CN109017676A - Control method for vehicle, device and storage medium - Google Patents
Control method for vehicle, device and storage medium Download PDFInfo
- Publication number
- CN109017676A CN109017676A CN201810811474.2A CN201810811474A CN109017676A CN 109017676 A CN109017676 A CN 109017676A CN 201810811474 A CN201810811474 A CN 201810811474A CN 109017676 A CN109017676 A CN 109017676A
- Authority
- CN
- China
- Prior art keywords
- target vehicle
- terminal
- key
- sent
- vehicle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000003860 storage Methods 0.000 title claims abstract description 25
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 43
- 238000013475 authorization Methods 0.000 claims description 25
- 238000012795 verification Methods 0.000 claims description 16
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 12
- 238000012797 qualification Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000015654 memory Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 206010048669 Terminal state Diseases 0.000 description 1
- 238000004378 air conditioning Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/101—Bluetooth
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Selective Calling Equipment (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of control method for vehicle, device and storage mediums, belong to Vehicle Engineering technical field.The described method includes: obtaining the information of vehicles of the target vehicle;The information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains the control key for controlling the target vehicle;The control key is sent to the first terminal and the target vehicle, so that the first terminal controls the target vehicle by the control key.The present invention generates control key by the information of vehicles of target vehicle, and control key is sent to first terminal and target vehicle, first terminal is set to directly control target vehicle by control key, without passing through traditional remote-control key, key loss is avoided, the efficiency and safety of control vehicle are improved.
Description
Technical field
The present invention relates to Vehicle Engineering technical field, in particular to a kind of control method for vehicle, device and storage medium.
Background technique
With economic and science and technology fast development, automobile has become the essential vehicles of people's trip gradually.By
It is just able to achieve a series of functions under the control of car key in vehicle needs, therefore, when using vehicle, needs using car key
Control the vehicle.
Currently, traditional vehicle is the control operation for being unlocked and starting to vehicle by traditional remote-control key,
Some vehicles have been equipped with remote control module, by remote control module, long-range unlock can be carried out to vehicle, is closed
Lock opens the controls such as air-conditioning operation.
But when being controlled by traditional remote-control key vehicle, due to, use high to remote-control key degree of dependence
User needs carrying keys at any time when vehicle, if key loss may result in vehicle safety reduction.
Summary of the invention
The embodiment of the invention provides a kind of control method for vehicle, device and storage mediums, for solving in the related technology
Vehicle control low efficiency, and the problem that vehicle safety is low.The technical solution is as follows:
In a first aspect, providing a kind of control method for vehicle, which comprises
Obtain the information of vehicles of the target vehicle;
The information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains controlling the target vehicle
Control key;
The control key is sent to the first terminal and the target vehicle, so that the first terminal passes through institute
It states control key and controls the target vehicle.
It is optionally, described that the control key is sent to after the first terminal and the target vehicle, further includes:
When the use to the target vehicle for receiving second terminal transmission is requested, it is sent to described using request
The first terminal;
When receiving the authorization acceptance message that the first terminal is sent, temporary key is generated;
The temporary key is sent to the target vehicle and the second terminal, so that the second terminal passes through institute
It states temporary key and controls the target vehicle.
Optionally, the generation temporary key, comprising:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
It is optionally, described that the temporary key is sent to after the target vehicle and the second terminal, further includes:
When receiving the authorization termination messages that the first terminal is sent, key failure is sent to the target vehicle and is referred to
It enables, the key failure instruction is used to indicate the temporary key failure;Alternatively,
When the effective time for detecting the temporary key expires, key failure instruction is sent to the target vehicle.
Optionally, the information of vehicles to the target vehicle is handled by the first Encryption Algorithm, is controlled
Before the control key of the target vehicle, further includes:
The bind request that the first terminal is sent is received, the bind request carries mark and the institute of the first terminal
State the verification information of target vehicle;
When determining the target vehicle qualification based on the verification information, by the first terminal and the target vehicle
It is bound.
Second aspect, provides a kind of controller of vehicle, and described device includes:
Module is obtained, for obtaining the information of vehicles of the target vehicle;
Processing module is handled by the first Encryption Algorithm for the information of vehicles to the target vehicle, is controlled
Make the control key of the target vehicle;
First sending module, for the control key to be sent to the first terminal and the target vehicle, so that
The first terminal controls the target vehicle by the control key.
Optionally, described device further include:
Second sending module, for inciting somebody to action when the use to the target vehicle for receiving second terminal transmission is requested
It is described to be sent to the first terminal using request;
Generation module, for generating temporary key when receiving the authorization acceptance message that the first terminal is sent;
Third sending module, for the temporary key to be sent to the target vehicle and the second terminal, so that
The second terminal controls the target vehicle by the temporary key.
Optionally, the generation module is used for:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
Optionally, described device further include:
4th sending module, for when receiving the authorization termination messages that the first terminal is sent, to the target
Vehicle sends key failure instruction, and the key failure instruction is used to indicate the temporary key failure;Alternatively,
5th sending module, for when the effective time for detecting the temporary key expires, to the target vehicle
Send key failure instruction.
Optionally, described device further include:
Receiving module, the bind request sent for receiving the first terminal, the bind request carry described first
The mark of terminal and the verification information of the target vehicle;
Binding module, for when determining the target vehicle qualification based on the verification information, by the first terminal
It is bound with the target vehicle.
The third aspect provides a kind of computer readable storage medium, is stored with computer program in the storage medium,
The computer program realizes above-mentioned first aspect any method when being executed by processor.
Technical solution bring beneficial effect provided in an embodiment of the present invention includes at least:
In embodiments of the present invention, the information of vehicles of available target vehicle, and to the information of vehicles of target vehicle into
The processing of the first Encryption Algorithm of row, obtains target vehicle control key, control key is sent to first terminal and target vehicle, is made
First terminal can directly control target vehicle by control key, without avoiding key and losing by traditional remote-control key
It loses, improves the efficiency and safety of control vehicle.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is a kind of vehicle control system configuration diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of control method for vehicle flow chart provided in an embodiment of the present invention;
Fig. 3 is another control method for vehicle flow chart provided in an embodiment of the present invention;
Fig. 4 is the first controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 5 is second of controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 6 is the third controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 7 is the 5th kind of controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of certificate server provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Before carrying out detailed explanation to the embodiment of the present invention, the first application to being related in the embodiment of the present invention
Scene and system architecture are explained respectively.
Firstly, to the present embodiments relate to application scenarios be introduced.
Currently, user needs to be unlocked vehicle by traditional remote control car key, start etc. controls operation, due to right
Remote-control key degree of dependence is high, needs carrying keys at any time using user when vehicle, if if key loss car key is lost,
Possibly vehicle can not be controlled, to the end vehicle control low efficiency, simultaneously as the loss of car key is likely to result in
Vehicle safety reduces.
Based on such scene, the embodiment of the invention provides one kind can be improved vehicle control efficiency and vehicle peace
The control method for vehicle of full property.
Next, to the present embodiments relate to system architecture be introduced.
Fig. 1 is a kind of vehicle control system structural schematic diagram provided in an embodiment of the present invention, and referring to Fig. 1, which includes
Certificate server, target vehicle 2 and first terminal 3, target vehicle 1 and first terminal 2 can respectively with 1 network of certificate server
Connection, target vehicle 2 can pass through bluetooth connection with first terminal.Wherein, certificate server 1 is for obtaining target vehicle
2 information of vehicles, and information of vehicles is handled by the first Encryption Algorithm, the control key of control target vehicle 2 is obtained,
Control key is sent to first terminal 3 and target vehicle 2.First terminal 2 after receiving control key for controlling target
Vehicle 2.Target vehicle 2 is used for after receiving control key, and corresponding function is executed under the control of first terminal 3.
In addition, the system can also include second terminal 4 and OEM (Original Equipment referring to Fig. 1
Manufacturer, original equipment manufacturer) database 5, second terminal 4 connects respectively with certificate server 1 and target vehicle 2
It connects, OEM database 5 is connect with certificate server 1.Wherein, OEM database is used to provide the vehicle of target vehicle for certificate server
Information;Second terminal 4 be used for when needing to control target vehicle, from certificate server obtain target vehicle authorization and
The temporary key of target vehicle 2 is controlled, and target vehicle 2 is controlled by temporary key.
It should be noted that may each comprise bluetooth communication in the first terminal 3, second terminal 4 and target vehicle 2,
To which first terminal 3 can carry out bluetooth company with the bluetooth communication in target vehicle 2 by the bluetooth communication of itself
It connects, second terminal 4 again may be by the bluetooth communication in the bluetooth communication and target vehicle 2 of itself and carry out bluetooth
Connection.
It, next will be in conjunction with attached drawing to this in the application scenarios to the embodiment of the present invention and after system architecture is introduced
The control method for vehicle that inventive embodiments provide describes in detail.
Fig. 2 is a kind of flow chart of method for vehicles provided in an embodiment of the present invention, and referring to fig. 2, this method is applied to certification
In server, include the following steps.
Step 201: obtaining the information of vehicles of the target vehicle.
Step 202: the information of vehicles of the target vehicle being handled by the first Encryption Algorithm, obtains controlling the target
The control key of vehicle.
Step 203: the control key being sent to the first terminal and the target vehicle, so that the first terminal is by being somebody's turn to do
Control key controls the target vehicle.
In embodiments of the present invention, the information of vehicles of available target vehicle, and to the information of vehicles of target vehicle into
The processing of the first Encryption Algorithm of row, obtains target vehicle control key, control key is sent to first terminal and target vehicle, is made
First terminal can directly control target vehicle by control key, without avoiding key and losing by traditional remote-control key
It loses, improves the efficiency and safety of control vehicle.
Optionally, which is sent to after the first terminal and the target vehicle, further includes:
When receiving when requesting the use of the target vehicle of second terminal transmission, by this using request be sent to this
One terminal;
When receiving the authorization acceptance message of first terminal transmission, temporary key is generated;
The temporary key is sent to the target vehicle and the second terminal, so that the second terminal passes through the temporary key
Control the target vehicle.
Optionally, temporary key is generated, comprising:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
Optionally, which is sent to after the target vehicle and the second terminal, further includes:
When receiving the authorization termination messages of first terminal transmission, key failure instruction is sent to the target vehicle,
Key failure instruction is used to indicate temporary key failure;Alternatively,
When the effective time for detecting the temporary key expires, key failure instruction is sent to the target vehicle.
Optionally, the information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains controlling the target
Before the control key of vehicle, further includes:
The bind request of first terminal transmission is received, which carries the mark and the target carriage of the first terminal
Verification information;
When determining the target vehicle qualification based on the verification information, the first terminal and the target vehicle are tied up
It is fixed.
All the above alternatives, can form alternative embodiment of the invention according to any combination, and the present invention is real
It applies example and this is no longer repeated one by one.
Fig. 3 is a kind of control method for vehicle provided in an embodiment of the present invention, and referring to Fig. 3, this method comprises the following steps.
Step 301: the information of vehicles of certificate server acquisition target vehicle.
It can be seen from the above, OEM database can provide the information of vehicles of target vehicle, therefore, certificate server can be from
The information of vehicles of target vehicle is obtained in OEM database, and certificate server can actively obtain the information of vehicles of target vehicle,
The information of vehicles of target vehicle can also passively be obtained.
Wherein, the operation that certificate server actively obtains the information of vehicles of target vehicle can be with are as follows: OEM database is each
The information of vehicles of updated vehicle is sent after secondary update to certificate server, alternatively, OEM database is every specified time interval
The information of vehicles of vehicle is sent to certificate server, which can be arranged in advance, for example, the specified time interval
It can be 1 day, 2 days, 1 week, 1 month etc..
In addition, these information have plenty of since OEM database is mainly used for storing the relevant information in vehicle generating process
It cannot open to the outside world, therefore, OEM database can be when certificate server needs the information of some vehicles, by partial information
It is sent to certificate server.For example, when target vehicle need with first terminal (terminal used by a user of target vehicle) into
Row binding, first terminal can send bind request to certificate server, first terminal mark can be carried in the bind request
With the verification information of target vehicle, when certificate server receives the bind request, target carriage can be obtained from OEM database
Information of vehicles, first terminal and target vehicle are bound later.
It should be noted that information of vehicles may include VIN (the Vehicle Identification of target vehicle
Number, ID code of vehicle), Bluetooth ID (bluetooth number), the information such as master Key (primary keyword).
Furthermore the information of vehicles of target vehicle directly can be sent to certificate server by OEM database, can also be right
After the information of vehicles of target vehicle is pre-processed, retransmit to certificate server.For example, when information of vehicles includes target vehicle
The information such as VIN, Bluetooth ID, master Key when, VIN can be converted to Vehicle ID (vehicle by OEM database
Identifier) after, the information such as Vehicle ID, Bluetooth ID, master Key are sent to certificate server.
Step 302: certificate server handles the information of vehicles of target vehicle by the first Encryption Algorithm, is controlled
Make the control key of the target vehicle.
In order to be first terminal control target vehicle, also for guarantee target vehicle using safe, not by other
Terminal is controlled, certificate server can the information of vehicles to target vehicle handled by the first Encryption Algorithm, controlled
The control key of target vehicle processed.
It should be noted that first Encryption Algorithm can be arranged in advance, for example, first Encryption Algorithm can be DES
(Data Encryption Algorithm, data encryption algorithm), TDES (Triple Data Encryption
Algorithm, triple Encryption Algorithm) etc. symmetric encipherment algorithms, or RSA, ECC (Elliptic Curves
Cryptography, elliptic curve cipher coding theory) etc. rivest, shamir, adelmans, or MD2 (Message Digest
Algorithm, Message Digest 5), hash (Hash) Encryption Algorithm such as MD4, MD5.It can certainly be the customized calculation of user
Method, for example, the first Encryption Algorithm can be choosing when information of vehicles includes Vehicle ID, Bluetooth ID, master Key
Take Vehicle ID front two, Bluetooth ID front two, master Key front two composition control key etc..
Further, since the control key that any terminal application obtains target vehicle can obtain the control of target vehicle
Key processed, it would be possible that the safety in utilization that will lead to target vehicle is very low.Therefore, in order to guarantee target vehicle use peace
Entirely, certificate server handles the information of vehicles of target vehicle by the first Encryption Algorithm, obtains controlling the target vehicle
Control key before, certificate server also needs to bind first terminal and target vehicle.
Wherein, network application equipment can send bind request to certificate server, which carries first terminal
Mark and target vehicle verification information;Certificate server receives the bind request of network application equipment transmission, and is based on
The verification information of target vehicle determines whether the target vehicle is qualified;When based on the verification information determine the target vehicle qualification
When, the first terminal and the target vehicle are bound.
In order to guarantee the safety in utilization of target vehicle, which can be the businessman institute of sale target vehicle
The equipment used, that is to say, user is when buying target vehicle and needing to bind the first terminal of user and target vehicle, out
The businessman for selling target vehicle can send bind request to certificate server by network application equipment.
It should be noted that the mark of first terminal is used for the unique identification terminal, the mark of first terminal can be should
MAC (Media Access Control, media access control) address of terminal, dispatch from the factory sequence number etc..Target vehicle is tested
Demonstrate,proving information can be at least one of Vehicle ID, Bluetooth ID, master Key of target vehicle etc..
It, can be in addition, certificate server is when the verification information based on target vehicle determines whether the target vehicle is qualified
It determines with the presence or absence of information identical with verification information in the information of vehicles of target vehicle, if it is present determining the target carriage
Verifying is qualified, if there is no then determining that target vehicle verifying is unqualified.
Furthermore the mark of first terminal is carried out corresponding storage with the information of vehicles of target vehicle by certificate server can be complete
The binding of pairs of target vehicle and first terminal.
Step 303: the control key is sent to first terminal and target vehicle by certificate server.
In order to make first terminal smoothly control target vehicle, control key can be sent to first by certificate server
Terminal and target vehicle.
Step 304: first terminal and target vehicle receive the control key that certificate server is sent, so that first terminal is logical
Cross control key control target vehicle.
Due to all having control key in first terminal and target vehicle, first terminal can be sent out to target vehicle
Send the control request for carrying control key;It, will the control that carry in the control request after target vehicle receives control request
Key is matched with the control key that certificate server is sent, and upon determining a match, can unlock starting target vehicle, and
Corresponding function is realized under the control of first terminal.
Further, need to borrow target vehicle due to sometimes might have other users, at this time the use of target vehicle
Family is less likely also to borrow first terminal to other users, and therefore, other users need to obtain control by the terminal of oneself
The temporary key of target vehicle.
Wherein, it when other users need to borrow target vehicle, can be sent by second terminal to certificate server more
The use of target vehicle is requested, this is using can carry full name of applicant, borrow the application informations such as duration in request;When certification takes
When the use to target vehicle that business device receives second terminal transmission is requested, this can be sent to first eventually using request
End;When first terminal receives use request, application information can be shown, so that the user of first terminal chooses whether together
Meaning lending target vehicle, when first terminal detects that user is awarded by what voice operating, clicking operation or slide were triggered
When power agrees to instruction, authorization acceptance message can be sent to certificate server;It is sent when certificate server receives first terminal
Authorization acceptance message when, generate temporary key;The temporary key is sent to the target vehicle and the second terminal;Second eventually
After end and target vehicle receive temporary key, second terminal can control the target vehicle by the temporary key.
Wherein, the operation that certificate server generates temporary key can be with are as follows: passes through the to the information of vehicles of the target vehicle
Two Encryption Algorithm are handled, and the temporary key is obtained.
It should be noted that second Encryption Algorithm can be arranged in advance, for example, second Encryption Algorithm can for DES,
The symmetric encipherment algorithms such as 3DES, DESX, or the rivest, shamir, adelmans such as ECC, or the hash such as MD2, MD4, MD5
(Hash) Encryption Algorithm.Can certainly be user's custom algorithm, for example, information of vehicles include Vehicle ID,
When Bluetooth ID, master Key, the second Encryption Algorithm can be two, Bluetooth ID after selection Vehicle ID
Two, two composition temporary keys of master Key etc..First Encryption Algorithm and the second Encryption Algorithm can identical can also be with
It is different.
In addition, sometimes the user of target vehicle is not intended to lending target vehicle, therefore, when first terminal shows letter of application
After breath, user may select refusal authorized order, and first terminal can request to send refusal and authorize to authentication service to disappear at this time
Breath;The refusal authorization messages can be sent to second terminal by certificate server, second terminal can display reminding information, with prompt
The right to use of target vehicle can not be obtained.
Further, it since the time that the user of target vehicle lends target vehicle is limited, that is to say, second terminal
There is the time limit using temporary key control target vehicle.Therefore, which is sent to the target by certificate server
After vehicle and the second terminal, it can also determine whether temporary key has failed.
Wherein, it when certificate server receives the authorization termination messages of first terminal transmission, is sent to the target vehicle
Key failure instruction, key failure instruction are used to indicate temporary key failure;Alternatively, when detecting having for the temporary key
When effect duration expires, key failure instruction is sent to the target vehicle.
It, at this time can be by the since the user of target vehicle there may come a time when to be unwilling to continue to lend target vehicle halfway
One terminal sends authorization termination messages to certificate server, and certificate server is when receiving the authorization termination messages, Ke Yixiang
The target vehicle sends key failure instruction, and target vehicle can determine that this is interim close after receiving key failure instruction
Key failure, it is subsequent to will be unable to detect second terminal any control instruction based on temporary key.Certainly, in order to allow second terminal
User know that temporary key fails, certificate server can also be when sending authorization termination messages to target vehicle, also to the
Two terminals send the authorization termination messages;Second terminal shows that authorization terminates prompt letter when receiving the authorization termination messages
Breath.
In addition, it can be seen from the above, second terminal when application is using target vehicle, when can carry borrow in application information
Long, therefore, certificate server can determine the use duration of temporary key after sending temporary key to second terminal, when facing
When key use duration with borrow duration it is identical when, determine that the effective time of temporary key expires, temporary key has failed, this
When can to target vehicle send key failure instruction.
In embodiments of the present invention, the information of vehicles of the available target vehicle of certificate server, and by first terminal
After target vehicle binding, the first Encryption Algorithm processing is carried out to the information of vehicles of target vehicle, it is close to obtain target vehicle control
Control key is sent to first terminal and target vehicle, first terminal is allow to directly control target by control key by key
Vehicle improves the efficiency and safety of control vehicle without avoiding key loss by traditional remote-control key.Meanwhile
, can be in the case where second terminal obtain first terminal authorization when the user of second terminal needs using target vehicle, base
In the temporary key that the information of vehicles of target vehicle is second terminal generation control temporary control target vehicle, to avoid tradition
Car key borrows inconvenient situation, improves vehicle control efficiency and safety.
After control method for vehicle provided in an embodiment of the present invention is explained, next, to of the invention real
The controller of vehicle for applying example offer is introduced.
Fig. 4 is a kind of block diagram for controller of vehicle that the embodiment of the present disclosure provides, and referring to fig. 4, which can be by soft
Part, hardware or both are implemented in combination with.The device includes: to obtain module 401, processing module 402 and the first sending module
403。
Module 401 is obtained, for obtaining the information of vehicles of the target vehicle;
Processing module 402 is handled by the first Encryption Algorithm for the information of vehicles to the target vehicle, is obtained
Control the control key of the target vehicle;
First sending module 403, for the control key to be sent to the first terminal and the target vehicle, with
The first terminal is set to control the target vehicle by the control key.
Optionally, referring to Fig. 5, described device further include:
Second sending module 404, for when receiving when requesting the use of the target vehicle of second terminal transmission,
The first terminal is sent to using request by described;
Generation module 405, it is interim close for generating when receiving the authorization acceptance message that the first terminal is sent
Key;
Third sending module 406, for the temporary key to be sent to the target vehicle and the second terminal, with
The second terminal is set to control the target vehicle by the temporary key.
Optionally, the generation module 405 is used for:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
Optionally, referring to Fig. 6, described device further include:
4th sending module 407, for when receiving the authorization termination messages that the first terminal is sent, to the mesh
It marks vehicle and sends key failure instruction, the key failure instruction is used to indicate the temporary key failure;Alternatively,
5th sending module 408, for when the effective time for detecting the temporary key expires, to the target carriage
Send key failure instruction.
Optionally, referring to Fig. 7, described device further include:
Receiving module 409, the bind request sent for receiving the first terminal, the bind request carry described the
The mark of one terminal and the verification information of the target vehicle;
Binding module 410, for when determining the target vehicle qualification based on the verification information, eventually by described first
It is bound with the target vehicle at end.
In conclusion in embodiments of the present invention, the information of vehicles of the available target vehicle of certificate server, and inciting somebody to action
After first terminal and target vehicle binding, the first Encryption Algorithm processing is carried out to the information of vehicles of target vehicle, obtains target carriage
Control key, is sent to first terminal and target vehicle for control key, keeps first terminal direct by control key
Target vehicle is controlled, without avoiding key loss by traditional remote-control key, improves the efficiency and safety of control vehicle
Property.Meanwhile when second terminal is needed using target vehicle, can second terminal obtain first terminal authorization in the case where,
Information of vehicles based on target vehicle is the temporary key that second terminal generates control temporary control target vehicle, to avoid passing
Car key of uniting borrows inconvenient situation, improves vehicle control efficiency and safety.
It should be understood that controller of vehicle provided by the above embodiment is when carrying out vehicle control, only with above-mentioned each
The division progress of functional module can according to need and for example, in practical application by above-mentioned function distribution by different function
Energy module is completed, i.e., the internal structure of device is divided into different functional modules, to complete whole described above or portion
Divide function.In addition, controller of vehicle provided by the above embodiment and control method for vehicle embodiment belong to same design, have
Body realizes that process is detailed in embodiment of the method, and which is not described herein again.
Fig. 8 is a kind of structural schematic diagram of certificate server provided in an embodiment of the present invention.The certificate server can be
Server in background server cluster.Specifically:
Server 800 includes central processing unit (CPU) 801 including random access memory (RAM) 802 and read-only deposits
The system storage 804 of reservoir (ROM) 803, and the system bus of connection system storage 804 and central processing unit 801
805.Server 800 further includes the basic input/output (I/O that information is transmitted between each device helped in computer
System) 806, and for the mass-memory unit of storage program area 813, application program 814 and other program modules 815
807。
Basic input/output 806 includes display 808 for showing information and inputs information for user
The input equipment 809 of such as mouse, keyboard etc.Wherein display 808 and input equipment 809 are all by being connected to system bus
805 input and output controller 810 is connected to central processing unit 801.Basic input/output 806 can also include defeated
Enter o controller 810 for receiving and handling from the defeated of multiple other equipment such as keyboard, mouse or electronic touch pen
Enter.Similarly, input and output controller 810 also provides output to display screen, printer or other kinds of output equipment.
Mass-memory unit 807 is connected by being connected to the bulk memory controller (not shown) of system bus 805
To central processing unit 801.Mass-memory unit 807 and its associated computer-readable medium are that server 800 provides
Non-volatile memories.That is, mass-memory unit 807 may include such as hard disk or CD-ROM drive etc
Computer-readable medium (not shown).
Without loss of generality, computer-readable medium may include computer storage media and communication media.Computer storage
Medium includes any of the information such as computer readable instructions, data structure, program module or other data for storage
The volatile and non-volatile of method or technique realization, removable and irremovable medium.Computer storage medium include RAM,
ROM, EPROM, EEPROM, flash memory or other solid-state storages its technologies, CD-ROM, DVD or other optical storages, cassette, magnetic
Band, disk storage or other magnetic storage devices.Certainly, skilled person will appreciate that computer storage medium is not limited to
It states several.Above-mentioned system storage 804 and mass-memory unit 807 may be collectively referred to as memory.
According to various embodiments of the present invention, server 800 can also pass through the network connections such as internet to network
On remote computer operation.Namely server 800 can be by the Network Interface Unit 811 that is connected on system bus 805
It is connected to network 812, in other words, Network Interface Unit 811 can be used also to be connected to other kinds of network or long-range meter
Calculation machine system (not shown).
Above-mentioned memory further includes one, and perhaps more than one program one or more than one program are stored in storage
In device, it is configured to be executed by CPU.The one or more programs include for realizing Fig. 2 or embodiment shown in Fig. 3
In control method for vehicle.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of control method for vehicle, which is characterized in that the described method includes:
Obtain the information of vehicles of the target vehicle;
The information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains the control for controlling the target vehicle
Key processed;
The control key is sent to the first terminal and the target vehicle, so that the first terminal passes through the control
Target vehicle described in cipher controlled processed.
2. the method as described in claim 1, which is characterized in that it is described by the control key be sent to the first terminal and
After the target vehicle, further includes:
It, will be described described using requesting to be sent to when the use to the target vehicle for receiving second terminal transmission is requested
First terminal;
When receiving the authorization acceptance message that the first terminal is sent, temporary key is generated;
The temporary key is sent to the target vehicle and the second terminal, so that the second terminal is faced by described
When cipher controlled described in target vehicle.
3. method according to claim 2, which is characterized in that the generation temporary key, comprising:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
4. method according to claim 2, which is characterized in that it is described by the temporary key be sent to the target vehicle and
After the second terminal, further includes:
When receiving the authorization termination messages that the first terminal is sent, key failure instruction is sent to the target vehicle,
The key failure instruction is used to indicate the temporary key failure;Alternatively,
When the effective time for detecting the temporary key expires, key failure instruction is sent to the target vehicle.
5. the method as described in claim 1, which is characterized in that the information of vehicles to the target vehicle adds by first
Close algorithm is handled, before the control key for obtaining controlling the target vehicle, further includes:
Receive the bind request that the first terminal is sent, the bind request carry the first terminal mark and the mesh
Mark the verification information of vehicle;
When determining the target vehicle qualification based on the verification information, the first terminal and the target vehicle are carried out
Binding.
6. a kind of controller of vehicle, which is characterized in that described device includes:
Module is obtained, for obtaining the information of vehicles of the target vehicle;
Processing module is handled for the information of vehicles to the target vehicle by the first Encryption Algorithm, and control institute is obtained
State the control key of target vehicle;
First sending module, for the control key to be sent to the first terminal and the target vehicle, so that described
First terminal controls the target vehicle by the control key.
7. device as claimed in claim 6, which is characterized in that described device further include:
Second sending module will be described for when receiving when requesting the use of the target vehicle of second terminal transmission
The first terminal is sent to using request;
Generation module, for generating temporary key when receiving the authorization acceptance message that the first terminal is sent;
Third sending module, for the temporary key to be sent to the target vehicle and the second terminal, so that described
Second terminal controls the target vehicle by the temporary key.
8. the method for claim 7, which is characterized in that the generation module is used for:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
9. device as claimed in claim 7, which is characterized in that described device further include:
4th sending module, for when receiving the authorization termination messages that the first terminal is sent, to the target vehicle
Key failure instruction is sent, the key failure instruction is used to indicate the temporary key failure;Alternatively,
5th sending module, for being sent to the target vehicle when the effective time for detecting the temporary key expires
Key failure instruction.
10. a kind of computer readable storage medium, which is characterized in that computer program is stored in the storage medium, it is described
Method as claimed in any one of claims 1 to 5 is realized when computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810811474.2A CN109017676B (en) | 2018-07-23 | 2018-07-23 | Vehicle control method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810811474.2A CN109017676B (en) | 2018-07-23 | 2018-07-23 | Vehicle control method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109017676A true CN109017676A (en) | 2018-12-18 |
CN109017676B CN109017676B (en) | 2020-04-07 |
Family
ID=64645131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810811474.2A Active CN109017676B (en) | 2018-07-23 | 2018-07-23 | Vehicle control method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109017676B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110808832A (en) * | 2019-11-06 | 2020-02-18 | 南京酷沃智行科技有限公司 | Digital key password sharing method and device |
CN111080857A (en) * | 2019-12-30 | 2020-04-28 | 华人运通(上海)云计算科技有限公司 | Vehicle digital key management and use method and device, mobile terminal and storage medium |
CN112585042A (en) * | 2020-03-17 | 2021-03-30 | 华为技术有限公司 | Vehicle control method, communication device, and computer-readable storage medium |
CN113645590A (en) * | 2021-07-16 | 2021-11-12 | 北汽福田汽车股份有限公司 | Method, apparatus, device and medium for remotely controlling vehicle based on encryption algorithm |
CN114283573A (en) * | 2021-12-22 | 2022-04-05 | 珠海格力电器股份有限公司 | Equipment control method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105577689A (en) * | 2016-01-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Authority management method and device and terminal |
CN105608885A (en) * | 2015-11-24 | 2016-05-25 | 东莞酷派软件技术有限公司 | Vehicle management method and device and server |
CN106780859A (en) * | 2016-11-21 | 2017-05-31 | 上海众人网络安全技术有限公司 | Control method and system that a kind of time type vehicle is unlocked/shut |
CN107294926A (en) * | 2016-03-31 | 2017-10-24 | 比亚迪股份有限公司 | Authoring system, method and vehicle, terminal, the server of vehicle remote control |
CN107809413A (en) * | 2016-09-09 | 2018-03-16 | 比亚迪股份有限公司 | Obtain method, terminal, safety chip and the vehicle cloud platform of information of vehicles |
-
2018
- 2018-07-23 CN CN201810811474.2A patent/CN109017676B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105608885A (en) * | 2015-11-24 | 2016-05-25 | 东莞酷派软件技术有限公司 | Vehicle management method and device and server |
CN105577689A (en) * | 2016-01-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Authority management method and device and terminal |
CN107294926A (en) * | 2016-03-31 | 2017-10-24 | 比亚迪股份有限公司 | Authoring system, method and vehicle, terminal, the server of vehicle remote control |
CN107809413A (en) * | 2016-09-09 | 2018-03-16 | 比亚迪股份有限公司 | Obtain method, terminal, safety chip and the vehicle cloud platform of information of vehicles |
CN106780859A (en) * | 2016-11-21 | 2017-05-31 | 上海众人网络安全技术有限公司 | Control method and system that a kind of time type vehicle is unlocked/shut |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110808832A (en) * | 2019-11-06 | 2020-02-18 | 南京酷沃智行科技有限公司 | Digital key password sharing method and device |
CN111080857A (en) * | 2019-12-30 | 2020-04-28 | 华人运通(上海)云计算科技有限公司 | Vehicle digital key management and use method and device, mobile terminal and storage medium |
CN111080857B (en) * | 2019-12-30 | 2022-05-03 | 华人运通(上海)云计算科技有限公司 | Vehicle digital key management and use method and device, mobile terminal and storage medium |
CN112585042A (en) * | 2020-03-17 | 2021-03-30 | 华为技术有限公司 | Vehicle control method, communication device, and computer-readable storage medium |
CN112585042B (en) * | 2020-03-17 | 2021-12-14 | 华为技术有限公司 | Vehicle control method, communication device, and computer-readable storage medium |
CN113645590A (en) * | 2021-07-16 | 2021-11-12 | 北汽福田汽车股份有限公司 | Method, apparatus, device and medium for remotely controlling vehicle based on encryption algorithm |
CN113645590B (en) * | 2021-07-16 | 2023-10-03 | 北汽福田汽车股份有限公司 | Method, device, equipment and medium for remotely controlling vehicle based on encryption algorithm |
CN114283573A (en) * | 2021-12-22 | 2022-04-05 | 珠海格力电器股份有限公司 | Equipment control method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109017676B (en) | 2020-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109017676A (en) | Control method for vehicle, device and storage medium | |
US11799637B2 (en) | Methods and systems for blockchain-implemented event-lock encryption | |
US11483338B2 (en) | Secure blockchain-based consensus | |
US11046201B2 (en) | Electric vehicle charging station system | |
CN111797159A (en) | Information management and access control in a database | |
WO1997050205A9 (en) | Digitally signing agreements from remotely located nodes | |
CN105871538A (en) | Quantum key distribution system, quantum key distribution method and device | |
JP2002537685A (en) | How to verify the use of a public key generated by an onboard system | |
Terzi et al. | Securing emission data of smart vehicles with blockchain and self-sovereign identities | |
CN111614680B (en) | CP-ABE-based traceable cloud storage access control method and system | |
CN111010381B (en) | Cross-chain-based identity authentication method and system | |
CN104660412A (en) | Password-less security authentication method and system for mobile equipment | |
CN109714170B (en) | Data isolation method in alliance chain and corresponding alliance chain system | |
Huang et al. | DAPA: A decentralized, accountable, and privacy-preserving architecture for car sharing services | |
US20210374273A1 (en) | Apparatus and Method for Controlling Access to User Information | |
Naresh et al. | Blockchain‐based patient centric health care communication system | |
CN109543365A (en) | A kind of authorization method and device | |
Kilic | Plug and Charge solutions with vehicle-to-grid communication | |
CN110851804A (en) | Alliance chain identity authentication method based on electronic contract | |
CN115906117A (en) | Trusted application implementation method based on blockchain transaction | |
Bharat et al. | A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing | |
CN112865968B (en) | Data ciphertext hosting method and system, computer equipment and storage medium | |
CN106921623B (en) | Identification key updating method and system | |
CN112214789A (en) | Ethical data processing method, block chain network and electronic equipment | |
Frej | Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |