CN115116162A - Digital key deleting method, device, equipment, system and storage medium - Google Patents

Digital key deleting method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN115116162A
CN115116162A CN202110298645.8A CN202110298645A CN115116162A CN 115116162 A CN115116162 A CN 115116162A CN 202110298645 A CN202110298645 A CN 202110298645A CN 115116162 A CN115116162 A CN 115116162A
Authority
CN
China
Prior art keywords
target
vehicle
target vehicle
digital key
deleting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110298645.8A
Other languages
Chinese (zh)
Other versions
CN115116162B (en
Inventor
蒋彦博
刘凯
黄占威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pateo Network Technology Service Co Ltd
Original Assignee
Shanghai Pateo Network Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pateo Network Technology Service Co Ltd filed Critical Shanghai Pateo Network Technology Service Co Ltd
Priority to CN202110298645.8A priority Critical patent/CN115116162B/en
Priority to PCT/CN2021/121560 priority patent/WO2022193615A1/en
Publication of CN115116162A publication Critical patent/CN115116162A/en
Application granted granted Critical
Publication of CN115116162B publication Critical patent/CN115116162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device

Abstract

The application discloses a method, a device, equipment, a system and a storage medium for deleting a digital key, wherein the method is applied to a terminal of a vehicle owner, the terminal is connected with a target vehicle of the vehicle owner through short-distance wireless communication, and the method comprises the following steps: sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deletes the digital key of the target borrower stored in the target vehicle, and sends a deleting result to the terminal; and sending a deletion request to the server under the condition that the deletion result is successful and the Internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server. Therefore, even if the target vehicle is in an environment with poor network or no network for a long time, the digital key of the target vehicle borrower can be completely deleted in time based on the short-distance communication between the terminal and the target vehicle, and the safety is improved.

Description

Digital key deleting method, device, equipment, system and storage medium
Technical Field
The application relates to the field of internet of vehicles, in particular to a digital key deleting method, device, equipment, system and storage medium.
Background
At present, more and more vehicles are provided with digital keys such as bluetooth keys, and a user terminal can establish communication connection with the vehicle through short-distance wireless communication to realize the short-distance communication between the vehicle and the terminal, and realize control functions such as unlocking or locking of a vehicle door, starting of the vehicle, opening and closing of a vehicle window and the like through the digital keys.
In practical application, a vehicle owner can use the vehicle through the digital key of the vehicle owner and can borrow the vehicle to a borrower for use, and at the moment, the vehicle also generates and stores the digital key for the borrower so that the borrower can use the vehicle. When the borrower returns the vehicle, the digital key of the borrower stored in the vehicle needs to be deleted. In the related art, the digital key of the borrower is deleted in such a manner that the terminal of the owner of the vehicle sends a deletion request to the server, and then the server sends a deletion instruction to the vehicle in response to the deletion request, so that the vehicle deletes the digital key of the borrower. However, the actual vehicle parking environment is often an environment with a poor network or no network, such as an underground parking lot, and the vehicle often cannot receive the deletion instruction sent by the server, and cannot execute the operation of deleting the digital key of the borrower, so that the digital key of the borrower cannot be successfully deleted, and potential safety hazards exist.
Disclosure of Invention
The present application aims to provide a method, an apparatus, a device, a system and a storage medium for deleting a digital key, so as to solve the problems in the related art.
The purpose of the application is realized by the following technical scheme:
in a first aspect, an embodiment of the present application provides a digital key deletion method, which is applied to a terminal of an owner, where the terminal is connected to a target vehicle of the owner through short-distance wireless communication, and the method includes:
sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deletes the digital key of the target borrower stored in the target vehicle, and sends a deleting result to the terminal;
and sending a deletion request to the server under the condition that the deletion result is successful and the Internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
In a second aspect, an embodiment of the present application provides a digital key deletion method, which is applied to a vehicle, where the vehicle is connected to a terminal of a vehicle owner through short-range wireless communication, and the method includes:
receiving a deleting instruction sent by the terminal, and responding to the deleting instruction to delete the digital key of the target borrower stored in the vehicle;
and sending the deletion result to the terminal so that the terminal sends a deletion request to the server under the condition that the deletion result is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
In a third aspect, an embodiment of the present application provides a digital key deleting device, which is applied to a terminal of a vehicle owner, where the terminal is connected to a target vehicle of the vehicle owner through short-distance wireless communication, and the device includes:
the first sending module is used for sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deletes the digital key of the target borrower stored in the target vehicle, and sends a deleting result to the terminal;
and the second sending module is used for sending a deleting request to the server under the condition that the deleting result is that the deleting is successful and the Internet can be accessed, wherein the deleting request is used for deleting the digital key of the target borrower stored in the server.
In a fourth aspect, an embodiment of the present application provides a digital key deleting device, which is applied to a vehicle, where the vehicle is connected to a terminal of a vehicle owner through short-range wireless communication, and the device includes:
the first receiving module is used for receiving a deleting instruction sent by the terminal and deleting the digital key of the target borrower stored in the vehicle in response to the deleting instruction;
and the result sending module is used for sending the deletion result to the terminal so that the terminal sends a deletion request to the server under the condition that the deletion result is successful and the internet can be accessed, and the deletion request is used for deleting the digital key of the target borrower stored in the server.
In a fifth aspect, an embodiment of the present application provides a digital key deletion system, including a server, a terminal of a vehicle owner, and a target vehicle; the terminal is connected with the target vehicle through short-distance wireless communication;
the terminal is used for sending a deleting instruction to the target vehicle; sending a deletion request to a server under the condition that the deletion result is successful and the Internet can be accessed;
the target vehicle is used for responding to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle and sending the deleting result to the terminal;
and the server is used for responding to the deletion request and deleting the digital key of the target borrower stored in the server.
In a sixth aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the method according to any one of the above methods when executing the computer program.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method as any one of the above.
The advantages or beneficial effects in the above technical solution at least include: the terminal of the vehicle owner and the target vehicle are connected through short-distance wireless communication, short-distance communication can be achieved, based on the short-distance communication, the terminal can directly send a deleting instruction to the target vehicle, the target vehicle can delete the digital key of the target vehicle borrower stored in the target vehicle in time, and under the condition that the deleting is successful and the internet can be normally accessed, a deleting request is sent to the server, so that the server can delete the stored digital key of the target vehicle borrower, and therefore even if the target vehicle is in an environment with poor network or no network for a long time, the digital key of the target vehicle borrower can be completely deleted in time based on the short-distance communication between the terminal and the target vehicle, and safety is improved.
The foregoing summary is provided for the purpose of description only and is not intended to be limiting in any way. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features of the present application will be readily apparent by reference to the drawings and following detailed description.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an exemplary digital key deletion method provided in an embodiment of the present application;
FIG. 2 is a flowchart of an exemplary method for deleting a digital key according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating an exemplary method for deleting a digital key according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an exemplary digital key deleting device provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of an exemplary digital key deletion apparatus provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of an exemplary digital key deletion apparatus provided in an embodiment of the present application;
fig. 7 is a schematic structural diagram of an exemplary digital key deletion apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an exemplary digital key deletion system according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an exemplary electronic device for implementing a digital key deletion method according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, more and more vehicles are provided with digital keys such as bluetooth keys, and a user terminal can establish communication connection with the vehicle through short-distance wireless communication to realize the short-distance communication between the vehicle and the terminal, and realize control functions such as unlocking or locking of a vehicle door, starting of the vehicle, opening and closing of a vehicle window and the like through the digital keys.
In practical application, a vehicle owner can use the vehicle through the digital key of the vehicle owner and can borrow the vehicle to a borrower for use, and at the moment, the vehicle also generates and stores the digital key for the borrower so that the borrower can use the vehicle. When the borrower returns the vehicle, the digital key of the borrower stored in the vehicle needs to be deleted. In the related art, the digital key of the borrower is deleted in such a manner that the terminal of the owner of the vehicle sends a deletion request to the server, and then the server sends a deletion instruction to the vehicle in response to the deletion request, so that the vehicle deletes the digital key of the borrower. However, the actual vehicle parking environment is often an environment with a poor or no network, such as an underground parking lot, and the like, and the vehicle often cannot receive the deletion instruction sent by the server, and cannot execute the operation of deleting the digital key of the borrower, so that the digital key of the borrower cannot be successfully deleted, and potential safety hazards exist.
In one scheme of the related art, a server polls a timed task to detect whether a vehicle is online (namely, the vehicle is accessed to the internet), and if the vehicle is online, a deletion instruction is sent to the vehicle. In another scheme, when the vehicle is online, the server sends a notification, and after receiving the notification, the server sends a deletion instruction to the vehicle, which is better than the former scheme and reduces the cost.
In order to solve the above technical problem, an embodiment of the present application provides a method for deleting a digital key. The following examples are given for the purpose of illustration.
Fig. 1 is a flowchart of an exemplary digital key deletion method provided in an embodiment of the present application. The digital key deleting method provided by this embodiment is applied to a terminal of a vehicle owner, and may be executed by the terminal or software and/or hardware therein, where the terminal is connected to a target vehicle of the vehicle owner through short-distance wireless communication, as shown in fig. 1, the digital key deleting method at least includes the following steps:
and step 101, sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle, and sending a deleting result to the terminal.
Wherein the target vehicle is a vehicle that currently requires deletion of the digital key. The target borrower is a borrower who lends the target vehicle.
The terminal has a short-distance wireless communication function, and can be a mobile terminal, such as a mobile phone, or a wearable device, such as a bracelet. The short-range wireless Communication may be, but is not limited to, bluetooth, Near Field Communication (NFC), and the like.
And 102, sending a deletion request to the server under the condition that the deletion result is successful and the Internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
In practical application, if a target vehicle is parked in an underground parking lot or other poor network or non-network environments, the internet cannot be normally accessed, a vehicle owner needs to get near the target vehicle to enable the terminal to establish short-distance wireless communication connection with the target vehicle, at the moment, the terminal is influenced by the environment and may not normally access the internet. The terminal may periodically detect whether it is able to access the internet. And after receiving a deletion request sent by the terminal, the server responds to the deletion request and deletes the digital key of the target borrower stored in the server. Here, the server may be a cloud server or a physical server.
According to the scheme, the terminal of the vehicle owner and the target vehicle are connected through short-distance wireless communication, short-distance communication can be achieved, based on the short-distance communication, the terminal can directly send a deleting instruction to the target vehicle, so that the target vehicle can delete the digital key of the target vehicle borrower stored in the target vehicle in time, and under the condition that the deleting is successful and the internet can be normally accessed, a deleting request is sent to the server, so that the server can delete the stored digital key of the target vehicle borrower, and therefore even if the target vehicle is in an environment with poor network or no network for a long time, the digital key of the target vehicle borrower can be completely deleted in time based on the short-distance communication between the terminal and the target vehicle, and therefore safety is improved.
In practical applications, the digital key of the target borrower generally has an authorization time limit, the target borrower can control the target vehicle through the digital key within the authorization time limit, and the digital key is invalid after the authorization time limit is exceeded.
Under the condition that the target borrower returns the target vehicle in advance, although the owner has recovered the target vehicle, the authorization time limit of the digital key is not yet reached, at the moment, the digital key of the borrower is still effective, and the digital key is actively deleted in time through the terminal, so that the situation that the target borrower drives the vehicle away again after the owner recovers the vehicle can be prevented. Based on this, the sending of the deletion instruction to the target vehicle may be sending the deletion instruction to the target vehicle within an authorized period.
Of course, after the digital key of the target borrower is invalid, the digital key of the target borrower can be deleted, so that the safety is further improved. Then, the above-mentioned sending of the deletion instruction to the target vehicle may be sending of the deletion instruction to the target vehicle after the authorization period is exceeded.
In an embodiment, the sending the deletion instruction to the target vehicle may include: and sending a deleting instruction to the target vehicle under the trigger of the deleting operation of the owner.
In practical application, when the target borrower returns the target vehicle, the target borrower usually actively informs the owner of the target vehicle, and when the owner of the target borrower returns the target vehicle, the owner of the target vehicle can actively delete the target vehicle at the terminal to trigger the target vehicle to delete the digital key of the target borrower. Therefore, the digital key of the target borrower can be deleted in time.
Illustratively, an operable interface may be displayed at the terminal, the operable interface including a delete control for performing a delete operation. When the owner wants to delete the digital key of the target borrower, a deletion operation (for example, a click operation) can be performed on the deletion control, and when the terminal detects the deletion operation, a deletion instruction is sent to the server.
In one embodiment, the sending of the deletion instruction to the target vehicle may include: and after the target vehicle is lent, sending a deleting instruction to the target vehicle when the connection is established with the target vehicle for the first time.
In practical application, after the target vehicle of the owner is lent, the owner keeps a long distance from the terminal of the owner, the short distance wireless communication connection cannot be established between the owner and the terminal of the owner, after the target vehicle is returned, if the owner is close to the target vehicle, the connection can be established between the owner and the target vehicle, that is, after the target vehicle is lent, once the connection can be established, the target vehicle is returned by the target borrower, and the digital key can be deleted. Therefore, after the target vehicle is lent, when the connection with the target vehicle is detected for the first time, the deleting instruction can be immediately and automatically sent to the target vehicle, so that the digital key can be automatically and timely deleted without manual operation of a vehicle owner, and the method is very convenient.
The connection established with the target vehicle for the first time may be established by the terminal under the trigger of a connection operation of the owner (for example, a connection operation when the owner drives the vehicle), or may be automatically established by the terminal. One way to automatically establish the first connection is illustrated below.
In one embodiment, before sending the deletion instruction to the target vehicle, the terminal-side digital key deletion method may further include: determining whether the target vehicle has lent; in the case that the target vehicle has been lent, periodically detecting a target device that can establish a connection; when the target equipment is detected, judging whether the target equipment is a target vehicle or not; in the case where the target apparatus is the target vehicle, the connection described above is established. Correspondingly, after the target vehicle is lent, when the connection with the target vehicle is established for the first time, a deletion instruction is sent to the target vehicle, and the specific implementation manner of the deletion instruction may include: and sending a deleting instruction to the target vehicle when the target device is the target vehicle and the connection is established.
In this embodiment, the target device capable of establishing the connection is automatically and periodically detected when it is determined that the target vehicle is lent, when the detected target device is the target vehicle, the vehicle returns, the connection is automatically established, the connection is the first connection after the target vehicle is lent, then, a deletion instruction is automatically sent to the target vehicle, and the target vehicle is triggered to delete the digital key of the borrower, so that the digital key is automatically and timely deleted to improve the safety, the owner does not need to manually operate at a terminal, and only needs to approach the vehicle or pass by the vehicle, which is very convenient.
When judging whether the target equipment is the target vehicle, specifically, the name of the target equipment can be obtained, whether the name of the target equipment is consistent with the name of the target vehicle of the owner of the vehicle stored locally is judged, and if so, the target equipment is determined to be the target vehicle.
In one embodiment, the determining whether the target vehicle has been lent may include: and determining whether the target vehicle is lent or not based on the local latest vehicle utilization record. In practical applications, the terminal locally stores the vehicle usage record of the target vehicle, including the vehicle usage record of the owner, the loan record of the target vehicle, and the like. If the target vehicle is borrowed, the latest user record is the record of the target vehicle lending, so that whether the target vehicle is borrowed or not can be accurately judged based on the latest local vehicle utilization record.
In one embodiment, before periodically detecting a target device that can establish a connection, the method for deleting a digital key on the terminal side may further include: based on the authorization deadline for the target borrower, a periodically detected start time is determined, the start time being earlier than the authorization deadline. Correspondingly, the specific implementation manner of periodically detecting the target device capable of establishing the connection may include: when the start time is reached, the target device starts to be detected periodically.
In practical application, for the condition that the vehicle is returned in advance, because the authorization period is not reached, if the digital key of the target borrower is not deleted, the digital key is still effective, in order to improve the safety, the digital key of the target borrower needs to be deleted in advance of the authorization period, namely, the starting time is earlier than the authorization period, so that the periodic detection can be started as early as possible, so that the target vehicle can be detected as soon as possible after the target vehicle is returned, the connection is established, and the digital key of the target borrower is deleted in time.
Further, since the periodic detection is started immediately after the loan of the vehicle, wasteful overhead increases, and therefore, in the present embodiment, the periodic detection is started after the start time is reached, and overhead can be reduced. Typically, the vehicle will return near the authorization deadline, so the start time may be near the authorization deadline to further reduce overhead. Also, the vehicle owner will typically approach the vehicle at customary usage times, such as in the morning, noon, and evening of the day, which can be used as a starting time to further reduce costs.
For example, determining the start time for the periodic detection based on the authorized duration for the subject borrower may include: determining a first time length between the lending moment and the authorization deadline; and calculating the product of the first time length and the preset proportion to obtain a second time length, taking the moment earlier than the second time length of the authorization deadline as candidate time, and taking the habitual vehicle using time closest to the candidate time as starting time. The specific time value of the habitual car using time can be set by the car owner or a default setting is adopted.
For example, habitual car hours may include 6:00, 12:00, 18: 00. The lending time is 2021 year 1 month 7 days 12:00, the authorization period is 2021 year 1 month 8 days 12:00, the first duration is 1 day, the preset proportion is 1/3, the second duration is 1/3 days, then the candidate time is 2021 year 1 month 8 days 4:00, the recent habitual vehicle using time is 6:00, and then regular detection is carried out by taking 2021 year 1 month 8 days 6:00 as the starting time.
The period interval in the periodic detection can be set according to actual conditions. Each cycle may be initiated for a predetermined time. For example, the test is started every 6 hours and continued for 30 to 60 minutes.
In one embodiment, when receiving the deletion result of the target vehicle, the terminal may further send a reminding message, where the reminding message is used for the vehicle owner to know whether the digital key is deleted in time.
In one embodiment, the method for deleting a digital key at a terminal side may further include: acquiring information of a digital key of a target borrower; generating a deleting instruction carrying the information of the digital key of the target borrower, so that the target vehicle deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deleting instruction; and/or generating a deletion request carrying the information of the digital key of the target borrower, so that the server deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deletion request.
In practical application, the information of the digital key of the target borrower is used for indicating the digital key which needs to be deleted. The information of the digital key of the target borrower may include at least one of: identification information of the target borrower, identification information of the digital key, an authorization period of the digital key, and the like.
The target vehicle can obtain the information of the digital key of the target borrower from the deletion instruction, and accurately search and delete the stored digital key of the target borrower based on the information of the digital key of the target borrower.
The server can obtain the information of the digital key of the target borrower from the deletion request, and accurately search and delete the stored digital key of the target borrower based on the information of the digital key of the target borrower.
In one embodiment, the information of the digital key of the target borrower is acquired, and the specific implementation manner of the information of the digital key of the target borrower can comprise the following steps: sending an inquiry instruction to the target vehicle so that the target vehicle inquires the stored information lists of all the digital keys and sends the information lists to the terminal; receiving a list of information from a target vehicle; and acquiring the information of the digital key of the target borrower from the information list.
In practical application, the digital key stored by the target vehicle is really used for vehicle control, so that the information of the digital key acquired from the target vehicle is more accurate. In this embodiment, the inquiry instruction is sent to the target vehicle, the information list of all the digital keys actually stored in the target vehicle at present is obtained in real time, and specific information of which digital keys and digital keys are present can be accurately known from the information list, so that the information of the digital keys of the target borrower can be accurately obtained from the information list.
In addition, the information of the digital key of the target borrower can be directly obtained from the information of the digital key locally stored in the terminal.
If the target vehicle is borrowed, the target borrower can be determined based on the latest vehicle usage record, and the information of the digital key of the target borrower is obtained.
In one embodiment, the sending of the deletion instruction to the target vehicle may include: and sending a deleting instruction to the target vehicle based on a preset encryption algorithm. And/or sending a query instruction to the target vehicle, wherein the specific implementation manner of the query instruction can include: and sending a query instruction to the target vehicle based on a preset encryption algorithm.
In practical application, the owner has the authority to delete and inquire the target vehicle. The safety between the terminal of the owner of the vehicle and the target vehicle can be guaranteed based on a preset encryption algorithm.
The preset encryption algorithm may be, but is not limited to, an RSA encryption algorithm. The RSA encryption algorithm is an asymmetric encryption algorithm that includes a pair of public and private keys that can decrypt each other. Correspondingly, based on the preset encryption algorithm, the query instruction is sent to the target vehicle, and the specific implementation manner may include:
and encrypting the query instruction through the public key of the target vehicle to obtain a first ciphertext, then signing the first ciphertext by using the private key of the owner, and sending the first ciphertext to the target vehicle. And after the target vehicle receives the first ciphertext sent by the terminal, decrypting the first ciphertext by using the private key of the target vehicle, verifying the signature by using the public key of the vehicle owner, after the decryption is successful and the signature verification is successful, confirming that the information list of the digital key has the authority to access, and sending the information list of all the digital keys on the target vehicle to the terminal.
Correspondingly, based on the preset encryption algorithm, the deletion instruction is sent to the target vehicle, and the specific implementation manner may include:
and encrypting the deletion instruction by the public key of the target vehicle to obtain a second ciphertext, signing the second ciphertext by the private key of the vehicle owner, and then sending the second ciphertext to the target vehicle. And after the target vehicle receives the second ciphertext, decrypting the second ciphertext through the private key of the target vehicle, verifying the signature by using the public key of the vehicle owner, and after the signature is successfully verified, responding to the deleting instruction by the target vehicle, executing deleting operation, and deleting the digital key stored in the target vehicle. And after the deletion is successful, sending a deletion result of successful deletion to the terminal.
The following describes a digital key deletion method provided in the embodiments of the present application in more detail by taking a bluetooth key as an example.
In the car networking system, the car networking system mainly comprises a host, a Telematics BOX (T-BOX), an Application program (APP) and a server. The host is mainly used for video entertainment in the vehicle and vehicle information display. The T-BOX is mainly used for communicating with a server or a terminal APP, and vehicle information display and control of the terminal APP are achieved.
Based on this, in the application scenario of this embodiment, the terminal of adoption is the cell-phone, and cell-phone APP can realize the bluetooth key function. The target vehicle is provided with a T-BOX. The server is a content Service Provider (TSP) cloud platform.
Among the correlation technique, cell-phone APP passes through bluetooth communication technology and vehicle bluetooth module communication, realizes the short distance communication of people with the vehicle for accomplish control functions such as door unblock, shutting, vehicle start, door window switch. The data communication among the mobile phone APP, the TSP cloud platform and the T-BOX uses an RSA encryption algorithm to ensure the security. And the car owner can borrow the car to friends or rent to renters and other lenders for use through the mobile phone APP, and the T-BOX grants the Bluetooth key to the lenders, and the lenders replace the mechanical key to control the car through the Bluetooth key. Bluetooth keys are typically stored in three places, respectively: T-BOX, TSP cloud platform, cell-phone APP. When the borrower returns the vehicle, for safety reasons, the vehicle usually deletes the bluetooth key granted to the borrower and stored in the T-BOX and the bluetooth key stored in the TSP cloud platform. The mobile phone APP is required to delete the key through the TSP cloud platform, the T-BOX of the vehicle is required to be on line in the original design, and the mobile phone APP issues an instruction through the TSP cloud platform service to delete the Bluetooth key in the T-BOX of the vehicle.
The above-mentioned flow restricts the vehicle T-BOX to be on-line, but the actual vehicle parking environment is often an environment such as an underground parking lot where the network environment is not good or no network. At this time, the deletion of the bluetooth key of the borrower is not successfully performed. Conventional solutions typically trigger the deletion of the borrower's bluetooth key by polling on a timed task, or waiting for a notification when the T-BOX of the vehicle has a network. This solution tends to fail relatively slowly. The scheme that this embodiment provided can directly delete the bluetooth key through the bluetooth and inform TSP cloud platform under the cell-phone APP has the condition of network, need not restrict the vehicle T-BOX and go on the line, so convenient and fast more.
The following explains the flow of this scheme:
the Bluetooth key stored by the TSP cloud platform is mainly convenient for inquiring and using the mobile phone APP, and the Bluetooth key stored on the T-BOX is mainly matched with the mobile phone APP and used for real vehicle control. Therefore, after the borrower returns the vehicle, the most safe scheme is to delete the key on the T-BOX, and ensure that the vehicle cannot be driven by the borrower again. And secondly, deleting keys stored on the TSP cloud platform so that all Bluetooth keys on the T-BOX can be synchronously and accurately displayed on the mobile phone APP.
As shown in fig. 2, in the presence of a network, a user logs in a mobile phone APP by using a vehicle owner account, that is, step one, the vehicle owner account logs in the mobile phone APP is executed. After logging in, the mobile phone APP keeps the login state of the owner for a period of time, such as 14 days.
And step two, the mobile phone APP and the T-BOX are established to be connected through Bluetooth after the car owner opens the mobile phone APP and the mobile phone APP is started.
Specifically, the mobile phone APP starts to use Bluetooth to connect with the T-BOX, a Bluetooth KEY (KEY) is input, Bluetooth connection is initiated with the T-BOX through a T-BOX Bluetooth name and the Bluetooth KEY, the T-BOX verifies the identity of a vehicle owner, after the T-BOX verifies the identity of the vehicle owner, the mobile phone APP is successfully connected with the T-BOX Bluetooth, an anti-replay random number is sent to the vehicle owner, and then the anti-replay random number is carried when the mobile phone APP of the vehicle owner communicates with the T-BOX, so that the safety of the Bluetooth KEY is guaranteed.
During the authentication, whether the Bluetooth KEY is correct or not can be judged, if not, the connection failure is prompted to retry, and if the connection is correct, the Bluetooth connection between the mobile phone APP and the T-BOX is successful.
And step three, the mobile phone APP sends a query instruction to the T-BOX.
Specifically, the mobile phone APP generates an inquiry instruction, the inquiry instruction carries an owner account Identity (ID), a mobile phone device number ID and a replay-preventing random number, the inquiry instruction is encrypted into a first ciphertext through a T-BOX public key, then the first ciphertext is signed by using a private key of the owner, and the first ciphertext is sent to the T-BOX through a Bluetooth protocol.
And step four, the T-BOX receives the inquiry command, inquires the information lists of all the Bluetooth keys stored on the T-BOX in response to the inquiry command, and sends the information lists of all the Bluetooth keys to the mobile phone APP.
Specifically, after the T-BOX receives a first ciphertext sent by the mobile phone APP, the first ciphertext is decrypted by using a private key of the T-BOX, if the decryption is unsuccessful, the command is determined to be wrong, the response is not performed, if the decryption is successful, the public key of the car owner is used for signature verification, if the signature verification is unsuccessful, the command is determined to be wrong, the response is not performed, if the signature verification is successful, the identified user is determined to be the car owner, the user has the authority to access the information list of the Bluetooth keys, the information lists of all the Bluetooth keys stored in the T-BOX are inquired in response to the inquiry command, and the information lists of all the Bluetooth keys are sent to the mobile phone APP.
And step five, the mobile phone APP receives and displays the information lists of all the Bluetooth keys.
The owner looks up the bluetooth key that needs to delete on cell-phone APP.
And step six, the mobile phone APP sends a deletion instruction to the T-BOX under the trigger of the deletion operation of the vehicle owner.
Specifically, an operable interface is displayed on the mobile phone APP, a user selects a Bluetooth key of a target user to be deleted (namely deletion operation) on the interface, the mobile phone APP generates a deletion instruction under the trigger of the deletion operation, the deletion instruction carries an owner account ID, a mobile phone device number ID, a replay-preventing random number and information of the Bluetooth key of the target user, the deletion instruction is encrypted into a second ciphertext through a T-BOX public key, the second ciphertext is signed through a private key of the user, and the second ciphertext is sent to the T-BOX through a Bluetooth protocol.
And step seven, the T-BOX receives the deletion instruction, responds to the deletion instruction, deletes the Bluetooth key of the target vehicle stored in the T-BOX, and sends the deletion result to the mobile phone APP.
Specifically, after the T-BOX receives a second ciphertext sent by the mobile phone APP, the second ciphertext is decrypted through a private key of the T-BOX, if the decryption is unsuccessful, the command is determined to be wrong, the response is not performed, if the decryption is successful, the public key of the owner is used for signature verification, if the signature verification is unsuccessful, the command is determined to be wrong, the response is not performed, if the signature verification is successful, the identified user is determined to be the owner, the T-BOX responds to a deleting command, and the Bluetooth key corresponding to the information of the Bluetooth key of the target person to be borrowed and stored in the T-BOX is deleted. And after the deletion is successful, returning a deletion result of successful deletion to the mobile phone APP.
And step eight, after acquiring the deletion result of successful deletion, the mobile phone APP sends a deletion request to the TSP cloud platform under the condition that the Internet can be accessed.
Specifically, after the mobile phone APP obtains a deletion result that deletion is successful, a local task is created, and whether the mobile phone can access the internet or not is detected by taking a preset time interval (for example, 5 minutes) as an interval frequency. And when the condition that the mobile phone can access the Internet is detected, sending a deletion request to the TSP cloud platform so as to call an Application Program Interface (API) to delete the Bluetooth key deleted on the T-BOX before. And finally, deleting the Bluetooth key of the target borrower by the TSP cloud platform.
Or, after the target vehicle is lent, when the connection between the mobile phone APP and the T-BOX of the target vehicle is established for the first time, the query instruction and the deletion instruction may be automatically sent to the T-BOX of the target vehicle to implement automatic deletion of the bluetooth key. If the connection is automatically established, the connection can be established by acquiring the pre-stored Bluetooth KEY.
Therefore, the problem that the target borrower's Bluetooth key is safely deleted in the scene of poor network or no network is solved, and the target borrower's Bluetooth key is still effective after the vehicle owner receives the vehicle and drives the vehicle away again is prevented.
The following describes a method for deleting a digital key on the vehicle side.
Fig. 3 is a flowchart of an exemplary digital key deletion method according to an embodiment of the present application. The digital key deleting method provided by the embodiment is applied to a vehicle, can be executed by the vehicle or software and/or hardware in the vehicle, and the vehicle is connected with a terminal of a vehicle owner through short-distance wireless communication, and the method at least comprises the following steps:
step 301, receiving a deletion instruction sent by the terminal, and deleting the digital key of the target borrower stored in the vehicle in response to the deletion instruction.
And step 302, sending the deletion result to the terminal so that the terminal sends a deletion request to the server under the condition that the deletion result is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
It should be noted that, the method for deleting a digital key at the vehicle side is similar to the method for deleting a digital key at the terminal side, and reference may be made to the embodiment related to the target vehicle at the terminal side for implementation, which is not described herein again.
In the scheme, the vehicle and the terminal of the vehicle owner are connected through short-distance wireless communication, short-distance communication can be achieved, based on the short-distance communication, the vehicle can directly receive a deleting instruction sent by the terminal, the digital key of the target borrower stored in the vehicle is deleted in time, and a deleting result is sent to the terminal, so that the terminal sends a deleting request to the server under the condition that the deleting is successful and the internet can be normally accessed, and the server deletes the stored digital key of the target borrower, therefore, even if the vehicle is in an environment with a poor network or no network for a long time, the digital key of the target borrower can be completely deleted in time based on the short-distance communication between the terminal and the vehicle, and the safety is improved.
In one embodiment, the method for deleting a digital key on the vehicle side may further include: receiving an inquiry instruction sent by a terminal, and inquiring a stored information list of all digital keys in response to the inquiry instruction; and sending the information list to the terminal. In practical application, the digital key stored in the vehicle is really used for vehicle control, so that the information of the digital key in the vehicle is more accurate. In this embodiment, the information list of all the digital keys currently and actually stored in the vehicle is sent to the terminal, so that the terminal can accurately know which digital keys and specific information of the digital keys exist at present.
Fig. 4 is a schematic structural diagram of an exemplary digital key deletion apparatus according to an embodiment of the present application. As shown in fig. 4, the present embodiment provides a digital key deleting device, which is applied to a terminal of an owner of a vehicle, and the terminal is connected to a target vehicle of the owner of the vehicle through short-range wireless communication, as shown in fig. 4, the device 400 includes:
the first sending module 401 is configured to send a deletion instruction to the target vehicle, so that the target vehicle deletes the digital key of the target borrower stored in the target vehicle in response to the deletion instruction, and sends a deletion result to the terminal;
and a second sending module 402, configured to send a deletion request to the server when the deletion result is that the deletion is successful and the internet can be accessed, where the deletion request is used to delete the digital key of the target borrower stored in the server.
In an embodiment, the first sending module 401 is specifically configured to:
and sending a deleting instruction to the target vehicle under the trigger of the deleting operation of the owner.
In an embodiment, the first sending module 401 is specifically configured to:
and after the target vehicle is lent out, when the target vehicle is connected with the target vehicle for the first time, sending a deleting instruction to the target vehicle.
In one embodiment, as shown in fig. 5, the method further comprises:
a first determination module 403 for determining whether the target vehicle has lent;
a periodic detection module 404 for periodically detecting a target device that can establish a connection if the target vehicle has been lent;
a vehicle judgment module 405, configured to judge whether the target device is a target vehicle when the target device is detected;
a connection establishing module 406, configured to establish a connection if the target device is a target vehicle;
the first sending module 401 is specifically configured to:
and sending a deleting instruction to the target vehicle when the target device is the target vehicle and the connection is established.
In an embodiment, the first determining module 403 is specifically configured to:
and determining whether the target vehicle is lent or not based on the local latest vehicle utilization record.
In one embodiment, as shown in fig. 5, the method further comprises:
a second determining module 407 for determining a periodically detected start time based on an authorized deadline for the target borrower, the start time being earlier than the authorized deadline;
the periodic detection module 404 is specifically configured to:
when the start time is reached, the target device starts to be detected periodically.
In one embodiment, as shown in fig. 5, the method further includes:
an information obtaining module 408, configured to obtain information of a digital key of a target borrower;
the instruction generating module 409 is used for generating a deletion instruction carrying the information of the digital key of the target borrower, so that the target vehicle deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deletion instruction; and/or generating a deletion request carrying the information of the digital key of the target borrower, so that the server deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deletion request.
In an embodiment, the information obtaining module 408 is specifically configured to:
sending an inquiry instruction to the target vehicle so that the target vehicle inquires the stored information lists of all the digital keys and sends the information lists to the terminal;
receiving a list of information from a target vehicle;
and acquiring the information of the digital key of the target borrower from the information list.
In an embodiment, the first sending module 401 is specifically configured to:
sending a deleting instruction to the target vehicle based on a preset encryption algorithm;
and/or the second sending module 402 is specifically configured to:
and sending a query instruction to the target vehicle based on a preset encryption algorithm.
The functions of each module in each device in the embodiment of the present application may refer to the corresponding description in the above embodiment of the method for deleting a digital key at the terminal side, and are not described herein again.
Fig. 6 is a schematic structural diagram of an exemplary digital key deletion apparatus according to an embodiment of the present application. The embodiment of the present application provides a digital key deleting device, is applied to the vehicle, and this vehicle passes through short distance wireless communication with car owner's terminal to be connected, as shown in fig. 6, this device 600 includes:
the first receiving module 601 is used for receiving a deleting instruction sent by the terminal and deleting the digital key of the target borrower stored in the vehicle in response to the deleting instruction;
and the result sending module 602 is configured to send the deletion result to the terminal, so that the terminal sends a deletion request to the server when the deletion result is that the deletion is successful and the internet can be accessed, where the deletion request is used to delete the digital key of the target borrower stored in the server.
In one embodiment, as shown in fig. 7, the method further includes:
a second receiving module 603, configured to receive an inquiry instruction sent by the terminal, and query the stored information lists of all digital keys in response to the inquiry instruction;
a list sending module 604, configured to send the information list to the terminal.
The functions of each module in each device in the embodiment of the present application may refer to the corresponding description in the above embodiment of the method for deleting a digital key on the vehicle side, and are not described herein again.
Fig. 8 is a schematic structural diagram of an exemplary digital key deletion system according to an embodiment of the present application. The embodiment of the present application provides a digital key deletion system, as shown in fig. 8, the system 800 includes a server 801, a terminal 802 of an owner, and a target vehicle 803; the terminal 802 is connected with the target vehicle 803 by short-range wireless communication;
a terminal 802 for sending a delete instruction to a target vehicle; sending a deletion request to a server under the condition that the deletion result is successful and the Internet can be accessed;
the target vehicle 803 is used for responding to the deletion instruction, deleting the digital key of the target borrower stored in the target vehicle and sending the deletion result to the terminal;
the server 801 is configured to delete the digital key of the target borrower stored in the server in response to the deletion request.
The functions of each module in each device in the embodiment of the present application may refer to the corresponding description in the above embodiment of the method for deleting a digital key on the vehicle side or the terminal side, and are not described herein again.
The embodiment of the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the digital key deleting method as in any of the above embodiments is implemented.
Fig. 9 is a schematic structural diagram of an exemplary electronic device provided in an embodiment of the present application. As shown in fig. 9, the electronic device may include: a processor 901, a communication interface 902, a memory 903 and a communication bus 904, wherein the processor 901, the communication interface 902 and the memory 903 are communicated with each other through the communication bus 904. The processor 901 may call a computer program in the memory 903 to execute the digital key deletion method in any of the above embodiments.
Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the digital key deleting method in any of the above embodiments.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the present application are generated in whole or in part when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or to implicitly indicate the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process. And the scope of the preferred embodiments of the present application includes other implementations in which functions may be performed out of the order shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. All or part of the steps of the method of the above embodiments may be implemented by hardware that is configured to be instructed to perform the relevant steps by a program, which may be stored in a computer-readable storage medium, and which, when executed, includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The above-described integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer-readable storage medium. The storage medium may be a read-only memory, a magnetic or optical disk, or the like.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of various changes or substitutions within the technical scope of the present application, and these should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (25)

1. A digital key deleting method is characterized by being applied to a terminal of a vehicle owner, wherein the terminal is connected with a target vehicle of the vehicle owner through short-distance wireless communication, and the method comprises the following steps:
sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deletes the digital key of the target borrower stored in the target vehicle, and sends a deleting result to the terminal;
and sending a deletion request to a server under the condition that the deletion result is successful and the Internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
2. The method of claim 1, wherein the sending a delete instruction to the target vehicle comprises:
and sending a deleting instruction to the target vehicle under the triggering of the deleting operation of the vehicle owner.
3. The method of claim 1, wherein the sending a deletion instruction to the target vehicle comprises:
and sending a deleting instruction to the target vehicle when the target vehicle is connected with the target vehicle for the first time after the target vehicle is lent.
4. The method of claim 3, further comprising, prior to said sending a delete instruction to said target vehicle:
determining whether the target vehicle has loaned;
periodically detecting a target device that can establish the connection if the target vehicle has been lent;
when the target device is detected, judging whether the target device is the target vehicle;
establishing the connection if the target device is the target vehicle;
after the target vehicle is lent out, when the connection is established with the target vehicle for the first time, a deleting instruction is sent to the target vehicle, and the method comprises the following steps:
and sending a deletion instruction to the target vehicle when the target device is the target vehicle and the connection is established.
5. The method of claim 4, wherein said determining whether the target vehicle has loaned comprises:
determining whether the target vehicle has been lent based on the latest local vehicle utilization record.
6. The method of claim 5, further comprising, prior to the periodically detecting a target device that can establish the connection:
determining a start time of the periodic detection based on an authorized term for the target borrower, the start time being earlier than the authorized term;
the periodically detecting a target device that may establish the connection includes:
starting to periodically detect the target device when the start time is reached.
7. The method of any one of claims 1-6, further comprising:
acquiring the information of a digital key of the target borrower;
generating the deleting instruction carrying the information of the digital key of the target borrower, so that the target vehicle deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deleting instruction; and/or generating the deletion request carrying the information of the digital key of the target borrower, so that the server deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deletion request.
8. The method of claim 7, wherein said obtaining information of a digital key of said target borrower comprises:
sending a query instruction to the target vehicle so that the target vehicle queries the stored information lists of all the digital keys and sends the information lists to the terminal;
receiving the list of information from the target vehicle;
and acquiring the information of the digital key of the target borrower from the information list.
9. The method of claim 8,
the sending of the deletion instruction to the target vehicle includes:
sending a deleting instruction to the target vehicle based on a preset encryption algorithm;
and/or, the sending of the query instruction to the target vehicle includes:
and sending a query instruction to the target vehicle based on a preset encryption algorithm.
10. A digital key deleting method is characterized by being applied to a vehicle, wherein the vehicle is connected with a terminal of a vehicle owner through short-distance wireless communication, and the method comprises the following steps:
receiving a deleting instruction sent by the terminal, and responding to the deleting instruction to delete the digital key of the target borrower stored in the vehicle;
and sending the deletion result to the terminal so that the terminal sends a deletion request to a server under the condition that the deletion result is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
11. The method of claim 10, further comprising:
receiving an inquiry instruction sent by the terminal, and inquiring the stored information list of all the digital keys in response to the inquiry instruction;
and sending the information list to the terminal.
12. A digital key deleting device is characterized in that the device is applied to a terminal of a vehicle owner, the terminal is connected with a target vehicle of the vehicle owner through short-distance wireless communication, and the device comprises:
the first sending module is used for sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deletes the digital key of the target borrower stored in the target vehicle and sends a deleting result to the terminal;
and the second sending module is used for sending a deletion request to the server under the condition that the deletion result is successful and the Internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
13. The apparatus of claim 12, wherein the first sending module is specifically configured to:
and sending a deleting instruction to the target vehicle under the triggering of the deleting operation of the vehicle owner.
14. The apparatus of claim 12, wherein the first sending module is specifically configured to:
and sending a deleting instruction to the target vehicle when the target vehicle is connected with the target vehicle for the first time after the target vehicle is lent.
15. The apparatus of claim 14, further comprising:
a first determination module to determine whether the target vehicle has been lent;
a periodic detection module for periodically detecting a target device that can establish the connection, in a case where the target vehicle has been lent;
the vehicle judgment module is used for judging whether the target equipment is the target vehicle or not when the target equipment is detected;
a connection establishing module for establishing the connection in a case where the target device is the target vehicle;
the first sending module is specifically configured to:
and sending a deletion instruction to the target vehicle when the target device is the target vehicle and the connection is established.
16. The apparatus of claim 15, wherein the first determining module is specifically configured to:
determining whether the target vehicle has loaned based on the latest local vehicle usage record.
17. The apparatus of claim 16, further comprising:
a second determination module for determining the start time of the periodic detection based on an authorization deadline for the target borrower, the start time being earlier than the authorization deadline;
the periodic detection module is specifically configured to:
starting to periodically detect the target device when the start time is reached.
18. The apparatus of any one of claims 12-17, further comprising:
the information acquisition module is used for acquiring the information of the digital key of the target borrower;
the instruction generation module is used for generating the deletion instruction carrying the information of the digital key of the target borrower so that the target vehicle deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deletion instruction; and/or generating the deletion request carrying the information of the digital key of the target borrower, so that the server deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deletion request.
19. The apparatus of claim 18, wherein the information obtaining module is specifically configured to:
sending a query instruction to the target vehicle so that the target vehicle queries the stored information lists of all the digital keys and sends the information lists to the terminal;
receiving the list of information from the target vehicle;
and acquiring the information of the digital key of the target borrower from the information list.
20. The apparatus of claim 19,
the first sending module is specifically configured to:
sending a deleting instruction to the target vehicle based on a preset encryption algorithm;
and/or the second sending module is specifically configured to:
and sending a query instruction to the target vehicle based on a preset encryption algorithm.
21. A digital key deleting device is characterized by being applied to a vehicle, wherein the vehicle is connected with a terminal of a vehicle owner through short-distance wireless communication, and the device comprises:
the first receiving module is used for receiving a deleting instruction sent by the terminal and responding to the deleting instruction to delete the digital key of the target borrower stored in the vehicle;
and the result sending module is used for sending the deletion result to the terminal so that the terminal sends a deletion request to the server under the condition that the deletion result is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
22. The apparatus of claim 21, further comprising:
the second receiving module is used for receiving the query instruction sent by the terminal and responding to the query instruction to query the stored information lists of all the digital keys;
and the list sending module is used for sending the information list to the terminal.
23. A digital key deleting system is characterized by comprising a server, a terminal of a vehicle owner and a target vehicle; the terminal is connected with the target vehicle through short-distance wireless communication;
the terminal is used for sending a deleting instruction to the target vehicle; sending a deletion request to a server under the condition that the deletion result is successful and the Internet can be accessed;
the target vehicle is used for responding to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle, and sending the deleting result to the terminal;
the server is used for responding to the deletion request and deleting the digital key of the target borrower stored in the server.
24. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1-11 when executing the computer program.
25. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-11.
CN202110298645.8A 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium Active CN115116162B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110298645.8A CN115116162B (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium
PCT/CN2021/121560 WO2022193615A1 (en) 2021-03-19 2021-09-29 Method and apparatus for deleting digital key, and device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110298645.8A CN115116162B (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium

Publications (2)

Publication Number Publication Date
CN115116162A true CN115116162A (en) 2022-09-27
CN115116162B CN115116162B (en) 2024-04-12

Family

ID=83321631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110298645.8A Active CN115116162B (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium

Country Status (2)

Country Link
CN (1) CN115116162B (en)
WO (1) WO2022193615A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117197933A (en) * 2023-10-25 2023-12-08 小米汽车科技有限公司 Control method and device for digital car key and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6748536B1 (en) * 2000-01-13 2004-06-08 Visteon Global Technologies, Inc. Key security system for vehicle-based information node
US20150294518A1 (en) * 2014-04-10 2015-10-15 Ford Global Technologies, Llc Remotely programmed keyless vehicle entry system
CN105083215A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN106023360A (en) * 2016-05-12 2016-10-12 上海泛创通信技术有限公司 Intelligent system management method of Bluetooth intelligent lock
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN109166216A (en) * 2018-08-27 2019-01-08 武汉市国扬科技集团有限公司 A kind of control method and device of smart bluetooth door lock
WO2019114578A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Method for generating and using virtual key of vehicle, system for same, and user terminal
CN110582056A (en) * 2019-09-25 2019-12-17 一汽轿车股份有限公司 vehicle starting control and vehicle management system and method based on virtual key
CN111080858A (en) * 2019-12-30 2020-04-28 上海博泰悦臻网络技术服务有限公司 Bluetooth key logout method and device
CN112215992A (en) * 2020-10-14 2021-01-12 上海银基信息安全技术股份有限公司 Digital key cleaning method and computer equipment
CN112288913A (en) * 2020-10-28 2021-01-29 上海银基信息安全技术股份有限公司 Digital key returning method and device and computer equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010209642A (en) * 2009-03-12 2010-09-24 Nissan Motor Co Ltd Automobile key management system
JP2018092323A (en) * 2016-12-01 2018-06-14 パナソニックIpマネジメント株式会社 Car sharing system, portable terminal device and on-vehicle terminal device
CN109361718B (en) * 2018-12-26 2021-04-27 上海银基信息安全技术股份有限公司 Identity authentication method, apparatus and medium
CN111605513A (en) * 2019-02-25 2020-09-01 宁波波导车卫士信息技术有限公司 Dynamic keyless entry method and system for vehicle
CN109808643B (en) * 2019-03-04 2022-03-11 重庆长安汽车股份有限公司 Bluetooth electronic key system and control method thereof
CN110164004A (en) * 2019-05-16 2019-08-23 东风小康汽车有限公司重庆分公司 A kind of Activiation method of Intelligent key, system, control device and client

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6748536B1 (en) * 2000-01-13 2004-06-08 Visteon Global Technologies, Inc. Key security system for vehicle-based information node
US20150294518A1 (en) * 2014-04-10 2015-10-15 Ford Global Technologies, Llc Remotely programmed keyless vehicle entry system
CN105083215A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN106023360A (en) * 2016-05-12 2016-10-12 上海泛创通信技术有限公司 Intelligent system management method of Bluetooth intelligent lock
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
WO2019114578A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Method for generating and using virtual key of vehicle, system for same, and user terminal
CN109166216A (en) * 2018-08-27 2019-01-08 武汉市国扬科技集团有限公司 A kind of control method and device of smart bluetooth door lock
CN110582056A (en) * 2019-09-25 2019-12-17 一汽轿车股份有限公司 vehicle starting control and vehicle management system and method based on virtual key
CN111080858A (en) * 2019-12-30 2020-04-28 上海博泰悦臻网络技术服务有限公司 Bluetooth key logout method and device
CN112215992A (en) * 2020-10-14 2021-01-12 上海银基信息安全技术股份有限公司 Digital key cleaning method and computer equipment
CN112288913A (en) * 2020-10-28 2021-01-29 上海银基信息安全技术股份有限公司 Digital key returning method and device and computer equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117197933A (en) * 2023-10-25 2023-12-08 小米汽车科技有限公司 Control method and device for digital car key and storage medium

Also Published As

Publication number Publication date
WO2022193615A1 (en) 2022-09-22
CN115116162B (en) 2024-04-12

Similar Documents

Publication Publication Date Title
US11669338B2 (en) Device locator disable authentication
US11424921B2 (en) Vehicle access systems and methods
EP3312750B1 (en) Information processing device, information processing system, and information processing method
CN108307674B (en) Method and equipment for guaranteeing terminal safety
US9906492B2 (en) Gateway device, and service providing system
EP3941014B1 (en) Digital key-based identity authentication method, terminal apparatus, and medium
CN109150907B (en) Vehicle-mounted industrial personal computer login method, device, system, computer equipment and medium
CN109920114B (en) Door lock control method and system based on geographic position
CN113542399B (en) Remote control method and device for vehicle, vehicle and storage medium
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN111404993B (en) Digital key sharing method, device and equipment
JP2004519777A (en) Method of measuring connection time of specific website on the Internet and recording medium storing program
CN114760112B (en) Wireless local area network-oriented intelligent home equipment networking method, system, equipment and storage medium
CN115002168A (en) Safety detection method for vehicle remote control and vehicle-mounted system
CN112669104A (en) Data processing method of rental equipment
CN115116162B (en) Digital key deleting method, device, equipment, system and storage medium
US8132021B2 (en) Information processing apparatus, control method therefor and computer-readable storage medium
CN114079666A (en) Equipment control system, method and device
CN112506267B (en) RTC calibration method, vehicle-mounted terminal, user and storage medium
CN110808832A (en) Digital key password sharing method and device
CN114827949A (en) Vehicle control method, control device, vehicle, and storage medium
CN113221082A (en) Data encryption method, system and computer
CN115240299A (en) Resource using method and system
CN115556703A (en) Vehicle starting control system and method
CN112559089A (en) Method, apparatus, and computer-readable storage medium for managing objects

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant