CN109727354A - A kind of control method and system of vehicle - Google Patents
A kind of control method and system of vehicle Download PDFInfo
- Publication number
- CN109727354A CN109727354A CN201811615317.0A CN201811615317A CN109727354A CN 109727354 A CN109727354 A CN 109727354A CN 201811615317 A CN201811615317 A CN 201811615317A CN 109727354 A CN109727354 A CN 109727354A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- target vehicle
- terminal
- authority information
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of control method of vehicle and systems, this method comprises: server generates the authorization message of target vehicle, the authorization message of target vehicle includes the identity information and the first authority information of target vehicle, first authority information is to be obtained by server using the second authority information of management key pair encryption of target vehicle, and the second authority information is used for designated vehicle control authority;The authorization message of target vehicle is sent to terminal by server, and the first authority information is sent to target vehicle by close range wireless communication modes according to the identity information of target vehicle by terminal;Target vehicle is decrypted using the first authority information of management key pair of target vehicle, to obtain the second authority information.
Description
Technical field
The present invention relates to technical field of vehicle more particularly to the control methods and system of a kind of vehicle.
Background technique
The ease of use that shared vehicle (for example, shared bicycle, shared electric vehicle, shared automobile) has by it,
It is more and more widely used into daily life.
When user wants using shared vehicle, the terminal needs of user are established remote radio communication with server and are connect,
And shared vehicle and server, which are also required to establish remote radio communication, to be connect, and such user can obtain the control of shared vehicle
Permission processed.For sharing the unlocking process of bicycle, user terminal reads the two dimension of shared bicycle by modes such as scannings
Code or number, to the server request unlock shared bicycle;Server sends to shared bicycle and solves when receiving request
Lock instruction;Shared bicycle executes unlock when receiving unlock instruction.
But when shared vehicle parking is at null zones, for example, inside library or building, terminal and server it
Between and shared vehicle and server between can not establish communication connection.In this case, user can not obtain total to this
The control authority of vehicle is enjoyed, unlocking authority as escribed above causes user that cannot control vehicle.
Therefore, it is necessary to propose a kind of new control method for vehicle, it can guarantee that user also can be just in null zones
Often control vehicle.
Summary of the invention
One purpose of the embodiment of the present invention is to provide a kind of new vehicle control technical solution.
According to the first aspect of the invention, a kind of control method of vehicle is provided, comprising:
Server generates the authorization message of target vehicle, and the authorization message of the target vehicle includes the target vehicle
Identity information and the first authority information, first authority information are close using the management of the target vehicle by the server
Key encrypts the second authority information and obtains, and second authority information is used for designated vehicle control authority;
The authorization message of the target vehicle is sent to terminal by the server, by the terminal according to the target carriage
Identity information first authority information is sent to the target vehicle by close range wireless communication modes;
First authority information described in management key pair of the target vehicle using the target vehicle is decrypted, to obtain
Obtain second authority information.
Optionally, the terminal will be described by close range wireless communication modes according to the identity information of the target vehicle
When first authority information is sent to the target vehicle, the target vehicle be in can not with the state of the server communication,
The terminal is in can or can not be with the state of the server communication.
Optionally, the specified vehicle control permission of second authority information includes unlocking control authority;
After the target vehicle obtains second authority information, manipulates the target vehicle and execute unlocking action.
Optionally, the specified vehicle control permission of second authority information, including following any or combination:
Lock control authority, vehicle window control authority, car light control authority, whistle control authority.
Optionally, after the target vehicle obtains second authority information, Xiang Suoshu terminal sends second permission
Information;
After the terminal receives second authority information from the target vehicle, provided on the interface of the terminal with
The specified one-to-one button of vehicle control permission of second authority information;
The terminal according to user to the trigger action of the button, Xiang Suoshu target vehicle send be triggered it is described by
The corresponding vehicle control order of button;
After the target vehicle receives the vehicle control order, manipulates the target vehicle and execute and the vehicle control
The corresponding movement of order.
Optionally, after the target vehicle receives the vehicle control order, manipulate the target vehicle execute with it is described
Vehicle control order acts accordingly, comprising:
After the target vehicle receives the vehicle control order, determine the vehicle control order whether described second
In the specified vehicle control permission of authority information;
If the vehicle control order manipulates the mesh in the vehicle control permission that second authority information is specified
Mark vehicle executes act corresponding with the vehicle control order.
Optionally, second authority information is also used to specify the effective time of the vehicle control permission;
After the target vehicle receives the vehicle control order, manipulates the target vehicle and execute and the vehicle control
The corresponding movement of order, comprising:
After the target vehicle receives the vehicle control order, determine the vehicle control order whether described second
In the specified vehicle control permission of authority information;
If the vehicle control order is in the vehicle control permission that second authority information is specified, when determining current
Between whether within the effective time of the vehicle control permission corresponding with the control command;
If current time within the effective time of the vehicle control permission corresponding with the control command, manipulates institute
It states target vehicle and executes act corresponding with the vehicle control order.
Optionally, the authorization message of the target vehicle further includes the first session key and the second session key, and described
One session key is that the encryption of the second session key described in the management key pair of the target vehicle is used to obtain as the server;
The method also includes:
First session key is transmitted to the target vehicle by close range wireless communication modes by the terminal;
First session key described in management key pair of the target vehicle using the target vehicle is decrypted, to obtain
Obtain second session key;
During subsequent wireless near field communication, the sender in the two is used for the terminal and the target vehicle
Second session key to send information encrypt, recipient using second session key to the information received into
Row decryption.
Optionally, the method also includes:
The target vehicle generates vehicle using reporting and being encrypted using the management key of the target vehicle, obtains
Vehicle to encryption uses report;
The vehicle of the encryption is sent to described by the target vehicle by close range wireless communication modes using report
The vehicle of the encryption is sent to the server using report by the terminal by terminal;
The vehicle of encryption described in vehicle management key pair of the server using the target vehicle uses report information
It is decrypted, uses report to obtain the vehicle.
Optionally, the target vehicle is sent the vehicle of the encryption using report by close range wireless communication modes
When to the terminal, the target vehicle be in can not with the state of the server communication, the terminal be in can or
It can not be with the state of the server communication.
According to the second aspect of the invention, the present invention also provides a kind of control systems of vehicle, including server, target
Vehicle and terminal;Wherein,
The server is used for, and generates the authorization message to target vehicle, the authorization message of the target vehicle includes institute
The identity information and the first authority information of target vehicle are stated, first authority information is to use the target by the server
The second authority information of management key pair of vehicle, which encrypts, to be obtained, and second authority information is used for designated vehicle control authority;
The server is also used to, and the authorization message of the target vehicle is sent to terminal, by the terminal according to institute
First authority information is transmitted to the target carriage by close range wireless communication modes by the identity information for stating target vehicle
?;
The target vehicle is also used to, and the first authority information described in the management key pair using the target vehicle is solved
It is close, to obtain second authority information.
To enable the above objects, features, and advantages of the disclosure to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described.It should be appreciated that the following drawings illustrates only certain embodiments of the present invention, therefore it is not construed as pair
The restriction of range.It for those of ordinary skill in the art, without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows the embodiment of the present disclosure and provides a kind of structural schematic diagram of shared Vehicular system;
Fig. 2 shows a kind of flow diagrams for control method for vehicle that the embodiment of the present disclosure provides;
Fig. 3 shows the flow diagram of another control method for vehicle of embodiment of the present disclosure offer.
Specific embodiment
The various exemplary embodiments of the disclosure are described in detail now with reference to attached drawing.It should also be noted that unless in addition having
Body explanation, the unlimited system of component and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
Scope of disclosure.
Be to the description only actually of at least one exemplary embodiment below it is illustrative, never as to the disclosure
And its application or any restrictions used.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without
It is as limitation.Therefore, other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
<shared Vehicular system>
Fig. 1 is the block diagram that can be used for realizing the hardware configuration of shared vehicle system 100 of the disclosure.
As shown in Figure 1, shared vehicle system 100 includes server 1000, terminal 2000 and vehicle 3000.
1000 offer processing of server, database, communications service service point.Server 1000 can be monoblock type service
Device or decentralized service device across multicomputer or computer data center.Server can be it is various types of, such as but
It is not limited to, network server, NEWS SERVER, mail server, message server, Advertisement Server, file server, applies
Server, interactive server, database server or proxy server.In some embodiments, each server may include
Hardware, software, or the embedded logic module of proper function supporting or realize for execute server or it is two or more this
The combination of class component.For example, server such as blade server, cloud server etc., or can be by multiple servers group
At server farm, may include one of server of the above-mentioned type or a variety of etc..
In one embodiment, server 1000 can be as shown in Figure 1, include processor 1100, memory 1200, interface
Device 1300, communication device 1400, display device 1500, input unit 1600.
In a further embodiment, server 1000 can also be including loudspeaker, microphone etc., it is not limited here.
Processor 1100 can be dedicated processor-server, be also possible to meet the desktop computer processing of performance requirement
Device, mobile edition processor etc., it is not limited here.Memory 1200 is for example including ROM (read-only memory), RAM (arbitrary access
Memory), the nonvolatile memory of hard disk etc..Interface arrangement 1300 is for example including various bus interface, such as serially
Bus interface (including USB interface), parallel bus interface etc..Communication device 1400 is for example able to carry out wired or wireless communication.
Display device 1500 is, for example, liquid crystal display, LED display touch display screen etc..Input unit 1600 for example may include touching
Touch screen, keyboard etc..
Although multiple devices of server 1000 are shown in FIG. 1, the present invention can only relate to part therein
Device, for example, server 1000 pertains only to memory 1200 and processor 1100.
In the present embodiment, terminal 2000 is, for example, mobile phone, portable computer, tablet computer, palm PC, wearable device
Deng.
As shown in Figure 1, terminal 2000 may include processor 2100, memory 2200, interface arrangement 2300, communication device
2400, display device 2500, input unit 2600, loudspeaker 2700, microphone 2800 etc..
Processor 2100 can be mobile edition processor.Memory 2200 for example including ROM (read-only memory), RAM (with
Machine accesses memory), the nonvolatile memory of hard disk etc..Interface arrangement 2300 is for example including USB interface, earphone interface
Deng.Communication device 2400 is for example able to carry out wired or wireless communication, and communication device 2400 may include short-range communication device,
E.g. based on Hilink agreement, WiFi (802.11 agreement of IEEE), Mesh, bluetooth, ZigBee, Thread, Z-Wave,
The short-range wireless communication protocols such as NFC, UWB, LiFi carry out any device of short-distance wireless communication, and communication device 2400 can also
To include remote communication devices, any device of WLAN, GPRS, 2G/3G/4G/5G telecommunication is e.g. carried out.Display device
2500 be, for example, liquid crystal display, touch display screen etc..Input unit 2600 is such as may include touch screen, keyboard.User
2800 inputting/outputting voice information of loudspeaker 2700 and microphone can be passed through.
Although multiple devices of terminal 2000 are shown in FIG. 1, the present invention can only relate to part dress therein
It sets, for example, terminal 2000 pertains only to memory 2200 and processor 2100, communication device 2400 and display device 2500.
Vehicle 3000 is any right to use that can sell with timesharing or with dividing for the shared vehicle used of different user, for example,
For shared shared bicycle, shared vehicle using motor, shared electric vehicle, shared vehicle etc..Vehicle 3000 can be shown in Fig. 1
Bicycle, can also be the various forms such as tricycle, Moped Scooter, motorcycle and fourth wheel passenger car certainly.
As shown in Figure 1, can be equipped with vehicle management device on the vehicle body of vehicle 3000, vehicle management device is for example including place
Manage device 3100, memory 3200, interface arrangement 3300, communication device 3400, display device 3500, input unit 3600, loudspeaking
Device 3700, microphone 3800, battery, etc..Wherein, battery is other components or the device power supply of vehicle management device.Place
Reason device 3100 can be Micro-processor MCV etc..Memory 3200 for example including ROM (read-only memory), RAM (deposit by arbitrary access
Reservoir), the nonvolatile memory of hard disk etc..Interface arrangement 3300 is for example including USB interface, earphone interface etc..Communication
Device 3400 is for example able to carry out wired or wireless communication, in another example being able to carry out short distance and telecommunication.Output device
3500 for example can be the device of output signal, can be display device, such as liquid crystal display, touch display screen etc., can also
To be output voice messaging such as loudspeaker etc..Input unit 3600 is also possible to Mike such as may include touch screen, keyboard
Wind input voice information.
Although multiple devices of vehicle 3000 are shown in FIG. 1, the present invention can only relate to part dress therein
It sets, for example, vehicle 3000 pertains only to communication device 3400, memory 3200 and processor 3100.Alternatively, can also include Fig. 1
In the unshowned latch mechanism for being controlled by processor 3100 and the sensor device etc. for detecting latch mechanism state.
Network 4000 can be cordless communication network and be also possible to wireline communication network, can be local area network and is also possible to extensively
Domain net can be short-range communication and be also possible to telecommunication.In shared Vehicular system 100 shown in Fig. 1, vehicle 3000
With server 1000, terminal 2000 and server 1000, can be communicated by network 4000.In addition, vehicle 3000 and clothes
Business device 1000, terminal 2000 communicate the network 4000 being based on server 1000 and can be same, are also possible to different.
It should be understood that not meant that although Fig. 1 only shows a server 1000, terminal 2000, vehicle 3000
Respective quantity is limited, may include multiple servers 1000, multiple terminals 2000, multiple vehicles in shared Vehicular system 100
3000。
In the foregoing description, technical staff can the instruction of the conceptual design according to provided by the disclosure.How instruction controls
Processor is operated, this is it is known in the art that therefore being not described in detail herein.
<general plotting>
The general plotting of the present embodiment is to provide a kind of new control method for vehicle:
Server generates the authorization message of target vehicle, and the authorization message of target vehicle includes the identity information of target vehicle
With the first authority information, the first authority information is to be encrypted by server using the second authority information of management key pair of target vehicle
It obtains, the second authority information is used for designated vehicle control authority.
The authorization message of target vehicle is sent to terminal by server, is passed through by terminal according to the identity information of target vehicle
First authority information is sent to target vehicle by close range wireless communication modes.
Target vehicle is decrypted using the first authority information of management key pair of target vehicle, to obtain the second permission letter
Breath.
The vehicle body of target vehicle is equipped with vehicle management device, and vehicle management device is battery powered, when battery capacity mistake
When low, the long range wireless communication function of vehicle management device be can not work normally, and the near radio of vehicle management device is logical
Module is believed it is possible to normal use, for example, vehicle management device is equipped with low-power consumption bluetooth module, low-power consumption bluetooth module still has
It is likely to be at normal operating conditions.
Alternatively, target vehicle is parked in null zones, target vehicle can not be with server communication, the low coverage of target vehicle
It is normal from radio function.
Therefore, terminal can terminal be in have signal area when and server carry out long range wireless communication, in advance
The authorization message of target vehicle is obtained from server.Then it near target vehicle, will be awarded based on close range wireless communication modes
Power information is transmitted to target vehicle.Target vehicle is by pre-stored vehicle management key, to the authorization message of target vehicle
It is decrypted to obtain the second authority information, so that user still can control vehicle.
In addition, vehicle control permission be by server using the management key of target vehicle encrypted, only server
Know the management key of target vehicle with target vehicle, and terminal and the management key for being unaware of target vehicle.Terminal is in this Shen
Play forwarding in the control method for vehicle that please be provide, the first authority information of target vehicle is transmitted to target vehicle, mesh
When mark vehicle gets the first authority information, according to the management key of the target vehicle of itself storage, to the first authority information solution
Close acquisition vehicle control authority information.Since terminal does not know the management key of target vehicle always, this guarantees entire controls
The safety of process processed.
<embodiment>
The control method for vehicle that the embodiment of the present disclosure provides, as shown in Figure 1, including the following steps S101-S103:
S101, server generate the authorization message of target vehicle, and the authorization message of target vehicle includes the body of target vehicle
Part information and the first authority information, the first authority information are to be believed by server using the second permission of management key pair of target vehicle
Encryption for information obtains, and the second authority information is used for designated vehicle control authority.
Specifically, terminal to server sends application vehicle and asks when server is connect with terminal device remote-wireless
It asks.Wherein, in the request of above-mentioned application vehicle for example, the location information and terminal iidentification of terminal.It can certainly wrap
Other information is included, such as the information of usable type of vehicle to be used is thought in this request.
Server is in the application vehicle request for receiving terminal transmission, the position of reading terminals from application vehicle request
Information and terminal iidentification, and target vehicle is chosen for terminal based on this.Optionally, server is according to the location information of terminal,
The vehicle of selected distance terminal minimum distance is as target vehicle.Optionally, in order to meet the individual demand of user, server
Also it can recommend multiple vehicles to the application vehicle request sent based on terminal for user, target vehicle is specified by user.
For server after choosing to target vehicle, identity information and the second authority information based on target vehicle generate target
The authorization message of vehicle.Wherein, the identity information of above-mentioned target vehicle can be MAC Address, ID or the sequence of target vehicle
Row number etc..Optionally, the specified vehicle control permission of the second above-mentioned authority information includes unlocking control authority.It is further optional
, the specified vehicle control permission of the second above-mentioned authority information includes lock control authority, vehicle window control authority, car light control
Any of permission, whistle control authority or any combination.In addition, the vehicle control permission that the second authority information is specified
It can also be the vehicle control permission of terminal request.
The authorization message of target vehicle is sent to terminal by S102, server, is believed by terminal according to the identity of target vehicle
First authority information is sent to target vehicle by close range wireless communication modes by breath.
It should be noted that the terminal in above-mentioned S102 passes through wireless near field communication according to the identity information of target vehicle
When first authority information is sent to target vehicle by mode, target vehicle be in can not with the state of server communication, at terminal
In can or can not be with the state of server communication.
Specifically, when server is connect with terminal device remote-wireless, server is by the authorization message of target vehicle
It is sent to terminal.Terminal reads the identity information of the target vehicle in target vehicle authorization message.When terminal is in target vehicle
When neighbouring, terminal identifies target vehicle based on the identity information of target vehicle, and passes through closely with the target vehicle identified
Communication establishes connection, and the first authority information is sent to target vehicle.It can not and be serviced at this point, target vehicle is in
The state of device communication, terminal processes can or can not be with the state of the server communication.
Wherein, terminal and the target vehicle identified establish connection by close range wireless communication modes, by the first permission
Information is sent to target vehicle.It such as can be with are as follows: the bluetooth module of terminal searches identical MAC according to the MAC Address of target vehicle
The bluetooth module of address, and pairing connection is carried out therewith.After terminal and target vehicle establish connection, terminal is by target vehicle
The first authority information in authorization message is sent to target vehicle.
Optionally, above-mentioned close range wireless communication modes can be bluetooth, WIFI, NFC.
It should be noted that due to the first authority information by server using target vehicle management key encrypt, and
Only server and target vehicle the management code key of holding target vehicle, therefore, terminal can not read in the first authority information and wrap
The second authority information for designated vehicle control authority included can avoid the control that user's malice distorts target vehicle in this way
Limit.Meanwhile even if terminal is sent to the first authority information of target vehicle by malicious intercepted, the control authority of target vehicle is not yet
It will be leaked.
S103, target vehicle are decrypted using the first authority information of management key pair of target vehicle, to obtain second
Authority information.
Specifically, due in vehicle be previously stored with the management code key of target vehicle, when target vehicle receives the
After one authorization message, target vehicle can be decrypted according to the first authority information of management key pair of target vehicle, to obtain
Second authority information.
In the control method for vehicle that the disclosure provides, terminal and server is when that can carry out long range wireless communication, in advance
First obtain the authorization message of target vehicle.If it is remote that the low battery of target vehicle can not support that target vehicle and server carry out
Distance wireless communication, when user's carried terminal reaches near target vehicle, target vehicle is in can not be with the shape of server communication
State.Alternatively, target vehicle is parked in null zones, and near user's carried terminal arrival target vehicle, terminal and target carriage
It all can not be with server communication.At this point, terminal is by the authorization message of the target vehicle obtained in advance with wireless near field communication
Mode pass on to target vehicle.Target vehicle carries out the authorization message of target vehicle by pre-stored management key
Decryption is to obtain the second authority information, so that vehicle still can be used in user.
In addition, vehicle control permission be by server using the management key of target vehicle encrypted, only server
Know the management key of target vehicle with target vehicle, and terminal and the management key for being unaware of target vehicle.Terminal is in this Shen
Play forwarding in the control method for vehicle that please be provide, the first authority information of target vehicle is transmitted to target vehicle, mesh
When mark vehicle gets the first authority information, according to the management key of the target vehicle of itself storage, to the first authority information solution
Close acquisition vehicle control authority information.Since terminal does not know the management key of target vehicle always, this guarantees entire controls
The safety of process processed.
In the first optional embodiment, when the vehicle control permission that the second authority information is specified only includes a control
Permission, such as when unlocking control authority, after target vehicle, which executes above-mentioned S103, obtains the second authority information, target vehicle can be straight
It connects manipulation target vehicle and executes unlocking action.Based on this it is found that utilizing this implementation in shared vehicle parking at null zones
The control method for vehicle that example provides, when the null zones of vehicle parking or the low battery of vehicle can not support target
When vehicle and server carry out remote-wireless connection, terminal device can still unlock to target vehicle.
It, can be by user's control target vehicle in order to meet the individual demand of user in second of optional embodiment
Whether vehicle control permission is executed.Based on this, based on any of the above embodiments, the control method for vehicle that the disclosure provides
Further include following S104-S107:
After S104, target vehicle obtain the second authority information, the second authority information is sent to terminal.
It should be noted that target vehicle is still logical based near radio when sending the second authority information to terminal
The mode of letter is sent.
S105, terminal provide on the interface of terminal and believe with the second permission after target vehicle the second authority information of reception
The specified one-to-one button of vehicle control permission of breath.
The operation that S106, terminal trigger button according to user sends the corresponding vehicle of button being triggered to target vehicle
Control command.
After S107, target vehicle receive vehicle control order, manipulation target vehicle executes corresponding with vehicle control order
Movement.
Illustratively, when the user clicks blow a whistle control button when, terminal to target vehicle send whistle order.Target vehicle
When receiving the order, whistle operation is executed.It should be noted that when the user clicks blow a whistle control button when, target vehicle ring
Flute can help user to find target vehicle faster.
In the third optional embodiment, it is based on above-mentioned second of embodiment, in order to further avoid illegal user couple
The control authority of target vehicle carries out malice and distorts, and target vehicle needs after the vehicle control order for receiving terminal transmission
The vehicle control order is verified whether in the control authority that the second authority information is specified.Based on this, above-mentioned S107 is specifically included
Following S1071 and S1072:
After S1071, target vehicle receive vehicle control order, determine whether vehicle control order refers in the second authority information
In fixed vehicle control permission.
If S1072, vehicle control order manipulate target vehicle in the vehicle control permission that the second authority information is specified
Execute act corresponding with vehicle control order.
Specifically, after receiving vehicle control order, the control command and the second authority information are specified for target vehicle
Vehicle control permission verified.If vehicle control order the second authority information specify vehicle control permission in,
It is proved to be successful.After being proved to be successful, target vehicle executes act corresponding with vehicle control order.
It is long in order to avoid user is after the vehicle control permission for obtaining target vehicle in the 4th kind of optional embodiment
Time does not send vehicle control order to target vehicle, occupied so as to cause target vehicle but unemployed happen.
Alternatively, the second authority information is blocked by illegal user's terminal in order to send the second authority information to user terminal in target vehicle
When cutting, the risk of illegal user's terminal control target vehicle is reduced.Second authority information is also used to designated vehicle control authority
Effective time.
Based on this, above-mentioned S107 specifically includes following S1073-S1075:
After S1073, target vehicle receive vehicle control order, determine whether vehicle control order refers in the second authority information
In fixed vehicle control permission.
If S1074, vehicle control order determine current time in the vehicle control permission that the second authority information is specified
Whether within the effective time of vehicle control permission corresponding with control command.
If S1075, current time within the effective time of vehicle control permission corresponding with control command, manipulate target
Vehicle executes act corresponding with vehicle control order.
Illustratively, it when the received vehicle control order of target vehicle is to unlock order, is obtained before target vehicle judgement
Whether the specified vehicle control permission of the second authority information got includes unlocking control authority, if not including, target vehicle is not
Unlocking action can be executed.If comprising further judging to determine whether current time controls in unlocking corresponding with order of unlocking
In the effective time of permission.
For example, target vehicle current time is 12:10, and is opened when target vehicle sends unlocking control authority to terminal
The effective time of lock control permission is 20 minutes.The unlocking order of terminal transmission is then received before 12:30 when target vehicle
When, target vehicle executes vehicle unlocking action.Time after 12:30, even if target vehicle receives opening for terminal transmission
Lock order, will not execute unlocking action.
In another example the effective time of unlocking control authority is when target vehicle sends unlocking control authority to terminal
On December 1st, 2018 12:10-12:30.The unlocking order of terminal transmission is then received in 12:10-12:30 when target vehicle
When, target vehicle executes vehicle unlocking action.When target vehicle receives the unlocking order of terminal transmission not in 12:10-12:30
It is interior, even if receiving the unlocking order of terminal transmission, unlocking action will not be executed.
It should be noted that different vehicle control permissions can correspond to different effective time.
Based on the above embodiment, it can avoid user after the vehicle control permission for obtaining target vehicle, for a long time not to mesh
Mark vehicle send vehicle control order, so as to cause target vehicle it is occupied but it is unemployed happen, can be improved in this way
The utilization rate of vehicle.In addition, even if the second authority information of target vehicle is intercepted by illegal user's terminal, illegal user's terminal
Target vehicle can only be controlled within the effective time of vehicle control permission, the safety of entire control process can be improved in this way
Property.
In the 5th kind of optional embodiment, in order to guarantee terminal and target vehicle information interaction safety,
Based on any of the above embodiments, the authorization message of target vehicle further includes the first session key and the second session key,
First session key is to be obtained by server using the second session key of management key pair encryption of target vehicle.Based on this, originally
The open control method for vehicle provided further includes following S108-S110:
First session key is transmitted to target vehicle by close range wireless communication modes by S108, terminal.
S109, target vehicle are decrypted using the first session key of management key pair of target vehicle, to obtain second
Session key.
During subsequent wireless near field communication, sender in the two uses for S110, terminal and target vehicle
Two session keys are encrypted to information is sent, and recipient is decrypted the information received using the second session key.
Illustratively, the second authority information is sent to terminal with target vehicle, terminal sends vehicle control to target vehicle
For order, illustrate above-mentioned S108-S110:
When terminal obtains the authorization message of target vehicle from server, can be read directly from authorization message to not added
The identity information of close target vehicle and the second session code key.
Terminal passes through close range wireless communication modes according to the identity information of target vehicle, by the first session key and first
Authority information is directly forwarded to target vehicle together.
Target vehicle receives the first session key and the first authority information, the vehicle management key solution stored using itself
It is close that it is decrypted, obtain the second session key and the second authority information.
During subsequent wireless near field communication, the sender in the two is using the second session key to transmission information
It is encrypted, recipient is decrypted the information received using the second session key.For example, target vehicle is as transmission
Side is encrypted when sending the second authority information to terminal using second the second authority information of session secret key pair.Later, target carriage
Encrypted second authority information is sent to terminal.Terminal is as recipient, in the second authority information for receiving encryption
Afterwards, it is decrypted using the second session code key to obtain the second authority information.
Illustratively, as shown in figure 3, in conjunction with above-mentioned 5th kind of optional embodiment, above-mentioned embodiment illustrated in fig. 1 and
Two kinds of optional embodiments, illustrate the control method for vehicle of the offer of the disclosure.It is specific:
In terminal and server long range wireless communication, terminal to server application vehicle request, server is being received
When the application vehicle sent to terminal is requested, the authorization message of target vehicle is generated, and the authorization message of target vehicle is sent
To terminal.
Terminal and vehicle with server can not long range wireless communication or vehicle and server can not remote nothing
When line leads to, terminal reads the second session code key, and will by close range wireless communication modes according to the identity information of target vehicle
First authority information and the first session code key are sent to target vehicle;Target vehicle uses the management key pair first of target vehicle
Authority information and the first session code key are decrypted, to obtain the second authority information and the second session code key;Target vehicle according to
Second the second authority information of session secret key pair is encrypted, and is sent to terminal;After terminal obtains the second authority information of encryption,
It is decrypted according to the second session code key, obtains the second authority information;After terminal obtains the second authority information, above mentioned at the interface of terminal
For the one-to-one button of vehicle control permission specified with the second authority information;Terminal receives user to the trigger action of button
Vehicle control order is generated, and using the vehicle control order of the second session code key encryption, is finally ordered the vehicle control of encryption
Order is sent to target vehicle;Target vehicle receive encryption vehicle control order after, using the second session code key be decrypted with
Vehicle control order is obtained, so that manipulating target vehicle executes act corresponding with vehicle control order.
In the 6th kind of optional embodiment, for usual target vehicle after use, server needs to obtain vehicle
Using report, so that the service condition to vehicle is monitored, such as knot expense operation is carried out according to the use of vehicle report.For
The control method for vehicle that any of the above-described embodiment provides, the disclosure realize that server obtains vehicle by following S111-S113
Use report:
S111, target vehicle generate vehicle using reporting and being encrypted using the management key of target vehicle, obtain
The vehicle of encryption uses report.
For example, target vehicle, which when detecting that lock tongue is closed, generates vehicle, uses report.Wherein, vehicle uses in report
It may include lock tongue opening time, lock tongue shut-in time, route or travel by vehicle etc..
The vehicle of encryption is sent to terminal using report by close range wireless communication modes by S112, target vehicle, by
The vehicle of encryption is sent to server using report by terminal.
It should be noted that the vehicle of encryption is sent to by target vehicle by close range wireless communication modes using report
When the terminal, target vehicle is in can not be with the state of server communication, and terminal is in can or can not be with the service
The state of device communication.
S113, server are solved using the vehicle of the vehicle management key pair encryption of target vehicle using report information
It is close, report is used to obtain vehicle.
It should be noted that target vehicle is encrypted according to the management key pair vehicle of target vehicle using report, this
Sample can avoid terminal and be distorted to vehicle using report when receiving vehicle using report.In addition, user has used target
When vehicle, target vehicle is parked in null zones again, i.e., target vehicle, terminal can not and server communication, or
The low battery of person's target vehicle can not support target vehicle and server long range wireless communication, i.e. target vehicle can not kimonos
Business device communication, and terminal can be with server communication, by way of the above-mentioned use report by terminal transfer vehicle, server is still
It is available to terminate this use process to using report, so that the vehicle control that next user can still provide according to the disclosure
Method realizes the control to the vehicle.
Certainly, when target vehicle has been parked in signal area, target vehicle can also carry out remote nothing with server
Line communication, the vehicle directly generated are sent to server using report.Server can quickly know target vehicle in this way
Vehicle using report.
In the 7th kind of optional embodiment, terminal and target vehicle are established after wireless near field communication connect, in terminal
In the communication process of target vehicle, following operation is executed:
Target vehicle generates random sequence m, and when target vehicle sends first time information to terminal, together will be random
Sequence m is sent to terminal, and random sequence m is, for example, a random number.
In subsequent process, sequence p is attached to and sends in information when sending information to target vehicle every time by terminal;Its
In, the initial value of sequence P=random sequence m+n, n are 1, and n adds 1 automatically after the every transmission primary information to target vehicle of terminal.
For example, in subsequent process, it is when terminal sends information to target vehicle for the first time, sequence P=random sequence m+1 is attached
It is added to and sends in information, when terminal sends information to target vehicle for the second time, sequence P=random sequence m+2 is attached to transmission
In information, when terminal third time sends information to target vehicle, sequence P=random sequence m+3 is attached to and is sent in information, with
This analogizes.
Target vehicle receive terminal transmission information when, can according to the sequence P received, itself storage it is random
Sequence m judges the legitimacy of the information, prevents illegality equipment from pretending to be terminal.Such as:
The sequence P=1 of the information once received before the sequence P- of this information received,
Sequence P- message number=m of this information received.
<control system of vehicle>
The vehicle control system that the embodiment of the present disclosure provides, including server, target vehicle and terminal;Wherein,
Server is used for, and generates the authorization message to target vehicle, the authorization message of target vehicle includes target vehicle
Identity information and the first authority information, the first authority information are the second permissions of management key pair that target vehicle is used by server
Information encryption obtains, and the second authority information is used for designated vehicle control authority.
Server is also used to, and the authorization message of target vehicle is sent to terminal, by terminal according to the identity of target vehicle
First authority information is transmitted to target vehicle by close range wireless communication modes by information.
Target vehicle is also used to, and is decrypted using the first authority information of management key pair of target vehicle, to obtain
Two authority informations.
It should be noted that the embodiment of the present disclosure provide vehicle control system structure chart can refer to it is as shown in Figure 1
The block diagram of the hardware configuration of shared vehicle system 100.
The present invention can be system, method and/or computer program product.Computer program product may include computer
Readable storage medium storing program for executing, containing for making processor realize the computer-readable program instructions of various aspects of the invention.
Computer readable storage medium, which can be, can keep and store the tangible of the instruction used by instruction execution equipment
Equipment.Computer readable storage medium for example can be-- but it is not limited to-- storage device electric, magnetic storage apparatus, optical storage
Equipment, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.Computer readable storage medium
More specific example (non exhaustive list) includes: portable computer diskette, hard disk, random access memory (RAM), read-only deposits
It is reservoir (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), portable
Compact disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding equipment, for example thereon
It is stored with punch card or groove internal projection structure and the above-mentioned any appropriate combination of instruction.Calculating used herein above
Machine readable storage medium storing program for executing is not interpreted that instantaneous signal itself, the electromagnetic wave of such as radio wave or other Free propagations lead to
It crosses the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) of waveguide or the propagation of other transmission mediums or is transmitted by electric wire
Electric signal.
Computer-readable program instructions as described herein can be downloaded to from computer readable storage medium it is each calculate/
Processing equipment, or outer computer or outer is downloaded to by network, such as internet, local area network, wide area network and/or wireless network
Portion stores equipment.Network may include copper transmission cable, optical fiber transmission, wireless transmission, router, firewall, interchanger, gateway
Computer and/or Edge Server.Adapter or network interface in each calculating/processing equipment are received from network to be counted
Calculation machine readable program instructions, and the computer-readable program instructions are forwarded, for the meter being stored in each calculating/processing equipment
In calculation machine readable storage medium storing program for executing.
Computer program instructions for executing operation of the present invention can be assembly instruction, instruction set architecture (ISA) instructs,
Machine instruction, machine-dependent instructions, microcode, firmware instructions, condition setup data or with one or more programming languages
The source code or object code that any combination is write, programming language include object-oriented programming language-such as Smalltalk,
C++ etc., and conventional procedural programming languages-such as " C " language or similar programming language.Computer-readable program refers to
Order can be executed fully on the user computer, partly be executed on the user computer, as an independent software package
Execute, part on the user computer part on the remote computer execute or completely on a remote computer or server
It executes.In situations involving remote computers, remote computer can include local area network by the network-of any kind
(LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize internet
Service provider is connected by internet).In some embodiments, by being believed using the state of computer-readable program instructions
Breath comes personalized customization electronic circuit, such as programmable logic circuit, field programmable gate array (FPGA) or programmable logic
Array (PLA), which can execute computer-readable program instructions, to realize various aspects of the invention.
Referring herein to according to the method for the embodiment of the present invention, the flow chart of device (system) and computer program product and/
Or block diagram describes various aspects of the invention.It should be appreciated that flowchart and or block diagram each box and flow chart and/
Or in block diagram each box combination, can be realized by computer-readable program instructions.
These computer-readable program instructions can be supplied to general purpose computer, special purpose computer or other programmable datas
The processor of processing unit, so that a kind of machine is produced, so that these instructions are passing through computer or other programmable datas
When the processor of processing unit executes, function specified in one or more boxes in implementation flow chart and/or block diagram is produced
The device of energy/movement.These computer-readable program instructions can also be stored in a computer-readable storage medium, these refer to
It enables so that computer, programmable data processing unit and/or other equipment work in a specific way, thus, it is stored with instruction
Computer-readable medium then includes a manufacture comprising in one or more boxes in implementation flow chart and/or block diagram
The instruction of the various aspects of defined function action.
Computer-readable program instructions can also be loaded into computer, other programmable data processing units or other
In equipment, so that series of operation steps are executed in computer, other programmable data processing units or other equipment, to produce
Raw computer implemented process, so that executed in computer, other programmable data processing units or other equipment
Instruct function action specified in one or more boxes in implementation flow chart and/or block diagram.
The flow chart and block diagram in the drawings show the system of multiple embodiments according to the present invention, method and computer journeys
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
One module of table, program segment or a part of instruction, module, program segment or a part of instruction include one or more for real
The executable instruction of logic function as defined in existing.In some implementations as replacements, function marked in the box can also be with
Occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be basically executed in parallel, it
Can also execute in the opposite order sometimes, this depends on the function involved.It is also noted that block diagram and/or process
The combination of each box in figure and the box in block diagram and or flow chart, can as defined in executing function or movement
Dedicated hardware based system is realized, or can be realized using a combination of dedicated hardware and computer instructions.For this
It is well known that, realized by hardware mode for the technical staff of field, software and hardware is realized and passed through by software mode
In conjunction with mode realize it is all of equal value.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and
It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill
Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport
In principle, the practical application or to the technological improvement in market for best explaining each embodiment, or make the art its
Its those of ordinary skill can understand each embodiment disclosed herein.The scope of the present invention is defined by the appended claims.
Claims (11)
1. a kind of control method of vehicle, comprising:
Server generates the authorization message of target vehicle, and the authorization message of the target vehicle includes the identity of the target vehicle
Information and the first authority information, first authority information are the management key pairs that the target vehicle is used by the server
The encryption of second authority information obtains, and second authority information is used for designated vehicle control authority;
The authorization message of the target vehicle is sent to terminal by the server, by the terminal according to the target vehicle
First authority information is sent to the target vehicle by close range wireless communication modes by identity information;
First authority information described in management key pair of the target vehicle using the target vehicle is decrypted, to obtain
State the second authority information.
2. according to the method described in claim 1, the terminal passes through short distance nothing according to the identity information of the target vehicle
When first authority information is sent to the target vehicle by line communication mode, the target vehicle is in can not be with the clothes
The state of business device communication, the terminal is in can or can not be with the state of the server communication.
3. method according to claim 1 or 2, the specified vehicle control permission of second authority information includes control of unlocking
Permission processed;
After the target vehicle obtains second authority information, manipulates the target vehicle and execute unlocking action.
4. method according to claim 1 or 2, the specified vehicle control permission of second authority information, including it is following
Any or combination:
Lock control authority, vehicle window control authority, car light control authority, whistle control authority.
5. method according to claim 1-4, after the target vehicle obtains second authority information, to institute
It states terminal and sends second authority information;
After the terminal receives second authority information from the target vehicle, provided on the interface of the terminal with it is described
The specified one-to-one button of vehicle control permission of second authority information;
For the terminal according to user to the trigger action of the button, Xiang Suoshu target vehicle sends the button pair being triggered
The vehicle control order answered;
After the target vehicle receives the vehicle control order, manipulates the target vehicle and execute and the vehicle control order
Corresponding movement.
6. according to the method described in claim 5, manipulating the target after the target vehicle receives the vehicle control order
Vehicle executes act corresponding with the vehicle control order, comprising:
After the target vehicle receives the vehicle control order, determine the vehicle control order whether in second permission
In the specified vehicle control permission of information;
If the vehicle control order manipulates the target carriage in the vehicle control permission that second authority information is specified
It executes and corresponding with the vehicle control order to act.
7. according to the method described in claim 5, second authority information is also used to specify having for the vehicle control permission
Imitate the time;
After the target vehicle receives the vehicle control order, manipulates the target vehicle and execute and the vehicle control order
Corresponding movement, comprising:
After the target vehicle receives the vehicle control order, determine the vehicle control order whether in second permission
In the specified vehicle control permission of information;
If the vehicle control order determines that current time is in the vehicle control permission that second authority information is specified
It is no within the effective time of the vehicle control permission corresponding with the control command;
If current time manipulates the mesh within the effective time of the vehicle control permission corresponding with the control command
Mark vehicle executes act corresponding with the vehicle control order.
8. method according to claim 1-7, the authorization message of the target vehicle further includes that the first session is close
Key and the second session key, first session key are the management key pair institutes that the target vehicle is used by the server
The encryption of the second session key is stated to obtain;
The method also includes:
First session key is transmitted to the target vehicle by close range wireless communication modes by the terminal;
First session key described in management key pair of the target vehicle using the target vehicle is decrypted, to obtain
State the second session key;
The terminal and the target vehicle are during subsequent wireless near field communication, described in sender's use in the two
Second session key is encrypted to information is sent, and recipient solves the information received using second session key
It is close.
9. method according to claim 1-8, the method also includes:
The target vehicle generates vehicle using reporting and being encrypted using the management key of the target vehicle, is added
Close vehicle uses report;
The vehicle of the encryption is sent to the terminal using report by close range wireless communication modes by the target vehicle,
The vehicle of the encryption is sent to the server using report by the terminal;
The vehicle of encryption described in vehicle management key pair of the server using the target vehicle is carried out using report information
Decryption uses report to obtain the vehicle.
10. according to the method described in claim 9, the target vehicle passes through close range wireless communication modes for the encryption
When vehicle is sent to the terminal using report, the target vehicle be in can not with the state of the server communication, it is described
Terminal is in can or can not be with the state of the server communication.
11. a kind of control system of vehicle, including server, target vehicle and terminal;Wherein,
The server is used for, and generates the authorization message to target vehicle, the authorization message of the target vehicle includes the mesh
The identity information and the first authority information of vehicle are marked, first authority information is to use the target vehicle by the server
The second authority information of management key pair encrypt obtain, second authority information be used for designated vehicle control authority;
The server is also used to, and the authorization message of the target vehicle is sent to terminal, by the terminal according to the mesh
First authority information is transmitted to the target vehicle by close range wireless communication modes by the identity information of mark vehicle;
The target vehicle is also used to, and the first authority information described in the management key pair using the target vehicle is decrypted,
To obtain second authority information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811615317.0A CN109727354A (en) | 2018-12-27 | 2018-12-27 | A kind of control method and system of vehicle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811615317.0A CN109727354A (en) | 2018-12-27 | 2018-12-27 | A kind of control method and system of vehicle |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109727354A true CN109727354A (en) | 2019-05-07 |
Family
ID=66296503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811615317.0A Pending CN109727354A (en) | 2018-12-27 | 2018-12-27 | A kind of control method and system of vehicle |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109727354A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782564A (en) * | 2019-11-06 | 2020-02-11 | 北京牛电信息技术有限责任公司 | Unlocking method, device and system and storage medium |
CN110992538A (en) * | 2019-12-16 | 2020-04-10 | 上海钧正网络科技有限公司 | Vehicle voice unlocking method, device and medium |
CN111325917A (en) * | 2020-02-27 | 2020-06-23 | 上海钧正网络科技有限公司 | Using method and device of sharing equipment, storage medium and equipment |
CN112214779A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Control method and device, electronic equipment and storage medium |
CN112214753A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Authentication method and device, electronic equipment and storage medium |
CN112215992A (en) * | 2020-10-14 | 2021-01-12 | 上海银基信息安全技术股份有限公司 | Digital key cleaning method and computer equipment |
CN112466014A (en) * | 2020-12-15 | 2021-03-09 | 歌尔光学科技有限公司 | Shared vehicle offline unlocking and authorization method, wearable device, terminal and system |
CN112822630A (en) * | 2021-01-12 | 2021-05-18 | 上海钧正网络科技有限公司 | Data processing method of device and computer-readable storage medium |
CN112905981A (en) * | 2019-12-04 | 2021-06-04 | 上海博泰悦臻电子设备制造有限公司 | Method, electronic device and computer-readable storage medium for information sharing |
CN113438264A (en) * | 2020-03-23 | 2021-09-24 | 未来穿戴技术有限公司 | Wearable massage instrument connection method and device, computer equipment and storage medium |
CN114070836A (en) * | 2021-11-12 | 2022-02-18 | 上汽通用五菱汽车股份有限公司 | Vehicle remote control method, system, device and computer readable storage medium |
CN115246372A (en) * | 2021-04-26 | 2022-10-28 | 上海博泰悦臻网络技术服务有限公司 | Vehicle information processing method and related device |
CN115567555A (en) * | 2022-09-07 | 2023-01-03 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104853050A (en) * | 2015-06-01 | 2015-08-19 | 北京润东方科技有限公司 | System and method for bicycle management |
CN105261091A (en) * | 2015-09-23 | 2016-01-20 | 奇瑞汽车股份有限公司 | Method and device used for vehicle one-key start |
CN205610679U (en) * | 2016-01-20 | 2016-09-28 | 安徽大学 | Car communication network equipment with signature and encryption function |
CN105976223A (en) * | 2016-04-29 | 2016-09-28 | 乐视控股(北京)有限公司 | Vehicle rental method and system, and server |
CN107650863A (en) * | 2017-09-19 | 2018-02-02 | 大陆汽车投资(上海)有限公司 | Vehicle sharing method and system |
CN108111998A (en) * | 2017-12-18 | 2018-06-01 | 北京博创联动科技有限公司 | A kind of wireless method for unlocking and system |
CN108154587A (en) * | 2017-12-28 | 2018-06-12 | 深圳市小快联科技有限公司 | A kind of method and system for switching bicycle lock |
CN108206996A (en) * | 2017-12-08 | 2018-06-26 | 中兴通讯股份有限公司 | Auth method and device |
US20180309760A1 (en) * | 2013-11-08 | 2018-10-25 | At&T Mobility Ii Llc | Mobile device enabled tiered data exchange via a vehicle |
CN208092725U (en) * | 2017-12-15 | 2018-11-13 | 蔚来汽车有限公司 | Vehicle authentication management system |
WO2018208062A1 (en) * | 2017-05-08 | 2018-11-15 | 엘지전자(주) | Method for securing connection identifier of user equipment in wireless communication system and apparatus therefor |
CN109003361A (en) * | 2018-07-02 | 2018-12-14 | 郑州云海信息技术有限公司 | A kind of control method and system of the shared bicycle switch lock based on cloud computing |
-
2018
- 2018-12-27 CN CN201811615317.0A patent/CN109727354A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180309760A1 (en) * | 2013-11-08 | 2018-10-25 | At&T Mobility Ii Llc | Mobile device enabled tiered data exchange via a vehicle |
CN104853050A (en) * | 2015-06-01 | 2015-08-19 | 北京润东方科技有限公司 | System and method for bicycle management |
CN105261091A (en) * | 2015-09-23 | 2016-01-20 | 奇瑞汽车股份有限公司 | Method and device used for vehicle one-key start |
CN205610679U (en) * | 2016-01-20 | 2016-09-28 | 安徽大学 | Car communication network equipment with signature and encryption function |
CN105976223A (en) * | 2016-04-29 | 2016-09-28 | 乐视控股(北京)有限公司 | Vehicle rental method and system, and server |
WO2018208062A1 (en) * | 2017-05-08 | 2018-11-15 | 엘지전자(주) | Method for securing connection identifier of user equipment in wireless communication system and apparatus therefor |
CN107650863A (en) * | 2017-09-19 | 2018-02-02 | 大陆汽车投资(上海)有限公司 | Vehicle sharing method and system |
CN108206996A (en) * | 2017-12-08 | 2018-06-26 | 中兴通讯股份有限公司 | Auth method and device |
CN208092725U (en) * | 2017-12-15 | 2018-11-13 | 蔚来汽车有限公司 | Vehicle authentication management system |
CN108111998A (en) * | 2017-12-18 | 2018-06-01 | 北京博创联动科技有限公司 | A kind of wireless method for unlocking and system |
CN108154587A (en) * | 2017-12-28 | 2018-06-12 | 深圳市小快联科技有限公司 | A kind of method and system for switching bicycle lock |
CN109003361A (en) * | 2018-07-02 | 2018-12-14 | 郑州云海信息技术有限公司 | A kind of control method and system of the shared bicycle switch lock based on cloud computing |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782564A (en) * | 2019-11-06 | 2020-02-11 | 北京牛电信息技术有限责任公司 | Unlocking method, device and system and storage medium |
CN112905981A (en) * | 2019-12-04 | 2021-06-04 | 上海博泰悦臻电子设备制造有限公司 | Method, electronic device and computer-readable storage medium for information sharing |
CN110992538B (en) * | 2019-12-16 | 2022-05-27 | 上海钧正网络科技有限公司 | Vehicle voice unlocking method, device and medium |
CN110992538A (en) * | 2019-12-16 | 2020-04-10 | 上海钧正网络科技有限公司 | Vehicle voice unlocking method, device and medium |
CN111325917A (en) * | 2020-02-27 | 2020-06-23 | 上海钧正网络科技有限公司 | Using method and device of sharing equipment, storage medium and equipment |
CN111325917B (en) * | 2020-02-27 | 2022-04-22 | 上海钧正网络科技有限公司 | Using method and device of sharing equipment, storage medium and equipment |
CN113438264A (en) * | 2020-03-23 | 2021-09-24 | 未来穿戴技术有限公司 | Wearable massage instrument connection method and device, computer equipment and storage medium |
CN112215992A (en) * | 2020-10-14 | 2021-01-12 | 上海银基信息安全技术股份有限公司 | Digital key cleaning method and computer equipment |
CN112214779A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Control method and device, electronic equipment and storage medium |
CN112214753A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Authentication method and device, electronic equipment and storage medium |
CN112466014A (en) * | 2020-12-15 | 2021-03-09 | 歌尔光学科技有限公司 | Shared vehicle offline unlocking and authorization method, wearable device, terminal and system |
CN112822630A (en) * | 2021-01-12 | 2021-05-18 | 上海钧正网络科技有限公司 | Data processing method of device and computer-readable storage medium |
CN112822630B (en) * | 2021-01-12 | 2022-12-23 | 上海钧正网络科技有限公司 | Data processing method of device and computer-readable storage medium |
CN115246372A (en) * | 2021-04-26 | 2022-10-28 | 上海博泰悦臻网络技术服务有限公司 | Vehicle information processing method and related device |
CN114070836A (en) * | 2021-11-12 | 2022-02-18 | 上汽通用五菱汽车股份有限公司 | Vehicle remote control method, system, device and computer readable storage medium |
CN115567555A (en) * | 2022-09-07 | 2023-01-03 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109727354A (en) | A kind of control method and system of vehicle | |
CN107683601B (en) | Relay services for the communication between controller and attachment | |
US11736277B2 (en) | Technologies for internet of things key management | |
US10499205B2 (en) | SMS proxying | |
CN106875518B (en) | Control method and device of intelligent lock and intelligent lock | |
US9917698B2 (en) | Management of certificates for mobile devices | |
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
CN109379369A (en) | Single-point logging method, device, server and storage medium | |
CN109302415A (en) | A kind of authentication method, block chain node and storage medium | |
US11658963B2 (en) | Cooperative communication validation | |
US10039002B2 (en) | Shared Wi-Fi usage | |
CN107483184B (en) | Battery management method, equipment, battery, article and system | |
CN106464687A (en) | Client applications communicating via a user tunnel | |
CN109313689A (en) | Measurement capacity exhaustion attacks | |
US11469957B2 (en) | System and method for managing and configuring attributes of internet of things (IoT) devices | |
WO2022155803A1 (en) | Data encryption method, data transmission method, related apparatuses and device | |
WO2018161862A1 (en) | Private key generation method, device and system | |
CN106161424A (en) | For determining method and the computer system of the reliability rating between communication equipment | |
CN109448157A (en) | Electric vehicle failure determination method, system, server and storage medium | |
CN108965033A (en) | A kind of Environment Monitoring System | |
CN1971578A (en) | Secure license key method and system | |
EP3282639B1 (en) | Method for operating server and client, server, and client apparatus | |
EP2387262B1 (en) | System and method for multi-certificate and certificate authority strategy | |
CN112751803B (en) | Method, apparatus, and computer-readable storage medium for managing objects | |
Gill et al. | Secure remote access to home automation networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201216 Address after: Room 168, building 6, 741 Hangzhou Road, Yangpu District, Shanghai 200090 Applicant after: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd. Address before: Room Bnan 1231, 2 bungalows, No. 5 Road, College, Haidian District, Beijing, 100191 Applicant before: BEIJING MOBIKE TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190507 |