CN112153640A - Vehicle control method, system, user terminal, vehicle and readable storage medium - Google Patents

Vehicle control method, system, user terminal, vehicle and readable storage medium Download PDF

Info

Publication number
CN112153640A
CN112153640A CN202010593769.4A CN202010593769A CN112153640A CN 112153640 A CN112153640 A CN 112153640A CN 202010593769 A CN202010593769 A CN 202010593769A CN 112153640 A CN112153640 A CN 112153640A
Authority
CN
China
Prior art keywords
vehicle
authorization information
information
owner
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010593769.4A
Other languages
Chinese (zh)
Inventor
周翔
周剑锐
李纯灵
杨子钰
曲延羽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAIC GM Wuling Automobile Co Ltd
Original Assignee
SAIC GM Wuling Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SAIC GM Wuling Automobile Co Ltd filed Critical SAIC GM Wuling Automobile Co Ltd
Priority to CN202010593769.4A priority Critical patent/CN112153640A/en
Publication of CN112153640A publication Critical patent/CN112153640A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a vehicle control method, a system, a user terminal, a vehicle and a readable storage medium, wherein the method comprises the following steps: the method comprises the steps that a user terminal establishes near field communication connection with a vehicle and receives authorization information sent by a vehicle owner terminal corresponding to the vehicle; the user terminal sends the authorization information to the vehicle based on the near field communication connection so as to enable the vehicle to perform security verification; and when receiving the verification passing information sent by the vehicle, the user terminal sends a control instruction to the vehicle so as to control the vehicle. The invention can realize remote vehicle borrowing, can obtain the use right of the vehicle without the user obtaining a key from the vehicle owner, has simple and convenient operation and provides convenience for the user.

Description

Vehicle control method, system, user terminal, vehicle and readable storage medium
Technical Field
The present invention relates to the field of automotive technologies, and in particular, to a method and a system for controlling a vehicle, a user terminal, a vehicle, and a readable storage medium.
Background
With the rapid development of society, more and more people learn to drive, and the condition of automobile borrowing is more and more. The conventional automobile is still controlled by a key, such as opening/closing a door by the key, starting/closing an engine, and the like; if the driver wants to control the vehicle normally, the driver needs to obtain the key from the owner to start the vehicle by using the key. However, in practice, it is often inconvenient for the borrower to get the key from the owner, which results in the borrower not using the vehicle normally.
Disclosure of Invention
The invention mainly aims to provide a vehicle control method, a vehicle control system, a user terminal, a vehicle and a readable storage medium, and aims to solve the technical problem of inconvenience in borrowing of the vehicle.
In order to achieve the above object, an embodiment of the present invention provides a vehicle control method, where the vehicle control method is applied to a user terminal, and the vehicle control method includes the following steps:
the user terminal establishes near field communication connection with the vehicle and receives authorization information sent by a vehicle owner terminal corresponding to the vehicle;
sending the authorization information to the vehicle based on the near field communication connection for security verification by the vehicle;
and when the verification passing information sent by the vehicle is received, sending a control instruction to the vehicle to control the vehicle.
Optionally, the step of establishing a near field communication connection between the user terminal and the vehicle and receiving authorization information sent by a vehicle owner terminal corresponding to the vehicle includes:
the user terminal establishes near field communication connection with a vehicle and acquires vehicle identification information of the vehicle based on the near field communication connection;
determining an owner terminal corresponding to the vehicle according to the vehicle identification information, and sending an authorization request to the owner terminal;
and receiving authorization information sent by the owner terminal based on the authorization request.
Optionally, the authorization request includes user identification information of the user terminal, the authorization information includes the user identification information and encrypted identification information, the encrypted identification information is obtained by the owner terminal encrypting the user identification information based on a preset owner private key,
correspondingly, the step of sending the authorization information to the vehicle based on the near field communication connection for security verification by the vehicle comprises:
and sending the authorization information to the vehicle based on the near field communication connection so that the vehicle can perform security verification based on the vehicle owner public key and the authorization information corresponding to the preset vehicle owner private key.
Further, to achieve the above object, an embodiment of the present invention proposes a vehicle control method applied to a vehicle, including:
the vehicle and the user terminal establish near field communication connection;
acquiring authorization information sent by the vehicle based on the near field communication connection, and performing security verification according to the authorization information, wherein the authorization information is sent to the user terminal by an owner terminal corresponding to the vehicle;
when the verification is passed, sending verification passing information to the user terminal;
and receiving a control instruction sent by the vehicle based on the verification passing information, and performing corresponding control operation according to the control instruction.
Optionally, the step of obtaining authorization information sent by the vehicle based on the near field communication connection and performing security verification according to the authorization information includes:
acquiring authorization information sent by the vehicle based on the near field communication connection, and judging whether the current time is within the validity period of the authorization information;
and if so, performing security verification according to the authorization information.
Optionally, the authorization message includes encrypted identification information and user identification information of the user terminal, the encrypted identification information is obtained by the owner terminal encrypting the user identification information based on a preset owner private key,
correspondingly, the steps of obtaining the authorization information sent by the vehicle based on the near field communication connection and performing security verification according to the authorization information include:
acquiring authorization information sent by the vehicle based on the near field communication connection, and acquiring encrypted identification information and user identification information according to the authorization information;
decrypting the encrypted identification information based on the owner public key corresponding to the owner private key to obtain decrypted information, and judging whether the decrypted information is matched with the user identification information;
and if the verification result is matched with the verification result, determining that the result of the security verification is verification pass.
In addition, in order to achieve the above object, an embodiment of the present invention further provides a vehicle control system, where the vehicle control system includes a user terminal and a vehicle, and a near field communication connection is established between the user terminal and the vehicle;
the user terminal is used for receiving authorization information sent by a vehicle owner terminal corresponding to the vehicle and sending the authorization information to the vehicle based on the near field communication connection;
the vehicle is used for acquiring the authorization information sent by the vehicle, performing security verification according to the authorization information, and sending verification passing information to the user terminal when the verification passes;
the user terminal is further used for sending a control instruction to the vehicle when the verification passing information sent by the vehicle is received;
the vehicle is also used for receiving the control instruction sent by the vehicle and carrying out corresponding control operation according to the control instruction.
In addition, to achieve the above object, an embodiment of the present invention further provides a user terminal, where the user terminal includes a memory, a processor, and a computer program stored in the memory and operable on the processor, and the computer program, when executed by the processor, implements the steps of the vehicle control method as described above.
In addition, to achieve the above object, an embodiment of the present invention further provides a vehicle, which includes a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the computer program, when executed by the processor, implements the steps of the vehicle control method as described above.
Furthermore, to achieve the above object, an embodiment of the present invention further proposes a readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the vehicle control method as described above.
When a user borrows the vehicle, the near field communication between the user terminal and the vehicle can be established, and then the authorization information is sent to the vehicle for safety verification, wherein the authorization information is obtained by the user terminal from the vehicle owner terminal; when the verification is passed, the user can control the vehicle through the user terminal, so that the user can obtain the use right of the vehicle without obtaining a key from the vehicle owner, the operation is simple and convenient, and convenience is provided for the user.
Drawings
Fig. 1 is a schematic structural diagram of a user terminal according to an embodiment of the present invention;
FIG. 2 is a schematic flowchart of a first embodiment of a vehicle control method of the invention;
fig. 3 is a flowchart illustrating a vehicle control method according to a third embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, if directional indications (such as up, down, left, right, front, and back) are involved in the embodiment of the present invention, the directional indications are only used for explaining the relative positional relationship, the motion situation, and the like between the components in a certain posture, and if the certain posture is changed, the directional indications are changed accordingly.
In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The automobile control method related to the embodiment of the invention is applied to the user terminal, and the user terminal can be a mobile phone, a palm computer, a tablet computer and the like. Referring to fig. 1, fig. 1 is a schematic diagram of a hardware architecture of a user terminal according to an embodiment of the present invention. In this embodiment of the present invention, the ue includes a processor 1001 (e.g., a Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. The communication bus 1002 is used for realizing connection communication among the components; the user interface 1003 may include a Display screen (Display), an input unit such as a key (Keyboard); the network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WI-FI interface, WI-FI interface); the memory 1005 may be a Random Access Memory (RAM) or a non-volatile memory (non-volatile memory), such as a magnetic disk memory, and the memory 1005 may optionally be a storage device independent of the processor 1001. Of course, those skilled in the art will appreciate that the hardware configuration shown in FIG. 1 is not intended to limit the present invention. With continued reference to FIG. 1, the memory 1005 of FIG. 1, which is one type of readable storage medium, may include an operating system, a network communication module, and a computer program. In fig. 1, a network communication module may be used to connect a network or an external device for data interaction; and the processor 1001 may call the computer program stored in the memory 1005 and implement the vehicle control method of the embodiment of the invention.
The vehicle control method related to the embodiment of the invention is also applied to a vehicle which comprises a processor and a memory. The memory may be a Random Access Memory (RAM), a non-volatile memory (non-volatile memory), such as a disk memory, and optionally, a storage device independent from the processor. The memory may include an operating system, a network communication module, and a computer program. The network communication module can be used for connecting a network or external equipment to perform data interaction; and the processor may call the computer program stored in the memory and implement the vehicle control method of the embodiment of the invention.
Further, the processor and the memory of the vehicle can be regarded as a decision system of the vehicle, and are used for realizing analysis and decision of data; the vehicle further comprises an execution system, the execution system comprises a brake actuator (used for realizing vehicle brake control), a steering system (used for realizing vehicle steering control), a driving system (used for realizing vehicle driving control), a parking system (used for realizing vehicle parking control), a vehicle body controller (used for realizing control of vehicle door locks, power signals, safety belt signal lamps and the like), and the like, and the execution system collects corresponding vehicle information and sends the corresponding vehicle information to the decision-making system, and meanwhile, the execution system also realizes corresponding control functions according to control instructions sent by the decision-making system.
The embodiment of the invention provides a vehicle control method.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first embodiment of a vehicle control method according to the present invention.
In this embodiment, the vehicle control method is applied to a user terminal, and includes the following steps:
step S10, the user terminal establishes near field communication connection with the vehicle and receives authorization information sent by a vehicle owner terminal corresponding to the vehicle;
the conventional automobile is still controlled by a key, such as opening/closing a door by the key, starting/closing an engine, and the like; in order to normally control the vehicle, a borrower needs to obtain a key from a vehicle owner to start the vehicle by using the key, but in practice, the borrower often has inconvenience in obtaining the key from the vehicle owner, which results in that the borrower cannot normally use the vehicle. In contrast, according to the vehicle control method provided by the embodiment, when a user borrows a vehicle, near field communication can be established between the user terminal and the vehicle, and then authorization information is sent to the vehicle for safety verification, wherein the authorization information is obtained by the user terminal from the vehicle owner terminal; when the verification is passed, the user can control the vehicle through the user terminal, so that the user can obtain the use right of the vehicle without obtaining a key from the vehicle owner, the operation is simple and convenient, and convenience is provided for the user.
The vehicle control method of the embodiment is applied to a user terminal, and the user terminal takes a mobile phone as an example for description. When a user (a person borrowing the vehicle) needs to borrow the vehicle, the user can hold the mobile phone to the vicinity of the vehicle to be borrowed; the handset will now establish a near field communication connection with the vehicle. The near field communication connection may be a bluetooth connection, an infrared connection, a WIFI connection, or the like, and when the connection is made, the user may select a connection mode by himself or the mobile phone may automatically select a suitable connection mode according to a communication environment, for example, select a connection mode with the best automatic communication quality (e.g., the lowest delay and the fastest transmission speed). In addition, the mobile phone also receives authorization information sent by a vehicle owner terminal corresponding to the vehicle; the owner terminal may be a mobile phone (or other mobile terminal), or an intelligent key of the vehicle, and the authorization information may be a vehicle use authorization certificate issued by the owner to the user through the owner terminal. Certainly, the process of acquiring the authorization information can be that the mobile phone establishes a near field communication connection with the vehicle, applies for the owner terminal, and then sends the owner terminal to the mobile phone; the user can also contact with the vehicle owner in advance, the vehicle owner sends authorization information to the mobile phone of the user through the vehicle owner terminal, then the user holds the mobile phone to be close to the vehicle, so that the mobile phone is in near field communication connection with the vehicle, in the process, when the vehicle owner terminal sends the authorization information to the mobile phone of the user, the authorization information can also comprise position information of the vehicle, and when the mobile phone obtains the authorization information, corresponding navigation information can be output according to the position information, so that the user can find the vehicle quickly.
Step S20, sending the authorization information to the vehicle based on the near field communication connection for the vehicle to perform security verification;
in this embodiment, when the mobile phone establishes the near field communication connection with the vehicle, the mobile phone sends the authorization information to the vehicle based on the currently established near field communication connection. When the vehicle receives the authorization information, the security verification is carried out according to the authorization information, namely, whether the mobile phone (or the user) has the authority of using the vehicle is judged. If the verification fails, namely the mobile phone (or the user) does not have the authority of using the vehicle, the vehicle returns corresponding verification failure information to the mobile phone, and the mobile phone is refused to control the vehicle; if the verification is passed, namely the mobile phone (or the user) has the authority of using the vehicle, the vehicle returns corresponding verification passing information to the mobile phone.
And step S30, when the verification passing information sent by the vehicle is received, sending a control instruction to the vehicle to control the vehicle.
In this embodiment, when the mobile phone receives the verification passing information sent by the vehicle, the corresponding passing prompt may be output, so that the user can know the result of the verification passing. At the moment, the user can carry out control operation on the mobile phone, and the mobile phone sends a corresponding control instruction to the vehicle according to the operation of the user so as to control the vehicle. For example, a user can operate on an APP installed on a mobile phone, click a door unlocking option in an APP interface, and the mobile phone sends a corresponding door opening control instruction to a vehicle according to the operation of the user; when the vehicle receives the door opening control instruction, the vehicle generates a corresponding control signal through a related communication line (such as a CAN), and sends the control signal to a corresponding control component (such as a vehicle body controller) so as to control the door to be opened. When the borrowing is finished, the user can click the returning option in the APP interface through the mobile phone, and the mobile phone sends a corresponding finishing control instruction to the vehicle according to the operation of the user; when the vehicle receives the ending control instruction, the corresponding control assembly is closed to control the vehicle to stop running; of course, the mobile phone may also send corresponding returning information to the owner terminal to inform the owner of the end of the borrowing, and the returning information may also include the position information of the current mobile phone (or vehicle) to enable the owner to know the position of the current vehicle.
In the embodiment, a user terminal establishes near field communication connection with a vehicle and receives authorization information sent by a vehicle owner terminal corresponding to the vehicle; sending the authorization information to the vehicle based on the near field communication connection for security verification by the vehicle; and when the verification passing information sent by the vehicle is received, sending a control instruction to the vehicle to control the vehicle. Through the mode, the user terminal and the vehicle can establish near field communication when the user borrows the vehicle, and then the authorization information is sent to the vehicle for safety verification, wherein the authorization information is obtained by the user terminal from the vehicle owner terminal; when the verification is passed, the user can control the vehicle through the user terminal, so that the user can obtain the use right of the vehicle without obtaining a key from the vehicle owner, the operation is simple and convenient, and convenience is provided for the user.
A second embodiment of the vehicle control method of the invention is proposed based on the above first embodiment of the vehicle control method.
In this embodiment, the step S10 includes:
step S11, the user terminal establishes near field communication connection with a vehicle and acquires vehicle identification information of the vehicle based on the near field communication connection;
in this embodiment, the process of acquiring the authorization information may be that the mobile phone applies for the owner terminal after establishing the near field communication connection with the vehicle, and then the owner terminal sends the authorization information to the mobile phone. Specifically, when a user (a person borrowing the vehicle) needs to borrow the vehicle, the user can hold the mobile phone to be close to the vehicle to be borrowed and control the mobile phone to establish near field communication connection with the vehicle. When the mobile phone establishes near field communication connection with the vehicle, a corresponding identification acquisition request is sent to the vehicle based on the near field communication connection, and when the vehicle receives the identification acquisition request, vehicle identification information of the vehicle is returned to the mobile phone.
Step S12, determining an owner terminal corresponding to the vehicle according to the vehicle identification information, and sending an authorization request to the owner terminal;
in this embodiment, the vehicle identification information and the vehicle owner terminal have an association relationship, and when the identification information of the vehicle is obtained, the mobile phone can determine the vehicle owner terminal corresponding to the vehicle according to the vehicle identification information. Then, the mobile phone may send a corresponding authorization request to the owner terminal, where the authorization request may include an identification of the mobile phone or the user (to indicate the identity of the borrower), vehicle identification information (to indicate the vehicle to be borrowed), borrowing time, borrowing reason, and the like. It should be noted that, in practice, a plurality of vehicles may be owned by one owner, and thus, the vehicle identification information of the plurality of vehicles may have an association relationship with the same owner terminal.
And step S13, receiving authorization information sent by the owner terminal based on the authorization request.
In this embodiment, when receiving the authorization request, the owner terminal outputs a corresponding authorization query to query whether the owner is authorized. If the owner refuses the authorization, the owner terminal returns corresponding refusing information to the mobile phone, and if the mobile phone receives the refusing information, the vehicle cannot be borrowed; if the owner agrees to the authorization, the owner terminal will return the corresponding authorization information to the mobile phone, and if the mobile phone receives the authorization information, the mobile phone can send the authorization information to the vehicle for the vehicle to perform security verification, i.e. step S20 is entered.
Through the mode, the user can remotely obtain the authorization information from the vehicle owner terminal through the user terminal, the user does not need to go to the place where the vehicle owner is located, the use right of the vehicle can be obtained, and convenience is provided for the user to borrow the vehicle.
Further, in this embodiment, the authorization request includes user identification information of the user terminal, the authorization information includes the user identification information and encrypted identification information, the encrypted identification information is obtained by encrypting the user identification information by the vehicle owner terminal based on a preset vehicle owner private key,
accordingly, the step S20 includes:
and step S21, sending the authorization information to the vehicle based on the near field communication connection, so that the vehicle can perform security verification based on the owner public key and the authorization information corresponding to the preset owner private key.
In this embodiment, the authorization request sent by the mobile phone to the in-vehicle terminal includes the user identification information (used to indicate the identity of the borrower) of the mobile phone. When the owner terminal receives the authorization request, the corresponding authorization inquiry is output so as to inquire whether the owner authorizes the owner; if the owner agrees to authorization, the owner terminal encrypts the user identification information through a pre-generated and stored owner private key to obtain encrypted identification information, then obtains authorization information (the authorization information comprises the user identification information and the encrypted identification information) according to the user identification information and the encrypted identification information, and returns corresponding authorization information to the mobile phone. If the mobile phone receives the authorization information, the authorization information can be sent to the vehicle for the vehicle to carry out safety verification. It should be noted that the owner terminal generates in advance an owner public-private key pair, which includes an owner public key and a corresponding owner private key, where the owner private key is stored in the owner terminal, and the owner public key is sent from the owner terminal to the vehicle and stored in the vehicle. When the vehicle receives the authorization information sent by the mobile phone, user identification information and encrypted identification information are extracted from the authorization information, and the encrypted identification information is decrypted based on the owner public key to obtain decrypted information; and then the vehicle compares the decrypted information obtained by decryption with the user identification information in the authorization information, if the decrypted information is matched with the user identification information, the security verification is considered to be passed, the verification passing information is sent to the mobile phone, and if the decrypted information is not matched with the user identification information, the potential safety hazard (if the vehicle is borrowed under the name of others) exists in the borrowing behavior of the current user terminal, and at the moment, verification failure information is sent to the mobile phone.
Through the mode, the user sends the authorization information to the vehicle when passing through the user terminal so as to carry out safety verification on the vehicle, and the improvement of the safety of vehicle borrowing is facilitated.
The vehicle control method related to the embodiment of the invention can also be applied to a vehicle.
Referring to fig. 3, fig. 3 is a flowchart illustrating a vehicle control method according to a third embodiment of the present invention.
The vehicle control method of the embodiment is applied to a vehicle, and includes:
step S40, the vehicle establishes a near field communication connection with the user terminal;
the present embodiment can be regarded as describing the process of vehicle control in the vehicle perspective, and the specific implementation can also be understood by referring to the first and second embodiments. The user terminal is also described by taking a mobile phone as an example. The vehicle is provided with a near field communication module (such as a Bluetooth module, an infrared module and a WIFI module) and the like; when a user (a borrower) needs to borrow a vehicle, the user can hold the mobile phone to the vicinity of the vehicle and operate the mobile phone to initiate a near field communication connection request to the vehicle. The near field communication connection may be a bluetooth connection, an infrared connection, a WIFI connection, or the like, and when the connection is made, the user may select a connection mode by himself or the mobile phone may automatically select a suitable connection mode according to a communication environment, for example, select a connection mode with the best automatic communication quality (e.g., the lowest delay and the fastest transmission speed). When the vehicle receives the connection request, the vehicle establishes a near field communication connection with the mobile phone according to the connection mode included in the connection request, for example, establishes a bluetooth connection with the mobile phone. Certainly, before connection, the vehicle may also perform related security detection, for example, detect whether the identification information of the mobile phone is in a preset white list, so as to determine whether the mobile phone is trusted, and establish a near field communication connection with the mobile phone only when it is determined that the mobile phone is trusted.
Step S50, obtaining authorization information sent by the vehicle based on the near field communication connection, and performing security verification according to the authorization information, wherein the authorization information is sent to the user terminal by an owner terminal corresponding to the vehicle;
in this embodiment, after the near field communication connection is established between the vehicle and the mobile phone, the mobile phone sends authorization information to the vehicle, where the authorization information is sent to the user terminal by a vehicle owner terminal corresponding to the vehicle, and the authorization information can be considered as a vehicle use authorization certificate issued by a vehicle owner to a user through the vehicle owner terminal; in other words, the user obtains the authorization information from the owner terminal through the mobile phone and then transmits the authorization information to the vehicle. For the process of obtaining the authorization information by the mobile phone, the process can be that the mobile phone establishes near field communication connection with the vehicle and then sends an authorization request to the owner terminal, and then the owner terminal sends the authorization information to the mobile phone; the user may also contact with the vehicle owner in advance, send an authorization request to the vehicle owner terminal through the mobile phone, then send authorization information to the mobile phone of the user through the vehicle owner terminal, and then hold the mobile phone to the vicinity of the vehicle by the user, so that the mobile phone and the vehicle establish a near field communication connection. When the vehicle receives the authorization information sent by the mobile phone, the security verification is carried out according to the authorization information, namely, whether the mobile phone (or the user) has the authority of using the vehicle is judged. If the verification fails, namely the mobile phone (or the user) does not have the authority of using the vehicle, the vehicle returns corresponding verification failure information to the mobile phone, and the mobile phone is refused to control the vehicle; if the verification is passed, namely the mobile phone (or the user) has the authority of using the vehicle, the vehicle returns corresponding verification passing information to the mobile phone.
Step S60, when the verification is passed, sending verification passing information to the user terminal;
in this embodiment, when the verification passes, the vehicle returns corresponding verification passing information to the mobile phone.
And step S70, receiving a control instruction sent by the vehicle based on the verification passing information, and carrying out corresponding control operation according to the control instruction.
In this embodiment, when the mobile phone receives the verification passing information sent by the vehicle, the corresponding passing prompt may be output, so that the user can know the result of the verification passing. At the moment, the user can carry out control operation on the mobile phone, and the mobile phone sends a corresponding control instruction to the vehicle according to the operation of the user so as to control the vehicle. For example, a user can operate on an APP installed on a mobile phone, click a door unlocking option in an APP interface, and the mobile phone sends a corresponding door opening control instruction to a vehicle according to the operation of the user; when the vehicle receives the door opening control instruction, the vehicle generates a corresponding control signal through a related communication line (such as a CAN), and sends the control signal to a corresponding control component (such as a vehicle body controller) so as to control the door to be opened. When the borrowing is finished, the user can click the returning option in the APP interface through the mobile phone, and the mobile phone sends a corresponding finishing control instruction to the vehicle according to the operation of the user; when the vehicle receives the ending control instruction, the corresponding control component is closed so as to control the vehicle to stop running. In addition, the vehicle position information can be obtained in real time or at regular time in the borrowing process of the vehicle, and is recorded, and the record can be sent to the vehicle owner terminal when the vehicle is subsequently connected with the vehicle owner terminal; certainly, the vehicle may also directly send the vehicle position information to the owner terminal, so that the owner can know the position of the vehicle borrowing process through the owner terminal, and when the user finishes borrowing and returns the vehicle, the vehicle may also send corresponding return information to the owner terminal to inform the owner that the borrowing is finished, and the return information may also include the position information of the current mobile phone (or vehicle), so that the owner can know the position of the current vehicle.
In the embodiment, a vehicle and a user terminal establish near field communication connection; acquiring authorization information sent by the vehicle based on the near field communication connection, and performing security verification according to the authorization information, wherein the authorization information is sent to the user terminal by an owner terminal corresponding to the vehicle; when the verification is passed, sending verification passing information to the user terminal; and receiving a control instruction sent by the vehicle based on the verification passing information, and performing corresponding control operation according to the control instruction. Through the mode, the user terminal and the vehicle can establish near field communication when the user borrows the vehicle, and then the authorization information is sent to the vehicle for safety verification, wherein the authorization information is obtained by the user terminal from the vehicle owner terminal; when the verification is passed, the user can control the vehicle through the user terminal, so that the user can obtain the use right of the vehicle without obtaining a key from the vehicle owner, the operation is simple and convenient, and convenience is provided for the user.
A fourth embodiment of the vehicle control method of the invention is proposed based on the above-described third embodiment of the vehicle control method.
In this embodiment, the step S50 includes:
step S51, obtaining the authorization information sent by the vehicle based on the near field communication connection, and judging whether the current time is in the validity period of the authorization information;
in this embodiment, in order to improve the security of borrowing a vehicle, the authorization information obtained by the mobile phone from the vehicle owner terminal has timeliness, that is, after the user obtains the authorization information through the mobile phone, the user needs to use the authorization information within a certain time. Specifically, the authorization information sent by the owner terminal to the mobile phone includes validity period information, and then the mobile phone sends the authorization information to the vehicle through near field communication connection. When the vehicle acquires the authorization information sent by the vehicle, the current time is acquired at first, the valid period information in the authorization information is extracted, and then whether the current time is within the valid period of the authorization information is judged according to the valid period information. For example, the validity period information is from 8 o 'clock at 3/2018/21/2018 to 18 o' clock at 21/2018/3/21/10, and when the current time is 2018/3/21/10, the current time is within the validity period of the authorization information.
And step S52, if yes, performing security verification according to the authorization information.
In the embodiment, if the current time is within the valid period of the authorization information, the vehicle carries out safety verification according to the authorization information; and if the current time is not within the validity period of the authorization information, the vehicle directly returns verification failure information to the mobile phone. In practice, of course, in addition to limiting the usage time of the authorization information, the usage times of the authorization information may also be limited, for example, each authorization information includes an information code unique to the authorization information, when the vehicle receives the authorization information, the vehicle may query a preset information code usage record according to the information code to determine the usage times of the authorization information, and if the usage times of the authorization information is detected to be less than the preset permitted times, the authorization information may be considered to be valid, and at this time, security verification is performed according to the authorization information; and if the using times of the authorization information is larger than or equal to the preset permission times, the vehicle directly returns the verification failure information to the mobile phone.
Through the mode, the validity of the authorization information can be judged firstly when the vehicle is subjected to security verification, and the security verification can be performed when the authorization information is valid, so that the security of borrowing the vehicle is improved.
Further, in this embodiment, the authorization token includes encrypted identification information and user identification information of the user terminal, the encrypted identification information is obtained by the owner terminal encrypting the user identification information based on a preset owner private key,
correspondingly, the step of step S50 further includes:
step S53, obtaining authorization information sent by the vehicle based on the near field communication connection, and obtaining encrypted identification information and user identification information according to the authorization information;
in this embodiment, when the mobile phone sends an authorization request to the owner terminal, the authorization request includes user identification information (indicating the identity of the borrower) of the mobile phone. When the owner terminal receives the authorization request, the corresponding authorization inquiry is output so as to inquire whether the owner authorizes the owner; if the owner agrees to authorization, the owner terminal encrypts the user identification information through a pre-generated and stored owner private key to obtain encrypted identification information, then obtains authorization information (the authorization information comprises the user identification information and the encrypted identification information) according to the user identification information and the encrypted identification information, and returns corresponding authorization information to the mobile phone. When the mobile phone receives the authorization information, the authorization information can be sent to the vehicle through the near field communication connection. It should be noted that the owner terminal generates in advance an owner public-private key pair, which includes an owner public key and a corresponding owner private key, where the owner private key is stored in the owner terminal, and the owner public key is sent from the owner terminal to the vehicle and stored in the vehicle. When the vehicle receives the authorization information sent by the mobile phone, the user identification information and the encrypted identification information are extracted from the authorization information.
Step S54, decrypting the encrypted identification information based on the owner public key corresponding to the owner private key to obtain decrypted information, and judging whether the decrypted information is matched with the user identification information;
in this embodiment, when the vehicle obtains the encrypted identification information and the user identification information, the encrypted identification information is decrypted based on the owner public key to obtain decrypted information. The vehicle compares the decrypted information with the user identification information in the authorization information, if the decrypted information is matched with the user identification information, the user applying to use the vehicle at present and the user authorized by the vehicle owner belong to the same object, at the moment, the safety verification is passed, the verification passing information is sent to the mobile phone, if the decrypted information is not matched with the user identification information, the potential safety hazard exists in the borrowing behavior of the current user terminal (if the vehicle is borrowed under the name of other people), and at the moment, the verification failure information is sent to the mobile phone. It should be noted that, in the step S51, the validity period information and the information code of the authorization information may also be encrypted by the owner terminal in advance through the owner private key, and the vehicle is decrypted by the owner public key when obtaining the authorization information, and then the authorization information is validated according to the validity period information and the information code, so as to prevent the validity period information and the information code from being tampered.
And step S55, if the verification result is matched, the result of the security verification is determined to be verification pass.
In this embodiment, if the two are matched, the user currently applying for using the vehicle and the user authorized by the vehicle owner belong to the same object, and the security verification result is that the verification is passed; when the authentication is passed, the vehicle will send the authentication pass message to the cellular phone, i.e., proceed to step S60.
Through the above manner, when the vehicle receives the authorization information sent by the user terminal, the security verification is performed in a public and private key decryption manner, and the improvement of the security of the vehicle borrowing is facilitated.
In addition, the embodiment of the invention also provides a vehicle control system, which comprises a user terminal and a vehicle, wherein near field communication connection is established between the user terminal and the vehicle;
the user terminal is used for receiving authorization information sent by a vehicle owner terminal corresponding to the vehicle and sending the authorization information to the vehicle based on the near field communication connection;
the vehicle is used for acquiring the authorization information sent by the vehicle, performing security verification according to the authorization information, and sending verification passing information to the user terminal when the verification passes;
the user terminal is further used for sending a control instruction to the vehicle when the verification passing information sent by the vehicle is received;
the vehicle is also used for receiving a control instruction sent by the vehicle and carrying out corresponding control operation according to the control instruction;
the specific function implementation of the user terminal and the vehicle may refer to each embodiment of the vehicle control method of the present invention, and will not be described herein again.
In addition, the embodiment of the invention also provides a computer readable storage medium.
The inventive computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the vehicle control method as described above.
The method implemented when the computer program is executed may refer to various embodiments of the vehicle control method of the present invention, and details thereof are not repeated herein.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A vehicle control method applied to a user terminal, comprising:
the user terminal establishes near field communication connection with the vehicle and receives authorization information sent by a vehicle owner terminal corresponding to the vehicle;
sending the authorization information to the vehicle based on the near field communication connection for security verification by the vehicle;
and when the verification passing information sent by the vehicle is received, sending a control instruction to the vehicle to control the vehicle.
2. The vehicle control method according to claim 1, wherein the step of establishing a near field communication connection between the user terminal and the vehicle and receiving the authorization information sent by the owner terminal corresponding to the vehicle comprises:
the user terminal establishes near field communication connection with a vehicle and acquires vehicle identification information of the vehicle based on the near field communication connection;
determining an owner terminal corresponding to the vehicle according to the vehicle identification information, and sending an authorization request to the owner terminal;
and receiving authorization information sent by the owner terminal based on the authorization request.
3. The vehicle control method according to claim 1, wherein the authorization request includes user identification information of the user terminal, the authorization information includes the user identification information and encrypted identification information, the encrypted identification information is obtained by the owner terminal encrypting the user identification information based on a preset owner private key,
correspondingly, the step of sending the authorization information to the vehicle based on the near field communication connection for security verification by the vehicle comprises:
and sending the authorization information to the vehicle based on the near field communication connection so that the vehicle can perform security verification based on the vehicle owner public key and the authorization information corresponding to the preset vehicle owner private key.
4. A vehicle control method characterized by being applied to a vehicle, comprising:
the vehicle and the user terminal establish near field communication connection;
acquiring authorization information sent by the vehicle based on the near field communication connection, and performing security verification according to the authorization information, wherein the authorization information is sent to the user terminal by an owner terminal corresponding to the vehicle;
when the verification is passed, sending verification passing information to the user terminal;
and receiving a control instruction sent by the vehicle based on the verification passing information, and performing corresponding control operation according to the control instruction.
5. The vehicle control method of claim 4, wherein the step of obtaining authorization information sent by the vehicle based on the near field communication connection and performing security verification according to the authorization information comprises:
acquiring authorization information sent by the vehicle based on the near field communication connection, and judging whether the current time is within the validity period of the authorization information;
and if so, performing security verification according to the authorization information.
6. The vehicle control method according to claim 4, wherein the authorization ticket includes encrypted identification information and user identification information of the user terminal, the encrypted identification information being obtained by the owner terminal encrypting the user identification information based on a preset owner private key,
correspondingly, the steps of obtaining the authorization information sent by the vehicle based on the near field communication connection and performing security verification according to the authorization information include:
acquiring authorization information sent by the vehicle based on the near field communication connection, and acquiring encrypted identification information and user identification information according to the authorization information;
decrypting the encrypted identification information based on the owner public key corresponding to the owner private key to obtain decrypted information, and judging whether the decrypted information is matched with the user identification information;
and if the verification result is matched with the verification result, determining that the result of the security verification is verification pass.
7. A vehicle control system is characterized by comprising a user terminal and a vehicle, wherein a near field communication connection is established between the user terminal and the vehicle;
the user terminal is used for receiving authorization information sent by a vehicle owner terminal corresponding to the vehicle and sending the authorization information to the vehicle based on the near field communication connection;
the vehicle is used for acquiring the authorization information sent by the vehicle, performing security verification according to the authorization information, and sending verification passing information to the user terminal when the verification passes;
the user terminal is further used for sending a control instruction to the vehicle when the verification passing information sent by the vehicle is received;
the vehicle is also used for receiving the control instruction sent by the vehicle and carrying out corresponding control operation according to the control instruction.
8. A user terminal, characterized in that the user terminal comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the vehicle control method according to any one of claims 1 to 3.
9. A vehicle, characterized in that the vehicle comprises a memory, a processor and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the vehicle control method according to any one of claims 4 to 6.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the vehicle control method according to any one of claims 1 to 3, or according to any one of claims 4 to 6.
CN202010593769.4A 2020-06-24 2020-06-24 Vehicle control method, system, user terminal, vehicle and readable storage medium Pending CN112153640A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010593769.4A CN112153640A (en) 2020-06-24 2020-06-24 Vehicle control method, system, user terminal, vehicle and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010593769.4A CN112153640A (en) 2020-06-24 2020-06-24 Vehicle control method, system, user terminal, vehicle and readable storage medium

Publications (1)

Publication Number Publication Date
CN112153640A true CN112153640A (en) 2020-12-29

Family

ID=73888659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010593769.4A Pending CN112153640A (en) 2020-06-24 2020-06-24 Vehicle control method, system, user terminal, vehicle and readable storage medium

Country Status (1)

Country Link
CN (1) CN112153640A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613218A (en) * 2021-08-04 2021-11-05 江西科技学院 Interaction method and device for wearable equipment and wearable equipment
CN113724408A (en) * 2021-10-19 2021-11-30 上海仙塔智能科技有限公司 Processing method, device and equipment for OBU equipment during temporary use
CN114187682A (en) * 2021-12-01 2022-03-15 无锡美加能科技有限公司 Method for increasing vehicle use safety based on Bluetooth signal transmission
CN115065517A (en) * 2022-05-31 2022-09-16 华人运通(上海)云计算科技有限公司 Vehicle business authorization method, device, cloud server and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105083214A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method
CN106302510A (en) * 2016-08-31 2017-01-04 长城汽车股份有限公司 The authorization method of virtual key, system, mobile terminal and server
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
CN109446767A (en) * 2018-09-29 2019-03-08 东风汽车有限公司 Vehicle personnel identity safety verification method, equipment and system
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN110766834A (en) * 2019-10-31 2020-02-07 上海博泰悦臻网络技术服务有限公司 Vehicle-mounted intelligent computing device and management and maintenance method of vehicle Bluetooth key
CN110855607A (en) * 2019-09-29 2020-02-28 华为技术有限公司 Vehicle control method based on Internet of vehicles, communication device and storage medium
CN111204311A (en) * 2018-11-19 2020-05-29 上海擎感智能科技有限公司 Vehicle-mounted TBOX, vehicle and Bluetooth key realization method and system
CN111277622A (en) * 2019-09-26 2020-06-12 上海钧正网络科技有限公司 Vehicle sharing method and device, vehicle, computer equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105083214A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method
CN106302510A (en) * 2016-08-31 2017-01-04 长城汽车股份有限公司 The authorization method of virtual key, system, mobile terminal and server
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
CN109446767A (en) * 2018-09-29 2019-03-08 东风汽车有限公司 Vehicle personnel identity safety verification method, equipment and system
CN111204311A (en) * 2018-11-19 2020-05-29 上海擎感智能科技有限公司 Vehicle-mounted TBOX, vehicle and Bluetooth key realization method and system
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN111277622A (en) * 2019-09-26 2020-06-12 上海钧正网络科技有限公司 Vehicle sharing method and device, vehicle, computer equipment and storage medium
CN110855607A (en) * 2019-09-29 2020-02-28 华为技术有限公司 Vehicle control method based on Internet of vehicles, communication device and storage medium
CN110766834A (en) * 2019-10-31 2020-02-07 上海博泰悦臻网络技术服务有限公司 Vehicle-mounted intelligent computing device and management and maintenance method of vehicle Bluetooth key

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613218A (en) * 2021-08-04 2021-11-05 江西科技学院 Interaction method and device for wearable equipment and wearable equipment
CN113613218B (en) * 2021-08-04 2024-06-21 江西科技学院 Interaction method and device for wearable equipment and wearable equipment
CN113724408A (en) * 2021-10-19 2021-11-30 上海仙塔智能科技有限公司 Processing method, device and equipment for OBU equipment during temporary use
CN114187682A (en) * 2021-12-01 2022-03-15 无锡美加能科技有限公司 Method for increasing vehicle use safety based on Bluetooth signal transmission
CN115065517A (en) * 2022-05-31 2022-09-16 华人运通(上海)云计算科技有限公司 Vehicle business authorization method, device, cloud server and system

Similar Documents

Publication Publication Date Title
CN107650863B (en) Vehicle sharing method and system
CN112153640A (en) Vehicle control method, system, user terminal, vehicle and readable storage medium
CN108122311B (en) Vehicle virtual key implementation method and system
CN107689092B (en) Method and apparatus for using digital temporary vehicle keys
CN112822630B (en) Data processing method of device and computer-readable storage medium
US7251473B2 (en) System and method for controlling access to mobile devices
US9842443B1 (en) Computing device as a vehicle key
US10147257B2 (en) Systems and methods for user based vehicle access control
US9566943B2 (en) Method of making a vehicle available and corresponding system for making a vehicle available
CN107251105B (en) Motor vehicle security and motor vehicle safety system
US9283856B2 (en) Methods, systems and apparatus for authorizing operation of an electric vehicle that is being charged at a charging station
US9268951B2 (en) Method and system for enabling a technical apparatus
CN111204311B (en) Vehicle-mounted TBOX, vehicle and Bluetooth key realization method and system
CN111422163B (en) Vehicle ignition method and system based on face recognition and vehicle
US20170334394A1 (en) Method for controlling access to at least one function of a motor vehicle
US20070043489A1 (en) System and method for controlling access to mobile devices
US20210237686A1 (en) Shared system and control method therefor
JPWO2019043954A1 (en) Vehicle control system
CN110297865B (en) Vehicle control method, system, and computer-readable storage medium
CN113232624B (en) Vehicle control method and device, electronic controller and vehicle
WO2023141869A1 (en) Systems and methods for keyless operation
EP3594910B1 (en) System and method for enabling functions of an object
CN111086484B (en) Vehicle owner information acquisition method, vehicle machine and vehicle
JP2002096715A (en) Method for authorization of driver, its system and its recording medium
CN110395216B (en) Vehicle unlocking and locking control method based on mobile terminal and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201229