CN117183986A - Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product - Google Patents

Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product Download PDF

Info

Publication number
CN117183986A
CN117183986A CN202311281698.4A CN202311281698A CN117183986A CN 117183986 A CN117183986 A CN 117183986A CN 202311281698 A CN202311281698 A CN 202311281698A CN 117183986 A CN117183986 A CN 117183986A
Authority
CN
China
Prior art keywords
vehicle
password
mode
factory
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311281698.4A
Other languages
Chinese (zh)
Inventor
张细峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202311281698.4A priority Critical patent/CN117183986A/en
Publication of CN117183986A publication Critical patent/CN117183986A/en
Pending legal-status Critical Current

Links

Abstract

The disclosure provides a vehicle anti-theft method, a vehicle anti-theft device, an electronic apparatus, a vehicle, a storage medium and a computer program product, and the technical field of vehicle control, in particular to the technical field of vehicle anti-theft, and the specific implementation scheme is as follows: responding to the fact that the door of the vehicle is opened and the current vehicle mode is a factory mode, and feeding back password input prompt information, wherein the factory mode is a factory initial mode of the vehicle; acquiring an input check password, and comparing the check password with a set password; and starting the vehicle in response to the check password being the same as the set password.

Description

Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product
Technical Field
The present disclosure relates to the field of vehicle control technology, and in particular, to the field of vehicle theft prevention technology, and more particularly, to a vehicle theft prevention method, a vehicle theft prevention device, an electronic device, a vehicle, a storage medium, and a computer program product.
Background
With the maturity of the mobile phone Bluetooth key technology, more and more vehicles are already marked with mobile phone Bluetooth keys. Based on the Bluetooth key technology, the vehicle can be bound with the vehicle key through a mobile phone, and the vehicle can be controlled through the mobile phone after the binding is completed, for example, a vehicle door, a trunk, a vehicle is started or closed remotely, air conditioner control and the like. The vehicle is turned off or started by the Bluetooth key, so that the risk of vehicle theft can be reduced.
Disclosure of Invention
The present disclosure provides a vehicle theft prevention method, a vehicle theft prevention device, an electronic apparatus, a vehicle, a storage medium, and a computer program product capable of reducing a risk of theft of the vehicle.
According to an aspect of the present disclosure, there is provided a vehicle theft prevention method including: responding to the fact that the door of the vehicle is opened and the current vehicle mode is a factory mode, and feeding back password input prompt information, wherein the factory mode is a factory initial mode of the vehicle; acquiring an input check password, and comparing the check password with a set password; and starting the vehicle in response to the check password being the same as the set password.
According to another aspect of the present disclosure, there is provided a vehicle theft preventing device including: the device comprises a feedback module, an acquisition module and a starting module. The feedback module is set to respond to the fact that the door of the vehicle is opened, the current vehicle mode is a factory mode, and the feedback module feeds back the password input prompt information, wherein the factory mode is a factory initial mode of the vehicle. The acquisition module is configured to acquire an entered verification password and compare the verification password with a set password. The start module is configured to start the vehicle in response to the check password being the same as the set password.
According to another aspect of the present disclosure, there is provided an electronic device including: at least one processor and a memory. Wherein the memory is communicatively coupled to the at least one processor and stores instructions executable by the at least one processor for execution by the at least one processor to enable the at least one processor to perform the method as set forth above.
According to another aspect of the present disclosure, there is provided a vehicle on which the above-mentioned electronic device is provided.
According to another aspect of the present disclosure, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the above-mentioned method.
According to another aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the above mentioned method.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 illustrates a schematic block diagram of an exemplary system architecture for a vehicle anti-theft method to which the present disclosure may be applied;
FIG. 2 is a flow chart diagram of a vehicle anti-theft method according to a first embodiment of the present disclosure;
FIG. 3 is a schematic illustration of a mechanical key engraved with a set password according to some embodiments of the present disclosure;
FIG. 4 is a schematic illustration of a key plate engraved with a set code according to some embodiments of the present disclosure;
FIG. 5 is a schematic flow diagram of the operation of various systems of a vehicle anti-theft method 200, according to some embodiments of the present disclosure;
FIG. 6 is a flow chart diagram of a vehicle anti-theft method according to a second embodiment of the present disclosure;
FIG. 7 is a flow chart of a vehicle anti-theft device according to a third embodiment of the present disclosure;
FIG. 8 illustrates a schematic block diagram of an example electronic device that may be used to implement embodiments of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic block diagram of an exemplary system architecture for a vehicle anti-theft method to which the present disclosure may be applied, in accordance with the present disclosure.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as video-type applications, live applications, instant messaging tools, mailbox clients, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices having a display screen, such as an in-vehicle host computer. When the terminal devices 101, 102, 103 are software, they can be installed in the above-listed electronic devices. Which may be implemented as multiple software or software modules (e.g., multiple software or software modules for providing distributed services) or as a single software or software module. The present invention is not particularly limited herein.
The server 105 may be a server providing various services, such as a background server providing support for the terminal devices 101, 102, 103. The background server may perform a comparison and peer-to-peer process on the received check password and the set password, and feed back a processing result (for example, an instruction for starting the vehicle or a result of determining whether to start the vehicle) to the terminal device.
It should be noted that, the method for constructing a data set or the method for training a model provided by the embodiments of the present disclosure may be executed by the server 105 or the terminal devices 101, 102, 103, and accordingly, the apparatus for constructing a data set or the apparatus for training a model may be disposed in the server 105 or the terminal devices 101, 102, 103.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
In some technologies, the use of a mobile phone bluetooth key can be started only by registering based on the mobile phone number and identity information of a client, which brings great inconvenience to production debugging and logistics transportation links, and research and development personnel need to design for the scenes. Typically, a vehicle with a cell phone bluetooth key configuration will have a remote key or near field communication (Near Field Communication, NFC) card key. In the vehicle production debugging link and the logistics transportation link, related personnel use a remote control key or an NFC card key to unlock and start the vehicle. After the vehicle is delivered to the customer, the customer registers to start the vehicle using the mobile phone Bluetooth key. However, after the vehicle is offline in a factory, the vehicle is frequently handed over through a plurality of links such as quality inspection, debugging, repairing, transportation, loading and unloading, if the mobile phone Bluetooth key is opened to the vehicle, the mobile phone Bluetooth key needs to be frequently registered and logged out for different people, and a key management system needs to be added in the factory, so that the time cost and the management cost are greatly increased. If a remote control key or an NFC card and card reader system is added to the vehicle, the material cost is high.
With continued reference to fig. 2, fig. 2 is a flow chart of a vehicle anti-theft method according to a first embodiment of the present disclosure. As shown in fig. 2, the vehicle theft prevention method 200 may include the steps of:
in step 201, in response to detecting that the door of the vehicle is opened and the current vehicle mode is the factory mode, a password input prompt message is fed back.
In the present embodiment, the execution subject may be, for example, a terminal device or a server illustrated in fig. 1, wherein the terminal device may be, for example, an in-vehicle host. After detecting that the door is opened, the executing body may be in an ON range of the vehicle, the vehicle is energized, and a current vehicle mode is determined. If the current vehicle mode is determined to be the factory mode, the execution main body can actively feed back the password input prompt information, and can also feed back the password input information after the user lights up the screen. The feedback time of the password input prompt information can be set according to needs, for example, the feedback mode of the password input prompt information can be consulted for determining.
In this embodiment, the operator may open the door by the mechanical key, and the execution body determines the current vehicle mode after determining that the door is opened by the mechanical key.
In the present embodiment, the factory mode is a factory initial mode of the vehicle. In other words, in this embodiment, the execution subject presets a factory mode for the vehicle. In factory mode, the vehicle starts with a mechanical key and a set password. Through addding mill's mode, car personnel accessible of links such as vehicle debugging, commodity circulation transportation set for the password and start the vehicle, need not to add NFC equipment or remote key for the vehicle, reduced material and development cost. Because the vehicle needs to be started by setting the password, even if other people illegally open the vehicle door, the vehicle cannot be started, namely cannot enter a state of successful starting and Ready starting (Ready), so that the vehicle cannot be started, the anti-theft performance of the vehicle is improved, and the anti-theft purpose is realized.
As one example, the executing body may pop up a pop-up window for inputting the password through the central control display screen to feed back the password input prompt information. It should be appreciated that the executing body may also feed back the password entry prompt in other ways, such as playing an entry password alert through the vehicle's voice control system, in order to enter the password with the vehicle operator's voice, without departing from the teachings of the present disclosure. The present disclosure does not limit the manner in which the executing body feeds back the password input prompt information.
Step 202, obtaining the inputted verification password and comparing the verification password with the set password.
In this embodiment, the executing body may detect whether information is input after feeding back the password input prompt information. If the input of information is detected, the execution main body acquires the input information as a check password, and compares the check password with the set password to determine whether to start the vehicle.
In some embodiments of the present disclosure, the password is set to the password for starting the vehicle in the factory mode. Alternatively, the setting password may be set before the vehicle is delivered to the user, for example, the execution body may write the setting password in a memory of the vehicle, and set the vehicle to a factory mode after the completion of the off-line electrical inspection process of the vehicle. In the example, the input of the set password is performed in the downlink electric inspection flow, so that an additional flow is not required to be added, and the development cost is reduced.
By way of example, the vehicle may include a whole vehicle domain controller (Vehicle control unit, VCU), mechanical keys, off-line diagnostics (Tester), body domain controller (Body Domain Control Unit, BDCU), intelligent cabin domain controller (Cockpit Domain Controller, CDC), cell phone bluetooth key controller (Passive Keyless Enter Controller, PKC), etc. systems. Wherein the whole vehicle domain controller can be used for setting the mode of the vehicle. In the factory and in the logistics transportation process of vehicles, the whole vehicle domain controller sets the vehicles to be in a factory mode, and waits for the vehicles to finish mobile phone Bluetooth key registration, and the whole vehicle domain controller sets the vehicles to exit from the factory mode. A mechanical key of a vehicle is used to open a door. The off-line diagnostic device can be used for writing a set password into the vehicle body domain controller in the vehicle electric detection process. The body domain controller may be operable to store the written set password in a memory (EEPROM) of the vehicle. In the process of the vehicle in the final assembly station for the offline electric inspection, an electric inspection person or other persons inputs a set password into the Tester. The Tester writes the set password into the BDCU via a diagnostic instruction. For example, in the procedure of writing a password in the whole vehicle offline procedure (End of Line, EOL), the Tester may set the BDCU to enter the extended session mode by setting a DID instruction (e.g., 0x10 03) corresponding to the extended session mode (e.g., 0x 10) service; the BDCU is accessed through a DID instruction (e.g., 0x27 01 or 0x27 02) corresponding to the secure access service (e.g., 0x 27); the password is written by a DID instruction (0 x2E f 150) corresponding to the write password information service (e.g., 0x 2E). For example, in the EOL process, after the Tester detects the corresponding instruction, the Tester may pop up the password input interface, and the electric inspector may input the set password. After the Tester detects that the input of the set password is completed (for example, a confirmation completion control in the password input interface is triggered), a confirmation box is popped up to prompt an electric inspector to verify whether the set password is correct, and two options of're-input' and 'correct' are popped up. The text in the confirmation box may be set as needed, and for example, the text may be "please check whether the setting password XXX is correct". After determining that the "re-enter" option is triggered, the Tester may pop up the enter password interface again. After determining that the "correct" option is triggered, the Tester may write the setup password entered by the inspector to the BDCU. The BDCU writes the setting password written by the Tester into the EEPROM for storage.
Alternatively, the set password may be rewritten or cleared by a Tester. For example, the Tester may set the BDCU to enter the extended session mode by setting a DID instruction (e.g., 0x 1003) corresponding to the extended session mode (e.g., 0x 10) service. The Tester accesses the BDCU through a DID instruction (e.g., 0x27 01 or 0x27 02) corresponding to the secure access service (e.g., 0x 27). The Tester reads the set password that has been written by reading the DID instruction (e.g., 0x22 f 150) corresponding to the data service (0 x 22). For example, the master reads the encryption information of the BDCU through the 0×22 f150, and if the BDCU does not store the set encryption, the master returns 00 or other specified information, and if the set encryption is stored, the master returns the actual set encryption. If the received message is 00 or other specified information, the Tester may prompt that no password is currently written (e.g., pop-up text box "BDCU does not write a password"). If another number is received, for example, the password is set to 4 as the number, and the received information is 4 numbers, the received information is displayed (for example, a pop-up text box "XXXX"). The Tester may assist in implementing password cleanup by writing a DID instruction (0 x2E f 150) corresponding to the password information service (e.g., 0x 2E). For example, if the number 00 is set to be written without setting the password, the password may be cleared by issuing the instruction 0x2e f150 00. After clearing the password, the Tester may write the password by writing the DID instruction (0 x2E f 150) corresponding to the password information service (e.g., 0x 2E). The password writing process may refer to the above related description, and will not be described herein.
It should be appreciated that the execution entity may also perform writing, erasing, overwriting, etc. of the set password in other ways without departing from the teachings of the present disclosure, and is not limited herein.
It should be appreciated that the executing entity may also write the set password in other processes without departing from the teachings of the present disclosure, e.g., after delivery of the vehicle to the user, the user may also set/modify the set password via a preset password setting/modifying instruction, which is not limiting in this disclosure.
In some embodiments of the present disclosure, the set password is determined based on at least one of a traceability information of the vehicle mechanical key bit, a vehicle identification code, and a vehicle powertrain number.
As one example, the set password may be determined based on the traceability information of the key bit of the mechanical key, e.g., the traceability information of the key bit is taken as the set password. To facilitate a user to reconfigure a mechanical key after the mechanical key of a vehicle is lost, the user is typically informed of the traceability information of the mechanical key blade of the vehicle. In this example, the key bit traceability information may be used to trace the key bit of a vehicle mechanical key to configure the mechanical key, and may also be used to start the vehicle. The traceability information of the key teeth can be obtained earlier in the vehicle production process, so that relevant manufacturers of the vehicles can determine the set passwords of the vehicles in advance, and the set passwords are engraved on key plates such as mechanical keys or mechanical keys so that users can know the set passwords, the influence on the vehicle production/delivery process is small, the change of the existing process is small, the adjustment of the production line is small, and the implementation of the vehicle anti-theft method is more beneficial to the floor.
As another example, the set password may be determined based on the vehicle identification code, for example, by entering the vehicle identification code into a specified algorithm to obtain the set password, such that the user requests the vehicle facilitator to assist in determining the vehicle identification code based on the set password, or requests the vehicle facilitator to assist in determining the set password based on the vehicle identification code.
As another example, the set password may be determined based on the vehicle powertrain number, e.g., the vehicle powertrain number is entered into a specified algorithm to derive the set password, such that the user requests the vehicle facilitator to assist in determining the vehicle powertrain number based on the set password, or requests the vehicle facilitator to assist in determining the set password based on the vehicle powertrain number.
It should be appreciated that the set password may also be a randomly set value, such as randomly generated between 0000 and 9999, or determined based on other vehicle identification information without departing from the teachings of the present disclosure, which is not limited in setting the set password.
In some embodiments of the present disclosure, fig. 3 is a schematic diagram of a mechanical key engraved with a set password, according to some embodiments of the present disclosure. As shown in fig. 3, the set password may be engraved on the mechanical key 300. When the mechanical key suppliers leave the factories, the set passwords can be laser carved on each key.
It should be appreciated that the set code may also be engraved on the key blade 400 of a mechanical key (e.g., as shown in fig. 4) or other location of the vehicle without departing from the teachings of the present disclosure, and is not limited thereto.
In step 203, the vehicle is started in response to the check password being the same as the set password.
In this embodiment, for a legal vehicle occupant, he can legally acquire the set password of the vehicle and input the password in the popup window. For an illegal car using person, the person cannot know the set password of the car, so that the person cannot use the car. After the execution main body obtains the verification password, if the verification password is identical to the set password, starting the vehicle. After the vehicle is started, the user is allowed to perform driving operations. If the verification password is different from the set password, the execution body does not start the vehicle, and the user cannot perform driving operation.
It should be appreciated that, without departing from the teachings of the present disclosure, if it is determined that the verification password is not the same as the set password, the executing body may also perform other operations, for example, may perform a specified alarm operation, such as sounding an alarm, etc., which the present disclosure is not limited to.
In some embodiments of the present disclosure, the vehicle may include a VCU, mechanical key, tester, BDCU, CDC, PKC, etc. system, as described above, with the set password written to the BDCU by the master. After receiving the check password, the BDCU compares the received check password with the stored set password, if the result is consistent, the VCU is allowed to start the vehicle, if the result is inconsistent, the password is prompted to input errors, and the starting fails.
According to some embodiments of the present disclosure, the vehicle is set to a factory mode after leaving the factory, in which the execution subject checks a check password input by a user, and if the check password is the same as the set password, the vehicle can be started. In the embodiment, the vehicle can be started by the vehicle user through setting the password, so that convenience of key handover is met, anti-theft verification in the starting process is realized, and safety is improved. In addition, the process does not need to register Bluetooth keys or install NFC equipment, solves the practical problem that car personnel cannot register mobile phone Bluetooth keys in factories, in links such as vehicle transportation and the like, but needs to start vehicles, and reduces management cost, equipment cost and development cost.
In some scenarios, fig. 5 is a schematic flow diagram of the operation of various systems of a vehicle anti-theft method 200, in accordance with some embodiments of the present disclosure.
As described above, the vehicle may include VCU, tester, BDCU, CDC and PKC systems. Based on the vehicle theft prevention method 200 of the present disclosure, in EOL mode, i.e., during the down-line radio inspection process, the operations performed by each system may include:
in step 501, the tester obtains an input setting password. The set password may be, for example, a 4-bit password.
In step 502, the tester writes the set password to the BDCU. The procedure of writing the password may be referred to the above related description, and will not be described herein.
After that, the vehicle completes the radio inspection process, and enters a factory mode, in which the operations performed by the respective systems may include:
step 503, the cdc detects that the operator opens the door and pops up a popup window for inputting a password. Specifically, the operator opens the door with a mechanical key, the vehicle switches to on, and the CDC pops up a pop-up window for entering a password.
Step 504, the cdc obtains the verification code entered by the vehicle operator and forwards the verification code to the BDCU.
In step 505, the BDCU receives the verification password. Wherein the BDCU is in communication connection with the CDC.
In step 506, the bdcu determines whether the check password is consistent with the set password. If it is determined that the two are identical, step 507 is executed, and if it is determined that the two are not identical, step 509 is executed.
In step 507, the BDCU starts the vehicle.
Step 508, the CDC exits the password entry interface. After that, the vehicle start-up flow is ended. Step 507 and step 508 may be performed synchronously or sequentially, which is not limited herein.
Step 509, the cdc prompts that the password input fails and reminds the vehicle operator to re-input the password. And then returns to step 504.
In addition to the above operations, other systems of the vehicle may perform the detection operation of whether the smart key is registered or not in synchronization, or after the step 508 is performed, other systems of the vehicle perform the detection operation of whether the smart key is registered or not. The detecting operation may include the steps of:
in step 510, the pkc detects whether the smart key is registered. If so, step 510 is performed, and if not, the vehicle operator continues to check whether the door is opened by a mechanical key and the vehicle is started by setting a password.
In step 511, the vcu determines that the bluetooth key is registered, and switches the mode of the vehicle to the normal mode.
During entry into the normal mode, the system of the vehicle may perform the following operations:
step 512, the CDC exits the password entry interface.
In step 513, the bdcu determines whether to start the vehicle based on the key fob.
As can be seen from the above, in some embodiments of the present disclosure, the vehicle is set to a factory mode after leaving the factory, in which the execution subject checks the check password input by the user, and if the check password is the same as the set password, the vehicle can be started. In the embodiment, the vehicle can be started by the vehicle user through setting the password, so that convenience of key handover is met, anti-theft verification in the starting process is realized, and safety is improved. In addition, the process does not need to register Bluetooth keys or install NFC equipment, solves the practical problem that car personnel cannot register mobile phone Bluetooth keys in factories, in links such as vehicle transportation and the like, but needs to start vehicles, and reduces management cost, equipment cost and development cost.
With continued reference to fig. 6, fig. 6 is a flow chart of a vehicle theft prevention method according to a second embodiment of the present disclosure. The present embodiment is substantially the same as the first embodiment, and differs mainly in that: after the intelligent key is successfully registered, the vehicle can be switched to a normal mode. As shown in fig. 6, the vehicle theft prevention method 600 may include the steps of:
in step 601, in response to detecting that a door of a vehicle is opened and a current vehicle mode is a factory mode, a password input prompt message is fed back. The factory mode is a factory initial mode of the vehicle.
Step 602, obtain the inputted verification password, and compare the verification password with the set password.
In step 603, the vehicle is started in response to the check password being the same as the set password.
In this embodiment, steps 601 to 603 are substantially the same as steps 201 to 203, and are not repeated here.
In response to detecting that the key fob registration was successful, the vehicle is switched from factory mode to normal mode, step 604.
In this embodiment, when the vehicle is delivered to the user's hand, the user may register a smart key (e.g., the above-mentioned mobile phone bluetooth key), and the executing body may switch the vehicle to the normal mode after determining that the smart key registration is successful. In the normal mode, the vehicle is started by a smart key. In the embodiment, after the vehicle is delivered, the user can start the vehicle through the intelligent key, so that the convenience in starting the vehicle and the safety of the vehicle are improved, and the use experience of the user is improved.
As one example, the vehicle may include a VCU, mechanical key, tester, BDCU, CDC, PKC, etc. system as described in the first embodiment. The function of each system may be described above, and will not be described here again, but the manner in which the vehicle mode is switched in this example will be mainly described below as an example. For example, the PKC may issue a flag bit for which the key is registered after recognizing that the smart key is registered. After the VCU receives the flag bit, the vehicle can be switched to a normal mode. After the vehicle enters normal mode, the CDC may no longer pop up the password entry box and the VCU will start the vehicle based on the smart key information (e.g., real-time location information).
Alternatively, after delivery of the vehicle, the executing subject may allow the user to switch the vehicle to the factory mode again for other personnel to use the vehicle.
For example, in some scenarios, the executing body may switch the vehicle from the normal mode to the factory mode in response to detecting the diagnostic signal. For example, after receiving a diagnostic signal of a local diagnostic apparatus or a remote diagnostic signal, the execution body may control the vehicle to switch to a factory mode, so that when a component of the vehicle fails and the diagnostic signal is triggered, automatic switching of the vehicle mode is achieved, and thus maintenance personnel or other personnel can use the vehicle in a maintenance stage.
As another example, in some scenarios, the executing body may switch the vehicle from the normal mode to the factory mode in response to detecting the third party takeover signal. For example, the vehicle is a special vehicle such as a driver license test vehicle and a shared vehicle, and many passengers are involved, and if each passenger registers a smart key, the vehicle is inconvenient to use. In the example, after receiving the third party takeover signal, the execution main body can be switched to the factory mode again, so that the vehicle using personnel is allowed to start the vehicle by using the set password, intelligent key registration is not needed by the vehicle using personnel, the vehicle using convenience is improved, and the user using experience is improved.
Alternatively, the third party takeover signal may be triggered based on the takeover request instruction. Wherein the take over request instruction may be triggered by a control on the vehicle or other electronic device other than the vehicle. The executing body may send a take-over authority request to the management terminal of the vehicle after receiving the take-over request instruction of the other device, and trigger a third party take-over signal in response to receiving the take-over authority grant instruction. In this case, the execution body triggers switching of the vehicle mode after receiving the takeover authority grant instruction of the management terminal, thereby improving the vehicle safety.
It should be appreciated that the third party takeover signal may also be triggered by other means, such as by the management terminal directly issuing the third party takeover signal without limitation herein, without departing from the teachings of the present disclosure.
It should be appreciated that the execution body may also switch between factory mode and normal mode in other scenarios without departing from the teachings of the present disclosure, which is not limited in this disclosure.
According to some embodiments of the present disclosure, the vehicle is set to a factory mode after leaving the factory, in which the execution subject checks a check password input by a user, and if the check password is the same as the set password, the vehicle can be started. In the embodiment, the vehicle can be started by the vehicle user through setting the password, so that convenience of key handover is met, anti-theft verification in the starting process is realized, and safety is improved. In addition, the process does not need to register Bluetooth keys or install NFC equipment, solves the practical problem that car personnel cannot register mobile phone Bluetooth keys in factories, in links such as vehicle transportation and the like, but needs to start vehicles, and reduces management cost, equipment cost and development cost. In addition, after the delivery of the vehicle is completed, the user can start the vehicle through the intelligent key, so that the convenience in starting the vehicle and the safety of the vehicle are improved, and the use experience of the user is improved.
With continued reference to fig. 7, fig. 7 is a schematic block diagram of a vehicle anti-theft device according to a third embodiment of the present disclosure. As shown in fig. 7, the vehicle theft preventing device 700 includes: a feedback module 701, an acquisition module 702 and a start module 703. The feedback module 701 is configured to respond to detection that a door of the vehicle is opened, and the current vehicle mode is a factory mode, and feedback a password to input prompt information, wherein the factory mode is a factory initial mode of the vehicle. The acquisition module 702 is configured to acquire an entered verification password and compare the verification password to a set password. The start module 703 is configured to start the vehicle in response to the check password being the same as the set password.
In some embodiments of the present disclosure, the set password is determined based on at least one of a vehicle key bit trace information, a vehicle identification code, and a vehicle powertrain number.
In some embodiments of the present disclosure, the vehicle anti-theft device 700 may further include a writing module and a first switching module. Wherein the writing module is configured to write the set password into a memory of the vehicle. The first switching module is configured to switch a mode of the vehicle to a factory mode in response to a completion of a down-line electrical inspection procedure of the vehicle.
In some embodiments of the present disclosure, the vehicle anti-theft device 700 may further include a second switching module. The second switching module is configured to switch the vehicle from a factory mode to a normal mode in response to detecting that the key fob registration is successful, wherein a method of starting the vehicle in the normal mode includes key fob start.
In some embodiments of the present disclosure, the vehicle anti-theft device 700 may further include a third switching module. The third switching module is configured to switch the vehicle from the normal mode to the factory mode in response to detecting the diagnostic signal.
In some embodiments of the present disclosure, the vehicle anti-theft device 700 may further include a fourth switching module. The fourth switching module is configured to switch the vehicle from the normal mode to the factory mode in response to detecting the third party takeover signal.
In some embodiments of the present disclosure, the vehicle anti-theft device 700 may further include a request module and a trigger module. The request module is configured to send a take-over authority request to a management terminal of the vehicle in response to receiving the take-over request instruction. The triggering module is configured to trigger a third party takeover signal in response to receiving the takeover rights granting instruction.
It is to be noted that this embodiment is an embodiment of the apparatus corresponding to the above-described method embodiment, and this embodiment may be implemented in cooperation with the above-described method embodiment. The related technical details mentioned in the above method embodiments are still valid in this embodiment, and in order to reduce repetition, they are not repeated here. Accordingly, the related technical details mentioned in the present embodiment can also be applied in the above-described method embodiments.
It should be noted that, each module involved in this embodiment is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, units less closely related to solving the technical problem presented by the present invention are not introduced in the present embodiment, but it does not indicate that other units are not present in the present embodiment.
According to a fourth embodiment of the present disclosure, there is provided an electronic apparatus including: at least one processor and a memory. The memory is communicatively coupled to the at least one processor and stores instructions executable by the at least one processor to enable the at least one processor to perform the methods as set forth in the embodiments.
According to a fifth embodiment of the present disclosure, there is provided a vehicle provided with the electronic apparatus mentioned in the fifth embodiment. Wherein the electronic device may be implemented as an in-vehicle host. The on-board host may include the VCU, BDCU, CDC, PKC system mentioned above, and the like.
In some embodiments of the present disclosure, the vehicle may further include a mechanical key. As described above, the set password may be engraved on the mechanical key.
According to a sixth embodiment of the present disclosure, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method mentioned in the above embodiments.
According to a seventh embodiment of the present disclosure, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method mentioned in the above embodiments.
Fig. 8 illustrates a schematic block diagram of an example electronic device 800 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, the device 800 includes a processor 801 that may perform various suitable actions and processes in accordance with a computer program stored in a Read Only Memory (ROM) 802 or a computer program loaded from a memory 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data required for the operation of the device 800 can also be stored. The processor 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to the bus 804.
Various components in device 800 are connected to I/O interface 805, including: an input unit 806 such as a keyboard, mouse, etc.; an output unit 807 such as various types of displays, speakers, and the like; memory 808, such as a magnetic disk, optical disk, etc.; and a communication unit 809, such as a network card, modem, wireless communication transceiver, or the like. The communication unit 809 allows the device 800 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The processor 801 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of processor 801 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 801 performs the various methods and processes described above, such as the vehicle theft prevention method 200/600. For example, in some embodiments, the vehicle theft protection method 200/600 may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the memory 808. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 800 via ROM 802 and/or communication unit 809. When a computer program is loaded into RAM 803 and executed by processor 801, one or more of the steps of the vehicle theft prevention method 200/600 described above may be performed. Alternatively, in other embodiments, the processor 801 may be configured to perform the vehicle theft prevention method 200/600 by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server incorporating a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel or sequentially or in a different order, provided that the desired results of the technical solutions of the present disclosure are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (19)

1. A vehicle anti-theft method comprising:
responding to the fact that a vehicle door of a vehicle is opened, and the current vehicle mode is a factory mode, and feeding back password input prompt information, wherein the factory mode is a factory initial mode of the vehicle;
acquiring an input check password, and comparing the check password with a set password; and
and starting the vehicle in response to the check password being the same as the set password.
2. The method of claim 1, further comprising:
writing the set password into a memory of the vehicle;
and setting the vehicle to the factory mode in response to completion of a down-line electrical inspection procedure of the vehicle.
3. The method of claim 1 or 2, further comprising:
and responding to the detection of successful registration of the intelligent key, and switching the vehicle from the factory mode to the normal mode, wherein the starting mode of the vehicle in the normal mode comprises intelligent key starting.
4. A method according to claim 3, further comprising:
in response to detecting the diagnostic signal, the vehicle is switched from the normal mode to a factory mode.
5. A method according to claim 3, further comprising:
in response to detecting a third party takeover signal, the vehicle is switched from the normal mode to a factory mode.
6. The method of claim 5, further comprising:
responding to receiving a take-over request instruction, and sending a take-over permission request to a management terminal of the vehicle; and
and triggering the third party to take over the signal in response to receiving the take over authority grant instruction.
7. The method of any one of claims 1 to 6, wherein the set password is determined from at least one of a vehicle mechanical key bit traceability information, a vehicle identification code, and a vehicle powertrain number.
8. A vehicle anti-theft device comprising:
the feedback module is set to respond to the detection that the door of the vehicle is opened, and the current vehicle mode is a factory mode, and feeds back the password input prompt information, wherein the factory mode is a factory initial mode of the vehicle;
the acquisition module is configured to acquire an input check password and compare the check password with a set password; and
and a starting module configured to start the vehicle in response to the check password being the same as the set password.
9. The apparatus of claim 8, further comprising:
a writing module configured to write the set password into a memory of the vehicle;
and a first switching module configured to switch a mode of the vehicle to the factory mode in response to completion of a down-line electrical inspection procedure of the vehicle.
10. The apparatus of claim 8 or 9, further comprising:
and the second switching module is configured to switch the vehicle from the factory mode to a normal mode in response to detection of successful registration of the smart key, wherein a starting method of the vehicle in the normal mode comprises smart key starting.
11. The apparatus of claim 10, further comprising:
A third switching module configured to switch the vehicle from the normal mode to a factory mode in response to detecting a diagnostic signal.
12. The apparatus of claim 10, further comprising:
a fourth switching module configured to switch the vehicle from the normal mode to a factory mode in response to detecting a third party takeover signal.
13. The apparatus of claim 12, further comprising:
the request module is configured to send a take-over authority request to a management terminal of the vehicle in response to receiving a take-over request instruction; and
and the triggering module is configured to trigger the third party to take over the signal in response to receiving the take over permission grant instruction.
14. The apparatus of any one of claims 8 to 13, wherein the set password is determined from at least one of a vehicle key bit traceability information, a vehicle identification code, and a vehicle powertrain number.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 7.
16. A vehicle on which the electronic apparatus of claim 15 is provided.
17. The vehicle of claim 16, further comprising a mechanical key, the set password being engraved on the mechanical key.
18. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1 to 7.
19. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 7.
CN202311281698.4A 2023-10-07 2023-10-07 Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product Pending CN117183986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311281698.4A CN117183986A (en) 2023-10-07 2023-10-07 Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311281698.4A CN117183986A (en) 2023-10-07 2023-10-07 Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product

Publications (1)

Publication Number Publication Date
CN117183986A true CN117183986A (en) 2023-12-08

Family

ID=88994217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311281698.4A Pending CN117183986A (en) 2023-10-07 2023-10-07 Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product

Country Status (1)

Country Link
CN (1) CN117183986A (en)

Similar Documents

Publication Publication Date Title
US20120221173A1 (en) Vehicle systems activation methods and applications
US11538300B2 (en) Authentication information issuing apparatus, delivery system and authentication information issuing method
US10803681B2 (en) Server side security preventing spoofing of vin provisioning service
CN106372949A (en) Vehicle maintenance management method
CN112230624B (en) Control system and method for vehicle door lock
CN112918386B (en) Control method and device for automobile glove box lock
CN214523589U (en) Vehicle storage box control system and vehicle
CN106600083A (en) Management method and management device for managing order receiving behavior of driver
CN107464447A (en) A kind of parking stall reserving method and device based on Internet of Things
CN105050061A (en) Method and device for sending messages on the basis of user voiceprint information
CN117183986A (en) Vehicle anti-theft method, device, apparatus, vehicle, storage medium and program product
US20190114414A1 (en) Vehicle computer update authentication
CN113160463B (en) Method and device for starting user identification device of vehicle and automobile control cloud
CN109067745B (en) Method for authenticating vehicle occupant, apparatus, device and storage medium therefor
CN113704106B (en) Off-line detection system, method, equipment and medium for automobile digital key
US11321072B2 (en) Vehicle computer update authentication
CN110539723B (en) Automobile trunk control method and system, vehicle-mounted equipment and server
CN114915939A (en) Vehicle personalized configuration method and system, readable storage medium and electronic equipment
CN113807117A (en) Vehicle security check method, system, device, equipment and storage medium
CN114049135A (en) Vehicle delivery control method and system
US20210158638A1 (en) Reducing latency in a passive entry system of a vehicle
CN116279286B (en) Unlocking method, device, equipment and medium of engine
CN112184953A (en) Unlocking method, unlocking system, logistics vehicle, equipment and storage medium
CN109308535A (en) Vehicle authentication method, program, terminal installation and Vehicle Authentication System
CN114386005A (en) Login method and device of vehicle-mounted system, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination