CN110310392A - Unlocking method of vehicle, device, computer equipment and storage medium - Google Patents

Unlocking method of vehicle, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110310392A
CN110310392A CN201910429513.7A CN201910429513A CN110310392A CN 110310392 A CN110310392 A CN 110310392A CN 201910429513 A CN201910429513 A CN 201910429513A CN 110310392 A CN110310392 A CN 110310392A
Authority
CN
China
Prior art keywords
vehicle
ciphertext
unlock
unlocking
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910429513.7A
Other languages
Chinese (zh)
Other versions
CN110310392B (en
Inventor
陈步青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910429513.7A priority Critical patent/CN110310392B/en
Priority to PCT/CN2019/101897 priority patent/WO2020232854A1/en
Publication of CN110310392A publication Critical patent/CN110310392A/en
Application granted granted Critical
Publication of CN110310392B publication Critical patent/CN110310392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/248Electronic key extraction prevention
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Abstract

The invention discloses a kind of unlocking method of vehicle, device, computer equipment and storage mediums, which comprises receiving terminal apparatus sends radio connection request, and establishes and be wirelessly connected with terminal device;The vehicle unlock instruction that receiving terminal apparatus is sent;Unlock ciphertext is decrypted using the first public-key cryptography generated according to RSA Algorithm, and obtains the unlock ciphertext after decryption;According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;When unlock ciphertext meets unlocking condition, vehicle is unlocked.The present invention greatly improves the safety of intelligent unlocking while carrying out quick, intelligent unlock to vehicle, cracks vehicle unlocking program to prevent by other people and causes user's property loss, enhances user experience.

Description

Unlocking method of vehicle, device, computer equipment and storage medium
Technical field
The present invention relates to art of cryptography more particularly to a kind of unlocking method of vehicle, device, computer equipment and storages Medium.
Background technique
In vehicle automatic unlocking field, scheme, face unlock, fingerprint are unlocked currently without a kind of automotive vehicle of low cost Unlock is limited to the accuracy of recognition of face, and specific camera or fingerprint-collection device is needed just to be able to achieve, and leads to hardware Higher cost cannot be popularized in low end vehicle, there are also being exactly that there may be errors for recognition of face and fingerprint recognition, not can guarantee Therefore recognition accuracy very may cause any property loss to user.
Summary of the invention
Based on this, the present invention provides a kind of unlocking method of vehicle, device, computer equipment and storage medium, for being promoted The safety of intelligent unlocking cracks vehicle unlocking program by other people and causes user's property loss to prevent, and enhances user Experience.
A kind of unlocking method of vehicle, the following steps including controlling end execution in the car:
Receiving terminal apparatus send the radio connection request comprising unique identification, and according to the unique identification with it is described Terminal device, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is included in the terminal device Unlock ciphertext after the first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and obtains solution The unlock ciphertext after close;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
A kind of unlocking method of vehicle, including the following steps executed in terminal device:
Radio connection request comprising unique identification is sent to terminal device, and by the unique identification and vehicle It controls end and establishes wireless connection;
The first privacy key and unlock ciphertext are obtained, and by unlocking ciphertext described in first secret key encryption;
Vehicle unlock instruction comprising the unlock ciphertext is sent in the vehicle and controls end, for being controlled in the vehicle After end is decrypted the encrypted unlock ciphertext using first public-key cryptography, meet out in the unlock ciphertext Vehicle is unlocked when bolt part.
A kind of vehicle tripper, including end is controlled in vehicle, end is controlled in the vehicle includes:
Link block, for the radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to described Unique identification and the terminal device, which are established, to be wirelessly connected;
Receiving module, the vehicle unlock instruction sent for receiving the terminal device, the vehicle unlock instruction include Unlock ciphertext after the terminal device is by the first secret key encryption, first privacy key is calculated according to RSA The key that method generates;
Deciphering module, for using the first public-key cryptography generated according to the RSA Algorithm to carry out the unlock ciphertext Decryption, and obtain the unlock ciphertext after decryption;
Detection module, for according to preset unlocking rule, whether the unlock ciphertext after detection decryption to meet unlocking Condition;
Unlocking module, for being unlocked to vehicle when the unlock ciphertext meets the unlocking condition.
A kind of vehicle tripper, including terminal device, the terminal device include:
First sending module, for will include that the radio connection request of unique identification is sent to terminal device, and passes through institute It states control end in unique identification and vehicle and establishes wireless connection;
Module is obtained, for obtaining the first privacy key and unlock ciphertext, and passes through the first secret key encryption institute State unlock ciphertext;
Second sending module, the vehicle unlock instruction for that will include the unlock ciphertext are sent in the vehicle and control End, after control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in the vehicle, Vehicle is unlocked when the unlock ciphertext meets unlocking condition.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, the processor realize the step of above-mentioned unlocking method of vehicle when executing the computer program Suddenly.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter The step of calculation machine program realizes above-mentioned unlocking method of vehicle when being executed by processor.
Above-mentioned unlocking method of vehicle, device, computer equipment and storage medium, the present invention is by carrying out intelligence to vehicle It is i.e. described to the critical data unlocked using the privacy key and public-key cryptography generated by RSA Algorithm during unlock Unlock ciphertext is encrypted, and binding time stabs and carries out double-encryption to the unlock ciphertext, is carrying out quick intelligence to vehicle While capable of unlocking, the safety because of intelligent unlocking is greatly improved, cracks vehicle unlocking program by other people to prevent And user's property loss is caused, enhance user experience.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of unlocking method of vehicle in one embodiment of the invention;
Fig. 2 is the flow chart that unlocking method of vehicle controls end execution in the car in one embodiment of the invention;
Fig. 3 is the flow chart of the step S40 of unlocking method of vehicle in one embodiment of the invention;
Fig. 4 is the flow chart of unlocking method of vehicle in another embodiment of the present invention;
Fig. 5 is the flow chart that unlocking method of vehicle is executed in terminal device in one embodiment of the invention;
Fig. 6 is the flow chart of the step S90 of unlocking method of vehicle in one embodiment of the invention;
Fig. 7 is the schematic diagram for controlling end in one embodiment of the invention in the vehicle of vehicle tripper;
Fig. 8 is the schematic diagram of the detection module of vehicle tripper in one embodiment of the invention;
Fig. 9 is the schematic diagram for controlling end in another embodiment of the present invention in the vehicle of vehicle tripper;
Figure 10 is the schematic diagram of the terminal device of vehicle tripper in one embodiment of the invention;
Figure 11 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Unlocking method of vehicle provided by the invention can be applicable in the application environment such as Fig. 1, wherein terminal device passes through Network is communicated with control end in vehicle.By during carrying out intelligent unlocking to vehicle using being generated by RSA Algorithm Privacy key and public-key cryptography encrypt the i.e. described unlock ciphertext of the critical data unlocked, further, by pre- If unlocking rule the unlock ciphertext is determined, when the unlock ciphertext meets unlocking condition, vehicle is solved Lock.Wherein, terminal device includes but is not limited to various personal computers, laptop, smart phone, tablet computer and portable Formula wearable device.End is controlled in vehicle to be mounted in the vehicle, can use independent server either multiple server groups At server cluster realize.
In one embodiment, as shown in Fig. 2, providing a kind of unlocking method of vehicle, the vehicle in Fig. 1 is applied in this way It is illustrated for middle control end, the unlocking method of vehicle includes the following steps that control end executes in the car:
S10, the radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to the unique identification and The terminal device, which is established, to be wirelessly connected.
Wherein, the terminal device includes but is not limited to mobile phone, smartwatch, the key with communication function (Bluetooth function) The mobile terminals such as key bow further include the terminal devices such as computer.The unique identification is the tool for distinguishing different terminal devices There is the mark of uniqueness.
The connection request can be sent in vehicle by the preset button of click by user and control end, can also entered Into a certain range of receiver, it is automatically sent to control end in vehicle.For example, leading to when user wants to be unlocked vehicle Cross and click the pre-set button of the terminal device of its carrying and send the connection request and control end into vehicle, also or, when the use Family enters in a certain range of the vehicle, after the terminal device carried detects, automatically sends out the connection request It send and controls end into vehicle.
Understandably, it after control termination receives the connection request in vehicle, i.e., establishes and is wirelessly connected with the terminal device, In one embodiment, the connection request is to be sent in vehicle to control end by bluetooth, and control end in the vehicle and receive request Afterwards, i.e., it is established and is wirelessly connected by bluetooth and the terminal device.In another embodiment, end and the end are controlled in the vehicle End equipment is established to be wirelessly connected to establish by radio network technique (such as WiFi) and the terminal device and is wirelessly connected.With The terminal device, which is established, to be wirelessly connected, for receiving the vehicle unlock instruction that the terminal device is sent in the next steps, In order to be unlocked to vehicle.
S20, receives the vehicle unlock instruction that the terminal device is sent, and the vehicle unlock instruction is included in the terminal Equipment passes through the unlock ciphertext after the first secret key encryption, and first privacy key is according to the close of RSA Algorithm generation Key.
Wherein, the vehicle unlock instruction is the instruction for being unlocked to vehicle, and control termination receives described in vehicle After vehicle unlock instruction, that is, open the unlock process to vehicle.The unlock ciphertext is the ciphertext for being unlocked to vehicle, It can be a string of characters, a word or a word etc..The unlock ciphertext can give birth to when sending the vehicle unlock instruction At, and encrypted by first privacy key, it can also be pre- after the first secret key encryption of the RSA Algorithm It is first stored in the terminal device.
The RSA Algorithm is a kind of rivest, shamir, adelman, i.e., is used for according to what the RSA Algorithm generated to information or number It with the key for information or data to be decrypted generated according to the RSA Algorithm is non-right according to the key encrypted Claim.For example, generating a pair of secret keys simultaneously according to the RSA Algorithm, respectively the first privacy key and first disclose close Key cannot be by first privacy key to this when being encrypted using first privacy key to information or data Information or the data are decrypted, and must use different and asymmetric from first privacy key (asymmetry refers to cannot First public-key cryptography is derived by known method according to known first privacy key) first disclose it is close The information or data Jing Guo first secret key encryption can be decrypted in key.
When encrypting using the RSA Algorithm to information or data, one is generated simultaneously according to the RSA Algorithm first To key, one of them is secrecy, underground, namely only user or user preset people or equipment could save or know The key of dawn, the key are privacy key (in the present embodiment, as described first privacy key);And another key is then It is key disclosed, unclassified, that anyone or equipment can be known or obtain, which is public-key cryptography (in this reality It applies in example, as described first public-key cryptography).Understandably, first privacy key and first public-key cryptography be each other A pair of of unsymmetrical key then uses described first that is, when encrypting using first privacy key to information or data The encrypted information or the data can be decrypted in public-key cryptography;Use first public-key cryptography to letter conversely, working as When breath or data are encrypted, then the encrypted information or the data can be solved using first privacy key It is close.It should be noted that first privacy key is controlled in the vehicle in advance after being generated in end according to the RSA Algorithm, It sends and stores to the terminal device dominated by user.
In the present embodiment, setting encrypts the unlock ciphertext using first privacy key, it will be appreciated that ground, First privacy key is generally stored inside in the terminal device dominated by user, when user needs to solve vehicle When lock, i.e., solution described in first secret key encryption is used by establishing the terminal device of wireless connection with vehicle Ciphertext is locked, or directly transfers the solution for having been subjected to first secret key encryption being stored in advance on the terminal device Ciphertext is locked, encrypted unlock ciphertext is sent in the vehicle and controls end, it will be appreciated that ground, the reception encryption in control end in vehicle Unlock ciphertext afterwards lifts vehicle unlock for the unlock ciphertext is decrypted in the next steps, and then described in judgement Whether the user of request meets the condition of unlocking.
S30 is decrypted the unlock ciphertext using the first public-key cryptography generated according to the RSA Algorithm, and obtains The unlock ciphertext after taking decryption.
As described above, first public-key cryptography is generated simultaneously according to the RSA Algorithm and first privacy key One disclosed in, unclassified key, first public-key cryptography is a pair of each other asymmetric close with first privacy key Key.First public-key cryptography after being generated according to the RSA Algorithm, control in the vehicle database at end in the car by storage.
Specifically, it after control termination receives the decryption ciphertext of terminal device transmission in vehicle, i.e., is adjusted from vehicle database First public-key cryptography is taken, then, the unlock ciphertext received is decrypted by first public-key cryptography, it is raw At the unlock ciphertext after decryption, then, the unlock ciphertext is obtained, it is described after decrypting in step s 40, detecting Whether unlock ciphertext meets preset unlocking condition.
S40, according to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition.
Wherein, the unlocking rule can be preset according to demand.
In one embodiment, the rule of unlocking can be set as when the content of the unlock ciphertext and preset unlocking are close When the content of text is consistent, the unlock ciphertext meets unlocking condition.As described above, the unlock ciphertext can also be user's root It is preset according to demand, it can be a string of characters, a word or a word etc., here with the unlock ciphertext for a word Language is illustrated the present embodiment: such as preset unlocking ciphertext is " hello ", at this point, the unlock ciphertext after detection decryption Content it is whether consistent with the unlocking ciphertext, that is, detection it is described unlock ciphertext content whether be " hello ", when result is When being, represents the unlock ciphertext and meet the unlocking condition vehicle is unlocked at this point, entering step S50;Work as result When being no, represents the unlock ciphertext and do not meet unlocking condition, at this point, the confirmation unlock ciphertext does not meet unlocking condition, it will This vehicle unlocking request is recorded as request failure, and the request frequency of failure of the vehicle unlocking request is added one, so as to In in some embodiments, according to the number of the request failure, preset restriction is carried out to vehicle unlocking request next time.
In another embodiment, the rule of unlocking includes the first unique identification of at least one terminal device, i.e., in advance The unique identification of all terminal devices that can be carried out unlocking is stored in the unlocking rule;It is described unlock ciphertext content be Second unique identification of terminal device used in active user, namely initiate unique mark of the terminal device of vehicle unlock instruction Know, in this embodiment, detecting whether there is and the unlock ciphertext in all first unique identifications in the rule of unlocking In the consistent mark of the second unique identification, that is, by second unique identification and all first unique identifications Be compared respectively, when detect in all first unique identifications exist it is consistent with second unique identification unique When mark, represent the corresponding terminal device of second unique identification as it is preset can be to the end that the vehicle is unlocked End equipment, at this point, the confirmation unlock ciphertext meets unlocking condition;And it is not deposited in all first unique identifications when detecting In the unique identification consistent with second unique identification, representing the corresponding terminal device of second unique identification is not Terminal device in the pre-existing rule of unlocking, at this point, this vehicle unlocking request is recorded as request failure, and will The request frequency of failure of the vehicle unlocking request adds one.
S50 is unlocked vehicle when the unlock ciphertext meets the unlocking condition.
When the unlock ciphertext meets the unlocking condition, the user for representing initiation vehicle unlocking instruction operation possesses out Qualification is locked, at this point, being unlocked according to the vehicle unlock instruction to the vehicle.
The present embodiment by during carrying out intelligent unlocking to vehicle using the privacy key generated by RSA Algorithm with Public-key cryptography encrypts the i.e. described unlock ciphertext of the critical data unlocked, and is carrying out quick, intelligent unlock to vehicle While, the safety because of intelligent unlocking is greatly improved, vehicle unlocking program is cracked to prevent and caused by other people User's property loss enhances user experience.
It in one embodiment, include preset uncaging time length and preset unlocking ciphertext in unlocking rule, The unlock ciphertext includes unlock ciphertext content and to generate the unlock time point of ciphertext with the terminal device corresponding Timestamp;As shown in figure 3, the step S40 includes:
S401, detects the unlock ciphertext content and whether the unlocking ciphertext is consistent.
Comprising unlock ciphertext content in the unlock ciphertext, the unlock ciphertext content can be a string of characters, a word Or word etc. in the present embodiment, detects the unlock for being compared with the unlocking ciphertext in the rule of unlocking Whether preset unlocking ciphertext is consistent in ciphertext content and unlocking rule, when the unlock ciphertext content and the unlocking are close When text is consistent, the unlocking condition may be met by representing the unlock ciphertext, at this point, enter step S402, according to it is described when Between stamp obtain the time point that the terminal device generates the unlock ciphertext, further to verify whether the unlock ciphertext accords with Run bolt part jointly.When the unlock ciphertext content and the unlocking ciphertext content are inconsistent, confirm that the unlock ciphertext is not inconsistent The unlocking condition is closed, and this vehicle unlocking request is recorded as request failure, and asking the vehicle unlocking request The frequency of failure is asked to add one.
S402 obtains the end according to the timestamp when the unlock ciphertext content is consistent with the unlocking ciphertext End equipment generates the time point of the unlock ciphertext.
The unlock ciphertext is also included in the time point corresponding timestamp that the terminal device generates the unlock ciphertext, The timestamp is the word that can be indicated that a data are already existing, complete before some specific time, can verify that Sequence is accorded with, the timestamp uniquely identifies the time at certain a moment, and specifically, the timestamp is using data signature technology institute The data of generation, the object of signature includes the information such as original document (data) information, signature parameter, signature time, when described Between stamp can provide a kind of electronic evidence for the unlock ciphertext, it was demonstrated that it is described unlock ciphertext generation time, and proof it is true Reality is very high, because timestamp can not be tampered in known technology.It should be noted that in the present embodiment, first The transmission rule of setting unlock ciphertext, and be stored in advance into the terminal device, which is when user needs to send vehicle Unlock instruction, and have clicked on preset button carried out send vehicle unlock instruction operation when, just generate it is described decryption it is close Literary content, and after generating the decryption ciphertext content, it is the decryption ciphertext content generation pair generated with most fast speed The timestamp answered, meanwhile, it is encrypted using timestamp of first privacy key to the decryption ciphertext content and generation, Generate encrypted decryption ciphertext, it will be appreciated that ground, the timestamp of generation can approximately identify what the decryption ciphertext generated Time point.In the present embodiment, the time point that the terminal device generates the unlock ciphertext is obtained, in step S403 Further determine whether the unlock ciphertext meets the unlocking condition.
S403, detection generate it is described unlock ciphertext time point and receive it is described unlock ciphertext time point between when Between length whether be less than the uncaging time length, when generate it is described unlock ciphertext time point and receive the unlock ciphertext Time point between time span when being less than the uncaging time length, confirm that the unlock ciphertext meets the unlocking item Part.
Wherein, the uncaging time length can be preset according to demand.Preferably, the uncaging time length is 2 seconds.
Understandably, in the present embodiment, the transmission rule of unlock ciphertext has been preset, i.e., when user initiates vehicle solution When lock instruction operation, the unlock ciphertext is generated just now, and timestamp is covered to the unlock ciphertext, if the then terminal Equipment generates control in the time point and vehicle of the unlock ciphertext and terminates the time received between the time point for unlocking ciphertext Length is excessive namely the unlock ciphertext is after generating the longer time, is just sent in the vehicle and controls end, represents It is likely to be the unlock ciphertext or first privacy key is cracked or known by other people, and be stored in advance, right It is sent in vehicle when vehicle is unlocked and controls end.
Therefore, the time point that the terminal device generates the unlock ciphertext is detected, is received with control termination in the vehicle Whether the time span between the time point of the unlock ciphertext is less than the uncaging time length, when the generation unlock ciphertext Time point and receive it is described unlock ciphertext time point between time span be greater than or equal to the uncaging time length, Prove that the unlock ciphertext does not meet the unlocking condition, i.e. the user of initiation vehicle unlock instruction may not have the money of unlocking Lattice, at this point, the confirmation unlock ciphertext does not meet the unlocking condition, and the vehicle unlocking request for recording this cannot pass through, That is the intransitable number of vehicle unlocking request adds one;Conversely, when the time point for generating the unlock ciphertext and receiving described When unlocking the time span between the time point of ciphertext less than the uncaging time length, representing the unlock ciphertext is according to pre- If transmission rule sent namely the unlock ciphertext meet the unlocking condition, at this point, confirming the unlock ciphertext Meet the unlocking condition, to be unlocked in the next steps to the vehicle.
The present embodiment guarantees the generation detected the solution by covering timestamp to it when the unlock ciphertext is generated Lock ciphertext time point with receive it is described unlock ciphertext time point be it is authentic and valid, be not tampered with, and to generate institute State unlock ciphertext time point and receive it is described unlock ciphertext time point between time span and the uncaging time it is long Degree is compared, and further determines whether the unlock ciphertext meets unlocking condition, greatly improves safety when vehicle is unlocked Property, enhance user experience.
In one embodiment, as shown in figure 4, after the step S40, further includes:
This described vehicle unlocking request is recorded as asking by S60 when the unlock ciphertext does not meet the unlocking condition Failure is asked, and the request frequency of failure of the vehicle unlocking request is added one.
When the unlock ciphertext does not meet the unlocking condition, represents and initiate the vehicle unlock instruction operation, namely The user for initiating this vehicle unlocking request does not have unlocking qualification, at this point, this vehicle unlocking request is recorded as asking Failure is asked, and the request frequency of failure of the vehicle unlocking request is added one.It should be noted that the vehicle solution recorded each time The number of the request failure of lock request will add up, but when controlling end in vehicle has through the vehicle unlocking request, namely When carrying out unlock to vehicle, the number of the request failure of the vehicle unlocking request recorded before this will be reset.For example, If there is continuously vehicle unlocking request cannot pass through three times, then records at this time and the request of cumulative vehicle unlocking request failure is secondary Number is 3, at this point, if vehicle unlocking request next time is passed through by control end in vehicle, the vehicle unlocking request recorded before this The request frequency of failure be 3 result reset, i.e., the request frequency of failure of vehicle unlocking request is 0, and start recording again.
S70, when the request frequency of failure of the vehicle unlocking request be greater than preset lock threshold when, to the vehicle into Row locking.
In one embodiment, the request frequency of failure of the vehicle unlocking request further includes being remembered in the step S401 The request frequency of failure of record.
The lock threshold can be preset according to demand, preferably, the lock threshold is 5.It is described to vehicle It is locked, comprising: within a preset time period, no longer receive vehicle unlock instruction, namely be not unlocked to vehicle, and will The case where locking to the vehicle is sent to preset manager, and described manager someone malice is reminded to unlock or It is attacked and (is cracked) to end is controlled in the vehicle.
When the intransitable number of vehicle unlocking request is greater than the lock threshold, representing the vehicle may be met The situation attacked and (cracked) to the unlocking of someone's malice or split lock system prevents institute at this point, locking to the vehicle The system for unlocking for stating vehicle is attacked and (is cracked) by people, and the safety of vehicle unlock is promoted, and enhances user experience.
In one embodiment, as shown in figure 5, providing a kind of unlocking method of vehicle, the terminal in Fig. 1 is applied in this way It is illustrated for equipment, the unlocking method of vehicle includes the following steps executed in terminal device:
Radio connection request comprising unique identification is sent to terminal device, and passes through the unique identification and vehicle by S80 End is controlled in establishes wireless connection.
As above-mentioned, the unique identification is the mark with uniqueness for distinguishing different terminal devices.When holding When the user of the terminal device needs to be unlocked vehicle, i.e., the connection request is sent to institute by the terminal device It states and controls end in vehicle, also or, in a certain range that the user enters the vehicle, the terminal device carried is examined After measuring, the connection request is sent in vehicle automatically and controls end;After control termination receives the connection request in the vehicle, It is wirelessly connected with terminal device, the foundation of the wireless connection passes through radio network technique, such as WIFI, bluetooth etc., Wireless connection is established with end is controlled in the vehicle, is controlled in order to send vehicle unlock instruction in the next steps into the vehicle End.
S90 obtains the first privacy key and unlock ciphertext, and close by unlock described in first secret key encryption Text.
First privacy key is obtained first, and in one embodiment, first privacy key can be in the vehicle It controls in end in and is pre-generated according to RSA Algorithm, and send in the terminal database for storing into terminal device vehicle control end, obtain It is transferred from the terminal database of terminal device when taking, obtaining the unlock ciphertext includes: according to preset close Literary rule generates unlock ciphertext or the unlock ciphertext has set in advance and has been stored in the terminal database of terminal device In, the unlock ciphertext is directly transferred from the terminal database at this time.Further, by first privacy key to institute It states unlock ciphertext to be encrypted, it is subsequent that the unlock ciphertext is sent to control end progress in the vehicle in the next steps Unlock process.
Vehicle unlock instruction comprising the unlock ciphertext is sent in the vehicle and controls end, for the vehicle by S100 After control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in, in the unlock ciphertext Vehicle is unlocked when meeting unlocking condition.
Vehicle unlock instruction comprising the encrypted unlock ciphertext is sent in the vehicle and controls end, is carried out subsequent Unlock process, the unlock process is referred to step S30 to described in step 50 or described in S30 to S70, no longer superfluous herein It states.
In one embodiment, as shown in fig. 6, the step S90 includes:
S901 obtains the first privacy key for passing through the second public key encryption, and obtains and second public-key cryptography Corresponding second privacy key.
Wherein, second public-key cryptography and second privacy key are asymmetric close by a pair of RSA Algorithm generation Key, second public-key cryptography is inconsistent (i.e. the two is two different keys) from first public-key cryptography, and described second Privacy key is inconsistent (i.e. the two is two different keys) from first privacy key, and second public-key cryptography is used for Encrypt first privacy key, and second privacy key is used to encrypt the after second public key encryption One privacy key.Second public-key cryptography and second privacy key pre-generate and are stored in the terminal device terminal In database.
Obtain the first privacy key for passing through the second public key encryption, and obtain second privacy key, for First privacy key is decrypted in subsequent step.
In one embodiment, described to can store by the first privacy key of the second public key encryption to cloud, and Non-memory causes first privacy key also to be lost in the terminal device after can preventing the terminal device from losing, And vehicle can not be unlocked, enhance user experience.Even and if storing by encrypted first privacy key to non- The cloud of secret is stolen and is usurped by other people without worry.
S902 carries out first privacy key by the second public key encryption using second privacy key Decryption, first privacy key after obtaining decryption.For using the first secret key encryption institute in step S903 State unlock ciphertext.
S903, by unlocking ciphertext described in first secret key encryption after decryption.For in subsequent step by institute It states unlock ciphertext and is sent to progress subsequent unlock process in control end in vehicle.
The present embodiment encrypts first privacy key by using the second public-key cryptography, further enhances The confidentiality and safety of first privacy key improve the safety of entire vehicle system for unlocking, enhance user experience.
The present invention during carrying out intelligent unlocking to vehicle by using the privacy key and public affairs generated by RSA Algorithm Open key, the i.e. described unlock ciphertext of the critical data unlocked encrypted, and binding time stamp and to it is described unlock it is close Text carries out double-encryption, while carrying out quick, intelligent unlock to vehicle, greatly improves the safety because of intelligent unlocking, Vehicle unlocking program is cracked by other people and cause user's property loss, enhance user experience to prevent.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
In one embodiment, a kind of vehicle tripper is provided, vehicle solution in the vehicle tripper and above-described embodiment Locking method corresponds.As shown in fig. 7, the vehicle tripper includes controlling end in vehicle, it includes connection that end is controlled in the vehicle Module 11, receiving module 12, deciphering module 13, detection module 14 and unlocking module 15.Detailed description are as follows for each functional module:
The link block 11, for the radio connection request comprising unique identification that receiving terminal apparatus is sent, and root It establishes and is wirelessly connected according to the unique identification and the terminal device;
The receiving module 12, the vehicle unlock instruction sent for receiving the terminal device, the vehicle unlock refer to It enables comprising the unlock ciphertext after the terminal device is by the first secret key encryption, first privacy key is basis The key that RSA Algorithm generates;
The deciphering module 13, for using the first public-key cryptography generated according to the RSA Algorithm close to the unlock Text is decrypted, and obtains the unlock ciphertext after decryption;
The detection module 14, for according to preset unlocking rule, whether the unlock ciphertext after detection decryption to be accorded with Run bolt part jointly;
The unlocking module 15, for being unlocked to vehicle when the unlock ciphertext meets the unlocking condition.
In one embodiment, as shown in figure 8, the detection module 14 includes:
Ciphertext comparing unit 141, it is whether consistent for detecting the unlock ciphertext content and the unlocking ciphertext;
Time acquisition unit 142, for when the unlock ciphertext content is consistent with the unlocking ciphertext, according to it is described when Between stamp obtain the time point that the terminal device generates the unlock ciphertext;
Time comparing unit 143, for detecting the time point of the generation unlock ciphertext and receiving the unlock ciphertext Time point between time span whether be less than the uncaging time length, when generate it is described unlock ciphertext time point and connect When receiving the time span between the time point of the unlock ciphertext less than the uncaging time length, the unlock ciphertext is confirmed Meet the unlocking condition.
In one embodiment, as shown in figure 9, controlling end in the vehicle further include:
Failure record module 16, for when the unlock ciphertext does not meet the unlocking condition, by this vehicle Unlocking request is recorded as request failure, and the request frequency of failure of the vehicle unlocking request is added one;
Vehicle locking module 17 is greater than preset lock threshold for the request frequency of failure when the vehicle unlocking request When, the vehicle is locked.
In one embodiment, as shown in Figure 10, the vehicle tripper further includes terminal device, the terminal device packet It includes:
First sending module 18, for will include that the radio connection request of unique identification is sent to terminal device, and passes through Control end, which is established, in the unique identification and vehicle is wirelessly connected;
Module 19 is obtained, for obtaining the first privacy key and unlock ciphertext, and passes through first secret key encryption The unlock ciphertext;
Second sending module 20, the vehicle unlock instruction for that will include the unlock ciphertext are sent in the vehicle and control End, after control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in the vehicle, Vehicle is unlocked when the unlock ciphertext meets unlocking condition.
In one embodiment, the acquisition module includes:
Key acquiring unit, for obtain pass through the second public key encryption the first privacy key, and obtain with it is described Corresponding second privacy key of second public-key cryptography;
Decryption unit, for using second privacy key to first secrecy by the second public key encryption Key is decrypted, first privacy key after obtaining decryption;
Encryption unit, for by unlocking ciphertext described in first secret key encryption after decryption.
Specific about vehicle tripper limits the restriction that may refer to above for unlocking method of vehicle, herein not It repeats again.Modules in above-mentioned vehicle tripper can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in figure 11.The computer equipment includes the processor connected by system bus, memory, network interface, shows Display screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment Memory includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer Program.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The meter The network interface for calculating machine equipment is used to communicate with external server by network connection.When the computer program is executed by processor To realize a kind of unlocking method of vehicle.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor perform the steps of when executing computer program
Receiving terminal apparatus send the radio connection request comprising unique identification, and according to the unique identification with it is described Terminal device, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is included in the terminal device Unlock ciphertext after the first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and obtains solution The unlock ciphertext after close;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Receiving terminal apparatus send the radio connection request comprising unique identification, and according to the unique identification with it is described Terminal device, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is included in the terminal device Unlock ciphertext after the first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and obtains solution The unlock ciphertext after close;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided by the present invention, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of unlocking method of vehicle, which is characterized in that the following steps executed including controlling end in vehicle:
The radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to the unique identification and the terminal Equipment, which is established, to be wirelessly connected;
The vehicle unlock instruction that the terminal device is sent is received, the vehicle unlock instruction is passed through included in the terminal device Unlock ciphertext after first secret key encryption, first privacy key are the keys generated according to RSA Algorithm;
The unlock ciphertext is decrypted using the first public-key cryptography generated according to the RSA Algorithm, and after obtaining decryption The unlock ciphertext;
According to preset unlocking rule, whether the unlock ciphertext after detection decryption meets unlocking condition;
When the unlock ciphertext meets the unlocking condition, vehicle is unlocked.
2. unlocking method of vehicle as described in claim 1, which is characterized in that when including preset unlocking in the unlocking rule Between length and preset unlocking ciphertext, the unlock ciphertext include unlock ciphertext content and with the terminal device generate The time point corresponding timestamp of the unlock ciphertext;The unlock according to preset unlocking rule, after detection decryption Whether ciphertext meets unlocking condition, comprising:
It detects the unlock ciphertext content and whether the unlocking ciphertext is consistent;
When the unlock ciphertext content is consistent with the unlocking ciphertext, the terminal device is obtained according to the timestamp and is generated The time point of the unlock ciphertext;
The time point of the detection generation unlock ciphertext and the time span received between the time point for unlocking ciphertext are It is no to be less than the uncaging time length, when the time point for generating the unlock ciphertext and the time point for receiving the unlock ciphertext Between time span when being less than the uncaging time length, confirm that the unlock ciphertext meets the unlocking condition.
3. unlocking method of vehicle as described in claim 1, which is characterized in that described according to preset unlocking rule, detection solution Whether the unlock ciphertext after close meets after unlocking condition, further includes:
When the unlock ciphertext does not meet the unlocking condition, this described vehicle unlocking request is recorded as request failure, And the request frequency of failure of the vehicle unlocking request is added one;
When the request frequency of failure of the vehicle unlocking request is greater than preset lock threshold, the vehicle is locked.
4. a kind of unlocking method of vehicle, which is characterized in that the following steps executed including terminal device:
Radio connection request comprising unique identification is sent to terminal device, and by controlling end in the unique identification and vehicle It establishes and is wirelessly connected;
The first privacy key and unlock ciphertext are obtained, and by unlocking ciphertext described in first secret key encryption;
Vehicle unlock instruction comprising the unlock ciphertext is sent in the vehicle and controls end, is made for controlling end in the vehicle After the encrypted unlock ciphertext is decrypted with first public-key cryptography, meet unlocking item in the unlock ciphertext Vehicle is unlocked when part.
5. unlocking method of vehicle as claimed in claim 4, which is characterized in that the first privacy key of the acquisition and unlock are close Text, and by unlocking ciphertext described in first secret key encryption, comprising:
The first privacy key for passing through the second public key encryption is obtained, and is obtained and second public-key cryptography corresponding second Privacy key;
It is decrypted, is obtained by the first privacy key of the second public key encryption to described using second privacy key First privacy key after decryption;
By unlocking ciphertext described in first secret key encryption after decryption.
6. a kind of vehicle tripper, which is characterized in that including controlling end in vehicle, control end includes: in the vehicle
Link block, for the radio connection request comprising unique identification that receiving terminal apparatus is sent, and according to described unique Mark is established with the terminal device and is wirelessly connected;
Receiving module, the vehicle unlock instruction sent for receiving the terminal device, the vehicle unlock instruction are included in institute Terminal device is stated by the unlock ciphertext after the first secret key encryption, first privacy key is raw according to RSA Algorithm At key;
Deciphering module, for using the first public-key cryptography generated according to the RSA Algorithm that the unlock ciphertext is decrypted, And obtain the unlock ciphertext after decryption;
Detection module, for according to preset unlocking rule, whether the unlock ciphertext after detection decryption to meet unlocking condition;
Unlocking module, for being unlocked to vehicle when the unlock ciphertext meets the unlocking condition.
7. vehicle tripper as claimed in claim 6, which is characterized in that the detection module includes:
Ciphertext comparing unit, it is whether consistent for detecting the unlock ciphertext content and the unlocking ciphertext;
Time acquisition unit, for being obtained according to the timestamp when the unlock ciphertext content is consistent with the unlocking ciphertext The terminal device is taken to generate the time point of the unlock ciphertext;
Time comparing unit, for detecting the time point for generating the unlock ciphertext and the time point for receiving the unlock ciphertext Between time span whether be less than the uncaging time length, when the time point for generating the unlock ciphertext and receive described When unlocking the time span between the time point of ciphertext less than the uncaging time length, it is described to confirm that the unlock ciphertext meets Unlocking condition.
8. a kind of vehicle tripper, which is characterized in that including terminal device, the terminal device includes:
First sending module, the radio connection request of unique identification is sent to terminal device for will include, and by it is described only One mark is established with control end in vehicle and is wirelessly connected;
Module is obtained, for obtaining the first privacy key and unlock ciphertext, and by solving described in first secret key encryption Lock ciphertext;
Second sending module, the vehicle unlock instruction for that will include the unlock ciphertext are sent in the vehicle and control end, with After control end is decrypted the encrypted unlock ciphertext using first public-key cryptography in the vehicle, described Unlock ciphertext is unlocked vehicle when meeting unlocking condition.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to The step of any one of 5 unlocking method of vehicle.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In the step of realization unlocking method of vehicle as described in any one of claim 1 to 5 when the computer program is executed by processor Suddenly.
CN201910429513.7A 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium Active CN110310392B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910429513.7A CN110310392B (en) 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium
PCT/CN2019/101897 WO2020232854A1 (en) 2019-05-22 2019-08-22 Vehicle unlocking method and apparatus, and computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910429513.7A CN110310392B (en) 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110310392A true CN110310392A (en) 2019-10-08
CN110310392B CN110310392B (en) 2021-07-16

Family

ID=68075250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910429513.7A Active CN110310392B (en) 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN110310392B (en)
WO (1) WO2020232854A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177699A (en) * 2019-12-23 2020-05-19 恒大新能源汽车科技(广东)有限公司 Data extraction method, secret key generation method, unlocking method and device
CN111491272A (en) * 2020-04-01 2020-08-04 支付宝(杭州)信息技术有限公司 Vehicle unlocking method and system
CN111923863A (en) * 2020-08-25 2020-11-13 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN115050140A (en) * 2022-06-08 2022-09-13 杭州野乐科技有限公司 Unlocking method, device and equipment of shared bicycle and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783687B (en) * 2021-09-07 2023-08-29 浙江吉利控股集团有限公司 Method and system for generating, encrypting and decrypting automobile electronic anti-theft code

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592340A (en) * 2012-02-29 2012-07-18 深圳市赛格导航科技股份有限公司 Emergency unlocking method and system for engineering vehicles
EP2897103A1 (en) * 2014-01-16 2015-07-22 Parcelhome Limited Electronic lock apparatus, method and system
CN105631299A (en) * 2015-12-29 2016-06-01 惠州Tcl移动通信有限公司 Intelligent unlocking method and system of mobile terminal
CN105894633A (en) * 2016-04-21 2016-08-24 上海众人网络安全技术有限公司 Access control system and unlocking method thereof
CN106559378A (en) * 2015-09-24 2017-04-05 联芯科技有限公司 Automobile door lock tripper, system and method and intelligent terminal
CN108092958A (en) * 2017-12-05 2018-05-29 成都市共维科技有限公司 Information authentication method, device, computer equipment and storage medium
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device
US20190047511A1 (en) * 2017-08-09 2019-02-14 M2MD Technologies, Inc. Method and system for using a wireless mobile device as a smart key

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9218700B2 (en) * 2012-12-14 2015-12-22 GM Global Technology Operations LLC Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs
CN109389710A (en) * 2018-08-24 2019-02-26 黄瀚思 Intelligent door lock system based on RSA Algorithm Yu BLE low-power consumption bluetooth

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592340A (en) * 2012-02-29 2012-07-18 深圳市赛格导航科技股份有限公司 Emergency unlocking method and system for engineering vehicles
EP2897103A1 (en) * 2014-01-16 2015-07-22 Parcelhome Limited Electronic lock apparatus, method and system
CN106559378A (en) * 2015-09-24 2017-04-05 联芯科技有限公司 Automobile door lock tripper, system and method and intelligent terminal
CN105631299A (en) * 2015-12-29 2016-06-01 惠州Tcl移动通信有限公司 Intelligent unlocking method and system of mobile terminal
CN105894633A (en) * 2016-04-21 2016-08-24 上海众人网络安全技术有限公司 Access control system and unlocking method thereof
US20190047511A1 (en) * 2017-08-09 2019-02-14 M2MD Technologies, Inc. Method and system for using a wireless mobile device as a smart key
CN108092958A (en) * 2017-12-05 2018-05-29 成都市共维科技有限公司 Information authentication method, device, computer equipment and storage medium
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177699A (en) * 2019-12-23 2020-05-19 恒大新能源汽车科技(广东)有限公司 Data extraction method, secret key generation method, unlocking method and device
CN111177699B (en) * 2019-12-23 2022-07-08 恒大恒驰新能源汽车科技(广东)有限公司 Data extraction method, secret key generation method, unlocking method and device
CN111491272A (en) * 2020-04-01 2020-08-04 支付宝(杭州)信息技术有限公司 Vehicle unlocking method and system
CN111491272B (en) * 2020-04-01 2022-04-19 支付宝(杭州)信息技术有限公司 Vehicle unlocking method and system
CN111923863A (en) * 2020-08-25 2020-11-13 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN111923863B (en) * 2020-08-25 2021-09-17 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN115050140A (en) * 2022-06-08 2022-09-13 杭州野乐科技有限公司 Unlocking method, device and equipment of shared bicycle and storage medium

Also Published As

Publication number Publication date
CN110310392B (en) 2021-07-16
WO2020232854A1 (en) 2020-11-26

Similar Documents

Publication Publication Date Title
CN110310392A (en) Unlocking method of vehicle, device, computer equipment and storage medium
CN110334503B (en) Method for unlocking one device by using the other device
EP3320667B1 (en) Method for mapping at least two authentication devices to a user account using an authentication server
US10567428B2 (en) Secure wireless ranging
CN109361669B (en) Identity authentication method, device and equipment of communication equipment
US9218473B2 (en) Creation and authentication of biometric information
EP3648396B1 (en) Maintenance system and maintenance method
US11290262B2 (en) Method and devices for communicating securely between devices
CN113691502B (en) Communication method, device, gateway server, client and storage medium
KR20170042549A (en) Method for the authentication of a first electronic entity by a second electronic entity, and electronic entity implementing such a method
CN113472793B (en) Personal data protection system based on hardware password equipment
CN105162797A (en) Bidirectional authentication method based on video surveillance system
CN109768979A (en) Data encryption and transmission method, device, computer equipment and storage medium
CN106465104A (en) Key sharing method and device
CN112425116B (en) Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment
CN111444496A (en) Application control method, device, equipment and storage medium
EP3556046B1 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
US11516215B2 (en) Secure access to encrypted data of a user terminal
CN114258013A (en) Data encryption method, device and storage medium
CN108769247B (en) Distributed networked storage and transmission method and device applied to monitoring camera equipment
CN107171784B (en) Emergency command scheduling method and system for emergency environment events
CN117240464A (en) eSIM data protection method based on SRAMPUF
CN116052307A (en) Unlocking method, unlocking system, intelligent door lock and storage medium
CN114499847A (en) Sensitive information writing method in chip production test stage
CN115830745A (en) Lock unlocking system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant