Disclosure of Invention
The present invention is directed to solve the above-mentioned problems of the prior art, and an object of the present invention is to provide a method and an apparatus for authenticating a virtual key of a vehicle, which are used to solve the disadvantages of the prior art.
Specifically, an embodiment of the present invention provides an authentication method for a vehicle virtual key, which is used for initiating authentication to a vehicle-mounted device, and includes:
sending authentication request information to the vehicle-mounted equipment;
receiving first verification request information returned after the vehicle-mounted equipment confirms the authentication request information;
after the first verification request information is verified and confirmed, a session key is generated according to the first verification request information;
generating second check request information containing the session key, and sending the second check request information to the vehicle-mounted equipment;
and receiving authentication response information with authentication result information and the session key returned after the vehicle-mounted equipment confirms the second verification request information.
As a further improvement of the above technical solution, after receiving authentication response information with authentication result information and the session key returned after the vehicle-mounted device confirms the second verification request information, the method further includes:
and displaying the authentication result information and the session key.
As a further improvement of the above technical solution, before sending the authentication request information to the vehicle-mounted device, the method further includes:
decrypting the virtual key by using a preset transmission key;
acquiring a Bluetooth unique identification code of the vehicle-mounted equipment by using the virtual key;
and searching the vehicle-mounted equipment corresponding to the unique Bluetooth identification code to establish Bluetooth communication connection with the vehicle-mounted equipment.
As a further improvement of the above technical solution, the method further comprises:
generating and/or storing the virtual key and the transmission key on a cloud server;
sending downloading request information to a cloud server;
receiving a virtual key and a transmission key returned by the cloud server;
the virtual key and transport key are stored locally.
As a further improvement of the above technical solution, the authentication request information includes a serial number of the mobile terminal and a serial number of the vehicle-mounted device; the first checking request information comprises a serial number of the vehicle-mounted equipment and a serial number of a communication channel; the second check request information comprises a session key and a vehicle-mounted equipment serial number; the authentication response information comprises a session key, authentication result information and a vehicle-mounted equipment serial number.
The embodiment of the invention also provides an authentication device of the vehicle virtual key, which is used for initiating authentication to vehicle-mounted equipment and comprises the following steps: the system comprises an information sending module, an information receiving module and a verification generating module;
the information sending module is used for sending authentication request information to the vehicle-mounted equipment;
the information receiving module is used for receiving first verification request information returned after the vehicle-mounted equipment confirms the authentication request information;
the verification generation module is used for generating a session key according to the first verification request information and generating second verification request information containing the session key after the first verification request information is verified and confirmed;
the information sending module is further used for sending the second check request information to the vehicle-mounted equipment;
the information receiving module is further used for receiving authentication response information with authentication result information and the session key returned by the vehicle-mounted equipment after the vehicle-mounted equipment confirms the second verification request information.
As a further improvement of the above technical solution, the method further comprises: and the display module is used for displaying the authentication result information and the session key.
As a further improvement of the above technical solution, the method further comprises: a decryption acquisition module; the decryption obtaining module is used for decrypting the virtual key by using a preset transmission key; acquiring a Bluetooth unique identification code of the vehicle-mounted equipment by using the virtual key;
a communication establishing module; the communication establishing module is used for searching the vehicle-mounted equipment corresponding to the Bluetooth unique identification code to establish Bluetooth communication connection with the vehicle-mounted equipment.
As a further improvement of the above technical solution, the method further comprises: and the storage module is used for locally storing the virtual key and the transmission key which are returned by the cloud server and received by the information receiving module.
As a further improvement of the above technical solution, the authentication request information includes: a mobile terminal serial number and a vehicle-mounted equipment serial number; the first verification request information includes: a vehicle-mounted equipment serial number and a communication channel serial number; the second check-up request information includes: a session key and a vehicle-mounted equipment serial number; the authentication response information includes: session key, authentication result information and vehicle-mounted equipment serial number.
The embodiment of the invention also provides a mobile terminal, which comprises a memory and a processor, wherein the memory is used for storing the computer program, and the processor runs the computer program to enable the mobile terminal to execute the authentication method of the vehicle virtual key.
An embodiment of the present invention further provides a computer-readable storage medium, which stores the computer program used in the mobile terminal.
Compared with the prior art, the technical scheme provided by the invention at least has the following beneficial effects: by adding the authentication process in the process of obtaining the secret key, the problem that no authentication exists in the virtual key generation process in the Internet of vehicles is solved, and the safety factor of vehicle use is improved. The user is provided with the convenient, efficient and safe high-quality vehicle-using experience.
Detailed Description
Various embodiments of the present disclosure will be described more fully hereinafter. The present disclosure is capable of various embodiments and of modifications and variations therein. However, it should be understood that: there is no intention to limit the scope of the disclosure to the specific embodiments disclosed herein, but rather, the disclosure is to cover all modifications, equivalents, and/or alternatives falling within the spirit and scope of the various embodiments of the disclosure.
Hereinafter, the term "includes" or "may include" used in various embodiments of the present disclosure indicates the presence of the disclosed functions, operations, or elements, and does not limit the addition of one or more functions, operations, or elements. Furthermore, as used in various embodiments of the present disclosure, the terms "comprising," "having," and their derivatives, are intended to be only representative of the particular features, integers, steps, operations, elements, components, or combinations of the foregoing, and should not be construed as first excluding the existence of, or adding to one or more other features, integers, steps, operations, elements, components, or combinations of the foregoing.
In various embodiments of the disclosure, the expression "at least one of a or/and B" includes any or all combinations of the words listed simultaneously. For example, the expression "a or B" or "at least one of a or/and B" may include a, may include B, or may include both a and B.
Expressions (such as "first", "second", and the like) used in various embodiments of the present disclosure may modify various constituent elements in the various embodiments, but may not limit the respective constituent elements. For example, the above description does not limit the order and/or importance of the elements described. The foregoing description is for the purpose of distinguishing one element from another. For example, the first user device and the second user device indicate different user devices, although both are user devices. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of various embodiments of the present disclosure.
It should be noted that: if it is described that one constituent element is "connected" to another constituent element, the first constituent element may be directly connected to the second constituent element, and a third constituent element may be "connected" between the first constituent element and the second constituent element. In contrast, when one constituent element is "directly connected" to another constituent element, it is understood that there is no third constituent element between the first constituent element and the second constituent element.
The term "user" used in various embodiments of the present disclosure may indicate a person using an electronic device or a device using an electronic device (e.g., an artificial intelligence electronic device).
The terminology used in the various embodiments of the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the various embodiments of the present disclosure. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the various embodiments of the present disclosure belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined in various embodiments of the present disclosure.
Example 1
As shown in fig. 1, an embodiment of the present invention provides an authentication method for a vehicle virtual key, which is used for initiating authentication to a vehicle-mounted device, and includes:
and S101, sending authentication request information to the vehicle-mounted equipment.
After the vehicle-mounted device receives the authentication request information sent by the user authentication terminal, whether the information in the fleet authentication request information is consistent with the data locally stored by the vehicle-mounted device is determined, for example: the serial number of the user authentication terminal, the mobile phone number, the serial number of the vehicle-mounted equipment and the like. And when the data are confirmed to be consistent, the vehicle-mounted equipment sends first verification request information to the user authentication terminal.
S102, receiving first verification request information returned after the vehicle-mounted equipment confirms the authentication request information.
The user authentication terminal receives first verification request information sent by the vehicle-mounted equipment. And whether the information of the first checking request information of the school team is consistent with the data locally stored by the user authentication terminal or not is judged. Such as: the mobile phone number, the serial number of the vehicle-mounted equipment, the serial number of a Bluetooth channel, the Bluetooth unique identification code of the vehicle-mounted equipment and the like.
S103, after the first verification request information is verified and confirmed, a session key is generated according to the first verification request information.
And after the data are confirmed to be consistent, the user authentication terminal locally generates a session key.
S104, generating second checking request information containing the session key, and sending the second checking request information to the vehicle-mounted equipment.
The user authentication terminal sends second check request information with the session key to the vehicle-mounted equipment.
And S105, receiving authentication response information with authentication result information and the session key returned after the vehicle-mounted equipment confirms the second verification request information.
After the vehicle-mounted device receives the second check request information sent by the user authentication terminal, whether the information in the second check request information of the school team is consistent with the data locally stored by the vehicle-mounted device is determined, for example: the mobile phone number, the serial number of the vehicle-mounted equipment, the Bluetooth unique identification code of the vehicle-mounted equipment and the like. And when the data are confirmed to be consistent, the vehicle-mounted equipment sends authentication response information with authentication result information and the session key to the user authentication terminal.
After receiving authentication response information with authentication result information and the session key returned after the second check-up request information is confirmed by the vehicle-mounted device, the method further comprises the following steps:
and displaying the authentication result information and the session key for a user to view.
And the user checks the authentication result information and the session key through the terminal app interface.
Before sending the authentication request information to the vehicle-mounted device, the method further comprises:
and decrypting the virtual key by using a preset transmission key.
And acquiring the Bluetooth unique identification code of the vehicle-mounted equipment by using the virtual key.
And searching the vehicle-mounted equipment corresponding to the unique Bluetooth identification code to establish Bluetooth communication connection with the vehicle-mounted equipment.
The user authentication terminal needs to download the virtual key and the transmission key from the cloud server first. For each authentication terminal, the cloud server provides different transmission keys. To ensure safety.
And generating and/or storing the virtual key and the transmission key on the cloud server. The user authentication terminal firstly sends downloading request information to a cloud server; and after receiving the request, the cloud server outputs a related data packet to the user authentication terminal initiating the request, and the user authentication terminal receives the virtual key and the transmission key returned by the cloud server and stores the virtual key and the transmission key locally. Therefore, relevant data are reserved on the user authentication terminal, and subsequent users do not need to download from the cloud server again.
The authentication request information includes: a mobile terminal serial number and a vehicle-mounted equipment serial number; the first verification request information includes: a vehicle-mounted equipment serial number and a communication channel serial number; the second check-up request information includes: a session key and a vehicle-mounted equipment serial number; the authentication response information includes: session key, authentication result information and vehicle-mounted equipment serial number. If the communication tool such as the mobile phone is used for sending the authentication request information to the vehicle-mounted equipment, the authentication request information and the second verification request information both further comprise: a cell phone number. When communicating with the in-vehicle device using bluetooth communication, the first verification request information, the second verification request information, and the authentication response information each include a bluetooth unique identification code of the in-vehicle device.
Example 2
As shown in fig. 2, an embodiment of the present invention provides an authentication apparatus for a vehicle virtual key, configured to initiate authentication to a vehicle-mounted device, including: the system comprises an information sending module 10, an information receiving module 20 and a verification generating module 30.
The information sending module 10 is used for sending the authentication request information to the vehicle-mounted device.
The information receiving module 20 is configured to receive first verification request information returned after the vehicle-mounted device confirms the authentication request information.
The verification generation module 30 is configured to, after verifying and confirming the first verification request information, generate a session key according to the first verification request information and generate second verification request information including the session key.
The information sending module 10 is further configured to send the second verification request information to the vehicle-mounted device.
The information receiving module 20 is further configured to receive authentication response information with authentication result information and the session key, which is returned by the vehicle-mounted device after the vehicle-mounted device confirms the second verification request information.
In this embodiment, the authentication device for a virtual key of a vehicle further includes: and the display module 40, the display module 40 is configured to display the authentication result information and the session key for the user to view.
In this embodiment, the authentication device for a virtual key of a vehicle further includes: a decryption acquisition module 50; the decryption obtaining module 50 is configured to decrypt the virtual key by using a preset transmission key; and acquiring a Bluetooth Unique identification code (UUID) of the vehicle-mounted equipment by using the virtual key.
A communication establishing module 60; the communication establishing module 60 is used for searching the vehicle-mounted device corresponding to the bluetooth unique identification code to establish bluetooth communication connection with the vehicle-mounted device.
In this embodiment, the authentication device for a virtual key of a vehicle further includes: and the storage module 70, the storage module 70 is configured to locally store the virtual key and the transmission key that are returned by the cloud server and received by the information receiving module 20.
The authentication request information includes: a mobile terminal serial number and a vehicle-mounted equipment serial number; the first verification request information includes: a vehicle-mounted equipment serial number and a communication channel serial number; the second check-up request information includes: a session key and a vehicle-mounted equipment serial number; the authentication response information includes: session key, authentication result information and vehicle-mounted equipment serial number. If the communication tool such as the mobile phone is used for sending the authentication request information to the vehicle-mounted equipment, the authentication request information and the second verification request information both further comprise: a cell phone number. When communicating with the in-vehicle device using bluetooth communication, the first verification request information, the second verification request information, and the authentication response information each include a bluetooth unique identification code of the in-vehicle device.
The embodiment of the invention also provides a mobile terminal, which comprises a memory and a processor, wherein the memory is used for storing the computer program, and the processor runs the computer program to enable the mobile terminal to execute the authentication method of the vehicle virtual key.
An embodiment of the present invention further provides a computer-readable storage medium, which stores the computer program used in the mobile terminal.
The invention also provides a mobile terminal which can comprise a smart phone, a tablet computer and the like. The mobile terminal comprises a memory and a processor, wherein the memory can be used for storing a computer program, and the processor enables the mobile terminal to execute the authentication method of the vehicle virtual key or the functions of each module in the authentication device of the vehicle virtual key by running the computer program.
The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the mobile terminal, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The invention also provides a computer storage medium for storing the computer program used in the mobile terminal.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention or a part of the technical solution that contributes to the prior art in essence can be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.