CN105976466B - Automobile entrance guard door opening method - Google Patents
Automobile entrance guard door opening method Download PDFInfo
- Publication number
- CN105976466B CN105976466B CN201610289071.7A CN201610289071A CN105976466B CN 105976466 B CN105976466 B CN 105976466B CN 201610289071 A CN201610289071 A CN 201610289071A CN 105976466 B CN105976466 B CN 105976466B
- Authority
- CN
- China
- Prior art keywords
- key
- code
- mobile phone
- character string
- key code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an automobile door control method, which comprises the following steps: the mobile phone terminal receives an authorization code input by a user and sends the authorization code to the cloud server; the cloud server verifies the authorization code, and after the authorization code is successfully verified, the cloud server generates an encryption key character string and sends the encryption key character string to the mobile phone terminal; the mobile phone terminal sends the encryption key character string to the automobile controller; the automobile controller decrypts the encrypted key character string to obtain key information, verifies the user mobile phone MAC address, the automobile identification code, the user mobile phone number and the key code in the key information respectively, and unlocks the automobile door if the verification succeeds, so that the automobile door is in an unlocking state; and if any one of the MAC address of the user mobile phone, the vehicle identification code, the user mobile phone number and the key code fails to be verified, keeping the automobile door in a locked state. The method improves the safety of the automobile entrance guard.
Description
Technical Field
The invention relates to the technical field of automobile entrance guard, in particular to an automobile entrance guard opening method.
Background
At present, with the popularization of smart phones and the maturity and application of cloud technologies, various mobile phone applications greatly facilitate the life of people. The application of various new technologies to automobiles, and automobiles become more and more intelligent. When the key is used as the automobile right, the key is sometimes forgotten to be carried and lost, and the like, so that the key is very inconvenient for a user to use. Some existing mobile phones are used for automobile entrance guard, but the existing mobile phones have the problems of high cost and safety, and the popularization is influenced.
In recent years, smart phones are used in automobile access control systems, but have problems of high cost and certain safety. The distance between a person and a vehicle is determined by sensing the distance between a mobile phone terminal carried by the person by a controller on the vehicle, the controller can be communicated with the mobile phone terminal for sensing, when the person approaches the vehicle, the controller on the vehicle senses that the distance between the mobile phone terminal carried by the person is within a relatively close range, the vehicle door is controlled to be in an unlocking state by the controller on the vehicle, and therefore the person can enter the vehicle by pulling the vehicle door open before walking to the vehicle door.
Disclosure of Invention
The invention aims to provide an automobile entrance guard opening method to improve the safety of automobile entrance guards.
In order to solve the technical problem, the invention provides an automobile entrance guard opening method, which comprises the following steps:
the mobile phone terminal receives an authorization code input by a user and sends the authorization code to the cloud server;
the cloud server verifies the authorization code, and after the verification is successful, the cloud server generates an encryption key character string and sends the encryption key character string to the mobile phone terminal;
the mobile phone terminal sends the encryption key character string to an automobile controller;
the automobile controller decrypts the encrypted key character string to obtain key information, verifies the user mobile phone MAC address, the vehicle identification code, the user mobile phone number and the key code in the key information respectively, and unlocks the automobile door if the verification succeeds, so that the automobile door is in an unlocking state; and if any one of the MAC address of the user mobile phone, the vehicle identification code, the user mobile phone number and the key code fails to be verified, keeping the automobile door in a locked state.
Preferably, the process of verifying the key code by the automobile controller includes:
the automobile controller acquires a key code and valid time from the key information and judges whether the valid time is expired; the valid time is the use time of the key code;
if yes, the key code is expired, and the key code verification fails;
if not, the key code is not overdue, the key code is compared with the correct key code stored in advance, if the key code is the same as the correct key code, the key code is correct, the key code is verified successfully, and if the key code is different from the correct key code, the key code is wrong, and the key code is verified unsuccessfully.
Preferably, the cloud server generates an encryption key string and sends the encryption key string to the mobile phone terminal, including:
the cloud server carries out encryption algorithm coding on pre-stored header information and key information to generate signature information;
the cloud server respectively carries out BASE64 encryption coding on the header information, the key information and the signature information, and combines the header information, the key information and the signature information which are subjected to BASE64 encryption coding to generate a key character string;
and the cloud server carries out AES encryption coding on the key character string to generate an encrypted key character string, and the encrypted key character string is sent to the mobile phone terminal.
Preferably, the key information includes a key code, an old key code, an update time, a valid time, a user's mobile phone number, a user's right, a user's mobile phone MAC address and a vehicle identification code.
Preferably, the automobile controller decrypts the encrypted key string to obtain key information, including:
the automobile controller carries out AES decryption on the encrypted key character string to generate a key character string;
and decrypting the key character string by using BASE64 to generate header information, key information and signature information, and acquiring the key information.
Preferably, the method further comprises:
the cloud server updates key codes in the pre-stored key information to obtain new key codes;
the cloud server generates a new encryption key character string through the new key code and sends the new encryption key character string to the mobile phone terminal, and the mobile phone terminal sends the new encryption key character string to the automobile controller;
the automobile controller decrypts the new encrypted key character string to obtain new key information, obtains a new key code from the new key information, updates a pre-stored correct key code into the new key code, and stores the new key code as the new correct key code;
after the new correct key code is stored, the automobile controller sends a successful updating response instruction to the mobile phone terminal, and the mobile phone terminal sends the successful updating response instruction to the cloud server;
and the cloud server receives the successful updating response instruction and confirms that the correct key code stored in the automobile controller is successfully updated.
Preferably, the method further comprises:
the mobile phone terminal sends the authorization code to one or more other mobile phone terminals;
the other one or more mobile phone terminals acquire the encryption key character string from the cloud server by using the authorization code and send the encryption key character string to the automobile controller;
and the automobile controller controls the door control state of the automobile door according to the encryption key character string.
The invention provides an automobile access control opening method.A mobile phone terminal receives an authorization code input by a user and sends the authorization code to a cloud server; the cloud server verifies the authorization code, and after the verification is successful, the cloud server generates an encryption key character string and sends the encryption key character string to the mobile phone terminal; the mobile phone terminal sends the encryption key character string to an automobile controller; the automobile controller decrypts the encrypted key character string to obtain key information, verifies the user mobile phone MAC address, the vehicle identification code, the user mobile phone number and the key code in the key information respectively, and unlocks the automobile door if the verification succeeds, so that the automobile door is in an unlocking state; and if any one of the MAC address of the user mobile phone, the vehicle identification code, the user mobile phone number and the key code fails to be verified, keeping the automobile door in a locked state. The obtained encrypted key character string improves the security of the key code, the vehicle door is controlled to be in a locked state or an unlocked state by verifying the MAC address of the user mobile phone, the vehicle identification code, the mobile phone number of the user and the key code, so that the vehicle door cannot be opened if any one of the verification is unsuccessful, the vehicle door can be opened only if the verification is successful, and the security of the automobile entrance guard is improved by verifying the MAC address of the user mobile phone, the vehicle identification code, the mobile phone number of the user and the key code.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of an automobile door access opening method provided by the present invention;
FIG. 2 is a schematic diagram of the generation of an encryption key string;
FIG. 3 is a schematic diagram of a process for decoding an encryption key string;
FIG. 4 is a schematic diagram of a transmission process of an encryption key string;
fig. 5 is a diagram illustrating an authorization code sharing process.
Detailed Description
The core of the invention is to provide an automobile entrance guard opening method to improve the safety of the automobile entrance guard.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for opening an automobile door lock according to the present invention, the method including:
s11: the mobile phone terminal receives an authorization code input by a user and sends the authorization code to the cloud server;
s12: the cloud server verifies the authorization code, and after the authorization code is successfully verified, the cloud server generates an encryption key character string and sends the encryption key character string to the mobile phone terminal;
s13: the mobile phone terminal sends the encryption key character string to the automobile controller;
s14: the automobile controller decrypts the encrypted key character string to obtain key information, verifies the user mobile phone MAC address, the automobile identification code, the user mobile phone number and the key code in the key information respectively, and unlocks the automobile door if the verification succeeds, so that the automobile door is in an unlocking state; and if any one of the MAC address of the user mobile phone, the vehicle identification code, the user mobile phone number and the key code fails to be verified, keeping the automobile door in a locked state.
The obtained encrypted key character string improves the security of the key code, the vehicle door is controlled to be in a locked state or an unlocked state by verifying the MAC address of the user mobile phone, the vehicle identification code, the mobile phone number of the user and the key code, so that the vehicle door cannot be opened if any one of the verification is unsuccessful, the vehicle door can be opened only if the verification is successful, and the security of the automobile entrance guard is improved by verifying the MAC address of the user mobile phone, the vehicle identification code, the mobile phone number of the user and the key code.
Based on the above method, specifically, the process of the vehicle controller verifying the key code in step S12 is as follows: the automobile controller acquires a key code and valid time from the key information and judges whether the valid time is expired; the valid time is the use time of the key code; if yes, the key code is expired, and the key code verification fails; if not, the key code is not overdue, the key code is compared with the correct key code stored in advance, if the key code is the same as the correct key code, the key code is correct, the key code is verified successfully, and if the key code is different from the correct key code, the key code is wrong, and the key code verification fails.
Whether the key code is overdue or not is judged through the valid time, the overdue key code cannot be used, whether the key code is the same as the correct key code stored in the automobile controller or not is judged, if the key code is the same as the correct key code stored in the automobile controller, the key code is correct, namely the key code is correct, the key code is verified successfully, and if the key code is different, the key code is wrong, namely the key code is wrong, and the key code is verified unsuccessfully. Under the condition that the key code is correct, if the MAC address of the user mobile phone, the vehicle identification code and the user mobile phone number are verified successfully, the vehicle controller can unlock the vehicle door, the vehicle door is in an unlocked state, and the vehicle door can be opened. Thus, the safety of the automobile entrance guard is improved through the verification of the valid period of the key code and the verification of the key code.
In step S12, the process of the cloud server generating the encryption key string and sending the encryption key string to the mobile phone terminal specifically includes: the cloud server carries out encryption algorithm coding on pre-stored header information and key information to generate signature information; the cloud server respectively carries out BASE64 encryption coding on the header information, the key information and the signature information, and combines the header information, the key information and the signature information which are subjected to BASE64 encryption coding to generate a key character string; and the cloud server carries out AES encryption coding on the key character string to generate an encrypted key character string, and the encrypted key character string is sent to the mobile phone terminal.
The key information comprises a key code, an old key code, updating time, valid time, a user mobile phone number, user authority, a user mobile phone MAC address and a vehicle identification code. The user authority comprises all key authorities, such as all functions of conventional keys of vehicle doors, a trunk, a vehicle start and the like. Specifically, the automobile controller is a vehicle Bluetooth PEPS controller.
Specifically, in step S14, the process of decrypting the encrypted key string by the vehicle controller to obtain the key information specifically includes: the automobile controller carries out AES decryption on the encrypted key character string to generate a key character string; the key string is decrypted by BASE64 to generate header information, key information, and signature information, and the key information is acquired.
Based on the method, specifically, the method further comprises the following steps:
s21: the cloud server updates key codes in the pre-stored key information to obtain new key codes;
s22: the cloud server generates a new encryption key character string through the new key code and sends the new encryption key character string to the mobile phone terminal, and the mobile phone terminal sends the new encryption key character string to the automobile controller;
s23: the automobile controller decrypts the new encrypted key character string to obtain new key information, obtains a new key code from the new key information, updates the pre-stored correct key code into the new key code, and stores the new key code as the new correct key code;
s24: after the new correct key code is stored, the automobile controller sends a successful updating response instruction to the mobile phone terminal, and the mobile phone terminal sends the successful updating response instruction to the cloud server;
s25: and the cloud server receives the successful updating response instruction and confirms that the correct key code stored in the automobile controller is successfully updated.
The cloud server updates the stored key code to obtain a new key code, and when the key code is updated, the automobile controller updates the stored correct key code, updates the correct key code into the new key code, and stores the new key code as the new correct key code.
Therefore, the cloud server updates the key code, the automobile controller also updates the stored correct key code, after the updating, if the key code obtained by the automobile controller is the original old key code instead of the updated key code, the key code obtained by the automobile controller is inconsistent with the new correct key code, the automobile door cannot be unlocked if the key code verification fails, the automobile door cannot be opened, and if the key code obtained by the automobile controller is the updated new key code instead of the original old key code, the key code obtained by the automobile controller is consistent with the new correct key code, the key code verification succeeds, the automobile door can be unlocked if the key code obtained by the automobile controller is the updated new key code, and the automobile door can be opened if the key code obtained by the automobile controller is the original old key code.
In detail, the method further comprises the following steps:
s31: the mobile phone terminal sends the authorization code to one or more other mobile phone terminals;
s32: the other one or more mobile phone terminals acquire the encryption key character string from the cloud server by using the authorization code and send the encryption key character string to the automobile controller;
s33: and the automobile controller controls the door control state of the automobile door according to the encryption key character string.
Wherein the authorization code is generated by the cloud server. Specifically, the mobile phone terminal receives user information, authorization information and authorization time input by a user and sends the user information, the authorization information and the authorization time to the cloud server, and the cloud server generates an authorization code according to the user information, the authorization information and the authorization time.
The mobile phone terminal is used as a master user to share the authorization code, the authorization code is sent to another mobile phone terminal or a plurality of mobile phone terminals to share the user, so that the user can know the authorization code, the vehicle door can be unlocked to open the vehicle door, the safety of the vehicle door is improved, the authorization code can be used for sharing, and the safety and the convenience of a key are improved.
Fig. 2 is a schematic diagram of generating an encrypted key string, in which the key string is generated by encrypting header information, key information, and signature information, respectively. The header information comprises an encryption algorithm and functions, and the key information comprises an old key code, updating time, valid time, a user mobile phone MAC address, a vehicle identification number and user authority information. The signature information is a unique signature generated by encrypting the header information and the key information code by an encryption algorithm in the header information. The header information, the key information and the signature information are respectively encrypted and encoded by BASE64 to generate a key character string in a combined mode, and finally the key character string is encrypted and encoded by AES to generate an encrypted key character string for transmission. Wherein, the AES encryption coding is AES128 encryption coding.
Fig. 3 is a schematic diagram of the process of decoding the encryption key string, in which the encryption key string is first decrypted by AES to generate the key string, and the key string is decrypted by BASE64 to generate the key, header information, key information and signature information. And then, verifying the signature information, namely verifying the key code, wherein the verification meets the requirement, and the key code is used. Wherein the AES decryption is AES128 decryption.
Fig. 4 is a schematic diagram of an encryption key character string transmission process, the cloud server generates an encryption key character string through the process of fig. 1, the encryption key character string is sent to the mobile phone through HTTP, the user obtains the encryption key character string from the cloud server through mobile phone application software on the mobile phone, the encryption key character string is stored in the mobile phone through the mobile phone application software, when the user uses the mobile phone to communicate with the automobile, the string and the encryption key character string are attached to the bluetooth PEPS controller through bluetooth and the automobile, the bluetooth PEPS controller receives the encryption key character string, the encryption key character string is decoded through the process of fig. 3, and the key code is used. The user needs to log in through the communication between the mobile phone application software and the cloud server, and the communication process is encrypted. The key information comprises a vehicle identification number which is used for vehicle authentication and can be changed when certain conditions are met; and an old key code for authentication in the process of exchanging the key code. The key information includes an update time, which is a time at which a new key code is generated.
In addition, the cloud server updates the key code, and similarly, the vehicle Bluetooth PEPS controller updates the correct key code, the cloud server updates the key code in the pre-stored key information to obtain a new key code, the cloud server generates a new encryption key character string through the new key code and sends the new encryption key character string to the mobile phone terminal, the mobile phone terminal sends the new encryption key character string to the vehicle Bluetooth PEPS controller, specifically, mobile phone application software on the mobile phone terminal sends the new encryption key character string to the vehicle Bluetooth PEPS controller, the vehicle Bluetooth PEPS controller decrypts the new encryption key character string to obtain new key information, obtains the new key code from the new key information, updates the pre-stored correct key code into the new key code, and stores the new key code as the new correct key code, after the new correct key code is stored, the vehicle Bluetooth PEPS controller sends a successful update response instruction to the mobile phone terminal, specifically, the successful update response instruction is sent to mobile phone application software on the mobile phone terminal, the mobile phone application software on the mobile phone terminal sends the successful update response instruction to the cloud server, and the cloud server receives the successful update response instruction and confirms that the correct key code stored in the vehicle controller is successfully updated.
Fig. 5 is a schematic diagram of an authorization code sharing process, in which a master user fills in information of a sharing user's mobile phone number or user name through mobile phone application software on a mobile phone terminal, selects granted authority and authorization time, submits the granted authority and authorization time to a cloud server through HTTP, and the cloud server generates a corresponding encryption key code and an authorization code and sends the authorization code to the master user through a short message. The mobile phone terminal receives an authorization code input by a master user, sends the authorization code to the cloud server, and can acquire the encryption key character string from the cloud server. The master user can also inform the authorization code to the mobile phone terminal of the sharing user through a short message of the mobile phone terminal or other modes, after the sharing user logs in through mobile phone application software of the mobile phone terminal, the generated encryption key character string is extracted from the cloud server by submitting the authorization code, and the automobile is controlled through the encryption key character string.
After a user logs in mobile phone application software on a mobile phone terminal, an encrypted key character string is obtained from a cloud server, the key information comprises user information and vehicle information, and the key code has valid time. And the user needs to log in the cloud server again to download the encrypted key character string again when the mobile phone is replaced or the key is overdue and the like. Each command of a user for operating the automobile needs to be added with an encryption key character string. The user can share the authorization code of the car with other people, the authorization code sharing process is shown in fig. 5, the master user fills information such as a mobile phone number or a user name of the sharing user through mobile phone application software, selects the granted authority and the granted time, submits the information to the server through the HTTP, the server generates a corresponding encryption key character string and the authorization code, sends the authorization code to the master user through a short message, and the master user informs the authorization code to the sharing user through the short message or other modes. After the sharing user logs in through the mobile phone application software, the sharing user obtains an encryption key code generated by the cloud server through submitting the authorization code, and the automobile is controlled through the encryption key code character string.
When the automobile Bluetooth PEPS controller detects that the key code is expired, the user is reminded to obtain a new encryption key character string from the cloud server again. The key information also comprises information such as a vehicle identification code, a user mobile phone MAC address, a user mobile phone number and the like, the vehicle can store the information when the encryption key character string is used each time, each instruction comprises the encryption key character string and is attached with the information such as the mobile phone MAC address and the like in the using process of the user, when the information changes, the user needs to download the encryption key character string again, the encryption key character string in the mobile phone is prevented from being stolen, and the safety is improved. The key information also comprises user rights, the rights comprise all key rights, such as all functions of conventional keys of vehicle doors, vehicle starting and the like, all vehicle door rights, trunk rights and the like, and a vehicle owner can share the keys to use by different people and give different rights.
Therefore, the security of the key is improved by the multi-layer encryption key code; the key information contains effective time, the key code is obtained regularly, and the security of the shared encrypted key character string is improved; the key information also contains the relevant information of the user, and is used for proofreading and recording, so that the safety is improved; the key information includes a key level and restricts the function of using the encryption key character string. The encryption key character string can be shared by others through an authorization code, the key code has expiration time and function limitation, the encryption key character string generated each time is different, and the flexibility and the safety of the encryption key character string are improved.
In summary, according to the automobile access control opening method provided by the invention, the mobile phone terminal receives the authorization code input by the user and sends the authorization code to the cloud server; the cloud server verifies the authorization code, and after the authorization code is successfully verified, the cloud server generates an encryption key character string and sends the encryption key character string to the mobile phone terminal; the mobile phone terminal sends the encryption key character string to the automobile controller; the automobile controller decrypts the encrypted key character string to obtain key information, verifies the user mobile phone MAC address, the automobile identification code, the user mobile phone number and the key code in the key information respectively, and unlocks the automobile door if the verification succeeds, so that the automobile door is in an unlocking state; and if any one of the MAC address of the user mobile phone, the vehicle identification code, the user mobile phone number and the key code fails to be verified, keeping the automobile door in a locked state. The obtained encrypted key character string improves the security of the key code, the vehicle door is controlled to be in a locked state or an unlocked state by verifying the MAC address of the user mobile phone, the vehicle identification code, the mobile phone number of the user and the key code, so that the vehicle door cannot be opened if any one of the verification is unsuccessful, the vehicle door can be opened only if the verification is successful, and the security of the automobile entrance guard is improved by verifying the MAC address of the user mobile phone, the vehicle identification code, the mobile phone number of the user and the key code.
The automobile access control opening method provided by the invention is described in detail above. The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.
Claims (6)
1. An automobile door control opening method is characterized by comprising the following steps:
the mobile phone terminal receives an authorization code input by a user and sends the authorization code to the cloud server;
the cloud server verifies the authorization code, and after the verification is successful, the cloud server generates an encryption key character string and sends the encryption key character string to the mobile phone terminal;
the mobile phone terminal sends the encryption key character string to an automobile controller;
the automobile controller decrypts the encrypted key character string to obtain key information, verifies the user mobile phone MAC address, the vehicle identification code, the user mobile phone number and the key code in the key information respectively, and unlocks the automobile door if the verification succeeds, so that the automobile door is in an unlocking state; if any one of the MAC address of the user mobile phone, the vehicle identification code, the user mobile phone number and the key code fails to be verified, keeping the automobile door in a locked state;
wherein, the process that automobile controller verified the key code includes:
the automobile controller acquires a key code and valid time from the key information and judges whether the valid time is expired; the valid time is the use time of the key code;
if yes, the key code is expired, and the key code verification fails;
if not, the key code is not overdue, the key code is compared with the correct key code stored in advance, if the key code is the same as the correct key code, the key code is correct, the key code is verified successfully, and if the key code is different from the correct key code, the key code is wrong, and the key code is verified unsuccessfully.
2. The method of claim 1, wherein the cloud server generates an encryption key string and sends the encryption key string to the mobile phone terminal, and comprises:
the cloud server carries out encryption algorithm coding on pre-stored header information and key information to generate signature information;
the cloud server respectively carries out BASE64 encryption coding on the header information, the key information and the signature information, and combines the header information, the key information and the signature information which are subjected to BASE64 encryption coding to generate a key character string;
and the cloud server carries out AES encryption coding on the key character string to generate an encrypted key character string, and the encrypted key character string is sent to the mobile phone terminal.
3. The method of claim 1, wherein the key information comprises a key code, an old key code, an update time, a validity time, a user phone number, a user privilege, a user phone MAC address, and a vehicle identification code.
4. The method of claim 1, wherein the vehicle controller decrypting the encrypted key string to obtain key information comprises:
the automobile controller carries out AES decryption on the encrypted key character string to generate a key character string;
and decrypting the key character string by using BASE64 to generate header information, key information and signature information, and acquiring the key information.
5. The method of claim 2, further comprising:
the cloud server updates key codes in the pre-stored key information to obtain new key codes;
the cloud server generates a new encryption key character string through the new key code and sends the new encryption key character string to the mobile phone terminal, and the mobile phone terminal sends the new encryption key character string to the automobile controller;
the automobile controller decrypts the new encrypted key character string to obtain new key information, obtains a new key code from the new key information, updates a pre-stored correct key code into the new key code, and stores the new key code as the new correct key code;
after the new correct key code is stored, the automobile controller sends a successful updating response instruction to the mobile phone terminal, and the mobile phone terminal sends the successful updating response instruction to the cloud server;
and the cloud server receives the successful updating response instruction and confirms that the correct key code stored in the automobile controller is successfully updated.
6. The method of any one of claims 1 to 5, further comprising:
the mobile phone terminal sends the authorization code to one or more other mobile phone terminals;
the other one or more mobile phone terminals acquire the encryption key character string from the cloud server by using the authorization code and send the encryption key character string to the automobile controller;
and the automobile controller controls the door control state of the automobile door according to the encryption key character string.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610289071.7A CN105976466B (en) | 2016-05-03 | 2016-05-03 | Automobile entrance guard door opening method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610289071.7A CN105976466B (en) | 2016-05-03 | 2016-05-03 | Automobile entrance guard door opening method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105976466A CN105976466A (en) | 2016-09-28 |
CN105976466B true CN105976466B (en) | 2020-01-10 |
Family
ID=56994473
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610289071.7A Active CN105976466B (en) | 2016-05-03 | 2016-05-03 | Automobile entrance guard door opening method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105976466B (en) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106504391B (en) * | 2016-11-24 | 2020-03-06 | 北京爱接力科技发展有限公司 | Control method, device and system of intelligent access control |
CN106657063A (en) * | 2016-12-22 | 2017-05-10 | 江苏萝卜交通科技有限公司 | Unlocking method for electric vehicle, vehicle cloud platform and mobile terminal |
CN107154086A (en) * | 2017-03-28 | 2017-09-12 | 深圳市元征科技股份有限公司 | A kind of automobile key matching process, server and diagnosis terminal |
CN108696476B (en) * | 2017-04-06 | 2020-12-25 | 上海航迹数据信息科技有限公司 | Security policy configurable automobile key system and implementation method thereof |
CN107067249B (en) * | 2017-04-17 | 2020-05-22 | 北京工业大学 | Encryption method applied to intelligent ground lock leasing system |
US10358114B2 (en) * | 2017-04-25 | 2019-07-23 | Ford Global Technologies, Llc | Method and apparatus for dynamic vehicle key generation and handling |
CN107130880A (en) * | 2017-06-21 | 2017-09-05 | 杭州空灵智能科技有限公司 | A kind of intelligent safe control system |
KR102363280B1 (en) * | 2017-06-23 | 2022-02-16 | 삼성전자주식회사 | Apparatus and method for providing and managing security informaiton in communicnation system |
CN107689098A (en) * | 2017-09-05 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | The implementation method and system of bluetooth car key |
CN107516365A (en) * | 2017-09-28 | 2017-12-26 | 北京新能源汽车股份有限公司 | A kind of virtual key management method, apparatus and system |
CN107888612A (en) * | 2017-11-29 | 2018-04-06 | 北京汽车股份有限公司 | Vehicle and its without key start control method, control system |
CN108206996A (en) * | 2017-12-08 | 2018-06-26 | 中兴通讯股份有限公司 | Auth method and device |
CN108711205B (en) * | 2018-05-09 | 2021-07-06 | 上海上实龙创智慧能源科技股份有限公司 | Visitor authentication system of conference system |
TWI670960B (en) * | 2018-06-14 | 2019-09-01 | 笠眾實業有限公司 | Vehicle networking system for verifying connection under public network and connection method thereof |
CN110858417A (en) * | 2018-08-15 | 2020-03-03 | 中国电信股份有限公司 | Electronic lock unlocking authentication method and system, electronic key and electronic lock |
CN109243017A (en) * | 2018-08-22 | 2019-01-18 | 天网互联科技(深圳)有限公司 | A kind of bluetooth method for unlocking, device and computer readable storage medium |
CN109326028A (en) * | 2018-09-27 | 2019-02-12 | 武汉盛硕电子有限公司 | A kind of method, system, intelligent terminal, reception device managing Intelligent key |
CN109285252B (en) * | 2018-09-29 | 2021-08-10 | 百度在线网络技术(北京)有限公司 | Vehicle lock control method and device |
CN112839040B (en) * | 2018-12-26 | 2023-08-04 | 上海银基信息安全技术股份有限公司 | Identity authentication method, device and medium |
CN109874125A (en) * | 2019-01-29 | 2019-06-11 | 上海博泰悦臻网络技术服务有限公司 | The car owner's authorization method and system of bluetooth key, storage medium and vehicle Cloud Server |
CN109673000A (en) * | 2019-01-29 | 2019-04-23 | 上海博泰悦臻网络技术服务有限公司 | The update method and system of bluetooth key, storage medium and vehicle Cloud Server |
CN109801423A (en) * | 2019-02-20 | 2019-05-24 | 北京首汽智行科技有限公司 | A kind of control method for vehicle and system based on bluetooth |
EP3933154B1 (en) * | 2019-02-25 | 2024-06-05 | Honda Motor Co., Ltd. | Vehicle, vehicle onboard device, and management method |
CN112002037A (en) * | 2019-05-10 | 2020-11-27 | 联合汽车电子有限公司 | Cloud server, vehicle, mobile terminal and authorization data updating method |
CN110310404A (en) * | 2019-07-09 | 2019-10-08 | 四川康佳智能终端科技有限公司 | A kind of automobile control method based on intelligent terminal, system and storage medium |
CN112243020B (en) * | 2019-07-19 | 2023-12-05 | 广州汽车集团股份有限公司 | Intelligent key calibration data synchronization method, device, vehicle-mounted communication module and system |
CN110570553A (en) * | 2019-08-09 | 2019-12-13 | 深圳市天彦通信股份有限公司 | Personnel management method and related device |
WO2021035441A1 (en) * | 2019-08-23 | 2021-03-04 | 北京宝沃汽车有限公司 | Vehicle management method, vehicle, storage medium, electronic device, and program |
CN110995416A (en) * | 2019-10-12 | 2020-04-10 | 武汉信安珞珈科技有限公司 | Method for associating mobile terminal with client |
CN110758321A (en) * | 2019-10-31 | 2020-02-07 | 上海博泰悦臻网络技术服务有限公司 | Control method and device of Bluetooth key |
CN111137245B (en) * | 2019-12-17 | 2022-08-02 | 重庆邮电大学 | Opening and closing method for automobile door lock |
US20210207967A1 (en) * | 2020-01-05 | 2021-07-08 | Voxx International Corporation | Sharing vehicle access by using mobile device messaging |
CN111460416B (en) * | 2020-02-29 | 2023-02-03 | 阳光学院 | Face feature and dynamic attribute authentication method based on WeChat applet platform |
CN111402464A (en) * | 2020-03-20 | 2020-07-10 | 科世达(上海)机电有限公司 | Method, device and system for updating vehicle electronic key |
CN111540089A (en) * | 2020-04-22 | 2020-08-14 | 广东邦盛北斗科技股份公司 | Digital car key sharing system, computer readable storage medium |
CN111447062A (en) * | 2020-04-28 | 2020-07-24 | 大陆汽车电子(长春)有限公司 | Password management system for vehicle |
CN111815817A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Access control safety control method and system |
CN112230954A (en) * | 2020-09-27 | 2021-01-15 | 南斗六星系统集成有限公司 | After-sale calibration-free method and system for vehicle all-round system host |
KR102303793B1 (en) * | 2021-02-04 | 2021-09-17 | 허정 | An apparatus and system for controlling the opening and closing of the door, and a method thereof |
CN112836238B (en) * | 2021-02-18 | 2023-10-27 | 支付宝(杭州)信息技术有限公司 | Verification method, device, equipment and system based on privacy protection |
CN113313864B (en) * | 2021-05-26 | 2023-05-09 | Oppo广东移动通信有限公司 | Access control method, device, wireless earphone, access control equipment and storage medium |
CN113823018A (en) * | 2021-09-30 | 2021-12-21 | 重庆长安汽车股份有限公司 | Method and system for unlocking and starting vehicle based on external voice system |
CN114120487B (en) * | 2021-10-27 | 2024-02-23 | 广州奇兵电子科技有限公司 | Automobile digital key management method, system, equipment and storage medium |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103035054B (en) * | 2012-12-29 | 2015-04-08 | 江苏中科天安智联科技有限公司 | NFC intelligent automobile key system with permission and authorization functions |
US9367978B2 (en) * | 2013-03-15 | 2016-06-14 | The Chamberlain Group, Inc. | Control device access method and apparatus |
GB2516939A (en) * | 2013-08-07 | 2015-02-11 | Eus Associates Ltd | Access authorisation system and secure data communications system |
CN104424679B (en) * | 2013-08-30 | 2017-04-12 | 比亚迪股份有限公司 | Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server |
CN103618705A (en) * | 2013-11-20 | 2014-03-05 | 浪潮电子信息产业股份有限公司 | Personal code managing tool and method under open cloud platform |
CN103903319A (en) * | 2014-02-10 | 2014-07-02 | 袁磊 | Electronic lock system based on internet dynamic authorization |
CN105488870A (en) * | 2014-09-18 | 2016-04-13 | 腾讯科技(深圳)有限公司 | Entrance guard control method, apparatus, terminal and control server |
-
2016
- 2016-05-03 CN CN201610289071.7A patent/CN105976466B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN105976466A (en) | 2016-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105976466B (en) | Automobile entrance guard door opening method | |
US11275820B2 (en) | Locking device biometric access | |
KR102422326B1 (en) | Control system and control mehtod for vehicle | |
KR101378784B1 (en) | Method for the Protection of a Movable Object, especially a Vehicle, against Unauthorized Use | |
CN106394487B (en) | Virtual key authorization method, server and authorization system | |
US9865113B2 (en) | Apparatus, system and method for dynamic identification and key management for vehicle access | |
US9466162B2 (en) | Electronic key system, and lock-side terminal and portable terminal employed in same | |
US11142166B2 (en) | Sharing system using valet key | |
EP1411477B1 (en) | Handling device and method of security data | |
CN109204227A (en) | Vehicle shared system and vehicle sharing method | |
JP5031994B2 (en) | Authority delegation system, control device, and authority delegation method | |
EP2743868A1 (en) | Virtual vehicle key | |
US20060123463A1 (en) | Security access device and method | |
CN112373431A (en) | Cloud digital key generation and authorization method | |
US20200052910A1 (en) | Retention and revocation of operation keys by a control unit | |
CN109649332A (en) | Vehicle shared system | |
JP6633589B2 (en) | Car sharing system | |
JP2014145200A (en) | Locking/unlocking right granting system, authentication device, mobile terminal, and program | |
CN111083696B (en) | Communication verification method and system, mobile terminal and vehicle machine side | |
JP2007251565A (en) | Terminal control system, information processing terminal, terminal control method, and program | |
CN110598469B (en) | Information processing method, device and computer storage medium | |
JP5178249B2 (en) | Key authentication system | |
CN108460872B (en) | Control method and device of intelligent lock | |
JP2005290739A (en) | Keyless lock system | |
JP7057944B2 (en) | Authentication system and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |