CN113765855A - Internet of vehicles owner authentication method - Google Patents

Internet of vehicles owner authentication method Download PDF

Info

Publication number
CN113765855A
CN113765855A CN202010500270.4A CN202010500270A CN113765855A CN 113765855 A CN113765855 A CN 113765855A CN 202010500270 A CN202010500270 A CN 202010500270A CN 113765855 A CN113765855 A CN 113765855A
Authority
CN
China
Prior art keywords
vehicle
authenticated
user
authentication
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010500270.4A
Other languages
Chinese (zh)
Other versions
CN113765855B (en
Inventor
游东宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Automobile Group Co Ltd
Original Assignee
Guangzhou Automobile Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Automobile Group Co Ltd filed Critical Guangzhou Automobile Group Co Ltd
Priority to CN202010500270.4A priority Critical patent/CN113765855B/en
Publication of CN113765855A publication Critical patent/CN113765855A/en
Application granted granted Critical
Publication of CN113765855B publication Critical patent/CN113765855B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a method for authenticating car owners of a car network, which comprises the steps of obtaining a target authentication request sent by a user terminal, wherein the target authentication request comprises user information to be authenticated and vehicle information to be authenticated, and carrying out validity judgment based on the user information to be authenticated and the vehicle information to be authenticated to obtain a validity judgment result; if the validity judgment result is that the authentication is valid, acquiring an activation request triggered by the user terminal, and judging whether an activation signal triggered by a vehicle key in the vehicle can be received in an activation response time period, wherein the activation signal carries target vehicle information; if an activation signal triggered by a vehicle key in the vehicle is received in an activation response time period, judging whether the target vehicle information is matched with the vehicle information to be authenticated; and if the target vehicle information is matched with the vehicle information to be authenticated, the vehicle owner authentication is successful.

Description

Internet of vehicles owner authentication method
Technical Field
The invention relates to the field of Internet of vehicles, in particular to an Internet of vehicles owner authentication method.
Background
At present, vehicles are indispensable travel tools for people, and with the continuous development of science and technology, automobile service providers are also continuously developing vehicle functions to serve users, such as car networking functions and navigation functions.
The vehicle that has the car networking function at present, before the user uses the car networking function through user terminal, need the relation of authentication user and vehicle, after the authentication passes, can associate vehicle and user terminal, accomplish car networking owner's authentication to the user uses the car networking function. Currently, there are two main user authentication methods: a user inputs authentication data such as identity information, vehicle information and purchase invoice on a user terminal and sends the authentication data to a server, the server authenticates that the authentication data provided by the user is accurate, user authentication is completed, the user terminal and the vehicle are associated, but the security coefficient of the authentication mode is low, the authenticated user can complete authentication as long as the authenticated user takes the authentication data such as the vehicle information and the purchase invoice, but the authenticated user can authenticate vehicles of other people; the other method is that a user inputs authentication data such as identity information, vehicle information and purchase invoices on a user terminal and sends the authentication data to a server, then a two-dimensional code displayed on a display screen of a scanning vehicle is used for authentication, the authentication is carried out by utilizing the two-dimensional code, the transmission process of the two-dimensional code is easy to crack, the safety factor is not high, certain risk exists, the display screen is needed, and the cost is high.
Disclosure of Invention
The embodiment of the invention provides an Internet of vehicles owner authentication method, which aims to solve the problems of low safety coefficient and high cost in a vehicle authentication process.
A vehicle owner authentication method of the Internet of vehicles comprises the following steps:
acquiring a target authentication request sent by a user terminal, wherein the target authentication request comprises user information to be authenticated and vehicle information to be authenticated, and performing validity judgment based on the user information to be authenticated and the vehicle information to be authenticated to acquire a validity judgment result;
if the validity judgment result is that the authentication is valid, acquiring an activation request triggered by the user terminal, and judging whether an activation signal triggered by a vehicle key in the vehicle can be received in an activation response time period, wherein the activation signal carries target vehicle information;
if an activation signal triggered by a vehicle key in the vehicle is received in an activation response time period, judging whether the target vehicle information is matched with the vehicle information to be authenticated;
and if the target vehicle information is matched with the vehicle information to be authenticated, the vehicle owner authentication is successful.
Preferably, the target authentication request includes a user authentication request and a vehicle authentication request;
the acquiring of the target authentication request sent by the user terminal, where the target authentication request includes user information to be authenticated and vehicle information to be authenticated, includes:
acquiring a user authentication request sent by a user terminal, wherein the user authentication request comprises information of a user to be authenticated;
and acquiring a vehicle authentication request sent by a user terminal within an authentication valid time period, wherein the vehicle authentication request comprises information of a vehicle to be authenticated.
Preferably, the information of the user to be authenticated comprises information of a certificate to be authenticated and a name of the user to be authenticated; the information of the vehicle to be authenticated comprises an identification code of the vehicle to be authenticated and an engine number to be authenticated;
the obtaining of the validity judgment result based on the validity judgment of the user information to be authenticated and the vehicle information to be authenticated comprises:
based on the information of the certificate to be authenticated and the name of the user to be authenticated, calling an information query interface to query an official database and acquiring a user authentication result;
based on the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, calling an information query interface to query a service provider database and acquiring a vehicle authentication result;
if the user authentication result and the vehicle authentication result are both valid, the validity judgment result is that the authentication is valid;
and if at least one of the user authentication result and the vehicle authentication result is invalid, the validity judgment result is invalid for authentication.
Preferably, the acquiring a target authentication request sent by a user terminal, where the target authentication request includes user information to be authenticated and vehicle information to be authenticated, and performing validity judgment based on the user information to be authenticated and the vehicle information to be authenticated to acquire a validity judgment result, includes:
acquiring a user authentication request sent by a user terminal, wherein the user authentication request comprises user information to be authenticated carrying a user account, and the user information to be authenticated comprises certificate information to be authenticated and a user name to be authenticated;
based on the information of the certificate to be authenticated and the name of the user to be authenticated, calling an information query interface to query an official database and acquiring a user authentication result;
if the user authentication result is valid, acquiring a vehicle authentication request sent by a user terminal, wherein the vehicle authentication request comprises to-be-authenticated vehicle information carrying the same user account, and the to-be-authenticated vehicle information comprises to-be-authenticated vehicle identification codes and to-be-authenticated engine numbers;
based on the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, calling an information query interface to query a service provider database and acquiring a vehicle authentication result;
if the vehicle authentication result is valid, the validity judgment result is that the vehicle authentication is valid;
and if the vehicle authentication result is invalid, the validity judgment result is that the authentication is invalid.
Preferably, if the validity determination result is that the authentication is valid, acquiring the activation request triggered by the user terminal includes:
if the validity judgment result is that the authentication is valid, generating authentication valid information, sending the authentication valid information to a user terminal, and controlling the user terminal to trigger an activation button;
and acquiring an activation request triggered by the user terminal based on the activation button.
Preferably, the determining whether the activation signal triggered by the vehicle key in the vehicle can be received in the activation response time period includes:
starting a timing module to start timing based on the activation request;
when receiving an activation signal sent by a user terminal, the timing module stops timing to determine an activation operation time period;
if the activation operation time period is not greater than the activation response time period, the activation signal triggered by the vehicle key in the vehicle is received within the activation response time period;
and if the activation operation time period is greater than the activation response time period, determining that the activation signal triggered by the vehicle key in the vehicle cannot be received in the activation response time period.
Preferably, the vehicle information to be authenticated comprises a vehicle identification code to be authenticated and an engine number to be authenticated; the target vehicle information comprises a target vehicle identification code and a target engine number;
if the target vehicle information is matched with the to-be-authenticated vehicle information, the vehicle owner authentication is successful, and the method comprises the following steps:
and if the target vehicle identification code is matched with the vehicle identification code to be authenticated and the target engine number is matched with the engine number to be authenticated, the vehicle owner authentication is successful.
Preferably, before the validity judgment is performed based on the information of the user to be authenticated and the information of the vehicle to be authenticated and the validity judgment result is obtained, the method for authenticating the car owner in the internet of vehicles further includes:
determining the number of authenticated users associated with the vehicle information to be authenticated;
judging whether the number of the authenticated users is smaller than a preset authentication threshold value;
and if the number of the authenticated users is smaller than a preset authentication threshold value, performing validity judgment based on the information of the users to be authenticated and the information of the vehicles to be authenticated.
Preferably, before the obtaining of the target authentication request sent by the user terminal, the internet of vehicles owner authentication method further includes:
acquiring a user login request, wherein the user login request comprises a user account and a user password;
judging whether the user account and the user password are valid;
and if the user account and the user password are valid, entering an interface for authentication.
Preferably, the in-vehicle key is any one of a bcll key, an Ecall key, and a start key.
In the vehicle networking vehicle owner authentication method, validity judgment is carried out based on the user information to be authenticated and the vehicle information to be authenticated, a validity judgment result is obtained, when the validity judgment result is that authentication is valid, an activation request triggered by the user terminal is obtained, whether an activation signal triggered by a vehicle key in the vehicle can be received in an activation response time period is judged, the operation is simple, the safety is good, and the cost can be reduced. When an activation signal triggered by a vehicle key in the vehicle is received in an activation response time period, only if target vehicle information carried by the activation signal is matched with the vehicle information to be authenticated, the vehicle owner authentication is successful, the vehicle safety is guaranteed, the vehicle owner is protected, and the vehicle is prevented from being illegally associated. The embodiment utilizes multiple judgment processes to improve the safety of the vehicle owner authentication of the Internet of vehicles, ensure that only the vehicle owner or the legal vehicle user can perform authentication, and the user to be authenticated can realize the authentication by utilizing the user terminal and the vehicle key in the vehicle, so that the operation is simple.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a schematic diagram of an application environment of a car owner authentication method in an embodiment of the present invention;
FIG. 2 is a flowchart of a method for authenticating an owner of a vehicle in a vehicle networking system according to an embodiment of the present invention;
FIG. 3 is another flowchart of a method for authenticating a vehicle owner in a vehicle networking system according to an embodiment of the invention;
FIG. 4 is another flowchart of a method for authenticating a vehicle owner in a vehicle networking system according to an embodiment of the invention;
FIG. 5 is another flowchart of a method for authenticating a vehicle owner in a vehicle networking system according to an embodiment of the invention;
FIG. 6 is another flowchart of a method for authenticating a vehicle owner in a vehicle networking system according to an embodiment of the invention;
FIG. 7 is another flowchart of a method for authenticating a vehicle owner in a vehicle networking system according to an embodiment of the invention;
FIG. 8 is another flowchart of a method for authenticating a vehicle owner in a vehicle networking system according to an embodiment of the invention;
fig. 9 is another flowchart of the car owner authentication method in the car networking according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The vehicle owner authentication method in the vehicle networking provided by the embodiment of the invention can be applied to the application environment shown in fig. 1. Specifically, the vehicle networking vehicle owner authentication method is applied to a vehicle networking vehicle owner authentication system, the vehicle networking vehicle owner authentication system comprises a user terminal and a server shown in figure 1, and the user terminal and the server are communicated through a network and used for ensuring high safety factor and low cost in the vehicle networking vehicle owner authentication process. The user terminal is a program corresponding to the server and providing local service for the client. The user terminal may be installed on, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The server may be implemented as a stand-alone server or as a server cluster consisting of a plurality of servers.
In an embodiment, as shown in fig. 2, a car owner authentication method in the internet of vehicles is provided, which is described by taking the example that the method is applied to the server in fig. 1, and includes the following steps:
s201: the method comprises the steps of obtaining a target authentication request sent by a user terminal, wherein the target authentication request comprises user information to be authenticated and vehicle information to be authenticated, carrying out validity judgment based on the user information to be authenticated and the vehicle information to be authenticated, and obtaining a validity judgment result.
The user information to be authenticated is user information which is sent to the server by the user terminal for authentication so that the server can judge whether the user information is legal and accurate. For example, the user information to be authenticated may be the certificate information to be authenticated of the user, the name of the user to be authenticated, and the like. The document information to be authenticated refers to information corresponding to a valid document of a user, and may be, for example, an identity card or a passport of the user. The user to be authenticated is a user requesting authentication, and may be a vehicle owner or a legal vehicle user. In this example, the vehicle to be authenticated is a fuel automobile, and the vehicle information to be authenticated may be an identification code of the vehicle to be authenticated, an engine number to be authenticated, and the like; the vehicle information to be authenticated can be the vehicle identification code to be authenticated and the motor number to be authenticated.
The vehicle information to be authenticated refers to vehicle information which is sent to the server by the user terminal for authentication, so that the server can judge whether the information corresponding to the vehicle is legal and accurate. For example, the vehicle information to be authenticated may be a vehicle identification code to be authenticated, an engine number to be authenticated, and the like.
The target authentication request is sent to the server by the user terminal, so that the server judges whether the information of the user to be authenticated and the information of the vehicle to be authenticated are valid and accurate, and the target authentication request is subsequently used for requesting the vehicle owner authentication of the internet of vehicles.
The validity judgment result refers to whether the user information to be authenticated and the vehicle information to be authenticated are legal and accurate, and the validity judgment result comprises authentication validity and authentication invalidity.
Specifically, a user to be authenticated fills in user information to be authenticated and vehicle information to be authenticated on an authentication interface of a user terminal, generates a target authentication request and sends the target authentication request to a server, so that the server authenticates the user information to be authenticated and the vehicle information to be authenticated, a subsequent authentication process is guaranteed to be performed based on legal and accurate user information to be authenticated and vehicle information to be authenticated, and the safety factor of the authentication process is improved. After the server acquires the user information to be authenticated and the vehicle information to be authenticated, the server calls an interface to query a database so as to judge whether the user information to be authenticated and the vehicle information to be authenticated are the same as the inventory user information and the inventory vehicle information which are stored in the database in advance, so that the user information to be authenticated and the vehicle information to be authenticated are ensured to be accurate and effective, and guarantee is provided for the subsequent realization of vehicle owner authentication of the Internet of vehicles. If the user information to be authenticated and the vehicle information to be authenticated are the same as the inventory user information and the inventory vehicle information which are stored in the database in advance, the validity judgment result is that the authentication is valid; and if any one of the user information to be authenticated and the vehicle information to be authenticated is different from the inventory user information and the inventory vehicle information which are stored in the database in advance, the validity judgment result is that the authentication is invalid. In this example, the interface is invoked to query the database to match the user information to be authenticated and the vehicle information to be authenticated with the inventory user information and the inventory vehicle information pre-stored in the database, so as to quickly determine an effective determination result. The database is used for storing inventory user information and inventory vehicle information; the stock user information refers to user information pre-stored in a database; the stock vehicle information is vehicle information stored in advance in a database.
S202: and if the validity judgment result is that the authentication is valid, acquiring an activation request triggered by the user terminal, and judging whether an activation signal triggered by a vehicle key in the vehicle can be received in an activation response time period, wherein the activation signal carries target vehicle information.
The activation request refers to a request sent by the user terminal to the server so that the server can associate the vehicle with the user to be authenticated and complete vehicle owner authentication of the Internet of vehicles.
The target vehicle information refers to information carried by the vehicle itself, and includes a target vehicle identification code and a target engine number.
The activation response time period refers to a preset time period, and the activation response time period can be understood as a valid time period of the activation request. In this example, if the server receives the activation signal within the activation response time period, the server performs subsequent processing according to the activation request and the activation signal; if the activation signal is not received in the activation response time period, the activation request and the activation signal are invalid, and subsequent processing is not carried out according to the activation request and the activation signal of the communication so as to standardize the vehicle owner authentication process of the Internet of vehicles.
The activation signal is a signal for activating the vehicle, which is sent to the server by using a vehicle key in the vehicle when the user to be authenticated enters the vehicle. In the example, the activation signal is triggered by the vehicle key in the vehicle, and other equipment for realizing activation authentication does not need to be additionally arranged, so that the cost is low; because the key of the vehicle in the vehicle is used for sending the activation signal, the activation signal is communicated with the server through the vehicle-mounted T-BOX of the vehicle, and the private protocol between the vehicle and the server is used, so that the safety coefficient of the vehicle owner authentication process of the Internet of vehicles is improved. The T-BOX is a short name of Telematics BOX, and the vehicle-mounted T-BOX is mainly used for APP communication installed on vehicles and servers or user terminals.
In this example, only when the vehicle information to be authenticated is valid for authentication, the activation request sent by the user terminal to be authenticated is received, and whether the activation signal triggered by the vehicle key in the vehicle is received in the activation response time period is judged, so that the subsequent server judges whether the vehicle information to be authenticated and the target vehicle information in the activation signal are the same, and the user only needs to operate the user terminal and the vehicle key in the vehicle, so that the operation is simple, the safety is good, and the cost can be reduced. In the prior art, a user to be authenticated generally scans a two-dimensional code of a display screen arranged on a vehicle to authenticate the vehicle, the scheme needs to start a host arranged on the vehicle to access a network, a server is used for sending the two-dimensional code to a corresponding host, an HTTP (hyper text transport protocol) protocol and the like are used, and the safety factor is low; the user needs to scan the two-dimensional code, start the display screen and open the two-dimensional code, and the operation process is complex; or when the authentication result of the user information to be authenticated and the vehicle information to be authenticated is valid, the user information to be authenticated and the vehicle information to be authenticated are directly stored in an associated manner, so that great potential safety hazards exist, because the channels for acquiring the vehicle information to be authenticated are more, the leakage is easy, and the risk that the user to be authenticated authenticates other vehicles exists.
S203: if an activation signal triggered by a vehicle key in the vehicle is received in the activation response time period, whether the target vehicle information is matched with the vehicle information to be authenticated is judged;
specifically, an activation signal triggered by a vehicle key in the vehicle is received in an activation response time period, whether target vehicle information carried by the activation signal is matched with vehicle information to be authenticated is judged, and only when the target vehicle information is matched with the vehicle information to be authenticated, subsequent steps are performed, so that the vehicle safety is guaranteed, and the vehicle is prevented from being illegally associated by others.
S204: and if the target vehicle information is matched with the vehicle information to be authenticated, the vehicle owner authentication is successful.
The vehicle networking database is used for storing the information of the user to be authenticated and the information of the vehicle to be authenticated in an associated mode.
Specifically, the target vehicle information is matched with the vehicle information to be authenticated, which shows that the user to be authenticated can enter the vehicle and send an activation signal by using the vehicle key in the vehicle, and then the user to be authenticated is proved to be the vehicle owner or the legal user, and has the right of use of the vehicle, so as to ensure that the vehicle is associated with the vehicle owner or the legal user, and at this time, the vehicle owner authentication is successful, and the vehicle owner authentication of the internet of vehicles is realized.
In one embodiment, the in-vehicle key is any one of a bcll key, an Ecall key, or an activation key. In this embodiment, the user to be authenticated sends an activation signal to the server through the vehicle-mounted T-BOX by using the bcll, the Ecall, or the start button, and the security is high by using a private protocol between the vehicle and the service provider, so that the subsequent server performs corresponding processing on the activation signal. It should be noted that only in the activation response time period, the to-be-authenticated user sends the activation signal to the server by using the bcll, the Ecall, or the activation key, and the server authenticates whether the activation signal matches the to-be-authenticated vehicle information. It can be understood that, the activation signal is sent to the server by using the Bcall, the Ecall or the start key, the operation is simple, the implementation is easy, and the cost can be saved.
The vehicle networking vehicle owner authentication method provided by the embodiment performs validity judgment based on user information to be authenticated and vehicle information to be authenticated, obtains a validity judgment result, obtains an activation request triggered by a user terminal when the validity judgment result is that the authentication is valid, and judges whether an activation signal triggered by a vehicle key in a vehicle can be received in an activation response time period. When an activation signal triggered by a vehicle key in the vehicle is received in the activation response time period, the vehicle owner authentication is successful only when the target vehicle information carried by the activation signal is matched with the vehicle information to be authenticated, so that the vehicle safety is guaranteed, the vehicle owner is protected, and the vehicle is prevented from being illegally associated. The embodiment utilizes multiple judgment processes to improve the safety of the vehicle owner authentication of the Internet of vehicles, ensure that only the vehicle owner or the legal vehicle user can perform authentication, and the user to be authenticated can realize the authentication by utilizing the user terminal and the vehicle key in the vehicle, so that the operation is simple.
In one embodiment, as shown in FIG. 3, the target authentication request includes a user authentication request and a vehicle authentication request; step S201, acquiring a target authentication request sent by a user terminal, where the target authentication request includes user information to be authenticated and vehicle information to be authenticated, and includes:
s301: and acquiring a user authentication request sent by a user terminal, wherein the user authentication request comprises information of a user to be authenticated.
The user authentication request refers to a request sent by the user terminal to the server so that the server can judge whether the vehicle information to be authenticated is legal and accurate.
As an example, a user fills in user information to be authenticated on a user terminal, where the user information to be authenticated includes, but is not limited to, a name of the user to be authenticated and an identity number of the user to be authenticated, and forms a user authentication request according to the user information to be authenticated and sends the user authentication request to a server, so that the server determines whether the name of the user to be authenticated and the identity number of the user to be authenticated match with an inventory user identity card corresponding to a stored inventory user name and the inventory user name to perform user identity authentication.
As another example, a user collects a user identification card on a user terminal through a shooting module of the user terminal, acquires an identification card photo, so as to form a user authentication request according to the identification card photo and waiting for authentication user information, and sends the user authentication request to a server, so that the server can acquire a name of a user to be authenticated and a number of the user to be authenticated and waiting for authentication user information, so as to confirm the user identity.
S302: and acquiring a vehicle authentication request sent by the user terminal within the valid authentication time period, wherein the vehicle authentication request comprises the information of the vehicle to be authenticated.
The vehicle authentication request is a request sent to the server by the user terminal so that the server can judge whether the vehicle information to be authenticated is legal and accurate. The authentication valid time period is preset, and the server acquires the time period between the user authentication request and the vehicle authentication request. In this embodiment, only when the time interval between the time when the server actually obtains the user authentication request and the time when the vehicle authentication request is not greater than the authentication valid time period, the vehicle information authentication is performed, so as to ensure timeliness of the authentication process and further improve the security of the authentication.
In this example, when the user authentication request is acquired, it is determined whether the vehicle authentication request can be received within an authentication valid time period to ensure validity of the authentication process, so as to further improve security of the authentication.
As an example, the user fills in the vehicle information to be authenticated on the user terminal, the vehicle information to be authenticated includes, but is not limited to, the vehicle identification code to be authenticated and the engine number to be authenticated, and forms a vehicle authentication request according to the vehicle information to be authenticated and sends the vehicle authentication request to the server, so that the server determines whether the vehicle identification code to be authenticated and the engine number to be authenticated match with the stored stock vehicle identification code and the stock engine number corresponding to the stock vehicle identification code for vehicle confirmation.
As another example, the user takes a vehicle information photo on the user terminal through a photographing module of the user terminal to form the vehicle information to be authenticated from the vehicle information photo, to form a vehicle authentication request based on the vehicle information to be authenticated, and sends the vehicle authentication request to the server, so that the server acquires the vehicle identification code to be authenticated and the engine number to be authenticated waiting for the vehicle information to be authenticated for vehicle information authentication.
It is to be understood that the order of acquiring the user authentication request and the vehicle authentication request in steps S301 and S302 may be switched as long as the time interval for judging that the vehicle information to be authenticated and the user information to be authenticated are received is within the authentication valid time.
The vehicle networking vehicle owner authentication method provided by the embodiment obtains the user authentication request sent by the user terminal, and judges whether the vehicle authentication request can be received in the authentication valid time period, so as to ensure the validity of the authentication process, further improve the authentication safety, and only if the vehicle authentication request sent by the user terminal is obtained in the authentication valid time period, the target authentication request is determined to be obtained, so that the subsequent server can judge the validity of the user information to be authenticated and the vehicle information to be authenticated.
In an embodiment, as shown in fig. 4, the user information to be authenticated includes certificate information to be authenticated and a name of the user to be authenticated; the vehicle information to be authenticated includes a vehicle identification code to be authenticated and an engine number to be authenticated. In step S201, the validity determination based on the user information to be authenticated and the vehicle information to be authenticated, and obtaining a validity determination result includes:
s401: and calling an information query interface to query an official database based on the information of the certificate to be authenticated and the name of the user to be authenticated, and acquiring a user authentication result.
The information query interface is an interface used for querying user information and vehicle information, and the user authentication result and the vehicle authentication result can be quickly determined by using the information query interface. The official database is a legal and authoritative database which stores the identity information and names of the inventory users.
The user authentication result is the result of whether the name of the user to be authenticated is matched with the name of the inventory user, and the result of whether the identity information of the user to be authenticated is matched with the inventory identity information corresponding to the name of the inventory user. If the user name to be authenticated is matched with the inventory user name, and the identity information of the user to be authenticated is matched with the inventory identity information corresponding to the inventory user name, the user authentication result is valid; and if at least one of the user name to be authenticated and the stock user name and the identity information of the user to be authenticated is not matched with the stock identity information, the user authentication result is invalid.
S402: and calling an information query interface to query a service provider database based on the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, and acquiring a vehicle authentication result.
The service provider database is a database of service providers selling vehicles, and the service provider database stores stock vehicle identification codes and stock engine numbers corresponding to the stock vehicle identification codes.
The vehicle authentication result is a result of whether the to-be-authenticated vehicle identification code and the stock vehicle identification code match, and a result of whether the to-be-authenticated engine number matches the stock engine number corresponding to the stock vehicle identification code. If the vehicle identification code to be authenticated is matched with the inventory vehicle identification code, and the engine number to be authenticated is matched with the inventory engine number corresponding to the inventory vehicle identification code, the vehicle authentication result is valid; and if at least one of the vehicle identification code to be authenticated and the inventory vehicle identification code and the engine number to be authenticated and the inventory engine number corresponding to the inventory vehicle identification code are not matched, the vehicle authentication result is invalid.
S403: and if the user authentication result and the vehicle authentication result are both valid, the validity judgment result is that the authentication is valid.
Specifically, the user authentication result and the vehicle authentication result are simultaneously authenticated, and the validity judgment result is valid only when the user authentication result and the vehicle authentication result are both valid, so that the safety of the vehicle is ensured.
S404: and if at least one of the user authentication result and the vehicle authentication result is invalid, the validity judgment result is that the authentication is invalid.
And when at least one of the user authentication result and the vehicle authentication result is invalid, the validity judgment result is that the authentication is invalid, and at the moment, the server is disconnected from the user terminal so as to protect the vehicle and a legal vehicle user and avoid other people from illegally associating the vehicle.
The vehicle networking vehicle owner authentication method provided by the embodiment calls the information query interface to query the official database and the service provider database based on the information of the certificate to be authenticated, the name of the user to be authenticated, the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, so as to obtain the user authentication result and the vehicle authentication result, and the information query interface can be used for quickly determining the user authentication result. And if the user authentication result and the vehicle authentication result are both valid, the validity judgment result is that the vehicle authentication is valid, so that the safety of the vehicle authentication is ensured. And if at least one of the user authentication result and the vehicle authentication result is invalid, the validity judgment result is invalid for protecting the vehicle and the vehicle legal user.
In an embodiment, as shown in fig. 5, in step S201, acquiring a target authentication request sent by a user terminal, where the target authentication request includes user information to be authenticated and vehicle information to be authenticated, and performing validity judgment based on the user information to be authenticated and the vehicle information to be authenticated, and acquiring a validity judgment result, where the method includes:
s501: the method comprises the steps of obtaining a user authentication request sent by a user terminal, wherein the user authentication request comprises user information to be authenticated carrying a user account, and the user information to be authenticated comprises certificate information to be authenticated and a user name to be authenticated.
The user account is information for uniquely identifying the user terminal, and for example, the user account may be a mobile phone number of the user. In this embodiment, it is ensured that the user authentication request carries the user account, so as to ensure that the user corresponding to the user account can be authenticated according to actual needs, and the authentication does not need to be completed at one time, so that the authentication process is more flexible. For example, the user may authenticate the information of the user to be authenticated first according to actual needs, and then authenticate the information of the vehicle to be authenticated when logging in next time.
S502: and calling an information query interface to query an official database based on the information of the certificate to be authenticated and the name of the user to be authenticated, and acquiring a user authentication result.
Step S502 is identical to step S401, and is not described herein.
S503: and if the user authentication result is valid, acquiring a vehicle authentication request sent by the user terminal, wherein the vehicle authentication request comprises to-be-authenticated vehicle information carrying the same user account, and the to-be-authenticated vehicle information comprises to-be-authenticated vehicle identification codes and to-be-authenticated engine numbers.
In this example, when the user authentication result is valid, it is determined whether the vehicle information to be authenticated is accurate and valid, so as to simplify the process and improve the efficiency. In this embodiment, when the user authentication result is valid, the to-be-authenticated user may select a specific time to perform the to-be-authenticated vehicle information according to actual needs, because the server may determine the authentication progress of the to-be-authenticated user according to the same user account. For example, when the current time of the user to be authenticated does not facilitate the determination of the vehicle information to be authenticated, the vehicle authentication request is performed at a specific time selected on the authentication interface of the user terminal or the authentication interface of the user terminal is directly exited, the same user account is used for logging in next time, and the server can determine the cognitive progress of the user to be authenticated according to the user account, so that the user can directly enter the vehicle authentication request.
S504: and calling an information query interface to query a service provider database based on the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, and acquiring a vehicle authentication result.
Step S504 corresponds to step S402, and is not described herein.
S505: and if the vehicle authentication result is valid, the validity judgment result is that the vehicle authentication is valid.
In step S503, it is determined that the user authentication result is valid, and when the vehicle authentication result is valid, the validity determination result is that the authentication is valid, so as to ensure that the user to be authenticated and the vehicle information to be authenticated are valid, so as to ensure that the subsequent associated user to be authenticated and the vehicle information to be authenticated are valid in the vehicle networking database.
S506: and if the vehicle authentication result is invalid, the validity judgment result is that the authentication is invalid.
In this example, when the vehicle authentication result is invalid, the validity determination result is that the authentication is invalid, and at this time, the user needs to perform the vehicle information authentication to be authenticated again.
The vehicle owner authentication method of the internet of vehicles provided by the embodiment obtains a user authentication request sent by a user terminal, wherein the user authentication request comprises user information to be authenticated carrying a user account, and the user information to be authenticated comprises certificate information to be authenticated and a user name to be authenticated. And calling an information query interface to query an official database based on the information of the certificate to be authenticated and the name of the user to be authenticated, and acquiring a user authentication result. And if the user authentication result is valid, acquiring a vehicle authentication request sent by the user terminal, wherein the vehicle authentication request comprises to-be-authenticated vehicle information carrying the same user account, and the to-be-authenticated vehicle information comprises to-be-authenticated vehicle identification codes and to-be-authenticated engine numbers. And calling an information query interface to query a service provider database based on the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, and acquiring a vehicle authentication result. And if the vehicle authentication result is invalid, the validity judgment result is that the authentication is invalid. And when the vehicle authentication result is invalid, the validity judgment result is that the vehicle authentication is invalid, and at the moment, the user needs to perform the vehicle information authentication to be authenticated again. In this example, it is determined whether the certificate information to be authenticated and the name of the user to be authenticated are valid, and when the certificate information to be authenticated and the name of the user to be authenticated are valid, it is determined whether the vehicle identification code to be authenticated and the engine number to be authenticated are valid.
In an embodiment, as shown in fig. 6, in step S202, if the validity determination result is that the authentication is valid, the acquiring the activation request triggered by the ue includes:
s601: and if the validity judgment result is that the authentication is valid, generating authentication valid information, sending the authentication valid information to the user terminal, and controlling the user terminal to trigger the activation button.
The authentication effective information is information which is sent to the user terminal by the server and informs the user terminal that the information of the user to be authenticated and the information of the vehicle to be authenticated, which are sent by the user terminal, are accurate and legal, so that the user terminal is triggered to display an activation button according to the authentication effective information.
The activation button refers to a button displayed on the user terminal for transmitting an activation request. It should be noted that the activation button is triggered and displayed on the user terminal after the user terminal acquires the valid authentication information, which is beneficial to the security of the authentication process. It can be understood that, when the validity judgment result is that the authentication is invalid, the server does not send the authentication valid information to the user terminal, and then the user terminal does not trigger the activation button, and the subsequent processing steps cannot be executed, so that the processing flow is simplified, and the security of the authentication process is improved.
S602: and acquiring an activation request triggered by the user terminal based on the activation button.
Specifically, the user terminal displays an activation button according to the authentication valid information sent by the server, the user clicks the activation button to generate an activation request, and the activation request is sent to the server, so that the information of the user to be authenticated and the information of the vehicle to be authenticated can be subsequently associated.
According to the vehicle owner authentication method of the Internet of vehicles, when the validity judgment result is that the authentication is valid, the authentication valid information is generated, the authentication valid information is sent to the user terminal, the user terminal is controlled to trigger the activation button, and the safety of the authentication process is facilitated. And acquiring an activation request triggered by the user terminal based on the activation button so as to subsequently associate the information of the user to be authenticated and the information of the vehicle to be authenticated.
In an embodiment, as shown in fig. 7, the determining whether the activation signal triggered by the vehicle key in the vehicle can be received in the activation response time period in step S202 includes:
s701: based on the activation request, a timing module is started to start timing.
The timing module is a module for calculating time. In this example, when the server acquires the activation request, the server starts a timing module to start timing, so that when the activation signal is received later, the time interval between the receipt of the activation request and the activation signal is determined. In this example, the time interval between the activation request and the activation signal can be accurately calculated using the timing module.
S702: and when receiving an activation signal sent by the user terminal, the timing module stops timing to determine the activation operation time period.
The activation running time period refers to a time interval between the server receiving the activation request and the activation signal, namely the activation running time period is equal to a difference between a time when the timing module stops timing and a time when the timing module starts timing.
S703: and if the activation operation time period is not greater than the activation response time period, the activation signal triggered by the key of the vehicle in the vehicle is received within the activation response time period.
Specifically, if the activation operation time period is not greater than the activation response time period, the activation signal is an activation signal triggered by a key of the vehicle in the vehicle received in the activation response time period, so that the association between the user information to be authenticated and the vehicle information to be authenticated is completed in the activation response time period, timeliness is provided, and the normalization of the authentication process is ensured. After the activation signal is acquired, the subsequent server can conveniently authenticate whether the target vehicle information in the activation signal is matched with the vehicle information to be authenticated.
S704: and if the activation operation time period is greater than the activation response time period, determining that the activation signal triggered by the vehicle key in the vehicle cannot be received in the activation response time period.
It can be understood that if the activation operation time period is longer than the activation response time, the activation signal and the activation request are useless, the owner authentication is not successful, an accident situation is prevented, the user terminal is required to resend the activation request and the activation signal in the activation response time period subsequently, and the server can authenticate whether the target vehicle information in the activation signal is matched with the vehicle information to be authenticated.
The vehicle owner authentication method of the internet of vehicles provided by the embodiment starts the timing module to start timing based on the activation request, and the timing module can be used for accurately calculating the time interval between the activation request and the activation signal. And when receiving an activation signal sent by the user terminal, the timing module stops timing to determine the activation operation time period. And when the activation operation time period is not greater than the activation response time period, receiving an activation signal triggered by a vehicle key in the vehicle in the activation response time period to ensure that the information of the user to be authenticated is associated with the information of the vehicle to be authenticated in the activation response time period, so that timeliness is achieved, and the normalization of the authentication process is ensured. And when the activation operation time period is greater than the activation response time period, the activation signal triggered by the vehicle key in the vehicle is determined not to be received in the activation response time period, the vehicle owner authentication is not successful, and the accident is prevented.
In one embodiment, in step S204, the vehicle information to be authenticated includes a vehicle identification code to be authenticated and an engine number to be authenticated; the target vehicle information includes a target vehicle identification code and a target engine number.
If the target vehicle information is matched with the vehicle information to be authenticated, the vehicle owner authentication is successful, and the method comprises the following steps: and if the target vehicle identification code is matched with the vehicle identification code to be authenticated and the target engine number is matched with the engine number to be authenticated, the vehicle owner authentication is successful.
The vehicle identification code to be authenticated is a vehicle identification code carried in a target authentication request sent to the server by the user terminal. The engine number to be authenticated refers to an engine number carried in a target authentication request sent to the server by the user terminal.
The target vehicle identification code is a vehicle identification code carried by an activation signal sent to the server by using the vehicle key in the vehicle. The target engine number is a transmitter number carried by an activation signal transmitted to the server by using a key of the vehicle in the vehicle.
Specifically, after the server acquires the target vehicle information, the information query interface is used for matching the target vehicle identification code with the vehicle identification code to be authenticated, and the interface is used for matching the target engine number with the engine number to be authenticated, so that the matching result of the target vehicle information and the vehicle information to be authenticated can be quickly determined. Only if the target vehicle identification code is matched with the vehicle identification code to be authenticated and the target engine number is matched with the engine number to be authenticated, the vehicle corresponding to the vehicle information to be authenticated sent by the user terminal and the vehicle corresponding to the activation signal sent by the vehicle key in the vehicle are determined to be the same vehicle, namely the vehicle is determined to be all users corresponding to the user to be authenticated, and the vehicle owner authentication is successful. At the moment, the information of the user to be authenticated and the information of the vehicle to be authenticated are stored in the vehicle networking database in an associated mode, so that the user authentication is realized, the vehicle and the user are associated, the safety of the authentication process is ensured, and the owner of the vehicle are protected.
In an embodiment, as shown in fig. 8, before step S201, that is, before performing validity judgment based on the user information to be authenticated and the vehicle information to be authenticated and obtaining a validity judgment result, the method for authenticating an owner of an internet of vehicles further includes:
s801: an authenticated number of users associated with the vehicle identification code to be authenticated and the engine number to be authenticated is determined.
The authenticated user number refers to the number of users who successfully authenticate vehicles corresponding to the vehicle identification code to be authenticated and the engine number to be authenticated. Specifically, a vehicle networking database is inquired according to the identification code of the vehicle to be authenticated, and the number of authenticated users associated with the vehicle is determined.
S802: and judging whether the number of the authenticated users is less than a preset authentication threshold value.
The preset authentication threshold value is the preset number of users capable of vehicle authentication. For example, the preset authentication threshold may be 5. In this example, it is determined whether the number of authenticated users is not greater than a preset authentication threshold, so as to determine whether the user to be authenticated can perform authentication.
S803: and if the number of the authenticated users is smaller than a preset authentication threshold value, executing and determining corresponding owner information.
In this example, only when the number of authenticated users is less than the preset authentication threshold, the owner information is determined according to the association between the vehicle identification code to be authenticated and the engine number to be authenticated, so that the owner can know the user to be authenticated according to the information about the user to be authenticated subsequently sent to the owner information, and the authentication process is ensured to be more complete.
The vehicle owner authentication method for the Internet of vehicles provided by the embodiment determines the number of authenticated users associated with the vehicle identification code to be authenticated and the engine number to be authenticated. And judging whether the number of the authenticated users is not greater than a preset authentication threshold value so as to judge whether the user to be authenticated can be authenticated. And when the number of the authenticated users is smaller than a preset authentication threshold value, executing and determining corresponding owner information so that the owner knows the information of the user to be authenticated and the authentication process is ensured to be more complete.
In an embodiment, as shown in fig. 9, before step S201, that is, before acquiring the target authentication request sent by the user terminal, the internet of vehicles owner authentication method further includes:
s901: and acquiring a user login request, wherein the user login request comprises a user account and a user password.
The user login request is a request of a user to be authenticated for logging in an APP in a user terminal. The user account is a login account of the user, for example, the user account may be a name or a mobile phone number of the user. In this embodiment, before carrying out the authentication, treat that the authentication user needs to log in APP to carry out car networking car owner authentication on this APP, utilize the internet to realize quick, convenient car networking car owner authentication.
S902: and judging whether the user account and the user password are valid.
Specifically, when a user account and a user password input by a user to be authenticated on the APP are obtained, the user account and the user password are compared with a user account and a user password which are stored in the database in an associated manner, and when the user account and the user password input by the user on the APP are the same as the user account and the user password which are stored in the database in an associated manner, the user account and the user password are valid, so that the user to be authenticated is a legal user of the APP.
S903: and if the user account and the user password are valid, entering an interface for authentication.
And when the user account and the user password are valid, entering an interface for authentication so as to facilitate the authentication of the user to be authenticated.
According to the vehicle networking vehicle owner authentication method, the user login request is obtained and comprises the user account and the user password, so that vehicle networking vehicle owner authentication can be conveniently carried out on the APP, and rapid and convenient vehicle networking vehicle owner authentication is realized by utilizing the Internet. And judging whether the user account and the user password are valid or not so as to ensure that the user to be authenticated is a legal user of the APP. And if the user account and the user password are valid, entering an interface for authentication.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A vehicle owner authentication method of the Internet of vehicles is characterized by comprising the following steps:
acquiring a target authentication request sent by a user terminal, wherein the target authentication request comprises user information to be authenticated and vehicle information to be authenticated; carrying out validity judgment based on the information of the user to be authenticated and the information of the vehicle to be authenticated to obtain a validity judgment result;
if the validity judgment result is that the authentication is valid, acquiring an activation request triggered by the user terminal, and judging whether an activation signal triggered by a vehicle key in the vehicle can be received in an activation response time period, wherein the activation signal carries target vehicle information;
if an activation signal triggered by a vehicle key in the vehicle is received in an activation response time period, judging whether the target vehicle information is matched with the vehicle information to be authenticated;
and if the target vehicle information is matched with the vehicle information to be authenticated, the vehicle owner authentication is successful.
2. The Internet of vehicles owner authentication method of claim 1, wherein the target authentication request includes a user authentication request and a vehicle authentication request;
the acquiring of the target authentication request sent by the user terminal, where the target authentication request includes user information to be authenticated and vehicle information to be authenticated, includes:
acquiring a user authentication request sent by a user terminal, wherein the user authentication request comprises information of a user to be authenticated;
and acquiring a vehicle authentication request sent by a user terminal within an authentication valid time period, wherein the vehicle authentication request comprises information of a vehicle to be authenticated.
3. The vehicle owner authentication method of the internet of vehicles according to claim 1, wherein the user information to be authenticated comprises certificate information to be authenticated and a user name to be authenticated; the information of the vehicle to be authenticated comprises an identification code of the vehicle to be authenticated and an engine number to be authenticated;
the obtaining of the validity judgment result based on the validity judgment of the user information to be authenticated and the vehicle information to be authenticated comprises:
based on the information of the certificate to be authenticated and the name of the user to be authenticated, calling an information query interface to query an official database and acquiring a user authentication result;
based on the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, calling an information query interface to query a service provider database and acquiring a vehicle authentication result;
if the user authentication result and the vehicle authentication result are both valid, the validity judgment result is that the authentication is valid;
and if at least one of the user authentication result and the vehicle authentication result is invalid, the validity judgment result is invalid for authentication.
4. The vehicle owner authentication method of the internet of vehicles according to claim 1, wherein the obtaining of the target authentication request sent by the user terminal includes user information to be authenticated and vehicle information to be authenticated, and the obtaining of the validity determination result based on the validity determination is performed on the basis of the user information to be authenticated and the vehicle information to be authenticated, and includes:
acquiring a user authentication request sent by a user terminal, wherein the user authentication request comprises user information to be authenticated carrying a user account, and the user information to be authenticated comprises certificate information to be authenticated and a user name to be authenticated;
based on the information of the certificate to be authenticated and the name of the user to be authenticated, calling an information query interface to query an official database and acquiring a user authentication result;
if the user authentication result is valid, acquiring a vehicle authentication request sent by a user terminal, wherein the vehicle authentication request comprises to-be-authenticated vehicle information carrying the same user account, and the to-be-authenticated vehicle information comprises to-be-authenticated vehicle identification codes and to-be-authenticated engine numbers;
based on the identification code of the vehicle to be authenticated and the number of the engine to be authenticated, calling an information query interface to query a service provider database and acquiring a vehicle authentication result;
if the vehicle authentication result is valid, the validity judgment result is that the vehicle authentication is valid;
and if the vehicle authentication result is invalid, the validity judgment result is that the authentication is invalid.
5. The vehicle owner authentication method of the internet of vehicles according to claim 1, wherein the obtaining of the activation request triggered by the user terminal if the validity determination result is that the authentication is valid comprises:
if the validity judgment result is that the authentication is valid, generating authentication valid information, sending the authentication valid information to a user terminal, and controlling the user terminal to trigger an activation button;
and acquiring an activation request triggered by the user terminal based on the activation button.
6. The vehicle networking vehicle owner authentication method of claim 1, wherein the determining whether an activation signal triggered by a vehicle key in the vehicle can be received within an activation response time period comprises:
starting a timing module to start timing based on the activation request;
when receiving an activation signal sent by a user terminal, the timing module stops timing to determine an activation operation time period;
if the activation operation time period is not greater than the activation response time period, the activation signal triggered by the vehicle key in the vehicle is received within the activation response time period;
and if the activation operation time period is greater than the activation response time period, determining that the activation signal triggered by the vehicle key in the vehicle cannot be received in the activation response time period.
7. The Internet of vehicles owner authentication method of claim 1, wherein the vehicle information to be authenticated comprises a vehicle identification code to be authenticated and an engine number to be authenticated; the target vehicle information comprises a target vehicle identification code and a target engine number;
if the target vehicle information is matched with the to-be-authenticated vehicle information, the vehicle owner authentication is successful, and the method comprises the following steps:
and if the target vehicle identification code is matched with the vehicle identification code to be authenticated and the target engine number is matched with the engine number to be authenticated, the vehicle owner authentication is successful.
8. The vehicle owner authentication method of the internet of vehicles according to claim 1, wherein before the validity judgment is performed based on the user information to be authenticated and the vehicle information to be authenticated and the validity judgment result is obtained, the vehicle owner authentication method of the internet of vehicles further comprises:
determining the number of authenticated users associated with the vehicle information to be authenticated;
judging whether the number of the authenticated users is smaller than a preset authentication threshold value;
and if the number of the authenticated users is smaller than a preset authentication threshold value, performing validity judgment based on the information of the users to be authenticated and the information of the vehicles to be authenticated.
9. The vehicle networking vehicle owner authentication method of claim 1, wherein before the obtaining the target authentication request sent by the user terminal, the vehicle networking vehicle owner authentication method further comprises:
acquiring a user login request, wherein the user login request comprises a user account and a user password;
judging whether the user account and the user password are valid;
and if the user account and the user password are valid, entering an interface for authentication.
10. The vehicle owner authentication method of the internet of vehicles according to claim 1, wherein the vehicle key in the vehicle is any one of a Bcall, an Ecall or a start key.
CN202010500270.4A 2020-06-04 2020-06-04 Vehicle networking owner authentication method Active CN113765855B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010500270.4A CN113765855B (en) 2020-06-04 2020-06-04 Vehicle networking owner authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010500270.4A CN113765855B (en) 2020-06-04 2020-06-04 Vehicle networking owner authentication method

Publications (2)

Publication Number Publication Date
CN113765855A true CN113765855A (en) 2021-12-07
CN113765855B CN113765855B (en) 2023-08-29

Family

ID=78783644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010500270.4A Active CN113765855B (en) 2020-06-04 2020-06-04 Vehicle networking owner authentication method

Country Status (1)

Country Link
CN (1) CN113765855B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010204829A (en) * 2009-03-02 2010-09-16 Nec Corp Authentication device, authentication method, and user authentication system
CN103029648A (en) * 2011-09-30 2013-04-10 上海博泰悦臻网络技术服务有限公司 Activation method and activation system for vehicle-mounted equipment
CN105791388A (en) * 2016-01-13 2016-07-20 四川长虹电器股份有限公司 Vehicular product remote activation method of internet of vehicles system
CN106257861A (en) * 2015-06-18 2016-12-28 涓ヤ卡 By controlling authentication method and the system thereof of equipment and auto communication
CN108382397A (en) * 2018-02-02 2018-08-10 北京车和家信息技术有限公司 Control method for vehicle and device
CN110126782A (en) * 2019-05-23 2019-08-16 东风小康汽车有限公司重庆分公司 A kind of Vehicular intelligent key application method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010204829A (en) * 2009-03-02 2010-09-16 Nec Corp Authentication device, authentication method, and user authentication system
CN103029648A (en) * 2011-09-30 2013-04-10 上海博泰悦臻网络技术服务有限公司 Activation method and activation system for vehicle-mounted equipment
CN106257861A (en) * 2015-06-18 2016-12-28 涓ヤ卡 By controlling authentication method and the system thereof of equipment and auto communication
CN105791388A (en) * 2016-01-13 2016-07-20 四川长虹电器股份有限公司 Vehicular product remote activation method of internet of vehicles system
CN108382397A (en) * 2018-02-02 2018-08-10 北京车和家信息技术有限公司 Control method for vehicle and device
CN110126782A (en) * 2019-05-23 2019-08-16 东风小康汽车有限公司重庆分公司 A kind of Vehicular intelligent key application method and device

Also Published As

Publication number Publication date
CN113765855B (en) 2023-08-29

Similar Documents

Publication Publication Date Title
EP3457344B1 (en) Payment authentication method, apparatus and system for onboard terminal
JP4540479B2 (en) How to link devices
CN106034134B (en) Method, auxiliary method and device for carrying out identity authentication request in webpage application program
US8453220B2 (en) Device association
JP2009135688A (en) Authentication method, authentication system, and on-vehicle device
CN111770057B (en) Identity verification system and identity verification method
WO2019085423A1 (en) Shared device unlocking method, device, and system
JP2010519631A (en) Authorization of secure resources
CN103945380A (en) Method and system for network login authentication based on graphic code
CN103685139A (en) Authentication and authorization processing method and device
CN108733992B (en) Processing method and system of electronic equipment
CN105577619B (en) Client login method, client and system
CN105812398A (en) Remote login authorization method and remote login authorization device
CN113938283B (en) Code scanning login method, system, device, electronic equipment and storage medium
CN115189891A (en) Application program login method and device, terminal and computer readable storage medium
JP2003284113A (en) Position certifying method, position certifying service system, and network system
CN113851012A (en) Automatic vehicle searching method, device, system and computer readable storage medium
KR20140138480A (en) Apparatus for verifying website and method thereof
CN115567271B (en) Authentication method and device, page skip method and device, electronic equipment and medium
CN113765855B (en) Vehicle networking owner authentication method
CN113015138A (en) Method, electronic device and computer-readable storage medium for information sharing
CN114553432A (en) Identity authentication method, device, equipment and computer readable storage medium
CN107645473B (en) Method and device for protecting data security
CN113395240A (en) Data acquisition method, device, equipment and medium
CN105554685B (en) A kind of automobile interconnected method, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant