CN112572343A - Anti-theft authentication method, device and storage medium applied to vehicle - Google Patents
Anti-theft authentication method, device and storage medium applied to vehicle Download PDFInfo
- Publication number
- CN112572343A CN112572343A CN201910936849.2A CN201910936849A CN112572343A CN 112572343 A CN112572343 A CN 112572343A CN 201910936849 A CN201910936849 A CN 201910936849A CN 112572343 A CN112572343 A CN 112572343A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- plaintext information
- gear shifter
- keyless entry
- electronic gear
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/01—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
- B60R25/04—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
- B60R25/06—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor operating on the vehicle transmission
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Lock And Its Accessories (AREA)
Abstract
The application provides an anti-theft authentication method, equipment and a storage medium applied to a vehicle, wherein the method comprises the following steps: acquiring a first ciphertext and a second ciphertext; sending a first ciphertext to the electronic gear shifter to enable the electronic gear shifter to decrypt and decode the first ciphertext to obtain plaintext information, and then encrypting the plaintext information to obtain a third ciphertext; receiving a third ciphertext sent by the electronic gear shifter; and comparing the second ciphertext with the third ciphertext to determine whether the electronic gear shifter is allowed to be unlocked. The keyless entry and start controller and the electronic gear shifter carry out an authentication process, and then determine whether to allow the electronic gear shifter to unlock, and then control the starting of the vehicle.
Description
Technical Field
The embodiment of the application relates to the technical field of intelligent equipment, in particular to an anti-theft authentication method, equipment and a storage medium applied to a vehicle.
Background
With the development of vehicles, the vehicles have become essential travel tools in life and work of people. The anti-theft security of vehicles is also receiving increasing attention. In order to prevent the vehicle from being stolen, an antitheft authentication method may be set for the vehicle, and after it is determined that hardware of the vehicle is successfully authenticated, it may be determined that the start of the vehicle is no longer locked.
In the prior art, in an anti-theft method for a vehicle, an authentication process can be completed between a Passive Entry and Start (PEPS) controller of the vehicle and an Electronic Steering Column Lock (ESCL) of the vehicle, and then the Passive Entry and Start controller can determine whether the authentication is successful or not so as to determine whether to unlock the electronic Steering column Lock or not.
However, in the prior art, the authentication process between the keyless entry and start controller and the electronic steering column lock can only control whether the vehicle can complete turning, but cannot control the straight pushing of the vehicle, that is, the vehicle can carry out the straight pushing no matter whether the authentication between the keyless entry and start controller and the electronic steering column lock is successful or not; further, the start of the vehicle cannot be controlled, and the vehicle cannot be prevented from being stolen.
Disclosure of Invention
The embodiment of the application provides an anti-theft authentication method, equipment and a storage medium applied to a vehicle, and is used for solving the problems that the starting of the vehicle cannot be controlled and the vehicle cannot be prevented from being stolen in the prior art.
The application provides an anti-theft authentication method applied to a vehicle, which is applied to a keyless entry and start controller, and the method comprises the following steps:
acquiring a first ciphertext and a second ciphertext, wherein the first ciphertext is obtained by encoding and encrypting pre-stored plaintext information, and the second ciphertext is obtained by encrypting the plaintext information;
sending the first ciphertext to an electronic gear shifter to enable the electronic gear shifter to decrypt and decode the first ciphertext to obtain plaintext information, and then encrypting the plaintext information to obtain a third ciphertext;
receiving the third ciphertext transmitted by the electronic shifter;
and comparing the second ciphertext with the third ciphertext to obtain a comparison result, and sending the comparison result to the electronic gear shifter, so that the electronic gear shifter determines whether to execute unlocking according to the comparison result.
In one possible implementation, obtaining the first ciphertext includes:
encoding the plaintext information to obtain encoded plaintext information;
and encrypting the coded plaintext information by using an encryption key to obtain the first ciphertext.
In a possible implementation manner, the encoding the plaintext information to obtain encoded plaintext information includes:
and encoding the plaintext information to a preset elliptic curve by adopting an elliptic curve encryption method to obtain the encoded plaintext information.
In one possible implementation, the obtaining the second ciphertext includes:
and encrypting the plaintext information by adopting an Advanced Encryption Standard (AES) key to obtain the second ciphertext.
In a possible embodiment, sending the comparison result to the electronic gear shifter to enable the electronic gear shifter to determine whether to perform unlocking according to the comparison result includes:
when the comparison result represents that the second ciphertext is consistent with the third ciphertext, sending a comparison result to the electronic gear shifter, wherein the comparison result comprises authentication success information, so that the electronic gear shifter sends a gear unlocking signal to a transmission case of a vehicle, and the authentication success information represents that the electronic gear shifter is allowed to be unlocked;
and when the comparison result represents that the second ciphertext is inconsistent with the third ciphertext, sending a comparison result to the electronic gear shifter, wherein the comparison result comprises authentication failure information, and the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked.
In a possible implementation manner, before the obtaining the first ciphertext and the second ciphertext, the method further includes:
and receiving an authentication request sent by the electronic gear shifter, wherein the authentication request is sent by the electronic gear shifter after the electronic gear shifter completes initialization after the keyless entry and start controller controls the relay of the vehicle to suck.
The application provides an anti-theft authentication method applied to a vehicle, which is applied to an electronic gear shifter and comprises the following steps:
receiving a first ciphertext sent by a keyless entry and start controller, wherein the first ciphertext is obtained after the keyless entry and start controller performs coding processing and encryption processing on prestored plaintext information;
carrying out decryption processing and decoding processing on the first ciphertext to obtain plaintext information;
encrypting the plaintext information to obtain a third ciphertext;
sending the third ciphertext to the keyless entry and start controller, so that the keyless entry and start controller compares a prestored second ciphertext with the third ciphertext to obtain a comparison result, wherein the second ciphertext is obtained after the keyless entry and start controller encrypts the plaintext information;
and receiving the comparison result sent by the keyless entry and start controller, and determining whether to execute unlocking according to the comparison result.
In a possible implementation manner, performing decryption processing and decoding processing on the first ciphertext to obtain the plaintext information includes:
decrypting the first ciphertext by using a decryption key to obtain a decrypted first ciphertext;
and decoding the decrypted first ciphertext to obtain the plaintext information.
In a possible implementation, the decrypted first ciphertext is located in a preset elliptic curve; decoding the decrypted first ciphertext to obtain the plaintext information, including:
and decoding the decrypted first ciphertext by adopting an elliptic curve encryption method to obtain the plaintext information.
In one possible implementation, encrypting the plaintext information to obtain a third ciphertext includes:
and encrypting the plaintext information by adopting an Advanced Encryption Standard (AES) key to obtain the third ciphertext.
In a possible embodiment, determining whether to perform unlocking according to the comparison result includes:
when the comparison result comprises authentication success information, wherein the authentication success information represents that the electronic gear shifter is allowed to be unlocked, and a signal for executing unlocking and sending an unlocking gear to a gearbox of a vehicle is determined; wherein the second ciphertext and the third ciphertext are consistent with each other;
or when the comparison result comprises authentication failure information, wherein the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked, and the second ciphertext is inconsistent with the third ciphertext, determining not to execute unlocking.
In a possible implementation manner, before the receiving the first ciphertext sent by the keyless entry and start controller, the method further includes:
after detecting that the keyless entry and start controller controls the relay of the vehicle to be attracted, finishing the initialization of the electronic gear shifter;
sending an authentication request to the keyless entry and start controller.
A third aspect of the present application provides a keyless entry and start controller comprising:
the device comprises a first acquisition unit, a second acquisition unit and a first encryption unit, wherein the first acquisition unit is used for acquiring a first ciphertext, and the first ciphertext is obtained by encoding and encrypting pre-stored plaintext information;
a second obtaining unit, configured to obtain a second ciphertext, where the second ciphertext is obtained by encrypting the plaintext information;
the first transmitting unit is used for transmitting the first ciphertext to the electronic gear shifter so that the electronic gear shifter carries out decryption processing and decoding processing on the first ciphertext to obtain the plaintext information and then carries out encryption processing on the plaintext information to obtain a third ciphertext;
the first receiving unit is used for receiving the third ciphertext sent by the electronic gear shifter;
the processing unit is used for comparing the second ciphertext with the third ciphertext to obtain a comparison result;
the second sending unit is used for sending the comparison result to the electronic gear shifter, so that the electronic gear shifter determines whether to execute unlocking according to the comparison result.
In a possible implementation, the first obtaining unit includes:
the encoding module is used for encoding the plaintext information to obtain encoded plaintext information;
and the encryption module is used for encrypting the coded plaintext information by adopting an encryption key to obtain the first ciphertext.
In a possible implementation, the encoding module is specifically configured to:
and encoding the plaintext information to a preset elliptic curve by adopting an elliptic curve encryption method to obtain the encoded plaintext information.
In a possible implementation manner, the second obtaining unit is specifically configured to:
and encrypting the plaintext information by adopting an Advanced Encryption Standard (AES) key to obtain the second ciphertext.
In one possible implementation, the second sending unit includes:
the first sending module is used for sending a comparison result to the electronic gear shifter when the comparison result represents that the second ciphertext is consistent with the third ciphertext, wherein the comparison result comprises authentication success information, so that the electronic gear shifter sends a gear unlocking signal to a transmission of a vehicle, and the authentication success information represents that the electronic gear shifter is allowed to be unlocked;
and the second sending module is used for sending a comparison result to the electronic gear shifter when the comparison result represents that the second ciphertext is inconsistent with the third ciphertext, wherein the comparison result comprises authentication failure information, and the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked.
In one possible embodiment, the keyless entry and start controller further comprises:
and the second receiving unit is used for receiving an authentication request sent by the electronic gear shifter before the first acquiring unit carries out coding processing and encryption processing on pre-stored plaintext information to obtain a first ciphertext, wherein the authentication request is sent by the electronic gear shifter after the electronic gear shifter completes initialization after the keyless entry and start controller controls the relay of the vehicle to suck.
The present application provides in a fourth aspect an electronic shifter comprising:
the device comprises a first receiving unit, a second receiving unit and a control unit, wherein the first receiving unit is used for receiving a first ciphertext sent by a keyless entry and start controller, and the first ciphertext is obtained after the keyless entry and start controller carries out coding processing and encryption processing on pre-stored plaintext information;
the first processing unit is used for carrying out decryption processing and decoding processing on the first ciphertext to obtain the plaintext information;
the second processing unit is used for carrying out encryption processing on the plaintext information to obtain a third ciphertext;
the first sending unit is used for sending the third ciphertext to the keyless entry and start controller so that the keyless entry and start controller compares a prestored second ciphertext with the third ciphertext to obtain a comparison result, wherein the second ciphertext is obtained after the keyless entry and start controller encrypts the plaintext information;
the second receiving unit is used for receiving the comparison result sent by the keyless entry and start controller;
and the determining unit is used for determining whether to execute unlocking according to the comparison result.
In one possible implementation, the first processing unit includes:
the decryption module is used for decrypting the first ciphertext by adopting a decryption key to obtain a decrypted first ciphertext;
and the decoding module is used for decoding the decrypted first ciphertext to obtain the plaintext information.
In a possible implementation, the decrypted first ciphertext is located in a preset elliptic curve; the decoding module is specifically configured to:
and decoding the decrypted first ciphertext by adopting an elliptic curve encryption method to obtain the plaintext information.
In a possible implementation manner, the second processing unit is specifically configured to:
and encrypting the plaintext information by adopting an Advanced Encryption Standard (AES) key to obtain the third ciphertext.
In a possible implementation, the determining unit includes:
the first determining module is used for determining to execute unlocking and sending a signal of an unlocking gear to a gearbox of a vehicle when the comparison result comprises authentication success information, wherein the authentication success information represents that the electronic gear shifter is allowed to be unlocked; wherein the second ciphertext and the third ciphertext are consistent with each other;
or the second determining module is configured to determine not to execute the unlocking when the comparison result includes authentication failure information, where the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked, and the second ciphertext is inconsistent with the third ciphertext.
In one possible embodiment, the electronic shifter further includes:
the initialization unit is used for completing initialization of the electronic gear shifter after detecting that the keyless entry and start controller controls the relay of the vehicle to suck before the first receiving unit receives the first ciphertext sent by the keyless entry and start controller;
and the second sending unit is used for sending an authentication request to the keyless entry and start controller.
A fifth aspect of the present application provides a keyless entry and start controller comprising: a transmitter, a receiver, a memory, and a processor;
the memory is to store computer instructions; the processor is configured to execute the computer instructions stored by the memory to implement the method provided by any implementation manner of the first aspect.
A sixth aspect of the present application provides an electronic shifter comprising: a transmitter, a receiver, a memory, and a processor;
the memory is to store computer instructions; the processor is used for executing the computer instructions stored by the memory to realize the method provided by any one of the implementation modes of the second aspect.
A seventh aspect of the present application provides a storage medium comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are used for realizing the method provided by any implementation manner of the first aspect.
An eighth aspect of the present application provides a storage medium comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are used for realizing the method provided by any implementation mode of the second aspect.
According to the anti-theft authentication method, the anti-theft authentication device and the anti-theft authentication storage medium applied to the vehicle, the first ciphertext and the second ciphertext are obtained, the first ciphertext is obtained by encoding and encrypting pre-stored plaintext information, and the second ciphertext is obtained by encrypting the plaintext information; sending a first ciphertext to the electronic gear shifter to enable the electronic gear shifter to decrypt and decode the first ciphertext to obtain plaintext information, and then encrypting the plaintext information to obtain a third ciphertext; receiving a third ciphertext sent by the electronic gear shifter; and comparing the second ciphertext with the third ciphertext to determine whether the electronic gear shifter is allowed to be unlocked. The method comprises the steps that a key-free entering and starting controller and an electronic gear shifter are subjected to an authentication process, whether the electronic gear shifter is allowed to be unlocked or not is further determined, and then starting of a vehicle is controlled, and the electronic gear shifter sends a gear unlocking signal to a gearbox, so that whether a transmission can be unlocked or not is further controlled, namely, a vehicle transmission system is locked, and the vehicle is controlled to run, so that the vehicle is prevented from being stolen; moreover, the first ciphertext adopted in the authentication process between the keyless entry and start controller and the electronic gear shifter is subjected to encoding processing and encryption processing, so that the first ciphertext can be prevented from being stolen, the safety of the authentication process is enhanced, and the vehicle is further prevented from being illegally started and stolen; and the keyless entry and start controller compares the second ciphertext with the received third ciphertext instead of directly adopting plaintext information, so that even if the ciphertext information is stolen, an illegal thief cannot crack the ciphertext, the safety of authentication is enhanced, and the vehicle is further prevented from being illegally started and stolen.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a schematic diagram of an exemplary application scenario provided herein;
fig. 2 is a flowchart of an anti-theft authentication method applied to a vehicle according to an embodiment of the present application;
FIG. 3 is a flowchart of another anti-theft authentication method applied to a vehicle according to an embodiment of the present application;
FIG. 4 is a flowchart of another anti-theft authentication method applied to a vehicle according to an embodiment of the present application;
fig. 5 is a signaling diagram of yet another anti-theft authentication method applied to a vehicle according to an embodiment of the present application;
FIG. 6 is a schematic structural diagram of a keyless entry and start controller according to an embodiment of the present application;
FIG. 7 is a schematic structural diagram of another keyless entry and start controller provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic shifter provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic shifter provided in an embodiment of the present application;
FIG. 10 is a schematic structural diagram of another keyless entry and start controller provided in accordance with an embodiment of the present application;
fig. 11 is a schematic structural diagram of another electronic shifter provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic diagram of an exemplary application scenario, and as shown in fig. 1, the anti-theft authentication method applied to a vehicle provided by the present application may be applied to a vehicle, including but not limited to a general vehicle, a driving assistance vehicle, an automatic driving vehicle, and the like.
With the development of vehicles, the vehicles have become essential travel tools in life and work of people. The anti-theft security of vehicles is also receiving increasing attention. In order to prevent the vehicle from being stolen, an antitheft authentication method may be set for the vehicle, and after it is determined that hardware of the vehicle is successfully authenticated, it may be determined that the start of the vehicle is no longer locked.
In the prior art, the anti-theft equipment of the vehicle is generally an electronic lock, and the electronic lock locks a steering column under the condition that the power supply mode is OFF, so that a steering wheel of the vehicle cannot rotate; the authentication process can be completed between the keyless entry and start controller of the vehicle and the electronic steering column lock of the vehicle, and then the keyless entry and start controller can determine whether the authentication is successful so as to determine whether to unlock the electronic steering column lock; the authentication can be completed between the keyless entry and start controller and the electronic steering column lock, and after the authentication is confirmed to pass, the electronic steering column lock can be unlocked, and then the power supply mode switching and the vehicle starting of the vehicle are realized.
However, in the above manner, the authentication process between the keyless entry and start controller and the electronic steering column lock can only control whether the vehicle can complete turning when the vehicle is in a flameout state, but cannot control the straight-direction pushing of the vehicle, that is, the vehicle can be pushed straight-direction regardless of whether the authentication between the keyless entry and start controller and the electronic steering column lock is successful; further, the start of the vehicle cannot be controlled, and the vehicle cannot be prevented from being stolen. In addition, in the above manner, an electronic lock needs to be added to a steering column of the vehicle, so that the weight of the vehicle is increased, and the cost of the vehicle is increased.
In order to solve the problems, the anti-theft authentication method, the anti-theft authentication device and the anti-theft authentication storage medium applied to the vehicle provided by the application have the advantages that the key-free entering and starting controller and the electronic gear shifter perform an authentication process, and then whether the electronic gear shifter is allowed to be unlocked is determined, and as the electronic gear shifter controls the starting of the vehicle, namely, the turning, straight running and the like of the vehicle are controlled, whether the vehicle is allowed to be started is determined, so that the vehicle is prevented from being stolen; and moreover, the first ciphertext adopted in the authentication process between the keyless entry and start controller and the electronic gear shifter is subjected to encoding processing and encryption processing, so that the first ciphertext can be prevented from being stolen.
Fig. 2 is a flowchart of an anti-theft authentication method applied to a vehicle according to an embodiment of the present application, and as shown in fig. 2, the method includes:
s101, a first ciphertext and a second ciphertext are obtained, wherein the first ciphertext is obtained by performing coding processing and encryption processing on pre-stored plaintext information, and the second ciphertext is obtained by performing encryption processing on the plaintext information.
In this step, the method provided by the embodiment is applied to the keyless entry and start controller.
A keyless entry and start controller and an electronic gear shifter are arranged in the automobile; the keyless entry and start controller and the electronic gear shifter are connected.
The keyless entry and start controller stores plaintext information, wherein the plaintext information comprises identification of the vehicle, problem information of the vehicle and the like; wherein the plaintext information for different vehicles is different. The problem information of the vehicle is, for example, the current starting time of the vehicle, a problem pre-stored by a user.
The keyless entry and start controller can perform coding processing and encryption processing on plaintext information to further obtain ciphertext information, and the ciphertext information obtained here is called a first ciphertext for distinguishing from the subsequent ciphertext information; in one example, the keyless entry and start controller may perform both encoding and encryption of the plaintext information; or, in one example, the keyless entry and start controller may encode the plaintext information first, and then encrypt the plaintext information; alternatively, in one example, the keyless entry and start controller may encrypt the plaintext information before encoding the plaintext information.
And the keyless entry and start controller can perform independent encryption processing on the plaintext information to obtain ciphertext information, wherein the ciphertext information is called a second ciphertext.
The encoding method may adopt an Elliptic Curve Cryptography (ECC) method, or a randomized encryption method, or other existing encoding methods, or a combination of the above encoding methods. This is not limited in this application.
The Encryption processing method may adopt an Advanced Encryption Standard (AES) method, or an exclusive-or Encryption method, or adopt other existing Encryption processing methods, or adopt a plurality of combinations of the Encryption processing methods. This is not limited in this application.
Alternatively, the first ciphertext and the second ciphertext may be received from other devices.
And S102, sending a first ciphertext to the electronic gear shifter, so that the electronic gear shifter performs decryption processing and decoding processing on the first ciphertext to obtain plaintext information, and then performing encryption processing on the plaintext information to obtain a third ciphertext.
In the step, the keyless entry and start controller sends the first ciphertext to the electronic gear shifter, the electronic gear shifter performs decryption processing and decoding processing on the received first ciphertext, and then the electronic gear shifter obtains plaintext information.
In one example, if the keyless entry and start controller can perform the encoding process and the encryption process on the plaintext information at the same time, the electronic shifter performs the decoding process and the decryption process on the first ciphertext at the same time; or, in one example, if the keyless entry and start controller can encode plaintext information first and then encrypt the plaintext information, the electronic gear shifter decrypts the first ciphertext first and then decodes the first ciphertext; alternatively, in one example, if the keyless entry and start controller can encrypt plaintext information before encode, the electronic shifter decodes the first ciphertext before decrypt.
Then, the electronic gear shifter encrypts the obtained plaintext information to obtain ciphertext information, and the ciphertext information obtained here is called third ciphertext information; the encryption processing method may adopt an advanced encryption standard method, or adopt an exclusive-or encryption method, or adopt other existing encryption processing methods, or adopt a plurality of combinations of the above encryption processing methods, which is not limited in this application.
And S103, receiving a third ciphertext sent by the electronic gear shifter.
In this step, after the electronic shifter obtains the third ciphertext, the electronic shifter sends the third ciphertext to the keyless entry and start controller.
And S104, comparing the second ciphertext with the third ciphertext to obtain a comparison result, and sending the comparison result to the electronic gear shifter so that the electronic gear shifter determines whether to execute unlocking according to the comparison result.
In this step, the keyless entry and start controller directly obtains a second ciphertext according to plaintext information in step S101, and compares the second ciphertext with a third ciphertext sent by the electronic shift to determine whether the second ciphertext and the third ciphertext are consistent, so as to generate a comparison result, and further determine whether to allow the electronic shift to be unlocked.
Then, the keyless entry and start controller sends the comparison result to the electronic gear shifter; and the electronic gear shifter further determines whether the result is finished according to the comparison result.
In one example, the keyless entry and start controller determines to allow the electronic shifter to unlock if it determines that the second cryptogram and the third cryptogram are consistent; and if the keyless entry and start controller determines that the second ciphertext is inconsistent with the third ciphertext, determining that the electronic gear shifter is not allowed to be unlocked.
The scheme provided by the embodiment is applied to a keyless entry and start controller, and a first ciphertext and a second ciphertext are obtained, wherein the first ciphertext is obtained by encoding and encrypting pre-stored plaintext information, and the second ciphertext is obtained by encrypting the plaintext information; sending a first ciphertext to the electronic gear shifter to enable the electronic gear shifter to decrypt and decode the first ciphertext to obtain plaintext information, and then encrypting the plaintext information to obtain a third ciphertext; receiving a third ciphertext sent by the electronic gear shifter; and comparing the second ciphertext with the third ciphertext to obtain a comparison result, and sending the comparison result to the electronic gear shifter so that the electronic gear shifter determines whether to execute unlocking according to the comparison result. The method comprises the steps that a key-free entering and starting controller and an electronic gear shifter are subjected to an authentication process, whether the electronic gear shifter is allowed to be unlocked or not is further determined, and then starting of a vehicle is controlled, and the electronic gear shifter sends a gear unlocking signal to a gearbox, so that whether a transmission can be unlocked or not is further controlled, namely, a vehicle transmission system is locked, and the vehicle is controlled to run, so that the vehicle is prevented from being stolen; moreover, the first ciphertext adopted in the authentication process between the keyless entry and start controller and the electronic gear shifter is subjected to encoding processing and encryption processing, so that the first ciphertext can be prevented from being stolen, the safety of the authentication process is enhanced, and the vehicle is further prevented from being illegally started and stolen; and the keyless entry and start controller compares the second ciphertext with the received third ciphertext instead of directly adopting plaintext information, so that even if the ciphertext information is stolen, an illegal thief cannot crack the ciphertext, the safety of authentication is enhanced, and the vehicle is further prevented from being illegally started and stolen.
Fig. 3 is a flowchart of another anti-theft authentication method applied to a vehicle according to an embodiment of the present application, and as shown in fig. 3, the method includes:
s201, receiving an authentication request sent by the electronic gear shifter, wherein the authentication request is sent by the electronic gear shifter after the electronic gear shifter completes initialization after the controller controls the relay of the vehicle to suck without a key.
In this step, the method provided by the embodiment is applied to the keyless entry and start controller.
A keyless entry and start controller, an electronic gear shifter and a gearbox are arranged in the automobile; the keyless entry and start controller and the electronic gear shifter are connected. The gearbox may also be referred to as a gearbox P-gear parking mechanism.
When a user carries an intelligent key to approach or enter a vehicle, the user can step on a brake pedal and then press a starting switch button, wherein the starting switch button is a one-key starting switch button; then, the keyless entry and start controller detects and authenticates the smart key, that is, after the keyless entry and start controller detects the smart key, authentication is completed between the keyless entry and start controller and the smart key to determine whether the smart key is legal. The keyless entry and start authentication process between the controller and the smart key may be an authentication process in the prior art.
Further, after authentication is completed between the keyless entry and start controller and the smart key and the validity of the smart key is determined, the subsequent process can be performed.
Then, the keyless entry and start controller controls a relay of the vehicle to pull in to complete electrification, wherein the relay is an IGN1 relay; at the moment, the relay is connected with the electronic gear shifter, so that the electronic gear shifter detects that no key enters and the starting controller controls the relay of the vehicle to suck; then, the electronic gear shifter starts to initialize; and after the initialization is completed, the electronic gear shifter sends an authentication request to the keyless entry and start controller.
S202, encoding the plaintext information to obtain encoded plaintext information.
In one example, step S202 specifically includes: and encoding the plaintext information to a preset elliptic curve by adopting an elliptic curve encryption method to obtain the encoded plaintext information.
In this step, after the keyless entry and start controller receives the authentication request, it encodes the pre-stored plaintext information to obtain the encoded plaintext information.
In one example, the keyless entry and start controller encodes the plaintext information onto the elliptic curve by using an ECC elliptic curve encryption method, and then obtains the plaintext on the elliptic curve, that is, obtains the encoded plaintext information.
For example, the plaintext information may be binary plaintext a, and the keyless entry and start controller encodes the binary plaintext onto the elliptic curve by ECC elliptic curve encryption.
S203, the encrypted plaintext information is encrypted by adopting the encryption key to obtain a first ciphertext.
In this step, the keyless entry and start controller encrypts the encoded plaintext information using the encryption key k1 to obtain a first ciphertext, where k1 is a private key. The encryption algorithm used at this time may be an encryption algorithm in the prior art, and this embodiment is not limited.
In one example, the plaintext information may be a binary plaintext a, and after obtaining the plaintext on the elliptic curve, the keyless entry and start controller encrypts the plaintext on the elliptic curve by using the private key k1 to obtain a ciphertext on the elliptic curve, that is, obtain the first ciphertext.
S204, encrypting the plaintext information by adopting an Advanced Encryption Standard (AES) key to obtain a second ciphertext.
In this step, the keyless entry and start controller encrypts plaintext information using AES algorithm with AES key k2 to obtain a second ciphertext. In one example, the plaintext information may be binary plaintext a, and the keyless entry and start controller may encrypt the binary plaintext using AES key k2 using AES algorithm to obtain binary ciphertext C, i.e., the second ciphertext.
Wherein, the execution sequence of the steps 202, 203 and S204 is not limited, and the steps 202, 203 may be executed first, and then the step S204 is executed; alternatively, step S204 may be performed first, and then step 202 and step 203 may be performed.
And S205, sending a first ciphertext to the electronic gear shifter, so that the electronic gear shifter performs decryption processing and decoding processing on the first ciphertext to obtain plaintext information, and then performs encryption processing on the plaintext information to obtain a third ciphertext.
In this step, the keyless entry and start controller sends a first cryptogram to the electronic shifter.
Then, the electronic gear shifter decrypts the received first ciphertext by using the encryption algorithm and the decryption key corresponding to the encryption algorithm adopted in the step S203, so as to obtain a decrypted first ciphertext; wherein, the decryption key may be the same as the encryption key used in step S203. Then, the electronic gear shifter decodes the decrypted first ciphertext to obtain plaintext information, in one example, the electronic gear shifter decodes the first ciphertext to obtain a plaintext on the elliptic curve, that is, to obtain the decrypted first ciphertext, and then the electronic gear shifter decodes the plaintext on the elliptic curve by using an ECC method to obtain the plaintext information.
In one example, the plaintext information may be a binary plaintext a, and after the electronic shifter receives the first ciphertext, the electronic shifter may receive a ciphertext C on the elliptic curve; then, the electronic gear shifter decrypts the ciphertext on the elliptic curve through a private key k1 to obtain a plaintext on the elliptic curve; then, the electronic gear shifter decodes the plaintext on the elliptic curve by using an ECC method to obtain a binary plaintext A.
Then, after obtaining the plaintext information, the electronic gear shifter encrypts the plaintext information to obtain a third ciphertext. In one example, the electronic shifter may encrypt plaintext information using an AES algorithm with AES key k 2.
For example, the plaintext information is binary plaintext, so that the electronic shifter may encrypt the decrypted binary plaintext with the private key k2 by using AES algorithm to generate the binary ciphertext B.
And S206, receiving a third ciphertext sent by the electronic gear shifter.
In this step, the step may refer to step S103 shown in fig. 2, and is not described again.
And S207, comparing the second ciphertext with the third ciphertext to obtain a comparison result, and sending the comparison result to the electronic gear shifter so that the electronic gear shifter determines whether to execute unlocking according to the comparison result.
In one example, step S207 specifically includes the following steps:
when the comparison result represents that the second ciphertext is consistent with the third ciphertext, the comparison result is sent to the electronic gear shifter, the comparison result comprises authentication success information, so that the electronic gear shifter sends a gear unlocking signal to a gearbox of a vehicle, wherein the authentication success information represents that the electronic gear shifter is allowed to be unlocked;
and when the comparison result represents that the second ciphertext is inconsistent with the third ciphertext, sending the comparison result to the electronic gear shifter, wherein the comparison result comprises authentication failure information, and the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked.
In this step, the keyless entry and start controller compares the second ciphertext with the third ciphertext to determine whether the second ciphertext is consistent with the third ciphertext.
If the keyless entry and start controller determines that the second ciphertext is consistent with the third ciphertext, generating a consistent comparison result between the second ciphertext and the third ciphertext, wherein the comparison result comprises authentication success information; then, the keyless entry and start controller sends the comparison result to the electronic shifter. Then, the electronic gear shifter can send a gear unlocking signal to a gearbox of the vehicle according to the authentication success information in the comparison result, wherein the signal is a P-gear unlocking signal. In one example, the electronic shifter receives the authentication success message, and the electronic shifter has the capability of sending an unlocking signal, so that when the user presses an unlocking key on the electronic shifter, the electronic shifter can send a signal for unlocking a gear to a gearbox of the vehicle.
Then, after the keyless entry and start controller sends the comparison result including the successful authentication information to the electronic gear shifter, the authentication between the keyless entry and start controller and the electronic gear shifter is passed; then, the authentication process provided by the embodiment can be referred between the keyless entry and start controller and the engine of the vehicle to finish the authentication; optionally, the authentication process provided by the embodiment can also be referred to among other devices in the vehicle to complete the authentication; the keyless entry and start controller then sends an ignition request to the engine, which ignites and the vehicle can start.
If the keyless entry and start controller determines that the second ciphertext is inconsistent with the third ciphertext, generating an inconsistent comparison result between the second ciphertext and the third ciphertext, wherein the comparison result comprises authentication failure information; then, the keyless entry and start controller sends the comparison result to the electronic shifter, and the keyless entry and start controller closes the authentication process with the electronic shifter. Then, the electronic gear shifter receives the comparison result including the authentication failure information, and the electronic gear shifter confirms that a signal for unlocking the gear cannot be sent to a gearbox of the vehicle. In one example, the electronic gear shifter receives authentication failure information, and the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked, so that the electronic gear shifter does not send a P-gear unlocking signal to a gearbox of the vehicle, the gearbox cannot release the P gear, and the vehicle is locked.
In the embodiment, the electronic gear shifter is used for sending a signal of unlocking a gear to the gearbox, so that whether the gearbox can unlock the P gear is controlled, namely a vehicle transmission system is locked, and the vehicle is controlled to run, so that the vehicle is prevented from being stolen; moreover, the first ciphertext adopted in the authentication process between the keyless entry and start controller and the electronic gear shifter is subjected to encoding processing and encryption processing, so that the first ciphertext can be prevented from being stolen, the safety of the authentication process is enhanced, and the vehicle is further prevented from being illegally started and stolen; and the keyless entry and start controller compares the second ciphertext with the received third ciphertext instead of directly adopting plaintext information, so that even if the ciphertext information is stolen, an illegal thief cannot crack the ciphertext, the safety of authentication is enhanced, and the vehicle is further prevented from being illegally started and stolen. Moreover, the encoding processing mode can adopt an elliptic curve encryption method, and the encryption processing mode can adopt an AES algorithm, so that the data is prevented from being stolen, and the authentication safety is enhanced.
Fig. 4 is a flowchart of a further anti-theft authentication method applied to a vehicle according to an embodiment of the present application, and as shown in fig. 4, the method is applied to an electronic gear shifter, and includes:
s301, receiving a first ciphertext sent by the keyless entry and start controller, wherein the first ciphertext is obtained after the keyless entry and start controller performs coding processing and encryption processing on pre-stored plaintext information.
S302, carrying out decryption processing and decoding processing on the first ciphertext to obtain plaintext information.
S303, encrypting the plaintext information to obtain a third ciphertext.
And S304, sending a third ciphertext to the keyless entry and start controller so that the keyless entry and start controller compares the prestored second ciphertext with the third ciphertext to obtain a comparison result, wherein the second ciphertext is obtained after the keyless entry and start controller encrypts plaintext information.
S305, receiving a comparison result sent by the keyless entry and starting controller.
S306, determining whether to execute unlocking according to the comparison result.
In one example, step S302 includes the steps of:
decrypting the first ciphertext by using the decryption key to obtain a decrypted first ciphertext; and decoding the decrypted first ciphertext to obtain plaintext information.
In one example, the decrypted first ciphertext is located in a preset elliptic curve; decoding the decrypted first ciphertext to obtain plaintext information, including: and decoding the decrypted first ciphertext by adopting an elliptic curve encryption method to obtain plaintext information.
In one example, step S303 specifically includes:
and encrypting the plaintext information by adopting an AES key to obtain a third ciphertext.
In one example, step S306 specifically includes:
when the comparison result comprises authentication success information, wherein the authentication success information represents that the electronic gear shifter is allowed to be unlocked, and the unlocking is determined to be executed and a signal of an unlocking gear is sent to a gearbox of the vehicle; the second ciphertext is consistent with the third ciphertext;
or when the comparison result comprises authentication failure information, wherein the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked, and the second ciphertext is inconsistent with the third ciphertext, determining not to execute unlocking.
In one example, before step S301, the method further includes the following steps:
after detecting that the keyless entry and the starting controller control the relay of the vehicle to be attracted, the electronic gear shifter is initialized; an authentication request is sent to the keyless entry and start controller.
The anti-theft authentication method provided by the embodiment can be referred to the anti-theft authentication method provided by the embodiment, and the principle and the technical effect are similar and are not described again.
Fig. 5 is a signaling diagram of a further anti-theft authentication method applied to a vehicle according to an embodiment of the present application, as shown in fig. 5, the method includes:
s401, the keyless entry and starting controller encodes the plaintext information to obtain encoded plaintext information.
In one example, step S401 specifically includes: the keyless entry and start controller encodes the plaintext information onto a preset elliptic curve by adopting an elliptic curve encryption method to obtain encoded plaintext information.
S402, the keyless entry and start controller encrypts the coded plaintext information by using an encryption key to obtain a first ciphertext.
In one example, step S402 specifically includes: and the keyless entry and start controller adopts an AES key to encrypt plaintext information to obtain a second ciphertext.
And S403, encrypting the plaintext information by the keyless entry and start controller to obtain a second ciphertext.
S404, the keyless entry and start controller sends a first cryptogram to the electronic shifter.
S405, the electronic gear shifter decrypts the first ciphertext by using the decryption key to obtain the decrypted first ciphertext.
S406, the electronic gear shifter decodes the decrypted first ciphertext to obtain plaintext information.
In one example, step S406 specifically includes: the decrypted first ciphertext is located in a preset elliptic curve; and the electronic gear shifter decodes the decrypted first ciphertext by adopting an elliptic curve encryption method to obtain plaintext information.
And S407, the electronic gear shifter encrypts the plaintext information to obtain a third ciphertext.
In one example, step S407 specifically includes: and the electronic gear shifter encrypts plaintext information by adopting an AES key to obtain a third ciphertext.
And S408, the electronic gear shifter sends a third ciphertext to the keyless entry and start controller.
And S409, comparing the second ciphertext with the third ciphertext by the keyless entry and starting controller to obtain a comparison result.
After the step S409, the method further includes step S410, when the comparison result indicates that the second ciphertext is consistent with the third ciphertext, the keyless entry and start controller sends an authentication success message to the electronic gear shifter, wherein the authentication success message indicates that the electronic gear shifter is allowed to be unlocked.
S411, the electronic gear shifter sends a gear unlocking signal to a gearbox of the vehicle.
After the step S409, the method further includes step S412, when the comparison result represents that the second ciphertext is inconsistent with the third ciphertext, the keyless entry and start controller sends authentication failure information to the electronic gear shifter, where the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked.
The anti-theft authentication method provided by the embodiment can be referred to the anti-theft authentication method provided by the embodiment, and the principle and the technical effect are similar and are not described again.
Fig. 6 is a schematic structural diagram of a keyless entry and start controller according to an embodiment of the present application, and as shown in fig. 6, the keyless entry and start controller includes:
the first obtaining unit 31 is configured to obtain a first ciphertext, where the first ciphertext is obtained by performing encoding processing and encryption processing on pre-stored plaintext information.
The second obtaining unit 32 is configured to obtain a second ciphertext, where the second ciphertext is obtained by encrypting the plaintext information.
The first transmitting unit 33 is configured to transmit a first ciphertext to the electronic gear shifter, so that the electronic gear shifter performs decryption processing and decoding processing on the first ciphertext to obtain plaintext information, and then performs encryption processing on the plaintext information to obtain a third ciphertext.
And the first receiving unit 34 is used for receiving a third ciphertext transmitted by the electronic gear shifter.
And the processing unit 35 is configured to compare the second ciphertext with the third ciphertext to obtain a comparison result.
A second sending unit 36, configured to send the comparison result to the electronic gear shifter, so that the electronic gear shifter determines whether to perform unlocking according to the comparison result.
The keyless entry and start controller provided in this embodiment is the same as the technical solution for implementing the anti-theft authentication method applied to the vehicle provided in any one of the foregoing embodiments, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 7 is a schematic structural diagram of another keyless entry and start controller according to an embodiment of the present application, and based on the embodiment shown in fig. 6, as shown in fig. 7, in the keyless entry and start controller, a first obtaining unit 31 includes:
the encoding module 311 is configured to perform encoding processing on the plaintext information to obtain encoded plaintext information.
The encrypting module 312 is configured to encrypt the encoded plaintext information by using an encryption key to obtain a first ciphertext.
The encoding module 311 is specifically configured to: and encoding the plaintext information to a preset elliptic curve by adopting an elliptic curve encryption method to obtain the encoded plaintext information.
The second obtaining unit 32 is specifically configured to: and encrypting the plaintext information by adopting an AES key to obtain a second ciphertext.
The second transmitting unit 36 includes:
the first sending module 361 is configured to send the comparison result to the electronic gear shifter when the comparison result indicates that the second ciphertext is consistent with the third ciphertext, where the comparison result includes authentication success information, so that the electronic gear shifter sends a signal of unlocking a gear to a transmission of a vehicle, where the authentication success information indicates that the electronic gear shifter is allowed to be unlocked.
The second sending module 362 is configured to send the comparison result to the electronic gear shifter when the comparison result represents that the second ciphertext is inconsistent with the third ciphertext, where the comparison result includes authentication failure information, and the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked.
The keyless entry and start controller provided by the embodiment further comprises:
the second receiving unit 41 is configured to receive an authentication request sent by the electronic gear shifter before the first obtaining unit 31 performs coding processing and encryption processing on the pre-stored plaintext information to obtain a first ciphertext, where the authentication request is sent by the electronic gear shifter after the electronic gear shifter completes initialization after the keyless entry and start controller controls the relay of the vehicle to pick up.
The keyless entry and start controller provided in this embodiment is the same as the technical solution for implementing the anti-theft authentication method applied to the vehicle provided in any one of the foregoing embodiments, and the implementation principle and the technical effect are similar and will not be described again.
Fig. 8 is a schematic structural diagram of an electronic shifter provided in an embodiment of the present application, and as shown in fig. 8, the electronic shifter includes:
the first receiving unit 51 is configured to receive a first ciphertext sent by the keyless entry and start controller, where the first ciphertext is obtained by performing encoding processing and encryption processing on pre-stored plaintext information by the keyless entry and start controller.
The first processing unit 52 is configured to perform decryption processing and decoding processing on the first ciphertext to obtain plaintext information.
And a second processing unit 53, configured to perform encryption processing on the plaintext information to obtain a third ciphertext.
The first sending unit 54 is configured to send a third ciphertext to the keyless entry and start controller, so that the keyless entry and start controller compares the pre-stored second ciphertext with the third ciphertext to obtain a comparison result, where the second ciphertext is obtained by encrypting plaintext information by the keyless entry and start controller.
The second receiving unit 55 is used for receiving the comparison result sent by the keyless entry and start controller.
And a determining unit 56, configured to determine whether to perform unlocking according to the comparison result.
The electronic gear shifter provided by this embodiment is the same as the technical scheme for implementing the anti-theft authentication method applied to the vehicle in the method provided by any one of the foregoing embodiments, and the implementation principle and the technical effect are similar and are not described again.
Fig. 9 is a schematic structural diagram of an electronic shifter provided in an embodiment of the present application, and based on the embodiment shown in fig. 8, as shown in fig. 9, in the electronic shifter, a first processing unit 52 includes:
the decryption module 521 is configured to decrypt the first ciphertext with the decryption key to obtain a decrypted first ciphertext.
The decoding module 522 is configured to perform decoding processing on the decrypted first ciphertext to obtain plaintext information.
The decrypted first ciphertext is located in a preset elliptic curve; the decoding module 522 is specifically configured to: and decoding the decrypted first ciphertext by adopting an elliptic curve encryption method to obtain plaintext information.
The second processing unit 53 is specifically configured to: and encrypting the plaintext information by adopting an AES key to obtain a third ciphertext.
In the electronic shifter provided in the present embodiment, the determination unit 56 includes:
the first determining module 561 is configured to, when the comparison result includes authentication success information, determine that the electronic gear shifter is allowed to be unlocked, and determine to execute unlocking and send a signal of an unlocked gear to a transmission of the vehicle; and the second ciphertext is consistent with the third ciphertext.
Or, the second determining module 562 is configured to determine not to execute the unlocking when the comparison result includes the authentication failure information, where the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked, and the second ciphertext is inconsistent with the third ciphertext.
The electronic gear shifter that this embodiment provided still includes:
the initialization unit 61 is used for completing initialization of the electronic gear shifter after detecting that the keyless entry and start controller controls the relay of the vehicle to be attracted before the first receiving unit 51 receives the first ciphertext sent by the keyless entry and start controller;
a second sending unit 62 for sending an authentication request to the keyless entry and start controller.
The electronic gear shifter provided by this embodiment is the same as the technical scheme for implementing the anti-theft authentication method applied to the vehicle in the method provided by any one of the foregoing embodiments, and the implementation principle and the technical effect are similar and are not described again.
Fig. 10 is a schematic structural diagram of another keyless entry and start controller according to an embodiment of the present application, as shown in fig. 10, the keyless entry and start controller includes: a transmitter 71, a receiver 72, a memory 73 and a processor 74.
The memory 73 is used to store computer instructions; the processor 74 is configured to execute the computer instructions stored in the memory 73 to implement the above-mentioned embodiments to provide any implementation of the anti-theft authentication method applied to the vehicle.
Fig. 11 is a schematic structural diagram of another electronic shifter provided in an embodiment of the present application, and as shown in fig. 11, the electronic shifter includes: a transmitter 81, a receiver 82, a memory 83 and a processor 84.
The present application also provides a storage medium comprising: readable storage media and computer instructions, the computer instructions stored in the readable storage media; the computer instructions are used for implementing the technical scheme of the anti-theft authentication method applied to the vehicle in any implementation mode provided by the previous embodiment.
In the above embodiments of the keyless entry and start controller and the electronic gear shifter, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (flexible disk), optical disk (optical disk), and any combination thereof.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.
Claims (17)
1. An anti-theft authentication method applied to a vehicle, which is applied to a keyless entry and start controller, the method comprising:
acquiring a first ciphertext and a second ciphertext, wherein the first ciphertext is obtained by encoding and encrypting pre-stored plaintext information, and the second ciphertext is obtained by encrypting the plaintext information;
sending the first ciphertext to an electronic gear shifter to enable the electronic gear shifter to decrypt and decode the first ciphertext to obtain plaintext information, and then encrypting the plaintext information to obtain a third ciphertext;
receiving the third ciphertext transmitted by the electronic shifter;
and comparing the second ciphertext with the third ciphertext to obtain a comparison result, and sending the comparison result to the electronic gear shifter, so that the electronic gear shifter determines whether to execute unlocking according to the comparison result.
2. The method of claim 1, wherein obtaining the first ciphertext comprises:
encoding the plaintext information to obtain encoded plaintext information;
and encrypting the coded plaintext information by using an encryption key to obtain the first ciphertext.
3. The method according to claim 2, wherein the encoding the plaintext information to obtain the encoded plaintext information comprises:
and encoding the plaintext information to a preset elliptic curve by adopting an elliptic curve encryption method to obtain the encoded plaintext information.
4. The method of claim 1, wherein obtaining the second ciphertext comprises:
and encrypting the plaintext information by adopting an Advanced Encryption Standard (AES) key to obtain the second ciphertext.
5. The method of claim 1, wherein sending the comparison to the electronic shifter to cause the electronic shifter to determine whether to perform unlocking according to the comparison comprises:
when the comparison result represents that the second ciphertext is consistent with the third ciphertext, sending a comparison result to the electronic gear shifter, wherein the comparison result comprises authentication success information, so that the electronic gear shifter sends a gear unlocking signal to a transmission case of a vehicle, and the authentication success information represents that the electronic gear shifter is allowed to be unlocked;
and when the comparison result represents that the second ciphertext is inconsistent with the third ciphertext, sending a comparison result to the electronic gear shifter, wherein the comparison result comprises authentication failure information, and the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked.
6. The method of any of claims 1-5, further comprising, prior to the obtaining the first ciphertext and the second ciphertext:
and receiving an authentication request sent by the electronic gear shifter, wherein the authentication request is sent by the electronic gear shifter after the electronic gear shifter completes initialization after the keyless entry and start controller controls the relay of the vehicle to suck.
7. An anti-theft authentication method applied to a vehicle is characterized by being applied to an electronic gear shifter, and the method comprises the following steps:
receiving a first ciphertext sent by a keyless entry and start controller, wherein the first ciphertext is obtained after the keyless entry and start controller performs coding processing and encryption processing on prestored plaintext information;
carrying out decryption processing and decoding processing on the first ciphertext to obtain plaintext information;
encrypting the plaintext information to obtain a third ciphertext;
sending the third ciphertext to the keyless entry and start controller, so that the keyless entry and start controller compares a prestored second ciphertext with the third ciphertext to obtain a comparison result, wherein the second ciphertext is obtained after the keyless entry and start controller encrypts the plaintext information;
and receiving the comparison result sent by the keyless entry and start controller, and determining whether to execute unlocking according to the comparison result.
8. The method according to claim 7, wherein performing decryption processing and decoding processing on the first ciphertext to obtain the plaintext information comprises:
decrypting the first ciphertext by using a decryption key to obtain a decrypted first ciphertext;
and decoding the decrypted first ciphertext to obtain the plaintext information.
9. The method according to claim 8, wherein the decrypted first ciphertext is located in a predetermined elliptic curve; decoding the decrypted first ciphertext to obtain the plaintext information, including:
and decoding the decrypted first ciphertext by adopting an elliptic curve encryption method to obtain the plaintext information.
10. The method of claim 7, wherein encrypting the plaintext information to obtain a third ciphertext comprises:
and encrypting the plaintext information by adopting an Advanced Encryption Standard (AES) key to obtain the third ciphertext.
11. The method of claim 7, wherein determining whether to perform unlocking according to the comparison comprises:
when the comparison result comprises authentication success information, wherein the authentication success information represents that the electronic gear shifter is allowed to be unlocked, and a signal for executing unlocking and sending an unlocking gear to a gearbox of a vehicle is determined; wherein the second ciphertext and the third ciphertext are consistent with each other;
or when the comparison result comprises authentication failure information, wherein the authentication failure information represents that the electronic gear shifter is not allowed to be unlocked, and the second ciphertext is inconsistent with the third ciphertext, determining not to execute unlocking.
12. The method according to any of claims 7-11, further comprising, prior to said receiving the first ciphertext transmitted by the keyless entry and start controller:
after detecting that the keyless entry and start controller controls the relay of the vehicle to be attracted, finishing the initialization of the electronic gear shifter;
sending an authentication request to the keyless entry and start controller.
13. A keyless entry and start controller comprising:
the device comprises a first acquisition unit, a second acquisition unit and a first encryption unit, wherein the first acquisition unit is used for acquiring a first ciphertext, and the first ciphertext is obtained by encoding and encrypting pre-stored plaintext information;
a second obtaining unit, configured to obtain a second ciphertext, where the second ciphertext is obtained by encrypting the plaintext information;
the first transmitting unit is used for transmitting the first ciphertext to the electronic gear shifter so that the electronic gear shifter carries out decryption processing and decoding processing on the first ciphertext to obtain the plaintext information and then carries out encryption processing on the plaintext information to obtain a third ciphertext;
the first receiving unit is used for receiving the third ciphertext sent by the electronic gear shifter;
the processing unit is used for comparing the second ciphertext with the third ciphertext to obtain a comparison result;
the second sending unit is used for sending the comparison result to the electronic gear shifter, so that the electronic gear shifter determines whether to execute unlocking according to the comparison result.
14. An electronic shifter, comprising:
the device comprises a first receiving unit, a second receiving unit and a control unit, wherein the first receiving unit is used for receiving a first ciphertext sent by a keyless entry and start controller, and the first ciphertext is obtained after the keyless entry and start controller carries out coding processing and encryption processing on pre-stored plaintext information;
the first processing unit is used for carrying out decryption processing and decoding processing on the first ciphertext to obtain the plaintext information;
the second processing unit is used for carrying out encryption processing on the plaintext information to obtain a third ciphertext;
the first sending unit is used for sending the third ciphertext to the keyless entry and start controller so that the keyless entry and start controller compares a prestored second ciphertext with the third ciphertext to obtain a comparison result, wherein the second ciphertext is obtained after the keyless entry and start controller encrypts the plaintext information;
the second receiving unit is used for receiving the comparison result sent by the keyless entry and start controller;
and the determining unit is used for determining whether to execute unlocking according to the comparison result.
15. A keyless entry and start controller comprising: a transmitter, a receiver, a memory, and a processor;
the memory is to store computer instructions; the processor is configured to execute the computer instructions stored by the memory to implement the method of any of claims 1-6.
16. An electronic shifter, comprising: a transmitter, a receiver, a memory, and a processor;
the memory is to store computer instructions; the processor is configured to execute the computer instructions stored by the memory to implement the method of any of claims 7-12.
17. A storage medium, comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions for implementing the method of any one of claims 1-6 or the computer instructions for implementing the method of any one of claims 7-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910936849.2A CN112572343B (en) | 2019-09-29 | 2019-09-29 | Anti-theft authentication method, device and storage medium applied to vehicle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910936849.2A CN112572343B (en) | 2019-09-29 | 2019-09-29 | Anti-theft authentication method, device and storage medium applied to vehicle |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112572343A true CN112572343A (en) | 2021-03-30 |
CN112572343B CN112572343B (en) | 2022-04-01 |
Family
ID=75111178
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910936849.2A Active CN112572343B (en) | 2019-09-29 | 2019-09-29 | Anti-theft authentication method, device and storage medium applied to vehicle |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112572343B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113200019A (en) * | 2021-05-24 | 2021-08-03 | 一汽奔腾轿车有限公司 | Mechanical locking anti-theft method for electronic gear shifting vehicle |
CN114889729A (en) * | 2022-05-26 | 2022-08-12 | 天津爱玛车业科技有限公司 | Electronic anti-theft system and method for electric vehicle |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101393658A (en) * | 2008-02-27 | 2009-03-25 | 重庆长安汽车股份有限公司 | Central controlled anti-theft method and system for automobile |
CN101602358A (en) * | 2009-06-18 | 2009-12-16 | 奇瑞汽车股份有限公司 | A kind of engine anti-theft authentication method based on the AES128 cryptographic algorithm |
CN103178966A (en) * | 2013-03-19 | 2013-06-26 | 北京经纬恒润科技有限公司 | KPD (key position detection) authentication method and system for vehicle and smart key and vehicle base station |
CN104494559A (en) * | 2013-03-23 | 2015-04-08 | 北京兴科迪科技有限公司 | Electronic intelligent key and a vehicle door automatic controller used in vehicle |
CN105365773A (en) * | 2014-08-30 | 2016-03-02 | 上海汽车集团股份有限公司 | Vehicle keyless entry method and system |
CN106427889A (en) * | 2015-08-07 | 2017-02-22 | 广州汽车集团股份有限公司 | Automobile anti-theft method and automobile anti-theft system |
US20190061686A1 (en) * | 2016-02-26 | 2019-02-28 | Huf Hülsbeck & Fürst Gmbh & Co. Kg | Method for activating at least one safety function of a vehicle safety system |
-
2019
- 2019-09-29 CN CN201910936849.2A patent/CN112572343B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101393658A (en) * | 2008-02-27 | 2009-03-25 | 重庆长安汽车股份有限公司 | Central controlled anti-theft method and system for automobile |
CN101602358A (en) * | 2009-06-18 | 2009-12-16 | 奇瑞汽车股份有限公司 | A kind of engine anti-theft authentication method based on the AES128 cryptographic algorithm |
CN103178966A (en) * | 2013-03-19 | 2013-06-26 | 北京经纬恒润科技有限公司 | KPD (key position detection) authentication method and system for vehicle and smart key and vehicle base station |
CN104494559A (en) * | 2013-03-23 | 2015-04-08 | 北京兴科迪科技有限公司 | Electronic intelligent key and a vehicle door automatic controller used in vehicle |
CN105365773A (en) * | 2014-08-30 | 2016-03-02 | 上海汽车集团股份有限公司 | Vehicle keyless entry method and system |
CN106427889A (en) * | 2015-08-07 | 2017-02-22 | 广州汽车集团股份有限公司 | Automobile anti-theft method and automobile anti-theft system |
US20190061686A1 (en) * | 2016-02-26 | 2019-02-28 | Huf Hülsbeck & Fürst Gmbh & Co. Kg | Method for activating at least one safety function of a vehicle safety system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113200019A (en) * | 2021-05-24 | 2021-08-03 | 一汽奔腾轿车有限公司 | Mechanical locking anti-theft method for electronic gear shifting vehicle |
CN114889729A (en) * | 2022-05-26 | 2022-08-12 | 天津爱玛车业科技有限公司 | Electronic anti-theft system and method for electric vehicle |
Also Published As
Publication number | Publication date |
---|---|
CN112572343B (en) | 2022-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6903834B2 (en) | ID-based control unit key fob pairing | |
CN108698563B (en) | Secure smartphone-based access and start authorization system for vehicles | |
US7961076B2 (en) | Methods and apparatuses for remote control of vehicle devices and vehicle lock-out notification | |
JP5248930B2 (en) | Cryptographic communication system and cryptographic key update method | |
CN102259636B (en) | Anti-theft method and system for automobiles | |
US11110894B2 (en) | Car sharing system | |
WO2005042317A1 (en) | Vehicle security device and id code management device | |
CN112572343B (en) | Anti-theft authentication method, device and storage medium applied to vehicle | |
CN111114489A (en) | Automatic transmission automobile anti-theft method and automatic transmission automobile | |
CN104029654A (en) | Car anti-theft method and system based on fingerprint secret key encryption technology | |
JP2005343430A (en) | Vehicle control system | |
CN107276748A (en) | A kind of keyless entry of automobile and the key derivation process of activation system | |
CN112950813A (en) | Intelligent lock device, scooter, intelligent lock body control method thereof and storage medium | |
CN107644476B (en) | Data processing method, equipment and system | |
CN115027409A (en) | Vehicle starting control method, keyless intelligent system and electronic equipment | |
JP5189432B2 (en) | Cryptographic data communication system | |
CN109131218B (en) | Starting method and device of vehicle, vehicle and computer readable storage medium | |
WO2017010136A1 (en) | Portable terminal device authenticating system, on-board device, and portable terminal device | |
JP5073307B2 (en) | Cryptographic data communication system | |
EP4180279A1 (en) | Method and system for vehicle anti-theft authentication, storage medium, and vehicle | |
JP5393717B2 (en) | Electronic key device | |
CN104590206B (en) | Ignition lock controls Apparatus and method for | |
KR20140002572A (en) | Wireless remote control for vehicle using otp | |
JP2003110554A (en) | On-vehicle receiver and wireless system for vehicle | |
JP2024526269A (en) | System and method for a secure keyless system - Patents.com |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |