CN109017676A - Control method for vehicle, device and storage medium - Google Patents

Control method for vehicle, device and storage medium Download PDF

Info

Publication number
CN109017676A
CN109017676A CN201810811474.2A CN201810811474A CN109017676A CN 109017676 A CN109017676 A CN 109017676A CN 201810811474 A CN201810811474 A CN 201810811474A CN 109017676 A CN109017676 A CN 109017676A
Authority
CN
China
Prior art keywords
target vehicle
terminal
key
sent
vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810811474.2A
Other languages
Chinese (zh)
Other versions
CN109017676B (en
Inventor
吴友盼
吴超
张圣峰
王川宿
张强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chery Automobile Co Ltd
Original Assignee
SAIC Chery Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SAIC Chery Automobile Co Ltd filed Critical SAIC Chery Automobile Co Ltd
Priority to CN201810811474.2A priority Critical patent/CN109017676B/en
Publication of CN109017676A publication Critical patent/CN109017676A/en
Application granted granted Critical
Publication of CN109017676B publication Critical patent/CN109017676B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/101Bluetooth

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Selective Calling Equipment (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of control method for vehicle, device and storage mediums, belong to Vehicle Engineering technical field.The described method includes: obtaining the information of vehicles of the target vehicle;The information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains the control key for controlling the target vehicle;The control key is sent to the first terminal and the target vehicle, so that the first terminal controls the target vehicle by the control key.The present invention generates control key by the information of vehicles of target vehicle, and control key is sent to first terminal and target vehicle, first terminal is set to directly control target vehicle by control key, without passing through traditional remote-control key, key loss is avoided, the efficiency and safety of control vehicle are improved.

Description

Control method for vehicle, device and storage medium
Technical field
The present invention relates to Vehicle Engineering technical field, in particular to a kind of control method for vehicle, device and storage medium.
Background technique
With economic and science and technology fast development, automobile has become the essential vehicles of people's trip gradually.By It is just able to achieve a series of functions under the control of car key in vehicle needs, therefore, when using vehicle, needs using car key Control the vehicle.
Currently, traditional vehicle is the control operation for being unlocked and starting to vehicle by traditional remote-control key, Some vehicles have been equipped with remote control module, by remote control module, long-range unlock can be carried out to vehicle, is closed Lock opens the controls such as air-conditioning operation.
But when being controlled by traditional remote-control key vehicle, due to, use high to remote-control key degree of dependence User needs carrying keys at any time when vehicle, if key loss may result in vehicle safety reduction.
Summary of the invention
The embodiment of the invention provides a kind of control method for vehicle, device and storage mediums, for solving in the related technology Vehicle control low efficiency, and the problem that vehicle safety is low.The technical solution is as follows:
In a first aspect, providing a kind of control method for vehicle, which comprises
Obtain the information of vehicles of the target vehicle;
The information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains controlling the target vehicle Control key;
The control key is sent to the first terminal and the target vehicle, so that the first terminal passes through institute It states control key and controls the target vehicle.
It is optionally, described that the control key is sent to after the first terminal and the target vehicle, further includes:
When the use to the target vehicle for receiving second terminal transmission is requested, it is sent to described using request The first terminal;
When receiving the authorization acceptance message that the first terminal is sent, temporary key is generated;
The temporary key is sent to the target vehicle and the second terminal, so that the second terminal passes through institute It states temporary key and controls the target vehicle.
Optionally, the generation temporary key, comprising:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
It is optionally, described that the temporary key is sent to after the target vehicle and the second terminal, further includes:
When receiving the authorization termination messages that the first terminal is sent, key failure is sent to the target vehicle and is referred to It enables, the key failure instruction is used to indicate the temporary key failure;Alternatively,
When the effective time for detecting the temporary key expires, key failure instruction is sent to the target vehicle.
Optionally, the information of vehicles to the target vehicle is handled by the first Encryption Algorithm, is controlled Before the control key of the target vehicle, further includes:
The bind request that the first terminal is sent is received, the bind request carries mark and the institute of the first terminal State the verification information of target vehicle;
When determining the target vehicle qualification based on the verification information, by the first terminal and the target vehicle It is bound.
Second aspect, provides a kind of controller of vehicle, and described device includes:
Module is obtained, for obtaining the information of vehicles of the target vehicle;
Processing module is handled by the first Encryption Algorithm for the information of vehicles to the target vehicle, is controlled Make the control key of the target vehicle;
First sending module, for the control key to be sent to the first terminal and the target vehicle, so that The first terminal controls the target vehicle by the control key.
Optionally, described device further include:
Second sending module, for inciting somebody to action when the use to the target vehicle for receiving second terminal transmission is requested It is described to be sent to the first terminal using request;
Generation module, for generating temporary key when receiving the authorization acceptance message that the first terminal is sent;
Third sending module, for the temporary key to be sent to the target vehicle and the second terminal, so that The second terminal controls the target vehicle by the temporary key.
Optionally, the generation module is used for:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
Optionally, described device further include:
4th sending module, for when receiving the authorization termination messages that the first terminal is sent, to the target Vehicle sends key failure instruction, and the key failure instruction is used to indicate the temporary key failure;Alternatively,
5th sending module, for when the effective time for detecting the temporary key expires, to the target vehicle Send key failure instruction.
Optionally, described device further include:
Receiving module, the bind request sent for receiving the first terminal, the bind request carry described first The mark of terminal and the verification information of the target vehicle;
Binding module, for when determining the target vehicle qualification based on the verification information, by the first terminal It is bound with the target vehicle.
The third aspect provides a kind of computer readable storage medium, is stored with computer program in the storage medium, The computer program realizes above-mentioned first aspect any method when being executed by processor.
Technical solution bring beneficial effect provided in an embodiment of the present invention includes at least:
In embodiments of the present invention, the information of vehicles of available target vehicle, and to the information of vehicles of target vehicle into The processing of the first Encryption Algorithm of row, obtains target vehicle control key, control key is sent to first terminal and target vehicle, is made First terminal can directly control target vehicle by control key, without avoiding key and losing by traditional remote-control key It loses, improves the efficiency and safety of control vehicle.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of vehicle control system configuration diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of control method for vehicle flow chart provided in an embodiment of the present invention;
Fig. 3 is another control method for vehicle flow chart provided in an embodiment of the present invention;
Fig. 4 is the first controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 5 is second of controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 6 is the third controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 7 is the 5th kind of controller of vehicle structural schematic diagram provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of certificate server provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Before carrying out detailed explanation to the embodiment of the present invention, the first application to being related in the embodiment of the present invention Scene and system architecture are explained respectively.
Firstly, to the present embodiments relate to application scenarios be introduced.
Currently, user needs to be unlocked vehicle by traditional remote control car key, start etc. controls operation, due to right Remote-control key degree of dependence is high, needs carrying keys at any time using user when vehicle, if if key loss car key is lost, Possibly vehicle can not be controlled, to the end vehicle control low efficiency, simultaneously as the loss of car key is likely to result in Vehicle safety reduces.
Based on such scene, the embodiment of the invention provides one kind can be improved vehicle control efficiency and vehicle peace The control method for vehicle of full property.
Next, to the present embodiments relate to system architecture be introduced.
Fig. 1 is a kind of vehicle control system structural schematic diagram provided in an embodiment of the present invention, and referring to Fig. 1, which includes Certificate server, target vehicle 2 and first terminal 3, target vehicle 1 and first terminal 2 can respectively with 1 network of certificate server Connection, target vehicle 2 can pass through bluetooth connection with first terminal.Wherein, certificate server 1 is for obtaining target vehicle 2 information of vehicles, and information of vehicles is handled by the first Encryption Algorithm, the control key of control target vehicle 2 is obtained, Control key is sent to first terminal 3 and target vehicle 2.First terminal 2 after receiving control key for controlling target Vehicle 2.Target vehicle 2 is used for after receiving control key, and corresponding function is executed under the control of first terminal 3.
In addition, the system can also include second terminal 4 and OEM (Original Equipment referring to Fig. 1 Manufacturer, original equipment manufacturer) database 5, second terminal 4 connects respectively with certificate server 1 and target vehicle 2 It connects, OEM database 5 is connect with certificate server 1.Wherein, OEM database is used to provide the vehicle of target vehicle for certificate server Information;Second terminal 4 be used for when needing to control target vehicle, from certificate server obtain target vehicle authorization and The temporary key of target vehicle 2 is controlled, and target vehicle 2 is controlled by temporary key.
It should be noted that may each comprise bluetooth communication in the first terminal 3, second terminal 4 and target vehicle 2, To which first terminal 3 can carry out bluetooth company with the bluetooth communication in target vehicle 2 by the bluetooth communication of itself It connects, second terminal 4 again may be by the bluetooth communication in the bluetooth communication and target vehicle 2 of itself and carry out bluetooth Connection.
It, next will be in conjunction with attached drawing to this in the application scenarios to the embodiment of the present invention and after system architecture is introduced The control method for vehicle that inventive embodiments provide describes in detail.
Fig. 2 is a kind of flow chart of method for vehicles provided in an embodiment of the present invention, and referring to fig. 2, this method is applied to certification In server, include the following steps.
Step 201: obtaining the information of vehicles of the target vehicle.
Step 202: the information of vehicles of the target vehicle being handled by the first Encryption Algorithm, obtains controlling the target The control key of vehicle.
Step 203: the control key being sent to the first terminal and the target vehicle, so that the first terminal is by being somebody's turn to do Control key controls the target vehicle.
In embodiments of the present invention, the information of vehicles of available target vehicle, and to the information of vehicles of target vehicle into The processing of the first Encryption Algorithm of row, obtains target vehicle control key, control key is sent to first terminal and target vehicle, is made First terminal can directly control target vehicle by control key, without avoiding key and losing by traditional remote-control key It loses, improves the efficiency and safety of control vehicle.
Optionally, which is sent to after the first terminal and the target vehicle, further includes:
When receiving when requesting the use of the target vehicle of second terminal transmission, by this using request be sent to this One terminal;
When receiving the authorization acceptance message of first terminal transmission, temporary key is generated;
The temporary key is sent to the target vehicle and the second terminal, so that the second terminal passes through the temporary key Control the target vehicle.
Optionally, temporary key is generated, comprising:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
Optionally, which is sent to after the target vehicle and the second terminal, further includes:
When receiving the authorization termination messages of first terminal transmission, key failure instruction is sent to the target vehicle, Key failure instruction is used to indicate temporary key failure;Alternatively,
When the effective time for detecting the temporary key expires, key failure instruction is sent to the target vehicle.
Optionally, the information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains controlling the target Before the control key of vehicle, further includes:
The bind request of first terminal transmission is received, which carries the mark and the target carriage of the first terminal Verification information;
When determining the target vehicle qualification based on the verification information, the first terminal and the target vehicle are tied up It is fixed.
All the above alternatives, can form alternative embodiment of the invention according to any combination, and the present invention is real It applies example and this is no longer repeated one by one.
Fig. 3 is a kind of control method for vehicle provided in an embodiment of the present invention, and referring to Fig. 3, this method comprises the following steps.
Step 301: the information of vehicles of certificate server acquisition target vehicle.
It can be seen from the above, OEM database can provide the information of vehicles of target vehicle, therefore, certificate server can be from The information of vehicles of target vehicle is obtained in OEM database, and certificate server can actively obtain the information of vehicles of target vehicle, The information of vehicles of target vehicle can also passively be obtained.
Wherein, the operation that certificate server actively obtains the information of vehicles of target vehicle can be with are as follows: OEM database is each The information of vehicles of updated vehicle is sent after secondary update to certificate server, alternatively, OEM database is every specified time interval The information of vehicles of vehicle is sent to certificate server, which can be arranged in advance, for example, the specified time interval It can be 1 day, 2 days, 1 week, 1 month etc..
In addition, these information have plenty of since OEM database is mainly used for storing the relevant information in vehicle generating process It cannot open to the outside world, therefore, OEM database can be when certificate server needs the information of some vehicles, by partial information It is sent to certificate server.For example, when target vehicle need with first terminal (terminal used by a user of target vehicle) into Row binding, first terminal can send bind request to certificate server, first terminal mark can be carried in the bind request With the verification information of target vehicle, when certificate server receives the bind request, target carriage can be obtained from OEM database Information of vehicles, first terminal and target vehicle are bound later.
It should be noted that information of vehicles may include VIN (the Vehicle Identification of target vehicle Number, ID code of vehicle), Bluetooth ID (bluetooth number), the information such as master Key (primary keyword).
Furthermore the information of vehicles of target vehicle directly can be sent to certificate server by OEM database, can also be right After the information of vehicles of target vehicle is pre-processed, retransmit to certificate server.For example, when information of vehicles includes target vehicle The information such as VIN, Bluetooth ID, master Key when, VIN can be converted to Vehicle ID (vehicle by OEM database Identifier) after, the information such as Vehicle ID, Bluetooth ID, master Key are sent to certificate server.
Step 302: certificate server handles the information of vehicles of target vehicle by the first Encryption Algorithm, is controlled Make the control key of the target vehicle.
In order to be first terminal control target vehicle, also for guarantee target vehicle using safe, not by other Terminal is controlled, certificate server can the information of vehicles to target vehicle handled by the first Encryption Algorithm, controlled The control key of target vehicle processed.
It should be noted that first Encryption Algorithm can be arranged in advance, for example, first Encryption Algorithm can be DES (Data Encryption Algorithm, data encryption algorithm), TDES (Triple Data Encryption Algorithm, triple Encryption Algorithm) etc. symmetric encipherment algorithms, or RSA, ECC (Elliptic Curves Cryptography, elliptic curve cipher coding theory) etc. rivest, shamir, adelmans, or MD2 (Message Digest Algorithm, Message Digest 5), hash (Hash) Encryption Algorithm such as MD4, MD5.It can certainly be the customized calculation of user Method, for example, the first Encryption Algorithm can be choosing when information of vehicles includes Vehicle ID, Bluetooth ID, master Key Take Vehicle ID front two, Bluetooth ID front two, master Key front two composition control key etc..
Further, since the control key that any terminal application obtains target vehicle can obtain the control of target vehicle Key processed, it would be possible that the safety in utilization that will lead to target vehicle is very low.Therefore, in order to guarantee target vehicle use peace Entirely, certificate server handles the information of vehicles of target vehicle by the first Encryption Algorithm, obtains controlling the target vehicle Control key before, certificate server also needs to bind first terminal and target vehicle.
Wherein, network application equipment can send bind request to certificate server, which carries first terminal Mark and target vehicle verification information;Certificate server receives the bind request of network application equipment transmission, and is based on The verification information of target vehicle determines whether the target vehicle is qualified;When based on the verification information determine the target vehicle qualification When, the first terminal and the target vehicle are bound.
In order to guarantee the safety in utilization of target vehicle, which can be the businessman institute of sale target vehicle The equipment used, that is to say, user is when buying target vehicle and needing to bind the first terminal of user and target vehicle, out The businessman for selling target vehicle can send bind request to certificate server by network application equipment.
It should be noted that the mark of first terminal is used for the unique identification terminal, the mark of first terminal can be should MAC (Media Access Control, media access control) address of terminal, dispatch from the factory sequence number etc..Target vehicle is tested Demonstrate,proving information can be at least one of Vehicle ID, Bluetooth ID, master Key of target vehicle etc..
It, can be in addition, certificate server is when the verification information based on target vehicle determines whether the target vehicle is qualified It determines with the presence or absence of information identical with verification information in the information of vehicles of target vehicle, if it is present determining the target carriage Verifying is qualified, if there is no then determining that target vehicle verifying is unqualified.
Furthermore the mark of first terminal is carried out corresponding storage with the information of vehicles of target vehicle by certificate server can be complete The binding of pairs of target vehicle and first terminal.
Step 303: the control key is sent to first terminal and target vehicle by certificate server.
In order to make first terminal smoothly control target vehicle, control key can be sent to first by certificate server Terminal and target vehicle.
Step 304: first terminal and target vehicle receive the control key that certificate server is sent, so that first terminal is logical Cross control key control target vehicle.
Due to all having control key in first terminal and target vehicle, first terminal can be sent out to target vehicle Send the control request for carrying control key;It, will the control that carry in the control request after target vehicle receives control request Key is matched with the control key that certificate server is sent, and upon determining a match, can unlock starting target vehicle, and Corresponding function is realized under the control of first terminal.
Further, need to borrow target vehicle due to sometimes might have other users, at this time the use of target vehicle Family is less likely also to borrow first terminal to other users, and therefore, other users need to obtain control by the terminal of oneself The temporary key of target vehicle.
Wherein, it when other users need to borrow target vehicle, can be sent by second terminal to certificate server more The use of target vehicle is requested, this is using can carry full name of applicant, borrow the application informations such as duration in request;When certification takes When the use to target vehicle that business device receives second terminal transmission is requested, this can be sent to first eventually using request End;When first terminal receives use request, application information can be shown, so that the user of first terminal chooses whether together Meaning lending target vehicle, when first terminal detects that user is awarded by what voice operating, clicking operation or slide were triggered When power agrees to instruction, authorization acceptance message can be sent to certificate server;It is sent when certificate server receives first terminal Authorization acceptance message when, generate temporary key;The temporary key is sent to the target vehicle and the second terminal;Second eventually After end and target vehicle receive temporary key, second terminal can control the target vehicle by the temporary key.
Wherein, the operation that certificate server generates temporary key can be with are as follows: passes through the to the information of vehicles of the target vehicle Two Encryption Algorithm are handled, and the temporary key is obtained.
It should be noted that second Encryption Algorithm can be arranged in advance, for example, second Encryption Algorithm can for DES, The symmetric encipherment algorithms such as 3DES, DESX, or the rivest, shamir, adelmans such as ECC, or the hash such as MD2, MD4, MD5 (Hash) Encryption Algorithm.Can certainly be user's custom algorithm, for example, information of vehicles include Vehicle ID, When Bluetooth ID, master Key, the second Encryption Algorithm can be two, Bluetooth ID after selection Vehicle ID Two, two composition temporary keys of master Key etc..First Encryption Algorithm and the second Encryption Algorithm can identical can also be with It is different.
In addition, sometimes the user of target vehicle is not intended to lending target vehicle, therefore, when first terminal shows letter of application After breath, user may select refusal authorized order, and first terminal can request to send refusal and authorize to authentication service to disappear at this time Breath;The refusal authorization messages can be sent to second terminal by certificate server, second terminal can display reminding information, with prompt The right to use of target vehicle can not be obtained.
Further, it since the time that the user of target vehicle lends target vehicle is limited, that is to say, second terminal There is the time limit using temporary key control target vehicle.Therefore, which is sent to the target by certificate server After vehicle and the second terminal, it can also determine whether temporary key has failed.
Wherein, it when certificate server receives the authorization termination messages of first terminal transmission, is sent to the target vehicle Key failure instruction, key failure instruction are used to indicate temporary key failure;Alternatively, when detecting having for the temporary key When effect duration expires, key failure instruction is sent to the target vehicle.
It, at this time can be by the since the user of target vehicle there may come a time when to be unwilling to continue to lend target vehicle halfway One terminal sends authorization termination messages to certificate server, and certificate server is when receiving the authorization termination messages, Ke Yixiang The target vehicle sends key failure instruction, and target vehicle can determine that this is interim close after receiving key failure instruction Key failure, it is subsequent to will be unable to detect second terminal any control instruction based on temporary key.Certainly, in order to allow second terminal User know that temporary key fails, certificate server can also be when sending authorization termination messages to target vehicle, also to the Two terminals send the authorization termination messages;Second terminal shows that authorization terminates prompt letter when receiving the authorization termination messages Breath.
In addition, it can be seen from the above, second terminal when application is using target vehicle, when can carry borrow in application information Long, therefore, certificate server can determine the use duration of temporary key after sending temporary key to second terminal, when facing When key use duration with borrow duration it is identical when, determine that the effective time of temporary key expires, temporary key has failed, this When can to target vehicle send key failure instruction.
In embodiments of the present invention, the information of vehicles of the available target vehicle of certificate server, and by first terminal After target vehicle binding, the first Encryption Algorithm processing is carried out to the information of vehicles of target vehicle, it is close to obtain target vehicle control Control key is sent to first terminal and target vehicle, first terminal is allow to directly control target by control key by key Vehicle improves the efficiency and safety of control vehicle without avoiding key loss by traditional remote-control key.Meanwhile , can be in the case where second terminal obtain first terminal authorization when the user of second terminal needs using target vehicle, base In the temporary key that the information of vehicles of target vehicle is second terminal generation control temporary control target vehicle, to avoid tradition Car key borrows inconvenient situation, improves vehicle control efficiency and safety.
After control method for vehicle provided in an embodiment of the present invention is explained, next, to of the invention real The controller of vehicle for applying example offer is introduced.
Fig. 4 is a kind of block diagram for controller of vehicle that the embodiment of the present disclosure provides, and referring to fig. 4, which can be by soft Part, hardware or both are implemented in combination with.The device includes: to obtain module 401, processing module 402 and the first sending module 403。
Module 401 is obtained, for obtaining the information of vehicles of the target vehicle;
Processing module 402 is handled by the first Encryption Algorithm for the information of vehicles to the target vehicle, is obtained Control the control key of the target vehicle;
First sending module 403, for the control key to be sent to the first terminal and the target vehicle, with The first terminal is set to control the target vehicle by the control key.
Optionally, referring to Fig. 5, described device further include:
Second sending module 404, for when receiving when requesting the use of the target vehicle of second terminal transmission, The first terminal is sent to using request by described;
Generation module 405, it is interim close for generating when receiving the authorization acceptance message that the first terminal is sent Key;
Third sending module 406, for the temporary key to be sent to the target vehicle and the second terminal, with The second terminal is set to control the target vehicle by the temporary key.
Optionally, the generation module 405 is used for:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
Optionally, referring to Fig. 6, described device further include:
4th sending module 407, for when receiving the authorization termination messages that the first terminal is sent, to the mesh It marks vehicle and sends key failure instruction, the key failure instruction is used to indicate the temporary key failure;Alternatively,
5th sending module 408, for when the effective time for detecting the temporary key expires, to the target carriage Send key failure instruction.
Optionally, referring to Fig. 7, described device further include:
Receiving module 409, the bind request sent for receiving the first terminal, the bind request carry described the The mark of one terminal and the verification information of the target vehicle;
Binding module 410, for when determining the target vehicle qualification based on the verification information, eventually by described first It is bound with the target vehicle at end.
In conclusion in embodiments of the present invention, the information of vehicles of the available target vehicle of certificate server, and inciting somebody to action After first terminal and target vehicle binding, the first Encryption Algorithm processing is carried out to the information of vehicles of target vehicle, obtains target carriage Control key, is sent to first terminal and target vehicle for control key, keeps first terminal direct by control key Target vehicle is controlled, without avoiding key loss by traditional remote-control key, improves the efficiency and safety of control vehicle Property.Meanwhile when second terminal is needed using target vehicle, can second terminal obtain first terminal authorization in the case where, Information of vehicles based on target vehicle is the temporary key that second terminal generates control temporary control target vehicle, to avoid passing Car key of uniting borrows inconvenient situation, improves vehicle control efficiency and safety.
It should be understood that controller of vehicle provided by the above embodiment is when carrying out vehicle control, only with above-mentioned each The division progress of functional module can according to need and for example, in practical application by above-mentioned function distribution by different function Energy module is completed, i.e., the internal structure of device is divided into different functional modules, to complete whole described above or portion Divide function.In addition, controller of vehicle provided by the above embodiment and control method for vehicle embodiment belong to same design, have Body realizes that process is detailed in embodiment of the method, and which is not described herein again.
Fig. 8 is a kind of structural schematic diagram of certificate server provided in an embodiment of the present invention.The certificate server can be Server in background server cluster.Specifically:
Server 800 includes central processing unit (CPU) 801 including random access memory (RAM) 802 and read-only deposits The system storage 804 of reservoir (ROM) 803, and the system bus of connection system storage 804 and central processing unit 801 805.Server 800 further includes the basic input/output (I/O that information is transmitted between each device helped in computer System) 806, and for the mass-memory unit of storage program area 813, application program 814 and other program modules 815 807。
Basic input/output 806 includes display 808 for showing information and inputs information for user The input equipment 809 of such as mouse, keyboard etc.Wherein display 808 and input equipment 809 are all by being connected to system bus 805 input and output controller 810 is connected to central processing unit 801.Basic input/output 806 can also include defeated Enter o controller 810 for receiving and handling from the defeated of multiple other equipment such as keyboard, mouse or electronic touch pen Enter.Similarly, input and output controller 810 also provides output to display screen, printer or other kinds of output equipment.
Mass-memory unit 807 is connected by being connected to the bulk memory controller (not shown) of system bus 805 To central processing unit 801.Mass-memory unit 807 and its associated computer-readable medium are that server 800 provides Non-volatile memories.That is, mass-memory unit 807 may include such as hard disk or CD-ROM drive etc Computer-readable medium (not shown).
Without loss of generality, computer-readable medium may include computer storage media and communication media.Computer storage Medium includes any of the information such as computer readable instructions, data structure, program module or other data for storage The volatile and non-volatile of method or technique realization, removable and irremovable medium.Computer storage medium include RAM, ROM, EPROM, EEPROM, flash memory or other solid-state storages its technologies, CD-ROM, DVD or other optical storages, cassette, magnetic Band, disk storage or other magnetic storage devices.Certainly, skilled person will appreciate that computer storage medium is not limited to It states several.Above-mentioned system storage 804 and mass-memory unit 807 may be collectively referred to as memory.
According to various embodiments of the present invention, server 800 can also pass through the network connections such as internet to network On remote computer operation.Namely server 800 can be by the Network Interface Unit 811 that is connected on system bus 805 It is connected to network 812, in other words, Network Interface Unit 811 can be used also to be connected to other kinds of network or long-range meter Calculation machine system (not shown).
Above-mentioned memory further includes one, and perhaps more than one program one or more than one program are stored in storage In device, it is configured to be executed by CPU.The one or more programs include for realizing Fig. 2 or embodiment shown in Fig. 3 In control method for vehicle.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of control method for vehicle, which is characterized in that the described method includes:
Obtain the information of vehicles of the target vehicle;
The information of vehicles of the target vehicle is handled by the first Encryption Algorithm, obtains the control for controlling the target vehicle Key processed;
The control key is sent to the first terminal and the target vehicle, so that the first terminal passes through the control Target vehicle described in cipher controlled processed.
2. the method as described in claim 1, which is characterized in that it is described by the control key be sent to the first terminal and After the target vehicle, further includes:
It, will be described described using requesting to be sent to when the use to the target vehicle for receiving second terminal transmission is requested First terminal;
When receiving the authorization acceptance message that the first terminal is sent, temporary key is generated;
The temporary key is sent to the target vehicle and the second terminal, so that the second terminal is faced by described When cipher controlled described in target vehicle.
3. method according to claim 2, which is characterized in that the generation temporary key, comprising:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
4. method according to claim 2, which is characterized in that it is described by the temporary key be sent to the target vehicle and After the second terminal, further includes:
When receiving the authorization termination messages that the first terminal is sent, key failure instruction is sent to the target vehicle, The key failure instruction is used to indicate the temporary key failure;Alternatively,
When the effective time for detecting the temporary key expires, key failure instruction is sent to the target vehicle.
5. the method as described in claim 1, which is characterized in that the information of vehicles to the target vehicle adds by first Close algorithm is handled, before the control key for obtaining controlling the target vehicle, further includes:
Receive the bind request that the first terminal is sent, the bind request carry the first terminal mark and the mesh Mark the verification information of vehicle;
When determining the target vehicle qualification based on the verification information, the first terminal and the target vehicle are carried out Binding.
6. a kind of controller of vehicle, which is characterized in that described device includes:
Module is obtained, for obtaining the information of vehicles of the target vehicle;
Processing module is handled for the information of vehicles to the target vehicle by the first Encryption Algorithm, and control institute is obtained State the control key of target vehicle;
First sending module, for the control key to be sent to the first terminal and the target vehicle, so that described First terminal controls the target vehicle by the control key.
7. device as claimed in claim 6, which is characterized in that described device further include:
Second sending module will be described for when receiving when requesting the use of the target vehicle of second terminal transmission The first terminal is sent to using request;
Generation module, for generating temporary key when receiving the authorization acceptance message that the first terminal is sent;
Third sending module, for the temporary key to be sent to the target vehicle and the second terminal, so that described Second terminal controls the target vehicle by the temporary key.
8. the method for claim 7, which is characterized in that the generation module is used for:
The information of vehicles of the target vehicle is handled by the second Encryption Algorithm, obtains the temporary key.
9. device as claimed in claim 7, which is characterized in that described device further include:
4th sending module, for when receiving the authorization termination messages that the first terminal is sent, to the target vehicle Key failure instruction is sent, the key failure instruction is used to indicate the temporary key failure;Alternatively,
5th sending module, for being sent to the target vehicle when the effective time for detecting the temporary key expires Key failure instruction.
10. a kind of computer readable storage medium, which is characterized in that computer program is stored in the storage medium, it is described Method as claimed in any one of claims 1 to 5 is realized when computer program is executed by processor.
CN201810811474.2A 2018-07-23 2018-07-23 Vehicle control method, device and storage medium Active CN109017676B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810811474.2A CN109017676B (en) 2018-07-23 2018-07-23 Vehicle control method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810811474.2A CN109017676B (en) 2018-07-23 2018-07-23 Vehicle control method, device and storage medium

Publications (2)

Publication Number Publication Date
CN109017676A true CN109017676A (en) 2018-12-18
CN109017676B CN109017676B (en) 2020-04-07

Family

ID=64645131

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810811474.2A Active CN109017676B (en) 2018-07-23 2018-07-23 Vehicle control method, device and storage medium

Country Status (1)

Country Link
CN (1) CN109017676B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110808832A (en) * 2019-11-06 2020-02-18 南京酷沃智行科技有限公司 Digital key password sharing method and device
CN111080857A (en) * 2019-12-30 2020-04-28 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN112585042A (en) * 2020-03-17 2021-03-30 华为技术有限公司 Vehicle control method, communication device, and computer-readable storage medium
CN113645590A (en) * 2021-07-16 2021-11-12 北汽福田汽车股份有限公司 Method, apparatus, device and medium for remotely controlling vehicle based on encryption algorithm
CN114283573A (en) * 2021-12-22 2022-04-05 珠海格力电器股份有限公司 Equipment control method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577689A (en) * 2016-01-29 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Authority management method and device and terminal
CN105608885A (en) * 2015-11-24 2016-05-25 东莞酷派软件技术有限公司 Vehicle management method and device and server
CN106780859A (en) * 2016-11-21 2017-05-31 上海众人网络安全技术有限公司 Control method and system that a kind of time type vehicle is unlocked/shut
CN107294926A (en) * 2016-03-31 2017-10-24 比亚迪股份有限公司 Authoring system, method and vehicle, terminal, the server of vehicle remote control
CN107809413A (en) * 2016-09-09 2018-03-16 比亚迪股份有限公司 Obtain method, terminal, safety chip and the vehicle cloud platform of information of vehicles

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608885A (en) * 2015-11-24 2016-05-25 东莞酷派软件技术有限公司 Vehicle management method and device and server
CN105577689A (en) * 2016-01-29 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Authority management method and device and terminal
CN107294926A (en) * 2016-03-31 2017-10-24 比亚迪股份有限公司 Authoring system, method and vehicle, terminal, the server of vehicle remote control
CN107809413A (en) * 2016-09-09 2018-03-16 比亚迪股份有限公司 Obtain method, terminal, safety chip and the vehicle cloud platform of information of vehicles
CN106780859A (en) * 2016-11-21 2017-05-31 上海众人网络安全技术有限公司 Control method and system that a kind of time type vehicle is unlocked/shut

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110808832A (en) * 2019-11-06 2020-02-18 南京酷沃智行科技有限公司 Digital key password sharing method and device
CN111080857A (en) * 2019-12-30 2020-04-28 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN111080857B (en) * 2019-12-30 2022-05-03 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN112585042A (en) * 2020-03-17 2021-03-30 华为技术有限公司 Vehicle control method, communication device, and computer-readable storage medium
CN112585042B (en) * 2020-03-17 2021-12-14 华为技术有限公司 Vehicle control method, communication device, and computer-readable storage medium
CN113645590A (en) * 2021-07-16 2021-11-12 北汽福田汽车股份有限公司 Method, apparatus, device and medium for remotely controlling vehicle based on encryption algorithm
CN113645590B (en) * 2021-07-16 2023-10-03 北汽福田汽车股份有限公司 Method, device, equipment and medium for remotely controlling vehicle based on encryption algorithm
CN114283573A (en) * 2021-12-22 2022-04-05 珠海格力电器股份有限公司 Equipment control method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109017676B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN109017676A (en) Control method for vehicle, device and storage medium
US11799637B2 (en) Methods and systems for blockchain-implemented event-lock encryption
US11483338B2 (en) Secure blockchain-based consensus
US11046201B2 (en) Electric vehicle charging station system
CN111797159A (en) Information management and access control in a database
WO1997050205A9 (en) Digitally signing agreements from remotely located nodes
CN105871538A (en) Quantum key distribution system, quantum key distribution method and device
JP2002537685A (en) How to verify the use of a public key generated by an onboard system
Terzi et al. Securing emission data of smart vehicles with blockchain and self-sovereign identities
CN111614680B (en) CP-ABE-based traceable cloud storage access control method and system
CN111010381B (en) Cross-chain-based identity authentication method and system
CN104660412A (en) Password-less security authentication method and system for mobile equipment
CN109714170B (en) Data isolation method in alliance chain and corresponding alliance chain system
Huang et al. DAPA: A decentralized, accountable, and privacy-preserving architecture for car sharing services
US20210374273A1 (en) Apparatus and Method for Controlling Access to User Information
Naresh et al. Blockchain‐based patient centric health care communication system
CN109543365A (en) A kind of authorization method and device
Kilic Plug and Charge solutions with vehicle-to-grid communication
CN110851804A (en) Alliance chain identity authentication method based on electronic contract
CN115906117A (en) Trusted application implementation method based on blockchain transaction
Bharat et al. A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing
CN112865968B (en) Data ciphertext hosting method and system, computer equipment and storage medium
CN106921623B (en) Identification key updating method and system
CN112214789A (en) Ethical data processing method, block chain network and electronic equipment
Frej Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant