Key exporting method for non key system entry and start of automobile

A technology for keyless entry and start system, which is applied in the field of keyless entry and start system key derivation of automobiles, can solve problems such as hidden dangers of PEPS system security, and achieve the effect of improving management security.

Active Publication Date: 2017-10-20
GUIZHOU NORMAL UNIVERSITY
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there are certain security risks in the PEPS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key exporting method for non key system entry and start of automobile

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] (1) Key agreement process:

[0025] ① The vehicle-mounted terminal uses the counter function of the single-chip microcomputer to generate x. After a single operation is completed, the counter of the single-chip microcomputer keeps counting, and stops when the outside world operates it again or sends data;

[0026] ②The vehicle terminal sends two large random numbers signed with the vehicle terminal private key (pk_S) to the key terminal with At the same time, a time stamp (Time) is added to the signature of the message to avoid replay attacks;

[0027] ③After receiving the information, the key terminal uses the vehicle-mounted public key to verify the legitimacy of the information. If it is legal, proceed to step ④, otherwise, the identity authentication is not passed and repeat step ②;

[0028] ④The key end generates two large random numbers with The method of generating y is the same as that of x, and then generating a 64-bit temporary key (Tempkey) equal to modp, 32-bit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key exporting method for non key system entry and start of an automobile. The method comprises the following steps: a key negotiation process: a key end uses the values of an original vendor code, a temporary key, a sequence number and a seed code obtained in the key negotiation process to calculate device keys of both communication parties, and then generates 32-bit frame hopping data encrypted by Keelop; the key end sends a 66-bit encoding words composed of fixed codes and skipping codes to a vehicle-mounted end together with big data (the formula is as shown in the specification) signed by a private key of the key end, (the formula is as shown in the specification) and a signature timestamp; and a vehicle-mounted system uses the private key of the key end to verify whether the received response data are legal, and makes corresponding action response if so. By adoption of the key exporting method, the vehicle washing key management security can be improved.

Description

technical field [0001] The invention belongs to the technical field of automobiles, and in particular relates to a key derivation method for a keyless entry and start system of an automobile. Background technique [0002] The function of the car keyless door opening and keyless start system (abbreviation: PEPS system) is composed of two parts: keyless entry and keyless start. Whether the vehicle-side action is executed or not needs to be judged through the key-side: ①When the vehicle owner enters the vehicle, as long as there is a legal key outside the vehicle, the unlock command will be executed. ② When the owner leaves, if there is a legal key in the car, the alarm command will be executed; if there is no legal key in the car and there is a legal key outside the car, the lock command will be executed. ③ When the owner starts the vehicle, as long as there is a legal key in the vehicle, the corresponding gear shift command will be executed. In addition, whether the key end...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08G07C9/00
CPCG07C9/00309H04L9/0838H04L9/0861H04L9/0869
Inventor 游子毅
Owner GUIZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products