Disclosure of Invention
Aiming at the problems in the prior art, the invention provides the communication method, the system, the equipment and the medium for the remote starting safety encryption authentication of the electric vehicle, which realize the communication encryption of the remote starting function of the vehicle, fundamentally improve the safety of the remote starting function and further realize the aim of protecting the property safety of the vehicle owner.
The invention is realized by the following technical scheme:
a remote start safety encryption authentication communication method for an electric vehicle, which comprises the following steps,
after receiving a remote start instruction from the cloud, the TBOX sends a remote control function request message;
the VCU receives the remote control function request message, and after confirming that the remote control function is a remote starting function, the VCU initiates a security encryption authentication flow and sends a security encryption authentication request message;
after receiving the secure encryption authentication request message, the TBOX sends a secure encryption authentication response message;
after the VCU and the TBOX finish the security encryption authentication flow, the VCU determines whether to execute remote starting of the electric vehicle according to the authentication result.
Preferably, after the TBOX receives the remote start instruction from the cloud, a remote control function request message is sent on the CAN network, and a request value of a remote start request signal response is filled in the remote control function request message; the CAN message of the remote control function request contains a remote start request signal.
Preferably, after receiving the remote control function request message sent by the TBOX, the VCU initiates a secure encryption authentication request message within a time T1, and fills a remote start authentication, an authentication in progress and an encryption authentication seed in the message, where the time T1 is not more than 20S.
Preferably, after receiving the secure encryption authentication request message sent by the VCU, the TBOX sends a secure encryption authentication response message in a time T1, and fills a remote start authentication, authentication in progress and encryption authentication key in the message.
Preferably, after receiving the secure encryption authentication response message sent by the TBOX, the VCU compares the remote start authentication, the authentication in-process and the encryption authentication key; if the secret key is correct, the VCU sends a secure encryption authentication request message again in the time T1, and the message is filled with the starting authentication, successful authentication and started;
preferably, after receiving the security authentication request message sent by the VCU, the TBOX resends a security encryption authentication response message within the time T1, where the message is filled with the startup authentication, the authentication is successful and started, and the execution result of the remote startup function is fed back to the cloud server;
preferably, if the TBOX and the VCU do not receive a feedback message of the other party in the communication interaction process exceeding the time T2, the starting security encryption authentication is considered to be failed, and the TBOX feeds back a remote starting function result to the cloud server; the T2 time is 50S.
The remote starting safety encryption authentication communication system of the electric vehicle comprises a TBOX module, a VCU module, a cloud service module and a remote execution module;
the TBOX module receives the remote starting instruction from the cloud service module and then sends a remote control function request message;
the VCU module receives the remote control function request message, and after confirming that the remote control function is a remote starting function, the VCU module initiates a secure encryption authentication flow and sends the secure encryption authentication request message;
after receiving the secure encryption authentication request message, the TBOX module sends a secure encryption authentication response message;
after the VCU module and the TBOX module complete the security encryption authentication flow, the VCU module determines whether to execute remote starting of the electric vehicle through the remote execution module according to the authentication result.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the electric vehicle remote start-up secure encrypted authentication communication method when the computer program is executed.
A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the electric vehicle remote start-up secure encryption authentication communication method.
Compared with the prior art, the invention has the following beneficial technical effects:
the invention relies on the automobile network safety development thought, based on automobile CAN bus communication, designs a remote start safety encryption authentication communication method for an electric vehicle, when a TBOX receives a remote start instruction from a cloud, a remote control function request message is sent on a CAN network, when a VCU receives the remote function request message sent by the TBOX and judges that the remote start function is performed, the VCU initiates a safety encryption authentication flow, and sends the safety encryption authentication request message. When the TBOX receives the security encryption authentication request message sent by the VCU, a security encryption authentication response message is sent, the TBOX can rapidly respond after receiving the security encryption authentication request sent by the VCU, and information such as remote start authentication, authentication neutralization encryption authentication key and the like is provided in the security encryption authentication response message, so that the security and reliability of a remote control function are ensured. After the VCU and the TBOX finish the security encryption authentication flow, the VCU determines whether to execute starting according to an authentication result, and after the security authentication is successful, the VCU can execute a remote control instruction sent by the TBOX, such as allowing a vehicle owner to remotely start the vehicle. To ensure the security of the remote control process and to prevent unauthorized access, the vehicle system typically performs secure cryptographic authentication of the remote control function request. Through this comparison of cryptographic authentication, the vehicle system ensures the security of remote communications against unauthorized access and potential security vulnerabilities. By using this cryptographic authentication key, the communication between the TBOX and VCU can be cryptographically protected against unauthorized third parties accessing or tampering with the communication content. The encryption authentication mechanism of the present invention helps to protect the vehicle system from potential remote attacks or unauthorized remote access; the communication encryption of the remote starting function of the automobile is realized, the safety of the remote starting function is fundamentally improved, and the aim of protecting the property safety of an automobile owner is further achieved.
Detailed Description
The invention will now be described in further detail with reference to specific examples, which are intended to illustrate, but not to limit, the invention.
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
Among the remote control functions of the automobile, the remote start function is a function which is common and has more application scenes. But remote initiated communication is without any secure encryption authentication policy if a relatively simple communication policy is employed. The communication strategy is likely to be cracked by lawbreakers, thereby causing damage to vehicle safety and owner property.
The invention designs a remote starting safety encryption authentication communication strategy of an electric vehicle based on the automobile CAN bus communication by relying on the automobile network safety development thought. The communication encryption of the remote starting function of the automobile is realized, the safety of the remote starting function is fundamentally improved, and the aim of protecting the property safety of an automobile owner is further achieved.
FIG. 1 depicts a remote start functional block diagram of the communication process between a VCU vehicle control unit and a TBOX remote communication box in an automotive remote control system.
1. After the TBOX receives the remote start instruction from the cloud, a remote control function request CAN message is sent on a CAN network, and a remote start request related signal is contained; VCU in automobile remote control system
2. When the VCU receives a remote function request message sent by the TBOX and judges that the remote function request message is a remote starting function, the VCU initiates a security encryption authentication flow and sends the security encryption authentication request message;
3. after receiving the security encryption authentication request message sent by the VCU, the TBOX sends a security encryption authentication response message;
after the VCU and the TBOX finish the security encryption authentication flow, the VCU determines whether to execute starting or not according to the authentication result.
Fig. 2 depicts an exemplary diagram of a remote-initiated secure encryption control communication data stream:
1. when the TBOX receives a remote start instruction at the cloud, the TBOX sends a remote control function request message on a CAN network, wherein a request value of a response is filled with a remote start request signal; the TBOX is a remote communication box in the vehicle that can communicate with an external network, such as through an internet connection, and when the vehicle owner initiates a remote control function request (such as remotely starting the vehicle) through a cell phone application or other remote control device, the TBOX generates and sends a message VCU containing the remote control function request.
The response value of the remote start request signal refers to a request signal to start the vehicle engine, typically sent to the vehicle by the vehicle owner or authorized user through a cell phone application or other remote control device. The response value may be a boolean value or a confirmation feedback indicating whether the vehicle successfully received and performed the remote start request.
In general, the response value of the remote start request signal may include the following cases:
1. successful response: if the vehicle successfully receives and executes a remote start request, the response value will typically be a confirmation feedback indicating that the vehicle has started.
2. Failure response: if the vehicle fails to receive or execute the remote start request, the response value may be an error code or failed acknowledgement feedback.
3. Status query response: in some systems, the response to the remote start request may be a query of the current state of the vehicle, such as whether the vehicle has been started or state information of the current vehicle.
After receiving a remote control function request message sent by TBOX, VCU initiates a secure encryption authentication request message within T1 time, and the message is filled with remote start authentication, authentication in-progress and encryption authentication seeds; the VCU is a control unit of the vehicle, responsible for controlling various functions of the vehicle. When the VCU receives the remote control function request message sent by the TBOX, it recognizes and parses the message to determine the remote control operation that the vehicle owner wants to perform. To ensure the security of the remote control process and to prevent unauthorized access, the vehicle system typically performs secure cryptographic authentication of the remote control function request. In the time T1 after receiving the remote control function request sent by the TBOX, the VCU generates a secure encrypted authentication request message and sends the secure encrypted authentication request message to the TBOX. Encryption authentication seed: in the secure encrypted authentication request message, the VCU is populated with an encrypted authentication Seed (Encryption Seed), which is a randomly generated value or key used in the Encryption algorithm of the encrypted authentication process. The remote start authentication information is used for verifying whether the vehicle owner has permission to execute remote start operation. The mark that authentication is in progress indicates that the vehicle is undergoing a process of security authentication. The process is to ensure the security and legitimacy of the remote control function request, and through secure encryption authentication, the vehicle system can prevent unauthorized access and protect the vehicle from potential remote attacks.
After receiving the security encryption authentication request message sent by the VCU, the TBOX sends a security encryption authentication response message within T1 time, and the message is filled with remote start authentication, authentication in-process and encryption authentication keys; the TBOX receives a secure encryption authentication request message sent by the VCU, wherein the secure encryption authentication request message comprises information such as remote start authentication, authentication in progress, encryption authentication seeds and the like. The T1 time is a predetermined period of time, typically a short time window, for responding to a secure encrypted authentication request to ensure timeliness of the authentication process. In the secure encrypted authentication response message, the TBOX populates the remote start authentication message to inform the VCU whether the vehicle has the right to start remotely, which is a boolean value for indicating the authorization status of remote start. In the secure encrypted authentication response message, the TBOX populates an ongoing flag indicating that the vehicle is undergoing a secure authentication process so that the VCU knows that authentication is still ongoing. The secure encrypted authentication response message contains an encrypted authentication key, which is a key for encrypted communications. The key is calculated from the encryption authentication seed and the encryption algorithm of the vehicle system. By using this cryptographic authentication key, the communication between the TBOX and VCU can be cryptographically protected against unauthorized third parties accessing or tampering with the communication content. The TBOX can respond quickly after receiving the security encryption authentication request sent by the VCU, and provides information such as remote start authentication, authentication neutralization encryption authentication key and the like in the security encryption authentication response message so as to ensure the security and reliability of the remote control function. Such an encryption authentication mechanism helps to protect the vehicle system from potential remote attacks or unauthorized remote access;
and 4, after the VCU receives the security encryption authentication response message sent by the TBOX, comparing the secret keys. If the secret key is correct, the VCU sends a secure encryption authentication request message again in the time T1, and the message is filled with the starting authentication, successful authentication and started; the VCU receives the security encryption authentication response message sent by the TBOX, and the VCU compares the encryption authentication keys therein to verify the validity and correctness of the encryption authentication keys, so as to ensure the security of communication and prevent potential security threat.
The process of comparing cryptographic authentication keys typically involves the steps of:
1. acquiring an encryption authentication seed: in the secure encrypted authentication request message, the VCU receives an encrypted authentication Seed (Encryption Seed) generated by TBOX.
2. Calculating a local encryption authentication key: the VCU calculates a local encryption authentication key using the received encryption authentication seed and a predefined encryption algorithm for the vehicle system.
3. Comparing the encrypted authentication key: and comparing the encryption authentication key obtained by local calculation with the encryption authentication key filled in the response message sent by the TBOX.
4. Verification result: if the locally calculated encrypted authentication key is consistent with the key sent by the TBOX, the authentication is successful, and the VCU can confirm that the communication is legal and continue to execute the remote control function. Otherwise, if the encrypted authentication keys do not match, the authentication fails and the VCU will refuse to perform remote control operations or take other security measures.
Through this comparison of cryptographic authentication, the vehicle system ensures the security of remote communications against unauthorized access and potential security vulnerabilities. After the security authentication is successful, the VCU may be relieved from executing remote control instructions sent by the TBOX, such as allowing the vehicle owner to remotely start the vehicle.
After receiving the security authentication request message sent by the VCU, the TBOX resends a security encryption authentication response message within the time T1, wherein the message is filled with the starting authentication, the authentication is successful and started, and the execution result of the remote starting function is fed back to the cloud server; the VCU will receive the authentication result delivered by the TBOX. The TBOX receives a security authentication request message sent by the VCU, the TBOX starts an authentication process and completes authentication within T1 time, the TBOX generates a security encryption authentication response message, and the security encryption authentication response message is filled with an authentication starting result, an authentication success result and an initiated result, wherein the authentication starting result can have two states: authentication success and authentication failure, if authentication is successful, the TBOX will populate an identification of "authentication success" in the message, and the TBOX will also populate an identification of "started", indicating that the remote start function has been performed. The TBOX sends a message with an authentication result and a remote starting state to the cloud server, and the execution result is fed back to the cloud server.
6. If the TBOX and the VCU do not receive the feedback message of the other party in the communication interaction process in excess of the time T2, the current starting security encryption authentication is considered to be failed, and the TBOX feeds back the remote starting function result to the cloud server.
In a normal vehicle remote start procedure, authentication is necessary to ensure that only authorized users can remotely start the vehicle. Accordingly, the VCU determines whether to perform remote start of the electric vehicle according to the authentication result received from the TBOX.
If authentication is successful, the VCU will recognize that the request is from an authorized user and allow remote start of the electric vehicle.
Otherwise, if authentication fails, the VCU will reject the remote start request, ensuring vehicle security and preventing unauthorized start.
Table 1 defines in detail the specific parameter definitions and parameter descriptions throughout the communication interaction.
Based on the secure encryption authentication communication flow of fig. 2 and the parameter definitions in table 1, the remote start function between TBOX and VCU can implement secure encryption authentication. Wherein, can formulate the differentiated encryption authentication algorithm according to the specific functional requirement.
An electronic device includes a processor and a memory having at least one instruction stored therein, the instructions stored in the memory being executable to implement the method of planning a most recent charge stake route based on a remaining mileage.
A computer readable storage medium having stored thereon a computer program which when executed by a processor implements the method of planning a nearest charging stake route based on remaining mileage.
The embodiment of the invention provides terminal equipment. The terminal device of this embodiment includes: a processor, a memory, and a computer program stored in the memory and executable on the processor. The steps of the various method embodiments described above are implemented when the processor executes the computer program. Alternatively, the processor may implement the functions of the modules/units in the above-described device embodiments when executing the computer program.
The computer program may be divided into one or more modules/units, which are stored in the memory and executed by the processor to accomplish the present invention.
The terminal equipment can be computing equipment such as a desktop computer, a notebook computer, a palm computer, a cloud server and the like. The terminal device may include, but is not limited to, a processor, a memory.
The processor may be a central processing unit (CentralProcessingUnit, CPU), but may also be other general purpose processors, digital signal processors (DigitalSignalProcessor, DSP), application specific integrated circuits (ApplicationSpecificIntegratedCircuit, ASIC), off-the-shelf programmable gate arrays (Field-ProgrammableGateArray, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like.
The memory may be used to store the computer program and/or module, and the processor may implement various functions of the terminal device by running or executing the computer program and/or module stored in the memory and invoking data stored in the memory.
The modules/units integrated in the terminal device may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a Read-only memory (ROM), a random access memory (RAM, randomAccessMemory), an electrical carrier signal, a telecommunication signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
The above description is only of the preferred embodiments of the present invention, and is not intended to limit the present invention in any way; those skilled in the art will readily appreciate that the present invention may be implemented as shown in the drawings and described above; however, those skilled in the art will appreciate that many modifications, adaptations, and variations of the present invention are possible in light of the above teachings without departing from the scope of the invention; meanwhile, any equivalent changes, modifications and evolution of the above embodiments according to the essential technology of the present invention still fall within the scope of the present invention.