CN115705762A - Vehicle control method, device, equipment, terminal and medium - Google Patents

Vehicle control method, device, equipment, terminal and medium Download PDF

Info

Publication number
CN115705762A
CN115705762A CN202110938416.8A CN202110938416A CN115705762A CN 115705762 A CN115705762 A CN 115705762A CN 202110938416 A CN202110938416 A CN 202110938416A CN 115705762 A CN115705762 A CN 115705762A
Authority
CN
China
Prior art keywords
target vehicle
key data
bluetooth
vehicle
bluetooth device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110938416.8A
Other languages
Chinese (zh)
Inventor
宋晶晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110938416.8A priority Critical patent/CN115705762A/en
Publication of CN115705762A publication Critical patent/CN115705762A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The embodiment discloses a vehicle control method, a vehicle control device, equipment, a terminal and a medium, wherein the method comprises the following steps: after the user terminal is successfully paired with a target vehicle, a first Bluetooth device generates digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data, and public key data of the asymmetric key data is sent to the target vehicle; after Bluetooth connection with a target vehicle is established, signing preset data by using private key data of the asymmetric key data to obtain signed data; and sending the signature data to the target vehicle through the Bluetooth connection, so that the target vehicle unlocks the target vehicle according to a signature verification result representing that signature verification passes, wherein the signature verification result is obtained by verifying the signature of the signature data by using the public key data by the target vehicle.

Description

Vehicle control method, device, equipment, terminal and medium
Technical Field
The present application relates to the field of data intelligent devices, and in particular, to a vehicle control method and apparatus, a bluetooth device, a user terminal, an electronic device, and a computer storage medium.
Background
In the related art, a smart phone, a Subscriber Identity Module (SIM) card, and a wearable device (smart watch or bracelet, etc.) are changed into a digital car key through a near field communication technology and safer key management, so that functions of keyless entry, engine start and stop, remote key authorization for other people, and the like are realized, and more comfortable and convenient car use experience is provided for car users.
However, in the process of unlocking the vehicle using the digital car key, the operation complexity of the user is high.
Disclosure of Invention
The embodiment of the application provides a technical scheme for detecting network availability, which can solve the problem that the operation complexity of a user is higher in the process of unlocking a vehicle by using a digital vehicle key.
The embodiment of the application provides a vehicle control method, which is applied to a first Bluetooth device of a user terminal and comprises the following steps:
after the user terminal is successfully paired with a target vehicle, generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data, and sending public key data of the asymmetric key data to the target vehicle;
after Bluetooth connection with a target vehicle is established, signing preset data by using private key data of the asymmetric key data to obtain signed data; and sending the signature data to the target vehicle through the Bluetooth connection, so that the target vehicle unlocks the target vehicle according to a signature verification result representing that signature verification passes, wherein the signature verification result is obtained by verifying the signature of the signature data by using the public key data by the target vehicle.
In some embodiments, after the pairing of the user terminal and the target vehicle is successful, the method further comprises:
sending a Media Access Control (MAC) address of the first Bluetooth device to the target vehicle; after receiving a Bluetooth connection establishment request sent by the target vehicle, establishing Bluetooth connection with the target vehicle; the Bluetooth connection establishment request is a request sent to the first Bluetooth device after the target vehicle determines that the currently searched Bluetooth device is the first Bluetooth device; the target vehicle is used for determining that the currently searched Bluetooth device is the first Bluetooth device after determining that the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device.
In some embodiments, the method further comprises:
after the user terminal establishes communication connection with the target vehicle, sending a pairing request with a pairing certificate to the target vehicle; and acquiring indication information for indicating generation of asymmetric key data, wherein the indication information is generated after the user terminal receives a pairing success verification result sent by the target vehicle.
In some embodiments, the method further comprises:
after a user terminal sends a deletion instruction of digital vehicle key data to a target vehicle, receiving an execution result of deletion operation sent by the target vehicle, wherein the execution result of the deletion operation is a result obtained by the target vehicle deleting the public key data according to the deletion instruction;
and deleting the digital vehicle key data of the target vehicle.
The embodiment of the application also provides another vehicle control method, which is applied to a target vehicle and comprises the following steps:
after the pairing with the user terminal is successful, receiving public key data of the asymmetric key data sent by the first Bluetooth equipment; the public key data is sent by the first Bluetooth device when generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data;
after Bluetooth connection is established with the first Bluetooth device, signature data sent by the first Bluetooth device is received; the signature data is obtained by the first Bluetooth device signing preset data by using private key data of the asymmetric key data;
using the public key data to verify the signature of the signature data to obtain a signature verification result; and unlocking the target vehicle when the verification result shows that the verification passes.
In some embodiments, after pairing with the user terminal is successful, the method further comprises:
receiving the MAC address of the first Bluetooth device sent by the first Bluetooth device; determining the MAC address of the currently searched Bluetooth device, determining the currently searched Bluetooth device to be the first Bluetooth device after the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device, and sending a Bluetooth connection establishment request to the first Bluetooth device to enable the target vehicle to establish Bluetooth connection with the first Bluetooth device.
In some embodiments, after establishing a bluetooth connection with the first bluetooth device, the method further comprises:
performing a lock drop of the target vehicle upon determining that the Bluetooth connection is disconnected.
In some embodiments, the method further comprises:
after establishing communication connection with the user terminal, receiving a pairing request with a pairing certificate sent by the user terminal; when the pairing request is verified successfully, generating a pairing success verification result;
and sending a pairing success verification result to the user terminal.
In some embodiments, upon receiving the public key data, the method further comprises:
and under the condition of receiving a deletion instruction of the digital vehicle key data sent by the user terminal, deleting the public key data according to the deletion instruction to obtain an execution result of deletion operation.
The embodiment of the present application further provides a vehicle control apparatus, which is applied to a first bluetooth device of a user terminal, and the apparatus includes:
the system comprises a first processing module, a second processing module and a third processing module, wherein the first processing module is used for generating digital vehicle key data of a target vehicle after a user terminal is successfully paired with the target vehicle, the digital vehicle key data comprises asymmetric key data, and public key data of the asymmetric key data is sent to the target vehicle;
the second processing module is used for signing preset data by using private key data of the asymmetric key data after Bluetooth connection with a target vehicle is established, so as to obtain signature data; and sending the signature data to the target vehicle through the Bluetooth connection, so that the target vehicle unlocks the target vehicle according to a signature verification result indicating that signature verification passes, wherein the signature verification result is a result obtained by using the public key data to verify the signature data by the target vehicle.
An embodiment of the present application further provides a vehicle control apparatus, which is applied to a target vehicle, and the apparatus includes:
the third processing module is used for receiving public key data of the asymmetric key data sent by the first Bluetooth equipment after the first Bluetooth equipment is successfully paired with the user terminal; the public key data is sent by the first Bluetooth device when generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data;
the fourth processing module is used for receiving the signature data sent by the first Bluetooth device after Bluetooth connection is established with the first Bluetooth device; the signature data is obtained by the first Bluetooth device signing preset data by using private key data of the asymmetric key data;
the fourth processing module is further configured to use the public key data to check the signature of the signature data, so as to obtain a signature checking result; and when the verification result shows that the verification passes, unlocking the target vehicle.
The embodiment of the present application further provides a first bluetooth device, including a processor and a memory for storing a computer program capable of running on the processor; wherein the content of the first and second substances,
the processor is configured to run the computer program to execute any one of the vehicle control methods applied to the first bluetooth device.
In some embodiments, the first bluetooth device comprises a bluetooth SIM card.
The embodiment of the application further provides a user terminal, which is characterized by comprising the vehicle control device in any one of the user terminals, or comprising any one of the first bluetooth devices.
The embodiment of the application also provides an electronic device, which is applied to a target vehicle and comprises a processor and a memory for storing a computer program capable of running on the processor; wherein the processor is configured to run the computer program to perform any one of the above-described vehicle control methods applied to a target vehicle.
The embodiment of the application also provides a computer storage medium, wherein a computer program is stored on the computer storage medium, and the computer program is characterized in that when being executed by a processor, the computer program realizes any one of the vehicle control methods.
It can be seen that, in the embodiment of the application, the target vehicle receives the signature data based on the bluetooth connection, and the signature verification can be performed on the signature data according to the pre-acquired public key data, so that the unlocking of the target vehicle is automatically executed when the signature verification passes, and the bluetooth connection between the user terminal and the target vehicle can be automatically established under the condition that the user terminal is close to the target vehicle, so that the automatic unlocking of the target vehicle is realized, and the operation complexity of a user is reduced.
Drawings
FIG. 1 is a flow chart of a vehicle control method provided by an embodiment of the present application;
fig. 2 is a schematic structural diagram of a digital car key system provided in an embodiment of the present application;
fig. 3 is a schematic diagram of a pairing process between a user terminal and a target vehicle in an embodiment of the present application;
FIG. 4 is a schematic illustration of the unlocking and locking processes of a target vehicle in an embodiment of the present application;
FIG. 5 is a schematic diagram of a revocation process of digital car keys in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a vehicle control apparatus applied to a first bluetooth device according to an embodiment of the present application;
fig. 7 is a schematic configuration diagram of a vehicle control apparatus applied to a target vehicle according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a first bluetooth device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In the related technology, the digital car key represents virtual digital backup information of an entity car key, and by using the digital car key technology, an effective basis for mutual authentication between a car and a legal user can be realized based on an asymmetric key signature and signature verification mechanism.
According to different Communication modes of vehicles and keys, the Communication modes of digital vehicle keys in the related art mainly include bluetooth, mobile network and Near Field Communication (NFC). Due to the existence of network-free environments such as underground garages, bluetooth and NFC are communication modes widely adopted by digital car keys.
NFC is a new technology, and devices using NFC technology can exchange data when they are close to each other, and is integrated and evolved from non-contact Radio Frequency IDentification (RFID) and interconnection technology, and by integrating functions of an induction card reader, an induction card, and point-to-point communication on a single chip, mobile payment, electronic ticketing, door access, mobile identity recognition, anti-counterfeiting, and the like using a mobile terminal
Bluetooth is a short-distance wireless communication technology, and can realize data exchange between fixed equipment and a mobile terminal. Bluetooth prior to bluetooth 3.0 using bluetooth Basic Rate (BR) or Enhanced Data Rate (EDR) technology is generally referred to as legacy bluetooth, while bluetooth under the bluetooth 4.0 specification is referred to as Bluetooth Low Energy (BLE). The bluetooth 4.0 standard includes a conventional bluetooth module portion and a bluetooth low energy module portion. The bluetooth low energy is developed based on the traditional bluetooth and is different from the traditional module, and the most important characteristic is that the cost and the power consumption are reduced.
In the process of establishing the bluetooth connection, the bluetooth device initiating the request for establishing the bluetooth connection is defined as a Central (Central) device, and the bluetooth device accepting the request for establishing the bluetooth connection is defined as a Peripheral (Peripheral) device.
The digital car key using the NFC communication method has the following problems: 1) The non-inductive operation cannot be realized, and the user experience is poor. Specifically, when the user is unlocking the car lock, the user needs to take out the mobile phone and touch NFC sensing areas such as a car door frame and a vehicle rearview mirror to complete unlocking operation. But the user also needs to take out the cell-phone and touch NFC induction zone and just can lock the car when locking the car, experiences inconsistent with current traditional entity car key, and user's operation complexity is higher. 2) The popularization rate of the NFC mobile phone is low, the NFC mobile phone accounts for about 3 market shares, the non-NFC mobile phone accounts for about 7 shares, and only a few users can experience the digital car key in the NFC communication mode.
The digital car key using the bluetooth communication method has the following problems: the bluetooth car key is not very convenient to use, and user experience is relatively poor. Use unblanking as an example, the user must take out the cell-phone, starts car key Application (APP), and after establishing the bluetooth with the vehicle and connecting, the user need the manual car key APP of clicking unblank the button and just can accomplish the operation. Although the car key APP of some car enterprises can be started and then automatically connected with the car through Bluetooth to complete the unlocking operation, the mobile phone system still can kill the car key APP resident in the background, so that the real non-inductive operation cannot be realized.
In addition, in consideration of data security, data of digital car keys using an NFC communication mode and a bluetooth communication mode generally exist in a security module (SE) of a mobile phone, and the SE of the mobile phone may include a SIM card of the mobile phone and an embedded SE; although an Android (Android) system provides an interface for accessing the SE by the APP of a third party, the implementation or adaptation of some mobile phone manufacturers to the interface for accessing the SE is not good, so that the access of a mobile phone card is not successful; the NFC function of the IOS system does not support direct access to data in the SIM card, and only supports access to data in the equipment SE, so that a digital car key is realized in the IOS system, and a car enterprise has to perform deep cooperation with a mobile phone manufacturer.
In summary, in the related art, in the process of unlocking the vehicle by using the digital vehicle key, the operation complexity of the user is high, and a solution of the digital vehicle key which is not felt by the user cannot be realized; also, compatibility of digital car keys in the related art is not ideal.
In view of the above technical problems, the technical solutions of the embodiments of the present application are provided.
The present application will be described in further detail below with reference to the drawings and examples. It should be understood that the examples provided herein are merely illustrative of the present application and are not intended to limit the present application. In addition, the following examples are provided for the purpose of carrying out some embodiments of the present application, and not for the purpose of providing all embodiments for carrying out the present application, and the technical solutions described in the embodiments of the present application may be implemented in any combination without conflict.
An embodiment of the present application provides a vehicle control method, and fig. 1 is a flowchart of the vehicle control method provided in the embodiment of the present application, and as shown in fig. 1, the flowchart may include:
step 101: after the user terminal is successfully paired with the target vehicle, the first Bluetooth device generates digital vehicle key data of the target vehicle; the digital vehicle key data includes asymmetric key data.
In this embodiment, the user terminal may be a mobile phone using an android system or an IOS system, the first bluetooth device is a device in the user terminal, the first bluetooth device may be a device using a conventional bluetooth module or a BLE module, and the first bluetooth device may be a device using a conventional bluetooth module or a BLE module; the target vehicle comprises a vehicle-mounted Bluetooth module which is in communication connection with the first Bluetooth device, and the vehicle-mounted Bluetooth module in the target vehicle can be recorded as a second Bluetooth device.
In one example, the first bluetooth device may be a bluetooth SIM card. The Bluetooth SIM card is obtained by adding a BLE communication module on the basis of a traditional SIM card, not only has all functions of the traditional SIM card, but also can be connected with an external Bluetooth module (such as a mobile phone Bluetooth module and a vehicle-mounted Bluetooth module) through a Bluetooth communication interface to carry out data transmission. The Bluetooth SIM card integrates a Bluetooth chip and can establish Bluetooth connection with a mobile phone terminal or a vehicle.
In the embodiment of the application, the second bluetooth device in the target vehicle has a bluetooth signal reading capability, and the second bluetooth device can perform bluetooth connection with the first bluetooth device of the user terminal and perform data communication with the first bluetooth device of the user terminal.
In practical application, the user terminal can send a pairing request with a pairing certificate to a target vehicle after establishing Bluetooth connection with the target vehicle; after receiving the pairing request, the target vehicle can check the pairing state according to the pairing certificate, and when determining that the target vehicle is paired with any Bluetooth device, the pairing process is terminated; terminating the pairing process when the pairing certificate is determined to be wrong; when the pairing certificate is determined to be correct, a pairing success verification result can be sent to the user terminal; after receiving the successful pairing check result, the user terminal generates indication information indicating that asymmetric key data is generated, and the first bluetooth device can generate asymmetric key data according to the indication information, namely digital vehicle key data of the target vehicle.
For example, the pairing credential may be a manufacturer-defined credential for the target vehicle that serves to identify the holder of the user terminal as the owner of the target vehicle, e.g., the pairing credential may be an Identity Document (ID) or other identification of the target vehicle. In practical application, after the user purchases the target vehicle, the manufacturer of the target vehicle may increase the corresponding pairing certificate to the owner of the target vehicle, so that the owner of the target vehicle may use the pairing certificate to pair the user terminal and the target vehicle.
In the embodiment of the application, the asymmetric key data comprises public key data and private key data, and the public key data and the private key data are a pair of data.
Step 102: the first bluetooth device transmits public key data of the asymmetric key data to the target vehicle.
Step 103: the target vehicle receives the public key data sent by the first bluetooth device.
Step 104: after the first Bluetooth device establishes Bluetooth connection with a target vehicle, signing preset data by using private key data of asymmetric key data to obtain signed data; and transmitting the signature data to a target vehicle through the Bluetooth connection.
In practical application, the target vehicle may be used as a central device to discover peripheral devices around, and when the peripheral device discovered by the target vehicle is a first bluetooth device, a bluetooth connection is established with the first bluetooth device.
The preset data may be, for example, a random number, a timestamp, or some random combination data, and the content of the preset data is not limited in the embodiments of the present application.
Step 105: the target vehicle receives signature data sent by the first Bluetooth device; and verifying the signature of the signature data by using the public key data to obtain a signature verification result.
For example, when signature data is verified by using public key data, a signature verification result indicating that signature verification fails may be obtained, or a signature verification result indicating that signature verification passes may be obtained.
Step 106: and the target vehicle performs unlocking of the target vehicle when the verification result shows that the verification passes.
In practical applications, the user terminal and/or the target vehicle may include a Processor, and the Processor may be at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Central Processing Unit (CPU), a controller, a microcontroller, and a microprocessor.
It can be seen that, in the embodiment of the application, the target vehicle receives the signature data based on the bluetooth connection, and the signature verification can be performed on the signature data according to the pre-acquired public key data, so that the unlocking of the target vehicle is automatically executed when the signature verification passes. Moreover, the signature verification is carried out on the signature data, so that the safety of unlocking the vehicle is improved.
Further, the vehicle control method according to the embodiment of the present application may be applicable to a user terminal that does not support a machine card access and a user terminal that does not support an NFC function, that is, the vehicle control method according to the embodiment of the present application has high compatibility.
Furthermore, in the embodiment of the application, the Bluetooth connection can be directly established between the target vehicle and the first Bluetooth device, and the Bluetooth connection does not need to be established through the mobile phone APP, so that the problem that the unlocking of the vehicle cannot be realized due to the fact that the mobile phone APP at the background is killed by a mobile phone system can be avoided.
In some embodiments, after the pairing of the user terminal and the target vehicle is successful, the process of establishing the bluetooth connection between the first bluetooth device and the target vehicle may include:
step A1: the first bluetooth device transmits a Media Access Control (MAC) address of the first bluetooth device to the target vehicle.
Step A2: the target vehicle receives the MAC address sent by the first bluetooth device.
For example, the first bluetooth device may transmit the public key data of the asymmetric key data and the MAC address of the first bluetooth device together to the target vehicle, or the first bluetooth device may sequentially transmit the public key data of the asymmetric key data and the MAC address of the first bluetooth device to the target vehicle.
Step A3: the target vehicle determines the MAC address of the currently searched bluetooth device.
In practical applications, the target vehicle may be used as a central device to search for peripheral bluetooth devices.
Step A4: after determining that the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device, the target vehicle determines that the currently searched Bluetooth device is the first Bluetooth device, and sends a Bluetooth connection establishment request to the first Bluetooth device
In the embodiment of the application, the target vehicle can compare the MAC address of the currently searched Bluetooth device with the MAC address of the first Bluetooth device, and when the MAC address of the currently searched Bluetooth device is different from the MAC address of the first Bluetooth device, the first Bluetooth device is determined not to be searched; when the MAC address of the currently searched bluetooth device is the same as the MAC address of the first bluetooth device, it may be determined that the first bluetooth device is searched.
Step A5: and the first Bluetooth device establishes Bluetooth connection with the target vehicle after receiving a Bluetooth connection establishment request sent by the target vehicle.
Therefore, the first Bluetooth device can be searched by comparing the MAC address of the currently searched Bluetooth device with the predetermined MAC address of the first Bluetooth device, and the Bluetooth connection between the first Bluetooth device and the target vehicle can be accurately established.
In some embodiments, after establishing the bluetooth connection with the first bluetooth device, the target vehicle may perform a lock down of the target vehicle upon determining that the bluetooth connection is broken.
Exemplarily, when the distance between the first Bluetooth device and the target vehicle exceeds the maximum sensing distance of Bluetooth connection, the disconnection of the Bluetooth connection is confirmed, and at this time, the target vehicle can automatically perform lock falling, so that the safety of the vehicle is improved.
For example, when the distance between the target vehicle and the first bluetooth device exceeds the maximum sensing distance of bluetooth connection, determining that the bluetooth connection is disconnected, determining the position of the user terminal before the bluetooth connection is disconnected, and if the user terminal is in the target vehicle before the bluetooth connection is disconnected, not performing lock-down of the target vehicle; and if the user terminal is outside the target vehicle before the Bluetooth connection is disconnected, executing automatic locking of the target vehicle.
It can be seen that this application embodiment can be when the bluetooth connection disconnection, the lock that falls of target vehicle is carried out automatically, because this application embodiment realizes the lock that falls of target vehicle on the basis that need not the user and click the key APP lock that falls button, consequently, has reduced user's operation complexity, has realized the operation that the user does not feel that the vehicle falls to lock.
Furthermore, in the embodiment of the application, when the target vehicle is disconnected from the Bluetooth of the first Bluetooth device, the target vehicle can be automatically locked, and the Bluetooth connection does not need to be established through the mobile phone APP, so that the problem that the vehicle cannot be locked due to the fact that the mobile phone APP at the background is killed by a mobile phone system can be avoided.
In some embodiments, the user terminal sends a deletion instruction of the digital car key data to the target vehicle; under the condition that the target vehicle receives a deletion instruction of the digital vehicle key data sent by the user terminal, deleting the public key data according to the deletion instruction to obtain an execution result of deletion operation; the target vehicle sends an execution result of the deletion operation to the first Bluetooth device; and the first Bluetooth device deletes the digital vehicle key data of the target vehicle after receiving the execution result of the deletion operation.
In practical application, a user can input a deletion instruction of digital vehicle key data to a user terminal according to actual requirements under the condition that the user does not need to unlock or lock the vehicle based on the digital vehicle key.
It can be seen that, the embodiment of the application can delete corresponding digital car key data in the target car and the first bluetooth device respectively according to actual requirements.
The following further describes a vehicle control method according to an embodiment of the present application with reference to the drawings.
Fig. 2 is a schematic structural diagram of a digital vehicle key system according to an embodiment of the present disclosure, and as shown in fig. 2, the digital vehicle key system may include a user terminal, a target vehicle, a vehicle key service platform, and a vehicle service platform.
Referring to fig. 2, the user terminal is provided with a digital car key APP, a mobile phone bluetooth module and a bluetooth SIM card, and the digital car key APP can communicate with the bluetooth SIM card through the mobile phone bluetooth module; the user terminal serves as a carrier of the digital car key APP, provides a car key service visual operation interface for a car owner of a target vehicle, and achieves operations such as opening and deleting of the digital car key.
The bluetooth SIM card is provided with a bluetooth communication module for communicating with a bluetooth module of the mobile phone, and a car key APPLET (APPLET) and related data can be stored in the bluetooth SIM card, and illustratively, the car key APPLET is stored in a SE of the bluetooth SIM card.
The vehicle key service platform is a service processing background of the digital vehicle key APP, and the vehicle key service platform is in butt joint with the vehicle service platform, so that the information synchronization function of the vehicle key APP and a vehicle can be realized.
And the vehicle enterprise service platform is used for managing target vehicle information, owner information of the target vehicle and the like, and can be communicated with the target vehicle through a private link.
Based on the digital car key system shown in fig. 2, the following exemplarily describes a process of pairing the user terminal with the target vehicle.
Referring to fig. 3, the process of pairing the user terminal with the target vehicle may include:
step 31: the Bluetooth SIM card is connected with the digital car key APP.
In the embodiment of the application, the mobile phone Bluetooth module of the user terminal can be used as the central equipment to discover the Bluetooth SIM card as the peripheral equipment, and the mobile phone Bluetooth module can establish Bluetooth connection with the Bluetooth SIM card, so that the connection between the Bluetooth SIM card and the digital car key APP can be established by combining the communication connection between the digital car key APP and the mobile phone Bluetooth module.
Step 32: the digital car key APP is connected with the target vehicle.
In the embodiment of the application, the mobile phone Bluetooth module of the user terminal can be used as the central equipment to discover the target vehicle as the peripheral equipment, and the mobile phone Bluetooth module establishes Bluetooth connection with the vehicle-mounted Bluetooth module of the target vehicle, so that the digital vehicle key APP can be established to be connected with the target vehicle by combining the communication connection of the digital vehicle key APP and the mobile phone Bluetooth module.
Step 33: the digital car key APP sends a pairing request with a pairing credential to the target vehicle.
Step 34: and the target vehicle verifies the pairing state according to the pairing certificate.
The implementation of this step has already been explained in the foregoing description, and is not described here again.
Step 35: and the target vehicle sends a pairing success verification result to the digital vehicle key APP.
In the embodiment of the application, the target vehicle can send the successful pairing check result to the digital vehicle key APP of the user terminal when the pairing certificate is determined to be correct.
Step 36: and the digital car key APP sends indication information to the Bluetooth SIM card.
In an embodiment of the present application, the instruction information is instruction information for generating asymmetric key data.
Step 37: the vehicle key APPLET generates digital vehicle key data of the target vehicle.
Step 38: and the vehicle key APPLET sends the public key data and the MAC address of the Bluetooth SIM card to the digital vehicle key APP.
Step 39: and the digital car key APP sends the public key data and the MAC address of the Bluetooth SIM card to the target car.
Step 310: the target vehicle stores the public key data and the MAC address of the Bluetooth SIM card, and is switched from the peripheral equipment to the central equipment.
Step 311: and the target vehicle sends a pairing result to the digital vehicle key APP, and the user terminal and the target vehicle pairing process is finished.
After the user terminal is successfully paired with the target vehicle, the following exemplary steps are described to unlock and unlock the target vehicle.
Referring to fig. 4, the unlocking and locking procedure of the target vehicle may include:
step 41: the target vehicle searches for a bluetooth device as a peripheral device.
Step 42: and the target vehicle establishes Bluetooth connection with the Bluetooth SIM card.
Step 43: and the target vehicle sends preset data to the Bluetooth SIM card.
Step 44: the Bluetooth SIM card signs the preset data by using the private key data to obtain signature data.
Step 45: and the Bluetooth SIM card sends the signature data to the target vehicle.
Step 46: the target vehicle checks the signature data by using the public key data, and unlocking the target vehicle is performed when the check passes.
Step 47: the status of the bluetooth connection is determined.
And 48: and when the Bluetooth connection is disconnected, locking the target vehicle.
The following exemplarily describes the revocation process of the digital car key.
Referring to fig. 5, the revocation procedure of the digital car key may include:
step 51: the Bluetooth SIM card is connected with the digital car key APP.
The implementation of step 51 is the same as step 31, and is not described herein again.
Step 52: and the digital car key APP sends a digital car key data deletion instruction to the car key service platform.
Step 53: and the vehicle key service platform sends a digital vehicle key data deletion instruction to the vehicle service platform.
Step 54: and the vehicle business platform sends a digital vehicle key data deletion instruction to the target vehicle.
Step 55: and deleting the public key data by the target vehicle to obtain the execution result of the deletion operation.
In the embodiment of the application, the target vehicle can be switched from the central equipment to the peripheral equipment after the public key data is deleted.
Step 56: and the target vehicle sends an execution result to the vehicle business platform.
And step 57: and the vehicle service platform sends an execution result to the vehicle key service platform.
Step 58: and the vehicle key service platform sends an execution result to the digital vehicle key APP.
Step 59: and the digital car key APP sends a deletion instruction of the digital car key data to the Bluetooth SIM card.
Step 510: and the Bluetooth SIM card deletes the digital car key data.
Step 511: and the Bluetooth SIM card sends a deletion completion message to the digital car key APP to indicate that the digital car key is deleted completely.
Based on the foregoing, a vehicle control method executed in a first bluetooth device of a user terminal may include:
after the user terminal is successfully paired with a target vehicle, generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data, and sending public key data of the asymmetric key data to the target vehicle;
after Bluetooth connection with a target vehicle is established, signing preset data by using private key data of the asymmetric key data to obtain signed data; and sending the signature data to the target vehicle through the Bluetooth connection, so that the target vehicle unlocks the target vehicle according to a signature verification result indicating that signature verification passes, wherein the signature verification result is a result obtained by using the public key data to verify the signature data by the target vehicle.
In some embodiments, after the pairing of the user terminal and the target vehicle is successful, the method further comprises:
sending a Media Access Control (MAC) address of the first Bluetooth device to the target vehicle; after receiving a Bluetooth connection establishment request sent by the target vehicle, establishing Bluetooth connection with the target vehicle; the Bluetooth connection establishment request is a request sent to the first Bluetooth device after the target vehicle determines that the currently searched Bluetooth device is the first Bluetooth device; the target vehicle is used for determining that the currently searched Bluetooth device is the first Bluetooth device after determining that the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device.
In some embodiments, the method further comprises:
after the user terminal establishes communication connection with the target vehicle, sending a pairing request with a pairing certificate to the target vehicle; and acquiring indication information for indicating generation of asymmetric key data, wherein the indication information is generated after the user terminal receives a pairing success verification result sent by the target vehicle.
In some embodiments, the method further comprises:
after a user terminal sends a deletion instruction of digital vehicle key data to a target vehicle, receiving an execution result of deletion operation sent by the target vehicle, wherein the execution result of the deletion operation is a result obtained by the target vehicle deleting the public key data according to the deletion instruction;
and deleting the digital vehicle key data of the target vehicle.
Based on the foregoing, a vehicle control method executed in a target vehicle may include:
after the pairing with the user terminal is successful, receiving public key data of the asymmetric key data sent by the first Bluetooth equipment; the public key data is sent by the first Bluetooth device when generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data;
after Bluetooth connection is established with the first Bluetooth device, signature data sent by the first Bluetooth device is received; the signature data is obtained by the first Bluetooth device signing preset data by using private key data of the asymmetric key data;
using the public key data to verify the signature of the signature data to obtain a signature verification result; and when the verification result shows that the verification passes, unlocking the target vehicle.
In some embodiments, after pairing successfully with the user terminal, the method further comprises:
receiving the MAC address of the first Bluetooth device sent by the first Bluetooth device; determining the MAC address of the currently searched Bluetooth device, determining the currently searched Bluetooth device to be the first Bluetooth device after the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device, and sending a Bluetooth connection establishment request to the first Bluetooth device to enable the target vehicle to establish Bluetooth connection with the first Bluetooth device.
In some embodiments, after establishing a bluetooth connection with the first bluetooth device, the method further comprises:
performing a lock drop of the target vehicle upon determining that the Bluetooth connection is disconnected.
In some embodiments, the method further comprises:
after establishing communication connection with the user terminal, receiving a pairing request with a pairing certificate sent by the user terminal; when the pairing request is verified successfully, generating a pairing success verification result;
and sending a pairing success verification result to the user terminal.
In some embodiments, upon receiving the public key data, the method further comprises:
and under the condition of receiving a deletion instruction of the digital vehicle key data sent by the user terminal, deleting the public key data according to the deletion instruction to obtain an execution result of deletion operation.
It will be understood by those of skill in the art that in the above method of the present embodiment, the order of writing the steps does not imply a strict order of execution and does not impose any limitations on the implementation, as the order of execution of the steps should be determined by their function and possibly inherent logic.
On the basis of the vehicle control method applied to the first bluetooth device provided by the foregoing embodiment, the embodiment of the present application provides a vehicle control apparatus applied to the first bluetooth device.
Fig. 6 is a schematic structural diagram of a vehicle control apparatus applied to a first bluetooth device according to an embodiment of the present application, and as shown in fig. 6, the apparatus may include:
the first processing module 601 is configured to generate digital vehicle key data of a target vehicle after a user terminal is successfully paired with the target vehicle, where the digital vehicle key data includes asymmetric key data, and send public key data of the asymmetric key data to the target vehicle;
the second processing module 602 is configured to sign preset data by using private key data of the asymmetric key data after establishing a bluetooth connection with a target vehicle, so as to obtain signature data; and sending the signature data to the target vehicle through the Bluetooth connection, so that the target vehicle unlocks the target vehicle according to a signature verification result indicating that signature verification passes, wherein the signature verification result is a result obtained by using the public key data to verify the signature data by the target vehicle.
In some embodiments, the second processing module 602 is further configured to, after the user terminal is successfully paired with the target vehicle, further include:
sending a Media Access Control (MAC) address of the first Bluetooth device to the target vehicle; after receiving a Bluetooth connection establishment request sent by the target vehicle, establishing Bluetooth connection with the target vehicle; the Bluetooth connection establishment request is a request sent to the first Bluetooth device after the target vehicle determines that the currently searched Bluetooth device is the first Bluetooth device; the target vehicle is used for determining that the currently searched Bluetooth device is the first Bluetooth device after determining that the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device.
In some embodiments, the first processing module 601 is further configured to:
after the user terminal establishes communication connection with the target vehicle, sending a pairing request with a pairing certificate to the target vehicle; and acquiring indication information for indicating generation of asymmetric key data, wherein the indication information is generated after the user terminal receives a pairing success verification result sent by the target vehicle.
In some embodiments, the first processing module 601 is further configured to:
after a user terminal sends a deletion instruction of digital vehicle key data to a target vehicle, receiving an execution result of deletion operation sent by the target vehicle, wherein the execution result of the deletion operation is a result obtained by the target vehicle deleting the public key data according to the deletion instruction;
and deleting the digital vehicle key data of the target vehicle.
In practical applications, the first processing module 601 and the second processing module 602 may be implemented by a processor in a user terminal, and the processor may be at least one of an ASIC, a DSP, a DSPD, a PLD, an FPGA, a CPU, a controller, a microcontroller, and a microprocessor.
On the basis of the vehicle control method applied to the target vehicle proposed by the foregoing embodiment, the embodiment of the present application proposes a vehicle control device applied to the target vehicle.
Fig. 7 is a schematic structural diagram of a vehicle control device applied to a target vehicle according to an embodiment of the present application, and as shown in fig. 7, the device may include:
a third processing module 701, configured to receive public key data of asymmetric key data sent by the first bluetooth device after pairing with the user terminal is successful; the public key data is sent by the first Bluetooth device when generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data;
a fourth processing module 701, configured to receive signature data sent by the first bluetooth device after establishing a bluetooth connection with the first bluetooth device; the signature data is obtained by the first Bluetooth device signing preset data by using private key data of the asymmetric key data;
the fourth processing module 702 is further configured to use the public key data to check the signature of the signature data, so as to obtain a result of checking the signature; and when the verification result shows that the verification passes, unlocking the target vehicle.
In some embodiments, the fourth processing module 702 is further configured to, after pairing with the user terminal is successful, perform the following steps:
receiving the MAC address of the first Bluetooth device sent by the first Bluetooth device; determining the MAC address of the currently searched Bluetooth device, determining that the currently searched Bluetooth device is the first Bluetooth device after the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device, and sending a Bluetooth connection establishment request to the first Bluetooth device to enable the target vehicle to establish Bluetooth connection with the first Bluetooth device.
In some embodiments, the fourth processing module 701 is further configured to, after establishing a bluetooth connection with the first bluetooth device, perform lock down of the target vehicle when it is determined that the bluetooth connection is disconnected.
In some embodiments, the third processing module 701 is further configured to:
after establishing communication connection with the user terminal, receiving a pairing request with a pairing certificate sent by the user terminal; when the pairing request is verified successfully, generating a pairing successful verification result;
and sending a pairing success verification result to the user terminal.
In some embodiments, the third processing module 701 is further configured to:
and after the public key data is received, under the condition of receiving a deleting instruction of the digital vehicle key data sent by the user terminal, deleting the public key data according to the deleting instruction to obtain an execution result of deleting operation.
In practical applications, the first processing module 601 and the second processing module 602 may be implemented by a processor in the target vehicle, and the processor may be at least one of an ASIC, a DSP, a DSPD, a PLD, an FPGA, a CPU, a controller, a microcontroller, and a microprocessor.
In addition, each functional module in this embodiment may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware or a form of a software functional module.
Based on the understanding that the technical solution of the present embodiment essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a Processor (Processor) to execute all or part of the steps of the method of the present embodiment. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Specifically, the computer program instructions corresponding to a vehicle control method in the present embodiment may be stored on a storage medium such as an optical disc, a hard disc, a usb disk, or the like, and when the computer program instructions corresponding to a vehicle control method in the storage medium are read or executed by an electronic device, any one of the vehicle control methods of the foregoing embodiments is implemented.
Based on the same technical concept of the foregoing embodiment, referring to fig. 8, it shows that the first bluetooth device 80 provided by the embodiment of the present application may include: a first memory 801 and a first processor 802; wherein the content of the first and second substances,
the first memory 801 for storing computer programs and data;
the first processor 802 is configured to execute the computer program stored in the memory to implement any one of the vehicle control methods applied to the first bluetooth device of the foregoing embodiments.
In practical applications, the first memory 801 may be a volatile memory (RAM); or a non-volatile memory (non-volatile memory) such as a ROM, a flash memory (flash memory), a Hard Disk Drive (HDD) or a Solid-State Drive (SSD); or a combination of the above types of memories and provides instructions and data to the first processor 802.
The first processor 802 may be at least one of an ASIC, a DSP, a DSPD, a PLD, an FPGA, a CPU, a controller, a microcontroller, and a microprocessor. It is understood that the electronic devices for implementing the above processor functions may be other devices, and the embodiments of the present application are not limited in particular.
In some embodiments, the first bluetooth device may include a bluetooth SIM card.
The embodiment of the present application further provides a user terminal, where the user terminal may include the vehicle control device shown in fig. 6, or include the first bluetooth device.
Based on the same technical concept of the foregoing embodiment, referring to fig. 9, it shows that the electronic device 90 provided in the embodiment of the present application may include: a second memory 901 and a second processor 902; wherein the content of the first and second substances,
the second memory 901 for storing computer programs and data;
the second processor 902 is configured to execute the computer program stored in the memory to implement any one of the vehicle control methods applied to the target vehicle of the foregoing embodiments.
In practical applications, the second memory 901 may be a volatile memory, such as a RAM; or a nonvolatile memory such as a ROM, a flash memory, an HDD or an SSD; or a combination of the above types of memories and provides instructions and data to the second processor 902.
The second processor 902 may be at least one of ASIC, DSP, DSPD, PLD, FPGA, CPU, controller, microcontroller, and microprocessor. It is understood that the electronic device for implementing the above processor function may be other electronic devices, and the embodiments of the present application are not limited in particular.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present application may be used to execute the method described in the above method embodiments, and specific implementation thereof may refer to the description of the above method embodiments, and for brevity, will not be described again here.
The foregoing description of the various embodiments is intended to highlight various differences between the embodiments, and the same or similar parts may be referred to each other, which are not repeated herein for brevity
The methods disclosed in the method embodiments provided by the present application can be combined arbitrarily without conflict to obtain new method embodiments.
The features disclosed in the various product embodiments provided in the present application may be combined arbitrarily without conflict, to arrive at new product embodiments.
The features disclosed in the method or apparatus embodiments provided in the present application may be combined arbitrarily, without conflict, to arrive at new method embodiments or apparatus embodiments.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present invention or portions thereof contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the methods according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (16)

1. A vehicle control method is applied to a first Bluetooth device of a user terminal, and comprises the following steps:
after the user terminal is successfully paired with a target vehicle, generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data, and sending public key data of the asymmetric key data to the target vehicle;
after Bluetooth connection with a target vehicle is established, signing preset data by using private key data of the asymmetric key data to obtain signed data; and sending the signature data to the target vehicle through the Bluetooth connection, so that the target vehicle unlocks the target vehicle according to a signature verification result representing that signature verification passes, wherein the signature verification result is obtained by verifying the signature of the signature data by using the public key data by the target vehicle.
2. The method of claim 1, wherein after the user terminal successfully pairs with the target vehicle, the method further comprises:
sending a Media Access Control (MAC) address of the first Bluetooth device to the target vehicle; after receiving a Bluetooth connection establishment request sent by the target vehicle, establishing Bluetooth connection with the target vehicle; the Bluetooth connection establishment request is a request sent to the first Bluetooth device after the target vehicle determines that the currently searched Bluetooth device is the first Bluetooth device; the target vehicle is used for determining that the currently searched Bluetooth device is the first Bluetooth device after determining that the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device.
3. The method of claim 1, further comprising:
after the user terminal establishes communication connection with the target vehicle, sending a pairing request with a pairing certificate to the target vehicle; and acquiring indication information for indicating generation of asymmetric key data, wherein the indication information is generated after the user terminal receives a pairing success verification result sent by the target vehicle.
4. The method of claim 1, further comprising:
after a user terminal sends a deletion instruction of digital vehicle key data to a target vehicle, receiving an execution result of deletion operation sent by the target vehicle, wherein the execution result of the deletion operation is a result obtained by the target vehicle deleting the public key data according to the deletion instruction;
and deleting the digital vehicle key data of the target vehicle.
5. A vehicle control method, applied to a target vehicle, comprising:
after the pairing with the user terminal is successful, public key data of the asymmetric key data sent by the first Bluetooth device is received; the public key data is sent by the first Bluetooth device when generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data;
after Bluetooth connection is established with the first Bluetooth device, signature data sent by the first Bluetooth device is received; the signature data is obtained by the first Bluetooth device signing preset data by using private key data of the asymmetric key data;
using the public key data to check the signature of the signature data to obtain a signature checking result; and when the verification result shows that the verification passes, unlocking the target vehicle.
6. The method according to claim 5, wherein after pairing with the user terminal is successful, the method further comprises:
receiving the MAC address of the first Bluetooth device sent by the first Bluetooth device; determining the MAC address of the currently searched Bluetooth device, determining that the currently searched Bluetooth device is the first Bluetooth device after the MAC address of the currently searched Bluetooth device is the same as the MAC address of the first Bluetooth device, and sending a Bluetooth connection establishment request to the first Bluetooth device to enable the target vehicle to establish Bluetooth connection with the first Bluetooth device.
7. The method of claim 5, wherein after establishing the Bluetooth connection with the first Bluetooth device, the method further comprises:
performing a lock drop of the target vehicle upon determining that the Bluetooth connection is disconnected.
8. The method of claim 5, further comprising:
after establishing communication connection with the user terminal, receiving a pairing request with a pairing certificate sent by the user terminal; when the pairing request is verified successfully, generating a pairing successful verification result;
and sending a pairing success verification result to the user terminal.
9. The method according to any of claims 5 to 8, wherein upon receiving the public key data, the method further comprises:
and under the condition of receiving a deletion instruction of the digital vehicle key data sent by the user terminal, deleting the public key data according to the deletion instruction to obtain an execution result of deletion operation.
10. A vehicle control apparatus applied to a first bluetooth device of a user terminal, the apparatus comprising:
the system comprises a first processing module, a second processing module and a third processing module, wherein the first processing module is used for generating digital vehicle key data of a target vehicle after a user terminal is successfully paired with the target vehicle, the digital vehicle key data comprises asymmetric key data, and public key data of the asymmetric key data is sent to the target vehicle;
the second processing module is used for signing preset data by using private key data of the asymmetric key data after Bluetooth connection with a target vehicle is established, so as to obtain signature data; and sending the signature data to the target vehicle through the Bluetooth connection, so that the target vehicle unlocks the target vehicle according to a signature verification result indicating that signature verification passes, wherein the signature verification result is a result obtained by using the public key data to verify the signature data by the target vehicle.
11. A vehicle control apparatus, characterized by being applied to a target vehicle, the apparatus comprising:
the third processing module is used for receiving the public key data of the asymmetric key data sent by the first Bluetooth equipment after the pairing with the user terminal is successful; the public key data is sent by the first Bluetooth device when generating digital vehicle key data of the target vehicle, wherein the digital vehicle key data comprises asymmetric key data;
the fourth processing module is used for receiving the signature data sent by the first Bluetooth device after Bluetooth connection is established with the first Bluetooth device; the signature data is obtained by the first Bluetooth device signing preset data by using private key data of the asymmetric key data;
the fourth processing module is further configured to use the public key data to check the signature of the signature data, so as to obtain a signature checking result; and unlocking the target vehicle when the verification result shows that the verification passes.
12. A first bluetooth device comprising a processor and a memory for storing a computer program operable on the processor; wherein, the first and the second end of the pipe are connected with each other,
the processor is configured to run the computer program to execute the vehicle control method according to any one of claims 1 to 4.
13. The first bluetooth device of claim 12, wherein the first bluetooth device comprises a bluetooth Subscriber Identity Module (SIM) card.
14. A user terminal, characterized in that it comprises a vehicle control device according to claim 10, or comprises a first bluetooth arrangement according to any one of claims 12 to 13.
15. An electronic device for use in a target vehicle, the electronic device comprising a processor and a memory for storing a computer program operable on the processor; wherein the content of the first and second substances,
the processor is configured to run the computer program to execute the vehicle control method according to any one of claims 5 to 9.
16. A computer storage medium on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the vehicle control method according to any one of claims 1 to 9.
CN202110938416.8A 2021-08-16 2021-08-16 Vehicle control method, device, equipment, terminal and medium Pending CN115705762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110938416.8A CN115705762A (en) 2021-08-16 2021-08-16 Vehicle control method, device, equipment, terminal and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110938416.8A CN115705762A (en) 2021-08-16 2021-08-16 Vehicle control method, device, equipment, terminal and medium

Publications (1)

Publication Number Publication Date
CN115705762A true CN115705762A (en) 2023-02-17

Family

ID=85181255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110938416.8A Pending CN115705762A (en) 2021-08-16 2021-08-16 Vehicle control method, device, equipment, terminal and medium

Country Status (1)

Country Link
CN (1) CN115705762A (en)

Similar Documents

Publication Publication Date Title
CN107948321B (en) Remote authorization method and system for vehicle
KR101514754B1 (en) System and method for provisioning over the air of confidential information on mobile communicative devices with non-uicc secure elements
CN111918243B (en) Digital vehicle key management method and device, vehicle and storage medium
CN106790070A (en) Electronic ID card identification service system based on authentication device
CN102869014A (en) Terminal and data communication method
CN104301110A (en) Authentication method, authentication device and system applied to intelligent terminal
CN104363589A (en) Identity authentication method, device and terminal
KR101926020B1 (en) System for Operating a Payment by using Dynamic Determined Authentication Number
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
CN109496443B (en) Mobile authentication method and system therefor
CN109379388B (en) Identity recognition method, terminal and wearable device
CN114764956B (en) Control method and device for vehicle and readable storage medium
JP2010033193A (en) Authentication system and authentication server device
CN106228654A (en) A kind of method of user account binding smart lock
AU2011350196A1 (en) System and method for secure containment of sensitive financial information stored in a mobile communication terminal
CN104680371A (en) Card-free transaction processing method and system
US20160366137A1 (en) Installation of a secure-element-related service application in a secure element in a communication device, system and telecommunications
CN104469736A (en) Data processing method, server and terminal
KR101417025B1 (en) Method for removable element authentication in an embedded system
KR101807645B1 (en) Method and system for appling usim certificate to online infrastructure
EP2175674B1 (en) Method and system for paring devices
KR101294805B1 (en) 2-channel authentication method and system based on authentication application
JP5178267B2 (en) IC card and control method of application program used for IC card
CN115705762A (en) Vehicle control method, device, equipment, terminal and medium
CN105704705A (en) Method for switching terminals with shared eSIM information, terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination