CN110290497B - Method and device for accessing vehicle-mounted terminal to network and vehicle - Google Patents

Method and device for accessing vehicle-mounted terminal to network and vehicle Download PDF

Info

Publication number
CN110290497B
CN110290497B CN201910563647.8A CN201910563647A CN110290497B CN 110290497 B CN110290497 B CN 110290497B CN 201910563647 A CN201910563647 A CN 201910563647A CN 110290497 B CN110290497 B CN 110290497B
Authority
CN
China
Prior art keywords
authentication information
vehicle
network
mounted terminal
router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910563647.8A
Other languages
Chinese (zh)
Other versions
CN110290497A (en
Inventor
吴贤
罗功武
刘宇
赖艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201910563647.8A priority Critical patent/CN110290497B/en
Publication of CN110290497A publication Critical patent/CN110290497A/en
Application granted granted Critical
Publication of CN110290497B publication Critical patent/CN110290497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The application provides a method, a device and a vehicle for accessing a vehicle-mounted terminal to a network, wherein the method comprises the following steps: sending first authentication information to the vehicle-mounted terminal; sending, by the server, second authentication information to the router; and sending a network access instruction to the vehicle-mounted terminal to instruct the vehicle-mounted terminal to send the first authentication information to the router to be verified together with the second authentication information, and accessing the vehicle-mounted terminal to the network of the router. The safety of the vehicle-mounted terminal accessing to the network can be effectively improved, and the vehicle-mounted terminal is not easy to crack.

Description

Method and device for accessing vehicle-mounted terminal to network and vehicle
Technical Field
The application relates to the technical field of intelligent automobiles, in particular to a method and a device for accessing a vehicle-mounted terminal to a network and a vehicle.
Background
One of the following main vehicles of electric vehicle, electric vehicle's the charging problem hinders its important factor of using widely, in order to solve electric vehicle's the charging problem, can set up the charging field among the prior art, for electric vehicle provides concentrated charging service in the charging field, can realize collecting to charge, stop, carwash and leisure in an organic whole.
Generally, a charging field is provided with a network service, such as a WiFi network, to be provided for a vehicle-mounted terminal of an electric vehicle to use, a conventional network access scheme is generally authenticated and accessed through an account number password, but in the charging field, network security is very important for the vehicle-mounted terminal, and the conventional network access scheme is easy to crack and has low security.
Disclosure of Invention
The purpose of the present application is to solve at least one of the above technical drawbacks, especially the technical drawbacks of easy hacking and low security.
The application provides a method for accessing a vehicle-mounted terminal to a network, which comprises the following steps:
sending first authentication information to the vehicle-mounted terminal;
sending, by the server, second authentication information to the router;
and sending a network access instruction to the vehicle-mounted terminal to instruct the vehicle-mounted terminal to send the first authentication information to the router to be verified with the second authentication information, and accessing the vehicle-mounted terminal to the network of the router.
In one embodiment, before the step of sending the first authentication information to the vehicle-mounted terminal, the method further includes:
and updating the first authentication information and the second authentication information periodically, and sending the updated first authentication information and second authentication information to the vehicle-mounted terminal and the router respectively for re-verification.
In one embodiment, before the step of sending the first authentication information to the vehicle-mounted terminal, the method further includes:
establishing network connection with the vehicle-mounted terminal and establishing network connection with the server;
and acquiring access verification information input by a user, and respectively generating the first authentication information and the second authentication information according to the access verification information.
In one embodiment, after the step of accessing the vehicle-mounted terminal to the network of the router, the method further includes:
and sending a parking instruction to the server, wherein the parking instruction is used for instructing the server to control the vehicle to park through the network of the router.
In one embodiment, after the step of accessing the in-vehicle terminal to the network of the router, the method further includes:
receiving the real-time electric quantity of the vehicle sent by the vehicle-mounted terminal;
and if the real-time electric quantity is smaller than a preset electric quantity threshold value, sending a charging instruction to the server, wherein the charging instruction is used for indicating the server to control the vehicle to charge through the network of the router.
The application also provides a method for accessing the vehicle-mounted terminal into the network, which comprises the following steps:
receiving first authentication information sent by a mobile terminal;
when a network access instruction sent by the mobile terminal is received, the first authentication information is sent to a router and is verified with second authentication information, wherein the second authentication information is sent to the router by the mobile terminal through a server;
and after the router passes the verification of the first authentication information, accessing the network of the router.
In one embodiment, before the step of receiving the first authentication information sent by the mobile terminal, the method further includes:
the method comprises the steps of obtaining the real-time position of a vehicle terminal, and sending a network access prompt to the mobile terminal when the real-time position reaches a preset range.
The application also provides a method for accessing the vehicle-mounted terminal to the network, which comprises the following steps:
receiving second authentication information sent by the mobile terminal through the server;
receiving first authentication information sent by a vehicle-mounted terminal; the first authentication information is triggered and sent after the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal;
verifying the first authentication information by using the second authentication information; and accessing the vehicle-mounted terminal into a network after the verification is passed.
In one embodiment, the step of verifying the first authentication information by using the second authentication information includes:
extracting a second account password in the second authentication information and extracting a first account password in the first authentication information; and if the second account password is consistent with the first account password, the verification is passed.
The application also provides a method for accessing the vehicle-mounted terminal to the network, which comprises the following steps:
the mobile terminal sends first authentication information to the vehicle-mounted terminal and sends second authentication information to the router through the server;
the mobile terminal sends a network access instruction to the vehicle-mounted terminal;
the vehicle-mounted terminal sends the first authentication information to the router according to the network access instruction;
the router verifies the first authentication information by using the second authentication information; and accessing the vehicle-mounted terminal into a network after the verification is passed.
The present application further provides a device for accessing a vehicle-mounted terminal to a network, including:
the first sending module is used for sending the first authentication information to the vehicle-mounted terminal;
the second sending module is used for sending second authentication information to the router through the server;
and the first access module is used for sending a network access instruction to the vehicle-mounted terminal so as to instruct the vehicle-mounted terminal to send the first authentication information to the router to be verified together with the second authentication information, and the vehicle-mounted terminal is accessed to the network of the router.
The present application further provides a device for accessing a vehicle-mounted terminal to a network, including:
the first receiving module is used for receiving first authentication information sent by the mobile terminal;
the first verification module is used for sending the first authentication information to a router and verifying second authentication information when receiving a network access instruction sent by the mobile terminal, wherein the second authentication information is sent to the router by the mobile terminal through a server;
and the second access module is used for accessing the network of the router after the router verifies the first authentication information.
The present application further provides a device for accessing a vehicle-mounted terminal to a network, including:
the second receiving module is used for receiving second authentication information sent by the mobile terminal through the server;
the third receiving module is used for receiving the first authentication information sent by the vehicle-mounted terminal; the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal and then triggers to send the first authentication information;
the third access module is used for verifying the first authentication information by utilizing the second authentication information; and accessing the vehicle-mounted terminal into a network after the verification is passed.
The application further provides a vehicle, and the vehicle-mounted terminal of the vehicle is configured to execute the steps of the method for accessing the network by the vehicle-mounted terminal according to any embodiment.
The application further provides a router configured to perform the steps of the method for accessing the network by the vehicle-mounted terminal according to any embodiment.
A computer device comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the method of accessing a network by a vehicle terminal according to any of the embodiments.
A storage medium storing computer readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of a method for a vehicle terminal to access a network as in any one of the embodiments.
According to the method, the device and the vehicle for accessing the vehicle-mounted terminal to the network, the mobile terminal sends the first authentication information to the vehicle-mounted terminal, and sends the second authentication information to the router through the server; the mobile terminal sends a network access instruction to the vehicle-mounted terminal; the vehicle-mounted terminal sends the first authentication information to the router according to the network access instruction; the router verifies the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed. Different authentication information is set for different vehicle-mounted terminals, the process is simple and convenient, the operation is convenient, the network access safety can be effectively improved, and the network access safety is not easy to crack.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a diagram of an application environment of a method for accessing a vehicle-mounted terminal to a network in an embodiment;
FIG. 2 is a flow diagram of a method for accessing a network by a vehicle-mounted terminal in one embodiment;
FIG. 3 is a flow diagram of a method for accessing a network by a vehicle-mounted terminal in one embodiment;
FIG. 4 is a flow diagram of a method for accessing a network by a vehicle mounted terminal in one embodiment;
FIG. 5 is a flow diagram of a method for a vehicle terminal to access a network in one embodiment;
FIG. 6 is a flow diagram of a method for a vehicle terminal to access a network in one embodiment;
FIG. 7 is a flow diagram of a method for a vehicle terminal to access a network in one embodiment;
FIG. 8 is a flowchart of a method for accessing a network by a vehicle-mounted terminal in another embodiment;
FIG. 9 is a diagram illustrating an exemplary architecture of a network access device;
FIG. 10 is a diagram of a network access device in accordance with one embodiment;
fig. 11 is a schematic structural diagram of a network access device in another embodiment;
FIG. 12 is a diagram showing an internal configuration of a computer device according to an embodiment.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It will be understood by those within the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The method for accessing the vehicle-mounted terminal to the network can be applied to the application environment shown in fig. 1. Specifically, the mobile terminal 101 sends first authentication information to the vehicle-mounted terminal 102, and sends second authentication information to the router 104 through the server 103; the mobile terminal 101 sends a network access instruction to the vehicle-mounted terminal 102; the vehicle-mounted terminal 102 sends the first authentication information to the router 104 according to the network access instruction; the router 104 verifies the first authentication information using the second authentication information; and the in-vehicle terminal 102 is accessed to the network after the authentication is passed.
As will be understood by those skilled in the art, the "Mobile terminal" used herein may be a Mobile phone, a tablet computer, a PDA (Personal Digital Assistant), an MID (Mobile Internet Device), etc.; the server may be implemented as a stand-alone server or as a server cluster consisting of a plurality of servers.
In an embodiment, as shown in fig. 2, a method for accessing a vehicle-mounted terminal to a network is provided, which is described by taking the application of the method to the mobile terminal in fig. 1 as an example, and may include the following steps:
step S202, first authentication information is sent to the vehicle-mounted terminal.
In this step, the mobile terminal sends first authentication information to the vehicle-mounted terminal, where the first authentication information may be first account password information used for performing network access authentication on the vehicle-mounted terminal.
In a specific implementation process, the first authentication information may be directly input by a user, the mobile terminal or the server may also store a plurality of kinds of available first authentication information, and the mobile terminal or the server may select to use the first authentication information, or the server or the mobile terminal may store a plurality of kinds of available first authentication information, and automatically acquire the corresponding first authentication information according to a current time period.
In one embodiment, as shown in fig. 3, before sending the first authentication information to the vehicle-mounted terminal in step S202, the method may further include:
and step S200, establishing network connection with the vehicle-mounted terminal and establishing network connection with the server.
Specifically, the mobile terminal may be provided with an application that is respectively connected to the in-vehicle terminal and the server via a network, and the application may send the first authentication information to the in-vehicle terminal.
Step S201, acquiring access verification information input by a user, and generating first authentication information and second authentication information according to the access verification information.
In one implementation, the first authentication information and the second authentication information may be the same, the access authentication information input by the user may include the first authentication information, and the mobile terminal generates the second authentication information by copying.
In another implementation process, the first authentication information and the second authentication information may also be different, multiple sets of corresponding first authentication information and second authentication information may be stored in the mobile terminal, and which set of first authentication information and second authentication information is selected by the user is determined through the access verification information input by the user; or the server stores multiple groups of corresponding first authentication information and second authentication information, and the mobile terminal acquires the first authentication information and the second authentication information selected by the user through the access verification instruction from the server.
In another implementation process, the second authentication information may also be obtained by transforming the first authentication information through a preset rule, and the mobile terminal obtains the first authentication information and a transformation rule selected by the user through the access verification information input by the user to obtain corresponding second authentication information; or the server acquires the first authentication information and the transformation rule selected by the user through the access verification information sent by the mobile terminal to obtain the corresponding second authentication information, and returns the obtained first authentication information and the second authentication information to the mobile terminal.
For example, the first account in the first authentication information is capital "ABC", the first password is "XYZ", the corresponding conversion rule is that capital is converted into lowercase, the second account in the second authentication information is lowercase "ABC", and the second password is "XYZ"; for another example, the first account number in the first authentication information is "ABC123", the first password is "123456", and the corresponding conversion rule is that the last character is moved to the first, then the corresponding second account number in the second authentication information is "3ABC12", and the second password is "612345".
And step S204, sending the second authentication information to the router through the server.
Specifically, the mobile terminal and the server are connected through a network, the server and the router are connected through a network, and the mobile terminal can send the second authentication information to the server and forward the second authentication information to the router through the server.
And step S206, sending a network access instruction to the vehicle-mounted terminal to instruct the vehicle-mounted terminal to send the first authentication information to the router to be verified with the second authentication information, and accessing the vehicle-mounted terminal to the network of the router.
The first authentication information and the second authentication information can be the same, the router verifies the first authentication information and the second authentication information in the process that a first account number in the first authentication information is matched with a second account number in the second authentication information, a first password in the first authentication information is matched with a second password in the second authentication information, if the first account number is the same as the second account number, and the first password is the same as the second password, the verification is passed, and the vehicle-mounted terminal accesses the network of the router.
The second authentication information can also be obtained by transforming the first authentication information through a preset rule, the first authentication information and the second authentication information are verified in the process that the first account in the first authentication information is matched with the second account in the second authentication information after being transformed through the preset rule, the first password in the first authentication information is matched with the second account in the second authentication information after being transformed through the preset rule, and if the first account and the second account after being transformed through the rule are the same and the first password and the second password after being transformed through the rule are the same, the verification is passed, and the vehicle-mounted terminal is accessed into the network of the router.
In one embodiment, as shown in fig. 4, after the step S206 of accessing the in-vehicle terminal to the network of the router, the method further includes:
and step S208, the first authentication information and the second authentication information are periodically updated, and the updated first authentication information and second authentication information are respectively sent to the vehicle-mounted terminal and the router for re-verification.
Specifically, the mobile terminal may preset automatic update time, and set multiple sets of the first authentication information and the second authentication information, and when the automatic update time is reached, the mobile terminal resends the updated first authentication information to the vehicle-mounted terminal, and sends the updated second authentication information to the router for verification again.
In one embodiment, after the step S206 of accessing the in-vehicle terminal to the network of the router, the method may further include: and sending a parking instruction to the server, wherein the parking instruction is used for instructing the server to control the vehicle to park through the network of the router.
In this step, after the in-vehicle terminal accesses the network of the router, the server may control the in-vehicle terminal through the network of the router, and the in-vehicle terminal controls the vehicle to move under the control of the server, such as to travel to a specified parking location for parking.
In one embodiment, after the step S206 of accessing the in-vehicle terminal to the network of the router, the method may further include:
(1) And receiving the real-time electric quantity of the vehicle sent by the vehicle-mounted terminal.
In a specific implementation process, after the vehicle-mounted terminal accesses the network of the router, the vehicle-mounted terminal sends the real-time electric quantity of the vehicle to the mobile terminal, and the mobile terminal judges whether the real-time electric quantity is smaller than a preset electric quantity threshold value or not so as to judge whether the vehicle is charged or not; or after the vehicle-mounted terminal accesses the network of the router, the vehicle-mounted terminal judges whether the real-time electric quantity is smaller than a preset electric quantity threshold value or not, so as to judge whether the vehicle is charged or not.
(2) And if the real-time electric quantity is smaller than a preset electric quantity threshold value, sending a charging instruction to the server, wherein the charging instruction is used for instructing the server to control the vehicle to charge through the network of the router.
If the mobile terminal judges that the real-time electric quantity is smaller than the preset electric quantity threshold value, the mobile terminal sends a charging instruction to the server, the server controls the vehicle-mounted terminal through the network of the router, the vehicle-mounted terminal controls the vehicle to move to the charging pile and opens a charging interface under the control of the server, and the server controls the mechanical arm of the charging pile to be inserted into the charging gun to charge the vehicle.
If the vehicle-mounted terminal judges that the real-time electric quantity of the vehicle is smaller than a preset electric quantity threshold value, the vehicle-mounted terminal sends a charging prompt to the mobile terminal, the mobile terminal sends a charging instruction to the server according to the charging prompt, the server controls the vehicle-mounted terminal through the network of the router, the vehicle-mounted terminal controls the vehicle to move to the charging pile and opens a charging interface under the control of the server, and the server controls a mechanical arm of the charging pile to be inserted into a charging gun to charge the vehicle.
In the method for accessing the vehicle-mounted terminal to the network, the mobile terminal sends the first authentication information to the vehicle-mounted terminal and sends the second authentication information to the router through the server; the mobile terminal sends a network access instruction to the vehicle-mounted terminal; the vehicle-mounted terminal sends the first authentication information to the router according to the network access instruction; the router verifies the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed. Different authentication information is set for different vehicle-mounted terminals, the process is simple and convenient, the operation is convenient, the network access safety can be effectively improved, and the network access safety is not easy to crack.
In addition, the mobile terminal periodically updates the first authentication information and the second authentication information, and respectively sends the updated first authentication information and the updated second authentication information to the vehicle-mounted terminal and the router for re-verification, so that the security of network access can be further improved.
The above embodiments illustrate a method for accessing a network by a vehicle-mounted terminal applied to a mobile terminal, and the following describes a method for accessing a network by a vehicle-mounted terminal applied to a vehicle-mounted terminal with reference to the accompanying drawings.
In an embodiment, as shown in fig. 5, a method for accessing a network by a vehicle-mounted terminal is provided, which is described by taking the method as an example applied to the vehicle-mounted terminal in fig. 1, and may include the following steps:
step S502, first authentication information sent by the mobile terminal is received.
Specifically, the first authentication information may be directly input to the mobile terminal by the user, and the mobile terminal transmits the first authentication information input by the user to the in-vehicle terminal.
The mobile terminal or the server can also store various available first authentication information which is selected by a user for use, or the server or the mobile terminal can store various available first authentication information, automatically acquire the corresponding first authentication information according to the current time period, and the mobile terminal sends the first authentication information to the vehicle-mounted terminal.
In one embodiment, as shown in fig. 6, before receiving the first authentication information sent by the mobile terminal, step S502 further includes:
and S500, acquiring the real-time position of the vehicle terminal, and sending a network access prompt to the mobile terminal when the real-time position reaches a preset range.
When the vehicle enters a preset range, for example, a parking lot, namely, the vehicle enters a network coverage range of the router, the vehicle-mounted terminal can send a network access prompt to the mobile terminal.
Or the vehicle-mounted terminal inquires accessible network information, and if the accessible network information comprises network information corresponding to the router, the vehicle-mounted terminal sends a network access prompt to the mobile terminal.
Step S504, when receiving the network access instruction sent by the mobile terminal, the first authentication information is sent to the router and verified with the second authentication information, wherein the second authentication information is sent to the router by the mobile terminal through the server.
The first authentication information and the second authentication information may be the same, the process of verifying the first authentication information and the second authentication information includes matching a first account in the first authentication information with a second account in the second authentication information, and matching a first password in the first authentication information with a second password in the second authentication information, and if the first account is the same as the second account and the first password is the same as the second password, the verification is passed.
Step S506, after the router verifies the first authentication information, the router accesses the network of the router.
In the step, if the verification is passed, the vehicle-mounted terminal accesses the network of the router; if the verification fails, the router returns a response of the failure of the verification to the server, and the server returns the response of the failure of the verification to the mobile terminal.
In the method for accessing the vehicle-mounted terminal of the vehicle-mounted terminal to the network, the vehicle-mounted terminal receives the first authentication information of the mobile terminal, sends the first authentication information to the router and verifies the second authentication information received by the router, and if the first authentication information passes the verification, the vehicle-mounted terminal accesses the network of the router, so that the safety in the network access process can be improved.
When the real-time position of the vehicle terminal reaches the preset range, the vehicle terminal sends a network access prompt to the mobile terminal so as to prompt a user to perform network access of the vehicle terminal, and the network access is more intelligent.
The above embodiments illustrate a method for accessing a network by a vehicle-mounted terminal applied to a vehicle-mounted terminal, and the following describes a method for accessing a network by a vehicle-mounted terminal applied to a router with reference to the accompanying drawings.
In one embodiment, as shown in fig. 7, a method for accessing a vehicle-mounted terminal to a network is provided, which is described by taking the method as an example applied to the router in fig. 1, and may include the following steps:
step S702, receiving, by the server, the second authentication information sent by the mobile terminal.
In this step, the second authentication information may be second account password information used for performing network access authentication on the vehicle-mounted terminal.
Step S704, receiving first authentication information sent by the vehicle-mounted terminal; the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal and then triggers and sends the first authentication information.
In a specific implementation process, the first authentication information may be directly input by a user, the mobile terminal or the server may also store a plurality of kinds of available first authentication information, which is selected by the user for use, or the server or the mobile terminal may store a plurality of kinds of available first authentication information, and automatically acquire the corresponding first authentication information according to a current time period.
Step S706, verifying the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed.
Specifically, the first authentication information and the second authentication information may be the same or different.
In an embodiment, if the first authentication information and the second authentication information are the same, the verifying the first authentication information by using the second authentication information in step S706 may include:
(1) The router extracts the second account password in the second authentication information and extracts the first account password in the first authentication information.
The first account password comprises a first account and a first password; the second account password comprises a second account and a second password.
(2) If the second account password is consistent with the first account password, the verification is passed.
The router matches the first account with the second account and matches the first password with the second password, and if the first account is consistent with the second account and the first password is consistent with the second password, the authentication is passed.
If the second authentication information is obtained by transforming the first authentication information through a preset rule, the process of verifying the first authentication information and the second authentication information may include:
(1) Matching the first account in the first authentication information with a second account in the second authentication information after the first account in the first authentication information is transformed by a preset rule;
(2) Matching a first password in the first authentication information with a second account in the second authentication information after being transformed by a preset rule;
(3) If the first account and the second account after rule transformation are the same and the first password and the second password after rule transformation are the same, the verification is passed, and the vehicle-mounted terminal accesses to the network of the router.
In the method for accessing the vehicle-mounted terminal of the vehicle-mounted terminal to the network, the router receives the second authentication information sent by the mobile terminal and the first authentication information sent by the vehicle-mounted terminal, matches the second authentication information with the first authentication information, and receives corresponding authentication information aiming at different vehicle-mounted terminals, so that the security in the network access process can be improved.
The above embodiments illustrate a method for accessing a vehicle-mounted terminal to a network, and an interaction process between a mobile terminal, the vehicle-mounted terminal, a server, and a router will be described below with reference to the accompanying drawings.
In one embodiment, as shown in fig. 8, a method for accessing a network by a vehicle-mounted terminal is provided, which includes the following steps:
s801, the mobile terminal sends first authentication information to the vehicle-mounted terminal;
s802, the mobile terminal sends second authentication information to a server;
s803, the server sends the second authentication information to the router;
s804, the mobile terminal sends a network access instruction to the vehicle-mounted terminal;
s805, the vehicle-mounted terminal sends the first authentication information to the router according to the network access instruction;
s806, the router verifies the first authentication information by using the second authentication information;
and S807, accessing the vehicle-mounted terminal into the network after the verification is passed.
In the method for accessing the vehicle-mounted terminal to the network, the mobile terminal sends the first authentication information to the vehicle-mounted terminal and sends the second authentication information to the router through the server; the router verifies the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed. Different authentication information is set for different vehicle-mounted terminals, the process is simple and convenient, the operation is convenient, the network access safety can be effectively improved, and the network access safety is not easy to crack.
As shown in fig. 9, fig. 9 is a schematic structural diagram of a network access device in an embodiment, where the network access device provided in this embodiment includes a first sending module 201, a second sending module 202, and a first access module 203, where:
a first sending module 201, configured to send first authentication information to the vehicle-mounted terminal;
a second sending module 202, configured to send, by the server, the second authentication information to the router;
and the first access module 203 is used for sending a network access instruction to the vehicle-mounted terminal so as to instruct the vehicle-mounted terminal to send the first authentication information to the router to be verified with the second authentication information, and accessing the vehicle-mounted terminal to the network of the router.
For specific limitations of the network access device in this embodiment, reference may be made to the above limitations on a method for accessing a network by a vehicle-mounted terminal applied to a mobile terminal, which are not described herein again. The modules in the network access device may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
As shown in fig. 10, fig. 10 is a schematic structural diagram of a network access device in an embodiment, and in this embodiment, a network access device is provided, which includes a first receiving module 301, a first verifying module 302, and a second accessing module 303, where:
a first receiving module 301, configured to receive first authentication information sent by a mobile terminal;
the first verification module 302 is configured to, when receiving a network access instruction sent by a mobile terminal, send first authentication information to a router and verify second authentication information, where the second authentication information is sent by the mobile terminal to the router through a server;
and a second access module 303, configured to access the network of the router after the router verifies the first authentication information.
For specific limitations of the network access device in this embodiment, reference may be made to the above limitations on a method for accessing a network by a vehicle-mounted terminal applied to the vehicle-mounted terminal, which are not described herein again. The modules in the network access device may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
As shown in fig. 11, fig. 11 is a schematic structural diagram of a network access device in an embodiment, where the network access device provided in this embodiment includes a second receiving module 401, a third receiving module 402, and a third access module 403, where:
a second receiving module 401, configured to receive, through the server, second authentication information sent by the mobile terminal;
a third receiving module 402, configured to receive first authentication information sent by the vehicle-mounted terminal; the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal and then triggers and sends the first authentication information;
a third access module 403, configured to verify the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed.
For specific limitations of the network access device in this embodiment, reference may be made to the above limitations on a method for a vehicle-mounted terminal applied to a router to access a network, and details are not described herein again. The modules in the network access device may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, the present application further provides a vehicle provided with a network access device; the steps of the method for accessing the network by the vehicle-mounted terminal, which is configured to be applied to the vehicle-mounted terminal in any one of the above embodiments.
In one embodiment, the present application further provides a router configured to perform the steps of the method applied to the in-vehicle terminal access network of the router in any of the above embodiments.
As shown in fig. 12, fig. 12 is a schematic diagram of an internal structure of a computer device in one embodiment. The computer apparatus includes a processor, a non-volatile storage medium, a memory, and a network interface connected by a device bus. The non-volatile storage medium of the computer device stores an operating device, a database and computer readable instructions, the database can store control information sequences, and the computer readable instructions, when executed by the processor, can enable the processor to implement a method for accessing the vehicle-mounted terminal to the network. The processor of the computer device is used for providing calculation and control capability and supporting the operation of the whole computer device. The memory of the computer device may have computer readable instructions stored therein, which when executed by the processor, may cause the processor to perform a method for accessing a network by a vehicle-mounted terminal. The network interface of the computer device is used for connecting and communicating with the terminal. Those skilled in the art will appreciate that the architecture shown in fig. 12 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, the computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: sending first authentication information to the vehicle-mounted terminal; sending, by the server, second authentication information to the router; and sending a network access instruction to the vehicle-mounted terminal to instruct the vehicle-mounted terminal to send the first authentication information to the router to be verified with the second authentication information, and accessing the vehicle-mounted terminal to the network of the router.
In one embodiment, after the step of accessing the vehicle-mounted terminal to the network of the router when the processor executes the computer program, the method further comprises the following steps: and regularly updating the first authentication information and the second authentication information, and respectively sending the updated first authentication information and second authentication information to the vehicle-mounted terminal and the router for re-verification.
In one embodiment, before the step of sending the first authentication information to the vehicle-mounted terminal when the processor executes the computer program, the method further includes: establishing network connection with a vehicle-mounted terminal and establishing network connection with a server; and acquiring access verification information input by a user, and respectively generating first authentication information and second authentication information according to the access verification information.
In one embodiment, after the step of accessing the vehicle-mounted terminal to the network of the router when the processor executes the computer program, the method further includes: and sending a parking instruction to the server, wherein the parking instruction is used for instructing the server to control the vehicle to park through the network of the router.
In one embodiment, after the step of accessing the vehicle-mounted terminal to the network of the router when the processor executes the computer program, the method further includes: receiving the real-time electric quantity of the vehicle sent by the vehicle-mounted terminal; and if the real-time electric quantity is smaller than the preset electric quantity threshold value, sending a charging instruction to the server, wherein the charging instruction is used for indicating the server to control the vehicle to be charged through the network of the router.
In one embodiment, a computer device is provided, the computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: receiving first authentication information sent by a mobile terminal; when receiving a network access instruction sent by a mobile terminal, sending first authentication information to a router and verifying the first authentication information and second authentication information, wherein the second authentication information is sent to the router by the mobile terminal through a server; and after the router verifies the first authentication information, accessing the network of the router.
In one embodiment, before the step of receiving the first authentication information sent by the mobile terminal when the processor executes the computer program, the method further includes: and acquiring the real-time position of the vehicle terminal, and sending a network access prompt to the mobile terminal when the real-time position reaches a preset range.
In one embodiment, a computer device is provided, the computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: receiving second authentication information sent by the mobile terminal through the server; receiving first authentication information sent by a vehicle-mounted terminal; the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal and then triggers and sends the first authentication information; verifying the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed.
In one embodiment, the step of verifying the first authentication information by using the second authentication information when the processor executes the computer program comprises: extracting a second account password in the second authentication information and extracting a first account password in the first authentication information; and if the second account password is consistent with the first account password, the verification is passed.
In one embodiment, a computer device is provided, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: the mobile terminal sends first authentication information to the vehicle-mounted terminal and sends second authentication information to the router through the server; the mobile terminal sends a network access instruction to the vehicle-mounted terminal; the vehicle-mounted terminal sends the first authentication information to the router according to the network access instruction; the router verifies the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed.
In one embodiment, a storage medium is provided that stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of: sending first authentication information to the vehicle-mounted terminal; sending, by the server, second authentication information to the router; and sending a network access instruction to the vehicle-mounted terminal to instruct the vehicle-mounted terminal to send the first authentication information to the router to be verified with the second authentication information, and accessing the vehicle-mounted terminal to the network of the router.
In one embodiment, after the step of accessing the in-vehicle terminal to the network of the router when the computer readable instructions are executed by the processor, the method further includes: and regularly updating the first authentication information and the second authentication information, and respectively sending the updated first authentication information and second authentication information to the vehicle-mounted terminal and the router for re-verification.
In one embodiment, before the step of sending the first authentication information to the vehicle-mounted terminal, the computer-readable instructions further include: establishing network connection with a vehicle-mounted terminal and establishing network connection with a server; and acquiring access verification information input by a user, and respectively generating first authentication information and second authentication information according to the access verification information.
In one embodiment, a storage medium is provided that stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of: receiving first authentication information sent by a mobile terminal; when receiving a network access instruction sent by a mobile terminal, sending first authentication information to a router and verifying the first authentication information and second authentication information, wherein the second authentication information is sent to the router by the mobile terminal through a server; and after the router verifies the first authentication information, accessing the network of the router.
In one embodiment, before the step of receiving the first authentication information sent by the mobile terminal when the computer readable instructions are executed by the processor, the method further includes: and acquiring the real-time position of the vehicle terminal, and sending a network access prompt to the mobile terminal when the real-time position reaches a preset range.
In one embodiment, a storage medium is provided that stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of: receiving second authentication information sent by the mobile terminal through the server; receiving first authentication information sent by a vehicle-mounted terminal; the first authentication information is triggered and sent after the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal; verifying the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed.
In one embodiment, the step of verifying the first authentication information using the second authentication information when the computer readable instructions are executed by the processor comprises: extracting a second account password in the second authentication information and extracting a first account password in the first authentication information; and if the second account password is consistent with the first account password, the verification is passed.
In one embodiment, a storage medium is provided that stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of: the mobile terminal sends first authentication information to the vehicle-mounted terminal and sends second authentication information to the router through the server; the mobile terminal sends a network access instruction to the vehicle-mounted terminal; the vehicle-mounted terminal sends the first authentication information to the router according to the network access instruction; the router verifies the first authentication information by using the second authentication information; and the vehicle-mounted terminal is accessed into the network after the verification is passed.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of execution is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, several modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (16)

1. A method for accessing a vehicle-mounted terminal to a network is characterized by comprising the following steps:
receiving network access reminding information sent by a vehicle-mounted terminal when a vehicle enters a preset range or when accessible network information is obtained through inquiry;
sending first authentication information to the vehicle-mounted terminal based on the network access reminding information, and sending second authentication information determined based on the first authentication information to the router through the server;
sending a network access instruction to the vehicle-mounted terminal to instruct the vehicle-mounted terminal to send the first authentication information to the router, verifying the first authentication information by the router by using the second authentication information, and accessing the vehicle-mounted terminal to a network of the router after the verification is passed;
and updating the first authentication information and the second authentication information periodically, and sending the updated first authentication information and second authentication information to the vehicle-mounted terminal and the router respectively for re-verification.
2. The method for accessing the network by the vehicle-mounted terminal according to claim 1, wherein the step of sending the first authentication information to the vehicle-mounted terminal is preceded by the steps of:
establishing network connection with the vehicle-mounted terminal and establishing network connection with the server;
and acquiring access verification information input by a user, and respectively generating the first authentication information and the second authentication information according to the access verification information.
3. The method for accessing the network by the vehicle-mounted terminal according to claim 1, wherein the step of accessing the vehicle-mounted terminal to the network of the router is followed by further comprising:
and sending a parking instruction to the server, wherein the parking instruction is used for instructing the server to control the vehicle to park through the network of the router.
4. The method for accessing the network by the vehicle-mounted terminal according to claim 1, wherein the step of accessing the vehicle-mounted terminal to the network of the router is followed by further comprising:
receiving the real-time electric quantity of the vehicle sent by the vehicle-mounted terminal;
and if the real-time electric quantity is smaller than a preset electric quantity threshold value, sending a charging instruction to the server, wherein the charging instruction is used for instructing the server to control the vehicle to charge through the network of the router.
5. A method for accessing a vehicle-mounted terminal to a network is characterized by comprising the following steps:
when the vehicle enters a preset range or accessible network information is obtained through inquiry, network access reminding information is sent to the mobile terminal;
receiving first authentication information sent by the mobile terminal based on the network access reminding information;
when receiving a network access instruction sent by the mobile terminal, sending the first authentication information to a router so that the router verifies the first authentication information by using second authentication information, wherein the second authentication information is determined based on the first authentication information and is sent to the router by the mobile terminal through a server;
after the router verifies the first authentication information, accessing the network of the router;
and the router respectively perform re-verification on the received first authentication information and second authentication information which are sent by the mobile terminal after being periodically updated.
6. The method for accessing the network by the vehicle-mounted terminal according to claim 5, wherein the step of sending the network access reminding information to the mobile terminal when the vehicle enters the preset range comprises the following steps:
the method comprises the steps of obtaining the real-time position of a vehicle terminal, and sending network access reminding information to the mobile terminal when the real-time position reaches a preset range.
7. A method for accessing a vehicle-mounted terminal to a network is characterized by comprising the following steps:
receiving second authentication information sent by a server, wherein the second authentication information is sent by a mobile terminal through the server;
receiving first authentication information sent by a vehicle-mounted terminal; the first authentication information is sent to the vehicle-mounted terminal by the mobile terminal based on network access reminding information, and is sent after the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal; the second authentication information is determined based on the first authentication information; the network access reminding information is sent to the mobile terminal when the vehicle enters a preset range or accessible network information is obtained through inquiry;
verifying the first authentication information by using the second authentication information; after the vehicle-mounted terminal passes the verification, the vehicle-mounted terminal is accessed into a network;
and the vehicle-mounted terminal respectively perform re-verification on the received first authentication information and second authentication information which are sent by the mobile terminal after being periodically updated.
8. The method for accessing the network by the vehicle-mounted terminal according to claim 7, wherein the step of verifying the first authentication information by using the second authentication information comprises:
extracting a second account password in the second authentication information and extracting a first account password in the first authentication information; and if the second account password is consistent with the first account password, the verification is passed.
9. A method for accessing a vehicle-mounted terminal to a network is characterized by comprising the following steps:
the vehicle-mounted terminal sends network access reminding information to the mobile terminal when a vehicle enters a preset range or when accessible network information is obtained through inquiry;
the mobile terminal sends first authentication information to the vehicle-mounted terminal based on the network access reminding information, and sends second authentication information determined based on the first authentication information to the router through the server;
the mobile terminal sends a network access instruction to the vehicle-mounted terminal;
the vehicle-mounted terminal sends the first authentication information to the router according to the network access instruction;
the router verifies the first authentication information by using the second authentication information; after the verification is passed, the vehicle-mounted terminal is accessed to a network;
and the mobile terminal periodically updates the first authentication information and the second authentication information and respectively sends the updated first authentication information and second authentication information to the vehicle-mounted terminal and the router for re-verification.
10. An apparatus for accessing a network by a vehicle-mounted terminal, comprising:
the first sending module is used for receiving network access reminding information sent by the vehicle-mounted terminal when a vehicle enters a preset range or when accessible network information is inquired; sending first authentication information to the vehicle-mounted terminal based on the network access reminding information;
a second sending module, configured to send, by the server, second authentication information determined based on the first authentication information to the router;
the first access module is used for sending a network access instruction to the vehicle-mounted terminal so as to instruct the vehicle-mounted terminal to send the first authentication information to the router, the router verifies the first authentication information by using the second authentication information, and the vehicle-mounted terminal is accessed to the network of the router after the verification is passed; and the router is also used for regularly updating the first authentication information and the second authentication information and respectively sending the updated first authentication information and second authentication information to the vehicle-mounted terminal and the router for re-verification.
11. An apparatus for accessing a network by a vehicle-mounted terminal, comprising:
the first receiving module is used for sending network access reminding information to the mobile terminal when a vehicle enters a preset range or when accessible network information is inquired and obtained, and receiving first authentication information sent by the mobile terminal based on the network access reminding information;
the first verification module is used for sending the first authentication information to a router when receiving a network access instruction sent by the mobile terminal so as to verify the first authentication information by the router by using second authentication information, wherein the second authentication information is determined based on the first authentication information and is sent to the router by the mobile terminal through a server; the router and the mobile terminal are further used for re-verifying the received first authentication information and the second authentication information which are sent by the mobile terminal after being periodically updated;
and the second access module is used for accessing the network of the router after the router passes the verification of the first authentication information.
12. An apparatus for accessing a network by a vehicle-mounted terminal, comprising:
the second receiving module is used for receiving second authentication information sent by the server, and the second authentication information is sent by the mobile terminal through the server;
the third receiving module is used for receiving the first authentication information sent by the vehicle-mounted terminal; the first authentication information is sent to the vehicle-mounted terminal by the mobile terminal based on network access reminding information, and is sent after the vehicle-mounted terminal receives a network access instruction sent by the mobile terminal; the second authentication information is determined based on the first authentication information; the network access reminding information is sent to the mobile terminal when the vehicle enters a preset range or accessible network information is obtained by inquiring;
the third access module is used for verifying the first authentication information by utilizing the second authentication information; after the vehicle-mounted terminal passes the verification, the vehicle-mounted terminal is accessed into a network; and the vehicle-mounted terminal and the mobile terminal are respectively used for carrying out re-verification on the received first authentication information and second authentication information which are sent by the mobile terminal after being periodically updated.
13. A vehicle, characterized in that a vehicle terminal of the vehicle is configured for performing the steps of the method for accessing a network by a vehicle terminal according to any one of claims 5 to 6.
14. A router, characterized in that it is configured for carrying out the steps of the method for accessing a network by a vehicular terminal according to any one of claims 7 to 8.
15. A computer device comprising a memory and a processor, the memory having stored therein computer-readable instructions, wherein the computer-readable instructions, when executed by the processor, cause the processor to perform the steps of the method of accessing a network by a vehicle terminal according to any one of claims 1 to 9.
16. A storage medium storing computer readable instructions, which, when executed by one or more processors, cause the one or more processors to perform the steps of the method for a vehicle terminal to access a network according to any one of claims 1 to 9.
CN201910563647.8A 2019-06-26 2019-06-26 Method and device for accessing vehicle-mounted terminal to network and vehicle Active CN110290497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910563647.8A CN110290497B (en) 2019-06-26 2019-06-26 Method and device for accessing vehicle-mounted terminal to network and vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910563647.8A CN110290497B (en) 2019-06-26 2019-06-26 Method and device for accessing vehicle-mounted terminal to network and vehicle

Publications (2)

Publication Number Publication Date
CN110290497A CN110290497A (en) 2019-09-27
CN110290497B true CN110290497B (en) 2023-03-31

Family

ID=68006255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910563647.8A Active CN110290497B (en) 2019-06-26 2019-06-26 Method and device for accessing vehicle-mounted terminal to network and vehicle

Country Status (1)

Country Link
CN (1) CN110290497B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113010893A (en) * 2019-12-19 2021-06-22 华为技术有限公司 Software management method, device and system
CN114125840B (en) * 2021-10-18 2022-08-05 广州鲁邦通物联网科技股份有限公司 Wireless communication method, system and gateway equipment based on LoRa
CN114475530A (en) * 2021-12-31 2022-05-13 深圳市小马控股有限公司 Vehicle washing method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010090038A (en) * 2001-08-21 2001-10-18 (주) 대성디지탈테크 Wireless local area network sytem and method for managing the same
US10104547B1 (en) * 2017-05-24 2018-10-16 GM Global Technology Operations LLC Automatic wireless communication authentication

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8977284B2 (en) * 2001-10-04 2015-03-10 Traxcell Technologies, LLC Machine for providing a dynamic data base of geographic location information for a plurality of wireless devices and process for making same
US9919598B2 (en) * 2011-08-22 2018-03-20 Lg Electronics Inc. Mobile terminal, image display apparatus mounted in vehicle and data processing method using the same
CN103985271B (en) * 2014-05-18 2016-09-14 吉林大学 A kind of intelligent parking based on cloud Internet of Things guides system
CN104158819A (en) * 2014-08-27 2014-11-19 重庆长安汽车股份有限公司 Safety authentication method of vehicle-mounted information entertainment terminal
CN104244455A (en) * 2014-09-01 2014-12-24 小米科技有限责任公司 Wireless local area network access information sharing method and device
CN106921675B (en) * 2017-03-30 2020-06-26 北京奇艺世纪科技有限公司 Method and device for accessing intelligent hardware to limited network
CN109041011A (en) * 2018-07-25 2018-12-18 深圳市元征科技股份有限公司 A kind of vehicle detection terminal and networking method, system, equipment, computer media
CN109038746A (en) * 2018-08-21 2018-12-18 谭钧方 Intelligent charging system and intelligent charging method
CN109067925B (en) * 2018-10-09 2021-07-23 北京智行者科技有限公司 Remote control parking method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010090038A (en) * 2001-08-21 2001-10-18 (주) 대성디지탈테크 Wireless local area network sytem and method for managing the same
US10104547B1 (en) * 2017-05-24 2018-10-16 GM Global Technology Operations LLC Automatic wireless communication authentication

Also Published As

Publication number Publication date
CN110290497A (en) 2019-09-27

Similar Documents

Publication Publication Date Title
CN110290497B (en) Method and device for accessing vehicle-mounted terminal to network and vehicle
US20230249560A1 (en) Facilitating access to an electric vehicle charging network
US20220032793A1 (en) System for providing an interface to electric vehicle charging stations
TWI788354B (en) Method and apparatus for managing vehicle control permissions
CN106740210A (en) Charging electric vehicle method and device based on Quick Response Code
CN107690149B (en) Method for triggering network policy update, management function entity and core network equipment
CN110356363A (en) A kind of driver identity authentication method, device, system and server
CN106899972B (en) Vehicle registration method, vehicle charging method, device and system
CN112995403B (en) Vehicle control method and related device
CN105513418A (en) Parking method, device and system
US20170237849A1 (en) Anti-distracted driver system
CN112363767A (en) Vehicle-mounted camera calling method and device
CN106295913A (en) The matching system of a kind of rideshare about car and matching process thereof and device
CN112309168A (en) Parking lot map downloading management method, device and system and storage medium
CN108898870B (en) Voice vehicle taking method and terminal for mechanical garage, management cloud platform and storage medium
CN112406615A (en) Electric vehicle charging management method and device and computer readable storage medium
CN108428361B (en) Parking lot charging parking space query method and system and storage medium
CN108215904B (en) Automobile and electric automobile leasing control method and system
CN107644265B (en) Reservation method, device and system for shared object and server
CN111497673A (en) Charging pile management method, mobile terminal, charging pile, cloud platform and medium
CN112927548A (en) Mechanical garage vehicle taking method and system and storage medium
CN105015484A (en) Remote-start control method and intelligent control unit of motor vehicle
CN111866783A (en) Order processing method and device, computer equipment and storage medium
CN112235349B (en) Vehicle comprehensive service method, system, computer equipment and storage medium
KR20150085898A (en) Method and System for Vehicle Firmware Update with Driver Authorization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant