CN110189452B - Vehicle key access processing method, device and system and vehicle - Google Patents

Vehicle key access processing method, device and system and vehicle Download PDF

Info

Publication number
CN110189452B
CN110189452B CN201910491995.9A CN201910491995A CN110189452B CN 110189452 B CN110189452 B CN 110189452B CN 201910491995 A CN201910491995 A CN 201910491995A CN 110189452 B CN110189452 B CN 110189452B
Authority
CN
China
Prior art keywords
vehicle
mounted terminal
user terminal
server
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910491995.9A
Other languages
Chinese (zh)
Other versions
CN110189452A (en
Inventor
朱朝卓
周慧能
洪基明
谭绍龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201910491995.9A priority Critical patent/CN110189452B/en
Publication of CN110189452A publication Critical patent/CN110189452A/en
Application granted granted Critical
Publication of CN110189452B publication Critical patent/CN110189452B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The application provides an access processing method, device and system of a vehicle key and a vehicle, wherein the method relates to a user terminal, a vehicle-mounted terminal and a server, and the method comprises the following steps: the vehicle-mounted terminal receives a connection request initiated by a user terminal; the vehicle-mounted terminal generates a verification result aiming at the connection request; the vehicle-mounted terminal calculates a first safety parameter according to the verification result; the vehicle-mounted terminal sends the verification result to the server; the vehicle-mounted terminal receives a second safety parameter fed back by the server, and the second safety parameter is obtained by the server through calculation according to a verification result; the vehicle-mounted terminal judges whether the user terminal meets the preset access requirement or not according to the first safety parameter and/or the second safety parameter; if not, the vehicle-mounted terminal refuses the connection request, the server and the vehicle-mounted terminal are adopted to respectively calculate the security parameters, and the access judgment is carried out according to the first security parameter and/or the second security parameter, so that the protection capability is improved, and the probability of brute force cracking is reduced.

Description

Vehicle key access processing method, device and system and vehicle
Technical Field
The application relates to the field of vehicle networking, in particular to a vehicle key access processing method, device and system and a vehicle.
Background
With the development of the technology, the bearing medium of the car key has diversity, including watches, mobile phones, rings, cards and the like.
At present, the verification mode of the car key is generally a verification key issued by a server, such as: and the vehicle verifies the vehicle key by comparing whether the verification information sent by the user terminal is consistent with the verification information sent by the server or not.
However, when the condition of brute force cracking is met, the vehicle has few coping methods for brute force cracking, generally only aiming at the freezing or blacking of the account number, the equipment of a cracking party cannot be effectively aimed at, and the existing processing mode only protects through the central control end of the vehicle, lacks secondary protection and has low protection capability; when the network fluctuates, the vehicle is prone to verification failure caused by the fact that the verification information of the server cannot be acquired, and the use experience of a user is affected.
Disclosure of Invention
In view of the above, the present application is proposed to provide a method, an apparatus, a system and a vehicle for accessing a vehicle key, which overcome the above problems or at least partially solve the above problems, and includes:
an access processing method of a car key relates to a user terminal, a vehicle-mounted terminal and a server, and comprises the following steps:
the vehicle-mounted terminal receives a connection request initiated by the user terminal;
the vehicle-mounted terminal generates a verification result aiming at the connection request;
the vehicle-mounted terminal calculates a first safety parameter according to the verification result;
the vehicle-mounted terminal sends the verification result to the server;
the vehicle-mounted terminal receives a second safety parameter fed back by the server, wherein the second safety parameter is obtained by the server through calculation according to the verification result;
the vehicle-mounted terminal judges whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter;
if not, the vehicle-mounted terminal rejects the connection request.
Further, the step of the vehicle-mounted terminal judging whether the user terminal meets the preset access requirement according to the first safety parameter and/or the second safety parameter comprises:
the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement;
and/or the presence of a gas in the gas,
the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement.
Further, the step of calculating the first security parameter by the vehicle-mounted terminal according to the verification result comprises:
when the verification result is that the verification fails, the vehicle-mounted terminal extracts the identification information of the user terminal;
the vehicle-mounted terminal counts the times of verification failure corresponding to the identification information as first reference times;
and the vehicle-mounted terminal configures the first reference times with a first preset weight to obtain the first safety parameter.
Further, the step of the vehicle-mounted terminal judging whether the user terminal meets the preset access requirement according to the first safety parameter and/or the second safety parameter includes:
when the vehicle-mounted terminal and the server are in a non-connection state, the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement.
Further, the step of the vehicle-mounted terminal judging whether the user terminal meets the preset access requirement according to the first safety parameter and/or the second safety parameter comprises:
when the vehicle-mounted terminal is in a connection state with the server, the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement.
Further, the step of the vehicle-mounted terminal judging whether the user terminal meets the preset access requirement according to the first safety parameter and/or the second safety parameter includes:
when the vehicle-mounted terminal is in a connection state with the server, the vehicle-mounted terminal judges whether the first safety parameter is smaller than or equal to a first preset threshold value or not, and judges whether the second safety parameter is smaller than or equal to a second preset threshold value or not;
if so, judging that the user terminal meets the preset access requirement;
if not, judging that the user terminal does not meet the preset access requirement.
Further, when the vehicle-mounted terminal receives a second safety parameter sent by the server within a preset time, the vehicle-mounted terminal and the server are judged to be in a connected state, otherwise, the vehicle-mounted terminal and the server are judged to be in a non-connected state.
An access processing method of a car key relates to a user terminal, a vehicle-mounted terminal and a server, and comprises the following steps:
the server receives a verification result sent by the vehicle-mounted terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the server calculates a second security parameter according to the verification result;
the server sends the second safety parameters to the vehicle-mounted terminal; the vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter, and refusing the connection request when the user terminal does not meet the access requirement; and the first safety parameter is obtained by the vehicle-mounted terminal according to the calculation of the verification result.
Further, the step of the server calculating a second security parameter according to the verification result comprises:
when the verification result is that the verification fails, the server acquires the identification information of the user terminal from the vehicle-mounted terminal;
the server counts the times of verification failure corresponding to the identification information as second reference times;
and the server configures the second reference times with a second preset weight to obtain the second safety parameters.
Further, the method may further comprise,
the server judges whether the user terminal is a frequently-used device or not according to the identification information;
if not, the server configures a third preset weight for the second reference times to obtain the second security parameters.
Further, the method further comprises:
when the user terminal is judged to be an unusual device, the server acquires key information sent by the vehicle-mounted terminal; the key information is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the server generates a first notice and sends the first notice to a historical user terminal which passes the key information verification last time and succeeds;
or the like, or, alternatively,
when the user terminal is judged to be an unusual device, the server acquires key information sent by the vehicle-mounted terminal; the key information is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
and the server generates a second notification and sends the second notification to a preset user terminal in the key information.
The utility model provides an access processing apparatus of car key, relates to user terminal, vehicle mounted terminal to and, the information interaction between the server, wherein, vehicle mounted terminal specifically includes:
a first receiving module, configured to receive a connection request initiated by the user terminal;
a generation module for generating a verification result for the connection request;
the first calculation module is used for calculating a first safety parameter according to the verification result;
the first sending module is used for sending the verification result to the server;
the second receiving module is used for receiving a second security parameter fed back by the server, wherein the second security parameter is obtained by the server through calculation according to the verification result;
the judging module is used for judging whether the user terminal meets the preset access requirement or not according to the first safety parameter and/or the second safety parameter;
and the connection module is used for refusing the connection request by the vehicle-mounted terminal if the connection request is not received.
An access processing device of a car key relates to information interaction between a user terminal, a vehicle-mounted terminal and a server, wherein the server specifically comprises:
the third receiving module is used for receiving the verification result sent by the vehicle-mounted terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the second calculation module is used for calculating a second safety parameter according to the verification result;
the second sending module is used for sending the second safety parameters to the vehicle-mounted terminal;
the vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter, and rejecting the connection request when the user terminal does not meet the access requirement; and the first safety parameter is obtained by the vehicle-mounted terminal according to the calculation of the verification result.
The utility model provides an access processing system of car key, relates to user terminal, vehicle-mounted terminal to and, the information interaction between the server specifically includes:
the user terminal initiates a connection request to the vehicle-mounted terminal;
the vehicle-mounted terminal generates a verification result aiming at the connection request, calculates a first safety parameter according to the verification result, and sends the verification result to the server;
the server calculates a second safety parameter according to the verification result and sends the second safety parameter to the vehicle-mounted terminal;
the vehicle-mounted terminal judges whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter;
and when the user terminal does not meet the preset access requirement, the vehicle-mounted terminal refuses the connection request initiated by the user terminal.
A vehicle includes a processor, a memory, and a computer program stored on the memory and capable of running on the processor, and when executed by the processor, the computer program implements the steps of the above-described vehicle key access processing method on the vehicle-mounted terminal side.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the vehicle key access processing method on the vehicle-mounted terminal side as described above.
The application has the following advantages:
in the embodiment of the application, a connection request initiated by the user terminal is received through the vehicle-mounted terminal; the vehicle-mounted terminal generates a verification result aiming at the connection request; the vehicle-mounted terminal calculates a first safety parameter according to the verification result; the vehicle-mounted terminal sends the verification result to the server; the vehicle-mounted terminal receives a second safety parameter fed back by the server, wherein the second safety parameter is obtained by the server through calculation according to the verification result; the vehicle-mounted terminal judges whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter; if not, the vehicle-mounted terminal refuses the connection request, the server and the vehicle-mounted terminal are adopted to respectively calculate the security parameters, and the access judgment is carried out according to the first security parameter and/or the second security parameter, so that the protection capability is improved, and the probability of brute force cracking is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed to be used in the description of the present application will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor.
Fig. 1 is a flowchart illustrating steps of a method for processing a vehicle key access according to an embodiment of the present application;
fig. 2 is a flowchart illustrating steps of a method for processing a vehicle key access according to an embodiment of the present application;
fig. 3 is a block diagram of an access processing server of a car key according to an embodiment of the present application;
fig. 4 is a block diagram of a vehicle-mounted terminal for processing access of a vehicle key according to an embodiment of the present application;
fig. 5 is a block diagram of a car key access processing system according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, in any embodiment of the present application, the user terminal is a carrier medium for car key information, where the type of the user terminal includes, but is not limited to, any one of a smart watch, a mobile phone, a smart bracelet, a ring, a necklace, and a card.
In any embodiment of the present application, the vehicle-mounted terminal is a carrier medium for each application in the vehicle for controlling vehicle functions, and the carried control application functions include, but are not limited to, vehicle key verification, recording of vehicle driving conditions, monitoring of vehicle speed, monitoring of vehicle navigation, opening and closing of vehicle windows, opening and closing of a vehicle-mounted air conditioner and temperature adjustment, playing and volume adjustment of vehicle-mounted music, adjustment and recording of posture and position of a vehicle seat, opening and closing of a vehicle-mounted camera, and opening and closing of a vehicle sunroof.
Referring to fig. 1, a method for processing access to a car key provided in an embodiment of the present application is shown, where the method relates to a user terminal, a car terminal, and a server, and the method includes:
s101, the vehicle-mounted terminal receives a connection request initiated by the user terminal;
s102, the vehicle-mounted terminal generates a verification result aiming at the connection request;
s103, the vehicle-mounted terminal calculates a first safety parameter according to the verification result;
s104, the vehicle-mounted terminal sends the verification result to the server;
s105, the vehicle-mounted terminal receives a second safety parameter fed back by the server, wherein the second safety parameter is obtained by the server through calculation according to the verification result;
s106, the vehicle-mounted terminal judges whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter;
and S107, if not, the vehicle-mounted terminal refuses the connection request.
In the embodiment of the application, a connection request initiated by the user terminal is received through the vehicle-mounted terminal; the vehicle-mounted terminal generates a verification result aiming at the connection request; the vehicle-mounted terminal calculates a first safety parameter according to the verification result; the vehicle-mounted terminal sends the verification result to the server; the vehicle-mounted terminal receives a second safety parameter fed back by the server, wherein the second safety parameter is obtained by the server through calculation according to the verification result; the vehicle-mounted terminal judges whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter; if not, the vehicle-mounted terminal refuses the connection request, the server and the vehicle-mounted terminal are adopted to respectively calculate the security parameters, and the access judgment is carried out according to the first security parameter and/or the second security parameter, so that the protection capability is improved, and the probability of brute force cracking is reduced.
Next, a method of processing the key access in the present exemplary embodiment will be further described.
As described in step S101 above, the vehicle-mounted terminal receives a connection request initiated by the user terminal; it should be noted that the connection request includes key information and identification information of the user terminal; and the user terminal generates a connection request containing the key information and the identification information through an application deployed in the user terminal, and sends the connection request to the vehicle-mounted terminal.
As an example, the data interaction between the vehicle-mounted terminal and the user terminal in the connection request may be performed by using radio frequency signals, such as a bluetooth connection, a Near Field Communication (NFC) connection, and a short-range Local Area network (WLAN) connection.
As an example, the key information may be an account number in an application for connecting the user terminal with the vehicle-mounted terminal, and a check code for logging in the account number, where the check code may be a preset character-based password or a biological-based password or a dynamically obtained character-based password or a biological-based password, where the character-based password includes, but is not limited to, a pattern password, a gesture password, and a password combined by one or more of numbers, letters, and symbols; biometric codes include, but are not limited to, fingerprints, palm prints, irises, voice prints, and facial shapes.
As an example, the identification information may be at least one of a network card MAC address of the user terminal, a bluetooth MAC address of the user terminal, or an IMEI number (IMEI, international mobile Equipment Identity, also called international mobile Equipment Identity) of the user terminal, each mobile Equipment is given an IMEI at the time of production, and the IMEI has global uniqueness. The information can uniquely identify each user terminal, and the vehicle-mounted terminal can search the historical connection record of the user terminal in the vehicle-mounted terminal record through the identification information.
As described in step S102 above, the vehicle-mounted terminal generates a verification result for the connection request;
the vehicle-mounted terminal acquires the key information contained in the connection request, and verifies the key information, specifically, verifies whether the account number and the password in the key information are matched (if the account number and the password are matched, the verification is successful, and if the account number and the password are not matched, the verification is failed), and generates a corresponding verification result, wherein the verification result at least contains information (including the verification success or the verification failure) whether the verification is successful, or can be a fraction value passing a fraction to represent whether the verification result is successful, specifically, when the verification is successful, the fraction is 0, and when the verification is failed, the fraction is a positive integer not 0.
As described in step S103, the vehicle-mounted terminal calculates a first security parameter according to the verification result;
as an example, before the vehicle-mounted terminal calculates the first security parameter according to the verification result, a determination step is generally required to determine whether the verification result is successful.
In an embodiment, when the verification result is that the verification is successful, the vehicle-mounted terminal does not perform calculation of the first safety parameter, or the vehicle-mounted terminal directly records the calculation result of the first safety parameter as 0;
it should be noted that, when the vehicle-mounted terminal directly records the calculation result of the first security parameter as 0, the vehicle-mounted terminal deletes the number of times of verification failure matched with the identification information in its own storage.
In a specific implementation, after the key information is successfully verified, the in-vehicle terminal zeros the recorded first reference number of times related to the user terminal, that is, zeros the number of times that verification fails, so that when the user terminal sends a new connection request after a connection request is successfully verified, the first reference number of times is zero according to which the user terminal calculates a first security parameter for the new connection request.
In another embodiment, when the verification result is that the verification fails, the vehicle-mounted terminal extracts the identification information of the user terminal, specifically, the vehicle-mounted terminal extracts the identification information of the user terminal from the connection request;
the vehicle-mounted terminal counts the number of times of verification failure corresponding to the identification information as a first reference number of times, specifically, the vehicle-mounted terminal searches out historical verification information matched with the identification information from self storage, wherein the historical verification information comprises the number of times of successful verification and the number of times of verification failure; the vehicle-mounted terminal screens out the times of the verification failure as the first reference times;
the vehicle-mounted terminal configures the first reference times with a first preset weight to obtain the first safety parameter, it should be noted that the first preset weight may be a preset calculation coefficient, or a preset weight algorithm,
as an example, the weight algorithm may include conditions such as a connection time period, a geographic location, and an access time interval to calculate the first security parameter.
In a specific implementation, when the first preset weight is a preset calculation coefficient, after the vehicle-mounted terminal obtains the first reference number of times, the first reference number of times is multiplied by the preset calculation coefficient to obtain the first safety parameter, where: the first reference frequency is 8 times, the preset calculation coefficient is 10, and then the first safety factor is 80.
As described in step S104 above, the in-vehicle terminal sends the verification result to the server;
in an embodiment, after the step of sending the verification result to the server by the vehicle-mounted terminal, the vehicle-mounted terminal determines whether the vehicle-mounted terminal is in a connection state with the server, specifically, the vehicle-mounted terminal determines whether a second security parameter sent by the server is received within a preset time; it should be noted that, after the vehicle-mounted terminal sends the first safety parameter to the server, the vehicle-mounted terminal is in a state of waiting to receive the feedback signal within a preset time, and determines whether the server feeds back the second safety parameter within the preset time.
And when the vehicle-mounted terminal receives a second safety parameter sent by the server within a preset time, judging that the vehicle-mounted terminal and the server are in a connected state, otherwise (including two conditions that no feedback exists all the time and the duration of the fed-back second safety parameter exceeds the preset time), judging that the vehicle-mounted terminal and the server are in a non-connected state.
When the vehicle-mounted terminal is disconnected with the server, the vehicle-mounted terminal judges whether the user terminal meets the access requirement or not according to the first safety parameter, namely, whether the first safety parameter is larger than a first preset threshold value or not is judged.
As described in step S105, the vehicle-mounted terminal receives a second security parameter fed back by the server, where the second security parameter is calculated and obtained by the server according to the verification result;
it should be noted that the second security parameter may be a fractional value, specifically, the server is calculated according to the verification result,
as an example, before the server calculates the second security parameter according to the verification result, a determination step is generally required to determine whether the verification result is successful.
In an embodiment, when the verification result is that the verification is successful, the server does not perform the calculation of the second security parameter, or the server directly records the calculation result of the second security parameter as 0;
it should be noted that, when the server directly records the calculation result of the second security parameter as 0, the server deletes the number of times of failure of verification matching with the identification information in its own storage.
In a specific implementation, after the key information is verified successfully, the server returns the number of times of verification failures of the vehicle-mounted terminal, which is related to the current transmission verification result, to zero from among the recorded number of times of verification failures of the user terminal, so that when the user terminal transmits a new connection request for the current vehicle-mounted terminal after a connection request for the current vehicle-mounted terminal is verified successfully, the second reference number of times according to which the second security parameter for the new connection request is calculated is equal to the number of times of verification failures of the user terminal minus the number of times of verification failures still related to the current vehicle-mounted terminal.
In another embodiment, when the verification result is that the verification fails, the server extracts the identification information of the user terminal, specifically, the server acquires the identification information of the user terminal from the vehicle-mounted terminal;
the server counts the number of times of verification failure corresponding to the identification information as a second reference number of times, specifically, the server searches out historical verification information matched with the identification information from self storage, wherein the historical verification information comprises the number of times of successful verification and the number of times of verification failure; the server screens out the times of the verification failure as the second reference times;
the server configures a second preset weight for the second reference times to obtain the second security parameter, where the second preset weight may be a preset calculation coefficient or a preset weight algorithm,
as an example, the weighting algorithm may include conditions such as a connection time period, a geographic location, and an access time interval to calculate the second security parameter.
In a specific implementation, when the second preset weight is a preset calculation coefficient, after the server obtains the second reference time, the second reference time is multiplied by the preset calculation coefficient to obtain the second security parameter, where: and if the second reference frequency is 8 times and the preset calculation coefficient is 10, the second safety factor is 80.
As described in step S106, the vehicle-mounted terminal determines whether the user terminal meets a preset access requirement according to the first security parameter and/or the second security parameter;
it should be noted that, the vehicle-mounted terminal determines whether the user terminal meets a preset access requirement according to the first security parameter and/or the second security parameter, specifically,
the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement;
and/or the presence of a gas in the gas,
the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement.
It should be noted that, the specific conditions of how the vehicle-mounted terminal uses the first security parameter and the second security parameter are generally determined based on the connection state of the vehicle-mounted terminal and the server in the present application, and are specifically divided into the following cases:
in case one, when the in-vehicle terminal is in a non-connected state with the server,
the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement.
In case two, when the in-vehicle terminal is in a connected state with the server,
the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement.
In case three, when the in-vehicle terminal is in a connected state with the server,
the vehicle-mounted terminal judges whether the first safety parameter is smaller than or equal to a first preset threshold value or not, and judges whether the second safety parameter is smaller than or equal to a second preset threshold value or not;
if so, judging that the user terminal meets the preset access requirement; if not, judging that the user terminal does not meet the preset access requirement.
It should be noted that, in case three, the user terminal meets the preset access requirement only when the first security parameter is smaller than or equal to the first preset threshold and the second security parameter is smaller than or equal to the second preset threshold, and the other determination results are that the user terminal does not meet the preset access requirement.
It should be noted that, when the vehicle-mounted terminal is connected to the server, the second case or the third case is used, and generally selected according to preset conditions, where the preset conditions are as follows: whether the authenticated user terminal is authenticated during a common time period or whether the authenticated user terminal is in a common use.
In a specific implementation, in the above three cases, when the preset weight for calculating the first safety parameter and the second safety parameter is a coefficient equal to 10, the first preset threshold and the second preset threshold are preferably equal to 100.
As described in step S107, if not, the vehicle-mounted terminal rejects the connection request.
It should be noted that, when the user terminal is determined by the vehicle-mounted terminal that the user terminal does not meet the preset access requirement, the vehicle-mounted terminal rejects the first connection request initiated by the user terminal and disconnects the connection with the user terminal;
in an embodiment, after the vehicle-mounted terminal disconnects from the user terminal, the identification information is further updated into a blacklist.
When the connection request of the user terminal is rejected, the vehicle-mounted terminal updates the identification information of the user terminal into the blacklist, at the moment, the user terminal corresponding to the identification information cannot be connected with the vehicle-mounted terminal, the blacklist can be uploaded to the server along with an operation log of the blacklist when the log is updated on the vehicle, and the server collects the blacklist acquired from each vehicle-mounted terminal regularly in an updating mode and sends the blacklist to each vehicle-mounted terminal, so that the protection of the vehicle is improved, and the use safety of the user is improved.
When the user terminal is judged to meet the preset access requirement by the vehicle-mounted terminal, the vehicle-mounted terminal is accessed into the user terminal, a user can start a vehicle corresponding to the vehicle-mounted terminal, and the vehicle-mounted terminal is controlled by the user terminal, so that the control application in the vehicle-mounted terminal is controlled by the user terminal.
Referring to fig. 2, an access processing method for a car key provided in an embodiment of the present application is shown, where the method relates to a user terminal, a car terminal, and a server, and the method includes:
s201, the server receives a verification result sent by the vehicle-mounted terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
s202, the server calculates a second safety parameter according to the verification result;
s203, the server sends the second safety parameters to the vehicle-mounted terminal;
the vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter, and refusing the connection request when the user terminal does not meet the access requirement; and the first safety parameter is obtained by the vehicle-mounted terminal according to the calculation of the verification result.
In the embodiment of the application, the server receives a verification result sent by the vehicle-mounted terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal; the server calculates a second security parameter according to the verification result; the server sends the second safety parameters to the vehicle-mounted terminal; the vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter, and refusing the connection request when the user terminal does not meet the access requirement; the first safety parameter is obtained by the vehicle-mounted terminal through calculation according to the verification result, safety parameters are calculated respectively by adopting a server and the vehicle-mounted terminal, and access judgment is carried out according to the first safety parameter and/or the second safety parameter, so that the protection capability is improved, and the probability of brute force cracking is reduced.
Next, a method of processing the key access in the present exemplary embodiment will be further described.
As described in step S201 above, the server receives the verification result sent by the in-vehicle terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
it should be noted that the verification result is obtained by obtaining, by the vehicle-mounted terminal, the key information included in the connection request and performing verification processing on the key information, specifically, verifying whether an account number and a password in the key information are matched (matching is successful if verification is successful, and mismatch is failed if verification is failed), and generating a corresponding verification result, it should be noted that the verification result at least includes information whether verification is successful (including verification success or verification failure), and may also be that whether the verification result is successful or not is indicated by a score value of a score, specifically, when verification is successful, the score is 0, and when verification is failed, the score is a positive integer not 0.
It should be noted that the connection request includes key information and identification information of the user terminal; and the user terminal generates a connection request containing the key information and the identification information through an application deployed in the user terminal, and sends the connection request to the vehicle-mounted terminal.
As an example, the data interaction between the vehicle-mounted terminal and the user terminal in the connection request may be performed by using radio frequency signals, such as a bluetooth connection, a Near Field Communication (NFC) connection, and a short-range Local Area network (WLAN) connection.
As an example, the key information may be an account number in an application for connecting the user terminal with the vehicle-mounted terminal, and a check code for logging in the account number, where the check code may be a preset character-based password or a biological-based password or a dynamically obtained character-based password or a biological-based password, where the character-based password includes, but is not limited to, a pattern password, a gesture password, and a password combined by one or more of numbers, letters, and symbols; biometric codes include, but are not limited to, fingerprints, palm prints, irises, voice prints, and facial shapes.
As an example, the identification information may be at least one of a network card MAC address of the user terminal, a bluetooth MAC address of the user terminal, or an IMEI number (International Mobile Equipment Identity) of the user terminal, where each Mobile Equipment is given an IMEI during production, and has global uniqueness). The information can uniquely identify each user terminal, and the vehicle-mounted terminal can search the historical connection record of the user terminal in the vehicle-mounted terminal record through the identification information.
As described in step S202, the server calculates a second security parameter according to the verification result;
it should be noted that the second security parameter may be a fractional value, and specifically, the server is obtained by calculation according to the verification result.
As an example, before the server calculates the second security parameter according to the verification result, a determination step is generally required to determine whether the verification result is successful.
In an embodiment, when the verification result is that the verification is successful, the server does not perform the calculation of the second security parameter, or the server directly records the calculation result of the second security parameter as 0;
it should be noted that, when the server directly records the calculation result of the second security parameter as 0, the server deletes the number of times of the verification failure matching with the identification information in its own storage.
In a specific implementation, after the key information is verified successfully, the server returns the number of times of verification failures of the vehicle-mounted terminal, which is related to the current transmission verification result, to zero from among the recorded number of times of verification failures of the user terminal, so that when the user terminal transmits a new connection request for the current vehicle-mounted terminal after a connection request for the current vehicle-mounted terminal is verified successfully, the second reference number of times according to which the second security parameter for the new connection request is calculated is equal to the number of times of verification failures of the user terminal minus the number of times of verification failures still related to the current vehicle-mounted terminal.
In another embodiment, when the verification result is that the verification fails, the server extracts the identification information of the user terminal, specifically, the server acquires the identification information of the user terminal from the vehicle-mounted terminal;
the server counts the number of times of verification failure corresponding to the identification information as a second reference number of times, specifically, the server searches out historical verification information matched with the identification information from self storage, wherein the historical verification information comprises the number of times of successful verification and the number of times of verification failure; the server screens out the times of the verification failure as the second reference times;
the server configures a second preset weight for the second reference times to obtain the second security parameter, where it should be noted that the second preset weight may be a preset calculation coefficient, or a preset weight algorithm,
as an example, the weighting algorithm may include conditions such as a connection time period, a geographic location, and an access time interval to calculate the second security parameter.
In a specific implementation, when the second preset weight is a preset calculation coefficient, after the server obtains the second reference time, the second reference time is multiplied by the preset calculation coefficient to obtain the second security parameter, for example: and if the second reference times are 8 times and the preset calculation coefficient is 10, the second safety factor is 80.
In another embodiment, when the verification result is that the verification fails, the server extracts the identification information of the user terminal, specifically, the server acquires the identification information of the user terminal from the vehicle-mounted terminal;
the server counts the number of times of verification failure corresponding to the identification information as a second reference number of times, specifically, the server searches out historical verification information matched with the identification information from self storage, wherein the historical verification information comprises the number of times of successful verification and the number of times of verification failure; the server screens out the times of the verification failure as the second reference times;
the server judges whether the user terminal is a common device or not according to the identification information, specifically, after the server acquires the second reference times, whether the identification information is the same as the identification information of the user terminal which is verified by adopting the same key information for the preset latest times and is verified successfully is judged, wherein the preset latest times are generally 3 times;
if the second reference times are the same as the first reference times, the server configures a second preset weight for the second reference times to obtain the second security parameter, where it should be noted that the second preset weight may be a preset calculation coefficient or a preset weight algorithm,
as an example, the weighting algorithm may include conditions such as a connection time period, a geographic location, and an access time interval to calculate the second security parameter.
In a specific implementation, when the second preset weight is a preset calculation coefficient, after the server obtains the second reference time, the second reference time is multiplied by the preset calculation coefficient to obtain the second security parameter, where: and if the second reference frequency is 8 times and the preset calculation coefficient is 10, the second safety factor is 80.
If the two reference times are different, the server configures a third preset weight for the second reference time to obtain the second security parameter, where it should be noted that the second preset weight may be a preset weight algorithm, specifically, the second reference time x a preset coefficient + a preset numerical value
In a specific implementation, the preset coefficient is 10, the preset value is 50, and the second reference frequency is 8, so that the second safety factor is 130.
In one embodiment, when the user terminal is determined to be an unusual device, the server acquires key information sent by the vehicle-mounted terminal; the key information is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the server generates a first notice and sends the first notice to a historical user terminal which passes the key information verification last time and succeeds; specifically, the historical user terminal which passes the verification last time and corresponds to the account information is found out through the account information in the key information;
as an example, the first notification information may be a short message and/or information based on other communication methods preset in the digital key information, such as WeChat, QQ, and email, and the first notification information may include identification information of the emergency device, a connection login place (including but not limited to a provincial address) of the emergency device, and a connection login time of the emergency device.
In another embodiment, when the user terminal is determined to be an unusual device, the server acquires key information sent by the vehicle-mounted terminal; the key information is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the server generates a second notification and sends the second notification to a preset user terminal in the key information, specifically, the preset user terminal corresponding to the account information is found out through the account information in the key information, the preset user terminal is used for emergency contact when the emergency contact occurs outside or when the server acquires that the account is stolen or abnormally used,
as an example, the abnormal usage may be: the user terminal using the account is an emergency device, the second security score of the user terminal using the account is higher than a second specified threshold, or the user terminal using the account is pulled into a blacklist.
As an example, the second notification information may be a short message and/or information preset in the digital key information based on other communication methods, such as a WeChat, a QQ, and an email, and the second notification information may include identification information of the emergency device, a connection login location (including but not limited to a provincial address) of the emergency device, and a connection login time of the emergency device.
As described in step S203, the server sends the second security parameter to the vehicle-mounted terminal;
and the server sends the second safety parameter to the vehicle-mounted terminal through a network, wherein the second safety parameter can be a fraction value, and specifically, the second safety parameter is obtained by calculation according to the verification result.
The vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter, and refusing the connection request when the user terminal does not meet the access requirement; and the first safety parameter is obtained by the vehicle-mounted terminal according to the calculation of the verification result.
It should be noted that, the vehicle-mounted terminal determines whether the user terminal meets a preset access requirement according to the first security parameter and/or the second security parameter, specifically,
the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement;
and/or the presence of a gas in the gas,
the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement.
It should be noted that specific conditions of how to use the first security parameter and the second security parameter by the vehicle-mounted terminal are generally determined based on the connection state of the vehicle-mounted terminal and the server in the present application, and are specifically classified into the following cases:
in case one, when the in-vehicle terminal is in a non-connected state with the server,
the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement.
In case two, when the in-vehicle terminal is in a connected state with the server,
the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement; if not, judging that the user terminal meets the preset access requirement.
In case three, when the in-vehicle terminal is in a connected state with the server,
the vehicle-mounted terminal judges whether the first safety parameter is smaller than or equal to a first preset threshold value or not, and judges whether the second safety parameter is smaller than or equal to a second preset threshold value or not;
if so, judging that the user terminal meets the preset access requirement; if not, judging that the user terminal does not meet the preset access requirement.
It should be noted that in case three, the ue meets the predetermined access requirement only when the first security parameter is smaller than or equal to the first predetermined threshold and the second security parameter is smaller than or equal to the second predetermined threshold, and the remaining determination results are that the ue does not meet the predetermined access requirement.
It should be noted that, when the vehicle-mounted terminal is connected to the server, the second case or the third case is used, and generally selected according to preset conditions, where the preset conditions are as follows: whether the authenticated user terminal is authenticated during a common time period or whether the authenticated user terminal is in a common use.
In a specific implementation, in the above three cases, when the preset weight for calculating the first safety parameter and the second safety parameter is a coefficient equal to or less than 10, the first preset threshold and the second preset threshold are preferably equal to or less than 100.
And when the access requirement is not met, the vehicle-mounted terminal refuses the connection request.
It should be noted that, when the user terminal is determined by the vehicle-mounted terminal that the user terminal does not meet the preset access requirement, the vehicle-mounted terminal rejects the first connection request initiated by the user terminal and disconnects the connection with the user terminal;
in an embodiment, after the vehicle-mounted terminal disconnects from the user terminal, the identification information is further updated into a blacklist.
When the connection request of the user terminal is rejected, the vehicle-mounted terminal updates the identification information of the user terminal into the blacklist, at the moment, the user terminal corresponding to the identification information cannot be connected with the vehicle-mounted terminal, the blacklist can be uploaded to the server along with an operation log of the blacklist when the log is updated on the vehicle, and the server collects the blacklist acquired from each vehicle-mounted terminal regularly in an updating mode and sends the blacklist to each vehicle-mounted terminal, so that the protection of the vehicle is improved, and the use safety of the user is improved.
When the user terminal is judged to meet the preset access requirement by the vehicle-mounted terminal, the vehicle-mounted terminal is accessed into the user terminal, a user can start a vehicle corresponding to the vehicle-mounted terminal, and the vehicle-mounted terminal is controlled by the user terminal, so that the control application in the vehicle-mounted terminal is controlled by the user terminal.
The first safety parameter is obtained by the vehicle-mounted terminal through calculation according to the verification result, and specifically comprises the following steps:
as an example, before the vehicle-mounted terminal calculates the first security parameter according to the verification result, a determination step is generally required to determine whether the verification result is successful.
In an embodiment, when the verification result is that the verification is successful, the vehicle-mounted terminal does not perform calculation of the first safety parameter, or the vehicle-mounted terminal directly records the calculation result of the first safety parameter as 0;
it should be noted that, when the vehicle-mounted terminal directly records the calculation result of the first security parameter as 0, the vehicle-mounted terminal deletes the number of times of verification failure matched with the identification information in its own storage.
In a specific implementation, after the key information is successfully verified, the in-vehicle terminal zeros the recorded first reference number of times related to the user terminal, that is, zeros the number of times that verification fails, so that when the user terminal sends a new connection request after a connection request is successfully verified, the first reference number of times is zero according to which the user terminal calculates a first security parameter for the new connection request.
In another embodiment, when the verification result is that the verification fails, the vehicle-mounted terminal extracts the identification information of the user terminal, specifically, the vehicle-mounted terminal extracts the identification information of the user terminal from the connection request;
the vehicle-mounted terminal counts the number of times of verification failure corresponding to the identification information as a first reference number of times, specifically, the vehicle-mounted terminal searches out historical verification information matched with the identification information from self storage, wherein the historical verification information comprises the number of times of successful verification and the number of times of verification failure; the vehicle-mounted terminal screens out the times of the verification failure as the first reference times;
the vehicle-mounted terminal configures the first reference times with a first preset weight to obtain the first safety parameter, it should be noted that the first preset weight may be a preset calculation coefficient, or a preset weight algorithm,
as an example, the weighting algorithm may include conditions such as a connection time period, a geographic location, and an access time interval to calculate the first security parameter.
In a specific implementation, when the first preset weight is a preset calculation coefficient, after the vehicle-mounted terminal obtains the first reference number of times, the first reference number of times is multiplied by the preset calculation coefficient to obtain the first safety parameter, where: the first reference frequency is 8 times, the preset calculation coefficient is 10, and then the first safety factor is 80.
For the device embodiment at the vehicle-mounted terminal side, since it is basically similar to the method embodiment, the description is relatively simple, and relevant points can be referred to the partial description of the method embodiment at the vehicle-mounted terminal side.
Referring to fig. 3, an access processing apparatus for a car key provided in an embodiment of the present application is shown, which relates to information interaction between a user terminal, a car terminal, and a server, where the car terminal specifically includes:
a first receiving module 101, configured to receive a connection request initiated by the user terminal;
a generating module 102, configured to generate a verification result for the connection request;
a first calculating module 103, configured to calculate a first security parameter according to the verification result;
a first sending module 104, configured to send the verification result to the server;
a second receiving module 105, configured to receive a second security parameter fed back by the server, where the second security parameter is obtained by the server through calculation according to the verification result;
a determining module 106, configured to determine whether the ue meets a preset access requirement according to the first security parameter and/or the second security parameter;
a connection module 107, configured to deny the connection request by the vehicle-mounted terminal if the connection request is not received.
For the device embodiment on the server side, since it is basically similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment on the server side.
Referring to fig. 4, an access processing apparatus for a car key provided in an embodiment of the present application is shown, which relates to information interaction between a user terminal, a vehicle-mounted terminal, and a server, where the server specifically includes:
a third receiving module 201, configured to receive a verification result sent by the vehicle-mounted terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
a second calculating module 202, configured to calculate a second security parameter according to the verification result;
the second sending module 203 is configured to send the second safety parameter to the vehicle-mounted terminal;
the vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter, and rejecting the connection request when the user terminal does not meet the access requirement; and the first safety parameter is obtained by the vehicle-mounted terminal according to the calculation of the verification result.
For the system embodiment, since it is basically similar to the server side and vehicle terminal side method embodiments, the description is relatively simple, and for relevant points, refer to partial description of the method embodiments.
Referring to fig. 5, a vehicle key access processing system according to the present application is shown, which relates to information interaction between a user terminal 300, a vehicle-mounted terminal 200, and a server 100, and specifically includes:
the user terminal 300 initiates a connection request to the vehicle-mounted terminal 200;
the vehicle-mounted terminal 200 generates a verification result for the connection request, calculates a first security parameter according to the verification result, and sends the verification result to the server 100;
the server 100 calculates a second safety parameter according to the verification result, and sends the second safety parameter to the vehicle-mounted terminal 200;
the vehicle-mounted terminal 200 judges whether the user terminal 300 meets a preset access requirement according to the first safety parameter and/or the second safety parameter;
when the user terminal 300 does not meet the preset access requirement, the in-vehicle terminal 200 rejects the connection request initiated by the user terminal 300.
Next, a method of processing the key access in the present exemplary embodiment will be further described.
The user terminal 300 initiates a connection request to the vehicle-mounted terminal 200, wherein the connection request comprises key information and identification information of the user terminal 300; the user terminal 300 generates a connection request including the key information and the identification information through an application deployed therein, and transmits the connection request to the in-vehicle terminal 200.
The vehicle-mounted terminal 200 generates a verification result for the connection request according to the key information, calculates a first security parameter according to the verification result and the identification information, and sends the first security parameter to the server 100; when the verification result is that verification fails, the vehicle-mounted terminal 200 searches the verification times matched with the identification information from the stored information according to the identification information, and then screens out the times of verification failure as first reference times; and the vehicle-mounted terminal 200 calculates the first safety parameter according to the first reference times.
The server 100 calculates a second security parameter according to the verification result, and sends the second security parameter to the vehicle-mounted terminal 200, which specifically includes:
the server 100 receives the verification result sent by the vehicle-mounted terminal 200;
the server 100 receives the verification result sent by the in-vehicle terminal 200 through the network.
When the verification result is that verification fails, the server 100 extracts the identification information from the vehicle-mounted terminal, searches verification times matched with the identification information from stored information according to the identification information, and then screens out verification failure times as second reference times; the server 100 calculates the second security parameter according to a second reference number.
The server 100 sends the second safety parameter to the vehicle-mounted terminal 200;
the server 100 sends the second security parameter to the vehicle-mounted terminal 200 through a network, where the second security parameter may be a fraction value, and specifically, the second security parameter is obtained by calculation by the server 100 according to the verification result.
The vehicle-mounted terminal 200 judges whether the user terminal 300 meets a preset access requirement according to the first safety parameter and/or the second safety parameter; if not, the vehicle-mounted terminal 200 rejects the connection request initiated by the user terminal 300.
It should be noted that, according to the first security parameter and/or the second security parameter, it is determined whether the user terminal 300 meets a preset access requirement, specifically, whether the first security parameter is greater than a first preset threshold is determined; and/or judging whether the second safety parameter is larger than a second preset threshold value.
In a specific implementation, the specific conditions of how the in-vehicle terminal 200 uses the first security parameter and the second security parameter are generally determined based on the connection state of the in-vehicle terminal 200 and the server 100, and are specifically divided into the following cases:
in case one, when the in-vehicle terminal 200 is in a non-connected state with the server site 100,
the vehicle-mounted terminal 200 judges whether the first safety parameter is greater than a first preset threshold value;
if yes, determining that the user terminal 300 does not meet the preset access requirement; if not, the user terminal 300 is determined to meet the preset access requirement.
In case two, when the in-vehicle terminal 200 is in a connected state with the server 100,
the vehicle-mounted terminal 200 judges whether the second safety parameter is greater than a second preset threshold value;
if yes, judging that the user terminal 300 does not meet the preset access requirement; if not, the user terminal 300 is determined to meet the preset access requirement.
In case three, when the in-vehicle terminal 200 is in a connected state with the server 100,
the vehicle-mounted terminal 200 judges whether the first safety parameter is less than or equal to a first preset threshold value, and judges whether the second safety parameter is less than or equal to a second preset threshold value;
if yes, determining that the user terminal 300 meets a preset access requirement; if not, it is determined that the user terminal 300 does not meet the preset access requirement.
It should be noted that in case three, if and only if the first security parameter is smaller than or equal to the first preset threshold and the second security parameter is smaller than or equal to the second preset threshold, the ue 300 meets the preset access requirement, and all the other determination results indicate that the ue 300 does not meet the preset access requirement.
In a specific implementation, in the above three cases, when the preset weight for calculating the first safety parameter and the second safety parameter is a coefficient equal to or less than 10, the first preset threshold and the second preset threshold are preferably equal to or less than 100.
An embodiment of the present application provides a vehicle, which includes a processor, a memory, and a computer program stored on the memory and capable of running on the processor, and when the computer program is executed by the processor, the steps of the method for processing the vehicle key access on the vehicle-mounted terminal side are implemented.
An embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method for processing vehicle key access on a vehicle-mounted terminal side as described above.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method, the device, the system and the vehicle for processing the vehicle key access provided by the present application are introduced in detail, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understanding the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (15)

1. A vehicle key access processing method relates to a user terminal, a vehicle-mounted terminal and a server, and comprises the following steps:
the vehicle-mounted terminal receives a connection request initiated by the user terminal;
the vehicle-mounted terminal generates a verification result aiming at the connection request;
when the verification result is that the verification fails, the vehicle-mounted terminal extracts the identification information of the user terminal; the identification information is a Bluetooth MAC address of the user terminal;
the vehicle-mounted terminal counts the times of verification failure corresponding to the identification information as first reference times;
the vehicle-mounted terminal configures the first reference times with a first preset weight to obtain a first safety parameter;
the vehicle-mounted terminal sends the verification result to the server;
the vehicle-mounted terminal receives a second safety parameter fed back by the server, wherein the second safety parameter is obtained by calculating the times of verification failure corresponding to the verification result and the identification information of the user terminal by the server;
the vehicle-mounted terminal judges whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter;
and if not, the vehicle-mounted terminal refuses the connection request.
2. The method according to claim 1, wherein the step of determining, by the vehicle-mounted terminal, whether the user terminal meets a preset access requirement according to the first security parameter and/or the second security parameter comprises:
the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement;
and/or the presence of a gas in the gas,
the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement.
3. The method according to claim 1, wherein the step of determining, by the vehicle-mounted terminal, whether the user terminal meets a preset access requirement according to the first security parameter and/or the second security parameter comprises:
when the vehicle-mounted terminal and the server are in a non-connection state, the vehicle-mounted terminal judges whether the first safety parameter is larger than a first preset threshold value or not;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement.
4. The method according to claim 1, wherein the step of the vehicle-mounted terminal determining whether the ue meets the preset access requirement according to the first security parameter and/or the second security parameter comprises:
when the vehicle-mounted terminal is connected with the server, the vehicle-mounted terminal judges whether the second safety parameter is larger than a second preset threshold value;
if so, judging that the user terminal does not meet the preset access requirement;
if not, judging that the user terminal meets the preset access requirement.
5. The method according to claim 1, wherein the step of determining, by the vehicle-mounted terminal, whether the user terminal meets a preset access requirement according to the first security parameter and/or the second security parameter comprises:
when the vehicle-mounted terminal is in a connection state with the server, the vehicle-mounted terminal judges whether the first safety parameter is smaller than or equal to a first preset threshold value or not, and judges whether the second safety parameter is smaller than or equal to a second preset threshold value or not;
if so, judging that the user terminal meets the preset access requirement;
if not, judging that the user terminal does not meet the preset access requirement.
6. The method according to any one of claims 3 to 5, wherein when the vehicle-mounted terminal receives the second security parameter sent by the server within a preset time, the vehicle-mounted terminal is determined to be in a connected state with the server, otherwise, the vehicle-mounted terminal is determined to be in a disconnected state with the server.
7. A vehicle key access processing method is characterized in that the method relates to a user terminal, a vehicle-mounted terminal and a server, and the method comprises the following steps:
the server receives a verification result sent by the vehicle-mounted terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the server calculates a second safety parameter according to the verification result and the times of verification failure corresponding to the identification information of the user terminal;
the server sends the second safety parameters to the vehicle-mounted terminal; the vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter, and refusing the connection request when the user terminal does not meet the access requirement; the first safety parameter is that when the verification result is that the verification fails, the vehicle-mounted terminal extracts the identification information of the user terminal; the vehicle-mounted terminal counts the times of verification failure corresponding to the identification information as first reference times; the vehicle-mounted terminal configures the first reference times with a first preset weight to obtain the first reference times; the identification information is the Bluetooth MAC address of the user terminal.
8. The method according to claim 7, wherein the step of the server calculating the second security parameter according to the verification result comprises:
when the verification result is verification failure, the server acquires the identification information of the user terminal from the vehicle-mounted terminal;
the server counts the times of verification failure corresponding to the identification information as second reference times;
and the server configures the second reference times with a second preset weight to obtain the second safety parameters.
9. The method of claim 8, further comprising,
the server judges whether the user terminal is a frequently-used device or not according to the identification information;
if not, the server configures a third preset weight for the second reference times to obtain the second security parameters.
10. The method of claim 8, further comprising:
when the user terminal is judged to be an unusual device, the server acquires key information sent by the vehicle-mounted terminal; the key information is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the server generates a first notice and sends the first notice to a historical user terminal which passes the key information verification last time and succeeds;
or the like, or, alternatively,
when the user terminal is judged to be an unusual device, the server acquires key information sent by the vehicle-mounted terminal; the key information is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
and the server generates a second notification and sends the second notification to a preset user terminal in the key information.
11. The utility model provides an access processing apparatus of car key which characterized in that relates to user terminal, vehicle mounted terminal to and, the information interaction between the server, wherein, vehicle mounted terminal specifically includes:
a first receiving module, configured to receive a connection request initiated by the user terminal;
a generation module, configured to generate a verification result for the connection request;
the first calculation module is used for extracting the identification information of the user terminal when the verification result is verification failure; counting the number of times of verification failure corresponding to the identification information as a first reference number of times; configuring a first preset weight for the first reference times to obtain a first safety parameter;
the first sending module is used for sending the verification result to the server;
a second receiving module, configured to receive a second security parameter fed back by the server, where the second security parameter is obtained by the server through calculation according to the verification result and the number of times of verification failures corresponding to the identification information of the user terminal;
the judging module is used for judging whether the user terminal meets the preset access requirement or not according to the first safety parameter and/or the second safety parameter;
and the connection module is used for refusing the connection request by the vehicle-mounted terminal if the connection request is not received.
12. The utility model provides an access processing apparatus of car key which characterized in that, relates to user terminal, vehicle-mounted terminal to and, the information interaction between the server, wherein, the server specifically includes:
the third receiving module is used for receiving the verification result sent by the vehicle-mounted terminal; the verification result is generated by the vehicle-mounted terminal aiming at a connection request initiated by the user terminal;
the second calculation module is used for calculating a second safety parameter according to the verification result and the times of verification failure corresponding to the identification information of the user terminal;
the second sending module is used for sending the second safety parameters to the vehicle-mounted terminal;
the vehicle-mounted terminal is further used for judging whether the user terminal meets a preset access requirement or not according to a first safety parameter and/or the second safety parameter, and refusing the connection request when the user terminal does not meet the access requirement; the first safety parameter is that when the verification result is that the verification fails, the vehicle-mounted terminal extracts the identification information of the user terminal; the vehicle-mounted terminal counts the times of verification failure corresponding to the identification information as first reference times; and the vehicle-mounted terminal configures the first reference times with a first preset weight to obtain the first reference times.
13. The utility model provides an access processing system of car key which characterized in that relates to user terminal, vehicle-mounted terminal to and, the information interaction between the server specifically includes:
the user terminal initiates a connection request to the vehicle-mounted terminal;
the vehicle-mounted terminal generates a verification result aiming at the connection request, and when the verification result is verification failure, the vehicle-mounted terminal extracts the identification information of the user terminal; the vehicle-mounted terminal counts the times of verification failure corresponding to the identification information as first reference times; the vehicle-mounted terminal configures the first reference times with a first preset weight to obtain a first safety parameter, and sends the verification result to the server;
the server calculates a second safety parameter according to the verification result and the number of times of verification failure corresponding to the identification information of the user terminal, and sends the second safety parameter to the vehicle-mounted terminal;
the vehicle-mounted terminal judges whether the user terminal meets a preset access requirement or not according to the first safety parameter and/or the second safety parameter;
and when the user terminal does not meet the preset access requirement, the vehicle-mounted terminal refuses the connection request initiated by the user terminal.
14. A vehicle comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the method of any one of claims 1 to 6.
15. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 6.
CN201910491995.9A 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle Active CN110189452B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910491995.9A CN110189452B (en) 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910491995.9A CN110189452B (en) 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle

Publications (2)

Publication Number Publication Date
CN110189452A CN110189452A (en) 2019-08-30
CN110189452B true CN110189452B (en) 2022-07-12

Family

ID=67720828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910491995.9A Active CN110189452B (en) 2019-06-06 2019-06-06 Vehicle key access processing method, device and system and vehicle

Country Status (1)

Country Link
CN (1) CN110189452B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113353022A (en) * 2020-03-05 2021-09-07 广州汽车集团股份有限公司 Vehicle anti-theft method and system and vehicle-mounted equipment
CN115733663A (en) * 2020-04-29 2023-03-03 华为技术有限公司 Login method, login device, electronic equipment and storage medium
CN112256003B (en) * 2020-10-16 2022-10-28 英博超算(南京)科技有限公司 Method for guaranteeing safety of remote control parking process

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035192A (en) * 2007-04-06 2007-09-12 中兴通讯股份有限公司 Fast network access method upon restart of IP STB
CN101119207A (en) * 2007-09-21 2008-02-06 北京意科通信技术有限责任公司 Authorization control method aimed at server
EP1482751B1 (en) * 2003-05-29 2009-10-07 Kyocera Corporation Communication system wherein a wireless repeater device sends notifications to wireless LAN terminals
CN101577024A (en) * 2009-02-02 2009-11-11 杭州在信科技有限公司 Method for applying RF-SIM in public transportation system
CN102169611A (en) * 2010-02-25 2011-08-31 曹松伟 Large self-service intelligent network group charging equipment and guide system for building parking lot
EP2666317B1 (en) * 2011-01-20 2014-12-24 Koninklijke Philips N.V. Method, cognitive radio device and spectrum manager for authenticating and authorizing a plurality of cognitive radio slave devices
CN104767717A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Identity authentication method and device
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN109151060A (en) * 2018-09-28 2019-01-04 广州小鹏汽车科技有限公司 A kind of road surface method for monitoring abnormality, device and computer readable storage medium

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100505927C (en) * 2004-10-22 2009-06-24 北京握奇数据系统有限公司 Dynamic password identification method
CN101331707A (en) * 2005-12-20 2008-12-24 松下电器产业株式会社 Authentication system and authentication device
JP2007272320A (en) * 2006-03-30 2007-10-18 Mitsubishi Electric Corp Entry management system
CN101977202B (en) * 2010-11-11 2012-08-29 北京航空航天大学 One-time password authentication system and authentication method used for B/S (Browser/Server) network structure
CN104809773A (en) * 2014-01-23 2015-07-29 中国移动通信集团公司 Entrance guard control method, entrance guard control apparatus, and entrance guard system
KR102133534B1 (en) * 2015-07-01 2020-07-13 삼성전자주식회사 Method and Apparatus for User Authentication
CN105491684A (en) * 2015-11-17 2016-04-13 广东好帮手电子科技股份有限公司 Method and system for automatically connecting on-board host computer and Bluetooth device
CN106447840A (en) * 2016-08-26 2017-02-22 合肥若涵信智能工程有限公司 Multifunctional intelligent entrance guard system
CN106961369A (en) * 2017-03-20 2017-07-18 浙江工业职业技术学院 Antitheft security system and method for electric automobile
EP3419241B1 (en) * 2017-06-21 2019-12-25 Volvo Car Corporation Method and system for preventing a physical layer relay attack
CN107481328A (en) * 2017-09-14 2017-12-15 珠海优仕达信息科技有限公司 A kind of novel intelligent subway gate passes through method, system and circuit
CN108449186B (en) * 2018-06-11 2020-06-05 京东数字科技控股有限公司 Security verification method and device
CN109446767A (en) * 2018-09-29 2019-03-08 东风汽车有限公司 Vehicle personnel identity safety verification method, equipment and system
CN109660966A (en) * 2018-12-19 2019-04-19 苏州迈荣祥信息科技有限公司 A kind of Research on Vehicle Remote Monitoring System Based on GPRS and method
CN109741499A (en) * 2018-12-29 2019-05-10 深圳市多度科技有限公司 The updating method of user information and device of door access machine

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1482751B1 (en) * 2003-05-29 2009-10-07 Kyocera Corporation Communication system wherein a wireless repeater device sends notifications to wireless LAN terminals
CN101035192A (en) * 2007-04-06 2007-09-12 中兴通讯股份有限公司 Fast network access method upon restart of IP STB
CN101119207A (en) * 2007-09-21 2008-02-06 北京意科通信技术有限责任公司 Authorization control method aimed at server
CN101577024A (en) * 2009-02-02 2009-11-11 杭州在信科技有限公司 Method for applying RF-SIM in public transportation system
CN102169611A (en) * 2010-02-25 2011-08-31 曹松伟 Large self-service intelligent network group charging equipment and guide system for building parking lot
EP2666317B1 (en) * 2011-01-20 2014-12-24 Koninklijke Philips N.V. Method, cognitive radio device and spectrum manager for authenticating and authorizing a plurality of cognitive radio slave devices
CN104767717A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Identity authentication method and device
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN109151060A (en) * 2018-09-28 2019-01-04 广州小鹏汽车科技有限公司 A kind of road surface method for monitoring abnormality, device and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于停放车辆的互联网接入研究;解全颖等;《西南民族大学学报(自然科学版)》;20160125;第85-91页 *

Also Published As

Publication number Publication date
CN110189452A (en) 2019-08-30

Similar Documents

Publication Publication Date Title
US11038879B2 (en) Identity authentication method and apparatus, and user equipment
CN110189452B (en) Vehicle key access processing method, device and system and vehicle
CN111373775B (en) Peripheral computing device
EP1895793B1 (en) Apparatus and Method for Downloading SIM Data in Mobile Communication System
JP6567751B2 (en) Multi-number service provision method
US20080127311A1 (en) Authentication system in information processing terminal using mobile information processing device
KR101892145B1 (en) Multiple-Segment Authentication Technologies
US10305901B2 (en) System and method for multi-factor authentication
US20130109351A1 (en) Authentication system, authentication method and authentication server
US9769308B2 (en) Anti-distracted driver system
CN103679000A (en) Apparatus and method for remotely deleting critical information
CN103857013A (en) Method for setting personal hotspot and mobile terminal
CN102215285A (en) Method and apparatus for protecting information in user terminal
JP3139483B2 (en) Personal communication system and communication method therefor
US10542434B2 (en) Evaluating as to whether or not a wireless terminal is authorized
CN106912049B (en) Method for improving user authentication experience
US11382016B2 (en) Communication system, base station, and control method
CN107819761B (en) Data processing method and device and readable storage medium
KR100791254B1 (en) Apparatus and method for retrieving multimedia message in mobile communication terminal
CN103051822A (en) Method, device and security service platform for transmitting alarm information
CN111949963A (en) Terminal device unlocking method, terminal device and computer readable storage medium
US11144627B2 (en) Peer assisted enhanced authentication
CA2320547A1 (en) Method for authorising a communication between at least two devices, as well as telecommunication system, as well as device
US9654975B2 (en) Method and device for authenticating a mobile device
CN113609473B (en) Wind control method for retrieving passwords, terminal equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant