CN115376226A - NFC vehicle key authentication method and device, vehicle and storage medium - Google Patents

NFC vehicle key authentication method and device, vehicle and storage medium Download PDF

Info

Publication number
CN115376226A
CN115376226A CN202211012816.7A CN202211012816A CN115376226A CN 115376226 A CN115376226 A CN 115376226A CN 202211012816 A CN202211012816 A CN 202211012816A CN 115376226 A CN115376226 A CN 115376226A
Authority
CN
China
Prior art keywords
vehicle
authentication data
packet
pairing authentication
nfc module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211012816.7A
Other languages
Chinese (zh)
Other versions
CN115376226B (en
Inventor
陈万东
陈德石
李拓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chery Automobile Co Ltd
Wuhu Lion Automotive Technologies Co Ltd
Original Assignee
Chery Automobile Co Ltd
Wuhu Lion Automotive Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chery Automobile Co Ltd, Wuhu Lion Automotive Technologies Co Ltd filed Critical Chery Automobile Co Ltd
Priority to CN202211012816.7A priority Critical patent/CN115376226B/en
Publication of CN115376226A publication Critical patent/CN115376226A/en
Application granted granted Critical
Publication of CN115376226B publication Critical patent/CN115376226B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/48Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to an NFC vehicle key authentication method, an NFC vehicle key authentication device, a vehicle and a storage medium, wherein the NFC vehicle key authentication method comprises the following steps: when a SELECT AID sent by a vehicle end NFC module is received and the SELECT AID is a target AID, judging whether a long password exists in the current mobile terminal; if the current mobile terminal does not have the long password, sending a first pairing authentication data packet to the vehicle-end NFC module, and receiving a first pairing authentication data response packet sent by the vehicle-end NFC module based on the first pairing authentication data packet; and checking the first pairing authentication data response packet, sending a second pairing authentication data packet to the vehicle end NFC module after the first pairing authentication data response packet passes the check, sending a CAN network instruction to the target vehicle after the vehicle end NFC module passes the check of the second pairing authentication data packet, and awakening the target vehicle. The problems of vehicle safety identity authentication and quick authentication are solved, the NFC mobile phone is safely paired and authenticated, and meanwhile quick authentication can be achieved.

Description

NFC vehicle key authentication method and device, vehicle and storage medium
Technical Field
The present application relates to the Field of keyless start systems, and in particular, to a method and an apparatus for NFC (Near Field Communication) vehicle key authentication, a vehicle, and a storage medium.
Background
The vehicle NFC digital key is based on an NFC near field communication technology, and a user controls a vehicle by using a mobile phone NFC function or an NFC card. The vehicle NFC digital key generally comprises main functions of locking and unlocking a vehicle by using a mobile phone NFC or an NFC card, starting and controlling the vehicle by one key and the like.
However, since both the NFC card and the mobile phone carrying the NFC protocol can be used as a terminal of the NFC car key, it is not beneficial to ensure the security of the property, and a solution is urgently needed.
Disclosure of Invention
The application provides an NFC vehicle key authentication method, an NFC vehicle key authentication device, a vehicle and a storage medium, solves the problems of vehicle safety identity authentication and rapid authentication, realizes safe pairing authentication of an NFC mobile phone, and can perform rapid authentication at the same time.
An embodiment of a first aspect of the present application provides an NFC vehicle key authentication method, including the following steps: receiving a SELECT AID (standard selection instruction) sent by a vehicle end NFC module, and judging whether a long password exists in a current mobile terminal when the SELECT AID is a target AID; if the long password does not exist in the current mobile terminal, sending a first pairing authentication data packet to the vehicle end NFC module, and receiving a first pairing authentication data response packet sent by the vehicle end NFC module based on the first pairing authentication data packet; and checking the first pairing authentication data response packet, sending a second pairing authentication data packet to the vehicle end NFC module after the first pairing authentication data response packet is checked to pass, sending a CAN network instruction to a target vehicle after the vehicle end NFC module checks the second pairing authentication data packet to pass, and awakening the target vehicle.
Optionally, after the vehicle-end NFC module verifies the second pairing authentication data packet, the method further includes: receiving a second pairing authentication data response packet generated based on the second pairing authentication data packet and sent by the vehicle-end NFC module; and verifying the second pairing authentication data response packet, acquiring a target long password from the second pairing authentication data response packet after the second pairing authentication data response packet passes the verification, and storing the target long password in the current mobile terminal.
Optionally, the NFC vehicle key authentication method further includes: if the long password exists in the current mobile terminal, constructing 11 data packets, and sending the 11 data packets to the vehicle end NFC module; receiving an 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes; and verifying the 11 data response packets, acquiring the target long password from the 11 data response packets after the 11 data response packets are verified to be passed, and storing the target long password in the current mobile terminal.
Optionally, after receiving the 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes, the method further includes: and sending the CAN network command to the target vehicle to wake up the target vehicle.
Optionally, after sending the 11 data packets to the vehicle-end NFC module, the method further includes: receiving an 11 data failure packet sent after the vehicle-end NFC module fails to verify the 11 data packet; and acquiring a failure reason from the 1 data failure packet, and constructing the first pairing authentication data packet according to the failure reason.
An embodiment of a second aspect of the present application provides an NFC vehicle key authentication device, including: the device comprises a judging module and a sending module, wherein the judging module is used for receiving a SELECT AID sent by a vehicle end NFC module and judging whether a long password exists in a current mobile terminal when the SELECT AID is a target AID; the first receiving module is used for sending a first pairing authentication data packet to the vehicle end NFC module and receiving a first pairing authentication data response packet sent by the vehicle end NFC module based on the first pairing authentication data packet if the long password does not exist in the current mobile terminal; the first sending module is used for checking the first pairing authentication data response packet, sending a second pairing authentication data packet to the vehicle end NFC module after the first pairing authentication data response packet passes the checking, sending a CAN network instruction to a target vehicle after the vehicle end NFC module passes the checking of the second pairing authentication data packet, and awakening the target vehicle.
Optionally, after the vehicle-end NFC module verifies the second pairing authentication packet, the first sending module is specifically configured to: receiving a second pairing authentication data response packet generated based on the second pairing authentication data packet and sent by the vehicle-end NFC module; and verifying the second pairing authentication data response packet, acquiring a target long password from the second pairing authentication data response packet after the second pairing authentication data response packet passes the verification, and storing the target long password in the current mobile terminal.
Optionally, the NFC vehicle key authentication device further includes: the second sending module is used for constructing 11 data packets if the long password exists in the current mobile terminal and sending the 11 data packets to the vehicle-end NFC module; the second receiving module is used for receiving an 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes; and the storage module is used for verifying the 11 data response packets, acquiring the target long password from the 11 data response packets after the 11 data response packets are verified to be passed, and storing the target long password in the current mobile terminal.
Optionally, after receiving the 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes, the method further includes: and sending the CAN network command to the target vehicle to wake up the target vehicle.
Optionally, after sending the 11 data packets to the vehicle-end NFC module, the method further includes: receiving an 11 data failure packet sent after the vehicle-end NFC module fails to verify the 11 data packet; and acquiring a failure reason from the 1 data failure packet, and constructing the first pairing authentication data packet according to the failure reason.
An embodiment of a third aspect of the present application provides a vehicle, comprising: the NFC vehicle key authentication method comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to achieve the NFC vehicle key authentication method according to the embodiment.
A fourth aspect of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor, and is used to implement the NFC vehicle key authentication method according to the foregoing embodiment.
Therefore, by receiving the SELECT AID sent by the vehicle end NFC module, and when the SELECT AID is a target AID, whether a long password exists in the current mobile terminal is judged, if the long password does not exist in the current mobile terminal, a first pairing authentication data packet is sent to the vehicle end NFC module, a first pairing authentication data response packet sent by the vehicle end NFC module is received, the first pairing authentication data response packet is verified, and a second pairing authentication data packet is sent to the vehicle end NFC module after the first pairing authentication data response packet is verified, so that after the vehicle end NFC module verifies the second pairing authentication data packet, a CAN network instruction is sent to the target vehicle, and the target vehicle is awakened. The problems of vehicle safety identity authentication and quick authentication are solved, the NFC mobile phone is safely paired and authenticated, and meanwhile quick authentication can be achieved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart of an NFC vehicle key authentication method according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of a NFC vehicle key authentication method according to one embodiment of the present application;
fig. 3 is a block diagram illustrating an NFC vehicle key authentication device according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a vehicle according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
An NFC vehicle key authentication method, apparatus, vehicle, and storage medium according to embodiments of the present application are described below with reference to the drawings. In the method, a SELECT AID sent by a vehicle-end NFC module is received, when the SELECT AID is a target AID, whether a long password exists at a current mobile terminal is judged, if the long password does not exist at the current mobile terminal, a first pairing authentication data packet is sent to the vehicle-end NFC module, a first pairing authentication data response packet sent by the vehicle-end NFC module is received, the first pairing authentication data response packet is verified, and after the first pairing authentication data response packet is verified, a second pairing authentication data packet is sent to the vehicle-end NFC module, so that after the vehicle-end NFC module verifies the second pairing authentication data packet, a CAN network command is sent to a target vehicle, and the target vehicle is awakened. Therefore, the problems of vehicle safety identity authentication and quick authentication are solved, the NFC mobile phone is safely paired and authenticated, and meanwhile quick authentication can be achieved.
Specifically, fig. 1 is a schematic flowchart of an NFC vehicle key authentication method provided in an embodiment of the present application.
As shown in fig. 1, the NFC vehicle key authentication method includes the following steps:
in step S101, a SELECT AID sent by the vehicle end NFC module is received, and when the SELECT AID is a target AID, it is determined whether a long password exists in the current mobile terminal.
Firstly, a Public Key Infrastructure (PKI) cloud generates a Key pair, an n-Key is swiped into a vehicle-side NFC authentication module through the internet of vehicles or other secure environments, and a Public Key is identified by an npkey. Then, the Vehicle PKI system uses npkey as computer signature to obtain a token according to NFC card associated information info (card authority Code + SN and other information + VIN (Vehicle Identification Number, unique Vehicle Identification Code)), and uses a security algorithm HMAC (Hash-based Message Authentication Code) and the nkey and the token as parameters to generate a virtual password uvkey, and the cloud sends the info, token and uvkey information to the user NFC card or the user NFC mobile phone. Then, when the user NFC mobile phone approaches the vehicle-end NFC module, the vehicle-end NFC module sends an NFC standard selection application instruction of SELECT AID, and the user NFC mobile phone determines that the user NFC mobile phone is an AID concerned by the user NFC mobile phone, checks whether an LTK (long temp key) on the memory exists, and if the user NFC mobile phone does not exist, enters a pairing authentication process.
In step S102, if the current mobile terminal does not have the long password, a first pairing authentication data packet is sent to the vehicle-end NFC module, and a first pairing authentication data response packet sent by the vehicle-end NFC module based on the first pairing authentication data packet is received.
Specifically, if the mobile terminal does not have a long password, a pairing authentication process is entered. The mobile phone NFC module sends a first pairing authentication data packet, the packet identifier is 01, the packet structure is ' 01+ and + info + token + check code ', ura ' is a temporary random number, info is NFC card associated information, token is a hash generated by a PKI system by signing info data with npkey, and the check code is generated by XOR on the front data bytes of the packet. The vehicle-side NFC module receives the 01 data packet, verifies token and info by adopting a private key, takes out equipment codes in the info to be compared with own equipment codes (such as vehicle VIN codes), meanwhile, checks whether SN in an info data structure is in a blacklist or not, and if signature verification fails or equipment code matching fails, replies with a failure 0101. And the vehicle-end NFC module generates a key nvkey according to an algorithm, and encrypts the received ura random number to obtain encrypted data eurand. The reply packet of the vehicle end NFC organization 01 identifier has a structure of '01 + eurand + nrand + check code', and nrand is a random number of the vehicle end.
In step S103, the first pairing authentication data response packet is verified, and after the first pairing authentication data response packet is verified, the second pairing authentication data packet is sent to the vehicle-end NFC module, so that after the vehicle-end NFC module verifies the second pairing authentication data packet, the CAN network command is sent to the target vehicle, and the target vehicle is awakened.
Specifically, the mobile phone NFC module decrypts the encrypted data eurand by using the virtual password uvkey, compares the encrypted data eurand with the random number urand, and if the encrypted data eurand is correct, carries out the next step, encrypts the random number nrad at the vehicle end NFC end by using the uvkey, and obtains enrad; and the mobile phone NFC utilizes the vehicle NFC terminal random number nrand and the mobile phone terminal random number urand to construct LTK, and the LTK is used for processing the nrad. The mobile phone NFC sends a second pairing authentication data packet to the vehicle end NFC module, the structure is '02 + enrad + LTK (nrad)', the vehicle end NFC module receives the 02 data packet, decrypts enrad, compares the decrypted enrad with nrad, and if the decrypted enrad is the same as the nrad, the LTK is constructed according to nrad and urand, and the LTK (nrad) is further verified; if the right information is correct, the right information is taken out, for example, whether the available date is in the service life or not, if the right information is correct, the NFC card instruction is taken out, the corresponding recognizable instruction of the CAN bus is constructed and sent to the CAN bus, and therefore the whole vehicle is waken up and the CAN command is executed.
Optionally, in some embodiments, after the vehicle-end NFC module verifies the second pairing authentication packet, the method further includes: receiving a second pairing authentication data response packet generated based on a second pairing authentication data packet and sent by the vehicle-end NFC module; and verifying the second pairing authentication data response packet, acquiring the target long password from the second pairing authentication data response packet after the second pairing authentication data response packet passes the verification, and storing the target long password in the current mobile terminal.
It can be understood that the vehicle-side NFC module stores the LTK and info data in the memory, and at the same time, the vehicle-side NFC module processes the second pairing authentication data response packet of the second pairing authentication data packet with the LTK and sends the second pairing authentication data response packet to the mobile phone NFC module, and the mobile phone NFC module receives the second pairing authentication data response packet, verifies the second pairing authentication data response packet with the LTK, and stores the LTK in the mobile terminal memory if the LTK is successful.
Optionally, in some embodiments, the NFC vehicle key authentication method further includes: if the current mobile terminal has the long password, constructing 11 data packets, and sending the 11 data packets to the vehicle end NFC module; receiving an 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes; and verifying the 11 data response packet, acquiring the target long password from the 11 data response packet after the 11 data response packet passes the verification, and storing the target long password in the current mobile terminal.
Optionally, in some embodiments, after sending 11 the data packet to the vehicle-end NFC module, the method further includes: receiving an 11 data failure packet sent after the vehicle-end NFC module fails to verify the 11 data packet; and acquiring a failure reason from the data failure packet 1, and constructing a first pairing authentication data packet according to the failure reason.
Optionally, in some embodiments, after the receiving the 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes, the method further includes: and sending a CAN network command to the target vehicle to wake up the target vehicle.
It can be understood that if the mobile phone end NFC module detects that the LTK exists, an 11 data packet is sent to the vehicle end NFC module, and the structure is "11+ LTK _ep (urand) + LTK _ CMAC (urand) + SN (Serial Number, unique key identifier) + check code", where LTK _ CMAC uses the LTK as a key to perform hash operation on the message, and LTK _ EP uses the LTK as a key to perform encryption operation on the message. If the vehicle end NFC module receives the 11 data packet, the SN is taken out from the data packet, the corresponding LTK is taken out according to the SN to the flash, the urand and the LTK _ CMAC (urand) are verified, if the verification is successful, a new random number nrad is generated, and a reply message is generated, wherein the structure is '11 + LTK_EP (nrad) + LTK _ CMAC (nrad) + SN'. And the mobile phone NFC module checks the signature by using the LTK of the mobile phone after receiving the data, and if the signature is successful, the new peer-to-peer LTK is generated and stored by using the urand + nrand according to the message authentication code algorithm of the block cipher. And the mobile phone NFC module replies 12 data messages to the vehicle-end NFC, which indicates that the random number is correctly analyzed. And the vehicle end receives the 12 instructions, executes the vehicle control instructions and stores the LTK. And if the vehicle-end module verifies that the random number is incorrect, sending a full verification instruction.
The embodiment of the application can adopt a blacklist mechanism, and if the NFC card is lost, the SN number of the card is issued to the vehicle end module through the cloud end, so that the use of the card is limited.
According to the NFC vehicle key authentication method provided by the embodiment of the application, a SELECT AID sent by a vehicle end NFC module is received, whether a long password exists in a current mobile terminal is judged when the SELECT AID is a target AID, if the long password does not exist in the current mobile terminal, a first pairing authentication data packet is sent to the vehicle end NFC module, a first pairing authentication data response packet sent by the vehicle end NFC module is received, the first pairing authentication data response packet is verified, a second pairing authentication data packet is sent to the vehicle end NFC module after the first pairing authentication data response packet is verified, a CAN network instruction is sent to a target vehicle after the vehicle end NFC module verifies the second pairing authentication data packet, and the target vehicle is awakened. Therefore, the problems of vehicle safety identity authentication and quick authentication are solved, the NFC mobile phone is safely paired and authenticated, and meanwhile quick authentication can be achieved.
The NFC vehicle key authentication device provided by the embodiment of the application is described with reference to the attached drawings, so that the problems of vehicle safety identity authentication and quick authentication are solved, the NFC mobile phone is safely paired and authenticated, and meanwhile, the quick authentication can be realized.
Fig. 3 is a block diagram of an NFC vehicle key authentication device according to an embodiment of the present application.
As shown in fig. 3, the NFC vehicle key authentication device 10 includes: a judging module 100, a first receiving module 200 and a second sending module 300.
The determining module 100 is configured to receive a SELECT AID sent by the vehicle-end NFC module, and determine whether a long password exists in the current mobile terminal when the SELECT AID is a target AID; the first receiving module 200 is configured to send a first pairing authentication data packet to the vehicle-end NFC module if the current mobile terminal does not have the long password, and receive a first pairing authentication data response packet sent by the vehicle-end NFC module based on the first pairing authentication data packet; the first sending module 300 is configured to verify the first pairing authentication data response packet, send a second pairing authentication data packet to the vehicle-end NFC module after the first pairing authentication data response packet is verified, send a CAN network instruction to the target vehicle after the vehicle-end NFC module verifies the second pairing authentication data packet, and wake up the target vehicle.
Optionally, in some embodiments, after the vehicle-end NFC module verifies the second pairing authentication data packet, the first sending module 300 is specifically configured to: receiving a second pairing authentication data response packet generated based on a second pairing authentication data packet and sent by the vehicle-end NFC module; and verifying the second pairing authentication data response packet, acquiring the target long password from the second pairing authentication data response packet after the second pairing authentication data response packet passes the verification, and storing the target long password in the current mobile terminal.
Optionally, in some embodiments, the NFC vehicle key authentication device 10 further includes: the second sending module is used for constructing 11 data packets if the current mobile terminal has the long password, and sending the 11 data packets to the vehicle-end NFC module; the second receiving module is used for receiving an 11 data response packet sent by the vehicle-end NFC module after the verification 11 data packet passes; and the storage module is used for verifying the 11 data response packet, acquiring the target long password from the 11 data response packet after the 11 data response packet is verified to be passed, and storing the target long password in the current mobile terminal.
Optionally, in some embodiments, after the receiving the 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes, the method further includes: and sending a CAN network command to the target vehicle to wake up the target vehicle.
Optionally, in some embodiments, after sending 11 the data packet to the vehicle-end NFC module, the method further includes: receiving an 11 data failure packet sent after the vehicle-end NFC module fails to verify the 11 data packet; and acquiring a failure reason from the data failure packet 1, and constructing a first pairing authentication data packet according to the failure reason.
It should be noted that the foregoing explanation on the embodiment of the NFC vehicle key authentication method is also applicable to the NFC vehicle key authentication apparatus in this embodiment, and details are not repeated here.
According to the NFC vehicle key authentication device provided by the embodiment of the application, through receiving the SELECT AID sent by the vehicle end NFC module, when the SELECT AID is the target AID, whether a long password exists in the current mobile terminal is judged, if the long password does not exist in the current mobile terminal, a first pairing authentication data packet is sent to the vehicle end NFC module, a first pairing authentication data response packet sent by the vehicle end NFC module is received, the first pairing authentication data response packet is verified, and after the first pairing authentication data response packet passes verification, a second pairing authentication data packet is sent to the vehicle end NFC module, so that after the vehicle end NFC module passes verification of the second pairing authentication data packet, a CAN network command is sent to a target vehicle, and the target vehicle is awakened. Therefore, the problems of vehicle safety identity authentication and quick authentication are solved, the NFC mobile phone is safely paired and authenticated, and meanwhile quick authentication can be achieved.
Fig. 4 is a schematic structural diagram of a vehicle according to an embodiment of the present application. The vehicle may include:
memory 401, processor 402, and computer programs stored on memory 401 and executable on processor 402.
The processor 402, when executing the program, implements the NFC car key authentication method provided in the above-described embodiment.
Further, the vehicle further includes:
a communication interface 403 for communication between the memory 401 and the processor 402.
A memory 401 for storing computer programs executable on the processor 402.
Memory 401 may comprise high-speed RAM memory, and may also include non-volatile memory, such as at least one disk memory.
If the memory 401, the processor 402 and the communication interface 403 are implemented independently, the communication interface 403, the memory 401 and the processor 402 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
Optionally, in a specific implementation, if the memory 401, the processor 402, and the communication interface 403 are integrated on a chip, the memory 401, the processor 402, and the communication interface 403 may complete mutual communication through an internal interface.
Processor 402 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present Application.
Embodiments of the present application also provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the NFC vehicle key authentication method as above.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present application, "N" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more N executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of implementing the embodiments of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or N wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. An NFC vehicle key authentication method is characterized by comprising the following steps:
receiving a SELECT AID sent by a vehicle end NFC module, and judging whether a long password exists in a current mobile terminal when the SELECT AID is a target AID;
if the long password does not exist in the current mobile terminal, sending a first pairing authentication data packet to the vehicle-end NFC module, and receiving a first pairing authentication data response packet sent by the vehicle-end NFC module based on the first pairing authentication data packet;
and checking the first pairing authentication data response packet, sending a second pairing authentication data packet to the vehicle end NFC module after the first pairing authentication data response packet is checked to pass, sending a CAN network instruction to a target vehicle after the vehicle end NFC module checks the second pairing authentication data packet to pass, and awakening the target vehicle.
2. The method of claim 1, wherein after the vehicle-side NFC module verifies the second pairing authentication packet, the method further comprises:
receiving a second pairing authentication data response packet which is sent by the vehicle-end NFC module and generated based on the second pairing authentication data packet;
and verifying the second pairing authentication data response packet, acquiring a target long password from the second pairing authentication data response packet after the second pairing authentication data response packet passes the verification, and storing the target long password in the current mobile terminal.
3. The method of claim 1, further comprising:
if the long password exists in the current mobile terminal, constructing 11 data packets, and sending the 11 data packets to the vehicle end NFC module;
receiving an 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes;
and verifying the 11 data response packet, acquiring the target long password from the 11 data response packet after the 11 data response packet passes the verification, and storing the target long password in the current mobile terminal.
4. The method according to claim 3, wherein after receiving the 11 data response packet sent by the vehicle-end NFC module after the 11 data packet is verified to pass, the method further comprises:
and sending the CAN network command to the target vehicle to wake up the target vehicle.
5. The method of claim 3, further comprising, after sending the 11 data packets to the vehicle-end NFC module:
receiving an 11 data failure packet sent after the vehicle-end NFC module fails to verify the 11 data packet;
and acquiring a failure reason from the 1 data failure packet, and constructing the first pairing authentication data packet according to the failure reason.
6. An NFC vehicle key authentication device, characterized by comprising:
the device comprises a judging module and a sending module, wherein the judging module is used for receiving a SELECT AID sent by a vehicle end NFC module and judging whether a long password exists in a current mobile terminal when the SELECT AID is a target AID;
the first receiving module is used for sending a first pairing authentication data packet to the vehicle end NFC module and receiving a first pairing authentication data response packet sent by the vehicle end NFC module based on the first pairing authentication data packet if the long password does not exist in the current mobile terminal;
the first sending module is used for checking the first pairing authentication data response packet, sending a second pairing authentication data packet to the vehicle end NFC module after the first pairing authentication data response packet passes the checking, sending a CAN network instruction to a target vehicle after the vehicle end NFC module passes the checking of the second pairing authentication data packet, and awakening the target vehicle.
7. The apparatus according to claim 6, wherein after the vehicle-end NFC module verifies the second pairing authentication packet, the first sending module is specifically configured to:
receiving a second pairing authentication data response packet generated based on the second pairing authentication data packet and sent by the vehicle-end NFC module;
and verifying the second pairing authentication data response packet, acquiring a target long password from the second pairing authentication data response packet after the second pairing authentication data response packet passes the verification, and storing the target long password in the current mobile terminal.
8. The apparatus of claim 6, further comprising:
the second sending module is used for constructing 11 data packets if the long password exists in the current mobile terminal and sending the 11 data packets to the vehicle-end NFC module;
the second receiving module is used for receiving an 11 data response packet sent after the vehicle-end NFC module verifies that the 11 data packet passes;
and the storage module is used for verifying the 11 data response packets, acquiring the target long password from the 11 data response packets after the 11 data response packets are verified, and storing the target long password in the current mobile terminal.
9. A vehicle comprising a memory, a processor;
wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for implementing the NFC vehicle key authentication method of any one of claims 1-5.
10. A computer-readable storage medium, in which a computer program is stored, which program, when being executed by a processor, carries out the NFC vehicle key authentication method according to any one of claims 1 to 5.
CN202211012816.7A 2022-08-23 2022-08-23 NFC vehicle key authentication method and device, vehicle and storage medium Active CN115376226B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211012816.7A CN115376226B (en) 2022-08-23 2022-08-23 NFC vehicle key authentication method and device, vehicle and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211012816.7A CN115376226B (en) 2022-08-23 2022-08-23 NFC vehicle key authentication method and device, vehicle and storage medium

Publications (2)

Publication Number Publication Date
CN115376226A true CN115376226A (en) 2022-11-22
CN115376226B CN115376226B (en) 2024-08-13

Family

ID=84068204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211012816.7A Active CN115376226B (en) 2022-08-23 2022-08-23 NFC vehicle key authentication method and device, vehicle and storage medium

Country Status (1)

Country Link
CN (1) CN115376226B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110065470A (en) * 2019-05-16 2019-07-30 广州小鹏汽车科技有限公司 Automobile control method, device, automobile and storage medium based on NFC car key
CN110288729A (en) * 2019-06-10 2019-09-27 湖北亿咖通科技有限公司 A kind of vehicle starting method and system based on wireless near field communication
CN111572493A (en) * 2020-05-08 2020-08-25 郑州信大捷安信息技术股份有限公司 Vehicle keyless entry and starting system and method based on Internet of vehicles
CN111976650A (en) * 2020-07-29 2020-11-24 上海果通通信科技股份有限公司 Non-contact automobile key implementation method and device
CN113515755A (en) * 2021-03-25 2021-10-19 北京汽车研究总院有限公司 Wake-up method for autonomous vehicle, storage medium, and electronic device
CN113852632A (en) * 2021-09-24 2021-12-28 北京明朝万达科技股份有限公司 Vehicle identity authentication method, system, device and storage medium based on SM9 algorithm

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110065470A (en) * 2019-05-16 2019-07-30 广州小鹏汽车科技有限公司 Automobile control method, device, automobile and storage medium based on NFC car key
CN110288729A (en) * 2019-06-10 2019-09-27 湖北亿咖通科技有限公司 A kind of vehicle starting method and system based on wireless near field communication
CN111572493A (en) * 2020-05-08 2020-08-25 郑州信大捷安信息技术股份有限公司 Vehicle keyless entry and starting system and method based on Internet of vehicles
CN111976650A (en) * 2020-07-29 2020-11-24 上海果通通信科技股份有限公司 Non-contact automobile key implementation method and device
CN113515755A (en) * 2021-03-25 2021-10-19 北京汽车研究总院有限公司 Wake-up method for autonomous vehicle, storage medium, and electronic device
CN113852632A (en) * 2021-09-24 2021-12-28 北京明朝万达科技股份有限公司 Vehicle identity authentication method, system, device and storage medium based on SM9 algorithm

Also Published As

Publication number Publication date
CN115376226B (en) 2024-08-13

Similar Documents

Publication Publication Date Title
CN111131313B (en) Safety guarantee method and system for replacing ECU (electronic control Unit) of intelligent networked automobile
US10360018B2 (en) Update control apparatus, software update system, and update control method
CN110572418B (en) Vehicle identity authentication method and device, computer equipment and storage medium
US10708062B2 (en) In-vehicle information communication system and authentication method
EP2720405B1 (en) In-Vehicle Communication System
US8307202B2 (en) Methods and systems for using PKCS registration on mobile environment
CN110708388B (en) Vehicle body safety anchor node device, method and network system for providing safety service
CN109981562B (en) Software development kit authorization method and device
US20080130879A1 (en) Method and system for a secure PKI (Public Key Infrastructure) key registration process on mobile environment
CN110650478B (en) OTA method, system, device, SE module, program server and medium
CN111376865A (en) Vehicle digital key activation method, system and storage medium
CN113766450B (en) Vehicle virtual key sharing method, mobile terminal, server and vehicle
US7797531B2 (en) Wireless ad-hoc communication system, terminal, method for suggesting issuance of attribute certificate and method for requesting issuance of attribute certificate in the terminal, and program for causing the terminal to execute the method
CN108632037B (en) Public key processing method and device of public key infrastructure
US20230396417A1 (en) Method and system for public key infrastructure for serviceable electronic components in software defined vehicles
CN109743283B (en) Information transmission method and equipment
CN112887099B (en) Data signing method, electronic device and computer readable storage medium
AU2020220129B2 (en) Method of enrolling a device into a pki domain for certificate management using factory key provisioning
CN114499999A (en) Identity authentication method, device, platform, vehicle, equipment and medium
EP3979113B1 (en) Secure startup method, target controller, auxiliary controller, control system, vehicle-mounted device, and computer-readable storage medium
CN115376226B (en) NFC vehicle key authentication method and device, vehicle and storage medium
CN112506267A (en) RTC calibration method, vehicle-mounted terminal, user side and storage medium
CN114978751B (en) Service certificate acquisition method and device and electronic equipment
CN115499199A (en) Vehicle safety communication method and device, vehicle and storage medium
CN118152306A (en) Hard disk data protection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant