CN110971574A - Method, device and system for logging in vehicle-mounted system and storage medium - Google Patents

Method, device and system for logging in vehicle-mounted system and storage medium Download PDF

Info

Publication number
CN110971574A
CN110971574A CN201811152700.7A CN201811152700A CN110971574A CN 110971574 A CN110971574 A CN 110971574A CN 201811152700 A CN201811152700 A CN 201811152700A CN 110971574 A CN110971574 A CN 110971574A
Authority
CN
China
Prior art keywords
vehicle
identification information
audio signal
mounted system
logging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811152700.7A
Other languages
Chinese (zh)
Inventor
唐正
朱朝卓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201811152700.7A priority Critical patent/CN110971574A/en
Publication of CN110971574A publication Critical patent/CN110971574A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a method, a device, a system and a storage medium for logging in a vehicle-mounted system, relates to the technical field of vehicle-mounted systems, and aims to solve the problem of how to log in the vehicle-mounted system quickly and safely under the condition of no network communication. In the method, encrypted identification information used for representing user identity information of a login vehicle-mounted system is embedded into an audio signal through an intelligent terminal; and logging in the vehicle-mounted system according to the audio signal sent to the vehicle-mounted terminal. Therefore, the identification information is embedded in the audio signal and is not easy to perceive, and the effect of avoiding identity information leakage can be achieved. In addition, the intelligent terminal can log in the vehicle-mounted system only by sending an audio signal to the vehicle-mounted terminal without manually inputting an account number and a password, so that the vehicle-mounted system can be logged in more quickly. More importantly, the intelligent terminal generates the audio signal and then receives the audio signal through the vehicle-mounted terminal, so that the login process can still be realized under the condition of no network communication.

Description

Method, device and system for logging in vehicle-mounted system and storage medium
Technical Field
The invention relates to the technical field of vehicle-mounted systems, in particular to a method, a device, a system and a storage medium for logging in a vehicle-mounted system.
Background
With the advent of the internet of vehicles, vehicle-mounted systems have also appeared. The vehicle-mounted system needs to be enabled after the user logs in and outputs the login. Specifically, a user manually inputs a personal account and a password at the vehicle-mounted terminal, the vehicle-mounted terminal sends the account password of the user to the cloud server for verification, and the vehicle-mounted system is successfully logged in after the verification is passed.
Therefore, the vehicle-mounted system can be logged in under the networking condition, and the vehicle-mounted system cannot be logged in without the network.
Disclosure of Invention
The embodiment of the application provides a method, a device, a system and a storage medium for logging in a vehicle-mounted system, wherein an intelligent terminal embeds user identity information for representing the logging in the vehicle-mounted system into an audio signal; and logging in the vehicle-mounted system according to the audio signal sent to the vehicle-mounted terminal. The operation of the user when logging in the vehicle-mounted system can be simplified, and the user can log in the vehicle-mounted system more quickly. More importantly, the intelligent terminal generates the audio signal and then receives the audio signal through the vehicle-mounted terminal, so that the login process can still be realized under the condition of no network communication.
In a first aspect, an embodiment of the present application provides a method for logging in a vehicle-mounted system, where the method includes:
embedding encrypted identification information for representing user identity information of a login vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information;
and sending the audio signal to authenticate the identity information of the logged-in vehicle-mounted system.
In a second aspect, an embodiment of the present application provides an apparatus for logging in an onboard system, where the apparatus includes:
the embedded module is used for embedding encrypted identification information used for representing user identity information of a logged vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information;
and the sending module is used for sending the audio signal to authenticate the identity information of the logged vehicle-mounted system.
In a third aspect, an embodiment of the present application provides a system for logging in an in-vehicle system, where the system includes:
the intelligent terminal is used for embedding encrypted identification information used for representing user identity information of a logged vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information; and sending the audio signal to authenticate the identity information of the logged-in vehicle-mounted system. (ii) a
The vehicle-mounted terminal is used for receiving an audio signal for logging in a vehicle-mounted system, wherein the audio signal contains encrypted identification information for representing user identity information for logging in the vehicle-mounted system; parsing the encrypted identification information from the audio signal; and authenticating the identity information of the login vehicle-mounted system based on the encrypted identification information.
In a fourth aspect, another embodiment of the present application further provides a computing device comprising at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute a method for logging in an on-board system provided by the embodiment of the application.
In a fifth aspect, another embodiment of the present application further provides a mobile terminal storage medium, where the mobile terminal storage medium stores mobile terminal executable instructions, and the mobile terminal executable instructions are configured to enable a mobile terminal to execute a method for logging in an in-vehicle system in an embodiment of the present application.
According to the method, the device, the system and the storage medium for logging in the vehicle-mounted system, encrypted identification information for representing user identity information of the logged in vehicle-mounted system is embedded into an audio signal through an intelligent terminal; and logging in the vehicle-mounted system according to the audio signal sent to the vehicle-mounted terminal. Therefore, the identification information is embedded into the audio signal, so that the identification information is not easy to sense, the effect of avoiding identity information leakage can be achieved, and the information safety of a user is improved. In addition, the vehicle-mounted system can be logged in only by sending an audio signal containing identification information, a user does not need to manually input information at a vehicle-mounted terminal, user operation is simplified, time for logging in the vehicle-mounted system is shortened, the user does not need to pay too much attention to logging in the vehicle-mounted system during driving, and therefore safety of the user during driving is improved. More importantly, the intelligent terminal generates the audio signal and then receives the audio signal through the vehicle-mounted terminal, so that the login process can still be realized under the condition of no network communication.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic diagram of an application scenario in an embodiment of the present application;
FIG. 2 is a first flowchart illustrating a method for logging in a vehicle-mounted system according to an embodiment of the present application;
FIG. 3 is a diagram illustrating another application scenario in an embodiment of the present application;
FIG. 4 is a diagram illustrating a login screen in an embodiment of the present application;
FIG. 5 is a second flowchart illustrating a method for logging in a vehicle-mounted system according to an embodiment of the present application;
FIG. 6 is a third schematic flowchart illustrating a method for logging in a vehicle-mounted system according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a system for logging into an onboard system in an embodiment of the present application;
FIG. 8 is a first structural diagram of a login vehicle-mounted system in the embodiment of the present application;
FIG. 9 is a structural diagram of a second login vehicle-mounted system in the embodiment of the present application;
fig. 10 is a schematic structural diagram of a computing device according to an embodiment of the present application.
Detailed Description
In order to quickly and safely log in an on-board system under the condition of network-free and network-free communication without a network, the embodiment of the application provides a method, a device, a system and a storage medium for logging in the on-board system. In order to better understand the technical solution provided by the embodiments of the present application, the following brief description is made on the basic principle of the solution:
based on the prior art that a user can input information manually at a vehicle-mounted terminal difficultly and the risk of user information leakage exists, meanwhile, the vehicle-mounted system can only log in through a network in the prior art, and the vehicle-mounted system can not log in without the network, so that the user experience is poor. Specifically, in the embodiment of the application, the intelligent terminal is used for transmitting the user identity information of the user to the vehicle-mounted terminal for use, and in order to improve the safety of the user identity information, the encrypted identification information for representing the user identity information of the login vehicle-mounted system is embedded in the carrier audio and is sent to the vehicle-mounted terminal for identity authentication. Therefore, the embodiment of the application realizes that the user does not need to manually input the user identity information at the vehicle-mounted terminal, simplifies the user operation, and ensures the personal safety of the user because the user can less scatter attention on logging in the vehicle-mounted system due to convenient operation when logging in the vehicle-mounted system in the driving process. Meanwhile, the user identity information is embedded into the audio signal, and the concealing property is achieved, so that the purpose of preventing the user identity information from being leaked and protecting the information safety can be achieved. More importantly, the audio signal is generated through the intelligent terminal, and then the authentication of logging in the vehicle-mounted system is carried out after the audio signal is received through the vehicle-mounted terminal, so that the authentication process can still be realized under the condition of no network communication.
Fig. 1 is a schematic view of a scenario in which logging in an in-vehicle system is completed by using the scheme provided by the embodiment of the present application. The scene includes the intelligent terminal 11 of the user 10 and the in-vehicle terminal 12.
The user 10 can embed the encrypted identification information for representing the user identity information of the logged-in vehicle-mounted system into the audio signal through the intelligent terminal 11 and play the audio signal, and the vehicle-mounted terminal 12 receives the audio signal sent by the intelligent terminal 11. The in-vehicle terminal 12 analyzes the received audio signal to obtain encrypted identification information. The vehicle-mounted terminal 12 authenticates the obtained encrypted identification information, and after the authentication is successful, the vehicle-mounted system can be logged in.
The intelligent terminal 11 may be a mobile phone, a tablet computer, or other device capable of performing audio processing.
Of course, the specific implementation is not limited to the above-mentioned one, and the following describes the method for logging in the vehicle-mounted system according to the embodiment of the present application with reference to the drawings. FIG. 2 is a schematic flow chart of a method for logging in a vehicle-mounted system, including the following steps:
step 201: and embedding encrypted identification information for representing the identity information of the user logging in the vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information.
The identification information is information corresponding to the user identity information one to one, and can be a login token, high-frequency information, a random number, characters, authentication characters, audio and the like. For example, the high-frequency information is hidden in the low-frequency audio as the user identity information, so that the user identity information can be conveniently recognized, and the subsequent identity authentication is facilitated. The identification information is encrypted by an encryption algorithm, which includes but is not limited to a symmetric encryption algorithm, an asymmetric encryption algorithm, a signature algorithm, and the like.
Step 202: and sending the audio signal to authenticate the identity information of the logged-in vehicle-mounted system.
Like this, with identification information embedding to audio signal for identification information is difficult by the perception, can reach the effect of avoiding identity information to be revealed, so improved user's information security. Meanwhile, the vehicle-mounted system can be logged in only by sending an audio signal containing the identification information, and a user does not need to manually input information at the vehicle-mounted terminal, so that the user operation is simplified. In addition, the intelligent terminal generates an audio signal and sends the audio signal to the vehicle-mounted terminal, so that normal login can still be realized under the condition of no network communication.
In the embodiment of the present application, the preset carrier audio may be a range that is not acceptable to human ears, and may be specifically implemented as: the frequency domain range of the preset carrier audio is the frequency domain range of ultrasonic waves or infrasonic waves. Like this, through choosing for use the frequency domain scope of ultrasonic wave or infrasonic wave, can realize the login process under noiseless circumstances, when improving user's experience, log in on-vehicle system under the circumstances that other people can not the perception, also can improve user identity information's safety.
In this application embodiment, the preset carrier audio may also be a range that can be received by human ears, and meanwhile, the audio that the user wants can be obtained, which may be specifically implemented as: the preset carrier audio is obtained by receiving an instruction of selecting audio information by a user. For example: selecting songs that the user likes, a password and user-defined audio. Therefore, the user experience can be improved by selecting the carrier audio as the audio for logging in the vehicle-mounted system.
In order to further understand the technical solutions provided in the embodiments of the present application, the following steps are described in detail:
1. acquisition of encrypted identification information relating to user identity information characterizing a logged-in on-board system
In one embodiment, the user identity information may be an account and a password input by the user at the intelligent terminal, and in order to simplify user operation, in the embodiment of the application, the user may input the account and the password of the user when the user uses the vehicle-mounted system for the first time, and then the intelligent terminal stores the account and the password and generates identification information for representing the user identity information for logging in the vehicle-mounted system. When the vehicle-mounted system is logged in later, the user does not need to manually input an account and a password or a network, and can acquire the identification information by adopting a one-key triggering mode.
After the intelligent terminal generates the identification information, the identification information is synchronized to the vehicle-mounted terminal, and specifically, the method can be implemented by firstly sending the audio signal containing the identification information to the vehicle-mounted terminal. And after the vehicle-mounted terminal analyzes the identification information from the audio signal, the identification information is stored so as to be convenient for verification of logging in a vehicle-mounted system.
It should be noted that the identification information embedded in the audio signal is encrypted. And the encryption timing can be determined according to the actual requirement. For example, the smart terminal may store the encrypted identification information after generating the identification information, or may store the unencrypted identification information. But rather encrypted before embedding in the carrier audio.
In the above, the scheme of generating the identification information by the intelligent terminal is introduced, and further, the identification information may be generated by the cloud server. For example, when the smart terminal is capable of connecting to the cloud server, the following method may be implemented, including steps a1-a 2:
step A1: and sending the user identity information for logging in the vehicle-mounted system to a cloud server.
Step A2: and receiving encrypted identification information for representing the user identity information of the logged-in vehicle-mounted system.
The identification information is stored in the cloud server in one-to-one correspondence with the user identity information. With the corresponding relationship, the cloud server can search the corresponding identification information according to the user identity information sent by the intelligent terminal and push the identification information to the intelligent terminal. Of course, the correspondence relationship is also configured in advance in the in-vehicle terminal to realize authentication.
In addition, when the intelligent terminal, the vehicle-mounted terminal and the cloud server are networked, the cloud server does not need to store the corresponding relation, and the cloud server sends the corresponding relation between the identification information and the user identity information to the intelligent terminal and the vehicle-mounted terminal for logging in a vehicle-mounted system through the intelligent terminal subsequently. Correspondingly, as shown in fig. 3, another scene schematic diagram for completing logging in the vehicle-mounted system by the scheme provided by the embodiment of the application is shown. The scene includes a smart terminal 31 of a user 30, a cloud server 32, and an on-vehicle terminal 33.
When the intelligent terminal 31 and the vehicle-mounted terminal 33 are networked with the cloud server 32, the user 30 can send user identity information for logging in the vehicle-mounted system to the cloud server 32 through the intelligent terminal 31, after the cloud server 32 receives the user identity information, the cloud server 32 sends the corresponding relation between the identification information and the user identity information to the intelligent terminal 31 and the vehicle-mounted terminal 33, and the intelligent terminal 31 and the vehicle-mounted terminal 33 receive and store the corresponding relation.
Then, when the smart terminal 31, the in-vehicle terminal 33 and the cloud server 32 cannot communicate with each other, if login authentication of the in-vehicle system is to be achieved, the smart terminal 31 may transmit an audio signal embedded with encrypted identification information to the in-vehicle terminal 33. Then, the in-vehicle terminal 33 analyzes the received audio signal to obtain encrypted identification information. The vehicle-mounted terminal 33 decrypts the encrypted identification information to obtain identification information, searches for user identity information corresponding to the decrypted identification information according to the stored corresponding relationship, performs authentication according to the identity information, and logs in the vehicle-mounted system after the authentication is successful.
Furthermore, no matter the intelligent terminal generates identification information by itself or acquires the identification information from the cloud server, in the embodiment of the application, in order to improve the safety of the identification information, the identification information can be stored in the memory space and updated regularly. Therefore, even if the identification information stored in the intelligent terminal is leaked, the leaked identification information is invalid due to periodic updating, and the aim of information safety is fulfilled.
The updating of the identification information may be initiated by the intelligent terminal or initiated by the cloud server. When the intelligent terminal is actively started, the intelligent terminal can periodically send a request for updating the identification information to the cloud server according to a preset updating period, and then receives the updated identification information sent by the cloud server.
When the cloud server is actively started, the cloud server automatically updates the identification information according to preset time and sends the updated identification information to the intelligent terminal.
In addition, in order to ensure that the identification information of the intelligent terminal can normally log in the vehicle-mounted system, the cloud server also needs to synchronize the identification information to the vehicle-mounted terminal so that the identification information of the intelligent terminal is consistent with that of the vehicle-mounted terminal.
Further, the identification information can also have timeliness so that the vehicle-mounted terminal can verify whether the identification information is within the validity period represented by timeliness when verifying the identity of the user. Of course, if updated periodically, the validity period of the timeliness is less than the update cycle duration.
The foregoing describes an embodiment in which the smart terminal sends the audio signal to the vehicle-mounted terminal for authentication, and an embodiment in which the cloud server sends the audio signal to the vehicle-mounted terminal for authentication is described below. During specific implementation, if the vehicle-mounted terminal is networked with the cloud server, the cloud server can send the audio signal to the vehicle-mounted terminal for authentication. For example, after the cloud server generates the identification information according to the scheme, if the vehicle-mounted system needs to be logged in, the cloud server embeds the encrypted identification information into the carrier audio to generate an audio signal, and then sends the audio signal to the vehicle-mounted terminal for identity authentication.
Furthermore, in order to ensure the safety of user information, before the cloud server sends the audio signal to the vehicle-mounted terminal, a verification code can be sent to the intelligent terminal, the verification code input by the user is received, and after the correct verification code is input by the user, the audio signal is sent to the vehicle-mounted terminal to complete identity authentication.
The situation that the user uses the intelligent terminal to log in one vehicle-mounted system is introduced, and further, when the user has a plurality of vehicles, the same user identity information can be used by the vehicle-mounted systems of the plurality of vehicles (situation one), and the vehicle-mounted systems of different vehicles can correspond to different user identity information (situation two). In either case, when the user has multiple vehicles, the user can select the vehicle to log in. For example, as shown in fig. 4, the upper part is to select a login vehicle for selecting a vehicle that wants to login to the in-vehicle system; the lower part is used for acquiring the encrypted identification information which is used for acquiring the encrypted identification information corresponding to the selected vehicle. Therefore, when the user logs in the vehicle-mounted system, manual input is not needed, user operation is simplified, and the risk of information leakage caused by manual input and display of an account and a password is avoided. Meanwhile, even if a plurality of vehicles can log in the vehicle-mounted system, the vehicles can also log in through the intelligent terminal.
2. Embedding identification information into an audio signal
After the identification information is obtained through the above steps, the identification information needs to be embedded into the audio signal, and in the embodiment of the present application, the identification information may be used as a digital watermark and embedded into the carrier audio to obtain the audio signal containing the identified information. In specific implementation, preferably, the intelligent terminal may perform error correction interleaving and parallel-to-serial conversion on the encrypted identification information to improve robustness of watermark information hiding. Then, synthesizing the carrier audio and the identification information after the interleaving conversion into an audio signal containing encrypted identification information through audio synthesis; and then, after the synchronous information is added into the audio signal, the embedding of the identification information is completed. In addition, it should be noted that the carrier audio may be DCT-transformed before audio synthesis.
In the embodiment of the application, the identification information is embedded into the audio signal through the digital watermarking technology, so that the concealment and the safety of the identity information can be improved through the digital watermarking technology, and the danger of information leakage is prevented.
The foregoing description explains the present solution from the perspective of the smart terminal side, and the following further explains the method for logging in the vehicle-mounted system at the vehicle-mounted terminal side by using a specific embodiment. Specifically, fig. 5 is a schematic flow chart of the method. The method comprises the following steps:
step 501: and receiving an audio signal for logging in the vehicle-mounted system, wherein the audio signal contains encrypted identification information for representing the identity information of a user logging in the vehicle-mounted system.
Wherein the audio signal is received by a vehicle audio receiver.
Step 502: and resolving the encrypted identification information from the audio signal.
Step 503: and authenticating the identity information of the login vehicle-mounted system based on the encrypted identification information.
As described above, the audio signal sent by the intelligent terminal is received and analyzed to obtain the identification information and perform authentication. Like this, with identification information embedding to audio signal for identification information is difficult by the perception, can reach the effect of avoiding identity information to be revealed, so improved user's information security. Meanwhile, the vehicle-mounted system can be logged in only by sending an audio signal containing the identification information, and a user does not need to manually input information at the vehicle-mounted terminal, so that the user operation is simplified. In addition, the intelligent terminal generates an audio signal and sends the audio signal to the vehicle-mounted terminal, so that normal login can still be realized under the condition of no network communication.
The audio signal sent by the cloud server can also be received and analyzed to obtain the identification information and perform authentication. This may further improve the security of the user information.
In one embodiment, when the intelligent terminal embeds the identification information into the audio signal as a digital watermark, after the vehicle-mounted terminal receives the audio signal sent by the intelligent terminal, the identification information serving as the digital watermark can be extracted from the audio signal through a blind detection technology, and the user identity information in the identification information is authenticated.
As described above, the identification information and the user identity information may be synchronized to the vehicle-mounted terminal in advance by the intelligent terminal or the cloud server. In this case, in order to authenticate the acquired identification information, step 503 may be implemented as steps B1-B3:
step B1: and decrypting the identification information to obtain the original identification information.
Step B2: and matching the original identification information with pre-stored identification information.
Step B3: and if the matching is successful, logging in the vehicle-mounted system.
In the embodiment of the application, the pre-stored identification information in the vehicle-mounted system corresponds to the received identification information one by one, the corresponding user identity information is found by matching the identification information, and then the vehicle-mounted system is logged in. Therefore, the confidentiality and the safety of the user identity information are ensured through the correspondence between the identification information of the vehicle-mounted terminal and the identification information of the intelligent terminal.
In addition to the above, when the vehicle-mounted terminal is connected to the cloud server, the authentication process may be executed by the cloud server, the audio signal is sent to the cloud server through the vehicle-mounted terminal, and the cloud server sends the authentication result back to the vehicle-mounted terminal, so that the authentication process is safer.
The encrypted identification information is decrypted through the vehicle-mounted terminal, and the decryption method can adopt a password which is the same as the encryption password to decrypt the encrypted identification information. The encrypted identification information can also be decrypted by adopting an asymmetric encryption algorithm (also called public-private key encryption), the cloud server encrypts the identification information by using a public key, and the vehicle-mounted terminal decrypts the identification information by using a private key. Wherein the private key is configured to the vehicle-mounted terminal in advance.
In order to facilitate systematic understanding of the technical solutions provided in the embodiments of the present application, the following further describes the technical solutions by using specific examples, where the embodiments are the case where both the smart terminal and the vehicle-mounted terminal are connected to the cloud server. As shown in fig. 6, a vehicle owner or a driver wants to log in to the vehicle-mounted system through the intelligent terminal, which specifically includes the following steps:
step 601: and the intelligent terminal sends user identity information for logging in the vehicle-mounted system to the cloud server.
Step 602: and the cloud server receives the user identity information and then sends encrypted identification information for representing the user identity information for logging in the vehicle-mounted system to the intelligent terminal, wherein the cloud server generates a public key and a private key, encrypts the identification information by using the public key and synchronizes the private key to the vehicle-mounted terminal.
Step 603: and the intelligent terminal embeds the encrypted identification information into the carrier audio to obtain an audio signal containing the identification information.
Step 604: and the intelligent terminal sends the audio signal containing the identification information to the vehicle-mounted terminal.
Step 605: and the vehicle-mounted terminal acquires the audio signal containing the identification information, and analyzes the audio signal to obtain the encrypted identification information.
Step 606: and the vehicle-mounted terminal decrypts the encrypted identification information through a preset private key.
Step 607: and matching the decrypted identification information with the pre-stored identification information.
Step 608: and finding out corresponding user identity information by matching the identification information, and then logging in a vehicle-mounted system.
Based on the same inventive concept, an embodiment of the present application further provides a system for logging in an on-board system, as shown in fig. 7, the system includes:
the intelligent terminal 701 is used for embedding encrypted identification information for representing user identity information of a logged vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information; sending the audio signal to authenticate the identity information of the logged-in vehicle-mounted system;
the vehicle-mounted terminal 702 receives an audio signal for logging in a vehicle-mounted system, wherein the audio signal contains token information for representing user identity information for logging in the vehicle-mounted system; parsing the token information from the audio signal; and authenticating the identity information of the login vehicle-mounted system based on the token information.
Further, the system further includes a cloud server 703;
the intelligent terminal is specifically used for sending the user identity information used for logging in the vehicle-mounted system to the cloud server; receiving encrypted identification information for representing user identity information of a login vehicle-mounted system;
the cloud server is used for receiving user identity information which is sent by the intelligent terminal and used for logging in the vehicle-mounted system; generating encrypted identification information for representing the user identity information of the logged-in vehicle-mounted system; and sending the identification information to an intelligent terminal.
Based on the same inventive concept, the embodiment of the application also provides a device for logging in the vehicle-mounted system. As shown in fig. 8, the apparatus includes:
the embedding module 801 is configured to embed encrypted identification information, which is used for representing user identity information of a logged vehicle-mounted system, into a preset carrier audio to obtain an audio signal containing the identification information;
a sending module 802, configured to send the audio signal to authenticate the identity information of the logged in vehicle-mounted system. Further, in the device, the frequency domain range of the preset carrier audio is the frequency domain range of ultrasonic waves or infrasonic waves.
Further, in the device, the preset carrier audio is obtained by receiving an instruction of selecting audio information by a user.
Further, the apparatus further comprises:
the sending server module is used for sending the user identity information used for logging in the vehicle-mounted system to the cloud server;
and the identification information receiving module is used for receiving encrypted identification information used for representing the user identity information of the login vehicle-mounted system.
Further, in the apparatus, the identification information is stored in a memory space and is periodically updated.
Based on the same inventive concept, the embodiment of the application also provides a device for logging in the vehicle-mounted system. As shown in fig. 9, the apparatus includes:
a module 901 for receiving an audio signal used for logging in a vehicle-mounted system, where the audio signal contains identification information used for representing user identity information of logging in the vehicle-mounted system;
a parsing module 902, configured to parse the identification information from the audio signal;
and the authentication module 903 is configured to authenticate the identity information of the logged in vehicle-mounted system based on the identification information.
Further, in the device, the audio signal is received by a vehicle-mounted audio receiver.
Further, the authentication module includes:
the decryption unit is used for decrypting the identification information to obtain original identification information;
the matching unit is used for matching the original identification information with pre-stored identification information;
and the login unit is used for logging in the vehicle-mounted system if the matching is successful.
Having described the method and apparatus for logging in an onboard system according to an exemplary embodiment of the present application, a computing apparatus according to another exemplary embodiment of the present application is described next.
As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method or program product. Accordingly, various aspects of the present application may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
In some possible implementations, a computing device may include at least one processor, and at least one memory, according to embodiments of the application. Wherein the memory stores program code which, when executed by the processor, causes the processor to perform the steps 201 and 203 of the method for logging in an in-vehicle system according to various exemplary embodiments of the present application described above in this specification.
The computing device 100 according to this embodiment of the present application is described below with reference to fig. 10. The computing device 100 shown in fig. 10 is only an example and should not bring any limitation to the function and scope of use of the embodiments of the present application. The computing device may be, for example, a cell phone, a tablet computer, or the like.
As shown in fig. 10, computing device 100 is embodied in the form of a general purpose computing device. Components of computing device 100 may include, but are not limited to: the at least one processor 101, the at least one memory 102, and a bus 103 connecting the various system components (including the memory 102 and the processor 101).
Bus 103 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
Memory 102 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)1021 and/or cache memory 1022, and may further include Read Only Memory (ROM) 1023.
Memory 102 may also include a program/utility 1025 having a set (at least one) of program modules 1024, such program modules 1024 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Computing device 100 may also communicate with one or more external devices 104 (e.g., pointing devices, etc.), with one or more devices that enable a user to interact with computing device 100, and/or with any devices (e.g., routers, modems, etc.) that enable computing device 100 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 105. Also, the computing device 100 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) through the network adapter 106. As shown, the network adapter 106 communicates with other modules for the computing device 100 over the bus 103. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computing device 100, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In some possible embodiments, the various aspects of the method for logging in an in-vehicle system provided by the present application may also be implemented in the form of a program product, which includes program code for causing a computer device to perform the steps in the method for logging in an in-vehicle system according to various exemplary embodiments of the present application described above in this specification, when the program product runs on the computer device, and perform the steps 201 and 202 as shown in fig. 2.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The login vehicle-mounted system of the embodiment of the application can adopt a portable compact disc read only memory (CD-ROM) and comprises program codes, and can run on a computing device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user computing device, partly on the user equipment, as a stand-alone software package, partly on the user computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Moreover, although the operations of the methods of the present application are depicted in the drawings in a sequential order, this does not require or imply that these operations must be performed in this order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a manner that causes the instructions stored in the computer-readable memory to produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A method of logging into an in-vehicle system, the method comprising:
embedding encrypted identification information for representing user identity information of a login vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information;
and sending the audio signal to authenticate the user identity information of the login vehicle-mounted system.
2. The method of claim 1, wherein the preset carrier audio frequency domain range is an ultrasonic or infrasonic frequency domain range.
3. The method of claim 1, wherein the predetermined carrier audio is obtained by receiving an instruction from a user to select audio information.
4. The method according to any one of claims 1 to 3, further comprising a preceding step,
sending the user identity information for logging in the vehicle-mounted system to a cloud server;
and receiving encrypted identification information for representing the user identity information of the logged-in vehicle-mounted system.
5. The method of claim 4, further comprising storing the identification information in a memory space and updating the identification information periodically.
6. A method of logging into an in-vehicle system, the method comprising:
receiving an audio signal for logging in the vehicle-mounted system, wherein the audio signal contains encrypted identification information for representing user identity information of the logged in vehicle-mounted system;
parsing the encrypted identification information from the audio signal;
and authenticating the identity information of the login vehicle-mounted system based on the encrypted identification information.
7. The method of claim 6, wherein the audio signal is received by a car audio receiver.
8. The method of claim 6, wherein the step of authenticating the identity information of the logged in vehicle system based on the identification information comprises:
decrypting the encrypted identification information to obtain original identification information;
matching the original identification information with pre-stored identification information;
and if the matching is successful, logging in the vehicle-mounted system.
9. An apparatus for logging into an onboard system, the apparatus comprising:
the embedded module is used for embedding encrypted identification information used for representing user identity information of a logged vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information;
and the sending module is used for sending the audio signal to authenticate the identity information of the logged vehicle-mounted system.
10. A system for logging into an onboard system, the system comprising:
the intelligent terminal is used for embedding encrypted identification information used for representing user identity information of a logged vehicle-mounted system into a preset carrier audio to obtain an audio signal containing the identification information; sending the audio signal to authenticate the identity information of the logged-in vehicle-mounted system;
the vehicle-mounted terminal is used for receiving an audio signal for logging in a vehicle-mounted system, wherein the audio signal contains token information for representing user identity information for logging in the vehicle-mounted system; parsing the token information from the audio signal; and authenticating the identity information of the login vehicle-mounted system based on the token information.
CN201811152700.7A 2018-09-29 2018-09-29 Method, device and system for logging in vehicle-mounted system and storage medium Pending CN110971574A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811152700.7A CN110971574A (en) 2018-09-29 2018-09-29 Method, device and system for logging in vehicle-mounted system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811152700.7A CN110971574A (en) 2018-09-29 2018-09-29 Method, device and system for logging in vehicle-mounted system and storage medium

Publications (1)

Publication Number Publication Date
CN110971574A true CN110971574A (en) 2020-04-07

Family

ID=70028160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811152700.7A Pending CN110971574A (en) 2018-09-29 2018-09-29 Method, device and system for logging in vehicle-mounted system and storage medium

Country Status (1)

Country Link
CN (1) CN110971574A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683105A (en) * 2020-08-12 2020-09-18 广州汽车集团股份有限公司 Internet of vehicles login control method and Internet of vehicles login control system
CN113141348A (en) * 2021-03-17 2021-07-20 重庆扬成大数据科技有限公司 Four-network-in-one data-based government affair safety guarantee working method
CN114285873A (en) * 2021-12-09 2022-04-05 阿波罗智联(北京)科技有限公司 Method, device, equipment and storage medium for establishing communication connection
CN114579193A (en) * 2022-03-08 2022-06-03 国泰新点软件股份有限公司 Multi-system loading method, device, equipment and storage medium
CN115021966A (en) * 2022-05-06 2022-09-06 深圳比特微电子科技有限公司 Voice access method, user access equipment and remote system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994595A (en) * 2015-05-29 2015-10-21 北京奇虎科技有限公司 Cell phone terminal and intelligent hardware networking control method thereof
CN106850580A (en) * 2017-01-04 2017-06-13 广州小鹏汽车科技有限公司 A kind of automobile account system and account automatic verification method
CN107102636A (en) * 2017-06-09 2017-08-29 国网重庆市电力公司电力科学研究院 A kind of car-mounted terminal based on acoustic communication technology
US20180063126A1 (en) * 2015-03-23 2018-03-01 Telefonaktiebolaget Lm Ericsson (Publ) Methods and user device and authenticator device for authentication of the user device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180063126A1 (en) * 2015-03-23 2018-03-01 Telefonaktiebolaget Lm Ericsson (Publ) Methods and user device and authenticator device for authentication of the user device
CN104994595A (en) * 2015-05-29 2015-10-21 北京奇虎科技有限公司 Cell phone terminal and intelligent hardware networking control method thereof
CN106850580A (en) * 2017-01-04 2017-06-13 广州小鹏汽车科技有限公司 A kind of automobile account system and account automatic verification method
CN107102636A (en) * 2017-06-09 2017-08-29 国网重庆市电力公司电力科学研究院 A kind of car-mounted terminal based on acoustic communication technology

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111683105A (en) * 2020-08-12 2020-09-18 广州汽车集团股份有限公司 Internet of vehicles login control method and Internet of vehicles login control system
CN113141348A (en) * 2021-03-17 2021-07-20 重庆扬成大数据科技有限公司 Four-network-in-one data-based government affair safety guarantee working method
CN113141348B (en) * 2021-03-17 2023-04-28 重庆扬成大数据科技有限公司 Four-network-based data government affair security guarantee working method
CN114285873A (en) * 2021-12-09 2022-04-05 阿波罗智联(北京)科技有限公司 Method, device, equipment and storage medium for establishing communication connection
CN114285873B (en) * 2021-12-09 2024-01-02 阿波罗智联(北京)科技有限公司 Method, device, equipment and storage medium for establishing communication connection
CN114579193A (en) * 2022-03-08 2022-06-03 国泰新点软件股份有限公司 Multi-system loading method, device, equipment and storage medium
CN114579193B (en) * 2022-03-08 2024-01-12 国泰新点软件股份有限公司 Multi-system loading method, device, equipment and storage medium
CN115021966A (en) * 2022-05-06 2022-09-06 深圳比特微电子科技有限公司 Voice access method, user access equipment and remote system

Similar Documents

Publication Publication Date Title
CN110971574A (en) Method, device and system for logging in vehicle-mounted system and storage medium
CN109150548B (en) Digital certificate signing and signature checking method and system and digital certificate system
KR102375777B1 (en) Payment authentication method, device and system for on-board terminal
EP3723399A1 (en) Identity verification method and apparatus
KR101786177B1 (en) Method and apparatus for performing secure bluetooth communication
CN101860540B (en) Method and device for identifying legality of website service
CN111376865B (en) Vehicle digital key activation method, system and storage medium
EP3001598B1 (en) Method and system for backing up private key in electronic signature token
CN102177678B (en) Trusted and confidential remote TPM initialization
US20220311767A1 (en) Method and system for granting remote access to an electronic device
CN104038486A (en) System and method for realizing user login identification based on identification type codes
CN106470103B (en) Method and system for sending encrypted URL request by client
CN110719173A (en) Information processing method and device
CN104836784A (en) Information processing method, client, and server
CN110838919B (en) Communication method, storage method, operation method and device
CN111277550A (en) RESTful-based interaction method, server, client and device
CN107181589B (en) Bastion machine private key management method and device
CN106789928B (en) Unlocking method and device based on system bidirectional authentication
CN109120611B (en) User authentication method, apparatus, system and medium for address generation server
CN111291398B (en) Block chain-based authentication method and device, computer equipment and storage medium
CN110808998B (en) Initialization of identity authentication device, identity authentication method and device
CN112351043A (en) Vehicle navigation factory setting password management method and system
CN112632481A (en) Method for authorizing software, terminal device and storage medium
CN104378334A (en) Information processing method and system based on mobile device
KR101793258B1 (en) System and method for authenticating terminal device based on OTP

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200407