CN116760867B - Digital car key creation method, device, storage medium and system - Google Patents

Digital car key creation method, device, storage medium and system Download PDF

Info

Publication number
CN116760867B
CN116760867B CN202311028935.6A CN202311028935A CN116760867B CN 116760867 B CN116760867 B CN 116760867B CN 202311028935 A CN202311028935 A CN 202311028935A CN 116760867 B CN116760867 B CN 116760867B
Authority
CN
China
Prior art keywords
car key
terminal
digital car
vehicle
combination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311028935.6A
Other languages
Chinese (zh)
Other versions
CN116760867A (en
Inventor
于凡
尚延民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Automobile Technology Co Ltd
Original Assignee
Xiaomi Automobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Automobile Technology Co Ltd filed Critical Xiaomi Automobile Technology Co Ltd
Priority to CN202311028935.6A priority Critical patent/CN116760867B/en
Publication of CN116760867A publication Critical patent/CN116760867A/en
Application granted granted Critical
Publication of CN116760867B publication Critical patent/CN116760867B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The disclosure relates to a method, a device, a storage medium and a system for creating a digital car key, which belong to the technical field of car keys, and the method applied to a first terminal comprises the following steps: determining, in response to an event that a digital car key is created between the first terminal and the first vehicle, whether the first terminal supports a public agreement of the digital car key; under the condition that the first terminal supports the public protocol, the first terminal and the first vehicle are used as a first combination, and whether the first combination is located in an abnormal list of the public protocol is determined; a digital car key between the first terminal and the first vehicle is created based on a private agreement of the digital car key, if the first combination is located on the abnormal list. Even the terminal supporting the public protocol can judge whether the digital car key can be successfully established by the public protocol through the abnormal list, and flexibly select the protocol for establishing the digital car key according to the judging result. Therefore, the success rate of the creation of the digital car key can be improved.

Description

Digital car key creation method, device, storage medium and system
Technical Field
The disclosure relates to the technical field of vehicle keys, and in particular relates to a method, a device, a storage medium and a system for creating a digital vehicle key.
Background
The terminal device as a car key is a popular technology in recent years, and this function is also called a digital car key. Unlike the conventional physical car key, the digital car key can realize the functions of opening a car door, starting a car and the like by integrating the car key function into the mobile terminal device. In order to use the digital car key, creation of the digital car key is required. In some scenarios, however, a situation may occur in which the digital car key cannot be successfully created for use, thereby affecting the car use experience of the user.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a method, an apparatus, a storage medium, and a system for creating a digital car key.
According to a first aspect of embodiments of the present disclosure, there is provided a method for creating a digital car key, applied to a first terminal, the method including:
determining, in response to an event that a digital car key is created between a first terminal and a first vehicle, whether the first terminal supports a public agreement of the digital car key;
in the case that the first terminal supports the public protocol, taking the first terminal and the first vehicle as a first combination, determining whether the first combination is in an abnormal list of the public protocol, wherein the abnormal list comprises a combination of digital car key abnormality created or used based on the public protocol, and the combination comprises a terminal and a vehicle;
Creating a digital car key between the first terminal and the first vehicle based on a private agreement of the digital car key, if the first combination is located in the list of anomalies.
According to a second aspect of embodiments of the present disclosure, there is provided a method for creating a digital car key, applied to a server, the server maintaining an abnormal list of public agreements of digital car keys, the abnormal list including a combination of creating or using digital car key abnormalities based on the public agreements, the combination including a terminal and a vehicle, the method including:
receiving a verification request sent by a first terminal, wherein the verification request is sent by the first terminal in the process of creating a digital car key between the first terminal and a first vehicle, the verification request comprises information of a first combination, the first combination comprises the first terminal and the first vehicle, and the information comprises a first type identifier of the first terminal and a second type identifier of the first vehicle;
verifying whether the first combination is positioned in the abnormal list according to the information to obtain a verification result;
sending the verification result to the first terminal;
Wherein, if the verification result characterizes that the first combination is located on the abnormal list, the first terminal creates the digital car key between the first terminal and the first vehicle based on the private protocol of the digital car key.
According to a third aspect of the embodiments of the present disclosure, there is provided a digital car key creation apparatus applied to a first terminal, the apparatus including:
a first determination module configured to determine whether a first terminal supports a public agreement of a digital car key in response to an event of creating the digital car key between the first terminal and a first vehicle;
a first execution module configured to take the first terminal and the first vehicle as a first combination if the first terminal supports the public protocol;
a second determination module configured to determine whether the first combination is in an anomaly list of the public protocol, the anomaly list including a combination of digital car key anomalies created or used based on the public protocol, the combination including a terminal and a vehicle;
a first creation module configured to create a digital car key between the first terminal and the first vehicle based on a private agreement of the digital car key if the first combination is located in the list of anomalies.
According to a fourth aspect of embodiments of the present disclosure, there is provided a digital car key creation apparatus applied to a server side maintaining an abnormal list of public agreements of digital car keys, the abnormal list including a combination of creating or using digital car key abnormalities based on the public agreements, the combination including a terminal and a vehicle, the apparatus including:
a first receiving module configured to receive a verification request transmitted by a first terminal, the verification request being transmitted by the first terminal in a process of creating a digital car key between the first terminal and a first vehicle, the verification request including information of a first combination including a first type identification of the first terminal and the first vehicle, the information including a second type identification of the first vehicle;
the first verification module is configured to verify whether the first combination is located in the abnormal list according to the information to obtain a verification result;
the first sending module is configured to send the verification result to the first terminal;
wherein, if the verification result characterizes that the first combination is located on the abnormal list, the first terminal creates the digital car key between the first terminal and the first vehicle based on the private protocol of the digital car key.
According to a fifth aspect of the embodiments of the present disclosure, there is provided a digital car key creation apparatus, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the steps of the method of any one of the first to second aspects.
According to a sixth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of any one of the first to second aspects.
According to a seventh aspect of embodiments of the present disclosure, there is provided a digital car key creation system, including a terminal configured to perform the steps of the method described in the first aspect and a server configured to perform the steps of the method described in the second aspect.
In the above scheme, the first terminal may determine whether the first terminal supports a public protocol of the digital car key in response to an event of creating the digital car key between the first terminal and the first vehicle. In the case of supporting a public protocol, a first terminal may take the first terminal and the first vehicle as a first combination and determine whether the first combination is in an abnormal list of the public protocol. In the case where the first combination is located in the anomaly list, a first terminal may create a digital car key between the first terminal and the first vehicle based on a private agreement of the digital car key.
Thus, by setting the abnormal list of the public protocol, the terminal can also detect whether the combination of the terminal and the vehicle is in the abnormal list when registering the digital car key. When the digital car key is in the abnormal list, the terminal can determine that the digital car key is difficult to establish through a public protocol, so that the digital car key can be established based on a private protocol, and the digital car key can be established smoothly. That is, even a terminal supporting a public protocol can determine whether or not it can successfully create a digital car key through the public protocol by itself through the abnormal list, and flexibly select a protocol for creating the digital car key according to the determination result. By the mode, the success rate of digital car key creation can be improved, and smooth use of the digital car key can be ensured.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating the creation of a digital car key according to an exemplary embodiment.
Fig. 2 is a flow chart illustrating a method of creating a digital car key according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating a method of creating a digital car key according to an exemplary embodiment.
Fig. 4 is a flowchart illustrating a method of creating a digital car key according to an exemplary embodiment.
FIG. 5 is a flow chart illustrating creation of a digital car key according to an exemplary embodiment.
Fig. 6 is a block diagram illustrating a digital car key creation apparatus according to an exemplary embodiment.
Fig. 7 is a block diagram illustrating a digital car key creation apparatus according to an exemplary embodiment.
Fig. 8 is a block diagram of a terminal 800, according to an example embodiment.
Fig. 9 is a block diagram illustrating a server 1900 according to an example embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Before introducing the method, the device, the storage medium and the system for creating the digital car key, the application scenario of each embodiment of the present disclosure will be described first.
The digital car key is a novel car key, and is different from the traditional physical car key, and the digital car key integrates the car key function in mobile terminal equipment, so that the functions of opening a car door, starting a car and the like can be realized.
Digital car key protocols can be classified into public protocols and private protocols. The public protocol may be CCC (Car Connectivity Consortium, internet of vehicles alliance) protocol, ICCOA (Intelligent Car Connectivity Open Alliance, intelligent car alliance open alliance) protocol, ICCE (Intelligent Car Connectivity Industry Ecosystem Alliance Digital Key System, intelligent car alliance digital car key system) protocol, etc. The private agreement may refer to a digital car key agreement that the car enterprise self-specifies.
The public agreement can store the related key of the digital car key in the terminal operating system. For a digital car key based on public protocols, whether a car enterprise APP (Application program) runs or not when a user uses the digital car key, a terminal operating system can control a car through a digital car key related key, so that the digital car key has better use experience. However, in order to implement a digital car key based on a public protocol, terminal manufacturers need to develop a terminal operating system to ensure that a specific type of terminal can support the public protocol.
The private agreement may store the digital car key related key in the car enterprise APP. For a digital car key based on a private protocol, because a terminal operating system does not have a digital car key related key capable of controlling a car, a user needs to ensure that a car enterprise APP is in an operating state when using the digital car key. In addition, because the digital car key based on the private protocol can be realized based on the car enterprise APP, no additional development is needed by terminal manufacturers.
It should be appreciated that the terminal may support one or more of a proprietary protocol and a public protocol. Thus, creation of the digital car key may be performed according to a protocol supported by the terminal. Fig. 1 is a flowchart of creating a digital car key according to an exemplary embodiment of the present disclosure, and referring to fig. 1, the creating process of the digital car key includes:
the vehicle holds mobile phone equipment and installs the vehicle enterprise APP on the mobile phone equipment. Thus, the vehicle owner can trigger the flow of digital vehicle key creation through the vehicle enterprise APP.
The vehicle enterprise APP tries to call a public protocol check interface of the mobile phone equipment operating system to determine whether the mobile phone equipment operating system supports the public protocol. It should be noted that, after the terminal manufacturer develops the public protocol of the digital car key for a terminal of a certain model, a public protocol checking interface which can be called by the car enterprise APP can be realized in the terminal operating system based on the specification of the public protocol. The vehicle enterprise APP can determine whether the terminal supports the public protocol by calling the public protocol checking interface.
If the mobile phone equipment operating system supports the public protocol, the public protocol checking interface returns a preset value, and the vehicle enterprise APP determines that the mobile phone equipment operating system supports the public protocol according to the preset value, and triggers the operating system to create the public protocol digital vehicle key.
If the operating system of the mobile phone equipment does not support the public protocol, the interface call fails or is wrong. The vehicle enterprise APP confirms that the mobile phone equipment operating system does not support the public protocol, and the step of creating the private protocol digital vehicle key is carried out in the vehicle enterprise APP.
However, in some scenarios, the terminal may support a public protocol, but when the terminal and a vehicle of a certain model are interconnected and intercommunicated, a situation may occur that a digital car key cannot be used due to a certain error, that is, a situation that "a digital car key joint tone of a terminal of a certain model and a digital car key of a certain vehicle model based on the public protocol is abnormal" exists. In this case, even if the user deletes the public agreement digital car key on the terminal and creates the digital car key again, the public agreement digital car key can still be created again because the car enterprise APP calls the public agreement check interface successfully. Eventually, the user is always unable to use the digital car key. Similarly, users of the same terminal model may face the same problems. Furthermore, in some scenarios, a digital car key may not be created based on a public agreement due to an error. At this time, the user cannot adjust to use the private protocol to create the digital car key, which eventually results in that the digital car key cannot be created all the time, and the user experience is affected.
For this reason, the present disclosure provides a method for creating a digital car key, which is applied to a first terminal, where the first terminal may be any terminal, such as a mobile phone, a tablet device, a wearable device, and the like. Fig. 2 is a flowchart illustrating a method for creating a digital car key according to an exemplary embodiment of the present disclosure, and referring to fig. 2, the method includes:
in step S21, in response to an event of creating a digital car key between the first terminal and the first vehicle, it is determined whether the first terminal supports a public agreement of the digital car key.
In an embodiment, the first terminal may determine an event triggering creation of a digital car key between the first terminal and the first vehicle upon receiving an instruction for instructing creation of a digital car key between the first terminal and the first vehicle.
In an embodiment, the first terminal may determine an event triggering creation of the digital car key between the first terminal and the first vehicle upon monitoring a user's operation for indicating creation of the digital car key between the first terminal and the first vehicle. These operations may be, for example, a click operation by a user on a control in the vehicle enterprise APP related to creating a vehicle key, a long press operation, and so on.
The first terminal may also respond to the event by determining whether the first terminal supports a public agreement for the digital car key. For example, the vehicle enterprise APP may invoke a public protocol check interface, and when the invocation returns to the set value successfully, determine that the first terminal supports the public protocol. When the call fails, it is determined that the first terminal does not support the public protocol.
In step S22, in the case where the first terminal supports the public protocol, the first terminal and the first vehicle are set as the first combination, and it is determined whether the first combination is located in an abnormal list of the public protocol.
The abnormal list comprises a combination of digital car key abnormality created or used based on public agreement, wherein the combination comprises a terminal and a vehicle.
For example, in some embodiments, determining whether the first combination is in an abnormal list of public protocols includes:
sending a verification request to a server, wherein the verification request comprises information of the first combination, the information comprises a first type identifier of the first terminal and a second type identifier of the first vehicle, the verification request is used for requesting the server to verify whether the first combination is located in an abnormal list of the public protocol, and the server maintains the abnormal list of the public protocol;
Receiving a verification result sent by the server;
and determining whether the first combination is in the abnormal list of the public protocol according to the verification result.
The service end can be a vehicle factory cloud service of a vehicle manufacturer, and the service end can be maintained with the abnormal list. For example, in some scenarios, the server may receive reports of after-market shops, users, and car key anomalies, and add terminals and vehicles that present digital car key anomalies created based on public agreements as a combination to the anomaly list. In addition, the server may add the terminal and the vehicle using public protocol digital car key abnormality as a combination to the abnormality list.
For example, the server may receive a message characterizing a digital car key anomaly, the message including a terminal and a vehicle that created or used the digital car key anomaly based on the public agreement, or the message including a terminal and a vehicle that used the digital car key anomaly created based on the public agreement.
After receiving the message, the server side can acquire a third type identifier of the terminal and a fourth type identifier of the vehicle; and adding the terminal with the third type identifier and the vehicle with the fourth type identifier into the abnormal list as a combination.
For example, in the case where the terminal type is a and the vehicle type is B, the server may combine the type a terminal with the type B vehicle and store the combination in the anomaly list.
Along with the example of sending a verification request to the server with the terminal, the server may obtain, after receiving the verification request, the first type identifier of the first terminal and the second type identifier of the first vehicle from the first combined information. And determining whether the abnormal list comprises a combination of the terminal identified by the first type and the vehicle identified by the second type. And when the combination formed by the terminal of the first type identifier and the vehicle of the second type identifier exists in the abnormal list, generating a verification result representing that the first combination is positioned in the abnormal list. And when the combination formed by the terminal identified by the first type and the vehicle identified by the second type does not exist in the abnormal list, generating a verification result representing that the first combination is not located in the abnormal list.
The server side can also send a verification result to the first terminal, and the first terminal can receive the verification result sent by the server side and determine whether the first combination is located in the abnormal list of the public protocol according to the verification result.
It should be noted that, in the above embodiment, taking the server side maintaining the abnormal list as an example, the first terminal determines whether the first combination is located on the abnormal list through the server side, and the implementation of step S22 is illustrated. However, in some scenarios, a person skilled in the art may select other ways to determine whether the first terminal is on the abnormal list, as required. For example, in the case where the first terminal maintains the abnormal list, the first terminal may determine by itself whether the first combination is on the abnormal list.
In addition, in some embodiments, the service end may also be a service end of a terminal device, where the service end of the terminal device may complete mutual trust with the vehicle cloud service, so as to obtain the abnormal list from the vehicle cloud service. In this way, the terminal may determine, through the server of the terminal device, whether the first combination is in the abnormal list.
In step S23, a digital car key between the first terminal and the first vehicle is created based on the private agreement of the digital car key, in case the first combination is located in the abnormal list.
The implementation of creating the digital car key between the first terminal and the first vehicle based on the private protocol of the digital car key refers to the related private protocol of the digital car key, which is not limited by the disclosed embodiments.
Thus, by setting the abnormal list of the public protocol, the terminal can also detect whether the combination of the terminal and the vehicle is in the abnormal list when registering the digital car key. When the digital car key is in the abnormal list, the terminal can determine that the digital car key is difficult to establish through a public protocol, so that the digital car key can be established based on a private protocol, and the digital car key can be established smoothly. That is, even a terminal supporting a public protocol can determine whether or not it can successfully create a digital car key through the public protocol by itself through the abnormal list, and flexibly select a protocol for creating the digital car key according to the determination result. By the mode, the success rate of digital car key creation can be improved, and smooth use of the digital car key can be ensured.
In some implementations, the first combination may not be located in the list of anomalies. Referring to fig. 3, a flowchart of a method for creating a digital car key is shown, where the method further includes, based on fig. 2:
in step S24, in the case that the abnormal list does not include the first combination, a digital car key between the first terminal and the first vehicle is created based on a public agreement of the digital car key.
In this way, the digital car key of public agreement is registered, the car using experience of the user can be improved,
in step S25, in the event of failure in creating a digital car key between the first terminal and the first vehicle based on the public agreement, a message is sent to the server that characterizes the digital car key abnormality.
The message comprises information of the first combination, the information comprises a first type identifier of the first terminal and a second type identifier of the first vehicle, and the message is used for adding the first combination into the abnormal list by the server side.
For example, in one embodiment, in a case that creation of a digital car key between the first terminal and the first vehicle based on the public protocol fails, sending a message to the server that characterizes a digital car key abnormality includes:
and in response to failure of creating the digital car key between the first terminal and the first vehicle based on the public protocol, sending a message representing digital car key abnormality to the service end.
That is, the first terminal may create the digital car key according to the public protocol, and send a message indicating that the digital car key is abnormal to the server when the creation of the digital car key fails.
In one embodiment, in a case that creation of the digital car key between the first terminal and the first vehicle based on the public protocol fails, sending a message indicating that the digital car key is abnormal to the server side includes:
accumulating a first number of failures in the event that creating a digital car key between the first terminal and the first vehicle based on the public agreement fails;
creating a digital car key between the first terminal and the first vehicle based again on a public agreement of the digital car key;
and when the first failure times are greater than a first time number threshold, sending a message representing that the digital car key is abnormal to the server.
Wherein, the initial value of the first failure time may be 0, and the first time threshold may be set based on the requirement, such as 2 times, 3 times, etc.
For example, the first terminal may create the digital car key according to a public protocol, and add one to the current first failure number when the digital car key creation fails. The first terminal may also create a digital car key between the first terminal and the first vehicle based again on a public agreement of the digital car key until the first number of failures is greater than a first number threshold. At this time, the first terminal may send a message indicating that the digital car key is abnormal to the server.
In this way, the server may receive the message and add the first combination to the list of anomalies.
In some scenarios, the first terminal may successfully register the digital car key based on a public agreement. However, when the first terminal uses the registered digital car key for the first vehicle, a phenomenon of failure in using the digital car key may occur.
In this case, the method includes:
and under the condition that the digital car key created based on the public protocol fails to be used, sending the message representing the digital car key abnormality to the service end.
For example, in one implementation, in a case that the digital car key created based on the public protocol fails, the sending, to the server, the message indicating that the digital car key is abnormal includes:
in response to failure of using the digital car key created based on the public protocol, sending a message representing that the digital car key is abnormal to the server;
that is, the first terminal may create a digital car key according to a public agreement and use the created digital car key. And under the condition that the use of the digital car key fails, sending a message representing the abnormality of the digital car key to the server.
In one embodiment, in the case that the digital car key created based on the public protocol fails to be used, the sending the message for representing the digital car key abnormality to the server side includes:
accumulating a second failure number in case of failure in using the digital car key created based on the public agreement;
reusing a digital car key created based on the public agreement;
and when the second failure times are larger than a second time threshold, sending the message representing the digital car key abnormality to the server.
Wherein the initial value of the second failure number may be 0, and the second number threshold may be set based on the requirement, such as 4 times, 3 times, etc.
For example, the first terminal may create a digital car key according to a public agreement and use the created digital car key. When the digital car key fails to use, the second failure number is increased by one. The first terminal may also reuse the digital car key until the second failure number is greater than a second number threshold. At this time, the first terminal may send a message indicating that the digital car key is abnormal to the server.
In this way, the server may receive the message and add the first combination to the list of anomalies.
By adopting the scheme, the first terminal can send the message of the digital car key abnormality to the server under the condition that the digital car key is failed to be established based on the public protocol or the digital car key using the public protocol is failed. The server may add the first combination to the abnormal list, thereby updating the abnormal list. In this way, in the subsequent digital car key creation process of other terminals or the first terminal, the combination of the terminal and the vehicle can be determined to be located in the abnormal list, so that the registration of the digital car key by using a public protocol is avoided. By the mode, the registration success rate of the digital car key and the use success rate of the registered digital car key can be ensured.
In one possible implementation, after the sending the message indicating that the digital car key is abnormal to the server, the first terminal may further create the digital car key between the first terminal and the first vehicle based on a private protocol of the digital car key.
In this way, the first terminal can send the message of the digital car key abnormality to the server under the condition that the digital car key is failed to be created based on the public protocol or the digital car key is failed to be used by the public protocol, so that the server can update the abnormal list. The first terminal can further continue to establish the digital car key through the private protocol, so that the digital car key can be successfully established, and the influence on the car using experience of a user is avoided.
Based on the same inventive concept, the present disclosure also provides a method for creating a digital car key, which is applied to a server. The server may be a server involved in an embodiment of the present disclosure, and the server maintains an abnormal list of public agreements of the digital car key, where the abnormal list includes a combination of creating or using digital car key abnormalities based on the public agreements, and the combination includes a terminal and a vehicle.
Fig. 4 is a flowchart illustrating a method for creating a digital car key according to an exemplary embodiment of the present disclosure, and referring to fig. 4, the method includes:
in step S41, a verification request sent by the first terminal is received, the verification request being sent by the first terminal during creation of a digital car key between the first terminal and the first vehicle, the verification request comprising information of the first combination.
The first combination includes a first terminal and a first vehicle, and the information includes a first type identification of the first terminal and a second type identification of the first vehicle.
In step S42, it is verified whether the first combination is located in the abnormal list according to the information, and a verification result is obtained.
For example, after receiving the verification request, the server may obtain the first type identifier of the first terminal and the second type identifier of the first vehicle from the first combined information. And determining whether the abnormal list comprises a combination of the terminal identified by the first type and the vehicle identified by the second type.
And when the combination formed by the terminal of the first type identifier and the vehicle of the second type identifier exists in the abnormal list, generating a verification result representing that the first combination is positioned in the abnormal list. And when the combination formed by the terminal identified by the first type and the vehicle identified by the second type does not exist in the abnormal list, generating a verification result representing that the first combination is not located in the abnormal list.
In step S43, the verification result is sent to the first terminal;
and under the condition that the verification result represents that the first combination is located on the abnormal list, the first terminal creates the digital car key between the first terminal and the first vehicle based on the private protocol of the digital car key.
The embodiment of the first terminal sending the verification request and the first terminal performing the digital car key creation has been described in detail in the embodiments of fig. 2 and 3, and for brevity of the description, this disclosure will not be repeated.
In the scheme, by setting the abnormal list of the public protocol, the terminal can also detect whether the combination of the terminal and the vehicle is in the abnormal list when registering the digital car key. When the digital car key is in the abnormal list, the terminal can determine that the digital car key is difficult to establish through a public protocol, so that the digital car key can be established based on a private protocol, and the digital car key can be established smoothly. That is, even a terminal supporting a public protocol can determine whether or not it can successfully create a digital car key through the public protocol by itself through the abnormal list, and flexibly select a protocol for creating the digital car key according to the determination result. By the mode, the success rate of digital car key creation can be improved, and smooth use of the digital car key can be ensured.
In one possible implementation manner, the method for creating the digital car key for the service end further includes:
receiving a message representing a digital car key abnormality, wherein the message comprises a terminal and a vehicle for creating the digital car key abnormality based on the public protocol, or the message comprises a terminal and a vehicle for using the digital car key abnormality created based on the public protocol;
acquiring a third type identifier of the terminal and a fourth type identifier of the vehicle;
and adding the terminal with the third type identifier and the vehicle with the fourth type identifier into the abnormal list as a combination.
For example, the service end may be a vehicle factory cloud service of a vehicle manufacturer, and the service end may maintain the abnormal list. For example, in some scenarios, the server may receive reports of after-market shops, users, and car key anomalies, and add terminals and vehicles that present digital car key anomalies created based on public agreements as a combination to the anomaly list. In addition, the server may add the terminal and the vehicle using the digital car key abnormality based on the public protocol to the abnormality list as a combination.
For example, the server may receive a message characterizing a digital car key anomaly, the message including a terminal and a vehicle that created or used the digital car key anomaly based on the public agreement, or the message including a terminal and a vehicle that used the digital car key anomaly created based on the public agreement.
After receiving the message, the server side can acquire a third type identifier of the terminal and a fourth type identifier of the vehicle; and adding the terminal with the third type identifier and the vehicle with the fourth type identifier into the abnormal list as a combination.
For example, in the case where the terminal type is a and the vehicle type is B, the server may combine the type a terminal with the type B vehicle and store the combination in the anomaly list.
Fig. 5 is a flowchart of creating a digital car key according to an exemplary embodiment of the present disclosure, and referring to fig. 5, the creating process of the digital car key includes:
when the user finds that the public agreement digital car key joint debugging between the mobile phone model and the car model is abnormal and the digital car key function cannot be used, the combination of the abnormal mobile phone model and the corresponding car model is reported to the car enterprise through the car enterprise customer service telephone or other paths. The vehicle enterprise cloud service records the combination and adds to the blacklist.
When the owner user triggers the digital car key creation process again or other users trigger the digital car key creation process, the car enterprise APP tries to call a public protocol check interface of the mobile phone equipment operating system, so that whether the mobile phone equipment operating system supports the public protocol is identified. If the operating system of the mobile phone equipment does not support the public protocol, the interface call fails or is wrong. The vehicle enterprise APP confirms that the mobile phone equipment operating system does not support a public protocol, and a private protocol digital vehicle key is built in the vehicle enterprise APP.
If the operating system of the mobile phone equipment supports the public protocol, the public protocol checking interface is successfully invoked, and the set value is returned. At this time, the vehicle enterprise APP confirms that the mobile phone equipment operating system supports the public protocol. Under the condition that the mobile phone equipment operating system supports a public protocol, the vehicle enterprise APP requests vehicle enterprise cloud service, and inquires whether the combination of the mobile phone model and the vehicle model which are expected to create the digital vehicle key currently exists in the blacklist.
If the vehicle enterprise APP confirms that the combination of the mobile phone model and the vehicle model which are expected to be created at present is not in the blacklist, triggering the mobile phone equipment operating system to create the public protocol digital vehicle key. If the vehicle enterprise APP confirms that the combination of the mobile phone model and the vehicle model which are expected to be created at present is in a blacklist, a private protocol digital vehicle key is created in the vehicle enterprise APP.
In the scheme, after the user finds that the combination of a certain terminal model and a certain vehicle model cannot use the digital vehicle key based on the public protocol, the user can report a message indicating that the digital vehicle key of the public protocol of the combination is unavailable to the vehicle enterprise. In this way, the vehicle enterprise cloud service may add the combination to the blacklist.
In this way, when the digital car key is created again with the user, or when other users using the same model and model combination create the digital car key, the model and model combination is in the blacklist of the public protocol, so that the creation of the digital car key of the private protocol can be triggered. Therefore, the user can use the digital car key based on the private protocol, so that the car using experience of the user is guaranteed.
Based on the same inventive concept, the embodiment of the disclosure provides a device for creating a digital car key, which is applied to a first terminal. Fig. 6 is a block diagram of a digital car key creation apparatus according to an exemplary embodiment of the present disclosure, and referring to fig. 6, the digital car key creation apparatus includes:
a first determination module 601 configured to determine whether a first terminal supports a public agreement of a digital car key in response to an event of creating the digital car key between the first terminal and a first vehicle;
a first execution module 602 configured to take the first terminal and the first vehicle as a first combination if the first terminal supports the public protocol;
a second determining module 603 configured to determine whether the first combination is in an anomaly list of the public protocol, the anomaly list comprising a combination of digital car key anomalies created or used based on the public protocol, the combination comprising a terminal and a vehicle;
a first creation module 604 configured to create a digital car key between the first terminal and the first vehicle based on a private agreement of the digital car key if the first combination is located in the list of anomalies.
In the scheme, by setting the abnormal list of the public protocol, the terminal can also detect whether the combination of the terminal and the vehicle is in the abnormal list when registering the digital car key. When the digital car key is in the abnormal list, the terminal can determine that the digital car key is difficult to establish through a public protocol, so that the digital car key can be established based on a private protocol, and the digital car key can be established smoothly. That is, even a terminal supporting a public protocol can determine whether or not it can successfully create a digital car key through the public protocol by itself through the abnormal list, and flexibly select a protocol for creating the digital car key according to the determination result. By the mode, the success rate of digital car key creation can be improved, and smooth use of the digital car key can be ensured.
Optionally, the second determining module 603 includes:
a first sending submodule configured to send a verification request to a server, wherein the verification request comprises information of the first combination, the information comprises a first type identifier of the first terminal and a second type identifier of the first vehicle, the verification request is used for requesting the server to verify whether the first combination is located in an abnormal list of the public protocol, and the server maintains the abnormal list of the public protocol;
The first receiving submodule is configured to receive the verification result sent by the server;
a first determination submodule configured to determine whether the first combination is in an abnormal list of the public agreement according to the verification result.
Optionally, the device for creating the digital car key comprises:
a first creation sub-module configured to create a digital car key between the first terminal and the first vehicle based on a public agreement of the digital car key, if the list of anomalies does not include the first combination;
a second sending sub-module configured to send, to the server, a message representing that a digital car key is abnormal, the message including information of the first combination including a first type identification of the first terminal and a second type identification of the first car, in case that creation of the digital car key between the first terminal and the first car fails based on the public protocol, the message being used by the server to add the first combination to the abnormal list.
Optionally, the second transmitting sub-module includes:
a first sending subunit configured to send a message to the server that characterizes a digital car key abnormality in response to a failure to create a digital car key between the first terminal and the first vehicle based on the public protocol; or,
A first execution subunit configured to accumulate a first number of failures in the event of failure to create a digital car key between the first terminal and the first vehicle based on the public agreement;
a second execution subunit configured to create a digital car key between the first terminal and the first vehicle based on a public agreement of the digital car key again;
and the second sending subunit is configured to send a message representing that the digital car key is abnormal to the server side when the first failure times are greater than a first time number threshold.
Optionally, the device for creating the digital car key comprises:
and the message sending module is configured to send the message representing the abnormality of the digital car key to the server side in the case that the digital car key created based on the public protocol fails to be used.
Optionally, the message sending module includes:
a first message sending sub-module configured to send a message to the server that characterizes a digital car key abnormality in response to a failure to use the digital car key created based on the public protocol; or,
a first accumulation sub-module configured to accumulate a second number of failures in case of failure of using a digital car key created based on the public agreement;
A first usage submodule configured to reuse a digital car key created based on the public agreement;
and the second message sending sub-module is configured to send the message representing the digital car key abnormality to the server side when the second failure times are larger than a second time threshold.
Optionally, the device for creating the digital car key comprises:
the key creation module is configured to create the digital car key between the first terminal and the first vehicle based on a private protocol of the digital car key after the second sending sub-module sends a message representing that the digital car key is abnormal to the server.
Based on the same inventive concept, the embodiment of the disclosure provides a device for creating a digital car key, which is applied to a server. The server maintains an abnormal list of public protocols with digital car keys, wherein the abnormal list comprises a combination of digital car key abnormality creation or use based on the public protocols, and the combination comprises a terminal and a vehicle. Fig. 7 is a block diagram of a digital car key creation apparatus according to an exemplary embodiment of the present disclosure, and referring to fig. 7, the digital car key creation apparatus includes:
A first receiving module 701 configured to receive a verification request sent by a first terminal, the verification request being sent by the first terminal in a process of creating a digital car key between the first terminal and a first vehicle, the verification request comprising information of a first combination, the first combination comprising the first terminal and the first vehicle, the information comprising a first type identification of the first terminal and a second type identification of the first vehicle;
a first verification module 702 configured to verify whether the first combination is in the abnormal list according to the information, so as to obtain a verification result;
a first sending module 703 configured to send the verification result to the first terminal;
wherein, if the verification result characterizes that the first combination is located on the abnormal list, the first terminal creates the digital car key between the first terminal and the first vehicle based on the private protocol of the digital car key.
In the scheme, by setting the abnormal list of the public protocol, the terminal can also detect whether the combination of the terminal and the vehicle is in the abnormal list when registering the digital car key. When the digital car key is in the abnormal list, the terminal can determine that the digital car key is difficult to establish through a public protocol, so that the digital car key can be established based on a private protocol, and the digital car key can be established smoothly. That is, even a terminal supporting a public protocol can determine whether or not it can successfully create a digital car key through the public protocol by itself through the abnormal list, and flexibly select a protocol for creating the digital car key according to the determination result. By the mode, the success rate of digital car key creation can be improved, and smooth use of the digital car key can be ensured.
Optionally, the device for creating a digital car key further includes:
a second receiving module configured to receive a message characterizing a digital car key anomaly, the message including a terminal and a vehicle that create a digital car key anomaly based on the public protocol, or the message including a terminal and a vehicle that use a digital car key anomaly created based on the public protocol;
the acquisition module is configured to acquire a third type identifier of the terminal and a fourth type identifier of the vehicle;
and the second execution module is configured to add the third type of identified terminal and the fourth type of identified vehicle as a combination into the abnormal list.
The embodiment of the disclosure also provides a device for creating a digital car key, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the steps of the method for creating a digital car key applied to the first terminal as described in any embodiment of the present disclosure.
The embodiment of the disclosure also provides a device for creating a digital car key, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the steps of the method for creating a digital car key applied to a server according to any embodiment of the present disclosure.
The disclosed embodiments also provide a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method for creating a digital car key applied to a first terminal described in any of the embodiments of the disclosure.
The embodiments of the present disclosure also provide a computer readable storage medium having stored thereon computer program instructions that when executed by a processor implement the steps of the method for creating a digital car key for a server described in any of the embodiments of the present disclosure.
The embodiment of the disclosure also provides a system for creating a digital car key, which comprises a terminal and a server, wherein the terminal is configured to execute the steps of the method for creating the digital car key applied to the first terminal in any embodiment of the disclosure, and the server is configured to execute the steps of the method for creating the digital car key applied to the server in any embodiment of the disclosure.
With respect to the digital car key creation apparatus in the above-described embodiments, the specific manner in which the respective modules perform the operations has been described in detail in the embodiments regarding the digital car key creation method, and will not be described in detail here.
Fig. 8 is a block diagram of a terminal 800, according to an example embodiment. For example, the terminal 800 may be a mobile phone, tablet device, wearable device, or the like.
Referring to fig. 8, a terminal 800 may include one or more of the following components: a first processing component 802, a first memory 804, a first power component 806, a multimedia component 808, an audio component 810, a first input/output interface 812, a sensor component 814, and a communication component 816.
The first processing component 802 generally controls overall operation of the terminal 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The first processing component 802 may include one or more processors 820 to execute instructions to perform all or part of the steps of the method of creating a digital car key as described above as applied to the first terminal. Further, the first processing component 802 may include one or more modules that facilitate interactions between the first processing component 802 and other components. For example, the first processing component 802 may include a multimedia module to facilitate interaction between the multimedia component 808 and the first processing component 802.
The first memory 804 is configured to store various types of data to support operations at the terminal 800. Examples of such data include instructions for any application or method operating on the terminal 800, contact data, phonebook data, messages, pictures, videos, and the like. The first memory 804 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The first power supply component 806 provides power to the various components of the terminal 800. The first power supply component 806 can include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the terminal 800.
The multimedia component 808 includes a screen between the terminal 800 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front camera and/or a rear camera. The front camera and/or the rear camera may receive external multimedia data when the terminal 800 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the terminal 800 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the first memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 further includes a speaker for outputting audio signals.
The first input/output interface 812 provides an interface between the first processing component 802 and a peripheral interface module, which may be a keyboard, click wheel, button, or the like. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of the terminal 800. For example, the sensor assembly 814 may detect an on/off state of the terminal 800, a relative positioning of the components, such as a display and keypad of the terminal 800, a change in position of the terminal 800 or a component of the terminal 800, the presence or absence of user contact with the terminal 800, an orientation or acceleration/deceleration of the terminal 800, and a change in temperature of the terminal 800. The sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communication between the terminal 800 and other devices, either wired or wireless. The terminal 800 may access a wireless network based on a communication standard, such as WiFi,2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for performing the above-described method of creating a digital car key applied to a first terminal.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as first memory 804 including instructions executable by processor 820 of terminal 800 to perform the above-described method of creating a digital car key for a first terminal. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
Fig. 9 is a block diagram illustrating a server 1900 according to an example embodiment. For example, server 1900 may be provided as a vehicle enterprise cloud server. Referring to fig. 9, the server 1900 includes a second processing component 1922 that further includes one or more processors and memory resources represented by a second memory 1932 for storing instructions, such as applications, executable by the second processing component 1922. The application program stored in the second memory 1932 may include one or more modules each corresponding to a set of instructions. Further, the second processing component 1922 is configured to execute instructions to perform the digital car key creation method applied to the server as described above.
The server 1900 may also include a second power supply component 1926 configured to perform power management of the server 1900, a wired or wireless network interface 1950 configured to connect the server 1900 to a network, and a second input/output interface 1958. The Server 1900 may operate based on an operating system stored in a second memory 1932, such as Windows Server TM ,Mac OS X TM ,Unix TM , Linux TM ,FreeBSD TM Or the like.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described method of creating a digital car key applied to a first terminal when executed by the programmable apparatus.
In another exemplary embodiment, a computer program product is also provided, comprising a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described method of creating a digital car key applied to a server, when executed by the programmable apparatus.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (14)

1. A method for creating a digital car key, applied to a first terminal, the method comprising:
Determining, in response to an event that a digital car key is created between a first terminal and a first vehicle, whether the first terminal supports a public agreement of the digital car key;
in the case that the first terminal supports the public protocol, taking the first terminal and the first vehicle as a first combination, determining whether the first combination is in an abnormal list of the public protocol, wherein the abnormal list comprises a combination of digital car key abnormality created or used based on the public protocol, and the combination comprises a terminal and a vehicle;
creating a digital car key between the first terminal and the first vehicle based on a private agreement of the digital car key, if the first combination is located in the list of anomalies.
2. The method of claim 1, wherein the determining whether the first combination is in an abnormal list of the public protocol comprises:
sending a verification request to a server, wherein the verification request comprises information of the first combination, the information comprises a first type identifier of the first terminal and a second type identifier of the first vehicle, the verification request is used for requesting the server to verify whether the first combination is located in an abnormal list of the public protocol, and the server maintains the abnormal list of the public protocol;
Receiving a verification result sent by the server;
and determining whether the first combination is in the abnormal list of the public protocol according to the verification result.
3. The method according to claim 2, characterized by comprising:
creating a digital car key between the first terminal and the first vehicle based on a public agreement of the digital car key, if the list of anomalies does not include the first combination;
and under the condition that the creation of the digital car key between the first terminal and the first vehicle fails based on the public protocol, sending a message representing the digital car key abnormality to the server, wherein the message comprises information of the first combination, the information comprises a first type identification of the first terminal and a second type identification of the first vehicle, and the message is used for adding the first combination into the abnormality list by the server.
4. The method of claim 3, wherein the sending a message to the server that characterizes a digital car key anomaly in the event of failure to create a digital car key between the first terminal and the first vehicle based on the public agreement comprises:
In response to failure to create a digital car key between the first terminal and the first vehicle based on the public agreement, sending a message to the server that characterizes a digital car key abnormality; or,
accumulating a first number of failures in the event that creating a digital car key between the first terminal and the first vehicle based on the public agreement fails;
creating a digital car key between the first terminal and the first vehicle based again on a public agreement of the digital car key;
and when the first failure times are greater than a first time number threshold, sending a message representing that the digital car key is abnormal to the server.
5. A method according to claim 3, comprising:
and under the condition that the digital car key created based on the public protocol fails to be used, sending the message representing the digital car key abnormality to the service end.
6. The method of claim 5, wherein the sending the message to the server indicating that the digital car key is abnormal in the event of failure to use the digital car key created based on the public protocol comprises:
in response to failure of using the digital car key created based on the public protocol, sending a message representing that the digital car key is abnormal to the server; or,
Accumulating a second failure number in case of failure in using the digital car key created based on the public agreement;
reusing a digital car key created based on the public agreement;
and when the second failure times are larger than a second time threshold, sending a message representing that the digital car key is abnormal to the server.
7. The method according to any one of claims 3 to 6, wherein after the sending a message indicating a digital car key abnormality to the server, the method comprises:
a digital car key between the first terminal and the first vehicle is created based on a proprietary protocol of the digital car key.
8. A method for creating a digital car key, applied to a server, the server maintaining an abnormal list of public agreements with digital car keys, the abnormal list including a combination of creating or using digital car keys anomalies based on the public agreements, the combination including a terminal and a vehicle, the method comprising:
receiving a verification request sent by a first terminal, wherein the verification request is sent by the first terminal in the process of creating a digital car key between the first terminal and a first vehicle, the verification request comprises information of a first combination, the first combination comprises the first terminal and the first vehicle, and the information comprises a first type identifier of the first terminal and a second type identifier of the first vehicle;
Verifying whether the first combination is positioned in the abnormal list according to the information to obtain a verification result;
sending the verification result to the first terminal;
wherein, if the verification result characterizes that the first combination is located on the abnormal list, the first terminal creates the digital car key between the first terminal and the first vehicle based on the private protocol of the digital car key.
9. The method as recited in claim 8, further comprising:
receiving a message representing a digital car key abnormality, wherein the message comprises a terminal and a vehicle for creating the digital car key abnormality based on the public protocol, or the message comprises a terminal and a vehicle for using the digital car key abnormality created based on the public protocol;
acquiring a third type identifier of the terminal and a fourth type identifier of the vehicle;
and adding the terminal with the third type identifier and the vehicle with the fourth type identifier into the abnormal list as a combination.
10. A digital car key creation apparatus, applied to a first terminal, comprising:
a first determination module configured to determine whether a first terminal supports a public agreement of a digital car key in response to an event of creating the digital car key between the first terminal and a first vehicle;
A first execution module configured to take the first terminal and the first vehicle as a first combination if the first terminal supports the public protocol;
a second determination module configured to determine whether the first combination is in an anomaly list of the public protocol, the anomaly list including a combination of digital car key anomalies created or used based on the public protocol, the combination including a terminal and a vehicle;
a first creation module configured to create a digital car key between the first terminal and the first vehicle based on a private agreement of the digital car key if the first combination is located in the list of anomalies.
11. A digital car key creation device, characterized by being applied to a server, the server maintaining an abnormal list of public agreements with digital car keys, the abnormal list including a combination of creating or using digital car keys abnormality based on the public agreements, the combination including a terminal and a vehicle, the device comprising:
a first receiving module configured to receive a verification request transmitted by a first terminal, the verification request being transmitted by the first terminal in a process of creating a digital car key between the first terminal and a first vehicle, the verification request including information of a first combination including a first type identification of the first terminal and the first vehicle, the information including a second type identification of the first vehicle;
The first verification module is configured to verify whether the first combination is located in the abnormal list according to the information to obtain a verification result;
the first sending module is configured to send the verification result to the first terminal;
wherein, if the verification result characterizes that the first combination is located on the abnormal list, the first terminal creates the digital car key between the first terminal and the first vehicle based on the private protocol of the digital car key.
12. A digital car key creation apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the steps of the method of any one of claims 1 to 9.
13. A computer readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the steps of the method of any of claims 1 to 9.
14. A digital car key creation system comprising a terminal configured to perform the steps of the method of any one of claims 1 to 7 and a server configured to perform the steps of the method of claim 8 or 9.
CN202311028935.6A 2023-08-15 2023-08-15 Digital car key creation method, device, storage medium and system Active CN116760867B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311028935.6A CN116760867B (en) 2023-08-15 2023-08-15 Digital car key creation method, device, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311028935.6A CN116760867B (en) 2023-08-15 2023-08-15 Digital car key creation method, device, storage medium and system

Publications (2)

Publication Number Publication Date
CN116760867A CN116760867A (en) 2023-09-15
CN116760867B true CN116760867B (en) 2023-11-21

Family

ID=87957544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311028935.6A Active CN116760867B (en) 2023-08-15 2023-08-15 Digital car key creation method, device, storage medium and system

Country Status (1)

Country Link
CN (1) CN116760867B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102232966B1 (en) * 2020-09-10 2021-03-29 (주)케이스마텍 Un-tact digital key service system and method thereof
CN115966038A (en) * 2021-10-13 2023-04-14 华为技术有限公司 Digital key opening method, equipment and system
CN116071854A (en) * 2023-01-18 2023-05-05 重庆长安汽车股份有限公司 Digital key recommendation method, device, equipment and storage medium
WO2023141869A1 (en) * 2022-01-27 2023-08-03 Irdeto B.V. Systems and methods for keyless operation

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102232966B1 (en) * 2020-09-10 2021-03-29 (주)케이스마텍 Un-tact digital key service system and method thereof
CN115966038A (en) * 2021-10-13 2023-04-14 华为技术有限公司 Digital key opening method, equipment and system
WO2023141869A1 (en) * 2022-01-27 2023-08-03 Irdeto B.V. Systems and methods for keyless operation
CN116071854A (en) * 2023-01-18 2023-05-05 重庆长安汽车股份有限公司 Digital key recommendation method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN116760867A (en) 2023-09-15

Similar Documents

Publication Publication Date Title
EP3076716A1 (en) Method and apparatus for network access
US10764934B2 (en) Method, apparatus for terminal device to access wireless network
CN109219036B (en) Method and device for unbinding equipment and electronic equipment
CN113110852A (en) Firmware upgrading method and device and storage medium
US20220070960A1 (en) Connection processing method and apparatus
CN109582400B (en) Program calling method and device
CN106454998B (en) Wireless local area network access method, device and terminal
KR101642019B1 (en) Method, apparatus, program, and recording medium of verifying terminal
CN110839073A (en) Method for acquiring push information, method and device for sending push information
CN115185717B (en) Interface calling method and device, electronic equipment and storage medium
CN108476379B (en) Information recording method and information recording apparatus
CN105530129B (en) Router resetting method and device
CN112584547B (en) Method, device, storage medium and terminal equipment for establishing data connection
CN110865823B (en) Pre-installation application control method, pre-installation application control device and storage medium
CN106375350B (en) Flashing verification method and device
CN116760867B (en) Digital car key creation method, device, storage medium and system
US10019604B2 (en) Method and apparatus of verifying terminal and medium
CN109542660B (en) Fault processing method and device
CN107819871B (en) Application state determination method and device
CN113286288B (en) Method, device and medium for accessing 5G network
CN111240735B (en) Application packaging method, application packaging device and storage medium
CN109710274B (en) Debugging function starting method and device
CN108011882B (en) Method, device and system for data synchronization
CN107992333B (en) Theme acquisition method and device
CN108173846B (en) Login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant