WO2021179144A1 - 一种车机系统登录方法及相关装置 - Google Patents
一种车机系统登录方法及相关装置 Download PDFInfo
- Publication number
- WO2021179144A1 WO2021179144A1 PCT/CN2020/078479 CN2020078479W WO2021179144A1 WO 2021179144 A1 WO2021179144 A1 WO 2021179144A1 CN 2020078479 W CN2020078479 W CN 2020078479W WO 2021179144 A1 WO2021179144 A1 WO 2021179144A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vehicle
- login
- mobile terminal
- binding code
- code
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/48—Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- This application relates to the field of connected cars and smart cars, in particular to a method and related devices for logging in to a car-machine system.
- the car-machine system uses a user account login mechanism to implement personalized vehicle configuration for users based on the user account.
- a user account login mechanism to implement personalized vehicle configuration for users based on the user account.
- the personalized configuration of the vehicle and machine system such as automatic driving data, driving behavior habit data, vehicle seat rearview mirror adjustment data, and driving mode.
- users can use their own user accounts to log in to the vehicle systems of different vehicles, and different vehicles can also provide the driver with services that meet the driver’s personal habits through the personalized data of the user account.
- My" smart car experience can be used to use their own user accounts to log in to the vehicle systems of different vehicles, and different vehicles can also provide the driver with services that meet the driver’s personal habits through the personalized data of the user account. My" smart car experience.
- the mobile app and the car are connected via Bluetooth.
- the Bluetooth near field communication range When the mobile phone and the car are within the Bluetooth near field communication range, data transmission and account verification are performed. After passing, the account login is completed. In this way, if there is no account information on the car terminal, the account login before getting on the car cannot be completed, so it is necessary to complete the login in advance and store the account information locally; in addition, the Bluetooth near field communication method is easy to be caught Following the attack, after intercepting the Bluetooth signal, the Bluetooth signal can be copied to complete the account login. If the account contains the vehicle control authority, the vehicle control authority is obtained indirectly.
- the user remotely sends instructions through the mobile phone, and sends the instructions to the vehicle through the telematics service provider (TSP), and the vehicle completes the remote login.
- TSP telematics service provider
- the user needs to determine the time of getting on the bus by himself, and then complete the account login in advance, and the user experience is poor.
- the embodiments of the present application provide a method and related devices for logging in to a vehicle system, so as to provide a convenient and safe solution for logging in to a vehicle system.
- a method for logging in to an in-vehicle system which is used to request a first user account to log in on an in-vehicle system on the mobile terminal side.
- the method includes: establishing a near-field communication link between a mobile terminal and a car machine, the car machine corresponding to the car-machine system; negotiating and logging in a binding code with the car machine through the near-field communication link;
- the login binding code is provided, and the login binding code is used by the network-side device to verify whether it is possible to log in with the first user account on the vehicle system.
- the method provided in the first aspect described above can be executed by a mobile terminal, and the mobile terminal mentioned here may be a mobile terminal device or a device capable of supporting the functions required by the mobile terminal device to implement the method, such as a chip system.
- the mobile terminal device is a mobile phone.
- the mobile terminal establishes a near field communication connection with the vehicle and the vehicle, and negotiates the login binding code with the vehicle through the near field communication link, so that the network side device can verify whether it can be on the vehicle system according to the login binding code.
- Log in with the first user account in the mobile terminal In this method, the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of a near field communication relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
- the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. At least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
- mode 1 to mode 3 is as follows.
- Manner 1 The mobile terminal sends a first login request message to the vehicle through the near field communication link; receives a login request feedback message returned by the vehicle through the near field communication link, in the login request feedback message Including the login binding code, the login binding code is obtained by the vehicle and the machine requesting the network side device; the providing the login binding code to the network side device includes: The device sends a first verification request message, the first verification request message includes the login binding code, and the first verification request message further includes at least one of the first user account or the vehicle system identification code item.
- the login binding code determined through negotiation between the mobile terminal and the vehicle system is that the vehicle requests the network side device to obtain the login binding code.
- the mobile terminal provides the login binding code to the network side device for verification.
- the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
- Manner 2 The mobile terminal sends a first binding code request message to the network side device; receives a first binding code feedback message returned by the network side device, and the first binding code feedback message includes the login A binding code; sending a third verification request message to the vehicle through the near field communication link, the third verification request message including the login binding code; the providing the network side device with the login binding
- the code determination includes: providing the login binding code to the network side device indirectly via sending the third verification request message to the vehicle.
- the login binding code determined through negotiation between the mobile terminal and the vehicle system is the mobile terminal requesting the network side device to obtain the login binding code.
- the mobile terminal indirectly provides the login binding code to the network side device for verification via the car machine.
- the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
- Manner 3 The mobile terminal sends a first binding code request message to the network side device; receives a first binding code feedback message returned by the network side device, and the first binding code feedback message includes the login A binding code; sending a second login request message to the vehicle through the near field communication link, the second login request message including the login binding code; the providing the network side device with the login binding
- the code determination includes: sending a first verification request message to the network side device, the first verification request message includes the login binding code, and the first verification request message further includes the first user account Or at least one of the identification codes of the vehicle and machine system.
- the login binding code determined through negotiation between the mobile terminal and the vehicle system is the mobile terminal requesting the network side device to obtain the login binding code.
- the mobile terminal provides the login binding code to the network side device (correspondingly, the car machine can also provide the login binding code to the network side device) for verification.
- the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
- Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the mobile terminal and the vehicle to negotiate the login binding code through the near-field communication link.
- the mobile terminal generates the first login binding code and sends the first login binding code to the vehicle.
- a login binding code is the finally negotiated login binding code, or the car machine generates the first login binding code and sends the first login binding code to the mobile terminal, the first login binding code is the final negotiated login The binding code, or the mobile terminal generates the first login binding code and sends it to the car machine, the car machine generates the second login binding code based on the first login binding code, and sends the second login binding code to the mobile terminal.
- the second login binding code is the final negotiated login binding, or the car machine generates the first login binding code and sends it to the mobile terminal, and the mobile terminal generates the second login binding code based on the first login binding code, and then transfers the second login binding code to the mobile terminal.
- the login binding code is sent to the vehicle, and the second login binding code is the final negotiated login binding, etc., which is not limited in the embodiment of the application.
- the mobile terminal logging in the binding code to the network side device provider includes: the mobile terminal sends a first verification request message to the network side device, and the first verification request message includes the login binding code , The first verification request message further includes at least one of the first user account or the vehicle system identification code.
- the login binding code is generated by the car machine and/or the mobile terminal.
- the mobile terminal can send the login binding code to the network side device for verification, and the car machine can also send the login binding code to the network side device for verification.
- the login binding code can verify the relationship between the vehicle and the mobile terminal, which helps to improve the security of the login vehicle system.
- the method further includes: logging in to a first application program with the first user account on the mobile terminal, and the network side device is The application server of the first application.
- the first application program may be any application program in the mobile terminal, for example, Baidu map, altitude map, or other applications.
- the application server corresponding to the first application verifies whether the first user account logged in by the first application can be used to log in to the vehicle system, so as to avoid using other servers to send the first user account to other services, which may lead to user information failure. Loss, to a certain extent, improve user information security.
- the method further includes: the mobile terminal receives a verification feedback message sent by the network side device.
- the network side device after the network side device completes the verification, it can send verification feedback information to the mobile terminal, for example, whether the verification is passed or not, so as to prompt the user to log in successfully or fail.
- the method further includes: a mobile terminal receiving a login success message sent by the vehicle.
- a login success message is sent to the mobile terminal to prompt the user that the vehicle system is successfully logged in.
- the first verification request message or the second login request message further includes the mobile terminal identification code or the vehicle identification code At least one of.
- the network side device may be known. For example, after the mobile terminal logs in to the first application with the first user account and reports the mobile terminal identification code to the network side device, then the network side device The corresponding relationship between the first user account and the mobile terminal identification code is determined. If the mobile terminal identification code is included in the first verification request message, it is possible to more accurately verify whether the vehicle system can be logged in with the first user account, which improves the security of vehicle system login.
- the network-side device may be known for the vehicle identification code.
- the vehicle identification code is reported to the network-side device. If the vehicle identification code is included in the first verification request message, it is possible to more accurately verify whether the vehicle system can be logged in with the first user account, thereby improving the security of vehicle system login.
- the method further includes: the mobile terminal communicates to the vehicle based on the near field communication link.
- the locomotive sends a locomotive system activation request, and the locomotive system activation request is used to activate the locomotive system.
- the mobile terminal realizes the automatic startup of the car-machine system through the near field communication link, which is convenient to operate.
- the vehicle system start request is sent when the distance between the mobile terminal and the vehicle machine is less than a first threshold.
- the mobile terminal when the mobile terminal determines that the distance to the vehicle is less than the first threshold, it sends the vehicle system activation request to the vehicle to avoid accidentally triggering the vehicle system activation when the mobile terminal is far from the vehicle. , The operation is convenient and the safety is high.
- a method for logging in to the vehicle system is also provided, which is used to log in the vehicle system with a first user account on the vehicle, wherein the vehicle and the vehicle system correspond to the vehicle and the vehicle system.
- the method includes: establishing a near field communication link with a mobile terminal, the mobile terminal being used to issue a request to log in to the vehicle system with the first user account; and negotiating login binding with the mobile terminal through the near field communication link.
- Fixed code provide the login binding code to the network side device, the login binding code is used by the network side device to verify whether it can log in with the first user account on the vehicle system; receive the A login instruction message sent by the network side device, where the login instruction message is used to instruct to log in to the first user account on the vehicle system; and to log in to the first user account on the vehicle system.
- the method provided in the second aspect described above can be executed by a car machine or a device capable of supporting the car machine to realize the functions required by the method, such as a chip system.
- the car machine establishes a near field communication connection with the mobile terminal, and negotiates the login binding code with the mobile terminal through the near field communication link, so that the network side device can verify whether it can be on the car machine system according to the login binding code.
- Log in with the first user account in the mobile terminal In this method, the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated between the car and the mobile terminal, and the login binding code can verify the existence of an association relationship between the car and the mobile terminal, which helps to improve the security of the login car system.
- the login binding code may be generated by a network side device.
- the login binding code is a mobile terminal identification used by the network side device to identify the mobile terminal according to the first user account.
- Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system.
- mode 1 to mode 3 is as follows.
- Manner 1 The vehicle receives a first login request message from the mobile terminal through the near field communication link; sends a second binding code request message to the network side device; receives the second binding code returned by the network side device.
- a fixed code feedback message, the second binding code feedback message includes the login binding code;
- a login request feedback message is sent to the mobile terminal through the near field communication link, and the login request feedback message includes all The login binding code;
- the providing the login binding code to the network side device includes: indirectly providing the login binding code to the network side device via sending the login request feedback message to the mobile terminal code.
- the login binding code determined by the vehicle machine and the mobile terminal through negotiation is the vehicle machine's request to the network side device to obtain the login binding code.
- the car machine indirectly provides the login binding code to the network side device for verification via the mobile terminal.
- the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated between the car and the mobile terminal, and the login binding code can verify the existence of an association relationship between the car and the mobile terminal, which helps to improve the security of the login car system.
- Manner 2 The vehicle receives a first login request message from the mobile terminal through the near field communication link; sends a second binding code request message to the network side device; receives the second binding code returned by the network side device.
- a fixed code feedback message, the second binding code feedback message includes the login binding code;
- a login request feedback message is sent to the mobile terminal through the near field communication link, and the login request feedback message includes all The login binding code;
- the providing the login binding code to the network side device includes: sending a second verification request message to the network side device, and the second verification request message includes the login binding code ,
- the second verification request message further includes at least one of the first user account or the vehicle system identification code.
- the login binding code determined through negotiation between the vehicle and the mobile terminal is the vehicle request to the network side device to obtain the login binding code.
- the car machine provides the login binding code to the network side device for verification.
- the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
- Manner 3 The vehicle receives a third verification request message or a second login request message from the mobile terminal through the near field communication link, and the third verification request message or the second login request message includes the login Binding code, wherein the login binding code is obtained by the mobile terminal upon request from the network side device; the providing the login binding code to the network side device includes: sending to the network side device A second verification request message, where the second verification request message includes the login binding code.
- the login binding code determined through negotiation between the car machine and the mobile terminal is the mobile terminal requesting the network side device to obtain the login binding code.
- the car machine provides the login binding code to the network side device (correspondingly, the mobile terminal may also provide the login binding code to the network side device) for verification.
- the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
- Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the mobile terminal providing the login binding code to the network side device includes: sending a second verification request message to the network side device, where the second verification request message includes the login binding code, so The second verification request message also includes at least one of the first user account or the vehicle system identification code.
- the login binding code is generated by the car machine and/or the mobile terminal.
- the mobile terminal can send the login binding code to the network side device, and the car machine can also send the login binding code to the network side device.
- the binding code can verify the relationship between the vehicle and the mobile terminal, which helps to improve the security of logging in to the vehicle system with the user account in the mobile terminal.
- the network-side device is an application server of a first application
- the first application is configured to run on the mobile terminal to issue A request for the first user account to log in to the vehicle system.
- the first application program may be any application in the mobile terminal, for example, Baidu map, altitude map, or other applications.
- the application server corresponding to the first application verifies whether the first user account logged in the first application can be used to log in to the vehicle system, so as to avoid using other servers to send the first user account to other services, which may lead to user information failure. Loss, to a certain extent, improve user information security.
- the method further includes: the car machine receives the personalized login data of the first user account from the network side device, and according to the personality And set up the car-machine system based on the log-in data.
- the first user account includes the user’s personalized login data, such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc. After the vehicle system logs in to the first user account, you can use the personality Log in data to set up the car-machine system to provide drivers with driving services in line with personal habits.
- personalized login data such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc.
- the method further includes: the vehicle machine sends a login success message to the mobile terminal.
- a login success message is sent to the mobile terminal to prompt the user that the vehicle system is successfully logged in.
- the login request feedback message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code One item.
- the network side device may be known. For example, after the mobile terminal logs in to the first application with the first user account and reports the mobile terminal identification code to the network side device, then the network side device The corresponding relationship between the first user account and the mobile terminal identification code is determined. If the second verification request message includes the mobile terminal identification code, it is possible to more accurately verify whether the first user account can be used to log in to the vehicle system, which improves the security of vehicle system login.
- the network-side device may be known for the vehicle identification code.
- the vehicle identification code is reported to the network-side device.
- the second verification request message includes the vehicle identification code, so that it can be more accurately verified whether the vehicle system can be logged in with the first user account, and the security of the vehicle system login can be improved.
- the method further includes: receiving from the mobile terminal based on the near field communication link A vehicle-motor system activation request, and the vehicle-motor system activation request is used to activate the vehicle-motor system.
- the mobile terminal realizes the automatic startup of the car-machine system through the near field communication link, which is convenient to operate.
- a method for logging in to the vehicle system is also provided, which is used to verify on a network side device to log in to the vehicle system with a first user account.
- the method includes: according to the login binding code, the first The verification of the user account and the vehicle system identification code used to identify the vehicle system can log in to the vehicle system with the first user account, and the login binding code is used to verify the establishment between the mobile terminal and the vehicle system.
- the car machine corresponds to the car machine system; the login binding code is also used to verify that the user holding the mobile terminal requests to use the first user account on the car machine Log in to the vehicle system; send a login instruction message to the vehicle, where the login instruction message is used to instruct to log in to the vehicle system with the first user account on the vehicle.
- the method provided by the above third aspect may be executed by a network-side device or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
- the login binding code is negotiated and determined by the mobile terminal and the car machine through the near field communication link, so the login binding code can verify that the mobile terminal and the car machine have established a near field communication link, and can also verify that the mobile terminal and the car machine have established a near field communication link.
- the user of the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle. In this method, the user does not need to judge the boarding time by himself, and the vehicle system does not need to log in to the first user account in advance, and the operation is convenient.
- the login binding code is negotiated and determined by the mobile terminal and the car machine. The login binding code can verify the existence of an association relationship between the car machine and the mobile terminal, which helps to improve the security of the login car machine system.
- the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. At least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
- the method further includes: A binding code application message is received from the vehicle or the mobile terminal, and the binding code application message includes the first user account, the mobile terminal identification code used to identify the mobile terminal, and the mobile terminal identification code used to identify the mobile terminal. At least one of the vehicle and vehicle system identification code of the vehicle and vehicle system or the vehicle and vehicle identification code used to identify the vehicle and vehicle; according to the binding code application message, the login binding code is generated, and the The vehicle or the mobile terminal sends a binding code feedback message, and the binding code feedback message includes the login binding code.
- the network side device generates a login binding code based on at least one of the first user account, mobile terminal identification code, vehicle system identification code, or vehicle identification code, and binds it through the login.
- the fixed code can verify the relationship between the car machine and the mobile terminal, which helps to improve the security of logging in to the car machine system with the user account in the mobile terminal.
- the network side device can log in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- the vehicle system identification code used to identify the vehicle system.
- mode 1 to mode 3 is as follows.
- Manner 1 The network side device receives a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user account Or at least one of the vehicle system identification codes; determining that the login binding code in the first verification request message is consistent with the generated login binding code; determining that the vehicle can be logged in with the first user account ⁇ Machine system.
- the login binding code is generated by the network side device and sent to the car machine.
- the login binding code is received from the mobile terminal side, indicating that there is an association relationship between the mobile terminal and the car machine, which helps to improve the login car machine system It is safe and does not require the user to judge the boarding time by himself, and the vehicle system does not need to pre-log in the first user account, which is convenient to operate.
- Manner 2 The network side device receives a second verification request message from the vehicle, the second verification request message includes the login binding code; the second verification request message also includes the first user account Or at least one of the vehicle system identification codes; determining that the login binding code in the second verification request message is consistent with the generated login binding code; determining that the vehicle can be logged in with the first user account ⁇ Machine system.
- the login binding code is generated by the network side device and sent to the mobile terminal.
- the login binding code is received from the vehicle side, indicating that there is an association relationship between the mobile terminal and the vehicle, which helps to improve the login vehicle system It is safe and does not require the user to judge the boarding time by himself, and the vehicle system does not need to pre-log in the first user account, which is convenient to operate.
- Manner 3 The network side device receives a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user account Or at least one of the vehicle and machine system identification codes; the network side device receives a second verification request message from the vehicle and machine, and the second verification request message includes the login binding code; the second verification The request message also includes at least one of the first user account or the vehicle system identification code; it is determined that the login binding code in the first verification request message and the second verification request message is consistent with the The generated login binding codes are consistent; it is determined that the vehicle system can be logged in with the first user account.
- the login binding code is generated by the network side device, and the login binding code is received from the car machine and the mobile terminal respectively, indicating that there is an association relationship between the mobile terminal and the car machine, which helps to improve the security of the login car machine system
- users do not need to judge the boarding time by themselves, and the vehicle system does not need to log in to the first user account, which is convenient to operate.
- Solution 2 The login binding code is generated by the mobile terminal, or generated by the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the network side device can log in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- the method may be: receiving a first verification request message from the mobile terminal, and receiving a second verification request message from the vehicle; wherein, the first verification request message includes the first user account and the login Binding code; the second verification request message includes the vehicle system identification code and the login binding code; or, the second verification request message includes the first user account and the login binding code
- the first verification request message includes the vehicle system identification code and the login binding code; determining that the login binding code in the first verification request message and the second verification request message are consistent; confirm The vehicle system can be logged in with the first user account.
- the login binding code is generated by the car machine and/or the mobile terminal.
- the mobile terminal can send the login binding code to the network side device, and the car machine can also send the login binding code to the network side device.
- the login binding code can better verify the relationship between the vehicle and the mobile terminal, which helps to improve the security of the login vehicle system.
- the first verification request message or the second verification request message further includes: the mobile terminal identification code or the vehicle identification code At least one of.
- the first verification request message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code, which can further improve the security of the vehicle login system.
- the mobile terminal identification code is included in the first verification request message, and if the mobile terminal identification code is known to the network side device, it can be verified whether the mobile terminal identification code in the first verification request message is consistent with the previously known mobile terminal identification If yes, the verification is passed and login security is improved.
- the method further includes: the network side device sends the personalized login data of the first user account to the car machine, and the personalized login The data is used to set up the car-machine system.
- the first user account includes the user’s personalized login data, such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc. After the vehicle system logs in to the first user account, you can use the personality Set up the car-machine system with log-in data to provide the driver with a driving experience in line with the user’s personal habits.
- personalized login data such as automatic driving data, driving behavior data, adjustment data such as vehicle seat mirrors, etc.
- the network-side device is an application server of a first application
- the first application runs on the mobile terminal and is used to initiate A request for a user account to log in to the vehicle system.
- the first application program may be any application in the mobile terminal, for example, Baidu map, altitude map, or other applications.
- the application server corresponding to the first application verifies whether the first user account logged in the first application can be used to log in to the vehicle system, so as to avoid using other servers to send the first user account to other services, which may lead to user information failure. Loss, to a certain extent, improve user information security.
- a device for logging in to the vehicle and machine system including: a communication unit for establishing a near-field communication link with the vehicle and machine, the vehicle and machine corresponding to the vehicle and machine system; and a processing unit for passing through the The near-field communication link negotiates a login binding code with the vehicle; the communication unit is also used to provide the network side device with the login binding code, and the login binding code is used for the network side device verification Whether it is possible to log in with the first user account on the vehicle system.
- the device for logging in to the vehicle system provided by the fourth aspect described above may be a mobile terminal, or a device capable of supporting the functions required by the mobile terminal to implement the method, such as a chip system.
- the mobile terminal is a mobile phone.
- the communication unit may include a receiving unit and a transmitting unit.
- the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. At least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
- the communication unit is further configured to send a first login request message to the vehicle through the near field communication link; the communication unit is also configured to receive a return from the vehicle through the near field communication link
- a login request feedback message the login request feedback message includes the login binding code, and the login binding code is obtained by the car machine requesting the network side device; the communication unit is used to communicate with the network
- the side device provides the login binding code, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes the login binding code, and the first verification request message also At least one of the first user account or the vehicle system identification code is included.
- the communication unit is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, where the first binding code feedback message includes The login binding code; the communication unit is further configured to send a third verification request message to the vehicle through the near field communication link, and the third verification request message includes the login binding code;
- the communication unit is used to provide the login binding code to the network side device, it specifically includes: indirectly providing the login binding code to the network side device via sending the third verification request message to the vehicle. Fixed code.
- the communication unit is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, the first binding code feedback message Includes the login binding code; the communication unit is further configured to send a second login request message to the vehicle through the near field communication link, and the second login request message includes the login binding code
- the communication unit is used to provide the login binding code to the network-side device, it specifically includes: sending a first verification request message to the network-side device, and the first verification request message includes the login binding
- the code is fixed, and the first verification request message further includes at least one of the first user account or the vehicle system identification code.
- Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the communication unit when used to provide the login binding code to the network side device, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes For the login binding code, the first verification request message further includes at least one of the first user account or the vehicle system identification code.
- the processing unit is further configured to: log in to the first application program with the first user account on the mobile terminal, and the network side device Is the application server of the first application.
- the communication unit is further configured to: receive a verification feedback message sent by the network side device.
- the communication unit is further configured to: receive a login success message sent by the vehicle.
- the first verification request message or the second login request message further includes the mobile terminal identification code or the vehicle identification code At least one of.
- the communication unit is further configured to: communicate to the vehicle based on the near field communication link.
- the locomotive sends the locomotive system activation request, and the locomotive system activation request is used to activate the locomotive system.
- the vehicle-machine system activation request is sent when the distance between the mobile terminal and the vehicle-machine is less than a first threshold.
- an apparatus for logging in to an in-vehicle system including: a communication unit, configured to establish a near field communication link with a mobile terminal, and the mobile terminal is configured to issue a login to the in-vehicle system with the first user account
- the processing unit is used to negotiate a login binding code with the mobile terminal through the near field communication link; the communication unit is also used to provide the login binding code to the network side device, and the login binding The code is used by the network-side device to verify whether it is possible to log in with the first user account on the vehicle system; the communication unit is also used to receive a login instruction message sent by the network-side device, the login instruction The message is used to instruct to log in the first user account on the vehicle system; the processing unit is also used to log in the first user account on the vehicle system.
- the device for logging in to the vehicle system provided by the fifth aspect may be a vehicle, or a device capable of supporting the vehicle to implement the functions required by the method, such as a chip system.
- the communication unit may include a receiving unit and a transmitting unit.
- the login binding code may be generated by a network side device.
- the login binding code is a mobile terminal identification used by the network side device to identify the mobile terminal according to the first user account.
- Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system.
- the communication unit is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, where the second binding code feedback message includes the login binding code; the communication unit is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
- the login request feedback message includes the login binding code; when the communication unit is used to provide the login binding code to the network side device, it specifically includes: indirectly sending the login binding code to the mobile terminal via A login request feedback message is used to provide the login binding code to the network side device.
- the communication unit is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, where the second binding code feedback message includes the login binding code; the communication unit is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
- the login request feedback message includes the login binding code; when the communication unit is used to provide the login binding code to the network side device, it specifically includes: sending a second verification request to the network side device Message, the second verification request message includes the login binding code, and the second verification request message further includes at least one of the first user account or the vehicle system identification code.
- the communication unit is further configured to receive a third verification request message or a second login request message from the mobile terminal through the near field communication link, where the third verification request message or the second login request message includes The login binding code, wherein the login binding code is obtained by the mobile terminal upon request from the network side device; when the communication unit is used to provide the login binding code to the network side device, Specifically, it includes: sending a second verification request message to the network side device, where the second verification request message includes the login binding code.
- Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the communication unit when used to provide the login binding code to the network-side device, it specifically includes: sending a second verification request message to the network-side device, where the second verification request message includes all For the login binding code, the second verification request message further includes at least one of the first user account or the vehicle system identification code.
- the network side device is an application server of a first application
- the first application is configured to run on the mobile terminal to issue A request for the first user account to log in to the vehicle system.
- the method further includes: receiving personalized login data of the first user account from the network side device, and logging in according to the personalized The data sets the car-machine system.
- the method further includes: sending a login success message to the mobile terminal.
- the login request feedback message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code One item.
- the method further includes: receiving from the mobile terminal based on the near field communication link A vehicle-on-vehicle system activation request, where the vehicle-on-vehicle system activation request is used to activate the vehicle and vehicle system.
- a device for logging in to a vehicle system including: a processing unit, configured to verify the vehicle system identification code based on the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system Log in to the vehicle system with the first user account, the login binding code is used to verify that a near field communication link is established between the mobile terminal and the vehicle, and the vehicle and the vehicle are corresponding to the vehicle system; The login binding code is also used to verify that the user holding the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle; the communication unit is used to send a login to the vehicle An instruction message, where the login instruction message is used to instruct to log in to the vehicle system with the first user account on the vehicle.
- the vehicle-machine system login device provided by the above sixth aspect may be a network-side device, or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
- the communication unit may include a receiving unit and a transmitting unit.
- the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. Generated by at least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
- the communication unit receives a binding code application message from the car machine or the mobile terminal, and the binding code application message includes the first user account and the mobile terminal identification used to identify the mobile terminal.
- Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system; the processing unit is specifically configured to: apply according to the binding code Message to generate the login binding code, the communication unit is further configured to send a binding code feedback message to the car machine or the mobile terminal, and the binding code feedback message includes the login binding code.
- the network side device can log in the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- the vehicle system identification code used to identify the vehicle system.
- the communication unit of the network side device is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes all At least one of the first user account or the vehicle system identification code; the processing unit is configured to determine that the login binding code in the first verification request message is consistent with the generated login binding code; the processing unit It is also used to determine that the vehicle system can be logged in with the first user account.
- the communication unit is configured to receive a second verification request message from the vehicle, the second verification request message includes the login binding code; the second verification request message also includes the first user At least one of the account number or the vehicle system identification code; the processing unit is used to determine that the login binding code in the second verification request message is consistent with the generated login binding code; the processing unit is also used to determine The vehicle system can be logged in with the first user account.
- the communication unit is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user At least one of the account number or the vehicle system identification code; the communication unit is further configured to receive a second verification request message from the vehicle machine, and the second verification request message includes the login binding code; The second verification request message also includes at least one of the first user account or the vehicle system identification code; the processing unit is specifically configured to determine the first verification request message and the second verification request
- the login binding code in the message is consistent with the generated login binding code; the processing unit is also used to determine that the vehicle system can be logged in with the first user account.
- Solution 2 The login binding code is generated by the mobile terminal, or generated by the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the processing unit is used to verify that the first user account is used to log in to the vehicle system according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- a communication unit for receiving a first verification request message from the mobile terminal and a second verification request message from the vehicle wherein, the first verification request message includes the first user account And the login binding code; the second verification request message includes the vehicle system identification code and the login binding code; or, the second verification request message includes the first user account and the Login binding code; the first verification request message includes the vehicle system identification code and the login binding code;
- the processing unit is specifically configured to determine the first verification request message and the second verification
- the login binding codes in the request message are consistent; the processing unit is also used to determine that the vehicle system can be logged in with the first user account.
- the first verification request message or the second verification request message further includes: the mobile terminal identification code or the vehicle identification code At least one of.
- the method further includes: sending personalized login data of the first user account to the vehicle, where the personalized login data is used for Set up the car-machine system.
- the network-side device is an application server of a first application, and the first application runs on the mobile terminal and is used to initiate A request for a user account to log in to the vehicle system.
- a device for logging in to a vehicle system including: a transceiver for establishing a near-field communication link with the vehicle and the vehicle, the vehicle and the vehicle system corresponding to the vehicle; The near field communication link negotiates a login binding code with the vehicle; the transceiver is also used to provide the network side device with the login binding code, and the login binding code is used for the network side device verification Whether it is possible to log in with the first user account on the vehicle system.
- the device for logging in to the vehicle system provided by the seventh aspect described above may be a mobile terminal, or a device capable of supporting the functions required by the mobile terminal to implement the method, such as a chip system.
- the mobile terminal is a mobile phone.
- the communication unit may include a receiving unit and a transmitting unit.
- the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. Generated by at least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
- the transceiver is further configured to send a first login request message to the vehicle through the near field communication link; the transceiver is also configured to receive a login request returned by the vehicle through the near field communication link Feedback message, the login request feedback message includes the login binding code, the login binding code is obtained by the vehicle machine requesting the network side device; the transceiver is used to communicate to the network side device
- the login binding code specifically includes: sending a first verification request message to the network side device, where the first verification request message includes the login binding code, and the first verification request message further includes all At least one of the first user account or the vehicle system identification code.
- the transceiver is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, where the first binding code feedback message includes The login binding code; the transceiver is also used to send a third verification request message to the vehicle through the near field communication link, and the third verification request message includes the login binding code;
- the transceiver is used to provide the login binding code to the network side device, it specifically includes: indirectly providing the login binding code to the network side device via sending the third verification request message to the vehicle. Fixed code.
- the transceiver is further configured to send a first binding code request message to the network side device; receive a first binding code feedback message returned by the network side device, where the first binding code feedback message includes The login binding code; the transceiver is also used to send a second login request message to the vehicle through the near field communication link, and the second login request message includes the login binding code;
- the transceiver is used to provide the login binding code to the network side device, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes the login binding code , The first verification request message further includes at least one of the first user account or the vehicle system identification code.
- Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the transceiver when used to provide the login binding code to the network side device, it specifically includes: sending a first verification request message to the network side device, where the first verification request message includes For the login binding code, the first verification request message further includes at least one of the first user account or the vehicle system identification code.
- the processing unit is further configured to: log in to the first application program with the first user account on the mobile terminal, and the network side device Is the application server of the first application.
- the communication unit is further configured to: receive a verification feedback message sent by the network side device.
- the communication unit is further configured to: receive a login success message sent by the vehicle.
- the first verification request message or the second login request message further includes the mobile terminal identification code or the vehicle identification code At least one of.
- the communication unit is further configured to: communicate to the vehicle based on the near field communication link.
- the locomotive sends a locomotive system activation request, and the locomotive system activation request is used to activate the locomotive system.
- the vehicle system start request is sent when the distance between the mobile terminal and the vehicle machine is less than a first threshold.
- a device for logging in to the vehicle system including: a transceiver, configured to establish a near field communication link with a mobile terminal, and the mobile terminal is used to issue a login to the vehicle system with the first user account
- the processor is configured to negotiate a login binding code with the mobile terminal through the near field communication link; the transceiver is also used to provide the login binding code to the network side device, and the login binding The code is used by the network-side device to verify whether it is possible to log in with the first user account on the vehicle system; the transceiver is also used to receive a login instruction message sent by the network-side device, the login instruction The message is used to instruct to log in the first user account on the vehicle system; the processor is also used to log in the first user account on the vehicle system.
- the above-mentioned device for logging in to the vehicle system in the eighth aspect may be a vehicle or a device capable of supporting the vehicle to realize the functions required by the method, such as a chip system.
- the communication unit may include a receiving unit and a transmitting unit.
- the login binding code may be generated by a network side device.
- the login binding code is a mobile terminal identification used by the network side device to identify the mobile terminal according to the first user account.
- Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system.
- the transceiver is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, the second binding code feedback message includes the login binding code; the transceiver is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
- the login request feedback message includes the login binding code; when the transceiver is used to provide the login binding code to the network side device, it specifically includes: indirectly sending the login binding code to the mobile terminal via A login request feedback message is used to provide the login binding code to the network side device.
- the transceiver is further configured to receive a first login request message from the mobile terminal through the near field communication link; send a second binding code application message to the network side device; and receive a return message from the network side device A second binding code feedback message, the second binding code feedback message includes the login binding code; the transceiver is further configured to send a login request feedback message to the mobile terminal through the near field communication link ,
- the login request feedback message includes the login binding code; when the transceiver is used to provide the login binding code to the network side device, it specifically includes: sending a second verification request to the network side device Message, the second verification request message includes the login binding code, and the second verification request message further includes at least one of the first user account or the vehicle system identification code.
- the transceiver is further configured to receive a third verification request message or a second login request message from the mobile terminal through the near field communication link, where the third verification request message or the second login request message includes The login binding code, wherein the login binding code is obtained by the mobile terminal upon request from the network side device; when the transceiver is used to provide the login binding code to the network side device, Specifically, it includes: sending a second verification request message to the network side device, where the second verification request message includes the login binding code.
- Solution 2 The login binding code is generated by the mobile terminal, or generated for the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the transceiver when used to provide the login binding code to the network-side device, it specifically includes: sending a second verification request message to the network-side device, where the second verification request message includes all For the login binding code, the second verification request message further includes at least one of the first user account or the vehicle system identification code.
- the network-side device is an application server of a first application
- the first application is configured to run on the mobile terminal to issue A request for the first user account to log in to the vehicle system.
- the method further includes: receiving personalized login data of the first user account from the network side device, and logging in according to the personalized The data sets the car-machine system.
- the method further includes: sending a login success message to the mobile terminal.
- the login request feedback message or the second verification request message includes at least one of the mobile terminal identification code or the vehicle identification code One item.
- the method further includes: receiving from the mobile terminal based on the near field communication link A vehicle-motor system activation request, and the vehicle-motor system activation request is used to activate the vehicle-motor system.
- a device for logging in to a vehicle system including a processor, configured to verify that the vehicle system identification code is used to identify the vehicle system according to the login binding code, the first user account, and the vehicle system identification code.
- the login binding code is used to verify that a near field communication link is established between the mobile terminal and the vehicle, and the vehicle and the vehicle are corresponding to the vehicle system;
- the login binding code is also used to verify that the user holding the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle;
- the transceiver is used to send a login to the vehicle An instruction message, where the login instruction message is used to instruct to log in to the vehicle system with the first user account on the vehicle.
- the device for logging in to the vehicle and machine system provided in the above-mentioned ninth aspect may be a network-side device, or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
- the communication unit may include a receiving unit and a transmitting unit.
- the aforementioned login binding code may be generated by a network-side device, for example, the network-side device uses the first user account, a mobile terminal identification code used to identify the mobile terminal, and a mobile terminal identification code used to identify the car-machine system according to the first user account. Generated by at least one of the vehicle system identification code or the vehicle identification code used to identify the vehicle.
- the transceiver receives a binding code application message from the car machine or the mobile terminal, and the binding code application message includes the first user account and the mobile terminal identification used to identify the mobile terminal.
- Code at least one of the vehicle system identification code used to identify the vehicle system or the vehicle vehicle identification code used to identify the vehicle system; the processor is specifically configured to: apply according to the binding code Message to generate the login binding code, the transceiver is also used to send a binding code feedback message to the car machine or the mobile terminal, and the binding code feedback message includes the login binding code.
- the network side device can log in the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- the vehicle system identification code used to identify the vehicle system.
- the transceiver of the network-side device is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the At least one of the first user account or the vehicle system identification code; the processor is configured to determine that the login binding code in the first verification request message is consistent with the generated login binding code; the processor also uses It is determined that the vehicle system can be logged in with the first user account.
- the transceiver is configured to receive a second verification request message from the vehicle, the second verification request message includes the login binding code; the second verification request message also includes the first user account Or at least one of the vehicle system identification codes; the processor is used to determine that the login binding code in the second verification request message is consistent with the generated login binding code; the processor is also used to determine The first user account logs in to the vehicle system.
- the transceiver is configured to receive a first verification request message from the mobile terminal; the first verification request message includes the login binding code; the first verification request message also includes the first user account Or at least one of the identification codes of the vehicle system; the transceiver is further configured to receive a second verification request message from the vehicle, and the second verification request message includes the login binding code; The second verification request message also includes at least one of the first user account or the vehicle system identification code; the processor is used to determine the first verification request message and the second verification request message The login binding code is consistent with the generated login binding code; the processor is further configured to determine that the vehicle system can be logged in with the first user account.
- Solution 2 The login binding code is generated by the mobile terminal, or generated by the vehicle, or jointly generated by the mobile terminal and the vehicle.
- the processor is configured to verify that the vehicle system can be logged in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- a transceiver for receiving a first verification request message from the mobile terminal, and a second verification request message from the vehicle; wherein, the first verification request message includes the first user account and The login binding code; the second verification request message includes the vehicle system identification code and the login binding code; or, the second verification request message includes the first user account and the login Binding code; the first verification request message includes the vehicle system identification code and the login binding code; the processor is specifically configured to determine the first verification request message and the second verification request The login binding code in the message is consistent; the processing unit is also used to determine that the vehicle system can be logged in with the first user account.
- the first verification request message or the second verification request message further includes: the mobile terminal identification code or the vehicle identification code At least one of.
- the method further includes: sending personalized login data of the first user account to the vehicle, where the personalized login data is used for Set up the car-machine system.
- the network-side device is an application server of a first application, and the first application runs on the mobile terminal and is used to initiate A request for a user account to log in to the vehicle system.
- a device for logging in to a vehicle and machine system including a processor and a memory; the memory stores program instructions, and when the program instructions are executed, the device for logging in to a vehicle and machine system is executed as described above.
- the vehicle system login device may be a mobile terminal or a device capable of supporting the mobile terminal to implement the functions required by the method provided in the above-mentioned first aspect, such as a chip system.
- a car-machine system login device including a processor and a memory; the memory stores program instructions, and when the program instructions are executed, the car-machine system log-in device is executed as described above.
- the device for logging in to the vehicle system may be a vehicle or a device capable of supporting the vehicle to implement the functions required by the method provided in the second aspect, such as a chip system.
- a device for logging in to a vehicle and machine system including a processor and a memory; the memory stores program instructions, and when the program instructions are executed, the device for logging in to a vehicle and machine system is executed as described above.
- the vehicle system login device may be a network-side device or a device capable of supporting the network-side device to implement the functions required by the method provided in the third aspect, such as a chip system.
- a car-machine system login system including: the car-machine system login device provided in the above-mentioned fourth aspect or the seventh aspect, and the car-machine system login provided in the above-mentioned fifth aspect or the eighth aspect Device, and the vehicle-machine system registration device provided in the sixth aspect or the ninth aspect described above.
- a fourteenth aspect there is also provided a computer-readable storage medium.
- the computer-readable storage medium includes a computer program.
- the vehicle-motor system login device executes the above-mentioned first aspect. Provided method.
- a computer-readable storage medium includes a computer program.
- the vehicle system login device executes the above-mentioned second aspect. Provided method.
- a computer-readable storage medium includes a computer program, and when the computer program runs on the processor, the vehicle-motor system login device executes the above-mentioned third aspect Provided method.
- a computer program product which when the computer program product runs on a processor, causes the vehicle-machine system login device to execute the method provided in the above-mentioned first aspect.
- a computer program product is also provided.
- the vehicle system login device executes the method provided in the above second aspect.
- a computer program product which when the computer program product runs on a processor, causes the vehicle-machine system login device to execute the method provided in the above-mentioned third aspect.
- FIG. 1 is a schematic diagram of a user account provided by an embodiment of the application and the personalized data contained therein;
- Fig. 2 is a schematic diagram of a login process of a car-machine system in the prior art
- Figure 3 is a schematic diagram of another car-machine system login process in the prior art
- FIG. 4 is a schematic flowchart of the first method for logging in to a vehicle-machine system according to an embodiment of the application;
- FIG. 5 is a schematic flowchart of a second method for logging in to a vehicle-machine system according to an embodiment of the application
- FIG. 6 is a schematic flowchart of a third method for logging in to a vehicle-machine system according to an embodiment of the application.
- FIG. 7 is a schematic flowchart of a fourth method for logging in to a vehicle-machine system according to an embodiment of the application.
- FIG. 8 is a schematic flowchart of a fifth method for logging in to a vehicle and a machine system according to an embodiment of the application;
- FIG. 9 is a schematic flowchart of a sixth method for logging in to a vehicle-machine system according to an embodiment of the application.
- FIG. 10 is a schematic flowchart of a seventh method for logging in to a vehicle-machine system according to an embodiment of the application;
- FIG. 11 is a schematic flowchart of an eighth method for logging in to a vehicle-machine system according to an embodiment of the application.
- FIG. 12 is a structural block diagram of a vehicle-machine system login device provided by an embodiment of the application.
- FIG. 13 is a structural block diagram of a device for logging in to a vehicle and machine system provided by an embodiment of the application.
- the mobile terminals involved in the embodiments of this application such as mobile phones, tablet computers, wearable devices (such as glasses, gloves, watches, bracelets, clothing and shoes, etc.), vehicle-mounted devices (or called vehicle-mounted terminals), and augmented reality (augmented reality (AR)/virtual reality (VR) equipment, laptops, ultra-mobile personal computers (UMPC), netbooks, personal digital assistants (PDAs) and other equipment, this application
- vehicle-mounted devices or called vehicle-mounted terminals
- AR augmented reality
- VR virtual reality
- laptops laptops
- UMPC ultra-mobile personal computers
- PDAs personal digital assistants
- the mobile terminal may also include a relay.
- the mobile terminal may be any device that has a near field communication link function (for example, a Bluetooth function) and can establish a connection with a network side device, which will not be listed here.
- a near field communication link function for example, a Bluetooth function
- the device used to implement the function of the mobile terminal may be a mobile terminal, or a device capable of supporting the terminal to implement the function, such as a chip system, and the device may be installed in the mobile terminal.
- the chip system may be composed of chips, or may include chips and other discrete devices.
- the device for implementing the functions of the mobile terminal is a mobile terminal.
- the application (application, app for short) involved in the embodiments of the present application is a software program that can implement one or more specific functions.
- one or more applications can be installed in a mobile terminal, for example, instant messaging applications, video applications, audio applications, image capturing applications, and so on.
- instant messaging applications for example, may include short message applications, WeChat (WeChat), WhatsApp Messenger, Line, photo sharing (Instagram), Kakao Talk, DingTalk, etc.
- Image capture applications for example, may include camera applications (system cameras or third-party camera applications).
- Video applications such as Youtube, Twitter, Douyin, iQiyi, Tencent Video, etc.
- Audio applications for example, may include Google Music, Kugou Music, Xiami, QQ Music, and so on.
- the network side device involved in the embodiment of the present application may include a server.
- the network side device may be an application server corresponding to the first application.
- the first application program here may be an application program related to a car machine.
- the server is a server corresponding to Baidu Map.
- the device used to implement the function of the network-side device may be a network-side device, or a device that can support the network-side device to implement the function, such as a chip system, which may be installed in the network-side device .
- a device that can support the network-side device to implement the function such as a chip system, which may be installed in the network-side device .
- the device for implementing the function of the network side device is the network side device.
- the vehicle identification code is an identification code used to identify the vehicle, which can be understood as the identification code of the vehicle hardware, such as the vehicle ID.
- the vehicle system identification code is an identification code used to identify the vehicle system (can be understood as the software client in the vehicle), which can be understood as the software identification code in the vehicle, such as the serial number (SN) of the vehicle .
- the mobile terminal identification code is an identification code used to identify the mobile terminal, for example, the model and serial number of the mobile terminal.
- the terms “system” and “network” in the embodiments of this application can be used interchangeably.
- “Multiple” refers to two or more than two. In view of this, “multiple” may also be understood as “at least two” in the embodiments of the present application.
- “At least one” can be understood as one or more, for example, one, two or more. For example, including at least one means including one, two or more, and it does not limit which ones are included. For example, if at least one of A, B, and C is included, then A, B, C, A and B, A and C, B and C, or A and B and C are included. In the same way, the understanding of "at least one" and other descriptions is similar.
- ordinal numbers such as “first” and “second” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority, or importance of multiple objects.
- Fig. 4 shows a schematic diagram of a communication system provided by an embodiment of the present application.
- the communication system includes a mobile terminal 100, a car machine 200, and a network side device 300.
- the mobile terminal 100 is a mobile phone.
- the first application in the mobile terminal 100 logs in to the first user account.
- the network side device 300 may be an application server corresponding to the first application program.
- the mobile terminal 100 establishes a near field communication connection with the car machine 200, such as a Bluetooth connection.
- the mobile terminal 100 requests to log in with the first user account on the vehicle system of the vehicle 200 through the near field communication link.
- the mobile terminal 100 and the car machine 200 negotiate the login binding code through the near field communication link, and provide the network side device 300 with the login binding code.
- the login binding code is used for the network side device to verify whether the car can be logged in with the first user account. ⁇ Machine system.
- the network side device 300 verifies that the vehicle system can be logged in with the first user account, it sends a login instruction and the personalized data corresponding to the first user account to the vehicle 200.
- the vehicle system of the vehicle 200 is logged in with the first user account.
- the car machine 200 does not need to store the user account locally, that is, the car machine system of the car machine 200 does not need to pre-log in with the first user account.
- the vehicle system of the vehicle 200 can also be automatically logged in.
- the user does not need to determine the timing of boarding by himself. When the user carries the mobile terminal 100 close to the car system 200, it can automatically log in, which is convenient for operation and has a high user experience.
- FIG. 4 is only an example of a communication system, and the solution of this application can also be applied to other systems, for example, a communication system for logging in to an aircraft including a mobile terminal, a network side device, and an aircraft/unmanned aerial vehicle.
- FIG. 5 is a schematic flowchart of a method for logging in to a vehicle and a machine system according to an embodiment of this application. This process can be applied to the communication system shown in FIG. 4. As shown in Figure 5, the process of the method may include:
- Step 100 Log in to the first application with the first user account on the mobile terminal.
- the first application program is, for example, AutoNavi Map, Baidu Map, etc., or other applications related to vehicles, which are not limited in the embodiment of the present application.
- Step 200 The mobile terminal establishes a near field communication link with the vehicle.
- the near field communication connection is, for example, a Bluetooth link, or other short-distance links.
- the process of establishing a Bluetooth link between the mobile terminal and the car machine may include Bluetooth pairing, connection, etc., which will not be introduced here too much.
- the vehicle may judge the mobile terminal requesting the establishment of the Bluetooth link. If the vehicle locally stores the terminal identification of the mobile terminal, it agrees to communicate with the mobile terminal. The terminal establishes a Bluetooth link; otherwise, it refuses to establish a Bluetooth link with the mobile terminal. For example, after the vehicle has established a Bluetooth connection with a certain mobile terminal (for example, the Bluetooth link is established for the first time), the vehicle locally stores the device identification of the mobile terminal. When the certain mobile terminal is close to the vehicle, the vehicle can search for the device identification of the mobile terminal, and when the device identification is consistent with the stored device identification, establish a Bluetooth link with the mobile terminal; otherwise, refuse to communicate with the mobile terminal. The mobile terminal establishes a Bluetooth link. Therefore, it is possible to prevent any mobile terminal from establishing a Bluetooth link with the vehicle, and improve security.
- the mobile terminal in order to prevent the mobile terminal from establishing Bluetooth connections with multiple vehicles, when the mobile terminal searches for a certain vehicle identification, it can determine whether the vehicle identification is consistent with the locally stored vehicle identification, and if so, send a notification to the vehicle identification.
- the vehicle corresponding to the identifier initiates a Bluetooth connection; otherwise, the Bluetooth link is not established with the vehicle corresponding to the vehicle identifier. Therefore, it is possible to prevent the mobile terminal from establishing a Bluetooth connection with any vehicle, and improve security.
- the mobile terminal may establish a near field communication link with the vehicle and the vehicle to accurately establish the near field communication link with the vehicle and the vehicle.
- the car machine can be automatically powered on, or, after step 200, the mobile terminal sends a power-on request to the car machine to request the car machine system to power on, and the car machine completes after receiving the power-on request
- the vehicle system is powered on.
- the mobile terminal may send the power-on request when it is determined that the distance to the vehicle-machine system is less than the first threshold.
- the first threshold may be smaller than the second threshold, and the specific value is not limited in the embodiment of the present application.
- the mobile terminal detects that the distance to the vehicle system is gradually shortening, it first establishes a near field communication connection with the vehicle system, and then triggers the vehicle system to be powered on.
- step 300 the mobile terminal and the car machine negotiate the login binding code through the near field communication link.
- the mobile terminal and the car machine can negotiate and log in the binding code through the near field communication link in a variety of ways.
- the login binding code is generated by the network side device.
- the mobile terminal applies for the login binding code from the network side device and sends the login binding code to the car machine, or the car machine applies for the login binding code to the network side device. Determine the code, and send the login binding code to the mobile terminal.
- the login binding code is generated by the mobile terminal and sent to the car machine; or, the login binding code is generated by the car machine and sent to the mobile terminal; or, the login binding code is generated by the mobile terminal and the car machine together ,and many more.
- Step 400 The mobile terminal and/or the car machine provides a login binding code to the network side device, and the login binding code is used for the network side device to verify whether the car machine system can be logged in with the first user account.
- step 500 the network side device verifies whether the vehicle system can be logged in with the first user account through the login binding code.
- the verification is passed, it is determined that the vehicle system can be logged in with the first user account, and then the subsequent steps are executed; otherwise, the execution is stopped.
- the subsequent steps it is also possible to send an indication that the verification is not passed to the car machine or/or the mobile terminal.
- step 300 there are multiple implementation manners for step 300, and step 400 and step 500 are related to step 300, so step 400 and step 500 also have multiple implementation manners, which will be introduced separately below.
- step 600 the network side device sends a login instruction and the personalized data of the first user account to the vehicle machine.
- the login instruction here may be a token, for example.
- the personalized data of the first user account can be seen in FIG. 1, which will not be repeated here.
- Step 700 Log in to the vehicle system with the first user account on the vehicle.
- step 800 the network side device feeds back information to the verification.
- step 800 and step 900 are optional steps, so they are represented by dashed lines in FIG. 5.
- the verification feedback information may be, for example, an indication that the network side device has passed or failed the verification of the received login binding code.
- Step 900 The car machine sends a login success indication to the mobile terminal, which is used to instruct the car machine system to successfully log in to the first user account.
- the mobile terminal may display prompt information, such as text or pictures, to prompt the user to successfully log in to the vehicle system.
- step 300 The various implementation manners of step 300 and the corresponding implementation manners of step 400 and step 500 are respectively introduced below.
- FIG. 6 it is a schematic flowchart of a method for logging in to a vehicle and machine system provided by an embodiment of this application.
- Figure 6 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 6, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 305; in step 400 in FIG.
- the device providing the login binding code may include step 401.
- Step 301 The mobile terminal sends a first login request message to the vehicle.
- the mobile terminal may send the first login request to the vehicle through the near field communication link.
- Step 302 The vehicle machine sends a second binding code application message to the network side device.
- the second binding code application message includes: the first user account, the mobile terminal identification code used to identify the mobile terminal, the vehicle system identification code used to identify the vehicle system, or the vehicle system identification code used to identify the vehicle system. At least one of the vehicle identification codes of the vehicle.
- the mobile terminal sends at least one of the mobile terminal identification code or the first user account to the car; or, in other steps (not step 200) before step 302, the mobile terminal sends to the car. At least one of the mobile terminal identification code or the first user account; the embodiment of the present application does not limit it.
- Step 303 The network side device generates a login binding code according to the second binding code request message.
- the second binding code application message includes the vehicle system identification code, that is, the login binding code is generated according to the vehicle system identification code.
- the network side device can store the vehicle system identification code and the login binding code Correspondence between. Exemplarily, see Table 1 below for an example of the corresponding relationship.
- the second binding code request message includes the first user account, that is, the login binding code is generated according to the first user account.
- the network side device may store the connection between the first user account and the login binding code Correspondence. Exemplarily, see Table 2 below for an example of the corresponding relationship.
- the second binding code application message includes the vehicle identification code, that is, the login binding code is generated according to the vehicle identification code.
- the network side device can store the vehicle identification code and the login binding code. Correspondence. Exemplarily, see Table 3 below for an example of the corresponding relationship.
- the second binding code request message includes the mobile terminal identification code, that is, the login binding code is generated according to the mobile terminal identification code.
- the network side device can store the mobile terminal identification code and the login binding code. Correspondence. Exemplarily, see Table 4 below for an example of the corresponding relationship.
- example 1 to example 4 can also be used in combination, for example, example 1 and example 2 are used in combination, for example, the second binding code application message includes the first user account and the vehicle system identification code, that is, login The binding code is generated based on the first user account and the vehicle system identification code.
- the network side device can store the correspondence between the vehicle system identification code, the first user account and the login binding code. Exemplarily, see Table 5 below for an example of the corresponding relationship.
- Example 1 It should be understood that other combinations between Example 1 and Example 4 will not be listed here.
- Step 304 The network side device sends a second binding code feedback message to the vehicle, and the second binding code feedback message includes the login binding code.
- the second binding code feedback message may also include one or some messages in the second binding code application message, for example: the first user account is used to identify the mobile terminal At least one of the mobile terminal identification code, the vehicle system identification code used to identify the vehicle and the vehicle system, or the vehicle vehicle identification code used to identify the vehicle and the vehicle system.
- the vehicle identification code may also be carried in the second binding code feedback message.
- the car machine After receiving the second binding code feedback message, the car machine compares whether the car machine identification code in the second binding code feedback message is consistent with the car machine identification code in the second binding code application message. If they are consistent, it indicates The communication data between the vehicle and the network-side device has not been tampered with, that is, the communication is safe, and the subsequent steps can be continued; otherwise, the execution of the subsequent steps can be stopped.
- Step 305 The car machine sends a login request feedback message to the mobile terminal, and the login request feedback message includes the login binding code.
- the login request feedback message may also carry one or some messages in the first login request.
- the first login request includes the mobile terminal identification code
- the login request feedback message may also carry the mobile terminal identification code.
- the mobile terminal After the mobile terminal receives the login request feedback message, it compares whether the mobile terminal identification code in the login request feedback message is consistent with the mobile terminal identification code in the first login request message. If the communication data has not been tampered with, the communication is safe, and the subsequent steps can be continued; otherwise, the execution of the subsequent steps can be stopped.
- the mobile terminal negotiates with the vehicle to obtain a login binding code, which is generated by the network side device.
- Step 401 The mobile terminal sends a first verification request message to a network side device, where the first verification request message includes the login binding code.
- step 500 the network side device verifies whether the vehicle system can be logged in with the first user account according to the login binding code in the first verification request message, if yes, execute the subsequent steps; otherwise, stop executing the subsequent steps.
- step 500 may include the network-side device determining whether it is possible to log in with the first user account on the vehicle system according to the login binding code, the first user account and the vehicle system identification code, for example, according to the login binding code and The first user account and the vehicle system identification code determine that there is an association relationship between the vehicle and the mobile terminal, and it is determined that the first user account can be logged in on the vehicle system.
- the login binding code is generated by the network side device according to the first user account and provided to the car machine
- the first verification request message received by the network side device from the mobile terminal includes the login binding code and the car machine system
- the identification code indicates that the car machine shared the login binding code with the mobile terminal, indicating that the car machine is associated with the mobile terminal, so it is determined that the first user account can be logged in to the car machine system; otherwise, it cannot be Log in to the first user account on the vehicle system.
- the first verification request message in step 401 corresponding to different login binding code generation methods can be different, and the corresponding step 500 is The verification method can also be different. The following is introduced separately with different login binding codes.
- the login binding code is generated by the network side device according to the vehicle system identification code.
- the first verification request message also includes at least the first user account. Specifically, it includes the following methods:
- the first verification request message includes the login binding code and the first user account.
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 1 (that is, the above table 1), and determines that the verification is passed; otherwise , The verification failed.
- the first verification request message includes the login binding code, the first user account, and the vehicle system identification code (for example, the vehicle sends the vehicle system identification code to the mobile terminal through step 305 or step 200).
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 1 (that is, Table 1), and determines that the verification is passed; otherwise, the verification Fail.
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the foregoing example 1 (that is, Table 1), and determines the vehicle in the first verification request message.
- the machine system identification code is consistent with the vehicle machine system identification code in the corresponding relationship in the above example 1 (that is, Table 1), and the verification is determined to pass; otherwise, the verification fails; this method is safer.
- the above-mentioned first verification request message may further include at least one of a mobile terminal identification code or a vehicle identification code.
- the network side device can perform further verification based on the mobile terminal identification code.
- the mobile terminal identification code is included in the second binding code application message, that is, the mobile terminal identification code is included in the above corresponding relationship (ie, Table 1), then the network side device determines the first verification request When the mobile terminal identification code in the message is consistent with the mobile terminal identification code in the corresponding relationship (that is, Table 1), it is determined that the verification is passed; otherwise, the verification is not passed.
- the network side device is an application server corresponding to the first application program.
- the first application program logs in with the first user account, and the first application program reports to the network side device the identification of the mobile terminal.
- the network side device stores the corresponding relationship A between the first user account and the mobile terminal identification code. Therefore, the network side device receives the second verification request message, the second verification request message including the login binding, the first user account, and the mobile terminal identification code.
- the network side device determines that the mobile terminal identification code and the first user account in the second verification request message are consistent with the corresponding relationship A, and the login binding code in the second verification request message is bound to the login in Table 1 above When the codes are consistent, the verification is determined to be passed, otherwise, the verification is not passed.
- the network side device may perform further verification based on the mobile terminal identification code.
- the second binding code application message includes the vehicle identification code, that is to say, the above corresponding relationship (ie Table 1) also includes the vehicle identification code, then the network side device determines the first verification When the vehicle identification code in the request message is consistent with the vehicle identification code in the corresponding relationship (that is, Table 1), it is determined that the verification is passed; otherwise, the verification is not passed.
- the login binding code is generated by the network side device according to the first user account
- the first verification request message also includes at least the vehicle system identification code. Specifically, it includes the following methods.
- the first verification request message includes the login binding code and the vehicle system identification code (for example, the vehicle sends the vehicle system identification code to the mobile terminal through step 305 or step 200).
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 2 above (ie Table 2), and confirms verification Pass; otherwise, the verification fails.
- the first verification request message includes the login binding code, the vehicle system identification code, and the first user account.
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 2 (that is, Table 2), and determines that the verification is passed; otherwise, the verification fails. pass through.
- the network-side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 2 (that is, Table 2), and determines that the first verification request message is the first in the first verification request message. If a user account is consistent with the first user account in the corresponding relationship in Example 2 (that is, Table 2), it is determined that the verification is passed; otherwise, the verification is not passed.
- the above-mentioned first verification request message may further include at least one of a mobile terminal identification code or a vehicle identification code.
- a mobile terminal identification code or a vehicle identification code For the role of the mobile terminal identification code or the vehicle identification code in the first verification request message, please refer to the description of the aforementioned case 1, which will not be repeated here.
- the login binding code is generated by the network side device according to the vehicle identification code
- the first verification request message also includes at least the vehicle system identification code, the first user account, and the vehicle identification code .
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 3 (ie Table 3), and determines that the verification is passed; otherwise, the verification is not pass through.
- the network-side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the foregoing example 3 (ie Table 3), and determines that the vehicle machine identification in the first verification request message The code is consistent with the vehicle identification code in the corresponding relationship in the above example 3 (ie, Table 3), and the verification is determined to be passed; otherwise, the verification is not passed.
- the first verification request message may also include a mobile terminal identification.
- the login binding code is generated by the network side device according to the mobile terminal identification code, then the first verification request message includes at least the vehicle system identification code, the first user account and the mobile terminal identification code .
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in the above example 4 (ie Table 4), and determines that the verification is passed; otherwise, the verification is not pass through.
- the network side device determines that the login binding code in the first verification request message is consistent with the login binding code in the corresponding relationship in Example 4 (ie Table 4) above, and determines the mobile terminal identification code in the first verification request message If it is consistent with the mobile terminal identification code in the corresponding relationship in the foregoing example 4 (ie, Table 4), it is determined that the verification is passed; otherwise, the verification is not passed.
- the first verification request message may also include the vehicle identification code.
- examples 1 to 4 can be used in combination. Assume that example 1 and example 2 are combined, that is, the login binding code is generated by the network side device according to the first user account and the vehicle system identification code. In this case, the first verification request message can be in the above case 1 to case 4. The first verification request message in any of the cases.
- the above-mentioned generation method of the login binding code is determined by the second binding code application message, and the generation method of the login binding code is related to the content of the first verification message.
- a possible implementation manner is that the generation method of the login binding code and the content of the first verification request message are pre-appointed. For example, it is agreed in advance that the login binding code is generated according to the first user account, and the first verification request message includes the login binding code and the vehicle identification code; then in actual applications, this agreement is executed, that is, the vehicle is sent by the vehicle.
- the second binding code application message carries at least the first user account, and the network side device generates the login binding code according to the first user account.
- the first verification request message sent by the mobile terminal includes the login binding code and the vehicle identification code.
- the vehicle can be notified that the login binding code is generated based on the first user account.
- the second binding code feedback message in step 304 carries an indication information 1, which is used to indicate that the login binding code is generated based on the first user account; or, a mark is added to the login binding code, The mark is used to indicate that it is generated according to the first user account, and so on.
- the car machine informs the mobile terminal that the login binding code is generated according to the first user account through step 305.
- the login request feedback message in step 305 may carry the indication information 1.
- the mobile terminal may determine the content of the first verification request message based on the login binding code being generated by the first user account.
- the specific implementation process please refer to the content of the above case 2, and the description will not be repeated here.
- FIG. 7 is a schematic flowchart of a method for logging in to a vehicle and a machine system according to an embodiment of this application.
- Figure 7 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 7, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 305 in FIG. 7. The introduction of step 301 to step 305 is the same as that of Embodiment 1, and will not be repeated here.
- Step 400 in FIG. 5 includes step 401 and step 402 in FIG. 7.
- Step 401 The mobile terminal sends a first verification request message to the network side device, where the first verification request includes a login binding code.
- Step 402 The vehicle machine sends a second verification request message to the network side device, where the second verification request message includes the login binding code.
- the second verification request message and the first verification request message may be the same or different. Taking the difference between the two as an example, taking the aforementioned case 1 that the login binding code is generated by the network side device according to the vehicle system identification code as an example, the first verification request message may be mode 1.1, and the second verification request message may be mode 1.2. That is to say, in one of the above cases 1 to 4, the first verification request message and the second verification request message may be different.
- the first verification request message includes the first user account (for example, the method 1.1 or the method 1.2 in the above case 1)
- the second The verification request message includes the vehicle system identification code (for example, the method 2.1 or the method 2.2 in the above case 2).
- the first verification request message includes the vehicle system identification code (for example, the method 2.1 or the method 2.2 in the above case 2)
- the second verification request message includes the first user account (for example, the method 1.1 or the method 1.2 in the above case 1). ).
- the first verification request message may be the first verification request message in case 3, and the second verification request message may be case 2. 1. A first verification request message in any of the cases 4.
- Step 500 according to the login binding code in the first verification request message and the second verification request message, verify whether the vehicle system can be logged in with the first user account; if so, continue to perform the subsequent steps, otherwise, stop the execution of the subsequent steps.
- the verification method for the second verification request message is similar to the verification method for the first verification request message, and will not be repeated here.
- the network side device determines that the verification of the first verification request message and the second verification request message pass, and determines that the first user account can log in to the vehicle system; otherwise, the first user account cannot be used to log in to the vehicle system.
- FIG. 8 is a schematic flowchart of a method for logging in to a vehicle and a machine system according to an embodiment of this application.
- Figure 8 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 8, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 8.
- Step 400 in FIG. 5 includes step 401 in FIG. 8.
- Step 301 The mobile terminal sends a first binding code request message to the network side device.
- the first binding code application message includes at least one of the first user account, mobile terminal identification code, vehicle system identification code, or vehicle identification code.
- the car machine sends at least one of the car machine system identification code or the car machine identification code to the mobile terminal; for example, it is sent in step 300.
- the mobile terminal may also send a second login request message (not shown in FIG. 8) to the car machine.
- the mobile terminal may also send a second login request message (not shown in FIG. 8) to the car machine.
- the second login request message may be sent before step 301.
- the car machine may also send a second login request feedback message (not shown in FIG. 8) to the mobile terminal, and the second login request feedback message may include at least one of the car machine system identification code or the car machine identification code.
- Step 302 The network side device generates a login binding code according to the first binding code request message.
- step 302 please refer to the generation process of the login binding code in Embodiment 1, for example, Example 1 to Example 4, which will not be repeated here.
- Step 303 The network side device sends a first binding code feedback message to the mobile terminal, and the first binding code feedback message includes the login binding code.
- Step 304 The mobile terminal sends a third verification request message to the vehicle, and the third verification request message includes the login binding code.
- the third verification request message may also include at least one of a mobile terminal identification code or the first user account.
- the third verification request message may be the above-mentioned second login request message, or it may be sent to the vehicle after the mobile terminal sends the second login request information, and the purpose is to indirectly send all the information to the vehicle.
- the third verification request message is used to provide the network side device with the login binding code message.
- Step 401 The vehicle machine sends a second verification request message to the network side device, where the second verification request message includes the login binding code.
- the content of the second verification request message is related to the manner of generating the login binding code, and reference may be made to the introduction of the first verification request message in Embodiment 1, which will not be repeated here.
- step 500 the network side device verifies whether the vehicle system can be logged in with the first user account according to the login binding code in the second verification request message, if yes, continue to perform the subsequent steps, otherwise, stop the execution of the subsequent steps.
- step 500 the verification method in step 500 is also different.
- the first verification request message in Case 1 to Case 4 in Embodiment 1 needs to be replaced with a second verification request message.
- FIG. 9 is a schematic flowchart of a method for logging in to a vehicle and machine system according to an embodiment of this application.
- Figure 9 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 9, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 9.
- Step 400 in FIG. 5 includes step 401 and step 402 in FIG. 9.
- step 301 to step 304 that differs from the embodiment shown in FIG. 8 is step 304. Therefore, the description of steps 301 to 303 will not be repeated.
- Step 304 The mobile terminal sends a second login request message to the vehicle, and the second login request message includes the login binding code.
- the second login request message may also include at least one of a mobile terminal identification code or the first user account.
- the mobile terminal after the mobile terminal requests the network side device to obtain the login binding code, it then initiates a login request to the vehicle; and in the embodiment shown in FIG. 8, the mobile terminal first sends The vehicle initiates a login request (for example, sends a second login request to the vehicle before step 304), and then sends a third verification request message to the vehicle, and indirectly sends the third verification request message to the vehicle.
- the network side device provides the login binding code.
- Step 401 The mobile terminal sends a first verification request message to the network side device, where the first verification request message includes a login binding code.
- Step 402 The vehicle machine sends a second verification request message to the network side device, and the second verification request message includes the login binding code.
- the login binding code there are multiple ways to generate the login binding code.
- the first verification request message such as the above case 1 to case 4.
- the second verification request message and the first verification request message may be the same or different.
- Step 500 The network side device verifies whether the vehicle system can be logged in with the first user account according to the login binding code in the first verification request message and the second verification request message, if yes, continue to perform the subsequent steps, otherwise, stop the subsequent steps Implementation.
- step 500 refer to the introduction of step 500 in Embodiment 2, and the details will not be repeated.
- the login binding code is generated by the network-side device.
- the login binding code may also be generated by the mobile terminal. Either it is generated by the vehicle or the mobile terminal and the vehicle.
- FIG. 10 is a schematic flowchart of a method for logging in to a vehicle and machine system according to an embodiment of this application.
- FIG. 10 can be understood as a refinement of some of the steps in FIG. 5. Comparing FIG. 5 and FIG. 10, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 10.
- Step 400 in FIG. 5 includes step 401 and step 402 in FIG. 10.
- Step 301 The mobile terminal generates a first login binding code.
- the mobile terminal may generate the first login binding code according to at least one of the first user account, mobile terminal identification code, vehicle system identification code, or vehicle identification code.
- the car machine sends at least one of the car machine system identification code or the car machine identification code to the mobile terminal; or, in other steps before step 301, the car machine sends the car machine system identification code to the mobile terminal.
- at least one of the vehicle identification code which is not limited in the embodiment of the present application.
- step 303 in Embodiment 1 for example, the foregoing example 1 to example 4
- the details are not repeated here.
- Step 302 The mobile terminal sends a login request to the vehicle, and the login request may include the first login binding code.
- the login request may also include at least one of the first user account or the mobile terminal identification code.
- Step 303 The car machine generates a second login binding code based on the first login binding code.
- the first login binding code and the second login binding code may be the same. Then there is no need to perform step 303, so step 303 is represented by a dotted line in the figure.
- the first login binding code and the second login binding code may be different.
- the first login binding code is generated by the mobile terminal according to the first user account
- the second login binding code may be generated by the car machine according to the first login binding code and the car machine system identification code.
- the car machine generates the third login binding code according to the car machine system identification code.
- the second login binding code can be a combination of the first login binding code and the third login binding code, such as in the first login binding code Add the third login binding code in, and so on.
- Step 304 The car machine sends a login request feedback message to the mobile terminal, and the login request feedback message includes the second login binding code.
- step 304 may carry the first login binding code, or carry the instruction information for agreeing to the first login binding code, or not carry any login binding code; After the mobile terminal receives the login request feedback message, it is determined that the vehicle agrees with the first login binding code.
- Step 401 The mobile terminal sends a first verification request message to the network side device, where the first verification request message includes the second login binding code, and also includes at least one of the first user account or the vehicle system identification code.
- the first verification request message may also include a vehicle identification code and/or a mobile terminal identification code.
- Step 402 The car machine sends a second verification request message to the network side device.
- the second verification request message includes the second login binding code, and also includes at least one of the first user account or the car machine system identification code.
- the second verification request message may also include the vehicle identification code and/or the mobile terminal identification code.
- Step 500 The network side device verifies whether the vehicle system can be logged in to the vehicle system with the first user account according to the second login binding code in the first verification request message and the second verification request message, if yes, continue to perform the subsequent steps, otherwise, stop Execution of subsequent steps.
- the first verification request message includes the second login binding code and the first user account
- the second verification request message includes the second login binding code and the vehicle system identification code
- the first verification request message Includes the second login binding code and the vehicle system identification code
- the second verification request message includes the second login binding code and the first user account.
- the network side device determines that the second login binding code in the first verification request message and the second verification request message are the same, and determines that the verification passes, otherwise the verification fails.
- the first verification request message and the second verification request message also include the vehicle identification code.
- the network side device determines that the second login binding code in the first verification request message and the second verification request message are the same, and determines that the vehicle identification code in the first verification message and the second verification message are the same, and confirms verification Pass, otherwise, the verification fails.
- FIG. 11 is a schematic flowchart of a method for logging in to a vehicle-machine system according to an embodiment of this application.
- Figure 11 can be understood as a refinement of some of the steps in Figure 5. Comparing FIG. 5 and FIG. 11, it can be seen that the process of negotiating and logging in the binding code between the mobile terminal and the vehicle in step 300 in FIG. 5 may include steps 301 to 304 in FIG. 11.
- Step 301 The mobile terminal sends a login request message to the vehicle.
- the login request message may carry at least one of the first user account or the mobile terminal identification code.
- Step 302 The car machine generates a first login binding code.
- the vehicle machine may generate the first login binding code according to at least one of the first user account, mobile terminal identification code, vehicle machine system identification code, or vehicle machine identification code.
- the vehicle machine may generate the first login binding code according to at least one of the first user account, mobile terminal identification code, vehicle machine system identification code, or vehicle machine identification code.
- Step 303 The car machine sends a login request feedback message to the mobile terminal, and the login request feedback message includes the first login binding code.
- Step 304 The mobile terminal generates a second login binding code based on the first login binding code.
- the first login binding code and the second login binding code may be the same. Then there is no need to perform step 304, so step 304 is represented by a dashed line in the figure.
- the first login binding code and the second login binding code may be different.
- the first login binding code is generated by the car machine according to the car machine system identification code
- the second login binding code may be generated by the mobile terminal according to the first login binding code and the first user account.
- the mobile terminal generates the third login binding code according to the first user account
- the second login binding code may be a combination of the first login binding code and the third login binding code, as in the first login binding code Add the third login binding code, and so on.
- Step 305 The mobile terminal sends a negotiated login binding code message to the vehicle, and the negotiated login binding code message includes the second login binding code.
- steps 304 to 305 are optional steps, which are represented by dashed lines in FIG. 11. If step 304 and step 305 are not performed, that is, the login binding code negotiated between the car machine and the mobile terminal is the first login binding code. If step 304 and step 305 are executed, that is, the login binding code negotiated between the vehicle and the mobile terminal is the second login binding code.
- the car machine may also send a negotiated login binding code feedback message to the mobile terminal, and the negotiated login binding code feedback message may include indication information 2 for indicating agreement to the second login binding code, or It includes the second login binding code, or does not include any binding code.
- step 300 the process of logging in binding codes negotiated by the car machine and the mobile terminal, can also have other implementations.
- the embodiments of this application are not listed one by one.
- step 401 to step 401 and step 500 reference may be made to the description of Embodiment 5, and the details will not be repeated.
- FIG. 12 is a structural block diagram of a device 1200 for logging in to a vehicle and machine system according to an embodiment of the application.
- the vehicle system login device 1200 is, for example, the above-mentioned mobile terminal, vehicle, or network side device.
- the vehicle system login device 1200 includes a processing unit 1210 and a communication unit 1220.
- the vehicle system login device 1200 is the above-mentioned mobile terminal, or a device capable of supporting the mobile terminal to implement the functions required by the method, such as a chip system.
- the mobile terminal is a mobile phone.
- the processing unit 1210 may be used to perform all operations performed by the mobile terminal in the embodiments shown in FIGS. 5-11 except for the transceiving operations, such as S100, and/or other processes used to support the technology described herein .
- the communication unit 1220 may be used to perform all the transceiving operations performed by the mobile terminal in the embodiments shown in FIG. 5 to FIG. 11, such as S200, and/or other processes used to support the technology described herein.
- the communication unit 1220 can be a functional module that can complete both sending and receiving operations.
- the communication unit 1220 is a module included in the vehicle system login device 1200, and the communication unit 1220 can be used to execute diagrams. 5-All the sending operations and receiving operations performed by the mobile terminal in the embodiment shown in FIG. 11, for example, when performing a sending operation, the communication unit 1220 can be considered as a sending module, and when performing a receiving operation, it can be considered as a communication
- the unit 1220 is a receiving module; alternatively, the communication unit 1220 can also be a collective term for two functional modules.
- the two functional modules are a sending module and a receiving module.
- the sending module is used to complete the sending operation.
- the communication unit 1220 is a mobile terminal station.
- the sending module can be used to perform all the sending operations performed by the mobile terminal in the embodiment shown in FIG. 5 to FIG. 11, and the receiving module is used to complete the receiving operation.
- the communication unit 1220 is included in the mobile terminal.
- the receiving module can be used to perform all receiving operations performed by the mobile terminal in the embodiments shown in FIGS. 5 to 11.
- the communication unit 1220 is used to establish a near-field communication link with the vehicle and the vehicle, and the vehicle and the vehicle corresponds to the vehicle and vehicle system; the processing unit 1210 is used to negotiate and log in with the vehicle and the vehicle through the near-field communication link Binding code; the communication unit 1220 is also used to provide the network side device with the login binding code, the login binding code is used by the network side device to verify whether it can be used on the vehicle system with the first Log in with a user account.
- the vehicle system registration device 1200 is the aforementioned vehicle, or a device capable of supporting the vehicle to implement the functions required by the method, such as a chip system.
- the processing unit 1210 may be used to perform all operations performed by the vehicle in the embodiments shown in FIGS. 5 to 11 except for the receiving and sending operations, such as S700, and/or other processes used to support the technology described herein .
- the communication unit 1220 may be used to perform all the transceiving operations performed by the vehicle in the embodiments shown in FIGS. 5 to 11, such as S200, and/or other processes used to support the technology described herein.
- the communication unit 1220 may be a functional module that can complete both sending and receiving operations.
- the communication unit 1220 is a module included in the vehicle, and the communication unit 1220 can be used to execute FIGS. 5-11.
- all the sending and receiving operations performed by the vehicle and the machine for example, when performing the sending operation, the communication unit 1220 can be considered as the sending module, and when performing the receiving operation, the communication unit 1220 can be considered as the receiving module.
- the communication unit 1220 can also be a collective term for two functional modules, the two functional modules are respectively a sending module and a receiving module, the sending module is used to complete the sending operation, for example, the communication unit 1220 is a module included in the car, Then the sending module can be used to perform all the sending operations performed by the vehicle in the embodiment shown in Figures 5 to 11, and the receiving module is used to complete the receiving operation.
- the communication unit 1220 is a module included in the vehicle, then the receiving The module can be used to perform all the receiving operations performed by the vehicle in the embodiment shown in FIG. 5 to FIG. 11.
- the communication unit 1220 is configured to establish a near field communication link with a mobile terminal, and the mobile terminal is configured to issue a request to log in to the vehicle system with the first user account; and the processing unit 1210 is configured to communicate through the near field
- the field communication link negotiates the login binding code with the mobile terminal; the communication unit 1220 is also used to provide the network side device with the login binding code, and the login binding code is used by the network side device to verify whether the Log in with the first user account on the vehicle system; the communication unit 1220 is also used to receive a login instruction message sent by the network side device, where the login instruction message is used to instruct to log in on the vehicle system The first user account; the processing unit 1210 is also used to log in the first user account on the vehicle system.
- the device 1200 for logging in to the vehicle and machine system is the aforementioned network-side device, or a device capable of supporting the network-side device to implement the functions required by the method, such as a chip system.
- the processing unit 1210 may be used to perform all operations performed by the network side device in the embodiment shown in FIGS. 5-11 except for the transceiving operations, such as S500, and/or other operations used to support the technology described herein. process.
- the communication unit 1220 may be used to perform all the transceiving operations performed by the network side device in the embodiments shown in FIG. 5 to FIG. 11, such as S600, and/or other processes used to support the technology described herein.
- the communication unit 1220 can be a functional module that can complete both sending and receiving operations.
- the communication unit 1220 is a module included in the network side device, and the communication unit 1220 can be used to execute FIG. 5-FIG.
- all the sending operations and receiving operations performed by the network-side device for example, when the sending operation is performed, the communication unit 1220 can be considered as a sending module, and when the receiving operation is performed, the communication unit 1220 can be considered It is a receiving module; or, the communication unit 1220 can also be a collective term for two functional modules.
- the two functional modules are a sending module and a receiving module.
- the sending module is used to complete the sending operation.
- the communication unit 1220 is included in the network side device.
- the sending module can be used to perform all the sending operations performed by the network side device in the embodiment shown in Figure 5 to Figure 11, and the receiving module is used to complete the receiving operation.
- the communication unit 1220 is included in the network side device.
- the receiving module can be used to perform all receiving operations performed by the network side device in the embodiment shown in FIG. 5 to FIG. 11.
- the processing unit 1210 is configured to verify that the vehicle system can be logged in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- the login binding code is used to verify that a near field communication link is established between the mobile terminal and the car machine, and the car machine corresponds to the car machine system; the login binding code is also used to verify the possession of all
- the user of the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle;
- the communication unit 1220 is further configured to send a login instruction message to the vehicle, and the login instruction message is used to instruct Log in to the vehicle system with the first user account on the vehicle.
- the division of units in the embodiments of this application is illustrative, and is only a logical function division. In actual implementation, there may be other division methods.
- the functional units in the various embodiments of this application can be integrated into one processing unit. In the device, it can also exist alone physically, or two or more units can be integrated into one unit.
- the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
- the software or firmware includes but is not limited to computer program instructions or codes, and can be executed by a hardware processor.
- the hardware includes, but is not limited to, various integrated circuits, such as a central processing unit (CPU), a digital signal processor (DSP), a field programmable gate array (FPGA), or an application specific integrated circuit (ASIC).
- CPU central processing unit
- DSP digital signal processor
- FPGA field programmable gate array
- ASIC application specific integrated circuit
- FIG. 13 is a schematic diagram of the hardware of the vehicle-machine system login device 1300 provided by an embodiment of the application.
- the vehicle system login device 1300 includes at least one processor 1301 and at least one memory 1302 for storing program instructions and/or data.
- the memory 1302 is coupled with the processor 1301.
- the coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units, or modules, which can be electrical, mechanical, or other forms, and is used for information exchange between devices, units, or modules.
- the processor 1301 may operate in cooperation with the memory 1302, the processor 1301 may execute program instructions stored in the memory 1302, and at least one of the at least one memory 1302 may be included in the processor 1301.
- the device 1300 for logging in to the vehicle system may further include a communication interface 1303 for communicating with other devices through a transmission medium, so that the device 1300 for logging in to the vehicle system can communicate with other devices.
- the communication interface may be a transceiver, circuit, bus, module, or other type of communication interface.
- the transceiver when the communication interface is a transceiver, the transceiver may include an independent receiver, an independent transmitter; a transceiver with integrated transceiver functions, or an interface circuit, etc. may also be integrated.
- connection medium between the processor 1301, the memory 1302, and the communication interface 1303 is not limited in the embodiment of the present application.
- the memory 1302, the processor 1301, and the communication interface 1303 are connected by a communication bus 1304 in FIG. 13.
- the bus is represented by a thick line in FIG. 13, and the connection mode between other components is only a schematic illustration , Not as a limitation.
- the bus may include an address bus, a data bus, a control bus, and so on. For ease of representation, only one thick line is used in FIG. 13, but it does not mean that there is only one bus or one type of bus.
- the vehicle system login device 1300 is used to implement the steps executed by the mobile terminal in the above-mentioned flow shown in FIG. 5 to FIG. 11.
- the vehicle system login device 1300 may be a mobile terminal, or a chip or circuit in the mobile terminal.
- the communication interface 1303 is used to perform the transceiving operations of the mobile terminal in the above embodiment.
- the processor 1301 is configured to perform processing related operations of the mobile terminal in the above method embodiment.
- the communication interface 1303 is used to establish a near field communication link with the vehicle and the vehicle, and the vehicle and the vehicle are corresponding to the vehicle and vehicle system; the processor 1301 is used to negotiate and log in with the vehicle and the vehicle through the near field communication link Binding code; communication interface 1303, which is also used to provide the network side device with the login binding code, and the login binding code is used by the network side device to verify whether it can be used on the vehicle system with the first Log in with a user account.
- the car-machine system registration device 1300 is used to implement the steps performed by the car-machine in the process shown in Figs. .
- the communication interface 1303 is used to perform operations related to receiving and sending on the vehicle side in the above embodiment.
- the processor 1301 is configured to perform processing related operations on the vehicle side in the above method embodiment.
- the communication interface 1303 is used to establish a near field communication link with a mobile terminal, and the mobile terminal is used to issue a request to log in to the vehicle system with the first user account; the processor 1301 is used to pass the near field communication link.
- the field communication link negotiates the login binding code with the mobile terminal;
- the communication interface 1303 is also used to provide the network side device with the login binding code, and the login binding code is used by the network side device to verify whether the Log in with the first user account on the vehicle system;
- the communication interface 1303 is also used to receive a login instruction message sent by the network side device, where the login instruction message is used to instruct to log in on the vehicle system
- the first user account; the processor 1301 is further configured to log in the first user account on the vehicle system.
- the vehicle system login device 1300 is used to implement the steps performed by the network side device in the process shown in FIGS. 5 to 11 above.
- the vehicle system login device 1300 may be a network side device or a Chip or circuit.
- the communication interface 1303 is used to perform operations related to sending and receiving on the network side device side in the above embodiment.
- the processor 1301 is configured to perform processing related operations on the network side device side in the above method embodiment.
- the processor 1301 is configured to verify that the vehicle system can be logged in to the vehicle system with the first user account according to the login binding code, the first user account, and the vehicle system identification code used to identify the vehicle system.
- the login binding code is used to verify that a near field communication link is established between the mobile terminal and the car machine, and the car machine corresponds to the car machine system; the login binding code is also used to verify the possession of all
- the user of the mobile terminal requests to log in to the vehicle system with the first user account on the vehicle;
- the communication interface 1303 is also used to send a login instruction message to the vehicle, and the login instruction message is used to instruct Log in to the vehicle system with the first user account on the vehicle.
- the processor may be a general-purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, and may implement or Perform the methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
- the general-purpose processor may be a microprocessor or any conventional processor or the like.
- the steps of the method disclosed in combination with the embodiments of the present application may be directly embodied as being executed and completed by a hardware processor, or executed and completed by a combination of hardware and software modules in the processor.
- the memory may be a non-volatile memory, such as a hard disk drive (HDD) or a solid-state drive (SSD), etc., or a volatile memory (volatile memory), for example Random-access memory (random-access memory, RAM).
- the memory is any other medium that can be used to carry or store desired program codes in the form of instructions or data structures and that can be accessed by a computer, but is not limited to this.
- the memory in the embodiments of the present application may also be a circuit or any other device capable of realizing a storage function for storing program instructions and/or data.
- the methods provided in the embodiments of the present application may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- software When implemented by software, it can be implemented in the form of a computer program product in whole or in part.
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, network equipment, user equipment, or other programmable devices.
- the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
- a computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
- the available medium may be a magnetic medium (for example, a floppy disk, hard disk, Magnetic tape), optical media (for example, digital video disc (digital video disc, DVD for short), or semiconductor media (for example, SSD), etc.
- At least one refers to one or more, and “multiple” refers to two or more.
- And/or describes the association relationship of the associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A alone exists, A and B exist at the same time, and B exists alone, where A, B can be singular or plural.
- the character “/” generally indicates that the associated objects before and after are in an “or” relationship.
- "The following at least one item (a)” or similar expressions refers to any combination of these items, including any combination of a single item (a) or a plurality of items (a).
- At least one of a, b, or c can mean: a, b, c, a and b, a and c, b and c, or a and b and c, where a, b, c can be single or multiple.
- this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
- the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
- the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- the disclosed device and method can be implemented in other ways within the scope of this application.
- the above-described embodiments are merely illustrative.
- the division of the modules or units is only a logical function division, and there may be other division methods in actual implementation, for example, multiple units or components may be combined. Or it can be integrated into another system, or some features can be ignored or not implemented.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. .
- Some or all of the modules can be selected according to actual needs to achieve the objectives of the solutions of the embodiments. Those of ordinary skill in the art can understand and implement without creative work.
- the described devices and methods and schematic diagrams of different embodiments can be combined or integrated with other systems, modules, technologies, or methods without departing from the scope of the present application.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electronic, mechanical or other forms.
Abstract
Description
车机系统识别码 | 登录绑定码 |
第一用户账号 | 登录绑定码 |
车机识别码 | 登录绑定码 |
移动终端识别码 | 登录绑定码 |
车机系统识别码 | 第一用户账号 | 登录绑定码 |
Claims (39)
- 一种车机系统登录方法,其特征在于,所述方法用于在移动终端侧请求在所述车机系统上以第一用户账号登录,包括:与车机建立近场通信链接,所述车机与所述车机系统相对应;通过所述近场通信链接与所述车机协商登录绑定码;向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
- 如权利要求1所述的方法,其特征在于,所述登录绑定码为所述网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
- 如权利要求2所述的方法,其特征在于,所述通过所述近场通信链接与所述车机协商登录绑定码,包括:通过所述近场通信链接向所述车机发送第一登录请求消息;通过所述近场通信链接接收所述车机返回的登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码,所述登录绑定码为所述车机向所述网络侧设备请求得到的;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息包括所述登录绑定码,所述第一验证请求消息还包括所述第一用户账号或所述车机系统识别码中的至少一项。
- 如权利要求2所述的方法,其特征在于,所述通过所述近场通信链接与所述车机协商登录绑定码,包括:向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述车机发送第三验证请求消息,所述第三验证请求消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:间接地经由向所述车机发送所述第三验证请求消息来向所述网络侧设备提供所述登录绑定码。
- 如权利要求2所述的方法,其特征在于,所述通过所述近场通信链接与所述车机协商登录绑定码,包括:向所述网络侧设备发送第一绑定码申请消息;接收所述网络侧设备返回的第一绑定码反馈消息,所述第一绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述车机发送第二登录请求消息,所述第二登录请求消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
- 如权利要求1所述的方法,其特征在于,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
- 如权利要求6所述的方法,其特征在于,所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第一验证请求消息,所述第一验证请求消息中包括所述登录绑定码,所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
- 如权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:在所述移动终端上以所述第一用户账号登录第一应用程序,并且所述网络侧设备为所述第一应用程序的应用服务器。
- 如权利要求1-8任一项所述的方法,其特征在于,所述方法还包括:接收所述网络侧设备发送的验证反馈消息。
- 如权利要求1-9任一项所述的方法,其特征在于,所述方法还包括:接收所述车机发送的登陆成功消息。
- 如权利要求3-5或7任一项所述的方法,其特征在于,所述第一验证请求消息或者所述第二登录请求消息中还包括所述移动终端识别码或所述车机识别码中的至少一项。
- 如权利要求1-11任一项所述的方法,其特征在于,在与所述车机建立近场通信链接后,所述方法还包括:基于所述近场通信链接向所述车机发送车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
- 如权利要求12所述的方法,其特征在于,所述车机系统启动请求在所述移动终端与所述车机之间距离小于第一阈值时发送。
- 一种车机系统登录方法,其特征在于,所述方法用于在车机上实现以第一用户账号登录所述车机系统,其中,所述车机与所述车机系统相对应,所述方法包括:与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;通过所述近场通信链接与所述移动终端协商登录绑定码;向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;在所述车机系统上登录所述第一用户账号。
- 如权利要求14所述的方法,其特征在于,所述登录绑定码为所述网络侧设备根据所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项生成的。
- 如权利要求15所述的方法,其特征在于,所述通过所述近场通信链接与所述移动终端协商登录绑定码,包括:通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:间接地经由向所述移动终端发送所述登录请求反馈消息来向所述网络侧设备提供所述登录绑定码。
- 如权利要求15所述的方法,其特征在于,所述通过所述近场通信链接与所述移动终端协商登录绑定码,包括:通过所述近场通信链接从所述移动终端接收第一登录请求消息;向所述网络侧设备发送第二绑定码申请消息;接收所述网络侧设备返回的第二绑定码反馈消息,所述第二绑定码反馈消息中包括所述登录绑定码;通过所述近场通信链接向所述移动终端发送登录请求反馈消息,所述登录请求反馈消息中包括所述登录绑定码;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
- 如权利要求15所述的方法,其特征在于,所述通过所述近场通信链接与所述移动终端协商登录绑定码,包括:通过所述近场通信链接从所述移动终端接收第三验证请求消息或第二登录请求消息,所述第三验证请求消息或所述第二登录请求消息中包括所述登录绑定码,其中,所述登录绑定码为所述移动终端向所述网络侧设备请求得到的;所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码。
- 如权利要求14所述的方法,其特征在于,所述登录绑定码为所述移动终端生成,或者为所述车机生成,或者为所述移动终端和所述车机共同生成。
- 如权利要求19所述的方法,其特征在于,所述向网络侧设备提供所述登录绑定码,包括:向所述网络侧设备发送第二验证请求消息,所述第二验证请求消息包括所述登录绑定码,所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项。
- 如权利要求14-20任一项所述的方法,其特征在于,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序用于在所述移动终端上运行以发出以所述第一用户账号登录所述车机系统的请求。
- 如权利要求14-21任一项所述的方法,其特征在于,所述方法还包括:从所述网络侧设备接收所述第一用户账号的个性化登录数据,并根据所述个性化登录数据设置所述车机系统。
- 如权利要求14-22任一项所述的方法,其特征在于,所述方法还包括:向所述移动终端发送登陆成功消息。
- 如权利要求16-18或20任一项所述的方法,其特征在于,所述登录请求反馈消息或者所述第二验证请求消息中包括所述移动终端识别码或所述车机识别码中的至少一项。
- 如权利要求14-24任一项所述的方法,其特征在于,在与所述移动终端建立近场通信链接后,所述方法还包括:基于所述近场通信链接从所述移动终端接收车机系统启动请求,所述车机系统启动请求用于启动所述车机系统。
- 一种车机系统登录方法,其特征在于,所述方法用于在网络侧设备上验证以第一用户账号登录所述车机系统,所述方法包括:根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
- 如权利要求26所述的方法,其特征在于,所述方法还包括:向所述车机发送所述第一用户账号的个性化登录数据,所述个性化登录数据用于设置所述车机系统。
- 如权利要求26或27所述的方法,其特征在于,所述网络侧设备为第一应用程序的应用服务器,所述第一应用程序运行在所述移动终端上并用于发起以第一用户账号登录所述车机系统的请求。
- 如权利要求26-28任一所述的方法,其特征在于,在所述根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统之前,还包括:从所述车机或所述移动终端接收绑定码申请消息,所述绑定码申请消息中包括所述第一用户账号、用于识别所述移动终端的移动终端识别码、用于识别所述车机系统的车机系统识别码或用于识别所述车机的车机识别码中的至少一项;根据所述绑定码申请消息,生成所述登录绑定码,并向所述车机或所述移动终端发送绑定码反馈消息,所述绑定码反馈消息中包括所述登录绑定码。
- 如权利要求29所述的方法,其特征在于,所述根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统,包括:从所述移动终端接收第一验证请求消息;所述第一验证请求消息中包括所述登录绑定码;所述第一验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;确定所述第一验证请求消息中的登录绑定码与所述生成的登录绑定码一致;确定可以以第一用户账号登录所述车机系统;或者,从所述车机接收第二验证请求消息,所述第二验证请求消息中包括所述登录绑定码;所述第二验证请求消息中还包括所述第一用户账号或所述车机系统识别码中的至少一项;确定所述第二验证请求消息中的登录绑定码与所述生成的登录绑定码一致;确定可以以第一用户账号登录所述车机系统。
- 如权利要求26-28任一所述的方法,其特征在于,所述登录绑定码为所述移动终 端生成的,或者所述车机生成的,或者所述移动终端和所述车机共同生成的。
- 如权利要求31所述的方法,其特征在于,所述根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以第一用户账号登录所述车机系统,包括:从所述移动终端接收第一验证请求消息,从所述车机接收第二验证请求消息;其中,所述第一验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第二验证请求消息中包括所述车机系统识别码和所述登录绑定码;或者,第二验证请求消息中包括所述第一用户账号和所述登录绑定码;所述第一验证请求消息中包括所述车机系统识别码和所述登录绑定码;确定所述第一验证请求消息和所述第二验证请求消息中的登录绑定码一致;确定可以以第一用户账号登录所述车机系统。
- 如权利要求30-32任一所述的方法,其特征在于,所述第一验证请求消息或所述第二验证请求消息中还包括:所述移动终端识别码或所述车机识别码中的至少一项。
- 一种车机系统登录装置,其特征在于,所述车机系统登录装置用于请求在所述车机系统上以第一用户账号登录,所述装置包括:通信单元,用于与车机建立近场通信链接,所述车机与所述车机系统相对应;处理单元,用于通过所述近场通信链接与所述车机协商登录绑定码;所述通信单元,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录。
- 一种车机系统登录装置,其特征在于,所述车机系统登录装置用于实现在车机上以第一用户账号登录车机系统,所述车机与所述车机系统相对应,所述装置包括:通信单元,用于与移动终端建立近场通信链接,所述移动终端用于发出以所述第一用户账号登录所述车机系统的请求;处理单元,用于通过所述近场通信链接与所述移动终端协商登录绑定码;所述通信单元,还用于向网络侧设备提供所述登录绑定码,所述登录绑定码用于所述网络侧设备验证是否可以在所述车机系统上以所述第一用户账号登录;所述通信单元,还用于接收所述网络侧设备发送的登录指示消息,所述登录指示消息用于指示在所述车机系统上登录所述第一用户账号;所述处理单元,还用于在所述车机系统上登录所述第一用户账号。
- 一种车机系统登录装置,其特征在于,车机系统登录装置用于验证以第一用户账号登录所述车机系统,所述装置包括:处理单元,用于根据登录绑定码、所述第一用户账号和用于识别所述车机系统的车机系统识别码验证可以以所述第一用户账号登录所述车机系统,所述登录绑定码用于验证移动终端与车机之间建立了近场通信链接,所述车机与所述车机系统相对应;所述登录绑定码还用于验证持有所述移动终端的用户请求在所述车机上以所述第一用户账号登录所述车机系统;通信单元,还用于向所述车机发送登录指示消息,所述登录指示消息用于指示在所述车机上以所述第一用户账号登录所述车机系统。
- 一种车机系统登录装置,其特征在于,所述车机系统登录装置包括处理器和存储器;所述存储器中存储有程序指令,当所述程序指令被执行时,使得所述车机系统登录装 置执行如权利要求1-33任一所述的方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括计算机程序,当所述计算机程序在处理器上运行时,使得车机系统登录装置执行如权利要求1-33任一所述的方法。
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在处理器上运行时,使得车机系统登录装置执行如权利要求1-33任一所述的方法。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202080097282.5A CN115136625B (zh) | 2020-03-09 | 2020-03-09 | 一种车机系统登录方法及相关装置 |
EP20924813.7A EP4106357A4 (en) | 2020-03-09 | 2020-03-09 | METHOD FOR CONNECTING TO AN ON-BOARD COMPUTER SYSTEM AND ASSOCIATED DEVICE |
KR1020227034216A KR20220150346A (ko) | 2020-03-09 | 2020-03-09 | 차량 내 시스템에 로그인하기 위한 방법 및 관련 장치 |
PCT/CN2020/078479 WO2021179144A1 (zh) | 2020-03-09 | 2020-03-09 | 一种车机系统登录方法及相关装置 |
JP2022553020A JP7440130B2 (ja) | 2020-03-09 | 2020-03-09 | 車載システムにログインするための方法および関連装置 |
US17/939,804 US20230006991A1 (en) | 2020-03-09 | 2022-09-07 | Method and related apparatus for logging in to in-vehicle system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/078479 WO2021179144A1 (zh) | 2020-03-09 | 2020-03-09 | 一种车机系统登录方法及相关装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/939,804 Continuation US20230006991A1 (en) | 2020-03-09 | 2022-09-07 | Method and related apparatus for logging in to in-vehicle system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021179144A1 true WO2021179144A1 (zh) | 2021-09-16 |
Family
ID=77670425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/078479 WO2021179144A1 (zh) | 2020-03-09 | 2020-03-09 | 一种车机系统登录方法及相关装置 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230006991A1 (zh) |
EP (1) | EP4106357A4 (zh) |
JP (1) | JP7440130B2 (zh) |
KR (1) | KR20220150346A (zh) |
CN (1) | CN115136625B (zh) |
WO (1) | WO2021179144A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978724B (zh) * | 2022-05-26 | 2024-02-20 | 重庆长安汽车股份有限公司 | 一种车机多模式融合登录系统及方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105501031A (zh) * | 2014-09-23 | 2016-04-20 | 比亚迪股份有限公司 | 车窗的控制方法和系统 |
WO2017097129A1 (zh) * | 2015-12-08 | 2017-06-15 | 阿里巴巴集团控股有限公司 | 建立短距离无线通道的方法及装置 |
CN107800708A (zh) * | 2017-11-06 | 2018-03-13 | 上海擎感智能科技有限公司 | 一种车机账户自动登录方法和车机装置 |
CN107895572A (zh) * | 2016-09-30 | 2018-04-10 | 法乐第(北京)网络科技有限公司 | 一种语音识别训练方法及系统 |
CN110198528A (zh) * | 2019-05-22 | 2019-09-03 | 上海博泰悦臻网络技术服务有限公司 | 一种个性化设置同步方法、车机及系统 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140310788A1 (en) * | 2013-04-15 | 2014-10-16 | Flextronics Ap, Llc | Access and portability of user profiles stored as templates |
CN104601327B (zh) * | 2013-12-30 | 2019-01-29 | 腾讯科技(深圳)有限公司 | 一种安全验证方法、相关设备和系统 |
CN104836780B (zh) * | 2014-02-12 | 2017-03-15 | 腾讯科技(深圳)有限公司 | 数据交互方法、验证终端、服务器和系统 |
CN105490996B (zh) * | 2014-10-09 | 2019-02-26 | 比亚迪股份有限公司 | 车辆蓝牙钥匙的授权系统和方法 |
US10701059B2 (en) * | 2015-12-29 | 2020-06-30 | Morphotrust Usa, Llc | Onboard vehicle digital identification transmission |
EP3463993A1 (en) * | 2016-06-03 | 2019-04-10 | Volkswagen Aktiengesellschaft | Apparatus, system and method for dynamic identification and key managemement for vehicle access |
CN107592627A (zh) * | 2016-07-06 | 2018-01-16 | 深圳联友科技有限公司 | 一种基于4g网络鉴权的安全蓝牙连接方法 |
CN107733838A (zh) * | 2016-08-11 | 2018-02-23 | 中国移动通信集团安徽有限公司 | 一种移动终端客户端身份认证方法、装置和系统 |
JP2018074205A (ja) | 2016-10-24 | 2018-05-10 | 富士通株式会社 | プログラム、情報処理装置、情報処理システム、及び情報処理方法 |
WO2018135919A1 (en) * | 2017-01-20 | 2018-07-26 | Samsung Electronics Co., Ltd. | Apparatus and method for providing and managing security information in communication system |
WO2018161690A1 (zh) * | 2017-03-07 | 2018-09-13 | 北京奇虎科技有限公司 | 可穿戴设备权限转移的方法、装置及终端 |
JP6898139B2 (ja) | 2017-04-10 | 2021-07-07 | 株式会社東海理化電機製作所 | ユーザ認証システム及びユーザ認証方法 |
CN108322507B (zh) * | 2017-12-28 | 2021-02-19 | 天地融科技股份有限公司 | 一种利用安全设备执行安全操作的方法及系统 |
US10218695B1 (en) * | 2018-03-27 | 2019-02-26 | Capital One Services, Llc | Systems and methods for providing credentialless login using a random one-time passcode |
US10604115B2 (en) * | 2018-03-29 | 2020-03-31 | Omar Mustafa Kamal Ahmad | NFC system for unlocking a vehicle via smartphone biometric authentication |
CN109033769B (zh) * | 2018-06-29 | 2022-06-10 | 蔚来(安徽)控股有限公司 | 基于交互、服务器、车机的车辆出厂检测方法及其装置 |
-
2020
- 2020-03-09 KR KR1020227034216A patent/KR20220150346A/ko active Search and Examination
- 2020-03-09 JP JP2022553020A patent/JP7440130B2/ja active Active
- 2020-03-09 WO PCT/CN2020/078479 patent/WO2021179144A1/zh unknown
- 2020-03-09 CN CN202080097282.5A patent/CN115136625B/zh active Active
- 2020-03-09 EP EP20924813.7A patent/EP4106357A4/en active Pending
-
2022
- 2022-09-07 US US17/939,804 patent/US20230006991A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105501031A (zh) * | 2014-09-23 | 2016-04-20 | 比亚迪股份有限公司 | 车窗的控制方法和系统 |
WO2017097129A1 (zh) * | 2015-12-08 | 2017-06-15 | 阿里巴巴集团控股有限公司 | 建立短距离无线通道的方法及装置 |
CN107895572A (zh) * | 2016-09-30 | 2018-04-10 | 法乐第(北京)网络科技有限公司 | 一种语音识别训练方法及系统 |
CN107800708A (zh) * | 2017-11-06 | 2018-03-13 | 上海擎感智能科技有限公司 | 一种车机账户自动登录方法和车机装置 |
CN110198528A (zh) * | 2019-05-22 | 2019-09-03 | 上海博泰悦臻网络技术服务有限公司 | 一种个性化设置同步方法、车机及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4106357A4 * |
Also Published As
Publication number | Publication date |
---|---|
JP7440130B2 (ja) | 2024-02-28 |
CN115136625A (zh) | 2022-09-30 |
EP4106357A1 (en) | 2022-12-21 |
KR20220150346A (ko) | 2022-11-10 |
US20230006991A1 (en) | 2023-01-05 |
EP4106357A4 (en) | 2023-07-12 |
JP2023517027A (ja) | 2023-04-21 |
CN115136625B (zh) | 2023-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9894526B2 (en) | Mobile applications using vehicle telematics data | |
CN105101115B (zh) | 用于启动应用的方法和系统 | |
US20170180330A1 (en) | Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium | |
US9305453B2 (en) | Method and apparatus for extra-vehicular emergency updates following an accident | |
US20150264017A1 (en) | Secure vehicle data communications | |
WO2018120493A1 (zh) | 通信连接建立方法、系统、移动终端、车载设备及对应设备和计算机存储介质 | |
CN113056898B (zh) | 获取密钥的方法、装置及密钥管理系统 | |
CN104322037A (zh) | 缓冲传输服务 | |
WO2021098212A1 (zh) | 软件升级方法、装置和系统 | |
WO2017177935A1 (zh) | 基于车辆的通信方法、系统及装置 | |
US20190334969A1 (en) | Media Downlink Transmission Control Method and Related Device | |
US9596225B2 (en) | Out-of-vehicle device interface apparatus and method for protecting in-vehicle network | |
WO2021179144A1 (zh) | 一种车机系统登录方法及相关装置 | |
US10308217B2 (en) | Method and apparatus for secure pairing | |
CN116723508B (zh) | 车钥匙创建方法、装置、存储介质及系统 | |
US20170080896A1 (en) | Method and apparatus for secure pairing based on fob presence | |
CN104485011A (zh) | 一种实现车联网接人功能的云服务器、系统及方法 | |
WO2022111691A1 (zh) | Nfc标签的校验方法和相关设备 | |
CN112640504B (zh) | 一种安全通信的方法及装置 | |
WO2023108618A1 (zh) | 一种基于空中下载ota技术的升级方法及通信装置 | |
CN110972204A (zh) | 资源配置的方法、装置、存储介质及网络设备和终端 | |
WO2019104989A1 (zh) | 终端和通信方法 | |
KR102422142B1 (ko) | 차량 간 통신 연결 시스템 및 그 제어방법 | |
CN114765548B (zh) | 目标业务的处理方法及装置 | |
US11972247B2 (en) | Software upgrading method, apparatus, and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20924813 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022553020 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2020924813 Country of ref document: EP Effective date: 20220913 |
|
ENP | Entry into the national phase |
Ref document number: 20227034216 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |