CN110641415A - Equipment security method, server and intelligent terminal equipment - Google Patents

Equipment security method, server and intelligent terminal equipment Download PDF

Info

Publication number
CN110641415A
CN110641415A CN201910916315.3A CN201910916315A CN110641415A CN 110641415 A CN110641415 A CN 110641415A CN 201910916315 A CN201910916315 A CN 201910916315A CN 110641415 A CN110641415 A CN 110641415A
Authority
CN
China
Prior art keywords
intelligent terminal
automobile
terminal equipment
terminal device
target contact
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910916315.3A
Other languages
Chinese (zh)
Inventor
余晓飞
倪键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Silver Based Information Security Technology Ltd By Share Ltd
Original Assignee
Shanghai Silver Based Information Security Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Silver Based Information Security Technology Ltd By Share Ltd filed Critical Shanghai Silver Based Information Security Technology Ltd By Share Ltd
Priority to CN201910916315.3A priority Critical patent/CN110641415A/en
Publication of CN110641415A publication Critical patent/CN110641415A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mechanical Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment provides a device security method, an intelligent terminal device and a server, and particularly relates to a method for judging whether the intelligent terminal device is locked in a vehicle or not after the vehicle is locked; if the intelligent terminal device is judged to be locked in the vehicle, an early warning instruction is sent to the server; the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information to the intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition; and if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to unlock the automobile. Therefore, when the intelligent terminal device is locked in the vehicle, the unlocking and locking operations can be realized by using other intelligent terminal devices. Therefore, the situation that the user cannot open the automobile when the intelligent terminal device is locked on the automobile is avoided.

Description

Equipment security method, server and intelligent terminal equipment
Technical Field
The application relates to the technical field of automobiles, in particular to a device security method, a server and intelligent terminal equipment.
Background
In recent years, keyless Entry and start peps (Passive Entry Passive start) systems have been widely used. In the PEPS system, the vehicle locks automatically when the user moves a certain distance away from the vehicle or presses a button on the door handle of the vehicle when the door is closed. Before locking, the vehicle usually detects whether the intelligent terminal device (the terminal device with the digital key control) is located in the vehicle, if so, the locking operation is not performed, and if not, the locking operation is performed.
However, there are some detection blind areas in the vehicle usually, and when the intelligent terminal device is in the detection blind area, the vehicle usually cannot detect the intelligent terminal device, so that the judgment that the intelligent terminal device is located outside the vehicle is made, and then the locking operation is performed, so that the user cannot open the vehicle again due to the fact that no intelligent terminal device is available at hand.
Disclosure of Invention
In view of the above, the present application provides a device security method, a server, and an intelligent terminal device for unlocking an automobile in a case where the intelligent terminal device is locked in the vehicle.
In order to achieve the above object, the following solutions are proposed:
a device security method applied to an intelligent terminal device currently used for controlling an automobile, the device security method comprising the steps of:
after the automobile is locked, judging whether the intelligent terminal equipment is locked in the automobile or not;
if the intelligent terminal device is judged to be locked in the automobile, an early warning instruction is sent to a server;
the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information to the intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition; if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to control the automobile; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
Optionally, after the intelligent terminal device of the target contact meets the authorization condition, the server further sends an authorization limit instruction to the intelligent terminal device locked in the vehicle, where:
the right limiting instruction is used for controlling the intelligent terminal device locked in the automobile to lose the operation right of the automobile.
Optionally, the determining whether the intelligent terminal device is locked in the vehicle includes:
detecting whether position movement occurs within a first preset time length from the locking of the automobile, if the position movement occurs, judging that the intelligent terminal device is not locked in the automobile, and if the position movement does not occur, judging that the intelligent terminal device is locked in the automobile.
An intelligent terminal device comprising:
the state judgment module is used for judging whether the intelligent terminal equipment is locked in the automobile or not after the automobile is locked;
the early warning execution module is used for sending an early warning instruction to a server if the intelligent terminal device is judged to be locked in the automobile;
the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information intelligent terminal equipment to intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition or not; if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to control the automobile; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
Optionally, the state determining module includes:
the displacement detection unit is used for detecting whether the position of the automobile moves within a first preset time from the locking of the automobile;
the first judging unit is used for judging that the intelligent terminal equipment is not locked in the vehicle if the position is moved;
and the second judging unit is used for judging that the intelligent terminal equipment is locked in the vehicle if the position movement does not occur.
A device security method applied to a server, the device security method comprising the steps of:
receiving an early warning instruction sent by intelligent terminal equipment;
selecting a target contact from a preset contact list according to the early warning instruction and a preset rule;
sending verification information to the intelligent terminal equipment of the target contact person;
when feedback information returned by the intelligent terminal equipment of the target contact is received, judging whether an authorization condition is met or not according to the feedback information;
if the authorization condition is met, sending authorization information to the intelligent terminal equipment of the target contact person so as to authorize the intelligent terminal equipment of the target contact person to operate and control the automobile within an authorization range; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
Optionally, the feedback information includes part or all of the user identity verification result, the intelligent terminal device verification result, and the feedback duration.
A server, comprising:
the instruction receiving module is used for receiving an early warning instruction sent by the intelligent terminal equipment;
the target selection module is used for selecting a target contact person from a preset contact person list according to the early warning instruction and a preset rule;
the first sending module is used for sending verification information to the intelligent terminal equipment of the target contact person;
the information judgment module is used for judging whether the authorization condition is met or not according to the feedback information when the feedback information returned by the intelligent terminal equipment of the target contact person is received;
the second sending module is used for sending authorization information to the intelligent terminal equipment of the currently selected contact person if the authorization condition is met so as to authorize the intelligent terminal equipment of the target contact person to operate and control the automobile within an authorization range; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
The embodiment provides a device security method, an intelligent terminal device and a server, and particularly relates to a method for judging whether the intelligent terminal device is locked in a vehicle or not after the vehicle is locked; if the intelligent terminal device is judged to be locked in the vehicle, an early warning instruction is sent to the server; the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information to the intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition; if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to unlock the automobile; if the authorization condition is not met, the server picks a new target contact from the contact list again. Therefore, when the intelligent terminal device is locked in the vehicle, the unlocking and locking operations can be realized by using other intelligent terminal devices. Therefore, the situation that the user cannot open the automobile when the intelligent terminal device is locked on the automobile is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flow chart of a device security method according to an embodiment of the present application;
fig. 2 is a block diagram of an intelligent terminal device according to an embodiment of the present application;
fig. 3 is a flow chart of another device security method according to an embodiment of the present application;
fig. 4 is a flow chart of another device security method according to an embodiment of the present application;
FIG. 5 is a block diagram of a server according to an embodiment of the present application;
fig. 6 is a block diagram of another server according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example one
Fig. 1 is a flowchart of a device security method according to an embodiment of the present application.
The device security method provided by the embodiment is applied to the intelligent terminal device, and the intelligent terminal device can be used for controlling the automobile, wherein the control comprises but is not limited to unlocking and locking the automobile. The intelligent terminal device can be an intelligent key special for the automobile, or a mobile device which establishes a matching relationship with the automobile, such as a smart phone, an intelligent wearable device and the like.
As shown in fig. 1, the device security method specifically includes the following steps:
s101, judging whether the intelligent terminal device is locked in the automobile after the automobile is locked.
Namely, after the automobile is flamed out and locked, whether the intelligent terminal equipment is locked in the automobile or not is judged.
The intelligent terminal equipment can judge whether the intelligent terminal equipment generates displacement or not by acquiring position information acquired by a displacement detection element on the intelligent terminal equipment, wherein the displacement detection element can be a satellite navigation module or a motion sensor. Specifically, the intelligent terminal device can detect whether the position of the intelligent terminal device moves within a first preset time period from the locking of the automobile, and give corresponding information according to a detection result. The first preset time period may be 5 to 10 seconds, that is, the time period lasts for 5 to 10 seconds from the time when the automobile is locked to detect the position information.
If the intelligent terminal device is not detected to be moved within the first preset time, judging that the intelligent terminal device is locked in the automobile;
on the contrary, if the intelligent terminal device is detected to have the position movement within the first preset time, the intelligent terminal device is judged to be normally taken away by the user.
Of course, it may also be determined whether the intelligent terminal device is locked in the vehicle in other manners, for example, by detecting a signal of the intelligent terminal device, and the details will not be discussed here.
And S102, if the intelligent terminal equipment is locked in the vehicle, sending an early warning instruction to a server.
After receiving the early warning instruction, the server determines a target contact from a preset contact list according to a preset rule, wherein the preset rule can be a priority order, an arrangement order and the like; and then sending verification information to the intelligent terminal device of the target contact person, wherein the verification information is used for verifying whether the intelligent terminal device has corresponding authorization conditions, such as whether corresponding binding is obtained before and has corresponding operation bases, such as corresponding application programs, and specifically, whether the intelligent terminal device has the right to perform unlocking and locking operations on the automobile.
Specifically, the intelligent terminal device of the target contact returns a feedback message to the server after receiving the verification message, and then the server judges whether the intelligent terminal device passes the verification according to the feedback message, and if the intelligent terminal device passes the verification, the intelligent terminal device indicates that the intelligent terminal device has the authorization condition. The server authorizes the intelligent terminal device, and the intelligent terminal of the target contact can control the automobile, so that even if the user locks the intelligent terminal device in the automobile, the intelligent terminal of the target contact can obtain the control right of the automobile again.
In addition, if the intelligent terminal device of the corresponding target contact person cannot complete the verification operation, according to the preset rule, after the contact persons which cannot complete the verification operation are eliminated, the corresponding target contact person is determined again from the contact person list, and the operation of sending verification information to the intelligent terminal device of the target contact person is returned.
It can be seen from the above technical solutions that, the present embodiment provides an apparatus security method, which is applied to an intelligent terminal apparatus configured for an automobile, and specifically, after the automobile is locked, whether the intelligent terminal apparatus is locked in the automobile is determined; if the intelligent terminal device is judged to be locked in the vehicle, an early warning instruction is sent to the server; the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information to the intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition; if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to unlock the automobile; if the authorization condition is not met, the server picks a new target contact from the contact list again. Therefore, when the intelligent terminal device is locked in the vehicle, the unlocking and locking operations can be realized by using other intelligent terminal devices. Therefore, the situation that the user cannot open the automobile when the intelligent terminal device is locked on the automobile is avoided.
Further, after the intelligent terminal device of the target contact obtains the authorization of the server, the server also sends an authorization limiting instruction to the intelligent terminal device in the original locked car, and the authorization limiting instruction is used for controlling the intelligent terminal device to lose the operation authority of the car, namely, the car can not be controlled any more. Therefore, the key in the locked automobile can be prevented from operating the automobile after being illegally obtained by other people, and the safety is improved.
Example two
Fig. 2 is a block diagram of an intelligent terminal device provided in an embodiment of the present application.
The intelligent terminal device can control the automobile, and the control comprises but is not limited to unlocking and locking the automobile by self. The intelligent terminal device can be an intelligent key special for the automobile, or a mobile device which establishes a matching relationship with the automobile, such as a smart phone, an intelligent wearable device and the like.
As shown in fig. 1, the intelligent terminal device at least includes a state judgment module 10 and an early warning execution module 20, and further includes other necessary components or devices for supporting the operations of the above modules, such as a power supply device, a processor, a memory, a wireless communication module, and the like.
The state judgment module is used for judging whether the intelligent terminal device is locked in the automobile after the automobile is locked.
Namely, after the automobile is flamed out and locked, whether the intelligent terminal equipment is locked in the automobile or not is judged. The module includes a displacement detection unit, a first determination unit, and a second determination unit.
The displacement detection unit is used for judging whether the intelligent terminal equipment generates displacement or not by acquiring position information acquired by a displacement detection element on the intelligent terminal equipment, and the displacement detection element can be a satellite navigation module or a motion sensor. Specifically, the displacement detection unit is used for judging whether the position of the automobile is moved within a first preset time period from the self-locking of the automobile, and giving corresponding information according to a detection result. The first preset time period can be 5-10 seconds, and can also be other time periods.
The first judging unit is used for judging that the intelligent terminal equipment is locked in the automobile if the intelligent terminal equipment is not detected to have position movement within the first preset time length;
the second judging unit is used for judging that the intelligent terminal equipment is normally taken away by the user if the intelligent terminal equipment is detected to have position movement within the first preset time length.
Of course, it may also be determined whether the intelligent terminal device is locked in the vehicle in other manners, for example, by detecting a signal of the intelligent terminal device, and the details will not be discussed here.
And the early warning execution module is used for sending an early warning instruction to the server if the intelligent terminal device is judged to be locked in the vehicle.
The early warning instruction is used for controlling the server to obtain a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information intelligent terminal equipment to intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition.
Specifically, the intelligent terminal device of the target contact returns a feedback message to the server after receiving the verification message, and then the server judges whether the intelligent terminal device passes the verification according to the feedback message. If the verification is passed, the server indicates that the verification meets the authorization condition, and authorizes the intelligent terminal device of the target contact person to control the automobile; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
According to the technical scheme, the embodiment provides the intelligent terminal device, which is specifically used for judging whether the intelligent terminal device is locked in the automobile or not after the automobile is locked; if the intelligent terminal device is judged to be locked in the vehicle, an early warning instruction is sent to the server; the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information to the intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition; if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to unlock the automobile; if the authorization condition is not met, the server picks a new target contact from the contact list again. Therefore, when the intelligent terminal device is locked in the vehicle, the unlocking and locking operations can be realized by using other intelligent terminal devices. Therefore, the situation that the user cannot open the automobile when the intelligent terminal device is locked on the automobile is avoided.
Further, after the intelligent terminal device of the target contact obtains the authorization of the server, the server also sends an authorization limiting instruction to the intelligent terminal device in the original locked car, and the authorization limiting instruction is used for controlling the intelligent terminal device to lose the operation authority of the car, namely, the car can not be controlled any more. Therefore, the key in the locked automobile can be prevented from operating the automobile after being illegally obtained by other people, and the safety is improved.
EXAMPLE III
Fig. 3 is a flowchart of another device security method according to an embodiment of the present application.
As shown in fig. 3, the device security method provided in this embodiment is applied to a server, where the server is in communication connection with an intelligent terminal device, and the method specifically includes the following steps:
s201, receiving an early warning instruction sent by the intelligent terminal device.
The source of the warning instruction is described in detail in the above embodiments, and is not described here. And when the intelligent terminal equipment sends the early warning instruction, receiving the early warning instruction.
S202, determining a target contact person from the contact person list according to the early warning instruction.
The contact list includes a plurality of contacts preset in the server by the user, and the contacts have corresponding priority order, arrangement order and the like. And after the early warning instruction is received, selecting from a contact list according to a preset rule, such as the priority sequence or the arrangement sequence of the contacts, specifically, selecting the contact with the highest priority or the contact ranked at the current earliest position as a target contact.
S203, sending verification information to the intelligent terminal equipment of the target contact person.
The verification information is sent to the intelligent terminal device held by the selected target contact or registered in advance, and the verification information is used for verifying whether the intelligent terminal device has corresponding authorization conditions, such as whether corresponding binding is obtained before and has corresponding operation basis, such as corresponding application program, and specifically, whether the intelligent terminal device has the right to perform unlocking and locking operations on the automobile.
And the intelligent terminal equipment returns a feedback message to the server after receiving the verification message.
And S204, judging whether the intelligent terminal equipment meets the authorization condition after receiving the feedback information.
And after receiving the verification information, the intelligent terminal equipment of the target contact judges the intelligent terminal according to the verification information, namely judges whether the intelligent terminal equipment meets the authorization condition. The verification information can be part or all of the user identity verification result, the intelligent terminal device verification result and the feedback time length, and the feedback time length reflects whether the corresponding user is beside the intelligent terminal device, so that long-time invalid waiting can be avoided.
S205, authorization information is sent to the intelligent terminal equipment meeting the authorization conditions.
The authorization information is used for authorizing the intelligent terminal device of the target contact person, so that the intelligent terminal device of the target contact person can control the automobile within an authorization range, such as unlocking or locking. Therefore, even if the user locks the intelligent terminal equipment of the user in the automobile, the control right of the automobile can be obtained again through the intelligent terminal of the target contact person.
If the intelligent terminal equipment of the target contact person can not finish the verification operation, according to the preset rule, after the contact person which can not finish the verification operation is eliminated, the corresponding target contact person is determined again from the contact person list, and the operation of sending the verification information to the intelligent terminal equipment of the target contact person is returned.
In addition, as shown in fig. 4, the method further includes the following steps:
and S206, sending a right limiting instruction to the intelligent terminal equipment.
Namely, under the condition that the intelligent terminal equipment of the target contact person is authorized and succeeds, the right limiting instruction is sent to the original intelligent terminal equipment. The right limiting instruction is used for temporarily or permanently limiting the operation right of the automobile. Therefore, even if other people illegally acquire the intelligent terminal equipment, the automobile cannot be operated, and therefore safety is improved.
Example four
Fig. 5 is a block diagram of a server according to an embodiment of the present application.
As shown in fig. 5, the server provided in this embodiment includes an instruction receiving module 30, an object selecting module 40, a first sending module 50, an information determining module 60, and a second sending module 70. And also includes other necessary components or devices for supporting the operation of the above modules, such as a power supply device, a processor, a memory, a communication module, and the like.
The instruction receiving module is used for receiving an early warning instruction sent by the intelligent terminal equipment.
The source of the warning instruction is described in detail in the above embodiments, and is not described here. And when the intelligent terminal equipment sends the early warning instruction, receiving the early warning instruction.
And the target selection module is used for determining a target contact person from the contact person list according to the early warning instruction.
The contact list includes a plurality of contacts preset in the server by the user. After the early warning instruction is received, the contact persons can be selected from the contact person list according to the priority or the ranking order of the contact persons, and particularly the contact person with the highest priority or the contact person ranked at the current earliest position is selected as the target contact person.
The first sending module is used for sending verification information to the intelligent terminal equipment of the target contact person.
The verification information is sent to the intelligent terminal device held by the selected target contact or registered in advance, and the verification information is used for verifying whether the intelligent terminal device has corresponding authorization conditions, such as whether corresponding binding is obtained before and has corresponding operation basis, such as corresponding application program, and specifically, whether the intelligent terminal device has the right to perform unlocking and locking operations on the automobile.
And the intelligent terminal equipment returns a feedback message to the server after receiving the verification message.
And the information judgment module is used for judging whether the intelligent terminal equipment meets the authorization condition after receiving the feedback information.
And after receiving the verification information, the intelligent terminal equipment of the target contact judges the intelligent terminal equipment according to the verification information, namely judges whether the intelligent terminal equipment meets the authorization condition. The verification information can be part or all of the user identity verification result, the intelligent terminal device verification result and the feedback time length, and the feedback time length reflects whether the corresponding user is beside the intelligent terminal device, so that long-time invalid waiting can be avoided.
The second sending module is used for sending authorization information to the intelligent terminal equipment meeting the authorization condition
The authorization information is used for authorizing the intelligent terminal device of the target contact person, and the intelligent terminal device of the target contact person can control the automobile within an authorization range through authorization, such as unlocking or locking. Therefore, even if the user locks the intelligent terminal equipment of the user in the automobile, the control right of the automobile can be obtained again through the intelligent terminal of the target contact person.
If the intelligent terminal equipment of the corresponding target contact person can not complete the verification operation, according to the preset rule, after the contact persons which can not complete the verification operation are eliminated, the corresponding target contact person is determined again from the contact person list, and the operation of sending verification information to the intelligent terminal equipment of the target contact person is returned.
In addition, as shown in fig. 5, a third sending module 80 is further included.
And the third sending module is used for sending the right limiting instruction to the intelligent terminal equipment.
Namely, under the condition that the intelligent terminal equipment of the target contact person is authorized and succeeds, the right limiting instruction is sent to the original intelligent terminal equipment. The right limiting instruction is used for temporarily or permanently limiting the operation right of the automobile. Therefore, even if other people illegally acquire the intelligent terminal equipment, the automobile cannot be operated, and therefore safety is improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The technical solutions provided by the present invention are described in detail above, and the principle and the implementation of the present invention are explained in this document by applying specific examples, and the descriptions of the above examples are only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (9)

1. An equipment security method applied to an intelligent terminal equipment currently used for controlling an automobile, characterized by comprising the steps of:
after the automobile is locked, judging whether the intelligent terminal equipment is locked in the automobile or not;
if the intelligent terminal device is judged to be locked in the automobile, an early warning instruction is sent to a server;
the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information to the intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition; if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to control the automobile; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
2. The device security method according to claim 1, wherein the server further sends an authorization instruction to the smart terminal device locked in the vehicle after the smart terminal device of the target contact meets the authorization condition, wherein:
the right limiting instruction is used for controlling the intelligent terminal device locked in the automobile to lose the operation right of the automobile.
3. The device security method according to claim 1, wherein the determining whether the smart terminal device is locked in the vehicle includes:
detecting whether position movement occurs within a first preset time length from the locking of the automobile, if the position movement occurs, judging that the intelligent terminal device is not locked in the automobile, and if the position movement does not occur, judging that the intelligent terminal device is locked in the automobile.
4. An intelligent terminal device, comprising:
the state judgment module is used for judging whether the intelligent terminal equipment is locked in the automobile or not after the automobile is locked;
the early warning execution module is used for sending an early warning instruction to a server if the intelligent terminal device is judged to be locked in the automobile;
the early warning instruction is used for controlling the server to acquire a preset contact list, selecting a target contact from the contact list according to a preset rule, and sending verification information to the intelligent terminal equipment of the target contact so as to verify whether the intelligent terminal equipment of the target contact meets an authorization condition; if the authorization condition is met, the server authorizes the intelligent terminal equipment of the target contact person to control the automobile; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
5. The intelligent terminal device according to claim 4, wherein the server further sends an authorization restriction instruction to the intelligent terminal device locked in the vehicle after the intelligent terminal device of the target contact meets the authorization condition, wherein:
the right limiting instruction is used for controlling the intelligent terminal device locked in the automobile to lose the operation right of the automobile.
6. A device security method applied to a server, the device security method comprising the steps of:
receiving an early warning instruction sent by intelligent terminal equipment;
selecting a target contact from a preset contact list according to the early warning instruction and a preset rule;
sending verification information to the intelligent terminal equipment of the target contact person;
when feedback information returned by the intelligent terminal equipment of the target contact is received, judging whether an authorization condition is met or not according to the feedback information;
if the authorization condition is met, sending authorization information to the intelligent terminal equipment of the target contact person so as to authorize the intelligent terminal equipment of the target contact person to operate and control the automobile within an authorization range; and if the authorization condition is not met, the server selects a new target contact from the contact list again.
7. The device security method according to claim 6, further comprising the step of, after the intelligent terminal device of the target contact meets the authorization condition:
and sending an authority limit instruction to the intelligent terminal equipment, wherein the authority limit instruction is used for controlling the intelligent terminal equipment locked in the automobile to lose the operation authority of the automobile.
8. A server, comprising:
the instruction receiving module is used for receiving an early warning instruction sent by the intelligent terminal equipment;
the target selection module is used for selecting a target contact person from a preset contact person list according to the early warning instruction and a preset rule;
the first sending module is used for sending verification information to the intelligent terminal equipment of the target contact person;
the information judgment module is used for judging whether the authorization condition is met or not according to the feedback information when the feedback information returned by the intelligent terminal equipment of the target contact person is received;
the second sending module is used for sending authorization information to the intelligent terminal equipment of the currently selected contact person if the authorization condition is met so as to authorize the intelligent terminal equipment of the currently selected contact person to execute unlocking operation on the automobile within an authorization range; and if the authorization condition is not met, the target selection module is informed to select the target contact from the contact list again.
9. The server of claim 8, further comprising:
and the third sending module is used for sending an authority limit instruction to the intelligent terminal device locked in the automobile after the intelligent terminal module of the target contact person meets an authorization condition, wherein the authority limit instruction is used for controlling the intelligent terminal device locked in the automobile to lose the operation authority of the automobile.
CN201910916315.3A 2019-09-26 2019-09-26 Equipment security method, server and intelligent terminal equipment Pending CN110641415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910916315.3A CN110641415A (en) 2019-09-26 2019-09-26 Equipment security method, server and intelligent terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910916315.3A CN110641415A (en) 2019-09-26 2019-09-26 Equipment security method, server and intelligent terminal equipment

Publications (1)

Publication Number Publication Date
CN110641415A true CN110641415A (en) 2020-01-03

Family

ID=68992738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910916315.3A Pending CN110641415A (en) 2019-09-26 2019-09-26 Equipment security method, server and intelligent terminal equipment

Country Status (1)

Country Link
CN (1) CN110641415A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112721859A (en) * 2021-01-14 2021-04-30 广州橙行智动汽车科技有限公司 Vehicle control method and device, vehicle and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09282566A (en) * 1996-04-12 1997-10-31 Mitsubishi Electric Corp Vehicle monitoring device
DE4409559C2 (en) * 1993-11-26 2001-06-07 Marquardt Gmbh Key for locking system
CN107031564A (en) * 2016-02-04 2017-08-11 重庆宁来科贸有限公司 A kind of automobile control protective unit
CN107294926A (en) * 2016-03-31 2017-10-24 比亚迪股份有限公司 Authoring system, method and vehicle, terminal, the server of vehicle remote control
CN206884986U (en) * 2017-05-18 2018-01-16 辽宁科大物联科技有限公司 A kind of controlled in wireless key case started for vehicle remote
CN108528385A (en) * 2018-03-21 2018-09-14 北京汽车股份有限公司 Automobile body antitheft system and its control method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4409559C2 (en) * 1993-11-26 2001-06-07 Marquardt Gmbh Key for locking system
JPH09282566A (en) * 1996-04-12 1997-10-31 Mitsubishi Electric Corp Vehicle monitoring device
CN107031564A (en) * 2016-02-04 2017-08-11 重庆宁来科贸有限公司 A kind of automobile control protective unit
CN107294926A (en) * 2016-03-31 2017-10-24 比亚迪股份有限公司 Authoring system, method and vehicle, terminal, the server of vehicle remote control
CN206884986U (en) * 2017-05-18 2018-01-16 辽宁科大物联科技有限公司 A kind of controlled in wireless key case started for vehicle remote
CN108528385A (en) * 2018-03-21 2018-09-14 北京汽车股份有限公司 Automobile body antitheft system and its control method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112721859A (en) * 2021-01-14 2021-04-30 广州橙行智动汽车科技有限公司 Vehicle control method and device, vehicle and medium
CN112721859B (en) * 2021-01-14 2022-08-19 广州橙行智动汽车科技有限公司 Vehicle control method and device, vehicle and medium

Similar Documents

Publication Publication Date Title
CN110065470B (en) Automobile control method and device based on NFC automobile key, automobile and storage medium
EP3053148B1 (en) Access control using portable electronic devices
US9566943B2 (en) Method of making a vehicle available and corresponding system for making a vehicle available
CN109920114B (en) Door lock control method and system based on geographic position
CN109799801B (en) Unmanned transport system
US10919497B1 (en) Systems and methods for starting a vehicle using a secure password entry system
JP6336931B2 (en) Vehicle anti-theft device
CN103419790B (en) The hierarchical identification of vehicle driver and vehicle based on this identification arrange activation and select
JP2010146095A (en) Biometric authentication system
CN112991584A (en) Control method and system for unlocking and locking of vehicle
CN113891290A (en) Method and system for logging in vehicle-mounted system based on remote control key and vehicle
CN112819997A (en) Method, apparatus and computer-readable storage medium for creating vehicle key
US11364875B2 (en) Theft protection for an automobile by means of context modelling of an authorised user
CN110077361B (en) Vehicle control method and device
CN110606045A (en) Equipment security method and intelligent terminal equipment
CN110641415A (en) Equipment security method, server and intelligent terminal equipment
US10091177B1 (en) Controlling access to a computerized resource of a mobile device based on whether the mobile device is within a vehicle that is currently moving
CN109067745B (en) Method for authenticating vehicle occupant, apparatus, device and storage medium therefor
CN109389720B (en) Intelligent door lock permission processing method and device
CN113569218B (en) Vehicle-mounted account authorization method and vehicle-mounted terminal
CN110843728B (en) Automobile keyless starting method, automobile keyless starting equipment, storage medium and automobile keyless starting device
CN109544753B (en) Authority management method and system based on two-dimensional code
CN106650364B (en) Control method and control device
US20180268630A1 (en) Systems and methods for secure authentication for access control, home control, and alarm systems
CN106992960B (en) Vehicle system operation control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 201203 building 34, No. 1387, Zhangdong Road, Pudong New Area, Shanghai

Applicant after: INGEEK INFORMATION SECURITY CONSULTING ASSOCIATES Co.,Ltd.

Address before: 200233 room 407, Chengda Creative Park, No. 402, Guilin road, Xuhui District, Shanghai

Applicant before: INGEEK INFORMATION SECURITY CONSULTING ASSOCIATES Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20200103

RJ01 Rejection of invention patent application after publication