WO2020232854A1 - 车辆解锁方法、装置、计算机设备及存储介质 - Google Patents

车辆解锁方法、装置、计算机设备及存储介质 Download PDF

Info

Publication number
WO2020232854A1
WO2020232854A1 PCT/CN2019/101897 CN2019101897W WO2020232854A1 WO 2020232854 A1 WO2020232854 A1 WO 2020232854A1 CN 2019101897 W CN2019101897 W CN 2019101897W WO 2020232854 A1 WO2020232854 A1 WO 2020232854A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
ciphertext
vehicle
secret key
terminal device
Prior art date
Application number
PCT/CN2019/101897
Other languages
English (en)
French (fr)
Inventor
陈步青
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020232854A1 publication Critical patent/WO2020232854A1/zh

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/248Electronic key extraction prevention
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Definitions

  • This application relates to the technical field of cryptography, in particular to a vehicle unlocking method, device, computer equipment and storage medium.
  • Face unlocking and fingerprint unlocking are limited by the accuracy of face recognition and require a specific camera or fingerprint collector to achieve this, resulting in higher hardware costs. High, it cannot be popularized on low-end vehicles, and there may be errors in face recognition and fingerprint recognition, and 100% recognition accuracy cannot be guaranteed, which may cause property losses to users.
  • the present application provides a vehicle unlocking method, device, computer equipment, and storage medium, which are used to improve the security of smart unlocking, so as to prevent others from hacking the vehicle unlocking program to cause user property loss and enhance user experience.
  • a method for unlocking a vehicle including the following steps performed at the control end of the vehicle:
  • the vehicle unlocking instruction including an unlocking ciphertext after the terminal device is encrypted by a first secret key, the first secret key being a key generated according to the RSA algorithm ;
  • unlock the vehicle When the unlocking ciphertext meets the unlocking condition, unlock the vehicle.
  • a method for unlocking a vehicle includes the following steps performed on a terminal device:
  • the vehicle unlocking instruction containing the unlocking ciphertext is sent to the vehicle central control terminal, so that the vehicle central control terminal uses the first public key to decrypt the encrypted unlocking ciphertext, after Unlock the vehicle when the unlocking ciphertext meets the unlocking conditions.
  • a vehicle unlocking device includes a vehicle central control terminal, and the vehicle central control terminal includes:
  • the connection module is configured to receive a wireless connection request containing a unique identifier sent by a terminal device, and establish a wireless connection with the terminal device according to the unique identifier;
  • the receiving module is configured to receive a vehicle unlocking instruction sent by the terminal device, where the vehicle unlocking instruction includes an unlocking ciphertext after the terminal device is encrypted by a first secret key, and the first secret key is based on RSA The key generated by the algorithm;
  • a decryption module configured to use the first public key generated according to the RSA algorithm to decrypt the unlocked ciphertext, and obtain the decrypted unlocked ciphertext;
  • the detection module is configured to detect whether the decrypted unlocked ciphertext meets the unlocking condition according to a preset unlocking rule
  • the unlocking module is used to unlock the vehicle when the unlocking ciphertext meets the unlocking condition.
  • a vehicle unlocking device includes terminal equipment, and the terminal equipment includes:
  • the first sending module is configured to send a wireless connection request including a unique identifier to the terminal device, and establish a wireless connection with the vehicle central control terminal through the unique identifier;
  • An obtaining module configured to obtain a first secret key and an unlocking ciphertext, and encrypt the unlocking ciphertext with the first secret key
  • the second sending module is configured to send the vehicle unlocking instruction including the unlocking ciphertext to the vehicle central control terminal, so that the vehicle central control terminal uses the first public key to encrypt the unlocking ciphertext After decryption, the vehicle is unlocked when the unlocking ciphertext meets the unlocking condition.
  • a computer device includes a memory, a processor of a vehicle central control terminal, and computer-readable instructions stored in the memory and capable of running on the processor.
  • the processor executes the computer-readable instructions, the following is achieved step:
  • the vehicle unlocking instruction including an unlocking ciphertext after the terminal device is encrypted by a first secret key, the first secret key being a key generated according to the RSA algorithm ;
  • unlock the vehicle When the unlocking ciphertext meets the unlocking condition, unlock the vehicle.
  • a computer device including a memory, a processor of a terminal device, and computer-readable instructions stored in the memory and capable of running on the processor.
  • the processor implements the following steps when the processor executes the computer-readable instructions :
  • the vehicle unlocking instruction containing the unlocking ciphertext is sent to the vehicle central control terminal, so that the vehicle central control terminal uses the first public key to decrypt the encrypted unlocking ciphertext, after Unlock the vehicle when the unlocking ciphertext meets the unlocking conditions.
  • One or more non-volatile readable storage media storing computer-readable instructions.
  • the computer-readable instructions are executed by one or more processors of the vehicle central control end, the one or more vehicle central control The processor at the end performs the following steps:
  • the vehicle unlocking instruction including an unlocking ciphertext after the terminal device is encrypted by a first secret key, the first secret key being a key generated according to the RSA algorithm ;
  • unlock the vehicle When the unlocking ciphertext meets the unlocking condition, unlock the vehicle.
  • One or more non-volatile readable storage media storing computer-readable instructions.
  • the computer-readable instructions are executed by the processors of one or more terminal devices, the processing of the one or more terminal devices The device performs the following steps:
  • the vehicle unlocking instruction containing the unlocking ciphertext is sent to the vehicle central control terminal, so that the vehicle central control terminal uses the first public key to decrypt the encrypted unlocking ciphertext, after Unlock the vehicle when the unlocking ciphertext meets the unlocking conditions.
  • FIG. 1 is a schematic diagram of an application environment of a vehicle unlocking method in an embodiment of the present application
  • FIG. 2 is a flowchart of the method for unlocking a vehicle in an embodiment of the present application executed at the vehicle central control end;
  • FIG. 3 is a flowchart of step S40 of the vehicle unlocking method in an embodiment of the present application.
  • FIG. 4 is a flowchart of a method for unlocking a vehicle in another embodiment of the present application.
  • FIG. 5 is a flowchart of a method for unlocking a vehicle in an embodiment of the present application executed on a terminal device;
  • FIG. 6 is a flowchart of step S90 of the vehicle unlocking method in an embodiment of the present application.
  • FIG. 7 is a schematic diagram of the vehicle central control end of the vehicle unlocking device in an embodiment of the present application.
  • FIG. 8 is a schematic diagram of a detection module of a vehicle unlocking device in an embodiment of the present application.
  • FIG. 9 is a schematic diagram of the vehicle central control end of the vehicle unlocking device in another embodiment of the present application.
  • FIG. 10 is a schematic diagram of a terminal device of a vehicle unlocking device in an embodiment of the present application.
  • Fig. 11 is a schematic diagram of a computer device in an embodiment of the present application.
  • the vehicle unlocking method provided in this application can be applied in the application environment as shown in Fig. 1, wherein the terminal device communicates with the vehicle central control terminal through the network.
  • the key data for unlocking that is, the unlocking ciphertext
  • the unlocking rules are preset
  • the unlocking ciphertext is determined, and the vehicle is unlocked when the unlocking ciphertext meets the unlocking condition.
  • terminal devices include, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
  • the vehicle central control terminal is installed in the vehicle and can be implemented by an independent server or a server cluster composed of multiple servers.
  • a method for unlocking a vehicle is provided.
  • the method is applied to the vehicle central control terminal in FIG. 1 as an example for illustration.
  • the vehicle unlocking method includes the method executed on the vehicle central control terminal. The following steps:
  • S10 Receive a wireless connection request including a unique identifier sent by a terminal device, and establish a wireless connection with the terminal device according to the unique identifier.
  • the terminal devices include, but are not limited to, mobile terminals such as mobile phones, smart watches, and key rings with communication functions (Bluetooth function), as well as terminal devices such as computers.
  • the unique identifier is a unique identifier used to distinguish different terminal devices.
  • the connection request can be sent to the vehicle central control terminal by the user by clicking a preset button, and can also be automatically sent to the vehicle central control terminal within a certain range of the receiver. For example, when the user wants to unlock the vehicle, he sends the connection request to the vehicle central control terminal by clicking the preset button of the terminal device he carries, or when the user enters a certain range of the vehicle, After the terminal device carried by it detects it, it automatically sends the connection request to the vehicle central control terminal.
  • the vehicle central control terminal after receiving the connection request, establishes a wireless connection with the terminal device.
  • the connection request is sent to the vehicle central control terminal via Bluetooth
  • the vehicle After receiving the request, the central control terminal establishes a wireless connection with the terminal device via Bluetooth.
  • the establishment of a wireless connection between the vehicle central control terminal and the terminal device may also establish a wireless connection with the terminal device through a wireless network technology (such as WiFi).
  • a wireless connection is established with the terminal device for receiving a vehicle unlocking instruction sent by the terminal device in a subsequent step, so as to unlock the vehicle.
  • the vehicle unlocking instruction is an instruction for unlocking the vehicle. After receiving the vehicle unlocking instruction, the vehicle central control terminal starts the unlocking process for the vehicle.
  • the unlocking ciphertext is a ciphertext used to unlock the vehicle, and may be a string of characters, a word, or a sentence.
  • the unlocking ciphertext may be generated when the vehicle unlocking instruction is sent and encrypted by the first secret key, or it may be encrypted by the first secret key of the RSA algorithm and then stored in the terminal device in advance in.
  • the RSA algorithm is an asymmetric encryption algorithm, that is, a key generated according to the RSA algorithm for encrypting information or data, and a secret key generated according to the RSA algorithm for decrypting information or data.
  • the key is asymmetric. For example, a pair of keys is generated at the same time according to the RSA algorithm, which are the first secret key and the first public key.
  • the first secret key is used to encrypt information or data
  • the first secret key is used to decrypt the information or the data, and must be used differently from the first secret key and asymmetric (this asymmetry means that the known first secret key cannot be passed through the known
  • the method of deriving the first public key of the first public key can decrypt the information or data encrypted by the first secret key.
  • the RSA algorithm When using the RSA algorithm to encrypt information or data, first generate a pair of keys at the same time according to the RSA algorithm, one of which is confidential and not public, that is, only the user or the person or device preset by the user
  • the key that can be saved or known, this key is the secret key (in this embodiment, it is the first secret key); and the other key is public and non-confidential.
  • a key that can be learned or obtained by the device, and the secret key is a public key (in this embodiment, it is the first public key).
  • the first secret key and the first public key are a pair of asymmetric keys, that is, when the first secret key is used to encrypt information or data, the The first public key can decrypt the encrypted information or data; conversely, when the first public key is used to encrypt information or data, the first secret key can be used to decrypt the information or data.
  • the encrypted information or data is decrypted. It must be noted that, after the first secret key is generated in the vehicle central control terminal according to the RSA algorithm in advance, it is sent and stored to a terminal device controlled by the user.
  • the first secret key is usually stored in the terminal device controlled by the user.
  • the terminal device that has established a wireless connection with the vehicle uses the first secret key to encrypt the unlocking ciphertext, or directly retrieves the pre-stored on the terminal device
  • the unlocking ciphertext encrypted by the first secret key is sent to the vehicle central control terminal.
  • the vehicle central control terminal receives the encrypted unlocking ciphertext
  • the text is used to decrypt the unlocking ciphertext in the subsequent steps, and then it is determined whether the user who raised the vehicle unlocking request meets the unlocking condition.
  • the first public key is a public, non-secret key generated simultaneously according to the RSA algorithm and the first secret key, and the first public key is the same as the first secret key.
  • the secret key is a pair of asymmetric keys. After the first public key is generated according to the RSA algorithm, it is stored in the vehicle database of the vehicle central control terminal.
  • the vehicle central control terminal After the vehicle central control terminal receives the decrypted ciphertext sent by the terminal device, it retrieves the first public key from the vehicle database, and then uses the first public key pair to receive the The unlocked ciphertext is decrypted, and the decrypted unlocked ciphertext is generated, and then the unlocked ciphertext is acquired for use in step S40 to detect whether the decrypted unlocked ciphertext meets a preset unlocking condition.
  • the unlocking rule can be preset according to requirements.
  • the unlocking rule may be set such that when the content of the unlocking ciphertext is consistent with the content of the preset unlocking ciphertext, the unlocking ciphertext meets the unlocking condition.
  • the unlocking ciphertext may also be preset by the user according to requirements, and it may be a string of characters, a word, or a sentence, etc.
  • the unlocking ciphertext is used as a word to describe this embodiment: for example, The preset unlocking ciphertext is "Hello".
  • step S50 to unlock the vehicle; when the result is no, it means that the unlocking ciphertext does not meet the unlocking condition, at this time, the vehicle unlocking request this time is recorded as a request failure, and the number of request failures of the vehicle unlocking request is increased by one, so that in some embodiments, according to all The number of failed requests is a preset limit for the next vehicle unlock request.
  • the unlocking rule includes the first unique identifier of at least one terminal device, that is, the unique identifiers of all terminal devices that can unlock in advance are stored in the unlocking rule; the content of the unlocking ciphertext It is the second unique identifier of the terminal device used by the current user, that is, the unique identifier of the terminal device that initiates the vehicle unlocking instruction. In this embodiment, it is detected whether all the first unique identifiers in the unlocking rule exist or not.
  • Said unlocking ciphertext with the same identity as the second unique identifier that is, the second unique identifier is compared with all the first unique identifiers, and when it is detected that all the first unique identifiers exist
  • the unique identifier is consistent with the second unique identifier, it represents that the terminal device corresponding to the second unique identifier is a preset terminal device that can unlock the vehicle.
  • the unlocking ciphertext conforms to Unlock condition; and when it is detected that there is no unique identifier consistent with the second unique identifier among all the first unique identifiers, it means that the terminal device corresponding to the second unique identifier is not pre-existing in the unlock rule At this time, the vehicle unlocking request is recorded as a request failure, and the number of request failures of the vehicle unlocking request is increased by one.
  • the unlocking ciphertext meets the unlocking condition, it represents that the user who initiated the vehicle unlocking instruction operation has the unlocking qualification. At this time, the vehicle is unlocked according to the vehicle unlocking instruction.
  • the key data for unlocking namely the unlocking ciphertext
  • the security of smart unlocking is greatly improved to prevent the loss of user property caused by others cracking the vehicle unlocking program and enhance the user experience.
  • the unlocking rule includes a preset length of unlocking time and a preset unlocking ciphertext
  • the unlocking ciphertext includes the unlocking ciphertext content and the information used to generate the unlocking ciphertext with the terminal device.
  • the unlocking ciphertext includes unlocking ciphertext content, and the unlocking ciphertext content may be a string of characters, a sentence, or a word, etc., which is used to compare with the unlocking ciphertext in the unlocking rule.
  • step S402 is entered to obtain the time point when the terminal device generates the unlocking ciphertext according to the timestamp, so as to further verify whether the unlocking ciphertext meets the unlocking condition.
  • the unlocking ciphertext also includes a timestamp corresponding to the time point when the terminal device generates the unlocking ciphertext, and the timestamp is a complete, complete, time-stamp that can indicate that a piece of data has existed before a certain time.
  • a verifiable character sequence the timestamp uniquely identifies the time at a certain moment, specifically, the timestamp is data generated using data signature technology, and the object of signature includes original file (data) information, signature parameters, Signature time and other information.
  • the timestamp can provide an electronic evidence for the unlocked ciphertext to prove the time when the unlocked ciphertext was generated, and the authenticity of the proof is very high, because the timestamp cannot be used in known technologies. Has been tampered with.
  • the sending rule for unlocking ciphertext is first set and stored in the terminal device in advance.
  • the rule is when the user needs to send a vehicle unlocking instruction and has clicked a preset button to proceed.
  • the decrypted ciphertext content is generated when the vehicle unlocking instruction is sent, and after the decrypted ciphertext content is generated, the corresponding time stamp is generated for the generated decrypted ciphertext content at the fastest speed, and at the same time , Use the first secret key to encrypt the decrypted ciphertext content and the generated time stamp to generate an encrypted decrypted ciphertext.
  • the generated time stamp can approximately identify the decrypted cipher text The time point when the text was generated.
  • the time point when the terminal device generates the unlocking ciphertext is acquired, so as to further determine whether the unlocking ciphertext meets the unlocking condition in step S403.
  • S403 Detect whether the time length between the time point when the unlocking ciphertext is generated and the time point when the unlocking ciphertext is received is less than the unlocking time length, and when the time point when the unlocking ciphertext is generated and the time point when the unlocking ciphertext is received When the time length between the time points of the unlocking ciphertext is less than the unlocking time length, it is confirmed that the unlocking ciphertext meets the unlocking condition.
  • the length of the unlocking time can be preset according to requirements.
  • the unlocking time length is 2 seconds.
  • the unlocking ciphertext sending rule is preset, that is, when the user initiates a vehicle unlocking instruction operation, the unlocking ciphertext is generated, and the unlocking ciphertext is stamped with time If the length of time between the time when the terminal device generates the unlocking ciphertext and the time when the vehicle central control terminal receives the unlocking ciphertext is too large, that is, the unlocking ciphertext is being generated After a relatively long time, it is sent to the vehicle central control terminal, which means that it is possible that the unlocking ciphertext or the first secret key has been cracked or learned by others and stored in advance before unlocking the vehicle. It is sent to the vehicle central control terminal.
  • the vehicle central control terminal it is detected whether the time point at which the terminal device generates the unlocking ciphertext and the time point at which the unlocking ciphertext is received by the vehicle central control terminal is less than the unlocking time length.
  • the length of time between the time point of the unlocking ciphertext and the time point of receiving the unlocking ciphertext is greater than or equal to the length of the unlocking time, which proves that the unlocking ciphertext does not meet the unlocking conditions, that is, a vehicle unlocking instruction is initiated
  • the user of may not be eligible to unlock.
  • the unlocking ciphertext does not meet the unlocking conditions, and record that the vehicle unlocking request cannot be passed this time, that is, the number of times the vehicle unlocking request cannot be passed plus one; otherwise, when When the time length between the time point when the unlocking ciphertext is generated and the time point when the unlocking ciphertext is received is less than the unlocking time length, it means that the unlocking ciphertext is sent according to a preset sending rule, That is, the unlocking ciphertext meets the unlocking condition. At this time, it is confirmed that the unlocking ciphertext meets the unlocking condition, so as to unlock the vehicle in a subsequent step.
  • the method further includes:
  • the vehicle unlocking instruction operation is initiated, that is, the user who initiated the vehicle unlocking request is not eligible for unlocking.
  • the vehicle unlocking request is recorded Is the request failure, and the number of request failures of the vehicle unlock request is increased by one. It must be noted that the number of failed requests for each vehicle unlock request recorded will be accumulated, but when the vehicle control terminal has passed the vehicle unlock request, that is, when the vehicle has been unlocked, the previously recorded vehicle The number of failed unlock requests will be cleared. For example, if there are three consecutive vehicle unlocking requests that cannot be passed, the number of failed requests for vehicle unlocking requests recorded and accumulated at this time is 3. At this time, if the next vehicle unlocking request is passed by the vehicle central control terminal, the previous The number of failed requests of the recorded vehicle unlock request is cleared to zero, that is, the number of failed requests of the vehicle unlock request is 0, and the recording is restarted.
  • S70 Lock the vehicle when the number of failed requests for unlocking the vehicle is greater than a preset locking threshold.
  • the number of request failures of the vehicle unlock request further includes the number of request failures recorded in the step S401.
  • the lock threshold may be preset according to requirements. Preferably, the lock threshold is 5.
  • the locking of the vehicle includes: within a preset time period, no longer receiving vehicle unlocking instructions, that is, not unlocking the vehicle, and sending the lock of the vehicle to a preset management party to remind Someone in the management party maliciously unlocks or is attacking (cracking) the vehicle central control terminal.
  • the lock threshold When the number of times that the vehicle unlock request cannot be passed is greater than the lock threshold, it means that the vehicle may encounter a situation where someone maliciously unlocks or attacks (cracks) the unlocking system. At this time, lock the vehicle to prevent The unlocking system of the vehicle is attacked (cracked) by people, which improves the safety of unlocking the vehicle and enhances user experience.
  • a method for unlocking a vehicle is provided.
  • the method is applied to the terminal device in FIG. 1 as an example for description.
  • the method for unlocking a vehicle includes the following steps performed on the terminal device:
  • S80 Send a wireless connection request including a unique identifier to the terminal device, and establish a wireless connection with the vehicle central control terminal through the unique identifier.
  • the unique identifier is a unique identifier used to distinguish different terminal devices.
  • the connection request is sent to the vehicle central control terminal through the terminal device, or when the user enters a certain range of the vehicle
  • the terminal device carried by it detects it, it automatically sends the connection request to the vehicle central control terminal; after the vehicle central control terminal receives the connection request, it immediately establishes a wireless connection with the terminal device.
  • the establishment of the connection establishes a wireless connection with the vehicle central control terminal through wireless network technology, such as WIFI, Bluetooth, etc., so as to send a vehicle unlocking instruction to the vehicle central control terminal in a subsequent step.
  • S90 Obtain a first secret key and an unlocking ciphertext, and encrypt the unlocking ciphertext by using the first secret key.
  • the first secret key may be pre-generated in the vehicle central control terminal according to the RSA algorithm, and sent to the terminal device of the vehicle central control terminal for storage In the database, it can be retrieved from the terminal database of the terminal device when acquiring, and acquiring the unlocking ciphertext includes: generating an unlocking ciphertext according to a preset ciphertext rule, or the unlocking ciphertext has been preset And stored in the terminal database of the terminal device. At this time, the unlocking ciphertext is directly retrieved from the terminal database. Further, the unlocking ciphertext is encrypted by the first secret key, so as to send the unlocking ciphertext to the vehicle central control terminal in a subsequent step for subsequent unlocking procedures.
  • the step S90 includes:
  • S901 Obtain a first secret key encrypted by a second public key, and obtain a second secret key corresponding to the second public key.
  • the second public key and the second secret key are a pair of asymmetric keys generated by the RSA algorithm, and the second public key is inconsistent with the first public key (that is, both Are two different keys), the second secret key is inconsistent with the first secret key (that is, the two are two different keys), and the second public key is used to encrypt the The first secret key, and the second secret key is used to encrypt the first secret key encrypted by the second public key.
  • the second public key and the second secret key are generated in advance and stored in the terminal database of the terminal device.
  • the first secret key encrypted by the second public key is obtained, and the second secret key is obtained for decrypting the first secret key in subsequent steps.
  • the first secret key encrypted by the second public key can be stored in the cloud instead of being stored in the terminal device, which can prevent the loss of the terminal device from causing the first secret key The key is also lost, and the vehicle cannot be unlocked, enhancing the user experience. Even if the encrypted first secret key is stored in a non-private cloud, there is no need to worry about being stolen and misappropriated by others.
  • step S902 Use the second secret key to decrypt the first secret key encrypted by the second public key, and obtain the decrypted first secret key.
  • step S903 Use the first secret key to encrypt the unlocking cipher text in step S903.
  • the confidentiality and security of the first secret key are further enhanced, and the security of the entire vehicle unlocking system is enhanced, user experience.
  • This application encrypts the key data for unlocking, namely the unlocking ciphertext, by using the secret key and the public key generated by the RSA algorithm in the process of intelligently unlocking the vehicle, and combines the timestamp and the unlocking
  • the ciphertext is double-encrypted, and while the vehicle is quickly and intelligently unlocked, the security of the intelligent unlocking is greatly improved, so as to prevent the loss of the user's property caused by others' cracking the vehicle unlocking program and enhance the user experience.
  • a vehicle unlocking device is provided, and the vehicle unlocking device corresponds to the vehicle unlocking method in the foregoing embodiment one-to-one.
  • the vehicle unlocking device includes a vehicle central control terminal, and the vehicle central control terminal includes a connection module 11, a receiving module 12, a decryption module 13, a detection module 14 and an unlocking module 15.
  • the detailed description of each functional module is as follows:
  • the connection module 11 is configured to receive a wireless connection request containing a unique identifier sent by a terminal device, and establish a wireless connection with the terminal device according to the unique identifier;
  • the receiving module 12 is configured to receive a vehicle unlocking instruction sent by the terminal device, where the vehicle unlocking instruction includes an unlocking ciphertext after the terminal device is encrypted by a first secret key, and the first secret key Is the key generated according to the RSA algorithm;
  • the decryption module 13 is configured to use the first public key generated according to the RSA algorithm to decrypt the unlocked ciphertext, and obtain the decrypted unlocked ciphertext;
  • the detection module 14 is configured to detect whether the unlocked ciphertext after decryption meets the unlocking condition according to a preset unlocking rule
  • the unlocking module 15 is used to unlock the vehicle when the unlocking ciphertext meets the unlocking condition.
  • the detection module 14 includes:
  • the ciphertext comparison unit 141 is configured to detect whether the content of the unlocked ciphertext is consistent with the unlocked ciphertext;
  • the time obtaining unit 142 is configured to obtain, according to the timestamp, the time point when the terminal device generates the unlocking ciphertext when the unlocking ciphertext content is consistent with the unlocking ciphertext;
  • the time comparison unit 143 is configured to detect whether the time length between the time point when the unlocking ciphertext is generated and the time point when the unlocking ciphertext is received is less than the unlocking time length, when the unlocking ciphertext is generated When the time length between the time point and the time point when the unlocking ciphertext is received is less than the unlocking time length, it is confirmed that the unlocking ciphertext meets the unlocking condition.
  • the vehicle central control terminal further includes:
  • the failure recording module 16 is configured to record the vehicle unlocking request this time as a request failure when the unlocking ciphertext does not meet the unlocking condition, and increase the number of request failures of the vehicle unlocking request by one;
  • the vehicle locking module 17 is used to lock the vehicle when the number of failed requests for unlocking the vehicle is greater than a preset locking threshold.
  • the vehicle unlocking device further includes a terminal device, and the terminal device includes:
  • the first sending module 18 is configured to send a wireless connection request including a unique identifier to the terminal device, and establish a wireless connection with the vehicle central control terminal through the unique identifier;
  • the obtaining module 19 is configured to obtain the first secret key and the unlocking ciphertext, and encrypt the unlocking ciphertext by the first secret key;
  • the second sending module 20 is configured to send the vehicle unlocking instruction containing the unlocking ciphertext to the vehicle central control terminal, so that the vehicle central control terminal uses the first public key to encrypt the unlocking secret After the text is decrypted, the vehicle is unlocked when the unlocked cipher text meets the unlocking condition.
  • the acquisition module includes:
  • a key acquisition unit for acquiring a first secret key encrypted by a second public key, and acquiring a second secret key corresponding to the second public key;
  • a decryption unit configured to use the second secret key to decrypt the first secret key encrypted by the second public key, and obtain the decrypted first secret key
  • the encryption unit is configured to encrypt the unlocking ciphertext by using the decrypted first secret key.
  • Each module in the aforementioned vehicle unlocking device can be implemented in whole or in part by software, hardware, and a combination thereof.
  • the foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
  • a computer device is provided.
  • the computer device may be a terminal, and its internal structure diagram may be as shown in FIG. 11.
  • the computer equipment includes a processor, a memory, a network interface, a display screen and an input device connected through a system bus.
  • the processor of the computer device is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system and computer readable instructions.
  • the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the network interface of the computer device is used to communicate with an external server through a network connection.
  • the computer-readable instruction is executed by the processor to realize a vehicle unlocking method.
  • a computer device including a memory, a processor of a vehicle central control terminal, and computer-readable instructions stored in the memory and running on the processor.
  • the processor executes the computer-readable instructions, the following is achieved step:
  • the vehicle unlocking instruction including an unlocking ciphertext after the terminal device is encrypted by a first secret key, the first secret key being a key generated according to the RSA algorithm ;
  • unlock the vehicle When the unlocking ciphertext meets the unlocking condition, unlock the vehicle.
  • a computer device including a memory, a processor of a terminal device, and computer readable instructions stored in the memory and executable on the processor, and the processor executes the The following steps are implemented when computer-readable instructions:
  • the vehicle unlocking instruction containing the unlocking ciphertext is sent to the vehicle central control terminal, so that the vehicle central control terminal uses the first public key to decrypt the encrypted unlocking ciphertext, after Unlock the vehicle when the unlocking ciphertext meets the unlocking conditions.
  • one or more non-volatile readable storage media storing computer readable instructions are provided, the non-volatile readable storage medium storing computer readable instructions, and the computer readable instructions When executed by one or more processors at the control end of the vehicle, one or more processors implement the following steps:
  • the vehicle unlocking instruction including an unlocking ciphertext after the terminal device is encrypted by a first secret key, the first secret key being a key generated according to the RSA algorithm ;
  • unlock the vehicle When the unlocking ciphertext meets the unlocking condition, unlock the vehicle.
  • one or more non-volatile readable storage media storing computer readable instructions are provided.
  • the computer readable instructions are executed by the processors of one or more terminal devices, the The processors of one or more terminal devices execute the following steps:
  • the vehicle unlocking instruction containing the unlocking ciphertext is sent to the vehicle central control terminal, so that the vehicle central control terminal uses the first public key to decrypt the encrypted unlocking ciphertext, after Unlock the vehicle when the unlocking ciphertext meets the unlocking conditions.
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • ROM read only memory
  • PROM programmable ROM
  • EPROM electrically programmable ROM
  • EEPROM electrically erasable programmable ROM
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Abstract

本申请公开了一种车辆解锁方法、装置、计算机设备及存储介质,所述方法包括:接收终端设备发送无线连接请求,并与终端设备建立无线连接;接收终端设备发送的车辆解锁指令;使用根据RSA算法生成的第一公开密钥对解锁密文进行解密,并获取解密后的解锁密文;根据预设的开锁规则,检测解密后的解锁密文是否符合开锁条件;当解锁密文符合开锁条件时,对车辆进行解锁。本申请在对车辆进行快速智能解锁的同时,大大提升了智能解锁的安全性,以防止出现被他人破解车辆解锁程序而造成用户财产损失,增强用户体验。

Description

车辆解锁方法、装置、计算机设备及存储介质
本申请以2019年5月22日提交的申请号为201910429513.7,名称为“车辆解锁方法、装置、计算机设备及存储介质”的中国发明专利申请为基础,并要求其优先权。
技术领域
本申请涉及密码技术领域,尤其涉及一种车辆解锁方法、装置、计算机设备及存储介质。
背景技术
在车辆自动解锁领域,目前没有一种低成本的自动车辆解锁方案,人脸解锁、指纹解锁受限于人脸识别的准度,并且需要特定的摄像头或者指纹收集器才能实现,导致硬件成本较高,在低端车辆上不能普及,还有就是人脸识别和指纹识别可能存在误差,无法保证百分百的识别准确率,可能会因此对用户造成财产损失。
发明内容
基于此,本申请提供一种车辆解锁方法、装置、计算机设备及存储介质,用于提升智能解锁的安全性,以防止出现被他人破解车辆解锁程序而造成用户财产损失,增强用户体验。
一种车辆解锁方法,包括在车辆中控端执行的以下步骤:
接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取 解密后的所述解锁密文;
根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
一种车辆解锁方法,包括在终端设备执行的以下步骤:
将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
一种车辆解锁装置,包括车辆中控端,所述车辆中控端包括:
连接模块,用于接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
接收模块,用于接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
解密模块,用于使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
检测模块,用于根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
开锁模块,用于当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
一种车辆解锁装置,包括终端设备,所述终端设备包括:
第一发送模块,用于将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
获取模块,用于获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
第二发送模块,用于将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密 之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
一种计算机设备,包括存储器、车辆中控端的处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
一种计算机设备,包括存储器、终端设备的处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个车辆中控端的处理器执行时,使得所述一个或多个车辆中控端的处理器执行如下步骤:
接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设 备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个终端设备的处理器执行时,使得所述一个或多个终端设备的处理器执行如下步骤:
将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
本申请的一个或多个实施例的细节在下面的附图和描述中提出,本申请的其他特征和优点将从说明书、附图以及权利要求变得明显。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一实施例中车辆解锁方法的一应用环境示意图;
图2是本申请一实施例中车辆解锁方法在车辆中控端执行的流程图;
图3是本申请一实施例中车辆解锁方法的步骤S40的流程图;
图4是本申请另一实施例中车辆解锁方法的流程图;
图5是本申请一实施例中车辆解锁方法在终端设备执行的流程图;
图6是本申请一实施例中车辆解锁方法的步骤S90的流程图;
图7是本申请一实施例中车辆解锁装置的车辆中控端的示意图;
图8是本申请一实施例中车辆解锁装置的检测模块的示意图;
图9是本申请另一实施例中车辆解锁装置的车辆中控端的示意图;
图10是本申请一实施例中车辆解锁装置的终端设备的示意图;
图11是本申请一实施例中计算机设备的一示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请提供的车辆解锁方法,可应用在如图1的应用环境中,其中,终端设备通过网络与车辆中控端进行通信。通过在对车辆进行智能解锁的过程中使用由RSA算法生成的保密密钥和公开密钥,对进行开锁的关键数据即所述解锁密文进行加密,进一步地,通过预设的开锁规则对所述解锁密文进行判定,在所述解锁密文符合开锁条件时,对车辆进行解锁。其中,终端设备包括但不限于各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备。车辆中控端安装在所述车辆中,可以用独立的服务器或者是多个服务器组成的服务器集群来实现。
在一实施例中,如图2所示,提供一种车辆解锁方法,以该方法应用在图1中的车辆中控端为例进行说明,所述车辆解锁方法包括在车辆中控端执行的如下步骤:
S10,接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接。
其中,所述终端设备包括但不限于手机、智能手表、具有通讯功能(蓝牙功能)的钥匙环等移动终端,还包括电脑等终端设备。所述唯一标识是用于区分不同的终端设备的具有唯一性的标识。
所述连接请求可以由用户通过点击预设的按钮发送至车辆中控端,还可以在进入到接收器的一定范围内,自动发送至车辆中控端。比如,当用户想要对车辆进行解锁时,通过点击其携带的终端设备的预设按钮发送所述连接请求至车辆中控端,亦或者,当所述用户进入到该车辆的一定范围内,其携带的所述终端设备检测到后,自动将所述连接请求发送至车辆中控端。
可理解地,车辆中控端接收到所述连接请求后,即与所述终端设备建立无线连接,在一实施例中,所述连接请求是通过蓝牙发送至车辆中控端,而所述车辆中控端接收请求后,即通过蓝牙与所述终端设备建立无线连接。在另一实施例中,所述车辆中控端与所述终端设备建立无线连接还可以通过无线网络技术(如WiFi)与所述终端设备建立无线连接。与所述终端设备建立无线连接,以供在后续步骤中接收所述终端设备发送的车辆解锁指令,以便于对车辆进行解锁。
S20,接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥。
其中,所述车辆解锁指令是用于对车辆进行解锁的指令,车辆中控端接收到所述车辆解锁指令后,即开启对车辆的解锁流程。所述解锁密文是用于对车辆进行解锁的密文,可以是一串字符、一个词语、或一句话等。所述解锁密文可以在发送所述车辆解锁指令时生成,并通过所述第一保密密钥进行加密,也可以经过所述RSA算法的第一保密密钥加密后预先存储在所述终端设备中。
所述RSA算法是一种非对称加密算法,即根据所述RSA算法生成的用于对信息或数据进行加密的密钥,与根据所述RSA算法生成的用于对信息或数据进行解密的密钥,是非对称的。举例说明,根据所述RSA算法同时生成一对密钥,分别为第一保密密钥和第一公开密钥,当使用所述第一保密密钥对信息或数据进行加密时,不能通过所述第一保密密钥对该信息或该数据进行解密,而须使用与所述第一保密密钥不同且不对称(该不对称是指不能根据已知的所述第一保密密钥通过已知的方法推导出所述第一公开密钥)的第一公开密钥,方能对经过所述第一保密密钥加密的信息或数据进行解密。
在使用所述RSA算法对信息或数据进行加密时,首先根据所述RSA算法同时生成一对密钥,其中之一是保密的,不公开的,也即只有用户或用户预设的人或设备才能保存或知晓的密钥,该密钥即为保密密钥(在本实施例中,即为所述第一保密密钥);而另一个密钥则是公开的、非保密的,任何人或设备都可以获知或获取的密钥,该秘钥为公开密钥(在本实施例中,即为所述第一公开密钥)。可理解地,所述第一保密密钥和所述第一公开密钥互为一对非对称密钥,即当使用所述第一保密密钥对信息或数据进行加密时,则使用所述第一公开密钥即可对加密后的该信息或该数据进行解密;反之,当使用所述第一公开密钥对信息或数据进行加密时,则使用所述第一保密密钥即可对加密后的该信息或该数据进行解密。必须说明的是,所述第一保密密钥预先在所述车辆中控端中根据所述RSA算法生成后,即发送并存储至由用户支配的终端设备。
在本实施例中,设定使用所述第一保密密钥对所述解锁密文进行加密,可理解地,所述第一保密密钥通常存储在由用户所支配的所述终端设备中,当用户需要对车辆进行解锁时,即通过已与车辆建立了无线连接的所述终端设备使用所述第一保密密钥加密所述解锁密文,或直接调取预先存储在所述终端设备上的已经过所述第一保密密钥加密的所述解锁密文,将加密后的解锁密文发送至所述车辆中控端,可理解地,车辆中控端接收所述加密后的解锁密文,以供在后续步骤中对所述解锁密文进行解密,进而判定所述提起车辆解锁请求的用户是否符合开锁的条件。
S30,使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文。
如上所述,所述第一公开密钥是根据所述RSA算法与所述第一保密密钥同时生成的一个公开的、非保密的密钥,所述第一公开密钥与所述第一保密密钥互为一对非对称密钥。所述第一公开密钥在根据所述RSA算法生成后,存储在车辆中控端的车辆数据库中。
具体地,当车辆中控端接收到终端设备发送的解密密文后,即从车辆数据库中调取所述第一公开密钥,然后,通过所述第一公开密钥对接收到的所述解锁密文进行解密,生成解密后的所述解锁密文,接着,获取所述解锁密文,以供在 步骤S40中,检测解密后的所述解锁密文是否符合预设的开锁条件。
S40,根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件。
其中,所述开锁规则可以根据需求预先设定。
在一实施例中,所述开锁规则可以设定为当所述解锁密文的内容与预设的开锁密文的内容一致时,所述解锁密文即符合开锁条件。如上所述,所述解锁密文亦可以是用户根据需求预先设定的,可以是一串字符、一个词语或一句话等,这里以所述解锁密文为一个词语对本实施例进行说明:比如预设的开锁密文为“你好”,此时,检测解密后的所述解锁密文的内容是否与所述开锁密文一致,也即,检测所述解锁密文的内容是否为“你好”,当结果为是时,代表所述解锁密文符合所述开锁条件,此时,进入步骤S50,对车辆进行解锁;当结果为否时,代表所述解锁密文不符合开锁条件,此时,确认所述解锁密文不符合开锁条件,将此次的车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一,以便于在一些实施例中,根据所述请求失败的次数,对下一次的车辆解锁请求进行预设的限定。
在另一实施例中,所述开锁规则包含至少一个终端设备的第一唯一标识,即预先将所有能进行开锁的终端设备的唯一标识存储在所述开锁规则中;所述解锁密文的内容为当前用户所使用的终端设备的第二唯一标识,也即发起车辆解锁指令的终端设备的唯一标识,在该实施例中,检测所述开锁规则中的所有第一唯一标识中是否存在与所述解锁密文中的第二唯一标识一致的标识,也即,将所述第二唯一标识与所述所有所述第一唯一标识分别进行比对,当检测到所有所述第一唯一标识中存在与所述第二唯一标识相一致的唯一标识时,代表所述第二唯一标识对应的终端设备为预先设定的可以对该车辆进行开锁的终端设备,此时,确认所述解锁密文符合开锁条件;而当检测到所有所述第一唯一标识中不存在与所述第二唯一标识相一致的唯一标识时,代表所述第二唯一标识对应的终端设备并非预先存在所述开锁规则中的终端设备,此时,将此次的车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一。
S50,当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
当所述解锁密文符合所述开锁条件时,代表发起车辆开锁指令操作的用户拥有 开锁资格,此时,根据所述车辆解锁指令,对所述车辆进行解锁。
本实施例通过在对车辆进行智能解锁的过程中使用由RSA算法生成的保密密钥和公开密钥,对进行开锁的关键数据即所述解锁密文进行加密,在对车辆进行快速智能解锁的同时,大大提升了因为智能解锁的安全性,以防止出现被他人破解车辆解锁程序而造成用户财产损失,增强用户体验。
在一实施例中,所述开锁规则中包含预设的开锁时间长度,以及预设的开锁密文,所述解锁密文包含解锁密文内容以及与所述终端设备生成所述解锁密文的时间点对应的时间戳;如图3所示,所述步骤S40包括:
S401,检测所述解锁密文内容与所述开锁密文是否一致。
所述解锁密文中包含解锁密文内容,所述解锁密文内容可以是一串字符、一句话或一个词语等,用于与所述开锁规则中的开锁密文进行比对,在本实施例中,检测所述解锁密文内容与所述开锁规则中预设的开锁密文是否一致,当所述解锁密文内容与所述开锁密文一致时,代表所述解锁密文即可能符合所述开锁条件,此时,进入步骤S402,根据所述时间戳获取所述终端设备生成所述解锁密文的时间点,以便进一步验证所述解锁密文是否符合开锁条件。当所述解锁密文内容与所述开锁密文内容不一致时,确认所述解锁密文不符合所述开锁条件,并将此次的车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一。
S402,当所述解锁密文内容与所述开锁密文一致时,根据所述时间戳获取所述终端设备生成所述解锁密文的时间点。
所述解锁密文还包含在所述终端设备生成所述解锁密文的时间点对应的时间戳,所述时间戳为一个能表示一份数据在某个特定时间之前已经存在的、完整的、可验证的字符序列,所述时间戳唯一地标识某一刻的时间,具体地,所述时间戳是使用数据签名技术所产生的数据,签名的对象包括了原始文件(数据)信息、签名参数、签名时间等信息,所述时间戳可以为所述解锁密文提供一种电子证据,证明所述解锁密文生成的时间,且证明的真实性非常高,因为时间戳在已知的技术中无法被篡改。必须说明的是,在本实施例中,首先设定解锁密文的发送规则,并预先存储至所述终端设备中,该规则为当用户需要发送车 辆解锁指令,并已经点击预设的按钮进行了发送车辆解锁指令的操作时,才生成所述解密密文内容,且在生成所述解密密文内容后,以最快的速度为生成的所述解密密文内容生成对应的时间戳,同时,使用所述第一保密密钥对所述解密密文内容和生成的时间戳进行加密,生成加密后的解密密文,可理解地,生成的该时间戳即可近似的标识所述解密密文生成的时间点。在本实施例中,获取所述终端设备生成所述解锁密文的时间点,以供在步骤S403中进一步判定所述解锁密文是否符合所述开锁条件。
S403,检测生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度是否小于所述开锁时间长度,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度小于所述开锁时间长度时,确认所述解锁密文符合所述开锁条件。
其中,所述开锁时间长度可以根据需求预先设定。作为优选,所述开锁时间长度为2秒。
可理解地,在本实施例中,预先设定了解锁密文的发送规则,即当用户发起车辆解锁指令操作的时候,方才生成所述解锁密文,并对所述解锁密文加盖时间戳,则若所述终端设备生成所述解锁密文的时间点与车辆中控端接收到所述解锁密文的时间点之间的时间长度过大,也即所述解锁密文在生成了比较久的时间之后,才发送到所述车辆中控端,代表有可能是所述解锁密文或所述第一保密密钥被他人所破解或获知,并预先存储下来,在对车辆进行开锁的时候发送至车辆中控端。
因此,检测所述终端设备生成所述解锁密文的时间点,与所述车辆中控端接收到所述解锁密文的时间点之间的时间长度是否小于所述开锁时间长度,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度大于或等于所述开锁时间长度,证明所述解锁密文不符合所述开锁条件,即发起车辆解锁指令的用户可能不具备开锁的资格,此时,确认所述解锁密文不符合所述开锁条件,并记录此次的车辆解锁请求不能通过,即车辆解锁请求不能通过的次数加一;反之,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度小于所述开锁时间长度时,代表所述解锁密文是按照预设的 发送规则进行发送的,也即所述解锁密文符合所述开锁条件,此时,确认所述解锁密文符合所述开锁条件,以便在后续步骤中对所述车辆进行解锁。
本实施例通过在所述解锁密文生成时对其加盖时间戳,保证检测到的生成所述解锁密文的时间点与接收到所述解锁密文的时间点是真实有效、没有被篡改的,并对生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度与所述开锁时间长度进行比较,进一步判定所述解锁密文是否符合开锁条件,大大提升了车辆开锁时的安全性,增强用户体验。
在一实施例中,如图4所示,所述步骤S40之后,还包括:
S60,当所述解锁密文不符合所述开锁条件时,将本次所述车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一。
当所述解锁密文不符合所述开锁条件时,代表发起所述车辆解锁指令操作,也即发起此次的车辆解锁请求的用户不具有开锁资格,此时,将此次的车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一。必须说明的是,每一次记录的车辆解锁请求的请求失败的次数将会累加,但是当车辆中控端有通过所述车辆解锁请求时,也即对车辆进行过解锁时,此前所记录的车辆解锁请求的请求失败的次数将会清零。举例说明,如果有连续三次车辆解锁请求不能通过,则此时记录并累加的车辆解锁请求的请求失败次数为3,此时,若下一次的车辆解锁请求被车辆中控端所通过,则此前记录的车辆解锁请求的请求失败次数为3的结果清零,即车辆解锁请求的请求失败次数为0,并重新开始记录。
S70,当所述车辆解锁请求的请求失败次数大于预设的锁定阈值时,对所述车辆进行锁定。
在一实施例中,所述车辆解锁请求的请求失败次数还包括在所述步骤S401中所记录的请求失败次数。
所述锁定阈值可以根据需求预先设定,作为优选,所述锁定阈值为5。所述对车辆进行锁定,包括:在预设的时间段内,不再接收车辆解锁指令,也即不对车辆进行解锁,并将对所述车辆进行锁定的情况发送给预设的管理方,提醒所述管理方有人恶意开锁或者正在对所述车辆中控端进行攻击(破解)。
当所述车辆解锁请求不能通过的次数大于所述锁定阈值时,代表所述车辆可能遇到有人恶意开锁或对开锁系统进行攻击(破解)的情形,此时,对所述车辆进行锁定,防止所述车辆的解锁系统被人所攻击(破解),提升车辆解锁的安全性,增强用户体验。
在一实施例中,如图5所示,提供一种车辆解锁方法,以该方法应用在图1中的终端设备为例进行说明,所述车辆解锁方法包括在终端设备执行的如下步骤:
S80,将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接。
如上述,所述唯一标识是用于区分不同的终端设备的具有唯一性的标识。当持有所述终端设备的用户需要对车辆进行解锁时,即通过所述终端设备发送所述连接请求至所述车辆中控端,亦或者,当所述用户进入到该车辆的一定范围内,其携带的所述终端设备检测到后,自动将所述连接请求发送至车辆中控端;所述车辆中控端接收到所述连接请求后,即与终端设备进行无线连接,所述无线连接的建立通过无线网络技术,比如WIFI、蓝牙等,与所述车辆中控端建立无线连接,以便于在后续步骤中发送车辆解锁指令至所述车辆中控端。
S90,获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文。
首先获取所述第一保密密钥,在一实施例中,所述第一保密密钥可以是在所述车辆中控端中根据RSA算法预先生成,并发送存储至终端设备车辆中控端的终端数据库中,获取时即从终端设备的终端数据库中调取即可,获取所述解锁密文包括:按照预先设定的密文规则生成解锁密文,或是所述解锁密文预先已经设定好并存储在终端设备的终端数据库中,此时直接从该终端数据库中调取所述解锁密文。进一步地,通过所述第一保密密钥对所述解锁密文进行加密,以供在后续步骤中将所述解锁密文发送至所述车辆中控端进行后续的解锁流程。
S100,将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
将包含加密后的所述解锁密文的车辆解锁指令发送至所述车辆中控端,进行后 续的解锁流程,所述解锁流程可以参照步骤S30至步骤50所述,或S30至S70所述,在此不再赘述。
在一实施例中,如图6所示,所述步骤S90包括:
S901,获取经过第二公开密钥加密的第一保密密钥,并获取与所述第二公开密钥对应的第二保密密钥。
其中,所述第二公开密钥和所述第二保密密钥是由RSA算法生成的一对非对称密钥,所述第二公开密钥与所述第一公开密钥不一致(即二者为两个不同的密钥),所述第二保密密钥与所述第一保密密钥不一致(即二者为两个不同的密钥),所述第二公开密钥用于加密所述第一保密密钥,而所述第二保密密钥用于加密经过所述第二公开密钥加密后的第一保密密钥。所述第二公开密钥和所述第二保密密钥预先生成并存储在所述终端设备终端数据库中。
获取经过第二公开密钥加密的第一保密密钥,并获取所述第二保密密钥,以供在后续步骤中对所述第一保密密钥进行解密。
在一实施例中,所述经过第二公开密钥加密的第一保密密钥可以存储至云端,而非存储在所述终端设备中,可以防止所述终端设备丢失后导致所述第一保密密钥也丢失,而无法对车辆进行解锁,增强用户体验。而经过加密后的所述第一保密密钥即使存储至非私密的云端,也不用担心被他人盗取和盗用。
S902,使用所述第二保密密钥对所述经过第二公开密钥加密的第一保密密钥进行解密,获取解密后的所述第一保密密钥。以供在步骤S903中使用所述第一保密密钥加密所述解锁密文。
S903,通过解密后的所述第一保密密钥加密所述解锁密文。以供后续步骤中将所述解锁密文发送至车辆中控端进行后续的解锁流程。
本实施例通过使用第二公开密钥对所述第一保密密钥进行加密,进一步地增强了所述第一保密密钥的保密性和安全性,提升了整个车辆解锁系统的安全性,增强用户体验。
本申请通过在对车辆进行智能解锁的过程中使用由RSA算法生成的保密密钥和公开密钥,对进行开锁的关键数据即所述解锁密文进行加密,且结合时间戳和对所述解锁密文进行双重加密,在对车辆进行快速智能解锁的同时,大大提升 了因为智能解锁的安全性,以防止出现被他人破解车辆解锁程序而造成用户财产损失,增强用户体验。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
在一实施例中,提供一种车辆解锁装置,该车辆解锁装置与上述实施例中车辆解锁方法一一对应。如图7所示,该车辆解锁装置包括车辆中控端,所述车辆中控端包括连接模块11、接收模块12、解密模块13、检测模块14和开锁模块15。各功能模块详细说明如下:
所述连接模块11,用于接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
所述接收模块12,用于接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
所述解密模块13,用于使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
所述检测模块14,用于根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
所述开锁模块15,用于当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
在一实施例中,如图8所示,所述检测模块14包括:
密文比对单元141,用于检测所述解锁密文内容与所述开锁密文是否一致;
时间获取单元142,用于当所述解锁密文内容与所述开锁密文一致时,根据所述时间戳获取所述终端设备生成所述解锁密文的时间点;
时间比对单元143,用于检测生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度是否小于所述开锁时间长度,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度小于所述开锁时间长度时,确认所述解锁密文符合所述开锁条件。
在一实施例中,如图9所示,所述车辆中控端还包括:
失败记录模块16,用于当所述解锁密文不符合所述开锁条件时,将本次所述车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一;
车辆锁定模块17,用于当所述车辆解锁请求的请求失败次数大于预设的锁定阈值时,对所述车辆进行锁定。
在一实施例中,如图10所示,所述车辆解锁装置还包括终端设备,所述终端设备包括:
第一发送模块18,用于将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
获取模块19,用于获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
第二发送模块20,用于将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
在一实施例中,所述获取模块包括:
密钥获取单元,用于获取经过第二公开密钥加密的第一保密密钥,并获取与所述第二公开密钥对应的第二保密密钥;
解密单元,用于使用所述第二保密密钥对所述经过第二公开密钥加密的第一保密密钥进行解密,获取解密后的所述第一保密密钥;
加密单元,用于通过解密后的所述第一保密密钥加密所述解锁密文。
关于车辆解锁装置的具体限定可以参见上文中对于车辆解锁方法的限定,在此不再赘述。上述车辆解锁装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一个实施例中,提供了一种计算机设备,该计算机设备可以是终端,其内部结构图可以如图11所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口、显示屏和输入装置。其中,该计算机设备的处理器用于提供计 算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机可读指令。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的网络接口用于与外部服务器通过网络连接通信。该计算机可读指令被处理器执行时以实现一种车辆解锁方法。
在一个实施例中,提供了一种计算机设备,包括存储器、车辆中控端的处理器及存储在存储器上并可在处理器上运行的计算机可读指令,处理器执行计算机可读指令时实现以下步骤:
接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
在一个实施例中,提供了一种计算机设备,包括存储器、终端设备的处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
在一个实施例中,提供了一个或多个存储有计算机可读指令的非易失性可读存储介质,该非易失性可读存储介质上存储有计算机可读指令,该计算机可读指 令被一个或多个车辆中控端的处理器执行时,使得一个或多个处理器实现以下步骤:
接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
在一个实施例中,提供了一个或多个存储有计算机可读指令的非易失性可读存储介质,所述计算机可读指令被一个或多个终端设备的处理器执行时,使得所述一个或多个终端设备的处理器执行如下步骤:
将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为 说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。
发明概述
技术问题
问题的解决方案
发明的有益效果

Claims (20)

  1. 一种车辆解锁方法,其特征在于,包括车辆中控端执行的如下步骤:
    接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
    接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
    使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
    根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
    当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
  2. 如权利要求1所述的车辆解锁方法,其特征在于,所述开锁规则中包含预设的开锁时间长度,以及预设的开锁密文,所述解锁密文包含解锁密文内容以及与所述终端设备生成所述解锁密文的时间点对应的时间戳;所述根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件,包括:
    检测所述解锁密文内容与所述开锁密文是否一致;
    当所述解锁密文内容与所述开锁密文一致时,根据所述时间戳获取所述终端设备生成所述解锁密文的时间点;
    检测生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度是否小于所述开锁时间长度,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度小于所述开锁时间长度时,确认所述解锁密文符合所述开锁条件。
  3. 如权利要求1所述的车辆解锁方法,其特征在于,所述根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件之后,还包括:
    当所述解锁密文不符合所述开锁条件时,将本次所述车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一;
    当所述车辆解锁请求的请求失败次数大于预设的锁定阈值时,对所述车辆进行锁定。
  4. 一种车辆解锁方法,其特征在于,包括终端设备执行的如下步骤:
    将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
    获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
    将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
  5. 如权利要求4所述的车辆解锁方法,其特征在于,所述获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文,包括:
    获取经过第二公开密钥加密的第一保密密钥,并获取与所述第二公开密钥对应的第二保密密钥;
    使用所述第二保密密钥对所述经过第二公开密钥加密的第一保密密钥进行解密,获取解密后的所述第一保密密钥;
    通过解密后的所述第一保密密钥加密所述解锁密文。
  6. 一种车辆解锁装置,其特征在于,包括车辆中控端,所述车辆中控端包括:
    连接模块,用于接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
    接收模块,用于接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解 锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
    解密模块,用于使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
    检测模块,用于根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
    开锁模块,用于当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
  7. 如权利要求6所述的车辆解锁装置,其特征在于,所述检测模块包括:
    密文比对单元,用于检测所述解锁密文内容与所述开锁密文是否一致;
    时间获取单元,用于当所述解锁密文内容与所述开锁密文一致时,根据所述时间戳获取所述终端设备生成所述解锁密文的时间点;
    时间比对单元,用于检测生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度是否小于所述开锁时间长度,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度小于所述开锁时间长度时,确认所述解锁密文符合所述开锁条件。
  8. 如权利要求6所述的车辆解锁装置,其特征在于,所述车辆中控端还包括:
    失败记录模块,用于当所述解锁密文不符合所述开锁条件时,将本次所述车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一;
    车辆锁定模块,用于当所述车辆解锁请求的请求失败次数大于预设的锁定阈值时,对所述车辆进行锁定。
  9. 一种车辆解锁装置,其特征在于,包括终端设备,所述终端设备包括:
    第一发送模块,用于将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
    获取模块,用于获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
    第二发送模块,用于将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
  10. 如权利要求9所述的车辆解锁装置,其特征在于,所述获取模块包括:
    密钥获取单元,用于获取经过第二公开密钥加密的第一保密密钥,并获取与所述第二公开密钥对应的第二保密密钥;
    解密单元,用于使用所述第二保密密钥对所述经过第二公开密钥加密的第一保密密钥进行解密,获取解密后的所述第一保密密钥;
    加密单元,用于通过解密后的所述第一保密密钥加密所述解锁密文。
  11. 一种计算机设备,包括存储器、车辆中控端的处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
    接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
    使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
    根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁 条件;
    当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
  12. 如权利要求11所述的计算机设备,其特征在于,所述开锁规则中包含预设的开锁时间长度,以及预设的开锁密文,所述解锁密文包含解锁密文内容以及与所述终端设备生成所述解锁密文的时间点对应的时间戳;所述根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件,包括:
    检测所述解锁密文内容与所述开锁密文是否一致;
    当所述解锁密文内容与所述开锁密文一致时,根据所述时间戳获取所述终端设备生成所述解锁密文的时间点;
    检测生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度是否小于所述开锁时间长度,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度小于所述开锁时间长度时,确认所述解锁密文符合所述开锁条件。
  13. 如权利要求11所述的计算机设备,其特征在于,所述根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件之后,所述处理器执行所述计算机可读指令时还实现如下步骤:
    当所述解锁密文不符合所述开锁条件时,将本次所述车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一;
    当所述车辆解锁请求的请求失败次数大于预设的锁定阈值时,对所述车辆进行锁定。
  14. 一种计算机设备,包括存储器、终端设备的处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
    获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所 述解锁密文;
    将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
  15. 如权利要求14所述的计算机设备,其特征在于,所述获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文,包括:
    获取经过第二公开密钥加密的第一保密密钥,并获取与所述第二公开密钥对应的第二保密密钥;
    使用所述第二保密密钥对所述经过第二公开密钥加密的第一保密密钥进行解密,获取解密后的所述第一保密密钥;
    通过解密后的所述第一保密密钥加密所述解锁密文。
  16. 一个或多个存储有计算机可读指令的非易失性可读存储介质,其特征在于,所述计算机可读指令被一个或多个车辆中控端的处理器执行时,使得所述一个或多个车辆中控端的处理器执行如下步骤:
    接收终端设备发送的包含唯一标识的无线连接请求,并根据所述唯一标识与所述终端设备建立无线连接;
    接收所述终端设备发送的车辆解锁指令,所述车辆解锁指令包含在所述终端设备经过第一保密密钥加密之后的解锁密文,所述第一保密密钥是根据RSA算法生成的密钥;
    使用根据所述RSA算法生成的第一公开密钥对所述解锁密文进行解密,并获取解密后的所述解锁密文;
    根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件;
    当所述解锁密文符合所述开锁条件时,对车辆进行解锁。
  17. 如权利要求16所述的非易失性可读存储介质,其特征在于,所述开锁规则中包含预设的开锁时间长度,以及预设的开锁密文,所 述解锁密文包含解锁密文内容以及与所述终端设备生成所述解锁密文的时间点对应的时间戳;所述根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件,包括:
    检测所述解锁密文内容与所述开锁密文是否一致;
    当所述解锁密文内容与所述开锁密文一致时,根据所述时间戳获取所述终端设备生成所述解锁密文的时间点;
    检测生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度是否小于所述开锁时间长度,当生成所述解锁密文的时间点与接收到所述解锁密文的时间点之间的时间长度小于所述开锁时间长度时,确认所述解锁密文符合所述开锁条件。
  18. 如权利要求16所述的非易失性可读存储介质,其特征在于,所述根据预设的开锁规则,检测解密后的所述解锁密文是否符合开锁条件之后,所述计算机可读指令被一个或多个车辆中控端的处理器执行时,使得所述一个或多个车辆中控端的处理器执行如下步骤:
    当所述解锁密文不符合所述开锁条件时,将本次所述车辆解锁请求记录为请求失败,并将所述车辆解锁请求的请求失败次数加一;
    当所述车辆解锁请求的请求失败次数大于预设的锁定阈值时,对所述车辆进行锁定。
  19. 一个或多个存储有计算机可读指令的非易失性可读存储介质,其特征在于,所述计算机可读指令被一个或多个终端设备的处理器执行时,使得所述一个或多个终端设备的处理器执行如下步骤:
    将包含唯一标识的无线连接请求发送至终端设备,并通过所述唯一标识与车辆中控端建立无线连接;
    获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文;
    将包含所述解锁密文的车辆解锁指令发送至所述车辆中控端,以 供所述车辆中控端使用第一公开密钥对加密后的所述解锁密文进行解密之后,在所述解锁密文符合开锁条件时对车辆进行解锁。
  20. 如权利要求19所述的非易失性可读存储介质,其特征在于,所述获取第一保密密钥和解锁密文,并通过所述第一保密密钥加密所述解锁密文,包括:
    获取经过第二公开密钥加密的第一保密密钥,并获取与所述第二公开密钥对应的第二保密密钥;
    使用所述第二保密密钥对所述经过第二公开密钥加密的第一保密密钥进行解密,获取解密后的所述第一保密密钥;
    通过解密后的所述第一保密密钥加密所述解锁密文。
PCT/CN2019/101897 2019-05-22 2019-08-22 车辆解锁方法、装置、计算机设备及存储介质 WO2020232854A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910429513.7A CN110310392B (zh) 2019-05-22 2019-05-22 车辆解锁方法、装置、计算机设备及存储介质
CN201910429513.7 2019-05-22

Publications (1)

Publication Number Publication Date
WO2020232854A1 true WO2020232854A1 (zh) 2020-11-26

Family

ID=68075250

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/101897 WO2020232854A1 (zh) 2019-05-22 2019-08-22 车辆解锁方法、装置、计算机设备及存储介质

Country Status (2)

Country Link
CN (1) CN110310392B (zh)
WO (1) WO2020232854A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783687A (zh) * 2021-09-07 2021-12-10 浙江吉利控股集团有限公司 一种汽车电子防盗码的生成与加解密方法和系统

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177699B (zh) * 2019-12-23 2022-07-08 恒大恒驰新能源汽车科技(广东)有限公司 一种数据提取方法、秘钥生成方法、解锁方法及装置
CN114999029A (zh) * 2020-04-01 2022-09-02 支付宝(杭州)信息技术有限公司 一种车辆解锁方法及系统
CN111923863B (zh) * 2020-08-25 2021-09-17 东信和平科技股份有限公司 一种基于数字车钥匙的车辆控制方法
CN115050140A (zh) * 2022-06-08 2022-09-13 杭州野乐科技有限公司 共享单车的解锁方法、装置、设备及存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874061A (zh) * 2012-12-14 2014-06-18 通用汽车环球科技运作有限责任公司 用于车辆与无线通信装置或密钥卡之间的安全和授权通信的方法和系统
CN109389710A (zh) * 2018-08-24 2019-02-26 黄瀚思 基于rsa算法与ble低功耗蓝牙的智能门锁系统

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102592340B (zh) * 2012-02-29 2017-09-12 深圳市赛格导航科技股份有限公司 一种工程车辆紧急解锁方法和系统
GB2522217A (en) * 2014-01-16 2015-07-22 Parcelhome Ltd Electronic lock apparatus, method and system
CN106559378B (zh) * 2015-09-24 2020-05-01 联芯科技有限公司 汽车门锁解锁装置、系统及方法和智能终端
CN105631299A (zh) * 2015-12-29 2016-06-01 惠州Tcl移动通信有限公司 一种移动终端的智能解锁方法及系统
CN105894633B (zh) * 2016-04-21 2018-05-08 上海众人网络安全技术有限公司 一种门禁系统及门禁系统解锁的方法
US11285915B2 (en) * 2017-08-09 2022-03-29 M2MD Technologies, Inc. Method and system for using a wireless mobile device as a smart key
CN108092958B (zh) * 2017-12-05 2021-05-28 成都市共维科技有限公司 信息认证方法、装置、计算机设备及存储介质
CN109150903A (zh) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 一种账号管理方法、装置、存储介质和终端设备

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874061A (zh) * 2012-12-14 2014-06-18 通用汽车环球科技运作有限责任公司 用于车辆与无线通信装置或密钥卡之间的安全和授权通信的方法和系统
CN109389710A (zh) * 2018-08-24 2019-02-26 黄瀚思 基于rsa算法与ble低功耗蓝牙的智能门锁系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113783687A (zh) * 2021-09-07 2021-12-10 浙江吉利控股集团有限公司 一种汽车电子防盗码的生成与加解密方法和系统
CN113783687B (zh) * 2021-09-07 2023-08-29 浙江吉利控股集团有限公司 一种汽车电子防盗码的生成与加解密方法和系统

Also Published As

Publication number Publication date
CN110310392A (zh) 2019-10-08
CN110310392B (zh) 2021-07-16

Similar Documents

Publication Publication Date Title
US11558381B2 (en) Out-of-band authentication based on secure channel to trusted execution environment on client device
KR102328725B1 (ko) 하나의 장치를 이용하여 다른 장치를 언로크하는 방법
WO2020232854A1 (zh) 车辆解锁方法、装置、计算机设备及存储介质
CN109325342B (zh) 身份信息管理方法、装置、计算机设备和存储介质
US10826882B2 (en) Network-based key distribution system, method, and apparatus
WO2020237868A1 (zh) 数据传输方法、电子设备、服务器及存储介质
CN108111497B (zh) 摄像机与服务器相互认证方法和装置
US10171235B2 (en) User-initiated migration of encryption keys
CN108418691A (zh) 基于sgx的动态网络身份认证方法
US10263782B2 (en) Soft-token authentication system
CN113691502B (zh) 通信方法、装置、网关服务器、客户端及存储介质
CN112425114A (zh) 受公钥-私钥对保护的密码管理器
CN113472793B (zh) 一种基于硬件密码设备的个人数据保护系统
US9942042B1 (en) Key containers for securely asserting user authentication
EP3206329B1 (en) Security check method, device, terminal and server
CN110659467A (zh) 一种远程用户身份认证方法、装置、系统、终端及服务器
WO2022022009A1 (zh) 消息处理方法、装置、设备及存储介质
US10785193B2 (en) Security key hopping
US8806216B2 (en) Implementation process for the use of cryptographic data of a user stored in a data base
CN112425116A (zh) 一种智能门锁无线通信方法、智能门锁、网关及通信设备
US11689369B2 (en) Data recovery for a computing device
US10979226B1 (en) Soft-token authentication system with token blocking after entering the wrong PIN
CN116318899B (zh) 数据加密解密的处理方法、系统、设备及介质
KR102648908B1 (ko) 사용자 인증 시스템 및 방법
CN115333733A (zh) 解锁方法、装置、电子设备和可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19929599

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19929599

Country of ref document: EP

Kind code of ref document: A1