CN112215992B - Digital key cleaning method and computer equipment - Google Patents

Digital key cleaning method and computer equipment Download PDF

Info

Publication number
CN112215992B
CN112215992B CN202011094091.1A CN202011094091A CN112215992B CN 112215992 B CN112215992 B CN 112215992B CN 202011094091 A CN202011094091 A CN 202011094091A CN 112215992 B CN112215992 B CN 112215992B
Authority
CN
China
Prior art keywords
key
instruction
vehicle end
digital key
deleting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011094091.1A
Other languages
Chinese (zh)
Other versions
CN112215992A (en
Inventor
朱鹏
熊伟
王颖
陈维鑫
韩毅
单宏寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingeek Information Security Consulting Associates Co ltd
Original Assignee
Ingeek Information Security Consulting Associates Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingeek Information Security Consulting Associates Co ltd filed Critical Ingeek Information Security Consulting Associates Co ltd
Priority to CN202011094091.1A priority Critical patent/CN112215992B/en
Publication of CN112215992A publication Critical patent/CN112215992A/en
Application granted granted Critical
Publication of CN112215992B publication Critical patent/CN112215992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention relates to the technical field of digital keys and discloses a digital key cleaning method and computer equipment. The method comprises the following steps: acquiring information of a target digital key to be cleaned; the target digital key is stored at the vehicle end; generating a key deleting instruction according to the information of the target digital key to be cleaned, and encrypting the key deleting instruction; searching the information of the instruction transmission equipment according to the information of the target digital key; the instruction transmission equipment has the authentication access authority of the vehicle end; and sending the key deleting instruction to the instruction transmission equipment so that the instruction transmission equipment can cache the key deleting instruction, and sending the key deleting instruction to the vehicle end so that the vehicle end can delete the target digital key after connection is established between the instruction transmission equipment and the vehicle end based on digital key authentication. According to the embodiment of the invention, the digital key deleting instruction is transmitted in time by other equipment with vehicle-side access authority, so that the digital key can be deleted in time and reliably, and the safety of a vehicle is ensured.

Description

Digital key cleaning method and computer equipment
Technical Field
The invention relates to the technical field of digital keys, in particular to a digital key cleaning method and computer equipment.
Background
With the popularization of digital keys, the frequency of using the digital keys is higher and higher. The safety of the entity key mainly lies in the management of the entity key by the car owner, all the circulation of the entity key occurs in a scene that the car owner can trust, and the safety of the vehicle is ensured by timely recovering the key. Compared with a physical key, the use of the digital key has greater flexibility, for example, the form of the digital key comprises a pre-key before sale, and a vehicle owner shares the key; in addition, the use mode of the digital key can be flexibly controlled, for example, a car owner can revoke the digital key, a shared key is overdue, a background freezes and unfreezes the key, offline use is supported, and the like.
When the digital key is convenient and flexible to use, the consistency of the deleting function of the digital key is ensured to ensure the safe use of the vehicle, namely, the sharing key deletion is initiated by a vehicle owner or a server, the server deletes the sharing key, the vehicle end is ensured to delete the digital key and synchronize the key deletion completing state to the server, the key deletion is finally completed, the key enters an invalid state, under the condition of a network, the shared person synchronously completes vehicle data, the vehicle does not have a connecting inlet any more, the vehicle is used under the offline condition, and the connection can be rejected by the vehicle end. The existing digital key deleting scheme is mainly characterized in that an APP end of a vehicle owner is directly connected with a vehicle end and deletes a digital key or a server directly controls the vehicle end to delete the digital key, however, the digital key cannot be deleted in time under the condition that no network exists or the vehicle owner is inconvenient to approach the vehicle, and certain risks exist.
Disclosure of Invention
The invention aims to provide a digital key cleaning method and computer equipment, which are beneficial to timely and reliably deleting a digital key and ensuring the use safety of a vehicle by transmitting a digital key deleting instruction in time by other equipment with vehicle access authority.
In order to solve the above technical problem, an embodiment of the present invention provides a digital key cleaning method, which is applied to a server, and the method includes:
acquiring information of a target digital key to be cleaned; the target digital key is stored at the vehicle end;
generating a key deleting instruction according to the information of the target digital key to be cleaned, and encrypting the key deleting instruction;
searching the information of the instruction transmission equipment according to the information of the target digital key; the instruction transmission equipment has the authentication access authority of the vehicle end;
and sending the key deleting instruction to the instruction transmission equipment so that the instruction transmission equipment can cache the key deleting instruction, and sending the key deleting instruction to the vehicle end after connection is established between the instruction transmission equipment and the vehicle end based on digital key authentication so that the vehicle end can delete the target digital key.
The embodiment of the invention also provides a digital key cleaning method which is applied to a terminal and comprises the following steps:
receiving and caching a key deleting instruction sent by a server; the key deleting instruction is used for indicating the vehicle end to delete the target digital key;
and after the connection with the vehicle end is established based on digital key authentication, sending the key deleting instruction to the vehicle end so that the vehicle end can delete the target digital key.
The embodiment of the invention also provides a digital key cleaning method, which is applied to a vehicle end and comprises the following steps:
establishing connection with a terminal based on digital key authentication;
receiving and decrypting a key deleting instruction sent by the terminal;
and deleting the target digital key indicated by the key deleting instruction according to the decrypted key deleting instruction.
An embodiment of the present invention also provides a computer device, including: a memory storing a computer program and a processor running the computer program to implement the digital key cleaning method as described above.
Compared with the prior art, the method and the device for deleting the key are characterized in that after the server obtains the information of the target digital key to be cleaned, the server generates a key deleting instruction according to the information of the target digital key to be cleaned, encrypts the key deleting instruction, searches the information of the instruction transmitting device according to the information of the target digital key, then sends the key deleting instruction to the instruction transmitting device so that the instruction transmitting device can cache the key deleting instruction, and sends the key deleting instruction to the vehicle end after connection is established between the instruction transmitting device and the vehicle end based on digital key authentication so that the vehicle end can delete the target digital key. Because the instruction transmission equipment has the authentication access authority of the vehicle end, the key deleting instruction is transmitted through the instruction transmission equipment to have higher safety, and meanwhile, the instruction transmission equipment can be other equipment except the APP end of the vehicle owner, so that the timeliness of the key deleting instruction transmission can be greatly improved, the invalid digital key at the vehicle end can be timely and reliably deleted, the consistency of the digital key deleting function is better achieved, and the safety of the vehicle is ensured.
As one embodiment, the instruction transmitting apparatus is plural;
after the sending the key deletion instruction to the instruction transmitting apparatus, further comprising:
and if the successful target digital key deletion information fed back by any one of the instruction transmission devices is received, other instruction transmission devices are informed to clear the cached key deletion instruction.
As an embodiment, after the sending the key deletion instruction to the vehicle end, the method further includes:
and if the successful target digital key deleting information fed back by the vehicle end is received, the successful target digital key deleting information is sent to the server.
As an embodiment, after receiving and caching the key deletion instruction sent by the server, the method further includes:
and if an instruction deleting request sent by the server is received, deleting the cached key deleting instruction.
As an embodiment, before the receiving and caching the key deletion instruction sent by the server, the method further includes:
and generating a key deletion request according to key deletion information input by a user, and sending the key deletion request to the server so that the server can obtain the information of the target digital key to be cleaned according to the key deletion request.
As an embodiment, after deleting the target digital key indicated by the key deletion instruction according to the key deletion instruction, the method further includes:
and feeding back key deletion success information to the terminal so that the terminal synchronizes the key deletion success information to the server.
As an embodiment, the target digital key is a digital key corresponding to a preset movement range;
the deleting the target digital key indicated by the key deleting instruction according to the key deleting instruction comprises:
and if the position of the vehicle end is detected to exceed the preset movable range, deleting the target digital key.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is understood that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a digital key cleaning method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a digital key clearing method according to another embodiment of the present invention;
FIG. 3 is a flow chart of a digital key cleaning method according to yet another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a digital key cleaning device according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a digital key cleaning device according to another embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a digital key cleaning device according to yet another embodiment of the present invention;
fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a digital key cleaning method which can be respectively applied to a server, a terminal and a vehicle end in a PEPS system, so that the server, the terminal and the vehicle end can keep the consistency of the state of a digital key and pairing information. However, the method is not limited thereto, and the method can be applied to all other systems requiring deletion of the digital key. In the embodiment of the invention, the server can generate a key deleting instruction according to the acquired information of the target digital key to be cleaned, encrypt the key deleting instruction, search the information of the instruction transmitting equipment according to the information of the target digital key, then send the key deleting instruction to the instruction transmitting equipment (namely the terminal) so that the instruction transmitting equipment can cache the key deleting instruction, and send the key deleting instruction to the vehicle end after connection is established between the instruction transmitting equipment and the vehicle end based on digital key authentication so that the vehicle end can delete the target digital key. In the embodiment of the invention, the instruction transmission equipment has the authentication access right of the vehicle end, so that the key deleting instruction transmitted by the instruction transmission equipment has higher safety, and meanwhile, the instruction transmission equipment can also be other equipment except the digital key APP end of the vehicle owner, so that the timeliness of the transmission of the key deleting instruction can be greatly improved, the invalid digital key at the vehicle end can be timely and reliably deleted, the consistency of the digital key deleting function is better achieved, and the use safety of the vehicle is ensured. By way of example and not limitation, in the embodiment of the present invention, the instruction transmitting device may be a smart phone, a portable wearable device, a charging pile, or the like. The vehicle end can be a vehicle supporting short-distance communication functions such as Bluetooth, zigbee, wireless fidelity and ultra wide band. The present embodiment is not limited to the specific types of the instruction transmitting device and the vehicle end.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present invention in its various embodiments. However, the technical solution claimed in the present invention can be implemented without these technical details and various changes and modifications based on the following embodiments.
The following description will first take the execution subject as a server. As shown in fig. 1, the digital key cleaning method of the present embodiment includes steps 101 to 103.
Step 101: and acquiring the information of the target digital key to be cleaned.
Wherein, the target digital key is stored in the vehicle end. In the PEPS system, a vehicle end and a terminal respectively store paired digital keys, so that the vehicle end and the terminal realize identity authentication based on the stored digital keys. In practical applications, the owner user may share the digital key with other users, and thus, the vehicle end may store a plurality of digital keys. Some digital keys are invalid due to the end of use or other reasons and need to be deleted in time, and at the moment, the invalid digital keys stored at the vehicle end also need to be deleted in time, so that the use safety of the vehicle is ensured. For example, when the digital key is invalid due to the fact that the owner withdraws the shared digital key, the digital key is frozen, expired and the like, the invalid digital key corresponding to the vehicle end needs to be deleted in time. The target digital key to be cleaned is the invalid digital key stored at the vehicle end.
Step 102: and generating a key deleting instruction according to the information of the target digital key to be cleaned, and encrypting the key deleting instruction.
And the key deleting instruction is used for indicating the vehicle end to delete the target digital key. After the key deletion instruction is generated, the key deletion instruction may be signed, that is, the key deletion instruction is encrypted, and the encryption method of the key deletion instruction is not particularly limited.
Step 103: and searching the information of the instruction transmission equipment according to the information of the target digital key.
Wherein, the instruction transmission equipment has the authentication access authority of the vehicle end.
By way of example and not limitation, the target digital key may be one of a plurality of digital keys stored at the vehicle end, so that all valid digital keys stored at the vehicle end may be queried at the server side, and each valid digital key has a corresponding terminal that can be paired and authenticated with the valid digital key, so that information of a terminal having vehicle-end authentication access authority may be found, and the terminal having vehicle-end authentication access authority may be used as the instruction transmitting device. The instruction transmitting device may be a smart phone or a charging pile, and the like, and is not limited herein.
Step 104: and sending the key deleting instruction to the instruction transmitting equipment so that the instruction transmitting equipment can cache the key deleting instruction, and sending the key deleting instruction to the vehicle end so that the vehicle end can delete the target digital key after connection is established between the instruction transmitting equipment and the vehicle end based on digital key authentication.
And after receiving the key deleting instruction sent by the server, the instruction transmission equipment automatically caches the key deleting instruction. When a user uses one command transmission device to unlock the vehicle end, the command transmission device can authenticate the vehicle end based on BLE or other near field communication technologies and a digital key, establish connection with the vehicle end after authentication is successful, and then send a cached key deleting command to the vehicle end. After the vehicle end receives the key deleting instruction, the vehicle end decrypts the key deleting instruction, for example, the vehicle end verifies and signs the key deleting instruction, and after decryption is successful, the vehicle end can automatically execute the key deleting instruction to delete the target digital key. Because the instruction transmission equipment can be a digital key terminal of a vehicle owner, a terminal of a shared digital key or a charging pile and the like, the target digital key can be effectively removed as long as any instruction transmission equipment is connected with the vehicle end, and the timeliness of cleaning the invalid digital key is improved.
In this embodiment, there are a plurality of instruction transmitting devices. After the key deletion instruction is sent to the instruction transmitting device, the method may further include: and if the successful target digital key deletion information fed back by any one instruction transmission device is received, other instruction transmission devices are informed to clear the cached key deletion instruction.
Specifically, after the vehicle end successfully deletes the target digital key, successful deletion information of the target digital key may be fed back to the corresponding instruction transmission device, and the instruction transmission device feeds back the successful deletion information of the target digital key to the server. After receiving the successful information of deleting the target digital key, the server informs other instruction transmission equipment to clear the cached key deleting instruction, so that the other instruction transmission equipment is prevented from unnecessarily informing the vehicle end of deleting the target digital key.
Compared with the prior art, the key deleting instruction is sent to more other terminals (namely the instruction transmitting equipment) with vehicle-side access authority, and the key deleting instruction is sent to the vehicle side by means of the instruction transmitting equipment, so that the invalid digital key at the vehicle side can be cleaned more timely, and the use safety of the vehicle is improved.
Then, the execution body is taken as the terminal for example for description. As shown in fig. 2, the digital key cleaning method of the present embodiment includes steps 201 and 202.
Step 201: and receiving and caching a key deleting instruction sent by the server.
And the key deleting instruction is used for indicating the vehicle end to delete the target digital key.
In this embodiment, the digital key APP terminal of the vehicle owner or the APP terminal sharing the digital key, and the terminals having the vehicle-side digital key authentication authority, such as the special charging pile of the vehicle side, can all serve as the instruction transmission device to receive the key deletion instruction sent by the server.
Step 202: and after the connection between the vehicle end and the vehicle end is detected to be established based on the digital key authentication, a key deleting instruction is sent to the vehicle end so that the vehicle end can delete the target digital key.
Since a plurality of terminals may receive the key deletion instruction in step 201, when any terminal receiving the key deletion instruction first approaches the vehicle end, for example, when the vehicle is used, a connection is established with the vehicle end based on the digital key, and after the connection is successful, the cached key deletion instruction can be immediately sent to the vehicle end. After the vehicle end receives the key deletion instruction and successfully verifies the signature, the digital key indicated by the key deletion instruction can be immediately deleted, but the vehicle end is not limited to the above, and the deletion task of the target digital key can also be executed according to the deletion deadline indicated by the key deletion instruction.
Optionally, after the key deleting instruction is sent to the vehicle end, the method may further include: and if the successful target digital key deletion information fed back by the vehicle end is received, the successful target digital key deletion information is sent to the server. Further, after receiving and caching the key deletion instruction sent by the server, the method may further include: and if an instruction deleting request sent by the server is received, deleting the cached key deleting instruction. Specifically, after the vehicle end successfully deletes the target digital key, the key deletion success information is timely fed back to the terminal transmitting the key deletion instruction to the vehicle end. Or, when the key deleting instruction is to delete the digital key in a delayed manner, the vehicle end can also feed back the information that the key deleting instruction is successful in receiving. After receiving the key deletion success information, the terminal synchronizes the information to the server, and meanwhile, the terminal can delete the cached key deletion instruction. And the server simultaneously informs other terminals cached with the key deleting instruction to delete the cached key deleting instruction.
In some examples, before receiving and caching the key deletion instruction sent by the server, the method may further include: and generating a key deletion request according to the key deletion information input by the user, and sending the key deletion request to the server so that the server can obtain the information of the target digital key to be cleaned according to the key deletion request. Specifically, the key deletion request may be generated by the APP side of the owner. At the moment, the vehicle owner can open the digital key APP, check the digital key management list, select the digital key needing to be deleted, the APP terminal generates a key deletion request according to the digital key needing to be deleted and sends the key deletion request to the server, at the moment, the state of the digital key needing to be deleted can be displayed as deletion, and when the synchronous deletion success information of the vehicle terminal or the server is received, the state of the digital key is correspondingly updated or the digital key is deleted from the key management list.
Compared with the prior art, the embodiment has the advantages that besides the digital key APP end of the vehicle owner, more terminals with vehicle end digital key authentication authority can receive the key deleting instruction issued by the server, and the key deleting instruction is sent to the vehicle end when the terminal is close to the vehicle end, so that the invalid digital key of the vehicle end can be cleared more timely under the condition that the vehicle owner is inconvenient, and the use safety of the vehicle is improved.
Finally, the execution main body is taken as a vehicle end for example to be described. As shown in fig. 3, the method for clearing a digital key of the present embodiment includes steps 301 to 303.
Step 301: and establishing connection with the terminal based on the digital key authentication.
In this embodiment, the terminal can be the digital key APP end of car owner, the digital key APP end of sharing or establish the electric pile etc. that fills who is connected based on digital key and car end to make the connection between terminal and the car end have the security of preferred.
Step 302: and receiving and decrypting a key deleting instruction sent by the terminal.
Here, the vehicle end may perform signature verification and the like on the key deletion instruction, and the encryption and decryption manner of the key deletion instruction is not specifically limited in this embodiment.
Step 303: and deleting the target digital key indicated by the key deletion instruction according to the decrypted key deletion instruction.
In this embodiment, the key deletion instruction may be used to instruct the vehicle end to delete the target digital key immediately, or delete the target digital key within a specified time, and the like, which is not limited herein.
Optionally, after deleting the target digital key indicated by the key deletion instruction according to the key deletion instruction in step 303, the method may further include:
and feeding back the key deletion success information to the terminal so that the terminal synchronizes the key deletion success information to the server. The server can synchronize the key deletion success information to the digital key APP terminal of the vehicle owner, so that the vehicle owner can timely obtain the cleaning completion state of the target digital key.
In one example, the target digital key may also be a digital key corresponding to a preset range of motion. The preset moving range can be set by a vehicle owner, namely, an electronic fence is arranged at the vehicle end. Accordingly, the step 303 of deleting the target digital key indicated by the key deletion instruction according to the key deletion instruction may include: and if the position of the vehicle end is detected to exceed the preset movable range, deleting the target digital key.
Compared with the prior art, any terminal which can be connected with the vehicle end based on the digital key can send a key deleting instruction to the vehicle end, so that the invalid digital key of the vehicle end can be cleaned more timely and conveniently, and the use safety of the vehicle is improved.
As shown in fig. 4, an embodiment of the present application further provides a digital key cleaning apparatus 400, where the cleaning apparatus 400 is disposed in a server, and the cleaning apparatus 400 includes:
the acquiring module 401 is configured to acquire information of a target digital key to be cleaned. Wherein, the target digital key is stored in the vehicle end.
A generating module 402, configured to generate a key deletion instruction according to the information of the target digital key to be cleaned, and encrypt the key deletion instruction.
And the query module 403 is configured to find information of the instruction transmitting device according to the information of the target digital key. Wherein, the instruction transmission equipment has the authentication access authority of the vehicle end.
The sending module 404 sends the key deletion instruction to the instruction transmitting device, so that the instruction transmitting device caches the key deletion instruction, and sends the key deletion instruction to the vehicle end after connection is established between the instruction transmitting device and the vehicle end based on digital key authentication, so that the vehicle end deletes the target digital key.
Optionally, there are a plurality of instruction transmitting devices, and the cleaning apparatus 400 may further include:
and the recovery module is used for informing other instruction transmission equipment of clearing the cached key deletion instruction if receiving the successful target digital key deletion information fed back by any instruction transmission equipment after sending the key deletion instruction to the instruction transmission equipment.
The cleaning device of the embodiment sends the key deleting instruction to other terminals (namely, instruction transmitting equipment) with vehicle-side access authority, and sends the key deleting instruction to the vehicle side by means of the instruction transmitting equipment, so that the cleaning device is favorable for cleaning the invalid digital key at the vehicle side more timely, and the use safety of the vehicle is improved.
As shown in fig. 5, an embodiment of the present application further provides a digital key cleaning device 500, where the cleaning device 500 is disposed in a terminal, and the cleaning device 500 includes:
and the receiving module 501 is configured to receive a key deletion instruction sent by the server and cache the key deletion instruction. And the key deleting instruction is used for indicating the vehicle end to delete the target digital key.
The sending module 502 is configured to send a key deletion instruction to the vehicle end after detecting that a connection is established between the vehicle end and the vehicle end based on digital key authentication, so that the vehicle end deletes the target digital key.
Optionally, the cleaning apparatus 500 may further include:
and the synchronization module is used for sending the key deletion instruction to the vehicle end, and sending the target digital key deletion success information to the server if the target digital key deletion success information fed back by the vehicle end is received.
Optionally, the cleaning apparatus 500 may further include:
and the instruction clearing module is used for deleting the cached key deleting instruction if receiving an instruction deleting request sent by the server after receiving and caching the key deleting instruction sent by the server.
Optionally, the cleaning apparatus 500 may further include:
and the deletion initiating module is used for generating a key deletion request according to the key deletion information input by the user before receiving the key deletion instruction sent by the server and caching the key deletion instruction, and sending the key deletion request to the server so that the server can obtain the information of the target digital key to be cleaned according to the key deletion request.
The cleaning device of this embodiment, except car owner's digital key APP end, the key that all can receive the server and issue deletes the instruction more the terminal that has car end digital key authentication authority to send it for the car end when being close to the car end, thereby can clear up the digital key that loses efficacy of car end more in time under the inconvenient condition of car owner, improve vehicle safety in utilization.
As shown in fig. 6, the present application further provides a digital key cleaning apparatus 600, where the cleaning apparatus 600 is disposed at a vehicle end, and the cleaning apparatus 600 includes:
the connection module 601 is configured to establish a connection with a device based on digital key authentication.
And the instruction receiving module 602 is configured to receive a key deleting instruction sent by the device and decrypt the key deleting instruction.
And the deleting module 603 is configured to delete the target digital key indicated by the key deleting instruction according to the decrypted key deleting instruction.
Optionally, the cleaning apparatus 600 may further include:
and the feedback module is used for feeding back the key deletion success information to the terminal after deleting the target digital key indicated by the key deletion instruction according to the key deletion instruction, so that the terminal synchronizes the key deletion success information to the server.
Optionally, the target digital key may also be a digital key corresponding to a preset moving range, and the deleting module 603 is specifically configured to delete the target digital key if it is detected that the position of the vehicle end exceeds the preset moving range.
The cleaning device of the embodiment can send a key deleting instruction to the vehicle end based on any terminal which can establish connection between the digital key and the vehicle end, so that the invalid digital key of the vehicle end can be cleaned more timely and conveniently, and the use safety of the vehicle is improved.
An embodiment of the present application further provides a computer device, as shown in fig. 7, the computer device includes: memory 702, processor 701;
the memory 702 stores instructions executable by the at least one processor 701, and the instructions are executed by the at least one processor 701 to implement the digital key cleaning method according to the foregoing embodiments.
The computer device includes one or more processors 701 and a memory 702, one processor 701 being taken as an example in fig. 7. The processor 701 and the memory 702 may be connected by a bus or by other means, and fig. 7 illustrates an example of a bus connection. Memory 702, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The processor 701 executes various functional applications and data processing of the device by executing nonvolatile software programs, instructions, and modules stored in the memory 702, that is, implements the above-described digital key cleaning method.
The memory 702 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like. Further, the memory 702 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
One or more modules are stored in the memory 702 and, when executed by the one or more processors 701, perform the digital key cleaning method of any of the method embodiments described above.
The above-mentioned device can execute the method provided by the embodiment of the present invention, and has the corresponding functional modules and beneficial effects of the execution method, and reference may be made to the method provided by the embodiment of the present invention for technical details that are not described in detail in the embodiment.
The computer equipment of the embodiment sends the key deleting instruction sent by the server to the vehicle end in time by means of more terminals (namely instruction transmitting equipment) with vehicle end access authority, so that the invalid digital key at the vehicle end can be cleaned more timely, and the use safety of the vehicle is improved.
An embodiment of the present application further provides a non-volatile storage medium for storing a computer-readable program, where the computer-readable program is used for a computer to execute some or all of the above method embodiments.
That is, those skilled in the art can understand that all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (6)

1. A digital key cleaning method is applied to a server, and is characterized by comprising the following steps:
acquiring information of a target digital key to be cleaned; the target digital key is stored at the vehicle end;
generating a key deleting instruction according to the information of the target digital key to be cleaned, and encrypting the key deleting instruction;
searching the information of the instruction transmission equipment according to the information of the target digital key; the command transmission equipment has the authentication access right of the vehicle end;
sending the key deleting instruction to the instruction transmitting equipment so that the instruction transmitting equipment can cache the key deleting instruction, and sending the key deleting instruction to the vehicle end after connection is established between the instruction transmitting equipment and the vehicle end based on digital key authentication so that the vehicle end can delete the target digital key;
wherein the instruction transmitting apparatus includes: at least two of a digital key APP end of a vehicle owner, an APP end sharing the digital key and a special charging pile of the vehicle end; after the vehicle end successfully deletes the target digital key, feeding back key deletion success information to instruction transmission equipment for transmitting a key deletion instruction to the vehicle end; or when the key deleting instruction is the digital key which is deleted in a delayed mode, the vehicle end feeds back the key deleting instruction to receive success information; after receiving the key deletion success information, the instruction transmission equipment deletes the cached key deletion instruction and synchronizes the key deletion success information to the server; and the server simultaneously informs other instruction transmission equipment with the key deleting instruction cached therein to delete the key deleting instruction cached therein.
2. A digital key cleaning method is applied to a terminal, and is characterized by comprising the following steps:
receiving and caching a key deleting instruction sent by a server; the key deleting instruction is used for indicating the vehicle end to delete the target digital key;
after connection with the vehicle end is detected to be established based on digital key authentication, the key deleting instruction is sent to the vehicle end so that the vehicle end can delete the target digital key;
wherein, the terminal includes: a digital key APP terminal of a vehicle owner, an APP terminal sharing the digital key or a special charging pile of the vehicle terminal; after the vehicle end successfully deletes the target digital key, the successful key deletion information is fed back to the terminal which transmits the key deletion instruction to the vehicle end; or when the key deleting instruction is the digital key deleting delayed instruction, the vehicle end feeds back the key deleting instruction to receive success information; after receiving the key deletion success information, the terminal deletes the cached key deletion instruction and synchronizes the key deletion success information to the server; and the server simultaneously informs other terminals cached with the key deleting instruction to delete the cached key deleting instruction.
3. The method for clearing a digital key according to claim 2, further comprising, before the receiving and buffering the key deletion command sent by the server:
and generating a key deletion request according to key deletion information input by a user, and sending the key deletion request to the server so that the server can obtain the information of the target digital key to be cleaned according to the key deletion request.
4. A digital key cleaning device disposed in a server, comprising:
the acquisition module is used for acquiring the information of the target digital key to be cleaned; the target digital key is stored at the vehicle end;
the generating module is used for generating a key deleting instruction according to the information of the target digital key to be cleaned and encrypting the key deleting instruction;
the query module is used for searching the information of the instruction transmission equipment according to the information of the target digital key; the command transmission equipment has the authentication access right of the vehicle end;
the sending module is used for sending the key deleting instruction to the instruction transmitting equipment so that the instruction transmitting equipment can cache the key deleting instruction, and sending the key deleting instruction to the vehicle end after connection is established between the instruction transmitting equipment and the vehicle end based on digital key authentication so that the vehicle end can delete the target digital key; wherein the instruction transmitting apparatus includes: at least two of a digital key APP end of a vehicle owner, an APP end sharing the digital key and a special charging pile of the vehicle end; after the vehicle end successfully deletes the target digital key, feeding back key deletion success information to instruction transmission equipment for transmitting a key deletion instruction to the vehicle end; or when the key deleting instruction is the digital key which is deleted in a delayed mode, the vehicle end feeds back the key deleting instruction to receive success information; after receiving the key deletion success information, the instruction transmission equipment deletes the cached key deletion instruction and synchronizes the key deletion success information to the server; and the server simultaneously informs other instruction transmission equipment with the key deleting instruction cached therein to delete the key deleting instruction cached therein.
5. A digital key cleaning device provided in a terminal, comprising:
the receiving module is used for receiving and caching the key deleting instruction sent by the server; the key deleting instruction is used for indicating the vehicle end to delete the target digital key;
the sending module is used for sending the key deleting instruction to the vehicle end after detecting that connection is established between the sending module and the vehicle end based on digital key authentication so that the vehicle end can delete the target digital key;
wherein, the terminal includes: a digital key APP terminal of a vehicle owner, an APP terminal sharing the digital key or a special charging pile of the vehicle terminal; after the vehicle end successfully deletes the target digital key, the successful key deletion information is fed back to the terminal which transmits the key deletion instruction to the vehicle end; or when the key deleting instruction is the digital key deleting delayed instruction, the vehicle end feeds back the key deleting instruction to receive success information; after receiving the key deletion success information, the terminal deletes the cached key deletion instruction and synchronizes the key deletion success information to the server; and the server simultaneously informs other terminals cached with the key deleting instruction to delete the cached key deleting instruction.
6. Computer apparatus, comprising: a memory storing a computer program and a processor running the computer program to implement the digital key cleaning method according to any one of claims 1 to 3.
CN202011094091.1A 2020-10-14 2020-10-14 Digital key cleaning method and computer equipment Active CN112215992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011094091.1A CN112215992B (en) 2020-10-14 2020-10-14 Digital key cleaning method and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011094091.1A CN112215992B (en) 2020-10-14 2020-10-14 Digital key cleaning method and computer equipment

Publications (2)

Publication Number Publication Date
CN112215992A CN112215992A (en) 2021-01-12
CN112215992B true CN112215992B (en) 2022-12-20

Family

ID=74053331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011094091.1A Active CN112215992B (en) 2020-10-14 2020-10-14 Digital key cleaning method and computer equipment

Country Status (1)

Country Link
CN (1) CN112215992B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114830619B (en) * 2021-02-19 2024-04-26 深圳市汇顶科技股份有限公司 Vehicle key control method and device, vehicle and vehicle key body
CN118230451A (en) * 2021-03-19 2024-06-21 上海博泰悦臻网络技术服务有限公司 Digital key deleting method, device, equipment, system and storage medium
CN113706743A (en) * 2021-07-15 2021-11-26 上海瓶钵信息科技有限公司 Digital key authorization issuing and withdrawing method and system
CN113808304A (en) * 2021-08-25 2021-12-17 上海瓶钵信息科技有限公司 Asynchronous end-to-end digital key recovery method and system
CN113660086A (en) * 2021-09-18 2021-11-16 上海瓶钵信息科技有限公司 Reliable failure method and system for off-line digital key
CN115410297A (en) * 2022-08-03 2022-11-29 重庆金康赛力斯新能源汽车设计院有限公司 Digital car key management method, device, medium and vehicle-mounted terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100407741C (en) * 2003-03-06 2008-07-30 华为技术有限公司 Short message processing method
CN105578422B (en) * 2015-12-15 2018-12-28 北京交通大学 Information transferring method and device based on vehicle mobile terminals
CN108076213A (en) * 2017-10-30 2018-05-25 努比亚技术有限公司 A kind of terminal based reminding method, terminal and computer readable storage medium
CN109727354A (en) * 2018-12-27 2019-05-07 北京摩拜科技有限公司 A kind of control method and system of vehicle
CN110091828B (en) * 2019-05-16 2022-12-13 广州小鹏汽车科技有限公司 Vehicle key control method and device

Also Published As

Publication number Publication date
CN112215992A (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN112215992B (en) Digital key cleaning method and computer equipment
CN107493561B (en) Shared device unlocking method, device and system and storage medium
CN108989848B (en) Video resource file acquisition method and management system
CN110049016B (en) Data query method, device, system, equipment and storage medium of block chain
KR101889495B1 (en) Wireless configuration using passive near field communication
CN108134789B (en) Method for synchronizing data between devices through cloud and cloud server
CN109525390B (en) Quantum key wireless distribution method and system for terminal equipment secret communication
CN113099443B (en) Equipment authentication method, device, equipment and system
CN106330442B (en) Identity authentication method, device and system
CN110969431B (en) Secure hosting method, device and system for private key of blockchain digital coin
US11924635B2 (en) Security authentication method and apparatus thereof, and electronic device
CN108696476B (en) Security policy configurable automobile key system and implementation method thereof
CN109474927B (en) Information interaction method, home network, user terminal and information interaction system
US20200127818A1 (en) Key exchange system and key exchange method
CN107993073B (en) Face recognition system and working method thereof
KR20120071556A (en) Image secure tansmission apparatus, image data reception apparatus, and key generation method therefor
CN106549939B (en) Data processing method and device for intelligent access control system
KR102157453B1 (en) Cryptographic chip using identity verification
CN105959281B (en) File encryption transmission method and device
CN112866981B (en) Method and device for managing subscription data
CN105656870A (en) Data transmission method, device and system
JP2001523064A (en) Generate seed count
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication
KR102321405B1 (en) System and method for providing security service using blockchain and biometric information
CN109413648A (en) Access control method, terminal, smart card, background server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant