CN113415254B - Intelligent key safety verification method and device and computer readable storage medium - Google Patents

Intelligent key safety verification method and device and computer readable storage medium Download PDF

Info

Publication number
CN113415254B
CN113415254B CN202110775971.3A CN202110775971A CN113415254B CN 113415254 B CN113415254 B CN 113415254B CN 202110775971 A CN202110775971 A CN 202110775971A CN 113415254 B CN113415254 B CN 113415254B
Authority
CN
China
Prior art keywords
intelligent key
key
security
user
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110775971.3A
Other languages
Chinese (zh)
Other versions
CN113415254A (en
Inventor
彭京思
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Autel Intelligent Technology Corp Ltd
Original Assignee
Autel Intelligent Technology Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Autel Intelligent Technology Corp Ltd filed Critical Autel Intelligent Technology Corp Ltd
Priority to CN202110775971.3A priority Critical patent/CN113415254B/en
Publication of CN113415254A publication Critical patent/CN113415254A/en
Application granted granted Critical
Publication of CN113415254B publication Critical patent/CN113415254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/2018Central base unlocks or authorises unlocking

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention relates to the technical field of automobile intelligent keys, and discloses an intelligent key safety verification method, an intelligent key safety verification device and a computer readable storage medium. The method comprises the following steps: acquiring a switching request of a user for the intelligent key, wherein the switching request is used for requesting to switch a control object of the intelligent key from a current vehicle to a target vehicle; determining a security verification mode for the user according to the switching request; performing security verification on the user according to the security verification mode; and if the safety verification is passed, switching the control object of the intelligent key from the current vehicle to the target vehicle. The embodiment of the invention improves the safety of the intelligent key of the automobile.

Description

Intelligent key safety verification method and device and computer readable storage medium
Technical Field
The embodiment of the invention relates to the technical field of automobile intelligent keys, in particular to an intelligent key safety verification method, an intelligent key safety verification device and a computer readable storage medium.
Background
An automobile intelligent key is an intelligent terminal capable of opening or closing an automobile. The traditional automobile key can only control a single automobile, and different automobile keys are required to be used when a user drives different automobiles; and the use of the smart key capable of controlling a plurality of automobiles can bring convenience to users.
In the related art, when the intelligent automobile key capable of controlling a plurality of automobiles is used, a user can switch the control object of the intelligent automobile key according to actual needs. However, the inventors discovered in the course of implementing embodiments of the present invention that: when the intelligent key of the automobile is borrowed or lost, because the intelligent key of the automobile can control a plurality of automobiles, the plurality of automobiles are in danger of being stolen, and the safety of the intelligent key of the automobile is lower.
Disclosure of Invention
In view of the foregoing problems, embodiments of the present invention provide a method and an apparatus for verifying security of a smart key, and a computer-readable storage medium, which are used to solve the problem in the prior art that security of an automobile smart key is low.
According to an aspect of an embodiment of the present invention, there is provided a smart key security verification method, including: acquiring a switching request of a user for the intelligent key, wherein the switching request is used for requesting to switch a control object of the intelligent key from a current vehicle to a target vehicle; determining a security verification mode for the user according to the switching request; performing security verification on the user according to the security verification mode; and if the safety verification is passed, switching the control object of the intelligent key from the current vehicle to the target vehicle.
In an optional manner, the determining, according to the handover request, a security authentication manner for the user includes: determining a security configuration mode of the intelligent key; and if it is determined that the intelligent key is configured with a uniform security verification mode aiming at different vehicles according to the security configuration mode, determining the uniform security verification mode as the security verification mode for the user.
In an optional manner, the method further comprises: if the intelligent key is determined to be respectively configured with different safety verification modes aiming at different vehicles according to the safety configuration mode, determining a safety verification mode corresponding to the target vehicle; and determining the safety verification mode corresponding to the target vehicle as the safety verification mode for the user.
In an alternative form, the method includes: determining an off-network time of the smart key; and if the off-grid time exceeds the off-grid time threshold, locking the control function of the intelligent key.
In an optional manner, the method further comprises: acquiring local configuration information of the intelligent key; determining whether the intelligent key starts remote protection or not according to the local configuration information; and if the intelligent key is determined to be unlocked for remote protection, synchronizing the vehicle control information of the intelligent key to a server.
In an alternative form, the method includes: acquiring a remote control instruction sent by the server, wherein the remote control instruction is generated by the server according to a remote control request of a user for the intelligent key; and disabling or erasing the control function of the remote protection vehicle by the intelligent key according to the remote control instruction, wherein the remote protection vehicle is a part or all of vehicles controlled by the intelligent key.
In an alternative manner, before the obtaining of the switching request of the user to the smart key, the method includes: acquiring a security configuration request of the user for the intelligent key; determining a security configuration mode of the intelligent key according to the security configuration request; if it is determined that the intelligent key needs to configure a uniform security verification mode aiming at different vehicles according to the security configuration mode, security verification information input by a user is obtained; and configuring the security verification mode according to the security verification information.
In an optional manner, the method further comprises: if the intelligent key is determined to need to configure different security verification modes aiming at different vehicles according to the security configuration mode, sequentially acquiring security verification information corresponding to different vehicles, which is input by a user; and configuring the safety verification modes of different vehicles in sequence according to the safety verification information corresponding to different vehicles.
In addition, to achieve the above object, an embodiment of the present invention provides a security key verification apparatus, which includes a memory and a processor, wherein the memory stores a security key verification system operable on the processor, and the security key verification system, when executed by the processor, causes the processor to perform the operations of the above method.
Further, to achieve the above object, an embodiment of the present invention provides a computer-readable storage medium having a smart key security authentication program stored thereon, which is executable by at least one processor, so that the processor performs the operations of the above method.
In the embodiment of the invention, when a user requests to switch the control object of the intelligent key from the current vehicle to the target vehicle, the safety verification mode of the user can be determined according to the switching request of the user, and the safety verification is carried out on the user according to the safety verification mode; and if the safety verification of the user passes, switching the control object of the intelligent key from the current vehicle to the target vehicle. Through the process, the safety risk of the intelligent key in the borrowing or losing process can be avoided, and the safety of the intelligent key in the using process is improved.
Drawings
The drawings are only for purposes of illustrating embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart illustrating a security verification method for a smart key according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram illustrating a smart key security verification apparatus according to an embodiment of the present invention;
fig. 3 shows a schematic structural diagram of a smart key security verification system provided in an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein.
Fig. 1 is a flowchart illustrating a security verification method for a smart key according to an embodiment of the present invention, where the method may be performed by a device, and the device may be implemented by software and/or hardware. As shown in fig. 1, the method comprises the steps of:
step 110: and acquiring a switching request of a user for the intelligent key, wherein the switching request is used for requesting to switch the control object of the intelligent key from the current vehicle to the target vehicle.
The intelligent key in the embodiment of the invention can control a plurality of different automobiles. The smart key may include a display screen, and the user may request switching of the control object of the smart key from the current vehicle to the target vehicle by triggering the display screen of the smart key. For example, the smart key may control three vehicles a, B, and C, where the current vehicle is vehicle a, and if the user needs the smart key to control vehicle B, the user may send a switching request to the smart key through an identifier associated with vehicle B on the display screen.
Step 120: and determining a security verification mode for the user according to the switching request.
The intelligent key can perform security verification on the user according to the switching request of the user so as to reduce security risks existing when the intelligent key is lost or stolen. Before the user is subjected to security authentication, the security authentication mode of the user needs to be determined. Further, a security authentication mode for the user may be determined according to a security configuration mode of the smart key.
Further, the security configuration mode of the smart key may be determined first, and the security configuration mode of the smart key generally includes three modes, that is, the smart key configures a uniform security verification mode for different vehicles, the smart key configures different security verification modes for different vehicles, and the smart key does not configure a security verification mode. If the intelligent key is determined to be configured with a uniform security verification mode aiming at different vehicles, determining the uniform security verification mode as a security verification mode for the user; if the fact that the intelligent key is configured with different safety verification modes for different vehicles is determined, the safety verification mode corresponding to the target vehicle is determined to be the safety verification mode for the user after the safety verification mode corresponding to the target vehicle is determined.
Further, before acquiring a switching request of the user for the smart key, the user may preset a security configuration mode of the smart key. When the security configuration mode of the intelligent key is set, a security configuration request of a user for the intelligent key can be obtained, the security configuration mode of the intelligent key is determined according to the security configuration request, if the intelligent key is determined to need to be configured with a uniform security verification mode aiming at different vehicles according to the security configuration mode of the intelligent key, the security verification mode of the intelligent key is configured according to the security verification information after the security verification information input by the user is obtained. If the fact that the intelligent key needs to be configured with different safety verification modes aiming at different vehicles is determined according to the safety configuration mode of the intelligent key, the safety verification information corresponding to the different vehicles and input by a user is sequentially obtained, and the safety verification modes of the different vehicles are sequentially configured according to the safety verification information corresponding to the different vehicles.
It should be noted that, the user may directly set the security configuration mode of the smart key through the display screen of the smart key, or may set the security configuration mode of the smart key according to the prompt of the key tool. The key tool is used to configure the basic control functions of the fob so that the fob can control multiple vehicles. For example, the key tool may prompt the user to set a security configuration mode of the key while configuring the basic control functions of the key. For example, when configuring the basic control function of the 1 st vehicle, the key tool may prompt the user whether different security verification manners need to be configured for different vehicles, and if the user selects "yes", the key tool configures different security verification manners for different vehicles when configuring the basic control function of different vehicles for the smart key; if the user selects 'no', the key tool does not configure the security verification mode when configuring the basic control function of the 1 st vehicle. When the basic control function of the 2 nd vehicle is configured, the user is continuously prompted whether a unified safety verification mode needs to be configured for different vehicles, if the user selects 'yes', the key tool configures the basic control functions of different vehicles for the intelligent key, the unified safety verification mode is configured for different vehicles, and if the user selects 'no', the key tool does not configure the safety verification mode when the key tool configures the basic control functions of different vehicles for the intelligent key.
Step 130: and performing security verification on the user according to the security verification mode.
The intelligent key can acquire the safety verification information of the user through the display screen to perform safety verification on the user. For example, the user is prompted to input security verification information through the display screen, the security verification information input by the user is verified, if the security verification information is verified, the security verification of the user is passed, and if the security verification information is not verified, the security verification of the user is not passed. It should be noted that, the unified security verification mode or the security verification modes configured differently for different vehicles may be verified through multiple verification approaches, such as at least one of characters (including combinations of numbers, letters, and the like), figures, gestures, fingerprints, faces, pupils, sounds, and the like; accordingly, the security authentication information may also include various kinds, and the security authentication information may include, for example, characters (including a combination of numbers, letters, and the like), graphics, gestures, fingerprints, faces, pupils, sounds, and the like. The smart key may also include a sensor for acquiring security verification information.
Step 140: and if the safety verification is passed, switching the control object of the intelligent key from the current vehicle to the target vehicle.
And if the user passes the safety verification of the intelligent key, the intelligent key switches the control object from the current vehicle to the target vehicle. At this time, the user can complete the opening or closing of the target vehicle through the smart key. It should be noted that, after the smart key switches the control object from the current vehicle to the target vehicle, if the user needs to use the smart key to control the previous control object, security verification needs to be performed on the user again according to the security configuration of the smart key, and only after the user passes the security verification again, the smart key can control the previous control object.
The intelligent key in the embodiment of the invention can access the server through the network. When the intelligent key is accessed to the network, the user can remotely control the intelligent key through the server, so that the intelligent key and a vehicle controlled by the intelligent key can be remotely protected. In order to realize that the intelligent key can be remotely controlled through the server smoothly, the user can set the intelligent key so that the intelligent key is communicated with the server regularly. Furthermore, when the intelligent key is communicated with the server regularly, the off-network time of the intelligent key can be determined, wherein the off-network time is the difference between the current time and the time when the intelligent key is accessed into the network last time, and if the off-network time exceeds an off-network time threshold value, the control function of the intelligent key is locked; the control function may be to lock all control functions of the smart key, or to lock a switching function of the smart key, and after the smart key is locked, the user is required to verify or to unlock the network after refreshing. The off-grid time threshold may be set by a user. Furthermore, the user can set the smart key to open or close the remote protection function of the smart key, and the switch information of the remote protection function is stored in the local configuration information of the smart key. After the intelligent key detects that the remote protection function is started, the intelligent key needs to receive a control instruction sent by the server through the network and respond to the control instruction sent by the server. After the remote protection function is closed, the intelligent key does not need to receive a control instruction sent by the server through the network.
Further, local configuration information of the smart key can be acquired, whether remote protection is started by the smart key is determined according to the local configuration information of the smart key, and if it is determined that the remote protection is started by the smart key, vehicle control information of the smart key is synchronized to the server, so that the server can acquire the vehicle control information of the smart key in real time. The vehicle control information includes a smart key serial number, a key name, and a key ID. The intelligent key serial number is used for identifying the intelligent key, and each intelligent key corresponds to a unique intelligent key serial number. When the intelligent key is used for controlling a plurality of vehicles, the intelligent key corresponds to a plurality of key names, and different vehicle names are correspondingly controlled by different vehicles. The key ID is used to identify key names, each of which corresponds to a unique key ID. For example, in the initial state, the smart key controls the vehicle a and the vehicle B, and the server stores the smart key serial number, the key name and the key ID for controlling the vehicle a, and the key name and the key ID for controlling the vehicle B; the user adds a basic control function to the intelligent key according to actual needs, so that the intelligent key can control the vehicle A, the vehicle B and the vehicle C, and the intelligent key can synchronize vehicle control information including an intelligent key serial number, a key name for controlling the vehicle C and a key ID for controlling the vehicle C to the server. It should be noted that, both the key name and the key ID can be used to characterize the key of the smart key for controlling a specific vehicle, the user generally identifies the key for controlling the specific vehicle according to the key name, and the server and the smart key generally identify the key for controlling the specific vehicle according to the key ID. When the user needs to remotely control the intelligent key, a remote control request can be initiated to the server, and the server can generate a remote control instruction according to the remote control request of the user. Furthermore, a remote control instruction sent by the server may be obtained, the remote control instruction is generated by the server according to a remote control request of the user for the smart key, and the control function of the smart key for the remote protection vehicle is disabled or erased according to the remote control instruction, where the remote protection vehicle is a part or all of the vehicles controlled by the smart key.
When the intelligent key is used for forbidding the control function of the remote protection vehicle, the user cannot control the remote protection vehicle through the intelligent key within a period of time; when the user needs to recover the control of the remote protection vehicle, the remote control request can be sent to the server again, the server generates a new remote control instruction according to the remote control request sent by the user again, and the intelligent key can recover the control of the remote protection vehicle according to the new remote control instruction sent by the server. When the intelligent key is used for erasing the control function of the remote protection vehicle, the user permanently loses the control of the remote protection vehicle through the intelligent key, and the user cannot recover the control of the remote protection vehicle by sending a remote control request to the server. After the control function of the intelligent key for remotely protecting the vehicle is erased, if a user needs to control the remotely protecting vehicle again, the basic control function of the intelligent key needs to be reconfigured by a key tool.
In the embodiment of the invention, when a user requests to switch a control object of the intelligent key from a current vehicle to a target vehicle, a safety verification mode for the user can be determined according to the switching request of the user, and the safety verification is carried out on the user according to the safety verification mode; and if the safety verification of the user passes, switching the control object of the intelligent key from the current vehicle to the target vehicle. Through the process, the safety risk of the intelligent key in the borrowing or losing process can be avoided, and the safety of the intelligent key in the using process is improved.
Fig. 2 is a schematic structural diagram illustrating a security verification device for a smart key according to an embodiment of the present invention. Fig. 2 is a schematic diagram of a preferred embodiment of the key fob security verification apparatus of the present application.
In this embodiment, the smart key security verification apparatus may be a PC (Personal Computer), or may be a terminal device such as a smart phone, a tablet PC, a smart watch, a smart key, a key tool, and a mobile Computer.
The key fob security verification apparatus includes a processor (processor) 202, a communication Interface (communication Interface) 204, a memory (memory) 206, and a communication bus 208.
The memory 206 includes at least one type of readable storage medium, including flash memory, hard disk, multi-media card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, and the like. Memory 206 may be an internal storage unit of the key fob security verification device, such as a hard disk of the key fob security verification device, in some embodiments. The memory 206 may also be an external storage device of the key fob in other embodiments, such as a plug-in hard disk provided on the key fob, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and so on. Further, the memory 206 may also include both an internal storage unit of the key fob security verification apparatus and an external storage device. The memory 206 may be used to store not only application software installed in the smart key security authentication apparatus and various types of data, such as a code of the smart key security authentication system, but also temporarily store data that has been output or is to be output.
The processor 202, which in some embodiments may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip, is configured to execute program code stored in the memory 206 or process data, such as performing the functions of a key fob security verification system.
A communication bus 208 is used to enable connective communication between these components.
The network interface 204 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), typically used to establish a communication link between the apparatus and other electronic devices.
FIG. 2 only shows the keyfob security authentication device having the components 202-208 and the keyfob security authentication system, but it should be understood that not all of the shown components are required and that more or fewer components may alternatively be implemented.
Optionally, the electronic device may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may further comprise a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is used to display information processed in the smart key security authentication device and to display a visual user interface.
In the embodiment of the apparatus shown in FIG. 2, the memory 206 has stored therein a keyfob security verification system; the processor 202 implements the following operations when executing the functions of the keyfob security authentication system stored in the memory 206:
acquiring a switching request of a user for the intelligent key, wherein the switching request is used for requesting to switch a control object of the intelligent key from a current vehicle to a target vehicle; determining a security verification mode for the user according to the switching request; performing security verification on the user according to the security verification mode; and if the safety verification is passed, switching the control object of the intelligent key from the current vehicle to the target vehicle.
Further, processor 202 implements the following operations when executing the functions of the keyfob security verification system stored in memory 206:
determining a security configuration mode of the intelligent key; and if it is determined that the intelligent key is configured with a uniform security verification mode aiming at different vehicles according to the security configuration mode, determining the uniform security verification mode as the security verification mode for the user.
Further, the processor 202, when executing the functions of the smart key security verification system stored in the memory 206, performs the following operations:
if the intelligent key is determined to be respectively configured with different safety verification modes aiming at different vehicles according to the safety configuration mode, determining a safety verification mode corresponding to the target vehicle; and determining the safety verification mode corresponding to the target vehicle as the safety verification mode for the user.
Further, the processor 202, when executing the functions of the smart key security verification system stored in the memory 206, performs the following operations:
determining the off-network time of the intelligent key; and if the off-grid time exceeds the off-grid time threshold, locking the control function of the intelligent key.
Further, processor 202 implements the following operations when executing the functions of the keyfob security verification system stored in memory 206:
acquiring local configuration information of the intelligent key; determining whether the intelligent key starts remote protection according to the local configuration information; and if the intelligent key is determined to be unlocked for remote protection, synchronizing the vehicle control information of the intelligent key to a server.
Further, the processor 202, when executing the functions of the smart key security verification system stored in the memory 206, performs the following operations:
acquiring a remote control instruction sent by the server, wherein the remote control instruction is generated by the server according to a remote control request of a user for the intelligent key; and disabling or erasing the control function of the remote protection vehicle by the intelligent key according to the remote control instruction, wherein the remote protection vehicle is a part or all of vehicles controlled by the intelligent key.
Further, processor 202 implements the following operations when executing the functions of the keyfob security verification system stored in memory 206:
acquiring a security configuration request of the user for the intelligent key; determining a security configuration mode of the intelligent key according to the security configuration request; if it is determined that the intelligent key needs to configure a uniform security verification mode for different vehicles according to the security configuration mode, acquiring security verification information input by a user; and configuring the security verification mode according to the security verification information.
Further, processor 202 implements the following operations when executing the functions of the keyfob security verification system stored in memory 206:
if the intelligent key is determined to need to configure different safety verification modes aiming at different vehicles according to the safety configuration mode, sequentially acquiring safety verification information corresponding to different vehicles, which is input by a user; and sequentially configuring the safety verification modes of different vehicles according to the safety verification information corresponding to different vehicles.
In the embodiment of the invention, when a user requests to switch the control object of the intelligent key from the current vehicle to the target vehicle, the safety verification mode of the user can be determined according to the switching request of the user, and the safety verification is carried out on the user according to the safety verification mode; and if the safety verification of the user passes, switching the control object of the intelligent key from the current vehicle to the target vehicle. Through the process, the safety risk of the intelligent key in the borrowing or losing process can be avoided, and the safety of the intelligent key in the using process is improved.
Further, in other embodiments, the key fob security verification system may be divided into one or more modules, and one or more modules are stored in the memory 206 and executed by one or more processors (in this embodiment, the processor 202) to perform the present application. For example, referring to fig. 3, a schematic block diagram of a key fob security verification system in an embodiment of the key fob security verification apparatus of the present application is shown, in which the key fob security verification system can be divided into an acquisition module 310, a determination module 320, a verification module 330, and a switching module 340, which exemplarily:
the obtaining module 310 is configured to obtain a switching request of a user for the smart key, where the switching request is used to request that a control object of the smart key is switched from a current vehicle to a target vehicle; the determining module 320 is configured to determine a security authentication manner for the user according to the handover request; the verification module 330 is configured to perform security verification on the user according to the security verification manner; the switching module 340 is configured to switch the control object of the smart key from the current vehicle to the target vehicle if the security verification passes.
The functions or operation steps of the obtaining module 310, the determining module 320, the verifying module 330 and the switching module 340 implemented by the above embodiments are substantially the same as those of the above embodiments, and are not described herein again.
Furthermore, an embodiment of the present application also provides a computer-readable storage medium having a smart key security authentication program stored thereon, where the smart key security authentication program is executable by one or more processors to implement the following operations:
acquiring a switching request of a user for the intelligent key, wherein the switching request is used for requesting to switch a control object of the intelligent key from a current vehicle to a target vehicle; determining a security verification mode for the user according to the switching request; performing security verification on the user according to the security verification mode; and if the safety verification is passed, switching the control object of the intelligent key from the current vehicle to the target vehicle.
Further, the smart key security verification program when executed by the processor further performs the following operations:
determining a security configuration mode of the intelligent key; and if it is determined that the intelligent key is configured with a uniform security verification mode aiming at different vehicles according to the security configuration mode, determining the uniform security verification mode as the security verification mode for the user.
Further, the smart key security verification program when executed by the processor further performs the following operations:
if the intelligent key is determined to be respectively configured with different safety verification modes aiming at different vehicles according to the safety configuration mode, determining a safety verification mode corresponding to the target vehicle; and determining the safety verification mode corresponding to the target vehicle as the safety verification mode for the user.
Further, the smart key security verification program when executed by the processor further performs the following operations:
determining an off-network time of the smart key; and if the off-grid time exceeds the off-grid time threshold, locking the control function of the intelligent key.
Further, the smart key security verification program when executed by the processor further performs the following operations:
acquiring local configuration information of the intelligent key; determining whether the intelligent key starts remote protection or not according to the local configuration information; and if the intelligent key is determined to be unlocked for remote protection, synchronizing the vehicle control information of the intelligent key to a server.
Further, the smart key security verification program when executed by the processor further performs the following operations:
acquiring a remote control instruction sent by the server, wherein the remote control instruction is generated by the server according to a remote control request of a user for the intelligent key; and disabling or erasing the control function of the remote protection vehicle by the intelligent key according to the remote control instruction, wherein the remote protection vehicle is a part or all of vehicles controlled by the intelligent key.
Further, the smart key security verification program when executed by the processor further performs the following operations:
acquiring a security configuration request of the user for the intelligent key; determining a security configuration mode of the intelligent key according to the security configuration request; if it is determined that the intelligent key needs to configure a uniform security verification mode for different vehicles according to the security configuration mode, acquiring security verification information input by a user; and configuring the security verification mode according to the security verification information.
Further, the smart key security verification program when executed by the processor further performs the following operations:
if the intelligent key is determined to need to configure different safety verification modes aiming at different vehicles according to the safety configuration mode, sequentially acquiring safety verification information corresponding to different vehicles, which is input by a user; and sequentially configuring the safety verification modes of different vehicles according to the safety verification information corresponding to different vehicles.
The specific implementation of the computer-readable storage medium of the present application is substantially the same as the embodiments of the foregoing method and apparatus for verifying security of an intelligent key, and is not described herein again.
It should be noted that the above-mentioned serial numbers of the embodiments of the present application are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one of 8230, and" comprising 8230does not exclude the presence of additional like elements in a process, apparatus, article, or method comprising the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present application may be substantially or partially embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (9)

1. A smart key security verification method, the method comprising:
acquiring a switching request of a user for the intelligent key, wherein the switching request is used for requesting to switch a control object of the intelligent key from a current vehicle to a target vehicle;
determining a security verification mode for the user according to the switching request;
performing security verification on the user according to the security verification mode;
if the safety verification is passed, switching the control object of the intelligent key from the current vehicle to a target vehicle;
determining the off-network time of the intelligent key;
and if the off-grid time exceeds the off-grid time threshold, locking the control function of the intelligent key.
2. The method of claim 1, wherein the determining a security authentication manner for the user according to the handover request comprises:
determining a security configuration mode of the intelligent key;
and if it is determined that the intelligent key is configured with a uniform security verification mode aiming at different vehicles according to the security configuration mode, determining the uniform security verification mode as the security verification mode for the user.
3. The method of claim 2, further comprising:
if the intelligent key is determined to be respectively configured with different safety verification modes aiming at different vehicles according to the safety configuration mode, determining a safety verification mode corresponding to the target vehicle;
and determining the safety verification mode corresponding to the target vehicle as the safety verification mode for the user.
4. The method of claim 1, further comprising:
acquiring local configuration information of the intelligent key;
determining whether the intelligent key starts remote protection or not according to the local configuration information;
and if the intelligent key is determined to be unlocked for remote protection, synchronizing the vehicle control information of the intelligent key to a server.
5. The method according to claim 4, characterized in that it comprises:
acquiring a remote control instruction sent by the server, wherein the remote control instruction is generated by the server according to a remote control request of a user for the intelligent key;
and disabling or erasing the control function of the remote protection vehicle by the intelligent key according to the remote control instruction, wherein the remote protection vehicle is a part or all of vehicles controlled by the intelligent key.
6. The method of claim 2, wherein prior to said obtaining a user request for a key fob switch, the method comprises:
acquiring a security configuration request of the user for the intelligent key;
determining a security configuration mode of the intelligent key according to the security configuration request;
if it is determined that the intelligent key needs to configure a uniform security verification mode aiming at different vehicles according to the security configuration mode, security verification information input by a user is obtained;
and configuring the security verification mode according to the security verification information.
7. The method of claim 6, further comprising:
if the intelligent key is determined to need to configure different safety verification modes aiming at different vehicles according to the safety configuration mode, sequentially acquiring safety verification information corresponding to different vehicles, which is input by a user;
and sequentially configuring the safety verification modes of different vehicles according to the safety verification information corresponding to different vehicles.
8. A key fob security verification apparatus comprising a memory and a processor, the memory having stored thereon a key fob security verification system operable on the processor, the key fob security verification system, when executed by the processor, causing the processor to perform the operations of the method of any one of claims 1 to 7.
9. A computer-readable storage medium having stored thereon a fob security verification program executable by at least one processor to cause the processor to perform operations of the method of any one of claims 1 to 7.
CN202110775971.3A 2021-07-08 2021-07-08 Intelligent key safety verification method and device and computer readable storage medium Active CN113415254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110775971.3A CN113415254B (en) 2021-07-08 2021-07-08 Intelligent key safety verification method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110775971.3A CN113415254B (en) 2021-07-08 2021-07-08 Intelligent key safety verification method and device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN113415254A CN113415254A (en) 2021-09-21
CN113415254B true CN113415254B (en) 2022-11-29

Family

ID=77721679

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110775971.3A Active CN113415254B (en) 2021-07-08 2021-07-08 Intelligent key safety verification method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113415254B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2929829Y (en) * 2006-04-14 2007-08-01 黄艳 Automobile managing device using fingerprint identifying technology
CN104709238A (en) * 2015-03-13 2015-06-17 广东欧珀移动通信有限公司 Vehicle remote control method and mobile device
WO2015196943A1 (en) * 2014-06-24 2015-12-30 比亚迪股份有限公司 Vehicle control system, method and device, and computer readable storage medium
CN105216718A (en) * 2015-10-27 2016-01-06 重庆交通大学 Based on Automobile intelligent key system and the control method of internet
CN108806033A (en) * 2017-05-02 2018-11-13 Lg电子株式会社 Intelligent key, control system and the method for vehicle
CN109823304A (en) * 2017-11-23 2019-05-31 太和汉创汽车工程科技(武汉)有限公司 A kind of long-range control vehicle system based on multiple safety protection
CN112884952A (en) * 2021-04-07 2021-06-01 深圳市道通科技股份有限公司 Intelligent key control method, device, electronic equipment and system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101101293B1 (en) * 2011-04-15 2012-01-04 손순호 Secession alarm system of smart key for vehicle
US20150235487A1 (en) * 2014-02-14 2015-08-20 GM Global Technology Operations LLC Method for enabling peps key to operate multiple vehicles
CN205086829U (en) * 2015-10-27 2016-03-16 重庆交通大学 Intelligent automobile key system
DE102016008468A1 (en) * 2016-07-12 2017-02-16 Daimler Ag Car key to use multiple vehicles
CN107813789A (en) * 2016-09-13 2018-03-20 彭少华 A kind of alarms and security systems for automobiles and method for supporting remote control engine start
CN108773344A (en) * 2018-04-28 2018-11-09 北京长城华冠汽车科技股份有限公司 Anti-stealing method for vehicles and device
KR20200109182A (en) * 2019-03-12 2020-09-22 두산인프라코어 주식회사 Control system and control method for construction machinery
CN110203169A (en) * 2019-04-30 2019-09-06 惠州市德赛西威汽车电子股份有限公司 A method of automobile burglar grade is promoted based on car networking system
CN111746519A (en) * 2020-06-05 2020-10-09 重庆长安汽车股份有限公司 Safety monitoring method for short-distance remote control parking and computer readable storage medium
CN111959436B (en) * 2020-08-26 2022-10-25 东风电子科技股份有限公司 Method and device for realizing remote vehicle locking through automobile combination instrument

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2929829Y (en) * 2006-04-14 2007-08-01 黄艳 Automobile managing device using fingerprint identifying technology
WO2015196943A1 (en) * 2014-06-24 2015-12-30 比亚迪股份有限公司 Vehicle control system, method and device, and computer readable storage medium
CN104709238A (en) * 2015-03-13 2015-06-17 广东欧珀移动通信有限公司 Vehicle remote control method and mobile device
CN105216718A (en) * 2015-10-27 2016-01-06 重庆交通大学 Based on Automobile intelligent key system and the control method of internet
CN108806033A (en) * 2017-05-02 2018-11-13 Lg电子株式会社 Intelligent key, control system and the method for vehicle
CN109823304A (en) * 2017-11-23 2019-05-31 太和汉创汽车工程科技(武汉)有限公司 A kind of long-range control vehicle system based on multiple safety protection
CN112884952A (en) * 2021-04-07 2021-06-01 深圳市道通科技股份有限公司 Intelligent key control method, device, electronic equipment and system

Also Published As

Publication number Publication date
CN113415254A (en) 2021-09-21

Similar Documents

Publication Publication Date Title
CN110091828B (en) Vehicle key control method and device
CN102449631B (en) For performing the system and method for bookkeeping
CN110103883B (en) Vehicle key control method and device
US10489612B2 (en) Memory controller to verify authenticity of data
CN110136306B (en) Vehicle key control method and system
US8924742B2 (en) Multi-level data storage
US20190061691A1 (en) Method for authorizing a driver to activate at least one system of a vehicle, based on a biometric authentication process
US20160098065A1 (en) Terminal Device and Method for Fastening or Unlocking Functional Card of Terminal Device
EP2919499B1 (en) Version protection method and apparatus for mobile terminals
US10444792B2 (en) Unlocking control system, method and wearable device using the same
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
CN104021358A (en) Anti-theft control method and device for mobile terminal
CN113645590B (en) Method, device, equipment and medium for remotely controlling vehicle based on encryption algorithm
US20150047019A1 (en) Information processing method and electronic device
CN104477130A (en) Lock for automobile
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
WO2011003304A1 (en) Phone-card locking method and device for wireless communication
CN105184133A (en) Authentication method and apparatus, and corresponding mobile terminal
WO2001020463B1 (en) Security arrangement
CA2686691A1 (en) Simplified multi-factor authentication
CN113415254B (en) Intelligent key safety verification method and device and computer readable storage medium
CN109389720B (en) Intelligent door lock permission processing method and device
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
US20160078235A1 (en) Device and management module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant