Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Symmetric encryption system and method for vehicle bluetooth key identity authentication mode

A bluetooth key and identity authentication technology, which is applied in the field of symmetric encryption system of vehicle bluetooth key identity authentication, can solve the problems of information leakage, illegal users or attackers unable to carry out replay attacks, unable to restore plaintext of identity information, etc., to achieve improved Security, avoiding plaintext leaks, avoiding missed checks, and the effects of replay attacks

Active Publication Date: 2022-04-22
上海越域智能科技有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the prior art, the present invention discloses a symmetric encryption system and method for vehicle bluetooth key identity authentication, which is used to solve information leakage, illegal users or attackers can no longer obtain legal user information, only fingerprints can be obtained Information, due to the irreversibility of fingerprint data, it is impossible to restore the plaintext of identity information, and the encryption key is a one-time secret, and illegal users or attackers cannot implement replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric encryption system and method for vehicle bluetooth key identity authentication mode
  • Symmetric encryption system and method for vehicle bluetooth key identity authentication mode
  • Symmetric encryption system and method for vehicle bluetooth key identity authentication mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] This embodiment discloses as figure 1 A symmetric encryption system of a vehicle bluetooth key identity authentication method is shown, the system is provided with a smart bluetooth module SBM and a bluetooth key BlueKey, and the smart bluetooth module SBM and the bluetooth key BlueKey realize data transparent transmission through low-power bluetooth BLE; When the vehicle is produced, the smart bluetooth module SBM is deployed on the vehicle and connected to the key distribution center KDC through LAN or 4G network to obtain and generate the vehicle master key CMPK; after sales, the Bluetooth key BlueKey is distributed through the 4G network connection key The central KDC generates the digital key VCK after acquisition, and sends back the Bluetooth key BlueKey with VCKINO information. There is a functional relationship between the generated vehicle master key CMPK and the digital key VCK.

[0039] There is a functional relationship between the vehicle master key CMPK and ...

Embodiment 2

[0045] This embodiment discloses as figure 2 A symmetric encryption method of a vehicle bluetooth key identity authentication method shown, comprising the following steps:

[0046] When the S1 vehicle is produced, the smart bluetooth module SBM requests the key distribution center KDC to obtain and generate the vehicle master key CMPK;

[0047] After S2 is sold, the bluekey bluekey requests the smart bluetooth module SBM to carry out the handshake process in clear text, and the smart bluetooth module SBM sends the vehicle information IDv and a random number N1 to BlueKey to complete the handshake;

[0048] S3 requests the smart Bluetooth module SBM to perform two-way identity authentication through the Bluetooth key BlueKey, and checks through the vehicle master key CMPK and DF and F functions to determine whether the identity authentication is passed;

[0049] S4 Bluetooth key BlueKey receives the successful state of two-way identity authentication, enters the session key n...

Embodiment 3

[0064] This embodiment discloses a system, which is designed to have a VCK=F(CMPK,DF), DF=H(VCKINFO) relationship between CMPK and VCK, where F is a one-way hash message authentication code (HMAC) function, and H is a one-way to the hash function;

[0065] On the production line of the car factory, the SBM and the KDC are connected through a LAN or 4G network. The SBM requests to obtain the vehicle master key (CMPK), and the KDC agrees to the request to generate a CMPK.

[0066] After the car is sold, the Bluetooth key BlueKey and KDC are connected through 4G network, BlueKey requests the digital key (VCK), KDC agrees to the request, generates VCK, and sends it back to BlueKey with VCKINO information.

[0067] VCKINFO information includes: VCKINFO:={user ID, authority, key start time, key end time, vehicle characteristics, user mobile phone characteristics}; key fingerprint information (ECDSA mode) {DF=SHA256(VkeyInfo), eDF=ECDSA(df )}

[0068] BlueKey and SBM are connected ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of identity authentication, in particular to a symmetric encryption system and method for identity authentication of a vehicle bluetooth key. Bluetooth BLE is used to realize data transparent transmission; when the vehicle is produced, the smart Bluetooth module SBM is deployed on the vehicle and connected to the key distribution center KDC through LAN or 4G network to obtain and generate the vehicle master key CMPK; after sales, the Bluetooth The key BlueKey is connected to the key distribution center KDC through the 4G network, and the digital key VCK is generated after acquisition, and the accompanying VCKINO information is sent back to the Bluetooth key BlueKey, and there is a functional relationship between the generated vehicle master key CMPK and the digital key VCK; It solves the problem of information leakage, prevents the threat of replay attacks without reducing the running speed, avoids missing checks and replay attacks, and has higher security and wider applicability.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a symmetric encryption system and method of a vehicle bluetooth key identity authentication method. Background technique [0002] The simplest identity authentication is based on the challenge / response (Challenge / Response) identity authentication system. The typical identity authentication process mainly consists of the sequential process of plaintext identity information exchange, two-way identity authentication, session key generation, and two-way symmetric key communication. composition. In the first step of identity authentication, identity information can only be sent in clear text, and techniques such as signatures can be used to prevent counterfeiting. Because the identity of the other party has not been known at this time, there is no shared secret, and since the identity information is sent in plain text, there is a problem of information leakage, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G07C9/00H04W4/80H04W12/79H04W12/0431H04W12/065B60R25/10B60R25/24
CPCH04L63/0435H04L63/0838H04L63/0869G07C9/00309G07C9/00658H04W4/80B60R25/10B60R25/24Y02D30/70
Inventor 吕晓建
Owner 上海越域智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products