Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission transfer method and system for digital key offline condition of trusted execution environment

A digital key and execution environment technology, applied in digital transmission systems, services based on specific environments, transmission systems, etc., to ensure privacy and security, and resist man-in-the-middle attacks and replay attacks.

Pending Publication Date: 2022-01-21
SHANGHAI JIAO TONG UNIV
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The patent does not involve the scene of authority transfer, and is only designed for car owners who need services such as unlocking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission transfer method and system for digital key offline condition of trusted execution environment
  • Permission transfer method and system for digital key offline condition of trusted execution environment
  • Permission transfer method and system for digital key offline condition of trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] According to a trusted execution environment digital key offline authority transfer method provided by the present invention, comprising:

[0065] Step S1: Import the cloud root key and vehicle identification code at the vehicle-end production line stage, bind the vehicle identification code with the SE ID, and fill the SE with the root certificate to generate the vehicle-end root key;

[0066] Step S2: Generate the car-end digital key key based on the car-end root key and derive the car-end digital key key;

[0067] Step S3: Generate a mobile phone digital key key, and authenticate the generated mobile phone digital key key with the vehicle digital key key;

[0068] Step S4: Through the trusted execution environment and the technical characteristics of the trusted clock, based on the generated car-end root key and the car-end digital key, the authority transfer of the digital key under offline conditions is realized.

[0069] Specifically, the step S1 adopts:

[0070...

Embodiment 2

[0091] Embodiment 2 is a preferred example of embodiment 1

[0092] The technical problems to be solved by the present invention include: designing a digital key authority transfer protocol in related offline scenarios to ensure the privacy and integrity of digital keys, and designing a trusted clock in offline scenarios to ensure that authority is withdrawn within a specified time.

[0093] People often pass through road sections without network while driving, and dual offline requires that the required functions (opening and closing locks, key sharing and recovery, etc.) can be completed even when the car terminal and mobile terminal are both offline. For opening and closing the lock, the digital key has been authorized and authenticated, and it only needs to be opened and closed after the Bluetooth connection or NFC connection. However, if you want to hand over the digital key to a third party and continuously control it, you cannot use the cloud to obtain friends’ public k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a permission transfer method and system for a digital key offline condition of a trusted execution environment, and the method comprises the steps: S1, importing a cloud root key and a vehicle identification code at a vehicle end production line stage, binding the vehicle identification code with an SE ID, pouring a root certificate into an SE, and generating a vehicle end root key; S2, generating a vehicle end digital key secret key based on the vehicle end root secret key and exporting the vehicle end digital key secret key; S3, generating a mobile phone end digital key secret key, and authenticating the generated mobile phone end digital key secret key and the car end digital key secret key; and S4, realizing permission transfer of the digital key under the off-line condition based on the generated vehicle end root key and the vehicle end digital key through technical characteristics of a trusted execution environment and a trusted clock.

Description

technical field [0001] The present invention relates to the field of secure communication and authentication, in particular, to a method and system for transferring rights of a digital key offline based on a Trusted Execution Environment, and more specifically, to a digital key based on a Trusted Execution Environment (TEE) (Trusted Execution Environment) The design scheme of the permission transfer of the key offline. Background technique [0002] The development of car keys has gone through three forms: Mechanical Key Entry, Remote Key Entry and Passive Key Entry. These three forms of keys all require the owner to have a physical physical key. With the popularization of mobile Internet and Internet of Vehicles technology, and the combination of TEE technology and all walks of life, the demand for using smart devices such as mobile phones to replace car keys is becoming stronger and stronger. The car digital key scene is becoming the most frequently used application in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L9/00H04W4/40H04W4/80H04W12/0471H04W12/069H04W12/121
CPCH04L9/3263H04L9/3247H04L9/0836H04L9/002H04W4/40H04W4/80H04W12/0471H04W12/069H04W12/121H04L2209/127H04L2209/84Y02P90/30
Inventor 李抒澄夏虞斌陈海波
Owner SHANGHAI JIAO TONG UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More