CN116366759A - Terminal device and data processing method of terminal device - Google Patents

Terminal device and data processing method of terminal device Download PDF

Info

Publication number
CN116366759A
CN116366759A CN202310316374.3A CN202310316374A CN116366759A CN 116366759 A CN116366759 A CN 116366759A CN 202310316374 A CN202310316374 A CN 202310316374A CN 116366759 A CN116366759 A CN 116366759A
Authority
CN
China
Prior art keywords
key
vehicle
digital
terminal device
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310316374.3A
Other languages
Chinese (zh)
Other versions
CN116366759B (en
Inventor
孙长宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Automobile Technology Co Ltd
Original Assignee
Xiaomi Automobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Automobile Technology Co Ltd filed Critical Xiaomi Automobile Technology Co Ltd
Priority to CN202310316374.3A priority Critical patent/CN116366759B/en
Publication of CN116366759A publication Critical patent/CN116366759A/en
Application granted granted Critical
Publication of CN116366759B publication Critical patent/CN116366759B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/724092Interfacing with an external cover providing additional functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/724098Interfacing with an on-board device of a vehicle

Abstract

The present disclosure relates to a terminal device and a data processing method of the terminal device, the terminal device including a communication apparatus configured to detect whether a native system of the terminal device includes a component for adapting a public protocol in response to receiving a sharing request of a digital car key for a target vehicle; and under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key. By the mode, the public protocol can be applied to various terminal equipment, so that the application range of the public protocol is improved. And the terminal equipment does not need to be configured with components for realizing the digital car key based on the private protocol, so that the deployment cost of the digital car key is reduced.

Description

Terminal device and data processing method of terminal device
Technical Field
The disclosure relates to the technical field of terminals, and in particular relates to a terminal device and a data processing method of the terminal device.
Background
The terminal device as a car key is a popular technology in recent years, and this function is also called a digital car key. Unlike the conventional physical car key, the digital car key can realize the functions of opening a car door, starting a car and the like by integrating the car key function into the mobile terminal device. Currently, some vehicle manufacturers and mobile terminal manufacturers have jointly developed solutions for digital car keys. However, these solutions have low applicability in some scenarios and cannot be widely used. At the same time, the configuration costs of these solutions are also high.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides a terminal device and a data processing method of the terminal device.
According to a first aspect of embodiments of the present disclosure, there is provided a terminal device, comprising communication means,
the communication device is configured to detect, in response to receiving a sharing request of a digital car key for a target vehicle, whether a native system of the terminal device includes a component for adapting a public protocol including a protocol for implementing the digital car key; and under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
Optionally, the communication device includes:
a digital key module capable of communicating with the vehicle server and configured to implement a function of a vehicle vendor application specified in the public protocol;
the local application module can be communicated with the terminal equipment server and is configured to realize the functions of terminal equipment manufacturer application specified in the public protocol;
a digital key frame module configured to implement the functions of the digital key frame specified in the public protocol;
a key management module configured to implement the functions of the digital key program specified in the public agreement.
Optionally, the communication device includes an encrypted whitebox module configured to store digital car key data.
Optionally, the local application module is configured to communicate with the terminal device server based on a terminal device service module in the vehicle server.
Optionally, the public protocol is a public protocol based on key authentication, and the communication device is configured to communicate with the vehicle server according to the public protocol in response to receiving a key opening request, so as to complete the opening step of the digital vehicle key and obtain the digital vehicle key.
Optionally, the public protocol is an ICCE protocol.
Optionally, the terminal device is configured to perform communication with the vehicle based on the public protocol through the communication device and the digital vehicle key, so as to establish and obtain a secure channel, and send a target control instruction to the vehicle through the secure channel, where the target control instruction is used to control the vehicle to execute a target action.
According to a second aspect of embodiments of the present disclosure, there is provided a data processing method of a terminal device, applied to any one of the above first aspects, the method including:
in response to receiving a sharing request of a digital car key for a target vehicle, detecting whether a native system of the terminal device comprises a component for adapting a public protocol, the public protocol comprising a protocol for implementing the digital car key;
and under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
Optionally, the public protocol is a public protocol based on key authentication, and the method includes:
and in response to receiving the key opening request, communicating with the vehicle server according to the public protocol to complete the opening step of the digital vehicle key, thereby obtaining the digital vehicle key.
Optionally, the method comprises:
the communication device and the digital car key are used for carrying out communication based on the public protocol with the vehicle so as to establish a secure channel;
and sending a target control instruction to the vehicle through the safety channel, wherein the target control instruction is used for controlling the vehicle to execute a target action.
In the above technical solution, a communication device is provided in a terminal device, where the communication device may detect, in response to receiving a sharing request for a digital car key of a target vehicle, whether a native system of the terminal device includes a component for adapting a public protocol, where the public protocol includes a protocol for implementing the digital car key. And under the condition that at least one component is missing in the original system, the communication device can communicate with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
In this way, the terminal device can communicate with the vehicle server through the communication device based on the public protocol, so that the function of the digital vehicle key can be realized according to the requirement of the public protocol. By the mode, the public protocol can be applied to various terminal equipment, so that the application range of the public protocol is improved. Meanwhile, as the original system does not support the terminal equipment of the public protocol, the communication device can also perform communication based on the public protocol, thereby realizing the function of the digital car key. Therefore, the components for realizing the digital car key based on the private protocol do not need to be configured in the terminal equipment, so that the deployment cost of the digital car key is reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is an architecture diagram of a digital car key system based on the ICCE protocol, according to an example embodiment.
Fig. 2 is a block diagram of a terminal device, according to an example embodiment.
Fig. 3 is a block diagram of a communication device, according to an example embodiment.
Fig. 4 is a block diagram illustrating a communication device and an encrypted white box, according to an exemplary embodiment.
FIG. 5 is a flow chart illustrating a key sharing according to an exemplary embodiment.
Fig. 6 is a flow chart illustrating a key-on according to an exemplary embodiment.
Fig. 7 is a flow chart illustrating a remote control authentication according to an exemplary embodiment.
FIG. 8 is a scene graph illustrating a vehicle control according to an example embodiment.
Fig. 9 is a flowchart illustrating a data processing method of a terminal device according to an exemplary embodiment.
Fig. 10 is a flowchart illustrating a data processing method of a terminal device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Before introducing the terminal device and the data processing method of the terminal device of the present disclosure, an application scenario of the present disclosure is first described.
The terminal device as a car key is a popular technology in recent years, and this function is also called a digital car key. Unlike the conventional physical car key, the digital car key can realize the functions of opening a car door, starting a car and the like by integrating the car key function into the mobile terminal device.
For example, in some scenarios, a vehicle enterprise may develop digital vehicle keys based on proprietary agreements. By packaging the related data of the private protocol in the vehicle enterprise application, the terminal equipment for installing the vehicle enterprise application can interact with the vehicle and the vehicle server based on the private protocol, so that functions of the digital vehicle key, such as vehicle control, key sharing and the like, are realized. In order to realize the function of the digital car key, the car enterprise application needs to run in the terminal equipment, such as foreground running or keep alive in the background, so that more resources are consumed for the terminal equipment.
For this reason, some vehicle manufacturers and mobile terminal manufacturers have jointly developed solutions for digital car keys, i.e. digital car key solutions based on public agreements. Compared with the private protocol, the public protocol can realize the function of the digital car key based on the bottom layer of the operating system.
Here, a description will be given of an example of a public protocol of ICCE (Intelligent Car Connectivity Industry Ecosystem Alliance Digital Key System, intelligent car co-production industry ecological alliance digital car key system), and an architecture diagram of a digital car key system based on ICCE protocol is shown in fig. 1. In a public agreement based vehicle digital key scheme, the related operations of the digital vehicle key may be packaged as a digital key frame (Digital Key Framework, DKF). The digital key framework may provide various APIs (Application Programming Interface, application programming interfaces) for upper layer applications to invoke, such as device pairing, key lifecycle management, key unlocking, locking, sharing, vehicle control, and the like. Through setting up the digital key frame of system level, terminal equipment can realize the function of digital car key based on operating system bottom, has the advantage that consumes resources a little, user experience is good.
It should be noted that public protocols are developed jointly by vehicle manufacturers and mobile terminal manufacturers, and therefore there are limits to the types of terminal devices. For example, the ICCE protocol was developed in conjunction with the vehicle enterprise by terminal vendor A so that terminal device A1 under the flag of terminal vendor A can support the ICCE protocol. However, for the terminal device B1 under the flag of the terminal vendor B, it is difficult to support the ICCE protocol, thereby affecting the user experience. For example, in some scenarios, the user of the vehicle may include a vehicle owner and a friend, but since the vehicle owner uses a terminal device A1 supporting the ICCE protocol and the friend uses a terminal device B1 not supporting the ICCE protocol, the vehicle owner cannot share the digital vehicle key with the friend.
Therefore, in order to ensure compatibility, a vehicle enterprise generally needs to develop a digital vehicle key scheme based on a private protocol and a digital vehicle key scheme based on a public protocol at the same time. Both schemes may be configured in the terminal device. However, this in turn results in higher costs for development and deployment of the digital car key scheme.
For this purpose, the present disclosure provides a terminal device, which may be a mobile terminal device such as a mobile phone, a tablet, or any other type of terminal device that may carry a digital key function.
Fig. 2 is a block diagram of a terminal device shown in the present disclosure, referring to fig. 2, the terminal device including a communication apparatus configured to detect, in response to receiving a sharing request of a digital car key for a target vehicle, whether a native system of the terminal device includes a component for adapting a public protocol including a protocol for implementing the digital car key; and under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
The native system of the terminal device may be a system that the terminal device leaves the factory and is carried on, and according to different terminal devices, the native system may exist in various forms, such as iOS system, hong-mo system, android system, and the like, which is not limited in the present disclosure. In order to realize the digital car key based on public protocol, the terminal equipment needs to be configured with corresponding components. These components may include security elements, digital key frames, etc., the kind of which may be referred to in particular in the description of the public agreements of the digital car key concerned.
In a sharing scenario of a digital car key, the communication device may detect whether a native system of the terminal device includes a component for adapting a public agreement in response to receiving a sharing request of the digital car key for a target vehicle. And under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
Wherein the communication means may be presented in the form of software, hardware or a combination of software and hardware. For example, in one possible implementation, the communication device may be in the form of an SDK (Software Development Kit ). The public protocol may be, for example, a public protocol based on key authentication, such as the ICCE protocol.
The communication apparatus will be described below using the common protocol of ICCE as an example.
Referring to the block diagram of one communication device shown in fig. 3, in one possible embodiment, the communication device may include a digital key module. The digital key module is capable of communicating with a vehicle server and is configured to implement the functions of the vehicle vendor application specified in the public agreement.
In the ICCE protocol, it is specified that a vehicle vendor application needs to provide a digital car key-related functional interface to a user. Thus, the digital key module can be obtained by packaging the related key management function method. The key management function method may include providing a user interface for key management and inquiry, providing an interaction channel between a key and a vehicle server, executing service flows of opening, updating, sharing, canceling and the like, pairing with bluetooth/UWB (Ultra Wide Band) of a vehicle in a key opening stage, transmitting instructions to a key management module through an API provided by DKF, and the like. Therefore, the functional method can be packaged to obtain the digital key module. The digital key module may be presented in the form of an SDK and provide an interface for the functions described above.
Referring to fig. 3, in one possible implementation, the communication device includes a local application module configured to implement functionality of a terminal equipment vendor application specified in the public protocol.
The local application module can communicate with a terminal device server. In some implementations, the local application module may be configured to communicate directly with the end device server. In some implementations, the terminal device service module may also be configured in the vehicle server. In this way, the local application module is configured to communicate with the end device server based on the end device service module in the vehicle server.
The terminal equipment manufacturer application can provide a function interface related to the digital car key for a user, execute business processes such as opening, updating, sharing and canceling the digital car key, and trigger state synchronization with a car enterprise server after executing operation of completing the state change of the life cycle of the key. Therefore, the above related functional methods can be encapsulated to obtain the local application module. The local application module can also be presented in the form of SDK and provides interfaces for the service functions of opening, updating, sharing, canceling and the like of the vehicle key.
Referring to fig. 3, in one possible embodiment, the communication device includes a digital key frame module configured to implement the functions of the digital key frame specified in the public protocol.
These functions include device pairing, vehicle key distribution and management, and the like. The digital key frame module may also interact with the key management module so that the key management module can timely receive and respond to authentication messages sent by the vehicle. The digital key frame module may also perform access control on the API of the key management module and maintain rules for access control.
In addition, the digital key frame module can be further configured to perform Bluetooth/UWB pairing with the vehicle and establish Bluetooth/UWB connection, wherein the Bluetooth/UWB pairing and connection can be in a general mode or a custom mode. In the interaction process with the vehicle, the digital key frame module can also analyze and encapsulate Bluetooth/UWB authentication data packets.
Referring to fig. 3, the key management module of the communication device is configured to implement the functions of the digital key program specified in the public protocol.
Here, referring to a block diagram of a communication apparatus and an encryption white box shown in fig. 4, unlike the related art in which key data is stored through a Secure Element (SE), the key data may be stored by means of the encryption white box in the present disclosure. In some implementations, the key data may also be stored by a secure storage technology of the terminal device's native system. In an android system, for example, key data may be stored by key-store (android key) technology.
The key management module may provide secure transaction functionality based on the encrypted whitepack. In addition, to meet the requirement of carrying multiple car keys, the key management module can use unified AID (application identifier ) by examples, ensure mutual isolation of key data of different manufacturers and prevent unauthorized inquiry requests.
Based on the communication means, the terminal device can perform ICCE protocol-based communication with the target communication party.
For example, the communication device of the terminal device may detect, in response to receiving a sharing request of a digital car key for a target vehicle, whether a native system of the terminal device includes a component for adapting a public protocol including a protocol for implementing the digital car key; and under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
Fig. 5 is a flowchart of key sharing shown in the present disclosure, and referring to fig. 5, the key sharing process includes:
in step 51, the owner or borrower initiates a share application. For example, the vehicle owner may initiate a digital vehicle key sharing application to the vehicle server via the vehicle vendor application (if any)/communication device in the vehicle owner terminal device. Or, the borrower terminal device may respond to the sharing request of the digital car key, and initiate a sharing application of the digital car key to the vehicle server through the communication device. The sharing request can be generated by operation triggering of the borrower on the borrower terminal, or can be sent by the vehicle owner terminal equipment. The sharing application may include information of the vehicle owner, vehicle information, rights to request sharing, and the like.
In step 52, the vehicle server may review the applied qualification. For example, the vehicle server may audit the information of the vehicle owner, the vehicle information, and the authority for requesting sharing, so as to determine whether the sharing application satisfies a set sharing policy.
In step 53, the vehicle server generates a sharing key. The sharing key may include a digital car key and digital car key service data. The digital car key may be used to perform authentication calculations, generated by the vehicle server and issued to the requesting terminal device. The digital car key service data can comprise key attributes such as the validity period, the operation authority setting and the like of the digital car key, and can also be generated by a vehicle server and issued to the terminal equipment of the requesting party.
In step 541, the vehicle server pushes the sharing key to the borrower terminal.
For example, the vehicle server may push the sharing key through a digital key module in the communication device, which may invoke a vehicle key distribution and management interface of a digital key frame module in the communication device. Thus, the key management module can process the sharing key and store the sharing key through the encryption white box module.
In step 542, the vehicle server pushes the sharing key to the vehicle. For example, the vehicle server may push the shared key to the vehicle's machine so that the machine manages the local key. The vehicle server can push the sharing key to the vehicle machine in an online or offline mode.
In step 543, the borrower terminal execution status returns.
In step 544, the vehicle execution state returns.
In step 55, the vehicle server shares the key status receipt to the vehicle owner and borrower.
In the above technical solution, a communication device is provided in a terminal device, where the communication device may detect, in response to receiving a sharing request for a digital car key of a target vehicle, whether a native system of the terminal device includes a component for adapting a public protocol, where the public protocol includes a protocol for implementing the digital car key. And under the condition that at least one component is missing in the original system, the communication device can communicate with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
In this way, the terminal device can communicate with the vehicle server through the communication device based on the public protocol, so that the function of the digital vehicle key can be realized according to the requirement of the public protocol. By the mode, the public protocol can be applied to various terminal equipment, so that the application range of the public protocol is improved. Meanwhile, as the original system does not support the terminal equipment of the public protocol, the communication device can also perform communication based on the public protocol, thereby realizing the function of the digital car key. Therefore, the components for realizing the digital car key based on the private protocol do not need to be configured in the terminal equipment, so that the deployment cost of the digital car key is reduced.
Of course, in some implementation scenarios, the terminal device may also be used as an initiator of key sharing (i.e. a vehicle owner terminal device) to share a digital vehicle key with another terminal device, which is not limited in this disclosure.
In one possible implementation, the public protocol is a public protocol based on key authentication, and the communication device is configured to communicate with the vehicle server according to the public protocol in response to receiving a key opening request, so as to complete the opening step of the digital vehicle key, and obtain the digital vehicle key.
Fig. 6 is a flow chart of a key-on shown in the present disclosure, and referring to fig. 6, the key-on flow includes:
in step 61, user authentication is performed, and the user is confirmed to be operating by himself.
For example, the mobile terminal may authenticate the user in response to a key-on operation triggered by the user at the terminal device. Authentication can be achieved, for example, by means of key authentication, biometric authentication to determine that a key-on operation is triggered by the user himself.
In step 62, an open application is initiated. The mobile terminal can communicate with a vehicle server through a digital key module in the communication device, for example, so as to initiate a key opening application. As one example, the mobile terminal may invoke a key issuing API of the digital key frame module after the user authentication passes. Thus, the key management module can generate a temporary encryption public and private key and store the temporary encryption public and private key through the encryption white box module. The mobile terminal can perform validity verification on the temporary encryption public key, and under the condition that verification is passed, an opening application is initiated to the vehicle server, wherein the opening application comprises the temporary encryption public key.
In step 63, the owner rights and key-on rights of the user are confirmed.
In step 64, a key and associated service data is generated and the user on state is recorded.
In step 65, a digital car key issue is requested.
In step 661, the digital car key is issued.
In step 662, a vehicle-side key is issued.
In step 67, the digital car key is written, completing the key management module personalization.
For example, the vehicle server may generate digital vehicle key data and encrypt the digital vehicle key data (e.g., key data of a digital vehicle key) by the temporary encryption public key, and transmit the encryption result to the mobile terminal SEI-TSM (Secure Element Issuer-Trusted Service Management, security element issuer-trusted service management). The mobile terminal SEI-TSM then issues the encrypted digital car key data to the mobile terminal. The key management module of the communication device can decrypt the encrypted digital car key data through the temporary encryption private key, and the decrypted digital car key data is stored in the encryption white box module.
In addition, the vehicle can acquire the digital vehicle key from the vehicle server through the communication module, or is connected to the vehicle server in a mobile phone bridging mode to acquire the digital vehicle key, so that the key issuing step of the vehicle end is completed.
In step 68, the mobile terminal and the vehicle server are message synchronized.
By adopting the technical scheme, for the terminal equipment of which the original system does not support the ICCE protocol, the digital car key based on the ICCE protocol can be opened based on the communication device, so that the application range of the ICCE protocol is improved.
In one possible implementation manner, the terminal device is used for performing communication based on the public protocol with the vehicle through the communication device and the digital vehicle key to establish and obtain a secure channel, and sending a target control instruction to the vehicle through the secure channel, wherein the target control instruction is used for controlling the vehicle to execute a target action.
Specifically, after the digital car key is turned on, the terminal device may use the digital car key. When the digital car key is used, the terminal device can authenticate with the vehicle based on the communication device.
Here, the authentication process may include a non-inductive authentication, a remote control authentication, a near field communication authentication, and the like. Taking remote control authentication as an example, fig. 7 is a flowchart of remote control authentication shown in the present disclosure, and referring to fig. 7, in the process of remote control authentication:
the mobile terminal may establish a connection with the vehicle, for example, based on a bluetooth module/UWB module. And then, carrying out a key authentication step with the vehicle through the communication device and the digital vehicle key data in the encrypted white box module. For the algorithm of key authentication, please refer to the provision of the ICCE protocol, and this disclosure will not be repeated for brevity of description. After the key authentication is passed, a session key is generated and session maintenance is performed.
In this way, the mobile terminal can encrypt the vehicle control data based on the session key, and send the encrypted vehicle control instruction to the vehicle.
Referring to a scenario diagram of vehicle control shown in fig. 8, the mobile terminal may send encrypted vehicle control instructions to the vehicle, for example, through a bluetooth module. The vehicle control instruction is transmitted to the digital key controller through the Bluetooth module at the vehicle end, and the digital key controller decrypts the vehicle control instruction through the session key to obtain vehicle control data. And then, the central domain controller controls the execution mechanism to execute corresponding vehicle control operations, such as opening a vehicle door, opening a trunk, adjusting a tail wing and the like, according to the vehicle control data. In this way, the terminal device whose original system does not support the ICCE protocol can also control the vehicle based on the ICCE protocol.
In the above embodiments, the mode of public protocol communication of the mobile terminal of the present disclosure is illustrated by taking key activation, key sharing and key usage as examples. Those skilled in the art will appreciate that the mobile terminal provided by the present disclosure may perform various public protocol-based communications based on the communication device and thus implement corresponding functions. Such functions include, but are not limited to, key-on, key-sharing, key-use, key-revocation, and the like.
Based on the same inventive concept, the present disclosure also provides a data processing method of a terminal device, which is applied to the terminal device provided by the present disclosure. Fig. 9 is a flowchart of a data processing method of a terminal device shown in the present disclosure, and referring to fig. 9, the method includes:
in step S91, in response to receiving a sharing request of a digital car key for a target vehicle, it is detected whether a native system of the terminal device includes a component for adapting a public agreement. The public protocol comprises a protocol for realizing a digital car key;
in step S92, in the case that at least one component is missing in the native system, communication is performed with a vehicle server associated with the target vehicle according to the public protocol, so as to complete the authentication step of sharing the digital vehicle key, and obtain the shared digital vehicle key.
Fig. 5 is a flowchart of key sharing shown in the present disclosure, and referring to fig. 5, the key sharing process includes:
in step 51, the owner or borrower initiates a share application. For example, the vehicle owner may initiate a digital vehicle key sharing application to the vehicle server via the vehicle vendor application/communication device in the vehicle owner terminal device. Or, the borrower terminal device may respond to the sharing request of the digital car key, and initiate a sharing application of the digital car key to the vehicle server through the communication device. The sharing request can be generated by operation triggering of the borrower on the borrower terminal, or can be sent by the vehicle owner terminal equipment. The sharing application may include information of the vehicle owner, vehicle information, rights to request sharing, and the like.
In step 52, the vehicle server may review the applied qualification. For example, the vehicle server may audit the information of the vehicle owner, the vehicle information, and the authority for requesting sharing, so as to determine whether the sharing application satisfies a set sharing policy.
In step 53, the vehicle server generates a sharing key. The sharing key may include a digital car key and digital car key service data. The digital car key may be used to perform authentication calculations, generated by the vehicle server and issued to the requesting terminal device. The digital car key service data can comprise key attributes such as the validity period, the operation authority setting and the like of the digital car key, and can also be generated by a vehicle server and issued to the terminal equipment of the requesting party.
In step 541, the vehicle server pushes the sharing key to the borrower terminal.
For example, the vehicle server may push the sharing key through a digital key module in the communication device, which may invoke a vehicle key distribution and management interface of a digital key frame module in the communication device. Thus, the key management module can process the sharing key and store the sharing key through the encryption white box module.
In step 542, the vehicle server pushes the sharing key to the vehicle. For example, the vehicle server may push the shared key to the vehicle's machine so that the machine manages the local key. The vehicle server can push the sharing key to the vehicle machine in an online or offline mode.
In step 543, the borrower terminal execution status returns.
In step 544, the vehicle execution state returns.
In step 55, the vehicle server shares the key status receipt to the vehicle owner and borrower.
In the above technical solution, a communication device is provided in a terminal device, where the communication device may detect, in response to receiving a sharing request for a digital car key of a target vehicle, whether a native system of the terminal device includes a component for adapting a public protocol, where the public protocol includes a protocol for implementing the digital car key. And under the condition that at least one component is missing in the original system, the communication device can communicate with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
In this way, the terminal device can communicate with the vehicle server through the communication device based on the public protocol, so that the function of the digital vehicle key can be realized according to the requirement of the public protocol. By the mode, the public protocol can be applied to various terminal equipment, so that the application range of the public protocol is improved. Meanwhile, as the original system does not support the terminal equipment of the public protocol, the communication device can also perform communication based on the public protocol, thereby realizing the function of the digital car key. Therefore, the components for realizing the digital car key based on the private protocol do not need to be configured in the terminal equipment, so that the deployment cost of the digital car key is reduced.
In one possible embodiment, the public protocol is a public protocol based on key authentication, the method comprising:
and in response to receiving the key opening request, communicating with the vehicle server according to the public protocol to complete the opening step of the digital vehicle key, thereby obtaining the digital vehicle key.
Fig. 6 is a flow chart of a key-on shown in the present disclosure, and referring to fig. 6, the key-on flow includes:
in step 61, user authentication is performed, and the user is confirmed to be operating by himself.
For example, the mobile terminal may authenticate the user in response to a key-on operation triggered by the user at the terminal device. Authentication can be achieved, for example, by means of key authentication, biometric authentication to determine that a key-on operation is triggered by the user himself.
In step 62, an open application is initiated. The mobile terminal can communicate with a vehicle server through a digital key module in the communication device, for example, so as to initiate a key opening application. As one example, the mobile terminal may invoke a key issuing API of the digital key frame module after the user authentication passes. Thus, the key management module can generate a temporary encryption public and private key and store the temporary encryption public and private key through the encryption white box module. The mobile terminal can perform validity verification on the temporary encryption public key, and under the condition that verification is passed, an opening application is initiated to the vehicle server, wherein the opening application comprises the temporary encryption public key.
In step 63, the owner rights and key-on rights of the user are confirmed.
In step 64, a key and associated service data is generated and the user on state is recorded.
In step 65, a digital car key issue is requested.
In step 661, the digital car key is issued.
In step 662, a vehicle-side key is issued.
In step 67, the digital car key is written, completing the key management module personalization.
For example, the vehicle server may generate digital vehicle key data, encrypt the digital vehicle key data by using the temporary encryption public key, and transmit the encryption result to the mobile terminal SEI-TSM. The mobile terminal SEI-TSM then issues the encrypted digital car key data to the mobile terminal. The key management module of the communication device can decrypt the encrypted digital car key data through the temporary encryption private key, and the decrypted digital car key data is stored in the encryption white box module.
In addition, the vehicle can acquire the digital vehicle key from the vehicle server through the communication module, or is connected to the vehicle server in a mobile phone bridging mode to acquire the digital vehicle key, so that the key issuing step of the vehicle end is completed.
In step 68, the mobile terminal and the vehicle server are message synchronized.
By adopting the technical scheme, for the terminal equipment of which the original system does not support the ICCE protocol, the digital car key based on the ICCE protocol can be opened based on the communication device, so that the application range of the ICCE protocol is improved.
Fig. 10 is a flowchart of a data processing method of a terminal device shown in the present disclosure, and referring to fig. 10, the method includes, on the basis of fig. 9:
in step S93, communication based on public protocol is performed between the vehicle and the digital car key through the communication device to establish a secure channel;
in step S94, a target control instruction for controlling the vehicle to perform a target action is transmitted to the vehicle through the secure channel.
After the digital car key is turned on, the terminal device can use the digital car key. When the digital car key is used, the terminal device can authenticate with the vehicle based on the communication device.
Here, the authentication process may include a non-inductive authentication, a remote control authentication, a near field communication authentication, and the like. Taking remote control authentication as an example, fig. 7 is a flowchart of remote control authentication shown in the present disclosure, and referring to fig. 7, in the process of remote control authentication:
the mobile terminal may establish a connection with the vehicle, for example, based on a bluetooth module/UWB module. And then, carrying out a key authentication step with the vehicle through the communication device and the digital vehicle key data in the encrypted white box module. For the algorithm of key authentication, please refer to the provision of the ICCE protocol, and this disclosure will not be repeated for brevity of description. After the key authentication is passed, a session key is generated and session maintenance is performed.
In this way, the mobile terminal can encrypt the vehicle control data based on the session key, and send the encrypted vehicle control instruction to the vehicle.
Referring to a scenario diagram of vehicle control shown in fig. 8, the mobile terminal may send encrypted vehicle control instructions to the vehicle, for example, through a bluetooth module. The vehicle control instruction is transmitted to the digital key controller through the Bluetooth module at the vehicle end, and the digital key controller decrypts the vehicle control instruction through the session key to obtain vehicle control data. And then, the central domain controller controls the execution mechanism to execute corresponding vehicle control operations, such as opening a vehicle door, opening a trunk, adjusting a tail wing and the like, according to the vehicle control data. In this way, the terminal device whose original system does not support the ICCE protocol can also control the vehicle based on the ICCE protocol.
In the above embodiments, the mode of public protocol communication of the mobile terminal of the present disclosure is illustrated by taking key activation, key sharing and key usage as examples. Those skilled in the art will appreciate that the mobile terminal provided by the present disclosure may perform various public protocol-based communications based on the communication device and thus implement corresponding functions. Such functions include, but are not limited to, key-on, key-sharing, key-use, key-revocation, and the like.
In another exemplary embodiment, a computer program product is also provided, which comprises a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-mentioned data processing method of a terminal device when being executed by the programmable apparatus.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A terminal device is characterized by comprising a communication device,
the communication device is configured to detect, in response to receiving a sharing request of a digital car key for a target vehicle, whether a native system of the terminal device includes a component for adapting a public protocol including a protocol for implementing the digital car key; and under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
2. The terminal device according to claim 1, wherein the communication means comprises:
a digital key module capable of communicating with the vehicle server and configured to implement a function of a vehicle vendor application specified in the public protocol;
the local application module can be communicated with the terminal equipment server and is configured to realize the functions of terminal equipment manufacturer application specified in the public protocol;
a digital key frame module configured to implement the functions of the digital key frame specified in the public protocol;
a key management module configured to implement the functions of the digital key program specified in the public agreement.
3. The terminal device of claim 2, wherein the communication means comprises an encrypted white-box module configured to store digital car key data.
4. The terminal device of claim 2, wherein the local application module is configured to communicate with the terminal device server based on a terminal device service module in a vehicle server.
5. The terminal device according to any one of claims 1 to 4, wherein the public protocol is a public protocol based on key authentication, and the communication means is configured to communicate with the vehicle server according to the public protocol in response to receiving a key-on request, to complete the step of opening the digital vehicle key, resulting in the digital vehicle key.
6. The terminal device of claim 5, wherein the common protocol is an ICCE protocol.
7. The terminal device according to any one of claims 1 to 4, characterized in that the terminal device is configured to communicate with the vehicle via the communication means and the digital car key based on the public protocol to establish a secure channel, and to send a target control instruction to the vehicle via the secure channel, the target control instruction being configured to control the vehicle to perform a target action.
8. A data processing method of a terminal device, characterized in that it is applied to a terminal device according to any one of claims 1 to 7, the method comprising:
in response to receiving a sharing request of a digital car key for a target vehicle, detecting whether a native system of the terminal device comprises a component for adapting a public protocol, the public protocol comprising a protocol for implementing the digital car key;
and under the condition that at least one component is missing in the original system, communicating with a vehicle server associated with the target vehicle according to the public protocol so as to complete the authentication step of sharing the digital vehicle key and obtain the shared digital vehicle key.
9. The method of claim 8, wherein the public protocol is a public protocol based on key authentication, the method comprising:
and in response to receiving the key opening request, communicating with the vehicle server according to the public protocol to complete the opening step of the digital vehicle key, thereby obtaining the digital vehicle key.
10. The method according to claim 8, comprising:
the communication device and the digital car key are used for carrying out communication based on the public protocol with the vehicle so as to establish a secure channel;
and sending a target control instruction to the vehicle through the safety channel, wherein the target control instruction is used for controlling the vehicle to execute a target action.
CN202310316374.3A 2023-03-24 2023-03-24 Terminal device and data processing method of terminal device Active CN116366759B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310316374.3A CN116366759B (en) 2023-03-24 2023-03-24 Terminal device and data processing method of terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310316374.3A CN116366759B (en) 2023-03-24 2023-03-24 Terminal device and data processing method of terminal device

Publications (2)

Publication Number Publication Date
CN116366759A true CN116366759A (en) 2023-06-30
CN116366759B CN116366759B (en) 2024-04-09

Family

ID=86914233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310316374.3A Active CN116366759B (en) 2023-03-24 2023-03-24 Terminal device and data processing method of terminal device

Country Status (1)

Country Link
CN (1) CN116366759B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160134996A1 (en) * 2014-11-12 2016-05-12 Qualcomm Incorporated Mirrorlink with wireless serial bus
EP3135546A1 (en) * 2015-08-27 2017-03-01 Unicept GmbH Car key, communication system and method for same
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
KR102232966B1 (en) * 2020-09-10 2021-03-29 (주)케이스마텍 Un-tact digital key service system and method thereof
CN113301167A (en) * 2021-06-30 2021-08-24 深圳市雪球科技有限公司 Cross-specification sharing method, device and equipment of digital key
CN114821867A (en) * 2022-06-08 2022-07-29 润芯微科技(江苏)有限公司 Method and system for realizing digital key based on MCU and wireless communication module
CN115303227A (en) * 2022-08-26 2022-11-08 惠州市德赛西威智能交通技术研究院有限公司 Digital key pairing method and system, digital key and automobile
CN115396191A (en) * 2022-08-24 2022-11-25 重庆长安汽车股份有限公司 Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium
CN115766021A (en) * 2022-10-27 2023-03-07 联合汽车电子有限公司 Back-end system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160134996A1 (en) * 2014-11-12 2016-05-12 Qualcomm Incorporated Mirrorlink with wireless serial bus
EP3135546A1 (en) * 2015-08-27 2017-03-01 Unicept GmbH Car key, communication system and method for same
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
KR102232966B1 (en) * 2020-09-10 2021-03-29 (주)케이스마텍 Un-tact digital key service system and method thereof
CN113301167A (en) * 2021-06-30 2021-08-24 深圳市雪球科技有限公司 Cross-specification sharing method, device and equipment of digital key
CN114821867A (en) * 2022-06-08 2022-07-29 润芯微科技(江苏)有限公司 Method and system for realizing digital key based on MCU and wireless communication module
CN115396191A (en) * 2022-08-24 2022-11-25 重庆长安汽车股份有限公司 Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium
CN115303227A (en) * 2022-08-26 2022-11-08 惠州市德赛西威智能交通技术研究院有限公司 Digital key pairing method and system, digital key and automobile
CN115766021A (en) * 2022-10-27 2023-03-07 联合汽车电子有限公司 Back-end system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LINAN101: "CCC数字钥匙Release3", pages 1 - 12, Retrieved from the Internet <URL:https://blog.csdn.net/linan101/article/details/120672124> *

Also Published As

Publication number Publication date
CN116366759B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
US9843585B2 (en) Methods and apparatus for large scale distribution of electronic access clients
US20180091978A1 (en) Universal Integrated Circuit Card Having A Virtual Subscriber Identity Module Functionality
KR102406757B1 (en) A method of provisioning a subscriber profile for a secure module
US20050188219A1 (en) Method and a system for communication between a terminal and at least one communication equipment
Busold et al. Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer
US20130185560A1 (en) Method and arrangement for provisioning and managing a device
CN101510824B (en) Vehicular network system of a motor vehicle with replaceable cryptographic key and/or certificate
KR101564478B1 (en) Releasing a service on an electronic appliance
JP2016167835A (en) Methods and apparatus for storage and operation of access control clients
US20080091604A1 (en) Method for the Compartmented Provisioning of an Electronic Service
CN109218263A (en) A kind of control method and device
WO2010051715A1 (en) Method, system and mobile terminal for distributing the initial key of security sub-domain of a smart card
KR20130006257A (en) Method for managing key of embedded sim, embedded sim and recording medium for the same
EP2815553B1 (en) Mobile apparatus supporting a plurality of access control clients, and corresponding methods
US10090997B2 (en) Method for changing an authentication key
CN116366759B (en) Terminal device and data processing method of terminal device
Bolhuis Using an NFC-equipped mobile phone as a token in physical access control
US11956638B2 (en) Method for remote provisioning of software modules in integrated circuit cards, corresponding apparatus and computer program product
CN116346978B (en) Terminal device and data processing method of terminal device
CN112416528B (en) Method for realizing non-invasive micro service interface safety call
CN113316916A (en) Apparatus and method for updating anti-theft token in digital key sharing system
US11974126B2 (en) Method, first and second device and system for connecting to at least one chip
EP3855328A1 (en) A method for securely diversifying a generic application stored in a secure processor of a terminal
CN116566601A (en) Bank card simulation method, automobile digital key, computer device and computer readable storage medium
US20220014911A1 (en) Method, first and second device and system for connecting to at least one chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant