CN101739736B - Vehicle which can be monitored remotely - Google Patents

Vehicle which can be monitored remotely Download PDF

Info

Publication number
CN101739736B
CN101739736B CN 200910241830 CN200910241830A CN101739736B CN 101739736 B CN101739736 B CN 101739736B CN 200910241830 CN200910241830 CN 200910241830 CN 200910241830 A CN200910241830 A CN 200910241830A CN 101739736 B CN101739736 B CN 101739736B
Authority
CN
China
Prior art keywords
wireless monitor
monitor controller
controller
encrypted
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 200910241830
Other languages
Chinese (zh)
Other versions
CN101739736A (en
Inventor
王景鹏
李昱
于铭汉
杜晓佳
李峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beiqi Foton Motor Co Ltd
Original Assignee
Beiqi Foton Motor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beiqi Foton Motor Co Ltd filed Critical Beiqi Foton Motor Co Ltd
Priority to CN 200910241830 priority Critical patent/CN101739736B/en
Publication of CN101739736A publication Critical patent/CN101739736A/en
Application granted granted Critical
Publication of CN101739736B publication Critical patent/CN101739736B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a vehicle which can be monitored remotely, comprising a wireless monitoring controller (100) and an engine controller (200). The wireless monitoring controller (100) can be connected with a remote service center (300), and the remote service center (300) can change the wireless monitoring controller (100) authorization state so that the unauthorized wireless monitoring controller (100) can not be verified by the engine controller (200); the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying that whether the wireless monitoring controller (100) is authorized by the remote service center (300) before an engine is started; and the engine is allowed to be started after the wireless monitoring controller (100) is verified. The wireless monitoring controller can be verified by the engine controller, and the engine is not allowed to be started before the wireless monitoring controller is verified, therefore, theforcible dismounting of the wireless monitoring controller by the consumer can be prevented effectively.

Description

A kind of vehicle that can remote monitoring
Technical field
The present invention relates to the vehicle remote monitoring field, and relate in particular to a kind of vehicle that can remote monitoring.
Background technology
Along with the development of automotive engineering and the raising of living standards of the people, the people who buys automobile is more and more, and Payment Methods are also more and more flexible, to satisfy the consumer demand with different purchasing power.A kind of Payment Methods of wherein sampling are monthly payment plan; for the vehicle that adopts buy in instalments; seller can be installed a wireless monitor controller at vehicle usually; this wireless monitor controller can carry out telecommunication with the remote service center of seller; so that seller can not paid in the situation of account receivable under forward contracts the consumer on time; vehicle is controlled, thereby forced consumer's payment.
For preventing that some consumer from removing the wireless monitor controller, escape the monitoring of seller, the wireless monitor controller need to possess anti-dismounting function, yet realizes that at present this function all just by some locking instruments, can't prevent that like this consumer from adopting violent means to remove.
Summary of the invention
Can be removed by consumer's violence and cause seller to lose the defective of monitoring for overcoming wireless monitor controller in the prior art, spy of the present invention provides a kind of vehicle that can remote monitoring, and this vehicle can prevent effectively that the wireless monitor controller is removed.
Vehicle that can remote monitoring provided by the invention comprises wireless monitor controller and engine controller, described wireless monitor controller can with the remote service center wireless connections, this remote service center can change the licensing status of described wireless monitor controller, so that this wireless monitor controller can't be by the checking of described engine controller in uncommitted situation; Described engine controller links to each other with described wireless monitor controller, is used for whether verifying first described wireless monitor controller through the remote service center mandate before starting engine, and just allows starting engine in the situation that checking is passed through.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller checking wireless monitor controller, and be not verified in the situation about passing through at the wireless monitor controller and stop engine start, thereby prevent that effectively the consumer from removing the wireless monitor controller by force.
Description of drawings
Fig. 1 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center;
Fig. 2 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center; And
Fig. 3 is the process flow diagram of the ciphering process of vehicle that can remote monitoring provided by the invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing.
As shown in Figure 1, the invention provides a kind of vehicle 400 that can remote monitoring, this vehicle 400 comprises: wireless monitor controller 100 and engine controller 200, described wireless monitor controller 100 can with remote service center 300 wireless connections, this remote service center 300 can change the licensing status of described wireless monitor controller 100, so that this wireless monitor controller 100 can't be by the checking of described engine controller 200 in uncommitted situation; Described engine controller 200 (for example links to each other with described wireless monitor controller 100, by the CAN bus), whether authorize through remote service center 300, and in the situation that checking is passed through, just allow starting engine for before starting engine, verifying first described wireless monitor controller 100.
Wherein, described remote service center 300 can be the consumer in the situation of timely payment account receivable under forward contracts, change the state of described wireless monitor controller 100, for example, shield the cryptographic algorithm of communicating by letter, change this wireless monitor controller 100 between this wireless monitor controller 100 and the engine controller 200, encryption key etc., so that this wireless monitor controller 100 can't be by the checking of engine controller 200, thereby the prevention engine start forces the consumer to pay seller with account receivable under forward contracts.
Preferably, as shown in Figure 2, described wireless monitor controller 100 can comprise GPS module 110.Wireless monitor controller 100 can be in response to the request of described remote service center 300, obtain vehicle position information by GPS module 110, and this information is sent to described remote service center 300, so that the current location of vehicle is in time known by dealer, and can at consumer's this vehicle of interception in the situation of timely payment account receivable under forward contracts not, force the consumer to pay account receivable under forward contracts.
Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilize encryption key and the cryptographic algorithm of storing in the described wireless monitor controller 100 that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and utilize encryption key and the cryptographic algorithm of storing in this engine controller 200 that the random number that receives is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that receives are compared, whether authorize through remote service center 300 to verify described wireless monitor controller 100, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can change by changing described cryptographic algorithm or encryption key the licensing status of wireless monitor controller 100.
At this, described cryptographic algorithm can adopt the various cryptographic algorithm such as DES, 3DES or IDEA.Preferably, described wireless monitor controller 100 and described engine controller 200 utilize encryption key and cryptographic algorithm that described random number is encrypted to comprise: step 1): described random number is divided into a plurality of parts; Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys; Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted; Step 4): utilize next group sub-key that upper one group of sub-key is encrypted result afterwards and be encrypted; And step 5): repeating step 4), encrypt result afterwards until obtain last group key, this result is encrypted ones.
Wherein, described random number can generate according to vehicle position information, also can be generated by other Generating Random Numbers.Described encryption key and cryptographic algorithm all (for example, can be cured by vehicle manufacturers) in described wireless monitor controller 100 and engine controller 200.
For symmetric encipherment algorithm, encryption key and the cryptographic algorithm of storing in encryption key and the cryptographic algorithm of storage and the described engine controller 200 in the described wireless monitor controller 100 are identical.
For rivest, shamir, adelman, described wireless monitor controller and engine controller 200 can be stored respectively private key and PKI.Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilizes private key that this random number is encrypted, and obtains encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and to utilizing PKI that the encrypted ones that receives is decrypted, obtain another random number, and this another random number and the random number that receives compared, whether authorize through remote service center 300 to verify described wireless monitor controller 100, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can change by changing described private key the licensing status of wireless monitor controller 100.
Describe ciphering process of the present invention in detail below with reference to accompanying drawing 3.
Whole ciphering process comprises three parts: random number generative process, encryption key generative process and ciphering process.The below is introduced one by one to these three ones.
The random number generative process
The longitude information that GPS module 110 sends and latitude information are that the form with 16 of double words sends, most-significant byte degree of being and minute integer-bit, the radix point position that least-significant byte is minute and second information.At this, as s1, the least-significant byte of latitude information is as s2 with the least-significant byte of longitude information.Suppose that the source random number is S, then can obtain 16 potential source random number: S=s1s2;
Afterwards, source random number S is divided into eight groups of 2 every group, i.e. x1, x2, x3, x4, x5, x6, x7, x8, and these 8 groups of numbers are carried out linear congruence process:
Xn=(1025xn+1)mod(2^15)
84 16 systems that obtain are counted Xn, these 84 16 systems are counted Xn carry out following arrangement (wherein, n=1~8):
{X1X2X3X4X5X6X7X8?X5X2X7X1X8X4X3X6}
Obtain thus one 64 random number.
The encryption key generative process
With 6 decimal system car load passwords, (this car load password is provided by depot, for example can be the VIN code of each car of unique identification) is designated as a.With this six figure places decimal system password square, get a^2, its scope was 9 16 system numbers when a^2 was converted to 16 systems and counts, the scope of 16 system numbers after this conversion is as follows:
(100000)^2=2540B?E400<=a^2<=(999999)^2=E?8DB6?8B81
Get a^2 low eight of 16 systems, both obtained one 32 basic key, with this basic key be divided into eight groups (that is, and c1c2c3c4c5c6c7c8), 4 every group.These eight groups of numbers are carried out computing according to the following rules:
b1=(1025c1+1)mod(2^15)
b2=(1025c2+1)mod(2^15)
b3=(1025c3+1)mod(2^15)
b4=(1025c4+1)mod(2^15)
b5=(1025c5+1)mod(2^15)
b6=(1025c6+1)mod(2^15)
b7=(1025c7+1)mod(2^15)
b8=(1025c8+1)mod(2^15)
Wherein, bn is 4 16 system numbers, is total to 16bit, n=1~8.
If encryption key is B, B=b1b2b3b4b5b6b7b8 can get the encryption key of 128bit thus.
Ciphering process
Whole encryption comprises that 9 take turns iteration, and wherein every wheel of 1-8 wheel used 6 sub-keys, and the 9th takes turns 4 sub-keys of use, altogether needs to use 52 sub-keys.Ciphering process comprises: sub-key generates step, random number partiting step and encrypting step.
(1) Sub-key generates step
The 128 bit encryption key lists that generate in the above-mentioned encryption key generative process are shown k, and k=k1k2...k128 is divided into 8 sub-keys, and 16 of each sub-keys are followed successively by:
Z 1 (1)=k1k2...k16
Z 2 (1)=k17k18...k32
Z 5 (1)=k65k66...k80
Z 6 (1)=k81k82...k96
Z 1 (2)=k97k98...k112
Z 2 (2)=k113k114...k128
Wherein, Z i (n)Represent i sub-key in the n wheel iteration, i=1~6, n=1~9.Z 1 (1)~Z 6 (1)As 6 sub-keys of the first round, remaining Z 1 (2), Z 2 (2)As the second sub-key of taking turns.
Afterwards, with k 25 of rotation displacements left:
k′=k26k27...k128k1k2...k25
Be divided into equally 8 sub-keys, front 4 Z 3 (2), Z 4 (2), Z 5 (2), Z 6 (2)Just in time divide formed Z with the last time 1 (2), Z 2 (2)Consist of together the second sub-key of taking turns, rear 4 sub-keys as third round.
Continue afterwards left 25 of rotation displacements, generate remaining sub-key, until 52 sub-keys generate complete.
(2) The random number partiting step
64 random numbers that generate in the above-mentioned random number generative process are divided into four groups, 16 every group.
If D is 64 random numbers receiving, then:
D 1=d1d2d3d4d5d6d7d8d9d10d11d12d13d14d15d16
D 2=d17d18d19d20d21d22d23d24d25d26d27d28d29d30d31d32
D 3=d33d34d35d36d37d38d39d40d41d42d43d44d45d46d47d48
D 4=d49d50d51d52d53d54d55d56d57d58d59d60d61d62d63d64
This sub-block D of four 16 1, D 2, D 3, D 4Input as the iteration first round.
(3) Encrypting step
Fig. 3 shows the detailed process of whole encrypting step, wherein,
Represent and make by turn XOR between the 16bit sub-block;
The integer that ⊙ represents 16bit is done the multiplying of mod (2^16+1);
Figure G2009102418302D00072
The integer that represents 16bit is done the additive operation of mod (2^16);
Figure G2009102418302D00073
Represent the operation result of each corresponding step;
1. represent D 1With the first round the 1st sub-key Z 1 (1)Make the result of multiplying;
2. represent D 2With the first round the 2nd sub-key Z 2 (1)Make the result of additive operation;
3. represent D 3With the first round the 3rd sub-key Z 3 (1)Make the result of additive operation;
4. represent D 4With the first round the 4th sub-key Z 4 (1)Make the result of multiplying;
5. 1. and 3. representative makes the result of XOR;
6. 2. and 4. representative makes the result of XOR;
7. the representative 5. with the first round the 5th sub-key Z 5 (1)Make the result of multiplying;
8. 6. and 7. representative makes the result of additive operation;
9. the representative 8. with the first round the 6th sub-key Z 6 (1)Make the result of multiplying;
10. 7. and 9. representative makes the result of additive operation;
1. and 9. representative makes the result of multiplying;
Figure G2009102418302D00082
3. and 9. representative makes the result of XOR;
Figure G2009102418302D00083
2. and 10. representative makes the result of XOR;
Figure G2009102418302D00084
4. and 10. representative makes the result of XOR.
Wherein,
Figure G2009102418302D00085
Input as next round repeats said process.Except last takes turns (the 9th takes turns), from last round of when transitting to next round, the 2nd and the 3rd mutually exchange.
The 8th take turns end after, suppose that Output rusults is
Figure G2009102418302D00086
Then last Output rusults of taking turns is as follows:
Figure G2009102418302D00087
With the 9th take turns the 1st subkey block Z 1 (9)Make the result of multiplying;
Figure G2009102418302D00088
With the 9th take turns the 2nd subkey block Z 2 (9)Make the result of additive operation;
Figure G2009102418302D00089
With the 9th take turns the 3rd subkey block Z 3 (9)Make the result of additive operation; And
Figure G2009102418302D000810
With the 9th take turns the 4th subkey block Z 4 (9)Make the result of multiplying.
This result can (not need at this moment exchange) in order and is combined into encrypted ones between the 2nd and the 3rd.
More than described ciphering process provided by the present invention, yet the present invention is not limited to this, also can uses other random digit generation method, encryption key generation method and cryptographic algorithm.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller 200 checking wireless monitor controllers 100, and be not verified in the situation about passing through at wireless monitor controller 100 and stop engine start, thereby prevent that effectively the consumer from removing wireless monitor controller 100 by force.And seller can be the consumer in the situation of timely payment account receivable under forward contracts, the vehicle position information interception car that stops engine start or can receive according to remote service center 300, thus force the consumer to pay account receivable under forward contracts.

Claims (5)

  1. One kind can remote monitoring vehicle, this vehicle comprises wireless monitor controller (100) and engine controller (200),
    Described wireless monitor controller (100) can with remote service center (300) wireless connections, this remote service center (300) can change the licensing status of described wireless monitor controller (100), so that this wireless monitor controller (100) can't be by the checking of described engine controller (200) in uncommitted situation;
    Described engine controller (200) links to each other with described wireless monitor controller (100), be used for verifying first before starting engine whether described wireless monitor controller (100) authorizes through remote service center (300), and in the situation that checking is passed through, just allow starting engine
    Wherein,
    Described wireless monitor controller (100) generates random number, utilize encryption key and the cryptographic algorithm of storing in the described wireless monitor controller (100) that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller (200); And
    Described engine controller (200) receives described random number and encrypted ones, and utilize encryption key and the cryptographic algorithm of storing in the described engine controller (200) that the random number that receives is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that receives are compared, if both are identical, show that then described wireless monitor controller (100) authorizes through remote service center (300), otherwise show that described wireless monitor controller (100) authorizes without remote service center (300).
  2. 2. vehicle according to claim 1, wherein, described wireless monitor controller (100) comprises GPS module (110), described wireless monitor controller (100) is in response to the request of described remote service center (300), obtain vehicle position information by described GPS module (110), and this vehicle position information is sent to described remote service center (300).
  3. 3. vehicle according to claim 1, wherein, the licensing status of described remote service center (300) the described wireless monitor controller of change (100) comprising: change cryptographic algorithm or the encryption key stored in the described wireless monitor controller (100).
  4. 4. vehicle according to claim 1, wherein, described wireless monitor controller (100) or described engine controller (200) utilize encryption key and cryptographic algorithm that random number is encrypted to comprise:
    Step 1): described random number is divided into a plurality of parts;
    Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys;
    Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted;
    Step 4): utilize next group sub-key that upper one group of sub-key is encrypted result afterwards and be encrypted; And
    Step 5): repeating step 4), encrypt result afterwards until obtain last group key, this result is encrypted ones.
  5. 5. each described vehicle according to claim 1-4, wherein, described random number generates according to vehicle position information.
CN 200910241830 2009-12-09 2009-12-09 Vehicle which can be monitored remotely Active CN101739736B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910241830 CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910241830 CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Publications (2)

Publication Number Publication Date
CN101739736A CN101739736A (en) 2010-06-16
CN101739736B true CN101739736B (en) 2013-10-16

Family

ID=42463182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910241830 Active CN101739736B (en) 2009-12-09 2009-12-09 Vehicle which can be monitored remotely

Country Status (1)

Country Link
CN (1) CN101739736B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637312B (en) * 2012-03-29 2015-03-11 中联重科股份有限公司 Unlocking treatment method, device and system for engineering machine
CN103465866A (en) * 2013-09-25 2013-12-25 北京汽车股份有限公司 Vehicle starting control method, vehicle starting control device and vehicle
CN103625427A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile door opening and closing automatic control method and system based on satellite locating technology
CN103625426A (en) * 2013-11-29 2014-03-12 东风小康汽车有限公司重庆分公司 Automobile start control system and method based on locating technology
CN105357181B (en) * 2015-09-29 2018-06-12 广东顺德中山大学卡内基梅隆大学国际联合研究院 A kind of method of multiple terminals monitoring Wi-Fi labels
CN105245406A (en) * 2015-11-02 2016-01-13 厦门雅迅网络股份有限公司 Method for preventing in-car terminal from being detached
CN105721149B (en) * 2016-04-25 2019-02-26 北汽福田汽车股份有限公司 A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding
CN106707817B (en) * 2016-12-30 2019-09-27 上海华兴数字科技有限公司 A kind of Dynamic Matching tamper method and excavator
CN109215164A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
CN111970317B (en) * 2020-04-28 2023-08-15 浙江吉利汽车研究院有限公司 Remote control method, storage medium and remote control system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6025774A (en) * 1998-06-24 2000-02-15 Forbes; Mark P. Method for retrieving vehicular collateral
US6195648B1 (en) * 1999-08-10 2001-02-27 Frank Simon Loan repay enforcement system
US20050162016A1 (en) * 2003-10-15 2005-07-28 Payment Protection Systems, Inc. Vehicle disablement system user interface
CN1830707A (en) * 2005-03-07 2006-09-13 本田技研工业株式会社 Theft prevention system for motor vehicles
CN1919666A (en) * 2005-08-26 2007-02-28 刘立平 Money-supply prompting method and system for automobile

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6025774A (en) * 1998-06-24 2000-02-15 Forbes; Mark P. Method for retrieving vehicular collateral
US6195648B1 (en) * 1999-08-10 2001-02-27 Frank Simon Loan repay enforcement system
US20050162016A1 (en) * 2003-10-15 2005-07-28 Payment Protection Systems, Inc. Vehicle disablement system user interface
CN1830707A (en) * 2005-03-07 2006-09-13 本田技研工业株式会社 Theft prevention system for motor vehicles
CN1919666A (en) * 2005-08-26 2007-02-28 刘立平 Money-supply prompting method and system for automobile

Also Published As

Publication number Publication date
CN101739736A (en) 2010-06-16

Similar Documents

Publication Publication Date Title
CN101739736B (en) Vehicle which can be monitored remotely
CN102546155B (en) On-demand safe key generates method and system
US6683956B1 (en) Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus
CN100468438C (en) Encryption and decryption method for realizing hardware and software binding
CN101149768B (en) Special processor software encryption and decryption method
US8484475B2 (en) Data transmission method, and tachograph system
WO2013179392A1 (en) Authentication system and authentication method
CN102725737A (en) V erifiable, leak-resistant encryption and decryption
CN104583028B (en) One-way key fob and vehicle pairing
US20140016781A1 (en) Motor vehicle control unit having a cryptographic device
CN101213814A (en) Secure patch system
CN103490901A (en) Secret key generating and releasing method based on combined secrete key system
CN101925867B (en) Field device and method of operation thereof
CN109728899B (en) Pure electric vehicle authentication key safety management method and system
CN109617675A (en) Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal
CN113098675B (en) Binary data encryption system and method based on polynomial complete homomorphism
CN100353704C (en) Asymmetrical cryptographic communication method and portable object therefor
CN1427575A (en) Electronic cipher formation and checking method
CN101179375B (en) Chaos algorithm based network data encryption card
CN1685725A (en) Multiple matching control method
CN107733634A (en) A kind of lightweight chaos authentication encryption method based on displacement coupling
US20040096059A1 (en) Encryption apparatus with parallel Data Encryption Standard (DES) structure
CN101883096A (en) Method, device and system for safely transferring data between electronic signature tools
CN104463267A (en) RFID comprehensive encryption method for electric vehicle charging station
JP4556252B2 (en) IC card, in-vehicle device and roadside device used for encryption conversion device, decryption conversion device, encryption communication device and automatic fee collection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant