专利摘要:
The invention relates to an automatic recognition method between a mobile electronic device (SP) and a motor vehicle (Vi) equipped with an electronic communication module (120), said mobile electronic device (SP) and the electronic module ( 120) of the vehicle (Vi) being able to operate according to the BLE protocol, the mobile electronic device (SP) being in a "scanning" mode and the electronic communication module (120) of the vehicle (Vi) being in a " advertising "characterized in that it comprises the various steps of: In the electronic module (120) of the vehicle (Vi), obtain an identification data (RPAi) of the vehicle (Vi); Transmitting from the electronic module (120) of the vehicle (Vi) to the mobile electronic device (SP), at least one data frame (Td) comprising the identification data (RPAi) of the vehicle (Vi); - Receive in the mobile electronic device (SP) placed in the "scanning" mode the at least one data frame (Td) containing the identification data (RPAi) of the vehicle (Vi); Verifying in the mobile electronic device (SP) that the identification data (RPAi) transmitted is valid, then transmitting from the mobile electronic device (SP) to the electronic module (120) of the vehicle (Vi) a connection request (110).
公开号:FR3030987A1
申请号:FR1403002
申请日:2014-12-23
公开日:2016-06-24
发明作者:Laurent Petel
申请人:Valeo Comfort and Driving Assistance SAS;
IPC主号:
专利说明:

[0001] TECHNICAL FIELD OF THE INVENTION The present invention relates to a method of automatic recognition between a mobile electronic communication device and an electronic module of a device. motor vehicle, said mobile communication device and said electronic module of the motor vehicle being able to exchange according to protocol Bluetooth Smart or Bluetooth Low Energy (BLE). The technical field of the invention is that of access to motor vehicles by means other than the use of mechanical keys. The term "mobile electronic communication device" in the context of this document will be understood to mean any electronic device enabling a person to access data and information via at least one telecommunication network (for example of the GSM or Bluetooth type) The terms "mobile communication devices" thus include mobile phones, more particularly of the type Smartphones, laptops, tablets, personal digital assistants (PDAs) etc ... In this document, as an example not limiting, the mobile communication device will be a smartphone in the different situations exposed. By misuse of language, we will designate the motor vehicle in place of the electronic module it contains. A renter is a person who will rent / borrow or rent / borrow a vehicle. In the context of the present invention, the user is necessarily equipped with a mobile communication device, including smartphone type. STATE OF THE PRIOR ART A user of a vehicle can today, thanks to the implementation of a secure exchange process, control, by means of a dedicated application, the execution of a function - or control - of a vehicle by means of a mobile communication device, such as a smartphone. The function - or command - concerned is for example a command among the following: locking / unlocking the vehicle, starting the vehicle, automatic parking ... In some applications, in order to implement one of these commands, the mobile device must have previously stored an identification key authorizing the execution of at least one order of the vehicle. The identification key can be memorized in a secure element of the smartphone, for example its SIM card or any other secure element. The user, keeping the smartphone on it, can for example unlock the lock of a door of the vehicle. To do this, data, including authentication data contained in the identification key, and therefore in the smartphone, are exchanged between said smartphone and an electronic module of the vehicle that determines whether the vehicle identification key is valid. . In advantageous embodiments, these data exchanges are performed in accordance with the BLE protocol.
[0002] In the case where the vehicle is shared by a plurality of users, the identification key stored on the smartphone of the user is an identification key which in certain configuration can be temporary that is to say that it is only valid for a limited period of time. The information relating to the period of validity is advantageously contained in the code constituting the temporary identification key. In the case of a vehicle of use, the duration of validity of the temporary identification key then corresponds to the duration of the use of the vehicle. The temporary identification key is obtained after the user has performed all the operations necessary for the use of the vehicle (reservation, payment ...). The identification key in all cases can be for example transferred according to the BLE protocol, but also NEC, wifi or via an electronic optical device such as for example using the camera of the smartphone that captures the image of a code (QR or Barcode), from an automatic terminal arranged near the vehicle to rent to the smartphone, or sent via a GSM type mobile communication network from a remote server to the smartphone. In the context where the exchanges between the smartphone and the motor vehicle operates according to BLE protocol, the motor vehicle is placed in "advertising" mode for long periods - or permanently -. The "advertising" mode is a mode of the BLE protocol in which the vehicle regularly sends messages that allow it to signal its presence, and possibly to communicate certain information. The information provided is for example information to indicate that it has the service used by the dedicated application. In the state of the art, to receive and take into account the instructions issued by the smartphone SP via the dedicated application, the vehicle must have been previously paired with the smartphone.
[0003] The smartphone is placed in the "scanning" mode of the BLE protocol: The scanning mode is a mode of the BLE protocol that allows it to listen to messages sent according to this protocol. The dedicated application can thus recover all the signals emitted by different vehicles in "advertising" mode, said signals indicating in particular that they are able to receive commands issued by the dedicated application. The dedicated application thus makes it possible to obtain a list of vehicles located in the BLE range of the smartphone and which indicated in their advertising frame that they are likely to receive orders from the dedicated application installed on the smartphone. The user of the smartphone however has the right to use one - or possibly several - vehicles from this list of vehicles. To determine which vehicle he will use among the vehicles for which he has obtained rights, he selects said vehicle and enters a code called said pairing code specific to the vehicle considered. The pairing code was previously communicated to him to the extent that he received rights to use the vehicle. The pairing code is most often a code that is entered on the smartphone during the authentication phase that is useful for pairing. In an alternative mode this pairing code can be received by the smartphone by NEC or via the camera (QR code or bar code). The smartphone and the vehicle are then paired. Of course, if the user dials a pairing code that is not the code expected by the vehicle, the pairing does not take place. Once the smartphone and the vehicle paired, they can exchange signals, for example in the form of requests, challenges, and / or responses in secure form. Indeed, advantageously, during the pairing operation, encryption keys have been exchanged between the vehicle and the smartphone that can encrypt / decrypt the signals exchanged. In another mode of operation, the vehicle accepts to receive commands from a smartphone only if these two devices have been previously paired. The pairing mechanism between a smartphone and a vehicle is advantageous insofar as it secures the exchanges between these two devices. However, it is binding because it forces the user of the smartphone to: - Identify the vehicle to which he is entitled from a list of vehicles that are offered by his dedicated application. The list of vehicles consisting of all the vehicles near the smartphone and able to receive commands from the dedicated application, said list can be important in the case for example where the user is in a user agency of vehicles. It is then not immediate for the user to identify the vehicle that is intended for him. - Have previously obtained the pairing code associated with the vehicle to which he is entitled. This code should have been given to him most often by a third person. He will then have to memorize it, or record it, and keep it until the access to the vehicle to which he is entitled. - Enter the pairing code in the dedicated application installed on your smartphone. The pairing mechanism is all the more restrictive that it can, depending on the conditions of use of the vehicle, be repeated several times.
[0004] SUMMARY OF THE INVENTION The invention aims to remedy all or some of the disadvantages of the state of the art identified above, and in particular to provide an automatic recognition method between a mobile communication device, for example smartphone type , and a motor vehicle by means of signals exchanged according to the BLE protocol, said authentication method no longer requiring the implementation of the pairing mechanism, but nevertheless having an optimal security of the exchanges between the vehicle and the mobile device. For this purpose, it is proposed in the invention, in particular, to transmit frames comprising authentication information from the vehicle V in an advertising mode of the BLE protocol, which frames will be recognized by the smartphone and by itself. The present invention thus essentially relates to an automatic recognition method between a mobile electronic device and a motor vehicle equipped with an electronic communication module, said mobile electronic device and the electronic module of the vehicle being able to operate according to the BLE protocol. , the mobile electronic device being in a "scanning" mode and the electronic communication module of the vehicle being in an "advertising" mode, characterized in that it comprises the various steps consisting in: In the electronic module of the vehicle, obtaining vehicle identification data; Transmitting from the electronic module of the vehicle to the mobile electronic device, at least one data frame comprising the identification data of the vehicle; Receiving in the mobile electronic apparatus placed in the "scanning" mode the at least one data frame containing the vehicle identification data; Check in the mobile electronic device that the transmitted identification data is valid, then send from the mobile electronic device to the electronic module of the vehicle a connection request. In addition to the main features which have just been mentioned in the preceding paragraph, the method according to the invention may have one or more additional characteristics among the following, considered individually or according to the technically possible combinations: the vehicle identification data, is expressed according to formula: RPAi = M (ASSOC) Ri, with Ri = Fc (Vidi, M, N) where: M, N are variable data of respectively m and n bits (m and n being integers or nulls ); Fc is an encryption function; Vidi is a secret code of the vehicle Vi ASSOC is a function that associates the data with each other, m = n = 0; oum = Oetn # 0; oum # Oetn = 0, oum # Oetn # 0; the mobile electronic device calculates on its side an encrypted control code R'i. according to the formula: R'i = Fc (Vidi, M, N) the step of checking in the mobile electronic device that the transmitted identification data is valid consists of an equality comparison between Ri and R'i ; all or part of the data frame sent from the electronic module of the vehicle to the mobile electronic device is used as a challenge to which the mobile electronic device must respond to perform an action on the vehicle. BRIEF DESCRIPTION OF THE FIGURES Other features and advantages of the invention will emerge on reading the description which follows, with reference to the appended FIGURE, FIG. 1, which shows a schematic representation of the various elements involved in an exemplary implementation. process of the invention. DETAILED DESCRIPTION OF AN EMBODIMENT In a non-limiting embodiment of the invention, the following is carried out in a first phase for all the vehicles Vi having a specific service (i varying from 1 to n , n being an integer corresponding to the number of vehicles), a remote server 101 has in a database 102 a set of confidential information 103 relating to each vehicle Vi. The remote server 101 thus disassembles, for each vehicle Vid, a first specific Vidi secret code for each vehicle Vi considered, and a second DiversifierKey secret code which will be used to generate a plurality of virtual keys. In a non-schematized preferential alternative mode, one or more different "DiversifierKey" code (s) is / are associated with each Vidi. . The "DiversifierKey" can be obtained according to Vidi and / or other data such as incremental data. In a next phase, it is necessary to define rights for each vehicle Vi. The rights considered for each vehicle Vi are associated, for each future user 200 equipped with a mobile communication device SP, for example of the Smartphone type, one or more of the following information: - A period TSi of authorized use for each user considered; this period of use may be defined for example by an interval between a first date and a second date, or by a start date of use and a maximum duration of use Dmax vehicle Vi; - A list of rights CmdRightsi; this list of rights CmdRightsi defines the actions, commands, that can be performed by each user considered on the vehicle Vi using a dedicated application 104 of his mobile device SP. This defines for example that the user 200 has the right to open all or part of the vehicle Vi (for example a number of times), to start the vehicle Vi, to park the vehicle Vi, to use the vehicle according to certain conditions (speed limit, distance traveled, geographical area, etc.). To define these rights, an authorized user 201, generally the owner of the vehicle, connects to the remote server 101, advantageously by means of a secure communication. for example by means of a password which the authorized user must possess 201. The owner 201 thus decides for each vehicle Vi, which will be the authorized users and the rights associated with each user. For this purpose, it communicates to the remote server said rights in question for each future user., And an identifier of each user. considered. Advantageously, the user's identifier is his mobile phone number PNi. In other examples, the identifier may be the IMEI number of the mobile phone, or an identification number of the SIM card (IMSI number) of the future user.
[0005] The remote server 101, from the information provided by the owner 201 and the first Vidi secret code of the vehicle Vi, generates, by means of a calculation unit 106, a credential Credentiali. Credentiali accreditation code may in a non-limiting embodiment be generated by means of calculation unit 106 by a simple concatenation of the data just mentioned (rights CmdRightsn tenant 200 considered, period of use TSi authorized, and first secret code Vidi of the vehicle Vi) .. In an alternative mode one omits to use in the concatennation the Vidi. The credential Credentiali code is therefore specific to a user, to a given vehicle, and rights that the user has on the vehicle Vi considered.
[0006] In one embodiment, the remote server 101 then generates, from the Credentiali accreditation code and the second DiversifierKey secret code of the vehicle Vi, by means of a first encryption module a signature, or authentication code, CredentialMACi which will be associated with the credential Credentiali, in order to subsequently authenticate the credential Credentiali.
[0007] In an alternative, the remote server 101 generates the CredentialMACi authentication code, from the second DiversifierKey secret code and the Vidi code. This encryption can for example be an encryption type HMAC1 for Hashed Message Authentication Code in English, or an encryption type AES for Advanbced Encryption Standard. The CredentialMACi authentication code also makes it possible to ensure that the user 200 will be limited in his actions to the rights conferred on him by his Credentiali accreditation code; it later allows the validation by the vehicle Vi of the desiderata of the user compared to the authorizations contained in the certification codeCredentiali. A Credentiali credential code and its CredentialMACi signature created by the remote server 101, they are, together with the Vidi code, transferred and stored in a secure area 107 of the smartphone SP of the tenant 200 associated with the virtual key CredentialMACi which has been generated specifically for this tenant 200. The secure area 107 of the smartphone may be for example the SIM card or any other secure element disposed on the smartphone. In an alternative embodiment, the secure zone 107 may be represented by a virtual secure element. . This storage operation can only be performed by an operator authorized to perform such a write operation in the secure zone. This entity is known as TSM (Trusted Service Manager in English). The transfer of the virtual key and its signature is carried out using the telephone number PNn of the user 200, PNn telephone number which had been communicated to the remote server 101 by the authorized user 201. At the same time, and always by the authorized operator TSM, is memorized in the secure area 107 a software element, said Cardlet in the case of a SIM card. The Cardlet software element is a specific application that will allow the dedicated application to interact with the codes stored in the secure area 107 that are CredentialMACi, Credentiali and Vidi without specifically disclosing the CredentialMACi and Vidi codes. The Credentiali code will be transmitted among other code by the application dedicated to the vehicle. Securing the process is thus reinforced. Once these various elements have been stored in the secure zone 107, the smartphone SP has the possibility of transmitting commands to the vehicle Vi via the dedicated application 104. For this purpose, a process of recognition is carried out in the invention, by the smartphone SP of the vehicle Vi that the user 200 - owner of the smartphone SP- is authorized to borrow. The various steps of this recognition process are now detailed: In a first step, which is repeated regularly, the vehicle Vi, or more precisely an electronic module 120 of the vehicle Vi, able to operate according to the BLE protocol, placed in advertising mode , regularly emits a data frame Td ,. According to the invention, the data frame comprises an identification data item RPA which is calculated, in a first example, by an encryption function Fc from the first Vidi secret code specific to the vehicle Vi; we can then write RPAi = Fc (Vidi). In a second example, corresponding to the illustrated example, the identification data RPAi is obtained by the association or concatenation (ASSOC) of Rand random data and a result Fc (Vidi, Rand) obtained by the applying the encryption function on the first secret code Vidi and random data Rand; we can then write RPAi = Rand. (ASSOC) Fc (Vidi, Rand). This second example has the advantage that the value of the identification data RPA may or may not vary from one program to another, whether or not to vary the RAND from one program to the other. to guess, what will be the value of the next RPA identification data. In a third exemplary embodiment, the identification data RPAi is obtained by an encryption function Fc from the first Vidi secret code specific to the vehicle Vi and a DATA datum which is variable. One can then write RPAi = Fc (Vidi, DATA). The DATA values are only known by the vehicle Vi and the smartphone SP. The DATA values may be, according to a non-limiting example, derived from a pseudo-random generator whose root value is known, or from a counter of predetermined increments, or from a clock. In a fourth exemplary embodiment , the identification data RPAi is obtained by the concatenation (ASSOC) of a data DATA "and of a result Fc (Vidi, DATA ', DATA") obtained by the application of the encryption function on the first code secret Vidi and on data DATA ', DATA "One can then write RPAi = DATA" (ASSOC) Fc (Vidi, DATA', DATA ") The DATA 'values are only known by the vehicle Vi and the smartphone SP The DATA 'values can be, according to a non-limiting example, from a pseudo-random generator whose root value is known, or from a counter of predetermined increments, or from a clock. all the examples of realization the data of idention RPAi can be translated according to the formula: RPAi = M (ASSOC) Ri, where Ri = Fc (Vidi, M, N) where M, N are variable data of respectively m and n bits (m and n being integers). Thus: the first exemplary embodiment corresponds to the case where m = n = 0 the second embodiment corresponds to the case n = 0 and m00 the third embodiment corresponds to the case n00 and m = 0 the fourth embodiment corresponds to In case n # 0 and m00 In a second step, when the smartphone SP in "scanning" mode receives the data frame Td, and therefore the identification data RPAi, it calculates on its side an encrypted control code R'i . This control operation is performed in the secure zone 107 by means of the encryption function Fc, identical to the encryption function present in the vehicle Vi; the latter has been stored in the secure zone 107 via the cardlet software element which includes this encryption function Fc. The formula of R'i is the following: R'i = Fc (Vidi, M, N) the data M having been received when sending RPAi, the data N being a data obtained by the smartphone SP.
[0008] In the case where the smartphone SP receives a data frame TD 'emitted by another vehicle Vi' than the one for which a use has been authorized, the first secret code Vidi used to calculate the encrypted control code R'i will give a result different (R'i = Fc (Vidi, M ', N)) of the encrypted code Ri the data frame TD' (Ri = Fc (Vidi ', M', N ')). Thus, in the first example considered (RPAi = Fc (Vidi)), the first secret code Vidi, which was communicated to the secure zone 107 via the Credentiali accreditation, is simply used to calculate the data. Ri control identification. We then have R'i = Fc (Vidi). The data Ri and the control data R'i will only be equal if the first secret code Vidi stored in the secure memory area is identical to the first secret code Vidi of the vehicle Vi transmitting the TD data frame. In the case where the smartphone SP receives a data frame TD 'emitted by another vehicle Vi' than the one for which a location has been authorized, the first secret code Vidi used to calculate the control data R'i = Fc (Vidi ) will give a result different from the identification data Ri '= Fc (Vidi') of the data frame TD '. In the second example considered (RPAi = Rand.CONCAT Fc (Vidi, Rand)), one uses firstly the first secret code Vidi communicated to the secure area through Credentiali accreditation and secondly the rand random data transmitted in the data frame Td from the vehicle Vi to the smartphone SP. The control identification data RPA'i is then calculated in the following manner: RPA'i = Fc (Vidi, Rand). The part Fc (Vidi, Rand) of the identification data RPAi is compared to the control identification data RPA'i, and they will only be equal if the first secret code Vidi stored in the secure memory area is identical the first secret code Vidi of the vehicle Vi emitting the data frame Td, which is the case in the example illustrated. In the case where the smartphone SP receives a data frame Tdi transmitted by another vehicle Vi that the one for which a use has been authorized, the first secret code Vidi used to calculate the control identification data Rpa'i will give a result different from the part Fc (Vidi, Rand) of the identification data Rpai transmitted in the data frame Tdi.
[0009] According to the third and fourth exemplary embodiments for obtaining the identification data RPAi of the vehicle, the smartphone SP will be carried out, identically to the second embodiment, to obtain RPA'i, and thus the part Fc ( Vidi, DATA) or the part Fc (Vidi, DATA ', DATA ") of the identification data RPAi and the control identification data RPA'i will be equal only if the first secret code Vidi stored in the area of secure memory is identical to the first secret code Vidi of the vehicle Vi emitting the data frame Td, and if the smartphone SP also has data DATA (third example), or DATA '(fourth example).
[0010] In an alternative embodiment not described, the previously used association in concatenation form may be replaced by an offending or a mixing operation. Thus, by being placed in a "scanning" mode of all the vehicles capable of exchanging data according to the BLE protocol, the smartphone SP will recognize the vehicle Vi that the user-user of the smartphone in question is authorized to use. Once this recognition is done, the smartphone SP issues a connection request 110 to the vehicle Vi, preferably still according to the BLE protocol. At this point, the exchanges between the smartphone SP and the vehicle Vi have enabled the smartphone SP to identify the vehicle Vi for which it has an authorization, and the two equipment smatphone SP and vehicle Vi are in connected mode. The steps that we will now describe must allow the vehicle Vi to authenticate a command sent by the smartphone SP. Once the connection is established between the smartphone SP and the vehicle Vi, as the smartphone SP and the vehicle Vi have not been paired, during the execution steps of a desired command (lock, unlock, ...) it is better to establish a stronger authentication process. That is to say, associated with the order request, the smartphone SP will have associated therewith a response to a challenge of the vehicle Vi.
[0011] In a first embodiment, the challenge is sent by the vehicle Vi once the connection is established. The smartphone SP responds with the sending of the specific command (lock, unlock, ...). In an advantageous embodiment, the challenge sent by the vehicle is materialized during the sending of the RPa. The smartphone SP interprets this challenge on the basis of all or part of the RPa sent and responds as in the previous case with the sending of the specific command (lock, unlock, ...). The authentication process is as follows: Initially, a desired command Cmdld by the user, for example the command "opening of the vehicle" is sent to a second encryption module present in the secure area 107. This second module encryption also receives the identification data RPAi issued by the vehicle Vi and a simplified credential Credential'i code which corresponds to the credential Credentiali - previously stored in the secure area 107 - in which the information relating to the first Vidi secret code has been removed for not being disclosed. The second encryption module finally receives the CredentialMACi signature of the credential Credentiali, which was also stored in the secure area 107.
[0012] From this information, the second encryption module calculates a first MAC verification code. Once the MAC verification code has been established, the smartphone SP transmits, to the vehicle Vi, advantageously still according to the BLE protocol, a request 111 of command Rc including in particular the Credential'i simplified accreditation code, the desired command CmdID and the first MAC verification code. For its part, the vehicle Vi performs the same calculations: from the simplified Credential'i accreditation code, the first Vidi secret code and the second DiversifierKey secret code, it recalculates the CredentialMACi authentication code of the Credentiali accreditation code. by means of the first encryption module which is also present in the electronic module 120 of the vehicle Vi. The CredentialMACi signature is then provided to the second encryption module, identical to the encryption module of the secure zone 107 of; the second encryption module also receives the control identification data RPAi, through the control request Rc, the desired command CmdID, the simplified credential Credential'i and can thus calculate a second verification code MAC. If the first MAC verification code and the second MAC verification code 'are identical, then the desired command Cmld will be carried out by the vehicle Vi, provided that the desired command Cmld is in the list of rights CmdRightsi, and that the moment RealTime where these verifications are made belongs to the authorized period of use TSi. In an alternative embodiment, the verifications can be inverted, ie we start by testing the Credential'i and CmdID clear information and then, if and only if they are validated, we check the CredentialMACi and MAC authentication codes. advantageous mode of implementation, for the calculation of the MAC verification code, the vehicle sends to the smartphone SP, in a transmission 112, a complementary variable Nonce. Advantageously, the complementary variable Nonce adopts a value that is only used once; any subsequent sending by the vehicle Vi of this complementary variable Nuncio will adopt a different value. The complementary nonce variable is used by the second encryption module of the secure memory area 107 in the development of the verification code MAC, and by the second encryption module of the vehicle Vi for the development of the second verification code MAC ' . This provides additional security In the invention, thus ensures a secure exchange of data between a smartphone and a vehicle exchanging according to the BLE protocol, all by means of a simplified process, no pairing code requiring to be informed by a user.
权利要求:
Claims (9)
[0001]
CLAIMS1- A method of automatic recognition between a mobile electronic device (SP) and a motor vehicle (Vi) equipped with an electronic communication module (120), said mobile electronic device (SP) and the electronic module (120) of the vehicle ( Vi) being able to operate according to the BLE protocol, the mobile electronic device (SP) being in a "scanning" mode and the electronic communication module (120) of the vehicle (Vi) being in an "advertising" mode, characterized in that it comprises the various steps of: - In the electronic module (120) of the vehicle (Vi), obtain an identification data (RPAi) of the vehicle (Vi); Transmitting from the electronic module (120) of the vehicle (Vi) to the mobile electronic device (SP), at least one data frame (Td) comprising the identification data (RPAi) of the vehicle (Vi); - Receive in the mobile electronic device (SP) placed in the "scanning" mode the at least one data frame (Td) containing the identification data (RPAi) of the vehicle (Vi); Verifying in the mobile electronic device (SP) that the identification data (RPAi) transmitted is valid, then transmitting from the mobile electronic device (SP) to the electronic module (120) of the vehicle (Vi) a connection request (110).
[0002]
2- automatic recognition method according to claim 1 characterized in that the identification data (Rpai) of the vehicle (Vi), is stated according to formula: RPAi = M (ASSOC) Ri, with Ri = Fc (Vidi, M , N) where: M, N are variable data of respectively m and n bits (m and n being integers or nulls); - Fc is an encryption function; - Vidi is a secret code of the vehicle Vi ASSOC is a function that associates the data with each other 17
[0003]
3- automatic recognition method according to claim 2 characterized in that: - m = n = 0
[0004]
4- Automatic recognition method according to claim 2 characterized in that: m = 0 - n 0 0
[0005]
5- automatic recognition method according to claim 2 characterized in that: m 0 0 n = 0
[0006]
6. Automatic recognition method according to claim 2, characterized in that m 0 0 - n 0 0
[0007]
7- automatic recognition method according to claim 2 and one of claims 3 to 6, characterized in that the mobile electronic device (SP) calculates on its side an encrypted control code R'i. according to the formula: R'i = Fc (Vidi, M, N)
[0008]
8- Automatic recognition method according to claim 7, characterized in that the step of checking in the mobile electronic device (SP) that the transmitted identification data (RPAi) is valid consists of an equality comparison between Ri and R'i.
[0009]
9- automatic recognition method according to one of the preceding claims characterized in that all or part of the data frame (Td) sent from the electronic module (120) of the vehicle (Vi) to the mobile electronic device (SP) is used as a challenge to be met by the mobile electronic device (SP) to perform an action on the vehicle.
类似技术:
公开号 | 公开日 | 专利标题
EP3262860B1|2021-07-14|Automatic recognition method between a mobile device and a vehicle using the ble protocol
EP1549011A1|2005-06-29|Communication method and system between a terminal and at least a communication device
FR2989799A1|2013-10-25|METHOD FOR TRANSFERRING A DEVICE TO ANOTHER RIGHTS OF ACCESS TO A SERVICE
EP2912818B1|2017-05-03|Method for mutual authentication between a terminal and a remote server via a third-party portal
EP3547270A1|2019-10-02|Method for verifying a biometric authentication
EP2306407A1|2011-04-06|Secure system for programming electronically controlled lock devices using encoded acoustic verifications
EP2871876A1|2015-05-13|Technique for configuring secure access by a guest terminal to a host network
WO2013079848A1|2013-06-06|Method for the mutual authentication of entities having previously initiated an online transaction
EP3308564A1|2018-04-18|Method for loading a virtual key and associated user terminal
EP3357212A1|2018-08-08|Improved method and device for authentication
WO2006082310A1|2006-08-10|Method for fast pre-authentication by distance recognition
EP3568965A1|2019-11-20|Two-step authentication method, device and corresponding computer program
FR3057973A1|2018-04-27|METHOD FOR INSTALLING A CERTIFICATE IN A VEHICLE COMPUTER, CALCULATOR AND ASSOCIATED SYSTEM
FR3064960A1|2018-10-12|METHOD AND SYSTEM FOR REMOTELY UNLOCKING A MOTOR VEHICLE
EP2911365B1|2017-08-02|Method and system for protecting transactions offered by a plurality of services between a mobile device of a user and an acceptance point
EP3262553B1|2019-04-10|Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
WO2016102834A1|2016-06-30|Method for authenticating a user and a secure module, associated electronic apparatus and system
WO2017005644A1|2017-01-12|Method and system for controlling access to a service via a mobile media without a trusted intermediary
FR3082089A1|2019-12-06|METHOD AND SYSTEM FOR REMOTE UNLOCKING OF A MOTOR VEHICLE
EP3594880A1|2020-01-15|Method for secured cryptographic data transmission
EP3499934A1|2019-06-19|Pairing method for electronic terminals, terminals and corresponding program
EP3758322A1|2020-12-30|Method and system for generating encryption keys for transaction or connection data
EP2630746B1|2019-05-08|Authentication method and system
FR3081663A1|2019-11-29|METHOD FOR REMOTELY MANAGING THE OPENING OF AN ELECTRONIC LOCK WITH A USER INTERFACE, TERMINAL, LOCK AND COMPUTER PROGRAM
WO2012022856A1|2012-02-23|Method of authenticating a user of the internet network
同族专利:
公开号 | 公开日
FR3030987B1|2018-03-23|
US20170347266A1|2017-11-30|
EP3262860B1|2021-07-14|
JP2018506208A|2018-03-01|
CN107454999B|2021-01-26|
EP3262860A1|2018-01-03|
WO2016102887A1|2016-06-30|
US10548014B2|2020-01-28|
CN107454999A|2017-12-08|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
EP0492692A2|1990-12-20|1992-07-01|Delco Electronics Corporation|Remote accessing system|
FR2774833A1|1998-02-09|1999-08-13|France Telecom|PROTOCOL FOR CONTROLLING ACCESS BETWEEN AN ELECTRONIC KEY AND A LOCK|
US7366677B1|2000-08-31|2008-04-29|International Business Machines Corporation|Access control for rental cars|
US20090251279A1|2005-07-19|2009-10-08|Philipp Paul Spangenberg|Identifying and/or Locking System for Identifying and/or Unblocking a Technical System, and Method for the Operation Thereof|
WO2008063899A2|2006-11-10|2008-05-29|Toyota Motor Engineering & Manufacturing North America, Inc.|Method for exchanging message and verifying the authenticity of the messages in an ad hoc network|
US20140169564A1|2012-12-14|2014-06-19|GM Global Technology Operations LLC|Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs|
US20140188348A1|2012-12-27|2014-07-03|GM Global Technology Operations LLC|Method and system for detecting proximity of an end device to a vehicle based on signal strength information received over a bluetooth low energy advertising channel|
US20140282974A1|2013-03-12|2014-09-18|Intertrust Technologies Corporation|Secure Transaction Systems and Methods|FR3086480A1|2018-09-24|2020-03-27|Psa Automobiles Sa|METHOD AND DEVICE FOR SECURING WIRELESS COMMUNICATION.|EP1232404B1|1999-11-15|2015-07-08|BLUELON ApS|An object detection system|
CN102917337B|2011-08-03|2016-01-27|通用汽车有限责任公司|For controlling the method for mobile communication|
EP2713582B1|2012-09-28|2018-08-01|Harman Becker Automotive Systems GmbH|Method and apparatus for personalized access to automotive telematic services|DE102015220228B4|2015-10-16|2019-03-21|Volkswagen Aktiengesellschaft|Method and system for securing a first contact of a mobile device with a device|
DE102016203715A1|2016-03-08|2017-09-14|Deere & Company|Arrangement for controlling functions of a work machine|
KR101810442B1|2016-06-02|2017-12-20|심충섭|System and method for controlling car based on instant messaging|
JP6372523B2|2016-06-28|2018-08-15|トヨタ自動車株式会社|Locking / unlocking system, key unit|
DE102018105443A1|2017-03-13|2018-09-13|Huf Hülsbeck & Fürst Gmbh & Co. Kg|Safety procedure for a safety system of a vehicle|
KR102363280B1|2017-06-23|2022-02-16|삼성전자주식회사|Apparatus and method for providing and managing security informaiton in communicnation system|
FR3075535B1|2017-12-20|2020-06-05|Valeo Comfort And Driving Assistance|METHOD OF MATCHING AN ELECTRONIC DEVICE AND AN ELECTRONIC UNIT EQUIPPED WITH A VEHICLE|
JP6640906B2|2018-04-24|2020-02-05|株式会社東海理化電機製作所|Key information generation system and key information generation method|
CN108769973B|2018-07-19|2021-04-02|深圳全志在线有限公司|Privacy protection method of Bluetooth equipment|
CN108990055B|2018-07-19|2021-07-30|深圳全志在线有限公司|Privacy protection circuit of bluetooth equipment|
US11190507B2|2018-09-27|2021-11-30|Apple Inc.|Trusted device establishment|
CN112448816B|2019-08-31|2021-10-19|华为技术有限公司|Identity verification method and device|
CN112309154A|2020-09-28|2021-02-02|惠州市德赛西威智能交通技术研究院有限公司|Method, equipment and automobile for automatically parking and leaving garage through quick Ble starting|
法律状态:
2015-12-31| PLFP| Fee payment|Year of fee payment: 2 |
2016-06-24| PLSC| Publication of the preliminary search report|Effective date: 20160624 |
2016-12-29| PLFP| Fee payment|Year of fee payment: 3 |
2018-01-02| PLFP| Fee payment|Year of fee payment: 4 |
2019-12-31| PLFP| Fee payment|Year of fee payment: 6 |
2020-12-31| PLFP| Fee payment|Year of fee payment: 7 |
2021-12-31| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
申请号 | 申请日 | 专利标题
FR1403002A|FR3030987B1|2014-12-23|2014-12-23|AUTOMATIC RECOGNITION METHOD BETWEEN A MOBILE DEVICE AND A MOTOR VEHICLE FOR OPERATING ACCORDING TO THE BLUE PROTOCOL|
FR1403002|2014-12-23|FR1403002A| FR3030987B1|2014-12-23|2014-12-23|AUTOMATIC RECOGNITION METHOD BETWEEN A MOBILE DEVICE AND A MOTOR VEHICLE FOR OPERATING ACCORDING TO THE BLUE PROTOCOL|
JP2017533861A| JP2018506208A|2014-12-23|2015-12-22|Method for automatic recognition between a mobile device and a motor vehicle operable according to the BLE protocol|
EP15823701.6A| EP3262860B1|2014-12-23|2015-12-22|Automatic recognition method between a mobile device and a vehicle using the ble protocol|
CN201580069345.5A| CN107454999B|2014-12-23|2015-12-22|Method for automatic identification between a mobile device and a motor vehicle, capable of operating according to the bluetooth low energy protocol|
PCT/FR2015/053717| WO2016102887A1|2014-12-23|2015-12-22|Method for automatic recognition between a mobile device and a motor vehicle, capable of functioning according to the ble protocol|
US15/532,384| US10548014B2|2014-12-23|2015-12-22|Method for automatic recognition between a mobile device and a motor vehicle, capable of functioning according to the BLE protocol|
[返回顶部]