![]() METHOD FOR REGISTERING A USER WITH A SERVICE FOR CONTROLLING A FUNCTIONALITY OF A VEHICLE USING A US
专利摘要:
A method of registering a user with a service of controlling at least one feature of a vehicle (10) by means of a user terminal (20) comprises the following steps: - communication of an identifier of the user user and an identifier associated with the vehicle (10) to a server (50); - authentication of an electronic unit (11) of the vehicle (10) by the server (50); - In case of successful authentication, registration of the user identifier and the identifier associated with the vehicle (10) in association at the server (50). 公开号:FR3031268A1 申请号:FR1463430 申请日:2014-12-30 公开日:2016-07-01 发明作者:Eric Menard;Eric Benteo;Fabienne Masson 申请人:Valeo Comfort and Driving Assistance SAS; IPC主号:
专利说明:
[0001] TECHNICAL FIELD TO WHICH THE INVENTION RELATES The present invention relates to the control of functionalities of a vehicle by means of a user terminal, such as a mobile phone. More particularly, it relates to a method for registering a user with a service for controlling a functionality of a vehicle by means of a user terminal. The invention is particularly advantageous in the case where this feature is the unlocking of the vehicle doors. TECHNOLOGICAL BACKGROUND It has been proposed to control certain functionalities of a motor vehicle, such as the unlocking of the vehicle doors, by means of a user terminal, for example a mobile phone commonly used by the user of the vehicle. In order to allow this command only to those actually authorized, a virtual key stored in the user terminal is used and an electronic control unit of the vehicle checks the validity before controlling the unlocking of the doors. [0002] Such virtual keys are distributed only to those who have subscribed to a functionality control service by means of the user terminal. OBJECT OF THE INVENTION In this context, the present invention proposes a method for registering a user with a service of control of at least one functionality of a vehicle by means of a user terminal, characterized in that it comprises the following steps: - communication of a user identifier and an identifier associated with the vehicle to a server; - authentication of an electronic unit of the vehicle by the server; - In case of successful authentication, registration of the user identifier and the identifier associated with the vehicle in association at the server. The registration of the vehicle with the service, in association with the user identifier 3031268 2 (which may be for example an identifier of its user terminal), is thus achieved only when an electronic unit of the vehicle designated by the identifier communicated has authenticated to the server. Other optional features, and therefore non-limiting, are the following: authentication comprises a step of use by the server of a cryptographic key stored in association with a reference of the electronic unit; authentication comprises data exchanges between the server and the electronic unit via the user terminal; the authentication step is part of a mutual authentication process between the server and the electronic control unit; the registration method comprises a step of detecting a user action on a physical object related to the vehicle; The registration is conditioned not only by the successful authentication, but also by the aforementioned detection; the detection step is implemented only in the event of successful authentication; the registration method comprises, in the event of successful detection, a step of transmission by the electronic unit of a service launch message to the server, said registration being carried out by the server upon receipt of the message of launch of the service; the method comprises, following said registration, a step of transmitting a virtual key to the terminal; The physical object is a physical key able to control the unlocking of the vehicle doors; the physical object is a manual control of the vehicle; the identifier of the user is an identifier of the user terminal; the method further comprises, in the case of successful authentication, a step of initializing a counter within the server and within the electronic unit; the counter is initialized at the initialization step with an initialization value stored within the server and within the electronic unit; the counter is incremented periodically with a period 3031268 3 stored within the server and within the electronic unit; the communication step is performed by transmission, for example by means of the user terminal, of the identifier of the user and the identifier associated with the vehicle; 5 - the communication step is performed by entering, at the server, the identifier of the user and the identifier associated with the vehicle. The registration method may further comprise the following steps: downloading, from the server to the terminal, of an application (for example pre-customized) containing a specific message intended for an electronic control entity corresponding to the associated identifier to the vehicle; - Transmission, because of the execution of the application on the terminal, the specific message to the control unit of the vehicle. The functionality is for example the unlocking or locking of the vehicle doors, or the locking or unlocking of the trunk of the vehicle, or the locking or unlocking of the glove box of the vehicle, or the starting or stopping of the engine of the vehicle. DETAILED DESCRIPTION OF AN EXEMPLARY EMBODIMENT The following description with reference to the accompanying drawings, given by way of non-limiting example, will make it clear what the invention consists of and how it can be achieved. In the accompanying drawings: FIG. 1 represents an exemplary context in which the invention may be implemented, notably comprising a vehicle and a user terminal; FIG. 2 diagrammatically represents components useful for understanding the invention, the vehicle and the user terminal of FIG. 1; FIG. 3 shows the main steps of a method of registration with a service of control of functionalities of the vehicle by means of the user terminal; FIG. 4 shows the main steps of an exemplary method of controlling a vehicle functionality by means of the user terminal; and FIG. 5 shows the main steps of another exemplary method of registering a vehicle function control service by means of the user terminal. [0003] FIG. 1 represents an example of context in which the invention can be implemented. In this context, a vehicle 10 comprises an electronic control unit 11 (or ECU for "Electronic Control Unit") which can communicate via a wireless link with a user terminal 20, for example a mobile phone (or cell phone ), possibly of "smart phone" or "smartphone" type according to the commonly used English name, in order to exchange data with this user terminal 20, for example with a view to controlling the functionalities of the vehicle 10 by means of the terminal 10 user (such a feature can be for example the unlocking of the doors of the vehicle 10), as explained below. The wireless link used to communicate between the electronic control unit 11 and the user terminal 20 is for example of the Bluetooth type. The user terminal 20 is furthermore designed to connect to a mobile telephone network 30 which notably comprises a base station 32 in communication via a radio link with the user terminal 20 and a gateway 34 for connection to a public network 40. for example the Internet network. A server 50 is also connected to the public network 40 so that the user terminal 20 and the server 50 can communicate and exchange data via the mobile network 30 and the public network 40. The server 50 is here managed by the manufacturer of the electronic control unit 11. FIG. 2 schematically represents components useful for understanding the invention, the vehicle 10 and the user terminal 20. [0004] The vehicle 10 comprises in particular the electronic control unit 11 already mentioned, an actuator 15 (designed here to allow the unlocking of the doors of the vehicle 10), an actuator 17 (designed to allow the vehicle to start), a communication module wireless 16 and a user interface 18. [0005] A VID identification number is assigned to the vehicle 10 and an N serial number is assigned to the electronic control unit 11. The association between the VID identification number of a vehicle 10 and the serial number N of the electronic control unit 11 which equips this vehicle 10 is stored in a database D managed by the server 50 (which may be the manufacturer of the vehicle 303 or a supplier). The electronic control unit comprises a processor 12 and a storage unit 14, for example a rewritable non-volatile memory or a hard disk. [0006] The storage unit 14 stores in particular computer programs comprising instructions whose execution by the processor 12 allows the implementation by the electronic control unit 11 of the methods described below. The storage unit 14 also stores data used in the processes described below, including a cryptographic key PrK (for example a private key) and a root key (or master key) MK, used as explained in FIG. after. The cryptographic key PrK and / or the root key MK are for example written in the storage unit 14 during the manufacture of the electronic control unit 11, before mounting of this electronic control unit 11 in the vehicle 10. The cryptographic key PrK and the root key MK are also stored at the server 50 (which is recalled that it is managed by the manufacturer of the electronic control unit 11), in association with the serial number N of the In some applications described hereinafter, the storage unit 14 also stores construction information of a diversified counter, for example an initial value I of the counter and a duration of step P. Information can also be written in the storage unit 14 during the manufacture of the control electronics unit 11, before mounting of this electronic control unit 11 into the control unit 11. 10, and stored otherwise at the server 50, in association with the serial number N of the electronic control unit 11. This counter is diversified in the sense that the counter construction information (here the initial value I and the duration of the pitch P) differ from one electronic control unit to another, and therefore from one vehicle to another. In other words, each electronic control unit (and therefore each vehicle) stores counter construction information of its own. The server S thus memorizes, as already indicated, this construction information 3031268 6 of the counter in association with each serial number of electronic control unit. The user terminal 20 comprises a processor 22, a memory 24 (for example a non-volatile memory rewritable), a wireless communication module 26 and a communication module 28 on the mobile telephone network 30. The communication module without wire 26 of the user terminal 20 makes it possible to establish a wireless link (here Bluetooth type as already indicated) with the wireless communication module 16 of the vehicle 10 through which the processor 12 of the electronic control unit 11 and the processor 22 of the user terminal 20 can exchange data, in particular as explained below. The communication module 28 allows the user terminal 20 (and specifically the processor 22 equipping this user terminal 20) to exchange 15 as already indicated data with other devices connected to the mobile telephone network 30 or the public network 40, in particular with the server 50. In some embodiments, the communication module may include a smart card that stores connection data associated with a subscription to the mobile telephony service and makes it possible to establish the connection on the mobile telephone network. 30. Figure 3 shows the main steps of a registration process (or enrollment) to a service of control of functionalities of the vehicle 10 by means of the user terminal 20. It is noted that before the implementation of such a method, the user terminal 20 is not specifically prepared for controlling the functionality of the vehicle 10 and does not include any data as 10. Thus, for example, the mobile phone commonly used by the vehicle owner 10. Likewise, prior to the implementation of the method, the user terminal 20 is unknown to the vehicle 10 which does not belong to the vehicle 10. is therefore aware of any data associated with this user terminal 20. It is considered that, for the implementation of the method of Figure 3, a user U (according to one embodiment: the owner of the vehicle 10; in another embodiment, a person in charge of putting the vehicle 10 into service has access to the vehicle 10 (also referenced V in FIG. 3) by conventional means (for example a physical key). In the embodiment described here, the user U carries and uses the user terminal 20 which, as described above, is in communication on the one hand with the electronic control unit 11 via a wireless link (for example). example Bluetooth type) and secondly with the server 50 (referenced S in Figure 3) via a radio link to the base station 31, then via the mobile network 30 and the public network 40. The terminal User 20 can thus be used, in the embodiment described here, as a gateway for data exchange between the vehicle V (specifically the electronic control unit 11) and the server S, as described hereinafter. As a variant, other communication means could be used between the vehicle V (ie the electronic control unit 11) and the server S, for example a communication module (sometimes referred to as a "Telematic Control Unit") fitted to the vehicle. V and designed to establish a (direct) communication between the vehicle V and the mobile telephone network 30. The method of FIG. 3 starts at the step E2 to which the user U communicates with the server S (referenced 50 in FIG. ) a user ID UID 20 and a VID identifier of the vehicle V (referenced 10 in Figure 1). In one conceivable embodiment, the user U connects to do this to the server S (for example by entering the http address of the server S in a browser executed by the processor 22 of the user terminal 20) and for example captures the identifiers mentioned above UID, VID in a form then transmitted to the server S. In another feasible embodiment, an application previously installed on the user terminal 20 asks the user U to enter the identifiers and transmits them to the server 50. , the user ID UID and the identifier VID of the vehicle V may have been previously entered at the server S, for example during the purchase of the vehicle V. The user ID UID includes for example the first and last name (s) of the user, as well as possibly his date of birth. However, another type of data could alternatively be used to identify the user; thus, the user identifier could be an electronic address, a telephone number (for example the number assigned to the mobile phone service subscription, such as a MSISDN number) or a user terminal identifier. the user U (such as an IMEI number). The VID identifier of the vehicle is for example of the "Vehicle 5 Identification Number" type. However, it would be possible alternatively to use another identifier associated with the vehicle 10, in particular the serial number N of the electronic control unit 11 of the vehicle 10. The server S receives the user identifier U and the vehicle identifier VID at the same time. step E4 and memorizes these identifiers, at this step in an area dedicated to the 10 vehicles for which the registration to the service of control of functionalities of the vehicle by means of the user terminal is in progress. The serial number N of the electronic control unit 11 is for example communicated by the user U to the server S, for example during the step E2. To do this, the serial number N is provided in advance to the user: it is for example printed on a label stuck in the vehicle user manual and / or accessed by the user via the interface. 18. The server S can thus determine in step E10 the cryptographic key PrK stored (as described above) in association with this serial number N. [0007] The server S then generates a challenge (in English "challenge"), for example random number RND (step E12). The server S then calculates in step E14 a response RESP associated with this challenge by applying a cryptographic function f using the cryptographic key PrK, which can be written: RESP = f (RND, PrK). [0008] The server S can thus emit at step E16 the RND challenge and part of the RESP response, here a LSB ("Least Significant Byte") word forming part of the RESP response, to the vehicle V of the electronic control unit 11. It is recalled as already indicated that the server S (referenced 50 in FIG. 1) communicates here with the electronic control unit 11 via the user terminal 20. The unit The control electronics 11 receives the challenge RND and the response part LSB and in turn calculates in step E18 the expected response RESP 'by application to the challenge RND received from the cryptographic function f using the cryptographic key PRK stored as indicated. higher in the memory unit 14: RESP '= f (RND, PrK). The electronic control unit 11 then verifies in step E20 that the LSB 'part (corresponding to the part of the RESP response received, here the least significant word) of the response RESP' calculated in step E18 is it is equal to the LSB response part received from the server S. If this equality is not verified, the electronic control unit 11 proceeds to the step E21 which terminates the registration process. In fact, this means that the cryptographic key used in the calculation of step E14 differs from that used in the calculation of step E18 and that an error has therefore occurred (for example because of the sending a wrong vehicle identifier in step E2). An error message can then for example be displayed on the user interface 18 of the vehicle V. If equality is verified, the electronic control unit 11 emits at step E22 another part of the response RESP ' calculated in step E18, here a most significant word MSB '(for "Most Significant Byte"), to the server S. The server S receives this other part MSB' of the response RESP 'and checks at step E24 that the part MSB (corresponding to the part MSB 'of the response RESP' received, here the most significant word) of the response RESP calculated in the step E14 is equal to the response part MSB 'received from of the electronic control unit 11. If this equality is not verified, the server proceeds to step E25 which terminates the registration processor. Indeed, this means that the partner of the server S in the communication has not been able to calculate the expected response, presumably because the partner is not the expected vehicle and therefore does not hold the cryptographic key PrK . In normal operation, equality is verified and mutual authentication has thus been performed between the server S and the electronic control unit 11. [0009] The server S then triggers the continuation of the registration process by transmitting to the electronic control unit 11 a command CMD for checking the presence of the user U in the vehicle V (step E26). Upon receipt of the command CMD, the electronic control unit 11 at step E28 generates the generation by the user interface 18 of an indication asking the user U to perform one or more action (s) ACT. This indication may be a visual indication (for example a light signal or a display on a screen of the user interface 18) and / or sound 5 (for example a particular sound or a voice message). The requested action (s) can understand the use of the physical key (for example, the support, possibly simultaneous, on one or more buttons of the physical key, or the start and / or the stopping the motor with the physical key) and / or an action of the user U on the vehicle V, for example pressing a button of the user interface 18, opening and / or closing of the door, and / or starting and / or stopping the engine. The user performs the action (s) requested ACT (s) in step E30. The electronic control unit 11 detects in step E32 whether the action performed by the user U corresponds to the requested action ACT (leaving for example a predetermined duration for the user to perform the action) . In case of failure (that is to say if the user U does not perform the requested actions within the allotted time), the electronic control unit 11 proceeds to the step E34 which ends the registration process. An error message 20 may further be displayed on the user interface 18 of the vehicle V. On the other hand, if the user correctly performs the requested actions ACT in the allotted time, it is considered that all the conditions required to perform the registration are completed and the vehicle feature control service through the user terminal can be started. [0010] It will be noted that it is possible to envisage other conditions for validating the registration, for example the entry at the user interface 18 of the vehicle 10 with a single-use code received and displayed by the terminal. 20. Such a single-use code can be sent by the server 50 to the user terminal 20 via the public network 40, for example when the application is executed, which, in certain embodiments, entering the identifiers in step E2, as indicated above. Alternatively, the one-time code could be transmitted (eg as a short message or SMS, for "Short Message System") to the user terminal 20 using the telephone number (MSISDN number) associated with the subscription used by the user terminal 20, in particular when this number forms the user identifier, as also envisaged above. In the latter case, the server 50 is designed to transmit data over the telephone network. In some embodiments, it is then possible to start a counter within the electronic control unit 11, using the construction information stored in the storage unit 14 as already indicated: in the embodiment described here, the counter is initialized to the initial value I and incremented periodically with the period P (step E36). When the counter is stored on a given number of bits, it is reset when an incrementation resulting in an overflow (or "overfloW" according to the English name sometimes used) of the maximum value (determined by the number of bits). The electronic control unit 11 also sends to the server S a message indicating that the presence of the user has been detected (by the ACT actions that he has carried out at the request of the user. electronic control unit 11) and that the service can be started (step E38) .The server S receives this message and, in the case where a counter is used, also starts the counter within it (step E40), in association with the vehicle identifier VID and on the basis of the construction information 20 stored in association with the serial number N of the electronic control unit 11, here the initial value I and the period P of incrementation of the counter. The counter therefore evolves in parallel within the control unit 11 and within the server S, possibly with a very small offset between the counter stored in the electronic control unit 11 and the counter 25 stored in the server. 50 (due in particular to the short time between steps E36 and E40), which is however not detrimental. The server S can then decide on the definitive enrollment of the user U in the service and memorizes for this purpose in association, in a storage area of the subscribers of the service, the user identifier UID, the vehicle identifier VID and, in the case where a counter is used, the current value of the counter (which will be incremented periodically with the period P), as well as possibly the serial number N (step E42). The user ID UID and the vehicle identifier VID stored in association can be considered as an electronic certificate of ownership of the vehicle for the proposed service. [0011] The server S can then communicate to the user U rights of access to the control service of the functionalities of the vehicle, for example by transmitting to the user terminal 20 a virtual key VK authorizing the user terminal 20 to control these functions (eg opening the vehicle doors), as in the examples presented below. The virtual key VK is stored in the user terminal 20 (step E44). In practice, the virtual key VK can be transmitted from the server 50 to an application previously downloaded into the memory 24 of the user terminal 20 and executable by the processor 22 of the user terminal 20, for example the application allowing the implementation of the step E2 as envisaged above. As a variant, the virtual key VK could be transmitted to the user terminal 20 by using the telephone number (MSISDN number) associated with the subscription used by the user terminal 20, in particular when this number forms the user identifier, as is also envisaged. above. [0012] FIG. 4 shows the main steps of an exemplary method of controlling a vehicle V functionality (referenced 10 in FIG. 1) by means of the user terminal T (of the type of that referenced in FIG. 1). Other steps than those described below can naturally be implemented in practice, in particular beforehand in order to establish a communication channel 20 between the electronic control unit 11 of the vehicle 10 and the user terminal 20. The control method described here is particularly well suited to the case where the vehicle V is rented to a user for a predefined period of time. [0013] To do this, a temporary virtual key VK is used, derived taking into account the value NB1 of the counter (installed in parallel in the electronic control unit 11 of the vehicle V and in the server S as indicated above) at the beginning. the rental period and the NB2 value of the meter at the end of the rental period. [0014] In order to generate the virtual key VK, the server S receives, for example from the vehicle renter, the vehicle identifier VID, the rental start time and the end time of rental and determines, on the basis of the construction information. 1, the value NB1 of the counter set up in the electronic control unit 11 concerned (whose serial number N is associated with the received vehicle identifier VID, continued for example to the method of Figure 3) and corresponding to the rental start time, and NB2 value of this counter corresponding to the end of rental time. The virtual key VK is then generated using the root key MK 5 (stored as indicated above in association with the serial number N), the start value NB1 and the end value NB2, for example by application of a derivation function g to these elements: VK = g (MK, NB1, NB2). The server S then transmits the virtual key VK and the values NB1, NB2 to the usual terminal T (for example a mobile phone) of the user (renter of the vehicle), for example after a verification step that this usual terminal T is eligible for service (based on a terminal identifier, such as an IMEI number, and / or a subscriber number associated with the terminal, such as a MSISDN number); the virtual key VK and the values NB1, NB2 are then stored within the terminal T. (Note that the terminal T used here is therefore not generally that used in the context of FIG. 3). in order to control the functionality of the vehicle V by means of the terminal T. To do this, the terminal T issues in step E102 a request to implement the functionality, accompanied by the start value NB1 and the value of end NB2, to the electronic control unit 11 of the vehicle V (step E102). The electronic control unit 11 then verifies in step E104 that the current value of the counter which it uses is indeed between the value NB1 and the value NB2 (which means, according to the construction described above). 25 above the values NB1 and NB2, that the current time is included in the rental period). If not, the electronic control unit 11 terminates the process in step E106 without performing the required functionality (i.e., without unlocking the vehicle doors V). A failure message may optionally be transmitted to the terminal T for displaying on the terminal T a corresponding indication. In the case of positive verification in step E104, the method continues in step E108 at which the electronic control unit 11 calculates the virtual key VK on the basis of the root key MK (stored as indicated above in 303 126 8 14 the storage unit 14), the start value NB1 and the end value NB2, according to the same calculation as that carried out as indicated above within the server S, here by applying the derivation function g to these elements: the electronic control unit 11 calculates in this case VK = g (MK, NB1, NB2). [0015] The electronic control unit 11 then generates in step E110 a challenge, for example a random number RND ', and issues this challenge to the user terminal T. The user terminal T receives this challenge in step E112. In step E114, the user terminal T (i.e., in practice, its processor) applies to the received challenge RND 'a cryptographic function h using the virtual key VK (received from the server S in advance as indicated below. above) and thus obtains a response R: R = h (RND ', VK). Other data may possibly be used in the calculations performed at this step, for example the vehicle identifier VID. [0016] In parallel, the electronic control unit performs in step E115 an identical calculation (in normal operation) in order to obtain on its side the expected response; we note here R 'the result of this calculation: R' = h (RND ', VK). The user terminal T transmits the expected response R (calculated in step E114) to the electronic control unit 11 (step E116). [0017] The electronic control unit 11 then checks in step E118 that the response R received from the user terminal T is equal to the expected response R ', to which the electronic control unit 11 can consider that the user terminal T holds the virtual key VK which gives a right of access to the vehicle. If the verification at step E118 fails (which is not the case in the normal operation described above, but may be the case when a malicious person tries to access the vehicle without knowing the virtual key VK), the electronic control unit 120 terminates the method in step E120 without performing the required functionality (that is to say here without unlocking the doors of the vehicle V). A failure message may optionally be transmitted to the terminal T for displaying on the terminal T a corresponding indication. When the equality between the response R received from the user terminal T and the expected response R 'calculated by the electronic control unit 11 is verified at step E118, step E122 is carried out at which the electronic unit of The control performs the requested functionality, here the unlocking of the vehicle doors, by issuing a corresponding command to the actuator 15 (or, in the case of starting the vehicle, to the actuator 17). In the example just described, a simple authentication is used; however, it is possible alternatively to use mutual authentication, for example when the desired functionality is the starting of the vehicle. Moreover, in the case just described, a temporary virtual key VK is used, particularly suitable for renting vehicles. In other embodiments, it is possible to use a fixed virtual key VK, for example stored in the storage unit 14 instead of the root key MK. The steps E102 and E110 to E122 described above, allowing the control of the vehicle functionality with the user terminal, can then be implemented using this fixed virtual key. The user terminal where the virtual key VK is stored may in this case be the user terminal used in the method of FIG. 3. Furthermore, the counter mentioned above may not be used, in which case the steps E36, E40 and E104 to E108 are omitted, and step E102 consists of a simple request to implement the functionality, without appended counter values. [0018] FIG. 5 shows the main steps of another exemplary method of registering with a vehicle feature control service 10 by means of the user terminal 20. This method starts at step E200 during which the user U (usually the owner of the vehicle V) communicates the serial number N of the electronic control unit 11 and its UID (for example an identifier of the user terminal 20, such as the IMEI number or the associated subscriber number MSISDN) to the server S. It is understood that in the present embodiment, the serial number N is used as the identifier associated with the vehicle 10. [0019] To communicate this information to the server S, the user U connects for example to a website associated with the server S and can then enter the information N, UID in a form subsequently transmitted to the server S. These operations can optionally be carried out at means of the terminal 20, but also by means of a personal computer of the user U. [0020] The server S receives the information N, UID in step E202 and stores it, for example in a storage zone dedicated to the vehicles for which the registration to the service of control of functionalities of the vehicle by means of the user terminal. is in progress. [0021] It will be noted that, alternatively, this information N, UID could be entered at the level of the server S at the time of the purchase of the vehicle V (the user U then providing the information concerning him to the organization managing the server S) . The server S then prepares in step E204 an APP application intended for the terminal 20 and which contains a specific message MSG (designed to be read only by the electronic control unit 11 whose serial number N has been received at the terminal. step E202) and a derivation key K specific to the APP application. The server S notably stores the derivation key K in association with the previously stored information N, UID. [0022] The APP application is downloaded and installed on the terminal 20 (hereinafter referred to as the T terminal) in step E206. For this purpose, the server S for example transmits an https link to the terminal 20 (for example by using the subscriber number MSISDN supplied at the step E200 as an identifier UID, or provided at the step E200 in addition to the identifier UID), which link is then used by the user U to carry out the download of the APP application on the terminal T. During a subsequent step E208 (which can be separated from the step E206 of a time more or less long), the user U starts the execution of the APP application on the terminal T. After a phase of initialization of the wireless link between the wireless communication module 16 of the vehicle V and the module 26 of the terminal T, the application APP causes the transmission of the specific message MSG to the electronic control unit 11 of the vehicle V. The specific message MSG is received in step E210 by the unit 11, which verifies that this specific message MSG is well suited for him. If this verification is not done correctly, the registration process is terminated. If the electronic control unit 11 is indeed the intended recipient of the specific message MSG, the electronic control unit 11 sends in step E210 an authentication request to the server S, accompanied by an example of its number. N series (or another identifier of the electronic control unit 11). Such a request is for example transmitted from the electronic control unit 11 to the server S via the terminal T (as already explained with regard to the embodiment of FIG. 3). For this purpose, the APP APP implements for example an IP address of the server 50 and transmits to this address the response it receives from the electronic control unit 11. As a variant, this request could be transmitted by means of a vehicle communication module V. The server S receives the authentication request and the serial number N 10 and then transmits in step E212 a challenge X to the terminal T (including an identifier or a subscription number associated is stored as already indicated at the server S in association with the identifier associated with the vehicle, here the serial number N). The terminal T receives the challenge X and applies to this challenge X (step E214) a cryptographic function using the derivation key K, previously received with the APP application (see the step E206 described above), which allows to obtain a derived data Y: Y = d (X, K). The derived data Y is transmitted from the terminal T to the electronic control unit 11 of the vehicle V via the wireless link established as indicated above in step E208. The electronic control unit 11 receives the derived data Y and calculates in step E216 a response Z by applying to this derived data Y a cryptographic function f using the cryptographic key PrK stored as indicated above in the storage unit 14 : Z = f (Y, PrK). [0023] The electronic control unit 11 transmits the response Z calculated in step E216 to the server S, for example via the terminal T as indicated above (or alternatively by means of a communication module fitted to the vehicle V). The server S receives the response Z and can thus verify in step E218 that this response Z is the expected response f (d (X, K), PrK). Indeed, the server S stores, in association with the serial number N of the electronic control unit 11, the cryptographic key PrK (as described above with reference to FIG. 2) and the derivation key K (see above step E204); the server S is also aware of the challenge X that it issued in step E212. [0024] If the response Z received from the electronic control unit 11 does not correspond to the expected response f (d (X, K), PrK), the registration process is terminated. If the response Z received from the electronic control unit 11 corresponds to the expected response f (d (X, K), PrK), this means that the terminal T and the electronic control unit 11 of the vehicle V , who have each participated in the production of the response Z (each using information specific to them), are those respectively associated with the user U (identified by his UID identifier) and the vehicle V (identified here by the serial number N): the server S has thus been able to authenticate the terminal T and the electronic control unit 11. The server S then decides on the definitive registration of the user U to the service control service of the vehicle V by means of the terminal T and memorizes for this purpose in step E220, in a storage area of the subscribers of the service, in association with the user identifier UID (for example, as already indicated, an identifier associated with the terminal T) and identified it associated with the vehicle (here the serial number N). The server S can then communicate to the user U rights of access to the control service of the functionalities of the vehicle, for example by transmitting (step E222) to the terminal T a virtual key VK allowing the terminal T to control these functions, as in the examples presented above. The virtual key VK can thus be stored in the user terminal T (step E224). It may be provided in some embodiments that the access rights are not transmitted immediately after the definitive registration, but subsequently, for example after transmission of an electronic message to the user U (at an electronic address provided by example in step E200) and confirmation of the activation of the service by the user U in response to this electronic message, for example by entering at the terminal T of a code 30 mentioned in the electronic message.
权利要求:
Claims (15) [0001] REVENDICATIONS1. A method of registering a user (U) with a service of controlling at least one feature of a vehicle (10; V) by means of a user terminal (20; T), characterized in that comprises the following steps: - communication of a user identifier (UID) (U) and an identifier (VID; N) associated with the vehicle (10; V) to a server (50; S); - Authentication of an electronic unit (11) of the vehicle (10; V) by the server (50; S); in the case of successful authentication, registration of the identifier (UID) of the user (U) and the identifier (VID; N) associated with the vehicle (10; V) in association with the server (50; 5). [0002] The registration method according to claim 1, wherein the authentication comprises a step (E14) of use by the server (50; S) of a stored cryptographic key in association with a reference (N) of the electronic unit (11). [0003] An enrollment method according to claim 1 or 2, wherein the authentication comprises data exchanges (E16, E22) between the server (50; S) and the electronic unit (11) via the user terminal (20). T). 20 [0004] The registration method according to one of claims 1 to 3, wherein the authentication step is part of a mutual authentication process between the server (50; S) and the electronic control unit ( 11). [0005] The registration method according to one of claims 1 to 4, comprising a step of detecting an action of the user (U) on a physical object related to the vehicle (10; V), the inscription being further conditioned by said detection. [0006] 6. Registration method according to claim 5, wherein the detection step (E32) is implemented only in case of successful authentication. [0007] 7. The registration method according to claim 6, comprising, in the event of successful detection, a transmission step (E38) by the electronic unit (11) of a service launch message to the server (50). S), said registration (E42) being performed by the server (50; S) upon receipt of the service launch message. [0008] 8. Method according to one of claims 5 to 7, wherein the physical object is a physical key adapted to control the unlocking of the vehicle doors (10; V). [0009] 9. Method according to one of claims 1 to 8, comprising the following steps: downloading (E206), from the server (50; S) to the terminal (20; T), an application (APP) containing a message specific object (MSG) for an electronic control entity corresponding to the identifier (VID; N) associated with the vehicle (10; V); - Transmission (E208), due to the execution of the application (APP) on the terminal (20; T), the message specific to the control unit (11) of the vehicle 10 (V). [0010] 10. Method according to one of claims 1 to 9, wherein the identifier (UID) of the user (U) is an identifier of the user terminal (20; T). [0011] 11. Method according to one of claims 1 to 10, further comprising, in case of successful authentication, a step of initialization (E36; E40) of a counter within the server (50; S) and within of the electronic unit (11). [0012] The method of claim 11, wherein the counter is initialized at the initialization step (E36; 40) with an initialization value stored within the server (50; S) and within the electronic unit. (11), and wherein the counter is incremented periodically with a stored period within the server (50; S) and within the electronic unit (11). [0013] 13. Registration method according to one of claims 1 to 12, comprising, following said registration, a step of issuing a virtual key (VK) to the terminal (20; T). [0014] 14. Method according to one of claims 1 to 13, wherein the communication step is performed by transmitting, by means of the user terminal (20; T), the identifier (UID) of the user (U). and the identifier (VID; N) associated with the vehicle (10; V) to the server (50; S). [0015] 15. Method according to one of claims 1 to 13, wherein the communication step is performed by entering, at the server (50; S), the identifier (UID) of the user (U) and the identifier (VID; N) associated with the vehicle (10; V).
类似技术:
公开号 | 公开日 | 专利标题 FR3031268A1|2016-07-01|METHOD FOR REGISTERING A USER WITH A SERVICE FOR CONTROLLING A FUNCTIONALITY OF A VEHICLE USING A USER TERMINAL EP3271901B1|2020-09-02|Electronics unit, method carried out in an electronics unit of said type, method for sharing a time frame between a server and an electronics unit, and method for synchronizing a server and an electronics unit EP2284803B1|2013-03-13|Secure system for programming electronically controlled lock devices using encoded acoustic verifications EP3269108A1|2018-01-17|Method for secure transmission of a virtual key and method for authentication of a mobile terminal FR3034550A1|2016-10-07|METHOD FOR LOADING A KEY WITHIN A USER TERMINAL AND ASSOCIATED USER TERMINAL EP2306407B1|2013-06-19|Secure system for programming electronically controlled lock devices using encoded acoustic verifications EP3308564B1|2020-11-18|Procédé de chargement d'une clé virtuelle et terminal utilisateur associé EP2912594B1|2019-04-10|Method of providing a secured service WO2016034810A1|2016-03-10|Electronic ticket management EP3568965A1|2019-11-20|Two-step authentication method, device and corresponding computer program WO2016135418A1|2016-09-01|Method for securing a service enabling the control of motor vehicles by means of mobile terminals FR2945141A1|2010-11-05|Contactless payment application e.g. local payment application, management method for mobile telephone, involves finalizing payment session if verification indicator is informed, and resetting indicator when session is completed EP3474583A1|2019-04-24|Methods of loading a profile in a secure element, manager and customisable secure element WO2018029564A1|2018-02-15|System and method for authentication of a user of an application system by a central server, without using a password FR2976437A1|2012-12-14|METHOD FOR SECURING AN ACTION THAT AN ACTUATOR DEVICE MUST ACCOMPLISH AT A USER'S REQUEST FR2913551A1|2008-09-12|User authenticating method for use in Internet network, involves authenticating authentication server by token and vice versa for each of web pages requested by user, by executing control script e.g. java script, in computer WO2020064890A1|2020-04-02|Method for processing a transaction, device, system and corresponding program EP3928272A1|2021-12-29|Method for processing a payment transaction, and corresponding device, system and programs FR3042362A1|2017-04-14|MEANS FOR MANAGING ACCESS TO DATA EP1398983B1|2007-07-11|Method for remotely programming a mobile phone and implementation system WO2017174888A1|2017-10-12|Method for pairing between a connected peripheral device and a community EP3465602A1|2019-04-10|Method for providing personal information of a user requested by a given online service
同族专利:
公开号 | 公开日 FR3031268B1|2017-01-13| CN107211002A|2017-09-26| JP2018508858A|2018-03-29| US20180012272A1|2018-01-11| EP3265344A1|2018-01-10| US11004124B2|2021-05-11| CN107211002B|2021-05-18| WO2016108012A1|2016-07-07|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US6253980B1|1999-07-07|2001-07-03|Honda Giken Kogyo Kabushiki Kaisha|Shared vehicle system and method with system for carrying a first vehicle with a second vehicle| WO2001061604A1|2000-02-16|2001-08-23|Zipcar, Inc|Systems and methods for controlling vehicle access| US20060072756A1|2002-09-16|2006-04-06|Swisscom Ag|Computer-based vehicle reservation system and method for a computer-based vehicle reservation system| WO2008044093A1|2006-10-11|2008-04-17|Renault Trucks|Customer identification device, keyless access system for vehicle, vehicle sharing system including such a device and methods using such a device| US20100148923A1|2008-12-17|2010-06-17|Toyota Jidosha Kabushiki Kaisha|Vehicle on-board biometric authentication system| US20120095642A1|2010-10-19|2012-04-19|Toyota Jidosha Kabushiki Kaisha|In-vehicle device, vehicle authentication system and data communication method| JP4068512B2|2003-06-10|2008-03-26|株式会社東芝|COMMUNICATION DEVICE, PORTABLE TERMINAL DEVICE, COMMUNICATION SYSTEM, COMMUNICATION CONTROL PROGRAM, AND COMMUNICATION CONTROL METHOD| JP4041090B2|2004-04-06|2008-01-30|本田技研工業株式会社|Remote locking / unlocking control device for vehicle| US7482142B1|2004-05-07|2009-01-27|Roche Molecular Systems, Inc.|High-risk human papillomavirus detection| JP2007004499A|2005-06-24|2007-01-11|Mazda Motor Corp|Program data distribution system| JP4554473B2|2005-08-26|2010-09-29|パナソニック株式会社|Content server device| DE102006015212B4|2006-03-30|2017-05-04|Bundesdruckerei Gmbh|Method for protecting a movable good, in particular a vehicle, against unauthorized use| JP4923974B2|2006-09-05|2012-04-25|株式会社デンソー|Wireless communication system and in-vehicle device| JP2009127285A|2007-11-22|2009-06-11|Toyota Motor Corp|Electronic key system, electronic key device for vehicle, and unlocking method| JP5120059B2|2008-05-09|2013-01-16|トヨタ自動車株式会社|Mobile terminal, communication method and program, and service providing method| JP5574611B2|2009-03-26|2014-08-20|株式会社Jsol|Electronic unlocking system, server, user terminal, electric lock terminal, and information processing method| JP5788636B2|2009-12-16|2015-10-07|ソニー株式会社|Electric vehicle, management device, drive management method, and charging device| DK177237B1|2010-12-30|2012-07-30|Jcdecaux Sa|Procedure for the rental of bicycles and facilities for use in the exercise thereof.| JP2012172325A|2011-02-18|2012-09-10|Kddi Corp|Smart key system of vehicle, vehicle operation method by smart key, and program| JP2012221224A|2011-04-08|2012-11-12|Tokai Rika Co Ltd|Car sharing system| JP5479408B2|2011-07-06|2014-04-23|日立オートモティブシステムズ株式会社|In-vehicle network system| JP5950225B2|2012-01-10|2016-07-13|クラリオン株式会社|Server device, in-vehicle terminal, information communication method, and information distribution system| JP5996872B2|2012-01-11|2016-09-21|株式会社東海理化電機製作所|Lending system| JP5729337B2|2012-03-21|2015-06-03|株式会社デンソー|VEHICLE AUTHENTICATION DEVICE AND VEHICLE AUTHENTICATION SYSTEM| US8768565B2|2012-05-23|2014-07-01|Enterprise Holdings, Inc.|Rental/car-share vehicle access and management system and method| JP2014235537A|2013-05-31|2014-12-15|Jx日鉱日石エネルギー株式会社|System capable of storing supply information and vehicle information for each driver| JP6190188B2|2013-07-05|2017-08-30|クラリオン株式会社|Information distribution system and server, in-vehicle terminal, communication terminal used therefor| US8646060B1|2013-07-30|2014-02-04|Mourad Ben Ayed|Method for adaptive authentication using a mobile device| CN103746969A|2013-12-24|2014-04-23|深圳市领华卫通数码科技有限公司|Vehicle terminal authentication method and authentication server| DE102014200116A1|2014-01-08|2015-07-09|Robert Bosch Gmbh|Method and device for enabling functions of a control unit|WO2017209310A1|2016-06-03|2017-12-07|株式会社ミックウェア|Information processing system, information processing terminal, information processing method, and information processing program| JP6846991B2|2016-07-05|2021-03-24|パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America|Anomaly detection electronic control unit, in-vehicle network system and anomaly detection method| US10189443B2|2016-11-10|2019-01-29|GM Global Technology Operations LLC|Virtual key for vehicle servicing| US10771450B2|2018-01-12|2020-09-08|Blackberry Limited|Method and system for securely provisioning a remote device| JP6640906B2|2018-04-24|2020-02-05|株式会社東海理化電機製作所|Key information generation system and key information generation method| US10715471B2|2018-08-22|2020-07-14|Synchronoss Technologies, Inc.|System and method for proof-of-work based on hash mining for reducing spam attacks| CN110239484B|2019-06-28|2020-09-25|江苏恒宝智能系统技术有限公司|Vehicle lock remote security control system and method|
法律状态:
2015-12-31| PLFP| Fee payment|Year of fee payment: 2 | 2016-07-01| PLSC| Publication of the preliminary search report|Effective date: 20160701 | 2016-12-29| PLFP| Fee payment|Year of fee payment: 3 | 2018-01-02| PLFP| Fee payment|Year of fee payment: 4 | 2019-12-31| PLFP| Fee payment|Year of fee payment: 6 | 2020-12-31| PLFP| Fee payment|Year of fee payment: 7 | 2021-12-31| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1463430A|FR3031268B1|2014-12-30|2014-12-30|METHOD FOR REGISTERING A USER WITH A SERVICE FOR CONTROLLING A FUNCTIONALITY OF A VEHICLE USING A USER TERMINAL|FR1463430A| FR3031268B1|2014-12-30|2014-12-30|METHOD FOR REGISTERING A USER WITH A SERVICE FOR CONTROLLING A FUNCTIONALITY OF A VEHICLE USING A USER TERMINAL| PCT/FR2015/053719| WO2016108012A1|2014-12-30|2015-12-22|Method for signing up a user to a service for controlling at least one vehicle functionality by means of a user terminal| CN201580070427.1A| CN107211002B|2014-12-30|2015-12-22|Method for registering to a service for controlling at least one vehicle function by means of a user terminal| JP2017535070A| JP2018508858A|2014-12-30|2015-12-22|Method for signing up a user for a service that controls the function of at least one vehicle at a user terminal| US15/540,347| US11004124B2|2014-12-30|2015-12-22|Method for signing up a user to a service for controlling at least one vehicle functionality by means of a user terminal| EP15823702.4A| EP3265344A1|2014-12-30|2015-12-22|Method for signing up a user to a service for controlling at least one vehicle functionality by means of a user terminal| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|