WO2020253856A1 - 一种智能锁解锁方法及相关设备 - Google Patents

一种智能锁解锁方法及相关设备 Download PDF

Info

Publication number
WO2020253856A1
WO2020253856A1 PCT/CN2020/097294 CN2020097294W WO2020253856A1 WO 2020253856 A1 WO2020253856 A1 WO 2020253856A1 CN 2020097294 W CN2020097294 W CN 2020097294W WO 2020253856 A1 WO2020253856 A1 WO 2020253856A1
Authority
WO
WIPO (PCT)
Prior art keywords
smart
terminal device
smart device
distance
identity authentication
Prior art date
Application number
PCT/CN2020/097294
Other languages
English (en)
French (fr)
Inventor
杨艳江
魏卓
王伟
刘旭涛
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20827245.0A priority Critical patent/EP3975142A4/en
Publication of WO2020253856A1 publication Critical patent/WO2020253856A1/zh
Priority to US17/553,957 priority patent/US20220109561A1/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/33Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/101Bluetooth
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
    • G07C2009/00404Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method starting with prompting the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00555Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks comprising means to detect or avoid relay attacks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to the technical field of intelligent unlocking, in particular to a method for unlocking an intelligent lock and related equipment.
  • unlocking is no longer limited to physical keys or electronic key fobs, but more and more methods such as password unlocking, fingerprint recognition unlocking, and face recognition unlocking methods are used.
  • Traditional locks avoid the trouble of carrying keys (physical keys or electronic key fobs), are convenient and fast, and are widely used.
  • the digital key mainly refers to the use of near field communication technology (such as Bluetooth, near field communication NFC, etc.), so that users can use smart phones or wearable smart devices (such as smart watches) to perform Operations such as unlocking or locking smart locks are widely used in scenes such as automobiles, company access control, home door locks, safes, and bicycle sharing.
  • near field communication technology such as Bluetooth, near field communication NFC, etc.
  • FIG. 1 is a schematic diagram of unlocking a digital car key in the prior art.
  • the digital car key (such as a mobile phone) carried by a legal user (such as a car owner) is close enough to a smart lock (such as a car door lock) (in the corresponding proximity).
  • a smart lock such as a car door lock
  • the door lock will send an identity authentication challenge to the mobile phone that initiates the unlock request. If the identity authentication response of the mobile phone passes the detection of the door lock, it will be automatically unlocked.
  • the relay attacker can use the relay to amplify the signal to establish a communication connection between the mobile phone and the door lock that is far away, making the two parties mistakenly believe that they are very close to each other, causing the door lock to be illegal Unlock.
  • the technical problem to be solved by the embodiments of the present invention is to provide a method for unlocking a smart lock and related equipment, which solves the problem of relay attacks in the process of smart unlocking.
  • an embodiment of the present invention provides a method for unlocking a smart lock, which may include: a terminal device monitors the trend of a distance change with the smart device, the smart device includes a smart lock; if the terminal device determines that it is approaching The smart device, and the distance between the terminal device and the smart device is less than the first distance threshold, then the identity authentication process between the terminal device and the smart device is started; When the identity authentication between the smart devices is successful, the terminal device unlocks the smart lock.
  • the terminal device monitors the trend of the distance from the smart device where the smart lock is located, and when it is determined that the smart device is approaching and the distance is less than a certain threshold, the communication with the smart device is started.
  • the identity authentication process and after the identity authentication is passed, unlock the smart lock.
  • the terminal device Before starting the identity authentication process, the terminal device not only considers the distance to the smart device, but also judges whether it is approaching the smart device by monitoring the change trend of the distance from the smart device, that is, it fully judges the holding Whether the user of the terminal device has the intention of unlocking (for example, the user holding the terminal device is walking and approaching the smart device), to avoid starting the identity authentication process only by judging the distance (within the communication range of the near field communication method), thereby It avoids the hidden danger of illegal unlocking by an attacker using only a relay attack to forge a close-range illusion, and greatly enhances the security of digital key unlocking.
  • the method further includes: when the distance between the terminal device and the smart device is less than a second distance threshold, the terminal device and the smart device establish a communication connection via Bluetooth, And triggering the execution of the monitoring and the change trend of the distance between the smart device, and the second distance threshold is greater than the first distance threshold.
  • the terminal device and the smart device communicate through Bluetooth, and the range of Bluetooth communication usually ranges from tens of meters to hundreds of meters. If the terminal device and the smart device are in a long distance Bluetooth communication range It may cause higher power consumption of terminal equipment to monitor the change trend of the distance within the system, and generally, in the case of a long distance, it is impossible to more effectively determine whether the user holding the terminal equipment has the intention of unlocking.
  • the Bluetooth pairing connection is performed when the distance between the terminal device and the smart device is within a relatively short range, and the execution of the monitoring distance change trend is triggered, which saves the power consumption of the terminal device. Improved the accuracy of unlocking condition judgment.
  • the method further includes: if the terminal device determines that it is moving away from the smart device, and the distance between the terminal device and the smart device is greater than a third distance threshold, then Lock the smart lock.
  • the terminal device also judges whether it is far away from the smart device by monitoring the change trend of the distance with the smart device, that is, it fully judges whether the user holding the terminal device has the intention to lock the smart lock, and avoids the user Hands-on. For example, when it is determined that the terminal device is far away from company access control, home door locks, car doors, safes, shared bicycles, etc., and the distance exceeds a certain threshold, the corresponding smart lock will be automatically locked without the user’s hands or perception. Convenient and fast, with good user experience.
  • the monitoring of the changing trend of the distance between the terminal device and the smart device includes:
  • the terminal device judges the change of the distance between the terminal device and the smart device according to the first distance information with the smart device; wherein, the first distance information includes Bluetooth signal strength change information, global positioning system One or more of GPS ranging information and pulsed ultra-wideband IRUWB ranging information.
  • the terminal device can specifically monitor the change trend of the distance with the smart device through one or more of the strength information of the Bluetooth signal, the GPS ranging information and the IRUWB ranging information, so as to determine the relationship between itself and the smart device. The distance between devices and whether they are approaching or far away from smart devices.
  • the method before the initiating the identity authentication process between the terminal device and the smart device, the method further includes: the terminal device compares its own environmental parameters with the smart device's location.
  • the environmental parameters include one or more of temperature, humidity, light intensity, odor and noise; the terminal device judges whether it is in the same environment as the smart device according to the comparison result; if so, The terminal device is allowed to start an identity authentication process with the smart device.
  • the terminal device before determining whether to start the identity authentication process, the terminal device not only considers whether it is approaching the smart device and whether it is close to the smart device in distance, but also judges whether it is between itself and the smart device through environmental parameters.
  • the method before the initiating the identity authentication process between the terminal device and the smart device, the method further includes: the terminal device initiates a voice response instruction to the smart device; the terminal device Receive the feedback sound issued by the smart device according to the voice response instruction; if it is confirmed that the voice response is matched successfully, the terminal device is allowed to start the identity authentication process with the smart device.
  • the terminal device before determining whether to start the identity authentication process, the terminal device not only considers whether it is approaching the smart device, and whether it is close to the smart device in distance, but also determines whether it is between itself and the smart device through a voice response.
  • the identity authentication process between the terminal device and the smart device includes: the terminal device and the smart device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • a shared key such as a symmetric key
  • a public-private key pair such as an asymmetric key
  • the smart device includes a plurality of the smart locks; the unlocking the smart lock includes: the terminal device determines the closest target smart lock among the plurality of smart locks To unlock the target smart lock.
  • the terminal device can further determine which smart lock is closer to itself, and then unlock the smart lock accordingly, providing users with more humanized smart unlocking services, and further Improve user experience.
  • the terminal device is approaching the smart device, which includes at least one of the following: the Bluetooth signal strength between the terminal device and the smart device is getting stronger; or the terminal The GPS ranging between the device and the smart device is getting smaller and smaller; or the IRUWB ranging between the terminal device and the smart device is getting smaller and smaller.
  • the terminal device can specifically monitor the change trend of the distance with the smart device through one or more of the strength information of the Bluetooth signal, the GPS ranging information and the IRUWB ranging information, so as to determine the relationship between itself and the smart device. The distance between the devices and whether they are close to the smart device.
  • the terminal device is moving away from the smart device, including at least one of the following: the Bluetooth signal strength between the terminal device and the smart device is getting weaker; or the terminal The GPS ranging between the device and the smart device is getting larger and larger; or the IRUWB ranging between the terminal device and the smart device is getting larger and larger.
  • the terminal device can specifically monitor the change trend of the distance with the smart device through one or more of the strength information of the Bluetooth signal, the GPS ranging information and the IRUWB ranging information, so as to determine the relationship between itself and the smart device. The distance between the devices and whether they are far away from the smart device.
  • an embodiment of the present invention provides a method for unlocking a smart lock, which may include: a smart device monitors the trend of a distance change between a terminal device and the smart device includes a smart lock; if the smart device determines that the When the terminal device is approaching, and the distance between the smart device and the terminal device is less than the first distance threshold, the identity authentication process between the smart device and the terminal device is started; If the identity authentication between the terminal devices is successful, the smart device unlocks the smart lock.
  • the smart device where the smart lock is located is used to monitor the trend of the distance change with the terminal device, and when it is determined that the terminal device is approaching itself and the distance is less than a certain threshold, the communication with the terminal device is started.
  • the identity authentication process and after the identity authentication is passed, unlock the smart lock.
  • the smart device Before the smart device starts the identity authentication process, it not only considers the distance with the terminal device, but also judges whether the terminal device is approaching itself by monitoring the change trend of the distance with the terminal device, that is, it fully judges the holding Whether the user of the terminal device has the intention of unlocking, to avoid starting the identity authentication process only by judging the distance (within the communication range of the near field communication mode), so as to prevent the attacker from using the relay attack to fake the illusion of the short distance to be illegal
  • the hidden danger of unlocking greatly enhances the security of digital key unlocking.
  • the method further includes: when the distance between the smart device and the terminal device is less than a second distance threshold, the smart device and the terminal device establish a communication connection via Bluetooth, And triggering the execution monitoring of the change trend of the distance between the terminal device and the terminal device, and the second distance threshold is greater than the first distance threshold.
  • the terminal device and the smart device communicate through Bluetooth, and the range of Bluetooth communication usually ranges from tens of meters to hundreds of meters.
  • the Bluetooth pairing connection is performed when the distance between the terminal device and the smart device is within a relatively close range, and the execution of the monitoring distance change trend is triggered, which saves the power consumption of the smart device. Improved the accuracy of unlocking condition judgment.
  • the method further includes: if the smart device determines that it is moving away from the terminal device, and the distance between the smart device and the terminal device is greater than a second distance threshold, then The smart device locks the smart lock.
  • the smart device also judges whether the smart device is far away from itself by monitoring the change trend of the distance with the terminal device, that is, it fully judges whether the user holding the terminal device has the intention of locking the smart lock, and avoids the user Hands-on. For example, when it is determined that the terminal device is far away from company access control, home door locks, car doors, safes, shared bicycles, etc., and the distance exceeds a certain threshold, the corresponding smart lock will be automatically locked without the user’s hands or perception. Convenient and fast, with good user experience.
  • the change trend of the distance between the smart device monitoring and the terminal device includes:
  • the smart device judges the change of the distance between the smart device and the terminal device according to the first distance information with the terminal device; wherein the first distance information includes Bluetooth signal strength change information, global positioning system One or more of GPS ranging information and pulsed ultra-wideband IRUWB ranging information.
  • the smart device can specifically monitor the trend of the distance change with the terminal device through one or more of Bluetooth signal strength information, GPS ranging information, and IRUWB ranging information, so as to determine the relationship with the terminal device. The distance between the terminals and whether the terminal equipment is approaching or far away.
  • the method before the initiating the identity authentication process between the smart device and the terminal device, the method further includes: the smart device compares its own environment parameters with the smart device's location.
  • the environmental parameters include one or more of temperature, humidity, light intensity, odor and noise; the smart device judges whether it is in the same environment as the smart device according to the comparison result; if so, The smart device is allowed to start an identity authentication process with the terminal device.
  • the smart device determines whether to start the identity authentication process, it not only considers whether the terminal device is approaching itself, and whether the smart device is close to itself in distance, but also determines whether the terminal device and itself are In the same environment, to further accurately determine whether the terminal device held by the user is indeed near the smart device (that is, the user is indeed likely to need to open the smart lock), instead of being forged by the attacker, the distance is very close, which can more effectively avoid relay
  • the illegal unlocking caused by the attack ensures the security of the smart lock and improves the user experience.
  • the method before the initiation of the identity authentication process between the smart device and the terminal device, the method further includes: the smart device receiving a voice response instruction initiated by the terminal device; The device sends a feedback sound to the terminal device according to the voice response instruction; if it is confirmed that the voice response is matched successfully, the smart device is allowed to start the identity authentication process with the smart device.
  • the smart device determines whether to start the identity authentication process, it not only considers whether the terminal device is approaching itself, and whether the terminal device is close to itself in distance, but also determines whether the terminal device is close to itself through a voice response.
  • the identity authentication process between the smart device and the terminal device includes: the smart device and the terminal device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • a shared key such as a symmetric key
  • a public-private key pair such as an asymmetric key
  • the smart device includes a plurality of the smart locks; the unlocking the smart lock includes: the smart device determines that the plurality of smart locks are closest to the terminal device The target smart lock, unlock the target smart lock.
  • the smart device can further determine which smart lock is closer to the terminal device, and then unlock the smart lock accordingly to provide users with a more humane smart unlocking service. Further enhance the user experience.
  • the terminal device is approaching the smart device, which includes at least one of the following: the Bluetooth signal strength between the terminal device and the smart device is getting stronger; or the terminal The GPS ranging between the device and the smart device is getting smaller and smaller; or the IRUWB ranging between the terminal device and the smart device is getting smaller and smaller.
  • the smart device can specifically monitor the trend of the distance between the smart device and the smart device through one or more of Bluetooth signal strength information, GPS ranging information, and IRUWB ranging information, so as to determine the relationship between itself and the smart device. The distance between the devices and whether they are close to the smart device.
  • the terminal device is moving away from the smart device, including at least one of the following: the Bluetooth signal strength between the terminal device and the smart device is getting weaker; or the terminal The GPS ranging between the device and the smart device is getting larger and larger; or the IRUWB ranging between the terminal device and the smart device is getting larger and larger.
  • the smart device can specifically monitor the trend of the distance between the smart device and the smart device through one or more of Bluetooth signal strength information, GPS ranging information, and IRUWB ranging information, so as to determine the relationship between itself and the smart device. The distance between the devices and whether they are far away from the smart device.
  • an embodiment of the present invention provides a method for unlocking a smart lock, which may include: the terminal device monitors the trend of the distance between the smart device and the smart device, the smart device includes a smart lock; if the terminal device determines that it is approaching The smart device, and the distance between the terminal device and the smart device is less than the first distance threshold, then the identity authentication process between the terminal device and the smart device is started; When the identity authentication between the smart devices is successful, the smart device unlocks the smart lock.
  • the terminal device monitors the trend of the distance from the smart device where the smart lock is located, and when it is determined that the smart device is approaching and the distance is less than a certain threshold, the communication with the smart device is started.
  • the smart device will unlock the smart lock.
  • the terminal device Before starting the identity authentication process, the terminal device not only considers the distance to the smart device, but also judges whether it is approaching the smart device by monitoring the change trend of the distance from the smart device, that is, it fully judges the holding Whether the user of the terminal device has the intention of unlocking, to avoid starting the identity authentication process only by judging the distance (within the communication range of the near field communication mode), so as to prevent the attacker from using only relay attacks to forge the illusion of the short distance.
  • the hidden danger of illegal unlocking greatly enhances the security of digital key unlocking.
  • an embodiment of the present invention provides a terminal device, which may include: a monitoring unit for monitoring the trend of the distance between the terminal device and a smart device, the smart device including a smart lock; an identity authentication unit, If it is determined that the terminal device is approaching the smart device, and the distance between the terminal device and the smart device is less than a first distance threshold, then start the communication between the terminal device and the smart device Identity authentication process; an unlocking unit for unlocking the smart lock when the identity authentication between the terminal device and the smart device is successful.
  • the terminal device further includes: a trigger unit, configured to establish when the distance between the terminal device and the smart device is less than a second distance threshold, and the smart device via Bluetooth Communication connection, and triggering the monitoring unit to perform the monitoring of the change trend of the distance between the terminal device and the smart device, and the second distance threshold is greater than the first distance threshold.
  • a trigger unit configured to establish when the distance between the terminal device and the smart device is less than a second distance threshold, and the smart device via Bluetooth Communication connection, and triggering the monitoring unit to perform the monitoring of the change trend of the distance between the terminal device and the smart device, and the second distance threshold is greater than the first distance threshold.
  • the terminal device further includes: a locking unit, configured to determine that the terminal device is moving away from the smart device and the distance between the terminal device and the smart device If it is greater than the third distance threshold, the smart lock is locked.
  • the monitoring unit is specifically configured to: determine a change in the distance between the terminal device and the smart device according to the first distance information between the terminal device and the smart device;
  • the first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the terminal device further includes: a comparing unit, configured to compare the environmental parameter where the terminal device is located and the environmental parameter where the smart device is located, and the environmental parameters include temperature, One or more of humidity, light intensity, smell, and noise; a judging unit for judging whether the terminal device and the smart device are in the same environment according to the comparison result; the first starting unit for determining whether it is in the same environment In the same environment, it is allowed to start the identity authentication process between the terminal device and the smart device.
  • a comparing unit configured to compare the environmental parameter where the terminal device is located and the environmental parameter where the smart device is located, and the environmental parameters include temperature, One or more of humidity, light intensity, smell, and noise
  • a judging unit for judging whether the terminal device and the smart device are in the same environment according to the comparison result
  • the first starting unit for determining whether it is in the same environment In the same environment, it is allowed to start the identity authentication process between the terminal device and the smart device.
  • the terminal device further includes: a response unit, configured to initiate a voice response instruction to the smart device; and a feedback unit, configured to receive a voice response instruction sent by the smart device according to the voice response instruction Feedback sound
  • the second initiating unit is configured to allow the start of the identity authentication process with the smart device if it is confirmed that the voice response matching is successful.
  • the identity authentication process between the terminal device and the smart device includes: the terminal device and the smart device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the unlocking unit is specifically configured to: determine the target smart lock closest to the terminal device among the plurality of smart locks, and unlock Open the target smart lock.
  • an embodiment of the present invention provides a smart device, which may include: a monitoring unit for monitoring the trend of the distance between the smart device and the terminal device, the smart device including a smart lock; an identity authentication unit, If it is determined that the terminal device is approaching the smart device, and the distance between the smart device and the terminal device is less than a first distance threshold, then start the communication between the smart device and the terminal device Identity authentication process; an unlocking unit for unlocking the smart lock in the case of successful identity authentication between the smart device and the terminal device.
  • the smart device further includes: a trigger unit, configured to establish when the distance between the smart device and the terminal device is less than a second distance threshold, and the terminal device via Bluetooth A communication connection, and triggering the monitoring unit to perform the monitoring of the change trend of the distance between the smart device and the terminal device, and the second distance threshold is greater than the first distance threshold.
  • a trigger unit configured to establish when the distance between the smart device and the terminal device is less than a second distance threshold, and the terminal device via Bluetooth A communication connection, and triggering the monitoring unit to perform the monitoring of the change trend of the distance between the smart device and the terminal device, and the second distance threshold is greater than the first distance threshold.
  • the smart device further includes: a locking unit, configured to determine that the smart device is moving away from the terminal device and the distance between the smart device and the terminal device If it is greater than the second distance threshold, the smart lock is locked.
  • the monitoring unit is specifically configured to: determine the change in the distance between the smart device and the terminal device according to the first distance information between the smart device and the terminal device;
  • the first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the smart device further includes: a comparing unit, configured to compare the environmental parameter where the smart device is located with the environmental parameter where the terminal device is located, and the environmental parameters include temperature, One or more of humidity, light intensity, smell, and noise; a judging unit for judging whether the smart device and the terminal device are in the same environment according to the comparison result; the first starting unit for determining whether it is in the same environment In the same environment, it is allowed to start the identity authentication process between the smart device and the terminal device.
  • a comparing unit configured to compare the environmental parameter where the smart device is located with the environmental parameter where the terminal device is located, and the environmental parameters include temperature, One or more of humidity, light intensity, smell, and noise
  • a judging unit for judging whether the smart device and the terminal device are in the same environment according to the comparison result
  • the first starting unit for determining whether it is in the same environment In the same environment, it is allowed to start the identity authentication process between the smart device and the terminal device.
  • the smart device further includes: a response unit, configured to receive a voice response instruction initiated by the terminal device; and a feedback unit, configured to send a voice response instruction to the terminal device according to the voice response instruction Feedback sound
  • the second starting unit is configured to allow starting the identity authentication process between the smart device and the smart device if it is confirmed that the voice response matching is successful.
  • the identity authentication process between the smart device and the terminal device includes: the smart device and the terminal device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the unlocking unit is specifically configured to: determine the target smart lock closest to the terminal device among the plurality of smart locks, and unlock Open the target smart lock.
  • an embodiment of the present invention provides a terminal device, which may include: a processor and a memory; where
  • the memory is used to store program code
  • the processor is used to call the program code stored in the memory to perform the following steps: monitor the trend of the distance change between the terminal device and the smart device, the smart device includes a smart lock; if It is determined that the terminal device is approaching the smart device and the distance between the terminal device and the smart device is less than the first distance threshold, then the identity authentication process between the terminal device and the smart device is started In the case of successful identity authentication between the terminal device and the smart device, unlock the smart lock.
  • the processor is further configured to: when the distance between the terminal device and the smart device is less than a second distance threshold, establish a communication connection with the smart device via Bluetooth, and Triggering execution of the monitoring of a change trend of the distance between the terminal device and the smart device, and the second distance threshold is greater than the first distance threshold.
  • the processor is further configured to: if it is determined that the terminal device is moving away from the smart device, and the distance between the terminal device and the smart device is greater than a third distance Threshold, the smart lock is locked.
  • the processor is specifically configured to: determine a change in the distance between the terminal device and the smart device according to the first distance information between the terminal device and the smart device;
  • the first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the processor is further configured to: compare the environmental parameters where the terminal device is located with the environmental parameters where the smart device is located, the environmental parameters including temperature, humidity, and light intensity One or more of odor and noise; judge whether the terminal device and the smart device are in the same environment according to the comparison result; if it is confirmed that they are in the same environment, allow the terminal device and the smart device to be activated Between the identity authentication process.
  • the processor is further configured to: initiate a voice response instruction to the smart device;
  • the identity authentication process between the terminal device and the smart device includes: the terminal device and the smart device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the processor is specifically configured to: determine the target smart lock that is closest to the terminal device among the plurality of smart locks, and unlock Open the target smart lock.
  • an embodiment of the present invention provides a smart device, which may include: a processor and a memory; wherein the memory is used to store program code, and the processor is used to call the program code stored in the memory to perform the following steps :
  • the smart device monitor the change trend of the distance between the smart device and the terminal device, the smart device includes a smart lock; if it is determined that the terminal device is approaching the smart device, and the smart device and the terminal device If the distance is less than the first distance threshold, the identity authentication process between the smart device and the terminal device is started; if the identity authentication between the smart device and the terminal device is successful, unlock the smart device lock.
  • the smart device and the terminal device establish a communication connection via Bluetooth; the processor is further configured to: when the distance between the smart device and the terminal device is less than the second The distance threshold is triggered to execute the monitoring of the change trend of the distance between the smart device and the terminal device, and the second distance threshold is greater than the first distance threshold.
  • the processor is further configured to: if it is determined that the smart device is moving away from the terminal device, and the distance between the smart device and the terminal device is greater than a second distance Threshold, the smart lock is locked.
  • the processor is specifically configured to: determine a change in the distance between the smart device and the terminal device according to the first distance information between the smart device and the terminal device;
  • the first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the processor is further configured to: compare the environmental parameters where the smart device is located with the environmental parameters where the terminal device is located, and the environmental parameters include temperature, humidity, and light intensity. One or more of smell and noise; judge whether the smart device and the terminal device are in the same environment according to the comparison result; if it is confirmed that they are in the same environment, allow the smart device and the terminal device to be activated Between the identity authentication process.
  • the processor is further configured to: receive a voice response instruction initiated by the terminal device; send a feedback sound to the terminal device according to the voice response instruction; if it is confirmed that the voice response is matched successfully , It is allowed to start the identity authentication process between the smart device and the smart device.
  • the identity authentication process between the smart device and the terminal device includes: the smart device and the terminal device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the processor is specifically configured to: determine the target smart lock that is closest to the terminal device among the plurality of smart locks, and unlock Open the target smart lock.
  • the present application provides a terminal device that has a function of realizing any one of the smart lock unlocking methods provided in the first aspect.
  • This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the present application provides a smart device that has the function of realizing any one of the smart lock unlocking methods provided in the second aspect.
  • This function can be realized by hardware, or by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the present application provides a terminal device, which includes a processor, and the processor is configured to support the terminal device to perform corresponding functions in any of the smart lock unlocking methods provided in the first aspect.
  • the terminal device may further include a memory, which is used for coupling with the processor, and stores the necessary program instructions and data of the terminal device.
  • the terminal device may also include a communication interface for the terminal device to communicate with other devices or a communication network.
  • the present application provides a smart device that includes a processor, and the processor is configured to support the smart device to perform a corresponding function in any one of the smart lock unlocking methods provided in the second aspect.
  • the smart device may also include a memory, which is used for coupling with the processor, and stores the program instructions and data necessary for the smart device.
  • the smart device may also include a communication interface for the smart device to communicate with other devices or a communication network.
  • the present application provides a computer storage medium for storing computer software instructions used for the terminal device provided in the first aspect above, which includes a program designed to execute the above aspect.
  • the present application provides a computer storage medium for storing computer software instructions for the smart device provided in the second aspect above, which includes the program designed to execute the above aspect.
  • an embodiment of the present invention provides a computer program, the computer program including instructions, when the computer program is executed by a terminal device, the terminal device can execute the smart lock unlocking method of any one of the above-mentioned first aspect The process performed by the terminal device in the middle.
  • an embodiment of the present invention provides a computer program, the computer program including instructions, when the computer program is executed by a smart device, the smart device can execute the smart lock unlocking method of any one of the above second aspects The process performed by smart devices in China.
  • the present application provides a chip system including a processor for supporting terminal devices to implement the functions involved in the above-mentioned first aspect.
  • the chip system further includes a memory, and the memory is used to store necessary program instructions and data of the terminal device.
  • the chip system can be composed of chips, or include chips and other discrete devices.
  • the present application provides a chip system including a processor for supporting smart devices to implement the functions involved in the above second aspect.
  • the chip system further includes a memory, and the memory is used to store necessary program instructions and data for the smart device.
  • the chip system can be composed of chips, or include chips and other discrete devices.
  • Figure 1 is a schematic diagram of unlocking a digital car key in the prior art.
  • Figure 2 is a schematic diagram of the architecture of a smart lock unlocking system provided by an embodiment of the present invention.
  • Fig. 3 is a schematic diagram of another intelligent lock unlocking system architecture provided by an embodiment of the present invention.
  • Fig. 4 is a schematic flowchart of a method for unlocking a smart lock provided by an embodiment of the present invention.
  • Fig. 5 is a schematic flowchart of another method for unlocking a smart lock according to an embodiment of the present invention.
  • Fig. 6 is a schematic diagram of a smart unlocking application scenario provided by an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of another method for unlocking a smart lock according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a terminal device provided by an embodiment of the present invention.
  • Fig. 9 is a schematic structural diagram of a smart device provided by an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of another terminal device provided by an embodiment of the present invention.
  • Fig. 11 is a schematic structural diagram of another smart device provided by an embodiment of the present invention.
  • Fig. 12 is a schematic structural diagram of a device provided by an embodiment of the present invention.
  • component used in this specification are used to denote computer-related entities, hardware, firmware, a combination of hardware and software, software, or software in execution.
  • the component may be, but is not limited to, a process, processor, object, executable file, thread of execution, program, and/or computer running on the processor.
  • application running on the computing device and the computing device can be components.
  • One or more components may reside in processes and/or threads of execution, and components may be located on one computer and/or distributed among two or more computers.
  • these components can be executed from various computer readable media having various data structures stored thereon.
  • the component may be based on, for example, a signal having one or more data packets (such as data from two components interacting with another component in a local system, a distributed system, and/or a network, such as the Internet that interacts with other systems through signals) Communicate through local and/or remote processes.
  • a signal having one or more data packets (such as data from two components interacting with another component in a local system, a distributed system, and/or a network, such as the Internet that interacts with other systems through signals) Communicate through local and/or remote processes.
  • NFC Near Field Communication
  • RFID radio frequency identification
  • interconnection technology Evolved, by integrating the functions of contactless card reader, contactless card and point-to-point communication on a single chip, using mobile terminals to realize applications such as mobile payment, electronic ticketing, access control, mobile identity recognition, and anti-counterfeiting.
  • Bluetooth is a short-distance wireless communication technology that can realize data exchange between fixed devices and mobile devices.
  • BR/EDR Bluetooth before Bluetooth 3.0 is called traditional Bluetooth
  • LE Bluetooth under the Bluetooth 4.0 specification is called low energy Bluetooth.
  • BLE (Bluetooh Low Energy) Bluetooth low energy technology is a short-distance, low-cost, and interoperable wireless technology that uses many intelligent means to minimize power consumption.
  • GPS Global Positioning System
  • GPS Global Satellite Positioning System
  • GPS Global Positioning System
  • GPS Global Satellite Positioning System
  • GPS is a system that uses GPS to locate satellites for real-time positioning and navigation on a global scale.
  • GPS is a omni-directional, all-weather, all-time, high-precision satellite navigation system that can provide users around the world with low-cost, high-precision three-dimensional position, speed, and precise timing navigation information.
  • Beacon is a kind of "Proximity System”.
  • applications running on smart phones, tablets, wearables or other computing devices can respond to signals sent by "Beacon devices".
  • the Beacon device itself is a small and cheap physical device that can be placed in certain places to send information to the "response device” within a certain distance.
  • the way it works is that a device equipped with Bluetooth Low Energy (BLE) communication uses BLE technology to send its own unique ID to the surroundings, and the application software that receives the ID will take some actions based on the ID.
  • BLE Bluetooth Low Energy
  • T-Box In-vehicle communication system
  • T-Box generally refers to the intelligent in-vehicle terminal in the car networking system, which directly communicates with the car's CAN bus to obtain body state and car condition information, and upload these parameters to the car remote service provider
  • TTP Telematics Service Provider
  • the Telematics Service Provider (TSP) background can also receive commands issued by the background and return the execution results. Based on this, the remote control function can be extended to mobile apps, smart keys, etc.
  • UltraWideBand is a wireless communication technology that transmits data at a high speed in a short distance with very low power.
  • UWB has strong anti-interference performance, high transmission rate, extremely wide bandwidth, low power consumption, and transmission power. Many advantages such as small are mainly used in indoor communication, home network, location determination, radar detection and other fields.
  • Impulse radio-Ultra Wide Band (IRUWB) is the most classic implementation of ultra-wideband UWB communication.
  • the IR-UWB technology wireless real-time high-precision positioning platform relies on an integrated network composed of multiple powerful data acquisition sensors to send signals instantly, which is equivalent to indoor GPS and is more accurate.
  • Cryptographic hash function also translated as cryptographic hash function, is a kind of hash function. It is considered to be a one-way function, which means that it is extremely difficult to return the result of the hash function to what the input data is. Such one-way functions are called “the workhorse of modern cryptography.”
  • the input data of this hash function is usually called a message, and its output result is often called a message digest or digest.
  • cryptographic hash functions In information security, there are many important applications that use cryptographic hash functions to implement, such as digital signatures and message authentication codes.
  • FIG. 2 is a schematic diagram of the architecture of a smart lock unlocking system provided by an embodiment of the present invention.
  • the system architecture can include a terminal device 10 (in Figure 2 the owner’s smart phone is taken as an example, it can also be a smart bracelet, smart glasses, etc.), a smart device 20 (in Figure 2, a smart vehicle is taken as an example, or it can be a company Access control, home door locks, safes, etc.) and the server 30 (take a cloud server as an example in Figure 2), where the smart device 20 includes one or more smart locks, and the terminal device 10 can be tied to the smart device 20 through the server 30
  • the server 30 take a cloud server as an example in Figure 2
  • the smart device 20 includes one or more smart locks
  • the terminal device 10 can be tied to the smart device 20 through the server 30
  • short-range wireless communication methods such as Bluetooth, NFC, Wi-Fi, etc.
  • the smart phone 10 of the car owner installs the relevant App to establish a secure channel with the server 30, and initiates a registration request to the server 30, submits its user name, password and the authentication certificate of the smart car 20 (used to prove that the car owner legally owns the car, this certificate Bind with the car, it can be a password, key, public and private key, etc.).
  • the smart phone 10 can store the key K O and the Bluetooth address locally, for example, store the key K O and the Bluetooth address in the security chip SE of the smart phone 10, or combine white box encryption with code obfuscation Wait.
  • the server 30 and the smart vehicle 20 authenticate each other and establish a secure channel, and send information such as the owner’s identity information, K O, and Bluetooth pairing information (such as the Bluetooth address of the terminal device, the Bluetooth pairing authentication code (PIN code), etc.) to The smart vehicle 20, in the subsequent identity authentication process of the smart phone and the smart vehicle, can perform the identity verification of both parties through the above-mentioned K O.
  • information such as the owner’s identity information, K O, and Bluetooth pairing information (such as the Bluetooth address of the terminal device, the Bluetooth pairing authentication code (PIN code), etc.)
  • the above system architecture assumes that a smart vehicle corresponds to a vehicle owner. In actual situations, there may be multiple vehicle owners. For the sake of generality, the vehicle owner can be set to have administrator rights to authorize or blacklist other users. In order to be able to unlock/lock the smart lock, the car owner needs to pre-register, and other users need to obtain the car owner's pre-authorization.
  • FIG. 3 is a schematic structural diagram of another intelligent lock unlocking system provided by an embodiment of the present invention.
  • the system architecture may include a terminal device 10-A and at least one terminal device 10-B (in Figure 3, the smartphone with 10-A as the owner of the car is taken as an example, and 10-B is the smartphone with the user to be authorized as an example),
  • the device 20 (a smart vehicle is taken as an example in FIG. 3) and a related server (the cloud server 03 is taken as an example in FIG. 3).
  • the smart device 20 includes one or more smart locks.
  • the terminal device 10-A can be bound to the smart device 20 through the server 30 to obtain the use right of the smart lock, and the terminal device 10-B can use the terminal device 10-B.
  • the short-distance wireless communication method such as Bluetooth, NFC, Wi-Fi, etc.
  • the smart device 20 perform processes such as distance monitoring, identity authentication, and unlocking/locking of the smart lock.
  • the process of authorizing a car owner to other users can be as follows:
  • the owner's smartphone 10-A can authorize other users' smartphones 10-B (such as family, friends, etc.) with certain access rights.
  • the owner's smartphone 01-A establishes a secure channel with the server 30 and performs identity authentication.
  • the vehicle owner After the server 30 authenticates the identity of the smartphone 10-A, the vehicle owner sends the user (appointed user) identity information ID U and authorization policy Pu to the server 30 through the smartphone 10-A.
  • the server 30 immediately updates the smart vehicle authorization list, and establishes a secure channel with the user to be authorized, and sends the key K U and the authorization policy P U to the authorized user's smartphone 10-B.
  • the server 30 establishes a secure channel with the corresponding smart vehicle 20, and sends the authorized user's identity information ID U , authorization policy P U , and Bluetooth pairing information to the corresponding smart vehicle 20.
  • the intelligent vehicle has a K O, according to K O, ID U, P U always calculated K U, K U thus transferred to the server without the smart vehicle 20, the vehicle 20 does not need to save the smart K U.
  • the rental and sharing of smart vehicles can be realized in a manner that the management terminal of the car rental company performs fixed-point authorization on the terminal of the car rental user.
  • the aforementioned authorization method can also be applied to unlocking scenarios such as company door locks, home door locks, safes, etc. The embodiment of the present invention does not specifically limit this, and will not be repeated here.
  • Figure 4 is a schematic flowchart of a method for unlocking a smart lock provided by an embodiment of the present invention.
  • the method can be applied to the system architecture described in Figure 2 or Figure 3 above, and the terminal device may be Figure 2
  • the terminal device 10 in the system architecture may also be the terminal device 10-A or the terminal device 10-B in the system architecture of FIG. 3, which may be used to support and execute the method flow shown in FIG. 4.
  • the description will be made from the terminal device side with reference to FIG. 4 below.
  • the method may include the following steps S401 to S403.
  • Step S401 The terminal device monitors the trend of the distance change between the terminal device and the smart device, and the smart device includes a smart lock.
  • the terminal device may be a smart phone, smart bracelet, etc. held by the user, and the smart device may be a smart vehicle, company access control, home door lock, safe, etc.
  • the terminal device judges the change of the distance with the smart device according to the first distance information with the smart device; wherein, the first distance information includes Bluetooth signal strength change information, GPS measurement of the global positioning system One or more of range information and pulse ultra-wideband IRUWB ranging information. That is, the terminal device can monitor the change in the distance between the terminal device and the smart device according to the strength of the Bluetooth signal with the smart device, GPS ranging information or other ranging technology (such as IRUWB technology).
  • the terminal device when the terminal device detects that the Bluetooth signal strength between it and the smart device is gradually increasing within a preset time range, it is determined that the terminal device is approaching the smart device, or when the terminal device detects that it is between the smart device and the smart device through distance measurement. If the distance gradually decreases within the preset time range, it is determined that the terminal device is leaning on the smart device.
  • the strength information or distance information can be realized by sampling the signal strength or distance multiple times within the preset time range. Obtaining to realize the judgment of distance change trend.
  • the smart device can also use the above-mentioned ranging method at the same time and exchange ranging information with the smart device to jointly monitor the trend of the distance change with the terminal device to improve the accuracy of the ranging.
  • the terminal device can also use accelerometers, gyroscopes and other sensors to detect whether the user (such as the owner or authorized user) is walking before monitoring the trend of the distance between the smart device and the smart device, or during the monitoring process.
  • the accuracy of precise ranging further avoids relay attacks that an attacker may cause when the terminal device is static.
  • Step S402 If the terminal device determines that it is approaching the smart device, and the distance between the terminal device and the smart device is less than the first distance threshold, start the communication between the terminal device and the smart device The identity authentication process.
  • the terminal device may indicate that the user holding the terminal device has the ability to open the smart device’s smart lock Intention or willingness. For example, the Bluetooth signal strength between the terminal device and the smart device is getting stronger; or the GPS ranging between the terminal device and the smart device is getting smaller and smaller; or the IRUWB ranging between the terminal device and the smart device is getting more and more Small, satisfying any one or more of the above can indicate that the terminal device is approaching the smart device, that is, the user holding the terminal device is walking and approaching the smart device.
  • “approaching” may mean that the distance between the terminal device and the smart device continues to decrease, or it may mean that the distance between the terminal device and the smart device has a decreasing trend. For example, if a user holds a terminal device (smart phone) to a smart terminal (smart vehicle), the user may go straight to the smart vehicle, or a tortuous route to the smart vehicle, that is, between the smart phone and the smart vehicle. The distance may show a tendency of decreasing ⁇ increasing ⁇ decreasing instability, and this situation also belongs to the situation of approaching the smart device in this application.
  • the identity authentication process can include: 1. The terminal device initiates an unlock request to the smart device; 2. The smart device sends an identity authentication challenge to the terminal device that initiated the unlock request; 3. The terminal device replies with an identity authentication response, so that it can be reliable, Effectively prevent attackers from impersonating legitimate users to obtain the control authority of the smart lock of the smart device, and ensure the legitimate interests of authorized visitors.
  • the above conditions for initiating identity authentication can effectively prevent the attacker from using the relay to amplify the signal to carry out a relay attack when the user's terminal device is in a static state or moving without purpose, that is, the attacker cannot be in a static state on the terminal device
  • the condition of "the terminal device is approaching the smart device" in the embodiment of the present invention greatly enhances the security of unlocking the digital key.
  • Step S403 When the identity authentication between the terminal device and the smart device is successful, the terminal device unlocks the smart lock.
  • the terminal device can unlock the smart lock of the smart device.
  • the terminal device can directly send a control signal to the smart lock to control the unlocking of the smart lock, or the terminal device can send a corresponding control signal to the smart device to pass the related control unit of the smart device (such as the vehicle’s T-Box ) Control the opening of its smart lock, or notify other third-party devices (such as cloud servers, smart gateways, etc.) to unlock them.
  • the user holding the terminal device can safely and automatically open the smart lock of the smart device without being aware of it.
  • the terminal device monitors the trend of the distance from the smart device where the smart lock is located, and when it is determined that the smart device is approaching and the distance is less than a certain threshold, the communication with the smart device is started.
  • the identity authentication process and after the identity authentication is passed, unlock the smart lock.
  • the terminal device Before starting the identity authentication process, the terminal device not only considers the distance to the smart device, but also determines whether it is approaching the smart device by monitoring the change trend of the distance with the smart device (such as holding the terminal device).
  • the user walks and approaches the smart device), that is, it fully judges whether the user holding the terminal device has the intention of unlocking, and avoids starting the identity authentication process only by judging the distance (within the communication range of the near field communication method), thereby It avoids the hidden danger of illegal unlocking by an attacker using only a relay attack to forge a close-range illusion, and greatly enhances the security of digital key unlocking.
  • Figure 5 is a schematic flowchart of another method for unlocking a smart lock provided by an embodiment of the present invention.
  • This method can be applied to the system architecture described in Figure 2 or Figure 3 above, where the terminal device may be 2
  • the terminal device 10 in the system architecture may also be the terminal device 10-A or the terminal device 10-B in the system architecture of FIG. 3, which may be used to support and execute the method flow shown in FIG. 5.
  • the following will describe from the terminal device side with reference to FIG. 5.
  • the method may include the following steps S501 to S505.
  • Step S501 When the distance between the terminal device and the smart device is less than a second distance threshold, the terminal device and the smart device establish a communication connection via Bluetooth, and trigger execution of the monitoring and the smart device. The change trend of the distance between.
  • the mobile phone and the vehicle can learn the distance between each other through mutual distance estimation, thereby determining the distance between the mobile phone and the vehicle. Whether the distance is less than the preset Bluetooth pairing distance (ie, the second distance threshold). It is understandable that the distance estimation process may be different from the trend of the distance change between the monitoring performed by the subsequent trigger and the smart device. It does not need to continuously monitor the trend of the distance change, but is mainly for making the mobile phone and the vehicle compare.
  • the premise of establishing a communication connection between the terminal device and the smart device via Bluetooth is that the Bluetooth function switch of the terminal device and the smart device is turned on, and the terminal device and the smart device are already in each other's Bluetooth communication list. After the terminal device and the smart device complete the Bluetooth pairing, the terminal device starts to monitor the trend of the distance change between the terminal device and the smart device in real time, so as to perform identity authentication under appropriate conditions.
  • Bluetooth communication uses authentication for data interaction to ensure security, and at the same time to ensure the convenience of use, Bluetooth usually completes the first communication authentication between two Bluetooth devices in the form of pairing, and after pairing , The subsequent communication connection does not have to be authenticated every time. Therefore, in the embodiment of the invention, the Bluetooth pairing between the terminal device and the smart device can only be completed initially (for example, during the registration process/authorization process in the embodiment of FIG. 2 or FIG. 3, or after registration/authorization).
  • the first Bluetooth pairing as long as it is within the communication distance range of Bluetooth and the distance between the two is less than the second distance threshold, authentication-free pairing can be performed.
  • Bluetooth pairing guarantees the security of Bluetooth communication to a certain extent, but due to the simplicity of the Bluetooth pairing authentication code (PIN code), its security assurance mechanism is relatively easy to be cracked. Therefore, in this application, further follow-up steps are required.
  • the identity authentication is used to authenticate the control authority of the smart lock, thereby enhancing security.
  • the terminal device and the smart device can also communicate through other short-range wireless communication methods, such as ZigBee, WiFi, NFC, etc., which are not specifically limited in this application.
  • NFC-based smart unlocking systems are also subject to relay attacks. Take the scenario of driving locks as an example. Due to the small communication range of NFC (the owner needs to be closer to the vehicle), the attacker’s relay device also needs distance. The vehicle owner can only form a relay attack if it is close, so it is easy to be noticed by the vehicle owner. In comparison, Bluetooth's wireless communication has a longer distance, which makes the Bluetooth-based digital car key system more likely to suffer a relay attack.
  • the invention is implemented Examples can more effectively solve the problem of relay attacks, and provide users with a safe, intelligent, and unconscious unlocking experience. It is understandable that the embodiments of the present invention can also avoid relay attacks in scenarios such as ZigBee and WiFi, and will not be repeated here.
  • the terminal device and the smart device communicate through Bluetooth, and the range of Bluetooth communication usually ranges from tens of meters to hundreds of meters. If the terminal device and the smart device are in a long distance Bluetooth communication range It may cause higher power consumption of terminal equipment to monitor the change trend of the distance within the system, and generally, in the case of a long distance, it is impossible to more effectively determine whether the user holding the terminal equipment has the intention of unlocking. Therefore, the present invention
  • the Bluetooth pairing connection is performed when the distance between the terminal device and the smart device is within a relatively short range, and the execution of the monitoring distance change trend is triggered, which saves the power consumption of the terminal device. Improved the accuracy of unlocking condition judgment.
  • Step S502 The terminal device monitors the trend of the distance change between the terminal device and the smart device, and the smart device includes a smart lock.
  • step S502 can refer to step S401 in the embodiment of FIG. 4, which will not be repeated here.
  • the first distance information includes Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the second distance information includes one or more of Bluetooth signal strength change information, GPS ranging information, and IRUWB ranging information. That is, in the embodiment of the present invention, not only the terminal device can lead the monitoring, but also the smart device can lead the monitoring. Furthermore, the terminal device and the smart device can also participate in the monitoring of the distance change trend at the same time to improve the accuracy of monitoring. .
  • Step S503 If the terminal device determines that it is approaching the smart device, and the distance between the terminal device and the smart device is less than the first distance threshold, start the communication between the terminal device and the smart device The identity authentication process.
  • step S503 can refer to step S402 in the above embodiment of FIG. 4, which will not be repeated here.
  • the identity authentication process between the terminal device and the smart device includes: the terminal device and the smart device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the way based on the pre-authenticated shared key can refer to the key K O shared by the terminal device (such as the owner's smart phone) and the smart device (such as a smart vehicle) correspondingly calculated in the embodiment in FIG. 2 and FIG. 3.
  • both parties can use the shared key K O to perform challenge-response-based bidirectional identity authentication.
  • the smart device can calculate the K U of the delegated user (terminal device) in real time, so the smart device and the terminal device of the delegated user can also use K U to perform challenge-response based Two-way identity authentication.
  • the above-mentioned identity authentication adopts a shared key mode, and the embodiment of the present invention may also adopt a public and private key pair for identity authentication.
  • the owner of the smartphone (referred to as owners) do not need to receive K O: generate a digital signature of the owner of public and private key pair (PK O, SK O), registered with the server
  • PK O, SK O public and private key pair
  • the identity of the vehicle owner, and the public key PK O and Bluetooth address information are sent to the smart device (the owner’s smart vehicle, referred to as the vehicle) through the server, and the vehicle owner safely keeps the SK O.
  • the vehicle owner In the vehicle owner’s authorization phase, the vehicle owner generates a public-private key pair (PK U , SK U ) for digital signatures, transmits (PK U , SK U ) to the terminal equipment used by the authorized user through the server, and registers PK U , authorization
  • PK U public-private key pair
  • the Bluetooth pairing information of the strategy PU and the delegated user is sent to the corresponding vehicle through the server.
  • the car owner can directly use SK O for identity authentication and the authorized user can directly use SK U to sign the challenge issued by the vehicle, thereby realizing identity authentication.
  • Step S504 When the identity authentication between the terminal device and the smart device is successful, the terminal device unlocks the smart lock.
  • step S504 can refer to step S403 in the embodiment of FIG. 4, which will not be repeated here.
  • the smart device includes a plurality of the smart locks; the unlocking the smart lock includes: the terminal device determines the closest target smart lock among the plurality of smart locks To unlock the target smart lock.
  • the terminal device can further determine which smart lock is closer to itself, and then unlock the smart lock accordingly, providing users with more humanized smart unlocking services, and further Improve user experience.
  • each door lock of a smart vehicle is equipped with a Bluetooth Beacon, which is placed in the main driver's door, co-driver's door, and trunk respectively.
  • the smart vehicle can determine which beacon the mobile phone owner is closer to based on the strength of the Bluetooth signal received by multiple beacons and determine the willingness to open the corresponding door/trunk door.
  • the value of the locked identifier of the vehicle maintenance is 1, if the mobile phone/vehicle detects that the user intends to be turned on, and the distance between the mobile phone and the vehicle is less than the preset opening distance (that is, the condition corresponding to step S503 above is satisfied) , The identity authentication process is started; if the vehicle completes the identity authentication protocol on the mobile phone, the vehicle turns on the corresponding vehicle equipment and sets the value of the locked identifier to 0. In the case where the value of the locked identifier of the vehicle maintenance is 0, if the mobile phone/vehicle detects that the user intends to close and the distance between the mobile phone and the vehicle is greater than the preset closing distance, all smart locks are closed.
  • the method before the initiating the identity authentication process between the terminal device and the smart device, the method further includes: the terminal device compares its own environmental parameters with the smart device's location.
  • the environmental parameters include one or more of temperature, humidity, light intensity, odor and noise; the terminal device judges whether it is in the same environment as the smart device according to the comparison result; if so, The terminal device is allowed to start an identity authentication process with the smart device. That is, before determining whether to start the identity authentication process, the terminal device not only considers whether it is approaching the smart device, and whether it is closer to the smart device in distance, but also can judge whether it is in the same position with the smart device through environmental parameters.
  • the method before the initiating the identity authentication process between the terminal device and the smart device, the method further includes: the terminal device initiates a voice response instruction to the smart device; the terminal device Receive the feedback sound issued by the smart device according to the voice response instruction; if it is confirmed that the voice response is matched successfully, the terminal device is allowed to start the identity authentication process with the smart device.
  • the multi-sensor mutual verification technology can be used to further reduce the threat of relay attack.
  • voice response technology is used.
  • the mobile phone sends a digital challenge to the vehicle (such as 0100), and the vehicle honks or emits ultrasonic waves for corresponding responses (such as short lengths and shorts).
  • the terminal device before determining whether to start the identity authentication process, the terminal device not only considers whether it is approaching the smart device, and whether it is close to the smart device in distance, but also determines whether it is between itself and the smart device through a voice response. Within a short distance, to further accurately determine whether the terminal device held by the user is indeed near the smart device (that is, the user is indeed likely to need to open the smart lock), and the distance forged by an attacker is very close, which is more effective to avoid Illegal unlocking caused by relay attacks ensures the security of smart locks and improves user experience.
  • the above-mentioned voice response challenge can also be implemented in conjunction with the above-mentioned environmental parameter judgment, that is, it is not only judged whether the terminal device is approaching the smart device and whether it is close to the smart device in distance, but also the voice response challenge and whether it is in the same Environmental judgment to further improve the accuracy of judgment.
  • Step S505 If the terminal device determines that it is moving away from the smart device, and the distance between the terminal device and the smart device is greater than a third distance threshold, lock the smart lock.
  • the terminal device is moving away from the smart device, including at least one of the following: the Bluetooth signal strength between the terminal device and the smart device is getting weaker; or the terminal device and the smart device The GPS ranging between the terminals is getting larger and larger; or the IRUWB ranging between the terminal device and the smart device is getting larger.
  • the terminal device also judges whether it is far away from the smart device by monitoring the change trend of the distance with the smart device, that is, it fully judges whether the user holding the terminal device has the intention to lock the smart lock, and avoids the user Hands-on.
  • the terminal device when it is determined that the terminal device is far away from company access control, home door locks, car doors, safes, shared bicycles, etc., and the distance exceeds a certain threshold, the corresponding smart lock will be automatically locked without the user’s hands or perception. Convenient and fast, with good user experience.
  • FIG. 6 is a schematic diagram of a smart unlocking application scenario provided by an embodiment of the present invention.
  • the smart vehicle (the smart vehicle in FIG. 6) is the center, and different dotted circles represent the first distance threshold.
  • the second distance threshold the range of the area corresponding to the third distance threshold, when the user holds the smart phone from the elevator into the parking lot, and walks towards his smart vehicle, and when the distance is less than the second distance threshold, the smart phone and the smart vehicle Start Bluetooth pairing.
  • any of the above-mentioned embodiments of the smart lock unlocking method in this application can be applied to digital key systems in various scenarios, such as car sharing, time-sharing leasing, car rental business, express delivery to the trunk, Unlocking areas such as home door locks, company access control, safes, etc. will not be repeated here.
  • FIG. 7 is a schematic flowchart of another method for unlocking a smart lock according to an embodiment of the present invention.
  • the method can be applied to the system architecture described in FIG. 2 or FIG. 3, where the smart device may be
  • the smart device 20 in the system architecture of FIG. 2 or FIG. 3 can be used to support and execute the method flow shown in FIG. 7.
  • the description will be made from the side of the smart device with reference to FIG.
  • the method may include the following steps S701-S703.
  • Step S701 the smart device monitors the trend of the change of the distance between the smart device and the terminal device, and the smart device includes a smart lock.
  • Step S702 If the smart device determines that the terminal device is approaching, and the distance between the smart device and the terminal device is less than the first distance threshold, start the connection between the smart device and the terminal device The identity authentication process.
  • Step S703 When the identity authentication between the smart device and the terminal device is successful, the smart device unlocks the smart lock.
  • step S701 to step S703 reference may be made to step S502 to step S504 in the embodiment of FIG. 4, which will not be repeated here.
  • the smart device monitors, determines, activates identity authentication, or unlocks the smart lock.
  • the specific implementation may vary according to the structure, sensors, and related functional modules on the smart device and the terminal device, for example, Smart vehicles can use ultrasonic radar to detect whether the owner is moving, and control the unlocking/locking of the smart lock through the CAN bus. That is, some implementation details on the smart device side need to be changed in conjunction with changes in the structure and function of the smart device itself, and will not be repeated here.
  • the method further includes: when the distance between the smart device and the terminal device is less than a second distance threshold, the smart device and the terminal device establish a communication connection via Bluetooth, And triggering the execution monitoring of the change trend of the distance between the terminal device and the terminal device, and the second distance threshold is greater than the first distance threshold.
  • the method further includes: if the smart device determines that it is moving away from the terminal device, and the distance between the smart device and the terminal device is greater than a second distance threshold, then The smart device locks the smart lock.
  • the change trend of the distance between the smart device monitoring and the terminal device includes:
  • the smart device judges the change of the distance between the smart device and the terminal device according to the first distance information with the terminal device; wherein the first distance information includes Bluetooth signal strength change information, global positioning system One or more of GPS ranging information and pulsed ultra-wideband IRUWB ranging information.
  • the method before the initiating the identity authentication process between the smart device and the terminal device, the method further includes: the smart device compares its own environment parameters with the smart device's location.
  • the environmental parameters include one or more of temperature, humidity, light intensity, odor and noise; the smart device judges whether it is in the same environment as the smart device according to the comparison result; if so, The smart device is allowed to start an identity authentication process with the terminal device.
  • the method before the initiation of the identity authentication process between the smart device and the terminal device, the method further includes: the smart device receiving a voice response instruction initiated by the terminal device; The device sends a feedback sound to the terminal device according to the voice response instruction; if it is confirmed that the voice response is matched successfully, the smart device is allowed to start the identity authentication process with the smart device.
  • the identity authentication process between the smart device and the terminal device includes: the smart device and the terminal device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the unlocking the smart lock includes: the smart device determines that the plurality of smart locks are closest to the terminal device The target smart lock, unlock the target smart lock.
  • This application also provides yet another method for unlocking a smart lock, which may include: the terminal device monitors the trend of the distance between the smart device and the smart device, and the smart device includes a smart lock; if the terminal device determines that it is approaching the smart device , And the distance between the terminal device and the smart device is less than the first distance threshold, then the identity authentication process between the terminal device and the smart device is started; between the terminal device and the smart device In the case that the inter-identity authentication is successful, the smart device unlocks the smart lock.
  • the terminal device monitors the trend of the distance from the smart device where the smart lock is located, and when it is determined that the smart device is approaching and the distance is less than a certain threshold, the communication with the smart device is started.
  • the smart device will unlock the smart lock.
  • the terminal device Before starting the identity authentication process, the terminal device not only considers the distance to the smart device, but also judges whether it is approaching the smart device by monitoring the change trend of the distance from the smart device, that is, it fully judges the holding Whether the user of the terminal device has the intention of unlocking, to avoid starting the identity authentication process only by judging the distance (within the communication range of the near field communication mode), so as to prevent the attacker from using only relay attacks to forge the illusion of the short distance.
  • the hidden danger of illegal unlocking greatly enhances the security of digital key unlocking.
  • the trend of the distance between the monitoring terminal device and the smart device may be monitored by the terminal device, or by the smart device, or jointly monitored by the terminal device and the smart device.
  • determining whether the terminal device is close to or far from the smart device and the distance between the two can be determined by the terminal device, the smart device, or the terminal device and the smart device jointly.
  • starting the identity authentication process between the terminal device and the smart device may also be initiated by the terminal device, or may be initiated by the smart device.
  • the final control to unlock the smart lock/control to lock the smart lock may be controlled and executed by the terminal device, or controlled and executed by the smart device.
  • the monitoring of the change trend of the distance between the two, the judgment between the distance and the distance threshold, the start of the identity authentication process, and the specific execution body of all or part of the steps in the process of unlocking/locking the smart lock It is not specifically limited, and all can be executed by the terminal device, all can be executed by the smart device, or partly executed by the terminal device and partly executed by the smart device interactively, that is, as long as it can be finally determined or a corresponding result can be obtained.
  • FIG. 8 is a schematic structural diagram of a terminal device provided by an embodiment of the present invention.
  • the terminal device 10 may include a monitoring unit 101, an identity authentication unit 102, and an unlocking unit 103.
  • the detailed description of each unit is as follows.
  • the monitoring unit 101 is configured to monitor the change trend of the distance between the terminal device and the smart device, the smart device including a smart lock;
  • the identity authentication unit 102 is configured to, if it is determined that the terminal device is approaching the smart device, and the distance between the terminal device and the smart device is less than a first distance threshold, then start the terminal device and the smart device Identity authentication process between smart devices;
  • the unlocking unit 103 is configured to unlock the smart lock when the identity authentication between the terminal device and the smart device is successful.
  • the terminal device further includes:
  • the trigger unit 104 is configured to establish a communication connection with the smart device via Bluetooth when the distance between the terminal device and the smart device is less than a second distance threshold, and trigger the monitoring unit to perform the monitoring of the terminal A change trend of the distance between the device and the smart device, and the second distance threshold is greater than the first distance threshold.
  • the terminal device further includes:
  • the locking unit 105 is configured to lock the smart lock if it is determined that the terminal device is moving away from the smart device and the distance between the terminal device and the smart device is greater than a third distance threshold.
  • the monitoring unit is specifically configured to: determine a change in the distance between the terminal device and the smart device according to the first distance information between the terminal device and the smart device;
  • the first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the terminal device further includes:
  • the comparing unit 106 is configured to compare the environmental parameters where the terminal device is located and the environmental parameters where the smart device is located, where the environmental parameters include one or more of temperature, humidity, light intensity, odor, and noise;
  • the judging unit 107 is configured to judge whether the terminal device and the smart device are in the same environment according to the comparison result;
  • the first starting unit 108 is configured to allow starting the identity authentication process between the terminal device and the smart device if it is confirmed that they are in the same environment.
  • the terminal device further includes:
  • the response unit 109 is configured to initiate a voice response instruction to the smart device
  • the feedback unit 110 is configured to receive a feedback sound emitted by the smart device according to the sound response instruction;
  • the second activating unit 111 is configured to, if it is confirmed that the voice response matching is successful, allow the identity authentication process with the smart device to be activated.
  • the identity authentication process between the terminal device and the smart device includes: the terminal device and the smart device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the unlocking unit is specifically configured to: determine the target smart lock closest to the terminal device among the plurality of smart locks, and unlock Open the target smart lock.
  • each functional unit in the terminal device 10 described in the embodiment of the present invention may refer to the related description of step S401 to step S403 in the method embodiment described in FIG. 2, or refer to the description in FIG.
  • the related description of step S501 to step S506 in the method embodiment described above will not be repeated here.
  • FIG. 9 is a schematic structural diagram of a smart device provided by an embodiment of the present invention.
  • the smart device 20 may include a monitoring unit 201, an identity authentication unit 202, and an unlocking unit 203.
  • the detailed description of each unit is as follows.
  • the monitoring unit 201 is configured to monitor the change trend of the distance between the smart device and the terminal device, and the smart device includes a smart lock;
  • the identity authentication unit 202 is configured to: if it is determined that the terminal device is approaching the smart device, and the distance between the smart device and the terminal device is less than a first distance threshold, then start the smart device and the Identity authentication process between terminal devices;
  • the unlocking unit 203 is configured to unlock the smart lock when the identity authentication between the smart device and the terminal device is successful.
  • the smart device further includes:
  • the trigger unit 204 is configured to establish a communication connection with the terminal device via Bluetooth when the distance between the smart device and the terminal device is less than a second distance threshold, and trigger the monitoring unit to perform the monitoring of the smart device. A change trend of the distance between the device and the terminal device, where the second distance threshold is greater than the first distance threshold.
  • the smart device further includes:
  • the locking unit 205 is configured to lock the smart lock if it is determined that the smart device is moving away from the terminal device and the distance between the smart device and the terminal device is greater than a second distance threshold.
  • the monitoring unit is specifically configured to: determine the change in the distance between the smart device and the terminal device according to the first distance information between the smart device and the terminal device;
  • the first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the smart device further includes:
  • the comparing unit 206 is configured to compare the environmental parameters where the smart device is located with the environmental parameters where the terminal device is located, where the environmental parameters include one or more of temperature, humidity, light intensity, odor, and noise;
  • the judging unit 207 is configured to judge whether the smart device and the terminal device are in the same environment according to the comparison result;
  • the first starting unit 208 is configured to allow starting the identity authentication process between the smart device and the terminal device if it is confirmed that they are in the same environment.
  • the smart device further includes:
  • the response unit 209 is configured to receive a voice response instruction initiated by the terminal device
  • the feedback unit 210 is configured to send a feedback sound to the terminal device according to the sound response instruction
  • the second activation unit 211 is configured to, if it is confirmed that the voice response matching is successful, allow the activation of the identity authentication process between the smart device and the smart device.
  • the identity authentication process between the smart device and the terminal device includes: the smart device and the terminal device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the unlocking unit is specifically configured to: determine the target smart lock closest to the terminal device among the plurality of smart locks, and unlock Open the target smart lock.
  • each functional unit in the smart device 20 described in the embodiment of the present invention can refer to the related descriptions of step S701 to step S703 in the method embodiment described in FIG. 7, which will not be repeated here.
  • FIG. 10 is a schematic structural diagram of another terminal device provided by an embodiment of the present invention.
  • the terminal device 40 may include a processor 401 and a memory 402. The detailed description of each unit is as follows.
  • the memory 402 is used to store program code
  • the processor 401 is used to call the program code stored in the memory to perform the following steps: monitor the trend of the distance between the terminal device and the smart device, the smart device includes a smart lock; If the terminal device is approaching the smart device, and the distance between the terminal device and the smart device is less than a first distance threshold, then the identity authentication process between the terminal device and the smart device is started; When the identity authentication between the terminal device and the smart device is successful, unlock the smart lock.
  • the processor 401 is further configured to: when the distance between the terminal device and the smart device is less than a second distance threshold, establish a communication connection with the smart device via Bluetooth, and trigger The monitoring of the change trend of the distance between the terminal device and the smart device is performed, and the second distance threshold is greater than the first distance threshold.
  • the processor 401 is further configured to: if it is determined that the terminal device is moving away from the smart device, and the distance between the terminal device and the smart device is greater than a third distance threshold , The smart lock is locked.
  • the processor 401 is specifically configured to: determine the change in the distance between the terminal device and the smart device according to the first distance information between the terminal device and the smart device; where The first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulsed ultra-wideband IRUWB ranging information.
  • the processor 401 is further configured to: compare the environmental parameters where the terminal device is located with the environmental parameters where the smart device is located.
  • the environmental parameters include temperature, humidity, light intensity, One or more of smell and noise; judging whether the terminal device and the smart device are in the same environment according to the comparison result; if it is confirmed that they are in the same environment, allowing the start of the terminal device and the smart device Identity authentication process between.
  • the processor 401 is further configured to: initiate a voice response instruction to the smart device;
  • the identity authentication process between the terminal device and the smart device includes: the terminal device and the smart device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the processor 401 is specifically configured to: determine the target smart lock closest to the terminal device among the plurality of smart locks, and unlock The target smart lock.
  • each functional unit in the terminal device 40 described in the embodiment of the present invention can be referred to the related description of step S401-step S403 in the method embodiment described in FIG. 2, or refer to the description in FIG. 5
  • step S501 to step S506 in the method embodiment described above will not be repeated here.
  • FIG. 11 is a schematic structural diagram of another smart device provided by an embodiment of the present invention.
  • the smart device 50 may include a processor 501 and a memory 502. The detailed description of each unit is as follows.
  • the memory 502 is used to store program codes, and the processor 501 is used to call the program codes stored in the memory to perform the following steps:
  • the smart device monitor the change trend of the distance between the smart device and the terminal device, the smart device includes a smart lock; if it is determined that the terminal device is approaching the smart device, and the smart device and the terminal device If the distance is less than the first distance threshold, the identity authentication process between the smart device and the terminal device is started; if the identity authentication between the smart device and the terminal device is successful, unlock the smart device lock.
  • the second distance threshold is greater than the first distance threshold.
  • the processor 501 is further configured to: if it is determined that the smart device is moving away from the terminal device, and the distance between the smart device and the terminal device is greater than a second distance threshold , The smart lock is locked.
  • the processor 501 is specifically configured to: determine the change in the distance between the smart device and the terminal device according to the first distance information between the smart device and the terminal device; where The first distance information includes one or more of Bluetooth signal strength change information, global positioning system GPS ranging information, and pulse ultra-wideband IRUWB ranging information.
  • the processor 501 is further configured to: compare the environmental parameters where the smart device is located with the environmental parameters where the terminal device is located.
  • the environmental parameters include temperature, humidity, light intensity, One or more of smell and noise; judge whether the smart device and the terminal device are in the same environment according to the comparison result; if the smart device and the terminal device are confirmed to be in the same environment, allow the start of the smart device and the terminal device Identity authentication process between.
  • the processor 501 is further configured to: receive a voice response instruction initiated by the terminal device; send a feedback sound to the terminal device according to the voice response instruction; if it is confirmed that the voice response is matched successfully, Then it is allowed to start the identity authentication process between the smart device and the smart device.
  • the identity authentication process between the smart device and the terminal device includes: the smart device and the terminal device perform security authentication based on a pre-certified shared key or a public-private key pair process.
  • the smart device includes a plurality of the smart locks; the processor 501 is specifically configured to: determine the target smart lock closest to the terminal device among the plurality of smart locks, and unlock The target smart lock.
  • FIG. 12 is a schematic structural diagram of a device provided by an embodiment of the present invention. Both the terminal device 10 and the smart device 20 may be implemented in the structure shown in FIG. 12.
  • the device 60 includes at least one processor 601, at least one memory 602, and at least one communication interface 603.
  • the device may also include general components such as antennas, which will not be described in detail here.
  • the processor 601 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the programs in the above scheme.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication interface 603 is used to communicate with other devices or communication networks, such as an upgrade server, a key server, and a device inside the vehicle.
  • the memory 602 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be Electrically Erasable Programmable Read-Only Memory (EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM) or other optical disc storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory can exist independently and is connected to the processor through a bus.
  • the memory can also be integrated with the processor.
  • the memory 602 is used to store application program codes for executing the above solutions, and the processor 601 controls the execution.
  • the processor 601 is configured to execute the application program code stored in the memory 602 to implement related functions of the terminal device 10 and the smart device 20.
  • terminal device 10 and the smart device 20 described in the embodiment of the present invention can refer to the related description in the method embodiment described in the above-mentioned FIG. 2 to FIG. 7, which will not be repeated here.
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium may store a program, and the program execution includes part or all of the steps of any smart lock unlocking method recorded in the foregoing method embodiments.
  • the embodiment of the present invention also provides a computer program, the computer program includes instructions, when the computer program is executed by a computer, the computer can execute part or all of the steps of any smart lock unlocking method.
  • the disclosed device may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the above-mentioned units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or integrated. To another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical or other forms.
  • the units described above as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the above integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , Including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc., specifically a processor in a computer device) execute all or part of the steps of the foregoing methods of the various embodiments of the present application.
  • the aforementioned storage medium may include: U disk, mobile hard disk, magnetic disk, optical disk, read-only memory (Read-Only Memory, abbreviation: ROM) or Random Access Memory (Random Access Memory, abbreviation: RAM), etc.
  • U disk mobile hard disk
  • magnetic disk magnetic disk
  • optical disk read-only memory
  • Read-Only Memory abbreviation: ROM
  • Random Access Memory Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mechanical Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

一种智能锁解锁方法及相关设备,具体可以应用于智能车辆以及无人驾驶车辆,实现车辆的智能门锁的解锁功能,其中的方法包括终端设备监测与智能设备之间的距离变化趋势,该智能设备包括智能锁(S401);若终端设备判断出正在靠近智能设备,且终端设备与智能设备之间的距离小于第一距离阈值,则启动终端设备与智能设备之间的身份认证过程(S402);在终端设备和智能设备之间的身份认证成功的情况下,终端设备解开智能锁(S403)。该方法可以应用于智能驾驶、智能家居、智能楼宇等多个技术领域,用于实现车辆设备或门禁设备的智能、安全开锁。

Description

一种智能锁解锁方法及相关设备
本申请要于在2019年06月20日提交中国专利局、申请号为201910536630.3、发明名称为“一种智能锁解锁方法及相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及智能解锁技术领域,尤其涉及一种智能锁解锁方法及相关设备。
背景技术
伴随着科技的发展,开锁已经不再局限于物理钥匙或者电子密钥卡,而是越来越多的使用密码开锁、指纹识别开锁、人脸识别开锁等方式,这类智能开锁方式相较于传统锁来说,避免了携带钥匙(物理钥匙或者电子密钥卡)的麻烦,方便快捷,应用广泛。
但是,在一些场景中,上述智能开锁方式仍然不能很好的满足用户需求,比如当用户未到达开锁现场而需要远程开锁,或者用户达到开锁现场却不方便开锁(如双手提重物不方便输密码、手指受伤、人脸识别率低等),则无法有效通过上述方式进行解锁。而数字钥匙的出现解决了上述问题,数字钥匙主要是指利用近场通信技术(如蓝牙Bluetooth、近场通信NFC等),使得用户可以通过智能手机或可穿戴智能设备(如智能手表)来进行智能锁的解锁或锁定等操作,广泛的应用于汽车、公司门禁、家庭门锁、保险柜、自行车共享等场景。
例如,在车辆领域,使用便携终端设备如智能手机、智能手环作为数字车钥匙已经被业界广泛认可,成为未来趋势。因为手机、手环已经成为日常必备,车主无需携带额外设备(如物理钥匙或电子密钥卡),也无需通过指纹、人脸或者密码等繁琐步骤进行开锁,只需要在距离车辆一定的距离范围内,则可以通过手机或手环的近场通信功能(通常为蓝牙、NFC)实现车门锁的自动解锁或锁定,给用户带来极大的便利。如图1所示,图1为现有技术中数字车钥匙的开锁示意图,合法用户(如车主)携带的数字车钥匙(如手机)距离智能锁(如车门锁)足够近(在对应的近场通信方式的通信范围内,图1中以蓝牙通信方式为例)时,车门锁会对发起开锁请求的手机发送身份认证挑战,若手机的身份认证应答通过车门锁的检测,则自动解锁。但是,在一些场景中,中继攻击者可以利用中继放大信号的方式,让距离很远的手机和车门锁之间建立起通信连接,使得双方误以为彼此距离很近,导致车门锁被非法解锁。例如,当用户的手机在家中处于静止状态且距离车门锁较远时,或者当用户手持手机走动且距离车门锁较远时,均有可能会遭受上述中继攻击(relay attacks),从而造成财产等损失。
因此,如何在利用数字钥匙进行便利解锁的过程中,避免中继攻击从而保证数字钥匙使用的安全性,是亟待解决的问题。
发明内容
本发明实施例所要解决的技术问题在于,提供一种智能锁解锁方法及相关设备,解决 了的智能解锁过程中的中继攻击问题。
第一方面,本发明实施例提供了一种智能锁解锁方法,可包括:终端设备监测与智能设备之间的距离变化趋势,所述智能设备包括智能锁;若所述终端设备判断出正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;在所述终端设备和所述智能设备之间的身份认证成功的情况下,所述终端设备解开所述智能锁。本发明实施例,通过终端设备监测与智能锁所在的智能设备之间的距离变化趋势,并在判定出自身正在向智能设备靠近且距离小于一定阈值的情况下,才启动与智能设备之间的身份认证过程,并在身份认证通过后,解开智能锁。由于终端设备在启动身份认证过程之前,不仅考虑了与智能设备之间的距离,还通过监测与智能设备之间的距离变化趋势,判断自身是否在向智能设备靠近,即充分的判断了持有该终端设备的用户是否有解锁意图(如持有该终端设备的用户走动并靠近该智能设备),避免仅通过判断距离远近(在近场通信方式的通信范围内)就启动身份认证过程,从而避免攻击者仅利用中继攻击伪造近距离的假象即可进行非法解锁的隐患,大大增强了数字钥匙解锁的安全性。
在一种可能的实现方式中,所述方法还包括:当所述终端设备和所述智能设备之间的距离小于第二距离阈值,所述终端设备和所述智能设备通过蓝牙建立通信连接,且触发执行所述监测与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。本发明实施例中,终端设备与智能设备之间通过蓝牙进行通信连接,而蓝牙通信的范围通常在几十米到几百米不等,若终端设备与智能设备在距离较远的蓝牙通信范围内就开始监测距离变化趋势,则可能导致终端设备监测功耗较高,并且,通常在距离较远的情况下,无法更有效的判断持有终端设备的用户是否有开锁意图,因此,本发明实施例在不影响解锁条件判断的前提下,在终端设备和智能设备之间的距离在较近的范围内再进行蓝牙配对连接,并触发执行监测距离变化趋势,节省了终端设备的功耗,提升了解锁条件判断的准确率。
在一种可能的实现方式中,所述方法还包括:若所述终端设备判断出正在远离所述智能设备,且所述终端设备与所述智能设备之间的距离大于第三距离阈值,则锁定所述智能锁。本发明实施例,终端设备还通过监测与智能设备之间的距离变化趋势,判断自身是否在远离智能设备,即充分的判断了持有该终端设备的用户是否有锁定智能锁的意图,避免用户动手操作。例如,当判断出终端设备正在远离公司门禁、家庭门锁、车门、保险柜、共享单车等,且距离超过一定阈值,则在用户无需动手、无感知的情况下,自动锁定对应的智能锁,方便快捷,用户体验佳。
在一种可能的实现方式中,所述终端设备监测与智能设备之间的距离变化趋势,包括:
所述终端设备根据与智能设备之间的第一距离信息,判断所述终端设备与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。本发明实施例,终端设备具体可以通过蓝牙信号的强弱信息、GPS测距信息和IRUWB测距信息中的一种或多种,监测与智能设备之间的距离变化趋势,从而确定自身与智能设备之间的距离以及是否在靠近或者远离智能设备。
在一种可能的实现方式中,所述启动所述终端设备与所述智能设备之间的身份认证过程之前,还包括:所述终端设备比较自身所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;所述终端设备根据比较结果判断是否与所述智能设备处于同一环境中;若是,则所述终端设备允许启动与所述智能设备之间的身份认证过程。本发明实施例,终端设备在确定是否启动身份认证过程之前,不仅考虑自身是否正在靠近智能设备,以及在距离上是否离智能设备较近,进一步地,还通过环境参数判断自身与智能设备是否处于同一个环境中,以进一步精确判断用户所持的该终端设备是否确实在智能设备附近(即用户的确极大可能需要开启智能锁),而非攻击者伪造的距离很近,更有效地避免中继攻击导致的非法解锁,保证智能锁的安全性,提升用户的体验。
在一种可能的实现方式中,所述启动所述终端设备与所述智能设备之间的身份认证过程之前,还包括:所述终端设备向所述智能设备发起声音应答指示;所述终端设备接收所述智能设备根据所述声音应答指示发出的反馈声音;若确认声音应答匹配成功,则所述终端设备允许启动与所述智能设备之间的身份认证过程。本发明实施例,终端设备在确定是否启动身份认证过程之前,不仅考虑自身是否正在靠近智能设备,以及在距离上是否离智能设备较近,进一步地,还通过声音应答判断自身与智能设备是否处于较近的距离范围内,以进一步精确判断用户所持的该终端设备是否确实在智能设备附近(即用户的确极大可能需要开启智能锁),而非攻击者伪造的距离很近,更有效地避免中继攻击导致的非法解锁,保证智能锁的安全性,提升用户的体验。
在一种可能的实现方式中,所述终端设备与所述智能设备之间的身份认证过程,包括:所述终端设备和所述智能设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。本发明实施例,在终端设备和智能设备之间的身份认证过程中,通过终端设备和智能设备预先协商好的共享密钥(如对称密钥),或者公私钥对(如非对称秘钥),进行身份认证挑战/应答流程,从而使得智能设备得以确认终端设备的合法性,进而实现后续安全的智能解锁服务。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解开所述智能锁,包括:所述终端设备确定所述多个智能锁中距离最近的目标智能锁,解开所述目标智能锁。本发明实施例,当智能设备有多个智能锁时,则终端设备可以进一步判断自身距离哪个智能锁更近,则相应的解开该智能锁,为用户提供更人性化的智能解锁服务,进一步提升用户体验。
在一种可能的实现方式中,所述终端设备正在靠近所述智能设备,包括以下至少一项:所述终端设备与所述智能设备之间的蓝牙信号强度越来越强;或者所述终端设备与所述智能设备之间的GPS测距越来越小;或者所述终端设备与所述智能设备之间的IRUWB测距越来越小。本发明实施例,终端设备具体可以通过蓝牙信号的强弱信息、GPS测距信息和IRUWB测距信息中的一种或多种,监测与智能设备之间的距离变化趋势,从而确定自身与智能设备之间的距离以及是否在靠近智能设备。
在一种可能的实现方式中,所述终端设备正在远离所述智能设备,包括以下至少一项:所述终端设备与所述智能设备之间的蓝牙信号强度越来越弱;或者所述终端设备与所述智 能设备之间的GPS测距越来越大;或者所述终端设备与所述智能设备之间的IRUWB测距越来越大。本发明实施例,终端设备具体可以通过蓝牙信号的强弱信息、GPS测距信息和IRUWB测距信息中的一种或多种,监测与智能设备之间的距离变化趋势,从而确定自身与智能设备之间的距离以及是否在远离智能设备。
第二方面,本发明实施例提供了一种智能锁解锁方法,可包括:智能设备监测与终端设备之间的距离变化趋势,所述智能设备包括智能锁;若所述智能设备判断出所述终端设备正在靠近,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;在所述智能设备和所述终端设备之间的身份认证成功的情况下,所述智能设备解开所述智能锁。本发明实施例,通过智能锁所在的智能设备监测与终端设备之间的距离变化趋势,并在判定出终端设备正在向自身靠近且距离小于一定阈值的情况下,才启动与终端设备之间的身份认证过程,并在身份认证通过后,解开智能锁。由于智能设备在启动身份认证过程之前,不仅考虑了与终端设备之间的距离,还通过监测与终端设备之间的距离变化趋势,判断终端设备是否在向自身靠近,即充分的判断了持有终端设备的用户是否有解锁意图,避免仅通过判断距离远近(在近场通信方式的通信范围内)就启动身份认证过程,从而避免攻击者仅利用中继攻击伪造近距离的假象即可进行非法解锁的隐患,大大增强了数字钥匙解锁的安全性。
在一种可能的实现方式中,所述方法还包括:当所述智能设备和所述终端设备之间的距离小于第二距离阈值,所述智能设备和所述终端设备通过蓝牙建立通信连接,且触发执行监测与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。本发明实施例中,终端设备与智能设备之间通过蓝牙进行通信连接,而蓝牙通信的范围通常在几十米到几百米不等,若终端设备与智能设备在距离较远的蓝牙通信范围内就开始监测距离变化趋势,则可能导致智能设备监测功耗较高,并且,通常在距离较远的情况下,无法更有效的判断持有终端设备的用户是否有开锁意图,因此,本发明实施例在不影响解锁条件判断的前提下,在终端设备和智能设备之间的距离在较近的范围内再进行蓝牙配对连接,并触发执行监测距离变化趋势,节省了智能设备的功耗,提升了解锁条件判断的准确率。
在一种可能的实现方式中,所述方法还包括:若所述智能设备判断出正在远离所述终端设备,且所述智能设备与所述终端设备之间的距离大于第二距离阈值,则所述智能设备锁定所述智能锁。本发明实施例,智能设备还通过监测与终端设备之间的距离变化趋势,判断智能设备是否在远离自身,即充分的判断了持有该终端设备的用户是否有锁定智能锁的意图,避免用户动手操作。例如,当判断出终端设备正在远离公司门禁、家庭门锁、车门、保险柜、共享单车等,且距离超过一定阈值,则在用户无需动手、无感知的情况下,自动锁定对应的智能锁,方便快捷,用户体验佳。
在一种可能的实现方式中,所述智能设备监测与终端设备之间的距离变化趋势,包括:
所述智能设备根据与终端设备之间的第一距离信息,判断所述智能设备与所述终端设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。本发明实施例,智能设备 具体可以通过蓝牙信号的强弱信息、GPS测距信息和IRUWB测距信息中的一种或多种,监测与终端设备之间的距离变化趋势,从而确定与终端设备之间的距离以及终端设备是否在靠近或者远离。
在一种可能的实现方式中,所述启动所述智能设备与所述终端设备之间的身份认证过程之前,还包括:所述智能设备比较自身所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;所述智能设备根据比较结果判断是否与所述智能设备是否处于同一环境中;若是,则所述智能设备允许启动与所述终端设备之间的身份认证过程。本发明实施例,智能设备在确定是否启动身份认证过程之前,不仅考虑终端设备是否正在靠近自身,以及智能设备在距离上是否离自身较近,进一步地,还通过环境参数判断终端设备与自身是否处于同一个环境中,以进一步精确判断用户所持的终端设备是否确实在智能设备附近(即用户的确极大可能需要开启智能锁),而非攻击者伪造的距离很近,更有效地避免中继攻击导致的非法解锁,保证智能锁的安全性,提升用户的体验。
在一种可能的实现方式中,所述启动所述智能设备与所述终端设备之间的身份认证过程之前,还包括:所述智能设备接收所述终端设备发起的声音应答指示;所述智能设备根据所述声音应答指示向所述终端设备发出反馈声音;若确认声音应答匹配成功,则所述智能设备允许启动与所述智能设备之间的身份认证过程。本发明实施例,智能设备在确定是否启动身份认证过程之前,不仅考虑终端设备是否正在靠近自身,以及终端设备在距离上是否离自身较近,进一步地,还通过声音应答判断终端设备与自身是否处于较近的距离范围内,以进一步精确判断用户所持的终端设备是否确实在智能设备附近(即用户的确极大可能需要开启智能锁),而非攻击者伪造的距离很近,更有效地避免中继攻击导致的非法解锁,保证智能锁的安全性,提升用户的体验。
在一种可能的实现方式中,所述智能设备与所述终端设备之间的身份认证过程,包括:所述智能设备和所述终端设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。本发明实施例,在终端设备和智能设备之间的身份认证过程中,通过终端设备和智能设备预先协商好的共享密钥(如对称密钥),或者公私钥对(如非对称秘钥),进行身份认证挑战/应答流程,从而使得智能设备得以确认终端设备的合法性,进而实现后续安全的智能解锁服务。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解开所述智能锁,包括:所述智能设备确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。本发明实施例,当智能设备有多个智能锁时,则智能设备可以进一步判断终端设备距离哪个智能锁更近,则相应的解开该智能锁,为用户提供更人性化的智能解锁服务,进一步提升用户体验。
在一种可能的实现方式中,所述终端设备正在靠近所述智能设备,包括以下至少一项:所述终端设备与所述智能设备之间的蓝牙信号强度越来越强;或者所述终端设备与所述智能设备之间的GPS测距越来越小;或者所述终端设备与所述智能设备之间的IRUWB测距越来越小。本发明实施例,智能设备具体可以通过蓝牙信号的强弱信息、GPS测距信息和IRUWB测距信息中的一种或多种,监测与智能设备之间的距离变化趋势,从而确定自身与 智能设备之间的距离以及是否在靠近智能设备。
在一种可能的实现方式中,所述终端设备正在远离所述智能设备,包括以下至少一项:所述终端设备与所述智能设备之间的蓝牙信号强度越来越弱;或者所述终端设备与所述智能设备之间的GPS测距越来越大;或者所述终端设备与所述智能设备之间的IRUWB测距越来越大。本发明实施例,智能设备具体可以通过蓝牙信号的强弱信息、GPS测距信息和IRUWB测距信息中的一种或多种,监测与智能设备之间的距离变化趋势,从而确定自身与智能设备之间的距离以及是否在远离智能设备。
第三方面,本发明实施例提供了一种智能锁解锁方法,可包括:终端设备监测与智能设备之间的距离变化趋势,所述智能设备包括智能锁;若所述终端设备判断出正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;在所述终端设备和所述智能设备之间的身份认证成功的情况下,所述智能设备解开所述智能锁。本发明实施例,通过终端设备监测与智能锁所在的智能设备之间的距离变化趋势,并在判定出自身正在向智能设备靠近且距离小于一定阈值的情况下,才启动与智能设备之间的身份认证过程,并在身份认证通过后,由智能设备解开智能锁。由于终端设备在启动身份认证过程之前,不仅考虑了与智能设备之间的距离,还通过监测与智能设备之间的距离变化趋势,判断自身是否在向智能设备靠近,即充分的判断了持有该终端设备的用户是否有解锁意图,避免仅通过判断距离远近(在近场通信方式的通信范围内)就启动身份认证过程,从而避免攻击者仅利用中继攻击伪造近距离的假象即可进行非法解锁的隐患,大大增强了数字钥匙解锁的安全性。
第四方面,本发明实施例提供了一种终端设备,可包括:监测单元,用于监测所述终端设备与智能设备之间的距离变化趋势,所述智能设备包括智能锁;身份认证单元,用于若判断出所述终端设备正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;解锁单元,用于在所述终端设备和所述智能设备之间的身份认证成功的情况下,解开所述智能锁。
在一种可能的实现方式中,所述终端设备,还包括:触发单元,用于当所述终端设备和所述智能设备之间的距离小于第二距离阈值,和所述智能设备通过蓝牙建立通信连接,且触发所述监测单元执行所述监测所述终端设备与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,所述终端设备,还包括:锁定单元,用于若判断出所述终端设备正在远离所述智能设备,且所述终端设备与所述智能设备之间的距离大于第三距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,所述监测单元,具体用于:根据所述终端设备与智能设备之间的第一距离信息,判断所述终端设备与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,所述终端设备,还包括:比较单元,用于比较所述终端设 备所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;判断单元,用于根据比较结果判断所述终端设备是否与所述智能设备处于同一环境中;第一启动单元,用于若确认处于同一环境中,则允许启动所述终端设备与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述终端设备,还包括:应答单元,用于向所述智能设备发起声音应答指示;反馈单元,用于接收所述智能设备根据所述声音应答指示发出的反馈声音;
第二启动单元,用于若确认声音应答匹配成功,则允许启动与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述终端设备与所述智能设备之间的身份认证过程,包括:所述终端设备和所述智能设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解锁单元,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
第五方面,本发明实施例提供了一种智能设备,可包括:监测单元,用于监测所述智能设备与终端设备之间的距离变化趋势,所述智能设备包括智能锁;身份认证单元,用于若判断出所述终端设备正在靠近所述智能设备,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;解锁单元,用于在所述智能设备和所述终端设备之间的身份认证成功的情况下,解开所述智能锁。
在一种可能的实现方式中,所述智能设备,还包括:触发单元,用于当所述智能设备和所述终端设备之间的距离小于第二距离阈值,和所述终端设备通过蓝牙建立通信连接,且触发所述监测单元执行所述监测所述智能设备与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,所述智能设备,还包括:锁定单元,用于若判断出所述智能设备正在远离所述终端设备,且所述智能设备与所述终端设备之间的距离大于第二距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,所述监测单元,具体用于:根据所述智能设备与终端设备之间的第一距离信息,判断所述智能设备与所述终端设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,所述智能设备,还包括:比较单元,用于比较所述智能设备所处的环境参数和所述终端设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;判断单元,用于根据比较结果判断所述智能设备与所述终端设备是否处于同一环境中;第一启动单元,用于若确认处于同一环境中,则允许启动所述智能设备与所述终端设备之间的身份认证过程。
在一种可能的实现方式中,所述智能设备,还包括:应答单元,用于接收所述终端设备发起的声音应答指示;反馈单元,用于根据所述声音应答指示向所述终端设备发出反馈声音;
第二启动单元,用于若确认声音应答匹配成功,则允许启动所述智能设备与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述智能设备与所述终端设备之间的身份认证过程,包括:所述智能设备和所述终端设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解锁单元,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
第六方面,本发明实施例提供了一种终端设备,可包括:处理器和存储器;其中
所述存储器用于存储程序代码,所述处理器用于调用所述存储器存储的程序代码执行如下步骤:监测所述终端设备与智能设备之间的距离变化趋势,所述智能设备包括智能锁;若判断出所述终端设备正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;在所述终端设备和所述智能设备之间的身份认证成功的情况下,解开所述智能锁。
在一种可能的实现方式中,所述处理器,还用于:当所述终端设备和所述智能设备之间的距离小于第二距离阈值,和所述智能设备通过蓝牙建立通信连接,且触发执行所述监测所述终端设备与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,所述处理器,还用于:若判断出所述终端设备正在远离所述智能设备,且所述终端设备与所述智能设备之间的距离大于第三距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,所述处理器,具体用于:根据所述终端设备与智能设备之间的第一距离信息,判断所述终端设备与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,所述处理器,还用于:比较所述终端设备所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;根据比较结果判断所述终端设备是否与所述智能设备处于同一环境中;若确认处于同一环境中,则允许启动所述终端设备与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述处理器,还用于:向所述智能设备发起声音应答指示;
接收所述智能设备根据所述声音应答指示发出的反馈声音;若确认声音应答匹配成功,则允许启动与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述终端设备与所述智能设备之间的身份认证过程,包括:所述终端设备和所述智能设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述处理器,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
第七方面,本发明实施例提供了一种智能设备,可包括:处理器和存储器;其中,所述存储器用于存储程序代码,所述处理器用于调用所述存储器存储的程序代码执行如下步 骤:
监测所述智能设备与终端设备之间的距离变化趋势,所述智能设备包括智能锁;若判断出所述终端设备正在靠近所述智能设备,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;在所述智能设备和所述终端设备之间的身份认证成功的情况下,解开所述智能锁。
在一种可能的实现方式中,所述智能设备和所述终端设备通过蓝牙建立通信连接;所述处理器,还用于:当所述智能设备和所述终端设备之间的距离小于第二距离阈值,则触发执行所述监测所述智能设备与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,所述处理器,还用于:若判断出所述智能设备正在远离所述终端设备,且所述智能设备与所述终端设备之间的距离大于第二距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,所述处理器,具体用于:根据所述智能设备与终端设备之间的第一距离信息,判断所述智能设备与所述终端设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,所述处理器,还用于:比较所述智能设备所处的环境参数和所述终端设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;根据比较结果判断所述智能设备与所述终端设备是否处于同一环境中;若确认处于同一环境中,则允许启动所述智能设备与所述终端设备之间的身份认证过程。
在一种可能的实现方式中,所述处理器,还用于:接收所述终端设备发起的声音应答指示;根据所述声音应答指示向所述终端设备发出反馈声音;若确认声音应答匹配成功,则允许启动所述智能设备与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述智能设备与所述终端设备之间的身份认证过程,包括:所述智能设备和所述终端设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述处理器,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
第八方面,本申请提供一种终端设备,该终端设备具有实现上述第一方面提供的任意一种智能锁解锁方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第九方面,本申请提供一种智能设备,该智能设备具有实现上述第二方面提供的任意一种智能锁解锁方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
第十方面,本申请提供一种终端设备,该终端设备中包括处理器,处理器被配置为支持该终端设备执行第一方面提供的任意一种智能锁解锁方法中相应的功能。该终端设备还可以包括存储器,存储器用于与处理器耦合,其保存该终端设备必要的程序指令和数据。该终端设备还可以包括通信接口,用于该终端设备与其他设备或通信网络通信。
第十一方面,本申请提供一种智能设备,该智能设备中包括处理器,处理器被配置为支持该智能设备执行第二方面提供的任意一种智能锁解锁方法中相应的功能。该智能设备还可以包括存储器,存储器用于与处理器耦合,其保存该智能设备必要的程序指令和数据。该智能设备还可以包括通信接口,用于该智能设备与其他设备或通信网络通信。
第十二方面,本申请提供一种计算机存储介质,用于储存为上述第一方面提供的终端设备所用的计算机软件指令,其包含用于执行上述方面所设计的程序。
第十三方面,本申请提供一种计算机存储介质,用于储存为上述第二方面提供的智能设备所用的计算机软件指令,其包含用于执行上述方面所设计的程序。
第十四方面,本发明实施例提供了一种计算机程序,该计算机程序包括指令,当该计算机程序被终端设备执行时,使得终端设备可以执行上述第一方面中任意一项的智能锁解锁方法中终端设备所执行的流程。
第十五方面,本发明实施例提供了一种计算机程序,该计算机程序包括指令,当该计算机程序被智能设备执行时,使得智能设备可以执行上述第二方面中任意一项的智能锁解锁方法中智能设备所执行的流程。
第十六方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于支持终端设备实现上述第一方面中所涉及的功能。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存终端设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
第十七方面,本申请提供了一种芯片系统,该芯片系统包括处理器,用于支持智能设备实现上述第二方面中所涉及的功能。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存智能设备必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。
附图说明
图1是现有技术中数字车钥匙的开锁示意图。
图2是本发明实施例提供的一种智能锁解锁系统构架示意图。
图3是本发明实施例提供的另一种智能锁解锁系统构架示意图。
图4是本发明实施例提供的一种智能锁解锁方法的流程示意图。
图5是本发明实施例提供的另一种智能锁解锁方法的流程示意图。
图6是本发明实施例提供的一种智能解锁应用场景示意图。
图7是本发明实施例提供的又一种智能锁解锁方法的流程示意图。
图8是本发明实施例提供的一种终端设备的结构示意图。
图9是本发明实施例提供的一种智能设备的结构示意图。
图10是本发明实施例提供的另一种终端设备的结构示意图。
图11是本发明实施例提供的另一种智能设备的结构示意图。
图12是本发明实施例提供的一种设备的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例进行描述。
本申请的说明书和权利要求书及所述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在2个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。
首先,对本申请中的部分用语进行解释说明,以便于本领域技术人员理解。
(1)近场通讯(Near Field Communication,NFC)使用了NFC技术的设备(比如手机)可以在彼此靠近的情况下进行数据交换,是由非接触式射频识别(RFID)及互连互通技术整合演变而来,通过在单一芯片上集成感应式读卡器、感应式卡片和点对点通信的功能,利用移动终端实现移动支付、电子票务、门禁、移动身份识别、防伪等应用。
(2)蓝牙(Bluetooth)是一种短距的无线通讯技术,可实现固定设备、移动设备之间的数据交换。一般将蓝牙3.0之前的BR/EDR蓝牙称为传统蓝牙,而将蓝牙4.0规范下的LE蓝牙称为低功耗蓝牙。BLE(Bluetooh Low Energy)蓝牙低能耗技术是短距离、低成本、可互操作性的无线技术,它利用许多智能手段最大限度地降低功耗。
(3)全球定位系统(Global Positioning System,GPS),也称为全球卫星定位系统,是利用GPS定位卫星,在全球范围内实时进行定位、导航的系统。GPS是一种具有全方位、全天候、全时段、高精度的卫星导航系统,能为全球用户提供低成本、高精度的三维位置、速度和精确定时等导航信息。
(4)信标(Beacon),是一种“邻近系统(Proximity System)”。在该系统中,运行在智能手机、平板电脑、可穿戴或其他计算设备上的应用可以对“Beacon设备”发出的信号进行响应。Beacon设备自身是一种小巧而廉价的实体设备,可以将其放置在某些场所,向处于一定距离之内的“响应设备”发送信息。其工作方式是,配备有低功耗蓝牙(BLE)通信功能的设备使用BLE技术向周围发送自己特有的ID,接收到该ID的应用软件会根据该ID采取一些行动。
(5)车载通讯系统(Telematic Box,T-Box),一般指车联网系统中的智能车载终端,直接与汽车CAN总线通信,获取车身状态、车况信息,并且将这些参数上传到汽车远程服务提供商(Telematics Service Provider,TSP)后台,也可以接收后台下发的指令并回传执行结果,基于此可以将远程控制功能扩展至手机App、智能钥匙等。
(6)手机应用(Application,App),原意是“应用、运用”的意思。随着移动互联网的发展,以及智能手机的普及,APP赋予的新的意义,App即智能手机应用,也就是智能手机的应用程序。
(7)超宽带(UltraWideBand,UWB)是一种以极低功率在短距离内高速传输数据的无线通信技术,UWB具有抗干扰性能强、传输速率高、带宽极宽、消耗电能小、发送功率小等诸多优势,主要应用于室内通信、家庭网络、位置测定、雷达检测等领域。脉冲超宽带(Impulse radio-Ultra Wide Band,IRUWB)是超宽带UWB通信最经典的实现方式。IR-UWB技术的无线实时高精度定位平台,依靠由多个强大的数据采集传感器组成的集成网络来即时发送信号,相当于室内的GPS,更精准。
(8)密码散列函数(Cryptographic hash function),又译为加密散列函数,是散列函数的一种。它被认为是一种单向函数,也就是说极其难以由散列函数输出的结果,回推输入的数据是什么。这样的单向函数被称为“现代密码学的驮马”。这种散列函数的输入数据,通常被称为消息(message),而它的输出结果,经常被称为消息摘要(message digest)或摘要(digest)。在信息安全中,有许多重要的应用,都使用了密码散列函数来实现,例如数字签名,消息认证码。
为了便于理解本发明实施例,下面先对本发明实施例所基于的其中一种系统架构进行描述。请参见图2,图2是本发明实施例提供的一种智能锁解锁系统构架示意图。该系统架构中可以包括终端设备10(图2中以车主的智能手机为例,也可以是智能手环、智能眼镜等)、智能设备20(图2中以智能车辆为例,也可以是公司门禁、家庭门锁、保险柜等)和服务器30(图2中以云服务器为例),其中,智能设备20包括一个或多个智能锁,终端设备10可通过服务器30与智能设备20进行绑定从而获得智能锁的使用授权,也可以通过短距离无线通信方式(如蓝牙、NFC、Wi-Fi等)与智能设备20之间进行距离监测、身份认证以及智能锁解锁/锁定等流程。例如,假设每个车主都有一台具有蓝牙通信功能和联网功能的智能手机,则车主的智能手机10的注册过程可以如下:
1、车主的智能手机10安装相关App与服务器30建立安全通道,并向服务器30发起注册请求,提交其用户名、密码及智能车辆20的认证凭证(用于证明车主合法拥有该车,此凭证与车绑定,可以是口令、密钥、公私钥等)。
2、服务器30根据车主的智能手机10发起的注册请求生成车主的身份密钥K O=h(K,ID V,ID O),其中,“h(.)”为密码散列函数,K为服务器30主密钥,ID V、ID O分别为智能车辆身份信息和车主身份信息。
3、服务器30将生成好的密钥K O=h(K,ID V,ID O)和智能车辆20的蓝牙地址通过安全通道发送回车主的智能手机10的App,然后服务器30更新车辆授权列表。其中,智能手机10可以在本地对密钥K O与蓝牙地址做安全存储保护,例如,将密钥K O与蓝牙地址存储 在智能手机10的安全芯片SE中、或者结合代码混淆的白盒加密等。
4、最后,服务器30和智能车辆20互相认证并建立安全通道,将车主身份信息、K O以及蓝牙配对信息等信息(例如终端设备的蓝牙地址、蓝牙配对认证码(PIN码)等)发送给智能车辆20,后续在智能手机和智能车辆的身份认证过程中,则可以通过上述K O进行双方的身份验证。
上述系统架构是假设一个智能车辆对应一个车主,而实际情况中,可能有多个车主存在,为了不失一般性,可设定车主有管理员权限,以对其他用户进行授权或黑名单管理。为了能够执行解开/锁定智能锁,车主需预先注册,而其他用户则需要取得车主的预先授权。
请参见图3,图3是本发明实施例提供的另一种智能锁解锁系统构架示意图。该系统架构中可以包括终端设备10-A和至少一个终端设备10-B(图3中以10-A为车主的智能手机为例,10-B为待授权用户的智能手机为例)、智能设备20(图3中以智能车辆为例)和相关服务器(图3中以云服务器03为例)。其中,智能设备20包括一个或多个智能锁,终端设备10-A可通过服务器30与智能设备20进行绑定从而获得智能锁的使用权限,而终端设备10-B则可通过终端设备10-A将其身份信息发送给服务器30,从而使得而终端设备10-B也可以通过服务器30获得智能设备20的智能锁的使用权限,获得权限之后的终端设备10-A和10-B均可以通过短距离无线通信方式(如蓝牙、NFC、Wi-Fi等)与智能设备20之间进行距离监测、身份认证以及智能锁的解开/锁定等流程。例如,车主授权给其他用户的过程可以如下:
1、车主的智能手机10-A可授权给其他用户的智能手机10-B(如家人、朋友等)一定的访问权限,车主的智能手机01-A与服务器30建立安全通道并进行身份认证。
2、服务器30认证智能手机10-A的身份通过后,车主通过智能手机10-A将要授权的用户(受委用户)身份信息ID U及授权策略P U发送给服务器30。
3、服务器30随即更新智能车辆授权列表,并且与要授权的用户建立安全通道,将密钥K U和授权策略P U发送给受委用户的智能手机10-B,K U可计算如下:K U=h(K O,ID U,P U)。
4、最后,服务器30与相应智能车辆20建立安全通道,并将受委用户的身份信息ID U,授权策略P U,蓝牙配对信息发送给相应的智能车辆20。其中,因为智能车辆拥有K O,可以根据K O、ID U、P U随时计算出K U,因此服务器无需传递K U给智能车辆20,而智能车辆20也无需保存K U
通过上述车主授权的方式可以让一个家庭里的几个家庭成员(父亲,母亲,孩子)在不同时间使用同一辆家庭公用的汽车,以实现车辆使用权限的共享。又或者,可以通过租车公司的管理终端对租车用户的终端进行定时定点授权的方式,来实现智能车辆的租用共享。除了上述共享车辆的需求(家庭共享,商业共享),上述授权方式还可以应用于公司门禁、家庭门锁、保险柜等解锁场景,本发明实施例对此不作具体限定,在此不再赘述。
参见图4,图4是本发明实施例提供的一种智能锁解锁方法的流程示意图,该方法可应用于上述图2或图3中所述的系统架构中,其中的终端设备可以为图2系统架构中的终 端设备10也可以为图3系统架构中的终端设备10-A或终端设备10-B,可用于支持并执行图4中所示的方法流程。下面将结合附图4从终端设备侧进行描述。该方法可以包括以下步骤S401-步骤S403。
步骤S401:终端设备监测与智能设备之间的距离变化趋势,所述智能设备包括智能锁。
具体地,终端设备可以为用户所持有的智能手机、智能手环等,智能设备可以为智能车辆、公司门禁、家居门锁、保险柜等,本发明实施例对具体的应用场景不作具体限定。可选的,终端设备根据与智能设备之间的第一距离信息,判断与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。即终端设备可以根据与智能设备之间的蓝牙信号的强弱、GPS测距信息或者其他测距技术(如IRUWB技术)监测与智能设备之间的距离变化。例如,当终端设备检测到与智能设备之间的蓝牙信号强度在预设时间范围内逐渐增强,则判断为终端设备正在靠近智能设备,或者当终端设备通过测距手段检测到与智能设备之间的距离在预设时间范围内逐渐减小,则判断为终端设备正在靠经智能设备,具体实现上可以通过在预设时间范围内对信号强度或者距离的多次采样来实现强度信息或者距离信息的获取,从而实现距离变化趋势的判断。可选的,智能设备也可以同时利用上述测距方式,并与智能设备之间相互交换测距信息,共同监测与终端设备之间的距离变化趋势,以提升测距的准确性。可选的,终端设备还可以在监测与智能设备之间的距离变化趋势之前,或者在监测的过程中利用加速计、陀螺仪等传感器探测用户(如车主或授权用户)是否在走动,以更加精确测距的精准性,进一步避免攻击者可能在终端设备处于静态的情况下造成的中继攻击。
步骤S402:若所述终端设备判断出正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程。
具体地,若终端设备监测到自身当前正在靠近智能设备,并且判断出与智能设备之间的距离小于一定的阈值,那么此时可能表明持有该终端设备的用户有打开智能设备的智能锁的意图或意愿。例如,终端设备与智能设备之间的蓝牙信号强度越来越强;或者终端设备与智能设备之间的GPS测距越来越小;或者终端设备与智能设备之间的IRUWB测距越来越小,满足上述任意一项或者多项都可以表明终端设备正在靠近智能设备,也即是持有该终端设备的用户正在走动并靠近该智能设备。其中,“正在靠近”可以是终端设备与智能设备之间的距离持续减小,也可以是终端设备和智能设备之间的距离有减小的趋势。比如,用户手持终端设备(智能手机)走向智能终端(智能车辆),该用户可能是径直路线走向该智能车辆,也可能是曲折路线走向该智能车辆,也即是智能手机与智能车辆之间的距离可能呈现减小→增加→减小的非稳定性减小的趋势,而该情况也属于本申请中的靠近智能设备的情况。当终端设备确认当前满足启动身份认证的条件(即判断出持有终端设备的用户有开锁意图或意愿),则主动开启与智能设备之间的身份认证过程,以证明该终端设备是有权限打开智能设备的所述智能锁的合法终端设备。其中,身份认证过程可以包括:1、终端设备向智能设备发起开锁请求;2、智能设备向该发起开锁请求的终端设备发送身份认证挑战;3、终端设备则回复身份认证应答,从而能够可靠、有效地防止攻击者假冒合法用户获 得该智能设备的智能锁的控制权限,保证授权访问者的合法利益。
上述启动身份认证的条件可以有效的避免攻击者在用户的终端设备处于静止状态或者无目的移动状态下,利用中继放大信号进而进行中继攻击的情形,即攻击者无法在终端设备处于静止状态下(如用户将手机放在家里的桌子上)、或者终端设备处于无目的的移动状态下(如用户携带手机在家里正常走动、活动)对智能锁进行中继攻击,因为上述状态都无法满足本发明实施例中的“终端设备正在靠近智能设备”的条件,大大增强了数字钥匙解锁的安全性。
步骤S403:在所述终端设备和所述智能设备之间的身份认证成功的情况下,所述终端设备解开所述智能锁。
具体地,当终端设备和智能设备之间的身份认证成功之后,终端设备则可以解开智能设备的智能锁。其中,终端设备可以是直接发送控制信号至智能锁,从而控制解开智能锁,也可以是终端设备发送相应的控制信号给智能设备,从而通过智能设备的相关控制单元(如车辆的T-Box)控制其智能锁的开启,或者通知其他的第三方设备(如云服务器、智能网关等)进行解锁等。此时持有所述终端设备的用户在无感知的情况下,则可以安全自动地打开智能设备的智能锁。例如,车主在购物完后走向智能车辆,若车主双手都提着购物袋,此时则无需放下购物袋,或掏出钥匙打开车门或后备箱,直接拎起购物袋放入车内或后备箱即可,十分便捷。
本发明实施例,通过终端设备监测与智能锁所在的智能设备之间的距离变化趋势,并在判定出自身正在向智能设备靠近且距离小于一定阈值的情况下,才启动与智能设备之间的身份认证过程,并在身份认证通过后,解开智能锁。由于终端设备在启动身份认证过程之前,不仅考虑了与智能设备之间的距离,还通过监测与智能设备之间的距离变化趋势,判断自身是否在向智能设备靠近(如持有该终端设备的用户走动并靠近该智能设备),即充分的判断了持有该终端设备的用户是否有解锁意图,避免仅通过判断距离远近(在近场通信方式的通信范围内)就启动身份认证过程,从而避免攻击者仅利用中继攻击伪造近距离的假象即可进行非法解锁的隐患,大大增强了数字钥匙解锁的安全性。
参见图5,图5是本发明实施例提供的另一种智能锁解锁方法的流程示意图,该方法可应用于上述图2或图3中所述的系统架构中,其中的终端设备可以为图2系统架构中的终端设备10也可以为图3系统架构中的终端设备10-A或终端设备10-B,可用于支持并执行图5中所示的方法流程。下面将结合附图5从终端设备侧进行描述。该方法可以包括以下步骤S501-步骤S505。
步骤S501:当所述终端设备和所述智能设备之间的距离小于第二距离阈值,所述终端设备和所述智能设备通过蓝牙建立通信连接,且触发执行所述监测与所述智能设备之间的距离变化趋势。
具体地,当终端设备(如手机)和智能设备(如车辆)在蓝牙通讯距离范围内时,手机和车辆可以通过相互估距的方式获知相互之间的距离,从而确定手机和车辆之间的距离是否小于预设的蓝牙配对距离(即第二距离阈值)。可以理解的是,该估距过程可以不同于后续触发所执行的所述监测与所述智能设备之间的距离变化趋势,其无需持续监测距离变 化趋势,而主要是为了使得手机和车辆在较近的距离范围内,再进行蓝牙配对连接,避免在距离较远时过早的进行蓝牙配对连接后导致的功耗较高,以及过早的进行距离变化趋势的监测而增加的误解锁概率的问题。可以理解的是,终端设备和智能设备通过蓝牙建立通信连接的前提是,终端设备和智能设备的蓝牙功能开关处于开启状态,并且终端设备和智能设备已经分别在对方的Bluetooth通讯列表内。当终端设备和智能设备完成蓝牙配对后,终端设备再开始实时监测与智能设备之间的距离变化趋势,从而在适当的条件下进行身份认证。
可以理解的是,由于蓝牙通信采用认证的方式进行数据交互以保证安全性,同时为了保证使用的方便性,蓝牙通常以配对的形式完成两个蓝牙设备之间的首次通讯认证,且经配对之后,随后的通讯连接就不必每次都要做认证。因此,在发明实施例中,终端设备和智能设备之间可以只在初始完成蓝牙配对即可(例如在图2或图3实施例中的注册过程/授权过程中、或者在注册/授权之后完成初次蓝牙配对),后续只要在蓝牙的通信距离范围内,且两者之间的距离小于第二距离阈值的情况下,则可以进行免认证的配对连接。可以看出蓝牙配对在一定程度上保证了蓝牙通信的安全,但是由于蓝牙配对认证码(PIN码)的简易性,导致其安全保证机制比较容易被破解,所以本申请中,需要通过后续进行进一步的身份认证来进行智能锁的控制权限认证,从而增强安全性。
需要说明的是,终端设备和智能设备之间还可以通过其它近距离无线通信方式进行通信连接,例如,ZigBee、WiFi、NFC等,本申请对此不作具体限定。其中,基于NFC的智能解锁系统也同样会遭受中继攻击,以开车锁的场景为例,由于NFC的通信范围较小(需要车主距离车辆较近),进而攻击者的中继设备也需要距离车主很近才能形成中继攻击,因此容易被车主察觉。相比较来说,Bluetooth的无线通信的距离更长,使得基于Bluetooth的数字车钥匙系统遭受中继攻击的可能性更大,因此,若终端设备和智能设备之间采用蓝牙进行通信,采用发明实施例可以更有效的解决中继攻击问题,为用户提供安全、智能、无感知解锁的体验。可以理解的是,本发明实施例同样可以避免ZigBee、WiFi等场景下的中继攻击,在此不再赘述。
本发明实施例中,终端设备与智能设备之间通过蓝牙进行通信连接,而蓝牙通信的范围通常在几十米到几百米不等,若终端设备与智能设备在距离较远的蓝牙通信范围内就开始监测距离变化趋势,则可能导致终端设备监测功耗较高,并且,通常在距离较远的情况下,无法更有效的判断持有终端设备的用户是否有开锁意图,因此,本发明实施例在不影响解锁条件判断的前提下,在终端设备和智能设备之间的距离在较近的范围内再进行蓝牙配对连接,并触发执行监测距离变化趋势,节省了终端设备的功耗,提升了解锁条件判断的准确率。
步骤S502:终端设备监测与智能设备之间的距离变化趋势,所述智能设备包括智能锁。
具体地,步骤S502可参考上述图4实施例中的步骤S401,这里不再赘述。
在一种可能的实现方式中,根据所述终端设备监测的与所述智能设备之间的第一距离信息,和/或根据所述智能设备监测的与所述终端设备之间的第二距离信息,判断所述终端设备与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种,所述第 二距离信息包括蓝牙信号强度变化信息、GPS测距信息和IRUWB测距信息中的一种或多种。即本发明实施例中不仅仅可以由终端设备来主导监测,也可以由智能设备来主导监测,进一步地,也可以让终端设备和智能设备同时参与距离变化趋势的监测,以提升监测的准确性。
步骤S503:若所述终端设备判断出正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程。
具体地,步骤S503可参考上述图4实施例中的步骤S402,这里不再赘述。
在一种可能的实现方式中,所述终端设备与所述智能设备之间的身份认证过程,包括:所述终端设备和所述智能设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
其中,基于预先认证的共享密钥的方式可以参考前述图2和图3中实施例对应计算出的终端设备(如车主的智能手机)和智能设备(如智能车辆)共享的密钥K O,此时,双方可利用共享的密钥K O进行基于挑战-应答的双向身份认证。另外,如前述图3中实施例所述,智能设备可实时计算出受委用户(终端设备)的K U,因此智能设备和受委用户的终端设备也可以利用K U进行基于挑战-应答的双向身份认证。
上述身份认证采用共享密钥方式,本发明实施例还可以采用公私钥对进行身份认证。具体地,在终端设备(如车主的智能手机)注册阶段,车主的智能手机(简称车主)无需领取K O:车主生成用于数字签名的公私钥对(PK O,SK O),通过服务器注册车主身份,并将公钥PK O及蓝牙地址信息通过服务器发送到智能设备(车主的智能车辆,简称车辆),并由车主安全保管SK O。在车主授权阶段,车主生成用于数字签名的公私钥对(PK U,SK U),通过服务器传递(PK U,SK U)给受委用户所使用的终端设备,并将注册PK U、授权策略P U和受委用户蓝牙配对信息通过服务器发送给相应车辆。这样,在后续的开启/关闭车门的过程中,进行身份认证时车主可以直接使用SK O而受委用户可直接使用SK U来签名车辆发出的挑战,从而实现身份认证。
步骤S504:在所述终端设备和所述智能设备之间的身份认证成功的情况下,所述终端设备解开所述智能锁。
具体地,步骤S504可参考上述图4实施例中的步骤S403,这里不再赘述。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解开所述智能锁,包括:所述终端设备确定所述多个智能锁中距离最近的目标智能锁,解开所述目标智能锁。本发明实施例,当智能设备有多个智能锁时,则终端设备可以进一步判断自身距离哪个智能锁更近,则相应的解开该智能锁,为用户提供更人性化的智能解锁服务,进一步提升用户体验。例如,以终端设备为手机、智能设备为智能车辆、智能锁为车门锁为例,智能车辆的每个车门锁上均设置有蓝牙Beacon,分别放在主驾驶车门、副驾驶车门、后备箱处。智能车辆可以根据多个Beacon接收到手机的蓝牙信号强弱来判断手机主人更靠近哪个Beacon,来判断打开相应车门\后备箱门的意愿。
需要说明的是,智能设备(以车辆为例),车辆需管理一个标识符locked,用于表示车门/后备箱门当前的状态,假设,locked=1代表车门处于关闭状态,locked=0代表车门处于开启状态。如果驾驶员在车内手动关闭车门或车辆开动,则车辆修改标识符locked的值为1; 如果驾驶员在车内手动开启车门,则车辆修改标识符locked的值为0。因此,在车辆维护的标识符locked的值为1的情况下,如果手机/车辆检测到用户意愿为开启,且手机和车辆的距离小于预设开启距离时(即满足上述步骤S503对应的条件),则启动身份认证过程;如果车辆于手机完成身份认证协议,则车辆开启相应的车辆设备,并将标识符locked的值置为0。在车辆维护的标识符locked的值为0的情况下,如果手机/车辆检测到用户的意愿是关闭,且手机和车辆的距离大于预设关闭距离时,关闭所有智能锁。
在一种可能的实现方式中,所述启动所述终端设备与所述智能设备之间的身份认证过程之前,还包括:所述终端设备比较自身所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;所述终端设备根据比较结果判断是否与所述智能设备处于同一环境中;若是,则所述终端设备允许启动与所述智能设备之间的身份认证过程。也即是终端设备在确定是否启动身份认证过程之前,不仅考虑自身是否正在靠近智能设备,以及在距离上是否离智能设备较近,进一步地,还可以通过环境参数判断自身与智能设备是否处于同一个环境中,以进一步精确判断用户所持的该终端设备是否确实在智能设备附近(即用户的确极大可能需要开启智能锁),而非攻击者伪造的距离很近,更有效地避免中继攻击导致的非法解锁,保证智能锁的安全性,提升用户的体验。
在一种可能的实现方式中,所述启动所述终端设备与所述智能设备之间的身份认证过程之前,还包括:所述终端设备向所述智能设备发起声音应答指示;所述终端设备接收所述智能设备根据所述声音应答指示发出的反馈声音;若确认声音应答匹配成功,则所述终端设备允许启动与所述智能设备之间的身份认证过程。即可采用多传感器互相检验技术来进一步减轻中继攻击relay attack的威胁。具体地,采用声音应答技术,例如,手机发送数字挑战给车辆(如0100),车辆鸣笛或者发出超声波进行相应的回应(如短长短短),如果手机能收到相应的鸣笛或者超声波,并且与发送出的挑战匹配,则认证成功。本发明实施例,终端设备在确定是否启动身份认证过程之前,不仅考虑自身是否正在靠近智能设备,以及在距离上是否离智能设备较近,进一步地,还通过声音应答判断自身与智能设备是否处于较近的距离范围内,以进一步精确判断用户所持的该终端设备是否确实在智能设备附近(即用户的确极大可能需要开启智能锁),而非攻击者伪造的距离很近,更有效地避免中继攻击导致的非法解锁,保证智能锁的安全性,提升用户的体验。可选的,上述声音应答挑战还可以结合上述环境参数判断一起实施,即不仅判断终端设备是否正在靠近智能设备,以及在距离上是否离智能设备较近,而且进一步进行声音应答挑战和是否处于同一环境的判断,以进一步提升判断的准确率。
步骤S505:若所述终端设备判断出正在远离所述智能设备,且所述终端设备与所述智能设备之间的距离大于第三距离阈值,则锁定所述智能锁。
具体地,所述终端设备正在远离所述智能设备,包括以下至少一项:所述终端设备与所述智能设备之间的蓝牙信号强度越来越弱;或者所述终端设备与所述智能设备之间的GPS测距越来越大;或者所述终端设备与所述智能设备之间的IRUWB测距越来越大。本发明实施例,终端设备还通过监测与智能设备之间的距离变化趋势,判断自身是否在远离智能设备,即充分的判断了持有该终端设备的用户是否有锁定智能锁的意图,避免用户动 手操作。例如,当判断出终端设备正在远离公司门禁、家庭门锁、车门、保险柜、共享单车等,且距离超过一定阈值,则在用户无需动手、无感知的情况下,自动锁定对应的智能锁,方便快捷,用户体验佳。
如图6所示,图6为本发明实施例提供的一种智能解锁应用场景示意图,图中分别以智能车辆(图6中的智能车辆)为中心,以不同的虚线圆圈代表第一距离阈值、第二距离阈值,第三距离阈值所对应的区域范围,当用户手持智能手机从电梯下来走进停车场,走向自己的智能车辆,且在距离小于第二距离阈值时,智能手机与智能车辆开始蓝牙配对,当距离小于第一距离阈值,且用户一直在靠近智能车辆的情况下,控制打开靠近用户侧的车门锁,至此,实现了用户无感知开锁的功能;当用户从车上下来,关上车门远离车辆,走到第三距离阈值时,则判定当前需要关闭车门,从而控制锁定处于解锁状态的车门锁,至此实现了用户无感知锁定车门锁的功能。
可以理解的是,本申请中的上述任意一种智能锁解锁方法的实施例,均可以应用在各类场景下的数字钥匙系统,例如汽车共享,分时租赁,租车业务,快递到后备箱、家庭门锁、公司门禁、保险柜等解锁领域,此处不再赘述。
参见图7,图7是本发明实施例提供的又一种智能锁解锁方法的流程示意图,该方法可应用于上述图2或图3中所述的系统架构中,其中的智能设备可以为图2或图3系统架构中的智能设备20,可用于支持并执行图7中所示的方法流程。下面将结合附图7从智能设备侧进行描述。该方法可以包括以下步骤S701-步骤S703。
步骤S701:智能设备监测与终端设备之间的距离变化趋势,所述智能设备包括智能锁。
步骤S702:若所述智能设备判断出所述终端设备正在靠近,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程。
步骤S703:在所述智能设备和所述终端设备之间的身份认证成功的情况下,所述智能设备解开所述智能锁。
具体地,步骤S701-步骤S703可参考上述图4实施例中的步骤S502-步骤S504,这里不再赘述。需要说明的是,由智能设备进行监测、判断、启动身份认证或解开智能锁,其具体实施方式可以根据智能设备和终端设备上的结构、传感器以及相关的功能模块的不同而不同,例如,智能车辆可以利用超声波雷达探测车主是否在走动,通过CAN总线控制智能锁的解锁/锁定等。即智能设备侧的部分实现细节需要结合智能设备本身的结构和功能的变化而变化,此处不再赘述。
在一种可能的实现方式中,所述方法还包括:当所述智能设备和所述终端设备之间的距离小于第二距离阈值,所述智能设备和所述终端设备通过蓝牙建立通信连接,且触发执行监测与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,所述方法还包括:若所述智能设备判断出正在远离所述终端设备,且所述智能设备与所述终端设备之间的距离大于第二距离阈值,则所述智能设备锁定所述智能锁。
在一种可能的实现方式中,所述智能设备监测与终端设备之间的距离变化趋势,包括:
所述智能设备根据与终端设备之间的第一距离信息,判断所述智能设备与所述终端设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,所述启动所述智能设备与所述终端设备之间的身份认证过程之前,还包括:所述智能设备比较自身所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;所述智能设备根据比较结果判断是否与所述智能设备是否处于同一环境中;若是,则所述智能设备允许启动与所述终端设备之间的身份认证过程。
在一种可能的实现方式中,所述启动所述智能设备与所述终端设备之间的身份认证过程之前,还包括:所述智能设备接收所述终端设备发起的声音应答指示;所述智能设备根据所述声音应答指示向所述终端设备发出反馈声音;若确认声音应答匹配成功,则所述智能设备允许启动与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述智能设备与所述终端设备之间的身份认证过程,包括:所述智能设备和所述终端设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解开所述智能锁,包括:所述智能设备确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
本申请还提供了又一种智能锁解锁方法,可包括:终端设备监测与智能设备之间的距离变化趋势,所述智能设备包括智能锁;若所述终端设备判断出正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;在所述终端设备和所述智能设备之间的身份认证成功的情况下,所述智能设备解开所述智能锁。本发明实施例,通过终端设备监测与智能锁所在的智能设备之间的距离变化趋势,并在判定出自身正在向智能设备靠近且距离小于一定阈值的情况下,才启动与智能设备之间的身份认证过程,并在身份认证通过后,由智能设备解开智能锁。由于终端设备在启动身份认证过程之前,不仅考虑了与智能设备之间的距离,还通过监测与智能设备之间的距离变化趋势,判断自身是否在向智能设备靠近,即充分的判断了持有该终端设备的用户是否有解锁意图,避免仅通过判断距离远近(在近场通信方式的通信范围内)就启动身份认证过程,从而避免攻击者仅利用中继攻击伪造近距离的假象即可进行非法解锁的隐患,大大增强了数字钥匙解锁的安全性。
基于所述,监测终端设备与智能设备之间的距离变化趋势,可以由终端设备监测,也可以由智能设备来监测,还可以由终端设备和智能设备来共同监测。可选的,判断终端设备靠近或远离智能设备,以及两者之间的距离可以由终端设备判断,也可以由智能设备判断,还可以由终端设备和智能设备共同判断。进一步可选的,启动终端设备和智能设备之间的身份认证过程,也可以是由终端设备来启动,也可以是由智能设备来启动。再进一步可选的,最终控制解开智能锁/控制锁定智能锁可以是由终端设备控制执行,也可以是由智能设备控制执行。即本申请中对两者之间的距离变化趋势的监测、距离与距离阈值之间的判断、启动身份认证过程、以及解开智能锁/锁定智能锁过程中的所有或者部分步骤的具体执行主体不作具体限定,可以均由终端设备执行也可以均由智能设备执行,还可以是部分 由终端设备部分由智能设备交互执行,即只要是可以最终确定或得到相应的结果即可。
上述详细阐述了本发明实施例的方法,下面提供了本发明实施例的相关装置。
请参见图8,图8是本发明实施例提供的一种终端设备的结构示意图,该终端设备10可以包括监测单元101、身份认证单元102和解锁单元103,其中,各个单元的详细描述如下。
监测单元101,用于监测所述终端设备与智能设备之间的距离变化趋势,所述智能设备包括智能锁;
身份认证单元102,用于若判断出所述终端设备正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;
解锁单元103,用于在所述终端设备和所述智能设备之间的身份认证成功的情况下,解开所述智能锁。
在一种可能的实现方式中,所述终端设备,还包括:
触发单元104,用于当所述终端设备和所述智能设备之间的距离小于第二距离阈值,和所述智能设备通过蓝牙建立通信连接,且触发所述监测单元执行所述监测所述终端设备与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,所述终端设备,还包括:
锁定单元105,用于若判断出所述终端设备正在远离所述智能设备,且所述终端设备与所述智能设备之间的距离大于第三距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,所述监测单元,具体用于:根据所述终端设备与智能设备之间的第一距离信息,判断所述终端设备与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,所述终端设备,还包括:
比较单元106,用于比较所述终端设备所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;
判断单元107,用于根据比较结果判断所述终端设备是否与所述智能设备处于同一环境中;
第一启动单元108,用于若确认处于同一环境中,则允许启动所述终端设备与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述终端设备,还包括:
应答单元109,用于向所述智能设备发起声音应答指示;
反馈单元110,用于接收所述智能设备根据所述声音应答指示发出的反馈声音;
第二启动单元111,用于若确认声音应答匹配成功,则允许启动与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述终端设备与所述智能设备之间的身份认证过程,包括:所述终端设备和所述智能设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解锁单元,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
需要说明的是,本发明实施例中所描述的终端设备10中各功能单元的功能可参见上述图2中所述的方法实施例中步骤S401-步骤S403的相关描述,或参见图5中所述的方法实施例中步骤S501-步骤S506的相关描述,此处不再赘述。
请参见图9,图9是本发明实施例提供的一种智能设备的结构示意图,该智能设备20可以包括监测单元201、身份认证单元202和解锁单元203,其中,各个单元的详细描述如下。
监测单元201,用于监测所述智能设备与终端设备之间的距离变化趋势,所述智能设备包括智能锁;
身份认证单元202,用于若判断出所述终端设备正在靠近所述智能设备,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;
解锁单元203,用于在所述智能设备和所述终端设备之间的身份认证成功的情况下,解开所述智能锁。
在一种可能的实现方式中,所述智能设备,还包括:
触发单元204,用于当所述智能设备和所述终端设备之间的距离小于第二距离阈值,和所述终端设备通过蓝牙建立通信连接,且触发所述监测单元执行所述监测所述智能设备与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,所述智能设备,还包括:
锁定单元205,用于若判断出所述智能设备正在远离所述终端设备,且所述智能设备与所述终端设备之间的距离大于第二距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,所述监测单元,具体用于:根据所述智能设备与终端设备之间的第一距离信息,判断所述智能设备与所述终端设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,所述智能设备,还包括:
比较单元206,用于比较所述智能设备所处的环境参数和所述终端设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;
判断单元207,用于根据比较结果判断所述智能设备与所述终端设备是否处于同一环境中;
第一启动单元208,用于若确认处于同一环境中,则允许启动所述智能设备与所述终端设备之间的身份认证过程。
在一种可能的实现方式中,所述智能设备,还包括:
应答单元209,用于接收所述终端设备发起的声音应答指示;
反馈单元210,用于根据所述声音应答指示向所述终端设备发出反馈声音;
第二启动单元211,用于若确认声音应答匹配成功,则允许启动所述智能设备与所述智 能设备之间的身份认证过程。
在一种可能的实现方式中,所述智能设备与所述终端设备之间的身份认证过程,包括:所述智能设备和所述终端设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;所述解锁单元,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
需要说明的是,本发明实施例中所描述的智能设备20中各功能单元的功能可参见上述图7中所述的方法实施例中步骤S701-步骤S703的相关描述,此处不再赘述。
请参见图10,图10是本发明实施例提供的另一种终端设备的结构示意图,该终端设备40可以包括处理器401和存储器402,其中,各个单元的详细描述如下。
存储器402用于存储程序代码,处理器401用于调用所述存储器存储的程序代码执行如下步骤:监测所述终端设备与智能设备之间的距离变化趋势,所述智能设备包括智能锁;若判断出所述终端设备正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;在所述终端设备和所述智能设备之间的身份认证成功的情况下,解开所述智能锁。
在一种可能的实现方式中,处理器401,还用于:当所述终端设备和所述智能设备之间的距离小于第二距离阈值,和所述智能设备通过蓝牙建立通信连接,且触发执行所述监测所述终端设备与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,处理器401,还用于:若判断出所述终端设备正在远离所述智能设备,且所述终端设备与所述智能设备之间的距离大于第三距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,处理器401,具体用于:根据所述终端设备与智能设备之间的第一距离信息,判断所述终端设备与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,处理器401,还用于:比较所述终端设备所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;根据比较结果判断所述终端设备是否与所述智能设备处于同一环境中;若确认处于同一环境中,则允许启动所述终端设备与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,处理器401,还用于:向所述智能设备发起声音应答指示;
接收所述智能设备根据所述声音应答指示发出的反馈声音;若确认声音应答匹配成功,则允许启动与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述终端设备与所述智能设备之间的身份认证过程,包括:所述终端设备和所述智能设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;处理器401,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
需要说明的是,本发明实施例中所描述的终端设备40中各功能单元的功能可参见上述 图2中所述的方法实施例中步骤S401-步骤S403的相关描述,或参见图5中所述的方法实施例中步骤S501-步骤S506的相关描述,此处不再赘述。
请参见图11,图11是本发明实施例提供的另一种智能设备的结构示意图,该智能设备50可以包括处理器501和存储器502,其中,各个单元的详细描述如下。
存储器502用于存储程序代码,处理器501用于调用所述存储器存储的程序代码执行如下步骤:
监测所述智能设备与终端设备之间的距离变化趋势,所述智能设备包括智能锁;若判断出所述终端设备正在靠近所述智能设备,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;在所述智能设备和所述终端设备之间的身份认证成功的情况下,解开所述智能锁。
当所述智能设备和所述终端设备之间的距离小于第二距离阈值,和所述终端设备通过蓝牙建立通信连接,且触发执行所述监测所述智能设备与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
在一种可能的实现方式中,处理器501,还用于:若判断出所述智能设备正在远离所述终端设备,且所述智能设备与所述终端设备之间的距离大于第二距离阈值,则锁定所述智能锁。
在一种可能的实现方式中,处理器501,具体用于:根据所述智能设备与终端设备之间的第一距离信息,判断所述智能设备与所述终端设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
在一种可能的实现方式中,处理器501,还用于:比较所述智能设备所处的环境参数和所述终端设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;根据比较结果判断所述智能设备与所述终端设备是否处于同一环境中;若确认处于同一环境中,则允许启动所述智能设备与所述终端设备之间的身份认证过程。
在一种可能的实现方式中,处理器501,还用于:接收所述终端设备发起的声音应答指示;根据所述声音应答指示向所述终端设备发出反馈声音;若确认声音应答匹配成功,则允许启动所述智能设备与所述智能设备之间的身份认证过程。
在一种可能的实现方式中,所述智能设备与所述终端设备之间的身份认证过程,包括:所述智能设备和所述终端设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
在一种可能的实现方式中,所述智能设备包括多个所述智能锁;处理器501,具体用于:确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
需要说明的是,本发明实施例中所描述的智能设备50中各功能单元的功能可参见上述图7中所述的方法实施例中步骤S701-步骤S703的相关描述,此处不再赘述。
如图12所示,图12是本发明实施例提供的一种设备的结构示意图。终端设备10和智能设备20,均可以以图12中的结构来实现,该设备60包括至少一个处理器601,至少一个存储器602、至少一个通信接口603。此外,该设备还可以包括天线等通用部件,在此不 再详述。
处理器601可以是通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制以上方案程序执行的集成电路。
通信接口603,用于与其他设备或通信网络通信,如升级服务器、密钥服务器、车载内部的设备等。
存储器602可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线与处理器相连接。存储器也可以和处理器集成在一起。
其中,所述存储器602用于存储执行以上方案的应用程序代码,并由处理器601来控制执行。所述处理器601用于执行所述存储器602中存储的应用程序代码以实现终端设备10和智能设备20的相关功能。
需要说明的是,本发明实施例中所描述的终端设备10和智能设备20的功能可参见上述图2至图7中的所述的方法实施例中的相关描述,此处不再赘述。
本发明实施例还提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时包括上述方法实施例中记载的任意一种智能锁解锁方法的部分或全部步骤。
本发明实施例还提供一种计算机程序,该计算机程序包括指令,当该计算机程序被计算机执行时,使得计算机可以执行任意一种智能锁解锁方法的部分或全部步骤。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可能可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置,可通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如上述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。
上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的 部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
上述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以为个人计算机、服务器或者网络设备等,具体可以是计算机设备中的处理器)执行本申请各个实施例上述方法的全部或部分步骤。其中,而前述的存储介质可包括:U盘、移动硬盘、磁碟、光盘、只读存储器(Read-Only Memory,缩写:ROM)或者随机存取存储器(Random Access Memory,缩写:RAM)等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (30)

  1. 一种智能锁解锁方法,其特征在于,包括:
    终端设备监测与智能设备之间的距离变化趋势,所述智能设备包括智能锁;
    若所述终端设备判断出正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;
    在所述终端设备和所述智能设备之间的身份认证成功的情况下,所述终端设备解开所述智能锁。
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    当所述终端设备和所述智能设备之间的距离小于第二距离阈值,所述终端设备和所述智能设备通过蓝牙建立通信连接,且触发执行所述监测与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
  3. 如权利要求1或2所述的方法,其特征在于,所述方法还包括:
    若所述终端设备判断出正在远离所述智能设备,且所述终端设备与所述智能设备之间的距离大于第三距离阈值,则锁定所述智能锁。
  4. 如权利要求1-3任意一项所述的方法,其特征在于,所述终端设备监测与智能设备之间的距离变化趋势,包括:
    所述终端设备根据与智能设备之间的第一距离信息,判断所述终端设备与所述智能设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
  5. 如权利要求1-4任意一项所述的方法,其特征在于,所述启动所述终端设备与所述智能设备之间的身份认证过程之前,还包括:
    所述终端设备比较自身所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;
    所述终端设备根据比较结果判断是否与所述智能设备处于同一环境中;
    若是,则所述终端设备允许启动与所述智能设备之间的身份认证过程。
  6. 如权利要求1-5任意一项所述的方法,其特征在于,所述启动所述终端设备与所述智能设备之间的身份认证过程之前,还包括:
    所述终端设备向所述智能设备发起声音应答指示;
    所述终端设备接收所述智能设备根据所述声音应答指示发出的反馈声音;
    若确认声音应答匹配成功,则所述终端设备允许启动与所述智能设备之间的身份认证过程。
  7. 如权利要求1-6任意一项所述的方法,其特征在于,所述终端设备与所述智能设备之间的身份认证过程,包括:所述终端设备和所述智能设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
  8. 如权利要求1-7任意一项所述的方法,其特征在于,所述智能设备包括多个所述智能锁;所述解开所述智能锁,包括:
    所述终端设备确定所述多个智能锁中距离最近的目标智能锁,解开所述目标智能锁。
  9. 一种智能锁解锁方法,其特征在于,包括:
    智能设备监测与终端设备之间的距离变化趋势,所述智能设备包括智能锁;
    若所述智能设备判断出所述终端设备正在靠近,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;
    在所述智能设备和所述终端设备之间的身份认证成功的情况下,所述智能设备解开所述智能锁。
  10. 如权利要求9所述的方法,其特征在于,所述方法还包括:
    当所述智能设备和所述终端设备之间的距离小于第二距离阈值,所述智能设备和所述终端设备通过蓝牙建立通信连接,且触发执行监测与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
  11. 如权利要求9或10所述的方法,其特征在于,所述方法还包括:
    若所述智能设备判断出正在远离所述终端设备,且所述智能设备与所述终端设备之间的距离大于第二距离阈值,则所述智能设备锁定所述智能锁。
  12. 如权利要求9-11任意一项所述的方法,其特征在于,所述智能设备监测与终端设备之间的距离变化趋势,包括:
    所述智能设备根据与终端设备之间的第一距离信息,判断所述智能设备与所述终端设备之间的距离变化;其中,所述第一距离信息包括蓝牙信号强度变化信息、全球定位系统GPS测距信息和脉冲超宽带IRUWB测距信息中的一种或多种。
  13. 如权利要求9-12任意一项所述的方法,其特征在于,所述启动所述智能设备与所述终端设备之间的身份认证过程之前,还包括:
    所述智能设备比较自身所处的环境参数和所述智能设备所处的环境参数,所述环境参数包括温度、湿度、光照强度、气味和噪声中的一种或多种;
    所述智能设备根据比较结果判断是否与所述智能设备是否处于同一环境中;
    若是,则所述智能设备允许启动与所述终端设备之间的身份认证过程。
  14. 如权利要求9-13任意一项所述的方法,其特征在于,所述启动所述智能设备与所 述终端设备之间的身份认证过程之前,还包括:
    所述智能设备接收所述终端设备发起的声音应答指示;
    所述智能设备根据所述声音应答指示向所述终端设备发出反馈声音;
    若确认声音应答匹配成功,则所述智能设备允许启动与所述智能设备之间的身份认证过程。
  15. 如权利要求9-14任意一项所述的方法,其特征在于,所述智能设备与所述终端设备之间的身份认证过程,包括:所述智能设备和所述终端设备基于预先认证的共享密钥或者公私钥对进行安全认证过程。
  16. 如权利要求9-15任意一项所述的方法,其特征在于,所述智能设备包括多个所述智能锁;所述解开所述智能锁,包括:
    所述智能设备确定所述多个智能锁中距离所述终端设备最近的目标智能锁,解开所述目标智能锁。
  17. 一种终端设备,其特征在于,包括:
    监测单元,用于监测所述终端设备与智能设备之间的距离变化趋势,所述智能设备包括智能锁;
    身份认证单元,用于若判断出所述终端设备正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;
    解锁单元,用于在所述终端设备和所述智能设备之间的身份认证成功的情况下,解开所述智能锁。
  18. 如权利要求17所述的终端设备,其特征在于,所述终端设备,还包括:
    触发单元,用于当所述终端设备和所述智能设备之间的距离小于第二距离阈值,和所述智能设备通过蓝牙建立通信连接,且触发所述监测单元执行所述监测所述终端设备与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
  19. 如权利要求17或18所述的终端设备,其特征在于,所述终端设备,还包括:
    应答单元,用于向所述智能设备发起声音应答指示;
    反馈单元,用于接收所述智能设备根据所述声音应答指示发出的反馈声音;
    第二启动单元,用于若确认声音应答匹配成功,则允许启动与所述智能设备之间的身份认证过程。
  20. 一种智能设备,其特征在于,包括:
    监测单元,用于监测所述智能设备与终端设备之间的距离变化趋势,所述智能设备包括智能锁;
    身份认证单元,用于若判断出所述终端设备正在靠近所述智能设备,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;
    解锁单元,用于在所述智能设备和所述终端设备之间的身份认证成功的情况下,解开所述智能锁。
  21. 如权利要求20所述的智能设备,其特征在于,所述智能设备,还包括:
    触发单元,用于当所述智能设备和所述终端设备之间的距离小于第二距离阈值,和所述终端设备通过蓝牙建立通信连接,且触发所述监测单元执行所述监测所述智能设备与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
  22. 如权利要求20或21所述的智能设备,其特征在于,所述智能设备,还包括:
    应答单元,用于接收所述终端设备发起的声音应答指示;
    反馈单元,用于根据所述声音应答指示向所述终端设备发出反馈声音;
    第二启动单元,用于若确认声音应答匹配成功,则允许启动所述智能设备与所述智能设备之间的身份认证过程。
  23. 一种终端设备,其特征在于,包括:处理器和存储器;其中
    所述存储器用于存储程序代码,所述处理器用于调用所述存储器存储的程序代码执行如下步骤:
    监测所述终端设备与智能设备之间的距离变化趋势,所述智能设备包括智能锁;
    若判断出所述终端设备正在靠近所述智能设备,且所述终端设备与所述智能设备之间的距离小于第一距离阈值,则启动所述终端设备与所述智能设备之间的身份认证过程;
    在所述终端设备和所述智能设备之间的身份认证成功的情况下,解开所述智能锁。
  24. 如权利要求23所述的终端设备,其特征在于,所述处理器,还用于:
    当所述终端设备和所述智能设备之间的距离小于第二距离阈值,和所述智能设备通过蓝牙建立通信连接,且触发执行所述监测所述终端设备与所述智能设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
  25. 如权利要求23或24所述的终端设备,其特征在于,所述处理器,还用于:
    向所述智能设备发起声音应答指示;
    接收所述智能设备根据所述声音应答指示发出的反馈声音;
    若确认声音应答匹配成功,则允许启动与所述智能设备之间的身份认证过程。
  26. 一种智能设备,其特征在于,包括:处理器和存储器;其中
    所述存储器用于存储程序代码,所述处理器用于调用所述存储器存储的程序代码执行如下步骤:
    监测所述智能设备与终端设备之间的距离变化趋势,所述智能设备包括智能锁;
    若判断出所述终端设备正在靠近所述智能设备,且所述智能设备与所述终端设备之间的距离小于第一距离阈值,则启动所述智能设备与所述终端设备之间的身份认证过程;
    在所述智能设备和所述终端设备之间的身份认证成功的情况下,解开所述智能锁。
  27. 如权利要求26所述的智能设备,其特征在于,所述处理器,还用于:
    当所述智能设备和所述终端设备之间的距离小于第二距离阈值,和所述终端设备通过蓝牙建立通信连接,且触发执行所述监测所述智能设备与所述终端设备之间的距离变化趋势,所述第二距离阈值大于所述第一距离阈值。
  28. 如权利要求26或27所述的智能设备,其特征在于,所述处理器,还用于:
    接收所述终端设备发起的声音应答指示;
    根据所述声音应答指示向所述终端设备发出反馈声音;
    若确认声音应答匹配成功,则允许启动所述智能设备与所述智能设备之间的身份认证过程。
  29. 一种计算机存储介质,其特征在于,所述计算机存储介质存储有计算机程序,该计算机程序被处理器执行时实现上述权利要求1-8任意一项所述的方法,或者实现上述权利要求9-16任意一项所述的方法。
  30. 一种计算机程序,其特征在于,所述计算机程序包括指令,当所述计算机程序被计算机执行时,使得所述计算机执行如权利要求1-8任意一项所述的方法,或者实现上述权利要求9-16任意一项所述的方法。
PCT/CN2020/097294 2019-06-20 2020-06-20 一种智能锁解锁方法及相关设备 WO2020253856A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20827245.0A EP3975142A4 (en) 2019-06-20 2020-06-20 METHOD OF UNLOCKING A SMART LOCK AND ASSOCIATED DEVICE
US17/553,957 US20220109561A1 (en) 2019-06-20 2021-12-17 Smart lock unlocking method and related device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910536630.3 2019-06-20
CN201910536630.3A CN112116735A (zh) 2019-06-20 2019-06-20 一种智能锁解锁方法及相关设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/553,957 Continuation US20220109561A1 (en) 2019-06-20 2021-12-17 Smart lock unlocking method and related device

Publications (1)

Publication Number Publication Date
WO2020253856A1 true WO2020253856A1 (zh) 2020-12-24

Family

ID=73795797

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/097294 WO2020253856A1 (zh) 2019-06-20 2020-06-20 一种智能锁解锁方法及相关设备

Country Status (4)

Country Link
US (1) US20220109561A1 (zh)
EP (1) EP3975142A4 (zh)
CN (1) CN112116735A (zh)
WO (1) WO2020253856A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113129486A (zh) * 2021-04-16 2021-07-16 山东爱德邦智能科技有限公司 车锁控制方法、终端设备、hid车锁设备及电子设备
CN113347613A (zh) * 2021-04-15 2021-09-03 奇瑞商用车(安徽)有限公司 基于蓝牙数字钥匙的安全通信方法及系统
CN114013394A (zh) * 2021-11-29 2022-02-08 重庆金康赛力斯新能源汽车设计院有限公司 一种车锁控制方法及装置
CN114244509A (zh) * 2021-12-17 2022-03-25 北京国泰网信科技有限公司 使用移动终端进行sm2一次一密双向认证开锁的方法
WO2022162071A1 (fr) * 2021-01-29 2022-08-04 Continental Automotive Technologies GmbH Procede d'activation d'une fonction d'un vehicule automobile et dispositif d'activation associe
IT202100006155A1 (it) * 2021-03-15 2022-09-15 Cs Performances Srl Dispositivo apri cancello/porta

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3940419A4 (en) * 2019-05-14 2022-06-01 Samsung Electronics Co., Ltd. ELECTRONIC DEVICE FOR PERFORMING RANGE MEASURING BY UWB AND OPERATING METHOD FOR ELECTRONIC DEVICE
JP7382281B2 (ja) * 2020-05-25 2023-11-16 株式会社東海理化電機製作所 制御装置および制御方法
JP7446926B2 (ja) * 2020-06-05 2024-03-11 株式会社東海理化電機製作所 制御装置および制御方法
JP7414648B2 (ja) * 2020-06-05 2024-01-16 株式会社東海理化電機製作所 制御装置および制御方法
CN113037921B (zh) * 2021-02-07 2022-06-07 武汉齐物科技有限公司 一种单车防遗盗方法及装置
CN113043996B (zh) * 2021-04-26 2022-07-22 歌尔股份有限公司 汽车的解锁方法、智能终端及计算机可读存储介质
CN113223215B (zh) * 2021-05-21 2022-11-01 歌尔股份有限公司 智能门锁的唤醒方法、终端设备及智能门锁
CN114124528B (zh) * 2021-09-17 2024-01-23 珠海极海半导体有限公司 无线mcu和车辆配置系统
CN114268380B (zh) * 2021-10-27 2024-03-08 浙江零跑科技股份有限公司 一种基于声波通信的汽车蓝牙无感进入改进方法
CN116030554A (zh) * 2021-10-27 2023-04-28 上海汽车集团股份有限公司 一种车位锁的激活方法、激活装置、车辆及电子设备
CN113978412A (zh) * 2021-10-28 2022-01-28 上汽通用五菱汽车股份有限公司 汽车无感解锁方法、系统、计算机设备及存储介质
US11734972B2 (en) * 2021-11-24 2023-08-22 Rivian Ip Holdings, Llc Systems and methods for securely managing vehicle information
CN114371777B (zh) * 2021-12-08 2024-06-11 惠州市德赛西威智能交通技术研究院有限公司 一种基于uwb技术的车辆控制方法及系统
CN114399854A (zh) * 2021-12-30 2022-04-26 荣耀终端有限公司 智能门锁的开锁方法、移动设备及存储介质
CN114743296B (zh) * 2022-04-20 2024-06-25 曾科岩 智能门锁的控制方法及控制系统
CN114973519A (zh) * 2022-04-24 2022-08-30 江苏中州科技有限公司 一种基于物联网的智能监控管理系统及方法
CN117197927A (zh) * 2022-06-01 2023-12-08 华为技术有限公司 智能锁的控制方法、智能锁控制系统和智能锁
WO2023247058A1 (en) * 2022-06-24 2023-12-28 Bayerische Motoren Werke Aktiengesellschaft Computer program, apparatus, user device, vehicle, server, and methods for controlling a vehicle
CN115331333A (zh) * 2022-07-12 2022-11-11 山东梦旅信息科技有限公司 一种基于物联网装置智能监控系统的智能锁
CN115331334A (zh) * 2022-07-13 2022-11-11 神通科技集团股份有限公司 一种基于人脸识别和蓝牙解锁的智能立柱及解锁方法
CN115240301A (zh) * 2022-07-13 2022-10-25 深圳市迪太科技有限公司 骑行设备控制方法、设备、介质及终端控制方法、装置
CN115195662A (zh) * 2022-07-27 2022-10-18 辽宁科大物联科技有限公司 一种基于蓝牙信号强度控制车辆解锁的装置、方法及车辆
US20240107264A1 (en) * 2022-09-27 2024-03-28 Sram, Llc Wireless bicycle component communication and control using ultra wideband radio
CN116434381A (zh) * 2022-10-28 2023-07-14 中国银联股份有限公司 一种无感入车方法以及无感入车系统
CN115909570A (zh) * 2022-12-09 2023-04-04 广州市中海龙国际货运代理有限公司 基于uwb的闸口控制方法及控制系统
CN116101220A (zh) * 2023-02-24 2023-05-12 英华达(上海)科技有限公司 汽车解锁控制方法、系统、设备及存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104484923A (zh) * 2014-12-03 2015-04-01 朗曦科技(上海)有限公司 基于智能移动终端身份验证和位置感知的门禁系统及方法
US20160086400A1 (en) * 2011-03-17 2016-03-24 Unikey Technologies Inc. Wireless access control system including distance based lock assembly and remote access device enrollment and related methods
CN106934884A (zh) * 2017-01-19 2017-07-07 云丁网络技术(北京)有限公司 一种基于移动设备的智能门锁自动开锁的方法及其系统
CN107730678A (zh) * 2017-09-29 2018-02-23 胡众义 一种智能开锁方法及系统
CN107734460A (zh) * 2017-09-20 2018-02-23 广州市盈泽信息科技有限公司 一种基于移动终端实现蓝牙锁智能开锁的方法及终端
CN108133523A (zh) * 2016-12-01 2018-06-08 阿里巴巴集团控股有限公司 门禁控制方法及装置
WO2019089376A1 (en) * 2017-10-30 2019-05-09 Walmart Apollo, Llc Systems and methods for securing access to storage and retrieval systems

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004114227A1 (en) * 2003-06-25 2004-12-29 Philips Intellectual Property & Standards Gmbh Method and arrangements for increasing the security of transponder systems, particularly for access to automobiles
US7688179B2 (en) * 2005-12-12 2010-03-30 Denso International America, Inc. Hands-free vehicle door opener
WO2007128319A2 (en) * 2006-06-14 2007-11-15 Scandlife Italia Aps Locking system and remote-controlled entry system
US8126450B2 (en) * 2008-09-24 2012-02-28 Embarq Holdings Company Llc System and method for key free access to a vehicle
US10325426B2 (en) * 2011-12-30 2019-06-18 Consumer 2.0, Inc. Automated entry
DE102013209612A1 (de) * 2013-05-23 2014-11-27 Siemens Aktiengesellschaft Verfahren zum Durchführen eines automatischen Öffnens eines Fahrzeugs oder eines Bezahl-Vorgangs sowie zugehörige Vorrichtung
EP3147868A1 (en) * 2015-09-25 2017-03-29 Assa Abloy AB Determining when to initiate an access control procedure
CN106740679A (zh) * 2015-11-23 2017-05-31 上海汽车集团股份有限公司 车辆无钥匙进入启动控制方法及系统
CN106204817B (zh) * 2016-06-24 2018-05-01 福建求实智能股份有限公司 一种蓝牙门禁的控制方法
DE102016120146A1 (de) * 2016-10-21 2018-04-26 Bayerische Motoren Werke Aktiengesellschaft Verfahren zum prüfen einer autorisierung einer mobilen entriegelungsvorrichtung sowie steuergeräte für ein fahrzeug
GB2558589A (en) * 2017-01-09 2018-07-18 Jaguar Land Rover Ltd Vehicle entry system
EP3432276A1 (en) * 2017-07-19 2019-01-23 KONE Corporation Wake-up procedure for a bluetooth smart lock
US11368845B2 (en) * 2017-12-08 2022-06-21 Carrier Corporation Secure seamless access control
JP2019169814A (ja) * 2018-03-22 2019-10-03 本田技研工業株式会社 車両制御装置、及びプログラム
CN109345668B (zh) * 2018-09-20 2020-12-11 深圳市零点智联科技有限公司 一种蓝牙无钥匙开关门方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160086400A1 (en) * 2011-03-17 2016-03-24 Unikey Technologies Inc. Wireless access control system including distance based lock assembly and remote access device enrollment and related methods
CN104484923A (zh) * 2014-12-03 2015-04-01 朗曦科技(上海)有限公司 基于智能移动终端身份验证和位置感知的门禁系统及方法
CN108133523A (zh) * 2016-12-01 2018-06-08 阿里巴巴集团控股有限公司 门禁控制方法及装置
CN106934884A (zh) * 2017-01-19 2017-07-07 云丁网络技术(北京)有限公司 一种基于移动设备的智能门锁自动开锁的方法及其系统
CN107734460A (zh) * 2017-09-20 2018-02-23 广州市盈泽信息科技有限公司 一种基于移动终端实现蓝牙锁智能开锁的方法及终端
CN107730678A (zh) * 2017-09-29 2018-02-23 胡众义 一种智能开锁方法及系统
WO2019089376A1 (en) * 2017-10-30 2019-05-09 Walmart Apollo, Llc Systems and methods for securing access to storage and retrieval systems

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3975142A4

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022162071A1 (fr) * 2021-01-29 2022-08-04 Continental Automotive Technologies GmbH Procede d'activation d'une fonction d'un vehicule automobile et dispositif d'activation associe
FR3119465A1 (fr) * 2021-01-29 2022-08-05 Continental Automotive Procede d’activation d’une fonction d’un vehicule automobile et dispositif d’activation associe
IT202100006155A1 (it) * 2021-03-15 2022-09-15 Cs Performances Srl Dispositivo apri cancello/porta
CN113347613A (zh) * 2021-04-15 2021-09-03 奇瑞商用车(安徽)有限公司 基于蓝牙数字钥匙的安全通信方法及系统
CN113347613B (zh) * 2021-04-15 2024-01-30 奇瑞商用车(安徽)有限公司 基于蓝牙数字钥匙的安全通信方法及系统
CN113129486A (zh) * 2021-04-16 2021-07-16 山东爱德邦智能科技有限公司 车锁控制方法、终端设备、hid车锁设备及电子设备
CN114013394A (zh) * 2021-11-29 2022-02-08 重庆金康赛力斯新能源汽车设计院有限公司 一种车锁控制方法及装置
CN114244509A (zh) * 2021-12-17 2022-03-25 北京国泰网信科技有限公司 使用移动终端进行sm2一次一密双向认证开锁的方法

Also Published As

Publication number Publication date
EP3975142A1 (en) 2022-03-30
CN112116735A (zh) 2020-12-22
US20220109561A1 (en) 2022-04-07
EP3975142A4 (en) 2022-08-10

Similar Documents

Publication Publication Date Title
WO2020253856A1 (zh) 一种智能锁解锁方法及相关设备
AU2023200489B2 (en) Physical access control systems with localization-based intent detection
US10730481B2 (en) Remote control of vehicle functionalities by means of a mobile terminal
JP7213967B2 (ja) アクセス制御のためのシステム、方法及び装置
US11573313B2 (en) Method for performing distance measurement and authentication concurrently and electronic device thereof
CN111066335A (zh) 用于与访问控制系统通信和测距以实现自动功能的移动设备
CN109844822A (zh) 用于车辆的被动进入/被动启动系统以及方法
CN108174363A (zh) 寻车方法及装置
US11916900B2 (en) Authorized remote control device gesture control methods and apparatus
EP3503044A1 (en) Method of getting access to a vehicle
CN112602299A (zh) 通用个人识别信号
US11979930B2 (en) Control device, non-transitory storage medium, and system
US20220091881A1 (en) System, control device, and processing device
JP2021188925A (ja) 制御装置およびプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20827245

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020827245

Country of ref document: EP

Effective date: 20211223