CN110310392B - Vehicle unlocking method and device, computer equipment and storage medium - Google Patents
Vehicle unlocking method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110310392B CN110310392B CN201910429513.7A CN201910429513A CN110310392B CN 110310392 B CN110310392 B CN 110310392B CN 201910429513 A CN201910429513 A CN 201910429513A CN 110310392 B CN110310392 B CN 110310392B
- Authority
- CN
- China
- Prior art keywords
- unlocking
- ciphertext
- vehicle
- secret key
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
- B60R25/248—Electronic key extraction prevention
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
Abstract
The invention discloses a vehicle unlocking method, a vehicle unlocking device, computer equipment and a storage medium, wherein the method comprises the following steps: receiving a wireless connection request sent by terminal equipment, and establishing wireless connection with the terminal equipment; receiving a vehicle unlocking instruction sent by terminal equipment; decrypting the unlocking ciphertext by using a first public key generated according to an RSA algorithm, and acquiring the decrypted unlocking ciphertext; detecting whether the decrypted unlocking ciphertext accords with unlocking conditions or not according to preset unlocking rules; and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle. The intelligent unlocking method and the intelligent unlocking system have the advantages that the intelligent unlocking safety is greatly improved while the vehicle is rapidly and intelligently unlocked, so that the property loss of a user caused by the fact that the vehicle unlocking program is cracked by others is prevented, and the user experience is enhanced.
Description
Technical Field
The invention relates to the technical field of passwords, in particular to a vehicle unlocking method and device, computer equipment and a storage medium.
Background
In the field of automatic vehicle unlocking, a low-cost automatic vehicle unlocking scheme does not exist at present, face unlocking and fingerprint unlocking are limited by the accuracy of face identification, and can be realized only by a specific camera or a fingerprint collector, so that the hardware cost is high, the face unlocking and the fingerprint unlocking cannot be popularized on low-end vehicles, errors can exist in face identification and fingerprint identification, hundreds of identification accuracy cannot be guaranteed, and property loss can be caused to users.
Disclosure of Invention
Based on the above, the invention provides a vehicle unlocking method and device, computer equipment and a storage medium, which are used for improving the safety of intelligent unlocking, preventing property loss of a user caused by the fact that a vehicle unlocking program is cracked by others, and enhancing user experience.
A vehicle unlocking method comprises the following steps executed at a vehicle central control end:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule;
and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
A vehicle unlocking method comprises the following steps executed at a terminal device:
sending a wireless connection request containing the unique identifier to terminal equipment, and establishing wireless connection with a vehicle central control end through the unique identifier;
acquiring a first secret key and an unlocking ciphertext, and encrypting the unlocking ciphertext through the first secret key;
and sending a vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with an unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
A vehicle unlocking device comprising a vehicle central control end, the vehicle central control end comprising:
the connection module is used for receiving a wireless connection request containing a unique identifier sent by terminal equipment and establishing wireless connection with the terminal equipment according to the unique identifier;
the receiving module is used for receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
the decryption module is used for decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm and acquiring the decrypted unlocking ciphertext;
the detection module is used for detecting whether the decrypted unlocking ciphertext accords with the unlocking condition or not according to a preset unlocking rule;
and the unlocking module is used for unlocking the vehicle when the unlocking ciphertext accords with the unlocking condition.
A vehicle unlocking apparatus comprising a terminal device, the terminal device comprising:
the first sending module is used for sending the wireless connection request containing the unique identifier to the terminal equipment and establishing wireless connection with the vehicle central control terminal through the unique identifier;
the acquisition module is used for acquiring a first secret key and an unlocking ciphertext and encrypting the unlocking ciphertext through the first secret key;
and the second sending module is used for sending the vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with the unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the vehicle unlocking method described above when executing the computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned vehicle unlocking method.
According to the vehicle unlocking method, the vehicle unlocking device, the computer equipment and the storage medium, the secret key and the public key generated by the RSA algorithm are used in the intelligent unlocking process of the vehicle, the key data for unlocking, namely the unlocking ciphertext is encrypted, and the time stamp and the unlocking ciphertext are combined for double encryption, so that the safety of intelligent unlocking is greatly improved while the vehicle is rapidly and intelligently unlocked, the property loss of a user caused by the fact that an unlocking program of the vehicle is cracked by others is prevented, and the user experience is enhanced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without inventive labor.
FIG. 1 is a schematic diagram of an application environment of a vehicle unlocking method according to an embodiment of the invention;
FIG. 2 is a flow chart of a vehicle unlocking method executed at a vehicle central control end according to an embodiment of the invention;
FIG. 3 is a flowchart of step S40 of a method for unlocking a vehicle according to an embodiment of the present invention;
FIG. 4 is a flow chart of a method for unlocking a vehicle in another embodiment of the present invention;
fig. 5 is a flowchart of a vehicle unlocking method executed in a terminal device according to an embodiment of the present invention;
FIG. 6 is a flowchart of step S90 of a method for unlocking a vehicle according to an embodiment of the present invention;
FIG. 7 is a schematic illustration of a vehicle central control end of the vehicle unlocking apparatus in an embodiment of the present invention;
FIG. 8 is a schematic view of a detection module of the vehicle unlocking apparatus in one embodiment of the present invention;
FIG. 9 is a schematic view of a vehicle center control end of a vehicle unlocking apparatus according to another embodiment of the present invention;
fig. 10 is a schematic view of a terminal device of the vehicle unlocking apparatus in an embodiment of the present invention;
FIG. 11 is a diagram of a computing device in accordance with an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The vehicle unlocking method provided by the invention can be applied to the application environment shown in figure 1, wherein the terminal equipment is communicated with the vehicle central control end through a network. The key data of unlocking are encrypted through the secret key and the public key generated by the RSA algorithm in the process of intelligently unlocking the vehicle, further, the unlocking ciphertext is judged through a preset unlocking rule, and when the unlocking ciphertext accords with an unlocking condition, the vehicle is unlocked. The terminal devices include, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The vehicle central control end is installed in the vehicle and can be realized by an independent server or a server cluster consisting of a plurality of servers.
In an embodiment, as shown in fig. 2, a vehicle unlocking method is provided, which is described by taking the application of the method to the vehicle central control end in fig. 1 as an example, and the vehicle unlocking method includes the following steps executed at the vehicle central control end:
and S10, receiving a wireless connection request containing the unique identifier sent by the terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier.
The terminal device includes but is not limited to a mobile terminal such as a mobile phone, a smart watch, a key ring with a communication function (bluetooth function), and a terminal device such as a computer. The unique identifier is a unique identifier for distinguishing different terminal devices.
The connection request can be sent to the vehicle central control end by a user through clicking a preset button, and can also be automatically sent to the vehicle central control end within a certain range when entering the receiver. For example, when a user wants to unlock a vehicle, the connection request is sent to a vehicle central control terminal by clicking a preset button of a terminal device carried by the user, or when the user enters a certain range of the vehicle, the terminal device carried by the user detects the connection request and then automatically sends the connection request to the vehicle central control terminal.
Understandably, the vehicle central control end establishes a wireless connection with the terminal device after receiving the connection request, in an embodiment, the connection request is sent to the vehicle central control end through bluetooth, and the vehicle central control end establishes a wireless connection with the terminal device through bluetooth after receiving the request. In another embodiment, the vehicle central control end and the terminal device can also establish wireless connection with the terminal device through a wireless network technology (such as WiFi). And establishing wireless connection with the terminal equipment so as to receive a vehicle unlocking instruction sent by the terminal equipment in the subsequent step, so that the vehicle can be unlocked conveniently.
And S20, receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm.
The vehicle unlocking instruction is used for unlocking the vehicle, and the vehicle central control end starts an unlocking process of the vehicle after receiving the vehicle unlocking instruction. The unlocking ciphertext is a ciphertext used for unlocking the vehicle, and may be a string of characters, a word, a sentence, or the like. The unlocking ciphertext can be generated when the vehicle unlocking instruction is sent, is encrypted through the first secret key, and can also be stored in the terminal device in advance after being encrypted through the first secret key of the RSA algorithm.
The RSA algorithm is an asymmetric encryption algorithm, i.e. the key generated according to the RSA algorithm for encrypting information or data is asymmetric with the key generated according to the RSA algorithm for decrypting information or data. For example, when information or data is encrypted by using the first secret key, the information or the data cannot be decrypted by using the first secret key, but a first public key which is different from the first secret key and is asymmetric (the asymmetry refers to that the first public key cannot be derived by a known method according to the known first secret key) is used to decrypt the information or the data encrypted by using the first secret key.
When the RSA algorithm is used to encrypt information or data, a pair of secret keys is generated according to the RSA algorithm, one of the secret keys is secret and not public, that is, a secret key that can be stored or known only by a user or a person or device preset by the user, and the secret key is a secret key (in this embodiment, the first secret key); the other key is public and non-secret, and can be known or obtained by anyone or equipment, and the key is a public key (in this embodiment, the first public key). Understandably, the first secret key and the first public key are mutually a pair of asymmetric keys, that is, when information or data is encrypted by using the first secret key, the encrypted information or data can be decrypted by using the first public key; on the contrary, when information or data is encrypted using the first public key, the encrypted information or data can be decrypted using the first public key. It should be noted that the first secret key is generated in advance in the vehicle central control end according to the RSA algorithm, and then is sent to and stored in the terminal device controlled by the user.
In this embodiment, it is assumed that the first secret key is used to encrypt the unlock ciphertext, and understandably, the first secret key is usually stored in the terminal device governed by the user, when the user needs to unlock the vehicle, the terminal device that has established wireless connection with the vehicle encrypts the unlock ciphertext using the first secret key, or directly retrieves the unlock ciphertext that has been encrypted with the first secret key and is stored in the terminal device in advance, and sends the encrypted unlock ciphertext to the vehicle central control end, and understandably, the vehicle central control end receives the encrypted unlock ciphertext to decrypt the unlock ciphertext in a subsequent step, so as to determine whether the user who has raised the vehicle unlock request meets the unlock condition.
And S30, decrypting the unlocking ciphertext by using the first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext.
As described above, the first public key is a public, non-secret key generated simultaneously with the first secret key according to the RSA algorithm, and the first public key and the first secret key are a pair of asymmetric keys. And the first public key is stored in a vehicle database of a vehicle central control end after being generated according to the RSA algorithm.
Specifically, after the vehicle central control end receives a decryption ciphertext sent by the terminal device, the first public key is called from the vehicle database, then the received unlocking ciphertext is decrypted through the first public key to generate the decrypted unlocking ciphertext, and then the unlocking ciphertext is obtained so as to detect whether the decrypted unlocking ciphertext meets a preset unlocking condition in step S40.
And S40, detecting whether the decrypted unlocking ciphertext accords with the unlocking condition or not according to a preset unlocking rule.
The unlocking rule can be preset according to requirements.
In an embodiment, the unlocking rule may be set such that when the content of the unlocking ciphertext is consistent with the content of a preset unlocking ciphertext, the unlocking ciphertext meets the unlocking condition. As described above, the unlocking ciphertext may also be preset by the user according to the requirement, and may be a string of characters, a word, a sentence, or the like, where the unlocking ciphertext is used as a word to describe the embodiment: for example, if the preset unlocking ciphertext is "hello", at this time, detecting whether the content of the decrypted unlocking ciphertext is consistent with the unlocking ciphertext, that is, detecting whether the content of the unlocking ciphertext is "hello", when the result is yes, indicating that the unlocking ciphertext meets the unlocking condition, and at this time, entering step S50 to unlock the vehicle; and if the result is negative, representing that the unlocking ciphertext does not accord with the unlocking condition, confirming that the unlocking ciphertext does not accord with the unlocking condition at the moment, recording the current vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request, so that in some embodiments, the next vehicle unlocking request is subjected to preset limitation according to the request failure times.
In another embodiment, the unlocking rule contains a first unique identifier of at least one terminal device, that is, the unique identifiers of all terminal devices capable of unlocking are stored in the unlocking rule in advance; in this embodiment, whether an identifier consistent with a second unique identifier in the unlocking cipher text exists in all first unique identifiers in the unlocking rule is detected, that is, the second unique identifier is respectively compared with all the first unique identifiers, when it is detected that an unique identifier consistent with the second unique identifier exists in all the first unique identifiers, the terminal device corresponding to the second unique identifier is represented as a preset terminal device capable of unlocking the vehicle, and at this time, the unlocking cipher text is confirmed to be in accordance with an unlocking condition; and when detecting that the unique identifier consistent with the second unique identifier does not exist in all the first unique identifiers, representing that the terminal device corresponding to the second unique identifier is not the terminal device pre-stored in the unlocking rule, recording the vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request.
And S50, when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
And when the unlocking ciphertext accords with the unlocking condition, representing that a user initiating a vehicle unlocking instruction operation has unlocking qualification, and unlocking the vehicle according to the vehicle unlocking instruction.
This embodiment is through using secret key and the public key that is generated by the RSA algorithm at the in-process that carries out intelligent unlocking to the vehicle, to the key data that unblanks promptly the unblock ciphertext encrypts, when carrying out quick intelligent unlocking to the vehicle, has promoted the security because intelligent unlocking greatly to prevent appearing being cracked vehicle unblock procedure by other people and causing user loss of property, reinforcing user experience.
In an embodiment, the unlocking rule includes a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext includes an unlocking ciphertext content and a timestamp corresponding to a time point at which the terminal device generates the unlocking ciphertext; as shown in fig. 3, the step S40 includes:
s401, detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext.
The unlocking ciphertext comprises unlocking ciphertext content which can be a string of characters, a sentence or a word and the like and is used for being compared with the unlocking ciphertext in the unlocking rule, in the embodiment, whether the unlocking ciphertext content is consistent with the unlocking ciphertext preset in the unlocking rule or not is detected, when the unlocking ciphertext content is consistent with the unlocking ciphertext, the unlocking ciphertext is represented to possibly accord with the unlocking condition, at this moment, the step S402 is entered, and the time point of the terminal device for generating the unlocking ciphertext is obtained according to the time stamp, so that whether the unlocking ciphertext accords with the unlocking condition or not is further verified. And when the unlocking ciphertext content is inconsistent with the unlocking ciphertext content, confirming that the unlocking ciphertext is not in accordance with the unlocking condition, recording the current vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request.
S402, when the content of the unlocking ciphertext is consistent with the unlocking ciphertext, acquiring the time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp.
The unlocking ciphertext further comprises a timestamp corresponding to a time point when the terminal device generates the unlocking ciphertext, the timestamp is a complete and verifiable character sequence which can represent that a piece of data exists before a certain specific time, the timestamp uniquely identifies the time of a certain moment, specifically, the timestamp is data generated by using a data signature technology, a signed object comprises information such as original file (data) information, signature parameters and signature time, the timestamp can provide an electronic evidence for the unlocking ciphertext to prove the time when the unlocking ciphertext is generated, and the authenticity of the proof is very high, because the timestamp cannot be tampered in a known technology. It should be noted that, in this embodiment, a sending rule of an unlock ciphertext is first set and stored in the terminal device in advance, where the rule is that when a user needs to send a vehicle unlock instruction and has clicked a preset button to perform an operation of sending the vehicle unlock instruction, the decrypted ciphertext content is generated, and after the decrypted ciphertext content is generated, a corresponding timestamp is generated for the generated decrypted ciphertext content at the fastest speed, and at the same time, the decrypted ciphertext content and the generated timestamp are encrypted by using the first secret key to generate an encrypted decrypted ciphertext, and the generated timestamp may conceivably identify a time point at which the decrypted ciphertext is generated. In this embodiment, a time point when the terminal device generates the unlocking ciphertext is obtained, so as to further determine whether the unlocking ciphertext meets the unlocking condition in step S403.
And S403, detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
The unlocking time length can be preset according to requirements. Preferably, the unlocking time is 2 seconds in length.
In this embodiment, a sending rule of the unlocking ciphertext is preset, that is, when the user initiates a vehicle unlocking instruction operation, the unlocking ciphertext is generated and a timestamp is added to the unlocking ciphertext, if a time length between a time point when the terminal device generates the unlocking ciphertext and a time point when the vehicle central control terminal receives the unlocking ciphertext is too large, that is, the unlocking ciphertext is sent to the vehicle central control terminal after a relatively long time is generated, which means that the unlocking ciphertext or the first secret key may be cracked or known by others, and is stored in advance, and the unlocking ciphertext or the first secret key is sent to the vehicle central control terminal when the vehicle is unlocked.
Therefore, whether the time length between the time point when the terminal device generates the unlocking ciphertext and the time point when the vehicle central control end receives the unlocking ciphertext is smaller than the unlocking time length or not is detected, when the time length between the time point when the unlocking ciphertext is generated and the time point when the unlocking ciphertext is received is larger than or equal to the unlocking time length, the unlocking ciphertext is proved to be not qualified with the unlocking condition, namely, a user initiating a vehicle unlocking instruction possibly does not have the qualification of unlocking, at the moment, the unlocking ciphertext is confirmed to be not qualified with the unlocking condition, and the vehicle unlocking request cannot pass at this time is recorded, namely, the number of times that the vehicle unlocking request cannot pass is increased by one; on the contrary, when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, the unlocking ciphertext is sent according to a preset sending rule, namely the unlocking ciphertext accords with the unlocking condition, and at the moment, the unlocking ciphertext is confirmed to accord with the unlocking condition so as to unlock the vehicle in the subsequent steps.
In the embodiment, the timestamp is added to the unlocking ciphertext when the unlocking ciphertext is generated, so that the detected time point for generating the unlocking ciphertext and the time point for receiving the unlocking ciphertext are real and effective and are not tampered, the time length between the time point for generating the unlocking ciphertext and the time point for receiving the unlocking ciphertext is compared with the unlocking time length, whether the unlocking ciphertext meets the unlocking condition or not is further judged, the safety of the vehicle during unlocking is greatly improved, and the user experience is enhanced.
In an embodiment, as shown in fig. 4, after the step S40, the method further includes:
and S60, when the unlocking ciphertext does not meet the unlocking condition, recording the vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request.
When the unlocking ciphertext does not meet the unlocking condition, the vehicle unlocking instruction operation is initiated on behalf of the user, namely the user initiating the vehicle unlocking request does not have the unlocking qualification, at the moment, the vehicle unlocking request is recorded as the request failure, and the request failure times of the vehicle unlocking request is increased by one. It should be noted that the number of times of the failure of the request of the vehicle unlocking request recorded each time is accumulated, but when the vehicle central control end has the vehicle unlocking request, that is, when the vehicle is unlocked, the number of times of the failure of the request of the vehicle unlocking request recorded before is cleared. For example, if three consecutive vehicle unlocking requests cannot pass through, the number of times of failure of the recorded and accumulated vehicle unlocking requests is 3, at this time, if the next vehicle unlocking request is passed through by the vehicle central control end, the result that the number of times of failure of the recorded vehicle unlocking requests is 3 is cleared, that is, the number of times of failure of the vehicle unlocking requests is 0, and the recording is restarted.
And S70, when the number of times of request failure of the vehicle unlocking request is larger than a preset locking threshold value, locking the vehicle.
In one embodiment, the number of request failures of the vehicle unlocking request further includes the number of request failures recorded in the step S401.
The locking threshold may be preset according to requirements, and preferably, the locking threshold is 5. The locking the vehicle comprises: in a preset time period, a vehicle unlocking instruction is not received any more, namely, the vehicle is not unlocked, the condition of locking the vehicle is sent to a preset management party, and the management party is reminded of maliciously unlocking or attacking (cracking) the vehicle central control terminal.
When the number of times that the vehicle unlocking request cannot pass is larger than the locking threshold, the vehicle is locked, the unlocking system of the vehicle is prevented from being attacked (cracked) by people, the safety of vehicle unlocking is improved, and the user experience is enhanced.
In an embodiment, as shown in fig. 5, a vehicle unlocking method is provided, which is described by taking the terminal device in fig. 1 as an example, and includes the following steps executed at the terminal device:
and S80, sending the wireless connection request containing the unique identifier to the terminal equipment, and establishing wireless connection with the vehicle central control terminal through the unique identifier.
As described above, the unique identifier is a unique identifier for distinguishing different terminal devices. When a user holding the terminal equipment needs to unlock the vehicle, the connection request is sent to the vehicle central control end through the terminal equipment, or when the user enters a certain range of the vehicle and the terminal equipment carried by the user detects the connection request, the connection request is automatically sent to the vehicle central control end; and after receiving the connection request, the vehicle central control end performs wireless connection with the terminal equipment, and the wireless connection is established with the vehicle central control end through a wireless network technology, such as WIFI, Bluetooth and the like, so that a vehicle unlocking instruction is sent to the vehicle central control end in the subsequent steps.
S90, obtaining a first secret key and an unlocking ciphertext, and encrypting the unlocking ciphertext through the first secret key.
First, the first secret key is obtained, in an embodiment, the first secret key may be generated in advance in the vehicle central control terminal according to an RSA algorithm, and is sent to and stored in a terminal database of the vehicle central control terminal of the terminal device, and when obtaining, the first secret key is called from the terminal database of the terminal device, and obtaining the unlocking ciphertext includes: and generating an unlocking ciphertext according to a preset ciphertext rule, or setting the unlocking ciphertext in advance and storing the unlocking ciphertext in a terminal database of the terminal equipment, and directly calling the unlocking ciphertext from the terminal database at the moment. Further, the unlocking ciphertext is encrypted through the first secret key, so that the unlocking ciphertext can be sent to the vehicle central control end in the subsequent step for subsequent unlocking process.
S100, sending a vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with an unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
And sending the vehicle unlocking command containing the encrypted unlocking ciphertext to the vehicle central control end to perform a subsequent unlocking process, wherein the unlocking process can refer to steps S30 to S50, or steps S30 to S70, and details are not repeated here.
In one embodiment, as shown in fig. 6, the step S90 includes:
s901, obtaining a first secret key encrypted by a second public key, and obtaining a second secret key corresponding to the second public key.
The second public key and the second secret key are a pair of asymmetric keys generated by an RSA algorithm, the second public key is not consistent with the first public key (i.e. the second public key and the first secret key are two different keys), the second secret key is not consistent with the first secret key (i.e. the second public key and the first secret key are two different keys), the second public key is used for encrypting the first secret key, and the second secret key is used for encrypting the first secret key encrypted by the second public key. The second public key and the second secret key are generated in advance and stored in the terminal device terminal database.
A first secret key encrypted with a second public key is obtained and the second secret key is obtained for decrypting the first secret key in a subsequent step.
In an embodiment, the first secret key encrypted by the second public key may be stored in a cloud instead of the terminal device, so that the first secret key is prevented from being lost after the terminal device is lost, the vehicle cannot be unlocked, and user experience is enhanced. Even if the encrypted first secret key is stored to a non-private cloud end, the first secret key does not need to be stolen and stolen by others.
S902, decrypting the first secret key encrypted by the second public key using the second secret key to obtain the decrypted first secret key. For encrypting the unlock ciphertext using the first security key in step S903.
And S903, encrypting the unlocking ciphertext through the decrypted first secret key. And sending the unlocking ciphertext to a vehicle central control end in the subsequent step for subsequent unlocking process.
In the embodiment, the first secret key is encrypted by using the second public key, so that the confidentiality and the safety of the first secret key are further enhanced, the safety of the whole vehicle unlocking system is improved, and the user experience is enhanced.
According to the intelligent unlocking method and the intelligent unlocking system, the secret key and the public key generated by the RSA algorithm are used in the intelligent unlocking process of the vehicle, key data for unlocking, namely the unlocking ciphertext is encrypted, and the time stamp and the unlocking ciphertext are combined for double encryption, so that the safety of intelligent unlocking is greatly improved while the vehicle is rapidly and intelligently unlocked, property loss of a user caused by the fact that an unlocking program of the vehicle is cracked by others is prevented, and the user experience is enhanced.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In one embodiment, a vehicle unlocking device is provided, and the vehicle unlocking device corresponds to the vehicle unlocking method in the above embodiments one to one. As shown in fig. 7, the vehicle unlocking device includes a vehicle central control end, and the vehicle central control end includes a connection module 11, a receiving module 12, a decryption module 13, a detection module 14, and an unlocking module 15. The functional modules are explained in detail as follows:
the connection module 11 is configured to receive a wireless connection request including a unique identifier sent by a terminal device, and establish a wireless connection with the terminal device according to the unique identifier;
the receiving module 12 is configured to receive a vehicle unlocking instruction sent by the terminal device, where the vehicle unlocking instruction includes an unlocking ciphertext obtained by encrypting, by the terminal device, a first secret key, where the first secret key is a key generated according to an RSA algorithm;
the decryption module 13 is configured to decrypt the unlocking ciphertext by using the first public key generated according to the RSA algorithm, and obtain the decrypted unlocking ciphertext;
the detection module 14 is configured to detect whether the decrypted unlocking ciphertext meets an unlocking condition according to a preset unlocking rule;
and the unlocking module 15 is used for unlocking the vehicle when the unlocking ciphertext accords with the unlocking condition.
In one embodiment, as shown in fig. 8, the detection module 14 includes:
a ciphertext comparison unit 141, configured to detect whether the content of the unlocking ciphertext is consistent with the unlocking ciphertext;
the time obtaining unit 142 is configured to obtain, according to the timestamp, a time point at which the terminal device generates the unlocking ciphertext when the unlocking ciphertext content is consistent with the unlocking ciphertext;
the time comparison unit 143 is configured to detect whether a time length between a time point at which the unlocking ciphertext is generated and a time point at which the unlocking ciphertext is received is smaller than the unlocking time length, and when the time length between the time point at which the unlocking ciphertext is generated and the time point at which the unlocking ciphertext is received is smaller than the unlocking time length, confirm that the unlocking ciphertext meets the unlocking condition.
In an embodiment, as shown in fig. 9, the vehicle central control end further includes:
the failure recording module 16 is configured to record the vehicle unlocking request as a request failure when the unlocking ciphertext does not meet the unlocking condition, and add one to the request failure times of the vehicle unlocking request;
and the vehicle locking module 17 is configured to lock the vehicle when the number of times of request failures of the vehicle unlocking request is greater than a preset locking threshold.
In one embodiment, as shown in fig. 10, the vehicle unlocking apparatus further includes a terminal device, and the terminal device includes:
the first sending module 18 is configured to send a wireless connection request including the unique identifier to the terminal device, and establish a wireless connection with the vehicle central control terminal through the unique identifier;
an obtaining module 19, configured to obtain a first secret key and an unlocking ciphertext, and encrypt the unlocking ciphertext by using the first secret key;
the second sending module 20 is configured to send a vehicle unlocking instruction including the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end decrypts the encrypted unlocking ciphertext by using the first public key, and unlocks the vehicle when the unlocking ciphertext meets an unlocking condition.
In one embodiment, the obtaining module includes:
a key acquisition unit configured to acquire a first secret key encrypted by a second public key, and acquire a second secret key corresponding to the second public key;
a decryption unit, configured to decrypt, using the second secret key, the first secret key encrypted by the second public key, and obtain the decrypted first secret key;
and the encryption unit is used for encrypting the unlocking ciphertext through the decrypted first secret key.
For specific limitations of the vehicle unlocking device, reference may be made to the above limitations of the vehicle unlocking method, which are not described herein again. The respective modules in the above vehicle unlocking apparatus may be wholly or partially implemented by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external server through a network connection. The computer program is executed by a processor to implement a vehicle unlocking method.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule;
and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule;
and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.
Claims (8)
1. The vehicle unlocking method is characterized by comprising the following steps executed by a vehicle central control end:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule; the unlocking rule comprises a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext comprises unlocking ciphertext content and a timestamp corresponding to the time point when the terminal equipment generates the unlocking ciphertext;
when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle;
wherein, according to the preset rule of unblanking, detect whether the unblock ciphertext after the deciphering accords with the condition of unblanking, include:
detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext or not;
when the unlocking ciphertext content is consistent with the unlocking ciphertext, acquiring a time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp;
detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length; and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
2. The vehicle unlocking method according to claim 1, wherein after detecting whether the decrypted unlocking ciphertext meets the unlocking condition according to a preset unlocking rule, the method further comprises:
when the unlocking ciphertext does not accord with the unlocking condition, recording the vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request;
and when the request failure times of the vehicle unlocking request are larger than a preset locking threshold value, locking the vehicle.
3. A vehicle unlocking method is characterized by comprising the following steps executed by a terminal device:
sending a wireless connection request containing the unique identifier to a vehicle central control end, and establishing wireless connection with the vehicle central control end through the unique identifier;
acquiring a first secret key and an unlocking ciphertext, and encrypting the unlocking ciphertext through the first secret key;
sending a vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with an unlocking condition after decrypting the encrypted unlocking ciphertext by using a first public key;
the vehicle central control end executes the following steps:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule; the unlocking rule comprises a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext comprises unlocking ciphertext content and a timestamp corresponding to the time point when the terminal equipment generates the unlocking ciphertext;
when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle;
wherein, according to the preset rule of unblanking, detect whether the unblock ciphertext after the deciphering accords with the condition of unblanking, include:
detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext or not;
when the unlocking ciphertext content is consistent with the unlocking ciphertext, acquiring a time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp;
detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length; and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
4. The vehicle unlocking method according to claim 3, wherein the obtaining of the first security key and the unlocking ciphertext and the encrypting of the unlocking ciphertext by the first security key comprises:
acquiring a first secret key encrypted by a second public key, and acquiring a second secret key corresponding to the second public key;
decrypting the first secret key encrypted by the second public key by using the second secret key to obtain the decrypted first secret key;
and encrypting the unlocking ciphertext by the decrypted first secret key.
5. A vehicle unlocking device is characterized by comprising a vehicle central control end, wherein the vehicle central control end comprises:
the connection module is used for receiving a wireless connection request containing a unique identifier sent by terminal equipment and establishing wireless connection with the terminal equipment according to the unique identifier;
the receiving module is used for receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
the decryption module is used for decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm and acquiring the decrypted unlocking ciphertext;
the detection module is used for detecting whether the decrypted unlocking ciphertext accords with the unlocking condition or not according to a preset unlocking rule; the unlocking rule comprises a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext comprises unlocking ciphertext content and a timestamp corresponding to the time point when the terminal equipment generates the unlocking ciphertext;
the unlocking module is used for unlocking the vehicle when the unlocking ciphertext accords with the unlocking condition;
wherein the detection module comprises:
the ciphertext comparison unit is used for detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext or not;
the time obtaining unit is used for obtaining the time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp when the unlocking ciphertext content is consistent with the unlocking ciphertext;
and the time comparison unit is used for detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length or not, and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
6. A vehicle unlocking apparatus comprising a terminal device and a vehicle center control terminal according to claim 5, wherein the terminal device comprises:
the first sending module is used for sending the wireless connection request containing the unique identifier to the vehicle central control end and establishing wireless connection with the vehicle central control end through the unique identifier;
the acquisition module is used for acquiring a first secret key and an unlocking ciphertext and encrypting the unlocking ciphertext through the first secret key;
and the second sending module is used for sending the vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with the unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
7. Computer arrangement comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor realizes the steps of the vehicle unlocking method according to any of claims 1 to 4 when executing the computer program.
8. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method for unlocking a vehicle according to any one of claims 1 to 4.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910429513.7A CN110310392B (en) | 2019-05-22 | 2019-05-22 | Vehicle unlocking method and device, computer equipment and storage medium |
PCT/CN2019/101897 WO2020232854A1 (en) | 2019-05-22 | 2019-08-22 | Vehicle unlocking method and apparatus, and computer device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910429513.7A CN110310392B (en) | 2019-05-22 | 2019-05-22 | Vehicle unlocking method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110310392A CN110310392A (en) | 2019-10-08 |
CN110310392B true CN110310392B (en) | 2021-07-16 |
Family
ID=68075250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910429513.7A Active CN110310392B (en) | 2019-05-22 | 2019-05-22 | Vehicle unlocking method and device, computer equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110310392B (en) |
WO (1) | WO2020232854A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111177699B (en) * | 2019-12-23 | 2022-07-08 | 恒大恒驰新能源汽车科技(广东)有限公司 | Data extraction method, secret key generation method, unlocking method and device |
CN114999029A (en) * | 2020-04-01 | 2022-09-02 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN111923863B (en) * | 2020-08-25 | 2021-09-17 | 东信和平科技股份有限公司 | Vehicle control method based on digital vehicle key |
CN113783687B (en) * | 2021-09-07 | 2023-08-29 | 浙江吉利控股集团有限公司 | Method and system for generating, encrypting and decrypting automobile electronic anti-theft code |
CN115050140A (en) * | 2022-06-08 | 2022-09-13 | 杭州野乐科技有限公司 | Unlocking method, device and equipment of shared bicycle and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631299A (en) * | 2015-12-29 | 2016-06-01 | 惠州Tcl移动通信有限公司 | Intelligent unlocking method and system of mobile terminal |
CN106559378A (en) * | 2015-09-24 | 2017-04-05 | 联芯科技有限公司 | Automobile door lock tripper, system and method and intelligent terminal |
CN108092958A (en) * | 2017-12-05 | 2018-05-29 | 成都市共维科技有限公司 | Information authentication method, device, computer equipment and storage medium |
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102592340B (en) * | 2012-02-29 | 2017-09-12 | 深圳市赛格导航科技股份有限公司 | A kind of engineering truck emergency release method and system |
US9218700B2 (en) * | 2012-12-14 | 2015-12-22 | GM Global Technology Operations LLC | Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs |
GB2522217A (en) * | 2014-01-16 | 2015-07-22 | Parcelhome Ltd | Electronic lock apparatus, method and system |
CN105894633B (en) * | 2016-04-21 | 2018-05-08 | 上海众人网络安全技术有限公司 | A kind of method of access control system and access control system unlock |
US11285915B2 (en) * | 2017-08-09 | 2022-03-29 | M2MD Technologies, Inc. | Method and system for using a wireless mobile device as a smart key |
CN109389710A (en) * | 2018-08-24 | 2019-02-26 | 黄瀚思 | Intelligent door lock system based on RSA Algorithm Yu BLE low-power consumption bluetooth |
-
2019
- 2019-05-22 CN CN201910429513.7A patent/CN110310392B/en active Active
- 2019-08-22 WO PCT/CN2019/101897 patent/WO2020232854A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106559378A (en) * | 2015-09-24 | 2017-04-05 | 联芯科技有限公司 | Automobile door lock tripper, system and method and intelligent terminal |
CN105631299A (en) * | 2015-12-29 | 2016-06-01 | 惠州Tcl移动通信有限公司 | Intelligent unlocking method and system of mobile terminal |
CN108092958A (en) * | 2017-12-05 | 2018-05-29 | 成都市共维科技有限公司 | Information authentication method, device, computer equipment and storage medium |
CN109150903A (en) * | 2018-09-25 | 2019-01-04 | 平安科技(深圳)有限公司 | A kind of account management method, device, storage medium and terminal device |
Also Published As
Publication number | Publication date |
---|---|
CN110310392A (en) | 2019-10-08 |
WO2020232854A1 (en) | 2020-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110310392B (en) | Vehicle unlocking method and device, computer equipment and storage medium | |
US20210350013A1 (en) | Security systems and methods for continuous authorized access to restricted access locations | |
US10826882B2 (en) | Network-based key distribution system, method, and apparatus | |
CN109325342B (en) | Identity information management method, device, computer equipment and storage medium | |
CN109361669B (en) | Identity authentication method, device and equipment of communication equipment | |
EP2893484B1 (en) | Method and system for verifying an access request | |
US10432600B2 (en) | Network-based key distribution system, method, and apparatus | |
WO2020215568A1 (en) | Communication number changing method, apparatus and system, computer device and storage medium | |
CN105978917A (en) | System and method for trusted application security authentication | |
CN113691502B (en) | Communication method, device, gateway server, client and storage medium | |
WO2017202025A1 (en) | Terminal file encryption method, terminal file decryption method, and terminal | |
CN112425114A (en) | Password manager protected by public-private key pair | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN108319857B (en) | Trusted application locking and unlocking method and system | |
CN113472793A (en) | Personal data protection system based on hardware password equipment | |
CN112559993A (en) | Identity authentication method, device and system and electronic equipment | |
US10389529B2 (en) | Entropy-based authentication of mobile financial transaction | |
CN114444134A (en) | Data use authorization method, system and device | |
CN112669104A (en) | Data processing method of rental equipment | |
CN107437996B (en) | Identity authentication method, device and terminal | |
CN113792345A (en) | Data access control method and device | |
CN108900595B (en) | Method, device and equipment for accessing data of cloud storage server and computing medium | |
CN110971610A (en) | Control system identity verification method and device, computer equipment and storage medium | |
CN111586024B (en) | Authentication method, authentication equipment and storage medium | |
CN113987445A (en) | User login method and device of USB-KEY, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |