Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key exporting method for non key system entry and start of automobile

A technology for keyless entry and start system, which is applied in the field of keyless entry and start system key derivation of automobiles, can solve problems such as hidden dangers of PEPS system security, and achieve the effect of improving management security.

Active Publication Date: 2017-10-20
GUIZHOU NORMAL UNIVERSITY
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there are certain security risks in the PEPS system using the original encryption technology (KEELOQ)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key exporting method for non key system entry and start of automobile

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] (1) Key negotiation process:

[0025] ① The on-board side uses the counter function of the single-chip microcomputer to generate x. After the single operation is completed, the counter of the single-chip microcomputer keeps counting, and stops when the outside world operates it again or sends data;

[0026] ②The vehicle terminal sends two large random numbers signed with the vehicle terminal private key (pk_S) to the key terminal and At the same time, a timestamp (Time) is added to the signature of the message to avoid replay attacks;

[0027] ③ After the key terminal receives the information, use the public key of the vehicle terminal to verify the validity of the information. If it is legal, proceed to step ④, otherwise, the identity authentication will not be passed and repeat step ②;

[0028] ④ The key end generates two large random numbers and The generation method of y is the same as that of x, and then generate a 64-bit temporary key (Tempkey) equal to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key exporting method for non key system entry and start of an automobile. The method comprises the following steps: a key negotiation process: a key end uses the values of an original vendor code, a temporary key, a sequence number and a seed code obtained in the key negotiation process to calculate device keys of both communication parties, and then generates 32-bit frame hopping data encrypted by Keelop; the key end sends a 66-bit encoding words composed of fixed codes and skipping codes to a vehicle-mounted end together with big data (the formula is as shown in the specification) signed by a private key of the key end, (the formula is as shown in the specification) and a signature timestamp; and a vehicle-mounted system uses the private key of the key end to verify whether the received response data are legal, and makes corresponding action response if so. By adoption of the key exporting method, the vehicle washing key management security can be improved.

Description

technical field [0001] The invention belongs to the technical field of automobiles, and in particular relates to a key derivation method for a keyless entry and start system of an automobile. Background technique [0002] The function of the car keyless door opening and keyless start system (abbreviation: PEPS system) is composed of two parts: keyless entry and keyless start. Whether the vehicle-side action is executed or not needs to be judged through the key-side: ①When the vehicle owner enters the vehicle, as long as there is a legal key outside the vehicle, the unlock command will be executed. ② When the owner leaves, if there is a legal key in the car, the alarm command will be executed; if there is no legal key in the car and there is a legal key outside the car, the lock command will be executed. ③ When the owner starts the vehicle, as long as there is a legal key in the vehicle, the corresponding gear shift command will be executed. In addition, whether the key end...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08G07C9/00
CPCG07C9/00309H04L9/0838H04L9/0861H04L9/0869
Inventor 游子毅
Owner GUIZHOU NORMAL UNIVERSITY
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More