CN110363894A - A kind of number key awakening method, wakeup unit and a kind of permission terminal - Google Patents
A kind of number key awakening method, wakeup unit and a kind of permission terminal Download PDFInfo
- Publication number
- CN110363894A CN110363894A CN201910645684.3A CN201910645684A CN110363894A CN 110363894 A CN110363894 A CN 110363894A CN 201910645684 A CN201910645684 A CN 201910645684A CN 110363894 A CN110363894 A CN 110363894A
- Authority
- CN
- China
- Prior art keywords
- lock end
- digital key
- identification information
- key software
- unique identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Abstract
The invention discloses a kind of digital key awakening method, wakeup unit and a kind of permission terminals, are monitored this method comprises: treating solution lock end, after receiving the broadcast packet wait solve lock end transmission, obtain the unique identification information of lock end to be solved in broadcast packet;If the unique identification information of lock end to be solved matches with pre-stored target identification information, the wake operation to digital key software is executed, so that digital key software enters working condition, and the digital key software of application is treated solution lock end and is unlocked.In this way, even if digital key software in a dormant state, can also realize the unlock for treating solution lock end, to improve user experience by waking up digital key software.
Description
Technical field
The present invention relates to internet of things field more particularly to a kind of digital key awakening methods, wakeup unit and a kind of permission
Terminal.
Background technique
In recent years, PEPS (full name in English: Passive Entry Passive Start, Chinese name: keyless entry
And starting) system has been widely used.Wherein, PEPS system refers to, when Intelligent key and lock end to be solved (such as vehicle
, intelligent door lock etc.) when meeting pre-determined distance, lock end to be solved can automatic unlocking.For example, working as Intelligent key from vehicle less than 2 meters
When, vehicle can automatic unlocking.
Currently, Intelligent key can be car key, door keys, but with the development of Internet of Things, Intelligent key can be with
For the digital key in permission terminal is arranged in, user is without still further carrying cart key and door keys.For example, above and below mobile phone
The permission of the number key software is arranged in the software of the digital key of load, when the distance between mobile phone and lock end to be solved meet in advance
If apart from when, lock end automatic unlocking to be solved.
But if the digital key software unlock of application, needs to keep the digital key software in permission terminal to be in operation
State, otherwise, even if the distance between permission terminal and lock end to be solved meet the requirement of pre-determined distance, lock end to be solved will not be by
Automatic unlocking.But in practical application, after user may forget to open digital key software, or digital key software is opened,
Due to being not used by for a long time, also (state i.e. out of service) can be cleared up by backstage, can not be played so as to cause PEPS system
Effect, influences the experience of user.
Summary of the invention
In view of this, the embodiment of the invention discloses a kind of digital key awakening method, wakeup unit and a kind of permission are whole
End, solve in the prior art, digital key software in a dormant state when, cannot achieve the function of PEPS system, cause
The problem of poor user experience.
The embodiment of the invention discloses a kind of digital key awakening method, the method is applied to permission terminal, comprising:
After receiving the broadcast packet wait solve lock end transmission, the unique identification of lock end to be solved described in the broadcast packet is obtained
Information;
If the unique identification information of the lock end to be solved matches with pre-stored target identification information, execute to number
The wake operation of key software is unlocked with waking up digital key software and treating solution lock end.
Optionally, further includes:
After having waken up digital key software, the target identification information of successful match is removed.
Optionally, further includes:
When receiving digital key software with after solving the notification message that lock end disconnects, the unique of lock end to be solved is obtained
Identification information;
The unique identification information of the lock end to be solved is stored as target identification information.
Optionally, the unique identification information of the lock end to be solved includes:
The unique identification information of the lock end to be solved of digital key software last time connection;
Or
The unique identification information at least one lock end to be solved that digital key software is sent.
Optionally, the unique identification information of the lock end to be solved described in determining matches with pre-stored target identification information
Later, before executing to the wake operation of digital key software, the method also includes:
Judge whether the digital key software is currently in the open state;
If the number key software is not in open state, enters the wake-up executed to digital key software and grasp
The step of making.
Optionally, after determining that the digital key software is not in open state, in the execution to digital key
Before the wake operation of software, the method also includes:
Judge whether the distance between the permission terminal and lock end to be solved meet default unlock distance;
If the step of meeting default unlock distance, entering the wake operation executed to digital key software.
The embodiment of the invention also discloses a kind of wakeup unit, the wakeup unit is applied to permission terminal, comprising:
First obtains module, for obtaining described in the broadcast packet after receiving the broadcast packet wait solve lock end transmission
The unique identification information of lock end to be solved;
Execution module is waken up, if unique identification information and pre-stored target identification information for the lock end to be solved
Match, executes the wake operation to digital key software.
Optionally, further includes:
Second acquisition unit, for obtaining when receiving digital key software with after solving the notification message that lock end disconnects
Take the unique identification information of lock end to be solved;
Storage unit, for the unique identification information of the lock end to be solved to be stored as target identification information.
The embodiment of the invention also discloses a kind of permission terminal, the permission terminal include: digital key software and on
State disclosed wakeup unit.
Optionally, the wakeup unit exists in the form of foreground service Foreground Service.
It in the present embodiment, treats solution lock end and is monitored, after receiving the broadcast packet wait solve lock end transmission, described in acquisition
The unique identification information of lock end to be solved described in broadcast packet;If the unique identification information of the lock end to be solved and pre-stored mesh
Mark identification information matches, and executes the wake operation to digital key software, so that waking up digital key software, and application number
Key software is treated solution lock end and is unlocked.In this way, even if digital key software in a dormant state, can also pass through wake-up number
Word key software realizes the unlock for treating solution lock end, improves user experience.
Further, the wakeup unit being arranged at the terminal exists in the form of foreground service ForegroundService, into
Journey rank is higher, and the system resource occupied is less, is not easy to be cleaned up from the background, wakeup unit is allowed to be constantly in work
State.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 shows a kind of flow diagram of digital key awakening method provided in an embodiment of the present invention;
Fig. 2 shows a kind of schematic diagram of a scenario;
Fig. 3 shows a kind of another flow diagram of digital key awakening method provided in an embodiment of the present invention;
Fig. 4 shows a kind of structural schematic diagram of wakeup unit provided in an embodiment of the present invention;
Fig. 5 shows a kind of structural schematic diagram of permission terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment one
With reference to Fig. 1, a kind of flow diagram of digital key awakening method provided in an embodiment of the present invention is shown, at this
In embodiment, this method comprises:
S101: after receiving the broadcast packet wait solve lock end transmission, lock end to be solved described in the broadcast packet is obtained only
One identification information;
In the present embodiment, as shown in Fig. 2, being provided in permission terminal, digital key software and wakeup unit are actually being answered
In, digital key software and wakeup unit is independent is arranged in permission terminal or wakeup unit can integrate in number
In key software.Wherein, if wakeup unit is integrated in digital key software, user is when installing digital key software, just
It synchronizes and is mounted with the wakeup unit, do not need again additional downloads installation wakeup unit.It is to be noted, however, that even if will call out
Awake unit is integrated in digital key software, and the two only has integrated relationship physically, is still mutually indepedent at runtime
Two individuals.
Wherein, digital key software include: digital key software APP and digital key software SDK (full name in English:
Software Development Kit, Chinese name: software development kit).Wherein, digital key APP is used to interact with user,
The instruction that user sends is received, SDK is used to execute the instruction of user's transmission, such as SDK executes the operation for unlocking lock end to be solved.
Furthermore, it is desirable to be appreciated that, the APP of a digital key software can be corresponding with multiple digital key SDK (English
Full name: Software Development Kit, Chinese name: software development kit), each SDK is packaged with different functions.
In the present embodiment, lock end to be solved constantly is sent out the broadcast packet comprising identity identification information, when wakeup unit with
When meeting certain condition wait solve the distance between lock end, wakeup unit can receive the broadcast packet that lock end to be solved is sent, when connecing
After receiving the broadcast packet wait solve lock end transmission, the unique identification information of lock end to be solved is parsed from broadcast packet.
For example: the communication module (such as bluetooth module) of vehicle can constantly be sent out broadcast packet, wake up
When unit is in running order, wakeup unit can monitor a certain range of broadcast packet, send when receiving vehicle communication module
Broadcast packet after, parse the broadcast packet, obtain the unique identification information of vehicle.Wherein, the unique identification information of lock end to be solved is
For uniquely indicating the mark of the lock end to be solved.In practical applications, which can be the communication module of vehicle
Identification information, such as the identification information of bluetooth module.
S102: it if the unique identification information of the lock end to be solved matches with pre-stored target identification information, executes
To the wake operation of digital key software.
In the present embodiment, wakeup unit needs first to store target identification information, wherein target identification before executing S102
Information is the unique identification information of lock end to be solved, which can obtain in the following manner: can be user and pass through
Digital key APP is sent to wakeup unit, is also possible to SDK according to dependent instruction and is sent to wakeup unit, or can also
To be that target identification information is sent to key software APP by SDK, target identification information is sent to wake-up again by key software APP
Unit.
Furthermore, it is desirable to illustrate, pre-stored target identification information includes that at least one waits unlocking in wakeup unit
The unique identification information at end.
After wakeup unit receives the unique identification information wait solve lock end, by unique mark information of lock end to be solved and in advance
The target identification information of storage matches, if successful match, i.e., includes the unique identification letter of the lock end to be solved in wakeup unit
Breath then executes the wake operation to digital key software.
Wherein, execute may include a variety of implementations to the wake operation of digital key software, such as may include as
Under four kinds of implementations:
Mode one matches when unique identification information and the pre-stored target identification information of the lock end to be solved, to
Digital key software sends wake up instruction.
It is understood that wakeup unit is judging unique identification information and pre-stored target to unlocking unit
When identification information matches, wake operation directly is sent to digital key software, without detecting the current shape of digital key software
Whether state, and digital key software meet unlocking condition.
After digital key receives wake up instruction, digital key software judges whether to need to wake up.For example, if digital key
For spoon when receiving wake up instruction, digital key software is in running order, then digital key software can ignore wakeup unit
The wake up instruction of transmission.If digital key is when receiving wake up instruction, digital key software in a dormant state, then wakes up number
Word key software.
In this way, wakeup unit is easy to operate, there is no complicated logical operations, will not occupy excessive system money
Source.
Mode two,
When the unique identification information of the lock end to be solved matches with pre-stored target identification information, digital key is judged
Whether spoon software is in the open state;
If the number key software is in non-open state, wake up instruction is sent to digital key software.
In the present embodiment, when digital key software is in the open state, if wakeup unit is sent to digital key software
Wake up instruction, then the instruction is illegal command, therefore, before sending wake up instruction to numerical software, can first judge number
Whether key software is in the open state, if it is in the open state, then ignores this matching result, not to digital key software
Send wake up instruction;If detecting, digital key software is in non-open state, that is, is in close state, then soft to digital key
Part sends wake up instruction.
Mode three,
When the unique identification information of the lock end to be solved matches with pre-stored target identification information, digital key is judged
Whether spoon software is in the open state;
If the number key software is in non-open state, judge whether permission terminal meets at a distance from lock end with wait solve
Default unlock distance;
If meeting default unlock distance, wake up instruction is sent to digital key software.
In the present embodiment, before sending wake up instruction to digital key software, not only allowing for numerical software key is
It is no in the open state, it is also considered that whether digital key software currently meets unlocking condition, is in and opens in digital key software
It opens state, and when digital key software meets unlocking condition, sends wake up instruction to digital key software, improve instruction and send
Validity.Moreover, avoiding Lost wake-up, that is, after having waken up digital key software, it is unsatisfactory for unlock distance, without executing solution
Lock operation, in this way, the power consumption of permission terminal can be reduced.
Mode four,
Permission end is judged when the unique identification information of the lock end to be solved and pre-stored target identification information match
Whether end meets default unlock distance with wait solve at a distance from lock end;
If meeting default unlock distance, wake up instruction is sent to digital key software.
In the present embodiment, before sending wake up instruction to digital key software, it is contemplated that digital key software is currently
No to meet unlocking condition, i.e. whether permission terminal meets preset unlock distance with wait solve at a distance from lock end, permission terminal with
Distance wait solve lock end be less than or equal to preset unlock apart from when, i.e., when digital key software meets unlocking condition, to number
Word key software sends wake up instruction, improves the validity that instruction is sent.Moreover, avoiding Lost wake-up, that is, number is waken up
After word key software, it is unsatisfactory for unlock distance, without executing unlock operation, in this way, the power consumption of permission terminal can be reduced.
Further, in order to reduce the resource that wakeup unit occupies, after having waken up digital key, wakeup unit removing
With successful target identification information.
In the present embodiment, wakeup unit is set in permission terminal, wake-up is treated solution lock end and is monitored, when receive to
After solving the broadcast packet that lock end is sent, the unique identification information of lock end to be solved described in the broadcast packet is obtained;If described wait unlock
The unique identification information at end matches with pre-stored target identification information, executes the wake operation to digital key software,
So that waking up digital key software, and the digital key software of application is treated solution lock end and is unlocked.In this way, even if at digital key
It also may be implemented to treat solution in permission terminal with after solving and meeting default unlock distance at a distance between lock end in dormant state
The unlock of lock end, improves user experience.
Embodiment two,
With reference to Fig. 3, a kind of another flow diagram of digital key awakening method provided in an embodiment of the present invention is shown,
In the present embodiment, this method comprises:
S201: it when receiving digital key software with after solving the notification message that lock end disconnects, obtains to be monitored wait unlock
The unique identification information at end;
Wherein, the source of the unique identification information of lock end to be solved can there are many, such as may include:
The unique identification information of the lock end to be solved of digital key software last time connection;
Or
The unique identification information at least one lock end to be solved that digital key software is sent;At least one described lock end to be solved
Unique identification information be that user passes through digital key software setting.
Wherein, when treating solution lock end by digital key software and being unlocked, digital key software can be with lock end to be solved
Connection, by above-mentioned introduction it is found that digital key software includes: the APP and digital key software of digital key software
SDK, specifically, when treating solution lock end by digital key software and being unlocked, be digital key software SDK with wait unlock
End connection.
So, the unique identification information of the lock end to be solved of the connection of digital key software last time of above-mentioned introduction, specifically
It can be the unique identification information for the lock end to be solved that the SDK last time connects.
In the case where target identification information is the unique identification information of the lock end to be solved once connected on SDK, wake up single
Member can obtain the unique identification information of lock end to be solved by following two ways:
Mode one, wakeup unit can obtain the unique identification information of lock end to be solved from digital key APP;
Wherein, the information in the APP of digital key software can be user's input, and digital key can also be sent to SDK
Spoon software APP's.Then, then by the APP of digital key software it is sent to wakeup unit.
Mode two, the unique identification information that lock end to be solved directly is obtained from from SDK:
Specifically, sending and obtaining to SDK when the SDK for receiving digital key is with after solving the notification message that lock end disconnects
The unique identification information of lock end to be solved to be monitored, and receive the unique mark for the lock end to be solved that the SDK last time that SDK is sent connects
Know information;
Or
After SDK wait solve lock end end with disconnecting, SDK sends the notification message disconnected to digital key, and
The lock end to be solved that the unique identification information for the lock end to be solved for needing to monitor to wakeup unit transmission, i.e. SDK last time connect is only
One identification information.
It is at least one lock end to be solved that digital key software is sent in the target identification information of lock end to be solved to be monitored
Unique identification information in the case where, the unique identification information of at least one lock end to be solved can be digital key software
APP is sent to wakeup unit, specifically includes:
After the SDK of digital key software wait solve lock end with disconnecting, user passes through the APP selection of digital key software
The unique identification information at least one lock end to be solved that wakeup unit needs to monitor;
The APP of digital key software sends the unique identification letter for the lock end to be solved that at least one needs monitors to wakeup unit
Breath.
Alternatively, user can first pass through in advance digital key software APP setting wakeup unit need to monitor next time to
The unique identification information of a few lock end to be solved.
S202: the unique identification information of the lock end to be solved is stored as target identification information;
S203: after receiving the broadcast packet wait solve lock end transmission, lock end to be solved described in the broadcast packet is obtained only
One identification information;
In the present embodiment, S203 is consistent with above-mentioned S101, repeats no more in the present embodiment.
S204: it when unique identification information and the pre-stored target identification information of the lock end to be solved match, executes
To the wake operation of digital key software.
In the present embodiment, S204 is consistent with above-mentioned S102, repeats no more in the present embodiment.
In the present embodiment, by above-mentioned introduction it is found that the condition of triggering wakeup unit work can be, digital key
SDK is disconnected with lock end to be solved.It however, it can be user's actively triggering starting, and after user's starting, wakeup unit one
It is straight in running order, until user closes.
In addition to this, after wakeup unit has sent wake up instruction to digital key software, wakeup unit can remove it
The target identification information of preceding successful match, in the case where wakeup unit is not stored target identification information, wakeup unit can be with
Solution lock end is not treated to be monitored.The memory source for reducing wakeup unit occupancy in this way, avoids and is cleared up from the background.
In the present embodiment, when wakeup unit is in running order, treats solution lock end and be monitored, monitoring wait unlock
After the unique identification information at end, if the unique identification information of the lock end to be solved and pre-stored target identification information phase
Match, execute the wake operation to digital key software, so that waking up digital key software, and the digital key software of application treats solution
Lock end is unlocked.Also, after having sent wake up instruction to digital key software, wakeup unit can be removed pre-stored
Target identification information, and stop treating the monitoring of solution lock end.In such manner, it is possible to digital key software in a dormant state when, lead to
The digital key software of wake-up is crossed, the unlock for treating solution lock end is realized, improves user experience.Also, due to wakeup unit can to
It is purged with successful target identification information, reduces the memory source of occupancy, so that wakeup unit is not easy by operating system
It cleans up.
Based on the above embodiments 1 and embodiment 2, it should be noted that wakeup unit and permission terminal in this programme
Operating system synchronous operation, as long as permission terminal is in open state, wakeup unit also can be in running order.
Further, lock end to be solved disclosed above, which can be understood as all, can access Internet of Things and using permission end
Hold the equipment, such as smart lock, vehicle etc. of control.
With reference to Fig. 4, a kind of structural schematic diagram of wakeup unit provided in an embodiment of the present invention is shown, in the present embodiment
In, which includes:
First obtains module 301, for obtaining institute in the broadcast packet after receiving the broadcast packet wait solve lock end transmission
State the unique identification information of lock end to be solved;
Execution module 302 is waken up, if unique identification information and pre-stored target identification for the lock end to be solved
Information matches, and executes the wake operation to digital key software.
Optionally, the wakeup unit further includes removing module, which is used for: having waken up, digital key is soft
After part, the target identification information of successful match before removing.
Optionally, the wakeup unit further include:
Second acquisition unit, for obtaining when receiving digital key software with after solving the notification message that lock end disconnects
Take the unique identification information of lock end to be solved;
Storage unit, for the unique identification information of the lock end to be solved to be stored as target identification information.
Optionally, the unique identification information of the lock end to be solved to be monitored includes:
The unique identification information of the lock end to be solved of digital key software last time connection;
Or
The unique identification information at least one lock end to be solved that digital key software is sent;
Optionally, the wakeup unit is in the unique identification information and pre-stored target mark for determining the lock end to be solved
After knowledge information matches, before executing to the wake operation of digital key software, it is also used to:
Judge whether the digital key software is currently in the open state;
If the number key software is not in open state, enters the wake-up executed to digital key software and grasp
The step of making.
Optionally, the wakeup unit is after determining that the digital key software is not in open state, described
Before executing to the wake operation of digital key software, it is also used to:
Judge whether the distance between the permission terminal and lock end to be solved meet default unlock distance;
If the step of meeting default unlock distance, entering the wake operation executed to digital key software.
Device through this embodiment is treated solution lock end and is monitored, after receiving the broadcast packet wait solve lock end transmission,
Obtain the unique identification information of lock end to be solved described in the broadcast packet;If the unique identification information of the lock end to be solved and in advance
The target identification information of storage matches, and executes the wake operation to digital key software, so that digital key software is waken up, and
Solution lock end is treated using digital key software to be unlocked.In this way, even if digital key in a dormant state, passes through wakeup unit
Digital key software is waken up, the unlock for treating solution lock end also may be implemented, improve user experience.
With reference to Fig. 5, a kind of structural schematic diagram of permission terminal provided in an embodiment of the present invention is shown, in the present embodiment
In, which includes:
Digital key software 401 and wakeup unit 402;
The number key software 401 is used to interact with wakeup unit, and it is to be monitored to send at least one to wakeup unit
The unique identification information of lock end to be solved;
The wakeup unit 402, for executing following method:
After receiving the broadcast packet wait solve lock end transmission, the unique identification of lock end to be solved described in the broadcast packet is obtained
Information;
If the unique identification information of the lock end to be solved matches with pre-stored target identification information, execute to number
The wake operation of key software is unlocked with waking up digital key software and treating solution lock end.
Optionally, further includes:
After having waken up digital key software, the target identification information of successful match is removed.
Optionally, further includes:
When receiving digital key software with after solving the notification message that lock end disconnects, the unique of lock end to be solved is obtained
Identification information;
The unique identification information of the lock end to be solved is stored as target identification information.
Optionally, the unique identification information of the lock end to be solved includes:
The unique identification information of the lock end to be solved of digital key software last time connection;
Or
The unique identification information at least one lock end to be solved that digital key software is sent.
Optionally, the unique identification information of the lock end to be solved described in determining matches with pre-stored target identification information
Later, before executing to the wake operation of digital key software, the method also includes:
Judge whether the digital key software is currently in the open state;
If the number key software is not in open state, enters the wake-up executed to digital key software and grasp
The step of making.
Optionally, after determining that the digital key software is not in open state, in the execution to digital key
Before the wake operation of software, the method also includes:
Judge whether the distance between the permission terminal and lock end to be solved meet default unlock distance;
If the step of meeting default unlock distance, entering the wake operation executed to digital key software.
Further, the wakeup unit exists in the form of foreground service ForegroundService.
Wherein, Service, which is one, can execute long-play operation without providing the application of user interface on backstage
Component.Service can be started by other application component, and even if user is switched to other application, service will be on backstage after reforwarding
Row.In addition, component can be tied to service, to interact therewith, (IPC) is communicated even between executive process.For example, service
It can handle web transactions, play music, execute and file I/O or interacted with contents providing program, and all these can be
Backstage carries out.
Wakeup unit exists in the form of foreground service ForegroundService, is a minimum operating component, has and disappear
Cost source small (memory consumption is low, power consumption is small), is not easy to exit at long operational time, it is not easy to the features such as being recovered in the system, this
Sample allows wakeup unit to be constantly in working condition, and electron key software can be waken up at any time by having ensured.
Permission terminal described in this example can be the intelligent terminals such as smart phone, intelligent wearable device.Lock end to be solved can
Think the equipment that vehicle, intelligent door lock etc. can be controlled by intelligent terminal.
Permission terminal through this embodiment is treated solution lock end and is monitored, when the broadcast packet for receiving lock end transmission to be solved
Afterwards, the unique identification information of lock end to be solved described in the broadcast packet is obtained;If the unique identification information of the lock end to be solved with
Pre-stored target identification information matches, and executes the wake operation to digital key software, so that it is soft to wake up digital key
Part, and the digital key software of application is treated solution lock end and is unlocked.In this way, even if digital key in a dormant state, can also
To realize that treating solution lock end is unlocked, and improves user experience.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of number key awakening method, which is characterized in that the method is applied to permission terminal, comprising:
After receiving the broadcast packet wait solve lock end transmission, the unique identification letter of lock end to be solved described in the broadcast packet is obtained
Breath;
If the unique identification information of the lock end to be solved matches with pre-stored target identification information, execute to digital key
The wake operation of software is unlocked with waking up digital key software and treating solution lock end.
2. the method according to claim 1, wherein further include:
After having waken up digital key software, the target identification information of successful match is removed.
3. method according to claim 1 or 2, which is characterized in that further include:
When receiving digital key software with after solving the notification message that lock end disconnects, the unique identification of lock end to be solved is obtained
Information;
The unique identification information of the lock end to be solved is stored as target identification information.
4. according to the method described in claim 3, it is characterized in that, the unique identification information of the lock end to be solved includes:
The unique identification information of the lock end to be solved of digital key software last time connection;
Or
The unique identification information at least one lock end to be solved that digital key software is sent.
5. the method according to claim 1, wherein in the unique identification information for determining the lock end to be solved and in advance
After the target identification information first stored matches, before executing to the wake operation of digital key software, the method is also
Include:
Judge whether the digital key software is currently in the open state;
If the number key software is not in open state, enter described execute to the wake operation of digital key software
Step.
6. according to the method described in claim 5, it is characterized in that, being not in open state in the judgement digital key software
Later, before the execution is to the wake operation of digital key software, the method also includes:
Judge whether the distance between the permission terminal and lock end to be solved meet default unlock distance;
If the step of meeting default unlock distance, entering the wake operation executed to digital key software.
7. a kind of wakeup unit, which is characterized in that the wakeup unit is applied to permission terminal, comprising:
First obtains module, for obtaining described in the broadcast packet wait solve after receiving the broadcast packet wait solve lock end transmission
The unique identification information of lock end;
Execution module is waken up, if unique identification information and pre-stored target identification information phase for the lock end to be solved
Match, executes the wake operation to digital key software.
8. wakeup unit according to claim 7, which is characterized in that further include:
Second acquisition unit, for when receive digital key software with after solving the notification message that lock end disconnects, obtain to
Solve the unique identification information of lock end;
Storage unit, for the unique identification information of the lock end to be solved to be stored as target identification information.
9. a kind of permission terminal, which is characterized in that single including digital key software and wake-up as claimed in claim 7 or 8
Member.
10. permission terminal according to claim 9, which is characterized in that the wakeup unit is serviced with foreground
Foreground Service form exists.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910645684.3A CN110363894A (en) | 2019-07-17 | 2019-07-17 | A kind of number key awakening method, wakeup unit and a kind of permission terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910645684.3A CN110363894A (en) | 2019-07-17 | 2019-07-17 | A kind of number key awakening method, wakeup unit and a kind of permission terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110363894A true CN110363894A (en) | 2019-10-22 |
Family
ID=68220853
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910645684.3A Pending CN110363894A (en) | 2019-07-17 | 2019-07-17 | A kind of number key awakening method, wakeup unit and a kind of permission terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110363894A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114202837A (en) * | 2021-12-07 | 2022-03-18 | 中信银行股份有限公司 | Method and device for realizing access control management based on Bluetooth technology |
CN114898483A (en) * | 2022-04-27 | 2022-08-12 | 北京汽车研究总院有限公司 | Vehicle unlocking method, device, equipment and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106127890A (en) * | 2016-06-17 | 2016-11-16 | 北京千丁互联科技有限公司 | Control of bluetooth access equipment, Bluetooth terminal, control of bluetooth access management system and method |
CN106652124A (en) * | 2016-11-08 | 2017-05-10 | 云蜂汽车有限公司 | Vehicle door control method and cloud service platform |
KR20170100722A (en) * | 2016-02-26 | 2017-09-05 | 주식회사 서연전자 | Smartkey System having a function to recognition sounds of users |
CN107231679A (en) * | 2017-06-20 | 2017-10-03 | 维沃移动通信有限公司 | A kind of data package processing method and mobile terminal |
CN107564193A (en) * | 2017-09-21 | 2018-01-09 | 广州明希网络科技有限公司 | Shared bicycle parking management system and method based on internet of things |
CN107622547A (en) * | 2017-09-13 | 2018-01-23 | 广州咩也科技有限公司 | Method, apparatus, storage medium and the computer equipment that terminal is unlocked |
CN109040023A (en) * | 2018-07-05 | 2018-12-18 | 无锡天脉聚源传媒科技有限公司 | Safe verification method, system and device based on WebSocket |
-
2019
- 2019-07-17 CN CN201910645684.3A patent/CN110363894A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170100722A (en) * | 2016-02-26 | 2017-09-05 | 주식회사 서연전자 | Smartkey System having a function to recognition sounds of users |
CN106127890A (en) * | 2016-06-17 | 2016-11-16 | 北京千丁互联科技有限公司 | Control of bluetooth access equipment, Bluetooth terminal, control of bluetooth access management system and method |
CN106652124A (en) * | 2016-11-08 | 2017-05-10 | 云蜂汽车有限公司 | Vehicle door control method and cloud service platform |
CN107231679A (en) * | 2017-06-20 | 2017-10-03 | 维沃移动通信有限公司 | A kind of data package processing method and mobile terminal |
CN107622547A (en) * | 2017-09-13 | 2018-01-23 | 广州咩也科技有限公司 | Method, apparatus, storage medium and the computer equipment that terminal is unlocked |
CN107564193A (en) * | 2017-09-21 | 2018-01-09 | 广州明希网络科技有限公司 | Shared bicycle parking management system and method based on internet of things |
CN109040023A (en) * | 2018-07-05 | 2018-12-18 | 无锡天脉聚源传媒科技有限公司 | Safe verification method, system and device based on WebSocket |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114202837A (en) * | 2021-12-07 | 2022-03-18 | 中信银行股份有限公司 | Method and device for realizing access control management based on Bluetooth technology |
CN114202837B (en) * | 2021-12-07 | 2023-11-28 | 中信银行股份有限公司 | Method and device for realizing access control management based on Bluetooth technology |
CN114898483A (en) * | 2022-04-27 | 2022-08-12 | 北京汽车研究总院有限公司 | Vehicle unlocking method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101393539B1 (en) | Integrated network system for vehicle | |
CN107465588B (en) | State control method and device of multi-channel bus network and network management system | |
EP2784249B1 (en) | Mobile device | |
CN104932657B (en) | Electricity saving of mobile terminal model-based optimization, distribute information generating method and device rationally | |
CN109918141B (en) | Thread execution method, thread execution device, terminal and storage medium | |
CN104875716A (en) | Method for automatically controlling safety lock and smart terminal | |
CN103226491B (en) | A kind of method and device that Application Status are set | |
CN105824659A (en) | Application program updating method and terminal equipment | |
CN108933719A (en) | Vehicle-mounted CAN network management, vehicle-mounted CAN network, vehicle | |
CN105959462B (en) | Extremely the control method and system started | |
CN106060909A (en) | Network access method and mobile terminal | |
DE102014204512A1 (en) | METHOD AND DEVICE FOR A WARNING STRATEGY BETWEEN MODULES | |
CN110363894A (en) | A kind of number key awakening method, wakeup unit and a kind of permission terminal | |
CN106648849A (en) | Process freezing method and mobile terminal | |
CN110005266A (en) | Control method, device and its relevant device of intelligent door lock | |
CN104683573B (en) | The implementation method of shutdown alarm clock and mobile terminal | |
CN102932757A (en) | Heartbeat message sending method of mobile terminal, mobile terminal and information pushing system | |
CN106095064B (en) | A kind of mobile terminal forbids applying the method and system of the specific broadcast of reception | |
CN102957540A (en) | System and method for detecting presence of one or more user identification device | |
CN105530377A (en) | Method, device and system for processing wake-up lock | |
CN105425931B (en) | A kind of battery capacity management method, device and intelligent terminal | |
CN105656894A (en) | Main control intelligent terminal, controlled intelligent terminal and monitoring method | |
CN111086502A (en) | Control method and device of electronic parking brake system and vehicle | |
CN108986809A (en) | A kind of portable device and its awakening method and device | |
CN106020426B (en) | A kind of method for releasing and device waking up lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 201203 building 34, No. 1387, Zhangdong Road, Pudong New Area, Shanghai Applicant after: INGEEK INFORMATION SECURITY CONSULTING ASSOCIATES Co.,Ltd. Address before: 200233 room 407, Chengda Creative Park, No. 402, Guilin road, Xuhui District, Shanghai Applicant before: INGEEK INFORMATION SECURITY CONSULTING ASSOCIATES Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191022 |