CN110310392B - Vehicle unlocking method and device, computer equipment and storage medium - Google Patents

Vehicle unlocking method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN110310392B
CN110310392B CN201910429513.7A CN201910429513A CN110310392B CN 110310392 B CN110310392 B CN 110310392B CN 201910429513 A CN201910429513 A CN 201910429513A CN 110310392 B CN110310392 B CN 110310392B
Authority
CN
China
Prior art keywords
unlocking
ciphertext
vehicle
secret key
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910429513.7A
Other languages
Chinese (zh)
Other versions
CN110310392A (en
Inventor
陈步青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910429513.7A priority Critical patent/CN110310392B/en
Priority to PCT/CN2019/101897 priority patent/WO2020232854A1/en
Publication of CN110310392A publication Critical patent/CN110310392A/en
Application granted granted Critical
Publication of CN110310392B publication Critical patent/CN110310392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/248Electronic key extraction prevention
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Abstract

The invention discloses a vehicle unlocking method, a vehicle unlocking device, computer equipment and a storage medium, wherein the method comprises the following steps: receiving a wireless connection request sent by terminal equipment, and establishing wireless connection with the terminal equipment; receiving a vehicle unlocking instruction sent by terminal equipment; decrypting the unlocking ciphertext by using a first public key generated according to an RSA algorithm, and acquiring the decrypted unlocking ciphertext; detecting whether the decrypted unlocking ciphertext accords with unlocking conditions or not according to preset unlocking rules; and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle. The intelligent unlocking method and the intelligent unlocking system have the advantages that the intelligent unlocking safety is greatly improved while the vehicle is rapidly and intelligently unlocked, so that the property loss of a user caused by the fact that the vehicle unlocking program is cracked by others is prevented, and the user experience is enhanced.

Description

Vehicle unlocking method and device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of passwords, in particular to a vehicle unlocking method and device, computer equipment and a storage medium.
Background
In the field of automatic vehicle unlocking, a low-cost automatic vehicle unlocking scheme does not exist at present, face unlocking and fingerprint unlocking are limited by the accuracy of face identification, and can be realized only by a specific camera or a fingerprint collector, so that the hardware cost is high, the face unlocking and the fingerprint unlocking cannot be popularized on low-end vehicles, errors can exist in face identification and fingerprint identification, hundreds of identification accuracy cannot be guaranteed, and property loss can be caused to users.
Disclosure of Invention
Based on the above, the invention provides a vehicle unlocking method and device, computer equipment and a storage medium, which are used for improving the safety of intelligent unlocking, preventing property loss of a user caused by the fact that a vehicle unlocking program is cracked by others, and enhancing user experience.
A vehicle unlocking method comprises the following steps executed at a vehicle central control end:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule;
and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
A vehicle unlocking method comprises the following steps executed at a terminal device:
sending a wireless connection request containing the unique identifier to terminal equipment, and establishing wireless connection with a vehicle central control end through the unique identifier;
acquiring a first secret key and an unlocking ciphertext, and encrypting the unlocking ciphertext through the first secret key;
and sending a vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with an unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
A vehicle unlocking device comprising a vehicle central control end, the vehicle central control end comprising:
the connection module is used for receiving a wireless connection request containing a unique identifier sent by terminal equipment and establishing wireless connection with the terminal equipment according to the unique identifier;
the receiving module is used for receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
the decryption module is used for decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm and acquiring the decrypted unlocking ciphertext;
the detection module is used for detecting whether the decrypted unlocking ciphertext accords with the unlocking condition or not according to a preset unlocking rule;
and the unlocking module is used for unlocking the vehicle when the unlocking ciphertext accords with the unlocking condition.
A vehicle unlocking apparatus comprising a terminal device, the terminal device comprising:
the first sending module is used for sending the wireless connection request containing the unique identifier to the terminal equipment and establishing wireless connection with the vehicle central control terminal through the unique identifier;
the acquisition module is used for acquiring a first secret key and an unlocking ciphertext and encrypting the unlocking ciphertext through the first secret key;
and the second sending module is used for sending the vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with the unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the vehicle unlocking method described above when executing the computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned vehicle unlocking method.
According to the vehicle unlocking method, the vehicle unlocking device, the computer equipment and the storage medium, the secret key and the public key generated by the RSA algorithm are used in the intelligent unlocking process of the vehicle, the key data for unlocking, namely the unlocking ciphertext is encrypted, and the time stamp and the unlocking ciphertext are combined for double encryption, so that the safety of intelligent unlocking is greatly improved while the vehicle is rapidly and intelligently unlocked, the property loss of a user caused by the fact that an unlocking program of the vehicle is cracked by others is prevented, and the user experience is enhanced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without inventive labor.
FIG. 1 is a schematic diagram of an application environment of a vehicle unlocking method according to an embodiment of the invention;
FIG. 2 is a flow chart of a vehicle unlocking method executed at a vehicle central control end according to an embodiment of the invention;
FIG. 3 is a flowchart of step S40 of a method for unlocking a vehicle according to an embodiment of the present invention;
FIG. 4 is a flow chart of a method for unlocking a vehicle in another embodiment of the present invention;
fig. 5 is a flowchart of a vehicle unlocking method executed in a terminal device according to an embodiment of the present invention;
FIG. 6 is a flowchart of step S90 of a method for unlocking a vehicle according to an embodiment of the present invention;
FIG. 7 is a schematic illustration of a vehicle central control end of the vehicle unlocking apparatus in an embodiment of the present invention;
FIG. 8 is a schematic view of a detection module of the vehicle unlocking apparatus in one embodiment of the present invention;
FIG. 9 is a schematic view of a vehicle center control end of a vehicle unlocking apparatus according to another embodiment of the present invention;
fig. 10 is a schematic view of a terminal device of the vehicle unlocking apparatus in an embodiment of the present invention;
FIG. 11 is a diagram of a computing device in accordance with an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The vehicle unlocking method provided by the invention can be applied to the application environment shown in figure 1, wherein the terminal equipment is communicated with the vehicle central control end through a network. The key data of unlocking are encrypted through the secret key and the public key generated by the RSA algorithm in the process of intelligently unlocking the vehicle, further, the unlocking ciphertext is judged through a preset unlocking rule, and when the unlocking ciphertext accords with an unlocking condition, the vehicle is unlocked. The terminal devices include, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The vehicle central control end is installed in the vehicle and can be realized by an independent server or a server cluster consisting of a plurality of servers.
In an embodiment, as shown in fig. 2, a vehicle unlocking method is provided, which is described by taking the application of the method to the vehicle central control end in fig. 1 as an example, and the vehicle unlocking method includes the following steps executed at the vehicle central control end:
and S10, receiving a wireless connection request containing the unique identifier sent by the terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier.
The terminal device includes but is not limited to a mobile terminal such as a mobile phone, a smart watch, a key ring with a communication function (bluetooth function), and a terminal device such as a computer. The unique identifier is a unique identifier for distinguishing different terminal devices.
The connection request can be sent to the vehicle central control end by a user through clicking a preset button, and can also be automatically sent to the vehicle central control end within a certain range when entering the receiver. For example, when a user wants to unlock a vehicle, the connection request is sent to a vehicle central control terminal by clicking a preset button of a terminal device carried by the user, or when the user enters a certain range of the vehicle, the terminal device carried by the user detects the connection request and then automatically sends the connection request to the vehicle central control terminal.
Understandably, the vehicle central control end establishes a wireless connection with the terminal device after receiving the connection request, in an embodiment, the connection request is sent to the vehicle central control end through bluetooth, and the vehicle central control end establishes a wireless connection with the terminal device through bluetooth after receiving the request. In another embodiment, the vehicle central control end and the terminal device can also establish wireless connection with the terminal device through a wireless network technology (such as WiFi). And establishing wireless connection with the terminal equipment so as to receive a vehicle unlocking instruction sent by the terminal equipment in the subsequent step, so that the vehicle can be unlocked conveniently.
And S20, receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm.
The vehicle unlocking instruction is used for unlocking the vehicle, and the vehicle central control end starts an unlocking process of the vehicle after receiving the vehicle unlocking instruction. The unlocking ciphertext is a ciphertext used for unlocking the vehicle, and may be a string of characters, a word, a sentence, or the like. The unlocking ciphertext can be generated when the vehicle unlocking instruction is sent, is encrypted through the first secret key, and can also be stored in the terminal device in advance after being encrypted through the first secret key of the RSA algorithm.
The RSA algorithm is an asymmetric encryption algorithm, i.e. the key generated according to the RSA algorithm for encrypting information or data is asymmetric with the key generated according to the RSA algorithm for decrypting information or data. For example, when information or data is encrypted by using the first secret key, the information or the data cannot be decrypted by using the first secret key, but a first public key which is different from the first secret key and is asymmetric (the asymmetry refers to that the first public key cannot be derived by a known method according to the known first secret key) is used to decrypt the information or the data encrypted by using the first secret key.
When the RSA algorithm is used to encrypt information or data, a pair of secret keys is generated according to the RSA algorithm, one of the secret keys is secret and not public, that is, a secret key that can be stored or known only by a user or a person or device preset by the user, and the secret key is a secret key (in this embodiment, the first secret key); the other key is public and non-secret, and can be known or obtained by anyone or equipment, and the key is a public key (in this embodiment, the first public key). Understandably, the first secret key and the first public key are mutually a pair of asymmetric keys, that is, when information or data is encrypted by using the first secret key, the encrypted information or data can be decrypted by using the first public key; on the contrary, when information or data is encrypted using the first public key, the encrypted information or data can be decrypted using the first public key. It should be noted that the first secret key is generated in advance in the vehicle central control end according to the RSA algorithm, and then is sent to and stored in the terminal device controlled by the user.
In this embodiment, it is assumed that the first secret key is used to encrypt the unlock ciphertext, and understandably, the first secret key is usually stored in the terminal device governed by the user, when the user needs to unlock the vehicle, the terminal device that has established wireless connection with the vehicle encrypts the unlock ciphertext using the first secret key, or directly retrieves the unlock ciphertext that has been encrypted with the first secret key and is stored in the terminal device in advance, and sends the encrypted unlock ciphertext to the vehicle central control end, and understandably, the vehicle central control end receives the encrypted unlock ciphertext to decrypt the unlock ciphertext in a subsequent step, so as to determine whether the user who has raised the vehicle unlock request meets the unlock condition.
And S30, decrypting the unlocking ciphertext by using the first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext.
As described above, the first public key is a public, non-secret key generated simultaneously with the first secret key according to the RSA algorithm, and the first public key and the first secret key are a pair of asymmetric keys. And the first public key is stored in a vehicle database of a vehicle central control end after being generated according to the RSA algorithm.
Specifically, after the vehicle central control end receives a decryption ciphertext sent by the terminal device, the first public key is called from the vehicle database, then the received unlocking ciphertext is decrypted through the first public key to generate the decrypted unlocking ciphertext, and then the unlocking ciphertext is obtained so as to detect whether the decrypted unlocking ciphertext meets a preset unlocking condition in step S40.
And S40, detecting whether the decrypted unlocking ciphertext accords with the unlocking condition or not according to a preset unlocking rule.
The unlocking rule can be preset according to requirements.
In an embodiment, the unlocking rule may be set such that when the content of the unlocking ciphertext is consistent with the content of a preset unlocking ciphertext, the unlocking ciphertext meets the unlocking condition. As described above, the unlocking ciphertext may also be preset by the user according to the requirement, and may be a string of characters, a word, a sentence, or the like, where the unlocking ciphertext is used as a word to describe the embodiment: for example, if the preset unlocking ciphertext is "hello", at this time, detecting whether the content of the decrypted unlocking ciphertext is consistent with the unlocking ciphertext, that is, detecting whether the content of the unlocking ciphertext is "hello", when the result is yes, indicating that the unlocking ciphertext meets the unlocking condition, and at this time, entering step S50 to unlock the vehicle; and if the result is negative, representing that the unlocking ciphertext does not accord with the unlocking condition, confirming that the unlocking ciphertext does not accord with the unlocking condition at the moment, recording the current vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request, so that in some embodiments, the next vehicle unlocking request is subjected to preset limitation according to the request failure times.
In another embodiment, the unlocking rule contains a first unique identifier of at least one terminal device, that is, the unique identifiers of all terminal devices capable of unlocking are stored in the unlocking rule in advance; in this embodiment, whether an identifier consistent with a second unique identifier in the unlocking cipher text exists in all first unique identifiers in the unlocking rule is detected, that is, the second unique identifier is respectively compared with all the first unique identifiers, when it is detected that an unique identifier consistent with the second unique identifier exists in all the first unique identifiers, the terminal device corresponding to the second unique identifier is represented as a preset terminal device capable of unlocking the vehicle, and at this time, the unlocking cipher text is confirmed to be in accordance with an unlocking condition; and when detecting that the unique identifier consistent with the second unique identifier does not exist in all the first unique identifiers, representing that the terminal device corresponding to the second unique identifier is not the terminal device pre-stored in the unlocking rule, recording the vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request.
And S50, when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
And when the unlocking ciphertext accords with the unlocking condition, representing that a user initiating a vehicle unlocking instruction operation has unlocking qualification, and unlocking the vehicle according to the vehicle unlocking instruction.
This embodiment is through using secret key and the public key that is generated by the RSA algorithm at the in-process that carries out intelligent unlocking to the vehicle, to the key data that unblanks promptly the unblock ciphertext encrypts, when carrying out quick intelligent unlocking to the vehicle, has promoted the security because intelligent unlocking greatly to prevent appearing being cracked vehicle unblock procedure by other people and causing user loss of property, reinforcing user experience.
In an embodiment, the unlocking rule includes a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext includes an unlocking ciphertext content and a timestamp corresponding to a time point at which the terminal device generates the unlocking ciphertext; as shown in fig. 3, the step S40 includes:
s401, detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext.
The unlocking ciphertext comprises unlocking ciphertext content which can be a string of characters, a sentence or a word and the like and is used for being compared with the unlocking ciphertext in the unlocking rule, in the embodiment, whether the unlocking ciphertext content is consistent with the unlocking ciphertext preset in the unlocking rule or not is detected, when the unlocking ciphertext content is consistent with the unlocking ciphertext, the unlocking ciphertext is represented to possibly accord with the unlocking condition, at this moment, the step S402 is entered, and the time point of the terminal device for generating the unlocking ciphertext is obtained according to the time stamp, so that whether the unlocking ciphertext accords with the unlocking condition or not is further verified. And when the unlocking ciphertext content is inconsistent with the unlocking ciphertext content, confirming that the unlocking ciphertext is not in accordance with the unlocking condition, recording the current vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request.
S402, when the content of the unlocking ciphertext is consistent with the unlocking ciphertext, acquiring the time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp.
The unlocking ciphertext further comprises a timestamp corresponding to a time point when the terminal device generates the unlocking ciphertext, the timestamp is a complete and verifiable character sequence which can represent that a piece of data exists before a certain specific time, the timestamp uniquely identifies the time of a certain moment, specifically, the timestamp is data generated by using a data signature technology, a signed object comprises information such as original file (data) information, signature parameters and signature time, the timestamp can provide an electronic evidence for the unlocking ciphertext to prove the time when the unlocking ciphertext is generated, and the authenticity of the proof is very high, because the timestamp cannot be tampered in a known technology. It should be noted that, in this embodiment, a sending rule of an unlock ciphertext is first set and stored in the terminal device in advance, where the rule is that when a user needs to send a vehicle unlock instruction and has clicked a preset button to perform an operation of sending the vehicle unlock instruction, the decrypted ciphertext content is generated, and after the decrypted ciphertext content is generated, a corresponding timestamp is generated for the generated decrypted ciphertext content at the fastest speed, and at the same time, the decrypted ciphertext content and the generated timestamp are encrypted by using the first secret key to generate an encrypted decrypted ciphertext, and the generated timestamp may conceivably identify a time point at which the decrypted ciphertext is generated. In this embodiment, a time point when the terminal device generates the unlocking ciphertext is obtained, so as to further determine whether the unlocking ciphertext meets the unlocking condition in step S403.
And S403, detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
The unlocking time length can be preset according to requirements. Preferably, the unlocking time is 2 seconds in length.
In this embodiment, a sending rule of the unlocking ciphertext is preset, that is, when the user initiates a vehicle unlocking instruction operation, the unlocking ciphertext is generated and a timestamp is added to the unlocking ciphertext, if a time length between a time point when the terminal device generates the unlocking ciphertext and a time point when the vehicle central control terminal receives the unlocking ciphertext is too large, that is, the unlocking ciphertext is sent to the vehicle central control terminal after a relatively long time is generated, which means that the unlocking ciphertext or the first secret key may be cracked or known by others, and is stored in advance, and the unlocking ciphertext or the first secret key is sent to the vehicle central control terminal when the vehicle is unlocked.
Therefore, whether the time length between the time point when the terminal device generates the unlocking ciphertext and the time point when the vehicle central control end receives the unlocking ciphertext is smaller than the unlocking time length or not is detected, when the time length between the time point when the unlocking ciphertext is generated and the time point when the unlocking ciphertext is received is larger than or equal to the unlocking time length, the unlocking ciphertext is proved to be not qualified with the unlocking condition, namely, a user initiating a vehicle unlocking instruction possibly does not have the qualification of unlocking, at the moment, the unlocking ciphertext is confirmed to be not qualified with the unlocking condition, and the vehicle unlocking request cannot pass at this time is recorded, namely, the number of times that the vehicle unlocking request cannot pass is increased by one; on the contrary, when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, the unlocking ciphertext is sent according to a preset sending rule, namely the unlocking ciphertext accords with the unlocking condition, and at the moment, the unlocking ciphertext is confirmed to accord with the unlocking condition so as to unlock the vehicle in the subsequent steps.
In the embodiment, the timestamp is added to the unlocking ciphertext when the unlocking ciphertext is generated, so that the detected time point for generating the unlocking ciphertext and the time point for receiving the unlocking ciphertext are real and effective and are not tampered, the time length between the time point for generating the unlocking ciphertext and the time point for receiving the unlocking ciphertext is compared with the unlocking time length, whether the unlocking ciphertext meets the unlocking condition or not is further judged, the safety of the vehicle during unlocking is greatly improved, and the user experience is enhanced.
In an embodiment, as shown in fig. 4, after the step S40, the method further includes:
and S60, when the unlocking ciphertext does not meet the unlocking condition, recording the vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request.
When the unlocking ciphertext does not meet the unlocking condition, the vehicle unlocking instruction operation is initiated on behalf of the user, namely the user initiating the vehicle unlocking request does not have the unlocking qualification, at the moment, the vehicle unlocking request is recorded as the request failure, and the request failure times of the vehicle unlocking request is increased by one. It should be noted that the number of times of the failure of the request of the vehicle unlocking request recorded each time is accumulated, but when the vehicle central control end has the vehicle unlocking request, that is, when the vehicle is unlocked, the number of times of the failure of the request of the vehicle unlocking request recorded before is cleared. For example, if three consecutive vehicle unlocking requests cannot pass through, the number of times of failure of the recorded and accumulated vehicle unlocking requests is 3, at this time, if the next vehicle unlocking request is passed through by the vehicle central control end, the result that the number of times of failure of the recorded vehicle unlocking requests is 3 is cleared, that is, the number of times of failure of the vehicle unlocking requests is 0, and the recording is restarted.
And S70, when the number of times of request failure of the vehicle unlocking request is larger than a preset locking threshold value, locking the vehicle.
In one embodiment, the number of request failures of the vehicle unlocking request further includes the number of request failures recorded in the step S401.
The locking threshold may be preset according to requirements, and preferably, the locking threshold is 5. The locking the vehicle comprises: in a preset time period, a vehicle unlocking instruction is not received any more, namely, the vehicle is not unlocked, the condition of locking the vehicle is sent to a preset management party, and the management party is reminded of maliciously unlocking or attacking (cracking) the vehicle central control terminal.
When the number of times that the vehicle unlocking request cannot pass is larger than the locking threshold, the vehicle is locked, the unlocking system of the vehicle is prevented from being attacked (cracked) by people, the safety of vehicle unlocking is improved, and the user experience is enhanced.
In an embodiment, as shown in fig. 5, a vehicle unlocking method is provided, which is described by taking the terminal device in fig. 1 as an example, and includes the following steps executed at the terminal device:
and S80, sending the wireless connection request containing the unique identifier to the terminal equipment, and establishing wireless connection with the vehicle central control terminal through the unique identifier.
As described above, the unique identifier is a unique identifier for distinguishing different terminal devices. When a user holding the terminal equipment needs to unlock the vehicle, the connection request is sent to the vehicle central control end through the terminal equipment, or when the user enters a certain range of the vehicle and the terminal equipment carried by the user detects the connection request, the connection request is automatically sent to the vehicle central control end; and after receiving the connection request, the vehicle central control end performs wireless connection with the terminal equipment, and the wireless connection is established with the vehicle central control end through a wireless network technology, such as WIFI, Bluetooth and the like, so that a vehicle unlocking instruction is sent to the vehicle central control end in the subsequent steps.
S90, obtaining a first secret key and an unlocking ciphertext, and encrypting the unlocking ciphertext through the first secret key.
First, the first secret key is obtained, in an embodiment, the first secret key may be generated in advance in the vehicle central control terminal according to an RSA algorithm, and is sent to and stored in a terminal database of the vehicle central control terminal of the terminal device, and when obtaining, the first secret key is called from the terminal database of the terminal device, and obtaining the unlocking ciphertext includes: and generating an unlocking ciphertext according to a preset ciphertext rule, or setting the unlocking ciphertext in advance and storing the unlocking ciphertext in a terminal database of the terminal equipment, and directly calling the unlocking ciphertext from the terminal database at the moment. Further, the unlocking ciphertext is encrypted through the first secret key, so that the unlocking ciphertext can be sent to the vehicle central control end in the subsequent step for subsequent unlocking process.
S100, sending a vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with an unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
And sending the vehicle unlocking command containing the encrypted unlocking ciphertext to the vehicle central control end to perform a subsequent unlocking process, wherein the unlocking process can refer to steps S30 to S50, or steps S30 to S70, and details are not repeated here.
In one embodiment, as shown in fig. 6, the step S90 includes:
s901, obtaining a first secret key encrypted by a second public key, and obtaining a second secret key corresponding to the second public key.
The second public key and the second secret key are a pair of asymmetric keys generated by an RSA algorithm, the second public key is not consistent with the first public key (i.e. the second public key and the first secret key are two different keys), the second secret key is not consistent with the first secret key (i.e. the second public key and the first secret key are two different keys), the second public key is used for encrypting the first secret key, and the second secret key is used for encrypting the first secret key encrypted by the second public key. The second public key and the second secret key are generated in advance and stored in the terminal device terminal database.
A first secret key encrypted with a second public key is obtained and the second secret key is obtained for decrypting the first secret key in a subsequent step.
In an embodiment, the first secret key encrypted by the second public key may be stored in a cloud instead of the terminal device, so that the first secret key is prevented from being lost after the terminal device is lost, the vehicle cannot be unlocked, and user experience is enhanced. Even if the encrypted first secret key is stored to a non-private cloud end, the first secret key does not need to be stolen and stolen by others.
S902, decrypting the first secret key encrypted by the second public key using the second secret key to obtain the decrypted first secret key. For encrypting the unlock ciphertext using the first security key in step S903.
And S903, encrypting the unlocking ciphertext through the decrypted first secret key. And sending the unlocking ciphertext to a vehicle central control end in the subsequent step for subsequent unlocking process.
In the embodiment, the first secret key is encrypted by using the second public key, so that the confidentiality and the safety of the first secret key are further enhanced, the safety of the whole vehicle unlocking system is improved, and the user experience is enhanced.
According to the intelligent unlocking method and the intelligent unlocking system, the secret key and the public key generated by the RSA algorithm are used in the intelligent unlocking process of the vehicle, key data for unlocking, namely the unlocking ciphertext is encrypted, and the time stamp and the unlocking ciphertext are combined for double encryption, so that the safety of intelligent unlocking is greatly improved while the vehicle is rapidly and intelligently unlocked, property loss of a user caused by the fact that an unlocking program of the vehicle is cracked by others is prevented, and the user experience is enhanced.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In one embodiment, a vehicle unlocking device is provided, and the vehicle unlocking device corresponds to the vehicle unlocking method in the above embodiments one to one. As shown in fig. 7, the vehicle unlocking device includes a vehicle central control end, and the vehicle central control end includes a connection module 11, a receiving module 12, a decryption module 13, a detection module 14, and an unlocking module 15. The functional modules are explained in detail as follows:
the connection module 11 is configured to receive a wireless connection request including a unique identifier sent by a terminal device, and establish a wireless connection with the terminal device according to the unique identifier;
the receiving module 12 is configured to receive a vehicle unlocking instruction sent by the terminal device, where the vehicle unlocking instruction includes an unlocking ciphertext obtained by encrypting, by the terminal device, a first secret key, where the first secret key is a key generated according to an RSA algorithm;
the decryption module 13 is configured to decrypt the unlocking ciphertext by using the first public key generated according to the RSA algorithm, and obtain the decrypted unlocking ciphertext;
the detection module 14 is configured to detect whether the decrypted unlocking ciphertext meets an unlocking condition according to a preset unlocking rule;
and the unlocking module 15 is used for unlocking the vehicle when the unlocking ciphertext accords with the unlocking condition.
In one embodiment, as shown in fig. 8, the detection module 14 includes:
a ciphertext comparison unit 141, configured to detect whether the content of the unlocking ciphertext is consistent with the unlocking ciphertext;
the time obtaining unit 142 is configured to obtain, according to the timestamp, a time point at which the terminal device generates the unlocking ciphertext when the unlocking ciphertext content is consistent with the unlocking ciphertext;
the time comparison unit 143 is configured to detect whether a time length between a time point at which the unlocking ciphertext is generated and a time point at which the unlocking ciphertext is received is smaller than the unlocking time length, and when the time length between the time point at which the unlocking ciphertext is generated and the time point at which the unlocking ciphertext is received is smaller than the unlocking time length, confirm that the unlocking ciphertext meets the unlocking condition.
In an embodiment, as shown in fig. 9, the vehicle central control end further includes:
the failure recording module 16 is configured to record the vehicle unlocking request as a request failure when the unlocking ciphertext does not meet the unlocking condition, and add one to the request failure times of the vehicle unlocking request;
and the vehicle locking module 17 is configured to lock the vehicle when the number of times of request failures of the vehicle unlocking request is greater than a preset locking threshold.
In one embodiment, as shown in fig. 10, the vehicle unlocking apparatus further includes a terminal device, and the terminal device includes:
the first sending module 18 is configured to send a wireless connection request including the unique identifier to the terminal device, and establish a wireless connection with the vehicle central control terminal through the unique identifier;
an obtaining module 19, configured to obtain a first secret key and an unlocking ciphertext, and encrypt the unlocking ciphertext by using the first secret key;
the second sending module 20 is configured to send a vehicle unlocking instruction including the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end decrypts the encrypted unlocking ciphertext by using the first public key, and unlocks the vehicle when the unlocking ciphertext meets an unlocking condition.
In one embodiment, the obtaining module includes:
a key acquisition unit configured to acquire a first secret key encrypted by a second public key, and acquire a second secret key corresponding to the second public key;
a decryption unit, configured to decrypt, using the second secret key, the first secret key encrypted by the second public key, and obtain the decrypted first secret key;
and the encryption unit is used for encrypting the unlocking ciphertext through the decrypted first secret key.
For specific limitations of the vehicle unlocking device, reference may be made to the above limitations of the vehicle unlocking method, which are not described herein again. The respective modules in the above vehicle unlocking apparatus may be wholly or partially implemented by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external server through a network connection. The computer program is executed by a processor to implement a vehicle unlocking method.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule;
and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule;
and when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (8)

1. The vehicle unlocking method is characterized by comprising the following steps executed by a vehicle central control end:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule; the unlocking rule comprises a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext comprises unlocking ciphertext content and a timestamp corresponding to the time point when the terminal equipment generates the unlocking ciphertext;
when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle;
wherein, according to the preset rule of unblanking, detect whether the unblock ciphertext after the deciphering accords with the condition of unblanking, include:
detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext or not;
when the unlocking ciphertext content is consistent with the unlocking ciphertext, acquiring a time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp;
detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length; and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
2. The vehicle unlocking method according to claim 1, wherein after detecting whether the decrypted unlocking ciphertext meets the unlocking condition according to a preset unlocking rule, the method further comprises:
when the unlocking ciphertext does not accord with the unlocking condition, recording the vehicle unlocking request as a request failure, and adding one to the request failure times of the vehicle unlocking request;
and when the request failure times of the vehicle unlocking request are larger than a preset locking threshold value, locking the vehicle.
3. A vehicle unlocking method is characterized by comprising the following steps executed by a terminal device:
sending a wireless connection request containing the unique identifier to a vehicle central control end, and establishing wireless connection with the vehicle central control end through the unique identifier;
acquiring a first secret key and an unlocking ciphertext, and encrypting the unlocking ciphertext through the first secret key;
sending a vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with an unlocking condition after decrypting the encrypted unlocking ciphertext by using a first public key;
the vehicle central control end executes the following steps:
receiving a wireless connection request containing a unique identifier sent by terminal equipment, and establishing wireless connection with the terminal equipment according to the unique identifier;
receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm, and acquiring the decrypted unlocking ciphertext;
detecting whether the decrypted unlocking ciphertext meets an unlocking condition or not according to a preset unlocking rule; the unlocking rule comprises a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext comprises unlocking ciphertext content and a timestamp corresponding to the time point when the terminal equipment generates the unlocking ciphertext;
when the unlocking ciphertext accords with the unlocking condition, unlocking the vehicle;
wherein, according to the preset rule of unblanking, detect whether the unblock ciphertext after the deciphering accords with the condition of unblanking, include:
detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext or not;
when the unlocking ciphertext content is consistent with the unlocking ciphertext, acquiring a time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp;
detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length; and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
4. The vehicle unlocking method according to claim 3, wherein the obtaining of the first security key and the unlocking ciphertext and the encrypting of the unlocking ciphertext by the first security key comprises:
acquiring a first secret key encrypted by a second public key, and acquiring a second secret key corresponding to the second public key;
decrypting the first secret key encrypted by the second public key by using the second secret key to obtain the decrypted first secret key;
and encrypting the unlocking ciphertext by the decrypted first secret key.
5. A vehicle unlocking device is characterized by comprising a vehicle central control end, wherein the vehicle central control end comprises:
the connection module is used for receiving a wireless connection request containing a unique identifier sent by terminal equipment and establishing wireless connection with the terminal equipment according to the unique identifier;
the receiving module is used for receiving a vehicle unlocking instruction sent by the terminal equipment, wherein the vehicle unlocking instruction comprises an unlocking ciphertext obtained after the terminal equipment is encrypted by a first secret key, and the first secret key is a key generated according to an RSA algorithm;
the decryption module is used for decrypting the unlocking ciphertext by using a first public key generated according to the RSA algorithm and acquiring the decrypted unlocking ciphertext;
the detection module is used for detecting whether the decrypted unlocking ciphertext accords with the unlocking condition or not according to a preset unlocking rule; the unlocking rule comprises a preset unlocking time length and a preset unlocking ciphertext, and the unlocking ciphertext comprises unlocking ciphertext content and a timestamp corresponding to the time point when the terminal equipment generates the unlocking ciphertext;
the unlocking module is used for unlocking the vehicle when the unlocking ciphertext accords with the unlocking condition;
wherein the detection module comprises:
the ciphertext comparison unit is used for detecting whether the unlocking ciphertext content is consistent with the unlocking ciphertext or not;
the time obtaining unit is used for obtaining the time point of the terminal equipment for generating the unlocking ciphertext according to the timestamp when the unlocking ciphertext content is consistent with the unlocking ciphertext;
and the time comparison unit is used for detecting whether the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length or not, and when the time length between the time point of generating the unlocking ciphertext and the time point of receiving the unlocking ciphertext is less than the unlocking time length, confirming that the unlocking ciphertext accords with the unlocking condition.
6. A vehicle unlocking apparatus comprising a terminal device and a vehicle center control terminal according to claim 5, wherein the terminal device comprises:
the first sending module is used for sending the wireless connection request containing the unique identifier to the vehicle central control end and establishing wireless connection with the vehicle central control end through the unique identifier;
the acquisition module is used for acquiring a first secret key and an unlocking ciphertext and encrypting the unlocking ciphertext through the first secret key;
and the second sending module is used for sending the vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control end, so that the vehicle central control end can unlock the vehicle when the unlocking ciphertext accords with the unlocking condition after decrypting the encrypted unlocking ciphertext by using the first public key.
7. Computer arrangement comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor realizes the steps of the vehicle unlocking method according to any of claims 1 to 4 when executing the computer program.
8. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method for unlocking a vehicle according to any one of claims 1 to 4.
CN201910429513.7A 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium Active CN110310392B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910429513.7A CN110310392B (en) 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium
PCT/CN2019/101897 WO2020232854A1 (en) 2019-05-22 2019-08-22 Vehicle unlocking method and apparatus, and computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910429513.7A CN110310392B (en) 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110310392A CN110310392A (en) 2019-10-08
CN110310392B true CN110310392B (en) 2021-07-16

Family

ID=68075250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910429513.7A Active CN110310392B (en) 2019-05-22 2019-05-22 Vehicle unlocking method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN110310392B (en)
WO (1) WO2020232854A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177699B (en) * 2019-12-23 2022-07-08 恒大恒驰新能源汽车科技(广东)有限公司 Data extraction method, secret key generation method, unlocking method and device
CN114999029A (en) * 2020-04-01 2022-09-02 支付宝(杭州)信息技术有限公司 Vehicle unlocking method and system
CN111923863B (en) * 2020-08-25 2021-09-17 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN113783687B (en) * 2021-09-07 2023-08-29 浙江吉利控股集团有限公司 Method and system for generating, encrypting and decrypting automobile electronic anti-theft code
CN115050140A (en) * 2022-06-08 2022-09-13 杭州野乐科技有限公司 Unlocking method, device and equipment of shared bicycle and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631299A (en) * 2015-12-29 2016-06-01 惠州Tcl移动通信有限公司 Intelligent unlocking method and system of mobile terminal
CN106559378A (en) * 2015-09-24 2017-04-05 联芯科技有限公司 Automobile door lock tripper, system and method and intelligent terminal
CN108092958A (en) * 2017-12-05 2018-05-29 成都市共维科技有限公司 Information authentication method, device, computer equipment and storage medium
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592340B (en) * 2012-02-29 2017-09-12 深圳市赛格导航科技股份有限公司 A kind of engineering truck emergency release method and system
US9218700B2 (en) * 2012-12-14 2015-12-22 GM Global Technology Operations LLC Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs
GB2522217A (en) * 2014-01-16 2015-07-22 Parcelhome Ltd Electronic lock apparatus, method and system
CN105894633B (en) * 2016-04-21 2018-05-08 上海众人网络安全技术有限公司 A kind of method of access control system and access control system unlock
US11285915B2 (en) * 2017-08-09 2022-03-29 M2MD Technologies, Inc. Method and system for using a wireless mobile device as a smart key
CN109389710A (en) * 2018-08-24 2019-02-26 黄瀚思 Intelligent door lock system based on RSA Algorithm Yu BLE low-power consumption bluetooth

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559378A (en) * 2015-09-24 2017-04-05 联芯科技有限公司 Automobile door lock tripper, system and method and intelligent terminal
CN105631299A (en) * 2015-12-29 2016-06-01 惠州Tcl移动通信有限公司 Intelligent unlocking method and system of mobile terminal
CN108092958A (en) * 2017-12-05 2018-05-29 成都市共维科技有限公司 Information authentication method, device, computer equipment and storage medium
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device

Also Published As

Publication number Publication date
CN110310392A (en) 2019-10-08
WO2020232854A1 (en) 2020-11-26

Similar Documents

Publication Publication Date Title
CN110310392B (en) Vehicle unlocking method and device, computer equipment and storage medium
US20210350013A1 (en) Security systems and methods for continuous authorized access to restricted access locations
US10826882B2 (en) Network-based key distribution system, method, and apparatus
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
CN109361669B (en) Identity authentication method, device and equipment of communication equipment
EP2893484B1 (en) Method and system for verifying an access request
US10432600B2 (en) Network-based key distribution system, method, and apparatus
WO2020215568A1 (en) Communication number changing method, apparatus and system, computer device and storage medium
CN105978917A (en) System and method for trusted application security authentication
CN113691502B (en) Communication method, device, gateway server, client and storage medium
WO2017202025A1 (en) Terminal file encryption method, terminal file decryption method, and terminal
CN112425114A (en) Password manager protected by public-private key pair
EP3206329B1 (en) Security check method, device, terminal and server
CN108319857B (en) Trusted application locking and unlocking method and system
CN113472793A (en) Personal data protection system based on hardware password equipment
CN112559993A (en) Identity authentication method, device and system and electronic equipment
US10389529B2 (en) Entropy-based authentication of mobile financial transaction
CN114444134A (en) Data use authorization method, system and device
CN112669104A (en) Data processing method of rental equipment
CN107437996B (en) Identity authentication method, device and terminal
CN113792345A (en) Data access control method and device
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
CN110971610A (en) Control system identity verification method and device, computer equipment and storage medium
CN111586024B (en) Authentication method, authentication equipment and storage medium
CN113987445A (en) User login method and device of USB-KEY, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant