Automobile key system with configurable safety strategy and realizing method thereof

A security strategy and system implementation technology, applied in the field of car key system, can solve the problems of not being able to drive the car, waiting for a long time, unable to make physical keys, etc., and achieve the effect of convenient use of car authorization and strong encryption strength

Active Publication Date: 2018-10-23
上海航迹数据信息科技有限公司
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

You can't drive your car if you forget your physical keys
If the physical key is lost or damaged, it will take a long time to wait for the original car factory to add a physical key
At the same time, when we want to rent the car to others, we usually cannot make a physical key that can revoke the authorization in the future to ensure the safety of the vehicle property and avoid disputes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automobile key system with configurable safety strategy and realizing method thereof
  • Automobile key system with configurable safety strategy and realizing method thereof
  • Automobile key system with configurable safety strategy and realizing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Such as figure 1 , figure 2 , image 3 , Figure 4 and Figure 5 As shown, a car key system implementation method with configurable security policy, the implementation method includes: setting a user terminal and a background command server and installing a vehicle controller on the car, and also includes the following steps:

[0036] Step S1: The on-board controller initiates a connection request to the command server through a preset encryption key;

[0037] The specific implementation manner of the step S1 in which the vehicle-mounted controller initiates a connection request to the command server through a preset encryption key may be: the vehicle-mounted controller sends various communication and sensor data to the command server through a preset encryption key.

[0038] In practical applications, the communication and sensor data may include: GPS information, Bluetooth incoming information data, SMS incoming information data, CAN data, temperature and humidit...

Embodiment 2

[0053] Such as image 3 and Figure 4 As shown, the encryption and command control process of the car key system implementation method with configurable security policy is as follows:

[0054] 1) The user terminal requests the encryption control command from the command server when necessary;

[0055] 2) instructing the server to return an encrypted control command to the user terminal according to the situation;

[0056] 3) The user terminal sends the encrypted control command to the vehicle controller through near-field communication;

[0057] Wherein, the near field communication is BLE (Bluetooth Low Energy).

[0058] 4) The on-board controller decrypts and judges whether the command is valid, executes the command if it is valid, and rejects the command if it is invalid;

[0059] 5) The on-board controller feeds back the execution result of the control command to the command server.

[0060] In practical applications, the user terminal can use the pre-cached encrypted...

Embodiment 3

[0065] Such as figure 1 and Figure 5 As shown, a car key system with configurable security policies is constructed according to the method for implementing a car key system with configurable security policies, including a vehicle-mounted controller, a user terminal and a background command server system, wherein the vehicle-mounted controller Including CPU core, memory, encryption and decryption calculator, random number generator, output module, input module, CAN communication module, near field communication device and mobile data network communication module, the CAN communication module, input module and output module are compatible with the vehicle Related circuits are connected, the near-field communication device establishes a connection with the user terminal, the mobile data network communication module establishes a connection with the background command server system, and the input module includes a gyroscope, a 3D acceleration sensor, GPS, a temperature sensor, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a realizing method of an automobile key system with a configurable safety strategy. The realizing method comprises the following steps that a vehicle-mounted controller sends aconnecting request to an instruction server through a preset encryption key; the instruction server verifies the identity of the vehicle-mounted controller and sends an effective encryption key to replace the preset encryption key; the instruction server communicates with the vehicle-mounted controller through the effective encryption key; the safety strategy is configured to trigger updating andreplacing of the effective encryption key; and a user terminal obtains authorization through the instruction server and builds connection with the vehicle-mounted controller through near field communication. The identity of the vehicle-mounted controller is authenticated by multiple factors, a dynamic secret key algorithm is adopted, a secret key is replaced regularly, and the encryption strengthis high; the instruction server is used for distributing encrypted control instructions, and through the near field communication technology, a mobile phone and other types of digital mobile terminals can be a carrier of an automobile key, a solid physical automobile key does not need to be carried along for driving an automobile, and automobile authorization and use are more convenient.

Description

technical field [0001] The invention relates to the field of car unlocking, in particular to a car key system with configurable security policies and an implementation method thereof. Background technique [0002] Currently cars mainly use physical physical keys. The physical key needs to be with you to drive the car. If you forget to bring the physical key, you cannot drive the car. If the physical key is lost or damaged, it will take a long time to wait for the original car factory to add a physical key. At the same time, when we want to rent the car to others, usually we cannot make a physical key that can revoke the authorization in the future to ensure the safety of the vehicle property and avoid disputes. Contents of the invention [0003] In view of the above-mentioned shortcomings existing at present, the present invention provides a car key system with configurable security policies and its implementation method, which can be separated from physical keys, make ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L12/40G07C9/00
CPCG07C9/00174G07C9/00857G07C2009/00769G07C2009/00865H04L9/0891H04L12/40013H04L63/06H04L63/083H04L63/10H04L63/20H04L2012/40215
Inventor 王瀚王鹏程侯觅伍俊
Owner 上海航迹数据信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products