[go: up one dir, main page]

CN101739736B - Vehicle which can be monitored remotely - Google Patents

Vehicle which can be monitored remotely Download PDF

Info

Publication number
CN101739736B
CN101739736B CN 200910241830 CN200910241830A CN101739736B CN 101739736 B CN101739736 B CN 101739736B CN 200910241830 CN200910241830 CN 200910241830 CN 200910241830 A CN200910241830 A CN 200910241830A CN 101739736 B CN101739736 B CN 101739736B
Authority
CN
China
Prior art keywords
wireless monitoring
controller
monitoring controller
random number
service center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 200910241830
Other languages
Chinese (zh)
Other versions
CN101739736A (en
Inventor
王景鹏
李昱
于铭汉
杜晓佳
李峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beiqi Foton Motor Co Ltd
Original Assignee
Beiqi Foton Motor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beiqi Foton Motor Co Ltd filed Critical Beiqi Foton Motor Co Ltd
Priority to CN 200910241830 priority Critical patent/CN101739736B/en
Publication of CN101739736A publication Critical patent/CN101739736A/en
Application granted granted Critical
Publication of CN101739736B publication Critical patent/CN101739736B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention provides a vehicle which can be monitored remotely, comprising a wireless monitoring controller (100) and an engine controller (200). The wireless monitoring controller (100) can be connected with a remote service center (300), and the remote service center (300) can change the wireless monitoring controller (100) authorization state so that the unauthorized wireless monitoring controller (100) can not be verified by the engine controller (200); the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying that whether the wireless monitoring controller (100) is authorized by the remote service center (300) before an engine is started; and the engine is allowed to be started after the wireless monitoring controller (100) is verified. The wireless monitoring controller can be verified by the engine controller, and the engine is not allowed to be started before the wireless monitoring controller is verified, therefore, theforcible dismounting of the wireless monitoring controller by the consumer can be prevented effectively.

Description

Vehicle capable of being remotely monitored
Technical Field
The present invention relates to the field of vehicle remote monitoring, and more particularly to a vehicle capable of remote monitoring.
Background
With the development of automobile technology and the improvement of the living standard of people, more and more people buy automobiles and more flexible payment modes are provided, so as to meet the requirements of consumers with different purchasing abilities. One of the sampled payment methods is installment payment, and for the vehicle purchased by installment payment method, the seller usually installs a wireless monitoring controller on the vehicle, and the wireless monitoring controller can communicate with the seller's remote service center in a remote manner, so that the seller can control the vehicle under the condition that the consumer does not pay due money on time, thereby forcing the consumer to pay.
In order to prevent some consumers from detaching the wireless monitoring controller and evade the monitoring of sellers, the wireless monitoring controller needs to have a detachment prevention function, but the wireless monitoring controller only needs to be locked by some locking tools at present, so that the consumers cannot be prevented from detaching by adopting a violent means.
Disclosure of Invention
In order to overcome the defect that a seller loses monitoring due to the fact that the wireless monitoring controller can be violently removed by a consumer in the prior art, the invention particularly provides a vehicle capable of being remotely monitored, and the vehicle can effectively prevent the wireless monitoring controller from being removed.
The vehicle capable of being remotely monitored comprises a wireless monitoring controller and an engine controller, wherein the wireless monitoring controller can be wirelessly connected with a remote service center, and the remote service center can change the authorization state of the wireless monitoring controller, so that the wireless monitoring controller cannot pass the verification of the engine controller under the condition of unauthorized; the engine controller is connected with the wireless monitoring controller and used for verifying whether the wireless monitoring controller is authorized by a remote service center before starting the engine and allowing the engine to be started under the condition that the verification is passed.
When the vehicle capable of being remotely monitored can be started, the engine controller verifies the wireless monitoring controller, and the engine is prevented from being started under the condition that the wireless monitoring controller is not verified, so that a consumer is effectively prevented from forcibly detaching the wireless monitoring controller.
Drawings
FIG. 1 is a schematic diagram of the connection relationship between a vehicle capable of being remotely monitored and a remote service center provided by the present invention;
FIG. 2 is a schematic diagram of the connection relationship between a vehicle capable of being remotely monitored and a remote service center provided by the present invention; and
fig. 3 is a flow chart of the encryption process for a vehicle capable of remote monitoring provided by the present invention.
Detailed Description
The present invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the present invention provides a vehicle 400 capable of remote monitoring, the vehicle 400 including: a wireless monitoring controller 100 and an engine controller 200, wherein the wireless monitoring controller 100 can be wirelessly connected with a remote service center 300, and the remote service center 300 can change the authorization state of the wireless monitoring controller 100, so that the wireless monitoring controller 100 cannot pass the verification of the engine controller 200 if not authorized; the engine controller 200 is connected to the wireless monitoring controller 100 (e.g., via a CAN bus) to verify whether the wireless monitoring controller 100 is authorized by the remote service center 300 before starting the engine, and to allow the engine to be started if the verification is passed.
In the case where the customer does not pay the due money in time, the remote service center 300 may change the state of the wireless monitoring controller 100, for example, block communication between the wireless monitoring controller 100 and the engine controller 200, change an encryption algorithm, an encryption key, etc. of the wireless monitoring controller 100, so that the wireless monitoring controller 100 cannot pass authentication of the engine controller 200, thereby preventing the engine from starting and forcing the customer to pay the due money to the seller.
Preferably, as shown in fig. 2, the wireless monitoring controller 100 may include a GPS module 110. The wireless monitoring controller 100 may acquire vehicle location information through the GPS module 110 in response to a request of the remote service center 300 and transmit the information to the remote service center 300 so that a dealer can know the current location of the vehicle in time and can intercept the vehicle in case that the customer does not pay the due money in time, forcing the customer to pay the due money.
The verification process comprises: the wireless monitoring controller 100 generates a random number, encrypts the random number by using an encryption key and an encryption algorithm stored in the wireless monitoring controller 100 to obtain an encrypted password, and sends the random number and the encrypted password to the engine controller 200; and the engine controller 200 receives the random number and the encrypted password, encrypts the received random number by using an encryption key and an encryption algorithm stored in the engine controller 200 to obtain another encrypted password, compares the other encrypted password with the received encrypted password to verify whether the wireless monitoring controller 100 is authorized by the remote service center 300, if the two are the same, it indicates that the wireless monitoring controller 100 is authorized by the remote service center 300, otherwise, it indicates that the wireless monitoring controller 100 is not authorized by the remote service center 300. At this time, the remote service center 300 may change the authorization status of the wireless monitoring controller 100 by changing the encryption algorithm or encryption key.
Here, the encryption algorithm may employ various encryption algorithms such as DES, 3DES, or IDEA. Preferably, the encrypting the random number by the wireless supervisory controller 100 and the engine controller 200 using an encryption key and an encryption algorithm includes: step 1): dividing the random number into a plurality of portions; step 2): generating a plurality of groups of sub-keys according to the encryption key, wherein each group of sub-keys comprises a plurality of sub-keys; step 3): encrypting portions of the random number using a first set of subkeys; step 4): encrypting the result after the previous group of sub-keys is encrypted by using the next group of sub-keys; and step 5): and repeating the step 4) until a result after the last group of keys is encrypted is obtained, wherein the result is the encrypted password.
The random number may be generated according to the vehicle position information, or may be generated by other random number generation algorithms. The encryption key and encryption algorithm are both in the wireless supervisory controller 100 and engine controller 200 (e.g., may be solidified by the vehicle manufacturer).
For a symmetric encryption algorithm, the encryption key and encryption algorithm stored in the wireless supervisory controller 100 are the same as the encryption key and encryption algorithm stored in the engine controller 200.
For asymmetric encryption algorithms, the wireless supervisory controller and engine controller 200 may store a private key and a public key, respectively. The verification process comprises: the wireless monitoring controller 100 generates a random number, encrypts the random number by using a private key to obtain an encrypted password, and sends the random number and the encrypted password to the engine controller 200; and the engine controller 200 receives the random number and the encrypted password, decrypts the received encrypted password with the public key to obtain another random number, and compares the another random number with the received random number to verify whether the wireless monitoring controller 100 is authorized by the remote service center 300, if the two are the same, it indicates that the wireless monitoring controller 100 is authorized by the remote service center 300, otherwise, it indicates that the wireless monitoring controller 100 is not authorized by the remote service center 300. At this time, the remote service center 300 may change the authorization status of the wireless monitoring controller 100 by changing the private key.
The encryption process of the present invention is described in detail below with reference to fig. 3.
The whole encryption process comprises three parts: a random number generation process, an encryption key generation process, and an encryption process. The three parts will be described one by one.
Random number generation process
The longitude information and the latitude information transmitted by the GPS module 110 are transmitted in a 16-bit double-word format, with the upper 8 bits being integer bits of degree and minutes and the lower 8 bits being decimal points of minutes and second information. Here, the lower 8 bits of the longitude information are s1, and the lower 8 bits of the latitude information are s 2. Assuming that the source random number is S, a 16-bit source random number is obtained: S1S 2;
thereafter, the source random number S is divided into eight groups of 2 bits each, i.e., x1, x2, x3, x4, x5, x6, x7, x8, and the 8 groups of numbers are subjected to linear congruence processing:
Xn=(1025xn+1)mod(2^15)
arranging the obtained 8 4-bit 16-ary numbers Xn as follows (wherein n is 1-8):
{X1X2X3X4X5X6X7X8 X5X2X7X1X8X4X3X6}
thereby obtaining a 64-bit random number.
Encryption key generation process
A is recorded as a 6 digit decimal vehicle password (the vehicle password is given by the vehicle manufacturer, such as a VIN code that can uniquely identify each vehicle). Squaring the six-bit decimal password to obtain a 2, wherein the range of the a 2 converted into the 16-bit 16-ary number is 9 bits, and the range of the converted 16-ary number is as follows:
(100000)^2=2540B E400<=a^2<=(999999)^2=E 8DB6 8B81
taking the lower eight bits of a 2 in 16 th order, we get a 32-bit basic key, which is divided into eight groups (i.e., c1c2c3c4c5c6c7c8), each group having 4 bits. The eight groups of numbers are calculated according to the following rules:
b1=(1025c1+1)mod(2^15)
b2=(1025c2+1)mod(2^15)
b3=(1025c3+1)mod(2^15)
b4=(1025c4+1)mod(2^15)
b5=(1025c5+1)mod(2^15)
b6=(1025c6+1)mod(2^15)
b7=(1025c7+1)mod(2^15)
b8=(1025c8+1)mod(2^15)
wherein bn is a 4-bit 16-ary number with 16 bits, and n is 1-8.
Assuming that the encryption key is B, B is B1B2B3B4B5B6B7B8, thereby obtaining a 128-bit encryption key.
Encryption process
The whole encryption comprises 9 rounds of iteration, wherein 6 sub-keys are used in each round from 1 to 8, 4 sub-keys are used in the 9 th round, and 52 sub-keys are used in total. The encryption process comprises the following steps: a sub-key generation step, a random number division step and an encryption step.
(1)Sub-key generation step
The 128-bit encryption key generated in the encryption key generation process is denoted as k, k being k1k2.. k128, and is divided into 8 sub-keys, each sub-key having 16 bits, which sequentially includes:
Z1 (1)=k1k2...k16
Z2 (1)=k17k18...k32
Z5 (1)=k65k66...k80
Z6 (1)=k81k82...k96
Z1 (2)=k97k98...k112
Z2 (2)=k113k114...k128
wherein Z isi (n)The i-th sub-key in the nth iteration is represented, i is 1-6, and n is 1-9. Z1 (1)~Z6 (1)As 6 subkeys for the first round, the remaining Z1 (2)、Z2 (2)As a sub-key for the second round.
Then, rotate k left by 25 bits:
k′=k26k27...k128k1k2...k25
it is also divided into 8 subkeys, the first 4Z3 (2)、Z4 (2)、Z5 (2)、Z6 (2)Exactly with Z formed by the last division1 (2)、Z2 (2)Together forming the sub-keys of the second round, the last 4 as sub-keys of the third round.
And then, the left rotation and the shift are continued by 25 bits, and the rest sub-keys are generated until the generation of 52 sub-keys is finished.
(2)Step of dividing random number
The 64-bit random numbers generated in the random number generation process described above are divided into four groups of 16 bits each.
Assuming D is the received 64-bit random number, then:
D1=d1d2d3d4d5d6d7d8d9d10d11d12d13d14d15d16
D2=d17d18d19d20d21d22d23d24d25d26d27d28d29d30d31d32
D3=d33d34d35d36d37d38d39d40d41d42d43d44d45d46d47d48
D4=d49d50d51d52d53d54d55d56d57d58d59d60d61d62d63d64
these four 16-bit subblocks D1、D2、D3、D4As the iterative first round input.
(3)Step of encryption
Fig. 3 shows a specific procedure of the entire encryption step, in which,
representing bit-by-bit difference between 16-bit subblocksOr operation;
as a multiplication operation of mod (2^16+1) by an integer representing 16 bit;
Figure G2009102418302D00072
an integer representing 16 bits is added at mod (2^ 16);
Figure G2009102418302D00073
representing the operation result of each corresponding step;
(ii) represents D1And a first round of 1 st subkey Z1 (1)Making the result of the multiplication operation;
② represents D2And a first round of a 2 nd subkey Z2 (1)Making the result of the addition operation;
③ represents D3And a first round of 3 rd subkey Z3 (1)Making the result of the addition operation;
fourthly represents D4And the first round 4 th subkey Z4 (1)Making the result of the multiplication operation;
representing the result of XOR operation of the first and the third;
sixthly, representing the result of XOR operation of the two and the four;
and the key Z represents the key Z of the 5 th sub-key of the first round5 (1)Making the result of the multiplication operation;
the eighths represent the results of addition;
ninthly represents the first round 6 th sub-key Z6 (1)Making the result of the multiplication operation;
r represents the result of addition of C and N;
representing the result of multiplication operation of (1) and (ninthly);
Figure G2009102418302D00082
representing the result of exclusive or operation of the third sum and the ninthly;
Figure G2009102418302D00083
represents the result of XOR operation between (c) and (r);
Figure G2009102418302D00084
representing the result of the exclusive or operation on r and r.
Wherein,
Figure G2009102418302D00085
the above process is repeatedly performed as an input for the next round. Except for the last round (9 th round), the 2 nd and 3 rd blocks are interchanged when transitioning from the previous round to the next round.
After the 8 th round, the output result is assumed to be
Figure G2009102418302D00086
The output of the last round is as follows:
Figure G2009102418302D00087
and the 9 th round 1 st sub-key block Z1 (9)Making the result of the multiplication operation;
Figure G2009102418302D00088
and the 9 th round 2 nd sub-key block Z2 (9)Making the result of the addition operation;
Figure G2009102418302D00089
and the 9 rd round 3 rd sub-key block Z3 (9)Making the result of the addition operation; and
Figure G2009102418302D000810
and the 9 th round 4 th sub-key block Z4 (9)The result of the multiplication is made.
The results can be combined into an encrypted password in order (no interchange is required between block 2 and block 3 at this point).
The encryption process provided by the present invention has been described above, but the present invention is not limited thereto, and other random number generation methods, encryption key generation methods, and encryption algorithms may also be used.
When the vehicle capable of remote monitoring provided by the invention can be started, the engine controller 200 verifies the wireless monitoring controller 100, and the engine is prevented from being started under the condition that the wireless monitoring controller 100 is not verified, so that a consumer is effectively prevented from forcibly removing the wireless monitoring controller 100. Also, the seller may prevent the engine from being started in case the customer does not pay the due money in time, or may intercept the vehicle according to the vehicle location information received by the remote service center 300, thereby forcing the customer to pay the due money.

Claims (5)

1. A vehicle capable of remote monitoring, the vehicle comprising a wireless monitoring controller (100) and an engine controller (200),
the wireless monitoring controller (100) can be wirelessly connected with a remote service center (300), and the remote service center (300) can change the authorization state of the wireless monitoring controller (100) so that the wireless monitoring controller (100) cannot pass the verification of the engine controller (200) in the unauthorized condition;
the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying whether the wireless monitoring controller (100) is authorized by a remote service center (300) before starting the engine and allowing the engine to be started only if the verification is passed,
wherein,
the wireless monitoring controller (100) generates a random number, encrypts the random number by using an encryption key and an encryption algorithm stored in the wireless monitoring controller (100) to obtain an encrypted password, and sends the random number and the encrypted password to the engine controller (200); and
the engine controller (200) receives the random number and the encrypted password, encrypts the received random number using an encryption key and an encryption algorithm stored in the engine controller (200) to obtain another encrypted password, compares the other encrypted password with the received encrypted password, and indicates that the wireless monitoring controller (100) is authorized by the remote service center (300) if the two are the same, or indicates that the wireless monitoring controller (100) is unauthorized by the remote service center (300).
2. The vehicle according to claim 1, wherein the wireless monitoring controller (100) includes a GPS module (110), and the wireless monitoring controller (100) acquires vehicle position information through the GPS module (110) in response to a request of the remote service center (300), and transmits the vehicle position information to the remote service center (300).
3. The vehicle of claim 1, wherein the remote service center (300) changing the authorization status of the wireless monitoring controller (100) comprises: changing an encryption algorithm or encryption key stored in the wireless supervisory controller (100).
4. The vehicle of claim 1, wherein the wireless supervisory controller (100) or the engine controller (200) encrypting the random number with an encryption key and an encryption algorithm comprises:
step 1): dividing the random number into a plurality of portions;
step 2): generating a plurality of groups of sub-keys according to the encryption key, wherein each group of sub-keys comprises a plurality of sub-keys;
step 3): encrypting portions of the random number using a first set of subkeys;
step 4): encrypting the result after the previous group of sub-keys is encrypted by using the next group of sub-keys; and
step 5): and repeating the step 4) until a result after the last group of keys is encrypted is obtained, wherein the result is the encrypted password.
5. The vehicle according to any one of claims 1-4, wherein the random number is generated from vehicle location information.
CN 200910241830 2009-12-09 2009-12-09 Vehicle which can be monitored remotely Active CN101739736B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910241830 CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910241830 CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Publications (2)

Publication Number Publication Date
CN101739736A CN101739736A (en) 2010-06-16
CN101739736B true CN101739736B (en) 2013-10-16

Family

ID=42463182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910241830 Active CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Country Status (1)

Country Link
CN (1) CN101739736B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637312B (en) * 2012-03-29 2015-03-11 中联重科股份有限公司 Method, device and system for unlocking engineering machinery
CN103465866A (en) * 2013-09-25 2013-12-25 北京汽车股份有限公司 Vehicle starting control method, vehicle starting control device and vehicle
CN103625427A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile door opening and closing automatic control method and system based on satellite locating technology
CN103625426A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile start control system and method based on locating technology
CN105357181B (en) * 2015-09-29 2018-06-12 广东顺德中山大学卡内基梅隆大学国际联合研究院 A kind of method of multiple terminals monitoring Wi-Fi labels
CN105245406A (en) * 2015-11-02 2016-01-13 厦门雅迅网络股份有限公司 Method for preventing in-car terminal from being detached
CN105721149B (en) * 2016-04-25 2019-02-26 北汽福田汽车股份有限公司 A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding
CN106707817B (en) * 2016-12-30 2019-09-27 上海华兴数字科技有限公司 A kind of Dynamic Matching tamper method and excavator
CN109215164A (en) 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
CN111970317B (en) * 2020-04-28 2023-08-15 浙江吉利汽车研究院有限公司 Remote control method, storage medium and remote control system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6025774A (en) * 1998-06-24 2000-02-15 Forbes; Mark P. Method for retrieving vehicular collateral
US6195648B1 (en) * 1999-08-10 2001-02-27 Frank Simon Loan repay enforcement system
US20050162016A1 (en) * 2003-10-15 2005-07-28 Payment Protection Systems, Inc. Vehicle disablement system user interface
CN1830707A (en) * 2005-03-07 2006-09-13 本田技研工业株式会社 vehicle anti-theft system
CN1919666A (en) * 2005-08-26 2007-02-28 刘立平 Money-supply prompting method and system for automobile

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6025774A (en) * 1998-06-24 2000-02-15 Forbes; Mark P. Method for retrieving vehicular collateral
US6195648B1 (en) * 1999-08-10 2001-02-27 Frank Simon Loan repay enforcement system
US20050162016A1 (en) * 2003-10-15 2005-07-28 Payment Protection Systems, Inc. Vehicle disablement system user interface
CN1830707A (en) * 2005-03-07 2006-09-13 本田技研工业株式会社 vehicle anti-theft system
CN1919666A (en) * 2005-08-26 2007-02-28 刘立平 Money-supply prompting method and system for automobile

Also Published As

Publication number Publication date
CN101739736A (en) 2010-06-16

Similar Documents

Publication Publication Date Title
CN101739736B (en) Vehicle which can be monitored remotely
JP6345157B2 (en) In-vehicle information communication system and authentication method
CN101559745B (en) Vehicle control system for preventing stealing and robbery and implementation method thereof
US9512659B2 (en) Code hopping based system with increased security
US9143320B2 (en) Electronic key registration system
US8275123B2 (en) Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key
JP5257814B2 (en) Secret key registration system and secret key registration method
JP6444304B2 (en) One-way key fob and vehicle pairing
CN103444127A (en) Motor vehicle control unit having a cryptographic device
JPH086520B2 (en) Remote access system
CN110336673B (en) A privacy protection based blockchain design method
MXPA02007602A (en) Method and device for mutual authentication of two data processing units.
JP4465998B2 (en) Mobile terminal and vehicle remote control system
CN101753308A (en) Completeness certification method
JP2011512562A (en) Random encryption and decryption method for access and communication data
Solomon et al. Limon-lightweight authentication for tire pressure monitoring sensors
CN107154920B (en) Encryption method and decryption method for security information and receiving device for receiving security information
JP4918133B2 (en) Data storage method, client device, data storage system, and program
TWI573427B (en) Code hopping based system with increase security
CN113783687B (en) Method and system for generating, encrypting and decrypting automobile electronic anti-theft code
JP5985845B2 (en) Electronic key registration method
CN201559614U (en) Control system for preventing vehicle from theft
CN1232067C (en) Data encryption transmission and exchange method in self-cycle balance state and soft-closed management system
CN115134073B (en) A software tamper-proof encryption method for electric bicycles
JPH1094058A (en) Device consisting of protection system for identification number and protecting method for identification number

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant