CN115171248B - Bluetooth key-based connection method and device and related equipment - Google Patents

Bluetooth key-based connection method and device and related equipment Download PDF

Info

Publication number
CN115171248B
CN115171248B CN202210761236.1A CN202210761236A CN115171248B CN 115171248 B CN115171248 B CN 115171248B CN 202210761236 A CN202210761236 A CN 202210761236A CN 115171248 B CN115171248 B CN 115171248B
Authority
CN
China
Prior art keywords
client
key
bluetooth key
state
bluetooth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210761236.1A
Other languages
Chinese (zh)
Other versions
CN115171248A (en
Inventor
刘伟
岑思阳
姚高飞
林军昌
张旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hozon New Energy Automobile Co Ltd
Original Assignee
Hozon New Energy Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hozon New Energy Automobile Co Ltd filed Critical Hozon New Energy Automobile Co Ltd
Priority to CN202210761236.1A priority Critical patent/CN115171248B/en
Publication of CN115171248A publication Critical patent/CN115171248A/en
Application granted granted Critical
Publication of CN115171248B publication Critical patent/CN115171248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application discloses a Bluetooth key-based connection method, a Bluetooth key-based connection device and related equipment, wherein the Bluetooth key-based connection method comprises the following steps: when the first client is determined to finish the security initialization operation, carrying out identity verification on the first client; when the verification is successful, connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client; when verification fails, determining the key state corresponding to the authorized vehicle; and judging whether to replace the first Bluetooth key according to the key state, and connecting the authorized vehicle based on the replaced first Bluetooth key. The method effectively solves the system use risk caused by network environment and downtime of the key platform, improves the coverage rate of the Bluetooth key and improves the user experience.

Description

Bluetooth key-based connection method and device and related equipment
Technical Field
The present application relates to the field of vehicle control technologies, and in particular, to a connection method and apparatus based on a bluetooth key, an electronic device, and a computer readable storage medium.
Background
The automobile Bluetooth key realizes the operations of opening, closing the automobile door, igniting and the like under the keyless condition, and provides convenience and different user experiences for automobile owners to a great extent. With the advent and development of car rental services, it has become important to realize the shared use of car bluetooth keys while ensuring the safety of vehicles. When the automobile Bluetooth key in the related art is connected, when no network exists in the external environment or internal errors occur in a background server of a host factory, on-line key signature verification fails, so that a user cannot use the Bluetooth key, and user experience is poor, and therefore, how to better realize connection of the Bluetooth key becomes a problem to be solved.
Disclosure of Invention
The object of the present application is to solve at least to some extent one of the above-mentioned technical problems.
Therefore, a first object of the present application is to provide a connection method based on a bluetooth key, which effectively solves the system use risk caused by network environment and downtime of a key platform, improves the coverage rate of the bluetooth key, and improves the user experience.
A second object of the present application is to provide a connection device based on a bluetooth key.
A third object of the present application is to propose an electronic device.
A fourth object of the present application is to propose a computer readable storage medium.
In order to achieve the above object, a connection method based on a bluetooth key according to an embodiment of the present application includes: when the first client is determined to finish the security initialization operation, carrying out identity verification on the first client; when the verification is successful, connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client; when verification fails, determining a key state corresponding to the authorized vehicle; and judging whether to replace the first Bluetooth key according to the key state, and connecting the authorized vehicle based on the replaced first Bluetooth key.
According to the Bluetooth key-based connection method, when the first client completes the security initialization operation, identity verification is conducted on the first client, when verification is successful, the authorized vehicle is connected according to the first Bluetooth key of the first client and the authorized vehicle, when verification is failed, the key state corresponding to the authorized vehicle is determined, whether the first Bluetooth key is replaced is judged according to the key state, and the authorized vehicle is connected based on the replaced first Bluetooth key. When the identity verification of the first client fails, whether the first Bluetooth key is replaced or not is determined by detecting the key state of the authorized vehicle, and the connection between the first client and the authorized vehicle is realized based on the replaced first Bluetooth key, so that the system use risk caused by network environment and downtime of a key platform is effectively solved, the coverage rate of the Bluetooth key is improved, and the user experience is improved.
According to one embodiment of the present application, the performing identity verification on the first client includes: the first client receives authorization information sent by a second client; downloading the first Bluetooth key according to the authorization information, and detecting whether the network condition of the first client is normal or not; if yes, carrying out identity verification on the first client.
According to one embodiment of the present application, the authorization information includes: information of the authorized vehicle, the first client information, an authorization time limit and an authorization right.
According to one embodiment of the application, the identity verification includes one or more of fingerprint recognition, face recognition, and verification code recognition.
According to one embodiment of the present application, the connecting the authorized vehicle according to the first bluetooth key of the first client and the authorized vehicle includes: the first client initiates a connection request to the authorized vehicle; judging whether the first client and the authorized vehicle need to be paired or not; if yes, connecting the authorized vehicles in a preset time based on the pairing code.
According to one embodiment of the application, the key status includes unused, downloaded, in use, revoked, and expired.
According to one embodiment of the present application, when the key status is the unused or in-use, the key status of the first bluetooth key is changed to the revoked status, and when the key status is determined to be the revoked status, it is determined that the first bluetooth key is not changed.
According to one embodiment of the present application, when the key status is the downloaded, the second client revokes the first bluetooth key and determines to change the first bluetooth key.
According to one embodiment of the present application, when the key status is the expired status and it is determined that the attribute information of the first client is changed, the first bluetooth key is changed; and when the attribute information of the second client is confirmed to be changed, the first Bluetooth key is not replaced.
According to one embodiment of the present application, further comprising: based on the connection between the first client and the authorized vehicle, the first client triggers a vehicle control instruction, so that when the authorized vehicle receives the vehicle control instruction, the authorized vehicle is controlled according to the vehicle control instruction.
To achieve the above object, a bluetooth key-based connection device according to a second aspect of the present application includes: the verification module is used for determining that the identity of the first client is verified when the first client completes the security initialization operation; the first connection module is used for connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client when the verification is successful; the determining module is used for determining the key state corresponding to the authorized vehicle when verification fails; and the second connection module is used for judging whether to replace the first Bluetooth key according to the key state and connecting the authorized vehicle based on the replaced first Bluetooth key.
To achieve the above object, an electronic device according to an embodiment of a third aspect of the present application includes: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the bluetooth key-based connection method according to the embodiment of the first aspect of the present application.
To achieve the above object, a fourth embodiment of the present application provides a computer readable storage medium, where the computer program when executed by a processor implements the bluetooth key based connection method according to the first embodiment of the present application.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow chart of a Bluetooth key based connection method according to one embodiment of the present application;
FIG. 2 is a flow chart of a Bluetooth key based connection method in accordance with a specific embodiment of the present application;
fig. 3 is a schematic structural view of a bluetooth key-based connection device according to one embodiment of the present application;
fig. 4 is a schematic structural view of a bluetooth key-based connection device according to another embodiment of the present application;
fig. 5 is a schematic structural view of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present application and should not be construed as limiting the application.
To this end, the application provides a Bluetooth key-based connection method, a Bluetooth key-based connection device, an electronic device and a computer-readable storage medium.
In particular, a bluetooth key-based connection method, apparatus, electronic device, and computer-readable storage medium according to embodiments of the present application are described below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a bluetooth key based connection method according to one embodiment of the application. It should be noted that, the connection method based on the bluetooth key according to the embodiment of the present application may be applied to the connection device based on the bluetooth key according to the embodiment of the present application, where the device may be configured on an electronic device or may be configured in a server. The electronic device may be a PC or a mobile terminal (e.g., a smart phone, a tablet computer, etc.). The embodiment of the present application is not limited thereto.
As shown in fig. 1, the connection method based on the bluetooth key includes:
s110, when the first client is determined to finish the security initialization operation, the identity of the first client is checked.
That is, upon determining that the first client has completed the secure initialization operation, the identity of the first client needs to be verified, where the identity verification includes one or more of fingerprint identification, face identification, and verification code identification.
Wherein the first client may be understood as an authorized user.
Among other things, in embodiments of the present application, security initialization operations include, but are not limited to, security checks of the operating environment, device software/hardware version checks, software code integrity checks, override and debug mode checks, and the like.
For example, the first client may log in the "bluetooth key" APP, and further perform a security initialization operation, and when the security initialization operation is completed, the "bluetooth key" APP interface may display that the security initialization operation is completed; in the process of performing the security initialization operation, when the security of the running environment is detected to be low, the Bluetooth key APP interface can display that the security initialization operation fails.
It should be noted that, when it is detected that the "bluetooth key APP" is turned back on or the mobile phone number of the first client is changed, a security initialization operation is required.
And S120, connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client when the verification is successful.
In the embodiment of the application, when the identity verification of the first client is successful, the first client can initiate a connection request to the authorized vehicle, then judge whether the first client and the authorized vehicle need to be paired, and if so, connect the authorized vehicle in a preset time based on the pairing code. Reference may be made to the following embodiments for specific implementation.
And S130, when the verification fails, determining the key state corresponding to the authorized vehicle.
In the embodiment of the application, when the identity verification of the first client fails, the key state corresponding to the authorized vehicle needs to be detected and determined, wherein the key state comprises unused, downloaded, in-use, revoked and expired.
And S140, judging whether to replace the first Bluetooth key according to the key state, and connecting the authorized vehicle based on the replaced first Bluetooth key.
That is, after determining the key state corresponding to the authorized vehicle, whether the first bluetooth key needs to be replaced can be determined according to the key state, and if yes, the authorized vehicle is connected based on the replaced first bluetooth key.
According to the Bluetooth key-based connection method, when the first client completes the security initialization operation, identity verification is conducted on the first client, when verification is successful, the authorized vehicle is connected according to the first Bluetooth key of the first client and the authorized vehicle, when verification is failed, the key state corresponding to the authorized vehicle is determined, whether the first Bluetooth key is replaced is judged according to the key state, and the authorized vehicle is connected based on the replaced first Bluetooth key. When the identity verification of the first client fails, whether the first Bluetooth key is replaced or not is determined by detecting the key state of the authorized vehicle, and the connection between the first client and the authorized vehicle is realized based on the replaced first Bluetooth key, so that the system use risk caused by network environment and downtime of a key platform is effectively solved, the coverage rate of the Bluetooth key is improved, and the user experience is improved.
For easier understanding of the present application by those skilled in the art, fig. 2 is a flowchart of a bluetooth key-based connection method according to an embodiment of the present application, and as shown in fig. 2, the bluetooth key-based connection method may include:
s210, when the first client is determined to finish the security initialization operation, the identity of the first client is checked.
In the embodiment of the application, the specific implementation mode of carrying out identity verification on the first client can be realized by the following modes that the first client can receive the authorization information sent by the second client, downloads the first Bluetooth key according to the authorization information and detects whether the network condition of the first client is normal or not; if yes, carrying out identity verification on the first client.
For example, the second client may send the authorization information to the first client, so that the first client receives the authorization information sent by the second client, logs in the "bluetooth key" APP according to the authorization information, and then triggers to download the first bluetooth key, and detects whether the network condition of the first client is normal, if so, performs identity verification on the first client.
For example, the second client may send the authorization information to the first client by means of a short message.
The authorization information comprises information of an authorized vehicle, first client information, an authorization time limit and an authorization right.
Wherein the information of the authorized vehicle includes, but is not limited to, license plate number, location, etc.
The first client may be understood as an authorized user, wherein the first client information includes attribute information, such as a mobile phone number. Wherein the first client may be one or more.
The second client may be understood as a user of the vehicle owner, where the second client shares a plurality of valid digital keys with the same authorized user (the first client), and the interface of the second client may display "sorry, you have shared vehicles with the current user".
The second client can authorize 5 authorized users at most, and when the number of the authorized users exceeds 5, an interface of the second client can display 'sorry, you have shared 5 effective keys, and the user cannot continue to share the effective keys temporarily'; the authorization time limit of the second client is not limited.
And S220, connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client when the verification is successful.
In the embodiment of the application, when the verification of the first client is successful, the first client can initiate a connection request to the authorized vehicle, then judge whether the first client and the authorized vehicle need to be paired, and if so, connect the authorized vehicle in a preset time based on the pairing code.
The implementation manner for judging whether the first client and the authorized vehicle need to be paired may be as follows: the mobile phone number of the first client is connected with the authorized vehicle for the first time or the first client actively ignores the pairing operation. For example, when the mobile phone number of the first client is connected with the authorized vehicle for the first time, it may be determined that the first client needs to be paired with the authorized vehicle; when the authorized vehicle actively ignores the pairing operation, it may be determined that the first client and the authorized vehicle do not need to be paired.
For example, when it is determined that the first client needs to be paired with the authorized vehicle, the "bluetooth key" APP may pop up the bluetooth pairing frame, and display the bluetooth pairing code at the same time, so as to input the bluetooth pairing code into the bluetooth pairing frame to implement connection between the first client and the authorized vehicle.
And S230, when verification fails, determining the key state corresponding to the authorized vehicle.
Wherein the key status includes unused, downloaded, in use, revoked, and expired.
For example, when identity verification of the first client through face recognition fails, a check box of an authorized vehicle of the bluetooth key APP in the first client may be clicked, and then a key inquiry button may be clicked, so as to determine a key state corresponding to the authorized vehicle.
S240, judging whether to replace the first Bluetooth key according to the key state, and connecting the authorized vehicle based on the replaced first Bluetooth key.
In the embodiment of the application, when the key state is unused or in use, the key state of the first bluetooth key is changed to the revoked state, and when the key state is determined to be the revoked state, it is determined that the first bluetooth key is not replaced.
And when the key state is downloaded, the second client side withdraws the first Bluetooth key and determines to replace the first Bluetooth key. That is, when the key status is determined to be downloaded, the second client must revoke the original authorized key and re-change the first bluetooth key to send the changed bluetooth key to the first client.
When the key state is expired and the attribute information of the first client is determined to be changed, the first Bluetooth key is replaced; and when the attribute information of the second client is confirmed to be changed, the first Bluetooth key is not replaced.
For example, the attribute information of the first client and the attribute information of the second client may be mobile phone numbers.
For example, when the key state is determined to be expired and the mobile phone number of the first client is determined to be changed, the first bluetooth key may be determined to be required to be changed, and then the second client may re-authorize the changed first bluetooth key to the first client; when the key state is determined to be expired and the mobile phone number of the second client is determined to be changed, the first Bluetooth key can be determined not to be required to be replaced, and the first client can normally use the first Bluetooth key.
S250, the first client sends a vehicle control instruction to the authorized vehicle.
In an embodiment of the present application, based on the connection of the first client to the authorized vehicle, the first client triggers the vehicle control command, so that when the authorized vehicle receives the vehicle control command, the authorized vehicle is controlled according to the vehicle control command.
Wherein, the car control button on accessible trigger "bluetooth key" APP realizes triggering the car control instruction.
The vehicle control instruction comprises remote control vehicle searching, vehicle door locks, ventilation, trunk, vehicle windows, sunroofs and the like.
When the authorized vehicle receives a plurality of vehicle control instructions, the authorized vehicle can be controlled according to the sequence of the received vehicle control instructions, when one vehicle control instruction controls the vehicle, the interface of the Bluetooth key APP is displayed in gray, and after the current vehicle control instruction controls the authorized vehicle, the authorized vehicle is controlled based on other vehicle control instructions.
According to the Bluetooth key-based connection method, when the safety initialization is completed and the network state is normal, the identity of the first client is verified, when the verification is successful, the authorized vehicle is connected according to the first Bluetooth key of the first client and the authorized vehicle, when the verification is failed, whether the first Bluetooth key is replaced or not is determined by detecting the key state of the authorized vehicle, and the connection between the first client and the authorized vehicle is realized based on the replaced first Bluetooth key, so that the system use risk caused by network environment and downtime of a key platform is effectively solved, the Bluetooth key coverage rate is improved, the user experience is improved, and any hardware and cost increase of a vehicle end are not required.
In correspondence to the bluetooth key-based connection method provided in the foregoing embodiments, an embodiment of the present application further provides a bluetooth key-based connection device, and since the bluetooth key-based connection device provided in the embodiment of the present application corresponds to the bluetooth key-based connection method provided in the foregoing embodiments, implementation of the bluetooth key-based connection method is also applicable to the bluetooth key-based connection device provided in the present embodiment, which will not be described in detail in the present embodiment. Fig. 3 is a schematic structural view of a bluetooth key-based connection device according to one embodiment of the present application. As shown in fig. 3, the bluetooth key-based connection device 300 includes: a verification module 310, a first connection module 320, a determination module 330, and a second connection module 340, wherein:
a verification module 310, configured to determine, when the first client completes the security initialization operation, to verify an identity of the first client;
a first connection module 320, configured to connect the authorized vehicle according to the first bluetooth key of the authorized vehicle and the first client when the verification is successful;
a determining module 330, configured to determine a key state corresponding to the authorized vehicle when the verification fails;
the second connection module 340 is configured to determine whether to replace the first bluetooth key according to the key status, and connect the authorized vehicle based on the replaced first bluetooth key.
According to the Bluetooth key-based connecting device, when the first client completes the security initialization operation, identity verification is conducted on the first client, when verification is successful, an authorized vehicle is connected according to the first Bluetooth key of the first client and the authorized vehicle, when verification is failed, a key state corresponding to the authorized vehicle is determined, whether to replace the first Bluetooth key is judged according to the key state, and the authorized vehicle is connected based on the replaced first Bluetooth key. Therefore, when the identity verification of the first client fails, whether the first Bluetooth key is replaced or not is determined by detecting the key state of the authorized vehicle, and the connection between the first client and the authorized vehicle is realized based on the replaced first Bluetooth key, so that the system use risk caused by network environment and downtime of a key platform is effectively solved, the coverage rate of the Bluetooth key is improved, and the user experience is improved.
In one embodiment of the present application, the verification module 310 is specifically configured to receive, by the first client, authorization information sent by the second client; downloading the first Bluetooth key according to the authorization information, and detecting whether the network condition of the first client is normal or not; if yes, carrying out identity verification on the first client.
In one embodiment of the present application, the authorization information includes: information of the authorized vehicle, the first client information, an authorization time limit and an authorization right.
In one embodiment of the application, the identity verification includes one or more of fingerprint identification, face identification, and verification code identification.
In one embodiment of the present application, the first connection module 320 is specifically configured to initiate a connection request from the first client to the authorized vehicle; judging whether the first client and the authorized vehicle need to be paired or not; if yes, connecting the authorized vehicles in a preset time based on the pairing code.
In one embodiment of the application, the key status includes unused, downloaded, in use, revoked, and expired.
In one embodiment of the present application, the second connection module 340 is specifically configured to change the key status of the first bluetooth key to the revoked status when the key status is not in use or in use, and determine not to change the first bluetooth key when the key status is determined to be in revoked status.
In one embodiment of the present application, the second connection module 340 is specifically configured to revoke the first bluetooth key and determine to change the first bluetooth key when the key status is the downloaded key status.
In one embodiment of the present application, the second connection module 340 is specifically configured to change the first bluetooth key when the key status is the expired status and when it is determined that the attribute information of the first client is changed; and when the attribute information of the second client is confirmed to be changed, the first Bluetooth key is not replaced.
In one embodiment of the present application, as shown in fig. 4, the system further includes a triggering instruction module 350, configured to trigger a vehicle control instruction by the first client based on the connection between the first client and the authorized vehicle, so that when the authorized vehicle receives the vehicle control instruction, the authorized vehicle is controlled according to the vehicle control instruction.
Referring now to fig. 5, a schematic diagram of an electronic device (e.g., a terminal device or server in fig. 1) 500 suitable for implementing an embodiment of the present application is shown. The terminal device in the embodiment of the present application may include, but is not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), car terminals (e.g., car navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 5 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present application.
As shown in fig. 5, the electronic device 500 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 501, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM502, and the RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 507 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 508 including, for example, magnetic tape, hard disk, etc.; and communication means 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 shows an electronic device 500 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a non-transitory computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or from the storage means 508, or from the ROM 502. The above-described functions defined in the method of the embodiment of the present application are performed when the computer program is executed by the processing means 501.
The computer readable medium of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: when the first client is determined to finish the security initialization operation, carrying out identity verification on the first client; when the verification is successful, connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client; when verification fails, determining a key state corresponding to the authorized vehicle; and judging whether to replace the first Bluetooth key according to the key state, and connecting the authorized vehicle based on the replaced first Bluetooth key.
Computer program code for carrying out operations of the present application may be written in one or more programming languages, including, but not limited to, an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented in software or in hardware. The name of the unit does not in any way constitute a limitation of the unit itself, for example the first acquisition unit may also be described as "unit acquiring at least two internet protocol addresses".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
In the context of the present application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in the present application is not limited to the specific combinations of technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the spirit of the disclosure. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.
Moreover, although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the application. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are example forms of implementing the claims.

Claims (9)

1. A bluetooth key based connection method, the method comprising:
when the first client is determined to finish the security initialization operation, carrying out identity verification on the first client;
when the verification is successful, connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client;
when verification fails, determining a key state corresponding to the authorized vehicle, wherein the key state comprises unused, downloaded, in-use, revoked and expired;
judging whether to replace the first Bluetooth key according to the key state, and connecting the authorized vehicle based on the replaced first Bluetooth key;
the first client comprises an authorized user side, and the second client comprises a vehicle owner user side;
determining whether to replace the first bluetooth key according to the key status includes:
when the key state is the unused state or the in-use state, changing the key state of the first Bluetooth key to the revoked state, and when the key state is determined to be the revoked state, determining not to change the first Bluetooth key;
when the key state is the downloaded state, the second client side withdraws the first Bluetooth key and determines to replace the first Bluetooth key;
when the key state is the expired state and the attribute information of the first client is determined to be changed, the first Bluetooth key is replaced; and when the attribute information of the second client is confirmed to be changed, the first Bluetooth key is not replaced.
2. The method of claim 1, wherein the verifying the identity of the first client comprises:
the first client receives authorization information sent by a second client;
downloading the first Bluetooth key according to the authorization information, and detecting whether the network condition of the first client is normal or not;
if yes, carrying out identity verification on the first client.
3. The method of claim 2, wherein the authorization information comprises: information of the authorized vehicle, the first client information, an authorization time limit and an authorization right.
4. The method of claim 2, wherein the identity verification includes one or more of fingerprint identification, face identification, and passcode identification.
5. The method of claim 2, wherein said connecting the authorized vehicle according to the first bluetooth key of the first client and the authorized vehicle comprises:
the first client initiates a connection request to the authorized vehicle;
judging whether the first client and the authorized vehicle need to be paired or not;
if yes, connecting the authorized vehicles in a preset time based on the pairing code.
6. The method of any one of claims 1-5, further comprising: based on the connection between the first client and the authorized vehicle, the first client triggers a vehicle control instruction, so that when the authorized vehicle receives the vehicle control instruction, the authorized vehicle is controlled according to the vehicle control instruction.
7. A bluetooth key based connection device, the device comprising:
the verification module is used for determining that the identity of the first client is verified when the first client completes the security initialization operation;
the first connection module is used for connecting the authorized vehicle according to the first Bluetooth key of the authorized vehicle and the first client when the verification is successful;
the determining module is used for determining the key state corresponding to the authorized vehicle when verification fails, wherein the key state comprises unused, downloaded, in-use, revoked and expired;
the second connection module is used for judging whether to replace the first Bluetooth key according to the key state and connecting the authorized vehicle based on the replaced first Bluetooth key;
the first client comprises an authorized user side, and the second client comprises a vehicle owner user side;
when the key state is the unused state or the in-use state, changing the key state of the first Bluetooth key to the revoked state, and when the key state is determined to be the revoked state, determining not to change the first Bluetooth key;
when the key state is the downloaded state, the second client side withdraws the first Bluetooth key and determines to replace the first Bluetooth key;
when the key state is the expired state and the attribute information of the first client is determined to be changed, the first Bluetooth key is replaced; and when the attribute information of the second client is confirmed to be changed, the first Bluetooth key is not replaced.
8. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the bluetooth key-based connection method of any one of claims 1-6.
9. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the bluetooth key based connection method according to any one of claims 1-6.
CN202210761236.1A 2022-06-29 2022-06-29 Bluetooth key-based connection method and device and related equipment Active CN115171248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210761236.1A CN115171248B (en) 2022-06-29 2022-06-29 Bluetooth key-based connection method and device and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210761236.1A CN115171248B (en) 2022-06-29 2022-06-29 Bluetooth key-based connection method and device and related equipment

Publications (2)

Publication Number Publication Date
CN115171248A CN115171248A (en) 2022-10-11
CN115171248B true CN115171248B (en) 2023-11-17

Family

ID=83489504

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210761236.1A Active CN115171248B (en) 2022-06-29 2022-06-29 Bluetooth key-based connection method and device and related equipment

Country Status (1)

Country Link
CN (1) CN115171248B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007280160A (en) * 2006-04-10 2007-10-25 Toyota Motor Corp Vehicle information communication system, control server, in-vehicle terminal, maintenance terminal and vehicle information communicating method
KR20090005725A (en) * 2007-07-10 2009-01-14 현대자동차주식회사 Locking system of engine room hood for anti-theft of vehicle
CN104183041A (en) * 2014-08-21 2014-12-03 深圳市同创新佳科技有限公司 Management method and system of simulated electronic key based on smart mobile phone
CN106301781A (en) * 2016-07-27 2017-01-04 山东尼格电子技术有限公司 A kind of Digital Automobile cloud key share system
WO2019202929A1 (en) * 2018-04-18 2019-10-24 株式会社東海理化電機製作所 Sharing system
CN112584365A (en) * 2020-11-23 2021-03-30 宝能(广州)汽车研究院有限公司 Vehicle NFC card key disabling method and system, Bluetooth device and storage medium
CN113570758A (en) * 2021-07-28 2021-10-29 东风汽车集团股份有限公司 Remote monitoring terminal and vehicle Bluetooth key management method
CN113808306A (en) * 2021-09-15 2021-12-17 上海瓶钵信息科技有限公司 Method and system for limiting number of times of using digital key

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007280160A (en) * 2006-04-10 2007-10-25 Toyota Motor Corp Vehicle information communication system, control server, in-vehicle terminal, maintenance terminal and vehicle information communicating method
KR20090005725A (en) * 2007-07-10 2009-01-14 현대자동차주식회사 Locking system of engine room hood for anti-theft of vehicle
CN104183041A (en) * 2014-08-21 2014-12-03 深圳市同创新佳科技有限公司 Management method and system of simulated electronic key based on smart mobile phone
CN106301781A (en) * 2016-07-27 2017-01-04 山东尼格电子技术有限公司 A kind of Digital Automobile cloud key share system
WO2019202929A1 (en) * 2018-04-18 2019-10-24 株式会社東海理化電機製作所 Sharing system
CN112584365A (en) * 2020-11-23 2021-03-30 宝能(广州)汽车研究院有限公司 Vehicle NFC card key disabling method and system, Bluetooth device and storage medium
CN113570758A (en) * 2021-07-28 2021-10-29 东风汽车集团股份有限公司 Remote monitoring terminal and vehicle Bluetooth key management method
CN113808306A (en) * 2021-09-15 2021-12-17 上海瓶钵信息科技有限公司 Method and system for limiting number of times of using digital key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
多用途智能钥匙柜系统;孙明;曾东阳;蒋宇;;当代化工研究(第16期);全文 *

Also Published As

Publication number Publication date
CN115171248A (en) 2022-10-11

Similar Documents

Publication Publication Date Title
CN111639319B (en) User resource authorization method, device and computer readable storage medium
CN111143816B (en) Verification and authorization method and verification server
CN109726528B (en) Method, device, equipment and medium for activating and requesting vehicle-machine service
CN112373431A (en) Cloud digital key generation and authorization method
US10939296B2 (en) Vehicle smart connection
CN112911550B (en) Vehicle data configuration method and electronic equipment
CN112991584A (en) Control method and system for unlocking and locking of vehicle
CN111899029A (en) Identity verification method and device for electronic payment
CN111404993A (en) Digital key sharing method, device and equipment
US10973060B2 (en) Methods and systems for management of an association between a user and a vehicle
CN115242634A (en) Software upgrading method, device and storage medium
CN115171248B (en) Bluetooth key-based connection method and device and related equipment
CN112422551A (en) SSL certificate updating method and device, electronic equipment and storage medium
CN111071204A (en) Mobile body control system, mobile body control device, and mobile body control method
CN111241518A (en) User authentication method, device, equipment and medium
CN113232624B (en) Vehicle control method and device, electronic controller and vehicle
CN113536365B (en) File access method, device, equipment and medium
CN115603982A (en) Vehicle-mounted terminal security authentication method and device, electronic equipment and storage medium
CN114882615B (en) Vehicle starting method and device, electronic equipment and medium
CN115379415A (en) Bluetooth automatic connection method and device, user equipment and vehicle-mounted equipment
CN110798320B (en) Vehicle information sharing method and device and vehicle-mounted equipment
CN115510419A (en) Electronic equipment control method and device, electronic equipment and storage medium
JP2017215889A (en) Control device, program update method, and computer program
CN115811404A (en) Method and device for creating digital key and related equipment
CN112116733A (en) Backup and acquisition method and system of vehicle Bluetooth key and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 314500 988 Tong Tong Road, Wu Tong Street, Tongxiang, Jiaxing, Zhejiang

Applicant after: United New Energy Automobile Co.,Ltd.

Address before: 314500 988 Tong Tong Road, Wu Tong Street, Tongxiang, Jiaxing, Zhejiang

Applicant before: Hezhong New Energy Vehicle Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant