CN110189452A - Access processing method, device, system and the vehicle of car key - Google Patents
Access processing method, device, system and the vehicle of car key Download PDFInfo
- Publication number
- CN110189452A CN110189452A CN201910491995.9A CN201910491995A CN110189452A CN 110189452 A CN110189452 A CN 110189452A CN 201910491995 A CN201910491995 A CN 201910491995A CN 110189452 A CN110189452 A CN 110189452A
- Authority
- CN
- China
- Prior art keywords
- car
- mounted terminal
- security parameter
- server
- user terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application provides a kind of access processing method of car key, device, system and vehicle, the method is related to user terminal, car-mounted terminal, and, server, which comprises car-mounted terminal receives the connection request that user terminal is initiated;Car-mounted terminal generates verification result for connection request;Car-mounted terminal calculates the first security parameter according to verification result;Verification result is sent to server by car-mounted terminal;Car-mounted terminal receives the second security parameter of server feedback, and the second security parameter is that server is obtained according to verification result calculating;Car-mounted terminal the first security parameter of foundation, and/or, the second security parameter judges whether user terminal meets default access and require;If it is not, then car-mounted terminal refuses connection request, the calculating of security parameter is carried out respectively by using server and car-mounted terminal, and according to first security parameter, and/or, second security parameter carries out access judgement, improves protective capacities, reduces by the probability of Brute Force.
Description
Technical field
This application involves car networking fields, more particularly to the access processing method of car key, device, system and vehicle.
Background technique
Car key develops with technology, and bearing medium appearance form has a diversity, including wrist-watch, mobile phone, ring, with
And card etc..
Currently, the verification mode of car key is generally the authentication secret by server issues, such as: identifying code, dynamic are close
Identification information of code or user terminal etc. is used as verification information, the verification information and service that vehicle is sent by comparing user terminal
Whether the verification information that device is sent unanimously is verified car key.
But when encountering Brute Force the case where, vehicle is less for the countermeasure of Brute Force, generally only for
Freezing or drawing black for account, can not carry out effectively for processing the equipment for the side of cracking, and existing processing mode is only led to
The middle control end for crossing vehicle is protected, and lacks secondary protection, protective capacities is low;When there is the case where network fluctuation, vehicle holds
Easily occur causing verification to fail because the verification information of server can not be obtained, influences the usage experience of user.
Summary of the invention
In view of described problem, the application is proposed in order to provide overcoming described problem or at least being partially solved described ask
Access processing method, device, system and the vehicle of the car key of topic, comprising:
A kind of access processing method of car key, the method are related to user terminal, car-mounted terminal, and, server, institute
The method of stating includes:
The car-mounted terminal receives the connection request that the user terminal is initiated;
The car-mounted terminal generates verification result for the connection request;
The car-mounted terminal calculates the first security parameter according to the verification result;
The verification result is sent to the server by the car-mounted terminal;
The car-mounted terminal receives the second security parameter of the server feedback, and second security parameter is the clothes
Device be engaged according to verification result calculating acquisition;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user
Whether terminal, which meets default access, requires;
If it is not, then the car-mounted terminal refuses the connection request.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement
Whether the user terminal, which meets the step of default access requires, includes:
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
Further, the car-mounted terminal includes: according to the step of verification result the first security parameter of calculating
When the verification result is verification failure, the car-mounted terminal extracts the identification information of the user terminal;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement
Whether the user terminal, which meets the step of default access requires, includes:
When the car-mounted terminal and the server are in notconnect state, the car-mounted terminal judges first peace
Whether population parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement
Whether the user terminal, which meets the step of default access requires, includes:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges second safety
Whether parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
Further, the car-mounted terminal is according to first security parameter, and/or, second security parameter, judgement
Whether the user terminal, which meets the step of default access requires, includes:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges first safety
Whether parameter is less than or equal to the first preset threshold, and, it is pre- to judge whether second security parameter is less than or equal to second
If threshold value;
If so, determining that the user terminal meets default access and requires;
If it is not, then determining that the user terminal does not meet default access and requires.
Further, when the car-mounted terminal receives the second safety ginseng that the server is sent within a preset time
Number then determines that the car-mounted terminal and the server are in connection status, otherwise, it is determined that the car-mounted terminal and the service
Device is in notconnect state.
A kind of access processing method of car key, the method are related to user terminal, car-mounted terminal, and, server, institute
The method of stating includes:
The server receives the verification result that the car-mounted terminal is sent;The verification result is directed to institute for car-mounted terminal
The connection request for stating user terminal initiation generates;
The server calculates the second security parameter according to the verification result;
Second security parameter is sent to the car-mounted terminal by the server;The car-mounted terminal is also used to foundation
First security parameter, and/or, second security parameter judges whether the user terminal meets default access and require,
And do not meet it is described access require when, refuse the connection request;Wherein, first security parameter is described vehicle-mounted
Terminal is calculated according to the verification result and is obtained.
Further, the server includes: according to the step of verification result the second security parameter of calculating
When the verification result is verification failure, the server obtains the user terminal from the car-mounted terminal
Identification information;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server.
Further, the method also includes,
Whether the server is commonly used equipment according to user terminal described in the identification information judgment;
If it is not, then the server joins the default weight acquisition of second reference number of times configuration third second safety
Number.
Further, the method also includes:
When the user terminal is judged as non-commonly used equipment, the server obtains the key that the car-mounted terminal is sent
Spoon information;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
The server generates first and notifies that being sent to the last successful history of key information verification that passes through uses
Family terminal;
Or,
When the user terminal is judged as non-commonly used equipment, the server obtains the key that the car-mounted terminal is sent
Spoon information;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
The server generates the pre-set user terminal that the second notice is sent in the key information.
A kind of access processing unit of car key, is related to user terminal, car-mounted terminal, and, the information between server is handed over
Mutually, wherein the car-mounted terminal specifically includes:
First receiving module, the connection request initiated for receiving the user terminal;
Generation module, for generating verification result for the connection request;
First computing module, for calculating the first security parameter according to the verification result;
First sending module, for the verification result to be sent to the server;
Second receiving module, for receiving the second security parameter of the server feedback, second security parameter is
The server is calculated according to the verification result and is obtained;
Judgment module is used for according to first security parameter, and/or, second security parameter judges the user
Whether terminal, which meets default access, requires;
Link block is used for if it is not, then the car-mounted terminal refuses the connection request.
A kind of access processing unit of car key, is related to user terminal, car-mounted terminal, and, the information between server is handed over
Mutually, wherein the server specifically includes:
Third receiving module, the verification result sent for receiving the car-mounted terminal;The verification result is vehicle-mounted end
The connection request that end is initiated for the user terminal generates;
Second computing module, for calculating the second security parameter according to the verification result;
Second sending module, for second security parameter to be sent to the car-mounted terminal;
Wherein, the car-mounted terminal is also used to according to first security parameter, and/or, second security parameter is sentenced
Whether the user terminal that breaks, which meets default access, requires, and, when not meeting the access and requiring, refuses the connection and ask
It asks;Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
A kind of access processing system of car key, is related to user terminal, car-mounted terminal, and, the information between server is handed over
Mutually, it specifically includes:
The user terminal initiates the connection request to the car-mounted terminal;
The car-mounted terminal generates verification result for the connection request, and calculates the first peace according to the verification result
Population parameter, and, the verification result is sent to the server;
The server calculates the second security parameter according to the verification result, and second security parameter is sent to
The car-mounted terminal;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user
Whether terminal, which meets default access, requires;
When the user terminal, which does not meet default access, to be required, the car-mounted terminal refuses what the user terminal was initiated
Connection request.
A kind of vehicle, including processor, memory and be stored on the memory and can transport on the processor
Capable computer program, the computer program realize the vehicle key of car-mounted terminal side as described above when being executed by the processor
The step of access processing method of spoon.
A kind of computer readable storage medium stores computer program, the meter on the computer readable storage medium
Calculation machine program realizes the step of access processing method of the car key of car-mounted terminal side as described above when being executed by processor.
The application has the following advantages:
In embodiments herein, the connection request that the user terminal is initiated is received by the car-mounted terminal;Institute
It states car-mounted terminal and generates verification result for the connection request;The car-mounted terminal calculates the first peace according to the verification result
Population parameter;The verification result is sent to the server by the car-mounted terminal;The car-mounted terminal receives the server
Second security parameter of feedback, second security parameter are that the server is obtained according to verification result calculating;It is described
Car-mounted terminal according to first security parameter, and/or, second security parameter judges whether the user terminal meets
Default access requires;If it is not, then the car-mounted terminal refuses the connection request, distinguish by using server and car-mounted terminal
The calculating of security parameter is carried out, and, according to first security parameter, and/or, second security parameter carries out access and sentences
It is fixed, protective capacities is improved, is reduced by the probability of Brute Force.
Detailed description of the invention
It, below will be to attached needed in the description of the present application in order to illustrate more clearly of the technical solution of the application
Figure is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for this field
For those of ordinary skill, without any creative labor, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of step flow chart of the access processing method for car key that one embodiment of the application provides;
Fig. 2 is a kind of step flow chart of the access processing method for car key that one embodiment of the application provides;
Fig. 3 is a kind of structural block diagram of the access processing server for car key that one embodiment of the application provides;
Fig. 4 is a kind of structural block diagram of the access processing car-mounted terminal for car key that one embodiment of the application provides;
Fig. 5 is a kind of structural block diagram of the access processing system for car key that one embodiment of the application provides.
Specific embodiment
It is with reference to the accompanying drawing and specific real to keep the objects, features and advantages of the application more obvious and easy to understand
Applying mode, the present application will be further described in detail.Obviously, described embodiment is some embodiments of the present application, without
It is whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall in the protection scope of this application.
It should be noted that user terminal is the bearing medium of car key information in the application any embodiment,
In, the type of user terminal includes but is not limited to smartwatch, mobile phone, Intelligent bracelet, ring, necklace, and, in card
Any one.
It should be noted that car-mounted terminal is each for controlling vehicle function in vehicle in the application any embodiment
The bearing medium of the application of energy, the control application function of carrying include but is not limited to car key verifying, the note of traveling state of vehicle
Record, the monitoring of car speed, the monitoring of automobile navigation, the switch of vehicle window, the switch and temperature of on-board air conditioner are adjusted, vehicle-mounted music
Broadcasting and volume adjustment, the posture of vehicle seat and the adjusting of position and record, the switch of vehicle-mounted camera and adjusting, vehicle
The switch and unlatching amplitude adjusted of skylight.
Referring to Fig.1, a kind of access processing method of car key of one embodiment of the application offer is shown, feature exists
In, the method is related to user terminal, car-mounted terminal, and, server, which comprises
S101, the car-mounted terminal receive the connection request that the user terminal is initiated;
S102, the car-mounted terminal generate verification result for the connection request;
S103, the car-mounted terminal calculate the first security parameter according to the verification result;
The verification result is sent to the server by S104, the car-mounted terminal;
S105, the car-mounted terminal receive the second security parameter of the server feedback, and second security parameter is
The server is calculated according to the verification result and is obtained;
S106, the car-mounted terminal according to first security parameter, and/or, second security parameter, described in judgement
Whether user terminal, which meets default access, requires;
S107, if it is not, then the car-mounted terminal refuses the connection request.
In embodiments herein, the connection request that the user terminal is initiated is received by the car-mounted terminal;Institute
It states car-mounted terminal and generates verification result for the connection request;The car-mounted terminal calculates the first peace according to the verification result
Population parameter;The verification result is sent to the server by the car-mounted terminal;The car-mounted terminal receives the server
Second security parameter of feedback, second security parameter are that the server is obtained according to verification result calculating;It is described
Car-mounted terminal according to first security parameter, and/or, second security parameter judges whether the user terminal meets
Default access requires;If it is not, then the car-mounted terminal refuses the connection request, distinguish by using server and car-mounted terminal
The calculating of security parameter is carried out, and, according to first security parameter, and/or, second security parameter carries out access and sentences
It is fixed, protective capacities is improved, is reduced by the probability of Brute Force.
In the following, by being further described to the access processing method of car key in the present exemplary embodiment.
As described in above-mentioned steps S101, the car-mounted terminal receives the connection request that the user terminal is initiated;It needs
Bright, the connection request includes the identification information of key information and the user terminal;User terminal passes through its inside portion
Administration includes the connection request of the key information and the identification information using generation, and is sent to the car-mounted terminal.
As an example, the car-mounted terminal and the user terminal carry out the side of the data interaction of the connection request
Formula may include bluetooth connection, NFC (Near Field Communication, near-field communication) connection, and, it is short-range
The mode of the radiofrequency signals such as WLAN (Wireless Local Area Networks, Wireless LAN) connection carries out data friendship
Mutually.
As an example, the key information can be for one for answering user terminal with what car-mounted terminal was attached
Account in, and, for logging in the check code of the account, which can be preset character type password or biological species
Password or character type password or biological species password by dynamic acquisition, wherein character type password includes but is not limited to that pattern is close
Code, gesture password, and, pass through one of number, letter and symbol or the password of a variety of combinations;Biological species password include but
It is not limited to fingerprint, palmmprint, iris, vocal print, and, shape of face.
As an example, the identification information can be MAC Address of Network Card, the bluetooth of user terminal of user terminal
International mobile equipment identity number (IMEI, InternationalMobile Equipment Identity, the movement of MAC Address or user terminal
Equipment international identity code, also known as International Mobile Station Equipment Identification, each mobile device are just endowed one in production
At least one of IMEI, with global uniqueness).These information can uniquely identify each user terminal, vehicle
Mounted terminal can search the history linkage record about the user terminal in car-mounted terminal record by identification information.
As described in above-mentioned steps S102, the car-mounted terminal generates verification result for the connection request;
The car-mounted terminal obtains the key information for including in the connection request, and carries out at verifying to the key information
Reason, specifically, whether the account and password of verifying in the key information match, (matching then verifies success, and mismatch then verifies
Failure), and generate corresponding verification result, it should be noted that the verification result is including at least having whether verify success
Information (comprising verify successfully or verification fails), can also be to indicate the success of the verification result by the fractional value of a score
Whether, specifically, when verify be successfully score be 0, when verification unsuccessfully when score be one be not 0 positive integer.
As described in above-mentioned steps S103, the car-mounted terminal calculates the first security parameter according to the verification result;
As an example, the car-mounted terminal according to the verification result calculate the first security parameter it is previous as also need
A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the car-mounted terminal is without first peace
The calculating of population parameter, or, the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal;
It should be noted that when the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal, institute
It states car-mounted terminal and deletes the number to fail in its own storage with the verification of the identification information match.
In the concrete realization, after verifying the key information success, the car-mounted terminal is by record about the use
First reference number of times of family terminal is zeroed, that is, the number zero for verifying failure, therefore, when the user terminal is primary
Connection request retransmits new connection request after being proved to be successful when, the first safety ginseng for being directed to the new connection request is calculated
Number when, based on the first reference number of times be zero.
In another embodiment, when the verification result is verification failure, it is whole that the car-mounted terminal extracts the user
The identification information at end, specifically, the car-mounted terminal extracts the identification information of the user terminal from the connection request;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times, specifically
For the car-mounted terminal finds out the history verification information with the identification information match, history verifying from itself storage
Information includes the successful number of verification, and, verify the number of failure;The car-mounted terminal filters out time of the verification failure
Number is used as first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal, is needed
It is noted that the first default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc.
Condition calculates the first security parameter.
In the concrete realization, it when the described first default weight is a default design factor, is obtained in the car-mounted terminal
After first reference number of times, first reference number of times is preset into design factor multiplied by this, obtains first security parameter,
Such as: first reference number of times is 8 times, and presetting design factor is 10, then first safety coefficient is 80.
As described in above-mentioned steps S104, the verification result is sent to the server by the car-mounted terminal;
In one embodiment, after the step of verification result is sent to the server by the car-mounted terminal,
The car-mounted terminal judges whether to be in connection status with the server, specifically, the car-mounted terminal judges whether pre-
If receiving the second security parameter that the server is sent in the time;It should be noted that in the car-mounted terminal to described
After server sends the first security parameter, the car-mounted terminal will be in the shape of feedback signal to be received within a preset time
State, judges whether server feeds back the second security parameter within a preset time.
When the car-mounted terminal receives the second security parameter that the server is sent within a preset time, then institute is determined
It states car-mounted terminal and the server is in connection status, otherwise (including never feed back, and, the second safety of feedback
Parameter duration is more than two kinds of situations of preset time), determine that the car-mounted terminal and the server are in notconnect state.
When being in an off state with the server, the car-mounted terminal is according to described in first security parameter judgement
Whether user terminal meets the access requirement, that is, judges whether first security parameter is greater than first preset threshold.
As described in above-mentioned steps S105, the car-mounted terminal receives the second security parameter of the server feedback, described
Second security parameter is that the server is obtained according to verification result calculating;
It should be noted that second security parameter can be a fractional value, specifically, the server is according to
Verification result, which calculates, to be obtained,
As an example, the server according to the verification result calculate the second security parameter it is previous as also need
A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the server is without second safety
The calculating of parameter, or, the calculated result of second security parameter is directly denoted as 0 by the server;
It should be noted that when the calculated result of second security parameter is directly denoted as 0 by the server, it is described
Server deletes the number in its own storage with the verification failure of the identification information match.
In the concrete realization, after verifying the key information success, the server is by record about the user
Number zero in the number of the verification failure of terminal about the verification failure of the car-mounted terminal of currently transmitted verification result, because
This, when the user terminal retransmits for after being once proved to be successful for the connection request of current car-mounted terminal and works as front truck
When the new connection request of mounted terminal, calculating is when being directed to the second security parameter of the new connection request, based on the
Two reference number of times are also relevant to preceding car-mounted terminal is deserved equal to the number about the verification failure of the user terminal is subtracted
Verify the number of failure.
In another embodiment, when the verification result is verification failure, the server extracts the user terminal
Identification information, specifically, the server obtains the identification information of the user terminal from the car-mounted terminal;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times, specifically
For the server finds out the history verification information with the identification information match, history verifying letter from itself storage
Breath includes the successful number of verification, and, verify the number of failure;The number that the screening server goes out the verification failure is made
For second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server, is needed
Illustrating, the second default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc.
Condition calculates the second security parameter.
In the concrete realization, when the described second default weight is a default design factor, institute is obtained in the server
After stating the second reference number of times, second reference number of times is preset into design factor multiplied by this, obtains second security parameter,
Such as: second reference number of times is 8 times, and presetting design factor is 10, then second safety coefficient is 80.
As described in above-mentioned steps S106, the car-mounted terminal according to first security parameter, and/or, it is described second peace
Population parameter, judges whether the user terminal meets default access and require;
It should be noted that the car-mounted terminal is according to first security parameter, and/or, second security parameter,
Judge whether the user terminal meets the step of default access requires, specifically,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires.
It should be noted that how the car-mounted terminal is directed to using the first security parameter, and, the second security parameter
Actual conditions in this application, generally depending on the connection status based on the car-mounted terminal and the server, specific point
For following situations:
In situation one, when the car-mounted terminal is in notconnect state with the server,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires.
In situation two, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires.
In situation three, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether first security parameter is less than or equal to the first preset threshold, and, judgement
Whether second security parameter is less than or equal to the second preset threshold;
If so, determining that the user terminal meets default access and requires;If it is not, then determining that the user terminal is not met
Default access requires.
It should be noted that having and only being preset when first security parameter is less than or equal to first in situation three
Threshold value, and, when second security parameter is less than or equal to the second preset threshold while reaching, the user terminal just meets
It presets access to require, remaining judging result is that the user terminal does not meet default access requirement.
It should be noted that in the case where the car-mounted terminal and the server are in connection status, situation two and situation three
Select a use, generally selected according to preset condition, preset condition such as: whether user already authenticated's terminal in the common period
It carries out verifying or whether user already authenticated's terminal is in common ground.
In the concrete realization, in above-mentioned three kinds of situations, when for calculating first security parameter and the second safety ginseng
When several default weights is a coefficient equal to 10, first preset threshold and second preset threshold are preferably equal,
And it is equal to 100.
As described in above-mentioned steps S107, if it is not, then the car-mounted terminal refuses the connection request.
It should be noted that when the user terminal is judged to not meeting default access by the car-mounted terminal and requires,
The car-mounted terminal refuses the first connection request that the user terminal is initiated at this time, and disconnects the company with the user terminal
It connects;
In one embodiment, after the car-mounted terminal disconnects the connection with the user terminal, also by the mark
Information update enters in blacklist.
After the connection request of the user terminal is rejected, the car-mounted terminal is by the identification information of the user terminal
It is updated in the blacklist, at this point, the user terminal corresponding with the identification information will be unable to and the car-mounted terminal
Connection, the blacklist can be uploaded to together the server, institute in the vehicle-mounted progress log update with its operation log
Server is stated periodically to summarize the blacklist obtained from each car-mounted terminal by way of update and be sent to each vehicle
Mounted terminal, to improve the protection to vehicle, and, improve the safety that user uses.
Thing, the car-mounted terminal access are required when the user terminal is judged to meeting default access by the car-mounted terminal
The user terminal, user can start the corresponding vehicle of the car-mounted terminal, and, by the user terminal to the vehicle
Mounted terminal is controlled, and is realized and is manipulated by the user terminal to the control application in the car-mounted terminal.
Referring to Fig. 2, a kind of access processing method of car key of one embodiment of the application offer is shown, the method relates to
And user terminal, car-mounted terminal, and, server, which comprises
S201, the server receive the verification result that the car-mounted terminal is sent;The verification result is car-mounted terminal
The connection request initiated for the user terminal generates;
S202, the server calculate the second security parameter according to the verification result;
Second security parameter is sent to the car-mounted terminal by S203, the server;
The car-mounted terminal is also used to according to first security parameter, and/or, second security parameter judges institute
It states user terminal and whether meets default access and require, and, when not meeting the access and requiring, refuse the connection request;
Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
In embodiments herein, the verification result that the car-mounted terminal is sent is received by the server;It is described
Verification result is that the connection request that car-mounted terminal is initiated for the user terminal generates;The server is tied according to the verifying
Fruit calculates the second security parameter;Second security parameter is sent to the car-mounted terminal by the server;The vehicle-mounted end
End is also used to according to first security parameter, and/or, second security parameter judges whether the user terminal meets
Default access requires, and, when not meeting the access and requiring, refuse the connection request;Wherein, the first safety ginseng
Number is that the car-mounted terminal is obtained according to verification result calculating, carries out safety respectively by using server and car-mounted terminal
The calculating of parameter, and, according to first security parameter, and/or, second security parameter carries out access judgement, improves
Protective capacities is reduced by the probability of Brute Force.
In the following, by being further described to the access processing method of car key in the present exemplary embodiment.
As described in above-mentioned steps S201, the server receives the verification result that the car-mounted terminal is sent;The verifying
As a result the connection request initiated for car-mounted terminal for the user terminal generates;
It should be noted that the verification result is that the car-mounted terminal obtains the key letter for including in the connection request
Breath, and verification processing is carried out to the key information and is obtained, specifically, verify account in the key information and password whether
With (matching then verifies success, and mismatch then verifies failure), and generate corresponding verification result, it should be noted that described to test
Result is demonstrate,proved as that can also be to pass through one point including at least having whether verify successful information (failing comprising verifying successfully or verifying)
Several fractional values indicates the success or not of the verification result, specifically, when verify be successfully score be 0, when verification unsuccessfully the time-division
Number is the positive integer that one is not 0.
It should be noted that the connection request includes the identification information of key information and the user terminal;User is whole
End includes the connection request of the key information and the identification information by its On-premise using generation, and is sent to
The car-mounted terminal.
As an example, the car-mounted terminal and the user terminal carry out the side of the data interaction of the connection request
Formula may include bluetooth connection, NFC (Near Field Communication, near-field communication) connection, and, it is short-range
The mode of the radiofrequency signals such as WLAN (Wireless Local Area Networks, Wireless LAN) connection carries out data friendship
Mutually.
As an example, the key information can be for one for answering user terminal with what car-mounted terminal was attached
Account in, and, for logging in the check code of the account, which can be preset character type password or biological species
Password or character type password or biological species password by dynamic acquisition, wherein character type password includes but is not limited to that pattern is close
Code, gesture password, and, pass through one of number, letter and symbol or the password of a variety of combinations;Biological species password include but
It is not limited to fingerprint, palmmprint, iris, vocal print, and, shape of face.
As an example, the identification information can be MAC Address of Network Card, the bluetooth of user terminal of user terminal
International mobile equipment identity number (IMEI, International Mobile Equipment Identity, the movement of MAC Address or user terminal
Equipment international identity code, also known as International Mobile Station Equipment Identification, each mobile device are just endowed one in production
At least one of IMEI, with global uniqueness).These information can uniquely identify each user terminal, vehicle
Mounted terminal can search the history linkage record about the user terminal in car-mounted terminal record by identification information.
As described in above-mentioned steps S202, the server calculates the second security parameter according to the verification result;
It should be noted that second security parameter can be a fractional value, specifically, the server is according to
Verification result, which calculates, to be obtained.
As an example, the server according to the verification result calculate the second security parameter it is previous as also need
A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the server is without second safety
The calculating of parameter, or, the calculated result of second security parameter is directly denoted as 0 by the server;
It should be noted that when the calculated result of second security parameter is directly denoted as 0 by the server, it is described
Server deletes the number in its own storage with the verification failure of the identification information match.
In the concrete realization, after verifying the key information success, the server is by record about the user
Number zero in the number of the verification failure of terminal about the verification failure of the car-mounted terminal of currently transmitted verification result, because
This, when the user terminal retransmits for after being once proved to be successful for the connection request of current car-mounted terminal and works as front truck
When the new connection request of mounted terminal, calculating is when being directed to the second security parameter of the new connection request, based on the
Two reference number of times are also relevant to preceding car-mounted terminal is deserved equal to the number about the verification failure of the user terminal is subtracted
Verify the number of failure.
In another embodiment, when the verification result is verification failure, the server extracts the user terminal
Identification information, specifically, the server obtains the identification information of the user terminal from the car-mounted terminal;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times, specifically
For the server finds out the history verification information with the identification information match, history verifying letter from itself storage
Breath includes the successful number of verification, and, verify the number of failure;The number that the screening server goes out the verification failure is made
For second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server, is needed
Illustrating, the second default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc.
Condition calculates the second security parameter.
In the concrete realization, when the described second default weight is a default design factor, institute is obtained in the server
After stating the second reference number of times, second reference number of times is preset into design factor multiplied by this, obtains second security parameter,
Such as: second reference number of times is 8 times, and presetting design factor is 10, then second safety coefficient is 80.
In another embodiment, when the verification result is verification failure, the server extracts the user terminal
Identification information, specifically, the server obtains the identification information of the user terminal from the car-mounted terminal;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times, specifically
For the server finds out the history verification information with the identification information match, history verifying letter from itself storage
Breath includes the successful number of verification, and, verify the number of failure;The number that the screening server goes out the verification failure is made
For second reference number of times;
Whether the server is commonly used equipment according to user terminal described in the identification information judgment, specifically, in institute
State after server obtains second reference number of times, judge the identification information whether with preset nearest number using identical keys
The identification information for the user terminal that information is verified and is proved to be successful is identical, this is preset nearest number and is generally 3 times;
When to be identical, then the default weight of second reference number of times configuration second is obtained described second by the server
Security parameter, it should be noted that the second default weight can be a default design factor, or, a preset weight is calculated
Method,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc.
Condition calculates the second security parameter.
In the concrete realization, when the described second default weight is a default design factor, institute is obtained in the server
After stating the second reference number of times, second reference number of times is preset into design factor multiplied by this, obtains second security parameter,
Such as: second reference number of times is 8 times, and presetting design factor is 10, then second safety coefficient is 80.
When to be different, then second reference number of times configuration third is preset weight and obtains described second by the server
Security parameter, it should be noted that the second default weight can be a preset Weight algorithm, specifically, the second reference
Number × predetermined coefficient+default value
In the concrete realization, predetermined coefficient 10, the default value are 50, if second reference number of times is 8 times, then
Second safety coefficient is 130.
In one embodiment, when the user terminal is judged as non-commonly used equipment, the server obtains the vehicle
The key information that mounted terminal is sent;The key information is the connection request that the car-mounted terminal is directed to that the user terminal is initiated
It generates;
The server generates first and notifies that being sent to the last successful history of key information verification that passes through uses
Family terminal;Specifically, being found out by the account information in the key information corresponding with account information the last logical
Cross historical user's terminal of verifying;
As an example, first notification information can be short message, and/or, it is preset in the number key information
The information based on other communication modes, e.g., wechat, QQ, and, Email, first notification information may include, non-
The identification information of commonly used equipment, the connection of non-commonly used equipment log in ground (including but not limited to provinces and cities address), and, non-commonly use sets
Standby connection login time.
In another embodiment, when the user terminal is judged as non-commonly used equipment, described in the server acquisition
The key information that car-mounted terminal is sent;The key information is that the connection that the car-mounted terminal is initiated for the user terminal is asked
It seeks survival into;
The server generates the pre-set user terminal that the second notice is sent in the key information, specifically, passing through
Account information in the key information finds out pre-set user terminal corresponding with account information, the preset user terminal
Emergency contact when occurring other than being generally used for for emergency contact gets account in server and is stolen or improper makes
Used time connection,
As an example, non-normal use can be with are as follows: the use of the user terminal of the account is non-commonly used equipment, uses this
The second safety point of user terminal of account is higher than the second specified threshold, or, the user terminal using the account is drawn into blacklist.
As an example, second notification information can be short message, and/or, it is preset in the number key information
The information based on other communication modes, e.g., wechat, QQ, and, Email, second notification information may include, non-
The identification information of commonly used equipment, the connection of non-commonly used equipment log in ground (including but not limited to provinces and cities address), and, non-commonly use sets
Standby connection login time.
As described in above-mentioned steps S203, second security parameter is sent to the car-mounted terminal by the server;
Second security parameter is sent to the car-mounted terminal, the second safety ginseng by network by the server
Number can be a fractional value, obtain specifically, the server is calculated according to the verification result.
The car-mounted terminal is also used to according to first security parameter, and/or, second security parameter judges institute
It states user terminal and whether meets default access and require, and, when not meeting the access and requiring, refuse the connection request;
Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
It should be noted that the car-mounted terminal is according to first security parameter, and/or, second security parameter,
Judge whether the user terminal meets the step of default access requires, specifically,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires.
It should be noted that how the car-mounted terminal is directed to using the first security parameter, and, the second security parameter
Actual conditions in this application, generally depending on the connection status based on the car-mounted terminal and the server, specific point
For following situations:
In situation one, when the car-mounted terminal is in notconnect state with the server,
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires.
In situation two, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;If it is not, then determining that the user terminal meets
Default access requires.
In situation three, when the car-mounted terminal is in connection status with the server,
The car-mounted terminal judges whether first security parameter is less than or equal to the first preset threshold, and, judgement
Whether second security parameter is less than or equal to the second preset threshold;
If so, determining that the user terminal meets default access and requires;If it is not, then determining that the user terminal is not met
Default access requires.
It should be noted that having and only being preset when first security parameter is less than or equal to first in situation three
Threshold value, and, when second security parameter is less than or equal to the second preset threshold while reaching, the user terminal just meets
It presets access to require, remaining judging result is that the user terminal does not meet default access requirement.
It should be noted that in the case where the car-mounted terminal and the server are in connection status, situation two and situation three
Select a use, generally selected according to preset condition, preset condition such as: whether user already authenticated's terminal in the common period
It carries out verifying or whether user already authenticated's terminal is in common ground.
In the concrete realization, in above-mentioned three kinds of situations, when for calculating first security parameter and the second safety ginseng
When several default weights is a coefficient equal to 10, first preset threshold and second preset threshold are preferably equal,
And it is equal to 100.
When not meeting the access and requiring, then the car-mounted terminal refuses the connection request.
It should be noted that when the user terminal is judged to not meeting default access by the car-mounted terminal and requires,
The car-mounted terminal refuses the first connection request that the user terminal is initiated at this time, and disconnects the company with the user terminal
It connects;
In one embodiment, after the car-mounted terminal disconnects the connection with the user terminal, also by the mark
Information update enters in blacklist.
After the connection request of the user terminal is rejected, the car-mounted terminal is by the identification information of the user terminal
It is updated in the blacklist, at this point, the user terminal corresponding with the identification information will be unable to and the car-mounted terminal
Connection, the blacklist can be uploaded to together the server, institute in the vehicle-mounted progress log update with its operation log
Server is stated periodically to summarize the blacklist obtained from each car-mounted terminal by way of update and be sent to each vehicle
Mounted terminal, to improve the protection to vehicle, and, improve the safety that user uses.
Thing, the car-mounted terminal access are required when the user terminal is judged to meeting default access by the car-mounted terminal
The user terminal, user can start the corresponding vehicle of the car-mounted terminal, and, by the user terminal to the vehicle
Mounted terminal is controlled, and is realized and is manipulated by the user terminal to the control application in the car-mounted terminal.
First security parameter is that the car-mounted terminal is obtained according to verification result calculating, specific as follows:
As an example, the car-mounted terminal according to the verification result calculate the first security parameter it is previous as also need
A judgment step is carried out, to judge whether the verification result is to verify successfully.
In one embodiment, when the verification result is to verify successfully, the car-mounted terminal is without first peace
The calculating of population parameter, or, the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal;
It should be noted that when the calculated result of first security parameter is directly denoted as 0 by the car-mounted terminal, institute
It states car-mounted terminal and deletes the number to fail in its own storage with the verification of the identification information match.
In the concrete realization, after verifying the key information success, the car-mounted terminal is by record about the use
First reference number of times of family terminal is zeroed, that is, the number zero for verifying failure, therefore, when the user terminal is primary
Connection request retransmits new connection request after being proved to be successful when, the first safety ginseng for being directed to the new connection request is calculated
Number when, based on the first reference number of times be zero.
In another embodiment, when the verification result is verification failure, it is whole that the car-mounted terminal extracts the user
The identification information at end, specifically, the car-mounted terminal extracts the identification information of the user terminal from the connection request;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times, specifically
For the car-mounted terminal finds out the history verification information with the identification information match, history verifying from itself storage
Information includes the successful number of verification, and, verify the number of failure;The car-mounted terminal filters out time of the verification failure
Number is used as first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal, is needed
It is noted that the first default weight can be a default design factor, or, a preset Weight algorithm,
As an example, may include in Weight algorithm the Connection Time section, geographical location, and, access time interval etc.
Condition calculates the first security parameter.
In the concrete realization, it when the described first default weight is a default design factor, is obtained in the car-mounted terminal
After first reference number of times, first reference number of times is preset into design factor multiplied by this, obtains first security parameter,
Such as: first reference number of times is 8 times, and presetting design factor is 10, then first safety coefficient is 80.
For the Installation practice of car-mounted terminal side, since it is basically similar to the method embodiment, so description
Fairly simple, related place illustrates referring to the part of the embodiment of the method for car-mounted terminal side.
Referring to Fig. 3, a kind of access processing unit of car key of one embodiment of the application offer is shown, is related to user's end
End, car-mounted terminal, and, the information exchange between server, wherein the car-mounted terminal specifically includes:
First receiving module 101, the connection request initiated for receiving the user terminal;
Generation module 102, for generating verification result for the connection request;
First computing module 103, for calculating the first security parameter according to the verification result;
First sending module 104, for the verification result to be sent to the server;
Second receiving module 105, for receiving the second security parameter of the server feedback, second security parameter
It is calculated and is obtained according to the verification result for the server;
Judgment module 106, for according to first security parameter, and/or, second security parameter, described in judgement
Whether user terminal, which meets default access, requires;
Link block 107 is used for if it is not, then the car-mounted terminal refuses the connection request.
For the Installation practice of server side, since it is basically similar to the method embodiment, so the ratio of description
Relatively simple, related place illustrates referring to the part of the embodiment of the method for server side.
Referring to Fig. 4, a kind of access processing unit of car key of one embodiment of the application offer is shown, is related to user's end
End, car-mounted terminal, and, the information exchange between server, wherein the server specifically includes:
Third receiving module 201, the verification result sent for receiving the car-mounted terminal;The verification result is vehicle-mounted
The connection request that terminal is initiated for the user terminal generates;
Second computing module 202, for calculating the second security parameter according to the verification result;
Second sending module 203, for second security parameter to be sent to the car-mounted terminal;
Wherein, the car-mounted terminal is also used to according to first security parameter, and/or, second security parameter is sentenced
Whether the user terminal that breaks, which meets default access, requires, and, when not meeting the access and requiring, refuses the connection and ask
It asks;Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
For system embodiments, since it is substantially similar to server side and car-mounted terminal side embodiment of the method, institute
To be described relatively simple, the relevent part can refer to the partial explaination of embodiments of method.
Referring to Fig. 5, a kind of access processing system of car key of the application is shown, user terminal 300, car-mounted terminal are related to
200, and, the information exchange between server 100 specifically includes:
The user terminal 300 initiates the connection request to the car-mounted terminal 200;
The car-mounted terminal 200 generates verification result for the connection request, and calculates the according to the verification result
One security parameter, and, the verification result is sent to the server 100;
The server 100 calculates the second security parameter according to the verification result, and second security parameter is sent out
It send to the car-mounted terminal 200;
The car-mounted terminal 200 according to first security parameter, and/or, second security parameter judges the use
Whether family terminal 300, which meets default access, requires;
When the user terminal 300, which does not meet default access, to be required, it is whole that the car-mounted terminal 200 refuses the user
The connection request that end 300 is initiated.
In the following, by being further described to the access processing method of car key in the present exemplary embodiment.
The user terminal 300 initiates the connection request to the car-mounted terminal 200, wherein the connection request includes key
The identification information of spoon information and the user terminal 300;User terminal 300 is generated by the application of its On-premise comprising
The connection request of key information and the identification information is stated, and is sent to the car-mounted terminal 200.
The car-mounted terminal 200 generates the verification result for being directed to the connection request according to key information, and according to described
Verification result and the identification information calculate the first security parameter, and first security parameter is sent to the server
100;When the verification result is verification failure, the car-mounted terminal 200 is according to the identification information from the information of storage
The verification number with the identification information match is found out, then is screened out from it the number of verification failure as the first reference time
Number;First security parameter is calculated according to the first reference number of times in the car-mounted terminal 200.
The server 100 calculates the second security parameter according to the verification result, and second security parameter is sent out
It send to the car-mounted terminal 200, specifically includes:
The server 100 receives the verification result that the car-mounted terminal 200 is sent;
The server 100 receives the verification result of the transmission of car-mounted terminal 200 by network.
When the verification result is verification failure, the server 100 extracts the mark letter from the car-mounted terminal
Breath, the verification number with the identification information match is found out according to the identification information, then therefrom sieve from the information of storage
The number of verification failure is selected as the second reference number of times;The server 100 is calculated described according to the second reference number of times
Second security parameter.
Second security parameter is sent to the car-mounted terminal 200 by the server 100;
Second security parameter is sent to the car-mounted terminal 200 by network by the server 100, described
Two security parameters can be a fractional value, obtain specifically, the server 100 is calculated according to the verification result.
The car-mounted terminal 200 according to first security parameter, and/or, second security parameter judges the use
Whether family terminal 300, which meets default access, requires;If not meeting, the car-mounted terminal 200 is refused the user terminal 300 and is initiated
Connection request.
It should be noted that according to first security parameter, and/or, second security parameter judges the user
Whether terminal 300, which meets default access, requires, and specially judges whether first security parameter is greater than the first preset threshold;
And/or judge whether second security parameter is greater than the second preset threshold.
In the concrete realization, how the car-mounted terminal 200 is directed to using the first security parameter, and, the second safety
The actual conditions of parameter in this application, generally the connection status based on the car-mounted terminal 200 and the server 100 and
It is fixed, it is specifically divided into following situations:
In situation one, 100 when notconnect state at the car-mounted terminal 200 and the server,
The car-mounted terminal 200 judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal 300 does not meet default access and requires;If it is not, then determining the user terminal
300, which meet default access, requires.
In situation two, when the car-mounted terminal 200 is in connection status with the server 100,
The car-mounted terminal 200 judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal 300 does not meet default access and requires;If it is not, then determining the user terminal
300, which meet default access, requires.
In situation three, when the car-mounted terminal 200 is in connection status with the server 100,
The car-mounted terminal 200 judges whether first security parameter is less than or equal to the first preset threshold, and, sentence
Whether second security parameter that breaks is less than or equal to the second preset threshold;
If so, determining that the user terminal 300 meets default access and requires;If it is not, then determining the user terminal 300
Default access is not met to require.
It should be noted that having and only being preset when first security parameter is less than or equal to first in situation three
Threshold value, and, when second security parameter is less than or equal to the second preset threshold while reaching, the user terminal 300 is
Meet and preset access requirement, remaining judging result is that the user terminal 300 does not meet default access requirement.
In the concrete realization, in above-mentioned three kinds of situations, when for calculating first security parameter and the second safety ginseng
When several default weights is a coefficient equal to 10, first preset threshold and second preset threshold are preferably equal,
And it is equal to 100.
A kind of vehicle that one embodiment of the application provides, including processor, memory and be stored on the memory simultaneously
The computer program that can be run on the processor, the computer program realize institute as above when being executed by the processor
The step of access processing method of the car key for the car-mounted terminal side stated.
A kind of computer readable storage medium that one embodiment of the application provides is deposited on the computer readable storage medium
Computer program is stored up, the computer program realizes connecing for the car key of car-mounted terminal side as described above when being executed by processor
The step of entering processing method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to the access processing method of car key provided herein, device, system and vehicle, detailed Jie has been carried out
It continues, specific examples are used herein to illustrate the principle and implementation manner of the present application, and the explanation of above embodiments is only
It is to be used to help understand the method for this application and its core ideas;At the same time, for those skilled in the art, according to this Shen
Thought please, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage
Solution is the limitation to the application.
Claims (16)
1. a kind of access processing method of car key, which is characterized in that the method is related to user terminal, car-mounted terminal, and,
Server, which comprises
The car-mounted terminal receives the connection request that the user terminal is initiated;
The car-mounted terminal generates verification result for the connection request;
The car-mounted terminal calculates the first security parameter according to the verification result;
The verification result is sent to the server by the car-mounted terminal;
The car-mounted terminal receives the second security parameter of the server feedback, and second security parameter is the server
It is calculated and is obtained according to the verification result;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user terminal
Whether meet default access to require;
If it is not, then the car-mounted terminal refuses the connection request.
2. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/
Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
The car-mounted terminal judges whether first security parameter is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires;
And/or
The car-mounted terminal judges whether second security parameter is greater than the second preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
3. the method according to claim 1, wherein the car-mounted terminal calculates first according to the verification result
The step of security parameter includes:
When the verification result is verification failure, the car-mounted terminal extracts the identification information of the user terminal;
The car-mounted terminal statistics number to fail that verifies corresponding with the identification information is the first reference number of times;
The default weight of first reference number of times configuration first is obtained first security parameter by the car-mounted terminal.
4. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/
Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
When the car-mounted terminal and the server are in notconnect state, the car-mounted terminal judges the first safety ginseng
Whether number is greater than the first preset threshold;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
5. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/
Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges second security parameter
Whether the second preset threshold is greater than;
If so, determining that the user terminal does not meet default access and requires;
If it is not, then determining that the user terminal meets default access and requires.
6. the method according to claim 1, wherein the car-mounted terminal is according to first security parameter, and/
Or, second security parameter, judges whether the user terminal meets the step of default access requires and include:
When the car-mounted terminal and the server are in connection status, the car-mounted terminal judges first security parameter
Whether first preset threshold is less than or equal to, and, judge whether second security parameter is less than or equal to the second default threshold
Value;
If so, determining that the user terminal meets default access and requires;
If it is not, then determining that the user terminal does not meet default access and requires.
7. according to method described in claim 4-6 any one, which is characterized in that when the car-mounted terminal within a preset time
The second security parameter that the server is sent is received, then determines that the car-mounted terminal and the server are in connection shape
State, otherwise, it is determined that the car-mounted terminal and the server are in notconnect state.
8. a kind of access processing method of car key, which is characterized in that the method is related to user terminal, car-mounted terminal, and,
Server, which comprises
The server receives the verification result that the car-mounted terminal is sent;The verification result is that car-mounted terminal is directed to the use
The connection request that family terminal is initiated generates;
The server calculates the second security parameter according to the verification result;
Second security parameter is sent to the car-mounted terminal by the server;The car-mounted terminal is also used to according to described in
First security parameter, and/or, second security parameter judges whether the user terminal meets default access and require, with
And do not meet it is described access require when, refuse the connection request;Wherein, first security parameter is the vehicle-mounted end
End calculates according to the verification result and obtains.
9. according to the method described in claim 8, it is characterized in that, the server calculates the second peace according to the verification result
The step of population parameter includes:
When the verification result is verification failure, the server obtains the mark of the user terminal from the car-mounted terminal
Know information;
The number of server statistics verification failure corresponding with the identification information is the second reference number of times;
The default weight of second reference number of times configuration second is obtained second security parameter by the server.
10. according to the method described in claim 9, it is characterized in that, the method also includes,
Whether the server is commonly used equipment according to user terminal described in the identification information judgment;
If it is not, then second reference number of times configuration third is preset weight and obtains second security parameter by the server.
11. according to the method described in claim 9, it is characterized in that, the method also includes:
When the user terminal is judged as non-commonly used equipment, the server obtains the key letter that the car-mounted terminal is sent
Breath;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
First notice of server generation is sent to the last by key information verification successful historical user's end
End;
Or,
When the user terminal is judged as non-commonly used equipment, the server obtains the key letter that the car-mounted terminal is sent
Breath;The key information is that the connection request that the car-mounted terminal is initiated for the user terminal generates;
The server generates the pre-set user terminal that the second notice is sent in the key information.
12. a kind of access processing unit of car key, which is characterized in that it is related to user terminal, car-mounted terminal, and, server
Between information exchange, wherein the car-mounted terminal specifically includes:
First receiving module, the connection request initiated for receiving the user terminal;
Generation module, for generating verification result for the connection request;
First computing module, for calculating the first security parameter according to the verification result;
First sending module, for the verification result to be sent to the server;
Second receiving module, for receiving the second security parameter of the server feedback, second security parameter is described
Server is calculated according to the verification result and is obtained;
Judgment module is used for according to first security parameter, and/or, second security parameter judges the user terminal
Whether meet default access to require;
Link block is used for if it is not, then the car-mounted terminal refuses the connection request.
13. a kind of access processing unit of car key, which is characterized in that it is related to user terminal, car-mounted terminal, and, server
Between information exchange, wherein the server specifically includes:
Third receiving module, the verification result sent for receiving the car-mounted terminal;The verification result is car-mounted terminal needle
The connection request that the user terminal is initiated is generated;
Second computing module, for calculating the second security parameter according to the verification result;
Second sending module, for second security parameter to be sent to the car-mounted terminal;
Wherein, the car-mounted terminal is also used to according to first security parameter, and/or, second security parameter judges institute
It states user terminal and whether meets default access and require, and, when not meeting the access and requiring, refuse the connection request;
Wherein, first security parameter is that the car-mounted terminal is obtained according to verification result calculating.
14. a kind of access processing system of car key, which is characterized in that it is related to user terminal, car-mounted terminal, and, server
Between information exchange, specifically include:
The user terminal initiates the connection request to the car-mounted terminal;
The car-mounted terminal generates verification result for the connection request, and calculates the first safety ginseng according to the verification result
Number, and, the verification result is sent to the server;
The server calculates the second security parameter according to the verification result, and second security parameter is sent to described
Car-mounted terminal;
The car-mounted terminal according to first security parameter, and/or, second security parameter judges the user terminal
Whether meet default access to require;
When the user terminal, which does not meet default access, to be required, the car-mounted terminal refuses the connection that the user terminal is initiated
Request.
15. a kind of vehicle, which is characterized in that including processor, memory and be stored on the memory and can be described
The computer program run on processor is realized when the computer program is executed by the processor as in claim 1 to 7
Described in any item methods.
16. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence realizes the method as described in any one of claims 1 to 7 when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910491995.9A CN110189452B (en) | 2019-06-06 | 2019-06-06 | Vehicle key access processing method, device and system and vehicle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910491995.9A CN110189452B (en) | 2019-06-06 | 2019-06-06 | Vehicle key access processing method, device and system and vehicle |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110189452A true CN110189452A (en) | 2019-08-30 |
CN110189452B CN110189452B (en) | 2022-07-12 |
Family
ID=67720828
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910491995.9A Active CN110189452B (en) | 2019-06-06 | 2019-06-06 | Vehicle key access processing method, device and system and vehicle |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110189452B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112256003A (en) * | 2020-10-16 | 2021-01-22 | 英博超算(南京)科技有限公司 | Method for guaranteeing safety of remote control parking process |
CN113353022A (en) * | 2020-03-05 | 2021-09-07 | 广州汽车集团股份有限公司 | Vehicle anti-theft method and system and vehicle-mounted equipment |
CN113572718A (en) * | 2020-04-29 | 2021-10-29 | 华为技术有限公司 | Login method, login device, electronic equipment and storage medium |
CN114466357A (en) * | 2022-02-28 | 2022-05-10 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006042469A1 (en) * | 2004-10-22 | 2006-04-27 | Beijing Watch Data System Co., Ltd | A dynamic password authentication system and the method thereof |
CN101035192A (en) * | 2007-04-06 | 2007-09-12 | 中兴通讯股份有限公司 | Fast network access method upon restart of IP STB |
JP2007272320A (en) * | 2006-03-30 | 2007-10-18 | Mitsubishi Electric Corp | Entry management system |
CN101119207A (en) * | 2007-09-21 | 2008-02-06 | 北京意科通信技术有限责任公司 | Authorization control method aimed at server |
CN101331707A (en) * | 2005-12-20 | 2008-12-24 | 松下电器产业株式会社 | Authentication system and authentication device |
EP1482751B1 (en) * | 2003-05-29 | 2009-10-07 | Kyocera Corporation | Communication system wherein a wireless repeater device sends notifications to wireless LAN terminals |
CN101577024A (en) * | 2009-02-02 | 2009-11-11 | 杭州在信科技有限公司 | Method for applying RF-SIM in public transportation system |
CN101977202A (en) * | 2010-11-11 | 2011-02-16 | 北京航空航天大学 | One-time password authentication system and authentication method used for B/S (Browser/Server) network structure |
CN102169611A (en) * | 2010-02-25 | 2011-08-31 | 曹松伟 | Large self-service intelligent network group charging equipment and guide system for building parking lot |
EP2666317B1 (en) * | 2011-01-20 | 2014-12-24 | Koninklijke Philips N.V. | Method, cognitive radio device and spectrum manager for authenticating and authorizing a plurality of cognitive radio slave devices |
CN104767717A (en) * | 2014-01-03 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Identity authentication method and device |
CN104809773A (en) * | 2014-01-23 | 2015-07-29 | 中国移动通信集团公司 | Entrance guard control method, entrance guard control apparatus, and entrance guard system |
CN105491684A (en) * | 2015-11-17 | 2016-04-13 | 广东好帮手电子科技股份有限公司 | Method and system for automatically connecting on-board host computer and Bluetooth device |
CN106447840A (en) * | 2016-08-26 | 2017-02-22 | 合肥若涵信智能工程有限公司 | Multifunctional intelligent entrance guard system |
CN106961369A (en) * | 2017-03-20 | 2017-07-18 | 浙江工业职业技术学院 | Antitheft security system and method for electric automobile |
CN107481328A (en) * | 2017-09-14 | 2017-12-15 | 珠海优仕达信息科技有限公司 | A kind of novel intelligent subway gate passes through method, system and circuit |
CN107685714A (en) * | 2017-08-30 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | Intelligent vehicle key system and its control method |
CN107810526A (en) * | 2015-07-01 | 2018-03-16 | 三星电子株式会社 | User authentication method and equipment |
CN108449186A (en) * | 2018-06-11 | 2018-08-24 | 北京京东金融科技控股有限公司 | Safe verification method and device |
CN109104403A (en) * | 2017-06-21 | 2018-12-28 | 沃尔沃汽车公司 | Method and system for preventing physical layer trunking from attacking |
CN109151060A (en) * | 2018-09-28 | 2019-01-04 | 广州小鹏汽车科技有限公司 | A kind of road surface method for monitoring abnormality, device and computer readable storage medium |
CN109446767A (en) * | 2018-09-29 | 2019-03-08 | 东风汽车有限公司 | Vehicle personnel identity safety verification method, equipment and system |
CN109660966A (en) * | 2018-12-19 | 2019-04-19 | 苏州迈荣祥信息科技有限公司 | A kind of Research on Vehicle Remote Monitoring System Based on GPRS and method |
CN109741499A (en) * | 2018-12-29 | 2019-05-10 | 深圳市多度科技有限公司 | The updating method of user information and device of door access machine |
-
2019
- 2019-06-06 CN CN201910491995.9A patent/CN110189452B/en active Active
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1482751B1 (en) * | 2003-05-29 | 2009-10-07 | Kyocera Corporation | Communication system wherein a wireless repeater device sends notifications to wireless LAN terminals |
WO2006042469A1 (en) * | 2004-10-22 | 2006-04-27 | Beijing Watch Data System Co., Ltd | A dynamic password authentication system and the method thereof |
CN101331707A (en) * | 2005-12-20 | 2008-12-24 | 松下电器产业株式会社 | Authentication system and authentication device |
JP2007272320A (en) * | 2006-03-30 | 2007-10-18 | Mitsubishi Electric Corp | Entry management system |
CN101035192A (en) * | 2007-04-06 | 2007-09-12 | 中兴通讯股份有限公司 | Fast network access method upon restart of IP STB |
CN101119207A (en) * | 2007-09-21 | 2008-02-06 | 北京意科通信技术有限责任公司 | Authorization control method aimed at server |
CN101577024A (en) * | 2009-02-02 | 2009-11-11 | 杭州在信科技有限公司 | Method for applying RF-SIM in public transportation system |
CN102169611A (en) * | 2010-02-25 | 2011-08-31 | 曹松伟 | Large self-service intelligent network group charging equipment and guide system for building parking lot |
CN101977202A (en) * | 2010-11-11 | 2011-02-16 | 北京航空航天大学 | One-time password authentication system and authentication method used for B/S (Browser/Server) network structure |
EP2666317B1 (en) * | 2011-01-20 | 2014-12-24 | Koninklijke Philips N.V. | Method, cognitive radio device and spectrum manager for authenticating and authorizing a plurality of cognitive radio slave devices |
CN104767717A (en) * | 2014-01-03 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Identity authentication method and device |
CN104809773A (en) * | 2014-01-23 | 2015-07-29 | 中国移动通信集团公司 | Entrance guard control method, entrance guard control apparatus, and entrance guard system |
CN107810526A (en) * | 2015-07-01 | 2018-03-16 | 三星电子株式会社 | User authentication method and equipment |
CN105491684A (en) * | 2015-11-17 | 2016-04-13 | 广东好帮手电子科技股份有限公司 | Method and system for automatically connecting on-board host computer and Bluetooth device |
CN106447840A (en) * | 2016-08-26 | 2017-02-22 | 合肥若涵信智能工程有限公司 | Multifunctional intelligent entrance guard system |
CN106961369A (en) * | 2017-03-20 | 2017-07-18 | 浙江工业职业技术学院 | Antitheft security system and method for electric automobile |
CN109104403A (en) * | 2017-06-21 | 2018-12-28 | 沃尔沃汽车公司 | Method and system for preventing physical layer trunking from attacking |
CN107685714A (en) * | 2017-08-30 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | Intelligent vehicle key system and its control method |
CN107481328A (en) * | 2017-09-14 | 2017-12-15 | 珠海优仕达信息科技有限公司 | A kind of novel intelligent subway gate passes through method, system and circuit |
CN108449186A (en) * | 2018-06-11 | 2018-08-24 | 北京京东金融科技控股有限公司 | Safe verification method and device |
CN109151060A (en) * | 2018-09-28 | 2019-01-04 | 广州小鹏汽车科技有限公司 | A kind of road surface method for monitoring abnormality, device and computer readable storage medium |
CN109446767A (en) * | 2018-09-29 | 2019-03-08 | 东风汽车有限公司 | Vehicle personnel identity safety verification method, equipment and system |
CN109660966A (en) * | 2018-12-19 | 2019-04-19 | 苏州迈荣祥信息科技有限公司 | A kind of Research on Vehicle Remote Monitoring System Based on GPRS and method |
CN109741499A (en) * | 2018-12-29 | 2019-05-10 | 深圳市多度科技有限公司 | The updating method of user information and device of door access machine |
Non-Patent Citations (1)
Title |
---|
解全颖等: "基于停放车辆的互联网接入研究", 《西南民族大学学报(自然科学版)》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113353022A (en) * | 2020-03-05 | 2021-09-07 | 广州汽车集团股份有限公司 | Vehicle anti-theft method and system and vehicle-mounted equipment |
CN113572718A (en) * | 2020-04-29 | 2021-10-29 | 华为技术有限公司 | Login method, login device, electronic equipment and storage medium |
CN113572718B (en) * | 2020-04-29 | 2022-11-04 | 华为技术有限公司 | Login method, login device, electronic equipment and storage medium |
CN112256003A (en) * | 2020-10-16 | 2021-01-22 | 英博超算(南京)科技有限公司 | Method for guaranteeing safety of remote control parking process |
CN112256003B (en) * | 2020-10-16 | 2022-10-28 | 英博超算(南京)科技有限公司 | Method for guaranteeing safety of remote control parking process |
CN114466357A (en) * | 2022-02-28 | 2022-05-10 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
CN114466357B (en) * | 2022-02-28 | 2024-04-19 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
Also Published As
Publication number | Publication date |
---|---|
CN110189452B (en) | 2022-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110189452A (en) | Access processing method, device, system and the vehicle of car key | |
JP6888845B2 (en) | Software updater | |
CN106850580B (en) | A kind of automobile account system and account automatic verification method | |
US9449445B2 (en) | Wireless communication techniques for controlling access granted by a security device | |
US7280833B2 (en) | Mobile communication terminal, server, communication system, communication control method, and communication control program | |
CN105931330B (en) | Intelligent unlocking method and smart lock | |
CN105101200B (en) | A kind of pseudo-base station recognition methods, device and terminal device | |
US20080003997A1 (en) | Restricting and preventing pairing attempts from virus attack and malicious software | |
CN105594154B (en) | Method and system for controlling the access to wireless device | |
CN108173822A (en) | Intelligent door lock management-control method, intelligent door lock and computer readable storage medium | |
CN105025490A (en) | Method and device for identifying pseudo base station | |
CN110232754A (en) | A kind of blue-tooth intelligence unlocking system and method | |
CN105228143A (en) | A kind of refuse messages discrimination method, device and terminal | |
US8576751B2 (en) | Method, mobile station, system and network processor for use in mobile communications | |
CN110490588A (en) | Letter of identity management method, device, computer equipment and storage medium | |
CN110027507A (en) | A kind of the various dimensions lock state switching method and system of shared automobile | |
CN108734812A (en) | Remote unlocking method, apparatus based on ZigBee and system | |
CN107769978A (en) | Management method, system, router and the server that a kind of terminal device networks | |
CN108540961B (en) | V2X-based emergency communication system and method | |
CN107148021A (en) | A kind of wireless access authentication method and a kind of radio reception device | |
CN109326024A (en) | A kind of linked system and processing method based on gate inhibition | |
CN105631281A (en) | Control method and control device based on fingerprint recognition | |
CN108599968A (en) | Information broadcast method for city Internet of Things | |
CN1110222C (en) | Method for establishing connection in mobile communication network | |
US20060058053A1 (en) | Method for logging in a mobile terminal at an access point of a local communication network, and access point and terminal for carrying out the method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |