CN110189452A - Access processing method, device, system and the vehicle of car key - Google Patents

Access processing method, device, system and the vehicle of car key Download PDF

Info

Publication number
CN110189452A
CN110189452A CN201910491995.9A CN201910491995A CN110189452A CN 110189452 A CN110189452 A CN 110189452A CN 201910491995 A CN201910491995 A CN 201910491995A CN 110189452 A CN110189452 A CN 110189452A
Authority
CN
China
Prior art keywords
car
mounted terminal
security parameter
server
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910491995.9A
Other languages
Chinese (zh)
Other versions
CN110189452B (en
Inventor
朱朝卓
周慧能
洪基明
谭绍龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201910491995.9A priority Critical patent/CN110189452B/en
Publication of CN110189452A publication Critical patent/CN110189452A/en
Application granted granted Critical
Publication of CN110189452B publication Critical patent/CN110189452B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application provides a kind of access processing method of car key, device, system and vehicle, the method is related to user terminal, car-mounted terminal, and, server, which comprises car-mounted terminal receives the connection request that user terminal is initiated;Car-mounted terminal generates verification result for connection request;Car-mounted terminal calculates the first security parameter according to verification result;Verification result is sent to server by car-mounted terminal;Car-mounted terminal receives the second security parameter of server feedback, and the second security parameter is that server is obtained according to verification result calculating;Car-mounted terminal the first security parameter of foundation, and/or, the second security parameter judges whether user terminal meets default access and require;If it is not, then car-mounted terminal refuses connection request, the calculating of security parameter is carried out respectively by using server and car-mounted terminal, and according to first security parameter, and/or, second security parameter carries out access judgement, improves protective capacities, reduces by the probability of Brute Force.

Description

Access processing method, device, system and the vehicle of car key
Technical field
This application involves car networking fields, more particularly to the access processing method of car key, device, system and vehicle.
Background technique
Car key develops with technology, and bearing medium appearance form has a diversity, including wrist-watch, mobile phone, ring, with And card etc..
Currently, the verification mode of car key is generally the authentication secret by server issues, such as: identifying code, dynamic are close Identification information of code or user terminal etc. is used as verification information, the verification information and service that vehicle is sent by comparing user terminal Whether the verification information that device is sent unanimously is verified car key.
But when encountering Brute Force the case where, vehicle is less for the countermeasure of Brute Force, generally only for Freezing or drawing black for account, can not carry out effectively for processing the equipment for the side of cracking, and existing processing mode is only led to The middle control end for crossing vehicle is protected, and lacks secondary protection, protective capacities is low;When there is the case where network fluctuation, vehicle holds Easily occur causing verification to fail because the verification information of server can not be obtained, influences the usage experience of user.
Summary of the invention
In view of described problem, the application is proposed in order to provide overcoming described problem or at least being partially solved described ask Access processing method, device, system and the vehicle of the car key of topic, comprising:
A kind of access processing method of car key, the method are related to user terminal, car-mounted terminal, and, server, institute The method of stating includes:
The car-mounted terminal receives the connection request that the user terminal is initiated;
The car-mounted terminal generates verification result for the connection request;
The car-mounted terminal calculates the first security parameter according to the verification result;
The verification result is sent to the server by the car-mounted terminal;
The car-mounted terminal receives the second security parameter of the server feedback, and second security parameter is the clothes Device be engaged according to verification result calculating acquisition;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user Whether terminal, which meets default access, requires;
If it is not, then the car-mounted terminal refuses the connection request.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement Whether the user terminal, which meets the step of default access requires, includes:
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
Further, the car-mounted terminal includes: according to the step of verification result the first security parameter of calculating
When the verification result is verification failure, the car-mounted terminal extracts the identification information of the user terminal;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement Whether the user terminal, which meets the step of default access requires, includes:
When the car-mounted terminal and the server are in notconnect state, the car-mounted terminal judges first peace Whether population parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement Whether the user terminal, which meets the step of default access requires, includes:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges second safety Whether parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement Whether the user terminal, which meets the step of default access requires, includes:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges first safety Whether parameter is less than or equal to the first preset threshold, and, it is pre- to judge whether second security parameter is less than or equal to second If threshold value;
If so, determining that the user terminal meets default access and requires;
If it is not, then determining that the user terminal does not meet default access and requires.
Further, when the car-mounted terminal receives the second safety ginseng that the server is sent within a preset time Number then determines that the car-mounted terminal and the server are in connection status, otherwise, it is determined that the car-mounted terminal and the service Device is in notconnect state.
A kind of access processing method of car key, the method are related to user terminal, car-mounted terminal, and, server, institute The method of stating includes:
The server receives the verification result that the car-mounted terminal is sent;The verification result is directed to institute for car-mounted terminal The connection request for stating user terminal initiation generates;
The server calculates the second security parameter according to the verification result;
Second security parameter is sent to the car-mounted terminal by the server;The car-mounted terminal is also used to foundation First security parameter, and/or, second security parameter judges whether the user terminal meets default access and require, And do not meet it is described access require when, refuse the connection request;Wherein, first security parameter is described vehicle-mounted Terminal is calculated according to the verification result and is obtained.
Further, the server includes: according to the step of verification result the second security parameter of calculating
When the verification result is verification failure, the server obtains the user terminal from the car-mounted terminal Identification information;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server.
Further, the method also includes,
Whether the server is commonly used equipment according to user terminal described in the identification information judgment;
If it is not, then the server joins the default weight acquisition of second reference number of times configuration third second safety Number.
Further, the method also includes:
When the user terminal is judged as non-commonly used equipment, the server obtains the key that the car-mounted terminal is sent Spoon information;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
The server generates first and notifies that being sent to the last successful history of key information verification that passes through uses Family terminal;
Or,
When the user terminal is judged as non-commonly used equipment, the server obtains the key that the car-mounted terminal is sent Spoon information;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
The server generates the pre-set user terminal that the second notice is sent in the key information.
A kind of access processing unit of car key, is related to user terminal, car-mounted terminal, and, the information between server is handed over Mutually, wherein the car-mounted terminal specifically includes:
First receiving module, the connection request initiated for receiving the user terminal;
Generation module, for generating verification result for the connection request;
First computing module, for calculating the first security parameter according to the verification result;
First sending module, for the verification result to be sent to the server;
Second receiving module, for receiving the second security parameter of the server feedback, second security parameter is The server is calculated according to the verification result and is obtained;
Judgment module is used for according to first security parameter, and/or, second security parameter judges the user Whether terminal, which meets default access, requires;
Link block is used for if it is not, then the car-mounted terminal refuses the connection request.
A kind of access processing unit of car key, is related to user terminal, car-mounted terminal, and, the information between server is handed over Mutually, wherein the server specifically includes:
Third receiving module, the verification result sent for receiving the car-mounted terminal;The verification result is vehicle-mounted end The connection request that end is initiated for the user terminal generates;
Second computing module, for calculating the second security parameter according to the verification result;
Second sending module, for second security parameter to be sent to the car-mounted terminal;
Wherein, the car-mounted terminal is also used to according to first security parameter, and/or, second security parameter is sentenced Whether the user terminal that breaks, which meets default access, requires, and, when not meeting the access and requiring, refuses the connection and ask It asks;Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
A kind of access processing system of car key, is related to user terminal, car-mounted terminal, and, the information between server is handed over Mutually, it specifically includes:
The user terminal initiates the connection request to the car-mounted terminal;
The car-mounted terminal generates verification result for the connection request, and calculates the first peace according to the verification result Population parameter, and, the verification result is sent to the server;
The server calculates the second security parameter according to the verification result, and second security parameter is sent to The car-mounted terminal;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user Whether terminal, which meets default access, requires;
When the user terminal, which does not meet default access, to be required, the car-mounted terminal refuses what the user terminal was initiated Connection request.
A kind of vehicle, including processor, memory and be stored on the memory and can transport on the processor Capable computer program, the computer program realize the vehicle key of car-mounted terminal side as described above when being executed by the processor The step of access processing method of spoon.
A kind of computer readable storage medium stores computer program, the meter on the computer readable storage medium Calculation machine program realizes the step of access processing method of the car key of car-mounted terminal side as described above when being executed by processor.
The application has the following advantages:
In embodiments herein, the connection request that the user terminal is initiated is received by the car-mounted terminal;Institute It states car-mounted terminal and generates verification result for the connection request;The car-mounted terminal calculates the first peace according to the verification result Population parameter;The verification result is sent to the server by the car-mounted terminal;The car-mounted terminal receives the server Second security parameter of feedback, second security parameter are that the server is obtained according to verification result calculating;It is described Car-mounted terminal according to first security parameter, and/or, second security parameter judges whether the user terminal meets Default access requires;If it is not, then the car-mounted terminal refuses the connection request, distinguish by using server and car-mounted terminal The calculating of security parameter is carried out, and, according to first security parameter, and/or, second security parameter carries out access and sentences It is fixed, protective capacities is improved, is reduced by the probability of Brute Force.
Detailed description of the invention
It, below will be to attached needed in the description of the present application in order to illustrate more clearly of the technical solution of the application Figure is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for this field For those of ordinary skill, without any creative labor, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of step flow chart of the access processing method for car key that one embodiment of the application provides;
Fig. 2 is a kind of step flow chart of the access processing method for car key that one embodiment of the application provides;
Fig. 3 is a kind of structural block diagram of the access processing server for car key that one embodiment of the application provides;
Fig. 4 is a kind of structural block diagram of the access processing car-mounted terminal for car key that one embodiment of the application provides;
Fig. 5 is a kind of structural block diagram of the access processing system for car key that one embodiment of the application provides.
Specific embodiment
It is with reference to the accompanying drawing and specific real to keep the objects, features and advantages of the application more obvious and easy to understand Applying mode, the present application will be further described in detail.Obviously, described embodiment is some embodiments of the present application, without It is whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall in the protection scope of this application.
It should be noted that user terminal is the bearing medium of car key information in the application any embodiment, In, the type of user terminal includes but is not limited to smartwatch, mobile phone, Intelligent bracelet, ring, necklace, and, in card Any one.
It should be noted that car-mounted terminal is each for controlling vehicle function in vehicle in the application any embodiment The bearing medium of the application of energy, the control application function of carrying include but is not limited to car key verifying, the note of traveling state of vehicle Record, the monitoring of car speed, the monitoring of automobile navigation, the switch of vehicle window, the switch and temperature of on-board air conditioner are adjusted, vehicle-mounted music Broadcasting and volume adjustment, the posture of vehicle seat and the adjusting of position and record, the switch of vehicle-mounted camera and adjusting, vehicle The switch and unlatching amplitude adjusted of skylight.
Referring to Fig.1, a kind of access processing method of car key of one embodiment of the application offer is shown, feature exists In, the method is related to user terminal, car-mounted terminal, and, server, which comprises
S101, the car-mounted terminal receive the connection request that the user terminal is initiated;
S102, the car-mounted terminal generate verification result for the connection request;
S103, the car-mounted terminal calculate the first security parameter according to the verification result;
The verification result is sent to the server by S104, the car-mounted terminal;
S105, the car-mounted terminal receive the second security parameter of the server feedback, and second security parameter is The server is calculated according to the verification result and is obtained;
S106, the car-mounted terminal according to first security parameter, and/or, second security parameter, described in judgement Whether user terminal, which meets default access, requires;
S107, if it is not, then the car-mounted terminal refuses the connection request.
In embodiments herein, the connection request that the user terminal is initiated is received by the car-mounted terminal;Institute It states car-mounted terminal and generates verification result for the connection request;The car-mounted terminal calculates the first peace according to the verification result Population parameter;The verification result is sent to the server by the car-mounted terminal;The car-mounted terminal receives the server Second security parameter of feedback, second security parameter are that the server is obtained according to verification result calculating;It is described Car-mounted terminal according to first security parameter, and/or, second security parameter judges whether the user terminal meets Default access requires;If it is not, then the car-mounted terminal refuses the connection request, distinguish by using server and car-mounted terminal The calculating of security parameter is carried out, and, according to first security parameter, and/or, second security parameter carries out access and sentences It is fixed, protective capacities is improved, is reduced by the probability of Brute Force.
In the following, by being further described to the access processing method of car key in the present exemplary embodiment.
As described in above-mentioned steps S101, the car-mounted terminal receives the connection request that the user terminal is initiated;It needs Bright, the connection request includes the identification information of key information and the user terminal;User terminal passes through its inside portion Administration includes the connection request of the key information and the identification information using generation, and is sent to the car-mounted terminal.
As an example, the car-mounted terminal and the user terminal carry out the side of the data interaction of the connection request Formula may include bluetooth connection, NFC (Near Field Communication, near-field communication) connection, and, it is short-range The mode of the radiofrequency signals such as WLAN (Wireless Local Area Networks, Wireless LAN) connection carries out data friendship Mutually.
As an example, the key information can be for one for answering user terminal with what car-mounted terminal was attached Account in, and, for logging in the check code of the account, which can be preset character type password or biological species Password or character type password or biological species password by dynamic acquisition, wherein character type password includes but is not limited to that pattern is close Code, gesture password, and, pass through one of number, letter and symbol or the password of a variety of combinations;Biological species password include but It is not limited to fingerprint, palmmprint, iris, vocal print, and, shape of face.
As an example, the identification information can be MAC Address of Network Card, the bluetooth of user terminal of user terminal International mobile equipment identity number (IMEI, InternationalMobile Equipment Identity, the movement of MAC Address or user terminal Equipment international identity code, also known as International Mobile Station Equipment Identification, each mobile device are just endowed one in production At least one of IMEI, with global uniqueness).These information can uniquely identify each user terminal, vehicle Mounted terminal can search the history linkage record about the user terminal in car-mounted terminal record by identification information.
As described in above-mentioned steps S102, the car-mounted terminal generates verification result for the connection request;
The car-mounted terminal obtains the key information for including in the connection request, and carries out at verifying to the key information Reason, specifically, whether the account and password of verifying in the key information match, (matching then verifies success, and mismatch then verifies Failure), and generate corresponding verification result, it should be noted that the verification result is including at least having whether verify success Information (comprising verify successfully or verification fails), can also be to indicate the success of the verification result by the fractional value of a score Whether, specifically, when verify be successfully score be 0, when verification unsuccessfully when score be one be not 0 positive integer.
As described in above-mentioned steps S103, the car-mounted terminal calculates the first security parameter according to the verification result;
As an example, the car-mounted terminal according to the verification result calculate the first security parameter it is previous as also need A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the car-mounted terminal is without first peace The calculating of population parameter, or, the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal;
It should be noted that when the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal, institute It states car-mounted terminal and deletes the number to fail in its own storage with the verification of the identification information match.
In the concrete realization, after verifying the key information success, the car-mounted terminal is by record about the use First reference number of times of family terminal is zeroed, that is, the number zero for verifying failure, therefore, when the user terminal is primary Connection request retransmits new connection request after being proved to be successful when, the first safety ginseng for being directed to the new connection request is calculated Number when, based on the first reference number of times be zero.
In another embodiment, when the verification result is verification failure, it is whole that the car-mounted terminal extracts the user The identification information at end, specifically, the car-mounted terminal extracts the identification information of the user terminal from the connection request;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times, specifically For the car-mounted terminal finds out the history verification information with the identification information match, history verifying from itself storage Information includes the successful number of verification, and, verify the number of failure;The car-mounted terminal filters out time of the verification failure Number is used as first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal, is needed It is noted that the first default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc. Condition calculates the first security parameter.
In the concrete realization, it when the described first default weight is a default design factor, is obtained in the car-mounted terminal After first reference number of times, first reference number of times is preset into design factor multiplied by this, obtains first security parameter, Such as: first reference number of times is 8 times, and presetting design factor is 10, then first safety coefficient is 80.
As described in above-mentioned steps S104, the verification result is sent to the server by the car-mounted terminal;
In one embodiment, after the step of verification result is sent to the server by the car-mounted terminal, The car-mounted terminal judges whether to be in connection status with the server, specifically, the car-mounted terminal judges whether pre- If receiving the second security parameter that the server is sent in the time;It should be noted that in the car-mounted terminal to described After server sends the first security parameter, the car-mounted terminal will be in the shape of feedback signal to be received within a preset time State, judges whether server feeds back the second security parameter within a preset time.
When the car-mounted terminal receives the second security parameter that the server is sent within a preset time, then institute is determined It states car-mounted terminal and the server is in connection status, otherwise (including never feed back, and, the second safety of feedback Parameter duration is more than two kinds of situations of preset time), determine that the car-mounted terminal and the server are in notconnect state.
When being in an off state with the server, the car-mounted terminal is according to described in first security parameter judgement Whether user terminal meets the access requirement, that is, judges whether first security parameter is greater than first preset threshold.
As described in above-mentioned steps S105, the car-mounted terminal receives the second security parameter of the server feedback, described Second security parameter is that the server is obtained according to verification result calculating;
It should be noted that second security parameter can be a fractional value, specifically, the server is according to Verification result, which calculates, to be obtained,
As an example, the server according to the verification result calculate the second security parameter it is previous as also need A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the server is without second safety The calculating of parameter, or, the calculated result of second security parameter is directly denoted as 0 by the server;
It should be noted that when the calculated result of second security parameter is directly denoted as 0 by the server, it is described Server deletes the number in its own storage with the verification failure of the identification information match.
In the concrete realization, after verifying the key information success, the server is by record about the user Number zero in the number of the verification failure of terminal about the verification failure of the car-mounted terminal of currently transmitted verification result, because This, when the user terminal retransmits for after being once proved to be successful for the connection request of current car-mounted terminal and works as front truck When the new connection request of mounted terminal, calculating is when being directed to the second security parameter of the new connection request, based on the Two reference number of times are also relevant to preceding car-mounted terminal is deserved equal to the number about the verification failure of the user terminal is subtracted Verify the number of failure.
In another embodiment, when the verification result is verification failure, the server extracts the user terminal Identification information, specifically, the server obtains the identification information of the user terminal from the car-mounted terminal;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times, specifically For the server finds out the history verification information with the identification information match, history verifying letter from itself storage Breath includes the successful number of verification, and, verify the number of failure;The number that the screening server goes out the verification failure is made For second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server, is needed Illustrating, the second default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc. Condition calculates the second security parameter.
In the concrete realization, when the described second default weight is a default design factor, institute is obtained in the server After stating the second reference number of times, second reference number of times is preset into design factor multiplied by this, obtains second security parameter, Such as: second reference number of times is 8 times, and presetting design factor is 10, then second safety coefficient is 80.
As described in above-mentioned steps S106, the car-mounted terminal according to first security parameter, and/or, it is described second peace Population parameter, judges whether the user terminal meets default access and require;
It should be noted that the car-mounted terminal is according to first security parameter, and/or, second security parameter, Judge whether the user terminal meets the step of default access requires, specifically,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires.
It should be noted that how the car-mounted terminal is directed to using the first security parameter, and, the second security parameter Actual conditions in this application, generally depending on the connection status based on the car-mounted terminal and the server, specific point For following situations:
In situation one, when the car-mounted terminal is in notconnect state with the server,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires.
In situation two, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires.
In situation three, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether first security parameter is less than or equal to the first preset threshold, and, judgement Whether second security parameter is less than or equal to the second preset threshold;
If so, determining that the user terminal meets default access and requires;If it is not, then determining that the user terminal is not met Default access requires.
It should be noted that having and only being preset when first security parameter is less than or equal to first in situation three Threshold value, and, when second security parameter is less than or equal to the second preset threshold while reaching, the user terminal just meets It presets access to require, remaining judging result is that the user terminal does not meet default access requirement.
It should be noted that in the case where the car-mounted terminal and the server are in connection status, situation two and situation three Select a use, generally selected according to preset condition, preset condition such as: whether user already authenticated's terminal in the common period It carries out verifying or whether user already authenticated's terminal is in common ground.
In the concrete realization, in above-mentioned three kinds of situations, when for calculating first security parameter and the second safety ginseng When several default weights is a coefficient equal to 10, first preset threshold and second preset threshold are preferably equal, And it is equal to 100.
As described in above-mentioned steps S107, if it is not, then the car-mounted terminal refuses the connection request.
It should be noted that when the user terminal is judged to not meeting default access by the car-mounted terminal and requires, The car-mounted terminal refuses the first connection request that the user terminal is initiated at this time, and disconnects the company with the user terminal It connects;
In one embodiment, after the car-mounted terminal disconnects the connection with the user terminal, also by the mark Information update enters in blacklist.
After the connection request of the user terminal is rejected, the car-mounted terminal is by the identification information of the user terminal It is updated in the blacklist, at this point, the user terminal corresponding with the identification information will be unable to and the car-mounted terminal Connection, the blacklist can be uploaded to together the server, institute in the vehicle-mounted progress log update with its operation log Server is stated periodically to summarize the blacklist obtained from each car-mounted terminal by way of update and be sent to each vehicle Mounted terminal, to improve the protection to vehicle, and, improve the safety that user uses.
Thing, the car-mounted terminal access are required when the user terminal is judged to meeting default access by the car-mounted terminal The user terminal, user can start the corresponding vehicle of the car-mounted terminal, and, by the user terminal to the vehicle Mounted terminal is controlled, and is realized and is manipulated by the user terminal to the control application in the car-mounted terminal.
Referring to Fig. 2, a kind of access processing method of car key of one embodiment of the application offer is shown, the method relates to And user terminal, car-mounted terminal, and, server, which comprises
S201, the server receive the verification result that the car-mounted terminal is sent;The verification result is car-mounted terminal The connection request initiated for the user terminal generates;
S202, the server calculate the second security parameter according to the verification result;
Second security parameter is sent to the car-mounted terminal by S203, the server;
The car-mounted terminal is also used to according to first security parameter, and/or, second security parameter judges institute It states user terminal and whether meets default access and require, and, when not meeting the access and requiring, refuse the connection request; Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
In embodiments herein, the verification result that the car-mounted terminal is sent is received by the server;It is described Verification result is that the connection request that car-mounted terminal is initiated for the user terminal generates;The server is tied according to the verifying Fruit calculates the second security parameter;Second security parameter is sent to the car-mounted terminal by the server;The vehicle-mounted end End is also used to according to first security parameter, and/or, second security parameter judges whether the user terminal meets Default access requires, and, when not meeting the access and requiring, refuse the connection request;Wherein, the first safety ginseng Number is that the car-mounted terminal is obtained according to verification result calculating, carries out safety respectively by using server and car-mounted terminal The calculating of parameter, and, according to first security parameter, and/or, second security parameter carries out access judgement, improves Protective capacities is reduced by the probability of Brute Force.
In the following, by being further described to the access processing method of car key in the present exemplary embodiment.
As described in above-mentioned steps S201, the server receives the verification result that the car-mounted terminal is sent;The verifying As a result the connection request initiated for car-mounted terminal for the user terminal generates;
It should be noted that the verification result is that the car-mounted terminal obtains the key letter for including in the connection request Breath, and verification processing is carried out to the key information and is obtained, specifically, verify account in the key information and password whether With (matching then verifies success, and mismatch then verifies failure), and generate corresponding verification result, it should be noted that described to test Result is demonstrate,proved as that can also be to pass through one point including at least having whether verify successful information (failing comprising verifying successfully or verifying) Several fractional values indicates the success or not of the verification result, specifically, when verify be successfully score be 0, when verification unsuccessfully the time-division Number is the positive integer that one is not 0.
It should be noted that the connection request includes the identification information of key information and the user terminal;User is whole End includes the connection request of the key information and the identification information by its On-premise using generation, and is sent to The car-mounted terminal.
As an example, the car-mounted terminal and the user terminal carry out the side of the data interaction of the connection request Formula may include bluetooth connection, NFC (Near Field Communication, near-field communication) connection, and, it is short-range The mode of the radiofrequency signals such as WLAN (Wireless Local Area Networks, Wireless LAN) connection carries out data friendship Mutually.
As an example, the key information can be for one for answering user terminal with what car-mounted terminal was attached Account in, and, for logging in the check code of the account, which can be preset character type password or biological species Password or character type password or biological species password by dynamic acquisition, wherein character type password includes but is not limited to that pattern is close Code, gesture password, and, pass through one of number, letter and symbol or the password of a variety of combinations;Biological species password include but It is not limited to fingerprint, palmmprint, iris, vocal print, and, shape of face.
As an example, the identification information can be MAC Address of Network Card, the bluetooth of user terminal of user terminal International mobile equipment identity number (IMEI, International Mobile Equipment Identity, the movement of MAC Address or user terminal Equipment international identity code, also known as International Mobile Station Equipment Identification, each mobile device are just endowed one in production At least one of IMEI, with global uniqueness).These information can uniquely identify each user terminal, vehicle Mounted terminal can search the history linkage record about the user terminal in car-mounted terminal record by identification information.
As described in above-mentioned steps S202, the server calculates the second security parameter according to the verification result;
It should be noted that second security parameter can be a fractional value, specifically, the server is according to Verification result, which calculates, to be obtained.
As an example, the server according to the verification result calculate the second security parameter it is previous as also need A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the server is without second safety The calculating of parameter, or, the calculated result of second security parameter is directly denoted as 0 by the server;
It should be noted that when the calculated result of second security parameter is directly denoted as 0 by the server, it is described Server deletes the number in its own storage with the verification failure of the identification information match.
In the concrete realization, after verifying the key information success, the server is by record about the user Number zero in the number of the verification failure of terminal about the verification failure of the car-mounted terminal of currently transmitted verification result, because This, when the user terminal retransmits for after being once proved to be successful for the connection request of current car-mounted terminal and works as front truck When the new connection request of mounted terminal, calculating is when being directed to the second security parameter of the new connection request, based on the Two reference number of times are also relevant to preceding car-mounted terminal is deserved equal to the number about the verification failure of the user terminal is subtracted Verify the number of failure.
In another embodiment, when the verification result is verification failure, the server extracts the user terminal Identification information, specifically, the server obtains the identification information of the user terminal from the car-mounted terminal;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times, specifically For the server finds out the history verification information with the identification information match, history verifying letter from itself storage Breath includes the successful number of verification, and, verify the number of failure;The number that the screening server goes out the verification failure is made For second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server, is needed Illustrating, the second default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc. Condition calculates the second security parameter.
In the concrete realization, when the described second default weight is a default design factor, institute is obtained in the server After stating the second reference number of times, second reference number of times is preset into design factor multiplied by this, obtains second security parameter, Such as: second reference number of times is 8 times, and presetting design factor is 10, then second safety coefficient is 80.
In another embodiment, when the verification result is verification failure, the server extracts the user terminal Identification information, specifically, the server obtains the identification information of the user terminal from the car-mounted terminal;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times, specifically For the server finds out the history verification information with the identification information match, history verifying letter from itself storage Breath includes the successful number of verification, and, verify the number of failure;The number that the screening server goes out the verification failure is made For second reference number of times;
Whether the server is commonly used equipment according to user terminal described in the identification information judgment, specifically, in institute State after server obtains second reference number of times, judge the identification information whether with preset nearest number using identical keys The identification information for the user terminal that information is verified and is proved to be successful is identical, this is preset nearest number and is generally 3 times;
When to be identical, then the default weight of second reference number of times configuration second is obtained described second by the server Security parameter, it should be noted that the second default weight can be a default design factor, or, a preset weight is calculated Method,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc. Condition calculates the second security parameter.
In the concrete realization, when the described second default weight is a default design factor, institute is obtained in the server After stating the second reference number of times, second reference number of times is preset into design factor multiplied by this, obtains second security parameter, Such as: second reference number of times is 8 times, and presetting design factor is 10, then second safety coefficient is 80.
When to be different, then second reference number of times configuration third is preset weight and obtains described second by the server Security parameter, it should be noted that the second default weight can be a preset Weight algorithm, specifically, the second reference Number × predetermined coefficient+default value
In the concrete realization, predetermined coefficient 10, the default value are 50, if second reference number of times is 8 times, then Second safety coefficient is 130.
In one embodiment, when the user terminal is judged as non-commonly used equipment, the server obtains the vehicle The key information that mounted terminal is sent;The key information is the connection request that the car-mounted terminal is directed to that the user terminal is initiated It generates;
The server generates first and notifies that being sent to the last successful history of key information verification that passes through uses Family terminal;Specifically, being found out by the account information in the key information corresponding with account information the last logical Cross historical user's terminal of verifying;
As an example, first notification information can be short message, and/or, it is preset in the number key information The information based on other communication modes, e.g., wechat, QQ, and, Email, first notification information may include, non- The identification information of commonly used equipment, the connection of non-commonly used equipment log in ground (including but not limited to provinces and cities address), and, non-commonly use sets Standby connection login time.
In another embodiment, when the user terminal is judged as non-commonly used equipment, described in the server acquisition The key information that car-mounted terminal is sent;The key information is that the connection that the car-mounted terminal is initiated for the user terminal is asked It seeks survival into;
The server generates the pre-set user terminal that the second notice is sent in the key information, specifically, passing through Account information in the key information finds out pre-set user terminal corresponding with account information, the preset user terminal Emergency contact when occurring other than being generally used for for emergency contact gets account in server and is stolen or improper makes Used time connection,
As an example, non-normal use can be with are as follows: the use of the user terminal of the account is non-commonly used equipment, uses this The second safety point of user terminal of account is higher than the second specified threshold, or, the user terminal using the account is drawn into blacklist.
As an example, second notification information can be short message, and/or, it is preset in the number key information The information based on other communication modes, e.g., wechat, QQ, and, Email, second notification information may include, non- The identification information of commonly used equipment, the connection of non-commonly used equipment log in ground (including but not limited to provinces and cities address), and, non-commonly use sets Standby connection login time.
As described in above-mentioned steps S203, second security parameter is sent to the car-mounted terminal by the server;
Second security parameter is sent to the car-mounted terminal, the second safety ginseng by network by the server Number can be a fractional value, obtain specifically, the server is calculated according to the verification result.
The car-mounted terminal is also used to according to first security parameter, and/or, second security parameter judges institute It states user terminal and whether meets default access and require, and, when not meeting the access and requiring, refuse the connection request; Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
It should be noted that the car-mounted terminal is according to first security parameter, and/or, second security parameter, Judge whether the user terminal meets the step of default access requires, specifically,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires.
It should be noted that how the car-mounted terminal is directed to using the first security parameter, and, the second security parameter Actual conditions in this application, generally depending on the connection status based on the car-mounted terminal and the server, specific point For following situations:
In situation one, when the car-mounted terminal is in notconnect state with the server,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires.
In situation two, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets Default access requires.
In situation three, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether first security parameter is less than or equal to the first preset threshold, and, judgement Whether second security parameter is less than or equal to the second preset threshold;
If so, determining that the user terminal meets default access and requires;If it is not, then determining that the user terminal is not met Default access requires.
It should be noted that having and only being preset when first security parameter is less than or equal to first in situation three Threshold value, and, when second security parameter is less than or equal to the second preset threshold while reaching, the user terminal just meets It presets access to require, remaining judging result is that the user terminal does not meet default access requirement.
It should be noted that in the case where the car-mounted terminal and the server are in connection status, situation two and situation three Select a use, generally selected according to preset condition, preset condition such as: whether user already authenticated's terminal in the common period It carries out verifying or whether user already authenticated's terminal is in common ground.
In the concrete realization, in above-mentioned three kinds of situations, when for calculating first security parameter and the second safety ginseng When several default weights is a coefficient equal to 10, first preset threshold and second preset threshold are preferably equal, And it is equal to 100.
When not meeting the access and requiring, then the car-mounted terminal refuses the connection request.
It should be noted that when the user terminal is judged to not meeting default access by the car-mounted terminal and requires, The car-mounted terminal refuses the first connection request that the user terminal is initiated at this time, and disconnects the company with the user terminal It connects;
In one embodiment, after the car-mounted terminal disconnects the connection with the user terminal, also by the mark Information update enters in blacklist.
After the connection request of the user terminal is rejected, the car-mounted terminal is by the identification information of the user terminal It is updated in the blacklist, at this point, the user terminal corresponding with the identification information will be unable to and the car-mounted terminal Connection, the blacklist can be uploaded to together the server, institute in the vehicle-mounted progress log update with its operation log Server is stated periodically to summarize the blacklist obtained from each car-mounted terminal by way of update and be sent to each vehicle Mounted terminal, to improve the protection to vehicle, and, improve the safety that user uses.
Thing, the car-mounted terminal access are required when the user terminal is judged to meeting default access by the car-mounted terminal The user terminal, user can start the corresponding vehicle of the car-mounted terminal, and, by the user terminal to the vehicle Mounted terminal is controlled, and is realized and is manipulated by the user terminal to the control application in the car-mounted terminal.
First security parameter is that the car-mounted terminal is obtained according to verification result calculating, specific as follows:
As an example, the car-mounted terminal according to the verification result calculate the first security parameter it is previous as also need A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the car-mounted terminal is without first peace The calculating of population parameter, or, the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal;
It should be noted that when the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal, institute It states car-mounted terminal and deletes the number to fail in its own storage with the verification of the identification information match.
In the concrete realization, after verifying the key information success, the car-mounted terminal is by record about the use First reference number of times of family terminal is zeroed, that is, the number zero for verifying failure, therefore, when the user terminal is primary Connection request retransmits new connection request after being proved to be successful when, the first safety ginseng for being directed to the new connection request is calculated Number when, based on the first reference number of times be zero.
In another embodiment, when the verification result is verification failure, it is whole that the car-mounted terminal extracts the user The identification information at end, specifically, the car-mounted terminal extracts the identification information of the user terminal from the connection request;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times, specifically For the car-mounted terminal finds out the history verification information with the identification information match, history verifying from itself storage Information includes the successful number of verification, and, verify the number of failure;The car-mounted terminal filters out time of the verification failure Number is used as first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal, is needed It is noted that the first default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc. Condition calculates the first security parameter.
In the concrete realization, it when the described first default weight is a default design factor, is obtained in the car-mounted terminal After first reference number of times, first reference number of times is preset into design factor multiplied by this, obtains first security parameter, Such as: first reference number of times is 8 times, and presetting design factor is 10, then first safety coefficient is 80.
For the Installation practice of car-mounted terminal side, since it is basically similar to the method embodiment, so description Fairly simple, related place illustrates referring to the part of the embodiment of the method for car-mounted terminal side.
Referring to Fig. 3, a kind of access processing unit of car key of one embodiment of the application offer is shown, is related to user's end End, car-mounted terminal, and, the information exchange between server, wherein the car-mounted terminal specifically includes:
First receiving module 101, the connection request initiated for receiving the user terminal;
Generation module 102, for generating verification result for the connection request;
First computing module 103, for calculating the first security parameter according to the verification result;
First sending module 104, for the verification result to be sent to the server;
Second receiving module 105, for receiving the second security parameter of the server feedback, second security parameter It is calculated and is obtained according to the verification result for the server;
Judgment module 106, for according to first security parameter, and/or, second security parameter, described in judgement Whether user terminal, which meets default access, requires;
Link block 107 is used for if it is not, then the car-mounted terminal refuses the connection request.
For the Installation practice of server side, since it is basically similar to the method embodiment, so the ratio of description Relatively simple, related place illustrates referring to the part of the embodiment of the method for server side.
Referring to Fig. 4, a kind of access processing unit of car key of one embodiment of the application offer is shown, is related to user's end End, car-mounted terminal, and, the information exchange between server, wherein the server specifically includes:
Third receiving module 201, the verification result sent for receiving the car-mounted terminal;The verification result is vehicle-mounted The connection request that terminal is initiated for the user terminal generates;
Second computing module 202, for calculating the second security parameter according to the verification result;
Second sending module 203, for second security parameter to be sent to the car-mounted terminal;
Wherein, the car-mounted terminal is also used to according to first security parameter, and/or, second security parameter is sentenced Whether the user terminal that breaks, which meets default access, requires, and, when not meeting the access and requiring, refuses the connection and ask It asks;Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
For system embodiments, since it is substantially similar to server side and car-mounted terminal side embodiment of the method, institute To be described relatively simple, the relevent part can refer to the partial explaination of embodiments of method.
Referring to Fig. 5, a kind of access processing system of car key of the application is shown, user terminal 300, car-mounted terminal are related to 200, and, the information exchange between server 100 specifically includes:
The user terminal 300 initiates the connection request to the car-mounted terminal 200;
The car-mounted terminal 200 generates verification result for the connection request, and calculates the according to the verification result One security parameter, and, the verification result is sent to the server 100;
The server 100 calculates the second security parameter according to the verification result, and second security parameter is sent out It send to the car-mounted terminal 200;
The car-mounted terminal 200 according to first security parameter, and/or, second security parameter judges the use Whether family terminal 300, which meets default access, requires;
When the user terminal 300, which does not meet default access, to be required, it is whole that the car-mounted terminal 200 refuses the user The connection request that end 300 is initiated.
In the following, by being further described to the access processing method of car key in the present exemplary embodiment.
The user terminal 300 initiates the connection request to the car-mounted terminal 200, wherein the connection request includes key The identification information of spoon information and the user terminal 300;User terminal 300 is generated by the application of its On-premise comprising The connection request of key information and the identification information is stated, and is sent to the car-mounted terminal 200.
The car-mounted terminal 200 generates the verification result for being directed to the connection request according to key information, and according to described Verification result and the identification information calculate the first security parameter, and first security parameter is sent to the server 100;When the verification result is verification failure, the car-mounted terminal 200 is according to the identification information from the information of storage The verification number with the identification information match is found out, then is screened out from it the number of verification failure as the first reference time Number;First security parameter is calculated according to the first reference number of times in the car-mounted terminal 200.
The server 100 calculates the second security parameter according to the verification result, and second security parameter is sent out It send to the car-mounted terminal 200, specifically includes:
The server 100 receives the verification result that the car-mounted terminal 200 is sent;
The server 100 receives the verification result of the transmission of car-mounted terminal 200 by network.
When the verification result is verification failure, the server 100 extracts the mark letter from the car-mounted terminal Breath, the verification number with the identification information match is found out according to the identification information, then therefrom sieve from the information of storage The number of verification failure is selected as the second reference number of times;The server 100 is calculated described according to the second reference number of times Second security parameter.
Second security parameter is sent to the car-mounted terminal 200 by the server 100;
Second security parameter is sent to the car-mounted terminal 200 by network by the server 100, described Two security parameters can be a fractional value, obtain specifically, the server 100 is calculated according to the verification result.
The car-mounted terminal 200 according to first security parameter, and/or, second security parameter judges the use Whether family terminal 300, which meets default access, requires;If not meeting, the car-mounted terminal 200 is refused the user terminal 300 and is initiated Connection request.
It should be noted that according to first security parameter, and/or, second security parameter judges the user Whether terminal 300, which meets default access, requires, and specially judges whether first security parameter is greater than the first preset threshold; And/or judge whether second security parameter is greater than the second preset threshold.
In the concrete realization, how the car-mounted terminal 200 is directed to using the first security parameter, and, the second safety The actual conditions of parameter in this application, generally the connection status based on the car-mounted terminal 200 and the server 100 and It is fixed, it is specifically divided into following situations:
In situation one, 100 when notconnect state at the car-mounted terminal 200 and the server,
The car-mounted terminal 200 judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal 300 does not meet default access and requires;If it is not, then determining the user terminal 300, which meet default access, requires.
In situation two, when the car-mounted terminal 200 is in connection status with the server 100,
The car-mounted terminal 200 judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal 300 does not meet default access and requires;If it is not, then determining the user terminal 300, which meet default access, requires.
In situation three, when the car-mounted terminal 200 is in connection status with the server 100,
The car-mounted terminal 200 judges whether first security parameter is less than or equal to the first preset threshold, and, sentence Whether second security parameter that breaks is less than or equal to the second preset threshold;
If so, determining that the user terminal 300 meets default access and requires;If it is not, then determining the user terminal 300 Default access is not met to require.
It should be noted that having and only being preset when first security parameter is less than or equal to first in situation three Threshold value, and, when second security parameter is less than or equal to the second preset threshold while reaching, the user terminal 300 is Meet and preset access requirement, remaining judging result is that the user terminal 300 does not meet default access requirement.
In the concrete realization, in above-mentioned three kinds of situations, when for calculating first security parameter and the second safety ginseng When several default weights is a coefficient equal to 10, first preset threshold and second preset threshold are preferably equal, And it is equal to 100.
A kind of vehicle that one embodiment of the application provides, including processor, memory and be stored on the memory simultaneously The computer program that can be run on the processor, the computer program realize institute as above when being executed by the processor The step of access processing method of the car key for the car-mounted terminal side stated.
A kind of computer readable storage medium that one embodiment of the application provides is deposited on the computer readable storage medium Computer program is stored up, the computer program realizes connecing for the car key of car-mounted terminal side as described above when being executed by processor The step of entering processing method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to the access processing method of car key provided herein, device, system and vehicle, detailed Jie has been carried out It continues, specific examples are used herein to illustrate the principle and implementation manner of the present application, and the explanation of above embodiments is only It is to be used to help understand the method for this application and its core ideas;At the same time, for those skilled in the art, according to this Shen Thought please, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is the limitation to the application.

Claims (16)

1. a kind of access processing method of car key, which is characterized in that the method is related to user terminal, car-mounted terminal, and, Server, which comprises
The car-mounted terminal receives the connection request that the user terminal is initiated;
The car-mounted terminal generates verification result for the connection request;
The car-mounted terminal calculates the first security parameter according to the verification result;
The verification result is sent to the server by the car-mounted terminal;
The car-mounted terminal receives the second security parameter of the server feedback, and second security parameter is the server It is calculated and is obtained according to the verification result;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user terminal Whether meet default access to require;
If it is not, then the car-mounted terminal refuses the connection request.
2. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/ Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
3. the method according to claim 1, wherein the car-mounted terminal calculates first according to the verification result The step of security parameter includes:
When the verification result is verification failure, the car-mounted terminal extracts the identification information of the user terminal;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal.
4. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/ Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
When the car-mounted terminal and the server are in notconnect state, the car-mounted terminal judges the first safety ginseng Whether number is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
5. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/ Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges second security parameter Whether the second preset threshold is greater than;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
6. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/ Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges first security parameter Whether first preset threshold is less than or equal to, and, judge whether second security parameter is less than or equal to the second default threshold Value;
If so, determining that the user terminal meets default access and requires;
If it is not, then determining that the user terminal does not meet default access and requires.
7. according to method described in claim 4-6 any one, which is characterized in that when the car-mounted terminal within a preset time The second security parameter that the server is sent is received, then determines that the car-mounted terminal and the server are in connection shape State, otherwise, it is determined that the car-mounted terminal and the server are in notconnect state.
8. a kind of access processing method of car key, which is characterized in that the method is related to user terminal, car-mounted terminal, and, Server, which comprises
The server receives the verification result that the car-mounted terminal is sent;The verification result is that car-mounted terminal is directed to the use The connection request that family terminal is initiated generates;
The server calculates the second security parameter according to the verification result;
Second security parameter is sent to the car-mounted terminal by the server;The car-mounted terminal is also used to according to described in First security parameter, and/or, second security parameter judges whether the user terminal meets default access and require, with And do not meet it is described access require when, refuse the connection request;Wherein, first security parameter is the vehicle-mounted end End calculates according to the verification result and obtains.
9. according to the method described in claim 8, it is characterized in that, the server calculates the second peace according to the verification result The step of population parameter includes:
When the verification result is verification failure, the server obtains the mark of the user terminal from the car-mounted terminal Know information;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server.
10. according to the method described in claim 9, it is characterized in that, the method also includes,
Whether the server is commonly used equipment according to user terminal described in the identification information judgment;
If it is not, then second reference number of times configuration third is preset weight and obtains second security parameter by the server.
11. according to the method described in claim 9, it is characterized in that, the method also includes:
When the user terminal is judged as non-commonly used equipment, the server obtains the key letter that the car-mounted terminal is sent Breath;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
First notice of server generation is sent to the last by key information verification successful historical user's end End;
Or,
When the user terminal is judged as non-commonly used equipment, the server obtains the key letter that the car-mounted terminal is sent Breath;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
The server generates the pre-set user terminal that the second notice is sent in the key information.
12. a kind of access processing unit of car key, which is characterized in that it is related to user terminal, car-mounted terminal, and, server Between information exchange, wherein the car-mounted terminal specifically includes:
First receiving module, the connection request initiated for receiving the user terminal;
Generation module, for generating verification result for the connection request;
First computing module, for calculating the first security parameter according to the verification result;
First sending module, for the verification result to be sent to the server;
Second receiving module, for receiving the second security parameter of the server feedback, second security parameter is described Server is calculated according to the verification result and is obtained;
Judgment module is used for according to first security parameter, and/or, second security parameter judges the user terminal Whether meet default access to require;
Link block is used for if it is not, then the car-mounted terminal refuses the connection request.
13. a kind of access processing unit of car key, which is characterized in that it is related to user terminal, car-mounted terminal, and, server Between information exchange, wherein the server specifically includes:
Third receiving module, the verification result sent for receiving the car-mounted terminal;The verification result is car-mounted terminal needle The connection request that the user terminal is initiated is generated;
Second computing module, for calculating the second security parameter according to the verification result;
Second sending module, for second security parameter to be sent to the car-mounted terminal;
Wherein, the car-mounted terminal is also used to according to first security parameter, and/or, second security parameter judges institute It states user terminal and whether meets default access and require, and, when not meeting the access and requiring, refuse the connection request; Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
14. a kind of access processing system of car key, which is characterized in that it is related to user terminal, car-mounted terminal, and, server Between information exchange, specifically include:
The user terminal initiates the connection request to the car-mounted terminal;
The car-mounted terminal generates verification result for the connection request, and calculates the first safety ginseng according to the verification result Number, and, the verification result is sent to the server;
The server calculates the second security parameter according to the verification result, and second security parameter is sent to described Car-mounted terminal;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user terminal Whether meet default access to require;
When the user terminal, which does not meet default access, to be required, the car-mounted terminal refuses the connection that the user terminal is initiated Request.
15. a kind of vehicle, which is characterized in that including processor, memory and be stored on the memory and can be described The computer program run on processor is realized when the computer program is executed by the processor as in claim 1 to 7 Described in any item methods.
16. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence realizes the method as described in any one of claims 1 to 7 when the computer program is executed by processor.
CN201910491995.9A 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle Active CN110189452B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910491995.9A CN110189452B (en) 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910491995.9A CN110189452B (en) 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle

Publications (2)

Publication Number Publication Date
CN110189452A true CN110189452A (en) 2019-08-30
CN110189452B CN110189452B (en) 2022-07-12

Family

ID=67720828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910491995.9A Active CN110189452B (en) 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle

Country Status (1)

Country Link
CN (1) CN110189452B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112256003A (en) * 2020-10-16 2021-01-22 英博超算(南京)科技有限公司 Method for guaranteeing safety of remote control parking process
CN113353022A (en) * 2020-03-05 2021-09-07 广州汽车集团股份有限公司 Vehicle anti-theft method and system and vehicle-mounted equipment
CN113572718A (en) * 2020-04-29 2021-10-29 华为技术有限公司 Login method, login device, electronic equipment and storage medium
CN114466357A (en) * 2022-02-28 2022-05-10 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006042469A1 (en) * 2004-10-22 2006-04-27 Beijing Watch Data System Co., Ltd A dynamic password authentication system and the method thereof
CN101035192A (en) * 2007-04-06 2007-09-12 中兴通讯股份有限公司 Fast network access method upon restart of IP STB
JP2007272320A (en) * 2006-03-30 2007-10-18 Mitsubishi Electric Corp Entry management system
CN101119207A (en) * 2007-09-21 2008-02-06 北京意科通信技术有限责任公司 Authorization control method aimed at server
CN101331707A (en) * 2005-12-20 2008-12-24 松下电器产业株式会社 Authentication system and authentication device
EP1482751B1 (en) * 2003-05-29 2009-10-07 Kyocera Corporation Communication system wherein a wireless repeater device sends notifications to wireless LAN terminals
CN101577024A (en) * 2009-02-02 2009-11-11 杭州在信科技有限公司 Method for applying RF-SIM in public transportation system
CN101977202A (en) * 2010-11-11 2011-02-16 北京航空航天大学 One-time password authentication system and authentication method used for B/S (Browser/Server) network structure
CN102169611A (en) * 2010-02-25 2011-08-31 曹松伟 Large self-service intelligent network group charging equipment and guide system for building parking lot
EP2666317B1 (en) * 2011-01-20 2014-12-24 Koninklijke Philips N.V. Method, cognitive radio device and spectrum manager for authenticating and authorizing a plurality of cognitive radio slave devices
CN104767717A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Identity authentication method and device
CN104809773A (en) * 2014-01-23 2015-07-29 中国移动通信集团公司 Entrance guard control method, entrance guard control apparatus, and entrance guard system
CN105491684A (en) * 2015-11-17 2016-04-13 广东好帮手电子科技股份有限公司 Method and system for automatically connecting on-board host computer and Bluetooth device
CN106447840A (en) * 2016-08-26 2017-02-22 合肥若涵信智能工程有限公司 Multifunctional intelligent entrance guard system
CN106961369A (en) * 2017-03-20 2017-07-18 浙江工业职业技术学院 Antitheft security system and method for electric automobile
CN107481328A (en) * 2017-09-14 2017-12-15 珠海优仕达信息科技有限公司 A kind of novel intelligent subway gate passes through method, system and circuit
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN107810526A (en) * 2015-07-01 2018-03-16 三星电子株式会社 User authentication method and equipment
CN108449186A (en) * 2018-06-11 2018-08-24 北京京东金融科技控股有限公司 Safe verification method and device
CN109104403A (en) * 2017-06-21 2018-12-28 沃尔沃汽车公司 Method and system for preventing physical layer trunking from attacking
CN109151060A (en) * 2018-09-28 2019-01-04 广州小鹏汽车科技有限公司 A kind of road surface method for monitoring abnormality, device and computer readable storage medium
CN109446767A (en) * 2018-09-29 2019-03-08 东风汽车有限公司 Vehicle personnel identity safety verification method, equipment and system
CN109660966A (en) * 2018-12-19 2019-04-19 苏州迈荣祥信息科技有限公司 A kind of Research on Vehicle Remote Monitoring System Based on GPRS and method
CN109741499A (en) * 2018-12-29 2019-05-10 深圳市多度科技有限公司 The updating method of user information and device of door access machine

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1482751B1 (en) * 2003-05-29 2009-10-07 Kyocera Corporation Communication system wherein a wireless repeater device sends notifications to wireless LAN terminals
WO2006042469A1 (en) * 2004-10-22 2006-04-27 Beijing Watch Data System Co., Ltd A dynamic password authentication system and the method thereof
CN101331707A (en) * 2005-12-20 2008-12-24 松下电器产业株式会社 Authentication system and authentication device
JP2007272320A (en) * 2006-03-30 2007-10-18 Mitsubishi Electric Corp Entry management system
CN101035192A (en) * 2007-04-06 2007-09-12 中兴通讯股份有限公司 Fast network access method upon restart of IP STB
CN101119207A (en) * 2007-09-21 2008-02-06 北京意科通信技术有限责任公司 Authorization control method aimed at server
CN101577024A (en) * 2009-02-02 2009-11-11 杭州在信科技有限公司 Method for applying RF-SIM in public transportation system
CN102169611A (en) * 2010-02-25 2011-08-31 曹松伟 Large self-service intelligent network group charging equipment and guide system for building parking lot
CN101977202A (en) * 2010-11-11 2011-02-16 北京航空航天大学 One-time password authentication system and authentication method used for B/S (Browser/Server) network structure
EP2666317B1 (en) * 2011-01-20 2014-12-24 Koninklijke Philips N.V. Method, cognitive radio device and spectrum manager for authenticating and authorizing a plurality of cognitive radio slave devices
CN104767717A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Identity authentication method and device
CN104809773A (en) * 2014-01-23 2015-07-29 中国移动通信集团公司 Entrance guard control method, entrance guard control apparatus, and entrance guard system
CN107810526A (en) * 2015-07-01 2018-03-16 三星电子株式会社 User authentication method and equipment
CN105491684A (en) * 2015-11-17 2016-04-13 广东好帮手电子科技股份有限公司 Method and system for automatically connecting on-board host computer and Bluetooth device
CN106447840A (en) * 2016-08-26 2017-02-22 合肥若涵信智能工程有限公司 Multifunctional intelligent entrance guard system
CN106961369A (en) * 2017-03-20 2017-07-18 浙江工业职业技术学院 Antitheft security system and method for electric automobile
CN109104403A (en) * 2017-06-21 2018-12-28 沃尔沃汽车公司 Method and system for preventing physical layer trunking from attacking
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN107481328A (en) * 2017-09-14 2017-12-15 珠海优仕达信息科技有限公司 A kind of novel intelligent subway gate passes through method, system and circuit
CN108449186A (en) * 2018-06-11 2018-08-24 北京京东金融科技控股有限公司 Safe verification method and device
CN109151060A (en) * 2018-09-28 2019-01-04 广州小鹏汽车科技有限公司 A kind of road surface method for monitoring abnormality, device and computer readable storage medium
CN109446767A (en) * 2018-09-29 2019-03-08 东风汽车有限公司 Vehicle personnel identity safety verification method, equipment and system
CN109660966A (en) * 2018-12-19 2019-04-19 苏州迈荣祥信息科技有限公司 A kind of Research on Vehicle Remote Monitoring System Based on GPRS and method
CN109741499A (en) * 2018-12-29 2019-05-10 深圳市多度科技有限公司 The updating method of user information and device of door access machine

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
解全颖等: "基于停放车辆的互联网接入研究", 《西南民族大学学报(自然科学版)》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113353022A (en) * 2020-03-05 2021-09-07 广州汽车集团股份有限公司 Vehicle anti-theft method and system and vehicle-mounted equipment
CN113572718A (en) * 2020-04-29 2021-10-29 华为技术有限公司 Login method, login device, electronic equipment and storage medium
CN113572718B (en) * 2020-04-29 2022-11-04 华为技术有限公司 Login method, login device, electronic equipment and storage medium
CN112256003A (en) * 2020-10-16 2021-01-22 英博超算(南京)科技有限公司 Method for guaranteeing safety of remote control parking process
CN112256003B (en) * 2020-10-16 2022-10-28 英博超算(南京)科技有限公司 Method for guaranteeing safety of remote control parking process
CN114466357A (en) * 2022-02-28 2022-05-10 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
CN114466357B (en) * 2022-02-28 2024-04-19 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method

Also Published As

Publication number Publication date
CN110189452B (en) 2022-07-12

Similar Documents

Publication Publication Date Title
CN110189452A (en) Access processing method, device, system and the vehicle of car key
JP6888845B2 (en) Software updater
CN106850580B (en) A kind of automobile account system and account automatic verification method
US9449445B2 (en) Wireless communication techniques for controlling access granted by a security device
US7280833B2 (en) Mobile communication terminal, server, communication system, communication control method, and communication control program
CN105931330B (en) Intelligent unlocking method and smart lock
CN105101200B (en) A kind of pseudo-base station recognition methods, device and terminal device
US20080003997A1 (en) Restricting and preventing pairing attempts from virus attack and malicious software
CN105594154B (en) Method and system for controlling the access to wireless device
CN108173822A (en) Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
CN105025490A (en) Method and device for identifying pseudo base station
CN110232754A (en) A kind of blue-tooth intelligence unlocking system and method
CN105228143A (en) A kind of refuse messages discrimination method, device and terminal
US8576751B2 (en) Method, mobile station, system and network processor for use in mobile communications
CN110490588A (en) Letter of identity management method, device, computer equipment and storage medium
CN110027507A (en) A kind of the various dimensions lock state switching method and system of shared automobile
CN108734812A (en) Remote unlocking method, apparatus based on ZigBee and system
CN107769978A (en) Management method, system, router and the server that a kind of terminal device networks
CN108540961B (en) V2X-based emergency communication system and method
CN107148021A (en) A kind of wireless access authentication method and a kind of radio reception device
CN109326024A (en) A kind of linked system and processing method based on gate inhibition
CN105631281A (en) Control method and control device based on fingerprint recognition
CN108599968A (en) Information broadcast method for city Internet of Things
CN1110222C (en) Method for establishing connection in mobile communication network
US20060058053A1 (en) Method for logging in a mobile terminal at an access point of a local communication network, and access point and terminal for carrying out the method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant