CN110310392A - Unlocking method of vehicle, device, computer equipment and storage medium - Google Patents
Unlocking method of vehicle, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110310392A CN110310392A CN201910429513.7A CN201910429513A CN110310392A CN 110310392 A CN110310392 A CN 110310392A CN 201910429513 A CN201910429513 A CN 201910429513A CN 110310392 A CN110310392 A CN 110310392A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- ciphertext
- unlock
- unlocking
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
- B60R25/248—Electronic key extraction prevention
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
Abstract
The invention discloses a kind of unlocking method of vehicle, device, computer equipment and storage mediums, which comprises receiving terminal apparatus sends radio connection request, and establishes and be wirelessly connected with terminal device;The vehicle unlock instruction that receiving terminal apparatus is sent;Unlock ciphertext is decrypted using the first public-key cryptography generated according to RSA Algorithm, and obtains the unlock ciphertext after decryption;According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;When unlock ciphertext meets unlocking condition, vehicle is unlocked.The present invention greatly improves the safety of intelligent unlocking while carrying out quick, intelligent unlock to vehicle, cracks vehicle unlocking program to prevent by other people and causes user's property loss, enhances user experience.
Description
Technical field
The present invention relates to art of cryptography more particularly to a kind of unlocking method of vehicle, device, computer equipment and storages
Medium.
Background technique
In vehicle automatic unlocking field, scheme, face unlock, fingerprint are unlocked currently without a kind of automotive vehicle of low cost
Unlock is limited to the accuracy of recognition of face, and specific camera or fingerprint-collection device is needed just to be able to achieve, and leads to hardware
Higher cost cannot be popularized in low end vehicle, there are also being exactly that there may be errors for recognition of face and fingerprint recognition, not can guarantee
Therefore recognition accuracy very may cause any property loss to user.
Summary of the invention
Based on this, the present invention provides a kind of unlocking method of vehicle, device, computer equipment and storage medium, for being promoted
The safety of intelligent unlocking cracks vehicle unlocking program by other people and causes user's property loss to prevent, and enhances user
Experience.
A kind of unlocking method of vehicle, the following steps including controlling end execution in the car:
Receiving terminal apparatus send the radio connection request comprising unique identification, and according to the unique identification with it is described
Terminal device, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is included in the terminal device
Unlock ciphertext after the first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and obtains solution
The unlock ciphertext after close;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
A kind of unlocking method of vehicle, including the following steps executed in terminal device:
Radio connection request comprising unique identification is sent to terminal device, and by the unique identification and vehicle
It controls end and establishes wireless connection;
The first privacy key and unlock ciphertext are obtained, and by unlocking ciphertext described in first secret key encryption;
Vehicle unlock instruction comprising the unlock ciphertext is sent in the vehicle and controls end, for being controlled in the vehicle
After end is decrypted the encrypted unlock ciphertext using first public-key cryptography, meet out in the unlock ciphertext
Vehicle is unlocked when bolt part.
A kind of vehicle tripper, including end is controlled in vehicle, end is controlled in the vehicle includes:
Link block, for the radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to described
Unique identification and the terminal device, which are established, to be wirelessly connected;
Receiving module, the vehicle unlock instruction sent for receiving the terminal device, the vehicle unlock instruction include
Unlock ciphertext after the terminal device is by the first secret key encryption, first privacy key is calculated according to RSA
The key that method generates;
Deciphering module, for using the first public-key cryptography generated according to the RSA Algorithm to carry out the unlock ciphertext
Decryption, and obtain the unlock ciphertext after decryption;
Detection module, for according to preset unlocking rule, whether the unlock ciphertext after detection decryption to meet unlocking
Condition;
Unlocking module, for being unlocked to vehicle when the unlock ciphertext meets the unlocking condition.
A kind of vehicle tripper, including terminal device, the terminal device include:
First sending module, for will include that the radio connection request of unique identification is sent to terminal device, and passes through institute
It states control end in unique identification and vehicle and establishes wireless connection;
Module is obtained, for obtaining the first privacy key and unlock ciphertext, and passes through the first secret key encryption institute
State unlock ciphertext;
Second sending module, the vehicle unlock instruction for that will include the unlock ciphertext are sent in the vehicle and control
End, after control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in the vehicle,
Vehicle is unlocked when the unlock ciphertext meets unlocking condition.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing
The computer program run on device, the processor realize the step of above-mentioned unlocking method of vehicle when executing the computer program
Suddenly.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter
The step of calculation machine program realizes above-mentioned unlocking method of vehicle when being executed by processor.
Above-mentioned unlocking method of vehicle, device, computer equipment and storage medium, the present invention is by carrying out intelligence to vehicle
It is i.e. described to the critical data unlocked using the privacy key and public-key cryptography generated by RSA Algorithm during unlock
Unlock ciphertext is encrypted, and binding time stabs and carries out double-encryption to the unlock ciphertext, is carrying out quick intelligence to vehicle
While capable of unlocking, the safety because of intelligent unlocking is greatly improved, cracks vehicle unlocking program by other people to prevent
And user's property loss is caused, enhance user experience.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of unlocking method of vehicle in one embodiment of the invention;
Fig. 2 is the flow chart that unlocking method of vehicle controls end execution in the car in one embodiment of the invention;
Fig. 3 is the flow chart of the step S40 of unlocking method of vehicle in one embodiment of the invention;
Fig. 4 is the flow chart of unlocking method of vehicle in another embodiment of the present invention;
Fig. 5 is the flow chart that unlocking method of vehicle is executed in terminal device in one embodiment of the invention;
Fig. 6 is the flow chart of the step S90 of unlocking method of vehicle in one embodiment of the invention;
Fig. 7 is the schematic diagram for controlling end in one embodiment of the invention in the vehicle of vehicle tripper;
Fig. 8 is the schematic diagram of the detection module of vehicle tripper in one embodiment of the invention;
Fig. 9 is the schematic diagram for controlling end in another embodiment of the present invention in the vehicle of vehicle tripper;
Figure 10 is the schematic diagram of the terminal device of vehicle tripper in one embodiment of the invention;
Figure 11 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Unlocking method of vehicle provided by the invention can be applicable in the application environment such as Fig. 1, wherein terminal device passes through
Network is communicated with control end in vehicle.By during carrying out intelligent unlocking to vehicle using being generated by RSA Algorithm
Privacy key and public-key cryptography encrypt the i.e. described unlock ciphertext of the critical data unlocked, further, by pre-
If unlocking rule the unlock ciphertext is determined, when the unlock ciphertext meets unlocking condition, vehicle is solved
Lock.Wherein, terminal device includes but is not limited to various personal computers, laptop, smart phone, tablet computer and portable
Formula wearable device.End is controlled in vehicle to be mounted in the vehicle, can use independent server either multiple server groups
At server cluster realize.
In one embodiment, as shown in Fig. 2, providing a kind of unlocking method of vehicle, the vehicle in Fig. 1 is applied in this way
It is illustrated for middle control end, the unlocking method of vehicle includes the following steps that control end executes in the car:
S10, the radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to the unique identification and
The terminal device, which is established, to be wirelessly connected.
Wherein, the terminal device includes but is not limited to mobile phone, smartwatch, the key with communication function (Bluetooth function)
The mobile terminals such as key bow further include the terminal devices such as computer.The unique identification is the tool for distinguishing different terminal devices
There is the mark of uniqueness.
The connection request can be sent in vehicle by the preset button of click by user and control end, can also entered
Into a certain range of receiver, it is automatically sent to control end in vehicle.For example, leading to when user wants to be unlocked vehicle
Cross and click the pre-set button of the terminal device of its carrying and send the connection request and control end into vehicle, also or, when the use
Family enters in a certain range of the vehicle, after the terminal device carried detects, automatically sends out the connection request
It send and controls end into vehicle.
Understandably, it after control termination receives the connection request in vehicle, i.e., establishes and is wirelessly connected with the terminal device,
In one embodiment, the connection request is to be sent in vehicle to control end by bluetooth, and control end in the vehicle and receive request
Afterwards, i.e., it is established and is wirelessly connected by bluetooth and the terminal device.In another embodiment, end and the end are controlled in the vehicle
End equipment is established to be wirelessly connected to establish by radio network technique (such as WiFi) and the terminal device and is wirelessly connected.With
The terminal device, which is established, to be wirelessly connected, for receiving the vehicle unlock instruction that the terminal device is sent in the next steps,
In order to be unlocked to vehicle.
S20, receives the vehicle unlock instruction that the terminal device is sent, and the vehicle unlock instruction is included in the terminal
Equipment passes through the unlock ciphertext after the first secret key encryption, and first privacy key is according to the close of RSA Algorithm generation
Key.
Wherein, the vehicle unlock instruction is the instruction for being unlocked to vehicle, and control termination receives described in vehicle
After vehicle unlock instruction, that is, open the unlock process to vehicle.The unlock ciphertext is the ciphertext for being unlocked to vehicle,
It can be a string of characters, a word or a word etc..The unlock ciphertext can give birth to when sending the vehicle unlock instruction
At, and encrypted by first privacy key, it can also be pre- after the first secret key encryption of the RSA Algorithm
It is first stored in the terminal device.
The RSA Algorithm is a kind of rivest, shamir, adelman, i.e., is used for according to what the RSA Algorithm generated to information or number
It with the key for information or data to be decrypted generated according to the RSA Algorithm is non-right according to the key encrypted
Claim.For example, generating a pair of secret keys simultaneously according to the RSA Algorithm, respectively the first privacy key and first disclose close
Key cannot be by first privacy key to this when being encrypted using first privacy key to information or data
Information or the data are decrypted, and must use different and asymmetric from first privacy key (asymmetry refers to cannot
First public-key cryptography is derived by known method according to known first privacy key) first disclose it is close
The information or data Jing Guo first secret key encryption can be decrypted in key.
When encrypting using the RSA Algorithm to information or data, one is generated simultaneously according to the RSA Algorithm first
To key, one of them is secrecy, underground, namely only user or user preset people or equipment could save or know
The key of dawn, the key are privacy key (in the present embodiment, as described first privacy key);And another key is then
It is key disclosed, unclassified, that anyone or equipment can be known or obtain, which is public-key cryptography (in this reality
It applies in example, as described first public-key cryptography).Understandably, first privacy key and first public-key cryptography be each other
A pair of of unsymmetrical key then uses described first that is, when encrypting using first privacy key to information or data
The encrypted information or the data can be decrypted in public-key cryptography;Use first public-key cryptography to letter conversely, working as
When breath or data are encrypted, then the encrypted information or the data can be solved using first privacy key
It is close.It should be noted that first privacy key is controlled in the vehicle in advance after being generated in end according to the RSA Algorithm,
It sends and stores to the terminal device dominated by user.
In the present embodiment, setting encrypts the unlock ciphertext using first privacy key, it will be appreciated that ground,
First privacy key is generally stored inside in the terminal device dominated by user, when user needs to solve vehicle
When lock, i.e., solution described in first secret key encryption is used by establishing the terminal device of wireless connection with vehicle
Ciphertext is locked, or directly transfers the solution for having been subjected to first secret key encryption being stored in advance on the terminal device
Ciphertext is locked, encrypted unlock ciphertext is sent in the vehicle and controls end, it will be appreciated that ground, the reception encryption in control end in vehicle
Unlock ciphertext afterwards lifts vehicle unlock for the unlock ciphertext is decrypted in the next steps, and then described in judgement
Whether the user of request meets the condition of unlocking.
S30 is decrypted the unlock ciphertext using the first public-key cryptography generated according to the RSA Algorithm, and obtains
The unlock ciphertext after taking decryption.
As described above, first public-key cryptography is generated simultaneously according to the RSA Algorithm and first privacy key
One disclosed in, unclassified key, first public-key cryptography is a pair of each other asymmetric close with first privacy key
Key.First public-key cryptography after being generated according to the RSA Algorithm, control in the vehicle database at end in the car by storage.
Specifically, it after control termination receives the decryption ciphertext of terminal device transmission in vehicle, i.e., is adjusted from vehicle database
First public-key cryptography is taken, then, the unlock ciphertext received is decrypted by first public-key cryptography, it is raw
At the unlock ciphertext after decryption, then, the unlock ciphertext is obtained, it is described after decrypting in step s 40, detecting
Whether unlock ciphertext meets preset unlocking condition.
S40, according to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition.
Wherein, the unlocking rule can be preset according to demand.
In one embodiment, the rule of unlocking can be set as when the content of the unlock ciphertext and preset unlocking are close
When the content of text is consistent, the unlock ciphertext meets unlocking condition.As described above, the unlock ciphertext can also be user's root
It is preset according to demand, it can be a string of characters, a word or a word etc., here with the unlock ciphertext for a word
Language is illustrated the present embodiment: such as preset unlocking ciphertext is " hello ", at this point, the unlock ciphertext after detection decryption
Content it is whether consistent with the unlocking ciphertext, that is, detection it is described unlock ciphertext content whether be " hello ", when result is
When being, represents the unlock ciphertext and meet the unlocking condition vehicle is unlocked at this point, entering step S50;Work as result
When being no, represents the unlock ciphertext and do not meet unlocking condition, at this point, the confirmation unlock ciphertext does not meet unlocking condition, it will
This vehicle unlocking request is recorded as request failure, and the request frequency of failure of the vehicle unlocking request is added one, so as to
In in some embodiments, according to the number of the request failure, preset restriction is carried out to vehicle unlocking request next time.
In another embodiment, the rule of unlocking includes the first unique identification of at least one terminal device, i.e., in advance
The unique identification of all terminal devices that can be carried out unlocking is stored in the unlocking rule;It is described unlock ciphertext content be
Second unique identification of terminal device used in active user, namely initiate unique mark of the terminal device of vehicle unlock instruction
Know, in this embodiment, detecting whether there is and the unlock ciphertext in all first unique identifications in the rule of unlocking
In the consistent mark of the second unique identification, that is, by second unique identification and all first unique identifications
Be compared respectively, when detect in all first unique identifications exist it is consistent with second unique identification unique
When mark, represent the corresponding terminal device of second unique identification as it is preset can be to the end that the vehicle is unlocked
End equipment, at this point, the confirmation unlock ciphertext meets unlocking condition;And it is not deposited in all first unique identifications when detecting
In the unique identification consistent with second unique identification, representing the corresponding terminal device of second unique identification is not
Terminal device in the pre-existing rule of unlocking, at this point, this vehicle unlocking request is recorded as request failure, and will
The request frequency of failure of the vehicle unlocking request adds one.
S50 is unlocked vehicle when the unlock ciphertext meets the unlocking condition.
When the unlock ciphertext meets the unlocking condition, the user for representing initiation vehicle unlocking instruction operation possesses out
Qualification is locked, at this point, being unlocked according to the vehicle unlock instruction to the vehicle.
The present embodiment by during carrying out intelligent unlocking to vehicle using the privacy key generated by RSA Algorithm with
Public-key cryptography encrypts the i.e. described unlock ciphertext of the critical data unlocked, and is carrying out quick, intelligent unlock to vehicle
While, the safety because of intelligent unlocking is greatly improved, vehicle unlocking program is cracked to prevent and caused by other people
User's property loss enhances user experience.
It in one embodiment, include preset uncaging time length and preset unlocking ciphertext in unlocking rule,
The unlock ciphertext includes unlock ciphertext content and to generate the unlock time point of ciphertext with the terminal device corresponding
Timestamp;As shown in figure 3, the step S40 includes:
S401, detects the unlock ciphertext content and whether the unlocking ciphertext is consistent.
Comprising unlock ciphertext content in the unlock ciphertext, the unlock ciphertext content can be a string of characters, a word
Or word etc. in the present embodiment, detects the unlock for being compared with the unlocking ciphertext in the rule of unlocking
Whether preset unlocking ciphertext is consistent in ciphertext content and unlocking rule, when the unlock ciphertext content and the unlocking are close
When text is consistent, the unlocking condition may be met by representing the unlock ciphertext, at this point, enter step S402, according to it is described when
Between stamp obtain the time point that the terminal device generates the unlock ciphertext, further to verify whether the unlock ciphertext accords with
Run bolt part jointly.When the unlock ciphertext content and the unlocking ciphertext content are inconsistent, confirm that the unlock ciphertext is not inconsistent
The unlocking condition is closed, and this vehicle unlocking request is recorded as request failure, and asking the vehicle unlocking request
The frequency of failure is asked to add one.
S402 obtains the end according to the timestamp when the unlock ciphertext content is consistent with the unlocking ciphertext
End equipment generates the time point of the unlock ciphertext.
The unlock ciphertext is also included in the time point corresponding timestamp that the terminal device generates the unlock ciphertext,
The timestamp is the word that can be indicated that a data are already existing, complete before some specific time, can verify that
Sequence is accorded with, the timestamp uniquely identifies the time at certain a moment, and specifically, the timestamp is using data signature technology institute
The data of generation, the object of signature includes the information such as original document (data) information, signature parameter, signature time, when described
Between stamp can provide a kind of electronic evidence for the unlock ciphertext, it was demonstrated that it is described unlock ciphertext generation time, and proof it is true
Reality is very high, because timestamp can not be tampered in known technology.It should be noted that in the present embodiment, first
The transmission rule of setting unlock ciphertext, and be stored in advance into the terminal device, which is when user needs to send vehicle
Unlock instruction, and have clicked on preset button carried out send vehicle unlock instruction operation when, just generate it is described decryption it is close
Literary content, and after generating the decryption ciphertext content, it is the decryption ciphertext content generation pair generated with most fast speed
The timestamp answered, meanwhile, it is encrypted using timestamp of first privacy key to the decryption ciphertext content and generation,
Generate encrypted decryption ciphertext, it will be appreciated that ground, the timestamp of generation can approximately identify what the decryption ciphertext generated
Time point.In the present embodiment, the time point that the terminal device generates the unlock ciphertext is obtained, in step S403
Further determine whether the unlock ciphertext meets the unlocking condition.
S403, detection generate it is described unlock ciphertext time point and receive it is described unlock ciphertext time point between when
Between length whether be less than the uncaging time length, when generate it is described unlock ciphertext time point and receive the unlock ciphertext
Time point between time span when being less than the uncaging time length, confirm that the unlock ciphertext meets the unlocking item
Part.
Wherein, the uncaging time length can be preset according to demand.Preferably, the uncaging time length is
2 seconds.
Understandably, in the present embodiment, the transmission rule of unlock ciphertext has been preset, i.e., when user initiates vehicle solution
When lock instruction operation, the unlock ciphertext is generated just now, and timestamp is covered to the unlock ciphertext, if the then terminal
Equipment generates control in the time point and vehicle of the unlock ciphertext and terminates the time received between the time point for unlocking ciphertext
Length is excessive namely the unlock ciphertext is after generating the longer time, is just sent in the vehicle and controls end, represents
It is likely to be the unlock ciphertext or first privacy key is cracked or known by other people, and be stored in advance, right
It is sent in vehicle when vehicle is unlocked and controls end.
Therefore, the time point that the terminal device generates the unlock ciphertext is detected, is received with control termination in the vehicle
Whether the time span between the time point of the unlock ciphertext is less than the uncaging time length, when the generation unlock ciphertext
Time point and receive it is described unlock ciphertext time point between time span be greater than or equal to the uncaging time length,
Prove that the unlock ciphertext does not meet the unlocking condition, i.e. the user of initiation vehicle unlock instruction may not have the money of unlocking
Lattice, at this point, the confirmation unlock ciphertext does not meet the unlocking condition, and the vehicle unlocking request for recording this cannot pass through,
That is the intransitable number of vehicle unlocking request adds one;Conversely, when the time point for generating the unlock ciphertext and receiving described
When unlocking the time span between the time point of ciphertext less than the uncaging time length, representing the unlock ciphertext is according to pre-
If transmission rule sent namely the unlock ciphertext meet the unlocking condition, at this point, confirming the unlock ciphertext
Meet the unlocking condition, to be unlocked in the next steps to the vehicle.
The present embodiment guarantees the generation detected the solution by covering timestamp to it when the unlock ciphertext is generated
Lock ciphertext time point with receive it is described unlock ciphertext time point be it is authentic and valid, be not tampered with, and to generate institute
State unlock ciphertext time point and receive it is described unlock ciphertext time point between time span and the uncaging time it is long
Degree is compared, and further determines whether the unlock ciphertext meets unlocking condition, greatly improves safety when vehicle is unlocked
Property, enhance user experience.
In one embodiment, as shown in figure 4, after the step S40, further includes:
This described vehicle unlocking request is recorded as asking by S60 when the unlock ciphertext does not meet the unlocking condition
Failure is asked, and the request frequency of failure of the vehicle unlocking request is added one.
When the unlock ciphertext does not meet the unlocking condition, represents and initiate the vehicle unlock instruction operation, namely
The user for initiating this vehicle unlocking request does not have unlocking qualification, at this point, this vehicle unlocking request is recorded as asking
Failure is asked, and the request frequency of failure of the vehicle unlocking request is added one.It should be noted that the vehicle solution recorded each time
The number of the request failure of lock request will add up, but when controlling end in vehicle has through the vehicle unlocking request, namely
When carrying out unlock to vehicle, the number of the request failure of the vehicle unlocking request recorded before this will be reset.For example,
If there is continuously vehicle unlocking request cannot pass through three times, then records at this time and the request of cumulative vehicle unlocking request failure is secondary
Number is 3, at this point, if vehicle unlocking request next time is passed through by control end in vehicle, the vehicle unlocking request recorded before this
The request frequency of failure be 3 result reset, i.e., the request frequency of failure of vehicle unlocking request is 0, and start recording again.
S70, when the request frequency of failure of the vehicle unlocking request be greater than preset lock threshold when, to the vehicle into
Row locking.
In one embodiment, the request frequency of failure of the vehicle unlocking request further includes being remembered in the step S401
The request frequency of failure of record.
The lock threshold can be preset according to demand, preferably, the lock threshold is 5.It is described to vehicle
It is locked, comprising: within a preset time period, no longer receive vehicle unlock instruction, namely be not unlocked to vehicle, and will
The case where locking to the vehicle is sent to preset manager, and described manager someone malice is reminded to unlock or
It is attacked and (is cracked) to end is controlled in the vehicle.
When the intransitable number of vehicle unlocking request is greater than the lock threshold, representing the vehicle may be met
The situation attacked and (cracked) to the unlocking of someone's malice or split lock system prevents institute at this point, locking to the vehicle
The system for unlocking for stating vehicle is attacked and (is cracked) by people, and the safety of vehicle unlock is promoted, and enhances user experience.
In one embodiment, as shown in figure 5, providing a kind of unlocking method of vehicle, the terminal in Fig. 1 is applied in this way
It is illustrated for equipment, the unlocking method of vehicle includes the following steps executed in terminal device:
Radio connection request comprising unique identification is sent to terminal device, and passes through the unique identification and vehicle by S80
End is controlled in establishes wireless connection.
As above-mentioned, the unique identification is the mark with uniqueness for distinguishing different terminal devices.When holding
When the user of the terminal device needs to be unlocked vehicle, i.e., the connection request is sent to institute by the terminal device
It states and controls end in vehicle, also or, in a certain range that the user enters the vehicle, the terminal device carried is examined
After measuring, the connection request is sent in vehicle automatically and controls end;After control termination receives the connection request in the vehicle,
It is wirelessly connected with terminal device, the foundation of the wireless connection passes through radio network technique, such as WIFI, bluetooth etc.,
Wireless connection is established with end is controlled in the vehicle, is controlled in order to send vehicle unlock instruction in the next steps into the vehicle
End.
S90 obtains the first privacy key and unlock ciphertext, and close by unlock described in first secret key encryption
Text.
First privacy key is obtained first, and in one embodiment, first privacy key can be in the vehicle
It controls in end in and is pre-generated according to RSA Algorithm, and send in the terminal database for storing into terminal device vehicle control end, obtain
It is transferred from the terminal database of terminal device when taking, obtaining the unlock ciphertext includes: according to preset close
Literary rule generates unlock ciphertext or the unlock ciphertext has set in advance and has been stored in the terminal database of terminal device
In, the unlock ciphertext is directly transferred from the terminal database at this time.Further, by first privacy key to institute
It states unlock ciphertext to be encrypted, it is subsequent that the unlock ciphertext is sent to control end progress in the vehicle in the next steps
Unlock process.
Vehicle unlock instruction comprising the unlock ciphertext is sent in the vehicle and controls end, for the vehicle by S100
After control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in, in the unlock ciphertext
Vehicle is unlocked when meeting unlocking condition.
Vehicle unlock instruction comprising the encrypted unlock ciphertext is sent in the vehicle and controls end, is carried out subsequent
Unlock process, the unlock process is referred to step S30 to described in step 50 or described in S30 to S70, no longer superfluous herein
It states.
In one embodiment, as shown in fig. 6, the step S90 includes:
S901 obtains the first privacy key for passing through the second public key encryption, and obtains and second public-key cryptography
Corresponding second privacy key.
Wherein, second public-key cryptography and second privacy key are asymmetric close by a pair of RSA Algorithm generation
Key, second public-key cryptography is inconsistent (i.e. the two is two different keys) from first public-key cryptography, and described second
Privacy key is inconsistent (i.e. the two is two different keys) from first privacy key, and second public-key cryptography is used for
Encrypt first privacy key, and second privacy key is used to encrypt the after second public key encryption
One privacy key.Second public-key cryptography and second privacy key pre-generate and are stored in the terminal device terminal
In database.
Obtain the first privacy key for passing through the second public key encryption, and obtain second privacy key, for
First privacy key is decrypted in subsequent step.
In one embodiment, described to can store by the first privacy key of the second public key encryption to cloud, and
Non-memory causes first privacy key also to be lost in the terminal device after can preventing the terminal device from losing,
And vehicle can not be unlocked, enhance user experience.Even and if storing by encrypted first privacy key to non-
The cloud of secret is stolen and is usurped by other people without worry.
S902 carries out first privacy key by the second public key encryption using second privacy key
Decryption, first privacy key after obtaining decryption.For using the first secret key encryption institute in step S903
State unlock ciphertext.
S903, by unlocking ciphertext described in first secret key encryption after decryption.For in subsequent step by institute
It states unlock ciphertext and is sent to progress subsequent unlock process in control end in vehicle.
The present embodiment encrypts first privacy key by using the second public-key cryptography, further enhances
The confidentiality and safety of first privacy key improve the safety of entire vehicle system for unlocking, enhance user experience.
The present invention during carrying out intelligent unlocking to vehicle by using the privacy key and public affairs generated by RSA Algorithm
Open key, the i.e. described unlock ciphertext of the critical data unlocked encrypted, and binding time stamp and to it is described unlock it is close
Text carries out double-encryption, while carrying out quick, intelligent unlock to vehicle, greatly improves the safety because of intelligent unlocking,
Vehicle unlocking program is cracked by other people and cause user's property loss, enhance user experience to prevent.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
In one embodiment, a kind of vehicle tripper is provided, vehicle solution in the vehicle tripper and above-described embodiment
Locking method corresponds.As shown in fig. 7, the vehicle tripper includes controlling end in vehicle, it includes connection that end is controlled in the vehicle
Module 11, receiving module 12, deciphering module 13, detection module 14 and unlocking module 15.Detailed description are as follows for each functional module:
The link block 11, for the radio connection request comprising unique identification that receiving terminal apparatus is sent, and root
It establishes and is wirelessly connected according to the unique identification and the terminal device;
The receiving module 12, the vehicle unlock instruction sent for receiving the terminal device, the vehicle unlock refer to
It enables comprising the unlock ciphertext after the terminal device is by the first secret key encryption, first privacy key is basis
The key that RSA Algorithm generates;
The deciphering module 13, for using the first public-key cryptography generated according to the RSA Algorithm close to the unlock
Text is decrypted, and obtains the unlock ciphertext after decryption;
The detection module 14, for according to preset unlocking rule, whether the unlock ciphertext after detection decryption to be accorded with
Run bolt part jointly;
The unlocking module 15, for being unlocked to vehicle when the unlock ciphertext meets the unlocking condition.
In one embodiment, as shown in figure 8, the detection module 14 includes:
Ciphertext comparing unit 141, it is whether consistent for detecting the unlock ciphertext content and the unlocking ciphertext;
Time acquisition unit 142, for when the unlock ciphertext content is consistent with the unlocking ciphertext, according to it is described when
Between stamp obtain the time point that the terminal device generates the unlock ciphertext;
Time comparing unit 143, for detecting the time point of the generation unlock ciphertext and receiving the unlock ciphertext
Time point between time span whether be less than the uncaging time length, when generate it is described unlock ciphertext time point and connect
When receiving the time span between the time point of the unlock ciphertext less than the uncaging time length, the unlock ciphertext is confirmed
Meet the unlocking condition.
In one embodiment, as shown in figure 9, controlling end in the vehicle further include:
Failure record module 16, for when the unlock ciphertext does not meet the unlocking condition, by this vehicle
Unlocking request is recorded as request failure, and the request frequency of failure of the vehicle unlocking request is added one;
Vehicle locking module 17 is greater than preset lock threshold for the request frequency of failure when the vehicle unlocking request
When, the vehicle is locked.
In one embodiment, as shown in Figure 10, the vehicle tripper further includes terminal device, the terminal device packet
It includes:
First sending module 18, for will include that the radio connection request of unique identification is sent to terminal device, and passes through
Control end, which is established, in the unique identification and vehicle is wirelessly connected;
Module 19 is obtained, for obtaining the first privacy key and unlock ciphertext, and passes through first secret key encryption
The unlock ciphertext;
Second sending module 20, the vehicle unlock instruction for that will include the unlock ciphertext are sent in the vehicle and control
End, after control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in the vehicle,
Vehicle is unlocked when the unlock ciphertext meets unlocking condition.
In one embodiment, the acquisition module includes:
Key acquiring unit, for obtain pass through the second public key encryption the first privacy key, and obtain with it is described
Corresponding second privacy key of second public-key cryptography;
Decryption unit, for using second privacy key to first secrecy by the second public key encryption
Key is decrypted, first privacy key after obtaining decryption;
Encryption unit, for by unlocking ciphertext described in first secret key encryption after decryption.
Specific about vehicle tripper limits the restriction that may refer to above for unlocking method of vehicle, herein not
It repeats again.Modules in above-mentioned vehicle tripper can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure
Figure can be as shown in figure 11.The computer equipment includes the processor connected by system bus, memory, network interface, shows
Display screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment
Memory includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer
Program.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The meter
The network interface for calculating machine equipment is used to communicate with external server by network connection.When the computer program is executed by processor
To realize a kind of unlocking method of vehicle.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor perform the steps of when executing computer program
Receiving terminal apparatus send the radio connection request comprising unique identification, and according to the unique identification with it is described
Terminal device, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is included in the terminal device
Unlock ciphertext after the first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and obtains solution
The unlock ciphertext after close;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Receiving terminal apparatus send the radio connection request comprising unique identification, and according to the unique identification with it is described
Terminal device, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is included in the terminal device
Unlock ciphertext after the first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and obtains solution
The unlock ciphertext after close;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided by the present invention,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of unlocking method of vehicle, which is characterized in that the following steps executed including controlling end in vehicle:
The radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to the unique identification and the terminal
Equipment, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is passed through included in the terminal device
Unlock ciphertext after first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and after obtaining decryption
The unlock ciphertext;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
2. unlocking method of vehicle as described in claim 1, which is characterized in that when including preset unlocking in the unlocking rule
Between length and preset unlocking ciphertext, the unlock ciphertext include unlock ciphertext content and with the terminal device generate
The time point corresponding timestamp of the unlock ciphertext;The unlock according to preset unlocking rule, after detection decryption
Whether ciphertext meets unlocking condition, comprising:
It detects the unlock ciphertext content and whether the unlocking ciphertext is consistent;
When the unlock ciphertext content is consistent with the unlocking ciphertext, the terminal device is obtained according to the timestamp and is generated
The time point of the unlock ciphertext;
The time point of the detection generation unlock ciphertext and the time span received between the time point for unlocking ciphertext are
It is no to be less than the uncaging time length, when the time point for generating the unlock ciphertext and the time point for receiving the unlock ciphertext
Between time span when being less than the uncaging time length, confirm that the unlock ciphertext meets the unlocking condition.
3. unlocking method of vehicle as described in claim 1, which is characterized in that described according to preset unlocking rule, detection solution
Whether the unlock ciphertext after close meets after unlocking condition, further includes:
When the unlock ciphertext does not meet the unlocking condition, this described vehicle unlocking request is recorded as request failure,
And the request frequency of failure of the vehicle unlocking request is added one;
When the request frequency of failure of the vehicle unlocking request is greater than preset lock threshold, the vehicle is locked.
4. a kind of unlocking method of vehicle, which is characterized in that the following steps executed including terminal device:
Radio connection request comprising unique identification is sent to terminal device, and by controlling end in the unique identification and vehicle
It establishes and is wirelessly connected;
The first privacy key and unlock ciphertext are obtained, and by unlocking ciphertext described in first secret key encryption;
Vehicle unlock instruction comprising the unlock ciphertext is sent in the vehicle and controls end, is made for controlling end in the vehicle
After the encrypted unlock ciphertext is decrypted with first public-key cryptography, meet unlocking item in the unlock ciphertext
Vehicle is unlocked when part.
5. unlocking method of vehicle as claimed in claim 4, which is characterized in that the first privacy key of the acquisition and unlock are close
Text, and by unlocking ciphertext described in first secret key encryption, comprising:
The first privacy key for passing through the second public key encryption is obtained, and is obtained and second public-key cryptography corresponding second
Privacy key;
It is decrypted, is obtained by the first privacy key of the second public key encryption to described using second privacy key
First privacy key after decryption;
By unlocking ciphertext described in first secret key encryption after decryption.
6. a kind of vehicle tripper, which is characterized in that including controlling end in vehicle, control end includes: in the vehicle
Link block, for the radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to described unique
Mark is established with the terminal device and is wirelessly connected;
Receiving module, the vehicle unlock instruction sent for receiving the terminal device, the vehicle unlock instruction are included in institute
Terminal device is stated by the unlock ciphertext after the first secret key encryption, first privacy key is raw according to RSA Algorithm
At key;
Deciphering module, for using the first public-key cryptography generated according to the RSA Algorithm that the unlock ciphertext is decrypted,
And obtain the unlock ciphertext after decryption;
Detection module, for according to preset unlocking rule, whether the unlock ciphertext after detection decryption to meet unlocking condition;
Unlocking module, for being unlocked to vehicle when the unlock ciphertext meets the unlocking condition.
7. vehicle tripper as claimed in claim 6, which is characterized in that the detection module includes:
Ciphertext comparing unit, it is whether consistent for detecting the unlock ciphertext content and the unlocking ciphertext;
Time acquisition unit, for being obtained according to the timestamp when the unlock ciphertext content is consistent with the unlocking ciphertext
The terminal device is taken to generate the time point of the unlock ciphertext;
Time comparing unit, for detecting the time point for generating the unlock ciphertext and the time point for receiving the unlock ciphertext
Between time span whether be less than the uncaging time length, when the time point for generating the unlock ciphertext and receive described
When unlocking the time span between the time point of ciphertext less than the uncaging time length, it is described to confirm that the unlock ciphertext meets
Unlocking condition.
8. a kind of vehicle tripper, which is characterized in that including terminal device, the terminal device includes:
First sending module, the radio connection request of unique identification is sent to terminal device for will include, and by it is described only
One mark is established with control end in vehicle and is wirelessly connected;
Module is obtained, for obtaining the first privacy key and unlock ciphertext, and by solving described in first secret key encryption
Lock ciphertext;
Second sending module, the vehicle unlock instruction for that will include the unlock ciphertext are sent in the vehicle and control end, with
After control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in the vehicle, described
Unlock ciphertext is unlocked vehicle when meeting unlocking condition.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
The step of any one of 5 unlocking method of vehicle.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In the step of realization unlocking method of vehicle as described in any one of claim 1 to 5 when the computer program is executed by processor
Suddenly.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910429513.7A CN110310392B (en) | 2019-05-22 | 2019-05-22 | Vehicle unlocking method and device, computer equipment and storage medium |
PCT/CN2019/101897 WO2020232854A1 (en) | 2019-05-22 | 2019-08-22 | Vehicle unlocking method and apparatus, and computer device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910429513.7A CN110310392B (en) | 2019-05-22 | 2019-05-22 | Vehicle unlocking method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110310392A true CN110310392A (en) | 2019-10-08 |
CN110310392B CN110310392B (en) | 2021-07-16 |
Family
ID=68075250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910429513.7A Active CN110310392B (en) | 2019-05-22 | 2019-05-22 | Vehicle unlocking method and device, computer equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110310392B (en) |
WO (1) | WO2020232854A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177699A (en) * | 2019-12-23 | 2020-05-19 | 恒大新能源汽车科技(广东)有限公司 | Data extraction method, secret key generation method, unlocking method and device |
CN111491272A (en) * | 2020-04-01 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN111923863A (en) * | 2020-08-25 | 2020-11-13 | 东信和平科技股份有限公司 | Vehicle control method based on digital vehicle key |
CN115050140A (en) * | 2022-06-08 | 2022-09-13 | 杭州野乐科技有限公司 | Unlocking method, device and equipment of shared bicycle and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113783687B (en) * | 2021-09-07 | 2023-08-29 | 浙江吉利控股集团有限公司 | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102592340A (en) * | 2012-02-29 | 2012-07-18 | 深圳市赛格导航科技股份有限公司 | Emergency unlocking method and system for engineering vehicles |
EP2897103A1 (en) * | 2014-01-16 | 2015-07-22 | Parcelhome Limited | Electronic lock apparatus, method and system |
CN105631299A (en) * | 2015-12-29 | 2016-06-01 | 惠州Tcl移动通信有限公司 | Intelligent unlocking method and system of mobile terminal |
CN105894633A (en) * | 2016-04-21 | 2016-08-24 | 上海众人网络安全技术有限公司 | Access control system and unlocking method thereof |
CN106559378A (en) * | 2015-09-24 | 2017-04-05 | 联芯科技有限公司 | Automobile door lock tripper, system and method and intelligent terminal |
CN108092958A (en) * | 2017-12-05 | 2018-05-29 | 成都市共维科技有限公司 | Information authentication method, device, computer equipment and storage medium |
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
US20190047511A1 (en) * | 2017-08-09 | 2019-02-14 | M2MD Technologies, Inc. | Method and system for using a wireless mobile device as a smart key |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9218700B2 (en) * | 2012-12-14 | 2015-12-22 | GM Global Technology Operations LLC | Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs |
CN109389710A (en) * | 2018-08-24 | 2019-02-26 | 黄瀚思 | Intelligent door lock system based on RSA Algorithm Yu BLE low-power consumption bluetooth |
-
2019
- 2019-05-22 CN CN201910429513.7A patent/CN110310392B/en active Active
- 2019-08-22 WO PCT/CN2019/101897 patent/WO2020232854A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102592340A (en) * | 2012-02-29 | 2012-07-18 | 深圳市赛格导航科技股份有限公司 | Emergency unlocking method and system for engineering vehicles |
EP2897103A1 (en) * | 2014-01-16 | 2015-07-22 | Parcelhome Limited | Electronic lock apparatus, method and system |
CN106559378A (en) * | 2015-09-24 | 2017-04-05 | 联芯科技有限公司 | Automobile door lock tripper, system and method and intelligent terminal |
CN105631299A (en) * | 2015-12-29 | 2016-06-01 | 惠州Tcl移动通信有限公司 | Intelligent unlocking method and system of mobile terminal |
CN105894633A (en) * | 2016-04-21 | 2016-08-24 | 上海众人网络安全技术有限公司 | Access control system and unlocking method thereof |
US20190047511A1 (en) * | 2017-08-09 | 2019-02-14 | M2MD Technologies, Inc. | Method and system for using a wireless mobile device as a smart key |
CN108092958A (en) * | 2017-12-05 | 2018-05-29 | 成都市共维科技有限公司 | Information authentication method, device, computer equipment and storage medium |
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177699A (en) * | 2019-12-23 | 2020-05-19 | 恒大新能源汽车科技(广东)有限公司 | Data extraction method, secret key generation method, unlocking method and device |
CN111177699B (en) * | 2019-12-23 | 2022-07-08 | 恒大恒驰新能源汽车科技(广东)有限公司 | Data extraction method, secret key generation method, unlocking method and device |
CN111491272A (en) * | 2020-04-01 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN111491272B (en) * | 2020-04-01 | 2022-04-19 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN111923863A (en) * | 2020-08-25 | 2020-11-13 | 东信和平科技股份有限公司 | Vehicle control method based on digital vehicle key |
CN111923863B (en) * | 2020-08-25 | 2021-09-17 | 东信和平科技股份有限公司 | Vehicle control method based on digital vehicle key |
CN115050140A (en) * | 2022-06-08 | 2022-09-13 | 杭州野乐科技有限公司 | Unlocking method, device and equipment of shared bicycle and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110310392B (en) | 2021-07-16 |
WO2020232854A1 (en) | 2020-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110310392A (en) | Unlocking method of vehicle, device, computer equipment and storage medium | |
CN110334503B (en) | Method for unlocking one device by using the other device | |
EP3320667B1 (en) | Method for mapping at least two authentication devices to a user account using an authentication server | |
US10567428B2 (en) | Secure wireless ranging | |
CN109361669B (en) | Identity authentication method, device and equipment of communication equipment | |
US9218473B2 (en) | Creation and authentication of biometric information | |
EP3648396B1 (en) | Maintenance system and maintenance method | |
US11290262B2 (en) | Method and devices for communicating securely between devices | |
CN113691502B (en) | Communication method, device, gateway server, client and storage medium | |
KR20170042549A (en) | Method for the authentication of a first electronic entity by a second electronic entity, and electronic entity implementing such a method | |
CN113472793B (en) | Personal data protection system based on hardware password equipment | |
CN105162797A (en) | Bidirectional authentication method based on video surveillance system | |
CN109768979A (en) | Data encryption and transmission method, device, computer equipment and storage medium | |
CN106465104A (en) | Key sharing method and device | |
CN112425116B (en) | Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment | |
CN111444496A (en) | Application control method, device, equipment and storage medium | |
EP3556046B1 (en) | Method for secure management of secrets in a hierarchical multi-tenant environment | |
US11516215B2 (en) | Secure access to encrypted data of a user terminal | |
CN114258013A (en) | Data encryption method, device and storage medium | |
CN108769247B (en) | Distributed networked storage and transmission method and device applied to monitoring camera equipment | |
CN107171784B (en) | Emergency command scheduling method and system for emergency environment events | |
CN117240464A (en) | eSIM data protection method based on SRAMPUF | |
CN116052307A (en) | Unlocking method, unlocking system, intelligent door lock and storage medium | |
CN114499847A (en) | Sensitive information writing method in chip production test stage | |
CN115830745A (en) | Lock unlocking system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |