CN101739736B - Vehicle which can be monitored remotely - Google Patents
Vehicle which can be monitored remotely Download PDFInfo
- Publication number
- CN101739736B CN101739736B CN 200910241830 CN200910241830A CN101739736B CN 101739736 B CN101739736 B CN 101739736B CN 200910241830 CN200910241830 CN 200910241830 CN 200910241830 A CN200910241830 A CN 200910241830A CN 101739736 B CN101739736 B CN 101739736B
- Authority
- CN
- China
- Prior art keywords
- wireless monitor
- monitor controller
- controller
- encrypted
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention provides a vehicle which can be monitored remotely, comprising a wireless monitoring controller (100) and an engine controller (200). The wireless monitoring controller (100) can be connected with a remote service center (300), and the remote service center (300) can change the wireless monitoring controller (100) authorization state so that the unauthorized wireless monitoring controller (100) can not be verified by the engine controller (200); the engine controller (200) is connected with the wireless monitoring controller (100) and is used for verifying that whether the wireless monitoring controller (100) is authorized by the remote service center (300) before an engine is started; and the engine is allowed to be started after the wireless monitoring controller (100) is verified. The wireless monitoring controller can be verified by the engine controller, and the engine is not allowed to be started before the wireless monitoring controller is verified, therefore, theforcible dismounting of the wireless monitoring controller by the consumer can be prevented effectively.
Description
Technical field
The present invention relates to the vehicle remote monitoring field, and relate in particular to a kind of vehicle that can remote monitoring.
Background technology
Along with the development of automotive engineering and the raising of living standards of the people, the people who buys automobile is more and more, and Payment Methods are also more and more flexible, to satisfy the consumer demand with different purchasing power.A kind of Payment Methods of wherein sampling are monthly payment plan; for the vehicle that adopts buy in instalments; seller can be installed a wireless monitor controller at vehicle usually; this wireless monitor controller can carry out telecommunication with the remote service center of seller; so that seller can not paid in the situation of account receivable under forward contracts the consumer on time; vehicle is controlled, thereby forced consumer's payment.
For preventing that some consumer from removing the wireless monitor controller, escape the monitoring of seller, the wireless monitor controller need to possess anti-dismounting function, yet realizes that at present this function all just by some locking instruments, can't prevent that like this consumer from adopting violent means to remove.
Summary of the invention
Can be removed by consumer's violence and cause seller to lose the defective of monitoring for overcoming wireless monitor controller in the prior art, spy of the present invention provides a kind of vehicle that can remote monitoring, and this vehicle can prevent effectively that the wireless monitor controller is removed.
Vehicle that can remote monitoring provided by the invention comprises wireless monitor controller and engine controller, described wireless monitor controller can with the remote service center wireless connections, this remote service center can change the licensing status of described wireless monitor controller, so that this wireless monitor controller can't be by the checking of described engine controller in uncommitted situation; Described engine controller links to each other with described wireless monitor controller, is used for whether verifying first described wireless monitor controller through the remote service center mandate before starting engine, and just allows starting engine in the situation that checking is passed through.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller checking wireless monitor controller, and be not verified in the situation about passing through at the wireless monitor controller and stop engine start, thereby prevent that effectively the consumer from removing the wireless monitor controller by force.
Description of drawings
Fig. 1 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center;
Fig. 2 be provided by the invention can remote monitoring vehicle and the annexation synoptic diagram of remote service center; And
Fig. 3 is the process flow diagram of the ciphering process of vehicle that can remote monitoring provided by the invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing.
As shown in Figure 1, the invention provides a kind of vehicle 400 that can remote monitoring, this vehicle 400 comprises: wireless monitor controller 100 and engine controller 200, described wireless monitor controller 100 can with remote service center 300 wireless connections, this remote service center 300 can change the licensing status of described wireless monitor controller 100, so that this wireless monitor controller 100 can't be by the checking of described engine controller 200 in uncommitted situation; Described engine controller 200 (for example links to each other with described wireless monitor controller 100, by the CAN bus), whether authorize through remote service center 300, and in the situation that checking is passed through, just allow starting engine for before starting engine, verifying first described wireless monitor controller 100.
Wherein, described remote service center 300 can be the consumer in the situation of timely payment account receivable under forward contracts, change the state of described wireless monitor controller 100, for example, shield the cryptographic algorithm of communicating by letter, change this wireless monitor controller 100 between this wireless monitor controller 100 and the engine controller 200, encryption key etc., so that this wireless monitor controller 100 can't be by the checking of engine controller 200, thereby the prevention engine start forces the consumer to pay seller with account receivable under forward contracts.
Preferably, as shown in Figure 2, described wireless monitor controller 100 can comprise GPS module 110.Wireless monitor controller 100 can be in response to the request of described remote service center 300, obtain vehicle position information by GPS module 110, and this information is sent to described remote service center 300, so that the current location of vehicle is in time known by dealer, and can at consumer's this vehicle of interception in the situation of timely payment account receivable under forward contracts not, force the consumer to pay account receivable under forward contracts.
Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilize encryption key and the cryptographic algorithm of storing in the described wireless monitor controller 100 that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and utilize encryption key and the cryptographic algorithm of storing in this engine controller 200 that the random number that receives is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that receives are compared, whether authorize through remote service center 300 to verify described wireless monitor controller 100, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can change by changing described cryptographic algorithm or encryption key the licensing status of wireless monitor controller 100.
At this, described cryptographic algorithm can adopt the various cryptographic algorithm such as DES, 3DES or IDEA.Preferably, described wireless monitor controller 100 and described engine controller 200 utilize encryption key and cryptographic algorithm that described random number is encrypted to comprise: step 1): described random number is divided into a plurality of parts; Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys; Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted; Step 4): utilize next group sub-key that upper one group of sub-key is encrypted result afterwards and be encrypted; And step 5): repeating step 4), encrypt result afterwards until obtain last group key, this result is encrypted ones.
Wherein, described random number can generate according to vehicle position information, also can be generated by other Generating Random Numbers.Described encryption key and cryptographic algorithm all (for example, can be cured by vehicle manufacturers) in described wireless monitor controller 100 and engine controller 200.
For symmetric encipherment algorithm, encryption key and the cryptographic algorithm of storing in encryption key and the cryptographic algorithm of storage and the described engine controller 200 in the described wireless monitor controller 100 are identical.
For rivest, shamir, adelman, described wireless monitor controller and engine controller 200 can be stored respectively private key and PKI.Described proof procedure comprises: described wireless monitor controller 100 generates random number, utilizes private key that this random number is encrypted, and obtains encrypted ones, and described random number and encrypted ones are sent to engine controller 200; And described engine controller 200 receives described random number and encrypted ones, and to utilizing PKI that the encrypted ones that receives is decrypted, obtain another random number, and this another random number and the random number that receives compared, whether authorize through remote service center 300 to verify described wireless monitor controller 100, if both are identical, then show described wireless monitor controller 100 through remote service center 300 mandates, otherwise show that described wireless monitor controller 100 is without remote service center 300 mandates.At this moment, described remote service center 300 can change by changing described private key the licensing status of wireless monitor controller 100.
Describe ciphering process of the present invention in detail below with reference to accompanying drawing 3.
Whole ciphering process comprises three parts: random number generative process, encryption key generative process and ciphering process.The below is introduced one by one to these three ones.
The random number generative process
The longitude information that GPS module 110 sends and latitude information are that the form with 16 of double words sends, most-significant byte degree of being and minute integer-bit, the radix point position that least-significant byte is minute and second information.At this, as s1, the least-significant byte of latitude information is as s2 with the least-significant byte of longitude information.Suppose that the source random number is S, then can obtain 16 potential source random number: S=s1s2;
Afterwards, source random number S is divided into eight groups of 2 every group, i.e. x1, x2, x3, x4, x5, x6, x7, x8, and these 8 groups of numbers are carried out linear congruence process:
Xn=(1025xn+1)mod(2^15)
84 16 systems that obtain are counted Xn, these 84 16 systems are counted Xn carry out following arrangement (wherein, n=1~8):
{X1X2X3X4X5X6X7X8?X5X2X7X1X8X4X3X6}
Obtain thus one 64 random number.
The encryption key generative process
With 6 decimal system car load passwords, (this car load password is provided by depot, for example can be the VIN code of each car of unique identification) is designated as a.With this six figure places decimal system password square, get a^2, its scope was 9 16 system numbers when a^2 was converted to 16 systems and counts, the scope of 16 system numbers after this conversion is as follows:
(100000)^2=2540B?E400<=a^2<=(999999)^2=E?8DB6?8B81
Get a^2 low eight of 16 systems, both obtained one 32 basic key, with this basic key be divided into eight groups (that is, and c1c2c3c4c5c6c7c8), 4 every group.These eight groups of numbers are carried out computing according to the following rules:
b1=(1025c1+1)mod(2^15)
b2=(1025c2+1)mod(2^15)
b3=(1025c3+1)mod(2^15)
b4=(1025c4+1)mod(2^15)
b5=(1025c5+1)mod(2^15)
b6=(1025c6+1)mod(2^15)
b7=(1025c7+1)mod(2^15)
b8=(1025c8+1)mod(2^15)
Wherein, bn is 4 16 system numbers, is total to 16bit, n=1~8.
If encryption key is B, B=b1b2b3b4b5b6b7b8 can get the encryption key of 128bit thus.
Ciphering process
Whole encryption comprises that 9 take turns iteration, and wherein every wheel of 1-8 wheel used 6 sub-keys, and the 9th takes turns 4 sub-keys of use, altogether needs to use 52 sub-keys.Ciphering process comprises: sub-key generates step, random number partiting step and encrypting step.
(1)
Sub-key generates step
The 128 bit encryption key lists that generate in the above-mentioned encryption key generative process are shown k, and k=k1k2...k128 is divided into 8 sub-keys, and 16 of each sub-keys are followed successively by:
Z
1 (1)=k1k2...k16
Z
2 (1)=k17k18...k32
Z
5 (1)=k65k66...k80
Z
6 (1)=k81k82...k96
Z
1 (2)=k97k98...k112
Z
2 (2)=k113k114...k128
Wherein, Z
i (n)Represent i sub-key in the n wheel iteration, i=1~6, n=1~9.Z
1 (1)~Z
6 (1)As 6 sub-keys of the first round, remaining Z
1 (2), Z
2 (2)As the second sub-key of taking turns.
Afterwards, with k 25 of rotation displacements left:
k′=k26k27...k128k1k2...k25
Be divided into equally 8 sub-keys, front 4 Z
3 (2), Z
4 (2), Z
5 (2), Z
6 (2)Just in time divide formed Z with the last time
1 (2), Z
2 (2)Consist of together the second sub-key of taking turns, rear 4 sub-keys as third round.
Continue afterwards left 25 of rotation displacements, generate remaining sub-key, until 52 sub-keys generate complete.
(2)
The random number partiting step
64 random numbers that generate in the above-mentioned random number generative process are divided into four groups, 16 every group.
If D is 64 random numbers receiving, then:
D
1=d1d2d3d4d5d6d7d8d9d10d11d12d13d14d15d16
D
2=d17d18d19d20d21d22d23d24d25d26d27d28d29d30d31d32
D
3=d33d34d35d36d37d38d39d40d41d42d43d44d45d46d47d48
D
4=d49d50d51d52d53d54d55d56d57d58d59d60d61d62d63d64
This sub-block D of four 16
1, D
2, D
3, D
4Input as the iteration first round.
(3)
Encrypting step
Fig. 3 shows the detailed process of whole encrypting step, wherein,
Represent and make by turn XOR between the 16bit sub-block;
The integer that ⊙ represents 16bit is done the multiplying of mod (2^16+1);
1. represent D
1With the first round the 1st sub-key Z
1 (1)Make the result of multiplying;
2. represent D
2With the first round the 2nd sub-key Z
2 (1)Make the result of additive operation;
3. represent D
3With the first round the 3rd sub-key Z
3 (1)Make the result of additive operation;
4. represent D
4With the first round the 4th sub-key Z
4 (1)Make the result of multiplying;
5. 1. and 3. representative makes the result of XOR;
6. 2. and 4. representative makes the result of XOR;
7. the representative 5. with the first round the 5th sub-key Z
5 (1)Make the result of multiplying;
8. 6. and 7. representative makes the result of additive operation;
9. the representative 8. with the first round the 6th sub-key Z
6 (1)Make the result of multiplying;
10. 7. and 9. representative makes the result of additive operation;
1. and 9. representative makes the result of multiplying;
Wherein,
Input as next round repeats said process.Except last takes turns (the 9th takes turns), from last round of when transitting to next round, the 2nd and the 3rd mutually exchange.
The 8th take turns end after, suppose that Output rusults is
Then last Output rusults of taking turns is as follows:
This result can (not need at this moment exchange) in order and is combined into encrypted ones between the 2nd and the 3rd.
More than described ciphering process provided by the present invention, yet the present invention is not limited to this, also can uses other random digit generation method, encryption key generation method and cryptographic algorithm.
Vehicle that can remote monitoring provided by the present invention is can start the time, by engine controller 200 checking wireless monitor controllers 100, and be not verified in the situation about passing through at wireless monitor controller 100 and stop engine start, thereby prevent that effectively the consumer from removing wireless monitor controller 100 by force.And seller can be the consumer in the situation of timely payment account receivable under forward contracts, the vehicle position information interception car that stops engine start or can receive according to remote service center 300, thus force the consumer to pay account receivable under forward contracts.
Claims (5)
- One kind can remote monitoring vehicle, this vehicle comprises wireless monitor controller (100) and engine controller (200),Described wireless monitor controller (100) can with remote service center (300) wireless connections, this remote service center (300) can change the licensing status of described wireless monitor controller (100), so that this wireless monitor controller (100) can't be by the checking of described engine controller (200) in uncommitted situation;Described engine controller (200) links to each other with described wireless monitor controller (100), be used for verifying first before starting engine whether described wireless monitor controller (100) authorizes through remote service center (300), and in the situation that checking is passed through, just allow starting engineWherein,Described wireless monitor controller (100) generates random number, utilize encryption key and the cryptographic algorithm of storing in the described wireless monitor controller (100) that described random number is encrypted, obtain encrypted ones, and described random number and encrypted ones are sent to engine controller (200); AndDescribed engine controller (200) receives described random number and encrypted ones, and utilize encryption key and the cryptographic algorithm of storing in the described engine controller (200) that the random number that receives is encrypted, obtain another encrypted ones, this another encrypted ones and the encrypted ones that receives are compared, if both are identical, show that then described wireless monitor controller (100) authorizes through remote service center (300), otherwise show that described wireless monitor controller (100) authorizes without remote service center (300).
- 2. vehicle according to claim 1, wherein, described wireless monitor controller (100) comprises GPS module (110), described wireless monitor controller (100) is in response to the request of described remote service center (300), obtain vehicle position information by described GPS module (110), and this vehicle position information is sent to described remote service center (300).
- 3. vehicle according to claim 1, wherein, the licensing status of described remote service center (300) the described wireless monitor controller of change (100) comprising: change cryptographic algorithm or the encryption key stored in the described wireless monitor controller (100).
- 4. vehicle according to claim 1, wherein, described wireless monitor controller (100) or described engine controller (200) utilize encryption key and cryptographic algorithm that random number is encrypted to comprise:Step 1): described random number is divided into a plurality of parts;Step 2): generate many group sub-keys according to described encryption key, every group of sub-key comprises a plurality of sub-keys;Step 3): utilize first group of sub-key that a plurality of parts of described random number are encrypted;Step 4): utilize next group sub-key that upper one group of sub-key is encrypted result afterwards and be encrypted; AndStep 5): repeating step 4), encrypt result afterwards until obtain last group key, this result is encrypted ones.
- 5. each described vehicle according to claim 1-4, wherein, described random number generates according to vehicle position information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910241830 CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910241830 CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101739736A CN101739736A (en) | 2010-06-16 |
CN101739736B true CN101739736B (en) | 2013-10-16 |
Family
ID=42463182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910241830 Active CN101739736B (en) | 2009-12-09 | 2009-12-09 | Vehicle which can be monitored remotely |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101739736B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102637312B (en) * | 2012-03-29 | 2015-03-11 | 中联重科股份有限公司 | Unlocking treatment method, device and system for engineering machine |
CN103465866A (en) * | 2013-09-25 | 2013-12-25 | 北京汽车股份有限公司 | Vehicle starting control method, vehicle starting control device and vehicle |
CN103625427A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile door opening and closing automatic control method and system based on satellite locating technology |
CN103625426A (en) * | 2013-11-29 | 2014-03-12 | 东风小康汽车有限公司重庆分公司 | Automobile start control system and method based on locating technology |
CN105357181B (en) * | 2015-09-29 | 2018-06-12 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | A kind of method of multiple terminals monitoring Wi-Fi labels |
CN105245406A (en) * | 2015-11-02 | 2016-01-13 | 厦门雅迅网络股份有限公司 | Method for preventing in-car terminal from being detached |
CN105721149B (en) * | 2016-04-25 | 2019-02-26 | 北汽福田汽车股份有限公司 | A kind of car networking system session key generates and the method for car-mounted terminal and ECU binding |
CN106707817B (en) * | 2016-12-30 | 2019-09-27 | 上海华兴数字科技有限公司 | A kind of Dynamic Matching tamper method and excavator |
CN109215164A (en) * | 2017-07-04 | 2019-01-15 | 百度在线网络技术(北京)有限公司 | Travelling data acquisition methods and device |
CN111970317B (en) * | 2020-04-28 | 2023-08-15 | 浙江吉利汽车研究院有限公司 | Remote control method, storage medium and remote control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6025774A (en) * | 1998-06-24 | 2000-02-15 | Forbes; Mark P. | Method for retrieving vehicular collateral |
US6195648B1 (en) * | 1999-08-10 | 2001-02-27 | Frank Simon | Loan repay enforcement system |
US20050162016A1 (en) * | 2003-10-15 | 2005-07-28 | Payment Protection Systems, Inc. | Vehicle disablement system user interface |
CN1830707A (en) * | 2005-03-07 | 2006-09-13 | 本田技研工业株式会社 | Theft prevention system for motor vehicles |
CN1919666A (en) * | 2005-08-26 | 2007-02-28 | 刘立平 | Money-supply prompting method and system for automobile |
-
2009
- 2009-12-09 CN CN 200910241830 patent/CN101739736B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6025774A (en) * | 1998-06-24 | 2000-02-15 | Forbes; Mark P. | Method for retrieving vehicular collateral |
US6195648B1 (en) * | 1999-08-10 | 2001-02-27 | Frank Simon | Loan repay enforcement system |
US20050162016A1 (en) * | 2003-10-15 | 2005-07-28 | Payment Protection Systems, Inc. | Vehicle disablement system user interface |
CN1830707A (en) * | 2005-03-07 | 2006-09-13 | 本田技研工业株式会社 | Theft prevention system for motor vehicles |
CN1919666A (en) * | 2005-08-26 | 2007-02-28 | 刘立平 | Money-supply prompting method and system for automobile |
Also Published As
Publication number | Publication date |
---|---|
CN101739736A (en) | 2010-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101739736B (en) | Vehicle which can be monitored remotely | |
CN102546155B (en) | On-demand safe key generates method and system | |
US6683956B1 (en) | Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus | |
CN100468438C (en) | Encryption and decryption method for realizing hardware and software binding | |
CN101149768B (en) | Special processor software encryption and decryption method | |
US8484475B2 (en) | Data transmission method, and tachograph system | |
WO2013179392A1 (en) | Authentication system and authentication method | |
CN102725737A (en) | V erifiable, leak-resistant encryption and decryption | |
CN104583028B (en) | One-way key fob and vehicle pairing | |
US20140016781A1 (en) | Motor vehicle control unit having a cryptographic device | |
CN101213814A (en) | Secure patch system | |
CN103490901A (en) | Secret key generating and releasing method based on combined secrete key system | |
CN101925867B (en) | Field device and method of operation thereof | |
CN109728899B (en) | Pure electric vehicle authentication key safety management method and system | |
CN109617675A (en) | Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal | |
CN113098675B (en) | Binary data encryption system and method based on polynomial complete homomorphism | |
CN100353704C (en) | Asymmetrical cryptographic communication method and portable object therefor | |
CN1427575A (en) | Electronic cipher formation and checking method | |
CN101179375B (en) | Chaos algorithm based network data encryption card | |
CN1685725A (en) | Multiple matching control method | |
CN107733634A (en) | A kind of lightweight chaos authentication encryption method based on displacement coupling | |
US20040096059A1 (en) | Encryption apparatus with parallel Data Encryption Standard (DES) structure | |
CN101883096A (en) | Method, device and system for safely transferring data between electronic signature tools | |
CN104463267A (en) | RFID comprehensive encryption method for electric vehicle charging station | |
JP4556252B2 (en) | IC card, in-vehicle device and roadside device used for encryption conversion device, decryption conversion device, encryption communication device and automatic fee collection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |