CN112652091A - Vehicle unlocking method, vehicle machine and mobile terminal - Google Patents
Vehicle unlocking method, vehicle machine and mobile terminal Download PDFInfo
- Publication number
- CN112652091A CN112652091A CN201910910983.5A CN201910910983A CN112652091A CN 112652091 A CN112652091 A CN 112652091A CN 201910910983 A CN201910910983 A CN 201910910983A CN 112652091 A CN112652091 A CN 112652091A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- mobile terminal
- random number
- machine
- side random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 98
- 238000012795 verification Methods 0.000 claims abstract description 135
- 230000002452 interceptive effect Effects 0.000 claims abstract description 121
- 238000004891 communication Methods 0.000 claims abstract description 65
- 230000000977 initiatory effect Effects 0.000 claims abstract description 17
- 238000003860 storage Methods 0.000 claims description 29
- 230000008569 process Effects 0.000 claims description 23
- 230000003993 interaction Effects 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 7
- 230000002618 waking effect Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 14
- 238000004590 computer program Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000000342 Monte Carlo simulation Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/48—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00365—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the disclosure discloses a vehicle unlocking method, a vehicle machine and a mobile terminal, relates to the technical field of vehicle control, and mainly aims to unlock a vehicle when a vehicle unlocking application is in a condition of no network or no foreground operation. The main technical scheme of the embodiment of the disclosure comprises the following steps: broadcasting the data packet; performing interactive verification with a mobile terminal initiating data communication, and acquiring vehicle key information issued by the mobile terminal when the interactive verification is passed, wherein the data communication is initiated by a vehicle unlocking application which wakes up the vehicle unlocking application when the mobile terminal monitors the data packet; and determining the distance between the mobile terminal and the vehicle, and executing vehicle unlocking operation corresponding to the distance based on the vehicle key information.
Description
Technical Field
The embodiment of the disclosure relates to the technical field of vehicle control, in particular to a vehicle unlocking method, a vehicle machine and a mobile terminal.
Background
With the development of the automobile industry, automobiles are used more and more frequently in daily life of people, so that the automobiles can provide a more convenient and faster automobile unlocking operation interaction mode for users in order to facilitate the users to use the automobiles, and the automobile unlocking operation interaction mode becomes one of the future development trends of the automobile industry.
Currently, the vehicle unlocking operation is completed based on the interaction between the mobile terminal and the vehicle. When the mobile terminal interacts with the vehicle, a convenient interaction experience of keyless vehicle unlocking can be created for a user. When the mobile terminal and the vehicle carry out interaction to carry out vehicle unlocking operation, the vehicle unlocking operation can be carried out only when the vehicle unlocking application in the mobile terminal is in a foreground running state. As can be seen, in the prior art, the vehicle unlocking operation is limited to the state of the vehicle unlocking application.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a vehicle unlocking method, a vehicle device, and a mobile terminal, and mainly aim to unlock a vehicle no matter whether a vehicle unlocking application is in a foreground, a background, a closed state, or a no-network state. The embodiment of the disclosure mainly provides the following technical scheme:
in a first aspect, an embodiment of the present disclosure provides a vehicle unlocking method, which is applied to a vehicle machine, and the method includes:
broadcasting the data packet;
performing interactive verification with a mobile terminal initiating data communication, and acquiring vehicle key information issued by the mobile terminal when the interactive verification is passed, wherein the data communication is initiated by a vehicle unlocking application which wakes up the vehicle unlocking application when the mobile terminal monitors the data packet;
and determining the distance between the mobile terminal and the vehicle, and executing vehicle unlocking operation corresponding to the distance based on the vehicle key information.
In a second aspect, an embodiment of the present disclosure provides a vehicle unlocking method, which is applied to a mobile terminal, and the method includes:
when a data packet broadcasted by a vehicle machine is monitored, a vehicle unlocking application is awakened to initiate data communication to the vehicle machine;
and carrying out interactive verification on the vehicle machine, and sending out vehicle key information to the vehicle machine when the interactive verification is passed, wherein the vehicle key information is used for unlocking the vehicle.
In a third aspect, an embodiment of the present disclosure provides a car machine, where the car machine includes:
a broadcasting unit for broadcasting the data packet;
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for carrying out interactive verification with a mobile terminal initiating data communication and acquiring vehicle key information issued by the mobile terminal when the interactive verification passes, and the data communication is initiated by a vehicle unlocking application which wakes up the vehicle unlocking application when the mobile terminal monitors the data packet;
and the unlocking unit is used for determining the distance between the mobile terminal and the vehicle and executing vehicle unlocking operation corresponding to the distance based on the vehicle key information.
In a fourth aspect, an embodiment of the present disclosure provides a mobile terminal, including:
the system comprises a wake-up unit, a data communication unit and a data communication unit, wherein the wake-up unit is used for waking up a vehicle unlocking application to initiate data communication to a vehicle machine when monitoring a data packet broadcasted by the vehicle machine;
and the issuing unit is used for performing interactive verification with the vehicle machine and issuing the vehicle key information to the vehicle machine when the interactive verification is passed, wherein the vehicle key information is used for unlocking the vehicle.
In a fifth aspect, embodiments of the present disclosure provide a vehicle unlocking system, including: the car machine of the third aspect and the moving end of the fourth aspect.
In a sixth aspect, an embodiment of the present disclosure provides a storage medium including a stored program, where the program, when executed, controls a device in which the storage medium is located to execute the vehicle unlocking method according to the first aspect or the second aspect.
In a seventh aspect, an embodiment of the present disclosure provides a human-computer interaction device, including a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions when executed perform the vehicle unlocking method of the first aspect.
By means of the technical scheme, the vehicle unlocking method, the vehicle machine and the mobile terminal provided by the embodiment of the disclosure firstly broadcast the data packet for the mobile terminal to monitor. When the mobile terminal monitors the data packet, the mobile terminal wakes up the vehicle unlocking application, carries out interactive verification with the mobile terminal initiating the data communication when the data communication is initiated by the vehicle unlocking application, and acquires the vehicle key information issued by the mobile terminal when the interactive verification is passed. Then, the distance between the mobile terminal and the vehicle is determined, and vehicle unlocking operation corresponding to the distance is performed based on the vehicle key information. Therefore, no matter the vehicle unlocking application is in a foreground state, a background state, a closed state or a no-network state, the vehicle unlocking application can be awakened through the broadcast data packet to initiate data communication to the vehicle machine, and therefore unlocking operation of the vehicle is completed.
The foregoing description is only an overview of the embodiments of the present disclosure, and in order to make the technical means of the embodiments of the present disclosure more clearly understood, the embodiments of the present disclosure may be implemented in accordance with the content of the description, and in order to make the foregoing and other objects, features, and advantages of the embodiments of the present disclosure more clearly understood, the following detailed description of the embodiments of the present disclosure is given.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the embodiments of the present disclosure. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 shows a flowchart of a method for unlocking a vehicle according to an embodiment of the present disclosure;
fig. 2 shows a flowchart of a vehicle unlocking method applied to a vehicle machine according to an embodiment of the present disclosure;
FIG. 3 shows a distance illustration of a vehicle unlock provided by an embodiment of the present disclosure;
FIG. 4 illustrates a schematic diagram of a positioning assistance module provided by an embodiment of the present disclosure;
FIG. 5 shows a flow chart of another vehicle unlocking method provided by embodiments of the present disclosure;
fig. 6 shows a flowchart of a vehicle unlocking method applied to a vehicle machine according to an embodiment of the present disclosure;
fig. 7 shows a flowchart of a vehicle unlocking method applied to a vehicle unlocking system according to an embodiment of the disclosure;
fig. 8 shows a block diagram of a vehicle machine provided in an embodiment of the present disclosure;
fig. 9 shows a block diagram of another vehicle machine provided in the embodiment of the present disclosure;
fig. 10 is a block diagram illustrating a mobile terminal according to an embodiment of the present disclosure;
fig. 11 shows a block diagram of another mobile terminal according to an embodiment of the present disclosure;
fig. 12 shows a block diagram of a vehicle unlocking system provided by an embodiment of the disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In a first aspect, an embodiment of the present disclosure provides a vehicle unlocking method, where the method is applied to a vehicle machine, and as shown in fig. 1, the method mainly includes:
101. and broadcasting the data packet.
The car machine in this embodiment is a vehicle-mounted terminal that is mounted on a vehicle cab, has multiple functions such as 3G/4G/5G wireless communication, GPS (Global Positioning System) navigation, shopping, entertainment, and audio and video, and can control operations such as unlocking and running of a vehicle. In the embodiment, the vehicle can interact with the mobile terminal, and the unlocking operation of the vehicle is completed under the request of the mobile terminal.
In practical application, the car machine broadcast is used for awakening the data packet of the vehicle unlocking application in a foreground running state or a background running state or in a closed state, and even if the vehicle unlocking application is not in the foreground running state, the data packet can be awakened in time, so that the mobile terminal and the car machine can perform vehicle unlocking related interaction. The vehicle is provided with a broadcasting module, and the vehicle machine broadcasts a data packet by using the broadcasting module. The method of broadcasting the data packet is related to the number of broadcasting modules deployed in the vehicle, and there are at least the following methods:
first, when a broadcast module is deployed in a vehicle, the car machine broadcasts a data packet for the mobile terminal to monitor by using the broadcast module. When the mobile terminal monitors the data packet, the vehicle unlocking application is awakened, and when the vehicle unlocking application initiates data communication, the mobile terminal performs interactive verification with the mobile terminal initiating the data communication. If the interactive verification with the mobile terminal does not pass, the vehicle machine controls the broadcasting module to stop broadcasting the data packet, and determines a new data packet again, and broadcasts the new data packet by using the determined broadcasting module again.
Second, when a plurality of broadcast modules are deployed in a vehicle, a data packet is broadcast using only one of the plurality of broadcast modules at a time. When the mobile terminal monitors the data packet, the vehicle unlocking application is awakened, and when the vehicle unlocking application initiates data communication, the mobile terminal performs interactive verification with the mobile terminal initiating the data communication. If the interactive verification with the mobile terminal does not pass, the vehicle machine controls the broadcasting module which currently executes the broadcasting to stop broadcasting the data packet, and reselects a new broadcasting module from the plurality of broadcasting modules to broadcast the data packet. In the method, a plurality of broadcasting modules can work alternately, so that the vehicle-mounted device and the mobile terminal can complete interactive verification smoothly. It should be noted that, in order to improve the security, after controlling the broadcast module currently executing the broadcast to stop broadcasting the data packet, before reselecting a new broadcast module from the plurality of broadcast modules to broadcast the data packet, it is further necessary to determine whether the total broadcast duration of the data packet exceeds a preset duration threshold, and if it is determined that the total broadcast duration of the data packet reaches the preset duration threshold, it indicates that the data packet is broadcast for a longer time, and the probability of being maliciously attacked and maliciously intercepted is higher, it is necessary to obtain the new data packet, and reselect a new broadcast module from the plurality of broadcast modules to broadcast the new data packet. After acquiring a new data packet, in order to reduce the occupied amount of the storage space in the car machine, the data packet with the total broadcast time length reaching the time length threshold value is cleared, and the car machine does not store the data packet any more.
In this embodiment, the broadcast module may broadcast the data packet in the long-distance transmission mode or the short-distance transmission mode, and ensure that data communication can be established between the mobile terminal and the vehicle terminal whether the mobile terminal is in a network-connected state or a network-free state, thereby completing the operation of unlocking the vehicle. The long-distance transmission mode comprises a wired network, a 2G/3G/4G/5G wireless network and the like. The short-distance transmission mode comprises Bluetooth, radio frequency and the like. Optionally, the broadcast module is an iBeacon module (a must ken module, and the following "must ken module" is all expressed as the "iBeacon module"), and the iBeacon module is a module equipped with a BLE (Bluetooth Low Energy) communication function, and broadcasts a specific data packet to its surroundings by using a BLE technology, so that the vehicle unlocking application receiving the data packet performs an awake state. Because the communication mode of the iBeacon module is Bluetooth, even if the vehicle machine and the mobile terminal are in a double-off-line state, the operation of unlocking the vehicle can be completed through Bluetooth interaction.
In practical applications, the content included in the data packet may be determined based on service requirements, and is not specifically limited in this embodiment. Optionally, when the broadcast module is an iBeacon module, the data packet is iBeacon information. The data packet comprises the following contents: UUID, Major, Minor, and Measured Power. Where UUID is a universally unique identifier is a 128-bit identifier specified as the ISO/IEC11578:1996 standard. Major and Minor are set by the iBeacon issuer themselves and are both 16-bit identifiers. For example, the car machine can write the area information in Major, and write the ID of the car machine in Minor, etc. Measured Power is the reference Received Signal Strength (RSSI) at a distance of 1m between the iBeacon module and the mobile terminal. The vehicle machine can calculate the distance between the iBeacon module and the mobile terminal according to the reference RSSI and the strength of the signal fed back by the mobile terminal.
The following description is provided by deploying two broadcast modules "iBeacon module" in the car machine: as shown in fig. 2, an iBeacon module 201 and an iBeacon module 202 are deployed in the car machine. And broadcasting the iBeacon information by only one iBeacon module in the 2 iBeacon modules at the same time. An iBeacon controller is deployed in each iBeacon module, and the iBeacon controller is responsible for controlling the iBeacon module to open or close broadcasting iBeacon information. When the iBeacon module is opened to carry out iBeacon information broadcasting, the iBeacon module broadcasts iBeacon information to be monitored by the mobile terminal. When the vehicle machine and the mobile terminal initiating data communication carry out interactive verification, the vehicle machine broadcasts information related to the interactive verification to carry out verification with the mobile terminal, and after the verification is passed, the vehicle machine executes vehicle unlocking operation.
102. And carrying out interactive verification with a mobile terminal initiating data communication, and acquiring vehicle key information issued by the mobile terminal when the interactive verification is passed, wherein the data communication is initiated by a vehicle unlocking application which wakes up the vehicle unlocking application when the mobile terminal monitors the data packet.
In practical application, the mobile terminal wakes up the vehicle unlocking application to enter a wake-up state when monitoring a data packet, and the vehicle unlocking application initiates data communication to the vehicle machine when the vehicle unlocking application enters the wake-up state, so that the vehicle machine and the mobile terminal perform interactive verification.
The interactive authentication with the mobile terminal initiating data communication in this embodiment specifically includes the following steps 1021-:
1021. generating a vehicle machine side random number in the interactive verification process with the mobile terminal, sending the vehicle machine side random number to the mobile terminal, and obtaining the mobile terminal side random number sent by the mobile terminal in the interactive verification process. It should be noted that the car-machine-side random number may include first car-side random data and second car-side random data, where the first car-side random number and the second car-side random number are generated at different authentication nodes in the mobile terminal and the car-machine authentication.
In practical applications, the specific implementation procedure of step 1021 includes:
a1, generating a first vehicle-side random number when performing interactive authentication with the mobile terminal.
In this embodiment, the first vehicle-side random number is a character string having a set number of digits, and the first vehicle-side random number includes at least one of the following contents: characters, numbers, and symbols. The first vehicle-side random number generation method may include, but is not limited to, any one of a monte carlo method, generation of U (0,1) random numbers, generation of random numbers from U (0,1) to other probability distributions, and generation of normal random numbers. It should be noted that, in order to ensure the security of the mutual authentication between the car machine and the mobile terminal, the first car-side random number is generated for the data communication between the current car machine and the mobile terminal.
And A2, sending the first vehicle-side random number and a preset vehicle-machine public key to the mobile terminal.
In this embodiment, when the communication connection in the bluetooth mode is performed between the car machine and the mobile terminal, the first car-side random number and the preset car machine public key are sent to the mobile terminal based on the bluetooth mode.
A3, receiving verification information fed back by the mobile terminal, wherein the verification information is a mobile terminal public key and a mobile terminal side random number encrypted by the vehicle machine public key.
In this embodiment, the check information is sent back to the car machine when the mobile terminal checks that the public key of the car machine passes through.
In this embodiment, the mobile end random number is a character string with a set number of digits, and the mobile end random number includes at least one of the following contents: characters, numbers, and symbols. The generation method of the mobile terminal side random number may include, but is not limited to, any one of a monte carlo method, generation of a U (0,1) random number, a random number from U (0,1) to other probability distributions, and generation of a normal random number.
A4, verifying the verification information by using a preset vehicle machine private key, obtaining the mobile terminal side random number when the verification is passed, and generating a second vehicle machine side random number.
Specifically, the process of verifying the verification information by using the car machine private key comprises the following steps: and decrypting the mobile terminal public key and the mobile terminal side random number encrypted by the vehicle machine public key by using the vehicle machine private key, and comparing the mobile terminal public key with a mobile terminal public key preset in the vehicle machine when the mobile terminal public key is obtained through decryption. When the consistency is obtained through comparison, the verification is passed; if the inconsistency is compared, the verification is not passed.
Specifically, the second vehicle-side random number generation method may include, but is not limited to, any one of a monte carlo method, generation of U (0,1) random numbers, generation of random numbers from U (0,1) to other probability distributions, and generation of normal random numbers. The second vehicle-side random number is a character string in which at least one of a number, a letter, and a symbol is combined, and has a predetermined number of characters. It should be noted that, in order to ensure the security of the mutual authentication between the car machine and the mobile terminal, the second car-side random number is generated for the data communication between the current car machine and the mobile terminal.
A5, sending the second vehicle-side random number encrypted by the mobile terminal public key to the mobile terminal.
Specifically, when receiving the second vehicle-side random number encrypted by the mobile terminal public key, the mobile terminal verifies the second vehicle-side random number encrypted by the mobile terminal public key, and obtains the second vehicle-side random number when the verification is passed, so that the mobile terminal generates the second interactive verification information by using the first vehicle-side random number, the second vehicle-side random number, and the mobile terminal-side random number.
1012. And generating first interactive verification information based on the vehicle machine side random number and the mobile terminal side random number.
In this embodiment, the method for generating the first interactive verification information based on the random number at the vehicle side and the random number at the mobile side at least includes the following two methods:
first, a car machine side random number and a mobile side random number are spliced to obtain first interactive verification information. It should be noted that the splicing order of the car-machine-side random number and the mobile-side random number may be determined based on the service requirement, for example, the car-machine-side random number may be located before the mobile-side random number or may be located after the mobile-side random number when splicing. In addition, when the vehicle-side random number includes the first vehicle-side random number and the second vehicle-side random number, the first vehicle-side random number and the second vehicle-side random number are spliced first (the first vehicle-side random number may be located before the second vehicle-side random number or may be located after the second vehicle-side random number in splicing), and then the spliced first vehicle-side random number and the spliced second vehicle-side random number are spliced with the mobile-side random number.
And secondly, performing preset operation on the random number at the vehicle side and the random number at the mobile side to obtain first interactive verification information. Wherein the predetermined operation at least comprises a hash operation.
No matter which method is adopted to generate the first interactive verification information, the first interactive verification information is generated based on the vehicle-machine side random number and the mobile-end side random number of the current data communication, so that the safety protection effect on the vehicle key information based on the first interactive verification information is excellent.
1013. And receiving encrypted vehicle key information of second interactive verification information sent by the mobile terminal, wherein the second interactive verification information is obtained by the mobile terminal based on the vehicle machine side random number and the mobile terminal side random number.
1014. And the vehicle key information is encrypted by second interactive verification information sent by the mobile terminal and decrypted by the first interactive verification information.
Specifically, the second mutual authentication information is generated by the mobile terminal based on the car machine side random number and the mobile terminal side random number.
Specifically, in order to be able to successfully verify the encrypted vehicle key information, the method of decrypting the data using the second mutual authentication information should correspond to the method of encrypting the data using the first mutual authentication information.
It should be noted that, the first mutual authentication information and the second mutual authentication information are both generated based on the car machine side random number and the mobile side random number of the current data communication, so that the transmission of the car key information between the car machine and the mobile terminal is completed based on the first mutual authentication information and the second mutual authentication information, and the security protection effect is excellent.
103. And determining the distance between the mobile terminal and the vehicle, and executing vehicle unlocking operation corresponding to the distance based on the vehicle key information.
In practical application, the car key information is composed of a plurality of characters, wherein the characters at least comprise at least one of the following contents: data, letters, and symbols. Illustratively, the vehicle key information is "123456 AAC".
In practical applications, the smaller the distance between the mobile terminal and the vehicle is, the closer the vehicle user holding the mobile terminal is to the vehicle is, the greater the user's control over the vehicle is, and therefore, the smaller the distance between the mobile terminal and the vehicle is, the higher the correlation between the performed vehicle unlocking operation and the vehicle entering the driving state is.
Illustratively, as shown in fig. 3, the vehicle periphery is at 30, 31, 32, and 33, respectively, representing four consecutive distance ranges, where 30 is the corresponding range of the vehicle interior space, i.e., 30 is actually the vehicle. When the distance between the vehicle and the mobile terminal is within the distance range of 33, the mobile terminal is far away from the vehicle, the vehicle does not execute the vehicle unlocking operation, and the vehicle continuously measures the real-time distance between the vehicle and the mobile terminal within the distance range of 33. When the distance between the vehicle and the mobile end is within the range of 32, the mobile end is closer to the vehicle, and at the moment, a user holding the mobile end has certain control force on the vehicle, so that the vehicle machine can unlock the vehicle door and meet the user to enter the vehicle. When the distance between the vehicle and the mobile terminal is within the range of 31, it is indicated that the mobile terminal is close to the vehicle, and at this time, a user holding the mobile terminal can enter the vehicle at any time. When the distance between the vehicle and the mobile terminal is within the range of 30, it is described that the user holding the mobile terminal has entered the vehicle, and the vehicle is convenient for the user to use the vehicle, at this time, the vehicle-mounted device unlocks the vehicle and enters a starting state, and the user can directly drive the vehicle.
Furthermore, in order to ensure the safety of the vehicle, after the distance between the mobile terminal and the vehicle is determined, whether a touch signal aiming at a target component of the vehicle is received or not can be detected, wherein the touch signal is generated when a user touches the target component; if the touch signal aiming at the vehicle target component is detected and received, it is indicated that the user with the mobile terminal has come near the vehicle, and the user can directly enter the vehicle when the vehicle is unlocked, so the vehicle-mounted device needs to execute the vehicle unlocking operation corresponding to the distance based on the vehicle key information. Alternatively, the target component may be a vehicle door.
In this embodiment, determining the distance between the mobile terminal and the vehicle may include: and determining the distance between the mobile terminal and the vehicle according to the data packet and a feedback signal fed back by the mobile terminal aiming at the data packet, which is acquired by a positioning auxiliary module deployed in the vehicle. Optionally, the positioning assistance module may be a BLE positioning assistance module. It should be noted that the positioning assistance module at least includes: the first positioning auxiliary module and the second positioning auxiliary module are arranged on two B columns which are axially symmetrical in the vehicle. And a third positioning auxiliary module installed on the central control of the vehicle. And the fourth positioning auxiliary module is arranged on the rear tail box. And the mobile terminal obtained by each positioning auxiliary module feeds back a feedback signal aiming at the data packet. Optionally, the positioning assistance module is a BLE positioning assistance module. And acquiring a feedback signal fed back by the mobile terminal aiming at the data packet at the positioning auxiliary module, and determining the distance between the mobile terminal and the vehicle by the following formula (1).
S=10((abs(RSSI)-A)/(10*n)) (1)
Wherein, the RSSI is the intensity of the feedback signal; a is the signal intensity when the broadcast module and the mobile terminal are separated by 1 meter; n is an environmental attenuation factor. It should be noted that the RSSI is the feedback signal strength, which is the average value of the strengths of the feedback signals received by the positioning assistance modules.
The following is illustrated by way of example in FIG. 4: the positioning assistance module includes: the positioning device comprises BLE positioning auxiliary modules arranged on two B columns which are symmetrical about the axis in the vehicle, a BLE positioning auxiliary module arranged on a central control of the vehicle and a BLE positioning auxiliary module arranged on a rear tail box. Each BLE positioning assistance module receives a feedback signal fed back by the mobile terminal for the data packet (a dashed line in fig. 4 is an acquisition path of the feedback signal). The LIN bus communication module is connected with each BLE positioning auxiliary module and used for summarizing feedback signals obtained by each BLE positioning auxiliary module.
According to the vehicle unlocking method provided by the embodiment of the disclosure, firstly, a data packet is broadcasted for a mobile terminal to monitor. When the mobile terminal monitors the data packet, the mobile terminal wakes up the vehicle unlocking application, carries out interactive verification with the mobile terminal initiating the data communication when the data communication is initiated by the vehicle unlocking application, and acquires the vehicle key information issued by the mobile terminal when the interactive verification is passed. Then, the distance between the mobile terminal and the vehicle is determined, and vehicle unlocking operation corresponding to the distance is performed based on the vehicle key information. Therefore, no matter the vehicle unlocking application is in a foreground state, a background state, a closed state or a no-network state, the vehicle unlocking application can be awakened through the broadcast data packet to initiate data communication to the vehicle machine, and therefore unlocking operation of the vehicle is completed.
In a second aspect, an embodiment of the present disclosure provides a vehicle unlocking method, which is applied to a mobile terminal, as shown in fig. 5, and mainly includes:
401. when a data packet broadcasted by a vehicle machine is monitored, a vehicle unlocking application is awakened to initiate data communication to the vehicle machine.
In practical applications, the mobile terminal may include at least mobile devices such as a mobile phone and a tablet computer. The vehicle unlocking application is an application deployed on a mobile terminal for unlocking a vehicle, and can unlock the vehicle in a keyless state. The vehicle unlock application may be an android application or an IOS application.
In practical application, in order to ensure that the vehicle can be unlocked in time, the mobile terminal can monitor the vehicle-mounted broadcast in real time or at a preset frequency. When the mobile terminal monitors a data packet broadcasted by the vehicle machine, no matter the vehicle unlocking application deployed in the mobile terminal is in a foreground running state, a background running state or a closed state, the vehicle unlocking application is awakened, data communication is timely initiated to the vehicle machine, and corresponding vehicle unlocking operation is carried out.
402. And carrying out interactive verification on the vehicle machine, and sending out vehicle key information to the vehicle machine when the interactive verification is passed, wherein the vehicle key information is used for unlocking the vehicle.
The interactive verification with the car machine in this embodiment specifically includes:
4021. generating a mobile terminal side random number in the process of interactive verification with the vehicle machine, sending the mobile terminal side random number to the vehicle machine, and obtaining the vehicle machine side random number sent by the vehicle machine in the process of interactive verification.
In practical applications, the specific implementation process of this step 4021 includes:
and B1, receiving the first vehicle-side random number and the preset vehicle-machine public key sent by the vehicle machine when the vehicle machine performs interactive verification.
Specifically, in order to ensure the security of the interactive authentication, the first vehicle-side random number is generated when the vehicle machine performs the interactive authentication with the mobile terminal.
B2, verifying the car machine public key, and generating the mobile end side random number when the verification is passed.
Specifically, the process of verifying the vehicle public key may be: comparing whether the vehicle machine public key is consistent with a vehicle machine public key preset in a mobile terminal; if yes, the check is passed; otherwise, the check fails.
Specifically, the generation method of the mobile terminal side random number may include, but is not limited to, any one of a monte carlo method, generation of a U (0,1) random number, generation of a random number from U (0,1) to other probability distributions, and generation of a normal random number. The random number on the moving end side is a character string composed of at least one character combination of numbers, letters and symbols and having a set number of characters.
And B3, sending verification information to the vehicle machine, wherein the verification information carries the mobile terminal public key encrypted by the vehicle machine public key and the mobile terminal side random number.
And B4, receiving the second vehicle-side random number encrypted by the vehicle machine public key sent by the vehicle machine.
Specifically, the second car-side random number is generated when the car machine passes through the verification information in the car-machine private key verification B3.
And B5, decrypting the second vehicle-side random number encrypted by the vehicle-mounted public key by using the mobile terminal private key to obtain the second vehicle-side random number.
Further, in this embodiment, when the mobile terminal and the car machine interaction verification fails, the currently monitored data packet is discarded, and a new data packet is monitored again; and when a new data packet is monitored, the vehicle unlocking application is awakened again to initiate data communication to the vehicle machine.
4022. And generating second interactive verification information based on the mobile side random number and the vehicle machine side random number.
Specifically, the method for generating the second interactive verification information by the mobile terminal at least includes the following two methods:
first, the random number at the mobile side and the random number at the vehicle side are spliced to obtain second interactive verification information. It should be noted that the splicing order of the mobile end random number and the car machine random number may be determined based on the service requirement, for example, the car machine random number may be located before the mobile end random number or located after the mobile end random number when splicing. In addition, when the vehicle-side random number includes the first vehicle-side random number and the second vehicle-side random number, the first vehicle-side random number and the second vehicle-side random number are spliced first (the first vehicle-side random number may be located before the second vehicle-side random number or after the second vehicle-side random number during splicing), and then the spliced first vehicle-side random number and the spliced second vehicle-side random number are spliced with the vehicle-side random number.
And secondly, performing preset operation on the random number at the mobile end and the random number at the vehicle end to obtain second interactive verification information. Optionally, the preset operation includes a hash operation.
4023. And issuing the vehicle key information encrypted by the second interactive verification information to the vehicle machine.
In practical application, the car key information is downloaded from the cloud end by the mobile terminal, and in order to ensure the safety, the car key information issued to the car machine is different when the mobile terminal performs data communication with the car machine every time. When the mobile terminal does not have the vehicle unlocking authority, the mobile terminal can apply the authority to the cloud terminal, acquire authorization information issued by the cloud terminal, and perform vehicle unlocking operation based on the authorization information. As shown in fig. 6, if the mobile terminal has no permission, the mobile terminal applies for permission to the cloud terminal to obtain authorization information issued by the cloud terminal, performs interactive verification with the car machine when the mobile terminal monitors a data packet, and issues car key data to the car machine for the car machine to perform car unlocking operation when the interactive verification passes.
In order to improve the security of data, the car key information is acquired from the cloud only when the mobile terminal needs to send the car key information to the car machine. And the mobile terminal can receive the car key information issued by the cloud terminal at least under the following two conditions:
the first method is to receive the car key information issued by the cloud at a preset frequency. The preset frequency is the frequency of using the vehicle by the user, so that the mobile terminal can receive the vehicle key information in time when the user uses the vehicle, and the vehicle can be unlocked in time according to the vehicle key information.
And secondly, the mobile terminal sends a vehicle key information acquisition request to the cloud terminal and receives vehicle key information aiming at the vehicle key information acquisition request sent by the cloud terminal. That is to say, just when having the demand of charging, the key information of dispatching a car under the high in the clouds is required to reduce the mutual volume of removal end and high in the clouds. When a vehicle driver has a vehicle unlocking demand, the mobile terminal can be triggered to send a vehicle key information acquisition request to the cloud terminal, so that the vehicle can be unlocked flexibly based on business demands in time according to the vehicle key information.
According to the vehicle unlocking method provided by the embodiment of the disclosure, when the mobile terminal monitors the data packet, the vehicle unlocking application is awakened, when the vehicle unlocking application initiates data communication, the vehicle unlocking application carries out interactive verification with the mobile terminal initiating the data communication, and when the interactive verification is passed, the vehicle key information is issued to the vehicle machine, so that the vehicle machine executes vehicle unlocking operation corresponding to the distance between the mobile terminal and the vehicle based on the vehicle key information. Therefore, no matter the vehicle unlocking application is in a foreground state, a background state, a closed state or a no-network state, the vehicle unlocking application can be awakened through the broadcast data packet to initiate data communication to the vehicle machine, and therefore unlocking operation of the vehicle is completed.
In a fourth aspect, an embodiment of the present disclosure provides a vehicle unlocking method, which is applied to a vehicle unlocking system including a vehicle machine and a mobile terminal, and vehicle unlocking is described below with reference to fig. 7:
when monitoring a data packet of a car machine broadcast, the mobile terminal initiates data communication to establish connection with the car machine, the car machine generates a first car-side random number by using a preset random number generation method, and executes step 501 to send the first car-side random number (denoted by random number a in fig. 7) and a car machine public key (denoted by SE _ pub in fig. 7) to the mobile terminal.
When the mobile terminal receives the random number A and the SE _ pub, executing a step 502 to verify the SE _ pub, wherein the verification process is to compare the SE _ pub preset by the mobile terminal with the received SE _ pub, and if the SE _ pub and the SE _ pub are different, the verification is not passed, and the interactive verification process is ended; if the two are the same, the check is passed, and step 503 is executed to generate a random number (indicated by a random number B in fig. 7) on the mobile terminal side. When generating the mobile side random number, step 504 is executed to send the mobile side public key Phone _ pub (indicated by Phone _ pub in fig. 7) and the mobile side random number to the car machine.
After receiving the mobile terminal public key Phone _ pub and the mobile terminal random number, the car machine executes step 505 to verify the mobile terminal public key. The process of verifying the mobile terminal public key may include, but is not limited to: comparing the mobile terminal public key with a mobile terminal public key preset in the vehicle machine; and when the comparison result is different, the result shows that the attack by a malicious party is possible in the transmission process, and the interactive verification process is ended. If the comparison is the same, the verification is passed. When the verification passes, step 506 is executed to generate a second vehicle-side random number (denoted by pre _ master _ key in fig. 7), and step 507 is executed to encrypt the pre _ master _ key using Phone _ pub and send the encrypted pre _ master _ key to the mobile terminal. And executing step 508 to generate first interactive verification information based on the first vehicle-side random number, the second vehicle-side random number and the mobile-side random number by adopting a preset interactive information generation method. It should be noted that the first mutual authentication information and the second mutual authentication information are generated by the same method. Optionally, the interaction information generation method may include, but is not limited to, a hash algorithm.
And when the mobile terminal receives the second vehicle-side random number encrypted by using the mobile terminal public key, the mobile terminal decrypts the second vehicle-side random number by using the mobile terminal private key to obtain the second vehicle-side random number. Then, step 509 is executed to generate second interactive verification information based on the first vehicle-side random number, the second vehicle-side random number, and the mobile-side random number by using a preset interactive information generation method.
When the mobile terminal generates the second interactive authentication information, step 510 is executed to encrypt the car key information by using the second interactive authentication information, and send the car key information to the car machine. And when the vehicle machine receives the vehicle key information encrypted by using the second interactive verification information, the vehicle machine uses the first interactive verification information for verification, and performs vehicle unlocking operation corresponding to the distance between the mobile terminal and the vehicle machine when the verification is passed.
In a fourth aspect, according to the method shown in fig. 1, another embodiment of the present disclosure further provides a car machine, as shown in fig. 8, the car machine mainly includes:
a broadcasting unit 61 for broadcasting the data packet;
the obtaining unit 62 is configured to perform interactive verification with a mobile terminal initiating data communication, and obtain vehicle key information issued by the mobile terminal when the interactive verification passes, where the data communication is initiated by a vehicle unlocking application that wakes up the vehicle unlocking application when the mobile terminal monitors the data packet;
and an unlocking unit 63, configured to determine a distance between the mobile terminal and the vehicle, and perform a vehicle unlocking operation corresponding to the distance based on the vehicle key information.
The car machine provided by the embodiment of the disclosure firstly broadcasts the data packet for the mobile terminal to monitor. When the mobile terminal monitors the data packet, the mobile terminal wakes up the vehicle unlocking application, carries out interactive verification with the mobile terminal initiating the data communication when the data communication is initiated by the vehicle unlocking application, and acquires the vehicle key information issued by the mobile terminal when the interactive verification is passed. Then, the distance between the mobile terminal and the vehicle is determined, and vehicle unlocking operation corresponding to the distance is performed based on the vehicle key information. Therefore, no matter the vehicle unlocking application is in a foreground state, a background state, a closed state or a no-network state, the vehicle unlocking application can be awakened through the broadcast data packet to initiate data communication to the vehicle machine, and therefore unlocking operation of the vehicle is completed.
In some embodiments, as shown in fig. 9, the car machine further includes:
a monitoring unit 64, configured to detect whether a touch signal for a target component of a vehicle is received, where the touch signal is generated when a user touches the target component; if yes, triggering an unlocking unit;
the unlocking unit 63 is configured to execute the vehicle unlocking operation corresponding to the distance based on the vehicle key information under the trigger of the monitoring unit.
In some embodiments, the broadcasting unit broadcasts the data packet at the same time by using only one broadcasting module of a plurality of preset broadcasting modules.
In some embodiments, the broadcasting module 61 is further configured to control, when the interactive verification with the mobile terminal fails, the broadcasting module currently performing broadcasting to stop broadcasting the data packet, and reselect a new broadcasting module from the plurality of broadcasting modules to broadcast the data packet.
In some embodiments, the broadcasting module 61 is configured to, after the broadcasting module controlling the currently performing broadcasting stops broadcasting the data packet, before the reselecting a new broadcasting module from the plurality of broadcasting modules to broadcast the data packet, further include: acquiring a new data packet when the total broadcast time of the data packet is determined to reach a preset time threshold; and reselecting a new broadcasting module from the plurality of broadcasting modules to broadcast the new data packet.
In some embodiments, the unlocking unit 63 includes:
a first sending module 631, configured to generate a car machine side random number in the mobile terminal interactive authentication process, send the car machine side random number to the mobile terminal, and obtain a mobile terminal side random number sent by the mobile terminal in the interactive authentication process;
a first generating module 632, configured to generate first interactive verification information based on the car machine side random number and the mobile terminal side random number;
a first decryption module 633, configured to receive vehicle key information encrypted by second interactive authentication information sent by the mobile terminal, where the second interactive authentication information is obtained by the mobile terminal based on the vehicle-machine-side random number and the mobile-terminal-side random number; and the vehicle key information is encrypted by second interactive verification information sent by the mobile terminal and decrypted by the first interactive verification information.
In some embodiments, the first sending module 631 is configured to generate a first vehicle-side random number when performing the interactive authentication with the mobile terminal; sending the first vehicle side random number and a preset vehicle public key to the mobile terminal; receiving verification information fed back by the mobile terminal, wherein the verification information is a mobile terminal public key and a mobile terminal side random number encrypted by the vehicle machine public key; verifying the verification information by using a preset vehicle machine private key, obtaining a random number at the mobile end side when the verification is passed, and generating a random number at the second vehicle machine side; and sending the second vehicle-side random number encrypted by using the mobile terminal public key to the mobile terminal.
In some embodiments, the first generating module 632 generates the first interactive verification information by splicing the car-machine side random number and the mobile-side random data, or by calculating the car-machine side random number and the mobile-side random data through a preset algorithm.
In some embodiments, the unlocking unit 63 includes:
a determining module 634, configured to determine a distance between the mobile terminal and the vehicle according to the data packet and a feedback signal, fed back by the mobile terminal for the data packet, acquired by a positioning assistance module deployed in the vehicle.
The vehicle machine provided by the embodiment of the fourth aspect may be used to execute the vehicle unlocking method applied to the vehicle machine provided by the embodiment of the first aspect, and the related meanings and specific embodiments of the related applications may be referred to in the description of the embodiment of the first aspect, and are not described in detail herein.
In a fifth aspect, according to the method shown in fig. 5, another embodiment of the present disclosure further provides a mobile terminal, as shown in fig. 10, the mobile terminal mainly includes:
the wake-up unit 71 is configured to wake up a vehicle unlocking application to initiate data communication to a vehicle machine when a data packet broadcasted by the vehicle machine is monitored;
and the issuing unit 72 is configured to perform interactive verification with the vehicle machine, and issue the vehicle key information to the vehicle machine when the interactive verification passes, where the vehicle key information is used for unlocking the vehicle.
The mobile terminal provided in the embodiment of the present disclosure first broadcasts a data packet for the mobile terminal to monitor. When the mobile terminal monitors the data packet, the mobile terminal wakes up the vehicle unlocking application, carries out interactive verification with the mobile terminal initiating the data communication when the data communication is initiated by the vehicle unlocking application, and acquires the vehicle key information issued by the mobile terminal when the interactive verification is passed. Then, the distance between the mobile terminal and the vehicle is determined, and vehicle unlocking operation corresponding to the distance is performed based on the vehicle key information. Therefore, no matter the vehicle unlocking application is in a foreground state, a background state, a closed state or a no-network state, the vehicle unlocking application can be awakened through the broadcast data packet to initiate data communication to the vehicle machine, and therefore unlocking operation of the vehicle is completed.
In some embodiments, as shown in fig. 11, the issuing unit 72 includes:
a second sending module 721, configured to generate a mobile end random number during the interactive verification process with the car machine, send the mobile end random number to the car machine, and obtain the car machine random number sent by the car machine during the interactive verification process;
a second generating unit 722, configured to generate second interactive verification information based on the mobile-side random number and the car-machine-side random number;
and a second issuing unit 723, configured to issue the vehicle key information encrypted by the second interactive authentication information to the vehicle machine.
In some embodiments, the second sending module 721 is configured to receive, when performing the interactive verification with the car machine, the first car-machine-side random number and the preset car-machine public key sent by the car machine; verifying the vehicle machine public key, and generating a random number at the mobile end side when the verification is passed; sending verification information to the vehicle machine; the verification information carries a mobile terminal public key encrypted by the vehicle public key and a mobile terminal side random number; receiving a second vehicle-side random number which is sent by the vehicle machine and encrypted by the vehicle machine public key; and decrypting the second vehicle-side random number encrypted by the vehicle-mounted public key by using a mobile-side private key to obtain the second vehicle-side random number.
In some embodiments, the wake-up unit 71 is further configured to discard the currently monitored data packet and listen to a new data packet again when the interactive verification with the car machine fails; and when a new data packet is monitored again, the vehicle unlocking application is awakened again to initiate data communication to the vehicle machine.
The mobile terminal provided by the embodiment of the fifth aspect may be used to execute the vehicle unlocking method applied to the mobile terminal provided by the embodiment of the second aspect, and the related meanings and specific embodiments of the related applications may be referred to the related descriptions in the embodiment of the second aspect, and are not described in detail here.
In a sixth aspect, according to the method shown in fig. 1 and 5, another embodiment of the present disclosure further provides a vehicle unlocking system, as shown in fig. 12, which mainly includes:
a vehicle machine 81 as described in the fourth aspect and a moving end 82 as described in the fifth aspect.
In this embodiment, the car machine and the mobile terminal may perform data communication through a wired network, a wireless network, bluetooth, or radio frequency, so as to complete the unlocking operation of the car.
According to the vehicle unlocking system disclosed by the embodiment of the disclosure, no matter the vehicle unlocking application in the mobile terminal is in a foreground state, a background state, a closed state or a no-network state, the vehicle unlocking application can be awakened through the broadcast data packet to initiate data communication to the vehicle machine, so that the vehicle unlocking operation is completed.
In a seventh aspect, an embodiment of the present disclosure provides a storage medium, where the storage medium includes a stored program, and when the program runs, the apparatus where the storage medium is located is controlled to execute the vehicle unlocking method according to the first aspect or the second aspect.
The storage medium may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
In an eighth aspect, embodiments of the present disclosure provide a human-computer interaction device, which includes a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions when executed perform the vehicle unlocking method of the first aspect or the second aspect.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (17)
1. The vehicle unlocking method is characterized by being applied to a vehicle machine, and comprises the following steps:
broadcasting the data packet;
performing interactive verification with a mobile terminal initiating data communication, and acquiring vehicle key information issued by the mobile terminal when the interactive verification is passed, wherein the data communication is initiated by a vehicle unlocking application which wakes up the vehicle unlocking application when the mobile terminal monitors the data packet;
and determining the distance between the mobile terminal and the vehicle, and executing vehicle unlocking operation corresponding to the distance based on the vehicle key information.
2. The method of claim 1, wherein after determining the distance between the moving end and the vehicle, the method further comprises:
detecting whether a touch signal aiming at a vehicle target component is received, wherein the touch signal is generated when a user touches the target component;
and if so, executing vehicle unlocking operation corresponding to the distance based on the vehicle key information.
3. The method of claim 1, wherein the broadcasting packet comprises:
and broadcasting the data packet by using only one broadcasting module in a plurality of preset broadcasting modules at the same time.
4. The method of claim 3, further comprising:
and when the interactive verification with the mobile terminal is not passed, controlling the broadcasting module which executes the broadcasting currently to stop broadcasting the data packet, and reselecting a new broadcasting module from the plurality of broadcasting modules to broadcast the data packet.
5. The method of claim 4, wherein after the controlling the broadcasting module currently performing broadcasting stops broadcasting the data packet, before the reselecting a new broadcasting module from the plurality of broadcasting modules to broadcast the data packet, the method further comprises:
acquiring a new data packet when the total broadcast time of the data packet is determined to reach a preset time threshold;
and reselecting a new broadcasting module from the plurality of broadcasting modules to broadcast the new data packet.
6. The method according to claim 1, wherein the performing interactive authentication with the mobile terminal initiating data communication comprises:
generating a vehicle machine side random number in the interactive verification process with the mobile terminal, sending the vehicle machine side random number to the mobile terminal, and obtaining the mobile terminal side random number sent by the mobile terminal in the interactive verification process;
generating first interactive verification information based on the vehicle machine side random number and the mobile terminal side random number;
receiving encrypted vehicle key information of second interactive authentication information sent by the mobile terminal, wherein the second interactive authentication information is obtained by the mobile terminal based on the vehicle machine side random number and the mobile terminal side random number;
and the vehicle key information is encrypted by second interactive verification information sent by the mobile terminal and decrypted by the first interactive verification information.
7. The method according to claim 6, wherein the generating a car machine side random number during the interactive authentication with the mobile terminal, sending the car machine side random number to the mobile terminal, and obtaining a mobile terminal side random number sent by the mobile terminal during the interactive authentication comprises:
generating a first vehicle-side random number when performing interactive authentication with the mobile terminal;
sending the first vehicle side random number and a preset vehicle public key to the mobile terminal;
receiving verification information fed back by the mobile terminal, wherein the verification information is a mobile terminal public key and a mobile terminal side random number encrypted by the vehicle machine public key;
verifying the verification information by using a preset vehicle machine private key, obtaining a random number at the mobile end side when the verification is passed, and generating a random number at the second vehicle machine side;
and sending the second vehicle-side random number encrypted by the public key of the mobile terminal to the mobile terminal.
8. The method according to claim 6, wherein the first interactive authentication information is obtained by splicing the random number at the vehicle side and the random data at the mobile side, or by calculating the random number at the vehicle side and the random data at the mobile side by a preset algorithm.
9. A vehicle unlocking method is applied to a mobile terminal and comprises the following steps:
when a data packet broadcasted by a vehicle machine is monitored, a vehicle unlocking application is awakened to initiate data communication to the vehicle machine;
and carrying out interactive verification on the vehicle machine, and sending out vehicle key information to the vehicle machine when the interactive verification is passed, wherein the vehicle key information is used for unlocking the vehicle.
10. The method of claim 9, wherein the interactive authentication with the car machine comprises:
generating a mobile terminal side random number in the interactive verification process with the car machine, sending the mobile terminal side random number to the car machine, and obtaining the car machine side random number sent by the car machine in the interactive verification process;
generating second interactive verification information based on the mobile side random number and the vehicle machine side random number;
and issuing the encrypted vehicle key information of the second interactive verification information to the vehicle machine.
11. The method according to claim 10, wherein the generating a mobile end side random number during the interactive verification with the car machine, sending the car machine side random number to the car machine, and obtaining the car machine side random number sent by the car machine during the interactive verification comprises:
receiving a first vehicle side random number and a preset vehicle machine public key sent by the vehicle machine when the vehicle machine carries out interactive verification with the vehicle machine;
verifying the vehicle machine public key, and generating a random number at the mobile end side when the verification is passed;
sending verification information to the car machine, wherein the verification information carries a mobile terminal public key encrypted by the car machine public key and a mobile terminal side random number;
receiving a second vehicle-side random number which is sent by the vehicle machine and encrypted by the vehicle machine public key;
and decrypting the second vehicle-side random number encrypted by the vehicle-mounted public key by using a mobile-side private key to obtain the second vehicle-side random number.
12. The method according to any one of claims 9-11, further comprising:
when the interactive verification with the car machine fails, discarding the currently monitored data packet and monitoring a new data packet again;
and when a new data packet is monitored again, the vehicle unlocking application is awakened again to initiate data communication to the vehicle machine.
13. The utility model provides a car machine, its characterized in that, car machine includes:
a broadcasting unit for broadcasting the data packet;
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for carrying out interactive verification with a mobile terminal initiating data communication and acquiring vehicle key information issued by the mobile terminal when the interactive verification passes, and the data communication is initiated by a vehicle unlocking application which wakes up the vehicle unlocking application when the mobile terminal monitors the data packet;
and the unlocking unit is used for determining the distance between the mobile terminal and the vehicle and executing vehicle unlocking operation corresponding to the distance based on the vehicle key information.
14. A mobile terminal, comprising:
the system comprises a wake-up unit, a data communication unit and a data communication unit, wherein the wake-up unit is used for waking up a vehicle unlocking application to initiate data communication to a vehicle machine when monitoring a data packet broadcasted by the vehicle machine;
and the issuing unit is used for performing interactive verification with the vehicle machine and issuing the vehicle key information to the vehicle machine when the interactive verification is passed, wherein the vehicle key information is used for unlocking the vehicle.
15. A vehicle unlocking system, characterized in that the system comprises: the vehicle machine of claim 13 and the mobile end of claim 14.
16. A storage medium characterized by comprising a stored program, wherein a device in which the storage medium is located is controlled to execute the vehicle unlocking method according to any one of claims 1 to 8 or claims 9 to 12 when the program is executed.
17. A human-computer interaction device, characterized in that the device comprises a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions when executed perform the vehicle unlocking method of any one of claims 1-8 or claims 9-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910910983.5A CN112652091A (en) | 2019-09-25 | 2019-09-25 | Vehicle unlocking method, vehicle machine and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910910983.5A CN112652091A (en) | 2019-09-25 | 2019-09-25 | Vehicle unlocking method, vehicle machine and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112652091A true CN112652091A (en) | 2021-04-13 |
Family
ID=75342293
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910910983.5A Pending CN112652091A (en) | 2019-09-25 | 2019-09-25 | Vehicle unlocking method, vehicle machine and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112652091A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114063956A (en) * | 2021-11-11 | 2022-02-18 | 上汽通用五菱汽车股份有限公司 | Vehicle-mounted device and mobile terminal program interaction method, vehicle-mounted device and readable storage medium |
CN114241632A (en) * | 2021-11-29 | 2022-03-25 | 歌尔科技有限公司 | Vehicle unlocking method, wearable device and intelligent unlocking system |
CN114845286A (en) * | 2022-04-21 | 2022-08-02 | 重庆长安汽车股份有限公司 | Noninductive Bluetooth short-range vehicle control method and system based on micro-positioning technology and vehicle |
CN115635941A (en) * | 2022-10-18 | 2023-01-24 | 辽宁科大物联科技有限公司 | Vehicle unlocking and locking method and device based on PEPS system and storage medium |
WO2023202138A1 (en) * | 2022-04-20 | 2023-10-26 | Oppo广东移动通信有限公司 | Welcoming method for case of approaching to automobile and related product |
WO2024125263A1 (en) * | 2022-12-12 | 2024-06-20 | 蔚来移动科技有限公司 | Vehicle unlocking method and apparatus, computer device, and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160314634A1 (en) * | 2015-04-22 | 2016-10-27 | Hon Hai Precision Industry Co., Ltd. | Vehicle key system and methods for using the same |
CN106652124A (en) * | 2016-11-08 | 2017-05-10 | 云蜂汽车有限公司 | Vehicle door control method and cloud service platform |
CN107610292A (en) * | 2017-09-15 | 2018-01-19 | 广州市雅天网络科技有限公司 | The method for unlocking of controllable distance intelligent door lock based on bluetooth |
CN108109239A (en) * | 2017-12-20 | 2018-06-01 | 东峡大通(北京)管理咨询有限公司 | A kind of method for unlocking of smart lock, mobile terminal and unlocking system |
CN108541324A (en) * | 2016-12-27 | 2018-09-14 | 深圳易马达科技有限公司 | A kind of unlocking method of electronic lock device, client and its electronic lock device |
CN109685959A (en) * | 2019-02-21 | 2019-04-26 | 贵安新区新特电动汽车工业有限公司 | Vehicle control safety certifying method based on bluetooth |
CN109841081A (en) * | 2017-11-29 | 2019-06-04 | 深圳市微能信息科技有限公司 | A kind of vehicle positioning method and handheld terminal based on Bluetooth technology |
CN110276865A (en) * | 2019-05-09 | 2019-09-24 | 北京致行慕远科技有限公司 | Solve lock control method, device, electric vehicle and terminal |
-
2019
- 2019-09-25 CN CN201910910983.5A patent/CN112652091A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160314634A1 (en) * | 2015-04-22 | 2016-10-27 | Hon Hai Precision Industry Co., Ltd. | Vehicle key system and methods for using the same |
CN106652124A (en) * | 2016-11-08 | 2017-05-10 | 云蜂汽车有限公司 | Vehicle door control method and cloud service platform |
CN108541324A (en) * | 2016-12-27 | 2018-09-14 | 深圳易马达科技有限公司 | A kind of unlocking method of electronic lock device, client and its electronic lock device |
CN107610292A (en) * | 2017-09-15 | 2018-01-19 | 广州市雅天网络科技有限公司 | The method for unlocking of controllable distance intelligent door lock based on bluetooth |
CN109841081A (en) * | 2017-11-29 | 2019-06-04 | 深圳市微能信息科技有限公司 | A kind of vehicle positioning method and handheld terminal based on Bluetooth technology |
CN108109239A (en) * | 2017-12-20 | 2018-06-01 | 东峡大通(北京)管理咨询有限公司 | A kind of method for unlocking of smart lock, mobile terminal and unlocking system |
CN109685959A (en) * | 2019-02-21 | 2019-04-26 | 贵安新区新特电动汽车工业有限公司 | Vehicle control safety certifying method based on bluetooth |
CN110276865A (en) * | 2019-05-09 | 2019-09-24 | 北京致行慕远科技有限公司 | Solve lock control method, device, electric vehicle and terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114063956A (en) * | 2021-11-11 | 2022-02-18 | 上汽通用五菱汽车股份有限公司 | Vehicle-mounted device and mobile terminal program interaction method, vehicle-mounted device and readable storage medium |
CN114241632A (en) * | 2021-11-29 | 2022-03-25 | 歌尔科技有限公司 | Vehicle unlocking method, wearable device and intelligent unlocking system |
WO2023202138A1 (en) * | 2022-04-20 | 2023-10-26 | Oppo广东移动通信有限公司 | Welcoming method for case of approaching to automobile and related product |
CN114845286A (en) * | 2022-04-21 | 2022-08-02 | 重庆长安汽车股份有限公司 | Noninductive Bluetooth short-range vehicle control method and system based on micro-positioning technology and vehicle |
CN115635941A (en) * | 2022-10-18 | 2023-01-24 | 辽宁科大物联科技有限公司 | Vehicle unlocking and locking method and device based on PEPS system and storage medium |
WO2024125263A1 (en) * | 2022-12-12 | 2024-06-20 | 蔚来移动科技有限公司 | Vehicle unlocking method and apparatus, computer device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112652091A (en) | Vehicle unlocking method, vehicle machine and mobile terminal | |
CN108122311B (en) | Vehicle virtual key implementation method and system | |
US8736438B1 (en) | Computing device as a vehicle key | |
CN107085870B (en) | Regulating vehicle access using encryption methods | |
EP3403246B1 (en) | A device and method for collecting user-based insurance data in vehicles | |
US9842443B1 (en) | Computing device as a vehicle key | |
EP3926500B1 (en) | Device upgrade method and related device | |
WO2017101310A1 (en) | Remote control method, device and system for vehicle | |
CN110136306B (en) | Vehicle key control method and system | |
CN107578503A (en) | Method for unlocking, unlocking terminal and the smart lock of shared vehicle | |
CN110365486B (en) | Certificate application method, device and equipment | |
CN111845624B (en) | Method for starting vehicle without key | |
CN112019326B (en) | Vehicle charging safety management method and system | |
CN103108327A (en) | Method, device and system of verification of safety association between terminal equipment and user card | |
CN113645590B (en) | Method, device, equipment and medium for remotely controlling vehicle based on encryption algorithm | |
CN110949317A (en) | Vehicle anti-theft system and anti-theft method thereof and vehicle | |
CN112583595B (en) | Vehicle charging safety management method | |
CN112188431A (en) | Intelligent vehicle entering system and method thereof | |
CN107968707B (en) | Method and system for classified storage of secret keys | |
CN113079511B (en) | Method, device, vehicle and storage medium for sharing information between vehicles | |
EP3949259A1 (en) | Secure emergency vehicular communication | |
US20190075441A1 (en) | System and method of low energy mobile device recognition | |
CN113434181B (en) | Software upgrading method and device, electronic equipment and storage medium | |
CN113810364A (en) | Information display method, device, equipment and storage medium | |
CN103818342B (en) | For the method and system of vehicle anti-theft matching operation purview certification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210413 |
|
RJ01 | Rejection of invention patent application after publication |