of b may be calculated, resulting in a second verification value. The vehicle may also decrypt the third ciphertext via the second communication key a' R. And under the condition that the decryption result is consistent with the second verification value, determining that the vehicle key successfully receives the vehicle key. At this time, the pairing of the vehicle and the vehicle key is completed, the vehicle key information and the vehicle key are stored in the vehicle, and the vehicle information and the vehicle key are stored in the vehicle key.
In some embodiments, the decryption result is inconsistent with the second verification value. In this case, the vehicle may determine that the vehicle key receives the vehicle key abnormality. And sending a first instruction to the car key, wherein the first instruction is used for instructing the car key to clear the received car key. In this way, the vehicle key may delete the received vehicle key and modify its own state from the paired state to the unpaired state in response to the first instruction.
In the scheme, the characteristic key of the vehicle and the target key of the key system to which the vehicle belongs are preset in the vehicle. In this way, the vehicle can perform trusted verification on the vehicle key to be paired through the target key. And under the condition that the credible verification result represents that the vehicle key is credible, the vehicle can derive the vehicle key based on the vehicle key information and the characteristic key. In this way, the car key may be transmitted to the car key, which is used by the car key to complete pairing with the vehicle. By adopting the scheme, the vehicle can generate the vehicle key according to the preset characteristic key in the vehicle. In this way, pairing between the vehicle and the vehicle key is possible. The pairing mode is independent of a network and a cloud server, and has higher freedom degree and higher usability.
In addition, the scheme supports the user to pair by using the car key, namely, the pairing is not required to be completed before leaving the factory. Compared with the mode that the car key and the car are matched before leaving the factory in the related art, the scheme can achieve the effect of saving production procedures. In addition, the scheme has the advantages of mutual authentication and forward confidentiality, and helps to prevent penetration attacks.
In some implementations, the vehicle may lose the feature key. For example, the vehicle may perform a vehicle lock device replacement, thereby losing the feature key. In this case, the pairing release operation may be performed on the vehicle key.
For example, in one embodiment, after the vehicle key is sent to the vehicle key, the method includes:
And acquiring information of the vehicle under the condition that the characteristic key is determined to be lost. For example, in some embodiments, the information of the vehicle may be obtained from a vehicle cloud service, which may include, for example, pairing information of the vehicle.
In this way, the vehicle can perform a trusted verification of the vehicle key. Fig. 4 is a flowchart of a method for unlocking a pairing of vehicle keys according to an exemplary embodiment of the present disclosure, wherein reference is made to the description in the above embodiment for a way of verifying the vehicle key trusted, and for brevity of description, the embodiment of the present disclosure will not be repeated.
And under the condition that the trusted verification result represents that the vehicle key is trusted, encrypting the first random number and the pairing release instruction of the vehicle key according to the information of the vehicle by the second communication key to obtain a fourth ciphertext.
As described in connection with fig. 4, the information of the vehicle may be encrypted using the second communication key a' R, the first random number s, and the unpaired data to obtain the fourth ciphertext h. The unpaired data may include, for example, a unpaired instruction of the vehicle key.
The vehicle can also send the fourth ciphertext to the vehicle key, wherein the fourth ciphertext is used for the vehicle key to decrypt according to the first communication key to obtain the information of the vehicle, the first random number and the pairing release instruction.
For example, referring to fig. 4, the vehicle key may decrypt the fourth ciphertext using, for example, the first communication key to obtain the information of the vehicle, the first random number, and the pairing release instruction. In this way, when the decrypted first random number matches the first random number in the vehicle key and the decrypted information of the vehicle matches the information of the paired vehicle in the vehicle key, the vehicle key can release the pairing with the vehicle in response to the pairing release instruction.
Therefore, the scheme can be used for carrying out pairing removal on the car key under the condition that the characteristic key is lost. In addition, as the pairing of the vehicle key is released, the vehicle key can be paired with the vehicle again or with the related vehicle meeting the pairing requirement without returning to a factory for repair. In this way, the usability of the vehicle key can be improved.
In some embodiments, the vehicle key may also control the vehicle based on the paired vehicle key. The vehicle key may be authenticated with the vehicle prior to controlling the vehicle. For example, in one possible embodiment, the method includes, on the basis of fig. 1:
And receiving third information sent by the vehicle key, wherein the third information comprises vehicle key information, a third random number generated by the vehicle key and a fifth ciphertext, the fifth ciphertext is obtained by encrypting a fourth random number generated by the vehicle key based on a third communication key, the third communication key is obtained by deriving a key by the vehicle key based on a second parameter and the vehicle key, and the second parameter is generated according to the third random number and the fourth random number.
Fig. 5 is a flowchart illustrating a vehicle key and a vehicle according to an exemplary embodiment of the present disclosure. As described in connection with fig. 5, in some scenarios, a vehicle key may be coupled to a vehicle in response to a user operation using the vehicle key. After the connection is established, the vehicle may for example generate a fourth random number m and send an instruction 5 to the vehicle key, which instruction 5 may comprise said fourth random number together with the vehicle information. The vehicle key may generate a third random number n after receiving the instruction 5, and generate a second parameter according to the third random number and a fourth random number. As an example, the third random number n and the fourth random number m may be spliced to obtain a second parameter, which may be denoted as T, for example.
In addition, the vehicle key may obtain the vehicle key b, and obtain a third communication key, denoted by bT, by means of key derivation based on the second parameter and the vehicle key. The vehicle key may further encrypt the fourth random number m generated by the vehicle based on the third communication key bT to obtain a fifth ciphertext x. In this way, the vehicle key may reply to the command 5, and send third information to the vehicle, the third information including the fifth ciphertext x, the vehicle key information, and the third random number n.
The vehicle can derive a vehicle key based on the characteristic key and the vehicle key information; generating a second parameter based on the third random number and the fourth random number; and deriving a fourth communication key according to the second parameter and the vehicle key.
As described with reference to fig. 5, the vehicle may, for example, acquire a preset feature key B, and derive a key derivative from the vehicle key information and the feature key B to obtain a vehicle key B'. In addition, the vehicle may also generate a second parameter T from the third random number n and the fourth random number m. Thus, the vehicle may derive a fourth communications key, e.g., denoted b 'T, by key derivation based on T and the vehicle key b'.
The vehicle may decrypt the fifth ciphertext according to the fourth communication key b' T. And under the condition that the fourth random number m is obtained through decryption, the vehicle determines that the third communication key is consistent with the fourth communication key, and determines that the vehicle key is the vehicle key of the vehicle.
In this way, the vehicle key can encrypt the vehicle control instruction using the third communication key, and transmit the encryption result to the vehicle. The vehicle can decrypt the encryption result according to the fourth communication key to obtain the vehicle control instruction and respond to the vehicle control instruction.
In addition, the vehicle may encrypt the vehicle key control command using the fourth communication key, and transmit the encryption result to the vehicle. The vehicle can decrypt the encryption result according to the third communication key to obtain the vehicle key control instruction and respond to the vehicle key control instruction.
For example, in one possible embodiment, the vehicle control command may be a pairing release command for a vehicle key. The method comprises the following steps:
In response to a request for vehicle key pairing release, adjusting a state of the vehicle key in a vehicle to a disabled state;
after the vehicle key is determined to be the vehicle key of the vehicle, the method further comprises:
encrypting the pairing release instruction of the vehicle key and the third random number through the fourth communication key to obtain an encryption instruction;
and sending the encryption instruction to the vehicle key, wherein the encryption instruction is used for the vehicle key to decrypt according to the third communication key to obtain a pairing release instruction and a third random number, the pairing release instruction is used for indicating the vehicle key to release the pairing with the vehicle, and the pairing release instruction is executed when the third random number obtained by decrypting the vehicle key is consistent with the third random number in the vehicle key.
That is, the vehicle may encrypt the pairing release instruction of the vehicle key and the third random number using the fourth communication key, and transmit the encrypted instruction to the vehicle key. The car key can decrypt the encrypted instruction according to the third communication key to obtain the pairing release instruction and the third random number. In this way, when the third random number decrypted by the vehicle key matches the third random number in the vehicle key, the vehicle key responds to the pairing release instruction to release the pairing with the vehicle.
Thus, the scheme can be used for carrying out pairing release on the car key. In addition, as the pairing of the vehicle key is released, the vehicle key can be paired with the vehicle again or with the related vehicle meeting the pairing requirement without returning to a factory for repair. In this way, the usability of the vehicle key can be improved.
Based on the same inventive concept, the embodiment of the present disclosure also provides a processing method of a vehicle key, which is applied to the vehicle key, where the vehicle key may be the vehicle key related to the above embodiment. Fig. 6 is a flowchart of a processing method of a car key according to an exemplary embodiment of the present disclosure, and referring to fig. 6, the method includes:
In step S61, a trust verification is performed with the vehicle. The vehicle performs trusted verification with the vehicle key based on a target key, wherein the target key is a key of a key system to which the vehicle belongs.
In one possible embodiment, the trusted verification with the vehicle comprises:
generating a first parameter according to a first random number generated by a vehicle key and a second random number generated by the vehicle;
Deriving a first communication key based on the first parameter and a first derivative key preset by a vehicle key factory, wherein the first derivative key is derived from a key for performing vehicle key trusted verification in a key system to which the vehicle key belongs based on vehicle key information;
encrypting the second random number through the first communication key to obtain a first ciphertext;
transmitting first information to the vehicle, wherein the first information comprises vehicle key information, the first random number and a first ciphertext;
The first information is used for the vehicle to determine whether the vehicle key is trusted or not, and the vehicle determines whether the vehicle key is trusted or not by the following method: deriving a second derived key according to the vehicle key information and a target key preset in the vehicle; generating a first parameter based on the first random number and the second random number; deriving a second communication key according to the first parameter and the second derivative key; decrypting the first ciphertext with the second communication key; and under the condition that the first decryption result is that the second random number is obtained, determining that the first communication key is consistent with the second communication key, and determining that the car key is credible.
In step S62, a vehicle key sent by the vehicle is received, the vehicle key is sent by the vehicle under the condition that the vehicle key is trusted as represented by a trusted verification result, the vehicle key is derived by the vehicle based on the vehicle key information and a characteristic key of the vehicle preset in the vehicle, and the vehicle key is used for the vehicle key to complete pairing with the vehicle.
For example, in one embodiment, the receiving the vehicle key sent by the vehicle includes:
receiving a second ciphertext sent by the vehicle, wherein the second ciphertext is obtained by encrypting the vehicle key and the first random number by the vehicle through the second communication key;
decrypting the second ciphertext according to the first communication key to obtain a vehicle key and a first random number;
And receiving the vehicle key when the decrypted first random number is consistent with the first random number in the vehicle key.
In one embodiment, the method further comprises:
calculating a first verification value based on the car key;
encrypting the first verification value based on the first communication key to obtain a third ciphertext;
Transmitting second information to the vehicle, the second information including the third ciphertext;
The second information is used for the vehicle to determine whether the vehicle key correctly receives the vehicle key, and the vehicle calculates a second verification value through the vehicle key in the vehicle; decrypting the third ciphertext with a second communication key; and determining that the car key successfully receives the car key under the condition that the decryption result is consistent with the second verification value;
In response to a first instruction by the vehicle to clear the received vehicle key, the first instruction is sent by the vehicle if it is determined that the decryption result is inconsistent with the second verification value.
In one possible implementation manner, after receiving the vehicle key sent by the vehicle, the method includes:
Responding to the request of the vehicle, and performing trusted verification with the vehicle;
Receiving a fourth ciphertext sent by the vehicle, wherein the fourth ciphertext is sent by the vehicle under the condition that a trusted verification result represents that the vehicle key is trusted, the fourth ciphertext is obtained by encrypting information of the vehicle, the first random number and a pairing release instruction of the vehicle key according to the second communication key by the vehicle, and the information of the vehicle is obtained by the vehicle under the condition that the characteristic key is determined to be lost;
decrypting according to the first communication key to obtain the information of the vehicle, the first random number and a pairing release instruction;
And when the decrypted first random number is consistent with the first random number in the vehicle key and the decrypted information of the vehicle is consistent with the paired vehicle information in the vehicle key, the pairing with the vehicle is released in response to the pairing release instruction.
In the scheme, the characteristic key of the vehicle and the target key of the key system to which the vehicle belongs are preset in the vehicle. In this way, the vehicle can perform trusted verification on the vehicle key to be paired through the target key. And under the condition that the credible verification result represents that the vehicle key is credible, the vehicle can derive the vehicle key based on the vehicle key information and the characteristic key. In this way, the car key may be transmitted to the car key, which is used by the car key to complete pairing with the vehicle. By adopting the scheme, the vehicle can generate the vehicle key according to the preset characteristic key in the vehicle. In this way, pairing between the vehicle and the vehicle key is possible. The pairing mode is independent of a network and a cloud server, and has higher freedom degree and higher usability.
In one possible embodiment, the method comprises, on the basis of fig. 6:
Generating a second parameter according to a third random number generated by the vehicle key and a fourth random number generated by the vehicle;
performing key derivation based on the second parameter and the vehicle key to obtain a third communication key;
Encrypting the fourth random number through the third communication key to obtain a fifth ciphertext;
Transmitting third information to the vehicle, wherein the third information comprises vehicle key information, a third random number and a fifth ciphertext;
The third information is used for the vehicle to determine whether the vehicle key is the vehicle key of the vehicle, and the vehicle determines whether the vehicle key is the vehicle key of the vehicle by the following modes: deriving a car key based on the characteristic key and car key information; generating a second parameter based on the third random number and the fourth random number; deriving a fourth communication key according to the second parameter and the vehicle key; decrypting the fifth ciphertext with the fourth communication key; and under the condition that the fourth random number is obtained through decryption, determining that the third communication key is consistent with the fourth communication key, and determining that the vehicle key is the vehicle key of the vehicle.
Optionally, the method comprises:
Receiving an encryption instruction sent by the vehicle, wherein the encryption instruction is generated by the vehicle after the vehicle determines that the vehicle key is the vehicle key of the vehicle, and the encryption instruction quality is obtained by encrypting a pairing release instruction of the vehicle key and the third random number by the vehicle through the fourth communication key;
decrypting the encryption instruction according to the third communication key to obtain a pairing release instruction and a third random number;
and when the decrypted third random number is consistent with the third random number in the vehicle key, the pairing with the vehicle is released in response to the pairing release instruction.
The specific manner of the steps in the above-described method embodiments has been described in detail in relation to embodiments of the processing method of the vehicle key applied to the vehicle, and will not be explained in detail here.
Based on the same inventive concept, the embodiment of the disclosure provides a processing device of a vehicle key, which is applied to a vehicle, wherein a characteristic key of the vehicle and a target key of a key system to which the vehicle belongs are preset in the vehicle. Fig. 7 is a block diagram of a processing device for a car key according to an exemplary embodiment of the present disclosure, and referring to fig. 7, the processing device for a car key includes:
a first module 701 configured to perform a trusted verification of a vehicle key to be paired with the target key;
A second module 702 configured to derive a car key based on the feature key and car key information if the trust verification result characterizes the car key as trusted;
A third module 703 is configured to send the car key to the car key, the car key being used by the car key to complete pairing with the vehicle.
In the scheme, the characteristic key of the vehicle and the target key of the key system to which the vehicle belongs are preset in the vehicle. In this way, the vehicle can perform trusted verification on the vehicle key to be paired through the target key. And under the condition that the credible verification result represents that the vehicle key is credible, the vehicle can derive the vehicle key based on the vehicle key information and the characteristic key. In this way, the car key may be transmitted to the car key, which is used by the car key to complete pairing with the vehicle. By adopting the scheme, the vehicle can generate the vehicle key according to the preset characteristic key in the vehicle. In this way, pairing between the vehicle and the vehicle key is possible. The pairing mode is independent of a network and a cloud server, and has higher freedom degree and higher usability.
Optionally, the method for verifying the trust of the car key comprises the following steps:
Receiving first information sent by a vehicle key, wherein the first information comprises vehicle key information, a first random number generated by the vehicle key and a first ciphertext, the first ciphertext is obtained by encrypting a second random number generated by a vehicle by the vehicle key based on a first communication key, the first communication key is obtained by key derivation of the vehicle key based on a first parameter and a first derivative key preset by the vehicle key in factory, the first parameter is generated according to the first random number and the second random number, and the first derivative key is obtained by key derivation based on the vehicle key information and a key for performing vehicle key trusted verification in a key system to which the vehicle key belongs;
deriving a second derived key according to the vehicle key information and the target key;
generating a first parameter based on the first random number and the second random number;
deriving a second communication key according to the first parameter and the second derivative key;
decrypting the first ciphertext with the second communication key;
and under the condition that the second random number is obtained through decryption, determining that the first communication key is consistent with the second communication key, and determining that the car key is credible.
Optionally, the third module 703 includes:
The first sub-module is configured to encrypt the vehicle key and the first random number through the second communication key to obtain a second ciphertext;
the second sub-module is configured to send the second ciphertext to the car key, the second ciphertext is used for the car key to decrypt according to the first communication key to obtain the car key and the first random number, and the car key receives the car key when the first random number obtained through decryption is identical to the first random number in the car key.
Optionally, the method comprises:
A sixth module configured to receive second information sent by a vehicle key, where the second information includes a third ciphertext obtained by encrypting, by the vehicle key, a first verification value based on the first communication key, the first verification value being calculated by the vehicle key based on the vehicle key;
A seventh module configured to calculate a second verification value from a vehicle key in the vehicle;
an eighth module configured to decrypt the third ciphertext with a second communication key;
A ninth module configured to determine that the car key successfully receives the car key if the decryption result is consistent with the second verification value;
and a tenth module configured to send a first instruction to the car key, the first instruction being used to instruct the car key to clear the received car key, if the decryption result is inconsistent with the second verification value.
Optionally, the method comprises:
an eleventh module configured to acquire information of the vehicle in case it is determined that the feature key is lost after the third module 703 transmits the vehicle key to the vehicle key;
A twelfth module configured to perform a trusted verification of the vehicle key;
A thirteenth module configured to encrypt, according to the second communication key, the information of the vehicle, the first random number, and a pairing release instruction of the vehicle key to obtain a fourth ciphertext, when the trusted verification result indicates that the vehicle key is trusted;
A fourteenth module configured to send the fourth ciphertext to the vehicle key, the fourth ciphertext being used by the vehicle key to decrypt the information of the vehicle according to the first communication key, the first random number, and a pairing release instruction; the pairing release instruction is used for indicating the vehicle key to release the pairing with the vehicle, and the pairing release instruction is executed under the following conditions: the first random number obtained by decrypting the car key is consistent with the first random number in the car key, and the information of the vehicle obtained by decrypting is consistent with the information of the matched vehicle in the car key.
Optionally, the method comprises:
A fifteenth module configured to receive third information sent by a vehicle key, where the third information includes vehicle key information, a third random number generated by the vehicle key, and a fifth ciphertext obtained by encrypting a fourth random number generated by the vehicle based on a third communication key by the vehicle key, the third communication key is obtained by deriving a key by the vehicle key based on a second parameter and the vehicle key, and the second parameter is generated according to the third random number and the fourth random number;
a sixteenth module configured to derive a car key based on the feature key and car key information;
a seventeenth module configured to generate a second parameter based on the third random number and the fourth random number;
An eighteenth module configured to derive a fourth communications key based on the second parameter and the vehicle key;
a nineteenth module configured to decrypt the fifth ciphertext with the fourth communication key;
And a twentieth module configured to determine that the third communication key is identical to the fourth communication key and determine that the car key is a car key of the vehicle if the second decryption result is the fourth random number.
Optionally, the method comprises:
a twenty-first module configured to adjust a state of a vehicle key in a vehicle to a disabled state in response to a request for a vehicle key pairing release;
a twenty-second module configured to, after the determining that the vehicle key is the vehicle key of the vehicle, further comprise:
A twenty-third module configured to encrypt the pairing release instruction of the vehicle key and the third random number by the fourth communication key to obtain an encrypted instruction;
And a twenty-fourth module configured to send the encryption instruction to the vehicle key, where the encryption instruction is used for the vehicle key to decrypt according to the third communication key to obtain a pairing release instruction and a third random number, where the pairing release instruction is used to instruct the vehicle key to release pairing with the vehicle, and where the pairing release instruction is executed when the third random number obtained by decrypting the vehicle key is consistent with the third random number in the vehicle key.
Based on the same inventive concept, the embodiment of the disclosure provides a processing device of a car key, which is applied to the car key. Fig. 8 is a block diagram of a processing apparatus for a car key according to an exemplary embodiment of the present disclosure, and referring to fig. 8, the processing apparatus for a car key includes:
A fourth module 801 configured to perform a trusted verification with a vehicle, the vehicle performing a trusted verification with the vehicle key based on a target key, the target key being a key of a key system to which the vehicle belongs;
A fifth module 802 is configured to receive a vehicle key sent by the vehicle, where the vehicle key is sent by the vehicle if the vehicle is trusted as represented by a trusted verification result, the vehicle key is derived by the vehicle based on vehicle key information and a characteristic key of the vehicle preset in the vehicle, and the vehicle key is used for the vehicle key to complete pairing with the vehicle.
In the scheme, the characteristic key of the vehicle and the target key of the key system to which the vehicle belongs are preset in the vehicle. In this way, the vehicle can perform trusted verification on the vehicle key to be paired through the target key. And under the condition that the credible verification result represents that the vehicle key is credible, the vehicle can derive the vehicle key based on the vehicle key information and the characteristic key. In this way, the car key may be transmitted to the car key, which is used by the car key to complete pairing with the vehicle. By adopting the scheme, the vehicle can generate the vehicle key according to the preset characteristic key in the vehicle. In this way, pairing between the vehicle and the vehicle key is possible. The pairing mode is independent of a network and a cloud server, and has higher freedom degree and higher usability.
Optionally, the trusted verification with the vehicle includes:
generating a first parameter according to a first random number generated by a vehicle key and a second random number generated by the vehicle;
Deriving a first communication key based on the first parameter and a first derivative key preset by a vehicle key factory, wherein the first derivative key is derived from a key for performing vehicle key trusted verification in a key system to which the vehicle key belongs based on vehicle key information;
encrypting the second random number through the first communication key to obtain a first ciphertext;
transmitting first information to the vehicle, wherein the first information comprises vehicle key information, the first random number and a first ciphertext;
The first information is used for the vehicle to determine whether the vehicle key is trusted or not, and the vehicle determines whether the vehicle key is trusted or not by the following method: deriving a second derived key according to the vehicle key information and a target key preset in the vehicle; generating a first parameter based on the first random number and the second random number; deriving a second communication key according to the first parameter and the second derivative key; decrypting the first ciphertext with the second communication key; and under the condition that the first decryption result is that the second random number is obtained, determining that the first communication key is consistent with the second communication key, and determining that the car key is credible.
Optionally, the fifth module 802 includes:
the third sub-module is configured to receive a second ciphertext sent by the vehicle, wherein the second ciphertext is obtained by encrypting the vehicle key and the first random number through the second communication key by the vehicle;
A fourth sub-module configured to decrypt the second ciphertext according to the first communication key to obtain a vehicle key and a first random number;
and a fifth sub-module configured to accept the car key if the decrypted first random number matches the first random number in the car key.
Optionally, the method comprises:
a first execution module configured to calculate a first verification value based on the car key;
the second execution module is configured to encrypt the first verification value based on the first communication key to obtain a third ciphertext;
a third execution module configured to send second information to the vehicle, the second information including the third ciphertext;
The second information is used for the vehicle to determine whether the vehicle key correctly receives the vehicle key, and the vehicle calculates a second verification value through the vehicle key in the vehicle; decrypting the third ciphertext with a second communication key; and determining that the car key successfully receives the car key under the condition that the decryption result is consistent with the second verification value;
In response to a first instruction by the vehicle to clear the received vehicle key, the first instruction is sent by the vehicle if it is determined that the decryption result is inconsistent with the second verification value.
Optionally, the method comprises:
A fourth execution module configured to perform a trusted verification with the vehicle in response to a request of the vehicle after the fifth module 802 receives the vehicle key sent by the vehicle;
A fifth execution module configured to receive a fourth ciphertext transmitted by the vehicle, the fourth ciphertext being transmitted by the vehicle when the vehicle is trusted as represented by a trusted verification result, the fourth ciphertext being obtained by encrypting, by the vehicle, information of the vehicle according to the second communication key, the first random number, and a pairing release instruction of the vehicle key, the information of the vehicle being obtained by the vehicle when the vehicle determines that the feature key is lost;
a sixth execution module configured to decrypt the information of the vehicle according to the first communication key, the first random number, and a pairing release instruction;
and a seventh execution module configured to respond to the pairing release instruction to release pairing with the vehicle when the decrypted first random number is consistent with the first random number in the vehicle key and the decrypted information of the vehicle is consistent with the information of the paired vehicle in the vehicle key.
Optionally, the method comprises:
An eighth execution module configured to generate a second parameter from a third random number generated by the vehicle key and a fourth random number generated by the vehicle;
a ninth execution module configured to derive a third communication key based on the second parameter and the vehicle key;
A tenth execution module configured to encrypt the fourth random number with the third communication key to obtain a fifth ciphertext;
an eleventh execution module configured to send third information to the vehicle, the third information including vehicle key information, a third random number, and a fifth ciphertext;
The third information is used for the vehicle to determine whether the vehicle key is the vehicle key of the vehicle, and the vehicle determines whether the vehicle key is the vehicle key of the vehicle by the following modes: deriving a car key based on the characteristic key and car key information; generating a second parameter based on the third random number and the fourth random number; deriving a fourth communication key according to the second parameter and the vehicle key; decrypting the fifth ciphertext with the fourth communication key; and under the condition that the fourth random number is obtained through decryption, determining that the third communication key is consistent with the fourth communication key, and determining that the vehicle key is the vehicle key of the vehicle.
Optionally, the method comprises:
A twelfth execution module configured to receive an encryption instruction sent by the vehicle, the encryption instruction being generated by the vehicle after determining that the vehicle key is the vehicle key of the vehicle, the encryption instruction quality being obtained by encrypting a pairing release instruction of the vehicle key and the third random number by the vehicle through the fourth communication key;
a thirteenth execution module configured to decrypt the encrypted instruction according to the third communication key, resulting in a pairing release instruction and a third random number;
And a fourteenth execution module configured to, in a case where the decrypted third random number matches the third random number in the vehicle key, release the pairing with the vehicle in response to the pairing release instruction.
The disclosed embodiments provide a vehicle including:
A processor;
A memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of processing a vehicle key for a vehicle provided in any of the embodiments of the present disclosure.
The disclosed embodiments provide a vehicle key, including:
A processor;
A memory for storing processor-executable instructions;
Wherein the processor is configured to perform the method of processing a car key applied to a car key provided in any of the embodiments of the present disclosure.
The disclosed embodiments provide a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of processing a car key for a vehicle provided in any of the embodiments of the present disclosure.
The disclosed embodiments provide a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the car key processing method for a car key provided in any of the embodiments of the present disclosure.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 9 is a block diagram of a vehicle 600, according to an exemplary embodiment. For example, vehicle 600 may be a hybrid vehicle, but may also be a non-hybrid vehicle, an electric vehicle, a fuel cell vehicle, or other type of vehicle. The vehicle 600 may be an autonomous vehicle, a semi-autonomous vehicle, or a non-autonomous vehicle.
Referring to fig. 9, a vehicle 600 may include various subsystems, such as an infotainment system 610, a perception system 620, a decision control system 630, a drive system 640, and a computing platform 650. Wherein the vehicle 600 may also include more or fewer subsystems, and each subsystem may include multiple components. In addition, interconnections between each subsystem and between each component of the vehicle 600 may be achieved by wired or wireless means.
In some embodiments, the infotainment system 610 may include a communication system, an entertainment system, a navigation system, and the like.
The perception system 620 may include several sensors for sensing information of the environment surrounding the vehicle 600. For example, the sensing system 620 may include a global positioning system (which may be a GPS system, a beidou system, or other positioning system), an inertial measurement unit (inertial measurement unit, IMU), a lidar, millimeter wave radar, an ultrasonic radar, and a camera device.
Decision control system 630 may include a computing system, a vehicle controller, a steering system, a throttle, and a braking system.
The drive system 640 may include components that provide powered movement of the vehicle 600. In one embodiment, the drive system 640 may include an engine, an energy source, a transmission, and wheels. The engine may be one or a combination of an internal combustion engine, an electric motor, an air compression engine. The engine is capable of converting energy provided by the energy source into mechanical energy.
Some or all of the functions of the vehicle 600 are controlled by the computing platform 650. The computing platform 650 may include at least one processor 651 and memory 652, the processor 651 may execute instructions 653 stored in the memory 652.
The processor 651 may be any conventional processor, such as a commercially available CPU. The processor may also include, for example, an image processor (Graphic Process Unit, GPU), a field programmable gate array (Field Programmable GATE ARRAY, FPGA), a System On Chip (SOC), an Application SPECIFIC INTEGRATED Circuit (ASIC), or a combination thereof.
The memory 652 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
In addition to instructions 653, memory 652 may store data such as road maps, route information, vehicle location, direction, speed, and the like. The data stored by memory 652 may be used by computing platform 650.
In an embodiment of the present disclosure, the processor 651 may execute the instructions 653 to perform all or part of the steps of the method of processing a vehicle key for a vehicle described above.
In another exemplary embodiment, a computer program product is also provided, which comprises a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-mentioned method of processing a car key applied to a vehicle when being executed by the programmable apparatus.
In another exemplary embodiment, a computer program product is also provided, which comprises a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-mentioned method of processing a car key applied to the car key when being executed by the programmable apparatus.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (19)

1. A processing method of a vehicle key, characterized in that the processing method is applied to a vehicle, wherein a characteristic key of the vehicle and a target key of a key system to which the vehicle belongs are preset in the vehicle, and the method comprises:
Performing trusted verification on the car key to be paired through the target key;
Under the condition that the credible verification result represents that the car key is credible, deriving a car key based on the characteristic key and car key information;
And sending the car key to the car key, wherein the car key is used for the car key to finish pairing with the vehicle.
2. The method of claim 1, wherein the trusted verification of the vehicle key to be paired by the target key comprises:
Receiving first information sent by a vehicle key, wherein the first information comprises vehicle key information, a first random number generated by the vehicle key and a first ciphertext, the first ciphertext is obtained by encrypting a second random number generated by a vehicle by the vehicle key based on a first communication key, the first communication key is obtained by key derivation of the vehicle key based on a first parameter and a first derivative key preset by the vehicle key in factory, the first parameter is generated according to the first random number and the second random number, and the first derivative key is obtained by key derivation based on the vehicle key information and a key for performing vehicle key trusted verification in a key system to which the vehicle key belongs;
deriving a second derived key according to the vehicle key information and the target key;
generating a first parameter based on the first random number and the second random number;
deriving a second communication key according to the first parameter and the second derivative key;
decrypting the first ciphertext with the second communication key;
and under the condition that the second random number is obtained through decryption, determining that the first communication key is consistent with the second communication key, and determining that the car key is credible.
3. The method of claim 2, wherein the transmitting the car key to the car key comprises:
Encrypting the car key and the first random number through the second communication key to obtain a second ciphertext;
And sending the second ciphertext to the car key, wherein the second ciphertext is used for decrypting the car key according to the first communication key to obtain the car key and the first random number, and the car key receives the car key under the condition that the decrypted first random number is consistent with the first random number in the car key.
4. A method according to claim 3, comprising:
Receiving second information sent by a vehicle key, wherein the second information comprises a third ciphertext, the third ciphertext is obtained by encrypting a first verification value by the vehicle key based on the first communication key, and the first verification value is obtained by calculating by the vehicle key based on the vehicle key;
Calculating a second verification value by a vehicle key in the vehicle;
Decrypting the third ciphertext with a second communication key;
under the condition that the decryption result is consistent with the second verification value, determining that the car key successfully receives the car key;
And if the decryption result is inconsistent with the second verification value, sending a first instruction to the car key, wherein the first instruction is used for indicating the car key to clear the received car key.
5. The method of claim 2, wherein said transmitting said car key to said car key comprises:
acquiring information of the vehicle under the condition that the characteristic key is determined to be lost;
Performing credibility verification on the car key;
Under the condition that the trusted verification result represents that the vehicle key is trusted, encrypting the first random number and a pairing release instruction of the vehicle key according to the information of the vehicle by the second communication key to obtain a fourth ciphertext;
The fourth ciphertext is sent to the vehicle key, and the fourth ciphertext is used for the vehicle key to decrypt according to the first communication key to obtain the information of the vehicle, the first random number and a pairing release instruction; the pairing release instruction is used for indicating the vehicle key to release the pairing with the vehicle, and the pairing release instruction is executed under the following conditions: the first random number obtained by decrypting the car key is consistent with the first random number in the car key, and the information of the vehicle obtained by decrypting is consistent with the information of the matched vehicle in the car key.
6. The method according to any one of claims 1 to 5, comprising:
Receiving third information sent by a vehicle key, wherein the third information comprises vehicle key information, a third random number generated by the vehicle key and a fifth ciphertext, the fifth ciphertext is obtained by encrypting a fourth random number generated by a vehicle by the vehicle key based on a third communication key, the third communication key is obtained by deriving a key by the vehicle key based on a second parameter and the vehicle key, and the second parameter is generated according to the third random number and the fourth random number;
deriving a car key based on the characteristic key and car key information;
generating a second parameter based on the third random number and the fourth random number;
deriving a fourth communication key according to the second parameter and the vehicle key;
Decrypting the fifth ciphertext with the fourth communication key;
and under the condition that the fourth random number is obtained through decryption, determining that the third communication key is consistent with the fourth communication key, and determining that the vehicle key is the vehicle key of the vehicle.
7. The method according to claim 6, comprising:
In response to a request for vehicle key pairing release, adjusting a state of the vehicle key in a vehicle to a disabled state;
after the vehicle key is determined to be the vehicle key of the vehicle, the method further comprises:
encrypting the pairing release instruction of the vehicle key and the third random number through the fourth communication key to obtain an encryption instruction;
and sending the encryption instruction to the vehicle key, wherein the encryption instruction is used for the vehicle key to decrypt according to the third communication key to obtain a pairing release instruction and a third random number, the pairing release instruction is used for indicating the vehicle key to release the pairing with the vehicle, and the pairing release instruction is executed when the third random number obtained by decrypting the vehicle key is consistent with the third random number in the vehicle key.
8. A method of handling a vehicle key, applied to a vehicle key, the method comprising:
Performing trusted verification with a vehicle, wherein the vehicle performs trusted verification with the vehicle key based on a target key, and the target key is a key of a key system to which the vehicle belongs;
and receiving a vehicle key sent by the vehicle, wherein the vehicle key is sent by the vehicle under the condition that the vehicle is trusted by the trusted verification result to represent the vehicle key, the vehicle key is derived by the vehicle based on vehicle key information and a characteristic key of the vehicle preset in the vehicle, and the vehicle key is used for the vehicle key to finish pairing with the vehicle.
9. The method of claim 8, wherein the trusted verification with the vehicle comprises:
generating a first parameter according to a first random number generated by a vehicle key and a second random number generated by the vehicle;
Deriving a first communication key based on the first parameter and a first derivative key preset by a vehicle key factory, wherein the first derivative key is derived from a key for performing vehicle key trusted verification in a key system to which the vehicle key belongs based on vehicle key information;
encrypting the second random number through the first communication key to obtain a first ciphertext;
transmitting first information to the vehicle, wherein the first information comprises vehicle key information, the first random number and a first ciphertext;
The first information is used for the vehicle to determine whether the vehicle key is trusted or not, and the vehicle determines whether the vehicle key is trusted or not by the following method: deriving a second derived key according to the vehicle key information and the target key; generating a first parameter based on the first random number and the second random number; deriving a second communication key according to the first parameter and the second derivative key; decrypting the first ciphertext with the second communication key; and under the condition that the second random number is obtained through decryption, determining that the first communication key is consistent with the second communication key, and determining that the car key is credible.
10. The method of claim 9, wherein the receiving the vehicle key transmitted by the vehicle comprises:
receiving a second ciphertext sent by the vehicle, wherein the second ciphertext is obtained by encrypting the vehicle key and the first random number by the vehicle through the second communication key;
decrypting the second ciphertext according to the first communication key to obtain a vehicle key and a first random number;
And receiving the vehicle key when the decrypted first random number is consistent with the first random number in the vehicle key.
11. The method according to claim 10, comprising:
calculating a first verification value based on the car key;
encrypting the first verification value based on the first communication key to obtain a third ciphertext;
Transmitting second information to the vehicle, the second information including the third ciphertext;
The second information is used for the vehicle to determine whether the vehicle key correctly receives the vehicle key, and the vehicle calculates a second verification value through the vehicle key in the vehicle; decrypting the third ciphertext with a second communication key; and determining that the car key successfully receives the car key under the condition that the decryption result is consistent with the second verification value;
In response to a first instruction by the vehicle to clear the received vehicle key, the first instruction is sent by the vehicle if it is determined that the decryption result is inconsistent with the second verification value.
12. The method of claim 9, wherein after receiving the vehicle key sent by the vehicle, the method comprises:
Responding to the request of the vehicle, and performing trusted verification with the vehicle;
Receiving a fourth ciphertext sent by the vehicle, wherein the fourth ciphertext is sent by the vehicle under the condition that a trusted verification result represents that the vehicle key is trusted, the fourth ciphertext is obtained by encrypting information of the vehicle, the first random number and a pairing release instruction of the vehicle key according to the second communication key by the vehicle, and the information of the vehicle is obtained by the vehicle under the condition that the characteristic key is determined to be lost;
decrypting according to the first communication key to obtain the information of the vehicle, the first random number and a pairing release instruction;
And when the decrypted first random number is consistent with the first random number in the vehicle key and the decrypted information of the vehicle is consistent with the paired vehicle information in the vehicle key, the pairing with the vehicle is released in response to the pairing release instruction.
13. The method according to any one of claims 8 to 12, comprising:
Generating a second parameter according to a third random number generated by the vehicle key and a fourth random number generated by the vehicle;
performing key derivation based on the second parameter and the vehicle key to obtain a third communication key;
Encrypting the fourth random number through the third communication key to obtain a fifth ciphertext;
Transmitting third information to the vehicle, wherein the third information comprises vehicle key information, a third random number and a fifth ciphertext;
The third information is used for the vehicle to determine whether the vehicle key is the vehicle key of the vehicle, and the vehicle determines whether the vehicle key is the vehicle key of the vehicle by the following modes: deriving a car key based on the characteristic key and car key information; generating a second parameter based on the third random number and the fourth random number; deriving a fourth communication key according to the second parameter and the vehicle key; decrypting the fifth ciphertext with the fourth communication key; and under the condition that the fourth random number is obtained through decryption, determining that the third communication key is consistent with the fourth communication key, and determining that the vehicle key is the vehicle key of the vehicle.
14. The method according to claim 13, comprising:
Receiving an encryption instruction sent by the vehicle, wherein the encryption instruction is generated by the vehicle after the vehicle determines that the vehicle key is the vehicle key of the vehicle, and the encryption instruction is obtained by encrypting a pairing release instruction of the vehicle key by the vehicle through the fourth communication key and the third random number;
decrypting the encryption instruction according to the third communication key to obtain a pairing release instruction and a third random number;
and when the decrypted third random number is consistent with the third random number in the vehicle key, the pairing with the vehicle is released in response to the pairing release instruction.
15. A processing device of a vehicle key, characterized in that it is applied to a vehicle in which a feature key of the vehicle and a target key of a key system to which the vehicle belongs are preset, the device comprising:
The first module is configured to perform trusted verification on the car keys to be paired through the target key;
the second module is configured to derive a vehicle key based on the characteristic key and the vehicle key information under the condition that the trusted verification result represents that the vehicle key is trusted;
And a third module configured to send the car key to the car key, the car key being used by the car key to complete pairing with the vehicle.
16. A vehicle key handling device for use with a vehicle key, the device comprising:
A fourth module configured to perform a trusted verification with a vehicle, the vehicle performing a trusted verification with the vehicle key based on a target key, the target key being a key of a key system to which the vehicle belongs;
And a fifth module configured to receive a car key sent by the vehicle, where the car key is sent by the vehicle when the trust verification result indicates that the car key is trusted, the car key is derived by the vehicle based on car key information and a characteristic key of the vehicle preset in the vehicle, and the car key is used for the car key to complete pairing with the vehicle.
17. A vehicle, characterized by comprising:
A processor;
A memory for storing processor-executable instructions;
Wherein the processor is configured to perform the method of any one of claims 1 to 7.
18. A vehicle key, comprising:
A processor;
A memory for storing processor-executable instructions;
Wherein the processor is configured to perform the method of any one of claims 8 to 14.
19. A computer readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the steps of the method of any of claims 1 to 14.
CN202410089551.3A 2024-01-22 2024-01-22 Vehicle key processing method and device, vehicle key and storage medium Pending CN117915324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410089551.3A CN117915324A (en) 2024-01-22 2024-01-22 Vehicle key processing method and device, vehicle key and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410089551.3A CN117915324A (en) 2024-01-22 2024-01-22 Vehicle key processing method and device, vehicle key and storage medium

Publications (1)

Publication Number Publication Date
CN117915324A true CN117915324A (en) 2024-04-19

Family

ID=90681565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410089551.3A Pending CN117915324A (en) 2024-01-22 2024-01-22 Vehicle key processing method and device, vehicle key and storage medium

Country Status (1)

Country Link
CN (1) CN117915324A (en)

Similar Documents

Publication Publication Date Title
CN111279310B (en) Vehicle-mounted equipment upgrading method and related equipment
CN111788811B (en) Secure communication between onboard electronic control units
CN112585905B (en) Equipment upgrading method and related equipment
US9688244B2 (en) Autonomous vehicle theft prevention
US11985238B2 (en) Vehicle-mounted device upgrade method and related device
CN112543927B (en) Equipment upgrading method and related equipment
CN109495307A (en) Method for upgrading system, OTA upgrade package encryption method, terminal device and vehicle
WO2019125756A1 (en) Vehicle secure messages based on a vehicle private key
CN107409045B (en) Management device, management method, and storage medium
CN107085870A (en) Accessed using encryption method regulation vehicle
CN112602303A (en) Data transmission method and device
JP7497438B2 (en) Certificate application method and device
US20210288806A1 (en) Authentication system
CN110920560A (en) Cloud authorized vehicle control
CN113015159A (en) Initial security configuration method, security module and terminal
CN113347133A (en) Authentication method and device for vehicle-mounted equipment
CN112350821A (en) Method, device and system for acquiring secret key
CN110830243B (en) Symmetric key distribution method, device, vehicle and storage medium
CN117915324A (en) Vehicle key processing method and device, vehicle key and storage medium
US20230071702A1 (en) Managing communications between a vehicle and a user device
CN115174083A (en) Internet of vehicles information encryption method and device and Internet of vehicles system
CN116170803A (en) System and method for securely managing vehicle information
US20220239472A1 (en) Service-oriented architecture in a vehicle
WO2016208227A1 (en) Management system, vehicle, management device, vehicle-mounted computer, management method, and computer program
CN116010934B (en) Domain controller process communication method, device, vehicle and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination