CN114863590A - Method and device for controlling opening of vehicle-mounted safe box through mobile terminal - Google Patents
Method and device for controlling opening of vehicle-mounted safe box through mobile terminal Download PDFInfo
- Publication number
- CN114863590A CN114863590A CN202210419750.7A CN202210419750A CN114863590A CN 114863590 A CN114863590 A CN 114863590A CN 202210419750 A CN202210419750 A CN 202210419750A CN 114863590 A CN114863590 A CN 114863590A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- mobile terminal
- safe box
- key
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000008569 process Effects 0.000 claims abstract description 27
- 238000004891 communication Methods 0.000 claims description 58
- 238000005259 measurement Methods 0.000 claims description 7
- 238000012423 maintenance Methods 0.000 description 4
- 230000008439 repair process Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00912—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a method and a device for controlling the opening of a vehicle-mounted safe box through a mobile terminal, and relates to the field of vehicle-mounted auxiliary devices. The method comprises the following steps: the server issues a terminal service key to the mobile terminal of the vehicle owner and issues a vehicle-mounted service key to the vehicle-mounted safe box; the mobile terminal of the vehicle owner and the vehicle-mounted safe box are connected and paired through Bluetooth; after the vehicle-mounted safe box is connected with the mobile terminal in a Bluetooth mode and successfully paired, the vehicle-mounted safe box judges that the mobile terminal is in a safety range, the vehicle-mounted safe box conducts terminal service key authentication through a vehicle-mounted service key, a Bluetooth session is continuously kept after the authentication is successful, and the mobile terminal opens the vehicle-mounted safe box through the terminal key. The invention can open the vehicle-mounted safe box by adopting the mobile terminal, not only improves the safety degree, but also has very simple operation process and is convenient for users to use.
Description
Technical Field
The invention relates to the field of vehicle-mounted auxiliary devices, in particular to a method and a device for controlling the opening of a vehicle-mounted safe box through a mobile terminal.
Background
The opening mode of the vehicle-mounted safe box on the current market is generally as follows: opening is performed by a physical key or password. The disadvantages of this approach are:
(1) for physical key opening: the user needs to give the key to a third party during maintenance, repair, or valet parking, which may present a security risk.
(2) For password open: the password needs to be recorded and input, the operation process is not simple enough, and the password cannot be opened if the password is forgotten carelessly.
Disclosure of Invention
Aiming at the defects in the prior art, the invention solves the technical problems that: how to automatically open and close the vehicle-mounted safe through the mobile terminal.
In order to achieve the above purpose, the method for controlling the opening of the vehicle-mounted safe box through the mobile terminal provided by the invention comprises the following steps:
s1: judging whether the starting method is executed for the first time, if so, issuing a terminal service key to a mobile terminal of a vehicle owner by the server, issuing a vehicle service key to a vehicle-mounted safe box, and turning to S2; otherwise go to S3;
s2: the mobile terminal of the vehicle owner and the vehicle-mounted safe box are connected and paired through Bluetooth, and the process goes to S3;
s3: after the vehicle-mounted safe box is successfully connected and paired with the mobile terminal through the Bluetooth, the vehicle-mounted safe box judges whether the mobile terminal is in a safety range, if so, the operation goes to S4, and if not, the operation is executed again to S3;
s4: the vehicle-mounted safe box carries out terminal service key authentication through the vehicle-mounted service key, the Bluetooth conversation is continuously kept after the authentication is successful, and the mobile terminal opens the vehicle-mounted safe box through the terminal key.
On the basis of the above technical solution, S1 specifically includes the following steps:
s101: the mobile terminal carries out user identity authentication, sends a digital key opening application to the server after confirming that the mobile terminal is the owner, and turns to S102, wherein the digital key opening application information comprises owner information;
s102: after confirming that the owner information passes, the server generates a terminal service key and a vehicle-mounted service key which are matched with each other and comprise the use validity period information; the server issues the terminal service key to the mobile terminal, and issues the vehicle-mounted service key to the vehicle-mounted safe box; at the moment, the mobile terminal and the vehicle-mounted safe box are considered to establish a pairing relation, and the mobile terminal can authorize the operation in the key authority by using the terminal service key.
On the basis of the above technical solution, S2 specifically includes the following steps:
s201: the vehicle-mounted safe box broadcasts vehicle information; after searching the vehicle information, the mobile terminal establishes Bluetooth connection with the vehicle-mounted safe and goes to S202;
s202: the vehicle-mounted safe box initiates a safety request, the mobile terminal returns a pairing request after receiving the safety request, and the step is S203;
s203: after receiving the pairing request returned by the safety request, the vehicle-mounted safe generates a unique pairing code, the mobile terminal inputs the pairing code and sends the pairing code to the vehicle-mounted safe, and the step is turned to S204;
s204: and after the vehicle-mounted safe box confirms that the pairing code is correct, the vehicle-mounted safe box is successfully paired with the mobile terminal.
On the basis of the above technical solution, the process of determining whether the mobile terminal is in the safe range by the vehicle-mounted safe in S3 includes: the vehicle-mounted safe box sends a distance measurement positioning packet to the mobile terminal through a plurality of different positions at the same time, the distance between the mobile terminal and the vehicle-mounted safe box is determined according to the distance information of the positions replied by the mobile terminal, whether the distance belongs to a safety range or not is judged, if yes, the mobile terminal is determined to be in the safety range, and otherwise, the mobile terminal is determined not to be in the safety range.
On the basis of the above technical solution, the process of the vehicle-mounted safe performing terminal key authentication through the vehicle-mounted service key in S4 includes: the mobile terminal sends instruction ciphertext information containing terminal service key information to the vehicle-mounted safe box through a Bluetooth communication channel; the vehicle-mounted safe box decrypts the instruction ciphertext information through the vehicle-mounted service key, if decryption is successful, authentication is successful, and if decryption is failed, authentication is failed.
The invention provides a device for controlling the opening of a vehicle-mounted safe box through a mobile terminal, which is characterized in that: the device comprises a key issuing module arranged on a server, a terminal Bluetooth communication module and a terminal key authentication module arranged on a mobile terminal, and a safe box Bluetooth communication module, a Bluetooth distance measuring module, a safe box key authentication module and a safe box control module arranged on a vehicle-mounted safe box;
the key issuing module is used for: issuing a terminal service key to a mobile terminal of a vehicle owner, and issuing a vehicle-mounted service key to a vehicle-mounted safe box;
terminal bluetooth communication module and safe bluetooth communication module are used for: carrying out Bluetooth connection and pairing on the mobile terminal and the vehicle-mounted safe box;
the Bluetooth ranging module is used for: after the vehicle-mounted safe box is successfully connected and paired with the mobile terminal through the Bluetooth, judging whether the mobile terminal is in a safety range, and if so, sending a key authentication signal to a safe box key authentication module; otherwise, continuously judging whether the mobile terminal is in a safety range;
the safe box key authentication module is used for: after receiving the key authentication signal, the terminal key authentication module initiates key authentication through the vehicle-mounted service key; after the authentication is successful, the Bluetooth session is continuously kept, and the safe control module opens the vehicle-mounted safe.
On the basis of the technical scheme, the device further comprises an identity authentication module arranged on the mobile terminal, and the identity authentication module is used for: carrying out user identity authentication, and sending a digital key opening application to a key issuing module of the server after confirming that the user identity is the owner, wherein the digital key opening application information comprises owner information;
the work flow of the key issuing module comprises the following steps: after the owner information is confirmed to pass, generating a terminal service key and a vehicle-mounted service key which are matched with each other and comprise the use validity period information; and issuing the terminal service key to the mobile terminal, and issuing the vehicle-mounted service key to the vehicle-mounted safe.
On the basis of the technical scheme, the specific working process of the terminal Bluetooth communication module and the safe Bluetooth communication module comprises the following steps: the safe box Bluetooth communication module broadcasts vehicle information; after the terminal Bluetooth communication module searches vehicle information, Bluetooth connection is established with the safe box Bluetooth communication module; the safe box Bluetooth communication module initiates a security request, and the terminal Bluetooth communication module returns a pairing request after receiving the security request; after receiving a pairing request returned by the safety request, the safe box Bluetooth communication module generates a unique pairing code, and the terminal Bluetooth communication module inputs the pairing code and sends the pairing code to the safe box Bluetooth communication module; after the safe box Bluetooth communication module confirms that the pairing code is correct, the pairing with the terminal Bluetooth communication module is successful.
On the basis of the technical scheme, the specific work flow of the Bluetooth ranging module comprises the following steps: the method comprises the steps of sending a distance measurement positioning packet to a mobile terminal through a plurality of different positions at the same time, determining the distance between the mobile terminal and a vehicle-mounted safe according to the distance information of the positions replied by the mobile terminal, judging whether the distance belongs to a safety range, if so, determining that the mobile terminal is in the safety range, otherwise, determining that the mobile terminal is not in the safety range.
On the basis of the technical scheme, the specific working process of the terminal key authentication module and the safe key authentication module comprises the following steps: the terminal key authentication module sends instruction ciphertext information containing terminal service key information to the vehicle-mounted safe box through a Bluetooth communication channel; the safe box key authentication module decrypts the instruction ciphertext information through the vehicle-mounted service key, if decryption is successful, authentication is successful, and if decryption is failed, authentication is failed.
Compared with the prior art, the invention has the advantages that:
compared with the mode of opening the vehicle-mounted safe box through the entity key in the prior art, the method and the system can open the vehicle-mounted safe box through the mobile terminal, and a user basically cannot give the mobile terminal to a third party during maintenance, repair or valet parking, so that the safety degree is improved.
Compared with the mode of opening the vehicle-mounted safe box through the password in the prior art, the method adopts the mobile terminal to automatically open and close the vehicle-mounted safe box, not only is the operation process very simple, but also the situation that the password is forgotten does not occur, and the method is convenient for users to use.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of S2 in the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The method for controlling the opening of the vehicle-mounted safe box through the mobile terminal in the embodiment of the invention comprises the following steps:
s1: judging whether the starting method is executed for the first time, if so, issuing a terminal service key to a mobile terminal of a vehicle owner by the server, issuing a vehicle service key to a vehicle-mounted safe box, and turning to S2; otherwise go to S3.
S1 specifically includes the following steps:
s101: the mobile terminal carries out user identity authentication, sends a digital key opening application to the server after confirming that the mobile terminal is the owner, and the digital key opening application information comprises owner information and goes to S102.
S102: after the server confirms that the owner information passes, generating a terminal service key and a vehicle-mounted service key which are matched with each other and comprise the use validity information; the server issues the terminal service key to the mobile terminal, and issues the vehicle-mounted service key to the vehicle-mounted safe box; at the moment, the mobile terminal and the vehicle-mounted safe box are considered to establish a pairing relation, and the mobile terminal can authorize the operation in the key authority by using the terminal service key.
S2: the mobile terminal of the vehicle owner and the vehicle-mounted safe are connected and paired through Bluetooth, and the process goes to S3.
Referring to fig. 1, S2 specifically includes the following steps:
s201: the vehicle-mounted safe box broadcasts vehicle information; after the mobile terminal searches the vehicle information, the mobile terminal establishes Bluetooth connection with the vehicle-mounted safe and goes to S202.
S202: the vehicle-mounted safe box initiates a security request, and the mobile terminal returns a pairing request after receiving the security request, so that the mobile terminal is prevented from initiating the pairing request at will, and the process goes to S203.
S203: and after receiving the pairing request returned by the safety request, the vehicle-mounted safe generates a unique pairing code, the mobile terminal inputs the pairing code and sends the pairing code to the vehicle-mounted safe, and the step is turned to S204.
The principle of the step is as follows: in the process of pairing the mobile terminal and the vehicle-mounted safe box at each time, the pairing code needs to be input so as to prevent the risk of being attacked by a man-in-the-middle in the pairing process, and in order to prevent the pairing code from being stolen and increase the stealing difficulty, the pairing code matched with the Bluetooth at each time is different. The pairing code should be verified in the manner defined by the bluetooth protocol.
S204: after the vehicle-mounted safe box confirms that the pairing code is correct, the vehicle-mounted safe box is successfully paired with the mobile terminal, and the vehicle-mounted safe box and the mobile terminal transmit the pairing code to a Bluetooth protocol stack safety management layer.
It should be noted that: after the vehicle owner digital key is issued to the vehicle owner mobile terminal, the Bluetooth pairing process needs to be executed for the first time, and data interaction can be further executed after Bluetooth pairing is successful. The paired and bound owner mobile terminals can be automatically reconnected when approaching the vehicle next time, and the pairing is not needed again.
S204 further comprises the steps of: in order to prevent arbitrary connection of others, the vehicle-mounted safe box needs to be disconnected from the Bluetooth connection immediately under the following several scenes:
(1) the vehicle-mounted safe box confirms that the pairing code sent by the mobile terminal is wrong;
(2) the vehicle-mounted safe box detects that the pairing code sent by the mobile terminal exceeds a preset time (preferably 5S).
S3: after the vehicle-mounted safe box is connected with the mobile terminal through the Bluetooth and is successfully paired, the vehicle-mounted safe box judges whether the mobile terminal is in a safety range, if so, the S4 is turned to, and if not, the S3 is executed again.
The process that the vehicle-mounted safe judges whether the mobile terminal is in the safety range in the S3 includes: the vehicle-mounted safe box sends a distance measurement positioning packet to the mobile terminal through a plurality of different positions at the same time, the distance between the mobile terminal and the vehicle-mounted safe box is determined according to the distance information of the positions replied by the mobile terminal, whether the distance belongs to a safety range or not is judged, if yes, the mobile terminal is determined to be in the safety range, and otherwise, the mobile terminal is determined not to be in the safety range.
The implementation method for determining the distance between the mobile terminal and the vehicle-mounted safe according to the distance information of the plurality of positions replied by the mobile terminal includes, but is not limited to, RSSI and HADM. When the RSSI is used for ranging and positioning, taking the measured value as the RSSI data as an example, the auxiliary node acquires the RSSI value by the vehicle end, including but not limited to, acquiring by sniffing the bluetooth data packet between the main node and the mobile terminal, or acquiring by receiving a periodic ranging and positioning broadcast from the mobile terminal. When ranging and positioning are performed by using the HADM method, the measured value may be a ranging result obtained by each secondary node of the vehicle ranging the mobile terminal based on the HADM mechanism.
S4: the vehicle-mounted safe box carries out terminal service key authentication through the vehicle-mounted service key (the Bluetooth connection can be immediately disconnected after the authentication fails), the Bluetooth conversation is continuously kept after the authentication succeeds, and the mobile terminal opens the vehicle-mounted safe box through the terminal key.
The process that the vehicle-mounted safe box authenticates the terminal key through the vehicle-mounted service key in the S4 includes: the mobile terminal sends instruction ciphertext information containing terminal service key information to the vehicle-mounted safe box through a Bluetooth communication channel; the vehicle-mounted safe box decrypts the instruction ciphertext information through the vehicle-mounted service key, if decryption is successful, authentication is successful, and if decryption is failed, authentication is failed.
Thus, it can be seen that:
compared with the mode of opening the vehicle-mounted safe box through the entity key in the prior art, the method and the system can open the vehicle-mounted safe box through the mobile terminal, and a user basically cannot give the mobile terminal to a third party during maintenance, repair or valet parking, so that the safety degree is improved.
Compared with the mode of opening the vehicle-mounted safe box through the password in the prior art, the method adopts the mobile terminal to automatically open and close the vehicle-mounted safe box, not only has a very simple operation process, but also can avoid the situation of forgetting the password, and is convenient for users to use.
The device for controlling the opening of the vehicle-mounted safe box through the mobile terminal comprises a secret key issuing module arranged on a server, a terminal Bluetooth communication module and a terminal secret key authentication module arranged on the mobile terminal, and a safe box Bluetooth communication module, a Bluetooth distance measurement module, a safe box secret key authentication module and a safe box control module arranged on the vehicle-mounted safe box.
The key issuing module is used for: and issuing the terminal service key to the mobile terminal of the vehicle owner, and issuing the vehicle-mounted service key to the vehicle-mounted safe box.
Terminal bluetooth communication module and safe bluetooth communication module are used for: and carrying out Bluetooth connection and pairing on the mobile terminal and the vehicle-mounted safe.
The Bluetooth ranging module is used for: after the vehicle-mounted safe box is successfully connected and paired with the mobile terminal through the Bluetooth, judging whether the mobile terminal is in a safety range, and if so, sending a key authentication signal to a safe box key authentication module; otherwise, whether the mobile terminal is in the safety range is continuously judged.
The safe box key authentication module is used for: after receiving the key authentication signal, the terminal key authentication module initiates key authentication through the vehicle-mounted service key, and the Bluetooth connection is immediately disconnected after authentication failure; after the authentication is successful, the Bluetooth session is continuously kept, and the safe control module opens the vehicle-mounted safe.
The specific working process of the terminal key authentication module and the safe key authentication module comprises the following steps: the terminal key authentication module sends instruction ciphertext information containing terminal service key information to the vehicle-mounted safe box through a Bluetooth communication channel; the safe box key authentication module decrypts the instruction ciphertext information through the vehicle-mounted service key, if decryption is successful, authentication is successful, and if decryption is failed, authentication is failed.
The device also comprises an identity authentication module arranged on the mobile terminal, and the identity authentication module is used for: and carrying out user identity authentication, and sending a digital key opening application to a key issuing module of the server after confirming that the user is the owner, wherein the digital key opening application information comprises owner information.
The work flow of the key issuing module comprises the following steps: after the owner information is confirmed to pass, generating a terminal service key and a vehicle-mounted service key which are matched with each other and comprise the use validity period information; the terminal service key is issued to the mobile terminal, and the vehicle-mounted service key is issued to the vehicle-mounted safe; at the moment, the mobile terminal and the vehicle-mounted safe box are considered to establish a pairing relation, and the mobile terminal can authorize the operation in the key authority by using the terminal service key.
The specific work flow of the terminal Bluetooth communication module and the safe Bluetooth communication module comprises the following steps:
the safe box Bluetooth communication module broadcasts vehicle information; after the terminal Bluetooth communication module searches the vehicle information, Bluetooth connection is established with the safe box Bluetooth communication module. The safe box Bluetooth communication module initiates a security request, and the terminal Bluetooth communication module returns a pairing request after receiving the security request, so that the mobile terminal is prevented from initiating the pairing request at will. After receiving the pairing request returned by the safety request, the safe box Bluetooth communication module generates a unique pairing code, and the terminal Bluetooth communication module inputs the pairing code and sends the pairing code to the safe box Bluetooth communication module. After the safe box Bluetooth communication module confirms that the pairing code is correct, the pairing code is successfully paired with the terminal Bluetooth communication module, and the pairing code is transmitted to the Bluetooth protocol stack safety management layer by the safe box Bluetooth communication module and the terminal Bluetooth communication module.
The principle of the step is as follows: in the process of pairing the mobile terminal and the vehicle-mounted safe box at each time, the pairing code needs to be input so as to prevent the risk of being attacked by a man-in-the-middle in the pairing process, and in order to prevent the pairing code from being stolen and increase the stealing difficulty, the pairing code matched with the Bluetooth at each time is different. The pairing code should be verified in the manner defined by the bluetooth protocol.
It should be noted that: after the vehicle owner digital key is issued to the vehicle owner mobile terminal, the Bluetooth pairing process needs to be executed for the first time, and data interaction can be further executed after the Bluetooth pairing is successful. The paired and bound owner mobile terminals can be automatically reconnected when approaching the vehicle next time, and the pairing is not needed again.
In addition, in order to prevent any connection of others, the vehicle-mounted safe needs to be immediately disconnected from the bluetooth connection under the following several scenes:
(1) the vehicle-mounted safe box confirms that the pairing code sent by the mobile terminal is wrong;
(2) the vehicle-mounted safe box detects that the pairing code transmitted by the mobile terminal exceeds a preset time (preferably 5S).
The specific work flow of the Bluetooth ranging module comprises the following steps: the method comprises the steps of sending a distance measurement positioning packet to a mobile terminal through a plurality of different positions at the same time, determining the distance between the mobile terminal and a vehicle-mounted safe according to the distance information of the positions replied by the mobile terminal, judging whether the distance belongs to a safety range, if so, determining that the mobile terminal is in the safety range, otherwise, determining that the mobile terminal is not in the safety range.
The implementation method for determining the distance between the mobile terminal and the vehicle-mounted safe according to the distance information of the plurality of positions replied by the mobile terminal includes, but is not limited to, RSSI and HADM. When the RSSI is used for ranging and positioning, taking the measured value as the RSSI data as an example, the auxiliary node acquires the RSSI value by the vehicle end, including but not limited to, acquiring by sniffing the bluetooth data packet between the main node and the mobile terminal, or acquiring by receiving a periodic ranging and positioning broadcast from the mobile terminal. When ranging and positioning are performed by using the HADM method, the measured value may be a ranging result obtained by each secondary node of the vehicle ranging the mobile terminal based on the HADM mechanism.
Thus, it can be seen that:
compared with the mode of opening the vehicle-mounted safe box through the entity key in the prior art, the method and the system can open the vehicle-mounted safe box through the mobile terminal, and a user basically cannot give the mobile terminal to a third party during maintenance, repair or valet parking, so that the safety degree is improved.
Compared with the mode of opening the vehicle-mounted safe box through the password in the prior art, the method adopts the mobile terminal to automatically open and close the vehicle-mounted safe box, not only is the operation process very simple, but also the situation that the password is forgotten does not occur, and the method is convenient for users to use.
In the description of the present invention, it should be noted that the terms "upper", "lower", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, which are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and operate, and thus, should not be construed as limiting the present invention. Unless expressly stated or limited otherwise, the terms "mounted," "connected," and "connected" are intended to be inclusive and mean, for example, that they may be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
It is to be noted that, in the present invention, relational terms such as "first" and "second", and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable storage media, which may include computer readable storage media (or non-transitory media) and communication media (or transitory media).
The term computer-readable storage medium includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer-readable storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
For example, the computer readable storage medium may be an internal storage unit of the electronic device of the foregoing embodiment, such as a hard disk or a memory of the electronic device. The computer readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk provided on the electronic device, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like.
The above embodiments are only specific embodiments of the present invention, but the scope of the embodiments of the present invention is not limited thereto, and any person skilled in the art can easily think of various equivalent modifications or substitutions within the technical scope of the embodiments of the present invention, and these modifications or substitutions should be covered by the scope of the embodiments of the present invention. Therefore, the protection scope of the embodiments of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. A method for controlling the opening of a vehicle-mounted safe through a mobile terminal is characterized by comprising the following steps:
s1: judging whether the starting method is executed for the first time, if so, issuing a terminal service key to a mobile terminal of a vehicle owner by the server, issuing a vehicle service key to a vehicle-mounted safe box, and turning to S2; otherwise go to S3;
s2: the mobile terminal of the vehicle owner and the vehicle-mounted safe are connected and paired through Bluetooth, and the operation goes to S3;
s3: after the vehicle-mounted safe box is successfully connected and paired with the mobile terminal through the Bluetooth, the vehicle-mounted safe box judges whether the mobile terminal is in a safety range, if so, the operation goes to S4, and if not, the operation is executed again to S3;
s4: the vehicle-mounted safe box carries out terminal service key authentication through the vehicle-mounted service key, the Bluetooth conversation is continuously kept after the authentication is successful, and the mobile terminal opens the vehicle-mounted safe box through the terminal key.
2. The method for controlling the opening of the vehicle-mounted safe box through the mobile terminal as claimed in claim 1, wherein the S1 specifically comprises the steps of:
s101: the mobile terminal carries out user identity authentication, sends a digital key opening application to the server after confirming that the mobile terminal is the owner, and turns to S102, wherein the digital key opening application information comprises owner information;
s102: after confirming that the owner information passes, the server generates a terminal service key and a vehicle-mounted service key which are matched with each other and comprise the use validity period information; the server issues the terminal service key to the mobile terminal, and issues the vehicle-mounted service key to the vehicle-mounted safe box; at the moment, the mobile terminal and the vehicle-mounted safe box are considered to establish a pairing relationship, and the mobile terminal can authorize the operation in the key authority by using the terminal service key.
3. The method for controlling the opening of the vehicle-mounted safe box through the mobile terminal as claimed in claim 1, wherein the S2 specifically comprises the steps of:
s201: the vehicle-mounted safe box broadcasts vehicle information; after the mobile terminal searches the vehicle information, the mobile terminal establishes Bluetooth connection with the vehicle-mounted safe box and goes to S202;
s202: the vehicle-mounted safe box initiates a safety request, the mobile terminal returns a pairing request after receiving the safety request, and the step is S203;
s203: after receiving the pairing request returned by the safety request, the vehicle-mounted safe generates a unique pairing code, the mobile terminal inputs the pairing code and sends the pairing code to the vehicle-mounted safe, and the step is turned to S204;
s204: and after the vehicle-mounted safe box confirms that the pairing code is correct, the vehicle-mounted safe box is successfully paired with the mobile terminal.
4. The method as claimed in claim 1, wherein the step of determining whether the mobile terminal is within the safe range by the vehicle-mounted safe in S3 includes: the vehicle-mounted safe box sends a distance measurement positioning packet to the mobile terminal through a plurality of different positions at the same time, the distance between the mobile terminal and the vehicle-mounted safe box is determined according to the distance information of the positions replied by the mobile terminal, whether the distance belongs to a safety range or not is judged, if yes, the mobile terminal is determined to be in the safety range, and otherwise, the mobile terminal is determined not to be in the safety range.
5. The method for controlling the opening of the vehicle-mounted safe through the mobile terminal according to any one of claims 1 to 4, wherein the process of the vehicle-mounted safe performing terminal key authentication through the vehicle-mounted service key in S4 comprises: the mobile terminal sends instruction ciphertext information containing terminal service key information to the vehicle-mounted safe box through a Bluetooth communication channel; the vehicle-mounted safe box decrypts the instruction ciphertext information through the vehicle-mounted service key, if decryption is successful, authentication is successful, and if decryption is failed, authentication is failed.
6. The utility model provides an opening device of on-vehicle safe of control through mobile terminal which characterized in that: the device comprises a key issuing module arranged on a server, a terminal Bluetooth communication module and a terminal key authentication module arranged on a mobile terminal, and a safe box Bluetooth communication module, a Bluetooth distance measuring module, a safe box key authentication module and a safe box control module arranged on a vehicle-mounted safe box;
the key issuing module is used for: issuing a terminal service key to a mobile terminal of a vehicle owner, and issuing a vehicle-mounted service key to a vehicle-mounted safe box;
terminal bluetooth communication module and safe bluetooth communication module are used for: carrying out Bluetooth connection and pairing on the mobile terminal and the vehicle-mounted safe box;
the Bluetooth ranging module is used for: after the vehicle-mounted safe box is successfully connected and paired with the mobile terminal through the Bluetooth, judging whether the mobile terminal is in a safety range, and if so, sending a key authentication signal to a safe box key authentication module; otherwise, continuously judging whether the mobile terminal is in a safety range;
the safe box key authentication module is used for: after receiving the key authentication signal, the terminal key authentication module initiates key authentication through the vehicle-mounted service key; after the authentication is successful, the Bluetooth session is continuously kept, and the safe control module opens the vehicle-mounted safe.
7. The apparatus for controlling the opening of a vehicle-mounted safe by a mobile terminal according to claim 6, wherein: the device also comprises an identity authentication module arranged on the mobile terminal, and the identity authentication module is used for: carrying out user identity authentication, and sending a digital key opening application to a key issuing module of the server after confirming that the user identity is the owner, wherein the digital key opening application information comprises owner information;
the work flow of the key issuing module comprises the following steps: after the owner information is confirmed to pass, generating a terminal service key and a vehicle-mounted service key which are matched with each other and comprise the use validity period information; and issuing the terminal service key to the mobile terminal, and issuing the vehicle-mounted service key to the vehicle-mounted safe.
8. The device for controlling the opening of the vehicle-mounted safe box through the mobile terminal as claimed in claim 6, wherein the specific working process of the terminal Bluetooth communication module and the safe box Bluetooth communication module comprises the following steps: the safe box Bluetooth communication module broadcasts vehicle information; after the terminal Bluetooth communication module searches vehicle information, Bluetooth connection is established with the safe box Bluetooth communication module; the safe box Bluetooth communication module initiates a security request, and the terminal Bluetooth communication module returns a pairing request after receiving the security request; after receiving a pairing request returned by the safety request, the safe box Bluetooth communication module generates a unique pairing code, and the terminal Bluetooth communication module inputs the pairing code and sends the pairing code to the safe box Bluetooth communication module; after the safe box Bluetooth communication module confirms that the pairing code is correct, the pairing with the terminal Bluetooth communication module is successful.
9. The device for controlling the opening of the vehicle-mounted safe box through the mobile terminal as claimed in claim 6, wherein the specific working process of the Bluetooth ranging module comprises: the method comprises the steps of sending a distance measurement positioning packet to a mobile terminal through a plurality of different positions at the same time, determining the distance between the mobile terminal and a vehicle-mounted safe according to the distance information of the positions replied by the mobile terminal, judging whether the distance belongs to a safety range, if so, determining that the mobile terminal is in the safety range, otherwise, determining that the mobile terminal is not in the safety range.
10. The device for controlling the opening of the vehicle-mounted safe box through the mobile terminal according to any one of claims 6 to 9, wherein the specific work flow of the terminal key authentication module and the safe box key authentication module comprises the following steps: the terminal key authentication module sends instruction ciphertext information containing terminal service key information to the vehicle-mounted safe box through a Bluetooth communication channel; the safe box key authentication module decrypts the instruction ciphertext information through the vehicle-mounted service key, if decryption is successful, authentication is successful, and if decryption is failed, authentication is failed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210419750.7A CN114863590A (en) | 2022-04-20 | 2022-04-20 | Method and device for controlling opening of vehicle-mounted safe box through mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210419750.7A CN114863590A (en) | 2022-04-20 | 2022-04-20 | Method and device for controlling opening of vehicle-mounted safe box through mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114863590A true CN114863590A (en) | 2022-08-05 |
Family
ID=82631042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210419750.7A Pending CN114863590A (en) | 2022-04-20 | 2022-04-20 | Method and device for controlling opening of vehicle-mounted safe box through mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114863590A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115471936A (en) * | 2022-09-06 | 2022-12-13 | 上海汽车集团股份有限公司 | Control method and device of Bluetooth key |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104484914A (en) * | 2014-10-31 | 2015-04-01 | 海发(宁波)办公设备有限公司 | Intelligent strong box system |
CN109345676A (en) * | 2018-11-27 | 2019-02-15 | 奇瑞汽车股份有限公司 | Vehicle safe box and its control method, device |
CN110462692A (en) * | 2017-03-29 | 2019-11-15 | 云丁网络技术(北京)有限公司 | A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system |
CN111815817A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Access control safety control method and system |
CN111815824A (en) * | 2020-08-04 | 2020-10-23 | 四川铁集共联科技股份有限公司 | Unlocking method based on Bluetooth identification |
-
2022
- 2022-04-20 CN CN202210419750.7A patent/CN114863590A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104484914A (en) * | 2014-10-31 | 2015-04-01 | 海发(宁波)办公设备有限公司 | Intelligent strong box system |
CN110462692A (en) * | 2017-03-29 | 2019-11-15 | 云丁网络技术(北京)有限公司 | A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system |
CN109345676A (en) * | 2018-11-27 | 2019-02-15 | 奇瑞汽车股份有限公司 | Vehicle safe box and its control method, device |
CN111815817A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Access control safety control method and system |
CN111815824A (en) * | 2020-08-04 | 2020-10-23 | 四川铁集共联科技股份有限公司 | Unlocking method based on Bluetooth identification |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115471936A (en) * | 2022-09-06 | 2022-12-13 | 上海汽车集团股份有限公司 | Control method and device of Bluetooth key |
CN115471936B (en) * | 2022-09-06 | 2024-03-22 | 上海汽车集团股份有限公司 | Bluetooth key control method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107689092B (en) | Method and apparatus for using digital temporary vehicle keys | |
JP6838211B2 (en) | Autonomous driving control device, autonomous mobile vehicle and autonomous mobile vehicle control system | |
US10538220B1 (en) | User activated/deactivated short-range wireless communications (SRWC) auxiliary key fob | |
CN108111998B (en) | Wireless unlocking method and system | |
CN110126782B (en) | Vehicle intelligent key application method and device | |
EP2888855B1 (en) | Systems and methods for lock access management using wireless signals | |
CN112822630B (en) | Data processing method of device and computer-readable storage medium | |
EP1371255B1 (en) | Method for enabling pki functions in a smart card | |
EP2384038B1 (en) | Method and system for realizing network locking and unlocking by a terminal device | |
US9079554B2 (en) | Method and apparatus for vehicle hardware theft prevention | |
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
US11095660B2 (en) | Blockchain enabled encryption | |
US20150221150A1 (en) | Method and Apparatus for Secure Vehicle System Access from a Remote System | |
CN106559213B (en) | Equipment management method, equipment and system | |
CN107094169B (en) | Apparatus and method for enhancing telematics security through a supplemental channel | |
CN111845624A (en) | Method for starting vehicle without key | |
CN114764956B (en) | Control method and device for vehicle and readable storage medium | |
EP3101929A1 (en) | Information processing method, terminal and server, and communication method and system | |
CN114863590A (en) | Method and device for controlling opening of vehicle-mounted safe box through mobile terminal | |
CN111862399A (en) | Unlocking request generation method and device and electronic equipment | |
US20230071702A1 (en) | Managing communications between a vehicle and a user device | |
CN105592074A (en) | Method and system of mobile device cooperation authentication on the basis of geographic position | |
CN111179474B (en) | Unlocking processing method and device for vehicle authenticated by user and electronic equipment | |
CN111314901B (en) | Association method of application program and IMEI (International Mobile Equipment identity) carrying mobile terminal thereof | |
JP2007053454A (en) | Authentication device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220805 |