CN116416717A - Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium - Google Patents

Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN116416717A
CN116416717A CN202211695395.2A CN202211695395A CN116416717A CN 116416717 A CN116416717 A CN 116416717A CN 202211695395 A CN202211695395 A CN 202211695395A CN 116416717 A CN116416717 A CN 116416717A
Authority
CN
China
Prior art keywords
key
time
terminal
vehicle
time information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211695395.2A
Other languages
Chinese (zh)
Inventor
骆俊凯
李洁辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Rox Intelligent Technology Co Ltd
Original Assignee
Shanghai Rox Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Rox Intelligent Technology Co Ltd filed Critical Shanghai Rox Intelligent Technology Co Ltd
Priority to CN202211695395.2A priority Critical patent/CN116416717A/en
Publication of CN116416717A publication Critical patent/CN116416717A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides a vehicle unlocking method, a vehicle end, a vehicle, electronic equipment and a readable storage medium, wherein the method comprises the following steps: under the condition that a first terminal is registered at a vehicle end and an unlocking request of the first terminal is received, a first secret key corresponding to the first terminal and a second secret key corresponding to the vehicle end are obtained; generating a real-time key according to the first key, the second key and the first current time information of the vehicle end; receiving an unlocking key sent by a first terminal, wherein the unlocking key is generated according to the first key, the second key and second current time information of the first terminal; in case the real-time key matches the unlocking key, the unlocking request is passed. Therefore, the real-time secret key of the vehicle end is generated according to the first secret key corresponding to the first terminal, the second secret key corresponding to the vehicle end and the first current moment information of the vehicle end, namely the real-time secret key can change along with different time, the risk of vehicle theft is reduced, and the safety of vehicle unlocking is improved.

Description

Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium
Technical Field
The application belongs to the technical field of vehicles, and particularly relates to a vehicle unlocking method, a vehicle end, a vehicle, electronic equipment and a readable storage medium.
Background
With the continuous development of vehicle intellectualization, operations such as unlocking the vehicle can be performed through the mobile terminal. At present, the unlocking is generally performed through a fixed key stored in a vehicle end, namely, the vehicle end performs identity authentication according to the unlocking key and the fixed key sent by the mobile terminal, and the unlocking operation can be performed when the authentication passes. However, the fixed key is stored at the vehicle end, so that the risk of being attacked or stolen exists, and the potential safety hazard of being stolen exists in the vehicle.
Disclosure of Invention
The embodiment of the application provides a vehicle unlocking method, a vehicle end, a vehicle, electronic equipment and a readable storage medium, so as to improve the safety of vehicle unlocking.
In a first aspect, an embodiment of the present application provides a vehicle unlocking method, applied to a vehicle end, where the method includes:
under the condition that a first terminal is registered at a vehicle end and an unlocking request of the first terminal is received, a first secret key corresponding to the first terminal and a second secret key corresponding to the vehicle end are obtained;
generating a real-time key according to the first key, the second key and the first current time information of the vehicle end;
receiving an unlocking key sent by a first terminal, wherein the unlocking key is generated according to the first key, the second key and second current time information of the first terminal;
in case the real-time key matches the unlocking key, the unlocking request is passed.
In some embodiments, generating the real-time key according to the first key, the second key and the first current time information of the vehicle end includes:
carrying out hash operation on the second secret key and the first current time information of the vehicle end to generate a third secret key;
synthesizing an authentication key according to the third key and the first key;
and carrying out hash operation on the verification key and the first current time information to generate a real-time key.
In some embodiments, performing hash operation on the second key and the first current time information of the vehicle end to generate a third key includes:
carrying out hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
carrying out hash operation on the verification key and the first current time information to generate a real-time key, wherein the method comprises the following steps:
performing hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
wherein the first time level information is greater than the second time level information.
In some embodiments, the method further comprises:
receiving an unlocking request of a second terminal, wherein the unlocking request of the second terminal carries a sharing key, the sharing key is synthesized by the second terminal according to a fourth key and a first key which are shared by the first terminal, the fifth key and second time-level information corresponding to third current time information of the second terminal are subjected to hash operation generation, the fourth key is generated based on hash operation of the second key and first time-level information corresponding to a key sharing time period, and the key sharing time period is determined based on the sharing operation received by the first terminal;
acquiring a first key corresponding to a first terminal and a second key corresponding to a vehicle end;
carrying out hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
synthesizing an authentication key according to the third key and the first key;
performing hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
and in the case that the real-time key is matched with the sharing key, passing the unlocking request.
In some embodiments, generating the real-time key according to the first key, the second key and the first current time information of the vehicle end includes:
and generating a real-time key according to the first key, the second key, the first current time information of the vehicle end and the error time information.
In some embodiments, before generating the real-time key according to the first key, the second key, the first current time information of the vehicle side and the error time information, the method further includes:
generating a plurality of preset keys according to the first key, the second key and a plurality of preset time information, wherein the plurality of preset time information is time information in a system redundancy time period of the last time information of the vehicle end;
receiving a sixth key sent by the first terminal, wherein the sixth key is generated according to the first key, the second key and the last time information of the first terminal;
matching the sixth key with a plurality of preset keys to determine a target key, wherein the target key is a preset key matched with the sixth key in the preset keys;
and determining error time information according to preset time information corresponding to the target key.
In a second aspect, an embodiment of the present application provides a vehicle end, including:
the acquisition module is used for acquiring a first key corresponding to the first terminal and a second key corresponding to the vehicle end under the condition that the first terminal is registered at the vehicle end and an unlocking request of the first terminal is received;
the generation module is used for generating a real-time key according to the first key, the second key and the first current moment information of the vehicle end;
the receiving module is used for receiving an unlocking key sent by the first terminal, and the unlocking key is generated according to the first key, the second key and the second current time information of the first terminal;
and the unlocking module is used for passing the unlocking request under the condition that the real-time key is matched with the unlocking key.
In a third aspect, embodiments of the present application provide a vehicle, the vehicle including a vehicle end, wherein the vehicle end is configured to implement a method as in the first aspect.
In a fourth aspect, an embodiment of the present application provides an electronic device, including:
a processor and a memory storing a program or instructions;
the processor, when executing the program or instructions, implements the methods described above.
In a fifth aspect, embodiments of the present application provide a machine-readable storage medium having stored thereon a program or instructions which, when executed by a processor, implement the above-described method.
In a sixth aspect, embodiments of the present application provide a computer program product, instructions in which, when executed by a processor of an electronic device, cause the electronic device to perform the above-described method.
According to the vehicle unlocking method, the vehicle end, the vehicle, the electronic equipment and the readable storage medium, when the first terminal is registered at the vehicle end and an unlocking request of the first terminal is received, a first key corresponding to the first terminal and a second key corresponding to the vehicle end can be obtained; generating a real-time key according to the first key, the second key and the first current time information of the vehicle end; receiving an unlocking key sent by a first terminal, wherein the unlocking key is generated according to the first key, the second key and second current time information of the first terminal; in case the real-time key matches the unlocking key, the unlocking request is passed. Therefore, the real-time secret key of the vehicle end is generated according to the first secret key corresponding to the first terminal, the second secret key corresponding to the vehicle end and the first current moment information of the vehicle end, namely the real-time secret key can change along with different time, the risk of vehicle theft is reduced, and the safety of vehicle unlocking is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described, and it is possible for a person skilled in the art to obtain other drawings according to these drawings without inventive effort.
FIG. 1 is a flow chart of a vehicle unlocking method provided in one embodiment of the present application;
fig. 2 is a schematic diagram of an unlocking key sharing process in a vehicle unlocking method provided in an embodiment of the present application;
FIG. 3 is a schematic view of a vehicle end according to another embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to another embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application are described in detail below to make the objects, technical solutions and advantages of the present application more apparent, and to further describe the present application in conjunction with the accompanying drawings and the detailed embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative of the application and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by showing examples of the present application.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
In order to solve the problems in the prior art, embodiments of the present application provide a vehicle unlocking method, a vehicle end, a vehicle, an electronic device, and a readable storage medium. The following first describes a vehicle unlocking method provided in the embodiment of the present application.
Fig. 1 shows a flow chart of a vehicle unlocking method according to an embodiment of the present application. As shown in fig. 1, the vehicle unlocking method may include:
step 101, under the condition that a first terminal is registered at a vehicle end and an unlocking request of the first terminal is received, a first key corresponding to the first terminal and a second key corresponding to the vehicle end are obtained.
In step 101, a first terminal may register on a vehicle end, and generate user registration information of the first terminal. When the vehicle end receives an unlocking request of the first terminal, the cloud server adds a random number, and the random number and user registration information of the first terminal can generate a first key corresponding to the first terminal and send the first key to the vehicle end. Namely, the vehicle end can acquire a first key K1 corresponding to the first terminal, and the vehicle end can also acquire a second key K2 corresponding to the vehicle end, wherein the second key K2 can be a preset key when the vehicle leaves the factory.
Step 102, generating a real-time key according to the first key, the second key and the first current time information of the vehicle end.
In step 102, a real-time key may be generated by a hash algorithm according to the first key, the second key, and the first current time information of the vehicle end. For example, the real-time key may be generated by directly hashing the first key, the second key, and the first current time information. The method can also be that the second key and the first current time information are subjected to hash operation once, the obtained hash value is synthesized with the first key, and the synthesized key is subjected to hash operation with the first current time information again to generate the real-time key. The specific generation algorithm of the real-time key can be set according to actual requirements, and is not particularly limited herein.
And step 103, receiving an unlocking key sent by the first terminal, wherein the unlocking key is generated according to the first key, the second key and the second current time information of the first terminal.
In step 103, an unlock key sent by the first terminal may be received, where the unlock key may be carried in the unlock request, or the unlock key may be sent to the vehicle end after the first terminal sends the unlock request to the vehicle end. The unlocking key is generated according to the first key, the second key and the second current time information of the first terminal. It can be appreciated that the unlocking key generation algorithm is the same as the real-time key generation algorithm to ensure that the two can be matched.
Step 104, in the case that the real-time key is matched with the unlocking key, passing the unlocking request.
In step 104, the real-time key and the unlock key may be compared, and if they are identical, the real-time key may be considered to be matched with the unlock key, and at this time, the vehicle end may return a confirmation password, and execute the vehicle unlock operation through the unlock request and in response to the unlock request.
In the embodiment of the application, the vehicle unlocking method can acquire the first key corresponding to the first terminal and the second key corresponding to the vehicle end under the condition that the first terminal is registered at the vehicle end and an unlocking request of the first terminal is received; generating a real-time key according to the first key, the second key and the first current time information of the vehicle end; receiving an unlocking key sent by a first terminal, wherein the unlocking key is generated according to the first key, the second key and second current time information of the first terminal; in case the real-time key matches the unlocking key, the unlocking request is passed. Therefore, the real-time secret key of the vehicle end is generated according to the first secret key corresponding to the first terminal, the second secret key corresponding to the vehicle end and the first current moment information of the vehicle end, namely the real-time secret key can change along with different time, the risk of vehicle theft is reduced, and the safety of vehicle unlocking is improved.
In some embodiments, the step 102 may include:
carrying out hash operation on the second secret key and the first current time information of the vehicle end to generate a third secret key;
synthesizing an authentication key according to the third key and the first key;
and carrying out hash operation on the verification key and the first current time information to generate a real-time key.
In this embodiment, the second key and the first current time information of the vehicle end may be hashed to generate a third key, then the third key and the first key are synthesized to obtain an authentication key, and finally the authentication key and the first current time information are hashed again to generate a real-time key.
Therefore, the first current moment information is utilized to carry out hash operation twice, so that a real-time key generation algorithm is more complex, the risk of vehicle theft is further reduced, and the safety of vehicle unlocking is improved.
In some embodiments, the generating the third key by performing a hash operation on the second key and the first current time information of the vehicle side may include:
carrying out hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
the generating the real-time key by performing the hash operation on the verification key and the first current time information may include:
performing hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
wherein the first time level information is greater than the second time level information.
In this embodiment, the first time level information may be greater than the second time level information, for example, the first time level information may indicate an hour, and the second time level information may indicate a minute, for example, 8:20 corresponds to 8 for the first time level information and 20 for the second time level information.
The second key and the first time level information corresponding to the first current time information may be hashed to generate a third key. At this time, the third key is the first time-level information key, and taking the hour indicated by the first time-level information as an example, the calculation formula of the third key S1 may be as shown in formula (1):
S1=Hash(K2,Th) (1)
wherein S1 is a third key, hash is a Hash algorithm, K2 is a second key, and Th is hour level information.
The calculation formula of the verification key S2 may be as shown in formula (2):
S2=S1+K1 (2)
wherein S2 is the authentication key, S1 is the third key, and K1 is the first key.
The verification key and the second time-level information corresponding to the first current time information can be subjected to hash operation to generate a real-time key. At this time, the real-time key is a second time-level information key, and taking the second time-level information indicating the minute as an example, the calculation formula of the real-time key S3 may be as shown in formula (3):
S3=Hash(S2,Tm) (3)
wherein S3 is a real-time key, hash is a Hash algorithm, S2 is a verification key, and Tm is minute-level information.
In this way, the first time level information key can be determined through the first hash algorithm, and the second time level information key is determined through the second hash algorithm based on the first time level information key, so that the real-time key generation algorithm is more complex, the risk of vehicle theft is further reduced, and the safety of vehicle unlocking is improved.
In some embodiments, the vehicle unlocking method may further include:
receiving an unlocking request of a second terminal, wherein the unlocking request of the second terminal carries a sharing key, the sharing key is synthesized by the second terminal according to a fourth key and a first key which are shared by the first terminal, the fifth key and second time-level information corresponding to third current time information of the second terminal are subjected to hash operation generation, the fourth key is generated based on hash operation of the second key and first time-level information corresponding to a key sharing time period, and the key sharing time period is determined based on the sharing operation received by the first terminal;
acquiring a first key corresponding to a first terminal and a second key corresponding to a vehicle end;
carrying out hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
synthesizing an authentication key according to the third key and the first key;
performing hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
and in the case that the real-time key is matched with the sharing key, passing the unlocking request.
In this embodiment, since the real-time key is a verification key synthesized based on the first time-level information key (third key) and the first key, hash operation generation is performed again with the second time-level information, and the unlock key is identical to the generation algorithm of the real-time key. Based on the above, the first terminal may enable the second terminal to unlock the vehicle temporarily by sharing the first time-level information key and the first key.
For example, as shown in fig. 2, a user may set a key sharing period on the first terminal, and the cloud server may generate a fourth key according to the first time level information and the second key corresponding to the key sharing period, where a generation algorithm of the fourth key is shown in formula (1). The first terminal may share the fourth key and the first key to the second terminal.
The second terminal may synthesize a fifth key according to the fourth key and the first key shared by the first terminal, where a generation algorithm of the fifth key is shown in formula (2). And carrying out hash operation on the second time-level information corresponding to the third current time information of the second terminal and the fifth key to generate a shared key, wherein the generation algorithm of the shared key is shown in a formula (3).
And the second terminal can send an unlocking request to the vehicle end according to the sharing key. After receiving the unlocking request of the second terminal, the vehicle end can acquire a first key corresponding to the first terminal and a second key corresponding to the vehicle end, hash the second key and first time level information corresponding to the first current time information to generate a third key, synthesize a verification key according to the third key and the first key, hash the verification key and second time level information corresponding to the first current time information to generate a real-time key. And comparing the real-time key with the sharing key, and if the real-time key and the sharing key are consistent, considering that the real-time key is matched with the sharing key, and at the moment, unlocking the vehicle by an unlocking request.
It is understood that the second terminal may be a different terminal than the first terminal, or may be the first terminal. For example, in some situations (such as an underground parking garage) where there is no network or a network signal is poor, the unlocking key issued by the cloud server may not be received due to the inability to network connection, and at this time, the second terminal may perform hash operation on itself based on the fourth key and the first key acquired previously, so as to generate the sharing key to unlock the vehicle.
In some embodiments, the step 102 may include:
and generating a real-time key according to the first key, the second key, the first current time information of the vehicle end and the error time information.
It can be understood that, due to system redundancy in the process of generating the real-time key by the vehicle end, or due to inconsistent time between the vehicle end and the first terminal, the real-time key and the unlocking key are not matched due to time errors, so that unlocking cannot be performed.
Based on this, in this embodiment, the real-time key may be generated according to the first key, the second key, the first current time information of the vehicle end, and the error time information. The error time information may be preset according to an empirical value or may be obtained by a pre-test. Therefore, when the real-time key is generated, error time information can be considered to ensure the accuracy of the real-time key, so that the success rate of unlocking the vehicle is improved.
In some embodiments, before the generating the real-time key according to the first key, the second key, the first current time information of the vehicle end and the error time information, the vehicle unlocking method may further include:
generating a plurality of preset keys according to the first key, the second key and a plurality of preset time information, wherein the plurality of preset time information is time information in a system redundancy time period of the last time information of the vehicle end;
receiving a sixth key sent by the first terminal, wherein the sixth key is generated according to the first key, the second key and the last time information of the first terminal;
matching the sixth key with a plurality of preset keys to determine a target key, wherein the target key is a preset key matched with the sixth key in the preset keys;
and determining error time information according to preset time information corresponding to the target key.
In this embodiment, a plurality of time information (i.e., a plurality of preset time information) in a system redundancy time period of the last time information of the vehicle end may be acquired first, where a time range of the plurality of preset time information may be [ T- Δt, t+Δt ], where T is the last time information, and Δt is the system redundancy time period and may be set according to an empirical value.
The plurality of preset keys may be generated according to the first key, the second key, and the plurality of preset time information. The algorithm for generating the plurality of preset keys is as described above, and will not be described herein.
The sixth key sent by the first terminal may be received, and the sixth key may be generated according to the first key, the second key, and the previous time information of the first terminal, where a generation algorithm of the sixth key is consistent with a generation algorithm of the plurality of preset keys.
The sixth key may be compared with a plurality of preset keys, a target key that matches the sixth key may be determined, and error time information may be determined according to preset time information corresponding to the target key. For example, a difference between preset time information corresponding to the target key and previous time information of the vehicle end may be determined as the error time information.
Therefore, the sixth key can be matched with a plurality of preset keys before the real-time key is generated, so that error time information is obtained through testing, the accuracy of the error time information is guaranteed, the accuracy of the subsequent real-time key generation is improved, and the success rate of vehicle unlocking is improved.
Based on the vehicle unlocking method provided by the embodiment, the application also provides an embodiment of a vehicle end.
Fig. 3 shows a schematic structural diagram of a vehicle end according to another embodiment of the present application, and for convenience of explanation, only a portion related to the embodiment of the present application is shown.
Referring to fig. 3, the vehicle end 300 includes:
the acquiring module 301 is configured to acquire a first key corresponding to the first terminal and a second key corresponding to the vehicle end when the first terminal is registered at the vehicle end and an unlocking request of the first terminal is received;
the generating module 302 is configured to generate a real-time key according to the first key, the second key, and the first current time information of the vehicle end;
a receiving module 303, configured to receive an unlock key sent by the first terminal, where the unlock key is generated according to the first key, the second key, and second current time information of the first terminal;
and the unlocking module 304 is configured to pass the unlocking request when the real-time key matches with the unlocking key.
In some embodiments, the generation module 302 may also be configured to:
carrying out hash operation on the second secret key and the first current time information of the vehicle end to generate a third secret key;
synthesizing an authentication key according to the third key and the first key;
and carrying out hash operation on the verification key and the first current time information to generate a real-time key.
In some embodiments, the generation module 302 may also be configured to:
carrying out hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
performing hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
wherein the first time level information is greater than the second time level information.
In some embodiments, the receiving module 303 may also be configured to:
receiving an unlocking request of a second terminal, wherein the unlocking request of the second terminal carries a sharing key, the sharing key is synthesized by the second terminal according to a fourth key and a first key which are shared by the first terminal, the fifth key and second time-level information corresponding to third current time information of the second terminal are subjected to hash operation generation, the fourth key is generated based on hash operation of the second key and first time-level information corresponding to a key sharing time period, and the key sharing time period is determined based on the sharing operation received by the first terminal;
the acquisition module 301 may also be configured to: acquiring a first key corresponding to a first terminal and a second key corresponding to a vehicle end;
the generation module 302 may also be configured to:
carrying out hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
synthesizing an authentication key according to the third key and the first key;
performing hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
the unlocking module 304 may also be used to: and in the case that the real-time key is matched with the sharing key, passing the unlocking request.
In some embodiments, the generation module 302 may also be configured to:
and generating a real-time key according to the first key, the second key, the first current time information of the vehicle end and the error time information.
In some embodiments, the generation module 302 may also be configured to: generating a plurality of preset keys according to the first key, the second key and a plurality of preset time information, wherein the plurality of preset time information is time information in a system redundancy time period of the last time information of the vehicle end;
the receiving module 303 may also be configured to: receiving a sixth key sent by the first terminal, wherein the sixth key is generated according to the first key, the second key and the last time information of the first terminal;
the vehicle end 300 may further include a determination module, which may be configured to:
matching the sixth key with a plurality of preset keys to determine a target key, wherein the target key is a preset key matched with the sixth key in the preset keys;
and determining error time information according to preset time information corresponding to the target key.
It should be noted that, based on the same concept as the embodiment of the method of the present application, the content of information interaction and execution process between the above devices/units is a device corresponding to the vehicle unlocking method, and all implementation manners in the above method embodiment are applicable to the embodiment of the device, and specific functions and technical effects thereof may be referred to the method embodiment section, and are not repeated herein.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
Fig. 4 shows a schematic hardware structure of an electronic device according to another embodiment of the present application.
The device may include a processor 401 and a memory 402 in which programs or instructions are stored.
The steps of any of the various method embodiments described above are implemented when the processor 401 executes a program.
For example, a program may be divided into one or more modules/units, which are stored in the memory 402 and executed by the processor 401 to complete the present application. One or more of the modules/units may be a series of program instruction segments capable of performing specific functions to describe the execution of the program in the device.
In particular, the processor 401 described above may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more integrated circuits of embodiments of the present application.
Memory 402 may include mass storage for data or instructions. By way of example, and not limitation, memory 402 may comprise a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the foregoing. Memory 402 may include removable or non-removable (or fixed) media, where appropriate. Memory 402 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 402 is a non-volatile solid state memory.
The memory may include Read Only Memory (ROM), random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory includes one or more tangible (non-transitory) machine-readable storage media (e.g., memory devices) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors) it is operable to perform the operations described with reference to methods in accordance with aspects of the present disclosure.
The processor 401 implements any of the methods of the above embodiments by reading and executing programs or instructions stored in the memory 402.
In one example, the electronic device may also include a communication interface 403 and a bus 404. The processor 401, the memory 402, and the communication interface 403 are connected to each other by a bus 404 and perform communication with each other.
The communication interface 403 is mainly used to implement communication between each module, device, unit and/or apparatus in the embodiments of the present application.
Bus 404 includes hardware, software, or both, coupling the components of the online data flow billing device to each other. By way of example, and not limitation, the buses may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a micro channel architecture (MCa) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus, or a combination of two or more of the above. Bus 404 may include one or more buses, where appropriate. Although embodiments of the present application describe and illustrate a particular bus, the present application contemplates any suitable bus or interconnect.
Additionally, in connection with the methods of the above-described embodiments, embodiments of the present application may be provided with a machine-readable storage medium. The machine-readable storage medium having stored thereon a program or instructions; the program or instructions, when executed by a processor, implement any of the methods of the embodiments described above. The machine-readable storage medium may be read by a machine such as a computer.
The embodiment of the application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled with the processor, and the processor is used for running a program or an instruction, implementing each process of the above method embodiment, and achieving the same technical effect, so as to avoid repetition, and not repeated here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
Embodiments of the present application provide a computer program product stored in a machine-readable storage medium, where the program product is executed by at least one processor to implement the respective processes of the above method embodiments, and achieve the same technical effects, and for avoiding repetition, a detailed description is omitted herein.
It should be clear that the present application is not limited to the particular arrangements and processes described above and illustrated in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions, or change the order between steps, after appreciating the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented in hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine readable medium or transmitted over transmission media or communication links by a data signal carried in a carrier wave. A "machine-readable medium" may include any medium that can store or transfer information. Examples of machine-readable media include electronic circuitry, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and the like. The code segments may be downloaded via computer grids such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be different from the order in the embodiments, or several steps may be performed simultaneously.
Aspects of the present disclosure are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer programs or instructions. These programs or instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to being, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware which performs the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In the foregoing, only the specific embodiments of the present application are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, which are intended to be included in the scope of the present application.

Claims (10)

1. A vehicle unlocking method applied to a vehicle end, comprising the following steps:
under the condition that a first terminal is registered at the vehicle end and an unlocking request of the first terminal is received 5, a first key corresponding to the first terminal and a second key corresponding to the vehicle end are obtained;
generating a real-time key according to the first key, the second key and the first current time information of the vehicle end;
receiving an unlocking key sent by the first terminal, wherein the unlocking key is generated according to the first key, the second key and second current time information of the first terminal;
and 0 passing the unlocking request under the condition that the real-time key is matched with the unlocking key.
2. The method of claim 1, wherein the generating a real-time key from the first key, the second key, and the first current time information of the vehicle side comprises:
performing hash operation on the second key and the first current moment information of the vehicle end to generate a third key;
5 synthesizing an authentication key according to the third key and the first key;
and carrying out hash operation on the verification key and the first current time information to generate a real-time key.
3. The method of claim 2, wherein the hashing the second key and the first current time information of the vehicle end to generate a third key includes: 0, carrying out hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
the hash operation is performed on the verification key and the first current time information to generate a real-time key, which comprises the following steps:
performing 5 hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
wherein the first time level information is greater than the second time level information.
4. A method according to claim 3, characterized in that the method further comprises:
receiving an unlocking request of a second terminal, wherein the unlocking request of the second terminal carries a sharing key, the sharing key is synthesized by the second terminal according to a fourth key shared by the first terminal and the first key, the fifth key and second time-level information corresponding to third current time information of the second terminal are generated through hash operation, the fourth key is generated through hash operation based on the second key and first time-level information corresponding to a key sharing time period, and the key sharing time period is determined based on the sharing operation received by the first terminal;
acquiring a first key corresponding to the first terminal and a second key corresponding to the vehicle end;
performing hash operation on the second key and first time level information corresponding to the first current time information to generate a third key;
synthesizing an authentication key according to the third key and the first key;
performing hash operation on the verification key and second time-level information corresponding to the first current time information to generate a real-time key;
and under the condition that the real-time key is matched with the sharing key, passing the unlocking request.
5. The method of claim 1, wherein the generating a real-time key from the first key, the second key, and the first current time information of the vehicle side comprises:
and generating a real-time key according to the first key, the second key, the first current time information of the vehicle end and the error time information.
6. The method of claim 5, wherein before generating the real-time key based on the first key, the second key, the first current time of day information of the vehicle side, and the error time information, the method further comprises:
generating a plurality of preset keys according to the first key, the second key and a plurality of preset time information, wherein the plurality of preset time information is time information in a system redundancy time period of the last time information of the vehicle end;
receiving a sixth key sent by the first terminal, wherein the sixth key is generated according to the first key, the second key and the last time information of the first terminal;
matching the sixth key with the preset keys to determine a target key, wherein the target key is a preset key matched with the sixth key in the preset keys;
and determining error time information according to the preset time information corresponding to the target key.
7. A vehicle end, comprising:
the acquisition module is used for acquiring a first key corresponding to the first terminal and a second key corresponding to the vehicle end under the condition that the first terminal is registered in the vehicle end and an unlocking request of the first terminal is received;
the generation module is used for generating a real-time key according to the first key, the second key and the first current moment information of the vehicle end;
the receiving module is used for receiving an unlocking key sent by the first terminal, and the unlocking key is generated according to the first key, the second key and second current time information of the first terminal;
and the unlocking module is used for passing the unlocking request under the condition that the real-time key is matched with the unlocking key.
8. A vehicle, characterized in that the vehicle comprises a vehicle end, wherein the vehicle end is adapted to implement the method according to any one of claims 1-6.
9. An electronic device, the device comprising: a processor and a memory storing a program or instructions;
the processor, when executing the program or instructions, implements the method of any one of claims 1-6.
10. A machine-readable storage medium having stored thereon a program or instructions which, when executed by a processor, implement the method of any of claims 1-6.
CN202211695395.2A 2022-12-28 2022-12-28 Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium Pending CN116416717A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211695395.2A CN116416717A (en) 2022-12-28 2022-12-28 Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211695395.2A CN116416717A (en) 2022-12-28 2022-12-28 Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN116416717A true CN116416717A (en) 2023-07-11

Family

ID=87052163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211695395.2A Pending CN116416717A (en) 2022-12-28 2022-12-28 Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN116416717A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117424703A (en) * 2023-11-14 2024-01-19 北京清远博创科技有限公司 Secure communication method and platform

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117424703A (en) * 2023-11-14 2024-01-19 北京清远博创科技有限公司 Secure communication method and platform

Similar Documents

Publication Publication Date Title
CN112084234B (en) Data acquisition method, device, equipment and medium
CN113569267B (en) Privacy safety data set intersection method, device, equipment and storage medium
CN116416717A (en) Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium
CN112084527A (en) Data storage and acquisition method, device, equipment and medium
CN116684156A (en) Password-free login authentication method, device, equipment, medium and product
CN115829572A (en) Cross-chain data interaction method, device, equipment, medium and product
CN115906188A (en) Electronic signature file verification method, device and equipment and computer storage medium
CN114386075A (en) Data transmission channel establishing method, data transmission device, data transmission equipment and medium
CN117811816A (en) Information protection method, apparatus, device, medium and computer program product
CN116527758B (en) Method, device, equipment, storage medium and product for generating universal identifier
CN117633586A (en) Device response signal acquisition method, system, device and storage medium
CN115225293B (en) Authentication method, system, device, equipment and computer storage medium
CN114070551B (en) Dynamic password generation method, authorization method, device, equipment and storage medium
CN114708109B (en) Risk recognition model training method, device, equipment and storage medium
CN116777626A (en) Business transaction method, device, equipment, storage medium and program product
CN112115425B (en) Software authorization permission method and device and electronic equipment
CN113553559B (en) Unlocking method, device, equipment and computer storage medium
CN116305246A (en) Data processing method, apparatus, device, storage medium, and program product
CN116095682A (en) Certificate injection method, device, terminal and computer storage medium
CN116797334A (en) Refund method, device and system of stored value card
CN114661993A (en) Information query method, device, equipment and computer readable storage medium
CN117635295A (en) Method, device, equipment, medium and product for exchanging resource exchanging files
CN115983856A (en) Shield testing method, device, equipment and computer storage medium
CN116303337A (en) Data migration method, device, equipment and computer storage medium
CN115907431A (en) Method, device and equipment for determining approval authority based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination