CN115116162B - Digital key deleting method, device, equipment, system and storage medium - Google Patents

Digital key deleting method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN115116162B
CN115116162B CN202110298645.8A CN202110298645A CN115116162B CN 115116162 B CN115116162 B CN 115116162B CN 202110298645 A CN202110298645 A CN 202110298645A CN 115116162 B CN115116162 B CN 115116162B
Authority
CN
China
Prior art keywords
vehicle
target
deleting
target vehicle
digital key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110298645.8A
Other languages
Chinese (zh)
Other versions
CN115116162A (en
Inventor
蒋彦博
刘凯
黄占威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pateo Network Technology Service Co Ltd
Original Assignee
Shanghai Pateo Network Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pateo Network Technology Service Co Ltd filed Critical Shanghai Pateo Network Technology Service Co Ltd
Priority to CN202110298645.8A priority Critical patent/CN115116162B/en
Priority to CN202410370716.4A priority patent/CN118230451A/en
Priority to PCT/CN2021/121560 priority patent/WO2022193615A1/en
Publication of CN115116162A publication Critical patent/CN115116162A/en
Application granted granted Critical
Publication of CN115116162B publication Critical patent/CN115116162B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a method, a device, equipment, a system and a storage medium for deleting a digital key, wherein the method is applied to a terminal of an owner, and the terminal is connected with a target vehicle of the owner through short-distance wireless communication, and comprises the following steps: transmitting a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle, and transmitting a deleting result to the terminal; and sending a deletion request to the server when the deletion result is that the deletion is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server. Therefore, even if the target vehicle is in an environment with poor network or no network for a long time, the digital key of the target borrower can be completely deleted in time based on the short-distance communication between the terminal and the target vehicle, so that the safety is improved.

Description

Digital key deleting method, device, equipment, system and storage medium
Technical Field
The present disclosure relates to the field of internet of vehicles, and in particular, to a method, device, equipment, system and storage medium for deleting a digital key.
Background
At present, a digital key such as a Bluetooth key is applied to more and more vehicles, a terminal of a user can establish communication connection with the vehicles through short-distance wireless communication so as to realize the short-distance communication of the two, and control functions such as unlocking or locking of a vehicle door, starting of the vehicle, opening and closing of a vehicle window and the like are realized through the digital key.
In practical application, the car owner can use the vehicle through the own digital key, can also borrow the vehicle for borrowing the car person and use, and at this moment, the vehicle can also generate the digital key and store for borrowing the car person to use the vehicle. When the borrower returns, the borrower's digital key stored in the vehicle needs to be deleted. In the related art, a method for deleting a digital key of a borrower is that a terminal of a vehicle owner sends a deletion request to a server, and then the server responds to the deletion request to send a deletion instruction to a vehicle so that the vehicle deletes the digital key of the borrower. However, the actual parking environment of the vehicle is often an environment with poor network or no network, such as an underground parking lot, the vehicle often cannot receive the deleting instruction sent by the server, and the operation of deleting the digital key of the borrower cannot be executed, so that the digital key of the borrower cannot be successfully deleted, and potential safety hazards exist.
Disclosure of Invention
The present application is directed to a method, apparatus, device, system and storage medium for deleting a digital key, so as to solve the problems in the related art.
The purpose of the application is realized through the following technical scheme:
in a first aspect, an embodiment of the present application provides a method for deleting a digital key, which is applied to a terminal of an owner, where the terminal is connected with a target vehicle of the owner through short-distance wireless communication, and the method includes:
transmitting a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle, and transmitting a deleting result to the terminal;
and sending a deletion request to the server when the deletion result is that the deletion is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
In a second aspect, an embodiment of the present application provides a method for deleting a digital key, which is applied to a vehicle, where the vehicle is connected to a terminal of a vehicle owner through short-distance wireless communication, and the method includes:
receiving a deleting instruction sent by a terminal, and deleting a digital key of a target borrower stored in a vehicle in response to the deleting instruction;
And sending the deleting result to the terminal so that the terminal sends a deleting request to the server when the deleting result is that the deleting is successful and the terminal can access the Internet, wherein the deleting request is used for deleting the digital key of the target borrower stored in the server.
In a third aspect, an embodiment of the present application provides a digital key deletion apparatus, applied to a terminal of an owner, where the terminal is connected to a target vehicle of the owner through short-distance wireless communication, the apparatus includes:
the first sending module is used for sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle and sending a deleting result to the terminal;
and the second sending module is used for sending a deleting request to the server when the deleting result is that the deleting is successful and the internet can be accessed, wherein the deleting request is used for deleting the digital key of the target vehicle borrower stored in the server.
In a fourth aspect, an embodiment of the present application provides a digital key deletion apparatus applied to a vehicle, where the vehicle is connected to a terminal of a vehicle owner through short-distance wireless communication, the apparatus including:
the first receiving module is used for receiving a deleting instruction sent by the terminal and deleting the digital key of the target borrower stored in the vehicle in response to the deleting instruction;
And the result sending module is used for sending the deleting result to the terminal so that the terminal can send a deleting request to the server when the deleting result is that the deleting is successful and the terminal can access the Internet, and the deleting request is used for deleting the digital key of the target borrower stored in the server.
In a fifth aspect, an embodiment of the present application provides a digital key deletion system, including a server, a terminal of a vehicle owner, and a target vehicle; the terminal is connected with the target vehicle through short-distance wireless communication;
the terminal is used for sending a deleting instruction to the target vehicle; under the condition that the deleting result is that the deleting is successful and the Internet can be accessed, a deleting request is sent to a server;
the target vehicle is used for responding to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle and sending the deleting result to the terminal;
and the server is used for responding to the deleting request and deleting the digital key of the target borrower stored in the server.
In a sixth aspect, embodiments of the present application provide an electronic device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing a method as any one of the above when executing the computer program.
In a seventh aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which when executed by a processor performs a method as any of the above.
The advantages or beneficial effects in the technical scheme at least comprise: the terminal of the vehicle owner and the target vehicle are connected through short-distance wireless communication, short-distance communication can be achieved, based on the short-distance communication, the terminal can directly send a deleting instruction to the target vehicle, the target vehicle can delete the digital key of the target borrower stored in the target vehicle in time, and under the condition that the deleting is successful and the Internet can be normally accessed, a deleting request is sent to the server, so that the server can delete the stored digital key of the target borrower, and even if the target vehicle is in an environment with poor network or no network for a long time, the digital key of the target borrower can be completely deleted in time based on the short-distance communication of the terminal and the target vehicle, and safety is improved.
The foregoing summary is for the purpose of the specification only and is not intended to be limiting in any way. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features of the present application will become apparent by reference to the drawings and the following detailed description.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required for the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an exemplary digital key deletion method provided by embodiments of the present application;
FIG. 2 is a flow chart of an exemplary digital key deletion method provided by embodiments of the present application;
FIG. 3 is a flow chart of an exemplary digital key deletion method provided by embodiments of the present application;
FIG. 4 is a schematic diagram of an exemplary digital key deletion apparatus provided in accordance with an embodiment of the present application;
FIG. 5 is a schematic diagram of an exemplary digital key deletion apparatus provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of an exemplary digital key deletion apparatus provided in accordance with an embodiment of the present application;
FIG. 7 is a schematic diagram of an exemplary digital key deletion apparatus provided in accordance with an embodiment of the present application;
FIG. 8 is a schematic diagram of an exemplary digital key deletion system provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device for implementing a digital key deletion method according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
At present, a digital key such as a Bluetooth key is applied to more and more vehicles, a terminal of a user can establish communication connection with the vehicles through short-distance wireless communication so as to realize the short-distance communication of the two, and control functions such as unlocking or locking of a vehicle door, starting of the vehicle, opening and closing of a vehicle window and the like are realized through the digital key.
In practical application, the car owner can use the vehicle through the own digital key, can also borrow the vehicle for borrowing the car person and use, and at this moment, the vehicle can also generate the digital key and store for borrowing the car person to use the vehicle. When the borrower returns, the borrower's digital key stored in the vehicle needs to be deleted. In the related art, a method for deleting a digital key of a borrower is that a terminal of a vehicle owner sends a deletion request to a server, and then the server responds to the deletion request to send a deletion instruction to a vehicle so that the vehicle deletes the digital key of the borrower. However, the actual parking environment of the vehicle is often an environment with poor network or no network, such as an underground parking lot, the vehicle often cannot receive the deleting instruction sent by the server, and the operation of deleting the digital key of the borrower cannot be executed, so that the digital key of the borrower cannot be successfully deleted, and potential safety hazards exist.
In one scheme of the related technology, a server polls a timing task to detect whether a vehicle is on line (i.e. accesses the internet), if the vehicle is on line, a deleting instruction is sent to the vehicle, however, the number of vehicles is large, the on-line time of the vehicle is not fixed, the efficiency of using the timing task is low, the cost is high, and the effect is poor. In another scheme, when the vehicle is on line, the notification is sent to the server, after the notification is received by the server, the deleting instruction is sent to the vehicle, so that the effect is better than that of the former scheme, and the cost is reduced.
In order to solve the above technical problems, an embodiment of the present application provides a method for deleting a digital key. The following is a detailed description of examples.
Fig. 1 is a flowchart of an exemplary method for deleting a digital key according to an embodiment of the present application. The digital key deleting method provided in this embodiment is applied to a terminal of a vehicle owner, and may be executed by the terminal or software and/or hardware therein, where the terminal is connected with a target vehicle of the vehicle owner through short-distance wireless communication, as shown in fig. 1, and the digital key deleting method at least includes the following steps:
And step 101, transmitting a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle, and transmitting a deleting result to the terminal.
Wherein the target vehicle is a vehicle that currently needs to delete the digital key. The target borrower is a borrower borrowing the target vehicle.
The terminal has a short-distance wireless communication function, and can be a mobile terminal, such as a mobile phone, or a wearable device, such as a bracelet. The short-range wireless communication may be, but is not limited to, bluetooth, near field communication (NFC, near Field Communication), and so forth.
And 102, sending a deletion request to a server when the deletion result is that the deletion is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server.
In practical application, if the target vehicle is parked in an environment with poor network or no network, such as an underground parking lot, the internet cannot be normally accessed, the vehicle owner needs to get near the target vehicle, so that the terminal and the target vehicle establish short-distance wireless communication connection, at this time, the terminal is affected by the environment, and the internet cannot be normally accessed, however, compared with the target vehicle, the terminal cannot be in the environment with poor network or no network, such as the underground parking lot, for a long time, because the terminal can move along with the vehicle owner, the terminal can quickly reach the environment with good network, can normally access the internet, and at this time, the deletion request can be sent to the server. The terminal may periodically detect whether it is capable of accessing the internet. After receiving the deletion request sent by the terminal, the server responds to the deletion request to delete the digital key of the target borrower stored in the server. Here, the server may be a cloud server or a physical server.
According to the scheme, the terminal of the vehicle owner and the target vehicle are connected through the short-distance wireless communication, short-distance communication can be achieved, based on the short-distance communication, the terminal can directly send a deleting instruction to the target vehicle, the target vehicle can delete the digital key of the target vehicle borrower stored in the target vehicle in time, and under the condition that deleting is successful and the Internet can be accessed normally, a deleting request is sent to the server, so that the server can delete the stored digital key of the target vehicle borrower, and even if the target vehicle is in an environment with poor network or no network for a long time, the digital key of the target vehicle borrower can be completely deleted in time based on the short-distance communication of the terminal and the target vehicle, and safety is improved.
In practical applications, the digital key of the target borrower generally has an authorized period, and in the authorized period, the target borrower can control the target vehicle through the digital key, and the digital key is invalid when the authorized period is exceeded.
Under the condition that the target vehicle borrower returns the target vehicle in advance, although the vehicle owner has retracted the target vehicle, the authorization period of the digital key is not yet reached, at this time, the digital key of the vehicle borrower is still effective, the digital key is actively deleted in time through the terminal, and the situation that the target vehicle borrower drives the vehicle again after the vehicle owner retracts the vehicle can be prevented. In this case, the deletion instruction may be transmitted to the target vehicle within the authorized period.
Of course, after the digital key of the target borrower is invalid, the digital key of the target borrower can be deleted, so that the safety is further improved. Then, the deletion instruction may be sent to the target vehicle after the authorization period has elapsed.
In an embodiment, the sending the deletion instruction to the target vehicle may include: and sending a deleting instruction to the target vehicle under the triggering of the deleting operation of the vehicle owner.
In practical application, when the target borrower returns the target vehicle, the owner of the vehicle is usually informed actively, and the owner can actively delete the target vehicle by the terminal under the condition that the owner knows that the target borrower returns the target vehicle, and trigger the target vehicle to delete the digital key of the target borrower. Therefore, the digital key of the target borrower can be deleted in time.
For example, an operable interface may be displayed at the terminal, the operable interface including a delete control for performing a delete operation. When the owner wants to delete the digital key of the target borrower, a deletion operation (for example, a clicking operation) can be performed on the deletion control, and when the terminal detects the deletion operation, a deletion instruction is sent to the server.
In one embodiment, the deleting instruction is sent to the target vehicle, and the specific implementation manner may include: and after the target vehicle is borrowed, when the connection is established with the target vehicle for the first time, sending a deleting instruction to the target vehicle.
In practical application, after the target vehicle of the vehicle owner is borrowed, the terminal of the vehicle owner always keeps a long distance from the terminal of the vehicle owner, the terminal of the vehicle owner can be connected with the target vehicle if the vehicle owner approaches the target vehicle after the target vehicle is returned, that is, after the target vehicle is borrowed, once the connection can be established, the target borrower can return the target vehicle, and the digital key can be deleted. Therefore, after the target vehicle is borrowed, when the connection with the target vehicle is detected to be established for the first time, a deleting instruction can be immediately and automatically sent to the target vehicle, so that the digital key is automatically and timely deleted, the digital key is not required to be deleted by an owner, and the method is very convenient.
The connection with the target vehicle for the first time can be established under the triggering of the connection operation of the vehicle owner (for example, the connection operation of the vehicle owner when using the vehicle), or can be automatically established by the terminal. The following illustrates one way of automatically establishing the first connection described above.
In one embodiment, before sending the deletion instruction to the target vehicle, the terminal-side digital key deletion method may further include: determining whether the target vehicle has been borrowed; periodically detecting a target device which can establish a connection in the case that the target vehicle has been borrowed; when the target equipment is detected, judging whether the target equipment is a target vehicle or not; in the case where the target device is a target vehicle, the above connection is established. Correspondingly, after the target vehicle is borrowed, when the connection is established with the target vehicle for the first time, a deleting instruction is sent to the target vehicle, and the specific implementation manner of the method can comprise the following steps: and sending a deleting instruction to the target vehicle when the target device is the target vehicle and the connection is established.
In this embodiment, under the condition that it is determined that the target vehicle is borrowed, the target device capable of establishing the connection is automatically detected periodically, when the detected target device is the target vehicle, the vehicle is considered to be returned, the connection is automatically established, the connection is the first connection after the target vehicle is borrowed, then, a deletion instruction is automatically sent to the target vehicle to trigger the target vehicle to delete the digital key of the borrower, so that the automatic and timely deletion of the digital key is realized, the terminal operation of a vehicle owner is not required, and the vehicle owner is only required to approach the vehicle or pass the vicinity of the vehicle, thereby being very convenient.
When judging whether the target equipment is a target vehicle, specifically, the name of the target equipment can be obtained, whether the name of the target equipment is consistent with the name of the locally stored vehicle owner's target vehicle is judged, and if so, the target equipment is determined to be the target vehicle.
In one embodiment, the determining whether the target vehicle has been lent may include: based on the local latest usage record, it is determined whether the target vehicle has been borrowed. In practical application, the terminal locally stores vehicle records of the target vehicle, including vehicle records of the vehicle owner, records of borrowing of the target vehicle, and the like. If the target vehicle is borrowed, the latest user record is the record of the borrowed target vehicle, so that whether the target vehicle is borrowed or not can be accurately judged based on the local latest vehicle use record.
In one embodiment, before periodically detecting the target device capable of establishing the connection, the method for deleting the digital key at the terminal side may further include: based on the authorization deadline for the target borrower, a start time for the periodic detection is determined, the start time being earlier than the authorization deadline. Accordingly, the periodic detection of the target device that can establish the connection may include: when the start time is reached, periodic detection of the target device is started.
In practical application, for the situation that the vehicle is returned in advance, if the digital key of the target borrower is not deleted, the digital key is still effective, and in order to improve the safety, the digital key of the target borrower needs to be deleted in advance of the authorized period, that is, the starting time is earlier than the authorized period, so that the digital key can be detected periodically as early as possible, the target vehicle can be detected as soon as possible after the target vehicle is returned, the connection is established, and the digital key of the target borrower is deleted timely.
Further, since the periodic detection starts immediately after the vehicle is lent, wasteful overhead increases, the periodic detection starts again after the start time is reached in the present embodiment, and the overhead can be reduced. Typically the vehicle will return close to the authorized period, so the start time may be close to the authorized period to further reduce overhead. Also, owners typically get close to the vehicle at habitual times of use, such as in the morning, noon and evening of the day, and may take habitual times of use as start times to further reduce overhead.
Illustratively, determining the start time of the periodic detection based on the authorized term for the target borrower may include: determining a first time length from the lending time to the authorized time limit; and calculating the product of the first time length and the preset proportion to obtain a second time length, taking the time earlier than the second time length of the authorized period as a candidate time, and taking the habitual train utilization time closest to the candidate time as a starting time. The specific time value of the habitual vehicle use time can be set by the vehicle owner or by default.
For example, habitual vehicle times may include 6:00, 12:00, 18:00. The borrowing time is 2021, 1, 7, 12:00, the authorized period is 2021, 1, 8, 12:00, the first time is 1, the preset proportion is 1/3, the second time is 1/3, the candidate time is 2021, 1, 8, 4:00, the latest habitual train time is 6:00, and 2021, 1, 8, 6:00 is taken as the starting time for periodic detection.
The periodic interval at the time of periodic detection may be set according to actual conditions. The detection may be continued for a preset time at the beginning of each cycle. For example, the detection is started every 6 hours, and the detection is continued for 30 to 60 minutes.
In one embodiment, the terminal may further send a reminder when receiving the deletion result of the target vehicle, where the reminder is used for enabling the owner to know in time whether the digital key is deleted.
In one embodiment, the method for deleting a digital key on the terminal side may further include: acquiring information of a digital key of a target borrower; generating a deleting instruction carrying the information of the digital key of the target borrower, so that the target vehicle deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deleting instruction; and/or generating a deleting request carrying the information of the digital key of the target borrower so that the server deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deleting request.
In practical applications, the information of the digital key of the target borrower is used for indicating the digital key to be deleted. The information of the digital key of the target borrower may include at least one of the following: the identity information of the target borrower, the identification information of the digital key, the authorized period of the digital key and the like.
The target vehicle can obtain the information of the digital key of the target borrower from the deleting instruction, and accurately find the stored digital key of the target borrower and delete the digital key based on the information of the digital key of the target borrower.
The server can obtain the information of the digital key of the target borrower from the deleting request, and accurately find the stored digital key of the target borrower and delete the digital key based on the information of the digital key of the target borrower.
In one embodiment, the method for obtaining the information of the digital key of the target borrower may include: sending a query instruction to the target vehicle so that the target vehicle queries the stored information list of all the digital keys and sends the information list to the terminal; receiving a list of information from a target vehicle; and acquiring the information of the digital key of the target borrower from the information list.
In practical applications, the digital key stored in the target vehicle is actually used for vehicle control, so that the information of the digital key obtained from the target vehicle is more accurate. In this embodiment, by sending a query command to the target vehicle, an information list of all the digital keys actually stored by the target vehicle is obtained in real time, and from the information list, specific information of which digital keys and digital keys exist at present can be accurately known, so that information of the digital keys of the target borrower can be accurately obtained from the information list.
In addition, the information of the digital key of the target borrower can be directly obtained from the information of the digital key locally stored in the terminal.
If the target vehicle is borrowed, the target borrower can be determined based on the latest vehicle record, and the information of the digital key of the target borrower can be acquired.
In one embodiment, the deleting instruction is sent to the target vehicle, and the specific implementation manner may include: and sending a deleting instruction to the target vehicle based on a preset encryption algorithm. And/or, send a query instruction to the target vehicle, which may include: and sending a query instruction to the target vehicle based on a preset encryption algorithm.
In practical application, the vehicle owner has the authority to delete and inquire the target vehicle. The safety can be ensured between the terminal of the vehicle owner and the target vehicle based on a preset encryption algorithm.
The preset encryption algorithm may be, but not limited to, an RSA encryption algorithm. The RSA encryption algorithm is an asymmetric encryption algorithm that includes a pair of public and private keys that can mutually decrypt. Correspondingly, based on a preset encryption algorithm, a query instruction is sent to the target vehicle, and the specific implementation manner may include:
and obtaining a first ciphertext through the public key encryption query instruction of the target vehicle, signing the first ciphertext by using the private key of the vehicle owner, and transmitting the first ciphertext to the target vehicle. After receiving the first ciphertext sent by the terminal, the target vehicle decrypts the first ciphertext by using the private key of the target vehicle, verifies the signature by using the public key of the vehicle owner, and confirms that the signature is authorized to access the information list of the digital key after the signature is successfully verified, and sends the information list of all the digital keys on the target vehicle to the terminal.
Correspondingly, based on a preset encryption algorithm, a deletion instruction is sent to the target vehicle, and the specific implementation manner may include:
and obtaining a second ciphertext through the public key encryption deleting instruction of the target vehicle, signing the second ciphertext through the private key of the vehicle owner, and then sending the second ciphertext to the target vehicle. After the target vehicle receives the second ciphertext, decrypting the second ciphertext through the private key of the target vehicle, verifying the signature by using the public key of the vehicle owner, and after the signature is successfully verified, the target vehicle responds to the deleting instruction to execute the deleting operation and delete the digital key stored on the target vehicle. And after the deletion is successful, sending a deletion result of the successful deletion to the terminal.
A method for deleting a digital key according to an embodiment of the present application will be described in more detail below by taking a bluetooth key as an example.
The internet of vehicles system mainly comprises a host computer, a remote information processor (T-BOX), a terminal Application (APP) and a server. The host is mainly used for video and audio entertainment in the vehicle and vehicle information display. The T-BOX is mainly used for communicating with a server or a terminal APP, and displaying and controlling vehicle information of the terminal APP is achieved.
Based on this, in the application scenario of this embodiment, the adopted terminal is a mobile phone, and the mobile phone APP can realize the bluetooth key function. The target vehicle is provided with a T-BOX. The server is a content service provider (TSP, telematics Service Provider) cloud platform.
In the related art, a mobile phone APP is communicated with a vehicle Bluetooth module through a Bluetooth communication technology, so that short-distance communication between a person and a vehicle is realized, and control functions such as unlocking, locking, starting of the vehicle, opening and closing of the vehicle window and the like are completed. The data communication among the mobile phone APP, the TSP cloud platform and the T-BOX uses an RSA encryption algorithm to ensure safety. And the car owner can borrow the car to friends or rent to borrowers such as tenant through cell-phone APP and use, and T-BOX can grant bluetooth key for borrower this moment, borrower replaces mechanical key control vehicle through bluetooth key. Bluetooth keys are typically stored in three places, respectively: T-BOX, TSP cloud platform, cell-phone APP. When a borrower returns a vehicle, the vehicle typically mainly deletes the bluetooth key stored on the T-BOX and granted to the borrower, as well as the bluetooth key stored on the TSP cloud platform for safety. The mobile phone APP is required to delete keys through the TSP cloud platform, the original design requires the T-BOX of the vehicle to be online, and the mobile phone APP issues a command to delete Bluetooth keys in the T-BOX of the vehicle through the TSP cloud platform service.
The above-described flow restricts the vehicle T-BOX to be online, but the actual vehicle parking environment is often an environment where the network environment such as an underground parking garage is poor or no network exists. At this time, the deletion of the bluetooth key of the borrower is not successful. Conventional solutions typically trigger the deletion of a borrower's bluetooth key by timed task polling, or waiting for a network-time notification of the T-BOX of the vehicle. This approach tends to fail relatively slowly. According to the scheme provided by the embodiment, the Bluetooth key can be deleted directly through Bluetooth, and the TSP cloud platform is informed under the condition that the mobile phone APP has a network, so that the vehicle T-BOX is not required to be limited to be on line, and convenience and rapidness are achieved.
The flow of this scheme is described below:
the Bluetooth key stored by the TSP cloud platform is mainly convenient for inquiring and using of the mobile phone APP, and the Bluetooth key stored on the T-BOX is mainly matched with the mobile phone APP and used for real vehicle control. Therefore, after the borrower returns the vehicle, the safest scheme is to delete the key on the T-BOX, so that the vehicle is ensured not to be driven away again by the borrower. And secondly, deleting keys stored on the TSP cloud platform so that all Bluetooth keys on the T-BOX can be synchronously and accurately displayed on the mobile phone APP.
As shown in fig. 2, in the case of a network, the user logs in the mobile phone APP using the owner account, that is, the step one is executed, and the owner account logs in the mobile phone APP. After logging in, the mobile phone APP can keep the logging-in state of the vehicle owner for a period of time, for example, the logging-in state is kept for 14 days.
And the owner opens the mobile phone APP, and after the mobile phone APP is started, the step two is executed, and Bluetooth connection is established between the mobile phone APP and the T-BOX.
Specifically, the mobile phone APP starts to use Bluetooth to connect with the T-BOX, inputs a Bluetooth KEY (KEY), initiates Bluetooth connection with the T-BOX through the T-BOX Bluetooth name and the Bluetooth KEY, and after the T-BOX verifies the identity of the vehicle owner, the mobile phone APP and the T-BOX Bluetooth are successfully connected, an anti-replay random number is sent to the vehicle owner, and then the anti-replay random number is carried when the vehicle owner mobile phone APP and the T-BOX are communicated, so that the safety of the Bluetooth KEY is ensured.
During identity verification, whether the Bluetooth KEY is correct or not can be judged, if not, connection failure is prompted to try again, and if so, the mobile phone APP and the T-BOX Bluetooth are successfully connected.
Step three, the mobile phone APP sends a query instruction to the T-BOX.
Specifically, the mobile phone APP generates a query instruction, the query instruction carries an owner account number identification (ID, identity document), a mobile phone device number ID and an anti-replay random number, the query instruction is encrypted by a T-BOX public key to form a first ciphertext, then the first ciphertext is signed by the private key of the owner, and the first ciphertext is sent to the T-BOX through a bluetooth protocol.
And step four, the T-BOX receives the inquiry command, and the information list of all the Bluetooth keys stored on the T-BOX is inquired in response to the inquiry command, and the information list of all the Bluetooth keys is sent to the mobile phone APP.
Specifically, after the T-BOX receives a first ciphertext sent by the mobile phone APP, decrypting the first ciphertext by using a private key of the T-BOX, if decryption is unsuccessful, determining that an instruction is wrong and not responding, if decryption is successful, performing signature verification by using a public key of a vehicle owner, if signature verification is unsuccessful, determining that the instruction is wrong and not responding, if signature verification is successful, determining that the identified user is the vehicle owner, having permission to access an information list of the Bluetooth keys, responding to a query instruction, querying the information list of all the Bluetooth keys stored on the T-BOX, and sending the information list of all the Bluetooth keys to the mobile phone APP.
And fifthly, the mobile phone APP receives and displays the information list of all the Bluetooth keys.
The owner looks over the bluetooth key that needs to delete on cell-phone APP.
Step six, the mobile phone APP sends a deleting instruction to the T-BOX under the triggering of the deleting operation of the vehicle owner.
Specifically, an operable interface is displayed on a mobile phone APP, a vehicle owner selects a Bluetooth key of a target vehicle borrower to be deleted (namely a deleting operation) on the interface, the mobile phone APP generates a deleting instruction under the triggering of the deleting operation, the deleting instruction carries information of a vehicle owner account ID, a mobile phone equipment ID, an anti-replay random number and the Bluetooth key of the target vehicle borrower, the deleting instruction is encrypted through a T-BOX public key to form a second ciphertext, the second ciphertext is signed through a private key of the vehicle owner, and then the second ciphertext is sent to the T-BOX through a Bluetooth protocol.
And step seven, the T-BOX receives a deleting instruction, the Bluetooth key of the target vehicle stored in the T-BOX is deleted in response to the deleting instruction, and a deleting result is sent to the mobile phone APP.
Specifically, after the T-BOX receives the second ciphertext sent by the mobile phone APP, decrypting the second ciphertext through a private key of the T-BOX, if decryption is unsuccessful, determining that an instruction is wrong and not responding, if decryption is successful, performing signature verification by using a public key of a vehicle owner, if signature verification is unsuccessful, determining that the instruction is wrong and not responding, if signature verification is successful, determining that the identified user is the vehicle owner, and deleting a Bluetooth key corresponding to the information of the Bluetooth key of the target vehicle borrower stored on the T-BOX by the T-BOX in response to the deleting instruction. And after the deletion is successful, returning a deleting result of the successful deletion to the mobile phone APP.
And step eight, after the mobile phone APP obtains a deleting result of successful deletion, a deleting request is sent to the TSP cloud platform under the condition that the Internet can be accessed.
Specifically, after the mobile phone APP acquires a deletion result of successful deletion, a local task is created, and whether the mobile phone can access the internet is detected by taking a preset time interval (for example, 5 minutes) as an interval frequency. When it is detected that the handset has access to the internet, a delete request is sent to the TSP cloud platform to invoke an application program interface (API, application Program Interface) to delete the bluetooth key previously deleted on the T-BOX. Finally, the TSP cloud platform deletes the bluetooth key of the target borrower.
Or, after the target vehicle is borrowed, when the mobile phone APP and the T-BOX of the target vehicle are first connected, an inquiry instruction and a deletion instruction are automatically sent to the T-BOX of the target vehicle, so as to realize automatic deletion of the bluetooth key. If the connection is automatically established, the connection may be established by acquiring a bluetooth KEY stored in advance.
Therefore, the problem that the Bluetooth key of the target borrower is still effective after the car owner receives the car is solved, and the target borrower drives the car again under the scene that the network is poor or no network.
The following describes a method of deleting a digital key on the vehicle side.
Fig. 3 is a flowchart of an exemplary method for deleting a digital key according to an embodiment of the present application. The digital key deleting method provided by the embodiment is applied to a vehicle, and can be executed by the vehicle or software and/or hardware therein, wherein the vehicle is connected with a terminal of a vehicle owner through short-distance wireless communication, and the method at least comprises the following steps:
step 301, receiving a deletion instruction sent by the terminal, and deleting the digital key of the target borrower stored in the vehicle in response to the deletion instruction.
And step 302, transmitting the deleting result to the terminal, so that the terminal transmits a deleting request to the server when the deleting result is that the deleting is successful and the terminal can access the Internet, wherein the deleting request is used for deleting the digital key of the target borrower stored in the server.
It should be noted that, the method for deleting the digital key on the vehicle side is similar to the method for deleting the digital key on the terminal side, and may be implemented with reference to the embodiment related to the target vehicle on the terminal side, which is not described herein.
According to the scheme, the vehicle and the vehicle owner's terminal are connected through the short-distance wireless communication, short-distance communication can be achieved, based on the short-distance communication, the vehicle can directly receive a deleting instruction sent by the terminal, delete the digital key of the target borrower stored in the vehicle in time, and send a deleting result to the terminal, so that the terminal can send a deleting request to the server under the condition that the terminal is successful in deleting and can normally access the Internet, and the server can delete the stored digital key of the target borrower, so that even if the vehicle is in an environment with poor network or no network for a long time, the digital key of the target borrower can be completely deleted in time based on the short-distance communication of the terminal and the vehicle, and safety is improved.
In one embodiment, the method for deleting a digital key on the vehicle side may further include: receiving an inquiry command sent by a terminal, and inquiring the stored information list of all the digital keys in response to the inquiry command; and sending the information list to the terminal. In practical applications, the digital key stored in the vehicle is actually used for controlling the vehicle, so that the information of the digital key in the vehicle is more accurate. In this embodiment, the information list of all the digital keys actually stored in the vehicle is sent to the terminal, so that the terminal can accurately know which digital keys exist and the specific information of the digital keys.
Fig. 4 is a schematic structural view of an exemplary digital key deletion apparatus according to an embodiment of the present application. As shown in fig. 4, an embodiment of the present application provides a digital key deletion apparatus, which is applied to a terminal of an owner, where the terminal is connected with a target vehicle of the owner through short-distance wireless communication, and as shown in fig. 4, the apparatus 400 includes:
a first transmitting module 401, configured to transmit a deletion instruction to the target vehicle, so that the target vehicle deletes the digital key of the target borrower stored in the target vehicle in response to the deletion instruction, and transmits a deletion result to the terminal;
And the second sending module 402 is configured to send a deletion request to the server, where the deletion result is that the deletion is successful and the internet can be accessed, and the deletion request is used to delete the digital key of the target borrower stored in the server.
In one embodiment, the first sending module 401 is specifically configured to:
and sending a deleting instruction to the target vehicle under the triggering of the deleting operation of the vehicle owner.
In one embodiment, the first sending module 401 is specifically configured to:
and after the target vehicle is borrowed, when the connection is established with the target vehicle for the first time, sending a deleting instruction to the target vehicle.
In one embodiment, as shown in fig. 5, further comprising:
a first determining module 403 for determining whether the target vehicle has been borrowed;
a periodic detection module 404, configured to periodically detect a target device that can establish a connection in a case where the target vehicle has been borrowed;
a vehicle judging module 405, configured to judge whether the target device is a target vehicle when the target device is detected;
a connection establishment module 406, configured to establish a connection when the target device is a target vehicle;
the first sending module 401 is specifically configured to:
and sending a deleting instruction to the target vehicle when the target device is the target vehicle and the connection is established.
In one embodiment, the first determining module 403 is specifically configured to:
based on the local latest usage record, it is determined whether the target vehicle has been borrowed.
In one embodiment, as shown in fig. 5, further comprising:
a second determining module 407, configured to determine, based on the authorization deadline for the target borrower, a start time of the periodic detection, where the start time is earlier than the authorization deadline;
the periodic detection module 404 is specifically configured to:
when the start time is reached, periodic detection of the target device is started.
In one embodiment, as shown in fig. 5, further comprising:
an information acquisition module 408, configured to acquire information of a digital key of a target borrower;
the instruction generating module 409 is configured to generate a deletion instruction carrying information of the digital key of the target borrower, so that the target vehicle deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deletion instruction; and/or generating a deleting request carrying the information of the digital key of the target borrower so that the server deletes the digital key of the target borrower based on the information of the digital key of the target borrower carried in the deleting request.
In one embodiment, the information obtaining module 408 is specifically configured to:
Sending a query instruction to the target vehicle so that the target vehicle queries the stored information list of all the digital keys and sends the information list to the terminal;
receiving a list of information from a target vehicle;
and acquiring the information of the digital key of the target borrower from the information list.
In one embodiment, the first sending module 401 is specifically configured to:
based on a preset encryption algorithm, a deleting instruction is sent to a target vehicle;
and/or, the second sending module 402 is specifically configured to:
and sending a query instruction to the target vehicle based on a preset encryption algorithm.
The functions of each module in each device of the embodiments of the present application may be referred to the corresponding description in the embodiment of the method for deleting a digital key on the terminal side, which is not described herein again.
Fig. 6 is a schematic structural diagram of an exemplary digital key deletion apparatus according to an embodiment of the present application. An embodiment of the present application provides a digital key deletion apparatus, which is applied to a vehicle, and the vehicle is connected to a terminal of a vehicle owner through short-distance wireless communication, as shown in fig. 6, the apparatus 600 includes:
a first receiving module 601, configured to receive a deletion instruction sent by a terminal, and delete a digital key of a target borrower stored in a vehicle in response to the deletion instruction;
The result sending module 602 is configured to send a deletion result to the terminal, so that the terminal sends a deletion request to the server when the deletion result is that the deletion is successful and the terminal can access the internet, where the deletion request is used to delete the digital key of the target borrower stored in the server.
In one embodiment, as shown in fig. 7, further comprising:
a second receiving module 603, configured to receive a query instruction sent by the terminal, and query the stored information list of all the digital keys in response to the query instruction;
the list sending module 604 is configured to send the information list to the terminal.
The functions of each module in each device of the embodiments of the present application may be referred to the corresponding description in the above embodiment of the method for deleting a digital key on the vehicle side, which is not repeated herein.
Fig. 8 is a schematic diagram of an exemplary digital key deletion system according to an embodiment of the present application. The embodiment of the application provides a digital key deleting system, as shown in fig. 8, the system 800 includes a server 801, a terminal 802 of a vehicle owner, and a target vehicle 803; the terminal 802 is connected to the target vehicle 803 by short-range wireless communication;
a terminal 802 for transmitting a deletion instruction to a target vehicle; under the condition that the deleting result is that the deleting is successful and the Internet can be accessed, a deleting request is sent to a server;
A target vehicle 803 for deleting the digital key of the target borrower stored in the target vehicle in response to the deletion instruction, and transmitting the deletion result to the terminal;
the server 801 is configured to delete a digital key of a target borrower stored in the server in response to a deletion request.
The functions of each module in each device of the embodiments of the present application may be referred to the corresponding description in the above embodiment of the method for deleting a digital key on the vehicle side or the terminal side, which is not repeated herein.
The embodiment of the application also provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the digital key deletion method as in any embodiment.
Fig. 9 is a schematic structural diagram of an exemplary electronic device according to an embodiment of the present application. As shown in fig. 9, the electronic device may include: processor 901, communication interface 902, memory 903 and communication bus 904, wherein processor 901, communication interface 902, memory 903 accomplish communication with each other via communication bus 904. The processor 901 may call a computer program in the memory 903 to perform the digital key deletion method in any of the above embodiments.
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the digital key deletion method as in any of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. Computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Any process or method description in a flowchart or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process. And the scope of the preferred embodiments of the present application includes additional implementations in which functions may be performed in a substantially simultaneous manner or in an opposite order from that shown or discussed, including in accordance with the functions that are involved.
Logic and/or steps represented in the flowcharts or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. All or part of the steps of the methods of the embodiments described above may be performed by a program that, when executed, comprises one or a combination of the steps of the method embodiments, instructs the associated hardware to perform the method.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules described above, if implemented in the form of software functional modules and sold or used as a stand-alone product, may also be stored in a computer-readable storage medium. The storage medium may be a read-only memory, a magnetic or optical disk, or the like.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of various changes or substitutions within the technical scope of the present application, and these should be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (21)

1. A digital key deletion method, characterized by being applied to a terminal of an owner, the terminal being connected with a target vehicle of the owner through short-distance wireless communication, the method comprising:
transmitting a deletion instruction to the target vehicle so that the target vehicle responds to the deletion instruction, deleting the digital key of the target borrower stored in the target vehicle, and transmitting a deletion result to the terminal;
transmitting a deletion request to a server under the condition that the deletion result is that the deletion is successful and the internet can be accessed, wherein the deletion request is used for deleting the digital key of the target vehicle borrower stored in the server;
the sending a deletion instruction to the target vehicle includes:
after the target vehicle is borrowed, when the connection is established with the target vehicle for the first time, a deleting instruction is sent to the target vehicle;
Before the sending of the deletion instruction to the target vehicle, the method further comprises:
determining whether the target vehicle has been borrowed;
periodically detecting a target device that can establish the connection in the event that the target vehicle has been borrowed;
when the target equipment is detected, judging whether the target equipment is the target vehicle or not;
establishing the connection if the target device is the target vehicle;
after the target vehicle is lent, when the connection is established with the target vehicle for the first time, sending a deleting instruction to the target vehicle, wherein the deleting instruction comprises the following steps:
and sending a deleting instruction to the target vehicle when the target device is the target vehicle and the connection is established.
2. The method of claim 1, wherein the sending a delete instruction to the target vehicle comprises:
and sending a deleting instruction to the target vehicle under the triggering of the deleting operation of the vehicle owner.
3. The method of claim 1, wherein the determining whether the target vehicle has been borrowed comprises:
based on the local latest usage record, it is determined whether the target vehicle has been borrowed.
4. A method according to claim 3, further comprising, prior to said periodically detecting a target device that can establish said connection:
determining a start time of the periodic detection based on an authorized deadline for the target borrower, the start time being earlier than the authorized deadline;
the periodic detection of the target device that may establish the connection includes:
when the start time is reached, the periodic detection of the target device is started.
5. A method according to any one of claims 1-3, further comprising:
acquiring information of a digital key of the target borrower;
generating the deleting instruction carrying the information of the digital key of the target vehicle borrower so that the target vehicle deletes the digital key of the target vehicle borrower based on the information of the digital key of the target vehicle borrower carried in the deleting instruction; and/or generating the deleting request carrying the information of the digital key of the target vehicle borrower, so that the server deletes the digital key of the target vehicle borrower based on the information of the digital key of the target vehicle borrower carried in the deleting request.
6. The method of claim 5, wherein the obtaining information of the digital key of the target borrower comprises:
sending a query instruction to the target vehicle so that the target vehicle queries the stored information list of all the digital keys and sends the information list to the terminal;
receiving the list of information from the target vehicle;
and acquiring the information of the digital key of the target borrower from the information list.
7. The method of claim 6, wherein the step of providing the first layer comprises,
the sending a deletion instruction to the target vehicle includes:
based on a preset encryption algorithm, a deleting instruction is sent to the target vehicle;
and/or, the sending a query instruction to the target vehicle includes:
and sending a query instruction to the target vehicle based on a preset encryption algorithm.
8. A digital key deletion method, characterized by being applied to a vehicle connected to a terminal of a vehicle owner through short-range wireless communication, comprising:
receiving a deleting instruction sent by the terminal, and deleting the digital key of the target borrower stored in the vehicle in response to the deleting instruction;
Transmitting a deletion result to the terminal, so that the terminal transmits a deletion request to a server when the deletion result is that the deletion is successful and the terminal can access the Internet, wherein the deletion request is used for deleting the digital key of the target borrower stored in the server;
the terminal is used for: after the vehicle is borrowed, when the connection is established with the vehicle for the first time, a deleting instruction is sent to the vehicle; for the following: determining whether the vehicle has been borrowed; periodically detecting a target device that can establish the connection in the event that the vehicle has been borrowed; when the target equipment is detected, judging whether the target equipment is the vehicle or not; establishing the connection if the target device is the vehicle; and sending a deleting instruction to the vehicle when the target device is the vehicle and the connection is established.
9. The method as recited in claim 8, further comprising:
receiving an inquiry command sent by the terminal, and inquiring the stored information list of all the digital keys in response to the inquiry command;
and sending the information list to the terminal.
10. A digital key deletion apparatus, characterized by being applied to a terminal of an owner, the terminal being connected to a target vehicle of the owner through short-range wireless communication, the apparatus comprising:
the first sending module is used for sending a deleting instruction to the target vehicle so that the target vehicle responds to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle and sending a deleting result to the terminal;
the second sending module is used for sending a deleting request to a server when the deleting result is that the deleting is successful and the internet can be accessed, wherein the deleting request is used for deleting the digital key of the target vehicle borrower stored in the server;
the first sending module is specifically configured to:
after the target vehicle is borrowed, when the connection is established with the target vehicle for the first time, a deleting instruction is sent to the target vehicle;
further comprises:
a first determination module for determining whether the target vehicle has been borrowed;
a periodic detection module for periodically detecting a target device that can establish the connection in the event that the target vehicle has been borrowed;
The vehicle judging module is used for judging whether the target equipment is the target vehicle or not when the target equipment is detected;
the connection establishment module is used for establishing the connection under the condition that the target equipment is the target vehicle;
the first sending module is specifically configured to:
and sending a deleting instruction to the target vehicle when the target device is the target vehicle and the connection is established.
11. The apparatus of claim 10, wherein the first transmitting module is specifically configured to:
and sending a deleting instruction to the target vehicle under the triggering of the deleting operation of the vehicle owner.
12. The apparatus of claim 11, wherein the first determining module is specifically configured to:
based on the local latest usage record, it is determined whether the target vehicle has been borrowed.
13. The apparatus as recited in claim 12, further comprising:
a second determining module, configured to determine a start time of the periodic detection based on an authorization deadline for the target borrower, where the start time is earlier than the authorization deadline;
the periodic detection module is specifically configured to:
When the start time is reached, the periodic detection of the target device is started.
14. The apparatus according to any one of claims 10-13, further comprising:
the information acquisition module is used for acquiring the information of the digital key of the target borrower;
the instruction generation module is used for generating the deleting instruction carrying the information of the digital key of the target vehicle borrower so that the target vehicle deletes the digital key of the target vehicle borrower based on the information of the digital key of the target vehicle borrower carried in the deleting instruction; and/or generating the deleting request carrying the information of the digital key of the target vehicle borrower, so that the server deletes the digital key of the target vehicle borrower based on the information of the digital key of the target vehicle borrower carried in the deleting request.
15. The apparatus of claim 14, wherein the information acquisition module is specifically configured to:
sending a query instruction to the target vehicle so that the target vehicle queries the stored information list of all the digital keys and sends the information list to the terminal;
receiving the list of information from the target vehicle;
And acquiring the information of the digital key of the target borrower from the information list.
16. The apparatus of claim 15, wherein the device comprises a plurality of sensors,
the first sending module is specifically configured to:
based on a preset encryption algorithm, a deleting instruction is sent to the target vehicle;
and/or, the second sending module is specifically configured to:
and sending a query instruction to the target vehicle based on a preset encryption algorithm.
17. A digital key deletion apparatus, characterized by being applied to a vehicle connected to a terminal of an owner of the vehicle through short-range wireless communication, comprising:
the first receiving module is used for receiving a deleting instruction sent by the terminal and deleting the digital key of the target borrower stored in the vehicle in response to the deleting instruction; the terminal is used for: after the vehicle is borrowed, when the connection is established with the vehicle for the first time, a deleting instruction is sent to the vehicle; for the following: determining whether the vehicle has been borrowed; periodically detecting a target device that can establish the connection in the event that the vehicle has been borrowed; when the target equipment is detected, judging whether the target equipment is the vehicle or not; establishing the connection if the target device is the vehicle; sending a delete instruction to the vehicle if the target device is the vehicle and the connection has been established;
And the result sending module is used for sending a deleting result to the terminal so that the terminal can send a deleting request to a server when the deleting result is that the deleting is successful and the terminal can access the Internet, and the deleting request is used for deleting the digital key of the target vehicle borrower stored in the server.
18. The apparatus as recited in claim 17, further comprising:
the second receiving module is used for receiving an inquiry instruction sent by the terminal and inquiring the stored information list of all the digital keys in response to the inquiry instruction;
and the list sending module is used for sending the information list to the terminal.
19. The digital key deleting system is characterized by comprising a server, a terminal of a vehicle owner and a target vehicle; the terminal is connected with the target vehicle through short-distance wireless communication;
the terminal is used for sending a deleting instruction to the target vehicle; under the condition that the deleting result is that the deleting is successful and the Internet can be accessed, a deleting request is sent to a server; the terminal is used for: after the vehicle is borrowed, when the connection is established with the vehicle for the first time, a deleting instruction is sent to the vehicle; for the following: determining whether the vehicle has been borrowed; periodically detecting a target device that can establish the connection in the event that the vehicle has been borrowed; when the target equipment is detected, judging whether the target equipment is the vehicle or not; establishing the connection if the target device is the vehicle; sending a delete instruction to the vehicle if the target device is the vehicle and the connection has been established;
The target vehicle is used for responding to the deleting instruction, deleting the digital key of the target borrower stored in the target vehicle and sending the deleting result to the terminal;
and the server is used for responding to the deleting request and deleting the digital key of the target borrower stored in the server.
20. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1-9 when executing the computer program.
21. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any one of claims 1-9.
CN202110298645.8A 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium Active CN115116162B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110298645.8A CN115116162B (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium
CN202410370716.4A CN118230451A (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium
PCT/CN2021/121560 WO2022193615A1 (en) 2021-03-19 2021-09-29 Method and apparatus for deleting digital key, and device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110298645.8A CN115116162B (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202410370716.4A Division CN118230451A (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium

Publications (2)

Publication Number Publication Date
CN115116162A CN115116162A (en) 2022-09-27
CN115116162B true CN115116162B (en) 2024-04-12

Family

ID=83321631

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202410370716.4A Pending CN118230451A (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium
CN202110298645.8A Active CN115116162B (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202410370716.4A Pending CN118230451A (en) 2021-03-19 2021-03-19 Digital key deleting method, device, equipment, system and storage medium

Country Status (2)

Country Link
CN (2) CN118230451A (en)
WO (1) WO2022193615A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117197933B (en) * 2023-10-25 2024-06-25 小米汽车科技有限公司 Control method and device for digital car key and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6748536B1 (en) * 2000-01-13 2004-06-08 Visteon Global Technologies, Inc. Key security system for vehicle-based information node
CN105083215A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN106023360A (en) * 2016-05-12 2016-10-12 上海泛创通信技术有限公司 Intelligent system management method of Bluetooth intelligent lock
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN109166216A (en) * 2018-08-27 2019-01-08 武汉市国扬科技集团有限公司 A kind of control method and device of smart bluetooth door lock
WO2019114578A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Method for generating and using virtual key of vehicle, system for same, and user terminal
CN110582056A (en) * 2019-09-25 2019-12-17 一汽轿车股份有限公司 vehicle starting control and vehicle management system and method based on virtual key
CN111080858A (en) * 2019-12-30 2020-04-28 上海博泰悦臻网络技术服务有限公司 Bluetooth key logout method and device
CN112215992A (en) * 2020-10-14 2021-01-12 上海银基信息安全技术股份有限公司 Digital key cleaning method and computer equipment
CN112288913A (en) * 2020-10-28 2021-01-29 上海银基信息安全技术股份有限公司 Digital key returning method and device and computer equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010209642A (en) * 2009-03-12 2010-09-24 Nissan Motor Co Ltd Automobile key management system
US20150294518A1 (en) * 2014-04-10 2015-10-15 Ford Global Technologies, Llc Remotely programmed keyless vehicle entry system
JP2018092323A (en) * 2016-12-01 2018-06-14 パナソニックIpマネジメント株式会社 Car sharing system, portable terminal device and on-vehicle terminal device
CN109361718B (en) * 2018-12-26 2021-04-27 上海银基信息安全技术股份有限公司 Identity authentication method, apparatus and medium
CN111605513A (en) * 2019-02-25 2020-09-01 宁波波导车卫士信息技术有限公司 Dynamic keyless entry method and system for vehicle
CN109808643B (en) * 2019-03-04 2022-03-11 重庆长安汽车股份有限公司 Bluetooth electronic key system and control method thereof
CN110164004A (en) * 2019-05-16 2019-08-23 东风小康汽车有限公司重庆分公司 A kind of Activiation method of Intelligent key, system, control device and client

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6748536B1 (en) * 2000-01-13 2004-06-08 Visteon Global Technologies, Inc. Key security system for vehicle-based information node
CN105083215A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN106023360A (en) * 2016-05-12 2016-10-12 上海泛创通信技术有限公司 Intelligent system management method of Bluetooth intelligent lock
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
WO2019114578A1 (en) * 2017-12-15 2019-06-20 蔚来汽车有限公司 Method for generating and using virtual key of vehicle, system for same, and user terminal
CN109166216A (en) * 2018-08-27 2019-01-08 武汉市国扬科技集团有限公司 A kind of control method and device of smart bluetooth door lock
CN110582056A (en) * 2019-09-25 2019-12-17 一汽轿车股份有限公司 vehicle starting control and vehicle management system and method based on virtual key
CN111080858A (en) * 2019-12-30 2020-04-28 上海博泰悦臻网络技术服务有限公司 Bluetooth key logout method and device
CN112215992A (en) * 2020-10-14 2021-01-12 上海银基信息安全技术股份有限公司 Digital key cleaning method and computer equipment
CN112288913A (en) * 2020-10-28 2021-01-29 上海银基信息安全技术股份有限公司 Digital key returning method and device and computer equipment

Also Published As

Publication number Publication date
WO2022193615A1 (en) 2022-09-22
CN118230451A (en) 2024-06-21
CN115116162A (en) 2022-09-27

Similar Documents

Publication Publication Date Title
US12001857B2 (en) Device locator disable authentication
CN108307674B (en) Method and equipment for guaranteeing terminal safety
US10569739B2 (en) Virtual keyfob for vehicle sharing
CN107650863B (en) Vehicle sharing method and system
US10659457B2 (en) Information processing device, information processing system, and information processing method
US20240013135A1 (en) Information processing device, information processing method, image acquisition method, and non-transitory computer-readable storage medium
US8923817B2 (en) Mobility device security
US8971857B2 (en) Communication system, communication method, and portable machine
US20190197471A1 (en) Information processing system, information processing method, information processing program
WO2020020185A1 (en) Systems and methods for a vehicle authenticating and enrolling a wireless device
US10589719B1 (en) Method for managing digital key of mobile device for vehicle-sharing and key server using the same
CN112373431A (en) Cloud digital key generation and authorization method
JP2008065829A (en) Method for updating authority data of access device and service center
KR20120137729A (en) Car control system
TW201928770A (en) Method for managing vehicle control permissions, and apparatus
CA2848428A1 (en) Methods and systems for keyless vehicle dispatch
BR102018073129A2 (en) DELIVERY ASSISTANCE DEVICE, DELIVERY ASSISTANCE METHOD, AND NON-TRANSIT COMPUTER LEGITIMACY STORAGE CONTAINER THAT STORES A DELIVERY ASSISTANCE PROGRAM
CN115116162B (en) Digital key deleting method, device, equipment, system and storage medium
CN114760112B (en) Wireless local area network-oriented intelligent home equipment networking method, system, equipment and storage medium
CN107452095B (en) Method and device for unlocking a door lock
JP2020533672A (en) Network devices and their control systems and methods
KR102591833B1 (en) Systems and methods for granting access to or booting a subject
CN117040724A (en) Digital key authorization method and device, electronic equipment and readable storage medium
CN112506267B (en) RTC calibration method, vehicle-mounted terminal, user and storage medium
CN111179474B (en) Unlocking processing method and device for vehicle authenticated by user and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant