CN110406498A - A kind of control method for vehicle and device - Google Patents
A kind of control method for vehicle and device Download PDFInfo
- Publication number
- CN110406498A CN110406498A CN201910628589.2A CN201910628589A CN110406498A CN 110406498 A CN110406498 A CN 110406498A CN 201910628589 A CN201910628589 A CN 201910628589A CN 110406498 A CN110406498 A CN 110406498A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- fingerprint
- mobile terminal
- key
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
- B60R25/252—Fingerprint recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/101—Bluetooth
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/103—Near field communication [NFC]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/108—Encryption
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Mechanical Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application provides a kind of control method for vehicle and devices.The above method includes: to carry out key agreement with mobile terminal, obtains first key;It is decrypted using ciphertext of the first key to the device-fingerprint that above-mentioned mobile terminal is sent, obtains above equipment fingerprint;Above equipment fingerprint is compared with the device-fingerprint of storage;If comparing unanimously, vehicle control system is triggered.Implement the application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using the unaware authentication techniques after optimization, using near-field communication technology as medium, reaches and the targets such as the entrance of control vehicle, starting are authenticated by mobile terminal device, improve the safety of information transmission, ensured the privacy of car owner.
Description
Technical field
This application involves field of computer technology more particularly to a kind of control method for vehicle and device.
Background technique
As the improvement of people's living standards, automobile gradually comes into thousand ten thousand as a kind of important trip vehicles
Family.Increasingly pay attention to the convenient control to vehicle to obtain more comfortable experience, automobile vendor by bus.
Traditional keyless entry and activation system (passive entry passive start, PEPS) need user to take
Band automobile wireless key, it is especially inconvenient to go on a journey for car owner's summer.Emerging internet automobile connects remote service by mobile phone
Device is to realize control vehicle, but network transmission, there are greater risk, information is easily intercepted by hacker, and automobile vendor's server can
To collect owner information, car owner's privacy is invaded.
Summary of the invention
The application proposes a kind of control method for vehicle and device, mobile phone can be used to substitute orthodox car key, facilitate car owner
It is carried;Reach using near-field communication technology as medium using the unaware authentication techniques after optimization and pass through mobile terminal device
The targets such as the entrance of certification control vehicle, starting, improve the safety of information transmission, have ensured the privacy of car owner.
In a first aspect, the application proposes a kind of control method for vehicle, which comprises
Key agreement is carried out with mobile terminal, obtains first key;
It is decrypted using ciphertext of the first key to the device-fingerprint that the mobile terminal is sent, obtains described set
Standby fingerprint;
The device-fingerprint is compared with the device-fingerprint of storage;
If comparing unanimously, vehicle control system is triggered.
In one possible implementation, described to carry out key agreement with mobile terminal, before obtaining first key, also
Include:
The user password that the target terminal of decryption is sent is compared with the password of storage;
If comparing the ciphertext for unanimously receiving the device-fingerprint that the target terminal is sent.
In one possible implementation, the password of the target terminal by the decryption user password sent and storage
Before being compared, further includes:
Key agreement is carried out with target terminal, obtains the second key;
The ciphertext of the user password sent using target terminal described in second key pair is decrypted, and the use is obtained
Family password.
In one possible implementation, the triggering vehicle control system, comprising:
Detect the signal of the mobile terminal;
The signal of signal and setting based on the mobile terminal triggers threshold values, sends control instruction to the vehicle,
For the control instruction for controlling the vehicle, the control instruction includes car door opening instruction, vehicle launch instruction.
Second aspect, the application propose a kind of control method for vehicle, which comprises
The collecting device fingerprinting-instruction that vehicle is sent is received, the collecting device fingerprinting-instruction includes the vehicle of the vehicle
Identification number;
The vehicle identification number of the vehicle is compared with the vehicle identification number of storage;
If comparing unanimously, device-fingerprint is encrypted, the ciphertext of the device-fingerprint is obtained, the device-fingerprint is
The unique identifier of mobile terminal;
The ciphertext of the device-fingerprint is sent to the vehicle.
In one possible implementation, before the collecting device fingerprinting-instruction for receiving vehicle transmission, further includes:
Target vehicle is sent to after user password is encrypted;
If the user password and the password of target vehicle storage compare unanimously, verification successful information, institute are received
State the vehicle identification number that verification successful information includes the target vehicle.
The third aspect, the application propose a kind of controller of vehicle, comprising:
First negotiation element obtains first key for carrying out key agreement with mobile terminal;
First decryption unit, the ciphertext of the device-fingerprint for being sent using the first key to the mobile terminal into
Row decryption, obtains the device-fingerprint;
First comparing unit, for the device-fingerprint to be compared with the device-fingerprint of storage;
If control unit triggers vehicle control system consistent for comparing.
In one possible implementation, described device further include:
Second comparing unit, for the user password of the target terminal transmission of decryption to be compared with the password of storage;
Receiving unit receives the ciphertext for the device-fingerprint that the target terminal is sent if consistent for comparing.
In one possible implementation, described device further include:
Second negotiation element obtains the second key for carrying out key agreement with target terminal;
Second decryption unit, the ciphertext of the user password for being sent using target terminal described in second key pair into
Row decryption, obtains the user password.
In one possible implementation, described control unit is specifically used for detecting the signal of the mobile terminal;Base
Threshold values is triggered in the signal of the mobile terminal and the signal of setting, control instruction is sent to the vehicle, the control refers to
It enables for controlling the vehicle, the control instruction includes car door opening instruction, vehicle launch instruction.
Fourth aspect, the application propose a kind of controller of vehicle, comprising:
First receiving unit, for receiving the collecting device fingerprinting-instruction of vehicle transmission, the collecting device fingerprinting-instruction
Vehicle identification number including the vehicle;
Comparing unit, for the vehicle identification number of the vehicle to be compared with the vehicle identification number of storage;
If device-fingerprint is encrypted consistent for comparing, obtains the ciphertext of the device-fingerprint by encryption unit,
The device-fingerprint is the unique identifier of mobile terminal;
First transmission unit, for the ciphertext of the device-fingerprint to be sent to the vehicle.
In one possible implementation, described device further include:
Second transmission unit, for being sent to target vehicle after encrypting user password;
Second receiving unit connects if the password for the user password and target vehicle storage compares unanimously
Verification successful information is received, the verification successful information includes the vehicle identification number of the target vehicle.
5th aspect, the application propose a kind of controller of vehicle, comprising: transceiver, processor and memory;The receipts
Device, the processor and the memory is sent out to be connected with each other by bus;Wherein, the memory is for storing computer journey
Sequence, the computer program include program instruction, and the processor is configured for calling described program instruction, execute such as first
The method that aspect is proposed.
6th aspect, the application propose a kind of controller of vehicle, comprising: transceiver, processor and memory;The receipts
Device, the processor and the memory is sent out to be connected with each other by bus;Wherein, the memory is for storing computer journey
Sequence, the computer program include program instruction, and the processor is configured for calling described program instruction, execute such as second
The method that aspect is proposed.
7th aspect, the application propose a kind of computer readable storage medium, the computer-readable recording medium storage
There is computer program, the computer program includes program instruction, and described program instructs when being executed by a processor, makes the place
Reason device executes the method that the various aspects are proposed.
Eighth aspect, the embodiment of the present application provide a kind of computer program product comprising program instruction, when it is being counted
When being run on calculation machine, so that computer executes the method that the various aspects are proposed.
Implement the application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using the nothing after optimization
Authentication techniques are perceived, using near-field communication technology as medium, reaches and the entrance of control vehicle, starting etc. is authenticated by mobile terminal device
Target improves the safety of information transmission, has ensured the privacy of car owner.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application
Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes;
Fig. 2 is the flow chart for another control method for vehicle that the application proposes;
Fig. 3 is a kind of flow chart of the concrete application scene for control method for vehicle that the application proposes;
Fig. 4 is the flow chart for another control method for vehicle that the application proposes;
Fig. 5 is the flow chart for another control method for vehicle that the application proposes;
Fig. 6 is the flow chart of the concrete application scene for another control method for vehicle that the application proposes;
Fig. 7 is a kind of frame diagram for vehicle control system that the application proposes;
Fig. 8 is a kind of structural schematic diagram for controller of vehicle that the application proposes;
Fig. 9 is the structural schematic diagram for another controller of vehicle that the application proposes;
Figure 10 is the structural schematic diagram for another controller of vehicle that the application proposes;
Figure 11 is the structural schematic diagram for another controller of vehicle that the application proposes.
Specific embodiment
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, meaning
Figure, which is to cover, non-exclusive includes.Such as contain the process, method, system, product or equipment of a series of steps or units
It is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also
Including other step or units intrinsic for these process, methods or equipment.
Existing keyless entry and activation system need user to carry automobile wireless key, go on a journey especially for car owner's summer
It is inconvenient.Emerging internet automobile connects remote server by mobile phone to realize control vehicle, but network transmission exist compared with
Risks, information are easily intercepted by hacker, and automobile vendor's server can collect owner information, invade car owner's privacy.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes, the above method includes the following contents:
101, key agreement is carried out with mobile terminal, obtains first key.
Specifically, negotiating link communication key using cipher key agreement algorithm, communicating pair can get key.Key association
Quotient's algorithm can use DH algorithm (Diffie-Hellman key exchange), which can allow communicating pair to obtain AES
Key.
102, it is decrypted, is obtained using ciphertext of the above-mentioned first key to the device-fingerprint that above-mentioned mobile terminal is sent
State device-fingerprint.
Specifically, being transferred to after the mobile terminal is encrypted the device-fingerprint of itself by above-mentioned first key
Vehicle end, vehicle end are decrypted the ciphertext of the device-fingerprint received using above-mentioned first key, obtain the equipment and refer to
Line.
Device-fingerprint, which refers to, can be used for equipment feature or unique device identification that unique identification goes out the equipment.Equipment
The acquisition modes of fingerprint can be the CPU sequence number, baseband chip sequence number, memory chip sequence number, flash of mobile terminal
The hardware informations such as chip serial number carry out Hash operation after splicing, refer to operation result as the Unique Device of the mobile terminal
Line.
103, above equipment fingerprint is compared with the device-fingerprint of storage.
Specifically, the ciphertext of the device-fingerprint of storage is decrypted, the plaintext of the device-fingerprint stored.It will receive
To the device-fingerprint of the mobile terminal be compared with the device-fingerprint of storage.
The device-fingerprint of storage is the device-fingerprint for the mobile terminal bound with the vehicle.Only with the vehicle
The mobile terminal bound just has the control authority of the vehicle, to eliminate the control authority to the vehicle, need to unbind phase
The mobile terminal answered.The purpose that device-fingerprint compares is to confirm whether the mobile terminal is the shifting with vehicle binding
Dynamic terminal.
If 104, comparing unanimously, vehicle control system is triggered.
Specifically, the i.e. device-fingerprint of the mobile terminal and the device-fingerprint of storage is identical if comparing unanimously, then proving should
Mobile terminal is the mobile terminal bound with the vehicle, has the control authority of the vehicle, triggers the control system of the vehicle
System.If comparison is inconsistent, which is not bound with the vehicle, does not have the control authority of the vehicle, process knot
Beam does not trigger vehicle control system.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization
Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter,
The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 2 is the flow chart for another control method for vehicle that the application proposes, the above method includes the following contents:
201, key agreement is carried out with target terminal, obtains the second key.
Specifically, the safety in order to guarantee information transmission, by key agreement, the key of each link communication is different
's.Key agreement can use DH algorithm, and communicating pair is made to obtain AES key.
202, the ciphertext of the user password sent using the above-mentioned target terminal of above-mentioned second key pair is decrypted, and is obtained
State user password.
Specifically, target terminal encrypts user password according to the second key consulted, ciphertext is transferred to vehicle
.Vehicle is decrypted using above-mentioned second key pair ciphertext, obtains the user password.
203, the user password that the target terminal of decryption is sent is compared with the password of storage.
Specifically, the password of storage by root password after Hash operation, encrypted transmission gives the vehicle, then decrypts write-in
ROM hardware store can not modify after password write-in.
Implementing the step is to detect whether target terminal has the permission bound with the vehicle.The target is whole after binding
End can control the vehicle.
If 204, comparing the ciphertext for unanimously receiving the device-fingerprint that above-mentioned target terminal is sent.
Specifically, the target terminal has the permission bound with the vehicle if comparing unanimously, target end is received
Hold the ciphertext of the device-fingerprint sent.If comparison is inconsistent, which does not have corresponding authority, and process terminates.Equipment
Fingerprint, which refers to, can be used for equipment feature or unique device identification that unique identification goes out the equipment.In order to guarantee that information is transmitted
Safety, encrypted device-fingerprint is transferred to the vehicle by target terminal.
The vehicle stores information using key-value form, and wherein key is the vehicle identification number of the vehicle, and value is
The device-fingerprint information of the target terminal received.Unique identification using vehicle identification number as vehicle, can be to avoid
The inconsistent problem of caused information of vehicles after the replacement such as hardware circuit or engine.
205, key agreement is carried out with mobile terminal, obtains first key.
Specifically, after mobile terminal is close to vehicle, if the bluetooth of mobile terminal, WiFi, nfc, baseband signal etc. is strong
After the weak signal transducer threshold values for reaching the vehicle, the vehicle automatic trigger identifying procedure.If the mobile terminal receives the vehicle
Send vehicle identification number and be verified, then the mobile terminal may have the control authority of the vehicle.The vehicle with
The mobile terminal carries out key agreement, obtains first key.
206, it is decrypted, is obtained using ciphertext of the above-mentioned first key to the device-fingerprint that above-mentioned mobile terminal is sent
State device-fingerprint.
Specifically, the mobile terminal encrypts device-fingerprint and is transferred to the vehicle using above-mentioned first key.It should
Vehicle is decrypted the ciphertext received using the above-mentioned first key consulted, obtains the device-fingerprint of the mobile terminal.
207, above equipment fingerprint is compared with the device-fingerprint of storage.
Specifically, in order to detect whether the mobile terminal is bound with the vehicle, if the control with the vehicle
Limit, the device-fingerprint of the mobile terminal received is compared with the device-fingerprint of storage.
If 208, comparing unanimously, the signal of above-mentioned mobile terminal is detected.
Specifically, the mobile terminal has the control authority of the vehicle if comparing unanimously, the control system of the vehicle is triggered
System, detects the signal of the mobile terminal.If comparison is inconsistent, illustrate that the mobile terminal does not have the control authority of the vehicle,
Process terminates, and does not trigger vehicle control system.
209, the signal of signal and setting based on above-mentioned mobile terminal triggers threshold values, sends control to above-mentioned vehicle and refers to
It enables.
Specifically, above-mentioned control instruction, for controlling the vehicle, which includes car door opening instruction, vehicle
Enabled instruction.The signal of the vehicle detection mobile terminal issues car door and opens if the signal strength reaches default first threshold values
Instruction is opened, car door opening instruction opens car door for controlling the vehicle;If signal strength reaches default second threshold values, issue
Vehicle launch instruction, the vehicle launch are instructed for controlling the vehicle launch engine.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization
Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter,
The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 3 is a kind of flow chart of the concrete application scene for control method for vehicle that the application proposes, the above method includes
The following contents:
301, key agreement is carried out with target terminal, obtains the second key.
For example, key agreement is carried out using DH algorithm and target terminal, both sides obtain AES key.The AES key is
For the second key.
302, the ciphertext of the user password sent using the above-mentioned target terminal of above-mentioned second key pair is decrypted, and is obtained
State user password.
For example, target terminal encrypts user password according to the second key consulted, and ciphertext is transferred to
Vehicle.Vehicle is decrypted using above-mentioned second key pair ciphertext, obtains the user password.
303, the user password that the target terminal of decryption is sent is compared with the password of storage.
For example, user inputs root password on mobile phone, which passes through sha3 Hash operation, assists using with vehicle
The good key of quotient encrypts, and is transferred to the vehicle.Good key pair ciphertext is decrypted the vehicle through consultation, after decryption
Cleartext information be user's root password sha3 cryptographic Hash, which enters a ROM hardware store.By the target of decryption
The user password that terminal is sent is compared with the password of storage.
If 304, comparing the ciphertext for unanimously receiving the device-fingerprint that above-mentioned target terminal is sent.
For example, if comparing unanimously, back-checking successful information, the verification successful information carries the vehicle of the vehicle
Identification number.After target terminal receives verification successful information, the vehicle identification number of the vehicle is stored.Target terminal is by CPU
Sha3 is carried out after the splicing of the hardware informations such as sequence number, baseband chip sequence number, memory chip sequence number, flash chip sequence number
Hash operation, Unique Device fingerprint of the result as the target terminal.What vehicle reception target terminal was sent passes through AES chain
The encrypted device-fingerprint in road.
305, key agreement is carried out with mobile terminal, obtains first key.
For example, after mobile terminal is close to vehicle, if the bluetooth of mobile terminal, WiFi, nfc, baseband signal etc.
After power reaches the signal transducer threshold values of the vehicle, the vehicle automatic trigger identifying procedure.If the mobile terminal receives this
The vehicle identification number of vehicle transmission is simultaneously verified, then the mobile terminal may have the control authority of the vehicle.The vehicle
Key agreement is carried out with the mobile terminal, obtains first key.
306, it is decrypted, is obtained using ciphertext of the above-mentioned first key to the device-fingerprint that above-mentioned mobile terminal is sent
State device-fingerprint.
For example, which encrypts device-fingerprint according to the first key consulted, is transferred to the vehicle
, which is decrypted the ciphertext of the device-fingerprint using the first key, obtains the device-fingerprint.
307, above equipment fingerprint is compared with the device-fingerprint of storage.
For example, the device-fingerprint of storage is decrypted, obtains the plaintext of device-fingerprint, the equipment of the storage is referred to
The plaintext of line is compared with the device-fingerprint of the mobile terminal received.
If 308, comparing unanimously, the signal of above-mentioned mobile terminal is detected.
For example, if comparing unanimously, which is the car key of the vehicle, has the control of the vehicle
Limit, triggers the control system of the vehicle, detects the signal of the mobile terminal.If comparison is inconsistent, illustrate the mobile terminal not
Has the control authority of the vehicle, process terminates, and does not trigger vehicle control system.
309, the signal of signal and setting based on above-mentioned mobile terminal triggers threshold values, sends control to above-mentioned vehicle and refers to
It enables.
For example, the signal of the vehicle detection mobile terminal issues if the signal strength reaches default first threshold values
Car door opening instruction, car door opening instruction open car door for controlling the vehicle;If signal strength reaches default second threshold values,
Vehicle launch instruction is then issued, which instructs for controlling the vehicle launch engine.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization
Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter,
The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 4 is the flow chart for another control method for vehicle that the application proposes, the above method includes the following contents:
401, the collecting device fingerprinting-instruction that vehicle is sent is received.
Specifically, when mobile terminal is close to vehicle, if the bluetooth of mobile terminal, WiFi, nfc, baseband signal etc. is strong
It is weak, after reaching signals of vehicles sensor threshold values, automatic trigger identifying procedure.Vehicle broadcasts collecting device fingerprinting-instruction, the collection
Device-fingerprint instructs the vehicle identification number that can carry the vehicle.
Device-fingerprint, which refers to, can be used for equipment feature or unique device identification that unique identification goes out the equipment.Equipment
The acquisition modes of fingerprint can be the CPU sequence number, baseband chip sequence number, memory chip sequence number, flash of mobile terminal
The hardware informations such as chip serial number carry out Hash operation after splicing, refer to operation result as the Unique Device of the mobile terminal
Line.
Vehicle identification number, abbreviation VIN, be one group by 17 English arrays at one group on automobile is unique
Number, can identify the data such as manufacturer, engine, chassis serial number and other performances of automobile.
402, the vehicle identification number of above-mentioned vehicle is compared with the vehicle identification number of storage.
Specifically, when encrypted root password is sent to target vehicle by mobile terminal, if target vehicle is decrypted and tested
Card password passes through, then target vehicle sends verification successful information to mobile terminal, which can carry the target
The vehicle identification number of vehicle.Mobile terminal stores the vehicle identification number of the target vehicle received.In order to determine
Whether the vehicle of communication connection is preset target vehicle, need to detect the vehicle identification number of the vehicle, therefore by the vehicle
Vehicle identification number is compared with the vehicle identification number of storage.
If 403, comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of above equipment fingerprint.
Specifically, the vehicle of the communication connection may be preset target vehicle if comparing consistent, mobile terminal with should
Vehicle carries out key agreement, is encrypted using the device-fingerprint of the key pair mobile terminal consulted, obtains the device-fingerprint
Ciphertext, above equipment fingerprint be the mobile terminal unique identifier.
404, the ciphertext of above equipment fingerprint is sent to above-mentioned vehicle.
The purpose for implementing the step is to finally detect whether the mobile terminal is the vehicle " key ", if is had
The control authority of the vehicle.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization
Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter,
The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 5 is the flow chart for another control method for vehicle that the application proposes, the above method includes the following contents:
501, target vehicle is sent to after encrypting user password.
Specifically, mobile terminal and target vehicle key agreement, are obtained key, are added using the key pair user password
It is close, and it is sent to target vehicle.
If 502, above-mentioned user password and the password of above-mentioned target vehicle storage compare unanimously, receives to verify and successfully believe
Breath.
Specifically, user inputs root password on mobile terminals, which utilizes negotiation into sha3 Hash operation excessively
Good key is encrypted to obtain root ciphertext.Mobile terminal sends root password write instruction to target vehicle, which takes
Band root ciphertext.It after target vehicle receives root ciphertext, is decrypted using the key consulted, the cleartext information after decryption
For the sha3 cryptographic Hash of user's root password, which is entered into a ROM hardware store, can not be carried out more after password write-in
Change.If user password and the password of vehicle storage compare unanimously, which is the target vehicle of mobile terminal, receives the vehicle
The verification successful information of transmission, the verification successful information carry the vehicle identification number of above-mentioned target vehicle.If comparison is inconsistent,
The password for then illustrating that user password and target vehicle store is inconsistent, and process terminates, and does not receive verification successful information.
503, the collecting device fingerprinting-instruction that vehicle is sent is received.
Specifically, mobile terminal, after vehicle, the power of bluetooth, WiFi, nfc, base-band information of mobile terminal etc. reaches
To after the threshold values of signals of vehicles sensor, automatic trigger identifying procedure, mobile terminal receives the collecting device fingerprint that vehicle is sent
Instruction, above-mentioned collecting device fingerprinting-instruction can carry the vehicle identification number of the vehicle.
504, the vehicle identification number of above-mentioned vehicle is compared with the vehicle identification number of storage.
Specifically, the purpose for implementing the step is to judge whether the vehicle is target vehicle with mobile terminal binding.
If 505, comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of above equipment fingerprint.
Specifically, the vehicle may be the target vehicle with mobile terminal binding if comparing unanimously, carried out with the vehicle
Key agreement is encrypted device-fingerprint using the key consulted.Above equipment fingerprint is the unique identification of mobile terminal
Code.
506, the ciphertext of above equipment fingerprint is sent to above-mentioned vehicle.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization
Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter,
The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 6 is the flow chart of the concrete application scene for another control method for vehicle that the application proposes, above method packet
Include the following contents:
601, target vehicle is sent to after encrypting user password.
For example, mobile terminal carries out key agreement using DH algorithm and target vehicle, obtains AES key, utilizes this
AES key encrypts user password, and is transferred to target vehicle.
If 602, above-mentioned user password and the password of above-mentioned target vehicle storage compare unanimously, receives to verify and successfully believe
Breath.
For example, target vehicle is carried out using ciphertext of the above-mentioned AES key consulted to the user password received
Decryption, the user password after decryption is compared with the password of storage, if compare it is consistent, to mobile terminal send verification at
Function information.Mobile terminal receives verification successful information, which carries the vehicle identification number of the target vehicle.
603, the collecting device fingerprinting-instruction that vehicle is sent is received.
For example, mobile terminal is after vehicle, the power of bluetooth, WiFi, nfc, base-band information of mobile terminal etc.
After the threshold values for reaching signals of vehicles sensor, automatic trigger identifying procedure, mobile terminal receives the collecting device that vehicle is sent and refers to
Line instruction, above-mentioned collecting device fingerprinting-instruction can carry the vehicle identification number of the vehicle.
604, the vehicle identification number of above-mentioned vehicle is compared with the vehicle identification number of storage.
The purpose for implementing the step is to judge whether the vehicle is target vehicle with mobile terminal binding.
If 605, comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of above equipment fingerprint.
For example, if comparing unanimously, which may be the target vehicle with mobile terminal binding, using DH algorithm
Key agreement is carried out with the vehicle, AES key is obtained, device-fingerprint is encrypted using above-mentioned AES key, obtain equipment and refer to
The ciphertext of line.
606, the ciphertext of above equipment fingerprint is sent to above-mentioned vehicle.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization
Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter,
The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
In one preferred embodiment of the application, a kind of control method for vehicle and device are related to, can be replaced with mobile phone
For orthodox car key, car owner is facilitated to carry;It is matchmaker with near-field communication technology using the unaware authentication techniques after optimization
It is situated between, reaches and the targets such as the entrance of control vehicle, starting are authenticated by mobile terminal device, improve the safety of information transmission, protect
The privacy of car owner is hindered.
Referring to Fig. 7, Fig. 7 is a kind of frame diagram of vehicle control system provided by the embodiments of the present application.As shown in fig. 7,
The vehicle control system includes but is not limited to vehicle 1 and mobile terminal 2.Vehicle 1 and mobile terminal 2 communicate to connect, and the application is real
It applies example and uniqueness restriction is not made for the communication connection mode between the vehicle 1 and the mobile terminal 2.
The control flow of the vehicle control system may include three phases: root authority control, mobile terminal binding solution
It ties up, the practical control of vehicle.
The stage is controlled in root authority, vehicle 1 and mobile terminal 2 communicate to connect, and connection type is unlimited.Vehicle 1 and movement
Key agreement is carried out using DH algorithm between terminal 2, obtains AES key.The DH algorithm can guarantee the secure interactive of data.With
Family inputs root password on mobile terminal 2, the root password pass through sha3 Hash operation, using the AES key consulted into
Row encryption, obtains root ciphertext.Mobile terminal 2 sends root password write instruction to vehicle 1, which carries root ciphertext.
Root password needs user to remember.After vehicle 1 receives root ciphertext, ciphertext is decrypted using above-mentioned AES key, is decrypted
Cleartext information afterwards is the sha3 cryptographic Hash of root password, which is entered a ROM hardware store, can not after information write-in
It modifies.
The stage is unbinded in mobile terminal binding, key agreement is carried out using DH algorithm between vehicle 1 and mobile terminal 2, is obtained
To AES key.Key agreement is re-started, guarantees that the key in each link communication is different.User is defeated in mobile terminal 2
Enter root password to be encrypted after root password is carried out sha3 Hash operation by mobile terminal 2 using the key consulted, it will
Ciphertext is sent to vehicle 1.After vehicle 1 receives root ciphertext, it is decrypted using the key pair ciphertext consulted, after decryption
Cleartext information and a ROM in the password that stores be compared, if comparison result is consistent, then it represents that authorization check passes through, and returns
Verification successful information is returned, which carries the vehicle identification number of vehicle 1, if comparison result is inconsistent, then it represents that
Cryptographic check failure, process terminate.After mobile terminal 2 receives verification successful information, by the identification of the vehicle of the vehicle 1 of carrying
Code stores.Mobile terminal 2 is by itself CPU sequence number, baseband chip sequence number, memory chip sequence number, flash chip
The hardware informations such as sequence number carry out sha3 Hash operation, as a result as the Unique Device fingerprint of the mobile terminal 2 after splicing.It will
Device-fingerprint is transferred to vehicle 1 after carrying out AES link encryption.Vehicle 1 stores information using key-value form.Wherein, key
For the vehicle identification number of the vehicle 1, value is the device-fingerprint information for receiving mobile terminal 2.Handset binding process knot
Beam.Unbundlings process: after root password is verified, the device-fingerprint of the corresponding mobile terminal 2 of vehicle 1 is deleted, unbundlings are completed.
In the vehicle practical control stage, mobile terminal 2 after vehicle, according to the bluetooth of mobile terminal 2, WiFi, nfc,
The power of base-band information etc., after reaching 1 signal transducer threshold values of vehicle, automatic trigger identifying procedure, vehicle 1 broadcasts collecting device
Fingerprinting-instruction, the instruction carry the vehicle identification number of vehicle 1.Mobile terminal 2 near field receives collecting device fingerprinting-instruction
Afterwards, the vehicle identification number wherein carried is extracted, is matched with the vehicle identification number of the mobile terminal 2 storage, if matching
Failure, then mobile terminal 2 is done nothing, and process terminates, if successful match, which may be vehicle 1
Key.Vehicle 1 and mobile terminal 2 carry out key agreement, obtain key.Mobile terminal 2 obtains itself device-fingerprint, acquisition modes
It is identical as the binding stage, vehicle 1 is transferred to after device-fingerprint is carried out link encryption.Vehicle 1 by the device-fingerprint received with
The key-value data being locally stored are compared, and comparing successfully then indicates that mobile terminal 2 is legal key, if comparing not
Success, then mobile terminal 2 does not have the control authority of vehicle 1, and process terminates.Different certification triggering threshold values is arranged in vehicle 1.When
When the signal strength of mobile terminal 2 reaches threshold values 1, vehicle 1 issues car door opening instruction, opens the car door of vehicle 1;When mobile whole
When the signal strength at end 2 reaches threshold values 2, vehicle 1 issues vehicle launch instruction, starts the engine of vehicle 1.
Fig. 8 is a kind of structural schematic diagram for controller of vehicle that the application proposes, above-mentioned apparatus includes:
First negotiation element 801 obtains first key for carrying out key agreement with mobile terminal;
First decryption unit 802, device-fingerprint for being sent using above-mentioned first key to above-mentioned mobile terminal it is close
Text is decrypted, and obtains above equipment fingerprint;
First comparing unit 803, for above equipment fingerprint to be compared with the device-fingerprint of storage;
If control unit 804 triggers vehicle control system consistent for comparing.
As shown in figure 8, above-mentioned apparatus further include:
Second comparing unit 805, for comparing the user password of target terminal transmission of decryption and the password of storage
It is right;
Receiving unit 806 receives the ciphertext for the device-fingerprint that above-mentioned target terminal is sent if consistent for comparing.
Further, above-mentioned apparatus further include:
Second negotiation element 807 obtains the second key for carrying out key agreement with target terminal;
Second decryption unit 808, for the close of the user password using the above-mentioned target terminal transmission of above-mentioned second key pair
Text is decrypted, and obtains above-mentioned user password.
Further, above-mentioned control unit 804 is specifically used for detecting the signal of above-mentioned mobile terminal;Based on above-mentioned mobile whole
The signal at end and the signal of setting trigger threshold values, send control instruction to above-mentioned vehicle, above-mentioned control instruction is used for above-mentioned
Vehicle is controlled, and above-mentioned control instruction includes car door opening instruction, vehicle launch instruction.
It is understood that the specific implementation of controller of vehicle shown in Fig. 8 reference may also be made to Fig. 1, Fig. 2 and shown in Fig. 3
Method is no longer described in detail one by one here.
In the embodiment of the present application, the first negotiation element 801 carries out key agreement with mobile terminal, obtains first key;
First decryption unit 802 is decrypted the ciphertext for the device-fingerprint that above-mentioned mobile terminal is sent using above-mentioned first key, obtains
To above equipment fingerprint;Above equipment fingerprint is compared first comparing unit 803 with the device-fingerprint of storage;If comparing one
It causes, then control unit 804 triggers vehicle control system.As it can be seen that the embodiment of the present application can substitute orthodox car key with mobile phone,
Car owner is facilitated to carry;Reach using near-field communication technology as medium using the unaware authentication techniques after optimization and pass through movement
Terminal device authentication controls the targets such as vehicle entrance, starting, improves the safety of information transmission, has ensured the privacy of car owner.
Fig. 9 is the structural schematic diagram for another controller of vehicle that the application proposes, above-mentioned apparatus includes:
First receiving unit 901, for receiving the collecting device fingerprinting-instruction of vehicle transmission, above-mentioned collecting device fingerprint refers to
Enable the vehicle identification number including above-mentioned vehicle;
Comparing unit 902, for the vehicle identification number of above-mentioned vehicle to be compared with the vehicle identification number of storage;
If encryption unit 903 encrypts device-fingerprint consistent for comparing, and obtains the close of above equipment fingerprint
Text, above equipment fingerprint are the unique identifier of mobile terminal;
First transmission unit 904, for the ciphertext of above equipment fingerprint to be sent to above-mentioned vehicle.
As shown in figure 9, above-mentioned apparatus further include:
Second transmission unit 905, for being sent to target vehicle after encrypting user password;
Second receiving unit 906, if the password for above-mentioned user password and the storage of above-mentioned target vehicle compares unanimously,
Verification successful information is received, above-mentioned verification successful information includes the vehicle identification number of above-mentioned target vehicle.
It is understood that the specific implementation of controller of vehicle shown in Fig. 9 reference may also be made to Fig. 4, Fig. 5 and shown in fig. 6
Method is no longer described in detail one by one here.
In the embodiment of the present application, the first receiving unit 901 receives the collecting device fingerprinting-instruction that vehicle is sent, above-mentioned receipts
Collect the vehicle identification number that device-fingerprint instruction includes above-mentioned vehicle;Comparing unit 902 is by the vehicle identification number of above-mentioned vehicle
It is compared with the vehicle identification number of storage;If comparing unanimously, encryption unit 903 encrypts device-fingerprint, obtains
The ciphertext of above equipment fingerprint, above equipment fingerprint are the unique identifier of mobile terminal;First transmission unit 904 is set above-mentioned
The ciphertext of standby fingerprint is sent to above-mentioned vehicle.As it can be seen that the embodiment of the present application, can substitute orthodox car key with mobile phone, it is convenient
Car owner carries;Reach using near-field communication technology as medium using the unaware authentication techniques after optimization and pass through mobile terminal
The targets such as the entrance of equipment certification control vehicle, starting, improve the safety of information transmission, have ensured the privacy of car owner.
Referring to Fig. 10, Figure 10 is a kind of structural schematic diagram of controller of vehicle provided by the embodiments of the present application, the dress
Setting includes: at least one processor 1001, such as central processing unit (central processing unit, CPU), and at least one
A memory 1002, at least one transceiver 1003 and at least one bus 1004.Wherein, above-mentioned bus 1004 can be one group
Parallel data line, for realizing the interconnection of above-mentioned processor 1001, above-mentioned memory 1002 and above-mentioned transceiver 1003;
Above-mentioned memory 1002 can be high-speed random access memory (random access memory, RAM), be also possible to non-easy
The property lost memory (non-volatile memory), for example, at least a read-only memory (read only memory, ROM).
Specifically, above-mentioned processor 1001 carries out key agreement with mobile terminal, first key is obtained;Above-mentioned processor
1001 are decrypted the ciphertext for the device-fingerprint that above-mentioned mobile terminal is sent using above-mentioned first key, obtain above equipment and refer to
Line;Above equipment fingerprint is compared above-mentioned processor 1001 with the device-fingerprint of storage;If comparing consistent, above-mentioned processing
Device 1001 triggers vehicle control system.
Further, the user password that above-mentioned processor 1001 sends the target terminal of decryption and the password of storage carry out
It compares;If comparing unanimously, above-mentioned transceiver 1003 receives the ciphertext for the device-fingerprint that above-mentioned target terminal is sent.
Further, above-mentioned processor 1001 carries out key agreement with target terminal, obtains the second key;Above-mentioned processor
The ciphertext of 1001 user passwords sent using the above-mentioned target terminal of above-mentioned second key pair is decrypted, and it is close to obtain above-mentioned user
Code.
Further, above-mentioned processor 1001 detects the signal of above-mentioned mobile terminal;Above-mentioned processor 1001 is based on above-mentioned
The signal of mobile terminal and the signal of setting trigger threshold values, send control instruction to above-mentioned vehicle, above-mentioned control instruction is used for
Above-mentioned vehicle is controlled, above-mentioned control instruction includes car door opening instruction, vehicle launch instruction.
Specifically, can store program instruction in above-mentioned memory 1002, above-mentioned processor 1001 can be used for caller
Instruction execution Fig. 1, Fig. 2 and method shown in Fig. 3.
Figure 11 is please referred to, Figure 11 is the structural schematic diagram of another controller of vehicle provided by the embodiments of the present application, should
Equipment includes: at least one processor 1101, such as central processing unit (central processing unit, CPU), at least
One memory 1102, at least one transceiver 1103 and at least one bus 1104.Wherein, above-mentioned bus 1104 can be one
The parallel data line of group, for realizing the mutually interconnection of above-mentioned processor 1101, above-mentioned memory 1102 and above-mentioned transceiver 1103
It connects;Above-mentioned memory 1102 can be high-speed random access memory (random access memory, RAM), be also possible to
Nonvolatile memory (non-volatile memory), for example, at least read-only memory (read only memory,
ROM)。
Specifically, above-mentioned transceiver 1103 receives the collecting device fingerprinting-instruction that vehicle is sent, above-mentioned collecting device fingerprint
Instruction includes the vehicle identification number of above-mentioned vehicle;Above-mentioned processor 1101 by the vehicle identification number of above-mentioned vehicle and storage
Vehicle identification number is compared;If comparing unanimously, above-mentioned processor 1101 encrypts device-fingerprint, obtains above-mentioned sets
The ciphertext of standby fingerprint, above equipment fingerprint are the unique identifier of mobile terminal;Above-mentioned transceiver 1103 is by above equipment fingerprint
Ciphertext be sent to above-mentioned vehicle.
Further, above-mentioned processor 1101 is sent to target vehicle after encrypting user password;If above-mentioned user password
Compared unanimously with the password of above-mentioned target vehicle storage, then above-mentioned transceiver 1103, which receives, verifies successful information, above-mentioned verification at
Function information includes the vehicle identification number of above-mentioned target vehicle.
Specifically, can store program instruction in above-mentioned memory 1102, above-mentioned processor 1101 can be used for caller
Instruction execution Fig. 4, Fig. 5 and method shown in fig. 6.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in computer readable storage medium, and storage is situated between
Matter include read-only memory (read only memory, ROM), random access memory (random access memory, RAM),
Programmable read only memory (programmable read only memory, PROM), Erasable Programmable Read Only Memory EPROM
(erasable programmable read only memory, EPROM), disposable programmable read-only memory (one-time
Programmable read-only memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory
(electrically-erasable programmable read-only memory, EEPROM), CD-ROM (compact
Disc read-only memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can
For carrying or any other computer-readable medium of storing data.
A kind of control method for vehicle and device disclosed in the embodiment of the present application are described in detail above, answered herein
With specific case, the principle and implementation of this application are described, and the explanation of above example is only intended to help to manage
Solve the present processes and its core concept;At the same time, for those skilled in the art, according to the thought of the application, In
There will be changes in specific embodiment and application range.In conclusion the content of the present specification should not be construed as to this Shen
Limitation please.
Claims (10)
1. a kind of control method for vehicle, which is characterized in that the described method includes:
Key agreement is carried out with mobile terminal, obtains first key;
It is decrypted using ciphertext of the first key to the device-fingerprint that the mobile terminal is sent, obtains the equipment and refer to
Line;
The device-fingerprint is compared with the device-fingerprint of storage;
If comparing unanimously, vehicle control system is triggered.
2. obtaining first the method according to claim 1, wherein described carry out key agreement with mobile terminal
Before key, further includes:
The user password that the target terminal of decryption is sent is compared with the password of storage;
If comparing the ciphertext for unanimously receiving the device-fingerprint that the target terminal is sent.
3. according to the method described in claim 2, it is characterized in that, the user password that sends of the target terminal by decryption with
Before the password of storage is compared, further includes:
Key agreement is carried out with target terminal, obtains the second key;
The ciphertext of the user password sent using target terminal described in second key pair is decrypted, and it is close to obtain the user
Code.
4. according to claim 1 to method described in 3 any one, which is characterized in that the triggering vehicle control system, packet
It includes:
Detect the signal of the mobile terminal;
The signal of signal and setting based on the mobile terminal triggers threshold values, sends control instruction to the vehicle, described
For control instruction for controlling the vehicle, the control instruction includes car door opening instruction, vehicle launch instruction.
5. a kind of control method for vehicle, which is characterized in that the described method includes:
The collecting device fingerprinting-instruction that vehicle is sent is received, the collecting device fingerprinting-instruction includes the vehicle identification of the vehicle
Number;
The vehicle identification number of the vehicle is compared with the vehicle identification number of storage;
If comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of the device-fingerprint, the device-fingerprint is movement
The unique identifier of terminal;
The ciphertext of the device-fingerprint is sent to the vehicle.
6. according to the method described in claim 5, it is characterized in that, it is described receive vehicle send collecting device fingerprinting-instruction it
Before, further includes:
Target vehicle is sent to after user password is encrypted;
If the user password and the password of target vehicle storage compare unanimously, verification successful information, the school are received
Test the vehicle identification number that successful information includes the target vehicle.
7. a kind of controller of vehicle characterized by comprising
First negotiation element obtains first key for carrying out key agreement with mobile terminal;
First decryption unit, for being solved using the first key to the ciphertext for the device-fingerprint that the mobile terminal is sent
It is close, obtain the device-fingerprint;
First comparing unit, for the device-fingerprint to be compared with the device-fingerprint of storage;
If control unit triggers vehicle control system consistent for comparing.
8. a kind of controller of vehicle characterized by comprising
First receiving unit, for receiving the collecting device fingerprinting-instruction of vehicle transmission, the collecting device fingerprinting-instruction includes
The vehicle identification number of the vehicle;
Comparing unit, for the vehicle identification number of the vehicle to be compared with the vehicle identification number of storage;
If device-fingerprint is encrypted consistent for comparing, obtains the ciphertext of the device-fingerprint by encryption unit, described
Device-fingerprint is the unique identifier of mobile terminal;
First transmission unit, for the ciphertext of the device-fingerprint to be sent to the vehicle.
9. a kind of controller of vehicle, which is characterized in that including processor, memory and transceiver;The processor described is deposited
Reservoir and the transceiver are connected with each other by bus;Wherein, the memory is for storing computer program, the calculating
Machine program includes program instruction, and the processor is configured for calling described program instruction, executes Claims 1-4 such as and appoints
Method described in one.
10. a kind of controller of vehicle, which is characterized in that including processor, memory and transceiver;It is the processor, described
Memory and the transceiver are connected with each other by bus;Wherein, the memory is for storing computer program, the meter
Calculation machine program includes program instruction, and the processor is configured for calling described program instruction, executes such as claim 5 to 6
Described in any item methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910628589.2A CN110406498A (en) | 2019-07-12 | 2019-07-12 | A kind of control method for vehicle and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910628589.2A CN110406498A (en) | 2019-07-12 | 2019-07-12 | A kind of control method for vehicle and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110406498A true CN110406498A (en) | 2019-11-05 |
Family
ID=68361204
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910628589.2A Pending CN110406498A (en) | 2019-07-12 | 2019-07-12 | A kind of control method for vehicle and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110406498A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110861608A (en) * | 2019-11-19 | 2020-03-06 | 苏州寰天汽车电子科技有限公司 | Automatic induction anti-theft method for vehicle-mounted Bluetooth matched with smart phone |
CN112867082A (en) * | 2020-12-09 | 2021-05-28 | 国网宁夏电力有限公司检修公司 | Method, medium and system for acquiring secure multi-hop transmission path of wireless sensor network |
CN115565268A (en) * | 2022-08-30 | 2023-01-03 | 星汉智能科技股份有限公司 | Automobile control method and system based on wireless automobile key, electronic equipment and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102923092A (en) * | 2012-11-14 | 2013-02-13 | 北京小米科技有限责任公司 | Method, control equipment, mobile terminal and system for controlling automobiles |
CN104424779A (en) * | 2013-08-30 | 2015-03-18 | 比亚迪股份有限公司 | System and method for controlling vehicle by virtue of mobile terminal |
CN105644501A (en) * | 2015-12-30 | 2016-06-08 | 小米科技有限责任公司 | Method, device and terminal for remote control of automobile |
CN106274807A (en) * | 2016-08-31 | 2017-01-04 | 杭州联络互动信息科技股份有限公司 | Automobile intelligent control method based on mobile terminal and device |
CN106792440A (en) * | 2016-11-29 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method of opening car door, mobile terminal, car-mounted terminal and system |
KR20190010834A (en) * | 2017-07-23 | 2019-01-31 | 김소현 | cellphone key |
DE102017216029A1 (en) * | 2017-09-12 | 2019-03-14 | Continental Automotive Gmbh | Access and start system and access and start verification procedures |
CN109600347A (en) * | 2017-09-30 | 2019-04-09 | 比亚迪股份有限公司 | Control method, device, mobile terminal and the vehicle of vehicle |
EP3483844A1 (en) * | 2017-11-13 | 2019-05-15 | Toyota Jidosha Kabushiki Kaisha | Key information sharing system, delivery device and user terminal |
CN109808643A (en) * | 2019-03-04 | 2019-05-28 | 重庆长安汽车股份有限公司 | Bluetooth electronic key system and its control method |
CN110194123A (en) * | 2019-06-28 | 2019-09-03 | 广州小鹏汽车科技有限公司 | Vehicle starting method and system, vehicle under a kind of no key status |
-
2019
- 2019-07-12 CN CN201910628589.2A patent/CN110406498A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102923092A (en) * | 2012-11-14 | 2013-02-13 | 北京小米科技有限责任公司 | Method, control equipment, mobile terminal and system for controlling automobiles |
CN104424779A (en) * | 2013-08-30 | 2015-03-18 | 比亚迪股份有限公司 | System and method for controlling vehicle by virtue of mobile terminal |
CN105644501A (en) * | 2015-12-30 | 2016-06-08 | 小米科技有限责任公司 | Method, device and terminal for remote control of automobile |
CN106274807A (en) * | 2016-08-31 | 2017-01-04 | 杭州联络互动信息科技股份有限公司 | Automobile intelligent control method based on mobile terminal and device |
CN106792440A (en) * | 2016-11-29 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method of opening car door, mobile terminal, car-mounted terminal and system |
KR20190010834A (en) * | 2017-07-23 | 2019-01-31 | 김소현 | cellphone key |
DE102017216029A1 (en) * | 2017-09-12 | 2019-03-14 | Continental Automotive Gmbh | Access and start system and access and start verification procedures |
CN109600347A (en) * | 2017-09-30 | 2019-04-09 | 比亚迪股份有限公司 | Control method, device, mobile terminal and the vehicle of vehicle |
EP3483844A1 (en) * | 2017-11-13 | 2019-05-15 | Toyota Jidosha Kabushiki Kaisha | Key information sharing system, delivery device and user terminal |
CN109808643A (en) * | 2019-03-04 | 2019-05-28 | 重庆长安汽车股份有限公司 | Bluetooth electronic key system and its control method |
CN110194123A (en) * | 2019-06-28 | 2019-09-03 | 广州小鹏汽车科技有限公司 | Vehicle starting method and system, vehicle under a kind of no key status |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110861608A (en) * | 2019-11-19 | 2020-03-06 | 苏州寰天汽车电子科技有限公司 | Automatic induction anti-theft method for vehicle-mounted Bluetooth matched with smart phone |
CN112867082A (en) * | 2020-12-09 | 2021-05-28 | 国网宁夏电力有限公司检修公司 | Method, medium and system for acquiring secure multi-hop transmission path of wireless sensor network |
CN112867082B (en) * | 2020-12-09 | 2022-12-23 | 国网宁夏电力有限公司检修公司 | Method, medium and system for acquiring secure multi-hop transmission path of wireless sensor network |
CN115565268A (en) * | 2022-08-30 | 2023-01-03 | 星汉智能科技股份有限公司 | Automobile control method and system based on wireless automobile key, electronic equipment and storage medium |
CN115565268B (en) * | 2022-08-30 | 2024-04-05 | 星汉智能科技股份有限公司 | Automobile control method and system based on wireless automobile key, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102285551B1 (en) | A physical key for provisioning a communication device with data that enables access to vehicle resources. | |
CN108122311B (en) | Vehicle virtual key implementation method and system | |
CN103477666B (en) | Mobile device is connected, is connected to vehicle and the cloud service of internet | |
EP3648396B1 (en) | Maintenance system and maintenance method | |
US9268951B2 (en) | Method and system for enabling a technical apparatus | |
CN111447601B (en) | Implementation method and device of automobile Bluetooth key | |
CN107650863A (en) | Vehicle sharing method and system | |
CN111835689B (en) | Identity authentication method of digital key, terminal device and medium | |
CN108235291A (en) | A kind of safety certification device and method for vehicle anti-theft | |
CN110103883B (en) | Vehicle key control method and device | |
JP2018506208A (en) | Method for automatic recognition between a mobile device and a motor vehicle operable according to the BLE protocol | |
US20130290191A1 (en) | Method of transferring access rights to a service from one device to another | |
CN108092991A (en) | The method for identifying ID and device of vehicle | |
CN106161032A (en) | A kind of identity authentication method and device | |
CN110406498A (en) | A kind of control method for vehicle and device | |
CN106156677B (en) | Identity card card reading method and system | |
CN111083696B (en) | Communication verification method and system, mobile terminal and vehicle machine side | |
CN110182171A (en) | Digital car key system and vehicle based on block chain technology | |
CN110758321A (en) | Control method and device of Bluetooth key | |
KR102553145B1 (en) | A secure element for processing and authenticating a digital key and operation metho thereof | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN106878122A (en) | A kind of method for network access and system | |
CN106027457A (en) | Identity card information transmission method and system | |
CN106027249B (en) | Identity card card reading method and system | |
CN113989958A (en) | Digital key sharing system, method and apparatus, vehicle and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191105 |