WO2021179144A1 - 一种车机系统登录方法及相关装置 - Google Patents

一种车机系统登录方法及相关装置 Download PDF

Info

Publication number
WO2021179144A1
WO2021179144A1 PCT/CN2020/078479 CN2020078479W WO2021179144A1 WO 2021179144 A1 WO2021179144 A1 WO 2021179144A1 CN 2020078479 W CN2020078479 W CN 2020078479W WO 2021179144 A1 WO2021179144 A1 WO 2021179144A1
Authority
WO
WIPO (PCT)
Prior art keywords
vehicle
login
mobile terminal
binding code
code
Prior art date
Application number
PCT/CN2020/078479
Other languages
English (en)
French (fr)
Inventor
金鑫垚
王军
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN202080097282.5A priority Critical patent/CN115136625B/zh
Priority to EP20924813.7A priority patent/EP4106357A4/en
Priority to KR1020227034216A priority patent/KR20220150346A/ko
Priority to PCT/CN2020/078479 priority patent/WO2021179144A1/zh
Priority to JP2022553020A priority patent/JP7440130B2/ja
Publication of WO2021179144A1 publication Critical patent/WO2021179144A1/zh
Priority to US17/939,804 priority patent/US20230006991A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • This application relates to the field of connected cars and smart cars, in particular to a method and related devices for logging in to a car-machine system.
  • the car-machine system uses a user account login mechanism to implement personalized vehicle configuration for users based on the user account.
  • a user account login mechanism to implement personalized vehicle configuration for users based on the user account.
  • the personalized configuration of the vehicle and machine system such as automatic driving data, driving behavior habit data, vehicle seat rearview mirror adjustment data, and driving mode.
  • users can use their own user accounts to log in to the vehicle systems of different vehicles, and different vehicles can also provide the driver with services that meet the driver’s personal habits through the personalized data of the user account.
  • My" smart car experience can be used to use their own user accounts to log in to the vehicle systems of different vehicles, and different vehicles can also provide the driver with services that meet the driver’s personal habits through the personalized data of the user account. My" smart car experience.
  • the mobile app and the car are connected via Bluetooth.
  • the Bluetooth near field communication range When the mobile phone and the car are within the Bluetooth near field communication range, data transmission and account verification are performed. After passing, the account login is completed. In this way, if there is no account information on the car terminal, the account login before getting on the car cannot be completed, so it is necessary to complete the login in advance and store the account information locally; in addition, the Bluetooth near field communication method is easy to be caught Following the attack, after intercepting the Bluetooth signal, the Bluetooth signal can be copied to complete the account login. If the account contains the vehicle control authority, the vehicle control authority is obtained indirectly.
  • the user remotely sends instructions through the mobile phone, and sends the instructions to the vehicle through the telematics service provider (TSP), and the vehicle completes the remote login.
  • TSP telematics service provider
  • the user needs to determine the time of getting on the bus by himself, and then complete the account login in advance, and the user experience is poor.
  • the embodiments of the present application provide a method and related devices for logging in to a vehicle system, so as to provide a convenient and safe solution for logging in to a vehicle system.
  • a method for logging in to an in-vehicle system which is used to request a first user account to log in on an in-vehicle system on the mobile terminal side.
  • the method includes: establishing a near-field communication link between a mobile terminal and a car machine, the car machine corresponding to the car-machine system; negotiating and logging in a binding code with the car machine through the near-field communication link;
  • the login binding code is provided, and the login binding code is used by the network-side device to verify whether it is possible to log in with the first user account on the vehicle system.
  • the method provided in the first aspect described above can be executed by a mobile terminal, and the mobile terminal mentioned here may be a mobile terminal device or a device capable of supporting the functions required by the mobile terminal device to implement the method, such as a chip system.
  • the mobile terminal device is a mobile phone.
  • the mobile terminal establishes a near field communication connection with the vehicle and the vehicle, and negotiates the login binding code with the vehicle through the near field communication link, so that the network side device can verify whether it can be on the vehicle system according to the login binding code.
  • Log in with the first user account in the mobile terminal In this method, the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of a near field communication relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
  • the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. At least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
  • mode 1 to mode 3 is as follows.
  • Manner 1 The mobile terminal sends a first login request message to the vehicle through the near field communication link; receives a login request feedback message returned by the vehicle through the near field communication link, in the login request feedback message Including the login binding code, the login binding code is obtained by the vehicle and the machine requesting the network side device; the providing the login binding code to the network side device includes: The device sends a first verification request message, the first verification request message includes the login binding code, and the first verification request message further includes at least one of the first user account or the vehicle system identification code item.
  • the login binding code determined through negotiation between the mobile terminal and the vehicle system is that the vehicle requests the network side device to obtain the login binding code.
  • the mobile terminal provides the login binding code to the network side device for verification.
  • the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
  • Manner 2 The mobile terminal sends a first binding code request message to the network side device; receives a first binding code feedback message returned by the network side device, and the first binding code feedback message includes the login A binding code; sending a third verification request message to the vehicle through the near field communication link, the third verification request message including the login binding code; the providing the network side device with the login binding
  • the code determination includes: providing the login binding code to the network side device indirectly via sending the third verification request message to the vehicle.
  • the login binding code determined through negotiation between the mobile terminal and the vehicle system is the mobile terminal requesting the network side device to obtain the login binding code.
  • the mobile terminal indirectly provides the login binding code to the network side device for verification via the car machine.
  • the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
  • Manner 3 The mobile terminal sends a first binding code request message to the network side device; receives a first binding code feedback message returned by the network side device, and the first binding code feedback message includes the login A binding code; sending a second login request message to the vehicle through the near field communication link, the second login request message including the login binding code; the providing the network side device with the login binding
  • the code determination includes: sending a first verification request message to the network side device, the first verification request message includes the login binding code, and the first verification request message further includes the first user account Or at least one of the identification codes of the vehicle and machine system.
  • the login binding code determined through negotiation between the mobile terminal and the vehicle system is the mobile terminal requesting the network side device to obtain the login binding code.
  • the mobile terminal provides the login binding code to the network side device (correspondingly, the car machine can also provide the login binding code to the network side device) for verification.
  • the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the mobile terminal and the vehicle to negotiate the login binding code through the near-field communication link.
  • the mobile terminal generates the first login binding code and sends the first login binding code to the vehicle.
  • a login binding code is the finally negotiated login binding code, or the car machine generates the first login binding code and sends the first login binding code to the mobile terminal, the first login binding code is the final negotiated login The binding code, or the mobile terminal generates the first login binding code and sends it to the car machine, the car machine generates the second login binding code based on the first login binding code, and sends the second login binding code to the mobile terminal.
  • the second login binding code is the final negotiated login binding, or the car machine generates the first login binding code and sends it to the mobile terminal, and the mobile terminal generates the second login binding code based on the first login binding code, and then transfers the second login binding code to the mobile terminal.
  • the login binding code is sent to the vehicle, and the second login binding code is the final negotiated login binding, etc., which is not limited in the embodiment of the application.
  • the mobile terminal logging in the binding code to the network side device provider includes: the mobile terminal sends a first verification request message to the network side device, and the first verification request message includes the login binding code , The first verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the login binding code is generated by the car machine and/or the mobile terminal.
  • the mobile terminal can send the login binding code to the network side device for verification, and the car machine can also send the login binding code to the network side device for verification.
  • the login binding code can verify the relationship between the vehicle and the mobile terminal, which helps to improve the security of the login vehicle system.
  • the method further includes: logging in to a first application program with the first user account on the mobile terminal, and the network side device is The application server of the first application.
  • the first application program may be any application program in the mobile terminal, for example, Baidu map, altitude map, or other applications.
  • the application server corresponding to the first application verifies whether the first user account logged in by the first application can be used to log in to the vehicle system, so as to avoid using other servers to send the first user account to other services, which may lead to user information failure. Loss, to a certain extent, improve user information security.
  • the method further includes: the mobile terminal receives a verification feedback message sent by the network side device.
  • the network side device after the network side device completes the verification, it can send verification feedback information to the mobile terminal, for example, whether the verification is passed or not, so as to prompt the user to log in successfully or fail.
  • the method further includes: a mobile terminal receiving a login success message sent by the vehicle.
  • a login success message is sent to the mobile terminal to prompt the user that the vehicle system is successfully logged in.
  • the first verification request message or the second login request message further includes the mobile terminal identification code or the vehicle identification code At least one of.
  • the network side device may be known. For example, after the mobile terminal logs in to the first application with the first user account and reports the mobile terminal identification code to the network side device, then the network side device The corresponding relationship between the first user account and the mobile terminal identification code is determined. If the mobile terminal identification code is included in the first verification request message, it is possible to more accurately verify whether the vehicle system can be logged in with the first user account, which improves the security of vehicle system login.
  • the network-side device may be known for the vehicle identification code.
  • the vehicle identification code is reported to the network-side device. If the vehicle identification code is included in the first verification request message, it is possible to more accurately verify whether the vehicle system can be logged in with the first user account, thereby improving the security of vehicle system login.
  • the method further includes: the mobile terminal communicates to the vehicle based on the near field communication link.
  • the locomotive sends a locomotive system activation request, and the locomotive system activation request is used to activate the locomotive system.
  • the mobile terminal realizes the automatic startup of the car-machine system through the near field communication link, which is convenient to operate.
  • the vehicle system start request is sent when the distance between the mobile terminal and the vehicle machine is less than a first threshold.
  • the mobile terminal when the mobile terminal determines that the distance to the vehicle is less than the first threshold, it sends the vehicle system activation request to the vehicle to avoid accidentally triggering the vehicle system activation when the mobile terminal is far from the vehicle. , The operation is convenient and the safety is high.
  • a method for logging in to the vehicle system is also provided, which is used to log in the vehicle system with a first user account on the vehicle, wherein the vehicle and the vehicle system correspond to the vehicle and the vehicle system.
  • the method includes: establishing a near field communication link with a mobile terminal, the mobile terminal being used to issue a request to log in to the vehicle system with the first user account; and negotiating login binding with the mobile terminal through the near field communication link.
  • Fixed code provide the login binding code to the network side device, the login binding code is used by the network side device to verify whether it can log in with the first user account on the vehicle system; receive the A login instruction message sent by the network side device, where the login instruction message is used to instruct to log in to the first user account on the vehicle system; and to log in to the first user account on the vehicle system.
  • the method provided in the second aspect described above can be executed by a car machine or a device capable of supporting the car machine to realize the functions required by the method, such as a chip system.
  • the car machine establishes a near field communication connection with the mobile terminal, and negotiates the login binding code with the mobile terminal through the near field communication link, so that the network side device can verify whether it can be on the car machine system according to the login binding code.
  • Log in with the first user account in the mobile terminal In this method, the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated between the car and the mobile terminal, and the login binding code can verify the existence of an association relationship between the car and the mobile terminal, which helps to improve the security of the login car system.
  • the login binding code may be generated by a network side device.
  • the login binding code is a mobile terminal identification used by the network side device to identify the mobile terminal according to the first user account.
  • Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system.
  • mode 1 to mode 3 is as follows.
  • Manner 1 The vehicle receives a first login request message from the mobile terminal through the near field communication link; sends a second binding code request message to the network side device; receives the second binding code returned by the network side device.
  • a fixed code feedback message, the second binding code feedback message includes the login binding code;
  • a login request feedback message is sent to the mobile terminal through the near field communication link, and the login request feedback message includes all The login binding code;
  • the providing the login binding code to the network side device includes: indirectly providing the login binding code to the network side device via sending the login request feedback message to the mobile terminal code.
  • the login binding code determined by the vehicle machine and the mobile terminal through negotiation is the vehicle machine's request to the network side device to obtain the login binding code.
  • the car machine indirectly provides the login binding code to the network side device for verification via the mobile terminal.
  • the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated between the car and the mobile terminal, and the login binding code can verify the existence of an association relationship between the car and the mobile terminal, which helps to improve the security of the login car system.
  • Manner 2 The vehicle receives a first login request message from the mobile terminal through the near field communication link; sends a second binding code request message to the network side device; receives the second binding code returned by the network side device.
  • a fixed code feedback message, the second binding code feedback message includes the login binding code;
  • a login request feedback message is sent to the mobile terminal through the near field communication link, and the login request feedback message includes all The login binding code;
  • the providing the login binding code to the network side device includes: sending a second verification request message to the network side device, and the second verification request message includes the login binding code ,
  • the second verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the login binding code determined through negotiation between the vehicle and the mobile terminal is the vehicle request to the network side device to obtain the login binding code.
  • the car machine provides the login binding code to the network side device for verification.
  • the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
  • Manner 3 The vehicle receives a third verification request message or a second login request message from the mobile terminal through the near field communication link, and the third verification request message or the second login request message includes the login Binding code, wherein the login binding code is obtained by the mobile terminal upon request from the network side device; the providing the login binding code to the network side device includes: sending to the network side device A second verification request message, where the second verification request message includes the login binding code.
  • the login binding code determined through negotiation between the car machine and the mobile terminal is the mobile terminal requesting the network side device to obtain the login binding code.
  • the car machine provides the login binding code to the network side device (correspondingly, the mobile terminal may also provide the login binding code to the network side device) for verification.
  • the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the mobile terminal providing the login binding code to the network side device includes: sending a second verification request message to the network side device, where the second verification request message includes the login binding code, so The second verification request message also includes at least one of the first user account or the vehicle system identification code.
  • the login binding code is generated by the car machine and/or the mobile terminal.
  • the mobile terminal can send the login binding code to the network side device, and the car machine can also send the login binding code to the network side device.
  • the binding code can verify the relationship between the vehicle and the mobile terminal, which helps to improve the security of logging in to the vehicle system with the user account in the mobile terminal.
  • the network-side device is an application server of a first application
  • the first application is configured to run on the mobile terminal to issue A request for the first user account to log in to the vehicle system.
  • the first application program may be any application in the mobile terminal, for example, Baidu map, altitude map, or other applications.
  • the application server corresponding to the first application verifies whether the first user account logged in the first application can be used to log in to the vehicle system, so as to avoid using other servers to send the first user account to other services, which may lead to user information failure. Loss, to a certain extent, improve user information security.
  • the method further includes: the car machine receives the personalized login data of the first user account from the network side device, and according to the personality And set up the car-machine system based on the log-in data.
  • the first user account includes the user’s personalized login data, such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc. After the vehicle system logs in to the first user account, you can use the personality Log in data to set up the car-machine system to provide drivers with driving services in line with personal habits.
  • personalized login data such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc.
  • the method further includes: the vehicle machine sends a login success message to the mobile terminal.
  • a login success message is sent to the mobile terminal to prompt the user that the vehicle system is successfully logged in.
  • the login request feedback message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code One item.
  • the network side device may be known. For example, after the mobile terminal logs in to the first application with the first user account and reports the mobile terminal identification code to the network side device, then the network side device The corresponding relationship between the first user account and the mobile terminal identification code is determined. If the second verification request message includes the mobile terminal identification code, it is possible to more accurately verify whether the first user account can be used to log in to the vehicle system, which improves the security of vehicle system login.
  • the network-side device may be known for the vehicle identification code.
  • the vehicle identification code is reported to the network-side device.
  • the second verification request message includes the vehicle identification code, so that it can be more accurately verified whether the vehicle system can be logged in with the first user account, and the security of the vehicle system login can be improved.
  • the method further includes: receiving from the mobile terminal based on the near field communication link A vehicle-motor system activation request, and the vehicle-motor system activation request is used to activate the vehicle-motor system.
  • the mobile terminal realizes the automatic startup of the car-machine system through the near field communication link, which is convenient to operate.
  • a method for logging in to the vehicle system is also provided, which is used to verify on a network side device to log in to the vehicle system with a first user account.
  • the method includes: according to the login binding code, the first The verification of the user account and the vehicle system identification code used to identify the vehicle system can log in to the vehicle system with the first user account, and the login binding code is used to verify the establishment between the mobile terminal and the vehicle system.
  • the car machine corresponds to the car machine system; the login binding code is also used to verify that the user holding the mobile terminal requests to use the first user account on the car machine Log in to the vehicle system; send a login instruction message to the vehicle, where the login instruction message is used to instruct to log in to the vehicle system with the first user account on the vehicle.
  • the method provided by the above third aspect may be executed by a network-side device or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine through the near field communication link, so the login binding code can verify that the mobile terminal and the car machine have established a near field communication link, and can also verify that the mobile terminal and the car machine have established a near field communication link.
  • the user of the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle. In this method, the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
  • the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
  • the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. At least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
  • the method further includes: A binding code application message is received from the vehicle or the mobile terminal, and the binding code application message includes the first user account, the mobile terminal identification code used to identify the mobile terminal, and the mobile terminal identification code used to identify the mobile terminal. At least one of the vehicle and vehicle system identification code of the vehicle and vehicle system or the vehicle and vehicle identification code used to identify the vehicle and vehicle; according to the binding code application message, the login binding code is generated, and the The vehicle or the mobile terminal sends a binding code feedback message, and the binding code feedback message includes the login binding code.
  • the network side device generates a login binding code based on at least one of the first user account, mobile terminal identification code, vehicle system identification code, or vehicle identification code, and binds it through the login.
  • the fixed code can verify the relationship between the car machine and the mobile terminal, which helps to improve the security of logging in to the car machine system with the user account in the mobile terminal.
  • the network side device can log in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • the vehicle system identification code used to identify the vehicle system.
  • mode 1 to mode 3 is as follows.
  • Manner 1 The network side device receives a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user account Or at least one of the vehicle system identification codes; determining that the login binding code in the first verification request message is consistent with the generated login binding code; determining that the vehicle can be logged in with the first user account ⁇ Machine system.
  • the login binding code is generated by the network side device and sent to the car machine.
  • the login binding code is received from the mobile terminal side, indicating that there is an association relationship between the mobile terminal and the car machine, which helps to improve the login car machine system It is safe and does not require the user to judge the boarding time by himself, and the vehicle system does not need to pre-log in the first user account, which is convenient to operate.
  • Manner 2 The network side device receives a second verification request message from the vehicle, the second verification request message includes the login binding code; the second verification request message also includes the first user account Or at least one of the vehicle system identification codes; determining that the login binding code in the second verification request message is consistent with the generated login binding code; determining that the vehicle can be logged in with the first user account ⁇ Machine system.
  • the login binding code is generated by the network side device and sent to the mobile terminal.
  • the login binding code is received from the vehicle side, indicating that there is an association relationship between the mobile terminal and the vehicle, which helps to improve the login vehicle system It is safe and does not require the user to judge the boarding time by himself, and the vehicle system does not need to pre-log in the first user account, which is convenient to operate.
  • Manner 3 The network side device receives a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user account Or at least one of the vehicle and machine system identification codes; the network side device receives a second verification request message from the vehicle and machine, and the second verification request message includes the login binding code; the second verification The request message also includes at least one of the first user account or the vehicle system identification code; it is determined that the login binding code in the first verification request message and the second verification request message is consistent with the The generated login binding codes are consistent; it is determined that the vehicle system can be logged in with the first user account.
  • the login binding code is generated by the network side device, and the login binding code is received from the car machine and the mobile terminal respectively, indicating that there is an association relationship between the mobile terminal and the car machine, which helps to improve the security of the login car machine system
  • users do not need to judge the boarding time by themselves, and the vehicle system does not need to log in to the first user account, which is convenient to operate.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated by the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the network side device can log in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • the method may be: receiving a first verification request message from the mobile terminal, and receiving a second verification request message from the vehicle; wherein, the first verification request message includes the first user account and the login Binding code; the second verification request message includes the vehicle system identification code and the login binding code; or, the second verification request message includes the first user account and the login binding code
  • the first verification request message includes the vehicle system identification code and the login binding code; determining that the login binding code in the first verification request message and the second verification request message are consistent; confirm The vehicle system can be logged in with the first user account.
  • the login binding code is generated by the car machine and/or the mobile terminal.
  • the mobile terminal can send the login binding code to the network side device, and the car machine can also send the login binding code to the network side device.
  • the login binding code can better verify the relationship between the vehicle and the mobile terminal, which helps to improve the security of the login vehicle system.
  • the first verification request message or the second verification request message further includes: the mobile terminal identification code or the vehicle identification code At least one of.
  • the first verification request message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code, which can further improve the security of the vehicle login system.
  • the mobile terminal identification code is included in the first verification request message, and if the mobile terminal identification code is known to the network side device, it can be verified whether the mobile terminal identification code in the first verification request message is consistent with the previously known mobile terminal identification If yes, the verification is passed and login security is improved.
  • the method further includes: the network side device sends the personalized login data of the first user account to the car machine, and the personalized login The data is used to set up the car-machine system.
  • the first user account includes the user’s personalized login data, such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc. After the vehicle system logs in to the first user account, you can use the personality Set up the car-machine system with log-in data to provide the driver with a driving experience in line with the user’s personal habits.
  • personalized login data such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc.
  • the network-side device is an application server of a first application
  • the first application runs on the mobile terminal and is used to initiate A request for a user account to log in to the vehicle system.
  • the first application program may be any application in the mobile terminal, for example, Baidu map, altitude map, or other applications.
  • the application server corresponding to the first application verifies whether the first user account logged in the first application can be used to log in to the vehicle system, so as to avoid using other servers to send the first user account to other services, which may lead to user information failure. Loss, to a certain extent, improve user information security.
  • a device for logging in to the vehicle and machine system including: a communication unit for establishing a near-field communication link with the vehicle and machine, the vehicle and machine corresponding to the vehicle and machine system; and a processing unit for passing through the The near-field communication link negotiates a login binding code with the vehicle; the communication unit is also used to provide the network side device with the login binding code, and the login binding code is used for the network side device verification Whether it is possible to log in with the first user account on the vehicle system.
  • the device for logging in to the vehicle system provided by the fourth aspect described above may be a mobile terminal, or a device capable of supporting the functions required by the mobile terminal to implement the method, such as a chip system.
  • the mobile terminal is a mobile phone.
  • the communication unit may include a receiving unit and a transmitting unit.
  • the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. At least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
  • the communication unit is further configured to send a first login request message to the vehicle through the near field communication link; the communication unit is also configured to receive a return from the vehicle through the near field communication link
  • a login request feedback message the login request feedback message includes the login binding code, and the login binding code is obtained by the car machine requesting the network side device; the communication unit is used to communicate with the network
  • the side device provides the login binding code, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes the login binding code, and the first verification request message also At least one of the first user account or the vehicle system identification code is included.
  • the communication unit is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, where the first binding code feedback message includes The login binding code; the communication unit is further configured to send a third verification request message to the vehicle through the near field communication link, and the third verification request message includes the login binding code;
  • the communication unit is used to provide the login binding code to the network side device, it specifically includes: indirectly providing the login binding code to the network side device via sending the third verification request message to the vehicle. Fixed code.
  • the communication unit is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, the first binding code feedback message Includes the login binding code; the communication unit is further configured to send a second login request message to the vehicle through the near field communication link, and the second login request message includes the login binding code
  • the communication unit is used to provide the login binding code to the network-side device, it specifically includes: sending a first verification request message to the network-side device, and the first verification request message includes the login binding
  • the code is fixed, and the first verification request message further includes at least one of the first user account or the vehicle system identification code.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the communication unit when used to provide the login binding code to the network side device, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes For the login binding code, the first verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the processing unit is further configured to: log in to the first application program with the first user account on the mobile terminal, and the network side device Is the application server of the first application.
  • the communication unit is further configured to: receive a verification feedback message sent by the network side device.
  • the communication unit is further configured to: receive a login success message sent by the vehicle.
  • the first verification request message or the second login request message further includes the mobile terminal identification code or the vehicle identification code At least one of.
  • the communication unit is further configured to: communicate to the vehicle based on the near field communication link.
  • the locomotive sends the locomotive system activation request, and the locomotive system activation request is used to activate the locomotive system.
  • the vehicle-machine system activation request is sent when the distance between the mobile terminal and the vehicle-machine is less than a first threshold.
  • an apparatus for logging in to an in-vehicle system including: a communication unit, configured to establish a near field communication link with a mobile terminal, and the mobile terminal is configured to issue a login to the in-vehicle system with the first user account
  • the processing unit is used to negotiate a login binding code with the mobile terminal through the near field communication link; the communication unit is also used to provide the login binding code to the network side device, and the login binding The code is used by the network-side device to verify whether it is possible to log in with the first user account on the vehicle system; the communication unit is also used to receive a login instruction message sent by the network-side device, the login instruction The message is used to instruct to log in the first user account on the vehicle system; the processing unit is also used to log in the first user account on the vehicle system.
  • the device for logging in to the vehicle system provided by the fifth aspect may be a vehicle, or a device capable of supporting the vehicle to implement the functions required by the method, such as a chip system.
  • the communication unit may include a receiving unit and a transmitting unit.
  • the login binding code may be generated by a network side device.
  • the login binding code is a mobile terminal identification used by the network side device to identify the mobile terminal according to the first user account.
  • Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system.
  • the communication unit is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, where the second binding code feedback message includes the login binding code; the communication unit is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
  • the login request feedback message includes the login binding code; when the communication unit is used to provide the login binding code to the network side device, it specifically includes: indirectly sending the login binding code to the mobile terminal via A login request feedback message is used to provide the login binding code to the network side device.
  • the communication unit is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, where the second binding code feedback message includes the login binding code; the communication unit is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
  • the login request feedback message includes the login binding code; when the communication unit is used to provide the login binding code to the network side device, it specifically includes: sending a second verification request to the network side device Message, the second verification request message includes the login binding code, and the second verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the communication unit is further configured to receive a third verification request message or a second login request message from the mobile terminal through the near field communication link, where the third verification request message or the second login request message includes The login binding code, wherein the login binding code is obtained by the mobile terminal upon request from the network side device; when the communication unit is used to provide the login binding code to the network side device, Specifically, it includes: sending a second verification request message to the network side device, where the second verification request message includes the login binding code.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the communication unit when used to provide the login binding code to the network-side device, it specifically includes: sending a second verification request message to the network-side device, where the second verification request message includes all For the login binding code, the second verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the network side device is an application server of a first application
  • the first application is configured to run on the mobile terminal to issue A request for the first user account to log in to the vehicle system.
  • the method further includes: receiving personalized login data of the first user account from the network side device, and logging in according to the personalized The data sets the car-machine system.
  • the method further includes: sending a login success message to the mobile terminal.
  • the login request feedback message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code One item.
  • the method further includes: receiving from the mobile terminal based on the near field communication link A vehicle-on-vehicle system activation request, where the vehicle-on-vehicle system activation request is used to activate the vehicle and vehicle system.
  • a device for logging in to a vehicle system including: a processing unit, configured to verify the vehicle system identification code based on the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system Log in to the vehicle system with the first user account, the login binding code is used to verify that a near field communication link is established between the mobile terminal and the vehicle, and the vehicle and the vehicle are corresponding to the vehicle system; The login binding code is also used to verify that the user holding the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle; the communication unit is used to send a login to the vehicle An instruction message, where the login instruction message is used to instruct to log in to the vehicle system with the first user account on the vehicle.
  • the vehicle-machine system login device provided by the above sixth aspect may be a network-side device, or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
  • the communication unit may include a receiving unit and a transmitting unit.
  • the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. Generated by at least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
  • the communication unit receives a binding code application message from the car machine or the mobile terminal, and the binding code application message includes the first user account and the mobile terminal identification used to identify the mobile terminal.
  • Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system; the processing unit is specifically configured to: apply according to the binding code Message to generate the login binding code, the communication unit is further configured to send a binding code feedback message to the car machine or the mobile terminal, and the binding code feedback message includes the login binding code.
  • the network side device can log in the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • the vehicle system identification code used to identify the vehicle system.
  • the communication unit of the network side device is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes all At least one of the first user account or the vehicle system identification code; the processing unit is configured to determine that the login binding code in the first verification request message is consistent with the generated login binding code; the processing unit It is also used to determine that the vehicle system can be logged in with the first user account.
  • the communication unit is configured to receive a second verification request message from the vehicle, the second verification request message includes the login binding code; the second verification request message also includes the first user At least one of the account number or the vehicle system identification code; the processing unit is used to determine that the login binding code in the second verification request message is consistent with the generated login binding code; the processing unit is also used to determine The vehicle system can be logged in with the first user account.
  • the communication unit is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user At least one of the account number or the vehicle system identification code; the communication unit is further configured to receive a second verification request message from the vehicle machine, and the second verification request message includes the login binding code; The second verification request message also includes at least one of the first user account or the vehicle system identification code; the processing unit is specifically configured to determine the first verification request message and the second verification request
  • the login binding code in the message is consistent with the generated login binding code; the processing unit is also used to determine that the vehicle system can be logged in with the first user account.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated by the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the processing unit is used to verify that the first user account is used to log in to the vehicle system according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • a communication unit for receiving a first verification request message from the mobile terminal and a second verification request message from the vehicle wherein, the first verification request message includes the first user account And the login binding code; the second verification request message includes the vehicle system identification code and the login binding code; or, the second verification request message includes the first user account and the Login binding code; the first verification request message includes the vehicle system identification code and the login binding code;
  • the processing unit is specifically configured to determine the first verification request message and the second verification
  • the login binding codes in the request message are consistent; the processing unit is also used to determine that the vehicle system can be logged in with the first user account.
  • the first verification request message or the second verification request message further includes: the mobile terminal identification code or the vehicle identification code At least one of.
  • the method further includes: sending personalized login data of the first user account to the vehicle, where the personalized login data is used for Set up the car-machine system.
  • the network-side device is an application server of a first application, and the first application runs on the mobile terminal and is used to initiate A request for a user account to log in to the vehicle system.
  • a device for logging in to a vehicle system including: a transceiver for establishing a near-field communication link with the vehicle and the vehicle, the vehicle and the vehicle system corresponding to the vehicle; The near field communication link negotiates a login binding code with the vehicle; the transceiver is also used to provide the network side device with the login binding code, and the login binding code is used for the network side device verification Whether it is possible to log in with the first user account on the vehicle system.
  • the device for logging in to the vehicle system provided by the seventh aspect described above may be a mobile terminal, or a device capable of supporting the functions required by the mobile terminal to implement the method, such as a chip system.
  • the mobile terminal is a mobile phone.
  • the communication unit may include a receiving unit and a transmitting unit.
  • the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. Generated by at least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
  • the transceiver is further configured to send a first login request message to the vehicle through the near field communication link; the transceiver is also configured to receive a login request returned by the vehicle through the near field communication link Feedback message, the login request feedback message includes the login binding code, the login binding code is obtained by the vehicle machine requesting the network side device; the transceiver is used to communicate to the network side device
  • the login binding code specifically includes: sending a first verification request message to the network side device, where the first verification request message includes the login binding code, and the first verification request message further includes all At least one of the first user account or the vehicle system identification code.
  • the transceiver is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, where the first binding code feedback message includes The login binding code; the transceiver is also used to send a third verification request message to the vehicle through the near field communication link, and the third verification request message includes the login binding code;
  • the transceiver is used to provide the login binding code to the network side device, it specifically includes: indirectly providing the login binding code to the network side device via sending the third verification request message to the vehicle. Fixed code.
  • the transceiver is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, where the first binding code feedback message includes The login binding code; the transceiver is also used to send a second login request message to the vehicle through the near field communication link, and the second login request message includes the login binding code;
  • the transceiver is used to provide the login binding code to the network side device, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes the login binding code , The first verification request message further includes at least one of the first user account or the vehicle system identification code.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the transceiver when used to provide the login binding code to the network side device, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes For the login binding code, the first verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the processing unit is further configured to: log in to the first application program with the first user account on the mobile terminal, and the network side device Is the application server of the first application.
  • the communication unit is further configured to: receive a verification feedback message sent by the network side device.
  • the communication unit is further configured to: receive a login success message sent by the vehicle.
  • the first verification request message or the second login request message further includes the mobile terminal identification code or the vehicle identification code At least one of.
  • the communication unit is further configured to: communicate to the vehicle based on the near field communication link.
  • the locomotive sends a locomotive system activation request, and the locomotive system activation request is used to activate the locomotive system.
  • the vehicle system start request is sent when the distance between the mobile terminal and the vehicle machine is less than a first threshold.
  • a device for logging in to the vehicle system including: a transceiver, configured to establish a near field communication link with a mobile terminal, and the mobile terminal is used to issue a login to the vehicle system with the first user account
  • the processor is configured to negotiate a login binding code with the mobile terminal through the near field communication link; the transceiver is also used to provide the login binding code to the network side device, and the login binding The code is used by the network-side device to verify whether it is possible to log in with the first user account on the vehicle system; the transceiver is also used to receive a login instruction message sent by the network-side device, the login instruction The message is used to instruct to log in the first user account on the vehicle system; the processor is also used to log in the first user account on the vehicle system.
  • the above-mentioned device for logging in to the vehicle system in the eighth aspect may be a vehicle or a device capable of supporting the vehicle to realize the functions required by the method, such as a chip system.
  • the communication unit may include a receiving unit and a transmitting unit.
  • the login binding code may be generated by a network side device.
  • the login binding code is a mobile terminal identification used by the network side device to identify the mobile terminal according to the first user account.
  • Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system.
  • the transceiver is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, the second binding code feedback message includes the login binding code; the transceiver is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
  • the login request feedback message includes the login binding code; when the transceiver is used to provide the login binding code to the network side device, it specifically includes: indirectly sending the login binding code to the mobile terminal via A login request feedback message is used to provide the login binding code to the network side device.
  • the transceiver is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, the second binding code feedback message includes the login binding code; the transceiver is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
  • the login request feedback message includes the login binding code; when the transceiver is used to provide the login binding code to the network side device, it specifically includes: sending a second verification request to the network side device Message, the second verification request message includes the login binding code, and the second verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the transceiver is further configured to receive a third verification request message or a second login request message from the mobile terminal through the near field communication link, where the third verification request message or the second login request message includes The login binding code, wherein the login binding code is obtained by the mobile terminal upon request from the network side device; when the transceiver is used to provide the login binding code to the network side device, Specifically, it includes: sending a second verification request message to the network side device, where the second verification request message includes the login binding code.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the transceiver when used to provide the login binding code to the network-side device, it specifically includes: sending a second verification request message to the network-side device, where the second verification request message includes all For the login binding code, the second verification request message further includes at least one of the first user account or the vehicle system identification code.
  • the network-side device is an application server of a first application
  • the first application is configured to run on the mobile terminal to issue A request for the first user account to log in to the vehicle system.
  • the method further includes: receiving personalized login data of the first user account from the network side device, and logging in according to the personalized The data sets the car-machine system.
  • the method further includes: sending a login success message to the mobile terminal.
  • the login request feedback message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code One item.
  • the method further includes: receiving from the mobile terminal based on the near field communication link A vehicle-motor system activation request, and the vehicle-motor system activation request is used to activate the vehicle-motor system.
  • a device for logging in to a vehicle system including a processor, configured to verify that the vehicle system identification code is used to identify the vehicle system according to the login binding code, the first user account, and the vehicle system identification code.
  • the login binding code is used to verify that a near field communication link is established between the mobile terminal and the vehicle, and the vehicle and the vehicle are corresponding to the vehicle system;
  • the login binding code is also used to verify that the user holding the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle;
  • the transceiver is used to send a login to the vehicle An instruction message, where the login instruction message is used to instruct to log in to the vehicle system with the first user account on the vehicle.
  • the device for logging in to the vehicle and machine system provided in the above-mentioned ninth aspect may be a network-side device, or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
  • the communication unit may include a receiving unit and a transmitting unit.
  • the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. Generated by at least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
  • the transceiver receives a binding code application message from the car machine or the mobile terminal, and the binding code application message includes the first user account and the mobile terminal identification used to identify the mobile terminal.
  • Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system; the processor is specifically configured to: apply according to the binding code Message to generate the login binding code, the transceiver is also used to send a binding code feedback message to the car machine or the mobile terminal, and the binding code feedback message includes the login binding code.
  • the network side device can log in the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • the vehicle system identification code used to identify the vehicle system.
  • the transceiver of the network-side device is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the At least one of the first user account or the vehicle system identification code; the processor is configured to determine that the login binding code in the first verification request message is consistent with the generated login binding code; the processor also uses It is determined that the vehicle system can be logged in with the first user account.
  • the transceiver is configured to receive a second verification request message from the vehicle, the second verification request message includes the login binding code; the second verification request message also includes the first user account Or at least one of the vehicle system identification codes; the processor is used to determine that the login binding code in the second verification request message is consistent with the generated login binding code; the processor is also used to determine The first user account logs in to the vehicle system.
  • the transceiver is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user account Or at least one of the identification codes of the vehicle system; the transceiver is further configured to receive a second verification request message from the vehicle, and the second verification request message includes the login binding code; The second verification request message also includes at least one of the first user account or the vehicle system identification code; the processor is used to determine the first verification request message and the second verification request message The login binding code is consistent with the generated login binding code; the processor is further configured to determine that the vehicle system can be logged in with the first user account.
  • Solution 2 The login binding code is generated by the mobile terminal, or generated by the vehicle, or jointly generated by the mobile terminal and the vehicle.
  • the processor is configured to verify that the vehicle system can be logged in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • a transceiver for receiving a first verification request message from the mobile terminal, and a second verification request message from the vehicle; wherein, the first verification request message includes the first user account and The login binding code; the second verification request message includes the vehicle system identification code and the login binding code; or, the second verification request message includes the first user account and the login Binding code; the first verification request message includes the vehicle system identification code and the login binding code; the processor is specifically configured to determine the first verification request message and the second verification request The login binding code in the message is consistent; the processing unit is also used to determine that the vehicle system can be logged in with the first user account.
  • the first verification request message or the second verification request message further includes: the mobile terminal identification code or the vehicle identification code At least one of.
  • the method further includes: sending personalized login data of the first user account to the vehicle, where the personalized login data is used for Set up the car-machine system.
  • the network-side device is an application server of a first application, and the first application runs on the mobile terminal and is used to initiate A request for a user account to log in to the vehicle system.
  • a device for logging in to a vehicle and machine system including a processor and a memory; the memory stores program instructions, and when the program instructions are executed, the device for logging in to a vehicle and machine system is executed as described above.
  • the vehicle system login device may be a mobile terminal or a device capable of supporting the mobile terminal to implement the functions required by the method provided in the above-mentioned first aspect, such as a chip system.
  • a car-machine system login device including a processor and a memory; the memory stores program instructions, and when the program instructions are executed, the car-machine system log-in device is executed as described above.
  • the device for logging in to the vehicle system may be a vehicle or a device capable of supporting the vehicle to implement the functions required by the method provided in the second aspect, such as a chip system.
  • a device for logging in to a vehicle and machine system including a processor and a memory; the memory stores program instructions, and when the program instructions are executed, the device for logging in to a vehicle and machine system is executed as described above.
  • the vehicle system login device may be a network-side device or a device capable of supporting the network-side device to implement the functions required by the method provided in the third aspect, such as a chip system.
  • a car-machine system login system including: the car-machine system login device provided in the above-mentioned fourth aspect or the seventh aspect, and the car-machine system login provided in the above-mentioned fifth aspect or the eighth aspect Device, and the vehicle-machine system registration device provided in the sixth aspect or the ninth aspect described above.
  • a fourteenth aspect there is also provided a computer-readable storage medium.
  • the computer-readable storage medium includes a computer program.
  • the vehicle-motor system login device executes the above-mentioned first aspect. Provided method.
  • a computer-readable storage medium includes a computer program.
  • the vehicle system login device executes the above-mentioned second aspect. Provided method.
  • a computer-readable storage medium includes a computer program, and when the computer program runs on the processor, the vehicle-motor system login device executes the above-mentioned third aspect Provided method.
  • a computer program product which when the computer program product runs on a processor, causes the vehicle-machine system login device to execute the method provided in the above-mentioned first aspect.
  • a computer program product is also provided.
  • the vehicle system login device executes the method provided in the above second aspect.
  • a computer program product which when the computer program product runs on a processor, causes the vehicle-machine system login device to execute the method provided in the above-mentioned third aspect.
  • FIG. 1 is a schematic diagram of a user account provided by an embodiment of the application and the personalized data contained therein;
  • Fig. 2 is a schematic diagram of a login process of a car-machine system in the prior art
  • Figure 3 is a schematic diagram of another car-machine system login process in the prior art
  • FIG. 4 is a schematic flowchart of the first method for logging in to a vehicle-machine system according to an embodiment of the application;
  • FIG. 5 is a schematic flowchart of a second method for logging in to a vehicle-machine system according to an embodiment of the application
  • FIG. 6 is a schematic flowchart of a third method for logging in to a vehicle-machine system according to an embodiment of the application.
  • FIG. 7 is a schematic flowchart of a fourth method for logging in to a vehicle-machine system according to an embodiment of the application.
  • FIG. 8 is a schematic flowchart of a fifth method for logging in to a vehicle and a machine system according to an embodiment of the application;
  • FIG. 9 is a schematic flowchart of a sixth method for logging in to a vehicle-machine system according to an embodiment of the application.
  • FIG. 10 is a schematic flowchart of a seventh method for logging in to a vehicle-machine system according to an embodiment of the application;
  • FIG. 11 is a schematic flowchart of an eighth method for logging in to a vehicle-machine system according to an embodiment of the application.
  • FIG. 12 is a structural block diagram of a vehicle-machine system login device provided by an embodiment of the application.
  • FIG. 13 is a structural block diagram of a device for logging in to a vehicle and machine system provided by an embodiment of the application.
  • the mobile terminals involved in the embodiments of this application such as mobile phones, tablet computers, wearable devices (such as glasses, gloves, watches, bracelets, clothing and shoes, etc.), vehicle-mounted devices (or called vehicle-mounted terminals), and augmented reality (augmented reality (AR)/virtual reality (VR) equipment, laptops, ultra-mobile personal computers (UMPC), netbooks, personal digital assistants (PDAs) and other equipment, this application
  • vehicle-mounted devices or called vehicle-mounted terminals
  • AR augmented reality
  • VR virtual reality
  • laptops laptops
  • UMPC ultra-mobile personal computers
  • PDAs personal digital assistants
  • the mobile terminal may also include a relay.
  • the mobile terminal may be any device that has a near field communication link function (for example, a Bluetooth function) and can establish a connection with a network side device, which will not be listed here.
  • a near field communication link function for example, a Bluetooth function
  • the device used to implement the function of the mobile terminal may be a mobile terminal, or a device capable of supporting the terminal to implement the function, such as a chip system, and the device may be installed in the mobile terminal.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the device for implementing the functions of the mobile terminal is a mobile terminal.
  • the application (application, app for short) involved in the embodiments of the present application is a software program that can implement one or more specific functions.
  • one or more applications can be installed in a mobile terminal, for example, instant messaging applications, video applications, audio applications, image capturing applications, and so on.
  • instant messaging applications for example, may include short message applications, WeChat (WeChat), WhatsApp Messenger, Line, photo sharing (Instagram), Kakao Talk, DingTalk, etc.
  • Image capture applications for example, may include camera applications (system cameras or third-party camera applications).
  • Video applications such as Youtube, Twitter, Douyin, iQiyi, Tencent Video, etc.
  • Audio applications for example, may include Google Music, Kugou Music, Xiami, QQ Music, and so on.
  • the network side device involved in the embodiment of the present application may include a server.
  • the network side device may be an application server corresponding to the first application.
  • the first application program here may be an application program related to a car machine.
  • the server is a server corresponding to Baidu Map.
  • the device used to implement the function of the network-side device may be a network-side device, or a device that can support the network-side device to implement the function, such as a chip system, which may be installed in the network-side device .
  • a device that can support the network-side device to implement the function such as a chip system, which may be installed in the network-side device .
  • the device for implementing the function of the network side device is the network side device.
  • the vehicle identification code is an identification code used to identify the vehicle, which can be understood as the identification code of the vehicle hardware, such as the vehicle ID.
  • the vehicle system identification code is an identification code used to identify the vehicle system (can be understood as the software client in the vehicle), which can be understood as the software identification code in the vehicle, such as the serial number (SN) of the vehicle .
  • the mobile terminal identification code is an identification code used to identify the mobile terminal, for example, the model and serial number of the mobile terminal.
  • the terms “system” and “network” in the embodiments of this application can be used interchangeably.
  • “Multiple” refers to two or more than two. In view of this, “multiple” may also be understood as “at least two” in the embodiments of the present application.
  • “At least one” can be understood as one or more, for example, one, two or more. For example, including at least one means including one, two or more, and it does not limit which ones are included. For example, if at least one of A, B, and C is included, then A, B, C, A and B, A and C, B and C, or A and B and C are included. In the same way, the understanding of "at least one" and other descriptions is similar.
  • ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects.
  • Fig. 4 shows a schematic diagram of a communication system provided by an embodiment of the present application.
  • the communication system includes a mobile terminal 100, a car machine 200, and a network side device 300.
  • the mobile terminal 100 is a mobile phone.
  • the first application in the mobile terminal 100 logs in to the first user account.
  • the network side device 300 may be an application server corresponding to the first application program.
  • the mobile terminal 100 establishes a near field communication connection with the car machine 200, such as a Bluetooth connection.
  • the mobile terminal 100 requests to log in with the first user account on the vehicle system of the vehicle 200 through the near field communication link.
  • the mobile terminal 100 and the car machine 200 negotiate the login binding code through the near field communication link, and provide the network side device 300 with the login binding code.
  • the login binding code is used for the network side device to verify whether the car can be logged in with the first user account. ⁇ Machine system.
  • the network side device 300 verifies that the vehicle system can be logged in with the first user account, it sends a login instruction and the personalized data corresponding to the first user account to the vehicle 200.
  • the vehicle system of the vehicle 200 is logged in with the first user account.
  • the car machine 200 does not need to store the user account locally, that is, the car machine system of the car machine 200 does not need to pre-log in with the first user account.
  • the vehicle system of the vehicle 200 can also be automatically logged in.
  • the user does not need to determine the timing of boarding by himself. When the user carries the mobile terminal 100 close to the car system 200, it can automatically log in, which is convenient for operation and has a high user experience.
  • FIG. 4 is only an example of a communication system, and the solution of this application can also be applied to other systems, for example, a communication system for logging in to an aircraft including a mobile terminal, a network side device, and an aircraft/unmanned aerial vehicle.
  • FIG. 5 is a schematic flowchart of a method for logging in to a vehicle and a machine system according to an embodiment of this application. This process can be applied to the communication system shown in FIG. 4. As shown in Figure 5, the process of the method may include:
  • Step 100 Log in to the first application with the first user account on the mobile terminal.
  • the first application program is, for example, AutoNavi Map, Baidu Map, etc., or other applications related to vehicles, which are not limited in the embodiment of the present application.
  • Step 200 The mobile terminal establishes a near field communication link with the vehicle.
  • the near field communication connection is, for example, a Bluetooth link, or other short-distance links.
  • the process of establishing a Bluetooth link between the mobile terminal and the car machine may include Bluetooth pairing, connection, etc., which will not be introduced here too much.
  • the vehicle may judge the mobile terminal requesting the establishment of the Bluetooth link. If the vehicle locally stores the terminal identification of the mobile terminal, it agrees to communicate with the mobile terminal. The terminal establishes a Bluetooth link; otherwise, it refuses to establish a Bluetooth link with the mobile terminal. For example, after the vehicle has established a Bluetooth connection with a certain mobile terminal (for example, the Bluetooth link is established for the first time), the vehicle locally stores the device identification of the mobile terminal. When the certain mobile terminal is close to the vehicle, the vehicle can search for the device identification of the mobile terminal, and when the device identification is consistent with the stored device identification, establish a Bluetooth link with the mobile terminal; otherwise, refuse to communicate with the mobile terminal. The mobile terminal establishes a Bluetooth link. Therefore, it is possible to prevent any mobile terminal from establishing a Bluetooth link with the vehicle, and improve security.
  • the mobile terminal in order to prevent the mobile terminal from establishing Bluetooth connections with multiple vehicles, when the mobile terminal searches for a certain vehicle identification, it can determine whether the vehicle identification is consistent with the locally stored vehicle identification, and if so, send a notification to the vehicle identification.
  • the vehicle corresponding to the identifier initiates a Bluetooth connection; otherwise, the Bluetooth link is not established with the vehicle corresponding to the vehicle identifier. Therefore, it is possible to prevent the mobile terminal from establishing a Bluetooth connection with any vehicle, and improve security.
  • the mobile terminal may establish a near field communication link with the vehicle and the vehicle to accurately establish the near field communication link with the vehicle and the vehicle.
  • the car machine can be automatically powered on, or, after step 200, the mobile terminal sends a power-on request to the car machine to request the car machine system to power on, and the car machine completes after receiving the power-on request
  • the vehicle system is powered on.
  • the mobile terminal may send the power-on request when it is determined that the distance to the vehicle-machine system is less than the first threshold.
  • the first threshold may be smaller than the second threshold, and the specific value is not limited in the embodiment of the present application.
  • the mobile terminal detects that the distance to the vehicle system is gradually shortening, it first establishes a near field communication connection with the vehicle system, and then triggers the vehicle system to be powered on.
  • step 300 the mobile terminal and the car machine negotiate the login binding code through the near field communication link.
  • the mobile terminal and the car machine can negotiate and log in the binding code through the near field communication link in a variety of ways.
  • the login binding code is generated by the network side device.
  • the mobile terminal applies for the login binding code from the network side device and sends the login binding code to the car machine, or the car machine applies for the login binding code to the network side device. Determine the code, and send the login binding code to the mobile terminal.
  • the login binding code is generated by the mobile terminal and sent to the car machine; or, the login binding code is generated by the car machine and sent to the mobile terminal; or, the login binding code is generated by the mobile terminal and the car machine together ,and many more.
  • Step 400 The mobile terminal and/or the car machine provides a login binding code to the network side device, and the login binding code is used for the network side device to verify whether the car machine system can be logged in with the first user account.
  • step 500 the network side device verifies whether the vehicle system can be logged in with the first user account through the login binding code.
  • the verification is passed, it is determined that the vehicle system can be logged in with the first user account, and then the subsequent steps are executed; otherwise, the execution is stopped.
  • the subsequent steps it is also possible to send an indication that the verification is not passed to the car machine or/or the mobile terminal.
  • step 300 there are multiple implementation manners for step 300, and step 400 and step 500 are related to step 300, so step 400 and step 500 also have multiple implementation manners, which will be introduced separately below.
  • step 600 the network side device sends a login instruction and the personalized data of the first user account to the vehicle machine.
  • the login instruction here may be a token, for example.
  • the personalized data of the first user account can be seen in FIG. 1, which will not be repeated here.
  • Step 700 Log in to the vehicle system with the first user account on the vehicle.
  • step 800 the network side device feeds back information to the verification.
  • step 800 and step 900 are optional steps, so they are represented by dashed lines in FIG. 5.
  • the verification feedback information may be, for example, an indication that the network side device has passed or failed the verification of the received login binding code.
  • Step 900 The car machine sends a login success indication to the mobile terminal, which is used to instruct the car machine system to successfully log in to the first user account.
  • the mobile terminal may display prompt information, such as text or pictures, to prompt the user to successfully log in to the vehicle system.
  • step 300 The various implementation manners of step 300 and the corresponding implementation manners of step 400 and step 500 are respectively introduced below.
  • FIG. 6 it is a schematic flowchart of a method for logging in to a vehicle and machine system provided by an embodiment of this application.
  • Figure 6 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 6, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 305; in step 400 in FIG.
  • the device providing the login binding code may include step 401.
  • Step 301 The mobile terminal sends a first login request message to the vehicle.
  • the mobile terminal may send the first login request to the vehicle through the near field communication link.
  • Step 302 The vehicle machine sends a second binding code application message to the network side device.
  • the second binding code application message includes: the first user account, the mobile terminal identification code used to identify the mobile terminal, the vehicle system identification code used to identify the vehicle system, or the vehicle system identification code used to identify the vehicle system. At least one of the vehicle identification codes of the vehicle.
  • the mobile terminal sends at least one of the mobile terminal identification code or the first user account to the car; or, in other steps (not step 200) before step 302, the mobile terminal sends to the car. At least one of the mobile terminal identification code or the first user account; the embodiment of the present application does not limit it.
  • Step 303 The network side device generates a login binding code according to the second binding code request message.
  • the second binding code application message includes the vehicle system identification code, that is, the login binding code is generated according to the vehicle system identification code.
  • the network side device can store the vehicle system identification code and the login binding code Correspondence between. Exemplarily, see Table 1 below for an example of the corresponding relationship.
  • the second binding code request message includes the first user account, that is, the login binding code is generated according to the first user account.
  • the network side device may store the connection between the first user account and the login binding code Correspondence. Exemplarily, see Table 2 below for an example of the corresponding relationship.
  • the second binding code application message includes the vehicle identification code, that is, the login binding code is generated according to the vehicle identification code.
  • the network side device can store the vehicle identification code and the login binding code. Correspondence. Exemplarily, see Table 3 below for an example of the corresponding relationship.
  • the second binding code request message includes the mobile terminal identification code, that is, the login binding code is generated according to the mobile terminal identification code.
  • the network side device can store the mobile terminal identification code and the login binding code. Correspondence. Exemplarily, see Table 4 below for an example of the corresponding relationship.
  • example 1 to example 4 can also be used in combination, for example, example 1 and example 2 are used in combination, for example, the second binding code application message includes the first user account and the vehicle system identification code, that is, login The binding code is generated based on the first user account and the vehicle system identification code.
  • the network side device can store the correspondence between the vehicle system identification code, the first user account and the login binding code. Exemplarily, see Table 5 below for an example of the corresponding relationship.
  • Example 1 It should be understood that other combinations between Example 1 and Example 4 will not be listed here.
  • Step 304 The network side device sends a second binding code feedback message to the vehicle, and the second binding code feedback message includes the login binding code.
  • the second binding code feedback message may also include one or some messages in the second binding code application message, for example: the first user account is used to identify the mobile terminal At least one of the mobile terminal identification code, the vehicle system identification code used to identify the vehicle and the vehicle system, or the vehicle vehicle identification code used to identify the vehicle and the vehicle system.
  • the vehicle identification code may also be carried in the second binding code feedback message.
  • the car machine After receiving the second binding code feedback message, the car machine compares whether the car machine identification code in the second binding code feedback message is consistent with the car machine identification code in the second binding code application message. If they are consistent, it indicates The communication data between the vehicle and the network-side device has not been tampered with, that is, the communication is safe, and the subsequent steps can be continued; otherwise, the execution of the subsequent steps can be stopped.
  • Step 305 The car machine sends a login request feedback message to the mobile terminal, and the login request feedback message includes the login binding code.
  • the login request feedback message may also carry one or some messages in the first login request.
  • the first login request includes the mobile terminal identification code
  • the login request feedback message may also carry the mobile terminal identification code.
  • the mobile terminal After the mobile terminal receives the login request feedback message, it compares whether the mobile terminal identification code in the login request feedback message is consistent with the mobile terminal identification code in the first login request message. If the communication data has not been tampered with, the communication is safe, and the subsequent steps can be continued; otherwise, the execution of the subsequent steps can be stopped.
  • the mobile terminal negotiates with the vehicle to obtain a login binding code, which is generated by the network side device.
  • Step 401 The mobile terminal sends a first verification request message to a network side device, where the first verification request message includes the login binding code.
  • step 500 the network side device verifies whether the vehicle system can be logged in with the first user account according to the login binding code in the first verification request message, if yes, execute the subsequent steps; otherwise, stop executing the subsequent steps.
  • step 500 may include the network-side device determining whether it is possible to log in with the first user account on the vehicle system according to the login binding code, the first user account and the vehicle system identification code, for example, according to the login binding code and The first user account and the vehicle system identification code determine that there is an association relationship between the vehicle and the mobile terminal, and it is determined that the first user account can be logged in on the vehicle system.
  • the login binding code is generated by the network side device according to the first user account and provided to the car machine
  • the first verification request message received by the network side device from the mobile terminal includes the login binding code and the car machine system
  • the identification code indicates that the car machine shared the login binding code with the mobile terminal, indicating that the car machine is associated with the mobile terminal, so it is determined that the first user account can be logged in to the car machine system; otherwise, it cannot be Log in to the first user account on the vehicle system.
  • the first verification request message in step 401 corresponding to different login binding code generation methods can be different, and the corresponding step 500 is The verification method can also be different. The following is introduced separately with different login binding codes.
  • the login binding code is generated by the network side device according to the vehicle system identification code.
  • the first verification request message also includes at least the first user account. Specifically, it includes the following methods:
  • the first verification request message includes the login binding code and the first user account.
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 1 (that is, the above table 1), and determines that the verification is passed; otherwise , The verification failed.
  • the first verification request message includes the login binding code, the first user account, and the vehicle system identification code (for example, the vehicle sends the vehicle system identification code to the mobile terminal through step 305 or step 200).
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 1 (that is, Table 1), and determines that the verification is passed; otherwise, the verification Fail.
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the foregoing example 1 (that is, Table 1), and determines the vehicle in the first verification request message.
  • the machine system identification code is consistent with the vehicle machine system identification code in the corresponding relationship in the above example 1 (that is, Table 1), and the verification is determined to pass; otherwise, the verification fails; this method is safer.
  • the above-mentioned first verification request message may further include at least one of a mobile terminal identification code or a vehicle identification code.
  • the network side device can perform further verification based on the mobile terminal identification code.
  • the mobile terminal identification code is included in the second binding code application message, that is, the mobile terminal identification code is included in the above corresponding relationship (ie, Table 1), then the network side device determines the first verification request When the mobile terminal identification code in the message is consistent with the mobile terminal identification code in the corresponding relationship (that is, Table 1), it is determined that the verification is passed; otherwise, the verification is not passed.
  • the network side device is an application server corresponding to the first application program.
  • the first application program logs in with the first user account, and the first application program reports to the network side device the identification of the mobile terminal.
  • the network side device stores the corresponding relationship A between the first user account and the mobile terminal identification code. Therefore, the network side device receives the second verification request message, the second verification request message including the login binding, the first user account, and the mobile terminal identification code.
  • the network side device determines that the mobile terminal identification code and the first user account in the second verification request message are consistent with the corresponding relationship A, and the login binding code in the second verification request message is bound to the login in Table 1 above When the codes are consistent, the verification is determined to be passed, otherwise, the verification is not passed.
  • the network side device may perform further verification based on the mobile terminal identification code.
  • the second binding code application message includes the vehicle identification code, that is to say, the above corresponding relationship (ie Table 1) also includes the vehicle identification code, then the network side device determines the first verification When the vehicle identification code in the request message is consistent with the vehicle identification code in the corresponding relationship (that is, Table 1), it is determined that the verification is passed; otherwise, the verification is not passed.
  • the login binding code is generated by the network side device according to the first user account
  • the first verification request message also includes at least the vehicle system identification code. Specifically, it includes the following methods.
  • the first verification request message includes the login binding code and the vehicle system identification code (for example, the vehicle sends the vehicle system identification code to the mobile terminal through step 305 or step 200).
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 2 above (ie Table 2), and confirms verification Pass; otherwise, the verification fails.
  • the first verification request message includes the login binding code, the vehicle system identification code, and the first user account.
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 2 (that is, Table 2), and determines that the verification is passed; otherwise, the verification fails. pass through.
  • the network-side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 2 (that is, Table 2), and determines that the first verification request message is the first in the first verification request message. If a user account is consistent with the first user account in the corresponding relationship in Example 2 (that is, Table 2), it is determined that the verification is passed; otherwise, the verification is not passed.
  • the above-mentioned first verification request message may further include at least one of a mobile terminal identification code or a vehicle identification code.
  • a mobile terminal identification code or a vehicle identification code For the role of the mobile terminal identification code or the vehicle identification code in the first verification request message, please refer to the description of the aforementioned case 1, which will not be repeated here.
  • the login binding code is generated by the network side device according to the vehicle identification code
  • the first verification request message also includes at least the vehicle system identification code, the first user account, and the vehicle identification code .
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 3 (ie Table 3), and determines that the verification is passed; otherwise, the verification is not pass through.
  • the network-side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the foregoing example 3 (ie Table 3), and determines that the vehicle machine identification in the first verification request message The code is consistent with the vehicle identification code in the corresponding relationship in the above example 3 (ie, Table 3), and the verification is determined to be passed; otherwise, the verification is not passed.
  • the first verification request message may also include a mobile terminal identification.
  • the login binding code is generated by the network side device according to the mobile terminal identification code, then the first verification request message includes at least the vehicle system identification code, the first user account and the mobile terminal identification code .
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 4 (ie Table 4), and determines that the verification is passed; otherwise, the verification is not pass through.
  • the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 4 (ie Table 4) above, and determines the mobile terminal identification code in the first verification request message If it is consistent with the mobile terminal identification code in the corresponding relationship in the foregoing example 4 (ie, Table 4), it is determined that the verification is passed; otherwise, the verification is not passed.
  • the first verification request message may also include the vehicle identification code.
  • examples 1 to 4 can be used in combination. Assume that example 1 and example 2 are combined, that is, the login binding code is generated by the network side device according to the first user account and the vehicle system identification code. In this case, the first verification request message can be in the above case 1 to case 4. The first verification request message in any of the cases.
  • the above-mentioned generation method of the login binding code is determined by the second binding code application message, and the generation method of the login binding code is related to the content of the first verification message.
  • a possible implementation manner is that the generation method of the login binding code and the content of the first verification request message are pre-appointed. For example, it is agreed in advance that the login binding code is generated according to the first user account, and the first verification request message includes the login binding code and the vehicle identification code; then in actual applications, this agreement is executed, that is, the vehicle is sent by the vehicle.
  • the second binding code application message carries at least the first user account, and the network side device generates the login binding code according to the first user account.
  • the first verification request message sent by the mobile terminal includes the login binding code and the vehicle identification code.
  • the vehicle can be notified that the login binding code is generated based on the first user account.
  • the second binding code feedback message in step 304 carries an indication information 1, which is used to indicate that the login binding code is generated based on the first user account; or, a mark is added to the login binding code, The mark is used to indicate that it is generated according to the first user account, and so on.
  • the car machine informs the mobile terminal that the login binding code is generated according to the first user account through step 305.
  • the login request feedback message in step 305 may carry the indication information 1.
  • the mobile terminal may determine the content of the first verification request message based on the login binding code being generated by the first user account.
  • the specific implementation process please refer to the content of the above case 2, and the description will not be repeated here.
  • FIG. 7 is a schematic flowchart of a method for logging in to a vehicle and a machine system according to an embodiment of this application.
  • Figure 7 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 7, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 305 in FIG. 7. The introduction of step 301 to step 305 is the same as that of Embodiment 1, and will not be repeated here.
  • Step 400 in FIG. 5 includes step 401 and step 402 in FIG. 7.
  • Step 401 The mobile terminal sends a first verification request message to the network side device, where the first verification request includes a login binding code.
  • Step 402 The vehicle machine sends a second verification request message to the network side device, where the second verification request message includes the login binding code.
  • the second verification request message and the first verification request message may be the same or different. Taking the difference between the two as an example, taking the aforementioned case 1 that the login binding code is generated by the network side device according to the vehicle system identification code as an example, the first verification request message may be mode 1.1, and the second verification request message may be mode 1.2. That is to say, in one of the above cases 1 to 4, the first verification request message and the second verification request message may be different.
  • the first verification request message includes the first user account (for example, the method 1.1 or the method 1.2 in the above case 1)
  • the second The verification request message includes the vehicle system identification code (for example, the method 2.1 or the method 2.2 in the above case 2).
  • the first verification request message includes the vehicle system identification code (for example, the method 2.1 or the method 2.2 in the above case 2)
  • the second verification request message includes the first user account (for example, the method 1.1 or the method 1.2 in the above case 1). ).
  • the first verification request message may be the first verification request message in case 3, and the second verification request message may be case 2. 1. A first verification request message in any of the cases 4.
  • Step 500 according to the login binding code in the first verification request message and the second verification request message, verify whether the vehicle system can be logged in with the first user account; if so, continue to perform the subsequent steps, otherwise, stop the execution of the subsequent steps.
  • the verification method for the second verification request message is similar to the verification method for the first verification request message, and will not be repeated here.
  • the network side device determines that the verification of the first verification request message and the second verification request message pass, and determines that the first user account can log in to the vehicle system; otherwise, the first user account cannot be used to log in to the vehicle system.
  • FIG. 8 is a schematic flowchart of a method for logging in to a vehicle and a machine system according to an embodiment of this application.
  • Figure 8 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 8, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 8.
  • Step 400 in FIG. 5 includes step 401 in FIG. 8.
  • Step 301 The mobile terminal sends a first binding code request message to the network side device.
  • the first binding code application message includes at least one of the first user account, mobile terminal identification code, vehicle system identification code, or vehicle identification code.
  • the car machine sends at least one of the car machine system identification code or the car machine identification code to the mobile terminal; for example, it is sent in step 300.
  • the mobile terminal may also send a second login request message (not shown in FIG. 8) to the car machine.
  • the mobile terminal may also send a second login request message (not shown in FIG. 8) to the car machine.
  • the second login request message may be sent before step 301.
  • the car machine may also send a second login request feedback message (not shown in FIG. 8) to the mobile terminal, and the second login request feedback message may include at least one of the car machine system identification code or the car machine identification code.
  • Step 302 The network side device generates a login binding code according to the first binding code request message.
  • step 302 please refer to the generation process of the login binding code in Embodiment 1, for example, Example 1 to Example 4, which will not be repeated here.
  • Step 303 The network side device sends a first binding code feedback message to the mobile terminal, and the first binding code feedback message includes the login binding code.
  • Step 304 The mobile terminal sends a third verification request message to the vehicle, and the third verification request message includes the login binding code.
  • the third verification request message may also include at least one of a mobile terminal identification code or the first user account.
  • the third verification request message may be the above-mentioned second login request message, or it may be sent to the vehicle after the mobile terminal sends the second login request information, and the purpose is to indirectly send all the information to the vehicle.
  • the third verification request message is used to provide the network side device with the login binding code message.
  • Step 401 The vehicle machine sends a second verification request message to the network side device, where the second verification request message includes the login binding code.
  • the content of the second verification request message is related to the manner of generating the login binding code, and reference may be made to the introduction of the first verification request message in Embodiment 1, which will not be repeated here.
  • step 500 the network side device verifies whether the vehicle system can be logged in with the first user account according to the login binding code in the second verification request message, if yes, continue to perform the subsequent steps, otherwise, stop the execution of the subsequent steps.
  • step 500 the verification method in step 500 is also different.
  • the first verification request message in Case 1 to Case 4 in Embodiment 1 needs to be replaced with a second verification request message.
  • FIG. 9 is a schematic flowchart of a method for logging in to a vehicle and machine system according to an embodiment of this application.
  • Figure 9 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 9, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 9.
  • Step 400 in FIG. 5 includes step 401 and step 402 in FIG. 9.
  • step 301 to step 304 that differs from the embodiment shown in FIG. 8 is step 304. Therefore, the description of steps 301 to 303 will not be repeated.
  • Step 304 The mobile terminal sends a second login request message to the vehicle, and the second login request message includes the login binding code.
  • the second login request message may also include at least one of a mobile terminal identification code or the first user account.
  • the mobile terminal after the mobile terminal requests the network side device to obtain the login binding code, it then initiates a login request to the vehicle; and in the embodiment shown in FIG. 8, the mobile terminal first sends The vehicle initiates a login request (for example, sends a second login request to the vehicle before step 304), and then sends a third verification request message to the vehicle, and indirectly sends the third verification request message to the vehicle.
  • the network side device provides the login binding code.
  • Step 401 The mobile terminal sends a first verification request message to the network side device, where the first verification request message includes a login binding code.
  • Step 402 The vehicle machine sends a second verification request message to the network side device, and the second verification request message includes the login binding code.
  • the login binding code there are multiple ways to generate the login binding code.
  • the first verification request message such as the above case 1 to case 4.
  • the second verification request message and the first verification request message may be the same or different.
  • Step 500 The network side device verifies whether the vehicle system can be logged in with the first user account according to the login binding code in the first verification request message and the second verification request message, if yes, continue to perform the subsequent steps, otherwise, stop the subsequent steps Implementation.
  • step 500 refer to the introduction of step 500 in Embodiment 2, and the details will not be repeated.
  • the login binding code is generated by the network-side device.
  • the login binding code may also be generated by the mobile terminal. Either it is generated by the vehicle or the mobile terminal and the vehicle.
  • FIG. 10 is a schematic flowchart of a method for logging in to a vehicle and machine system according to an embodiment of this application.
  • FIG. 10 can be understood as a refinement of some of the steps in FIG. 5. Comparing FIG. 5 and FIG. 10, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 10.
  • Step 400 in FIG. 5 includes step 401 and step 402 in FIG. 10.
  • Step 301 The mobile terminal generates a first login binding code.
  • the mobile terminal may generate the first login binding code according to at least one of the first user account, mobile terminal identification code, vehicle system identification code, or vehicle identification code.
  • the car machine sends at least one of the car machine system identification code or the car machine identification code to the mobile terminal; or, in other steps before step 301, the car machine sends the car machine system identification code to the mobile terminal.
  • at least one of the vehicle identification code which is not limited in the embodiment of the present application.
  • step 303 in Embodiment 1 for example, the foregoing example 1 to example 4
  • the details are not repeated here.
  • Step 302 The mobile terminal sends a login request to the vehicle, and the login request may include the first login binding code.
  • the login request may also include at least one of the first user account or the mobile terminal identification code.
  • Step 303 The car machine generates a second login binding code based on the first login binding code.
  • the first login binding code and the second login binding code may be the same. Then there is no need to perform step 303, so step 303 is represented by a dotted line in the figure.
  • the first login binding code and the second login binding code may be different.
  • the first login binding code is generated by the mobile terminal according to the first user account
  • the second login binding code may be generated by the car machine according to the first login binding code and the car machine system identification code.
  • the car machine generates the third login binding code according to the car machine system identification code.
  • the second login binding code can be a combination of the first login binding code and the third login binding code, such as in the first login binding code Add the third login binding code in, and so on.
  • Step 304 The car machine sends a login request feedback message to the mobile terminal, and the login request feedback message includes the second login binding code.
  • step 304 may carry the first login binding code, or carry the instruction information for agreeing to the first login binding code, or not carry any login binding code; After the mobile terminal receives the login request feedback message, it is determined that the vehicle agrees with the first login binding code.
  • Step 401 The mobile terminal sends a first verification request message to the network side device, where the first verification request message includes the second login binding code, and also includes at least one of the first user account or the vehicle system identification code.
  • the first verification request message may also include a vehicle identification code and/or a mobile terminal identification code.
  • Step 402 The car machine sends a second verification request message to the network side device.
  • the second verification request message includes the second login binding code, and also includes at least one of the first user account or the car machine system identification code.
  • the second verification request message may also include the vehicle identification code and/or the mobile terminal identification code.
  • Step 500 The network side device verifies whether the vehicle system can be logged in to the vehicle system with the first user account according to the second login binding code in the first verification request message and the second verification request message, if yes, continue to perform the subsequent steps, otherwise, stop Execution of subsequent steps.
  • the first verification request message includes the second login binding code and the first user account
  • the second verification request message includes the second login binding code and the vehicle system identification code
  • the first verification request message Includes the second login binding code and the vehicle system identification code
  • the second verification request message includes the second login binding code and the first user account.
  • the network side device determines that the second login binding code in the first verification request message and the second verification request message are the same, and determines that the verification passes, otherwise the verification fails.
  • the first verification request message and the second verification request message also include the vehicle identification code.
  • the network side device determines that the second login binding code in the first verification request message and the second verification request message are the same, and determines that the vehicle identification code in the first verification message and the second verification message are the same, and confirms verification Pass, otherwise, the verification fails.
  • FIG. 11 is a schematic flowchart of a method for logging in to a vehicle-machine system according to an embodiment of this application.
  • Figure 11 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 11, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 11.
  • Step 301 The mobile terminal sends a login request message to the vehicle.
  • the login request message may carry at least one of the first user account or the mobile terminal identification code.
  • Step 302 The car machine generates a first login binding code.
  • the vehicle machine may generate the first login binding code according to at least one of the first user account, mobile terminal identification code, vehicle machine system identification code, or vehicle machine identification code.
  • the vehicle machine may generate the first login binding code according to at least one of the first user account, mobile terminal identification code, vehicle machine system identification code, or vehicle machine identification code.
  • Step 303 The car machine sends a login request feedback message to the mobile terminal, and the login request feedback message includes the first login binding code.
  • Step 304 The mobile terminal generates a second login binding code based on the first login binding code.
  • the first login binding code and the second login binding code may be the same. Then there is no need to perform step 304, so step 304 is represented by a dashed line in the figure.
  • the first login binding code and the second login binding code may be different.
  • the first login binding code is generated by the car machine according to the car machine system identification code
  • the second login binding code may be generated by the mobile terminal according to the first login binding code and the first user account.
  • the mobile terminal generates the third login binding code according to the first user account
  • the second login binding code may be a combination of the first login binding code and the third login binding code, as in the first login binding code Add the third login binding code, and so on.
  • Step 305 The mobile terminal sends a negotiated login binding code message to the vehicle, and the negotiated login binding code message includes the second login binding code.
  • steps 304 to 305 are optional steps, which are represented by dashed lines in FIG. 11. If step 304 and step 305 are not performed, that is, the login binding code negotiated between the car machine and the mobile terminal is the first login binding code. If step 304 and step 305 are executed, that is, the login binding code negotiated between the vehicle and the mobile terminal is the second login binding code.
  • the car machine may also send a negotiated login binding code feedback message to the mobile terminal, and the negotiated login binding code feedback message may include indication information 2 for indicating agreement to the second login binding code, or It includes the second login binding code, or does not include any binding code.
  • step 300 the process of logging in binding codes negotiated by the car machine and the mobile terminal, can also have other implementations.
  • the embodiments of this application are not listed one by one.
  • step 401 to step 401 and step 500 reference may be made to the description of Embodiment 5, and the details will not be repeated.
  • FIG. 12 is a structural block diagram of a device 1200 for logging in to a vehicle and machine system according to an embodiment of the application.
  • the vehicle system login device 1200 is, for example, the above-mentioned mobile terminal, vehicle, or network side device.
  • the vehicle system login device 1200 includes a processing unit 1210 and a communication unit 1220.
  • the vehicle system login device 1200 is the above-mentioned mobile terminal, or a device capable of supporting the mobile terminal to implement the functions required by the method, such as a chip system.
  • the mobile terminal is a mobile phone.
  • the processing unit 1210 may be used to perform all operations performed by the mobile terminal in the embodiments shown in FIGS. 5-11 except for the transceiving operations, such as S100, and/or other processes used to support the technology described herein .
  • the communication unit 1220 may be used to perform all the transceiving operations performed by the mobile terminal in the embodiments shown in FIG. 5 to FIG. 11, such as S200, and/or other processes used to support the technology described herein.
  • the communication unit 1220 can be a functional module that can complete both sending and receiving operations.
  • the communication unit 1220 is a module included in the vehicle system login device 1200, and the communication unit 1220 can be used to execute diagrams. 5-All the sending operations and receiving operations performed by the mobile terminal in the embodiment shown in FIG. 11, for example, when performing a sending operation, the communication unit 1220 can be considered as a sending module, and when performing a receiving operation, it can be considered as a communication
  • the unit 1220 is a receiving module; alternatively, the communication unit 1220 can also be a collective term for two functional modules.
  • the two functional modules are a sending module and a receiving module.
  • the sending module is used to complete the sending operation.
  • the communication unit 1220 is a mobile terminal station.
  • the sending module can be used to perform all the sending operations performed by the mobile terminal in the embodiment shown in FIG. 5 to FIG. 11, and the receiving module is used to complete the receiving operation.
  • the communication unit 1220 is included in the mobile terminal.
  • the receiving module can be used to perform all receiving operations performed by the mobile terminal in the embodiments shown in FIGS. 5 to 11.
  • the communication unit 1220 is used to establish a near-field communication link with the vehicle and the vehicle, and the vehicle and the vehicle corresponds to the vehicle and vehicle system; the processing unit 1210 is used to negotiate and log in with the vehicle and the vehicle through the near-field communication link Binding code; the communication unit 1220 is also used to provide the network side device with the login binding code, the login binding code is used by the network side device to verify whether it can be used on the vehicle system with the first Log in with a user account.
  • the vehicle system registration device 1200 is the aforementioned vehicle, or a device capable of supporting the vehicle to implement the functions required by the method, such as a chip system.
  • the processing unit 1210 may be used to perform all operations performed by the vehicle in the embodiments shown in FIGS. 5 to 11 except for the receiving and sending operations, such as S700, and/or other processes used to support the technology described herein .
  • the communication unit 1220 may be used to perform all the transceiving operations performed by the vehicle in the embodiments shown in FIGS. 5 to 11, such as S200, and/or other processes used to support the technology described herein.
  • the communication unit 1220 may be a functional module that can complete both sending and receiving operations.
  • the communication unit 1220 is a module included in the vehicle, and the communication unit 1220 can be used to execute FIGS. 5-11.
  • all the sending and receiving operations performed by the vehicle and the machine for example, when performing the sending operation, the communication unit 1220 can be considered as the sending module, and when performing the receiving operation, the communication unit 1220 can be considered as the receiving module.
  • the communication unit 1220 can also be a collective term for two functional modules, the two functional modules are respectively a sending module and a receiving module, the sending module is used to complete the sending operation, for example, the communication unit 1220 is a module included in the car, Then the sending module can be used to perform all the sending operations performed by the vehicle in the embodiment shown in Figures 5 to 11, and the receiving module is used to complete the receiving operation.
  • the communication unit 1220 is a module included in the vehicle, then the receiving The module can be used to perform all the receiving operations performed by the vehicle in the embodiment shown in FIG. 5 to FIG. 11.
  • the communication unit 1220 is configured to establish a near field communication link with a mobile terminal, and the mobile terminal is configured to issue a request to log in to the vehicle system with the first user account; and the processing unit 1210 is configured to communicate through the near field
  • the field communication link negotiates the login binding code with the mobile terminal; the communication unit 1220 is also used to provide the network side device with the login binding code, and the login binding code is used by the network side device to verify whether the Log in with the first user account on the vehicle system; the communication unit 1220 is also used to receive a login instruction message sent by the network side device, where the login instruction message is used to instruct to log in on the vehicle system The first user account; the processing unit 1210 is also used to log in the first user account on the vehicle system.
  • the device 1200 for logging in to the vehicle and machine system is the aforementioned network-side device, or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
  • the processing unit 1210 may be used to perform all operations performed by the network side device in the embodiment shown in FIGS. 5-11 except for the transceiving operations, such as S500, and/or other operations used to support the technology described herein. process.
  • the communication unit 1220 may be used to perform all the transceiving operations performed by the network side device in the embodiments shown in FIG. 5 to FIG. 11, such as S600, and/or other processes used to support the technology described herein.
  • the communication unit 1220 can be a functional module that can complete both sending and receiving operations.
  • the communication unit 1220 is a module included in the network side device, and the communication unit 1220 can be used to execute FIG. 5-FIG.
  • all the sending operations and receiving operations performed by the network-side device for example, when the sending operation is performed, the communication unit 1220 can be considered as a sending module, and when the receiving operation is performed, the communication unit 1220 can be considered It is a receiving module; or, the communication unit 1220 can also be a collective term for two functional modules.
  • the two functional modules are a sending module and a receiving module.
  • the sending module is used to complete the sending operation.
  • the communication unit 1220 is included in the network side device.
  • the sending module can be used to perform all the sending operations performed by the network side device in the embodiment shown in Figure 5 to Figure 11, and the receiving module is used to complete the receiving operation.
  • the communication unit 1220 is included in the network side device.
  • the receiving module can be used to perform all receiving operations performed by the network side device in the embodiment shown in FIG. 5 to FIG. 11.
  • the processing unit 1210 is configured to verify that the vehicle system can be logged in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • the login binding code is used to verify that a near field communication link is established between the mobile terminal and the car machine, and the car machine corresponds to the car machine system; the login binding code is also used to verify the possession of all
  • the user of the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle;
  • the communication unit 1220 is further configured to send a login instruction message to the vehicle, and the login instruction message is used to instruct Log in to the vehicle system with the first user account on the vehicle.
  • the division of units in the embodiments of this application is illustrative, and is only a logical function division. In actual implementation, there may be other division methods.
  • the functional units in the various embodiments of this application can be integrated into one processing unit. In the device, it can also exist alone physically, or two or more units can be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the software or firmware includes but is not limited to computer program instructions or codes, and can be executed by a hardware processor.
  • the hardware includes, but is not limited to, various integrated circuits, such as a central processing unit (CPU), a digital signal processor (DSP), a field programmable gate array (FPGA), or an application specific integrated circuit (ASIC).
  • CPU central processing unit
  • DSP digital signal processor
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • FIG. 13 is a schematic diagram of the hardware of the vehicle-machine system login device 1300 provided by an embodiment of the application.
  • the vehicle system login device 1300 includes at least one processor 1301 and at least one memory 1302 for storing program instructions and/or data.
  • the memory 1302 is coupled with the processor 1301.
  • the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units, or modules, which can be electrical, mechanical, or other forms, and is used for information exchange between devices, units, or modules.
  • the processor 1301 may operate in cooperation with the memory 1302, the processor 1301 may execute program instructions stored in the memory 1302, and at least one of the at least one memory 1302 may be included in the processor 1301.
  • the device 1300 for logging in to the vehicle system may further include a communication interface 1303 for communicating with other devices through a transmission medium, so that the device 1300 for logging in to the vehicle system can communicate with other devices.
  • the communication interface may be a transceiver, circuit, bus, module, or other type of communication interface.
  • the transceiver when the communication interface is a transceiver, the transceiver may include an independent receiver, an independent transmitter; a transceiver with integrated transceiver functions, or an interface circuit, etc. may also be integrated.
  • connection medium between the processor 1301, the memory 1302, and the communication interface 1303 is not limited in the embodiment of the present application.
  • the memory 1302, the processor 1301, and the communication interface 1303 are connected by a communication bus 1304 in FIG. 13.
  • the bus is represented by a thick line in FIG. 13, and the connection mode between other components is only a schematic illustration , Not as a limitation.
  • the bus may include an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 13, but it does not mean that there is only one bus or one type of bus.
  • the vehicle system login device 1300 is used to implement the steps executed by the mobile terminal in the above-mentioned flow shown in FIG. 5 to FIG. 11.
  • the vehicle system login device 1300 may be a mobile terminal, or a chip or circuit in the mobile terminal.
  • the communication interface 1303 is used to perform the transceiving operations of the mobile terminal in the above embodiment.
  • the processor 1301 is configured to perform processing related operations of the mobile terminal in the above method embodiment.
  • the communication interface 1303 is used to establish a near field communication link with the vehicle and the vehicle, and the vehicle and the vehicle are corresponding to the vehicle and vehicle system; the processor 1301 is used to negotiate and log in with the vehicle and the vehicle through the near field communication link Binding code; communication interface 1303, which is also used to provide the network side device with the login binding code, and the login binding code is used by the network side device to verify whether it can be used on the vehicle system with the first Log in with a user account.
  • the car-machine system registration device 1300 is used to implement the steps performed by the car-machine in the process shown in Figs. .
  • the communication interface 1303 is used to perform operations related to receiving and sending on the vehicle side in the above embodiment.
  • the processor 1301 is configured to perform processing related operations on the vehicle side in the above method embodiment.
  • the communication interface 1303 is used to establish a near field communication link with a mobile terminal, and the mobile terminal is used to issue a request to log in to the vehicle system with the first user account; the processor 1301 is used to pass the near field communication link.
  • the field communication link negotiates the login binding code with the mobile terminal;
  • the communication interface 1303 is also used to provide the network side device with the login binding code, and the login binding code is used by the network side device to verify whether the Log in with the first user account on the vehicle system;
  • the communication interface 1303 is also used to receive a login instruction message sent by the network side device, where the login instruction message is used to instruct to log in on the vehicle system
  • the first user account; the processor 1301 is further configured to log in the first user account on the vehicle system.
  • the vehicle system login device 1300 is used to implement the steps performed by the network side device in the process shown in FIGS. 5 to 11 above.
  • the vehicle system login device 1300 may be a network side device or a Chip or circuit.
  • the communication interface 1303 is used to perform operations related to sending and receiving on the network side device side in the above embodiment.
  • the processor 1301 is configured to perform processing related operations on the network side device side in the above method embodiment.
  • the processor 1301 is configured to verify that the vehicle system can be logged in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
  • the login binding code is used to verify that a near field communication link is established between the mobile terminal and the car machine, and the car machine corresponds to the car machine system; the login binding code is also used to verify the possession of all
  • the user of the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle;
  • the communication interface 1303 is also used to send a login instruction message to the vehicle, and the login instruction message is used to instruct Log in to the vehicle system with the first user account on the vehicle.
  • the processor may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, and may implement or Perform the methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
  • the general-purpose processor may be a microprocessor or any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
  • the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or a volatile memory (volatile memory), for example Random-access memory (random-access memory, RAM).
  • the memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this.
  • the memory in the embodiments of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
  • the methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software When implemented by software, it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • a computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, hard disk, Magnetic tape), optical media (for example, digital video disc (digital video disc, DVD for short), or semiconductor media (for example, SSD), etc.
  • At least one refers to one or more, and “multiple” refers to two or more.
  • And/or describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
  • "The following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
  • At least one of a, b, or c can mean: a, b, c, a and b, a and c, b and c, or a and b and c, where a, b, c can be single or multiple.
  • this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • the disclosed device and method can be implemented in other ways within the scope of this application.
  • the above-described embodiments are merely illustrative.
  • the division of the modules or units is only a logical function division, and there may be other division methods in actual implementation, for example, multiple units or components may be combined. Or it can be integrated into another system, or some features can be ignored or not implemented.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. .
  • Some or all of the modules can be selected according to actual needs to achieve the objectives of the solutions of the embodiments. Those of ordinary skill in the art can understand and implement without creative work.
  • the described devices and methods and schematic diagrams of different embodiments can be combined or integrated with other systems, modules, technologies, or methods without departing from the scope of the present application.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electronic, mechanical or other forms.

Abstract

本申请涉及一种车机系统登录方法及相关装置。该方法可以应用于车联网,例如V2X、LTE-V、V2V等,或可以用于D2D,智能驾驶,智能网联车等领域。该方法包括:移动终端与车机建立近场通信链接,所述车机与车机系统相对应;通过所述近场通信链接与所述车机协商登录绑定码;向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。该方法中,无需用户自行判断登车时间,操作方便,而且登录绑定码是移动终端与车机协商确定的,通过该登录绑定码能够更好的验证车机与移动终端之间存在近场通信的关联关系,有助于提升以移动终端中的用户账号登录车机系统安全性。

Description

一种车机系统登录方法及相关装置 技术领域
本申请涉及网联汽车及智能汽车领域,尤其涉及一种车机系统登录方法及相关装置。
背景技术
目前,车机系统使用用户账号登录机制,基于用户账号为用户实现个性化的车辆配置。参见图1,车机系统个性化的配置自动驾驶数据、驾驶行为习惯数据、车辆座椅后视镜调节数据和驾驶模式等多个方面。也就是说,用户可以使用自己的用户账号登录不同车机的车机系统,不同车机也可以通过所述用户账号的个性化数据为驾驶员提供符合驾驶员个人习惯的服务,达到“车辆懂我”的智能用车体验。
目前,车机系统的登录方式有如下两种:
第一种方式,如图2,手机App和车机通过蓝牙连接,当手机和车机在蓝牙近场通讯范围内时,进行数据的传输和账户验证,通过后,完成账号的登录。这种方式中,如果车机端没有账号信息,则无法完成上车前的账号登录,因此需预先完成登录,并把账号信息存储在本地;另外,蓝牙近场通讯的方式,很容易被中继攻击,截获蓝牙信号后,可以复制蓝牙信号,完成账号的登录。如果账号包含车辆控制的权限,就间接的获取了车辆控制的权限。
第二种方式,如图3,用户通过手机远程发送指令,通过汽车远程服务提供商(telematics service provider,TSP)发送指令给车机,车机完成远程登录。这种方式中,用户需要自行确定上车时间,然后预先完成账号的登录,用户体验较差。
因此,上述两种方式均有不可避免的缺陷,目前尚无兼顾便捷性和安全性的车机系统登录方式。
发明内容
本申请实施例提供一种车机系统登录方法及相关装置,用以提供一种便捷且安全的登录车机系统的方案。
第一方面,提供一种车机系统登录方法,该方法用于在移动终端侧请求在车机系统上以第一用户账号登录。该方法包括:移动终端与车机建立近场通信链接,所述车机与所述车机系统相对应;通过所述近场通信链接与所述车机协商登录绑定码;向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
上述第一方面提供的方法可由移动终端执行,这里提到的移动终端可以是移动终端设备或能够支持移动终端设备实现该方法所需的功能的装置,例如芯片系统。示例性地,移动终端设备为手机。
本申请实施例中,移动终端与车机建立近场通信连接,并通过近场通信链接与车机协商登录绑定码,以使网络侧设备根据登录绑定码验证是否可以在车机系统上以移动终端中的第一用户账号登录。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是移动终端与车机协商确定的,通过该登录 绑定码能够验证车机与移动终端之间存在近场通信的关联关系,有助于提升登录车机系统安全性。
方案1,上述登录绑定码可以是网络侧设备生成的,例如网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
对于上述方案1,移动终端通过所述近场通信链接与所述车机协商登录绑定码的方式有多种。例如如下方式1-方式3。
方式1,移动终端通过所述近场通信链接向所述车机发送第一登录请求消息;通过所述近场通信链接接收所述车机返回的登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码,所述登录绑定码为所述车机向所述网络侧设备请求得到的;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息包括所述登录绑定码,所述第一验证请求消息还包括所述第一用户账号或所述车机系统识别码中的至少一项。
也就是说,方式1中,移动终端与车机系统协商确定的登录绑定码是车机向网络侧设备请求得到登录绑定码。移动终端将该登录绑定码提供给网络侧设备进行验证。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是移动终端与车机协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方式2,移动终端向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述车机发送第三验证请求消息,所述第三验证请求消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:间接地经由向所述车机发送所述第三验证请求消息来向所述网络侧设备提供所述登录绑定码。
也就是说,方式2中,移动终端与车机系统协商确定的登录绑定码是移动终端向网络侧设备请求得到登录绑定码。移动终端间接的经由车机将该登录绑定码提供给网络侧设备进行验证。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是移动终端与车机协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方式3,移动终端向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述车机发送第二登录请求消息,所述第二登录请求消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
也就是说,方式3中,移动终端与车机系统协商确定的登录绑定码是移动终端向网络侧设备请求得到登录绑定码。移动终端将登录绑定码提供给网络侧设备(对应的,车机也可以将登录绑定码提供给网络侧设备)进行验证。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是移动终端与车机协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方案2,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
示例性,移动终端与车机通过近场通信链接协商登录绑定码的方式有多种,例如,移动终端生成第一登录绑定码并将第一登录绑定码发送给车机,该第一登录绑定码为最终协商的登录绑定码,或者,车机生成第一登录绑定码并将第一登录绑定码发送给移动终端,该第一登录绑定码为最终协商的登录绑定码,或者,移动终端生成第一登录绑定码发送给车机,车机基于第一登录绑定码生成第二登录绑定码,将第二登录绑定码发送给移动终端,该第二登录绑定码为最终协商的登录绑定,或者,车机生成第一登录绑定码发送给移动终端,移动终端基于第一登录绑定码生成第二登录绑定码,将第二登录绑定码发送给车机,该第二登录绑定码为最终协商的登录绑定,等等,本申请实施例不作限定。
对于上述方案2,移动终端向网络侧设备提供商登录绑定码,包括:移动终端向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
应理解,登录绑定码是车机和/或移动终端生成的,移动终端可以将登录绑定码发送给网络侧设备进行验证,车机也可以将登录绑定码发送给网络侧设备进行验证,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
结合第一方面,在第一方面的一种可能的实施方式中,所述方法还包括:在所述移动终端上以所述第一用户账号登录第一应用程序,并且所述网络侧设备为所述第一应用程序的应用服务器。
其中,第一应用程序可以是移动终端中的任一应用程序,例如,百度地图、高度地图,或者其他应用。第一应用程序对应的应用服务器验证是否可以以第一应用登录的第一用户账号登录车机系统,避免使用其他服务器时,在向其他服务为发送第一用户账号的过程中而导致用户信息的丢失,一定程度上提升用户信息安全性。
结合第一方面,在第一方面的一种可能的实施方式中,所述方法还包括:移动终端接收所述网络侧设备发送的验证反馈消息。
也就是说,网络侧设备完成验证之后,可以向移动终端发送验证反馈信息,例如,验证通过或不通过,以便于提示用户登录成功或失败。
结合第一方面,在第一方面的一种可能的实施方式中,所述方法还包括:移动终端接收所述车机发送的登陆成功消息。
也就是说,车机上以第一用户账号登录车机系统之后,向移动终端发送登录成功消息,以提示用户车机系统登录成功。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一验证请求消息或者所述第二登录请求消息中还包括所述移动终端识别码或所述车机识别码中的至少一项。
举例来说,对于移动终端识别码,网络侧设备可以是已知的,例如,移动终端以第一用户账号登录第一应用程序后,向网络侧设备报备移动终端识别码,那么网络侧设备确定第一用户账号与移动终端识别码之间的对应关系。第一验证请求消息中包括移动终端识别码,就能够更准确的验证是否可以以第一用户账号登录车机系统,提升车机系统登录安全性。
再例如,假设对于车机识别码,网络侧设备可以是已知的,例如,车机向网络侧设备请求登录绑定码时,向网络侧设备报备车机识别码。第一验证请求消息中包括车机识别码, 就能够更准确的验证是否可以以第一用户账号登录车机系统,提升车机系统登录安全性。
结合第一方面,在第一方面的一种可能的实施方式中,在与所述车机建立近场通信链接后,所述方法还包括:移动终端基于所述近场通信链接向所述车机发送车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
在本申请实施例中,移动终端通过近场通信链接实现车机系统自动启动,操作便捷。
示例性的,所述车机系统启动请求在所述移动终端与所述车机之间距离小于第一阈值时发送。
在本申请实施例中,移动终端确定与车机之间的距离小于第一阈值时,向车机发送车机系统启动请求,以避免移动终端距离车机较远时,误触发车机系统启动,操作便捷而且安全性较高。
第二方面,还提供一种车机系统登录方法,该方法用于在车机上实现以第一用户账号登录所述车机系统,其中,所述车机与所述车机系统相对应,该方法包括:与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;通过所述近场通信链接与所述移动终端协商登录绑定码;向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;在所述车机系统上登录所述第一用户账号。
上述第二方面提供的方法可由车机或能够支持车机实现该方法所需的功能的装置执行,所述装置例如芯片系统。
本申请实施例中,车机与移动终端建立近场通信连接,并通过近场通信链接与移动终端协商登录绑定码,以使网络侧设备根据登录绑定码验证是否可以在车机系统上以移动终端中的第一用户账号登录。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是车机与移动终端协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方案1,所述登录绑定码可以是网络侧设备生成的,例如,所述登录绑定码为所述网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
对于上述方案1,车机通过所述近场通信链接与移动终端协商登录绑定码的方式有多种。例如如下方式1-方式3。
方式1,车机通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:间接地经由向所述移动终端发送所述登录请求反馈消息来向所述网络侧设备提供所述登录绑定码。
也就是说,方式1中,车机与移动终端协商确定的登录绑定码是车机向网络侧设备请求得到登录绑定码。车机间接的经由移动终端将该登录绑定码提供给网络侧设备进行验证。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是车机与移动终端协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方式2,车机通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
也就是说,车机与移动终端协商确定的登录绑定码是车机向网络侧设备请求得到登录绑定码。车机将该登录绑定码提供给网络侧设备进行验证。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是移动终端与车机协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方式3,车机通过所述近场通信链接从所述移动终端接收第三验证请求消息或第二登录请求消息,所述第三验证请求消息或所述第二登录请求消息中包括所述登录绑定码,其中,所述登录绑定码为所述移动终端向所述网络侧设备请求得到的;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码。
也就是说,方式3中,车机与移动终端协商确定的登录绑定码是移动终端向网络侧设备请求得到登录绑定码。车机将登录绑定码提供给网络侧设备(对应的,移动终端也可以将登录绑定码提供给网络侧设备)进行验证。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是移动终端与车机协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方案2,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
对于上述方案2,移动终端向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
应理解,登录绑定码是车机和/或移动终端生成的,移动终端可以将登录绑定码发送给网络侧设备,车机也可以将登录绑定码发送给网络侧设备,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升以移动终端中的用户账号登录车机系统安全性。
结合第一方面,在第一方面的一种可能的实施方式中,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序用于在所述移动终端上运行以发出以所述第一用户账号登录所述车机系统的请求。
其中,第一应用程序可以是移动终端中的任一应用,例如,百度地图、高度地图,或者其他应用。第一应用程序对应的应用服务器验证是否可以以第一应用登录的第一用户账号登录车机系统,避免使用其他服务器时,在向其他服务为发送第一用户账号的过程中而导致用户信息的丢失,一定程度上提升用户信息安全性。
结合第一方面,在第一方面的一种可能的实施方式中,所述方法还包括:车机从所述 网络侧设备接收所述第一用户账号的个性化登录数据,并根据所述个性化登录数据设置所述车机系统。
第一用户账号中包括用户个性化登录数据,例如,自动驾驶数据、驾驶行为习惯数据、车辆座椅后视镜等调节数据等等,车机系统登录第一用户账号后,可以以所述个性化登录数据设置车机系统,为驾驶员提供符合个人习惯的驾驶服务。
结合第一方面,在第一方面的一种可能的实施方式中,所述方法还包括:车机向所述移动终端发送登陆成功消息。
也就是说,车机上以第一用户账号登录车机系统之后,向移动终端发送登录成功消息,以提示用户车机系统登录成功。
结合第一方面,在第一方面的一种可能的实施方式中,所述登录请求反馈消息或者所述第二验证请求消息中包括所述移动终端识别码或所述车机识别码中的至少一项。
举例来说,对于移动终端识别码,网络侧设备可以是已知的,例如,移动终端以第一用户账号登录第一应用程序后,向网络侧设备报备移动终端识别码,那么网络侧设备确定第一用户账号与移动终端识别码之间的对应关系。第二验证请求消息中包括移动终端识别码,就能够更准确的验证是否可以以第一用户账号登录车机系统,提升车机系统登录安全性。
再例如,假设对于车机识别码,网络侧设备可以是已知的,例如,车机向网络侧设备请求登录绑定码时,向网络侧设备报备车机识别码。第二验证请求消息中包括车机识别码,就能够更准确的验证是否可以以第一用户账号登录车机系统,提升车机系统登录安全性。
结合第一方面,在第一方面的一种可能的实施方式中,在与所述移动终端建立近场通信链接后,所述方法还包括:基于所述近场通信链接从所述移动终端接收车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
在本申请实施例中,移动终端通过近场通信链接实现车机系统自动启动,操作便捷。
第三方面,还提供一种车机系统登录方法,该方法用于在网络侧设备上验证以第一用户账号登录所述车机系统,该方法包括:根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
上述第三方面提供的方法可由网络侧设备或能够支持网络侧设备实现该方法所需的功能的装置执行,所述装置例如芯片系统。
本申请实施例中,登录绑定码是移动终端与车机通过近场通信链接协商确定的,所以登录绑定码可以验证移动终端与车机建立了近场通信链接,还可以验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统。该方法中,无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。而且,登录绑定码是移动终端与车机协商确定的,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
方案1,上述登录绑定码可以是网络侧设备生成的,例如网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识 别码或用于识别所述车机的车机识别码中的至少一项生成的。
例如,在所述根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统之前,还包括:从所述车机或所述移动终端接收绑定码申请消息,所述绑定码申请消息中包括所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项;根据所述绑定码申请消息,生成所述登录绑定码,并向所述车机或所述移动终端发送绑定码反馈消息,所述绑定码反馈消息中包括所述登录绑定码。
也就是说,本申请实施例中,网络侧设备是基于第一用户账号、移动终端识别码、车机系统识别码或车机识别码中的至少一项生成登录绑定码,通过该登录绑定码能够验证车机与移动终端之间存在关联关系,有助于提升以移动终端中的用户账号登录车机系统安全性。
对于上述方案1,网络侧设备根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统的方式有多种。例如如下方式1-方式3。
方式1,网络侧设备从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;确定所述第一验证请求消息中的登录绑定码与所述生成的登录绑定码一致;确定可以以第一用户账号登录所述车机系统。
例如,登录绑定码是网络侧设备生成并发送给车机的,从移动终端侧接收到了该登录绑定码,说明移动终端与车机之间存在关联关系,有助于提升登录车机系统安全性,而且无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。
方式2,网络侧设备从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;确定所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;确定可以以第一用户账号登录所述车机系统。
例如,登录绑定码是网络侧设备生成并发送给移动终端的,从车机侧接收到了该登录绑定码,说明移动终端与车机之间存在关联关系,有助于提升登录车机系统安全性,而且无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。
方式3,网络侧设备从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;网络侧设备从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;确定可以以第一用户账号登录所述车机系统。
应理解,登录绑定码是网络侧设备生成的,从车机和移动终端分别接收到该登录绑定码,说明移动终端与车机之间存在关联关系,有助于提升登录车机系统安全性,而且无需用户自行判断登车时间,而且车机系统无需预登陆第一用户账号,操作便捷。
方案2,所述登录绑定码为所述移动终端生成的,或者所述车机生成的,或者所述移动终端和所述车机共同生成的。
对于上述方案2,网络侧设备根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统的方式可以是:从所述移动终端接收第一验证请求消息,从所述车机接收第二验证请求消息;其中,所述第一验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第二验证请求消息中包括所述车机系统识别码和所述登录绑定码;或者,第二验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第一验证请求消息中包括所述车机系统识别码和所述登录绑定码;确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码一致;确定可以以第一用户账号登录所述车机系统。
应理解,登录绑定码是车机和/或移动终端生成的,移动终端可以将登录绑定码发送给网络侧设备,车机也可以将登录绑定码发送给网络侧设备,网络侧设备通过该登录绑定码能够更好的验证车机与移动终端之间存在关联关系,有助于提升登录车机系统安全性。
结合第一方面,在第一方面的一种可能的实施方式中,所述第一验证请求消息或所述第二验证请求消息中还包括:所述移动终端识别码或所述车机识别码中的至少一项。
应理解,第一验证请求消息或第二验证请求消息中包括移动终端识别码或所述车机识别码中的至少一项,可以进一步提升登录车机系统安全性。例如,第一验证请求消息中包括移动终端识别码,网络侧设备已知移动终端识别码的情况下,可以验证第一验证请求消息中的移动终端识别码与事先已知的移动终端识别是否一致,若是,验证通过,提升登录安全性。
结合第一方面,在第一方面的一种可能的实施方式中,所述方法还包括:网络侧设备向所述车机发送所述第一用户账号的个性化登录数据,所述个性化登录数据用于设置所述车机系统。
第一用户账号中包括用户个性化登录数据,例如,自动驾驶数据、驾驶行为习惯数据、车辆座椅后视镜等调节数据等等,车机系统登录第一用户账号后,可以以所述个性化登录数据设置车机系统,为驾驶员提供符合用户个人习惯的驾驶体验。
结合第一方面,在第一方面的一种可能的实施方式中,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序运行在所述移动终端上并用于发起以第一用户账号登录所述车机系统的请求。
其中,第一应用程序可以是移动终端中的任一应用,例如,百度地图、高度地图,或者其他应用。第一应用程序对应的应用服务器验证是否可以以第一应用登录的第一用户账号登录车机系统,避免使用其他服务器时,在向其他服务为发送第一用户账号的过程中而导致用户信息的丢失,一定程度上提升用户信息安全性。
第四方面,还提供一种车机系统登录装置,包括:通信单元,用于与车机建立近场通信链接,所述车机与所述车机系统相对应;处理单元,用于通过所述近场通信链接与所述车机协商登录绑定码;所述通信单元,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
上述第四方面提供的车机系统登录装置可以是移动终端,或者能够支持移动终端实现该方法所需的功能的装置,例如芯片系统。示例性地,移动终端为手机。所述通信单元可以包括接收单元和发送单元。
方案1,上述登录绑定码可以是网络侧设备生成的,例如网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识 别码或用于识别所述车机的车机识别码中的至少一项生成的。
对于上述方案1,移动终端通过所述近场通信链接与所述车机协商登录绑定码的实现方式有多种,例如如下方式1-方式3。
方式1,所述通信单元还用于通过所述近场通信链接向所述车机发送第一登录请求消息;所述通信单元还用于通过所述近场通信链接接收所述车机返回的登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码,所述登录绑定码为所述车机向所述网络侧设备请求得到的;所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息包括所述登录绑定码,所述第一验证请求消息还包括所述第一用户账号或所述车机系统识别码中的至少一项。
方式2,通信单元还用于向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;所述通信单元还用于通过所述近场通信链接向所述车机发送第三验证请求消息,所述第三验证请求消息中包括所述登录绑定码;所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:间接地经由向所述车机发送所述第三验证请求消息来向所述网络侧设备提供所述登录绑定码。
方式3,所述通信单元还用于向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;所述通信单元还用于通过所述近场通信链接向所述车机发送第二登录请求消息,所述第二登录请求消息中包括所述登录绑定码;所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
方案2,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
对于上述方案2,所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
结合第四方面,在第四方面的一种可能的实施方式中,所述处理单元还用于:在所述移动终端上以所述第一用户账号登录第一应用程序,所述网络侧设备为所述第一应用程序的应用服务器。
结合第四方面,在第四方面的一种可能的实施方式中,所述通信单元还用于:接收所述网络侧设备发送的验证反馈消息。
结合第四方面,在第四方面的一种可能的实施方式中,所述通信单元还用于:接收所述车机发送的登陆成功消息。
结合第四方面,在第四方面的一种可能的实施方式中,所述第一验证请求消息或者所述第二登录请求消息中还包括所述移动终端识别码或所述车机识别码中的至少一项。
结合第四方面,在第四方面的一种可能的实施方式中,在与所述车机建立近场通信链接后,所述通信单元还用于:基于所述近场通信链接向所述车机发送车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
结合第四方面,在第四方面的一种可能的实施方式中,所述车机系统启动请求在所述移动终端与所述车机之间距离小于第一阈值时发送。
第五方面,还提供一种车机系统登录装置,包括:通信单元,用于与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;处理单元,用于通过所述近场通信链接与所述移动终端协商登录绑定码;所述通信单元还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;所述通信单元还用于接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;所述处理单元还用于在所述车机系统上登录所述第一用户账号。
上述第五方面提供的车机系统登录装置可以是车机,或者能够支持车机实现该方法所需的功能的装置,例如芯片系统。所述通信单元可以包括接收单元和发送单元。
方案1,所述登录绑定码可以是网络侧设备生成的,例如,所述登录绑定码为所述网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
对于上述方案1,车机通过所述近场通信链接与所述移动终端协商登录绑定码的实现方式有多种,例如如下方式1-方式3。
方式1,通信单元还用于通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;所述通信单元还用于通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:间接地经由向所述移动终端发送所述登录请求反馈消息来向所述网络侧设备提供所述登录绑定码。
方式2,通信单元还用于通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;所述通信单元还用于通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
方式3,通信单元还用于通过所述近场通信链接从所述移动终端接收第三验证请求消息或第二登录请求消息,所述第三验证请求消息或所述第二登录请求消息中包括所述登录绑定码,其中,所述登录绑定码为所述移动终端向所述网络侧设备请求得到的;所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码。
方案2,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
对于上述方案2,所述通信单元在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一 项。
结合第五方面,在第五方面的一种可能的实施方式中,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序用于在所述移动终端上运行以发出以所述第一用户账号登录所述车机系统的请求。
结合第五方面,在第五方面的一种可能的实施方式中,所述方法还包括:从所述网络侧设备接收所述第一用户账号的个性化登录数据,并根据所述个性化登录数据设置所述车机系统。
结合第五方面,在第五方面的一种可能的实施方式中,所述方法还包括:向所述移动终端发送登陆成功消息。
结合第五方面,在第五方面的一种可能的实施方式中,所述登录请求反馈消息或者所述第二验证请求消息中包括所述移动终端识别码或所述车机识别码中的至少一项。
结合第五方面,在第五方面的一种可能的实施方式中,在与所述移动终端建立近场通信链接后,所述方法还包括:基于所述近场通信链接从所述移动终端接收车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
第六方面,还提供一种车机系统登录装置,包括:处理单元,用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;通信单元,用于向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
上述第六方面提供的车机系统登录装置可以是网络侧设备,或者能够支持网络侧设备实现该方法所需的功能的装置,例如芯片系统。所述通信单元可以包括接收单元和发送单元。
方案1,上述登录绑定码可以是网络侧设备生成的,例如网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
例如,所述通信单元从所述车机或所述移动终端接收绑定码申请消息,所述绑定码申请消息中包括所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项;所述处理单元具体用于:根据所述绑定码申请消息,生成所述登录绑定码,所述通信单元还用于向所述车机或所述移动终端发送绑定码反馈消息,所述绑定码反馈消息中包括所述登录绑定码。
对于上述方案1,网络侧设备根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统的方式可以有多种。例如,如下方式1-方式3。
方式1,网络侧设备的通信单元用于从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;处理单元用于确定所述第一验证请求消息中的登录绑定码与所述生成的登录绑定码一致;处理单元还用于确定可以以第一用户账号登录所 述车机系统。
方式2,通信单元用于从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;处理单元用于确定所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;处理单元还用于确定可以以第一用户账号登录所述车机系统。
方式3,通信单元用于从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;所述通信单元还用于从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;处理单元具体用于确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;处理单元还用于确定可以以第一用户账号登录所述车机系统。
方案2,所述登录绑定码为所述移动终端生成的,或者所述车机生成的,或者所述移动终端和所述车机共同生成的。
对于上述方案2,处理单元在用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统时,具体包括:通信单元用于从所述移动终端接收第一验证请求消息,从所述车机接收第二验证请求消息;其中,所述第一验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第二验证请求消息中包括所述车机系统识别码和所述登录绑定码;或者,第二验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第一验证请求消息中包括所述车机系统识别码和所述登录绑定码;所述处理单元具体用于确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码一致;所述处理单元还用于确定可以以第一用户账号登录所述车机系统。
结合第六方面,在第六方面的一种可能的实施方式中,所述第一验证请求消息或所述第二验证请求消息中还包括:所述移动终端识别码或所述车机识别码中的至少一项。
结合第六方面,在第六方面的一种可能的实施方式中,所述方法还包括:向所述车机发送所述第一用户账号的个性化登录数据,所述个性化登录数据用于设置所述车机系统。
结合第六方面,在第六方面的一种可能的实施方式中,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序运行在所述移动终端上并用于发起以第一用户账号登录所述车机系统的请求。
第七方面,还提供一种车机系统登录装置,包括:收发器,用于与车机建立近场通信链接,所述车机与所述车机系统相对应;处理器,用于通过所述近场通信链接与所述车机协商登录绑定码;所述收发器,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
上述第七方面提供的车机系统登录装置可以是移动终端,或者能够支持移动终端实现该方法所需的功能的装置,例如芯片系统。示例性地,移动终端为手机。所述通信单元可以包括接收单元和发送单元。
方案1,上述登录绑定码可以是网络侧设备生成的,例如网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
对于上述方案1,移动终端通过所述近场通信链接与所述车机协商登录绑定码的方式有多种,例如如下方式1-方式3。
方式1,收发器还用于通过所述近场通信链接向所述车机发送第一登录请求消息;所述收发器还用于通过所述近场通信链接接收所述车机返回的登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码,所述登录绑定码为所述车机向所述网络侧设备请求得到的;所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息包括所述登录绑定码,所述第一验证请求消息还包括所述第一用户账号或所述车机系统识别码中的至少一项。
方式2,收发器还用于向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;所述收发器还用于通过所述近场通信链接向所述车机发送第三验证请求消息,所述第三验证请求消息中包括所述登录绑定码;所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:间接地经由向所述车机发送所述第三验证请求消息来向所述网络侧设备提供所述登录绑定码。
方式3,收发器还用于向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;所述收发器还用于通过所述近场通信链接向所述车机发送第二登录请求消息,所述第二登录请求消息中包括所述登录绑定码;所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
方案2,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
对于上述方案2,所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
结合第七方面,在第七方面的一种可能的实施方式中,所述处理单元还用于:在所述移动终端上以所述第一用户账号登录第一应用程序,所述网络侧设备为所述第一应用程序的应用服务器。
结合第七方面,在第七方面的一种可能的实施方式中,所述通信单元还用于:接收所述网络侧设备发送的验证反馈消息。
结合第七方面,在第七方面的一种可能的实施方式中,所述通信单元还用于:接收所述车机发送的登陆成功消息。
结合第七方面,在第七方面的一种可能的实施方式中,所述第一验证请求消息或者所述第二登录请求消息中还包括所述移动终端识别码或所述车机识别码中的至少一项。
结合第七方面,在第七方面的一种可能的实施方式中,在与所述车机建立近场通信链接后,所述通信单元还用于:基于所述近场通信链接向所述车机发送车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
结合第七方面,在第七方面的一种可能的实施方式中,所述车机系统启动请求在所述移动终端与所述车机之间距离小于第一阈值时发送。
第八方面,还提供一种车机系统登录装置,包括:收发器,用于与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;处理器,用于通过所述近场通信链接与所述移动终端协商登录绑定码;所述收发器还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;所述收发器还用于接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;所述处理器还用于在所述车机系统上登录所述第一用户账号。
上述第八方面提供的车机系统登录装置可以是车机,或者能够支持车机实现该方法所需的功能的装置,例如芯片系统。所述通信单元可以包括接收单元和发送单元。
方案1,所述登录绑定码可以是网络侧设备生成的,例如,所述登录绑定码为所述网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
对于上述方案1,车机通过所述近场通信链接与所述移动终端协商登录绑定码的实现方式有多种,例如如下方式1-方式3。
方式1,收发器还用于通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;所述收发器还用于通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:间接地经由向所述移动终端发送所述登录请求反馈消息来向所述网络侧设备提供所述登录绑定码。
方式2,收发器还用于通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;所述收发器还用于通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
方式3,收发器还用于通过所述近场通信链接从所述移动终端接收第三验证请求消息或第二登录请求消息,所述第三验证请求消息或所述第二登录请求消息中包括所述登录绑定码,其中,所述登录绑定码为所述移动终端向所述网络侧设备请求得到的;所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码。
方案2,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
对于上述方案2,所述收发器在用于向网络侧设备提供所述登录绑定码时,具体包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
结合第八方面,在第八方面的一种可能的实施方式中,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序用于在所述移动终端上运行以发出以所述第一用户账号登录所述车机系统的请求。
结合第八方面,在第八方面的一种可能的实施方式中,所述方法还包括:从所述网络侧设备接收所述第一用户账号的个性化登录数据,并根据所述个性化登录数据设置所述车机系统。
结合第八方面,在第八方面的一种可能的实施方式中,所述方法还包括:向所述移动终端发送登陆成功消息。
结合第八方面,在第八方面的一种可能的实施方式中,所述登录请求反馈消息或者所述第二验证请求消息中包括所述移动终端识别码或所述车机识别码中的至少一项。
结合第八方面,在第八方面的一种可能的实施方式中,在与所述移动终端建立近场通信链接后,所述方法还包括:基于所述近场通信链接从所述移动终端接收车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
第九方面,还提供一种车机系统登录装置,包括:处理器,用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;收发器,用于向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
上述第九方面提供的车机系统登录装置可以是网络侧设备,或者能够支持网络侧设备实现该方法所需的功能的装置,例如芯片系统。所述通信单元可以包括接收单元和发送单元。
方案1,上述登录绑定码可以是网络侧设备生成的,例如网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
例如,所述收发器从所述车机或所述移动终端接收绑定码申请消息,所述绑定码申请消息中包括所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项;所述处理器具体用于:根据所述绑定码申请消息,生成所述登录绑定码,所述收发器还用于向所述车机或所述移动终端发送绑定码反馈消息,所述绑定码反馈消息中包括所述登录绑定码。
对于上述方案1,网络侧设备根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统的方式可以有多种。例如,如下方式1-方式3。
方式1,网络侧设备的收发器用于从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;处理器用于确定所述第一验证请求消息中的登录绑定码与所述生成的登录绑定码一致;处理器还用于确定可以以第一用户账号登录所述车机系统。
方式2,收发器用于从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;处理器用于确定所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;处理器还用于确定可以以第一用户账号登录所述车机系统。
方式3,收发器用于从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;所述收发器还用于从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;处理器用于确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;处理器还用于确定可以以第一用户账号登录所述车机系统。
方案2,所述登录绑定码为所述移动终端生成的,或者所述车机生成的,或者所述移动终端和所述车机共同生成的。
对于上述方案2,处理器在用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统时,具体包括:收发器用于从所述移动终端接收第一验证请求消息,从所述车机接收第二验证请求消息;其中,所述第一验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第二验证请求消息中包括所述车机系统识别码和所述登录绑定码;或者,第二验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第一验证请求消息中包括所述车机系统识别码和所述登录绑定码;所述处理器具体用于确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码一致;所述处理单元还用于确定可以以第一用户账号登录所述车机系统。
结合第九方面,在第九方面的一种可能的实施方式中,所述第一验证请求消息或所述第二验证请求消息中还包括:所述移动终端识别码或所述车机识别码中的至少一项。
结合第九方面,在第九方面的一种可能的实施方式中,所述方法还包括:向所述车机发送所述第一用户账号的个性化登录数据,所述个性化登录数据用于设置所述车机系统。
结合第九方面,在第九方面的一种可能的实施方式中,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序运行在所述移动终端上并用于发起以第一用户账号登录所述车机系统的请求。
第十方面,还提供一种车机系统登录装置,包括处理器和存储器;所述存储器中存储有程序指令,当所述程序指令被执行时,使得所述车机系统登录装置执行如上述第一方面提供的方法。车机系统登录装置可以是移动终端或能够支持移动终端实现上述第一方面提供的方法所需的功能的装置,例如芯片系统。
第十一方面,还提供一种车机系统登录装置,包括处理器和存储器;所述存储器中存储有程序指令,当所述程序指令被执行时,使得所述车机系统登录装置执行如上述第二方面提供的方法。车机系统登录装置可以是车机或能够支持车机实现上述第二方面提供的方法所需的功能的装置,例如芯片系统。
第十二方面,还提供一种车机系统登录装置,包括处理器和存储器;所述存储器中存储有程序指令,当所述程序指令被执行时,使得所述车机系统登录装置执行如上述第三方面提供的方法。车机系统登录装置可以是网络侧设备或能够支持网络侧设备实现上述第三方面提供的方法所需的功能的装置,例如芯片系统。
第十三方面,还提供一种车机系统登录系统,包括:如上述第四方面或第七方面提供的车机系统登录装置,以及如上述第五方面或第八方面提供的车机系统登录装置,以及如上述第六方面或第九方面提供的车机系统登录装置。
第十四方面,还提供一种计算机可读存储介质,所述计算机可读存储介质包括计算机 程序,当所述计算机程序在处理器上运行时,使得车机系统登录装置执行如上述第一方面提供的方法。
第十五方面,还提供一种计算机可读存储介质,所述计算机可读存储介质包括计算机程序,当所述计算机程序在处理器上运行时,使得车机系统登录装置执行如上述第二方面提供的方法。
第十六方面,还提供一种计算机可读存储介质,所述计算机可读存储介质包括计算机程序,当所述计算机程序在处理器上运行时,使得车机系统登录装置执行如上述第三方面提供的方法。
第十七方面,还提供一种计算机程序产品,当所述计算机程序产品在处理器上运行时,使得车机系统登录装置执行如上述第一方面提供的方法。
第十八方面,还提供一种计算机程序产品,当所述计算机程序产品在处理器上运行时,使得车机系统登录装置执行如上述第二方面提供的方法。
第十九方面,还提供一种计算机程序产品,当所述计算机程序产品在处理器上运行时,使得车机系统登录装置执行如上述第三方面提供的方法。
上述第四方面至第十九方面的有益效果请参见上述第一方面至第三方面的有益效果,在此不重复赘述。
附图说明
图1为本申请实施例提供的用户账号与其包含的个性化数据的示意图;
图2为现有技术的一种车机系统登录过程的示意图;
图3为现有技术的另一种车机系统登录过程的示意图;
图4为本申请实施例提供的第一种车机系统登录方法的流程示意图;
图5为本申请实施例提供的第二种车机系统登录方法的流程示意图;
图6为本申请实施例提供的第三种车机系统登录方法的流程示意图;
图7为本申请实施例提供的第四种车机系统登录方法的流程示意图;
图8为本申请实施例提供的第五种车机系统登录方法的流程示意图;
图9为本申请实施例提供的第六种车机系统登录方法的流程示意图;
图10为本申请实施例提供的第七种车机系统登录方法的流程示意图;
图11为本申请实施例提供的第八种车机系统登录方法的流程示意图;
图12为本申请实施例提供的车机系统登录装置的结构框图;
图13为本申请实施例提供的车机系统登录装置的结构框图。
具体实施方式
为了便于理解,对本申请实施例涉及的术语进行解释说明,该术语的解释说明也作为对本申请实施例发明内容的一部分。
1)本申请实施例涉及的移动终端,诸如手机、平板电脑、可穿戴设备(如眼镜、手套、手表、手环、服饰及鞋等)、车载设备(或者称为车载终端)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本、个人数字助理(personal digital assistant,PDA)等 设备,本申请实施例对移动终端的具体类型不作任何限制。或者,移动终端还可以包括中继(relay)。
需要说明的是,本申请实施例中,移动终端可以是具有近场通信链接功能(例如蓝牙功能),且能与网络侧设备建立连接的任何设备,这里不再一一列举。
本申请实施例中,用于实现移动终端的功能的装置可以是移动终端,也可以是能够支持终端实现该功能的装置,例如芯片系统,该装置可以被安装在移动终端中。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。下文中,以用于实现移动终端的功能的装置是移动终端为例。
2)本申请实施例涉及的应用程序(application,简称app),简称应用,为能够实现某项或多项特定功能的软件程序。通常,移动终端中可以安装一个或多个应用,例如,即时通讯类应用、视频类应用、音频类应用、图像拍摄类应用等等。其中,即时通信类应用,例如可以包括短信应用、微信(WeChat)、WhatsApp Messenger、连我(Line)、照片分享(Instagram)、Kakao Talk、钉钉等。图像拍摄类应用,例如可以包括相机应用(系统相机或第三方相机应用)。视频类应用,例如可以包括Youtube、Twitter、抖音、爱奇艺,腾讯视频等等。音频类应用,例如可以包括Google Music、酷狗音乐、虾米、QQ音乐等等。
3)本申请实施例涉及的网络侧设备,可以包括服务器。例如,移动终端中安装第一应用程序,网络侧设备可以是该第一应用程序对应的应用服务器。这里的第一应用程序可以是与车机相关的应用程序,例如第一应用程序是百度地图,那么服务器是百度地图对应的服务器。
本申请实施例中,用于实现网络侧设备的功能的装置可以是网络侧设备,也可以是能够支持网络侧设备实现该功能的装置,例如芯片系统,该装置可以被安装在网络侧设备中。下文中,以用于实现网络侧设备的功能的装置是网络侧设备为例。
4)本申请实施例涉及的车机识别码,车机系统识别码、移动终端识别码。其中,车机识别码是用于识别车机的识别码,可以理解为车机硬件的识别码,例如车机ID。车机系统识别码是用于识别车机系统(可以理解为车机中的软件客户端)的识别码,可以理解为车机中的软件识别码,例如车机序列号(serial number,SN)。移动终端识别码是用于识别移动终端的识别码,例如,移动终端的型号、序列号等。
5)本申请实施例中的术语“系统”和“网络”可被互换使用。“多个”是指两个或两个以上,鉴于此,本申请实施例中也可以将“多个”理解为“至少两个”。“至少一个”,可理解为一个或多个,例如理解为一个、两个或更多个。例如,包括至少一个,是指包括一个、两个或更多个,而且不限制包括的是哪几个。例如,包括A、B和C中的至少一个,那么包括的可以是A、B、C,A和B,A和C,B和C,或A和B和C。同理,对于“至少一种”等描述的理解,也是类似的。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,字符“/”,如无特殊说明,一般表示前后关联对象是一种“或”的关系。
除非有相反的说明,本申请实施例提及“第一”、“第二”等序数词用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。
下面介绍本申请实施例提供的通信系统。
图4示出了本申请实施例提供的通信系统的示意图。如图4所示,通信系统中包括移动终端100、车机200和网络侧设备300。以移动终端100是手机为例。移动终端100中 的第一应用程序登录第一用户账号。网络侧设备300可以是第一应用程序对应的应用服务器。用户携带移动终端100靠近车机200时,移动终端100与车机200建立近场通信连接,例如蓝牙连接。移动终端100通过近场通信链接请求在车机200的车机系统上以第一用户账号登录。移动终端100与车机200通过近场通信链接协商登录绑定码,并向网络侧设备300提供登录绑定码,该登录绑定码用于网络侧设备验证是否可以以第一用户账号登录车机系统。当网络侧设备300验证可以以第一用户账号登录车机系统时,向车机200发送登录指示和所述第一用户账号对应的个性化数据。车机200的车机系统以第一用户账号登录。
因此,本申请实施例中,车机200本地无需存储用户账号,即车机200的车机系统无需以第一用户账号预登录,换句话说,本申请实施例提供的技术方案,在首次登录车机200的车机系统时也可以实现自动登录。而且,本申请实施例中,用户无需自行确定登车时机,当用户携带移动终端100靠近车机系统200时,可以自动登录,方便操作,用户体验较高。
应理解,图4仅是通信系统的一种举例,本申请的方案还可以适用于其它的系统,例如,包括移动终端、网络侧设备与飞机/无人机的用于登录飞行器的通信系统。
参见图5,为本申请实施例提供的一种车机系统登录方法的流程示意图。该流程可以适用于图4所示的通信系统。如图5所示,所述方法的流程可以包括:
步骤100,在移动终端上以第一用户账号登录第一应用程序。
示例性的,第一应用程序例如为高德地图、百度地图等,或者是其它与车机相关的应用,本申请实施例不作限定。
步骤200,移动终端与车机建立近场通信链接。其中,近场通信连接例如蓝牙链接,或其他短距离链接。
以蓝牙链接为例,移动终端与车机建立蓝牙链接的过程可以包括蓝牙配对、连接等,在此不作过多介绍。
在一些实施例中,为了避免多个移动终端与车机建立蓝牙链接,车机可以对请求建立蓝牙链接的移动终端进行判断,若车机本地存储该移动终端的终端标识,则同意与该移动终端建立蓝牙链接,否则,拒绝与该移动终端建立蓝牙链接。比如,车机与某个移动终端建立过蓝牙连接(例如,首次建立蓝牙链接)后,车机本地存储该移动终端的设备标识。当所述某个移动终端靠近车机时,车机可以搜索到所述移动终端的设备标识,比较该设备标识与存储的设备标识一致时,与所述移动终端建立蓝牙链接;否则,拒绝与所述移动终端建立蓝牙链接。因此,可以避免任何的移动终端与车机建立蓝牙链接,提升安全性。
或者,为了避免移动终端与多个车机建立蓝牙连接,当移动终端搜索到某个车机的标识时,可以判断该车机标识是否与本地存储的车机标识一致,若是,向该车机标识对应的车机发起蓝牙连接;否则不与该车机标识对应的车机建立蓝牙链接。因此,可以避免移动终端与任何车辆建立蓝牙连接,提升安全性。
可选的,移动终端可以在确定与车机之间的距离小于第二阈值时,与车机建立近场通信链接,以准确的建立与车机之间的近场通信链接。
可选的,步骤200之后,车机可以自动上电,或者,步骤200之后,移动终端向车机发送上电请求,以请求车机系统上电,车机在接收到上电请求之后,完成车机系统上电。其中,移动终端可以在确定与车机系统之间的距离小于第一阈值时,发送所述上电请求。可选的,第一阈值可以小于第二阈值,具体取值本申请实施例不作限定。也就是说,移动终端检测到与车机系统的距离逐渐变短的过程中,先与车机建立近场通信连接,再触发车 机系统上电。
步骤300,移动终端与车机通过近场通信链接协商登录绑定码。
其中,移动终端与车机通过近场通信链接协商登录绑定码可以有多种实现方式。例如,登录绑定码是网络侧设备生成的,例如,移动终端向网络侧设备申请登录绑定码,并将该登录绑定码发送给车机,或者,车机向网络侧设备申请登录绑定码,并将该登录绑定码发送给移动终端。再例如,登录绑定码是移动终端生成、并发送给车机;或者,登录绑定码是车机生成、并发送给移动终端;或者,登录绑定码是移动终端和车机共同生成的,等等。
步骤400,移动终端和/或车机向网络侧设备提供登录绑定码,该登录绑定码用于网络侧设备验证是否可以以第一用户账号登录车机系统。
步骤500,网络侧设备通过登录绑定码验证是否可以以第一用户账号登录车机系统,验证通过时,即确定可以以第一用户账号登录车机系统,则执行后续步骤;否则,停止执行后续步骤或者还可以向车机或/或移动终端发送验证不通过的指示。
需要说明的是,步骤300有多种实现方式,而步骤400和步骤500与步骤300相关,所以步骤400和步骤500也相应的有多种实现方式,下文会分别介绍。
步骤600,网络侧设备向车机发送登录指示,以及第一用户账号的个性化数据。
示例性的,这里的登录指示例如可以是token。其中,第一用户账号的个性化数据可以参见图1,在此不再重复赘述。
步骤700,在车机上以第一用户账号登录车机系统。
步骤800,网络侧设备向验证反馈信息。
需要说明的是,步骤800和步骤900是可选步骤,所以图5中以虚线表示。所述验证反馈信息例如可以是网络侧设备对接收的登录绑定码验证通过,或不通过的指示信息。
步骤900,车机向移动终端发送登录成功指示,用于指示车机系统成功登录第一用户账号。示例性的,移动终端接收到登录成功指示,可以显示提示信息例如文字或图片等等信息,以提示用户车机系统登录成功。
下面分别介绍步骤300的多种实现方式,以及对应的步骤400和步骤500的实现方式。
实施例1
如图6所示,为本申请实施例提供的一种车机系统登录方法的流程示意图。图6可以理解为对图5中部分步骤的细化。对比图5和图6可知,图5中的步骤300中移动终端与车机协商登录绑定码的过程可以包括步骤301-步骤305;图5中的步骤400中移动终端和/或车机向网络侧设备提供登录绑定码可以包括步骤401。
步骤301,移动终端向车机发送第一登录请求消息。可选的,移动终端可以通过近场通信链接向车机发送第一登录请求。
步骤302,车机向网络侧设备发送第二绑定码申请消息。该第二绑定码申请消息中包括:所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项。例如,步骤200或步骤301中移动终端向车机发送了移动终端识别码或第一用户账号中的至少一项;或者,在步骤302之前的其它步骤(非步骤200)中移动终端向车机发送了移动终端识别码或第一用户账号中的至少一项;,本申请实施例不作限定。
步骤303,网络侧设备根据第二绑定码申请消息,生成登录绑定码。
应理解,第二绑定码申请消息有多种情况,对应的步骤303有多种实现方式,下面分 别举例介绍。
示例1,第二绑定码申请消息中包括车机系统识别码,即登录绑定码是根据车机系统识别码生成的,例如,网络侧设备可以存储车机系统识别码与登录绑定码之间的对应关系。示例性的,参见下表1为所述对应关系的一种示例。
表1
车机系统识别码 登录绑定码
示例2,第二绑定码申请消息中包括第一用户账号,即登录绑定码是根据第一用户账号生成的,例如,网络侧设备可以存储第一用户账号与登录绑定码之间的对应关系。示例性的,参见下表2为所述对应关系的一种示例。
表2
第一用户账号 登录绑定码
示例3,第二绑定码申请消息中包括车机识别码,即登录绑定码是根据车机识别码生成的,例如,网络侧设备可以存储车机识别码与登录绑定码之间的对应关系。示例性的,参见下表3为所述对应关系的一种示例。
表3
车机识别码 登录绑定码
示例4,第二绑定码申请消息中包括移动终端识别码,即登录绑定码是根据移动终端识别码生成的,例如,网络侧设备可以存储移动终端识别码与登录绑定码之间的对应关系。示例性的,参见下表4为所述对应关系的一种示例。
表4
移动终端识别码 登录绑定码
需要说明的是,上述示例1-示例4还可以组合使用,比如,示例1和示例2组合使用,例如,第二绑定码申请消息中包括第一用户账号和车机系统识别码,即登录绑定码是根据第一用户账号和车机系统识别码生成的。网络侧设备可以存储车机系统识别码、第一用户账号与登录绑定码之间的对应关系。示例性的,参见下表5为所述对应关系的一种示例。
表5
车机系统识别码 第一用户账号 登录绑定码
应当理解的是,示例1-示例4之间的其它组合方式,在此不再一一列举。
步骤304,网络侧设备向车机发送第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码。
可以理解的是,第二绑定码反馈消息中还可以包括所述第二绑定码申请消息中的某个或某些消息,例如:所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项。以第二绑定码申请消息中包括车机识别码为例,第二绑定码反馈消息中也可以携带车机识别码。车机接收到第二绑定码反馈消息之后,比较第二绑定码反馈消息中的车机识别码与所述第二绑定码申请消息中的车机识别码是否一致,若一致,说明车机与网络侧设备之间的通信数据未被篡改即通信安全,可以继续进行后续步骤,否则,可以停止后续步骤的执行。
步骤305,车机向移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码。
可以理解的是,登录请求反馈消息中也可以携带所述第一登录请求中的某个或某些消 息。例如:第一登录请求中包括移动终端识别码,登录请求反馈消息中也可以携带移动终端识别码。移动终端接收到登录请求反馈消息之后,比较登录请求反馈消息中的移动终端识别码与所述第一登录请求消息中的移动终端识别码是否一致,若一致,说明移动终端与车机之间的通信数据未被篡改即通信安全,可以继续进行后续步骤,否则,可以停止后续步骤的执行。
因此,图6所示的实施例中,通过上述步骤301-步骤305,移动终端与车机协商成登录绑定码,该登录绑定码是网络侧设备生成的。
步骤401,移动终端向网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码。
步骤500,网络侧设备根据第一验证请求消息中的登录绑定码验证是否可以以第一用户账号登录车机系统,若是,则执行后续步骤;否则,停止执行后续步骤。
示例性的,步骤500可以包括网络侧设备根据登录绑定码和第一用户账号和车机系统识别码确定是否可以在车机系统上以第一用户账号登录,例如,根据登录绑定码和第一用户账号和车机系统识别码确定车机与所述移动终端之间有关联关系,则确定可以在车机系统上以第一用户账号登录。例如,登录绑定码是网络侧设备根据第一用户账号生成、并提供给车机的,而网络侧设备从移动终端接收的第一验证请求消息中包括所述登录绑定码与车机系统识别码,说明车机将所述登录绑定码分享给了移动终端,说明车机与所述移动终端有关联关系,所以确定可以在车机系统上登录第一用户账号;否则,不可以在车机系统上登录第一用户账号。
需要说明的是,登录绑定码的生成方式有多种,例如上述示例1-示例4,不同的登录绑定码生成方式对应的步骤401中第一验证请求消息可以不同,对应的步骤500中验证方式也可以不同。下面以不同登录绑定码分别介绍。
情况1,对应上述示例1,即登录绑定码是网络侧设备根据车机系统识别码生成的,对应的,第一验证请求消息中至少还包括第一用户账号。具体包括如下几种方式:
方式1.1,第一验证请求消息包括登录绑定码和第一用户账号。这种方式下,步骤500中网络侧设备确定第一验证请求消息中的登录绑定码与上述示例1中的对应关系(即上述表1)中的登录绑定码一致,确定验证通过;否则,验证不通过。
方式1.2,第一验证请求消息包括登录绑定码、第一用户账号和车机系统识别码(例如车机通过步骤305或步骤200向移动终端发送车机系统识别码)。这种方式中,步骤500中网络侧设备确定第一验证请求消息中的登录绑定码与上述示例1中对应关系(即表1)中的登录绑定码一致,确定验证通过;否则,验证不通过。或者,步骤500中网络侧设备确定第一验证请求消息中的登录绑定码与上述示例1中对应关系(即表1)中的登录绑定码一致,并确定第一验证请求消息中的车机系统识别码与上述示例1中的对应关系(即表1)中的车机系统识别码一致,确定验证通过;否则,验证不通过;该方式安全性较高。
可选的,上述第一验证请求消息中还可以包括移动终端识别码或车机识别码中的至少一项。
以第一验证请求消息中还包括移动终端识别码为例。网络侧设备可以基于该移动终端识别码作进一步的验证。例如一种可实现方式为,第二绑定码申请消息中包括移动终端识别码,也就是说,上述对应关系(即表1)中包括移动终端识别码,那么网络侧设备确定第一验证请求消息中的移动终端识别码与所述对应关系(即表1)中的移动终端识别码一 致时,确定验证通过;否则,验证不通过。另一种可实现方式为,网络侧设备是与第一应用程序对应的应用服务器,步骤100中,第一应用程序以第一用户账号登录,第一应用程序向网络侧设备报备移动终端识别码,网络侧设备存储第一用户账号与移动终端识别码之间的对应关系A。因此,网络侧设备接收到第二验证请求消息,该第二验证请求消息包括登录绑定、第一用户账号和移动终端识别码。网络侧设备确定该第二验证请求消息中的移动终端识别码和第一用户账号与所述对应关系A一致,且第二验证请求消息中的登录绑定码与上述表1中的登录绑定码一致时,则确定验证通过,否则,验证不通过。
以第一验证请求消息中还包括车机识别码为例,网络侧设备可以基于该移动终端识别码作进一步的验证。例如一种可实现方式为,第二绑定码申请消息中包括车机识别码,也就是说,上述对应关系(即表1)中还包括车机识别码,那么网络侧设备确定第一验证请求消息中的车机识别码与所述对应关系(即表1)中的车机识别码一致时,确定验证通过;否则,验证不通过。
情况2,对应上述示例2,即登录绑定码是网络侧设备根据第一用户账号生成的,则第一验证请求消息至少还包括车机系统识别码。具体包括如下几种方式。
方式2.1,第一验证请求消息包括登录绑定码和车机系统识别码(例如车机通过步骤305或步骤200向移动终端发送车机系统识别码)。这种方式中,网络侧设备接收到第一验证请求消息之后,确定第一验证请求消息中登录绑定码与上述示例2中的对应关系(即表2)中登录绑定码一致,确定验证通过;否则,验证不通过。
方式2.2,第一验证请求消息包括登录绑定码、车机系统识别码和第一用户账号。这种方式下,步骤500中网络侧设备确定第一验证请求消息中登录绑定码与述示例2中的对应关系(即表2)中登录绑定码一致,确定验证通过;否则,验证不通过。或者,步骤500中网络侧设备确定第一验证请求消息中登录绑定码与述示例2中的对应关系(即表2)中登录绑定码一致,并确定所述第一验证请求消息中第一用户账号与述示例2中的对应关系(即表2)中第一用户账号一致,确定验证通过;否则,验证不通过。
可选的,上述第一验证请求消息中还可以包括移动终端识别码或车机识别码中的至少一项。其中,第一验证请求消息中移动终端识别码或车机识别码的作用参见前述情况1的描述,在此不重复赘述。
情况3,对应上述示例3,登录绑定码是网络侧设备根据车机识别码生成的,则第一验证请求消息至少还包括车机系统识别码、第一用户账号和所述车机识别码。这种情况中,步骤500中网络侧设备确定第一验证请求消息中登录绑定码与上述示例3中的对应关系(即表3)中登录绑定码一致,确定验证通过;否则,验证不通过。或者,步骤500中网络侧设备确定第一验证请求消息中登录绑定码与上述示例3中的对应关系(即表3)中登录绑定码一致,并确定第一验证请求消息中车机识别码与上述示例3中的对应关系(即表3)中车机识别码一致,确定验证通过;否则,验证不通过。
可选的,第一验证请求消息中还可以包括移动终端标识。
情况4,对应上述示例4,登录绑定码是网络侧设备根据移动终端识别码生成的,则第一验证请求消息中至少包括车机系统识别码、第一用户账号和所述移动终端识别码。这种情况下,步骤500中网络侧设备确定第一验证请求消息中登录绑定码与上述示例4中的对应关系(即表4)中登录绑定码一致,确定验证通过;否则,验证不通过。或者,步骤500中网络侧设备确定第一验证请求消息中登录绑定码与上述示例4中的对应关系(即表 4)中登录绑定码一致,并确定第一验证请求消息中移动终端识别码与上述示例4中的对应关系(即表4)中移动终端识别码一致,则确定验证通过;否则,验证不通过。
可选的,第一验证请求消息中还可以包括车机识别码。
需要说明的是,如前文所述,示例1-示例4之间可以组合使用。假设示例1和示例2组合,即登录绑定码是网络侧设备根据第一用户账号和车机系统识别码生成的,这种情况下,第一验证请求消息可以是上述情况1-情况4中的任意一种情况中的第一验证请求消息。
需要说明的是,上述登录绑定码的生成方式由第二绑定码申请消息决定,而登录绑定码的生成方式与第一验证消息的内容有关联。一种可能的实现方式为,登录绑定码的生成方式与第一验证请求消息的内容是预先约定好的。例如,预先约定好登录绑定码是根据第一用户账号生成,而第一验证请求消息中包括登录绑定码和车机识别码;那么在实际应用中按照此约定执行,即车机发送的第二绑定码申请消息中至少携带第一用户账号,网络侧设备就根据第一用户账号生成登录绑定码,移动终端发送的第一验证请求消息中包括登录绑定码和车机识别码。另一种可能的实现方式为,并非事先约定好的,假设登录绑定码是根据第一用户账号生成的话,可以通知车机该登录绑定码是根据第一用户账号生成的。例如,步骤304中第二绑定码反馈消息中携带一个指示信息1,该指示信息1用于指示登录绑定码是基于第一用户账号生成的;或者,登录绑定码中添加一个标记,该标记用于指示是根据第一用户账号生成的,等等。车机通过步骤305通知移动终端登录绑定码是根据第一用户账号生成的,例如步骤305中登录请求反馈消息中可以携带所述指示信息1。对应的,移动终端可以基于登录绑定码是第一用户账号生成的,确定第一验证请求消息的内容。具体的实现过程可以参见上述情况2的内容,在此不再重复描述。
实施例2
参见图7所示,为本申请实施例提供的一种车机系统登录方法的流程示意图。图7可以理解为对图5中部分步骤的细化。对比图5和图7可知,图5中的步骤300中移动终端与车机协商登录绑定码的过程可以包括图7中的步骤301-步骤305。其中关于步骤301-步骤305的介绍,与实施例1相同,在此不重复赘述。图5中的步骤400包括图7中的步骤401和步骤402。
步骤401,移动终端向网络侧设备发送第一验证请求消息,该第一验证请求中包括登录绑定码。
步骤402,车机向网络侧设备发送第二验证请求消息,所述第二验证请求消息中包括登录绑定码。
需要说明的是,登录绑定码的生成方式有多种,例如上述示例1-示例4,对应的,第一验证请求消息有多种情况,例如上述情况1-情况4。
第二验证请求消息与第一验证请求消息可以相同或者不同。以二者不同为例,以前述情况1即登录绑定码是网络侧设备根据车机系统识别码生成为例,第一验证请求消息可以是方式1.1,第二验证请求消息可以是方式1.2。也就是说,对于上述情况1-情况4中的某一种情况下,第一验证请求消息和第二验证请求消息可以不同。或者,以前述情况1即登录绑定码是网络侧设备根据车机系统识别码生成为例,第一验证请求消息包括第一用户账号(例如上述情况1中方式1.1或方式1.2),第二验证请求消息包括车机系统识别码(例如上述情况2中方式2.1或方式2.2)。或者,第一验证请求消息包括车机系统识别码(例 如上述情况2中方式2.1或方式2.2),对应的,第二验证请求消息包括第一用户账号(例如上述情况1中方式1.1或方式1.2)。以上述情况3即登录绑定码是网络侧设备根据车机识别码生成为例,第一验证请求消息可以是情况3中的第一验证请求消息,第二验证请求消息可以是情况2、情况1、情况4中任一情况中的一种第一验证请求消息。
步骤500,根据第一验证请求消息和第二验证请求消息中的登录绑定码验证是否可以以第一用户账号登录车机系统;若是,则继续执行后续步骤,否则,停止后续步骤的执行。
对于第一验证请求消息,网络侧设备验证的方式参见实施例1中步骤500的描述。对于第二验证请求消息的验证方式与对第一验证请求消息的验证方式类似,不再重复赘述。网络侧设备确定第一验证请求消息和第二验证请求消息验证通过,确定可以第一用户账号登录车机系统,否则,不可以以第一用户账号登录车机系统。
实施例3
参见图8所示,为本申请实施例提供的一种车机系统登录方法的流程示意图。图8可以理解为对图5中部分步骤的细化。对比图5和图8可知,图5中的步骤300中移动终端与车机协商登录绑定码的过程可以包括图8中的步骤301-步骤304。图5中的步骤400包括图8中的步骤401。
步骤301,移动终端向网络侧设备发送第一绑定码申请消息。该第一绑定码申请消息中包括:所述第一用户账号、移动终端识别码、车机系统识别码或车机识别码中的至少一项。
可选的,步骤301之前车机向移动终端发送了车机系统识别码或车机识别码中的至少一项;例如,在步骤300中发送。或者,移动终端还可以向车机发送第二登录请求消息(图8中未示出),例如,移动终端在与车机建立近场通信链接之后,紧接着向所述移动终端发送第二登录请求消息,例如,第二登录请求消息可以在步骤301之前发送。车机还可以向移动终端发送第二登录请求反馈信息(图8中未示出),该第二登录请求反馈消息中可以包括车机系统识别码或车机识别码中的至少一项。
步骤302,网络侧设备根据第一绑定码申请消息,生成登录绑定码。其中,步骤302的实现方式请参见实施例1中登录绑定码的生成过程例如示例1-示例4,在此不重复赘述。
步骤303,网络侧设备向移动终端发送第一绑定码反馈消息,该第一绑定码反馈消息中包括所述登录绑定码。
步骤304,移动终端向车机发送第三验证请求消息,所述第三验证请求消息中包括所述登录绑定码。可选的,第三验证请求消息中还可以包括移动终端识别码或第一用户账号中的至少一项。
可以理解的是,第三验证请求消息可以是上述第二登录请求消息,或者,是移动终端发送第二登录请求信息之后,向车机发送的、目的在于间接地经由向所述车机发送所述第三验证请求消息来向所述网络侧设备提供所述登录绑定码的消息。
步骤401,车机向网络侧设备发送第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码。其中,第二验证请求消息的内容与登录绑定码的生成方式相关,可以参见实施例1中关于第一验证请求消息的介绍,在此不重复赘述。
步骤500,网络侧设备根据第二验证请求消息中的登录绑定码验证是否可以以第一用户账号登录车机系统,若是,则继续执行后续步骤,否则,停止后续步骤的执行。
在本申请实施例中,对应上述步骤302的多种示例(前文示例1-示例4),对应的,第 二验证请求消息有多种情况,对应的,步骤500中验证方式也不同。具体参见实施例1中情况1-情况4的介绍,区别在于在该实施例中,需要将实施例1中的情况1-情况4中的第一验证请求消息替换为第二验证请求消息。
实施例4
参见图9所示,为本申请实施例提供的一种车机系统登录方法的流程示意图。图9可以理解为对图5中部分步骤的细化。对比图5和图9可知,图5中的步骤300中移动终端与车机协商登录绑定码的过程可以包括图9中的步骤301-步骤304。图5中的步骤400包括图9中的步骤401和步骤402。
其中步骤301-步骤304与图8所示的实施例中存在区别的步骤为步骤304。因此,关于步骤301-步骤303不重复赘述。
步骤304,移动终端向车机发送第二登录请求消息,所述第二登录请求消息中包括所述登录绑定码。可选的,第二登录请求消息中还可以包括移动终端识别码或第一用户账号中的至少一项。
需要说明的是,图9所示的实施例中,移动终端向网络侧设备请求得到登录绑定码之后,再向车机发起登录请求;而图8所示的实施例中,移动终端先向车机发起登录请求(例如步骤304之前向车机发送第二登录请求),然后再向车机发送第三验证请求消息,间接地经由向所述车机发送所述第三验证请求消息来向所述网络侧设备提供所述登录绑定码。
步骤401,移动终端向网络侧设备发送第一验证请求消息,该第一验证请求消息中包括登录绑定码。
步骤402,车机向网络侧设备发送第二验证请求消息,该第二验证请求消息中包括登录绑定码。
需要说明的是,登录绑定码生成方式有多种,对应上述示例1-示例4,第一验证请求消息有多种情况,例如上述情况1-情况4。第二验证请求消息与第一验证请求消息可以相同或者不同。具体参见实施例2中的描述,不重复赘述。
步骤500,网络侧设备根据第一验证请求消息和第二验证请求消息中的登录绑定码验证是否可以以第一用户账号登录车机系统,若是,则继续执行后续步骤,否则,停止后续步骤的执行。其中,步骤500的介绍参见实施例2中步骤500的介绍,不重复赘述。
需要说明的是,上述实施例1-实施例4中,登录绑定码是网络侧设备生成的,下面介绍另一些实施例,这些实施例中,登录绑定码还可以是移动终端生成的,或者车机生成的,或者,移动终端和车机共同生成的。
实施例5
参见图10所示,为本申请实施例提供的一种车机系统登录方法的流程示意图。图10可以理解为对图5中部分步骤的细化。对比图5和图10可知,图5中的步骤300中移动终端与车机协商登录绑定码的过程可以包括图10中的步骤301-步骤304。图5中的步骤400包括图10中的步骤401和步骤402。
步骤301,移动终端生成第一登录绑定码。示例性的,移动终端可以根据所述第一用户账号、移动终端识别码、车机系统识别码或车机识别码中的至少一项生成第一登录绑定码。例如,步骤200中车机向移动终端发送了车机系统识别码或车机识别码中的至少一项;或者,在步骤301之前的其它步骤中车机向移动终端发送了车机系统识别码或车机识别码中的至少一项,本申请实施例不作限定。
具体的,登录绑定码的生成过程参见实施例1中步骤303(例如,上述示例1-示例4)的介绍,在此不重复赘述。
步骤302,移动终端向车机发送登录请求,该登录请求中可以包括所述第一登录绑定码。可选的,登录请求中还可以包括第一用户账号或移动终端识别码中的至少一项。
步骤303,车机基于所述第一登录绑定码,生成第二登录绑定码。
其中,第一登录绑定码与第二登录绑定码可以相同。那么无需执行步骤303,所以图中步骤303以虚线表示。或者,第一登录绑定码与第二登录绑定码可以不相同。例如,第一登录绑定码是移动终端根据第一用户账号生成的,第二登录绑定码可以是车机根据第一登录绑定码和车机系统识别码生成的。例如,车机根据车机系统识别码生成第三登录绑定码,第二登录绑定码可以是第一登录绑定码和第三登录绑定码的组合,如在第一登录绑定码中添加第三登录绑定码,等等。
步骤304,车机向移动终端发送登录请求反馈消息,该登录请求反馈消息中包括第二登录绑定码。
需要说明的是,若步骤303不执行,那么步骤304中可以携带所述第一登录绑定码,或者,携带同意第一登录绑定码的指示信息,或者,不携带任何登录绑定码;当移动终端接收到登录请求反馈消息之后,确定车机同意该第一登录绑定码。
步骤401,移动终端向网络侧设备发送第一验证请求消息,该第一验证请求消息中包括第二登录绑定码,还包括第一用户账号或车机系统识别码中的至少一项。可选的,第一验证请求消息还可以包括车机识别码和/或移动终端识别码。
步骤402,车机向网络侧设备发送第二验证请求消息,该第二验证请求消息中包括第二登录绑定码,还包括第一用户账号或车机系统识别码中的至少一项。可选的,第二验证请求消息还可以包括车机识别码和/或移动终端识别码。
步骤500,网络侧设备根据第一验证请求消息和第二验证请求消息中的第二登录绑定码验证是否可以以第一用户账号登录车机系统,若是,则继续执行后续步骤,否则,停止后续步骤的执行。
举例来说,第一验证请求消息中包括第二登录绑定码和第一用户账号,第二验证请求消息中包括第二登录绑定码和车机系统识别码;或者,第一验证请求消息中包括第二登录绑定码和车机系统识别码,第二验证请求消息中包括第二登录绑定码和第一用户账号。网络侧设备确定第一验证请求消息和第二验证请求消息中的第二登录绑定码相同,确定验证通过,否则验证不通过。
再例如,第一验证请求消息和第二验证请求消息中还包括车机识别码。网络侧设备确定第一验证请求消息和第二验证请求消息中的第二登录绑定码相同,并确定所述第一验证消息和所述第二验证消息中的车机识别码相同,确定验证通过,否则,验证不通过。
实施例6
参见图11所示,为本申请实施例提供的一种车机系统登录方法的流程示意图。图11可以理解为对图5中部分步骤的细化。对比图5和图11可知,图5中的步骤300中移动终端与车机协商登录绑定码的过程可以包括图11中的步骤301-步骤304。
步骤301,移动终端向车机发送登录请求消息。可选的,该登录请求消息中可以携带第一用户账号或移动终端识别码中的至少一项。
步骤302,车机生成第一登录绑定码。示例性的,车机可以根据所述第一用户账号、 移动终端识别码、车机系统识别码或车机识别码中的至少一项生成第一登录绑定码。具体参见实施例1中步骤303的介绍,在此不重复赘述。
步骤303,车机向移动终端发送登录请求反馈消息,该登录请求反馈消息中包括第一登录绑定码。
步骤304,移动终端基于第一登录绑定码,生成第二登录绑定码。
其中,第一登录绑定码与第二登录绑定码可以相同。那么无需执行步骤304,所以图中步骤304以虚线表示。或者,第一登录绑定码与第二登录绑定码可以不相同。例如,第一登录绑定码是车机根据车机系统识别码生成的,第二登录绑定码可以是移动终端根据第一登录绑定码和第一用户账号生成的。例如,移动终端根据第一用户账号生成第三登录绑定码,第二登录绑定码可以是第一登录绑定码和第三登录绑定码的组合,如在第一登录绑定码中添加第三登录绑定码,等等。
步骤305,移动终端向车机发送协商登录绑定码消息,该协商登录绑定码消息中包括所述第二登录绑定码。
需要说明的是,步骤304-步骤305是可选步骤,图11中以虚线表示。如果不执行步骤304和步骤305,即车机和移动终端协商的登录绑定码为所述第一登录绑定码。如果执行步骤304和步骤305,即车机和移动终端协商的登录绑定码为所述第二登录绑定码。
可选的,步骤304之后,车机还可以向移动终端发送协商登录绑定码反馈消息,协商登录绑定码反馈消息中可以包括用于指示同意第二登录绑定码的指示信息2,或者包括所述第二登录绑定码,或者不包含任何绑定码。
需要说明的是,图10和图11中仅列举了步骤300的两种实现方式,在实际应用中,步骤300即车机和移动终端协商的登录绑定码的过程还可以有其它实现方式,本申请实施例不一一列举。
步骤401-步骤401以及步骤500可以参见实施例5的描述,不重复赘述。
下面结合附图介绍本申请实施例中用来实现上述方法的装置。因此,上文中的内容均可以用于后续实施例中,重复的内容不再赘述。
图12为本申请实施例提供的车机系统登录装置1200的结构框图。示例性地,车机系统登录装置1200例如为上述移动终端、车机或网络侧设备。车机系统登录装置1200包括处理单元1210,通信单元1220。
一种示例,车机系统登录装置1200为上述移动终端,或,能够支持移动终端实现该方法所需的功能的装置,例如芯片系统。示例性地,移动终端为手机。
处理单元1210可以用于执行图5-图11所示的实施例中由移动终端所执行的除了收发操作之外的全部操作,例如S100,和/或用于支持本文所描述的技术的其它过程。通信单元1220可以用于执行图5-图11所示的实施例中由移动终端所执行的全部收发操作,例如S200,和/或用于支持本文所描述的技术的其它过程。
其中,通信单元1220可以是一个功能模块,该功能模块既能完成发送操作也能完成接收操作,例如通信单元1220是车机系统登录装置1200所包括的模块,则通信单元1220可以用于执行图5-图11所示的实施例中由移动终端所执行的全部发送操作和接收操作,例如,在执行发送操作时,可以认为通信单元1220是发送模块,而在执行接收操作时,可以认为通信单元1220是接收模块;或者,通信单元1220也可以是两个功能模块的统称,这两个功能模块分别为发送模块和接收模块,发送模块用于完成发送操作,例如通信单元 1220是移动终端所包括的模块,则发送模块可以用于执行图5-图11所示的实施例中由移动终端所执行的全部发送操作,接收模块用于完成接收操作,例如通信单元1220是移动终端所包括的模块,则接收模块可以用于执行图5-图11所示的实施例中由移动终端所执行的全部接收操作。
例如,通信单元1220,用于与车机建立近场通信链接,所述车机与所述车机系统相对应;处理单元1210,用于通过所述近场通信链接与所述车机协商登录绑定码;通信单元1220,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
一种示例,车机系统登录装置1200为上述车机,或,能够支持车机实现该方法所需的功能的装置,例如芯片系统。处理单元1210可以用于执行图5-图11所示的实施例中由车机所执行的除了收发操作之外的全部操作,例如S700,和/或用于支持本文所描述的技术的其它过程。通信单元1220可以用于执行图5-图11所示的实施例中由车机所执行的全部收发操作,例如S200,和/或用于支持本文所描述的技术的其它过程。
其中,通信单元1220可以是一个功能模块,该功能模块既能完成发送操作也能完成接收操作,例如通信单元1220是车机所包括的模块,则通信单元1220可以用于执行图5-图11所示的实施例中由车机所执行的全部发送操作和接收操作,例如,在执行发送操作时,可以认为通信单元1220是发送模块,而在执行接收操作时,可以认为通信单元1220是接收模块;或者,通信单元1220也可以是两个功能模块的统称,这两个功能模块分别为发送模块和接收模块,发送模块用于完成发送操作,例如通信单元1220是车机所包括的模块,则发送模块可以用于执行图5-图11所示的实施例中由车机所执行的全部发送操作,接收模块用于完成接收操作,例如通信单元1220是车机所包括的模块,则接收模块可以用于执行图5-图11所示的实施例中由车机所执行的全部接收操作。
例如,通信单元1220,用于与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;处理单元1210,用于通过所述近场通信链接与所述移动终端协商登录绑定码;通信单元1220,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;通信单元1220,还用于接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;处理单元1210,还用于在所述车机系统上登录所述第一用户账号。
一种示例,车机系统登录装置1200为上述网络侧设备,或,能够支持网络侧设备实现该方法所需的功能的装置,例如芯片系统。处理单元1210可以用于执行图5-图11所示的实施例中由网络侧设备所执行的除了收发操作之外的全部操作,例如S500,和/或用于支持本文所描述的技术的其它过程。通信单元1220可以用于执行图5-图11所示的实施例中由网络侧设备所执行的全部收发操作,例如S600,和/或用于支持本文所描述的技术的其它过程。
其中,通信单元1220可以是一个功能模块,该功能模块既能完成发送操作也能完成接收操作,例如通信单元1220是网络侧设备所包括的模块,则通信单元1220可以用于执行图5-图11所示的实施例中由网络侧设备所执行的全部发送操作和接收操作,例如,在执行发送操作时,可以认为通信单元1220是发送模块,而在执行接收操作时,可以认为通信单元1220是接收模块;或者,通信单元1220也可以是两个功能模块的统称,这两个 功能模块分别为发送模块和接收模块,发送模块用于完成发送操作,例如通信单元1220是网络侧设备所包括的模块,则发送模块可以用于执行图5-图11所示的实施例中由网络侧设备所执行的全部发送操作,接收模块用于完成接收操作,例如通信单元1220是网络侧设备所包括的模块,则接收模块可以用于执行图5-图11所示的实施例中由网络侧设备所执行的全部接收操作。
例如,处理单元1210,用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;通信单元1220,还用于向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能单元可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
图12中的各个单元的只一个或多个可以软件、硬件、固件或其结合实现。所述软件或固件包括但不限于计算机程序指令或代码,并可以被硬件处理器所执行。所述硬件包括但不限于各类集成电路,如中央处理单元(CPU)、数字信号处理器(DSP)、现场可编程门阵列(FPGA)或专用集成电路(ASIC)。
图13为本申请实施例提供的车机系统登录装置1300的硬件示意图。车机系统登录装置1300包括至少一个处理器1301,还包括至少一个存储器1302,用于存储程序指令和/或数据。存储器1302和处理器1301耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性、机械性或其它的形式,用于装置、单元或模块之间的信息交互。处理器1301可以和存储器1302协同操作,处理器1301可以执行存储器1302中存储的程序指令,所述至少一个存储器1302中的至少一个可以包括于处理器1301中。
车机系统登录装置1300还可包括通信接口1303,用于通过传输介质和其它设备进行通信,从而用于车机系统登录装置1300可以和其它设备进行通信。在本申请实施例中,通信接口可以是收发器、电路、总线、模块或其它类型的通信接口。在本申请实施例中,通信接口为收发器时,收发器可以包括独立的接收器、独立的发射器;也可以集成收发功能的收发器、或者接口电路等。
应理解,本申请实施例中不限定上述处理器1301、存储器1302以及通信接口1303之间的连接介质。本申请实施例在图13中以存储器1302、处理器1301以及通信接口1303之间通过通信总线1304连接,总线在图13中以粗线表示,其它部件之间的连接方式,仅是示意性说明,并不作为限定。所述总线可以包括地址总线、数据总线、控制总线等。为了便于表示,图13中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线等。
在一种示例中,车机系统登录装置1300用于实现上述图5-图11所示流程中移动终端执行的步骤,车机系统登录装置1300可以是移动终端,或者移动终端内的芯片或电路。通信接口1303,用于执行上文实施例中移动终端收发操作。处理器1301,用于执行上文方法实施例中移动终端的处理相关操作。
例如,通信接口1303,用于与车机建立近场通信链接,所述车机与所述车机系统相对应;处理器1301,用于通过所述近场通信链接与所述车机协商登录绑定码;通信接口1303,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
在一种示例中,车机系统登录装置1300用于实现上述图5-图11所示流程中车机执行的步骤,车机系统登录装置1300可以是车机,或者车机内的芯片或电路。通信接口1303,用于执行上文实施例中车机侧收发的相关操作。处理器1301,用于执行上文方法实施例中车机侧的处理相关操作。
例如,通信接口1303,用于与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;处理器1301,用于通过所述近场通信链接与所述移动终端协商登录绑定码;通信接口1303,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;通信接口1303,还用于接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;处理器1301,还用于在所述车机系统上登录所述第一用户账号。
在一种示例中,车机系统登录装置1300用于实现上述图5-图11所示流程中网络侧设备执行的步骤,车机系统登录装置1300可以是网络侧设备,或者网络侧设备内的芯片或电路。通信接口1303,用于执行上文实施例中网络侧设备侧收发的相关操作。处理器1301,用于执行上文方法实施例中网络侧设备侧的处理相关操作。
例如,处理器1301,用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;通信接口1303,还用于向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
在本申请实施例中,处理器可以是通用处理器、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。
在本申请实施例中,存储器可以是非易失性存储器,比如硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD)等,还可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM)。存储器是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本申请实施例中的存储器还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
本申请实施例提供的方法中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、 专用计算机、计算机网络、网络设备、用户设备或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,简称DSL)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机可以存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,数字视频光盘(digital video disc,简称DVD)、或者半导体介质(例如,SSD)等。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
本申请实施例中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a和b,a和c,b和c,或a和b和c,其中a,b,c可以是单个,也可以是多个。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,在没有超过本申请的范围内,可以通过其他的方式实现。例如,以上所描述的实施例仅仅是示意性的, 例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
另外,所描述装置和方法以及不同实施例的示意图,在不超出本申请的范围内,可以与其它系统,模块,技术或方法结合或集成。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电子、机械或其它的形式。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (39)

  1. 一种车机系统登录方法,其特征在于,所述方法用于在移动终端侧请求在所述车机系统上以第一用户账号登录,包括:
    与车机建立近场通信链接,所述车机与所述车机系统相对应;
    通过所述近场通信链接与所述车机协商登录绑定码;
    向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
  2. 如权利要求1所述的方法,其特征在于,所述登录绑定码为所述网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
  3. 如权利要求2所述的方法,其特征在于,所述通过所述近场通信链接与所述车机协商登录绑定码,包括:
    通过所述近场通信链接向所述车机发送第一登录请求消息;
    通过所述近场通信链接接收所述车机返回的登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码,所述登录绑定码为所述车机向所述网络侧设备请求得到的;
    所述向网络侧设备提供所述登录绑定码,包括:
    向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息包括所述登录绑定码,所述第一验证请求消息还包括所述第一用户账号或所述车机系统识别码中的至少一项。
  4. 如权利要求2所述的方法,其特征在于,所述通过所述近场通信链接与所述车机协商登录绑定码,包括:
    向所述网络侧设备发送第一绑定码申请消息;
    接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;
    通过所述近场通信链接向所述车机发送第三验证请求消息,所述第三验证请求消息中包括所述登录绑定码;
    所述向网络侧设备提供所述登录绑定码,包括:
    间接地经由向所述车机发送所述第三验证请求消息来向所述网络侧设备提供所述登录绑定码。
  5. 如权利要求2所述的方法,其特征在于,所述通过所述近场通信链接与所述车机协商登录绑定码,包括:
    向所述网络侧设备发送第一绑定码申请消息;
    接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;
    通过所述近场通信链接向所述车机发送第二登录请求消息,所述第二登录请求消息中包括所述登录绑定码;
    所述向网络侧设备提供所述登录绑定码,包括:
    向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
  6. 如权利要求1所述的方法,其特征在于,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
  7. 如权利要求6所述的方法,其特征在于,所述向网络侧设备提供所述登录绑定码,包括:
    向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
  8. 如权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:在所述移动终端上以所述第一用户账号登录第一应用程序,并且所述网络侧设备为所述第一应用程序的应用服务器。
  9. 如权利要求1-8任一项所述的方法,其特征在于,所述方法还包括:接收所述网络侧设备发送的验证反馈消息。
  10. 如权利要求1-9任一项所述的方法,其特征在于,所述方法还包括:接收所述车机发送的登陆成功消息。
  11. 如权利要求3-5或7任一项所述的方法,其特征在于,所述第一验证请求消息或者所述第二登录请求消息中还包括所述移动终端识别码或所述车机识别码中的至少一项。
  12. 如权利要求1-11任一项所述的方法,其特征在于,在与所述车机建立近场通信链接后,所述方法还包括:基于所述近场通信链接向所述车机发送车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
  13. 如权利要求12所述的方法,其特征在于,所述车机系统启动请求在所述移动终端与所述车机之间距离小于第一阈值时发送。
  14. 一种车机系统登录方法,其特征在于,所述方法用于在车机上实现以第一用户账号登录所述车机系统,其中,所述车机与所述车机系统相对应,所述方法包括:
    与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;
    通过所述近场通信链接与所述移动终端协商登录绑定码;
    向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;
    接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;
    在所述车机系统上登录所述第一用户账号。
  15. 如权利要求14所述的方法,其特征在于,所述登录绑定码为所述网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
  16. 如权利要求15所述的方法,其特征在于,所述通过所述近场通信链接与所述移动终端协商登录绑定码,包括:
    通过所述近场通信链接从所述移动终端接收第一登录请求消息;
    向所述网络侧设备发送第二绑定码申请消息;
    接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;
    通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;
    所述向网络侧设备提供所述登录绑定码,包括:
    间接地经由向所述移动终端发送所述登录请求反馈消息来向所述网络侧设备提供所述登录绑定码。
  17. 如权利要求15所述的方法,其特征在于,所述通过所述近场通信链接与所述移动终端协商登录绑定码,包括:
    通过所述近场通信链接从所述移动终端接收第一登录请求消息;
    向所述网络侧设备发送第二绑定码申请消息;
    接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;
    通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;
    所述向网络侧设备提供所述登录绑定码,包括:
    向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
  18. 如权利要求15所述的方法,其特征在于,所述通过所述近场通信链接与所述移动终端协商登录绑定码,包括:
    通过所述近场通信链接从所述移动终端接收第三验证请求消息或第二登录请求消息,所述第三验证请求消息或所述第二登录请求消息中包括所述登录绑定码,其中,所述登录绑定码为所述移动终端向所述网络侧设备请求得到的;
    所述向网络侧设备提供所述登录绑定码,包括:
    向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码。
  19. 如权利要求14所述的方法,其特征在于,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
  20. 如权利要求19所述的方法,其特征在于,所述向网络侧设备提供所述登录绑定码,包括:
    向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
  21. 如权利要求14-20任一项所述的方法,其特征在于,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序用于在所述移动终端上运行以发出以所述第一用户账号登录所述车机系统的请求。
  22. 如权利要求14-21任一项所述的方法,其特征在于,所述方法还包括:从所述网络侧设备接收所述第一用户账号的个性化登录数据,并根据所述个性化登录数据设置所述车机系统。
  23. 如权利要求14-22任一项所述的方法,其特征在于,所述方法还包括:向所述移动终端发送登陆成功消息。
  24. 如权利要求16-18或20任一项所述的方法,其特征在于,所述登录请求反馈消息或者所述第二验证请求消息中包括所述移动终端识别码或所述车机识别码中的至少一项。
  25. 如权利要求14-24任一项所述的方法,其特征在于,在与所述移动终端建立近场通信链接后,所述方法还包括:基于所述近场通信链接从所述移动终端接收车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
  26. 一种车机系统登录方法,其特征在于,所述方法用于在网络侧设备上验证以第一用户账号登录所述车机系统,所述方法包括:
    根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;
    向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
  27. 如权利要求26所述的方法,其特征在于,所述方法还包括:向所述车机发送所述第一用户账号的个性化登录数据,所述个性化登录数据用于设置所述车机系统。
  28. 如权利要求26或27所述的方法,其特征在于,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序运行在所述移动终端上并用于发起以第一用户账号登录所述车机系统的请求。
  29. 如权利要求26-28任一所述的方法,其特征在于,在所述根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统之前,还包括:
    从所述车机或所述移动终端接收绑定码申请消息,所述绑定码申请消息中包括所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项;
    根据所述绑定码申请消息,生成所述登录绑定码,并向所述车机或所述移动终端发送绑定码反馈消息,所述绑定码反馈消息中包括所述登录绑定码。
  30. 如权利要求29所述的方法,其特征在于,所述根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统,包括:
    从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;
    确定所述第一验证请求消息中的登录绑定码与所述生成的登录绑定码一致;
    确定可以以第一用户账号登录所述车机系统;
    或者,
    从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;
    确定所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;
    确定可以以第一用户账号登录所述车机系统。
  31. 如权利要求26-28任一所述的方法,其特征在于,所述登录绑定码为所述移动终 端生成的,或者所述车机生成的,或者所述移动终端和所述车机共同生成的。
  32. 如权利要求31所述的方法,其特征在于,所述根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统,包括:
    从所述移动终端接收第一验证请求消息,从所述车机接收第二验证请求消息;其中,所述第一验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第二验证请求消息中包括所述车机系统识别码和所述登录绑定码;或者,第二验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第一验证请求消息中包括所述车机系统识别码和所述登录绑定码;
    确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码一致;
    确定可以以第一用户账号登录所述车机系统。
  33. 如权利要求30-32任一所述的方法,其特征在于,所述第一验证请求消息或所述第二验证请求消息中还包括:所述移动终端识别码或所述车机识别码中的至少一项。
  34. 一种车机系统登录装置,其特征在于,所述车机系统登录装置用于请求在所述车机系统上以第一用户账号登录,所述装置包括:
    通信单元,用于与车机建立近场通信链接,所述车机与所述车机系统相对应;
    处理单元,用于通过所述近场通信链接与所述车机协商登录绑定码;
    所述通信单元,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
  35. 一种车机系统登录装置,其特征在于,所述车机系统登录装置用于实现在车机上以第一用户账号登录车机系统,所述车机与所述车机系统相对应,所述装置包括:
    通信单元,用于与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;
    处理单元,用于通过所述近场通信链接与所述移动终端协商登录绑定码;
    所述通信单元,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;
    所述通信单元,还用于接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;
    所述处理单元,还用于在所述车机系统上登录所述第一用户账号。
  36. 一种车机系统登录装置,其特征在于,车机系统登录装置用于验证以第一用户账号登录所述车机系统,所述装置包括:
    处理单元,用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;
    通信单元,还用于向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
  37. 一种车机系统登录装置,其特征在于,所述车机系统登录装置包括处理器和存储器;所述存储器中存储有程序指令,当所述程序指令被执行时,使得所述车机系统登录装 置执行如权利要求1-33任一所述的方法。
  38. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括计算机程序,当所述计算机程序在处理器上运行时,使得车机系统登录装置执行如权利要求1-33任一所述的方法。
  39. 一种计算机程序产品,其特征在于,当所述计算机程序产品在处理器上运行时,使得车机系统登录装置执行如权利要求1-33任一所述的方法。
PCT/CN2020/078479 2020-03-09 2020-03-09 一种车机系统登录方法及相关装置 WO2021179144A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
CN202080097282.5A CN115136625B (zh) 2020-03-09 2020-03-09 一种车机系统登录方法及相关装置
EP20924813.7A EP4106357A4 (en) 2020-03-09 2020-03-09 METHOD FOR CONNECTING TO AN ON-BOARD COMPUTER SYSTEM AND ASSOCIATED DEVICE
KR1020227034216A KR20220150346A (ko) 2020-03-09 2020-03-09 차량 내 시스템에 로그인하기 위한 방법 및 관련 장치
PCT/CN2020/078479 WO2021179144A1 (zh) 2020-03-09 2020-03-09 一种车机系统登录方法及相关装置
JP2022553020A JP7440130B2 (ja) 2020-03-09 2020-03-09 車載システムにログインするための方法および関連装置
US17/939,804 US20230006991A1 (en) 2020-03-09 2022-09-07 Method and related apparatus for logging in to in-vehicle system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/078479 WO2021179144A1 (zh) 2020-03-09 2020-03-09 一种车机系统登录方法及相关装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/939,804 Continuation US20230006991A1 (en) 2020-03-09 2022-09-07 Method and related apparatus for logging in to in-vehicle system

Publications (1)

Publication Number Publication Date
WO2021179144A1 true WO2021179144A1 (zh) 2021-09-16

Family

ID=77670425

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/078479 WO2021179144A1 (zh) 2020-03-09 2020-03-09 一种车机系统登录方法及相关装置

Country Status (6)

Country Link
US (1) US20230006991A1 (zh)
EP (1) EP4106357A4 (zh)
JP (1) JP7440130B2 (zh)
KR (1) KR20220150346A (zh)
CN (1) CN115136625B (zh)
WO (1) WO2021179144A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978724B (zh) * 2022-05-26 2024-02-20 重庆长安汽车股份有限公司 一种车机多模式融合登录系统及方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105501031A (zh) * 2014-09-23 2016-04-20 比亚迪股份有限公司 车窗的控制方法和系统
WO2017097129A1 (zh) * 2015-12-08 2017-06-15 阿里巴巴集团控股有限公司 建立短距离无线通道的方法及装置
CN107800708A (zh) * 2017-11-06 2018-03-13 上海擎感智能科技有限公司 一种车机账户自动登录方法和车机装置
CN107895572A (zh) * 2016-09-30 2018-04-10 法乐第(北京)网络科技有限公司 一种语音识别训练方法及系统
CN110198528A (zh) * 2019-05-22 2019-09-03 上海博泰悦臻网络技术服务有限公司 一种个性化设置同步方法、车机及系统

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140310788A1 (en) * 2013-04-15 2014-10-16 Flextronics Ap, Llc Access and portability of user profiles stored as templates
CN104601327B (zh) * 2013-12-30 2019-01-29 腾讯科技(深圳)有限公司 一种安全验证方法、相关设备和系统
CN104836780B (zh) * 2014-02-12 2017-03-15 腾讯科技(深圳)有限公司 数据交互方法、验证终端、服务器和系统
CN105490996B (zh) * 2014-10-09 2019-02-26 比亚迪股份有限公司 车辆蓝牙钥匙的授权系统和方法
US10701059B2 (en) * 2015-12-29 2020-06-30 Morphotrust Usa, Llc Onboard vehicle digital identification transmission
EP3463993A1 (en) * 2016-06-03 2019-04-10 Volkswagen Aktiengesellschaft Apparatus, system and method for dynamic identification and key managemement for vehicle access
CN107592627A (zh) * 2016-07-06 2018-01-16 深圳联友科技有限公司 一种基于4g网络鉴权的安全蓝牙连接方法
CN107733838A (zh) * 2016-08-11 2018-02-23 中国移动通信集团安徽有限公司 一种移动终端客户端身份认证方法、装置和系统
JP2018074205A (ja) 2016-10-24 2018-05-10 富士通株式会社 プログラム、情報処理装置、情報処理システム、及び情報処理方法
WO2018135919A1 (en) * 2017-01-20 2018-07-26 Samsung Electronics Co., Ltd. Apparatus and method for providing and managing security information in communication system
WO2018161690A1 (zh) * 2017-03-07 2018-09-13 北京奇虎科技有限公司 可穿戴设备权限转移的方法、装置及终端
JP6898139B2 (ja) 2017-04-10 2021-07-07 株式会社東海理化電機製作所 ユーザ認証システム及びユーザ認証方法
CN108322507B (zh) * 2017-12-28 2021-02-19 天地融科技股份有限公司 一种利用安全设备执行安全操作的方法及系统
US10218695B1 (en) * 2018-03-27 2019-02-26 Capital One Services, Llc Systems and methods for providing credentialless login using a random one-time passcode
US10604115B2 (en) * 2018-03-29 2020-03-31 Omar Mustafa Kamal Ahmad NFC system for unlocking a vehicle via smartphone biometric authentication
CN109033769B (zh) * 2018-06-29 2022-06-10 蔚来(安徽)控股有限公司 基于交互、服务器、车机的车辆出厂检测方法及其装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105501031A (zh) * 2014-09-23 2016-04-20 比亚迪股份有限公司 车窗的控制方法和系统
WO2017097129A1 (zh) * 2015-12-08 2017-06-15 阿里巴巴集团控股有限公司 建立短距离无线通道的方法及装置
CN107895572A (zh) * 2016-09-30 2018-04-10 法乐第(北京)网络科技有限公司 一种语音识别训练方法及系统
CN107800708A (zh) * 2017-11-06 2018-03-13 上海擎感智能科技有限公司 一种车机账户自动登录方法和车机装置
CN110198528A (zh) * 2019-05-22 2019-09-03 上海博泰悦臻网络技术服务有限公司 一种个性化设置同步方法、车机及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4106357A4 *

Also Published As

Publication number Publication date
JP7440130B2 (ja) 2024-02-28
CN115136625A (zh) 2022-09-30
EP4106357A1 (en) 2022-12-21
KR20220150346A (ko) 2022-11-10
US20230006991A1 (en) 2023-01-05
EP4106357A4 (en) 2023-07-12
JP2023517027A (ja) 2023-04-21
CN115136625B (zh) 2023-06-02

Similar Documents

Publication Publication Date Title
US9894526B2 (en) Mobile applications using vehicle telematics data
CN105101115B (zh) 用于启动应用的方法和系统
US20170180330A1 (en) Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium
US9305453B2 (en) Method and apparatus for extra-vehicular emergency updates following an accident
US20150264017A1 (en) Secure vehicle data communications
WO2018120493A1 (zh) 通信连接建立方法、系统、移动终端、车载设备及对应设备和计算机存储介质
CN113056898B (zh) 获取密钥的方法、装置及密钥管理系统
CN104322037A (zh) 缓冲传输服务
WO2021098212A1 (zh) 软件升级方法、装置和系统
WO2017177935A1 (zh) 基于车辆的通信方法、系统及装置
US20190334969A1 (en) Media Downlink Transmission Control Method and Related Device
US9596225B2 (en) Out-of-vehicle device interface apparatus and method for protecting in-vehicle network
WO2021179144A1 (zh) 一种车机系统登录方法及相关装置
US10308217B2 (en) Method and apparatus for secure pairing
CN116723508B (zh) 车钥匙创建方法、装置、存储介质及系统
US20170080896A1 (en) Method and apparatus for secure pairing based on fob presence
CN104485011A (zh) 一种实现车联网接人功能的云服务器、系统及方法
WO2022111691A1 (zh) Nfc标签的校验方法和相关设备
CN112640504B (zh) 一种安全通信的方法及装置
WO2023108618A1 (zh) 一种基于空中下载ota技术的升级方法及通信装置
CN110972204A (zh) 资源配置的方法、装置、存储介质及网络设备和终端
WO2019104989A1 (zh) 终端和通信方法
KR102422142B1 (ko) 차량 간 통신 연결 시스템 및 그 제어방법
CN114765548B (zh) 目标业务的处理方法及装置
US11972247B2 (en) Software upgrading method, apparatus, and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20924813

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022553020

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2020924813

Country of ref document: EP

Effective date: 20220913

ENP Entry into the national phase

Ref document number: 20227034216

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE