CN101739736B - Vehicle which can be monitored remotely - Google Patents
Vehicle which can be monitored remotely Download PDFInfo
- Publication number
- CN101739736B CN101739736B CN 200910241830 CN200910241830A CN101739736B CN 101739736 B CN101739736 B CN 101739736B CN 200910241830 CN200910241830 CN 200910241830 CN 200910241830 A CN200910241830 A CN 200910241830A CN 101739736 B CN101739736 B CN 101739736B
- Authority
- CN
- China
- Prior art keywords
- wireless monitoring
- controller
- monitoring controller
- random number
- service center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Lock And Its Accessories (AREA)
- Selective Calling Equipment (AREA)
Abstract
The invention provides a vehicle which can be monitored remotely, comprising a wireless monitoring controller (100) and an engine controller (200). The wireless monitoring controller (100) can be connected with a remote service center (300), and the remote service center (300) can change the wireless monitoring controller (100) authorization state so that the unauthorized wireless monitoring controller (100) can not be verified by the engine controller (200); the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying that whether the wireless monitoring controller (100) is authorized by the remote service center (300) before an engine is started; and the engine is allowed to be started after the wireless monitoring controller (100) is verified. The wireless monitoring controller can be verified by the engine controller, and the engine is not allowed to be started before the wireless monitoring controller is verified, therefore, theforcible dismounting of the wireless monitoring controller by the consumer can be prevented effectively.
Description
Technical Field
The present invention relates to the field of vehicle remote monitoring, and more particularly to a vehicle capable of remote monitoring.
Background
With the development of automobile technology and the improvement of the living standard of people, more and more people buy automobiles and more flexible payment modes are provided, so as to meet the requirements of consumers with different purchasing abilities. One of the sampled payment methods is installment payment, and for the vehicle purchased by installment payment method, the seller usually installs a wireless monitoring controller on the vehicle, and the wireless monitoring controller can communicate with the seller's remote service center in a remote manner, so that the seller can control the vehicle under the condition that the consumer does not pay due money on time, thereby forcing the consumer to pay.
In order to prevent some consumers from detaching the wireless monitoring controller and evade the monitoring of sellers, the wireless monitoring controller needs to have a detachment prevention function, but the wireless monitoring controller only needs to be locked by some locking tools at present, so that the consumers cannot be prevented from detaching by adopting a violent means.
Disclosure of Invention
In order to overcome the defect that a seller loses monitoring due to the fact that the wireless monitoring controller can be violently removed by a consumer in the prior art, the invention particularly provides a vehicle capable of being remotely monitored, and the vehicle can effectively prevent the wireless monitoring controller from being removed.
The vehicle capable of being remotely monitored comprises a wireless monitoring controller and an engine controller, wherein the wireless monitoring controller can be wirelessly connected with a remote service center, and the remote service center can change the authorization state of the wireless monitoring controller, so that the wireless monitoring controller cannot pass the verification of the engine controller under the condition of unauthorized; the engine controller is connected with the wireless monitoring controller and used for verifying whether the wireless monitoring controller is authorized by a remote service center before starting the engine and allowing the engine to be started under the condition that the verification is passed.
When the vehicle capable of being remotely monitored can be started, the engine controller verifies the wireless monitoring controller, and the engine is prevented from being started under the condition that the wireless monitoring controller is not verified, so that a consumer is effectively prevented from forcibly detaching the wireless monitoring controller.
Drawings
FIG. 1 is a schematic diagram of the connection relationship between a vehicle capable of being remotely monitored and a remote service center provided by the present invention;
FIG. 2 is a schematic diagram of the connection relationship between a vehicle capable of being remotely monitored and a remote service center provided by the present invention; and
fig. 3 is a flow chart of the encryption process for a vehicle capable of remote monitoring provided by the present invention.
Detailed Description
The present invention is described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the present invention provides a vehicle 400 capable of remote monitoring, the vehicle 400 including: a wireless monitoring controller 100 and an engine controller 200, wherein the wireless monitoring controller 100 can be wirelessly connected with a remote service center 300, and the remote service center 300 can change the authorization state of the wireless monitoring controller 100, so that the wireless monitoring controller 100 cannot pass the verification of the engine controller 200 if not authorized; the engine controller 200 is connected to the wireless monitoring controller 100 (e.g., via a CAN bus) to verify whether the wireless monitoring controller 100 is authorized by the remote service center 300 before starting the engine, and to allow the engine to be started if the verification is passed.
In the case where the customer does not pay the due money in time, the remote service center 300 may change the state of the wireless monitoring controller 100, for example, block communication between the wireless monitoring controller 100 and the engine controller 200, change an encryption algorithm, an encryption key, etc. of the wireless monitoring controller 100, so that the wireless monitoring controller 100 cannot pass authentication of the engine controller 200, thereby preventing the engine from starting and forcing the customer to pay the due money to the seller.
Preferably, as shown in fig. 2, the wireless monitoring controller 100 may include a GPS module 110. The wireless monitoring controller 100 may acquire vehicle location information through the GPS module 110 in response to a request of the remote service center 300 and transmit the information to the remote service center 300 so that a dealer can know the current location of the vehicle in time and can intercept the vehicle in case that the customer does not pay the due money in time, forcing the customer to pay the due money.
The verification process comprises: the wireless monitoring controller 100 generates a random number, encrypts the random number by using an encryption key and an encryption algorithm stored in the wireless monitoring controller 100 to obtain an encrypted password, and sends the random number and the encrypted password to the engine controller 200; and the engine controller 200 receives the random number and the encrypted password, encrypts the received random number by using an encryption key and an encryption algorithm stored in the engine controller 200 to obtain another encrypted password, compares the other encrypted password with the received encrypted password to verify whether the wireless monitoring controller 100 is authorized by the remote service center 300, if the two are the same, it indicates that the wireless monitoring controller 100 is authorized by the remote service center 300, otherwise, it indicates that the wireless monitoring controller 100 is not authorized by the remote service center 300. At this time, the remote service center 300 may change the authorization status of the wireless monitoring controller 100 by changing the encryption algorithm or encryption key.
Here, the encryption algorithm may employ various encryption algorithms such as DES, 3DES, or IDEA. Preferably, the encrypting the random number by the wireless supervisory controller 100 and the engine controller 200 using an encryption key and an encryption algorithm includes: step 1): dividing the random number into a plurality of portions; step 2): generating a plurality of groups of sub-keys according to the encryption key, wherein each group of sub-keys comprises a plurality of sub-keys; step 3): encrypting portions of the random number using a first set of subkeys; step 4): encrypting the result after the previous group of sub-keys is encrypted by using the next group of sub-keys; and step 5): and repeating the step 4) until a result after the last group of keys is encrypted is obtained, wherein the result is the encrypted password.
The random number may be generated according to the vehicle position information, or may be generated by other random number generation algorithms. The encryption key and encryption algorithm are both in the wireless supervisory controller 100 and engine controller 200 (e.g., may be solidified by the vehicle manufacturer).
For a symmetric encryption algorithm, the encryption key and encryption algorithm stored in the wireless supervisory controller 100 are the same as the encryption key and encryption algorithm stored in the engine controller 200.
For asymmetric encryption algorithms, the wireless supervisory controller and engine controller 200 may store a private key and a public key, respectively. The verification process comprises: the wireless monitoring controller 100 generates a random number, encrypts the random number by using a private key to obtain an encrypted password, and sends the random number and the encrypted password to the engine controller 200; and the engine controller 200 receives the random number and the encrypted password, decrypts the received encrypted password with the public key to obtain another random number, and compares the another random number with the received random number to verify whether the wireless monitoring controller 100 is authorized by the remote service center 300, if the two are the same, it indicates that the wireless monitoring controller 100 is authorized by the remote service center 300, otherwise, it indicates that the wireless monitoring controller 100 is not authorized by the remote service center 300. At this time, the remote service center 300 may change the authorization status of the wireless monitoring controller 100 by changing the private key.
The encryption process of the present invention is described in detail below with reference to fig. 3.
The whole encryption process comprises three parts: a random number generation process, an encryption key generation process, and an encryption process. The three parts will be described one by one.
Random number generation process
The longitude information and the latitude information transmitted by the GPS module 110 are transmitted in a 16-bit double-word format, with the upper 8 bits being integer bits of degree and minutes and the lower 8 bits being decimal points of minutes and second information. Here, the lower 8 bits of the longitude information are s1, and the lower 8 bits of the latitude information are s 2. Assuming that the source random number is S, a 16-bit source random number is obtained: S1S 2;
thereafter, the source random number S is divided into eight groups of 2 bits each, i.e., x1, x2, x3, x4, x5, x6, x7, x8, and the 8 groups of numbers are subjected to linear congruence processing:
Xn=(1025xn+1)mod(2^15)
arranging the obtained 8 4-bit 16-ary numbers Xn as follows (wherein n is 1-8):
{X1X2X3X4X5X6X7X8 X5X2X7X1X8X4X3X6}
thereby obtaining a 64-bit random number.
Encryption key generation process
A is recorded as a 6 digit decimal vehicle password (the vehicle password is given by the vehicle manufacturer, such as a VIN code that can uniquely identify each vehicle). Squaring the six-bit decimal password to obtain a 2, wherein the range of the a 2 converted into the 16-bit 16-ary number is 9 bits, and the range of the converted 16-ary number is as follows:
(100000)^2=2540B E400<=a^2<=(999999)^2=E 8DB6 8B81
taking the lower eight bits of a 2 in 16 th order, we get a 32-bit basic key, which is divided into eight groups (i.e., c1c2c3c4c5c6c7c8), each group having 4 bits. The eight groups of numbers are calculated according to the following rules:
b1=(1025c1+1)mod(2^15)
b2=(1025c2+1)mod(2^15)
b3=(1025c3+1)mod(2^15)
b4=(1025c4+1)mod(2^15)
b5=(1025c5+1)mod(2^15)
b6=(1025c6+1)mod(2^15)
b7=(1025c7+1)mod(2^15)
b8=(1025c8+1)mod(2^15)
wherein bn is a 4-bit 16-ary number with 16 bits, and n is 1-8.
Assuming that the encryption key is B, B is B1B2B3B4B5B6B7B8, thereby obtaining a 128-bit encryption key.
Encryption process
The whole encryption comprises 9 rounds of iteration, wherein 6 sub-keys are used in each round from 1 to 8, 4 sub-keys are used in the 9 th round, and 52 sub-keys are used in total. The encryption process comprises the following steps: a sub-key generation step, a random number division step and an encryption step.
(1)Sub-key generation step
The 128-bit encryption key generated in the encryption key generation process is denoted as k, k being k1k2.. k128, and is divided into 8 sub-keys, each sub-key having 16 bits, which sequentially includes:
Z1 (1)=k1k2...k16
Z2 (1)=k17k18...k32
Z5 (1)=k65k66...k80
Z6 (1)=k81k82...k96
Z1 (2)=k97k98...k112
Z2 (2)=k113k114...k128
wherein Z isi (n)The i-th sub-key in the nth iteration is represented, i is 1-6, and n is 1-9. Z1 (1)~Z6 (1)As 6 subkeys for the first round, the remaining Z1 (2)、Z2 (2)As a sub-key for the second round.
Then, rotate k left by 25 bits:
k′=k26k27...k128k1k2...k25
it is also divided into 8 subkeys, the first 4Z3 (2)、Z4 (2)、Z5 (2)、Z6 (2)Exactly with Z formed by the last division1 (2)、Z2 (2)Together forming the sub-keys of the second round, the last 4 as sub-keys of the third round.
And then, the left rotation and the shift are continued by 25 bits, and the rest sub-keys are generated until the generation of 52 sub-keys is finished.
(2)Step of dividing random number
The 64-bit random numbers generated in the random number generation process described above are divided into four groups of 16 bits each.
Assuming D is the received 64-bit random number, then:
D1=d1d2d3d4d5d6d7d8d9d10d11d12d13d14d15d16
D2=d17d18d19d20d21d22d23d24d25d26d27d28d29d30d31d32
D3=d33d34d35d36d37d38d39d40d41d42d43d44d45d46d47d48
D4=d49d50d51d52d53d54d55d56d57d58d59d60d61d62d63d64
these four 16-bit subblocks D1、D2、D3、D4As the iterative first round input.
(3)Step of encryption
Fig. 3 shows a specific procedure of the entire encryption step, in which,
representing bit-by-bit difference between 16-bit subblocksOr operation;
as a multiplication operation of mod (2^16+1) by an integer representing 16 bit;
(ii) represents D1And a first round of 1 st subkey Z1 (1)Making the result of the multiplication operation;
② represents D2And a first round of a 2 nd subkey Z2 (1)Making the result of the addition operation;
③ represents D3And a first round of 3 rd subkey Z3 (1)Making the result of the addition operation;
fourthly represents D4And the first round 4 th subkey Z4 (1)Making the result of the multiplication operation;
representing the result of XOR operation of the first and the third;
sixthly, representing the result of XOR operation of the two and the four;
and the key Z represents the key Z of the 5 th sub-key of the first round5 (1)Making the result of the multiplication operation;
the eighths represent the results of addition;
ninthly represents the first round 6 th sub-key Z6 (1)Making the result of the multiplication operation;
r represents the result of addition of C and N;
representing the result of multiplication operation of (1) and (ninthly);
Wherein,the above process is repeatedly performed as an input for the next round. Except for the last round (9 th round), the 2 nd and 3 rd blocks are interchanged when transitioning from the previous round to the next round.
The results can be combined into an encrypted password in order (no interchange is required between block 2 and block 3 at this point).
The encryption process provided by the present invention has been described above, but the present invention is not limited thereto, and other random number generation methods, encryption key generation methods, and encryption algorithms may also be used.
When the vehicle capable of remote monitoring provided by the invention can be started, the engine controller 200 verifies the wireless monitoring controller 100, and the engine is prevented from being started under the condition that the wireless monitoring controller 100 is not verified, so that a consumer is effectively prevented from forcibly removing the wireless monitoring controller 100. Also, the seller may prevent the engine from being started in case the customer does not pay the due money in time, or may intercept the vehicle according to the vehicle location information received by the remote service center 300, thereby forcing the customer to pay the due money.
Claims (5)
1. A vehicle capable of remote monitoring, the vehicle comprising a wireless monitoring controller (100) and an engine controller (200),
the wireless monitoring controller (100) can be wirelessly connected with a remote service center (300), and the remote service center (300) can change the authorization state of the wireless monitoring controller (100) so that the wireless monitoring controller (100) cannot pass the verification of the engine controller (200) in the unauthorized condition;
the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying whether the wireless monitoring controller (100) is authorized by a remote service center (300) before starting the engine and allowing the engine to be started only if the verification is passed,
wherein,
the wireless monitoring controller (100) generates a random number, encrypts the random number by using an encryption key and an encryption algorithm stored in the wireless monitoring controller (100) to obtain an encrypted password, and sends the random number and the encrypted password to the engine controller (200); and
the engine controller (200) receives the random number and the encrypted password, encrypts the received random number using an encryption key and an encryption algorithm stored in the engine controller (200) to obtain another encrypted password, compares the other encrypted password with the received encrypted password, and indicates that the wireless monitoring controller (100) is authorized by the remote service center (300) if the two are the same, or indicates that the wireless monitoring controller (100) is unauthorized by the remote service center (300).
2. The vehicle according to claim 1, wherein the wireless monitoring controller (100) includes a GPS module (110), and the wireless monitoring controller (100) acquires vehicle position information through the GPS module (110) in response to a request of the remote service center (300), and transmits the vehicle position information to the remote service center (300).
3. The vehicle of claim 1, wherein the remote service center (300) changing the authorization status of the wireless monitoring controller (100) comprises: changing an encryption algorithm or encryption key stored in the wireless supervisory controller (100).
4. The vehicle of claim 1, wherein the wireless supervisory controller (100) or the engine controller (200) encrypting the random number with an encryption key and an encryption algorithm comprises:
step 1): dividing the random number into a plurality of portions;
step 2): generating a plurality of groups of sub-keys according to the encryption key, wherein each group of sub-keys comprises a plurality of sub-keys;
step 3): encrypting portions of the random number using a first set of subkeys;
step 4): encrypting the result after the previous group of sub-keys is encrypted by using the next group of sub-keys; and
step 5): and repeating the step 4) until a result after the last group of keys is encrypted is obtained, wherein the result is the encrypted password.
5. The vehicle according to any one of claims 1-4, wherein the random number is generated from vehicle location information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910241830 CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910241830 CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101739736A CN101739736A (en) | 2010-06-16 |
CN101739736B true CN101739736B (en) | 2013-10-16 |
Family
ID=42463182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910241830 Active CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101739736B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102637312B (en) * | 2012-03-29 | 2015-03-11 | 中联重科股份有限公司 | Method, device and system for unlocking engineering machinery |
CN103465866A (en) * | 2013-09-25 | 2013-12-25 | 北京汽车股份有限公司 | Vehicle starting control method, vehicle starting control device and vehicle |
CN103625427A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile door opening and closing automatic control method and system based on satellite locating technology |
CN103625426A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile start control system and method based on locating technology |
CN105357181B (en) * | 2015-09-29 | 2018-06-12 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | A kind of method of multiple terminals monitoring Wi-Fi labels |
CN105245406A (en) * | 2015-11-02 | 2016-01-13 | 厦门雅迅网络股份有限公司 | Method for preventing in-car terminal from being detached |
CN105721149B (en) * | 2016-04-25 | 2019-02-26 | 北汽福田汽车股份有限公司 | A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding |
CN106707817B (en) * | 2016-12-30 | 2019-09-27 | 上海华兴数字科技有限公司 | A kind of Dynamic Matching tamper method and excavator |
CN109215164A (en) | 2017-07-04 | 2019-01-15 | 百度在线网络技术(北京)有限公司 | Travelling data acquisition methods and device |
CN111970317B (en) * | 2020-04-28 | 2023-08-15 | 浙江吉利汽车研究院有限公司 | Remote control method, storage medium and remote control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6025774A (en) * | 1998-06-24 | 2000-02-15 | Forbes; Mark P. | Method for retrieving vehicular collateral |
US6195648B1 (en) * | 1999-08-10 | 2001-02-27 | Frank Simon | Loan repay enforcement system |
US20050162016A1 (en) * | 2003-10-15 | 2005-07-28 | Payment Protection Systems, Inc. | Vehicle disablement system user interface |
CN1830707A (en) * | 2005-03-07 | 2006-09-13 | 本田技研工业株式会社 | vehicle anti-theft system |
CN1919666A (en) * | 2005-08-26 | 2007-02-28 | 刘立平 | Money-supply prompting method and system for automobile |
-
2009
- 2009-12-09 CN CN 200910241830 patent/CN101739736B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6025774A (en) * | 1998-06-24 | 2000-02-15 | Forbes; Mark P. | Method for retrieving vehicular collateral |
US6195648B1 (en) * | 1999-08-10 | 2001-02-27 | Frank Simon | Loan repay enforcement system |
US20050162016A1 (en) * | 2003-10-15 | 2005-07-28 | Payment Protection Systems, Inc. | Vehicle disablement system user interface |
CN1830707A (en) * | 2005-03-07 | 2006-09-13 | 本田技研工业株式会社 | vehicle anti-theft system |
CN1919666A (en) * | 2005-08-26 | 2007-02-28 | 刘立平 | Money-supply prompting method and system for automobile |
Also Published As
Publication number | Publication date |
---|---|
CN101739736A (en) | 2010-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101739736B (en) | Vehicle which can be monitored remotely | |
JP6345157B2 (en) | In-vehicle information communication system and authentication method | |
CN101559745B (en) | Vehicle control system for preventing stealing and robbery and implementation method thereof | |
US9512659B2 (en) | Code hopping based system with increased security | |
US9143320B2 (en) | Electronic key registration system | |
US8275123B2 (en) | Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key | |
JP5257814B2 (en) | Secret key registration system and secret key registration method | |
JP6444304B2 (en) | One-way key fob and vehicle pairing | |
CN103444127A (en) | Motor vehicle control unit having a cryptographic device | |
JPH086520B2 (en) | Remote access system | |
CN110336673B (en) | A privacy protection based blockchain design method | |
MXPA02007602A (en) | Method and device for mutual authentication of two data processing units. | |
JP4465998B2 (en) | Mobile terminal and vehicle remote control system | |
CN101753308A (en) | Completeness certification method | |
JP2011512562A (en) | Random encryption and decryption method for access and communication data | |
Solomon et al. | Limon-lightweight authentication for tire pressure monitoring sensors | |
CN107154920B (en) | Encryption method and decryption method for security information and receiving device for receiving security information | |
JP4918133B2 (en) | Data storage method, client device, data storage system, and program | |
TWI573427B (en) | Code hopping based system with increase security | |
CN113783687B (en) | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code | |
JP5985845B2 (en) | Electronic key registration method | |
CN201559614U (en) | Control system for preventing vehicle from theft | |
CN1232067C (en) | Data encryption transmission and exchange method in self-cycle balance state and soft-closed management system | |
CN115134073B (en) | A software tamper-proof encryption method for electric bicycles | |
JPH1094058A (en) | Device consisting of protection system for identification number and protecting method for identification number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |