CN116612555A - Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium - Google Patents

Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium Download PDF

Info

Publication number
CN116612555A
CN116612555A CN202310237283.0A CN202310237283A CN116612555A CN 116612555 A CN116612555 A CN 116612555A CN 202310237283 A CN202310237283 A CN 202310237283A CN 116612555 A CN116612555 A CN 116612555A
Authority
CN
China
Prior art keywords
digital key
unlocking
vehicle
operation data
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310237283.0A
Other languages
Chinese (zh)
Inventor
熊伟
胡飞
陈先通
单宏寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Yinji Information Security Technology Co ltd
Original Assignee
Guangdong Yinji Information Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Yinji Information Security Technology Co ltd filed Critical Guangdong Yinji Information Security Technology Co ltd
Priority to CN202310237283.0A priority Critical patent/CN116612555A/en
Publication of CN116612555A publication Critical patent/CN116612555A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0841Registering performance data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application relates to the technical field of vehicle safety, and discloses a digital key abuse prevention unlocking method and device, intelligent equipment and storage medium. The method includes obtaining digital key operation data and vehicle status; judging whether target unlocking operation meeting unlocking condition is existed or not according to the digital key operation data and the vehicle state; if yes, the digital key is forbidden according to a preset strategy. According to the embodiment of the application, the digital key is forbidden when the unlocking abusive condition is detected, so that the unlocking abusive problem of the digital key can be effectively avoided, and unnecessary feeding of the vehicle is prevented.

Description

Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of vehicle safety, in particular to a digital key abuse prevention unlocking method and device, intelligent equipment and storage medium.
Background
With the development of technology, keyless entry and start (Passive Entry Passive Start, abbreviated as PEPS) systems have been used in various fields due to their high security and convenience. At present, PEPS systems have been widely used in the automotive field to achieve keyless entry into the automobile and keyless start of the automobile. The PEPS system relies on a digital key in an intelligent terminal carried by a user to realize identity authentication, the intelligent terminal can be automatically unlocked when the digital key is successfully authenticated and enters an unlocking distance range of the vehicle end, and the vehicle end can be automatically locked when the intelligent terminal is far away from the vehicle end and exceeds a locking distance range of the vehicle end.
With the rapid popularization of the application of the digital key in new energy vehicles and traditional vehicles, the digital key brings good experience of safe and convenient vehicles to users. However, the inventor of the present application has found that while the present digital key provides convenience, there are cases of unlocking abuses, such as when the digital key end moves back and forth in the vicinity of the vehicle, the unlocking operation is frequently triggered, causing the vehicle to be unnecessarily fed.
Disclosure of Invention
The embodiment of the application provides a method and a device for preventing a digital key from being unlocked abusively, intelligent equipment and a storage medium, which are used for solving the existing problem of unlocking the digital key abusively and preventing a vehicle from being fed unnecessarily.
In a first aspect, an embodiment of the present application provides a method for preventing a digital key from being unlocked, which is applied to a digital key end, and the method includes:
acquiring digital key operation data and a vehicle state;
judging whether a target unlocking operation meeting a abusive unlocking condition exists or not according to the digital key operation data and the vehicle state;
if yes, the digital key is forbidden according to a preset strategy.
In addition, the determining whether there is a target unlocking operation satisfying a unlock-abuse condition according to the digital key operation data and the vehicle state includes:
if the number of unlocking operations corresponding to the digital key operation data is greater than N times, the average unlocking time interval of the unlocking operations corresponding to the digital key operation data is smaller than a first threshold, and the vehicle state indicates that the vehicle door is not opened within the time corresponding to the digital key operation data, determining that the target unlocking operation is met; n is a natural number greater than 1.
In addition, the disabling the digital key according to the preset policy includes any one of the following:
if the target unlocking operation is detected, controlling the digital key to be disabled for a preset time period;
if the target unlocking operation is detected, controlling the forbidden duration of the digital key to be increased along with the increase of the times of the target unlocking operation; or alternatively
And if the target unlocking operation is detected, controlling the forbidden duration of the digital key to be reduced along with the increase of the times of the target unlocking operation.
In addition, the method further comprises:
before controlling the disabled duration of the digital key to increase with the increase in the number of target unlocking operations, the method further includes:
detecting that the average unlocking time interval of the unlocking operation corresponding to the digital key operation data is smaller than a second threshold value;
before controlling the disabled duration of the digital key to decrease with the increase of the number of target unlocking operations, further comprising:
detecting that the average unlocking time interval of the unlocking operation corresponding to the digital key operation data is larger than or equal to a second threshold value; wherein the second threshold is less than the first threshold.
In addition, the disabling the digital key according to the preset policy includes:
and disabling the digital key and monitoring whether a digital key enabling condition is detected, and if so, enabling the digital key.
In addition, monitoring whether a digital key enabling condition is detected includes:
and monitoring the speed information of the key end and judging whether the speed change of the key end is larger than a change threshold value, if the speed change of the key end is larger than the change threshold value and the time that the key end is kept in a preset unlocking range is larger than a stay threshold value, determining that a digital key starting condition exists.
In addition, the method further comprises:
after disabling the digital key, pushing the digital key disable message.
In a second aspect, an embodiment of the present application provides a device for preventing a digital key from being unlocked, configured at a digital key end, where the device includes:
the data acquisition module is used for acquiring digital key operation data and vehicle states;
the judging module is used for judging whether target unlocking operation meeting the unlocking condition exists or not according to the digital key operation data and the vehicle state;
and the execution module is used for disabling the digital key according to a preset strategy if the judgment module judges that the target unlocking operation exists.
In a third aspect, an embodiment of the present application provides an intelligent device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the method for preventing unlocking a digital key according to the first aspect when executing the program.
In a fourth aspect, an embodiment of the present application provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the digital key abuse prevention unlocking method according to the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has at least the following positive effects:
according to the digital key abuse-resistant unlocking method, whether target unlocking operation meeting the abuse unlocking condition exists or not is judged according to the digital key operation data and the vehicle state, and when the abuse unlocking condition exists, the digital key is forbidden according to the preset strategy, so that vehicle feeding caused by frequent unlocking of a vehicle due to abuse of the digital key function can be avoided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a method for preventing unlocking a digital key according to a first embodiment of the present application;
fig. 2 is a schematic structural diagram of a digital key abuse-preventing unlocking device according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of an intelligent device according to a third embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present application are shown in the drawings.
Example 1
Fig. 1 is a flowchart of a method for preventing unlocking of a digital key according to an embodiment of the present application. The digital key end can be a portable intelligent terminal provided with the digital key APP, and the portable intelligent terminal comprises a smart phone, a smart watch and the like, wherein the smart terminal is used for enabling a user to enter an unlocking range by carrying the digital key end, so that automatic unlocking of a vehicle can be achieved, and the user leaves the unlocking range after leaving the vehicle, so that automatic locking of the vehicle can be achieved. The method can be executed by the digital key abuse-preventing unlocking device provided by the embodiment of the application, and the device can be realized in a software mode and is configured at the digital key end. The embodiment of the application specifically comprises the following steps:
step 101, acquiring digital key operation data and vehicle states.
The digital key operation data may include an unlock command, a lock command, and a time corresponding to the unlock command and the lock command, which are generated when the digital key APP interacts with the vehicle end. The vehicle status may include status data of the vehicle when the digital key fob interacts with the vehicle, including, but not limited to, door opening information, door closing information, and status of the tailgate opening information, tailgate closing information, and other body components, etc., without specific limitation herein. The unlocking instruction and the locking instruction can be directly generated by the digital key end or can be generated by the vehicle and then sent to the digital key end. The method of the present embodiment may be enabled simultaneously with the digital key APP and may exit after a vehicle start is detected.
Step 102: and judging whether a target unlocking operation meeting the unlocking condition exists or not according to the digital key operation data and the vehicle state.
The unlocking abuse is an unlocking operation which is generated when the user does not have the intention of actually using the vehicle. The unlocking abuse condition is, for example, an unlocking operation generated when the user rests in the unlocking distance range of the vehicle or an unlocking operation generated when the user moves back and forth in the vicinity of the vehicle. Some cases are unlocking operations caused by unintentional back and forth movement of a user, and other cases are unlocking operations caused by intentional play of a digital key by an owner without authorization. The digital key end can be provided with an unlocking abusive condition for identifying the unlocking abusive condition, so that the target unlocking operation meeting the unlocking abusive condition is automatically identified.
For example, determining whether there is a target unlocking operation satisfying the unlock-abuse condition based on the digital key operation data and the vehicle state may include: if the number of unlocking operations corresponding to the digital key operation data is greater than N times, the average unlocking time interval of the unlocking operations corresponding to the digital key operation data is smaller than a first threshold, and the vehicle state indicates that the vehicle door is not opened within the time corresponding to the digital key operation data, then the target unlocking operation is determined to be met. N is a natural number greater than 1. N is, for example, 3.
The digital key operation data may be digital key operation data generated during a connection process between the digital key end and the vehicle, for example, after the digital key end establishes a short-range communication connection with the vehicle, such as a bluetooth connection, the digital key end and the vehicle maintain the bluetooth connection, i.e., when the user moves near the vehicle, the distance between the digital key end and the vehicle is always within the bluetooth connection distance range. The digital key operation data comprise unlocking times, locking times, unlocking time, locking time and the like of the digital key in the connection. The digital key operation data may also be digital key operation data generated during a plurality of connection processes between the digital key end and the vehicle, for example, after the digital key end is connected to the vehicle by bluetooth, an unlocking command is generated, after that, the digital key end is disconnected from the vehicle briefly and then is connected again, and an unlocking command is also generated. For example, a user carrying a key fob may be moved away from the vehicle beyond the distance of connection of the digital key fob to the vehicle when the user is in the vicinity of the vehicle, thereby disconnecting the digital key fob from the bluetooth connection of the vehicle, but then quickly connecting. Therefore, the unlocking times contained in the digital key operation data can be unlocking times generated in one Bluetooth connection process or unlocking times generated in a plurality of Bluetooth connection processes. The first threshold is used to distinguish between a normally unlocked time interval and a abused unlocked time interval. Accordingly, the first threshold may be set for one connection and multiple connections, respectively, or may be set uniformly. By way of example and not limitation, the first threshold may be uniformly set to 2 minutes.
When the user walks around the vehicle with the digital key end, the unlocking operation is triggered continuously for 4 times, the average unlocking time interval is less than 2 minutes, and the vehicle door is not opened in the unlocking operation process for a plurality of times, so that the situation of abusive unlocking can be judged. The multiple unlocking operations corresponding to the digital key operation data may be unlocking operations in unlocking operations when the key end moves back and forth, or may be multiple unlocking operations when the key end stays in an unlocking range, which is not particularly limited herein.
Step 103: and disabling the digital key according to a preset strategy.
The digital key is disabled temporarily, namely the digital key is enabled to sleep temporarily, so that an unlocking instruction can not be generated when the digital key end moves nearby a vehicle, the situation of unlocking abused can be prevented from continuously occurring, and vehicle feeding caused by frequent unlocking of the vehicle can be avoided. After the vehicle is unlocked, the vehicle ECU (Electronic Control Unit, electronic control unit, ECU for short) enters the working mode from the dormant mode, the power consumption of the vehicle ECU in the dormant state is generally tens of milliamperes, the power consumption of the vehicle ECU in the working mode is generally hundreds of milliamperes, and the power consumption of the vehicle ECU in the working mode is tens of times of the power consumption of the vehicle ECU in the dormant mode. Therefore, if the vehicle is frequently fed due to unlocking abuse, a large amount of electricity is wasted, and normal use of the vehicle may be affected.
Illustratively, disabling the digital key according to the preset policy may include: if the target unlocking operation is detected, the digital key is controlled to be forbidden for a preset time, namely, the unlocking instruction is forbidden to be generated between the digital key APP and the vehicle, and abnormal feeding of the vehicle can be avoided because the unlocking instruction is not generated any more. The preset time period is, for example, 30 minutes, that is, 30 minutes after each detection of the target unlocking operation, the digital key is automatically disabled, so that more unlocking operations which are not intended for the vehicle and may occur in the digital key enabled state are prevented.
As an alternative to the above-described disabling digital key strategy, disabling the digital key according to the preset strategy may include: if the target unlocking operation is detected, the disabling time length of the digital key is controlled to be increased along with the increase of the target unlocking operation, namely, the disabling time length of the digital key is also accumulated along with the increase of the target unlocking operation. For example, the time period for disabling the digital key is 30 minutes when the target unlocking operation is detected for the first time, 60 minutes when the target unlocking operation is detected for the second time, and 120 minutes when the target unlocking operation is detected for the third time. It will be appreciated that the digital key disabling time periods may be uniformly accumulated, or may be uniformly accumulated, without specific limitation.
As an alternative to the above-described disabling digital key strategy, disabling the digital key according to the preset strategy may include: if the target unlocking operation is detected, the disabling time of the digital key is controlled to be reduced along with the increase of the times of the target unlocking operation. For example, the time period for disabling the digital key is 30 minutes when the target unlocking operation is detected for the first time, 20 minutes when the target unlocking operation is detected for the second time, and 10 minutes when the target unlocking operation is detected for the third time. It will be appreciated that the digital key disabling time period may be uniformly or unevenly shortened, and is not particularly limited herein.
It should be noted that, before the disabling time period of the digital key is controlled to increase with the increase of the number of target unlocking operations, the method for preventing unlocking the digital key according to the embodiment may further include: and when the average unlocking time interval of the unlocking operation corresponding to the digital key operation data is detected to be smaller than a second threshold value, controlling the forbidden duration of the digital key to be increased along with the increase of the number of target unlocking operations. The method may further include, before controlling the disable time period of the digital key to decrease with an increase in the number of target unlocking operations: the average unlocking time interval of the unlocking operation corresponding to the digital key operation data is detected to be larger than or equal to a second threshold value, namely the disabling time length of the digital key is controlled to be reduced along with the increase of the number of target unlocking operations when the average unlocking time interval of the unlocking operation corresponding to the digital key operation data is detected to be larger than or equal to the second threshold value. Wherein the second threshold is less than the first threshold. The second threshold may be used to distinguish between instances of human play with a digital key and instances of abuse unlocking caused by unintended ambulation, and a more stringent digital key disabling policy for the former and a more flexible digital key disabling policy for the latter. For example, the value of the second threshold may be 30 seconds, when the average time interval of the multiple unlocking operations corresponding to each target unlocking operation is less than 30 seconds, the digital key disabling time is gradually increased, and when the average time interval of the multiple unlocking operations corresponding to each target unlocking operation is greater than or equal to 30 seconds, the digital key disabling time is gradually reduced. By analyzing and judging the average unlocking time interval, different abusive unlocking conditions can be judged, corresponding digital key disabling strategies can be adopted respectively, the digital key can be well prevented from being abused by people, and the limitation of too long digital key can be avoided when the digital key is unconsciously abused.
It should be noted that, the method for preventing unlocking the digital key in the foregoing embodiment may further include: after disabling the digital key, a digital key disable message is pushed. Wherein the pushed digital key disabling message may include: the time period for disabling, such as by detecting an indeterminate frequent unlock, disables the digital key for 30 minutes. So that the user can know the running condition of the digital key in time. The user can actively open the digital key APP for unlocking during the digital key disabling.
In the foregoing embodiment, the disabling time is preset in the case of disabling the digital key according to the preset policy, the digital key is automatically enabled after the disabling time is reached, normal use of the digital key is restored, the key end and the vehicle end need to be authenticated again when the digital key APP is restored, and the corresponding unlocking operation is executed after the authentication is passed. As an alternative to the foregoing embodiment, disabling the digital key according to the preset policy may include: and disabling the digital key and monitoring whether a digital key enabling condition is detected, and if so, enabling the digital key.
Monitoring whether a digital key enabling condition is detected may include: and monitoring the speed information of the key end and judging whether the speed change of the key end is larger than a change threshold value, and if the speed change of the key end is larger than the change threshold value and the time that the key end is kept in a preset unlocking range is larger than a stay threshold value, determining that a digital key starting condition exists. Determining whether the rate change of the key end is greater than a change threshold may include: and monitoring the average speed of the key end and the speed of the key end in the latest preset period, calculating the ratio of the speed in the latest preset period to the average speed, and if the ratio is larger than the preset ratio, determining that the speed change of the key end is larger than a change threshold. The preset ratio may be 1.3 or 1.5, etc., and is not particularly limited herein. The dwell threshold is, for example, 2 seconds or 3 seconds, etc. That is, when the user carries the digital key end to move at a significantly increased speed and stays in the unlocking range of the vehicle for a longer time, the user can analyze and judge that the intention of the vehicle is present, and at the moment, the digital key APP can be immediately started, so that the digital key end and the vehicle are connected in Bluetooth and are automatically unlocked.
Compared with the prior art, the digital key abuse-resistant unlocking method provided by the embodiment of the application has the advantages that whether the target unlocking operation meeting the abuse unlocking condition exists is judged through analysis of the acquired digital key operation data and the vehicle state, and the digital key is forbidden according to different strategies when the abuse unlocking condition occurs, so that the abuse unlocking condition can be effectively prevented, and unnecessary feeding of the vehicle is avoided.
Example two
The second embodiment of the application provides a digital key abuse-preventing unlocking device which is configured at a key end. As shown in fig. 2, the digital key abuse prevention unlocking device includes: a data acquisition module 201, a judgment module 202 and an execution module 203.
The data acquisition module 201 is used to acquire digital key operation data and vehicle status.
The judging module 202 is configured to judge whether a target unlocking operation that satisfies a condition of unlocking abuse exists according to the digital key operation data and the vehicle state.
The execution module 203 is configured to disable the digital key according to a preset policy if the determination module determines that the target unlocking operation exists.
Optionally, the judging module 202 is specifically configured to determine that the target unlocking operation is satisfied if the number of unlocking operations corresponding to the digital key operation data is greater than N and the average unlocking time interval of the unlocking operations corresponding to the digital key operation data is less than a first threshold, and the vehicle state indicates that the vehicle door is not opened within the time corresponding to the digital key operation data; n is a natural number greater than 1.
Optionally, the executing module 203 is specifically configured to control the digital key to disable for a preset period of time if the target unlocking operation is detected; or if the target unlocking operation is detected, controlling the forbidden duration of the digital key to be increased along with the increase of the times of the target unlocking operation; or if the target unlocking operation is detected, controlling the forbidden duration of the digital key to decrease along with the increase of the times of the target unlocking operation.
Further, the execution module 203 is configured to control, when detecting that the average unlock time interval of the unlock operation corresponding to the digital key operation data is smaller than the second threshold, before the disable duration of the digital key increases with the increase of the number of target unlock operations; and/or the execution module 203 is configured to control the disable duration of the digital key to decrease with an increase in the number of target unlocking operations when the average unlocking time interval of the unlocking operations corresponding to the digital key operation data is detected to be greater than or equal to the second threshold; wherein the second threshold is less than the first threshold.
As an alternative, the execution module 203 may also be configured to disable the digital key and monitor whether a digital key enable condition is detected, and if so, enable the digital key.
The execution module 203 may be further configured to monitor rate information of the key end and determine whether a rate change of the key end is greater than a change threshold, and if the rate change of the key end is greater than the change threshold and a time that the key end remains in a preset unlocking range is greater than a stay threshold, determine that a digital key enabling condition exists.
Optionally, the digital key abuse prevention unlocking device may further comprise a pushing module for pushing the digital key disable message after disabling the digital key.
The digital key anti-abusive unlocking device provided by the embodiment can execute the digital key anti-abusive unlocking method provided by the embodiment of the method, and has the corresponding functional modules and beneficial effects of the execution method. The implementation principle and technical effect of the present embodiment are similar to those of the above method embodiment, and are not described here again.
Compared with the prior art, the digital key abuse-resistant unlocking device provided by the embodiment judges whether target unlocking operation meeting the abuse unlocking condition exists or not through analysis of the acquired digital key operation data and the vehicle state, and disables the digital key according to different strategies when the abuse unlocking condition occurs, so that the abuse unlocking condition can be effectively prevented, and unnecessary feeding of the vehicle is avoided.
Example III
Fig. 3 is a schematic structural diagram of an intelligent device according to a third embodiment of the present application. The smart device 30 comprises a memory 31, a processor 32 and a computer program stored in the memory 32 and executable on the processor 32, wherein the processor 32 implements the technical solution according to the first embodiment when executing the program.
Example IV
A fourth embodiment of the present application provides a computer-readable storage medium having stored thereon a computer program for performing the technical solutions of any of the method embodiments when executed by a computer processor.
From the above description of embodiments, it will be clear to a person skilled in the art that the present application may be implemented by means of software and necessary general purpose hardware, but of course also by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, etc., comprising instructions for causing a computer device (which may be a personal computer, a server, a grid device, etc.) to execute the method according to the embodiments of the present application
It should be noted that, in the embodiment of the apparatus, each unit and module included are only divided according to the functional logic, but not limited to the above-mentioned division, so long as the corresponding function can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present application.
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the application, which is set forth in the following claims.

Claims (10)

1. A method for preventing a digital key from being unlocked abusive, which is applied to a digital key terminal, the method comprising:
acquiring digital key operation data and a vehicle state;
judging whether a target unlocking operation meeting a abusive unlocking condition exists or not according to the digital key operation data and the vehicle state;
if yes, the digital key is forbidden according to a preset strategy.
2. The method for preventing unlocking a digital key according to claim 1, wherein the determining whether there is a target unlocking operation satisfying an unlocking condition based on the digital key operation data and a vehicle state comprises:
if the number of unlocking operations corresponding to the digital key operation data is greater than N times, the average unlocking time interval of the unlocking operations corresponding to the digital key operation data is smaller than a first threshold, and the vehicle state indicates that the vehicle door is not opened within the time corresponding to the digital key operation data, determining that the target unlocking operation is met; n is a natural number greater than 1.
3. The method of claim 2, wherein disabling the digital key according to a predetermined policy comprises any one of:
if the target unlocking operation is detected, controlling the digital key to be disabled for a preset time period;
if the target unlocking operation is detected, controlling the forbidden duration of the digital key to be increased along with the increase of the times of the target unlocking operation; or alternatively
And if the target unlocking operation is detected, controlling the forbidden duration of the digital key to be reduced along with the increase of the times of the target unlocking operation.
4. A digital key abuse prevention unlocking method according to claim 3, further comprising:
before controlling the disabled duration of the digital key to increase with the increase in the number of target unlocking operations, the method further includes:
detecting that the average unlocking time interval of the unlocking operation corresponding to the digital key operation data is smaller than a second threshold value;
before controlling the disabled duration of the digital key to decrease with the increase of the number of target unlocking operations, further comprising:
detecting that the average unlocking time interval of the unlocking operation corresponding to the digital key operation data is larger than or equal to a second threshold value; wherein the second threshold is less than the first threshold.
5. The method of claim 1, wherein disabling the digital key according to a predetermined policy comprises:
and disabling the digital key and monitoring whether a digital key enabling condition is detected, and if so, enabling the digital key.
6. The method of claim 5, wherein monitoring whether a digital key enablement condition is detected comprises:
and monitoring the speed information of the key end and judging whether the speed change of the key end is larger than a change threshold value, if the speed change of the key end is larger than the change threshold value and the time that the key end is kept in a preset unlocking range is larger than a stay threshold value, determining that a digital key starting condition exists.
7. The digital key abuse prevention unlocking method of claim 1, further comprising:
after disabling the digital key, pushing the digital key disable message.
8. A digital key abuse prevention unlocking device, wherein the device is configured at a digital key end, the device comprising:
the data acquisition module is used for acquiring digital key operation data and vehicle states;
the judging module is used for judging whether target unlocking operation meeting the unlocking condition exists or not according to the digital key operation data and the vehicle state;
and the execution module is used for disabling the digital key according to a preset strategy if the judgment module judges that the target unlocking operation exists.
9. An intelligent device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the digital key abuse prevention unlocking method of any of claims 1-7 when the program is executed.
10. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements a digital key abuse prevention unlocking method according to any one of claims 1 to 7.
CN202310237283.0A 2023-03-13 2023-03-13 Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium Pending CN116612555A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310237283.0A CN116612555A (en) 2023-03-13 2023-03-13 Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310237283.0A CN116612555A (en) 2023-03-13 2023-03-13 Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116612555A true CN116612555A (en) 2023-08-18

Family

ID=87678822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310237283.0A Pending CN116612555A (en) 2023-03-13 2023-03-13 Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116612555A (en)

Similar Documents

Publication Publication Date Title
CN111422162B (en) Vehicle starting method and device based on digital key and terminal
CN105844749A (en) Mobile phone unlocking system and unlocking method for automobile
CN111645633A (en) Vehicle control method and device, vehicle and storage medium
US10121295B2 (en) System and method for accessing a vehicle
WO2023193778A1 (en) Vehicle traveling control method and apparatus, and electronic device
CN101746350A (en) Anti-theft system for construction machines
CN112061076B (en) Keyless control method and device for vehicle, vehicle and electronic equipment
CN114758432A (en) Progressive locking strategy and remote lock management interface for device-less vehicle access
RU2684814C2 (en) System for detecting vehicle door being ajar
CN111572495B (en) Vehicle control method, device, equipment, medium and vehicle
CN113978414A (en) Vehicle control method, device, storage medium and equipment
CN116612555A (en) Digital key abuse prevention unlocking method and device, intelligent equipment and storage medium
CN110194123A (en) Vehicle starting method and system, vehicle under a kind of no key status
CN109064281A (en) A kind of timesharing lease control method, system and the automobile of automobile
CN112373344A (en) Intelligent charging method, equipment, storage medium and device
CN113085780B (en) Anti-theft control method and device
DE102017122021A1 (en) Procedure for granting access to a vehicle and vehicle access system
CN115613907A (en) Door lock control method, door lock control system, electronic device, and storage medium
CN114643955B (en) Back door control method and system, electronic equipment and vehicle
CN111915774B (en) Remote intelligent assisted unlocking method and device
CN115230446A (en) Automobile tail door control method, device, equipment and storage medium
CN112158165B (en) Vehicle unlocking and quick starting method and system, vehicle and storage medium
CN113978415A (en) Vehicle door handle control method, control device and control equipment
CN108804771B (en) Discrete event system method for analyzing and designing human-computer interaction logic
CN117676777A (en) Vehicle Bluetooth control method, device and system and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination