CN110406498A - A kind of control method for vehicle and device - Google Patents

A kind of control method for vehicle and device Download PDF

Info

Publication number
CN110406498A
CN110406498A CN201910628589.2A CN201910628589A CN110406498A CN 110406498 A CN110406498 A CN 110406498A CN 201910628589 A CN201910628589 A CN 201910628589A CN 110406498 A CN110406498 A CN 110406498A
Authority
CN
China
Prior art keywords
vehicle
fingerprint
mobile terminal
key
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910628589.2A
Other languages
Chinese (zh)
Inventor
刘新
侯利朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910628589.2A priority Critical patent/CN110406498A/en
Publication of CN110406498A publication Critical patent/CN110406498A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/2018Central base unlocks or authorises unlocking
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • B60R25/252Fingerprint recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/101Bluetooth
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/103Near field communication [NFC]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/108Encryption
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Mechanical Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application provides a kind of control method for vehicle and devices.The above method includes: to carry out key agreement with mobile terminal, obtains first key;It is decrypted using ciphertext of the first key to the device-fingerprint that above-mentioned mobile terminal is sent, obtains above equipment fingerprint;Above equipment fingerprint is compared with the device-fingerprint of storage;If comparing unanimously, vehicle control system is triggered.Implement the application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using the unaware authentication techniques after optimization, using near-field communication technology as medium, reaches and the targets such as the entrance of control vehicle, starting are authenticated by mobile terminal device, improve the safety of information transmission, ensured the privacy of car owner.

Description

A kind of control method for vehicle and device
Technical field
This application involves field of computer technology more particularly to a kind of control method for vehicle and device.
Background technique
As the improvement of people's living standards, automobile gradually comes into thousand ten thousand as a kind of important trip vehicles Family.Increasingly pay attention to the convenient control to vehicle to obtain more comfortable experience, automobile vendor by bus.
Traditional keyless entry and activation system (passive entry passive start, PEPS) need user to take Band automobile wireless key, it is especially inconvenient to go on a journey for car owner's summer.Emerging internet automobile connects remote service by mobile phone Device is to realize control vehicle, but network transmission, there are greater risk, information is easily intercepted by hacker, and automobile vendor's server can To collect owner information, car owner's privacy is invaded.
Summary of the invention
The application proposes a kind of control method for vehicle and device, mobile phone can be used to substitute orthodox car key, facilitate car owner It is carried;Reach using near-field communication technology as medium using the unaware authentication techniques after optimization and pass through mobile terminal device The targets such as the entrance of certification control vehicle, starting, improve the safety of information transmission, have ensured the privacy of car owner.
In a first aspect, the application proposes a kind of control method for vehicle, which comprises
Key agreement is carried out with mobile terminal, obtains first key;
It is decrypted using ciphertext of the first key to the device-fingerprint that the mobile terminal is sent, obtains described set Standby fingerprint;
The device-fingerprint is compared with the device-fingerprint of storage;
If comparing unanimously, vehicle control system is triggered.
In one possible implementation, described to carry out key agreement with mobile terminal, before obtaining first key, also Include:
The user password that the target terminal of decryption is sent is compared with the password of storage;
If comparing the ciphertext for unanimously receiving the device-fingerprint that the target terminal is sent.
In one possible implementation, the password of the target terminal by the decryption user password sent and storage Before being compared, further includes:
Key agreement is carried out with target terminal, obtains the second key;
The ciphertext of the user password sent using target terminal described in second key pair is decrypted, and the use is obtained Family password.
In one possible implementation, the triggering vehicle control system, comprising:
Detect the signal of the mobile terminal;
The signal of signal and setting based on the mobile terminal triggers threshold values, sends control instruction to the vehicle, For the control instruction for controlling the vehicle, the control instruction includes car door opening instruction, vehicle launch instruction.
Second aspect, the application propose a kind of control method for vehicle, which comprises
The collecting device fingerprinting-instruction that vehicle is sent is received, the collecting device fingerprinting-instruction includes the vehicle of the vehicle Identification number;
The vehicle identification number of the vehicle is compared with the vehicle identification number of storage;
If comparing unanimously, device-fingerprint is encrypted, the ciphertext of the device-fingerprint is obtained, the device-fingerprint is The unique identifier of mobile terminal;
The ciphertext of the device-fingerprint is sent to the vehicle.
In one possible implementation, before the collecting device fingerprinting-instruction for receiving vehicle transmission, further includes:
Target vehicle is sent to after user password is encrypted;
If the user password and the password of target vehicle storage compare unanimously, verification successful information, institute are received State the vehicle identification number that verification successful information includes the target vehicle.
The third aspect, the application propose a kind of controller of vehicle, comprising:
First negotiation element obtains first key for carrying out key agreement with mobile terminal;
First decryption unit, the ciphertext of the device-fingerprint for being sent using the first key to the mobile terminal into Row decryption, obtains the device-fingerprint;
First comparing unit, for the device-fingerprint to be compared with the device-fingerprint of storage;
If control unit triggers vehicle control system consistent for comparing.
In one possible implementation, described device further include:
Second comparing unit, for the user password of the target terminal transmission of decryption to be compared with the password of storage;
Receiving unit receives the ciphertext for the device-fingerprint that the target terminal is sent if consistent for comparing.
In one possible implementation, described device further include:
Second negotiation element obtains the second key for carrying out key agreement with target terminal;
Second decryption unit, the ciphertext of the user password for being sent using target terminal described in second key pair into Row decryption, obtains the user password.
In one possible implementation, described control unit is specifically used for detecting the signal of the mobile terminal;Base Threshold values is triggered in the signal of the mobile terminal and the signal of setting, control instruction is sent to the vehicle, the control refers to It enables for controlling the vehicle, the control instruction includes car door opening instruction, vehicle launch instruction.
Fourth aspect, the application propose a kind of controller of vehicle, comprising:
First receiving unit, for receiving the collecting device fingerprinting-instruction of vehicle transmission, the collecting device fingerprinting-instruction Vehicle identification number including the vehicle;
Comparing unit, for the vehicle identification number of the vehicle to be compared with the vehicle identification number of storage;
If device-fingerprint is encrypted consistent for comparing, obtains the ciphertext of the device-fingerprint by encryption unit, The device-fingerprint is the unique identifier of mobile terminal;
First transmission unit, for the ciphertext of the device-fingerprint to be sent to the vehicle.
In one possible implementation, described device further include:
Second transmission unit, for being sent to target vehicle after encrypting user password;
Second receiving unit connects if the password for the user password and target vehicle storage compares unanimously Verification successful information is received, the verification successful information includes the vehicle identification number of the target vehicle.
5th aspect, the application propose a kind of controller of vehicle, comprising: transceiver, processor and memory;The receipts Device, the processor and the memory is sent out to be connected with each other by bus;Wherein, the memory is for storing computer journey Sequence, the computer program include program instruction, and the processor is configured for calling described program instruction, execute such as first The method that aspect is proposed.
6th aspect, the application propose a kind of controller of vehicle, comprising: transceiver, processor and memory;The receipts Device, the processor and the memory is sent out to be connected with each other by bus;Wherein, the memory is for storing computer journey Sequence, the computer program include program instruction, and the processor is configured for calling described program instruction, execute such as second The method that aspect is proposed.
7th aspect, the application propose a kind of computer readable storage medium, the computer-readable recording medium storage There is computer program, the computer program includes program instruction, and described program instructs when being executed by a processor, makes the place Reason device executes the method that the various aspects are proposed.
Eighth aspect, the embodiment of the present application provide a kind of computer program product comprising program instruction, when it is being counted When being run on calculation machine, so that computer executes the method that the various aspects are proposed.
Implement the application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using the nothing after optimization Authentication techniques are perceived, using near-field communication technology as medium, reaches and the entrance of control vehicle, starting etc. is authenticated by mobile terminal device Target improves the safety of information transmission, has ensured the privacy of car owner.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes;
Fig. 2 is the flow chart for another control method for vehicle that the application proposes;
Fig. 3 is a kind of flow chart of the concrete application scene for control method for vehicle that the application proposes;
Fig. 4 is the flow chart for another control method for vehicle that the application proposes;
Fig. 5 is the flow chart for another control method for vehicle that the application proposes;
Fig. 6 is the flow chart of the concrete application scene for another control method for vehicle that the application proposes;
Fig. 7 is a kind of frame diagram for vehicle control system that the application proposes;
Fig. 8 is a kind of structural schematic diagram for controller of vehicle that the application proposes;
Fig. 9 is the structural schematic diagram for another controller of vehicle that the application proposes;
Figure 10 is the structural schematic diagram for another controller of vehicle that the application proposes;
Figure 11 is the structural schematic diagram for another controller of vehicle that the application proposes.
Specific embodiment
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, meaning Figure, which is to cover, non-exclusive includes.Such as contain the process, method, system, product or equipment of a series of steps or units It is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also Including other step or units intrinsic for these process, methods or equipment.
Existing keyless entry and activation system need user to carry automobile wireless key, go on a journey especially for car owner's summer It is inconvenient.Emerging internet automobile connects remote server by mobile phone to realize control vehicle, but network transmission exist compared with Risks, information are easily intercepted by hacker, and automobile vendor's server can collect owner information, invade car owner's privacy.
Fig. 1 is a kind of flow chart for control method for vehicle that the application proposes, the above method includes the following contents:
101, key agreement is carried out with mobile terminal, obtains first key.
Specifically, negotiating link communication key using cipher key agreement algorithm, communicating pair can get key.Key association Quotient's algorithm can use DH algorithm (Diffie-Hellman key exchange), which can allow communicating pair to obtain AES Key.
102, it is decrypted, is obtained using ciphertext of the above-mentioned first key to the device-fingerprint that above-mentioned mobile terminal is sent State device-fingerprint.
Specifically, being transferred to after the mobile terminal is encrypted the device-fingerprint of itself by above-mentioned first key Vehicle end, vehicle end are decrypted the ciphertext of the device-fingerprint received using above-mentioned first key, obtain the equipment and refer to Line.
Device-fingerprint, which refers to, can be used for equipment feature or unique device identification that unique identification goes out the equipment.Equipment The acquisition modes of fingerprint can be the CPU sequence number, baseband chip sequence number, memory chip sequence number, flash of mobile terminal The hardware informations such as chip serial number carry out Hash operation after splicing, refer to operation result as the Unique Device of the mobile terminal Line.
103, above equipment fingerprint is compared with the device-fingerprint of storage.
Specifically, the ciphertext of the device-fingerprint of storage is decrypted, the plaintext of the device-fingerprint stored.It will receive To the device-fingerprint of the mobile terminal be compared with the device-fingerprint of storage.
The device-fingerprint of storage is the device-fingerprint for the mobile terminal bound with the vehicle.Only with the vehicle The mobile terminal bound just has the control authority of the vehicle, to eliminate the control authority to the vehicle, need to unbind phase The mobile terminal answered.The purpose that device-fingerprint compares is to confirm whether the mobile terminal is the shifting with vehicle binding Dynamic terminal.
If 104, comparing unanimously, vehicle control system is triggered.
Specifically, the i.e. device-fingerprint of the mobile terminal and the device-fingerprint of storage is identical if comparing unanimously, then proving should Mobile terminal is the mobile terminal bound with the vehicle, has the control authority of the vehicle, triggers the control system of the vehicle System.If comparison is inconsistent, which is not bound with the vehicle, does not have the control authority of the vehicle, process knot Beam does not trigger vehicle control system.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter, The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 2 is the flow chart for another control method for vehicle that the application proposes, the above method includes the following contents:
201, key agreement is carried out with target terminal, obtains the second key.
Specifically, the safety in order to guarantee information transmission, by key agreement, the key of each link communication is different 's.Key agreement can use DH algorithm, and communicating pair is made to obtain AES key.
202, the ciphertext of the user password sent using the above-mentioned target terminal of above-mentioned second key pair is decrypted, and is obtained State user password.
Specifically, target terminal encrypts user password according to the second key consulted, ciphertext is transferred to vehicle .Vehicle is decrypted using above-mentioned second key pair ciphertext, obtains the user password.
203, the user password that the target terminal of decryption is sent is compared with the password of storage.
Specifically, the password of storage by root password after Hash operation, encrypted transmission gives the vehicle, then decrypts write-in ROM hardware store can not modify after password write-in.
Implementing the step is to detect whether target terminal has the permission bound with the vehicle.The target is whole after binding End can control the vehicle.
If 204, comparing the ciphertext for unanimously receiving the device-fingerprint that above-mentioned target terminal is sent.
Specifically, the target terminal has the permission bound with the vehicle if comparing unanimously, target end is received Hold the ciphertext of the device-fingerprint sent.If comparison is inconsistent, which does not have corresponding authority, and process terminates.Equipment Fingerprint, which refers to, can be used for equipment feature or unique device identification that unique identification goes out the equipment.In order to guarantee that information is transmitted Safety, encrypted device-fingerprint is transferred to the vehicle by target terminal.
The vehicle stores information using key-value form, and wherein key is the vehicle identification number of the vehicle, and value is The device-fingerprint information of the target terminal received.Unique identification using vehicle identification number as vehicle, can be to avoid The inconsistent problem of caused information of vehicles after the replacement such as hardware circuit or engine.
205, key agreement is carried out with mobile terminal, obtains first key.
Specifically, after mobile terminal is close to vehicle, if the bluetooth of mobile terminal, WiFi, nfc, baseband signal etc. is strong After the weak signal transducer threshold values for reaching the vehicle, the vehicle automatic trigger identifying procedure.If the mobile terminal receives the vehicle Send vehicle identification number and be verified, then the mobile terminal may have the control authority of the vehicle.The vehicle with The mobile terminal carries out key agreement, obtains first key.
206, it is decrypted, is obtained using ciphertext of the above-mentioned first key to the device-fingerprint that above-mentioned mobile terminal is sent State device-fingerprint.
Specifically, the mobile terminal encrypts device-fingerprint and is transferred to the vehicle using above-mentioned first key.It should Vehicle is decrypted the ciphertext received using the above-mentioned first key consulted, obtains the device-fingerprint of the mobile terminal.
207, above equipment fingerprint is compared with the device-fingerprint of storage.
Specifically, in order to detect whether the mobile terminal is bound with the vehicle, if the control with the vehicle Limit, the device-fingerprint of the mobile terminal received is compared with the device-fingerprint of storage.
If 208, comparing unanimously, the signal of above-mentioned mobile terminal is detected.
Specifically, the mobile terminal has the control authority of the vehicle if comparing unanimously, the control system of the vehicle is triggered System, detects the signal of the mobile terminal.If comparison is inconsistent, illustrate that the mobile terminal does not have the control authority of the vehicle, Process terminates, and does not trigger vehicle control system.
209, the signal of signal and setting based on above-mentioned mobile terminal triggers threshold values, sends control to above-mentioned vehicle and refers to It enables.
Specifically, above-mentioned control instruction, for controlling the vehicle, which includes car door opening instruction, vehicle Enabled instruction.The signal of the vehicle detection mobile terminal issues car door and opens if the signal strength reaches default first threshold values Instruction is opened, car door opening instruction opens car door for controlling the vehicle;If signal strength reaches default second threshold values, issue Vehicle launch instruction, the vehicle launch are instructed for controlling the vehicle launch engine.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter, The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 3 is a kind of flow chart of the concrete application scene for control method for vehicle that the application proposes, the above method includes The following contents:
301, key agreement is carried out with target terminal, obtains the second key.
For example, key agreement is carried out using DH algorithm and target terminal, both sides obtain AES key.The AES key is For the second key.
302, the ciphertext of the user password sent using the above-mentioned target terminal of above-mentioned second key pair is decrypted, and is obtained State user password.
For example, target terminal encrypts user password according to the second key consulted, and ciphertext is transferred to Vehicle.Vehicle is decrypted using above-mentioned second key pair ciphertext, obtains the user password.
303, the user password that the target terminal of decryption is sent is compared with the password of storage.
For example, user inputs root password on mobile phone, which passes through sha3 Hash operation, assists using with vehicle The good key of quotient encrypts, and is transferred to the vehicle.Good key pair ciphertext is decrypted the vehicle through consultation, after decryption Cleartext information be user's root password sha3 cryptographic Hash, which enters a ROM hardware store.By the target of decryption The user password that terminal is sent is compared with the password of storage.
If 304, comparing the ciphertext for unanimously receiving the device-fingerprint that above-mentioned target terminal is sent.
For example, if comparing unanimously, back-checking successful information, the verification successful information carries the vehicle of the vehicle Identification number.After target terminal receives verification successful information, the vehicle identification number of the vehicle is stored.Target terminal is by CPU Sha3 is carried out after the splicing of the hardware informations such as sequence number, baseband chip sequence number, memory chip sequence number, flash chip sequence number Hash operation, Unique Device fingerprint of the result as the target terminal.What vehicle reception target terminal was sent passes through AES chain The encrypted device-fingerprint in road.
305, key agreement is carried out with mobile terminal, obtains first key.
For example, after mobile terminal is close to vehicle, if the bluetooth of mobile terminal, WiFi, nfc, baseband signal etc. After power reaches the signal transducer threshold values of the vehicle, the vehicle automatic trigger identifying procedure.If the mobile terminal receives this The vehicle identification number of vehicle transmission is simultaneously verified, then the mobile terminal may have the control authority of the vehicle.The vehicle Key agreement is carried out with the mobile terminal, obtains first key.
306, it is decrypted, is obtained using ciphertext of the above-mentioned first key to the device-fingerprint that above-mentioned mobile terminal is sent State device-fingerprint.
For example, which encrypts device-fingerprint according to the first key consulted, is transferred to the vehicle , which is decrypted the ciphertext of the device-fingerprint using the first key, obtains the device-fingerprint.
307, above equipment fingerprint is compared with the device-fingerprint of storage.
For example, the device-fingerprint of storage is decrypted, obtains the plaintext of device-fingerprint, the equipment of the storage is referred to The plaintext of line is compared with the device-fingerprint of the mobile terminal received.
If 308, comparing unanimously, the signal of above-mentioned mobile terminal is detected.
For example, if comparing unanimously, which is the car key of the vehicle, has the control of the vehicle Limit, triggers the control system of the vehicle, detects the signal of the mobile terminal.If comparison is inconsistent, illustrate the mobile terminal not Has the control authority of the vehicle, process terminates, and does not trigger vehicle control system.
309, the signal of signal and setting based on above-mentioned mobile terminal triggers threshold values, sends control to above-mentioned vehicle and refers to It enables.
For example, the signal of the vehicle detection mobile terminal issues if the signal strength reaches default first threshold values Car door opening instruction, car door opening instruction open car door for controlling the vehicle;If signal strength reaches default second threshold values, Vehicle launch instruction is then issued, which instructs for controlling the vehicle launch engine.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter, The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 4 is the flow chart for another control method for vehicle that the application proposes, the above method includes the following contents:
401, the collecting device fingerprinting-instruction that vehicle is sent is received.
Specifically, when mobile terminal is close to vehicle, if the bluetooth of mobile terminal, WiFi, nfc, baseband signal etc. is strong It is weak, after reaching signals of vehicles sensor threshold values, automatic trigger identifying procedure.Vehicle broadcasts collecting device fingerprinting-instruction, the collection Device-fingerprint instructs the vehicle identification number that can carry the vehicle.
Device-fingerprint, which refers to, can be used for equipment feature or unique device identification that unique identification goes out the equipment.Equipment The acquisition modes of fingerprint can be the CPU sequence number, baseband chip sequence number, memory chip sequence number, flash of mobile terminal The hardware informations such as chip serial number carry out Hash operation after splicing, refer to operation result as the Unique Device of the mobile terminal Line.
Vehicle identification number, abbreviation VIN, be one group by 17 English arrays at one group on automobile is unique Number, can identify the data such as manufacturer, engine, chassis serial number and other performances of automobile.
402, the vehicle identification number of above-mentioned vehicle is compared with the vehicle identification number of storage.
Specifically, when encrypted root password is sent to target vehicle by mobile terminal, if target vehicle is decrypted and tested Card password passes through, then target vehicle sends verification successful information to mobile terminal, which can carry the target The vehicle identification number of vehicle.Mobile terminal stores the vehicle identification number of the target vehicle received.In order to determine Whether the vehicle of communication connection is preset target vehicle, need to detect the vehicle identification number of the vehicle, therefore by the vehicle Vehicle identification number is compared with the vehicle identification number of storage.
If 403, comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of above equipment fingerprint.
Specifically, the vehicle of the communication connection may be preset target vehicle if comparing consistent, mobile terminal with should Vehicle carries out key agreement, is encrypted using the device-fingerprint of the key pair mobile terminal consulted, obtains the device-fingerprint Ciphertext, above equipment fingerprint be the mobile terminal unique identifier.
404, the ciphertext of above equipment fingerprint is sent to above-mentioned vehicle.
The purpose for implementing the step is to finally detect whether the mobile terminal is the vehicle " key ", if is had The control authority of the vehicle.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter, The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 5 is the flow chart for another control method for vehicle that the application proposes, the above method includes the following contents:
501, target vehicle is sent to after encrypting user password.
Specifically, mobile terminal and target vehicle key agreement, are obtained key, are added using the key pair user password It is close, and it is sent to target vehicle.
If 502, above-mentioned user password and the password of above-mentioned target vehicle storage compare unanimously, receives to verify and successfully believe Breath.
Specifically, user inputs root password on mobile terminals, which utilizes negotiation into sha3 Hash operation excessively Good key is encrypted to obtain root ciphertext.Mobile terminal sends root password write instruction to target vehicle, which takes Band root ciphertext.It after target vehicle receives root ciphertext, is decrypted using the key consulted, the cleartext information after decryption For the sha3 cryptographic Hash of user's root password, which is entered into a ROM hardware store, can not be carried out more after password write-in Change.If user password and the password of vehicle storage compare unanimously, which is the target vehicle of mobile terminal, receives the vehicle The verification successful information of transmission, the verification successful information carry the vehicle identification number of above-mentioned target vehicle.If comparison is inconsistent, The password for then illustrating that user password and target vehicle store is inconsistent, and process terminates, and does not receive verification successful information.
503, the collecting device fingerprinting-instruction that vehicle is sent is received.
Specifically, mobile terminal, after vehicle, the power of bluetooth, WiFi, nfc, base-band information of mobile terminal etc. reaches To after the threshold values of signals of vehicles sensor, automatic trigger identifying procedure, mobile terminal receives the collecting device fingerprint that vehicle is sent Instruction, above-mentioned collecting device fingerprinting-instruction can carry the vehicle identification number of the vehicle.
504, the vehicle identification number of above-mentioned vehicle is compared with the vehicle identification number of storage.
Specifically, the purpose for implementing the step is to judge whether the vehicle is target vehicle with mobile terminal binding.
If 505, comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of above equipment fingerprint.
Specifically, the vehicle may be the target vehicle with mobile terminal binding if comparing unanimously, carried out with the vehicle Key agreement is encrypted device-fingerprint using the key consulted.Above equipment fingerprint is the unique identification of mobile terminal Code.
506, the ciphertext of above equipment fingerprint is sent to above-mentioned vehicle.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter, The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
Fig. 6 is the flow chart of the concrete application scene for another control method for vehicle that the application proposes, above method packet Include the following contents:
601, target vehicle is sent to after encrypting user password.
For example, mobile terminal carries out key agreement using DH algorithm and target vehicle, obtains AES key, utilizes this AES key encrypts user password, and is transferred to target vehicle.
If 602, above-mentioned user password and the password of above-mentioned target vehicle storage compare unanimously, receives to verify and successfully believe Breath.
For example, target vehicle is carried out using ciphertext of the above-mentioned AES key consulted to the user password received Decryption, the user password after decryption is compared with the password of storage, if compare it is consistent, to mobile terminal send verification at Function information.Mobile terminal receives verification successful information, which carries the vehicle identification number of the target vehicle.
603, the collecting device fingerprinting-instruction that vehicle is sent is received.
For example, mobile terminal is after vehicle, the power of bluetooth, WiFi, nfc, base-band information of mobile terminal etc. After the threshold values for reaching signals of vehicles sensor, automatic trigger identifying procedure, mobile terminal receives the collecting device that vehicle is sent and refers to Line instruction, above-mentioned collecting device fingerprinting-instruction can carry the vehicle identification number of the vehicle.
604, the vehicle identification number of above-mentioned vehicle is compared with the vehicle identification number of storage.
The purpose for implementing the step is to judge whether the vehicle is target vehicle with mobile terminal binding.
If 605, comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of above equipment fingerprint.
For example, if comparing unanimously, which may be the target vehicle with mobile terminal binding, using DH algorithm Key agreement is carried out with the vehicle, AES key is obtained, device-fingerprint is encrypted using above-mentioned AES key, obtain equipment and refer to The ciphertext of line.
606, the ciphertext of above equipment fingerprint is sent to above-mentioned vehicle.
Implement the embodiment of the present application, orthodox car key can be substituted with mobile phone, car owner is facilitated to carry;Using optimization Unaware authentication techniques afterwards, using near-field communication technology as medium, reach by mobile terminal device authenticate control vehicle enter, The targets such as starting improve the safety of information transmission, have ensured the privacy of car owner.
In one preferred embodiment of the application, a kind of control method for vehicle and device are related to, can be replaced with mobile phone For orthodox car key, car owner is facilitated to carry;It is matchmaker with near-field communication technology using the unaware authentication techniques after optimization It is situated between, reaches and the targets such as the entrance of control vehicle, starting are authenticated by mobile terminal device, improve the safety of information transmission, protect The privacy of car owner is hindered.
Referring to Fig. 7, Fig. 7 is a kind of frame diagram of vehicle control system provided by the embodiments of the present application.As shown in fig. 7, The vehicle control system includes but is not limited to vehicle 1 and mobile terminal 2.Vehicle 1 and mobile terminal 2 communicate to connect, and the application is real It applies example and uniqueness restriction is not made for the communication connection mode between the vehicle 1 and the mobile terminal 2.
The control flow of the vehicle control system may include three phases: root authority control, mobile terminal binding solution It ties up, the practical control of vehicle.
The stage is controlled in root authority, vehicle 1 and mobile terminal 2 communicate to connect, and connection type is unlimited.Vehicle 1 and movement Key agreement is carried out using DH algorithm between terminal 2, obtains AES key.The DH algorithm can guarantee the secure interactive of data.With Family inputs root password on mobile terminal 2, the root password pass through sha3 Hash operation, using the AES key consulted into Row encryption, obtains root ciphertext.Mobile terminal 2 sends root password write instruction to vehicle 1, which carries root ciphertext. Root password needs user to remember.After vehicle 1 receives root ciphertext, ciphertext is decrypted using above-mentioned AES key, is decrypted Cleartext information afterwards is the sha3 cryptographic Hash of root password, which is entered a ROM hardware store, can not after information write-in It modifies.
The stage is unbinded in mobile terminal binding, key agreement is carried out using DH algorithm between vehicle 1 and mobile terminal 2, is obtained To AES key.Key agreement is re-started, guarantees that the key in each link communication is different.User is defeated in mobile terminal 2 Enter root password to be encrypted after root password is carried out sha3 Hash operation by mobile terminal 2 using the key consulted, it will Ciphertext is sent to vehicle 1.After vehicle 1 receives root ciphertext, it is decrypted using the key pair ciphertext consulted, after decryption Cleartext information and a ROM in the password that stores be compared, if comparison result is consistent, then it represents that authorization check passes through, and returns Verification successful information is returned, which carries the vehicle identification number of vehicle 1, if comparison result is inconsistent, then it represents that Cryptographic check failure, process terminate.After mobile terminal 2 receives verification successful information, by the identification of the vehicle of the vehicle 1 of carrying Code stores.Mobile terminal 2 is by itself CPU sequence number, baseband chip sequence number, memory chip sequence number, flash chip The hardware informations such as sequence number carry out sha3 Hash operation, as a result as the Unique Device fingerprint of the mobile terminal 2 after splicing.It will Device-fingerprint is transferred to vehicle 1 after carrying out AES link encryption.Vehicle 1 stores information using key-value form.Wherein, key For the vehicle identification number of the vehicle 1, value is the device-fingerprint information for receiving mobile terminal 2.Handset binding process knot Beam.Unbundlings process: after root password is verified, the device-fingerprint of the corresponding mobile terminal 2 of vehicle 1 is deleted, unbundlings are completed.
In the vehicle practical control stage, mobile terminal 2 after vehicle, according to the bluetooth of mobile terminal 2, WiFi, nfc, The power of base-band information etc., after reaching 1 signal transducer threshold values of vehicle, automatic trigger identifying procedure, vehicle 1 broadcasts collecting device Fingerprinting-instruction, the instruction carry the vehicle identification number of vehicle 1.Mobile terminal 2 near field receives collecting device fingerprinting-instruction Afterwards, the vehicle identification number wherein carried is extracted, is matched with the vehicle identification number of the mobile terminal 2 storage, if matching Failure, then mobile terminal 2 is done nothing, and process terminates, if successful match, which may be vehicle 1 Key.Vehicle 1 and mobile terminal 2 carry out key agreement, obtain key.Mobile terminal 2 obtains itself device-fingerprint, acquisition modes It is identical as the binding stage, vehicle 1 is transferred to after device-fingerprint is carried out link encryption.Vehicle 1 by the device-fingerprint received with The key-value data being locally stored are compared, and comparing successfully then indicates that mobile terminal 2 is legal key, if comparing not Success, then mobile terminal 2 does not have the control authority of vehicle 1, and process terminates.Different certification triggering threshold values is arranged in vehicle 1.When When the signal strength of mobile terminal 2 reaches threshold values 1, vehicle 1 issues car door opening instruction, opens the car door of vehicle 1;When mobile whole When the signal strength at end 2 reaches threshold values 2, vehicle 1 issues vehicle launch instruction, starts the engine of vehicle 1.
Fig. 8 is a kind of structural schematic diagram for controller of vehicle that the application proposes, above-mentioned apparatus includes:
First negotiation element 801 obtains first key for carrying out key agreement with mobile terminal;
First decryption unit 802, device-fingerprint for being sent using above-mentioned first key to above-mentioned mobile terminal it is close Text is decrypted, and obtains above equipment fingerprint;
First comparing unit 803, for above equipment fingerprint to be compared with the device-fingerprint of storage;
If control unit 804 triggers vehicle control system consistent for comparing.
As shown in figure 8, above-mentioned apparatus further include:
Second comparing unit 805, for comparing the user password of target terminal transmission of decryption and the password of storage It is right;
Receiving unit 806 receives the ciphertext for the device-fingerprint that above-mentioned target terminal is sent if consistent for comparing.
Further, above-mentioned apparatus further include:
Second negotiation element 807 obtains the second key for carrying out key agreement with target terminal;
Second decryption unit 808, for the close of the user password using the above-mentioned target terminal transmission of above-mentioned second key pair Text is decrypted, and obtains above-mentioned user password.
Further, above-mentioned control unit 804 is specifically used for detecting the signal of above-mentioned mobile terminal;Based on above-mentioned mobile whole The signal at end and the signal of setting trigger threshold values, send control instruction to above-mentioned vehicle, above-mentioned control instruction is used for above-mentioned Vehicle is controlled, and above-mentioned control instruction includes car door opening instruction, vehicle launch instruction.
It is understood that the specific implementation of controller of vehicle shown in Fig. 8 reference may also be made to Fig. 1, Fig. 2 and shown in Fig. 3 Method is no longer described in detail one by one here.
In the embodiment of the present application, the first negotiation element 801 carries out key agreement with mobile terminal, obtains first key; First decryption unit 802 is decrypted the ciphertext for the device-fingerprint that above-mentioned mobile terminal is sent using above-mentioned first key, obtains To above equipment fingerprint;Above equipment fingerprint is compared first comparing unit 803 with the device-fingerprint of storage;If comparing one It causes, then control unit 804 triggers vehicle control system.As it can be seen that the embodiment of the present application can substitute orthodox car key with mobile phone, Car owner is facilitated to carry;Reach using near-field communication technology as medium using the unaware authentication techniques after optimization and pass through movement Terminal device authentication controls the targets such as vehicle entrance, starting, improves the safety of information transmission, has ensured the privacy of car owner.
Fig. 9 is the structural schematic diagram for another controller of vehicle that the application proposes, above-mentioned apparatus includes:
First receiving unit 901, for receiving the collecting device fingerprinting-instruction of vehicle transmission, above-mentioned collecting device fingerprint refers to Enable the vehicle identification number including above-mentioned vehicle;
Comparing unit 902, for the vehicle identification number of above-mentioned vehicle to be compared with the vehicle identification number of storage;
If encryption unit 903 encrypts device-fingerprint consistent for comparing, and obtains the close of above equipment fingerprint Text, above equipment fingerprint are the unique identifier of mobile terminal;
First transmission unit 904, for the ciphertext of above equipment fingerprint to be sent to above-mentioned vehicle.
As shown in figure 9, above-mentioned apparatus further include:
Second transmission unit 905, for being sent to target vehicle after encrypting user password;
Second receiving unit 906, if the password for above-mentioned user password and the storage of above-mentioned target vehicle compares unanimously, Verification successful information is received, above-mentioned verification successful information includes the vehicle identification number of above-mentioned target vehicle.
It is understood that the specific implementation of controller of vehicle shown in Fig. 9 reference may also be made to Fig. 4, Fig. 5 and shown in fig. 6 Method is no longer described in detail one by one here.
In the embodiment of the present application, the first receiving unit 901 receives the collecting device fingerprinting-instruction that vehicle is sent, above-mentioned receipts Collect the vehicle identification number that device-fingerprint instruction includes above-mentioned vehicle;Comparing unit 902 is by the vehicle identification number of above-mentioned vehicle It is compared with the vehicle identification number of storage;If comparing unanimously, encryption unit 903 encrypts device-fingerprint, obtains The ciphertext of above equipment fingerprint, above equipment fingerprint are the unique identifier of mobile terminal;First transmission unit 904 is set above-mentioned The ciphertext of standby fingerprint is sent to above-mentioned vehicle.As it can be seen that the embodiment of the present application, can substitute orthodox car key with mobile phone, it is convenient Car owner carries;Reach using near-field communication technology as medium using the unaware authentication techniques after optimization and pass through mobile terminal The targets such as the entrance of equipment certification control vehicle, starting, improve the safety of information transmission, have ensured the privacy of car owner.
Referring to Fig. 10, Figure 10 is a kind of structural schematic diagram of controller of vehicle provided by the embodiments of the present application, the dress Setting includes: at least one processor 1001, such as central processing unit (central processing unit, CPU), and at least one A memory 1002, at least one transceiver 1003 and at least one bus 1004.Wherein, above-mentioned bus 1004 can be one group Parallel data line, for realizing the interconnection of above-mentioned processor 1001, above-mentioned memory 1002 and above-mentioned transceiver 1003; Above-mentioned memory 1002 can be high-speed random access memory (random access memory, RAM), be also possible to non-easy The property lost memory (non-volatile memory), for example, at least a read-only memory (read only memory, ROM).
Specifically, above-mentioned processor 1001 carries out key agreement with mobile terminal, first key is obtained;Above-mentioned processor 1001 are decrypted the ciphertext for the device-fingerprint that above-mentioned mobile terminal is sent using above-mentioned first key, obtain above equipment and refer to Line;Above equipment fingerprint is compared above-mentioned processor 1001 with the device-fingerprint of storage;If comparing consistent, above-mentioned processing Device 1001 triggers vehicle control system.
Further, the user password that above-mentioned processor 1001 sends the target terminal of decryption and the password of storage carry out It compares;If comparing unanimously, above-mentioned transceiver 1003 receives the ciphertext for the device-fingerprint that above-mentioned target terminal is sent.
Further, above-mentioned processor 1001 carries out key agreement with target terminal, obtains the second key;Above-mentioned processor The ciphertext of 1001 user passwords sent using the above-mentioned target terminal of above-mentioned second key pair is decrypted, and it is close to obtain above-mentioned user Code.
Further, above-mentioned processor 1001 detects the signal of above-mentioned mobile terminal;Above-mentioned processor 1001 is based on above-mentioned The signal of mobile terminal and the signal of setting trigger threshold values, send control instruction to above-mentioned vehicle, above-mentioned control instruction is used for Above-mentioned vehicle is controlled, above-mentioned control instruction includes car door opening instruction, vehicle launch instruction.
Specifically, can store program instruction in above-mentioned memory 1002, above-mentioned processor 1001 can be used for caller Instruction execution Fig. 1, Fig. 2 and method shown in Fig. 3.
Figure 11 is please referred to, Figure 11 is the structural schematic diagram of another controller of vehicle provided by the embodiments of the present application, should Equipment includes: at least one processor 1101, such as central processing unit (central processing unit, CPU), at least One memory 1102, at least one transceiver 1103 and at least one bus 1104.Wherein, above-mentioned bus 1104 can be one The parallel data line of group, for realizing the mutually interconnection of above-mentioned processor 1101, above-mentioned memory 1102 and above-mentioned transceiver 1103 It connects;Above-mentioned memory 1102 can be high-speed random access memory (random access memory, RAM), be also possible to Nonvolatile memory (non-volatile memory), for example, at least read-only memory (read only memory, ROM)。
Specifically, above-mentioned transceiver 1103 receives the collecting device fingerprinting-instruction that vehicle is sent, above-mentioned collecting device fingerprint Instruction includes the vehicle identification number of above-mentioned vehicle;Above-mentioned processor 1101 by the vehicle identification number of above-mentioned vehicle and storage Vehicle identification number is compared;If comparing unanimously, above-mentioned processor 1101 encrypts device-fingerprint, obtains above-mentioned sets The ciphertext of standby fingerprint, above equipment fingerprint are the unique identifier of mobile terminal;Above-mentioned transceiver 1103 is by above equipment fingerprint Ciphertext be sent to above-mentioned vehicle.
Further, above-mentioned processor 1101 is sent to target vehicle after encrypting user password;If above-mentioned user password Compared unanimously with the password of above-mentioned target vehicle storage, then above-mentioned transceiver 1103, which receives, verifies successful information, above-mentioned verification at Function information includes the vehicle identification number of above-mentioned target vehicle.
Specifically, can store program instruction in above-mentioned memory 1102, above-mentioned processor 1101 can be used for caller Instruction execution Fig. 4, Fig. 5 and method shown in fig. 6.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in computer readable storage medium, and storage is situated between Matter include read-only memory (read only memory, ROM), random access memory (random access memory, RAM), Programmable read only memory (programmable read only memory, PROM), Erasable Programmable Read Only Memory EPROM (erasable programmable read only memory, EPROM), disposable programmable read-only memory (one-time Programmable read-only memory, OTPROM), the electronics formula of erasing can make carbon copies read-only memory (electrically-erasable programmable read-only memory, EEPROM), CD-ROM (compact Disc read-only memory, CD-ROM) or other disc memories, magnetic disk storage, magnetic tape storage or can For carrying or any other computer-readable medium of storing data.
A kind of control method for vehicle and device disclosed in the embodiment of the present application are described in detail above, answered herein With specific case, the principle and implementation of this application are described, and the explanation of above example is only intended to help to manage Solve the present processes and its core concept;At the same time, for those skilled in the art, according to the thought of the application, In There will be changes in specific embodiment and application range.In conclusion the content of the present specification should not be construed as to this Shen Limitation please.

Claims (10)

1. a kind of control method for vehicle, which is characterized in that the described method includes:
Key agreement is carried out with mobile terminal, obtains first key;
It is decrypted using ciphertext of the first key to the device-fingerprint that the mobile terminal is sent, obtains the equipment and refer to Line;
The device-fingerprint is compared with the device-fingerprint of storage;
If comparing unanimously, vehicle control system is triggered.
2. obtaining first the method according to claim 1, wherein described carry out key agreement with mobile terminal Before key, further includes:
The user password that the target terminal of decryption is sent is compared with the password of storage;
If comparing the ciphertext for unanimously receiving the device-fingerprint that the target terminal is sent.
3. according to the method described in claim 2, it is characterized in that, the user password that sends of the target terminal by decryption with Before the password of storage is compared, further includes:
Key agreement is carried out with target terminal, obtains the second key;
The ciphertext of the user password sent using target terminal described in second key pair is decrypted, and it is close to obtain the user Code.
4. according to claim 1 to method described in 3 any one, which is characterized in that the triggering vehicle control system, packet It includes:
Detect the signal of the mobile terminal;
The signal of signal and setting based on the mobile terminal triggers threshold values, sends control instruction to the vehicle, described For control instruction for controlling the vehicle, the control instruction includes car door opening instruction, vehicle launch instruction.
5. a kind of control method for vehicle, which is characterized in that the described method includes:
The collecting device fingerprinting-instruction that vehicle is sent is received, the collecting device fingerprinting-instruction includes the vehicle identification of the vehicle Number;
The vehicle identification number of the vehicle is compared with the vehicle identification number of storage;
If comparing unanimously, device-fingerprint is encrypted, obtains the ciphertext of the device-fingerprint, the device-fingerprint is movement The unique identifier of terminal;
The ciphertext of the device-fingerprint is sent to the vehicle.
6. according to the method described in claim 5, it is characterized in that, it is described receive vehicle send collecting device fingerprinting-instruction it Before, further includes:
Target vehicle is sent to after user password is encrypted;
If the user password and the password of target vehicle storage compare unanimously, verification successful information, the school are received Test the vehicle identification number that successful information includes the target vehicle.
7. a kind of controller of vehicle characterized by comprising
First negotiation element obtains first key for carrying out key agreement with mobile terminal;
First decryption unit, for being solved using the first key to the ciphertext for the device-fingerprint that the mobile terminal is sent It is close, obtain the device-fingerprint;
First comparing unit, for the device-fingerprint to be compared with the device-fingerprint of storage;
If control unit triggers vehicle control system consistent for comparing.
8. a kind of controller of vehicle characterized by comprising
First receiving unit, for receiving the collecting device fingerprinting-instruction of vehicle transmission, the collecting device fingerprinting-instruction includes The vehicle identification number of the vehicle;
Comparing unit, for the vehicle identification number of the vehicle to be compared with the vehicle identification number of storage;
If device-fingerprint is encrypted consistent for comparing, obtains the ciphertext of the device-fingerprint by encryption unit, described Device-fingerprint is the unique identifier of mobile terminal;
First transmission unit, for the ciphertext of the device-fingerprint to be sent to the vehicle.
9. a kind of controller of vehicle, which is characterized in that including processor, memory and transceiver;The processor described is deposited Reservoir and the transceiver are connected with each other by bus;Wherein, the memory is for storing computer program, the calculating Machine program includes program instruction, and the processor is configured for calling described program instruction, executes Claims 1-4 such as and appoints Method described in one.
10. a kind of controller of vehicle, which is characterized in that including processor, memory and transceiver;It is the processor, described Memory and the transceiver are connected with each other by bus;Wherein, the memory is for storing computer program, the meter Calculation machine program includes program instruction, and the processor is configured for calling described program instruction, executes such as claim 5 to 6 Described in any item methods.
CN201910628589.2A 2019-07-12 2019-07-12 A kind of control method for vehicle and device Pending CN110406498A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910628589.2A CN110406498A (en) 2019-07-12 2019-07-12 A kind of control method for vehicle and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910628589.2A CN110406498A (en) 2019-07-12 2019-07-12 A kind of control method for vehicle and device

Publications (1)

Publication Number Publication Date
CN110406498A true CN110406498A (en) 2019-11-05

Family

ID=68361204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910628589.2A Pending CN110406498A (en) 2019-07-12 2019-07-12 A kind of control method for vehicle and device

Country Status (1)

Country Link
CN (1) CN110406498A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110861608A (en) * 2019-11-19 2020-03-06 苏州寰天汽车电子科技有限公司 Automatic induction anti-theft method for vehicle-mounted Bluetooth matched with smart phone
CN112867082A (en) * 2020-12-09 2021-05-28 国网宁夏电力有限公司检修公司 Method, medium and system for acquiring secure multi-hop transmission path of wireless sensor network
CN115565268A (en) * 2022-08-30 2023-01-03 星汉智能科技股份有限公司 Automobile control method and system based on wireless automobile key, electronic equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102923092A (en) * 2012-11-14 2013-02-13 北京小米科技有限责任公司 Method, control equipment, mobile terminal and system for controlling automobiles
CN104424779A (en) * 2013-08-30 2015-03-18 比亚迪股份有限公司 System and method for controlling vehicle by virtue of mobile terminal
CN105644501A (en) * 2015-12-30 2016-06-08 小米科技有限责任公司 Method, device and terminal for remote control of automobile
CN106274807A (en) * 2016-08-31 2017-01-04 杭州联络互动信息科技股份有限公司 Automobile intelligent control method based on mobile terminal and device
CN106792440A (en) * 2016-11-29 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of method of opening car door, mobile terminal, car-mounted terminal and system
KR20190010834A (en) * 2017-07-23 2019-01-31 김소현 cellphone key
DE102017216029A1 (en) * 2017-09-12 2019-03-14 Continental Automotive Gmbh Access and start system and access and start verification procedures
CN109600347A (en) * 2017-09-30 2019-04-09 比亚迪股份有限公司 Control method, device, mobile terminal and the vehicle of vehicle
EP3483844A1 (en) * 2017-11-13 2019-05-15 Toyota Jidosha Kabushiki Kaisha Key information sharing system, delivery device and user terminal
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
CN110194123A (en) * 2019-06-28 2019-09-03 广州小鹏汽车科技有限公司 Vehicle starting method and system, vehicle under a kind of no key status

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102923092A (en) * 2012-11-14 2013-02-13 北京小米科技有限责任公司 Method, control equipment, mobile terminal and system for controlling automobiles
CN104424779A (en) * 2013-08-30 2015-03-18 比亚迪股份有限公司 System and method for controlling vehicle by virtue of mobile terminal
CN105644501A (en) * 2015-12-30 2016-06-08 小米科技有限责任公司 Method, device and terminal for remote control of automobile
CN106274807A (en) * 2016-08-31 2017-01-04 杭州联络互动信息科技股份有限公司 Automobile intelligent control method based on mobile terminal and device
CN106792440A (en) * 2016-11-29 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of method of opening car door, mobile terminal, car-mounted terminal and system
KR20190010834A (en) * 2017-07-23 2019-01-31 김소현 cellphone key
DE102017216029A1 (en) * 2017-09-12 2019-03-14 Continental Automotive Gmbh Access and start system and access and start verification procedures
CN109600347A (en) * 2017-09-30 2019-04-09 比亚迪股份有限公司 Control method, device, mobile terminal and the vehicle of vehicle
EP3483844A1 (en) * 2017-11-13 2019-05-15 Toyota Jidosha Kabushiki Kaisha Key information sharing system, delivery device and user terminal
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
CN110194123A (en) * 2019-06-28 2019-09-03 广州小鹏汽车科技有限公司 Vehicle starting method and system, vehicle under a kind of no key status

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110861608A (en) * 2019-11-19 2020-03-06 苏州寰天汽车电子科技有限公司 Automatic induction anti-theft method for vehicle-mounted Bluetooth matched with smart phone
CN112867082A (en) * 2020-12-09 2021-05-28 国网宁夏电力有限公司检修公司 Method, medium and system for acquiring secure multi-hop transmission path of wireless sensor network
CN112867082B (en) * 2020-12-09 2022-12-23 国网宁夏电力有限公司检修公司 Method, medium and system for acquiring secure multi-hop transmission path of wireless sensor network
CN115565268A (en) * 2022-08-30 2023-01-03 星汉智能科技股份有限公司 Automobile control method and system based on wireless automobile key, electronic equipment and storage medium
CN115565268B (en) * 2022-08-30 2024-04-05 星汉智能科技股份有限公司 Automobile control method and system based on wireless automobile key, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
KR102285551B1 (en) A physical key for provisioning a communication device with data that enables access to vehicle resources.
CN108122311B (en) Vehicle virtual key implementation method and system
CN103477666B (en) Mobile device is connected, is connected to vehicle and the cloud service of internet
EP3648396B1 (en) Maintenance system and maintenance method
US9268951B2 (en) Method and system for enabling a technical apparatus
CN111447601B (en) Implementation method and device of automobile Bluetooth key
CN107650863A (en) Vehicle sharing method and system
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
CN108235291A (en) A kind of safety certification device and method for vehicle anti-theft
CN110103883B (en) Vehicle key control method and device
JP2018506208A (en) Method for automatic recognition between a mobile device and a motor vehicle operable according to the BLE protocol
US20130290191A1 (en) Method of transferring access rights to a service from one device to another
CN108092991A (en) The method for identifying ID and device of vehicle
CN106161032A (en) A kind of identity authentication method and device
CN110406498A (en) A kind of control method for vehicle and device
CN106156677B (en) Identity card card reading method and system
CN111083696B (en) Communication verification method and system, mobile terminal and vehicle machine side
CN110182171A (en) Digital car key system and vehicle based on block chain technology
CN110758321A (en) Control method and device of Bluetooth key
KR102553145B1 (en) A secure element for processing and authenticating a digital key and operation metho thereof
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN106878122A (en) A kind of method for network access and system
CN106027457A (en) Identity card information transmission method and system
CN106027249B (en) Identity card card reading method and system
CN113989958A (en) Digital key sharing system, method and apparatus, vehicle and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191105