WO2024041635A1 - 车辆安全认证方法 - Google Patents

车辆安全认证方法 Download PDF

Info

Publication number
WO2024041635A1
WO2024041635A1 PCT/CN2023/114924 CN2023114924W WO2024041635A1 WO 2024041635 A1 WO2024041635 A1 WO 2024041635A1 CN 2023114924 W CN2023114924 W CN 2023114924W WO 2024041635 A1 WO2024041635 A1 WO 2024041635A1
Authority
WO
WIPO (PCT)
Prior art keywords
vehicle
authentication
digital car
mobile terminal
car key
Prior art date
Application number
PCT/CN2023/114924
Other languages
English (en)
French (fr)
Inventor
赵君杰
苏京
陈少蓓
冯鸿博
沈鸿翔
Original Assignee
京东方科技集团股份有限公司
北京京东方技术开发有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东方科技集团股份有限公司, 北京京东方技术开发有限公司 filed Critical 京东方科技集团股份有限公司
Publication of WO2024041635A1 publication Critical patent/WO2024041635A1/zh

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present disclosure relates to the field of Internet of Vehicles, and more specifically, to digital car key technology.
  • the present disclosure discloses a vehicle safety authentication method, and corresponding vehicles, mobile terminals, systems, computer program products, and electronic devices.
  • mobile terminal equipment and related technologies have developed rapidly in recent years, carrying more and more functions related to people's daily necessities, food, housing and transportation.
  • mobile terminal products can not only be used as communication tools, but also as bank cards, transportation cards, Smart home control terminal and other functions are used.
  • the function of a mobile terminal device as a car key is one of the popular technologies that has emerged in recent years. This function is also called a digital car key. Different from traditional car keys, digital car keys do not require additional physical car keys. They only integrate the car key function into the mobile terminal device and use near-field communication based on security functions such as Secure Element (SE) and Trusted Execution Environment (TEE).
  • SE Secure Element
  • TEE Trusted Execution Environment
  • NFC NFC
  • Bluetooth BLE
  • ultra-wideband UWB
  • other technologies connect mobile phones and cars to realize functions such as door opening and starting of the vehicle.
  • Digital car keys are one of the important innovative applications of intelligent connected vehicles. Some vehicle manufacturing companies, mobile terminal manufacturers and original equipment manufacturers (OEMs) have already begun to develop digital car key solutions.
  • digital car keys provide security authentication functions
  • digital car keys also have certain security risks. For example, after the mobile terminal device is lost, other users can still unlock the vehicle through the mobile terminal device, which may cause digital car key users to property damage.
  • the present disclosure designs a further security authentication method for digital car keys based on the existing digital car key security authentication scheme, thereby improving the security of digital car key authentication.
  • embodiments of the present disclosure provide a vehicle safety authentication method, wherein The vehicle corresponds to at least one digital car key, and the at least one digital car key is located at at least one mobile terminal.
  • the method includes: receiving a connection request from the at least one mobile terminal; and obtaining the at least one digital car key on the at least one mobile terminal.
  • Authentication information of a digital car key and when the authentication information of the at least one digital car key meets security authentication conditions, perform operations corresponding to the at least one digital car key.
  • embodiments of the present disclosure provide a vehicle configured to perform the above method.
  • embodiments of the present disclosure provide a mobile terminal, the mobile terminal including at least one digital car key configured to interact with a vehicle that performs the above method.
  • embodiments of the present disclosure provide a system, the system includes a vehicle and at least one mobile terminal, the vehicle corresponds to at least one digital car key, and the at least one digital car key is located in the at least one mobile terminal. Terminal, wherein the vehicle is configured to perform the above method, and the system is further configured: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the connection request on the at least one mobile terminal. Authentication information of at least one digital car key; in response to the authentication information of at least two digital car keys passing the first authentication condition within a predetermined time period, and the relative positions between the mobile terminals corresponding to the at least two digital car keys are all the same.
  • the first predetermined condition determining that the authentication information of the at least one digital car key satisfies the second authentication condition; in response to determining that the authentication information of the at least one digital car key satisfies the second authentication condition, executing the at least one digital car key corresponding operation.
  • embodiments of the present disclosure provide a system, the system includes a vehicle and at least one mobile terminal, the vehicle corresponds to at least one digital car key, and the at least one digital car key is located in the at least one mobile terminal. Terminal, wherein the vehicle is configured to perform the above method, and the system is further configured: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the connection request on the at least one mobile terminal.
  • Authentication information of at least one digital car key the vehicle determines the trajectory of the mobile terminal corresponding to the at least one digital car key based on the authentication information of the at least one digital car key; in response to the movement corresponding to the at least one digital car key The trajectory of the terminal satisfies the second predetermined condition, and it is determined that the authentication information of the at least one digital car key satisfies the second predetermined condition.
  • Authentication condition in response to the authentication information of the at least one digital car key satisfying the first authentication condition and the second authentication condition, perform an operation corresponding to the at least one digital car key.
  • embodiments of the present disclosure provide a system, the system includes a vehicle and at least one mobile terminal, the vehicle corresponds to at least one digital car key, and the at least one digital car key is located in the at least one mobile terminal. Terminal, wherein the vehicle is configured to perform the above method, and the system is further configured: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the connection request on the at least one mobile terminal.
  • Authentication information of at least one digital car key the vehicle triggers the at least one mobile terminal to perform identity information verification; the at least one mobile terminal performs identity information verification and returns the identity information verification result to the vehicle; respond When the identity information verification result passes, it is determined that the authentication information of the at least one digital car key on the at least one mobile terminal satisfies the second authentication condition; in response to the authentication information of the at least one digital car key satisfying The first authentication condition and the second authentication condition execute operations corresponding to the at least one digital car key.
  • embodiments of the present disclosure provide a system, the system includes a vehicle and at least one mobile terminal, the vehicle corresponds to at least one digital car key, and the at least one digital car key is located in the at least one mobile terminal. Terminal, wherein the vehicle is configured to perform the above method, and the system is further configured: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the connection request on the at least one mobile terminal.
  • Authentication information of at least one digital car key in response to the at least one mobile terminal performing a predetermined operation, determining that the authentication information of the at least one digital car key on the at least one mobile terminal satisfies the second authentication condition; in response to The authentication information of the at least one digital car key satisfies the first authentication condition and the second authentication condition, and the operation corresponding to the at least one digital car key is performed.
  • embodiments of the present disclosure provide a system, the system includes a vehicle and at least one mobile terminal, the vehicle corresponds to at least one digital car key, and the at least one digital car key is located in the at least one mobile terminal.
  • a terminal wherein the vehicle is configured to perform the above method, and the system is further configured to: the vehicle synchronizes the second authentication condition from a vehicle server of the vehicle; the vehicle receives the at least one mobile terminal connection request; the vehicle obtains the at least one connection request on the at least one mobile terminal Authentication information of a digital car key; when the second authentication condition includes two second authentication conditions among the above-mentioned second authentication conditions and the relationship between the two second authentication conditions is an AND relationship, in response to the The authentication information of the at least one digital car key satisfies the two second authentication conditions at the same time, and it is determined that the authentication information of the at least one digital car key satisfies the second authentication condition; where the second authentication condition includes the above second authentication condition.
  • two second authentication conditions among the authentication conditions and the relationship between the two second authentication conditions is an OR relationship
  • in response to the authentication information of the at least one digital car key satisfying one of the two second authentication conditions Any one of, determining that the authentication information of the at least one digital car key satisfies the second authentication condition; in response to the authentication information of the at least one digital car key satisfying the first authentication condition and the second authentication condition, execute Operations corresponding to the at least one digital car key.
  • embodiments of the present disclosure provide a system, the system includes a vehicle and at least one mobile terminal, the vehicle corresponds to at least one digital car key, and the at least one digital car key is located in the at least one mobile terminal.
  • a terminal wherein the vehicle is configured to perform the above method, and the system is further configured such that the vehicle is provided with multiple security authentication models, wherein each security authentication model corresponds to one of the above second authentication conditions.
  • the second authentication condition the vehicle extracts corresponding parameters of the multiple security authentication models; the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the at least one mobile terminal on the at least one mobile terminal.
  • Authentication information of a digital car key the vehicle obtains the values of corresponding parameters of the multiple security authentication models from the authentication information of the at least one digital car key; the vehicle is based on the corresponding parameters of the multiple security authentication models The value of the parameter is used to determine the matching degree between the at least one digital car key and the plurality of security authentication models, and the security authentication model with the highest matching degree between the at least one digital car key and the at least one digital car key is determined from the plurality of security authentication models.
  • Authentication model the vehicle sets the security authentication model as a security authentication model for the at least one digital vehicle key.
  • an embodiment of the present disclosure provides a system, the system includes a vehicle and at least one mobile terminal, the vehicle corresponds to at least one digital car key, the at least one digital car key is located in the at least one mobile terminal.
  • a terminal wherein the vehicle is configured to perform the above method, and the system is further configured: the vehicle obtains a preset predetermined abnormal state; the vehicle receives a connection request from the at least one mobile terminal; The vehicle obtains the authentication information of the at least one digital car key on the at least one mobile terminal; when it is determined that the authentication information of the at least one digital car key satisfies the first authentication condition, the vehicle based on the at least one Authentication information of a digital car key determines the current status of the at least one digital car key; when it is determined that the current status of the at least one digital car key is a predetermined abnormal state, the vehicle determines that the at least one digital car key Whether the authentication information of the key satisfies the second authentication condition; in response to the authentication information of
  • embodiments of the present disclosure provide an electronic device, including: one or more processors; and one or more memories, wherein a computer executable program is stored in the one or more memories, When the computer executable program is executed by the processor, the vehicle safety authentication method as described above is executed.
  • embodiments of the present disclosure provide a computer-readable storage medium on which computer-executable instructions are stored, and when executed by a processor, the instructions are used to implement the vehicle safety authentication method as described above.
  • embodiments of the present disclosure provide a computer program product or computer program including computer instructions stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the vehicle safety authentication method according to the embodiment of the present disclosure.
  • the method provided by the embodiment of the present disclosure obtains the authentication information of the mobile terminal when initiating a connection request, and performs double security authentication of the digital car key of the mobile terminal based on the authentication information of the digital car key, so as to obtain the authentication information of the digital car key of the mobile terminal.
  • the mobile terminal controls the vehicle, so that the digital car key of the mobile terminal can obtain higher security, thereby improving the user experience of the digital car key.
  • FIG. 1A is a schematic diagram illustrating an example framework corresponding to a digital car key according to an embodiment of the present disclosure
  • 1B is a schematic diagram illustrating the architecture of a TEE-based Bluetooth digital car key system according to an embodiment of the present disclosure
  • 1C is a flow chart illustrating the use of a digital car key according to an embodiment of the present disclosure
  • 1D is a flowchart illustrating standards certification according to an embodiment of the present disclosure
  • 1E is a flowchart illustrating fast authentication according to an embodiment of the present disclosure
  • FIG. 2A is a flowchart illustrating a vehicle safety authentication method according to an embodiment of the present disclosure
  • 2B is a schematic diagram illustrating the relationship between a vehicle and a digital car key according to an embodiment of the present disclosure
  • 2C is another schematic diagram illustrating the relationship between a vehicle and a digital car key according to an embodiment of the present disclosure
  • 3A is a schematic flowchart illustrating security authentication in the presence of at least two mobile terminals connected to a vehicle according to an embodiment of the present disclosure
  • 3B is a schematic diagram illustrating possible settings of a second authentication condition in the presence of at least two mobile terminals connected to a vehicle according to an embodiment of the present disclosure
  • 3C is a schematic diagram illustrating the relationship between two mobile terminals and a vehicle according to an embodiment of the present disclosure
  • 4A is a schematic flowchart illustrating security authentication in the case where the second authentication condition is that the trajectory of the mobile terminal corresponding to at least one digital car key satisfies the second predetermined condition according to an embodiment of the present disclosure
  • 4B is a schematic diagram illustrating possible settings of the second authentication condition when the trajectory of the mobile terminal corresponding to at least one digital car key satisfies the second predetermined condition according to an embodiment of the present disclosure
  • 4C is a schematic diagram illustrating a first example trajectory of a mobile terminal according to an embodiment of the present disclosure
  • 4D is a diagram illustrating a second example trajectory of a mobile terminal according to an embodiment of the present disclosure. schematic diagram
  • 4E is a schematic diagram illustrating a third example trajectory of a mobile terminal according to an embodiment of the present disclosure.
  • Figure 5A is a schematic flow chart illustrating security authentication in the case where the second authentication condition is identity information verification according to an embodiment of the present disclosure
  • 5B is a schematic diagram illustrating possible settings of the second authentication condition when the second authentication condition is identity information verification according to an embodiment of the present disclosure
  • 5C is a schematic diagram illustrating the relationship between a mobile terminal and a vehicle according to an embodiment of the present disclosure
  • 6A is a schematic flowchart illustrating security authentication in the case where the second authentication condition includes two conditions combined according to an embodiment of the present disclosure
  • 6B is a schematic diagram illustrating an example situation in which the second authentication condition includes one or more possible conditions according to an embodiment of the present disclosure
  • Figure 7 is a schematic flowchart illustrating security authentication using a security authentication model according to an embodiment of the present disclosure
  • FIG. 8A is a schematic diagram illustrating a first abnormal state according to an embodiment of the present disclosure.
  • FIG. 8B is a schematic diagram illustrating a second abnormal state according to an embodiment of the present disclosure.
  • 8C is a schematic diagram illustrating a third abnormal state according to an embodiment of the present disclosure.
  • 8D is a schematic diagram illustrating a fourth abnormal state according to an embodiment of the present disclosure.
  • 8E is a flowchart illustrating operations in response to the current state of the digital car key being a predetermined abnormal state according to an embodiment of the present disclosure
  • FIG. 9 is a flowchart illustrating execution of security authentication based on predetermined abnormal state judgment according to an embodiment of the present disclosure
  • Figure 10 shows a schematic diagram of an electronic device according to an embodiment of the present disclosure
  • FIG. 11 illustrates a schematic diagram of the architecture of an exemplary computing device in accordance with an embodiment of the present disclosure.
  • Figure 12 shows a schematic diagram of a storage medium according to an embodiment of the present disclosure.
  • Mobile intelligent terminal A mobile terminal that can access the mobile communication network, has an open operating system that can provide application development interfaces, and can install and run application software.
  • Digital key A technology that integrates the car key function into a mobile terminal device, based on security capabilities such as SE and TEE, and uses communication technologies such as NFC, Bluetooth, and UWB to realize functions such as opening the door and starting the vehicle.
  • the digital key framework should encapsulate the operations related to the digital key TA in the life cycle of the digital key, and provide the key management service to the car factory App and Native in the form of a unified API. App calls, these functions include but are not limited to: device pairing, key life cycle management, key unlocking, locking, sharing, car control, etc.
  • the digital car key framework should ensure the availability of the terminal-side key function in the authentication process, so that the digital car key TA can receive and respond to the authentication messages sent by the vehicle in a timely manner. The specific method is implemented by the mobile terminal manufacturer.
  • the digital car key framework should implement access control to the key service API and maintain access control policies.
  • the digital car key framework should have the ability to parse and encapsulate Bluetooth authentication data packets for Bluetooth pairing with the vehicle based on a universal method, establishing a Bluetooth connection, and realizing interaction with the vehicle.
  • the Trusted Execution Environment is a security area that exists in the mobile terminal device and is separated from the REE.
  • the specific implementation can be a security mode of the main processor, or it can be isolated from the main processor. coprocessor.
  • a trusted execution environment provides the basis This security function includes secure storage, secure boot, isolation mechanism, etc.
  • Rich Execution Environment A rich trusted execution environment exists in a mobile terminal device, runs a common operating system such as Android, iOS, and Linux, provides all functions of the device to the upper-layer App, and is non-secure and separated from the TEE. area.
  • the digital car key trusted application is a trusted application executed in the TEE.
  • TA should call the underlying security capabilities provided by the TEE to realize the construction and storage of key data, and provide key pairing and unlocking services. , locking, sharing, vehicle control and other business functions provide the ability to encrypt, decrypt and secure data. TA should have the ability to verify user identity.
  • FIG. 1A is a schematic diagram illustrating an example framework corresponding to a digital car key according to an embodiment of the present disclosure.
  • an example framework corresponding to a digital car key includes a mobile terminal (the mobile terminal optionally includes an owner device, a friend device, etc.), a mobile terminal server (the owner device original equipment manufacturer (OEM) server corresponding to the user's device, OEM server corresponding to the friend's device, etc.), vehicle and vehicle server, etc.
  • Mobile terminals and vehicles can interact through near field communication (NFC), Bluetooth (BLE), and ultra-wideband (UWB) protocols.
  • NFC near field communication
  • BLE Bluetooth
  • UWB ultra-wideband
  • the vehicle side is deployed with one or more of NFC readers, BLE modules, and UWB modules.
  • Both NFC and BLE can realize the functions of digital car keys, including digital car key pairing and digital car key usage functions.
  • UWB is mainly used to assist digital car keys in positioning.
  • FIG. 1B is a schematic diagram illustrating the architecture of a TEE-based Bluetooth digital car key system according to an embodiment of the present disclosure.
  • the TEE-based Bluetooth digital car key system architecture mainly includes vehicles, vehicle servers, mobile terminal devices, terminal device servers and mobile service providers.
  • the Digital Car Key Framework encapsulates the operations related to the digital car key TA in the life cycle of the digital car key, in the form of a unified API.
  • the car key management service is provided to the device manufacturer application software and the vehicle manufacturer application software. These functions include but are not limited to: device pairing, key life cycle management, key unlocking, locking, sharing, vehicle control, etc.
  • the digital car key framework also ensures the availability of the terminal-side key function in the authentication process, allowing the digital car key TA to receive and respond to the authentication messages sent by the vehicle in a timely manner.
  • the digital car key framework can pair with the vehicle via Bluetooth in a universal manner, establish a Bluetooth connection and interact with the vehicle.
  • the vehicle has a vehicle DK authentication system for digital car key authentication, in which the digital car key authentication information of the mobile terminal obtained from the vehicle server can be authenticated and control of the vehicle can be determined.
  • 1C is a flow chart illustrating the use of a digital car key located on a mobile terminal for interaction with a vehicle according to an embodiment of the present disclosure. After the digital car key of the mobile terminal is paired with the vehicle, the digital car key can be used to complete vehicle control operations (such as vehicle starting operations).
  • a mobile terminal equipped with a digital car key can interact with the vehicle in the following steps A1 to A7.
  • the vehicle and the mobile terminal can respectively have the TEE-based Bluetooth digital car key system architecture as shown in Figure 1B.
  • the structure of the vehicle and the mobile terminal in the vehicle, wherein, before performing vehicle control according to the instructions of the mobile terminal, the verification of the mobile terminal and its digital car key can be performed by, for example, the vehicle DK authentication system in the vehicle.
  • the vehicle notifies the mobile terminal that a Bluetooth communication connection is successfully established (the Bluetooth pairing process ends), and the Bluetooth digital car key can be used normally.
  • Standard authentication is performed between the vehicle and the mobile terminal. If the standard authentication is successful, save the quick authentication key, and establish a secure channel and jump to step A5. If the standard authentication fails, determine the failure type. Among them, if it is not an error that the digital car key ID (KeyID) cannot be found, it is considered If the security authentication fails, the process ends. If it is an error that the KeyID cannot be found, it is considered to be the first standard authentication of the friend's key, and step A4 is followed to obtain the friend's key authentication information process.
  • KeyID digital car key ID
  • the vehicle obtains the friend’s key authentication information from the mobile terminal and uses the owner’s digital car
  • the key public key verifies the signature. If the verification passes, the digital car key public key is saved, and this public key is used to verify the signature transmitted by the mobile terminal, completing the first standard authentication process for the friend's key.
  • the vehicle and the mobile terminal have established a secure channel, and the vehicle can call the loadData interface to read the digital car key business data.
  • A6 Perform Bluetooth ranging and positioning operations between the mobile terminal and the vehicle.
  • a sensorless authentication process or a remote control authentication process can be carried out between the vehicle and the mobile terminal.
  • the user can call the vehicle control instructions through the mobile terminal to complete the vehicle control operation.
  • the existing security authentication can include the above-mentioned standard authentication and fast authentication.
  • the following describes the standard authentication and quick authentication processes with reference to Figure 1D and Figure 1E respectively.
  • FIG. 1D is a flowchart illustrating standards authentication according to an embodiment of the present disclosure.
  • Figure IE is a flowchart illustrating fast authentication according to an embodiment of the present disclosure.
  • a mobile terminal equipped with a digital car key can interact with the vehicle in the following steps B1 to B15.
  • the vehicle and the mobile terminal can respectively have the TEE-based Bluetooth digital car key system architecture as shown in Figure 1B
  • the structure of the vehicle and the mobile terminal in the vehicle, wherein the standard authentication shown in FIG. 1D can be performed by, for example, the vehicle DK authentication system in the vehicle.
  • the vehicle generates a temporary public and private key pair for the vehicle.
  • the vehicle sends a public key exchange request to the mobile terminal, transmitting the vehicle temporary public key and vehicle ID.
  • the mobile terminal generates a temporary public and private key pair for the digital car key.
  • the mobile terminal sends a public key exchange request response to the vehicle and returns the digital car key temporary public key and digital car key ID.
  • the vehicle generates vehicle authentication information, including digital car key temporary public key, vehicle temporary public key and digital car key ID related information, and uses the vehicle private key to sign the vehicle authentication information for mobile terminal verification of the vehicle's identity, Prevent counterfeit vehicles from obtaining mobile terminal information.
  • vehicle authentication information including digital car key temporary public key, vehicle temporary public key and digital car key ID related information, and uses the vehicle private key to sign the vehicle authentication information for mobile terminal verification of the vehicle's identity, Prevent counterfeit vehicles from obtaining mobile terminal information.
  • the vehicle sends a standard authentication request to the mobile terminal and transmits the vehicle identification to the mobile terminal. Certificate information signature.
  • the mobile terminal uses the vehicle public key to verify the signature of the vehicle authentication information.
  • the vehicle public key certificate has been issued to the mobile terminal by the key activation process.
  • the mobile terminal If the signature verification of the vehicle authentication information passes, the mobile terminal generates digital car key authentication information, including digital car key temporary public key, vehicle temporary public key and vehicle ID related information, and then B8. Use the digital car key private key to verify the digital car key Authentication information is signed.
  • the mobile terminal sends a standard authentication request response to the vehicle and transmits the digital car key authentication information signature to the vehicle.
  • the mobile terminal and the vehicle use a temporary key pair to negotiate a symmetric key.
  • the key derivation function (KDF) algorithm is used to generate the secure channel key and the fast authentication key (B10.1).
  • the mobile terminal uses the same key agreement algorithm and KDF algorithm to generate the secure channel key.
  • key and fast authentication key (B10.2) based on the same secure channel key, both parties establish a secure channel.
  • Step B11 According to the digital car key ID transmitted by the mobile terminal, the vehicle internally queries the digital car key ID to obtain the corresponding digital car key public key. If it can be found, proceed directly to step B15; if the vehicle cannot find the digital car key ID and the corresponding The digital car key public key of the friend's key is then executed based on the established security channel. Steps B12-B14 are performed, and the vehicle obtains the digital car key public key of the friend's key through steps B12-B14.
  • the vehicle sends a digital car key data request to the mobile terminal to obtain the friend's key authentication information.
  • the mobile terminal sends a digital car key data request response to the vehicle and returns the friend's key authentication information.
  • the vehicle uses the secure channel key to decrypt the friend's key authentication information, it uses the owner's digital car key public key to verify the signature of the friend's key authentication information. If the verification is successful, it saves the friend's digital car key public key in the friend's key authentication information.
  • the terminal can interact with the vehicle in the following steps C1 to C12.
  • the vehicle and the mobile terminal can respectively have the structures of the vehicle and the mobile terminal in the TEE-based Bluetooth digital car key system architecture as shown in Figure 1B, wherein Figure 1E
  • the quick authentication shown may be performed, for example, by a vehicle DK authentication system in the vehicle.
  • the vehicle generates a temporary public and private key pair for the vehicle.
  • the vehicle sends a public key exchange request to the mobile terminal, transmitting the vehicle temporary public key and vehicle ID.
  • the mobile terminal generates a temporary public and private key pair for the digital car key.
  • the mobile terminal uses the fast authentication key and the KDF algorithm to generate the first key (KCmac) and the secure channel key.
  • the mobile terminal uses KCmac to generate digital car key quick authentication information.
  • the mobile terminal sends a public key exchange request response to the vehicle and returns the digital car key quick authentication information, digital car key temporary public key and digital car key ID.
  • the vehicle does not find the quick authentication key corresponding to the digital car key ID, it will proceed to the standard authentication process. If the fast authentication key is found, the KCmac and secure channel keys are generated using the fast authentication key and the KDF algorithm.
  • the vehicle uses KCmac to verify the rapid authentication information of the digital car key and complete the vehicle's authentication of the mobile terminal.
  • the vehicle uses KCmac to generate rapid vehicle certification information.
  • the vehicle sends a quick authentication request to the mobile terminal and transmits the vehicle quick authentication information.
  • the mobile terminal uses KCmac to verify the vehicle quick authentication information and complete the vehicle authentication by the mobile terminal.
  • the mobile terminal sends a fast authentication request response to the vehicle. If the authentication is successful, the fast authentication is passed. The mobile terminal and the vehicle will synchronize to establish a secure channel based on the generated secure channel key, and subsequent operations will use this secure channel.
  • the digital car key provides security authentication functions, including standard authentication and fast authentication as described with reference to Figure 1D and Figure 1E.
  • the digital car key still has certain security risks, for example, after the mobile terminal is lost , other users can still unlock the vehicle through the mobile terminal, which may cause property damage to the user of the digital car key.
  • Digital car keys are the future development trend.
  • the functions of digital car keys can be realized through one or more of NFC, BLE and UWB.
  • NFC/BLE realizes the function of digital car keys.
  • UWB mainly Realize digital car key positioning function.
  • the present disclosure provides a vehicle security authentication method, which improves the security of digital car key authentication by designing a further security authentication method for digital car keys based on the existing digital car key security authentication scheme. sex.
  • the method provided by the embodiment of the present disclosure obtains the authentication information of the mobile terminal when initiating a connection request, and performs double security authentication of the digital car key of the mobile terminal based on the authentication information of the digital car key, so as to obtain the authentication information of the digital car key of the mobile terminal.
  • the mobile terminal controls the vehicle, so that the digital car key of the mobile terminal can obtain higher security, thereby improving the user experience of the digital car key.
  • FIG. 2A is a flowchart illustrating a vehicle security authentication method 200 according to an embodiment of the present disclosure.
  • FIG. 2B is a schematic diagram illustrating the relationship between the vehicle 20 and the digital car keys (21, 22) according to an embodiment of the present disclosure.
  • Figure 2C is another schematic diagram illustrating the relationship between the vehicle 20 and the digital car keys (23, 24) according to an embodiment of the present disclosure.
  • the vehicle safety authentication method 200 may include steps 201-203 as shown in FIG. 2A.
  • the method 20 includes one or all of steps 201 to 203, and may also include more steps.
  • the execution subjects of steps 201 to 203 may be various components located on the vehicle 20 (for example, the central processor, BLE node, UWB node or NFC node, etc., on the vehicle 20 as shown in FIG. 2B ), or may be located on the vehicle 20 .
  • Various components on the exterior of vehicle 20 This disclosure does not limit the execution subject of steps 201 to 203.
  • step 201 a connection request from at least one mobile terminal may be received.
  • the vehicle 20 optionally has a trusted environment and supports the function of a digital car key.
  • the vehicle 20 can cooperate with various devices in Figure 2B to complete or independently complete one or more of the following operations: 1 cooperate with the mobile terminal's Bluetooth connection and pairing request; 2 perform identity and key authentication with the mobile terminal , and authenticate key-related business data at the same time; 3 Locate the position of the mobile terminal relative to the vehicle; 4 Receive digital car key control vehicle operation requests, process and control the vehicle to complete related operations (such as vehicle unlocking, raising and lowering windows, turning on and off the air conditioner, starting the ignition permissions, etc.); 5 Supports online upgrade of digital car key applications; 6 DK authentication system function, which can prevent relay attacks with the cooperation of mobile terminals.
  • the mobile terminal can be equipped with vehicle manufacturer application software, equipment manufacturer application software, digital car key execution environment and communication module, etc., to jointly construct the basic functions of the digital car key.
  • vehicle manufacturer application software also known as the vehicle manufacturer APP
  • Equipment manufacturer application software also known as "Native App”
  • the device manufacturer's application software can trigger status synchronization with the car after completing the key life cycle status change operation, and optionally synchronize through interaction between the two servers.
  • the vehicle may correspond to at least one digital car key, and the at least one digital car key may be located in at least one mobile terminal.
  • the at least one digital car key may be located in at least one mobile terminal.
  • FIG 2B there are two mobile terminals (mobile terminals 1 and 2) near the vehicle 20, on which digital car keys 21 and 22 can be mounted respectively (not shown in the figure). Any one of these two mobile terminals can establish a communication connection with the vehicle.
  • a mobile terminal can be equipped with multiple digital car keys.
  • a mobile terminal can be equipped with digital car key A using BLE communication connection, digital car key B using UWB communication connection, and digital car key C using NFC communication connection. This disclosure is not limited in this regard.
  • the vehicle may include a plurality of communication nodes, and the plurality of communication nodes may include one or more of a Bluetooth BLE node, a near field communication NFC node, and an ultra-wideband UWB node.
  • the vehicle 20 may optionally be equipped with a BLE node, and within the effective range of the BLE connection, establish a Bluetooth communication connection with the mobile terminals 1 and 2 equipped with digital car keys 21 and 22 respectively.
  • the BLE node optionally includes a Bluetooth master node and a Bluetooth slave node.
  • the Bluetooth master node is used in the digital car key system to establish a Bluetooth communication link between the vehicle and the mobile terminal device, and is responsible for data transmission between the two parties.
  • the Bluetooth master node can also be used to coordinate the implementation of the positioning function.
  • the Bluetooth auxiliary node is mainly used to assist in realizing the positioning function in the digital car key system, so that the vehicle system can learn the location status of the digital car key.
  • the digital car keys 21 and 22 can be sensed by the vehicle when within the BLE node connection effective range (shown in gray circles).
  • the mobile terminals 1 and 2 equipped with the digital car keys 21 and 22 respectively can perform data transmission with the vehicle through Bluetooth.
  • the process of establishing a Bluetooth communication connection between the vehicle 20 and the mobile terminals 1 and 2 equipped with digital car keys 21 and 22 respectively includes Bluetooth connection operations, Bluetooth pairing operations, key authentication operations, etc., while ensuring safety. .
  • the Bluetooth connection operation and Bluetooth pairing operation can provide a basic Bluetooth secure communication link, and the key authentication operation ensures the security of data transmission at the business layer to ensure the functional safety of the Bluetooth digital car key.
  • the present disclosure does not limit the process of establishing a Bluetooth communication connection here, as long as it can achieve the establishment of a communication connection between the vehicle 20 and the mobile terminal equipped with the digital car key 21 .
  • Bluetooth auxiliary nodes are needed and the number of nodes.
  • the vehicle 20 can optionally be equipped with 4 Bluetooth/NFC nodes (BLE/NFC node 1 to BLE/NFC node 4, for example, preferably deployed on the handles/door pillars of four doors respectively. ), the coverage range of each Bluetooth/NFC node does not overlap. Therefore, the BLE/NFC node 1 can only sense the mobile terminal equipped with the digital car key 23 in FIG. 2C, and the BLE/NFC node 3 can only sense the mobile terminal equipped with the digital car key 24.
  • the vehicle 20 may also optionally install an NFC node, a UWB node, etc. to establish an NFC communication connection and a UWB communication connection respectively.
  • the vehicle 20 can trigger the UWB node to search for digital cars within a larger range (shown with a slashed circle). key. Due to the large detection range and high accuracy of UWB, It can more accurately locate the distance and direction of other mobile terminals that support the UWB protocol.
  • multiple communication nodes deployed on the vehicle may be used to receive connection requests from one or more mobile terminals within their coverage range (connection effective range).
  • the connection request can be sent by the mobile terminal to the vehicle to establish a communication connection with the vehicle, thereby performing security authentication on the digital car key carried by the mobile terminal, so as to use the digital car key to control the vehicle to perform desired operations.
  • the mobile terminal corresponding to the digital car key 24 in Figure 2C can send a connection request to the vehicle 20 through the Bluetooth module provided on it. Since the mobile terminal is within the coverage of the BLE/NFC node 3, its connection request can be sent by The BLE/NFC node 3 obtains.
  • the connection request of the at least one mobile terminal may be sent after the at least one mobile terminal has established a Bluetooth connection with the vehicle and completed digital car key pairing (for example, when the mobile terminal wishes to establish a Bluetooth connection with the vehicle again) .
  • the BLE/NFC/UWB node can establish a connection with the central processor
  • the vehicle can establish a connection with its vehicle server
  • the vehicle server can be connected to the digital car key server
  • the mobile terminal can establish a connection with the central processor through BLE/NFC/
  • the digital car key of the vehicle can be saved in the TEE environment, and the digital car key can be backed up in the digital car key server (for example, the digital car keys 21-24 are backed up in the digital car key server).
  • the digital car key for the vehicle carried by the at least one mobile terminal may already have a backup in the vehicle server of the vehicle.
  • the at least one mobile terminal wishes to control the vehicle through the digital car key again, the The backup of the digital car key in the vehicle server can be used to securely authenticate the digital car key.
  • the status information of the mobile terminal when sending a connection request to the vehicle is creatively applied to the security authentication of the digital car key mounted on it.
  • the operation is performed to determine whether to choose to trust the digital car key in combination with more available state information in addition to the digital car key certificate information.
  • step 202 the authentication information of the at least one digital car key on the at least one mobile terminal can be obtained.
  • the obtained authentication information of at least one digital car key may include the status information of the above-mentioned mobile terminal when sending a connection request to the vehicle and the certificate information of the digital car key mounted on the mobile terminal, etc., to be used for at least one digital car key. Secure authentication of digital car keys from a mobile terminal.
  • the authentication information of the at least one digital car key may include location information of the corresponding mobile terminal when sending a connection request to the vehicle, movement information of the corresponding mobile terminal when sending a connection request to the vehicle, movement information of the corresponding mobile terminal when sending a connection request to the vehicle, The user's physiological signs information when sending a connection request, etc.
  • This information can be used to judge various suspicious (or abnormal) states that may occur in actual application scenarios, thereby providing more information for the choice of whether to trust digital car keys.
  • Reference Information A more detailed description will be given below with reference to step 203 and Figures 3A-9.
  • the various authentication information mentioned above are only used as examples in the embodiments of the present disclosure and are not limiting. Other information that can be used to determine suspicious (or abnormal) status can also be applied to the method of the present disclosure.
  • the security authentication condition may include a first authentication condition and a second authentication condition.
  • the first authentication condition and the second authentication condition may be used to perform double security authentication on the at least one digital car key.
  • performing the operation corresponding to the at least one digital car key may include: If the authentication information satisfies the first authentication condition and the second authentication condition, perform an operation corresponding to the at least one digital car key.
  • security authentication for the digital car key in the mobile terminal may include dual security authentication operations based on the first authentication condition and the second authentication condition respectively.
  • the security authentication operation based on the first authentication condition can be used to authenticate the certificate information of the digital car key
  • the security authentication operation based on the second authentication condition can be used for various suspicious (or abnormal) states in actual application scenarios.
  • security certification Among them, it should be understood that unless otherwise specified, based on the first certification condition and the second certification During the security authentication process of at least one digital car key in at least one mobile terminal, there is no restriction on the authentication sequence of the two authentication conditions, but can be specifically set according to actual needs.
  • the second authentication condition is used for security authentication for various suspicious (or abnormal) states in actual application scenarios
  • the scenarios corresponding to various suspicious (or abnormal) states can be adjusted according to the user's expectations or needs.
  • the second authentication condition can be set by the user (for example, the vehicle owner) through his or her mobile terminal.
  • the user can set specific second authentication conditions on the vehicle server according to needs, so that the vehicle can synchronize the second authentication conditions set by the user from its vehicle server and thereby perform security authentication.
  • the user can also directly set the second authentication condition on the vehicle, and this disclosure does not limit this.
  • the vehicle safety authentication method 200 may further include: synchronizing the second authentication condition from the vehicle server of the vehicle, and the second authentication condition may be configured by a mobile terminal. Set up on the vehicle server.
  • the second authentication condition may be differentially set according to the number of mobile terminals connected to the vehicle. This is because when there is only a single mobile terminal connected to the vehicle, only the security of the digital car key of the mobile terminal needs to be considered. Therefore, the second authentication condition can be set solely for the individual status information of the mobile terminal. However, when there are multiple When a mobile terminal is connected to a vehicle, in addition to the individual status information of each mobile terminal, the relative status information between these mobile terminals also needs to be added to the security authentication of the digital car key as a security consideration.
  • the second authentication condition may include at least one of the following:
  • the authentication information of at least two digital car keys passes the first authentication condition
  • the mobile terminal corresponding to the at least one digital car key passes the identity information verification
  • the mobile terminal corresponding to the at least one digital car key performs a specific operation.
  • the second authentication conditions can be set in case 1 (conditions 1 and 2) and case 2 (conditions 3, 4 and 5) according to the number of mobile terminals connected to the vehicle, which will be set with reference to Figure 3A-Fig. 9. These possible settings of the second authentication condition are described in detail respectively.
  • Figures 3A-3C correspond to security authentication in the case where there are at least two mobile terminals connected to the vehicle.
  • 3A is a schematic flowchart illustrating security authentication in the case where at least two mobile terminals are connected to the vehicle according to an embodiment of the present disclosure.
  • 3B is a schematic diagram illustrating possible settings of the second authentication condition in the case where there are at least two mobile terminals connected to the vehicle according to an embodiment of the present disclosure.
  • 3C is a schematic diagram illustrating the relationship between two mobile terminals and a vehicle according to an embodiment of the present disclosure.
  • mobile terminals 1 and 2 may respectively correspond to the vehicle owner's mobile device and friend's device of the vehicle. Therefore, optionally, the vehicle owner may complete pairing with the vehicle through mobile terminal 1 to obtain the vehicle's corresponding mobile device.
  • Digital car key 1, and the vehicle owner can also assign a digital car key 2 to the mobile terminal 2 through the mobile terminal 1.
  • the digital car keys 1 and 2 assigned in this step can be backed up on the vehicle server.
  • the mobile terminal 1 can set the second authentication condition through the vehicle server, so that the vehicle can synchronously obtain the second authentication condition from its vehicle server. Therefore, by synchronizing the second authentication condition, the vehicle can determine the security authentication condition currently to be applied to the digital car key, for example, the above-mentioned conditions 1 and 2.
  • the setting of the security authentication conditions of the vehicle is completed, and the vehicle can thereby apply the set security authentication conditions to the mobile terminal and its digital car key that subsequently request communication connection.
  • the second authentication condition may correspond to at least two digital car keys in the at least one digital car key passing security authentication based on the first authentication condition.
  • the time for the at least two digital car keys to pass the security authentication based on the first authentication condition can also be limited, for example, The second authentication condition may also require that the time at which the at least two digital car keys pass security authentication based on the first authentication condition is within a predetermined time window. That is to say, in one embodiment of the present disclosure, in response to the authentication information of at least two digital car keys passing the first authentication condition within a predetermined time period, it may be determined that the authentication information of the at least one digital car key satisfies the second authentication condition.
  • the vehicle may include a variety of communication nodes, wherein each communication node has different ways of obtaining information from the mobile terminal and the information obtained, and the at least one mobile terminal may communicate with the vehicle through different communication nodes.
  • a communication connection is established. Therefore, in this case, the setting of the second authentication condition may be further differentiated based on the type of communication node that obtains the digital car key.
  • the second authentication condition can be set according to the same or different types of communication nodes for obtaining the digital car key, including for at least two nodes (for example, both NFC nodes or BLE nodes, or NFC nodes).
  • the relative status information between the mobile terminals (for example, the above condition 2) can also be considered.
  • the relative positions between mobile terminals may be determined through the plurality of communication nodes, wherein the relative positions between the mobile terminals corresponding to the at least two digital car keys may include the at least One or more of the distance and angle between the mobile terminals corresponding to the two digital car keys. Therefore, since different communication nodes obtain the information of the mobile terminal corresponding to each digital car key in different ways, the second authentication conditions can be further differentiated and set based on the above settings, as shown in FIG. 3B.
  • the first predetermined condition may include one or more of the following: the distance between the mobile terminals corresponding to the at least two digital car keys satisfies the predetermined distance condition; or the at least two The angle between the mobile terminals corresponding to the digital car key meets the predetermined angle condition.
  • the relative positions between them can be constrained.
  • the distance between the two mobile terminals needs to meet a certain threshold, or the distance between the two mobile terminals needs to meet a certain threshold.
  • the angle needs to meet a certain threshold.
  • BLE digital car keys 1 and 2 the possible relative positional relationship between two mobile terminals (shown as BLE digital car keys 1 and 2 in the figure) is shown, where BLE digital car keys 2 (a)-(d) represent BLE digital car keys.
  • the distance between two mobile terminals is required to meet a certain threshold
  • the case where the distance is smaller than the threshold may not pass the security authentication. This is taken into account
  • two mobile terminals with too small distance or abnormal angle are connected to the vehicle at the same time, there may be security risks in actual application scenarios. Therefore, by judging the distance and angle between digital keys, possible security risks can be determined and the digital key can be improved. Car key security.
  • the vehicle After the vehicle authenticates the at least one digital car key based on the synchronized second authentication condition, if it is determined that the authentication information of the at least one digital car key satisfies the second authentication condition, the corresponding control operation can be performed and the at least one digital car key can be authenticated.
  • a mobile terminal returns security authentication events and control results.
  • the vehicle may also choose to perform other further authentication operations or warning operations, such as sending a notification message to the alarm server, which is not limited by this disclosure.
  • the system of the present disclosure may include a vehicle and at least one mobile terminal, the vehicle may correspond to at least one digital car key, and the at least one digital car key may be located at the at least one mobile terminal, wherein, the vehicle may be configured to perform the method corresponding to claim 1, and the system may be configured such that: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the information on the at least one mobile terminal.
  • the authentication information of the at least one digital car key in response to the authentication information of at least two digital car keys passing the first authentication condition within a predetermined time period, and the communication between the mobile terminals corresponding to the at least two digital car keys The relative positions all meet the first predetermined condition, and it is determined that the authentication information of the at least one digital car key satisfies the second authentication condition; in response to determining that the authentication information of the at least one digital car key satisfies the second authentication condition, executing the at least one Operations corresponding to the digital car key.
  • Figures 4A-5C correspond to security authentication in the presence of at least one mobile terminal connected to the vehicle.
  • Figures 4A-4E correspond to the security authentication when the second authentication condition is the above-mentioned condition 3
  • Figures 5A-5C correspond to the security authentication when the second authentication condition is the above-mentioned condition 4. Certification.
  • 4A is a schematic flowchart illustrating security authentication in the case where the second authentication condition is that the trajectory of the mobile terminal corresponding to at least one digital car key satisfies the second predetermined condition according to an embodiment of the present disclosure.
  • 4B is a schematic diagram illustrating possible settings of the second authentication condition when the trajectory of the mobile terminal corresponding to at least one digital car key satisfies the second predetermined condition according to an embodiment of the present disclosure.
  • 4C is a schematic diagram showing a first example trajectory of a mobile terminal according to an embodiment of the present disclosure.
  • 4D is a schematic diagram showing a second example trajectory of the mobile terminal according to an embodiment of the present disclosure.
  • 4E is a schematic diagram showing a third example trajectory of the mobile terminal according to an embodiment of the present disclosure.
  • security authentication can be performed on the individual status information of the mobile terminal.
  • the individual status information may be the trajectory of the mobile terminal relative to each communication node, which corresponds to the case where the second authentication condition is condition 3.
  • the mobile terminal 1 after the mobile terminal 1 obtains the digital car key of the vehicle by pairing with the vehicle, the mobile terminal 1 can set the second authentication condition through the vehicle server, so that the vehicle can synchronously obtain the second authentication condition from its vehicle server. Therefore, by synchronizing the second authentication condition, the vehicle can determine the current security authentication condition to be applied to the digital car key, for example, the above-mentioned condition 3.
  • the setting of the security authentication conditions of the vehicle is completed, and the vehicle can thereby apply the set security authentication conditions to the mobile terminal and its digital car key that subsequently request communication connection.
  • the vehicle can trigger the location awareness function and then obtain the location information of the mobile terminal 1 (for example, included in the authentication information of the digital car key).
  • the vehicle After the vehicle authenticates the trajectory of the mobile terminal corresponding to the at least one digital car key based on the synchronized second authentication condition, if it is determined that the trajectory of the mobile terminal corresponding to the at least one digital car key satisfies the second authentication condition, it may be executed Corresponding control operations are performed, and security authentication events and control results are returned to the at least one mobile terminal.
  • the trajectory of the mobile terminal corresponding to the at least one digital car key satisfying the second predetermined condition may include: for the at least one digital car key pair For each of the corresponding mobile terminals, the position of the mobile terminal relative to one of the plurality of communication nodes satisfies a predetermined location condition; or for each of the mobile terminals corresponding to the at least one digital car key , the trajectory of the mobile terminal relative to at least two communication nodes among the plurality of communication nodes satisfies the predetermined trajectory condition.
  • the mobile terminal can be The trajectories are divided into single node trajectories and multiple node trajectories (corresponding to passing through a single communication node or multiple communication nodes when sending a connection request respectively), as shown in Figure 4B.
  • the second authentication conditions that the trajectory of the mobile terminal needs to meet can be set differently.
  • the trajectory of the mobile terminal needs to meet predetermined location conditions, that is, for its location relative to a specific node. constraints, and for the case of multiple node trajectories, the trajectory of the mobile terminal needs to satisfy predetermined trajectory conditions, and the predetermined trajectory conditions can be preset by the vehicle user.
  • the position of the mobile terminal relative to one of the plurality of communication nodes may include the position of the mobile terminal relative to the plurality of communication nodes.
  • the location information of the mobile terminal is obtained by a single specific node, and the single specific node can be any one of a variety of communication nodes possessed by the vehicle, therefore, the location information of the mobile terminal can be obtained in a manner
  • the settings differ according to the type of communication node.
  • the position of the mobile terminal relative to one of the plurality of communication nodes may be determined in the following manner: when the communication node is an NFC node, through the NFC The node obtains the position; when the communication node is a BLE node, determines the signal strength of each BLE node in the plurality of communication nodes and the mobile terminal, and obtains the position of the mobile terminal through the signal strength ; Or when the communication node is a BLE node, obtain the location of the mobile terminal through the UWB node to determine the location of the mobile terminal.
  • the location information of the digital car key of the specific NFC node can be obtained; if the specific node If the node is a BLE node, you can determine the signal strength of each Bluetooth node and the digital car key of the mobile terminal (for example, through RSSI (Received Signal Strength Indication) and/or AOA (angle of arrival) calculation), and obtain the digital car key's location information.
  • RSSI Receiveived Signal Strength Indication
  • AOA angle of arrival
  • the location of the digital car key can optionally be sensed through the UWB node (for example, through TOF (time of flight) calculation), thereby determining the location of the digital car key, where , the determined location information may include the trajectory of the digital car key (including distance and angle information), and/or the coordinates of the digital car key.
  • TOF time of flight
  • the predetermined trajectory condition may be that the mobile terminal passes through the coverage area of the at least two communication nodes according to the predetermined trajectory, and the predetermined trajectory may include passing through the At least one of a predetermined order of coverage areas of at least two communication nodes, a predetermined angle into the coverage areas of the at least two communication nodes, and a distance from the at least two communication nodes.
  • trajectory conditions may be described below with reference to FIGS. 4C to 4E based on the types of communication nodes it includes. Of course, these trajectory conditions shown are only examples and not limitations in this disclosure.
  • Figure 4C corresponds to the case where multiple node trajectories only involve multiple NFC nodes.
  • the NFC digital car key 1 needs to move within the coverage of multiple NFC nodes according to a predetermined trajectory.
  • the NFC digital car key 1 can move along trajectory 1, that is, from node NFC-1 to node NFC-3, or move along trajectory 2, that is, start from node NFC-1 and pass through node NFC-2 and node NFC-4 in sequence. , and finally reaches node NFC-3.
  • the mobile terminal can contact corresponding NFC nodes in sequence in a predetermined order.
  • Figure 4D corresponds to the case where multiple node trajectories only involve multiple BLE nodes.
  • the BLE digital car key 2 needs to move within the coverage of multiple BLE nodes according to a predetermined trajectory.
  • the BLE digital car key 2 can move along trajectory 1, that is, from node BLE-1 to node BLE-3, or move along trajectory 2, that is, start from node BLE-1 and pass through node BLE-2 and node BLE-4 in sequence. , and finally reaches node BLE-3.
  • the mobile terminal can pass through the coverage of the corresponding BLE nodes in a predetermined order. scope.
  • the mobile terminal can also enter the coverage of the corresponding BLE node BLE-4 according to a predetermined angle.
  • the mobile terminal can also enter the coverage of the corresponding BLE nodes BLE-4 and BLE-3 according to a predetermined distance.
  • Figure 4E shows the situation where multiple node trajectories involve multiple BLE nodes and NFC nodes, in which four BLE nodes are set on the handles/door pillars of the four doors of the vehicle, and the NFC node is set on the vehicle. tail.
  • the BLE digital car key 3 can pass through the coverage area of the corresponding BLE node in a predetermined order according to the predetermined trajectories 1 and 2 as shown in FIG. 4D .
  • predetermined trajectory conditions for combining NFC nodes and BLE nodes can also be set.
  • the mobile terminal After contacting the mobile terminal with the NFC-1 node, it enters the BLE node BLE- at a predetermined angle and/or distance. 4 and BLE-3 coverage, as shown in Track 3, the mobile terminal can have a BLE digital car key 3 and an NFC digital car key 1.
  • the trajectory of the digital car key can be used to distinguish whether the user of the digital car key is a legal authorized user. Therefore, possible security risks can be judged and the security of the digital car key can be improved. .
  • the system of the present disclosure may include a vehicle and at least one mobile terminal, the vehicle may correspond to at least one digital car key, and the at least one digital car key may be located at the at least one mobile terminal, wherein, the vehicle may be configured to perform the above method, and the system may be configured such that: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the at least one connection request on the at least one mobile terminal.
  • Authentication information of a digital car key the vehicle determines the trajectory of the mobile terminal corresponding to the at least one digital car key based on the authentication information of the at least one digital car key; in response to the mobile terminal corresponding to the at least one digital car key The trajectory satisfies the second predetermined condition, determining that the authentication information of the at least one digital car key satisfies the second authentication condition; in response to the authentication information of the at least one digital car key satisfying the first authentication condition and the second authentication Condition, perform the operation corresponding to the at least one digital car key.
  • FIG. 5A is a schematic flowchart illustrating security authentication in the case where the second authentication condition is identity information verification according to an embodiment of the present disclosure.
  • Figure 5B is a diagram illustrating a method according to the present disclosure
  • the second authentication condition of the embodiment is a schematic diagram of possible settings of the second authentication condition in the case of identity information verification.
  • FIG. 5C is a schematic diagram illustrating the relationship between the mobile terminal and the vehicle according to an embodiment of the present disclosure.
  • security authentication can be performed on the individual status information of the mobile terminal.
  • the individual status information may be the identity information of the user of the mobile terminal, which corresponds to the case where the second authentication condition is condition 4.
  • the mobile terminal 2 can set the second authentication condition through the vehicle server so that the vehicle can synchronously obtain the second authentication condition from its vehicle server. Therefore, by synchronizing the second authentication condition, the vehicle can determine the current security authentication condition to be applied to the digital car key, for example, the above-mentioned condition 4.
  • the setting of the security authentication conditions of the vehicle is completed, and the vehicle can thereby apply the set security authentication conditions to the mobile terminal and its digital car key that subsequently request communication connection.
  • the vehicle may trigger the security authentication function in response to the mobile terminal 2 passing the first authentication condition, and then trigger device verification at the mobile terminal 2 (for example, triggering mobile The terminal performs the unlocking operation).
  • the vehicle determines that the device verification passes based on the mobile terminal device verification result returned by the mobile terminal 2, it can perform corresponding control operations and return the security authentication event and control result to the at least one mobile terminal.
  • the identity information verification may include at least one of biometric verification and non-biometric verification for the mobile terminal; wherein the biometric verification may be related to the face of the mobile terminal.
  • biometric verification may be related to the face of the mobile terminal.
  • One or more of the characteristics, fingerprint characteristics, breathing characteristics or heartbeat characteristics are related; the non-biological characteristic verification can be related to the physical operation verification of the mobile terminal, and the physical operation verification can include authentication password information verification. test.
  • the identity information verification at the mobile terminal may include biometric verification and non-biometric verification, which respectively correspond to biometric authentication and physical operation authentication of the user of the mobile terminal.
  • the second authentication condition can be subdivided for multiple identity authentications.
  • biometric authentication can be used to identify Whether the current user of the mobile terminal is the person himself, such as based on facial features and fingerprint features.
  • biometric authentication can also be used to identify the mental state of the current user of the mobile terminal, such as obtaining its respiratory characteristics or heartbeat characteristics through respiratory monitoring or heartbeat detection.
  • security authentication may also be performed based on a physical authentication operation on the mobile terminal, such as through password information or sliding information (eg, sliding gesture information). As shown in FIG. 5C , the mobile terminal 1 can perform the above-mentioned security authentication within the coverage of any one of these BLE nodes to control the vehicle 20 using its digital car key 1 through the BLE node.
  • the system of the present disclosure may include a vehicle and at least one mobile terminal, the vehicle may correspond to at least one digital car key, and the at least one digital car key may be located at the at least one mobile terminal, wherein, the vehicle may be configured to perform the above method, and the system may be configured such that: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the at least one connection request on the at least one mobile terminal.
  • Authentication information of a digital car key the vehicle triggers the at least one mobile terminal to perform identity information verification; the at least one mobile terminal performs identity information verification and returns the identity information verification result to the vehicle; in response to The identity information verification result is passed, and it is determined that the authentication information of the at least one digital car key on the at least one mobile terminal satisfies the second authentication condition; in response to the authentication information of the at least one digital car key satisfying the second authentication condition.
  • An authentication condition and the second authentication condition perform operations corresponding to the at least one digital car key.
  • security authentication can be performed on the individual status information of the mobile terminal.
  • the individual status information may be a specific operation performed by the mobile terminal, which corresponds to the case where the second authentication condition is condition 5.
  • the specific operation may include an operable component of the mobile terminal performing a predetermined action.
  • the operable component may include a foldable screen, a flexible screen or a rolling screen.
  • operable parts such as an operable screen (for example, a folding screen, a flexible screen or a scroll screen, etc.)
  • security authentication can be implemented based on specific operations on the operable parts of the mobile terminal, including controlling the operable parts to perform Scheduled actions.
  • security authentication can be achieved based on the specific folding method of the folding screen.
  • a mobile terminal with a two-fold screen can complete the security authentication of a digital car key through the operation of "open folding screen - close folding screen”.
  • a mobile terminal with a tri-fold screen can complete the security authentication of the digital car key through the operation of "open the left folding screen - close the right folding screen”.
  • the security authentication of the digital car key can be completed by folding the flexible screen to a certain angle (for example, "fold the upper left corner of the flexible screen 90 degrees").
  • digital car key authentication can be performed by extending the screen to a certain length, such as “extend the scroll screen by 10cm to complete digital car key authentication", or “extend the scroll screen to the entire screen length” 50% of completed digital car key certification”.
  • the system of the present disclosure may include a vehicle and at least one mobile terminal, the vehicle may correspond to at least one digital car key, and the at least one digital car key may be located at the at least one mobile terminal, wherein the vehicle
  • the system may be configured to perform the above method, and the system may be configured such that: the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the at least one digital car key on the at least one mobile terminal.
  • Authentication information in response to the at least one mobile terminal performing a predetermined operation, determining that the authentication information of the at least one digital car key on the at least one mobile terminal satisfies the second authentication condition; in response to the at least one digital car key The authentication information of the key satisfies the first authentication condition and the second authentication condition, and the operation corresponding to the at least one digital car key is performed.
  • FIG. 6A is a diagram illustrating that the second authentication condition according to an embodiment of the present disclosure includes a combination of two A schematic flow chart of security authentication under various conditions.
  • FIG. 6B is a schematic diagram illustrating an example situation in which the second authentication condition includes one or more possible conditions according to an embodiment of the present disclosure.
  • the above conditions 1 to 5 can be used for security authentication alone or in combination.
  • any one or more of the above conditions 1 to 5 can be combined in an "AND” or “OR” manner for security authentication.
  • Figure 6B takes conditions 1 and 3 as examples for these two situations.
  • FIG. 6A illustrates the use of an "OR" combination of two conditions to achieve security authentication.
  • the vehicle owner can complete pairing with the vehicle through the mobile terminal 1 to obtain the digital car key 1 corresponding to the vehicle, and the vehicle owner can also assign the digital car key 1 to the mobile terminal 2 through the mobile terminal 1.
  • the digital car keys 1 and 2 assigned in this step can be backed up on the vehicle server.
  • the mobile terminal 1 can set a second authentication condition through the vehicle server, so that the vehicle can synchronously obtain the second authentication condition from its vehicle server, where the second authentication condition includes any two of the above conditions 1 to 5.
  • a combination for example, shown in Figure 6A as an "OR” combination of condition 1 and any other condition (represented by "Condition 2")). Therefore, by synchronizing the second authentication condition, the vehicle can determine the current security authentication condition to be applied to the digital car key.
  • the setting of the security authentication conditions of the vehicle is completed, and the vehicle can thereby apply the set security authentication conditions to the mobile terminal and its digital car key that subsequently request communication connection.
  • the vehicle can perform security authentication on the authentication information of mobile terminals 1 and 2 based on the "OR" combination of condition 1 and condition 2.
  • condition 1 and condition 2 when any one of condition 1 and condition 2 is satisfied , the vehicle can all consider that the authentication information of the at least one digital car key meets the second authentication condition, then perform the corresponding control operation, and return the security authentication event and control result to the at least one mobile terminal.
  • the set second authentication condition includes an "AND" combination of two conditions, then at this stage, the at least one digital vehicle needs to be satisfied only when both conditions are met. The authentication information of the key meets the second authentication condition, and then subsequent operations are performed.
  • the system of the present disclosure may include a vehicle and at least one a mobile terminal, the vehicle may correspond to at least one digital car key, and the at least one digital car key may be located at the at least one mobile terminal, wherein the vehicle may be configured to perform the above method, and the system may be It is configured as follows: the vehicle synchronizes the second authentication condition from a vehicle server of the vehicle; the vehicle receives a connection request from the at least one mobile terminal; and the vehicle obtains the at least one authentication condition on the at least one mobile terminal.
  • Authentication information of a digital car key in the case where the second authentication condition includes two second authentication conditions among the above-mentioned second authentication conditions and the relationship between the two second authentication conditions is an AND relationship, in response to the The authentication information of the at least one digital car key satisfies the two second authentication conditions at the same time, and it is determined that the authentication information of the at least one digital car key satisfies the second authentication condition; where the second authentication condition includes the above second authentication condition.
  • two second authentication conditions among the authentication conditions and the relationship between the two second authentication conditions is an OR relationship
  • in response to the authentication information of the at least one digital car key satisfying one of the two second authentication conditions Any one of, determining that the authentication information of the at least one digital car key satisfies the second authentication condition; in response to the authentication information of the at least one digital car key satisfying the first authentication condition and the second authentication condition, execute Operations corresponding to the at least one digital car key.
  • the setting of the second authentication condition is mainly set by the vehicle user on the vehicle or the vehicle server for the vehicle to obtain.
  • the vehicle determines the second authentication condition.
  • the condition is not limited to this, it can also be automatically determined by the vehicle based on the authentication information of the digital car key, for example, through a pre-trained security authentication model.
  • performing the operation corresponding to the at least one digital car key may include: authentication based on the at least one digital car key information, determining a second authentication condition for the at least one digital car key; wherein the determining the second authentication condition for the at least one digital car key based on the authentication information of the at least one digital car key is by A pre-trained security authentication model is executed, wherein the security authentication model selects a second authentication condition for the at least one digital car key based on authentication information of the at least one digital car key.
  • FIG. 7 is a diagram illustrating security using a security authentication model according to an embodiment of the present disclosure. Schematic flow chart for certification.
  • the vehicle owner can set multiple security authentication models at the vehicle or vehicle server, each security authentication model can correspond to one of the aforementioned second authentication conditions, and the vehicle or The vehicle server can also extract corresponding parameters of the security authentication model, including all parameters required for judging each second authentication condition, such as the relative position of the mobile terminal, motion information, physiological characteristics of the mobile terminal user, etc.
  • the vehicle can obtain the values corresponding to these parameters from the authentication information of the digital car key, wherein, optionally, the vehicle can send the obtained values corresponding to these parameters to the vehicle server.
  • the vehicle or vehicle server can match the security authentication model based on the values corresponding to these parameters to obtain the security authentication model that best matches the user from these security authentication models, and apply the security authentication model to the security of the mobile terminal.
  • the vehicle or vehicle server can set the security authentication model that best matches the user as the activated security authentication model.
  • the system of the present disclosure may include a vehicle and at least one mobile terminal, the vehicle may correspond to at least one digital car key, and the at least one digital car key may be located at the at least one mobile terminal, wherein,
  • the vehicle may be configured to perform the above method, and the system may be configured such that the vehicle is provided with a plurality of security authentication models, wherein each security authentication model corresponds to one of the above second authentication conditions.
  • the vehicle extracts corresponding parameters of the multiple security authentication models; the vehicle receives a connection request from the at least one mobile terminal; the vehicle obtains the at least one digital vehicle on the at least one mobile terminal Authentication information of the key; the vehicle obtains the values of corresponding parameters of the multiple security authentication models from the authentication information of the at least one digital car key; the vehicle obtains all values of corresponding parameters of the multiple security authentication models based on the authentication information of the at least one digital car key; Determine the matching degree between the at least one digital car key and the plurality of security authentication models, and determine the security authentication model with the highest matching degree between the at least one digital car key and the at least one digital car key from the plurality of security authentication models; The vehicle sets the security authentication model as a security authentication model for the at least one digital vehicle key.
  • the authentication information of at least one digital car key can be used to judge various suspicious (or abnormal) states that may occur in actual application scenarios, thereby providing more reference information for choosing whether to trust the digital car key.
  • the at least one mobile key may be determined based on the authentication information of the at least one digital car key. Whether the mobile terminal is in an abnormal state, and based on this judgment, it is determined whether to apply dual security authentication to the digital car key.
  • performing the operation corresponding to the at least one digital car key may further include: When the authentication information satisfies the first authentication condition, determining the current status of the at least one digital car key based on the authentication information of the at least one digital car key; and determining that the current status of the at least one digital car key is a predetermined In the case of an abnormal state, it is determined whether the authentication information of the at least one digital car key satisfies the second authentication condition.
  • security authentication based on the first authentication condition can be first performed on the digital car key, and the first authentication condition is used as the basis for the security authentication. After the first authentication When the conditions are met, it will be determined whether to perform further security authentication. The judgment may be based on abnormal state judgment, that is, when it is determined that the current state of the digital car key of the mobile terminal belongs to a predetermined abnormal state, the digital car key is then selected to perform security authentication based on the second authentication condition.
  • the predetermined abnormal state may include at least one of the following: the distance between the mobile terminals corresponding to at least two digital car keys is less than a predetermined threshold; the distance between the mobile terminals corresponding to the at least one digital car key The trajectory satisfies a predetermined abnormal trajectory condition; the speed of the mobile terminal corresponding to the at least one digital car key satisfies the predetermined abnormal speed condition; or the physiological characteristics of the user of the mobile terminal corresponding to the at least one digital car key satisfy the predetermined abnormal physiological condition.
  • FIGS 8A-8D illustrate examples of possible abnormal states.
  • 8A is a schematic diagram showing a first abnormal state according to an embodiment of the present disclosure
  • FIG. 8B is a schematic diagram showing a second abnormal state according to an embodiment of the present disclosure
  • FIG. 8C is a schematic diagram showing an implementation according to the present disclosure
  • 8D is a schematic diagram showing a fourth abnormal state according to an embodiment of the present disclosure.
  • 8E is a flowchart illustrating operations in response to the current state of the digital car key being a predetermined abnormal state according to an embodiment of the present disclosure.
  • FIG. 8A shows an abnormal situation in which two digital car keys (shown as BLE digital car keys 1 and 2) are connected to the vehicle and the distance between the two digital car keys is less than a predetermined threshold.
  • two digital car keys shown as BLE digital car keys 1 and 2
  • the distance between the two digital car keys is less than a predetermined threshold.
  • the situation where the terminal is connected to the vehicle at the same time is relatively rare in actual application scenarios, and there may be security risks. It needs to be considered as an abnormal state for further security certification.
  • Figure 8B shows a situation where a single digital car key (shown as BLE digital car key 1) is connected to a vehicle and the movement trajectory of the digital car key is abnormal.
  • BLE digital car key 1 shown as BLE digital car key 1
  • the digital car key repeatedly moves around the vehicle, which is rare in actual application scenarios and may have security risks (for example, the user of the mobile terminal is being chased), which needs to be treated as an abnormal state. Consideration for further security certification.
  • Figure 8C shows a situation where a single digital car key (shown as BLE digital car key 1) is connected to the vehicle and the motion state of the digital car key is abnormal.
  • the digital car key first quickly rushes towards the vehicle from a distance, and then immediately escapes from the vehicle at a faster speed to a further distance. This is relatively rare in actual application scenarios and may pose safety risks.
  • the user of the mobile terminal discovers an abnormality in the vehicle and escapes), which needs to be considered as an abnormal state for further safety authentication.
  • FIG. 8D shows a situation in which a single digital car key (shown as BLE digital car key 1) is connected to a vehicle and the physiological characteristics of the user of the digital car key are abnormal.
  • the user of the digital car key approaches the vehicle with a very high heart rate (eg, a heart rate of 140), or is accompanied by another mobile terminal device and approaches the vehicle with a very high heart rate (eg, a heart rate of 140).
  • heart rate is 130
  • these two situations are relatively rare in actual application scenarios, and may have security risks (for example, the user of the mobile terminal is hijacked), which need to be considered as an abnormal state for further security authentication.
  • FIG. 8E in response to determining that the current state of the digital car key of the mobile terminal belongs to a predetermined abnormal state, dual security authentication may be initiated to perform security authentication based on the second authentication condition, and after determining that the digital car key passes the dual security authentication In this case, the digital car key can control the vehicle.
  • the system of the present disclosure may include a vehicle and at least one mobile terminal.
  • the vehicle may correspond to at least one digital car key, and the at least one A digital car key may be located in the at least one mobile terminal, wherein the vehicle may be configured to perform the above method, and the system may be configured such that: the vehicle obtains a preset predetermined abnormal state; the vehicle receives the The connection request of the at least one mobile terminal; the vehicle obtains the authentication information of the at least one digital car key on the at least one mobile terminal; and after determining that the authentication information of the at least one digital car key meets the first authentication condition In this case, the vehicle determines the current state of the at least one digital car key based on the authentication information of the at least one digital car key; when it is determined that the current state of the at least one digital car key is a predetermined abnormal state, The vehicle determines whether the authentication information of the at least one digital car key satisfies the second authentication condition; in response to the authentication information of the at least one
  • FIG. 9 is a flowchart illustrating execution of security authentication based on predetermined abnormal state judgment according to an embodiment of the present disclosure.
  • FIG. 9 shows the overall process of combining the above-mentioned abnormal state judgment and the security authentication execution process.
  • the overall process may include the following operations.
  • the vehicle/vehicle server receives the predetermined abnormal status of the digital car key set by the user.
  • the predetermined abnormal status may include one or more of the multiple abnormal statuses mentioned above, and the relationship between these abnormal statuses may be "and" or “or” relationship;
  • the vehicle receives the second authentication condition set by the user, or the vehicle presets the second authentication condition.
  • the second authentication condition may include one or more of the above conditions 1 to 5, and the words between these conditions may be " The relationship between "and” or "or”;
  • the vehicle receives connection requests from one or more mobile terminals
  • the vehicle determines whether the current state of the mobile terminal's digital car key belongs to the predetermined abnormal state of the digital car key. If it belongs to the predetermined abnormal state, dual security authentication is initiated;
  • Figure 10 shows a schematic diagram of an electronic device 2000 according to an embodiment of the present disclosure.
  • the electronic device 2000 may include one or more processors 2010, and one or more memories 2020.
  • the memory 2020 stores computer readable code, and when the computer readable code is run by the one or more processors 2010, the vehicle safety authentication method as described above can be executed.
  • the processor in the embodiment of the present disclosure may be an integrated circuit chip having signal processing capabilities.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components.
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA off-the-shelf programmable gate array
  • Each method, step and logical block diagram disclosed in the embodiment of this application can be implemented or executed.
  • the general-purpose processor can be a microprocessor or the processor can be any conventional processor, etc., which can be of X86 architecture or ARM architecture.
  • the various example embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, firmware, logic, or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor, or other computing device. While aspects of embodiments of the present disclosure are illustrated or described as block diagrams, flowcharts, or using some other graphical representation, it will be understood that the blocks, devices, systems, techniques, or methods described herein may be used as non-limiting Examples are implemented in hardware, software, firmware, special purpose circuitry or logic, general purpose hardware or controllers, or other computing devices, or some combination thereof.
  • computing device 3000 may include a bus 3010, one or more CPUs 3020, read only memory (ROM) 3030, random access memory (RAM) 3040, communication port 3050 connected to a network, input/output components 3060, hard disk 3070, etc.
  • the storage device in the computing device 3000 such as the ROM 3030 or the hard disk 3070, can store various data or files used for processing and/or communication of the vehicle safety authentication method provided by the present disclosure, as well as program instructions executed by the CPU.
  • Computing device 3000 may also include user interface 3080.
  • the architecture shown in FIG. 11 is only exemplary, and when implementing different devices, one or more components in the computing device shown in FIG. 11 may be omitted according to actual needs.
  • Figure 12 shows a schematic diagram 4000 of a storage medium in accordance with the present disclosure.
  • Computer-readable instructions 4010 are stored on the computer storage medium 4020.
  • the vehicle safety authentication method according to the embodiments of the present disclosure described with reference to the above figures may be executed.
  • Computer-readable storage media in embodiments of the present disclosure may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory.
  • Non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), or flash memory.
  • Volatile memory may be random access memory (RAM), which acts as an external cache.
  • RAM Direct Memory Bus Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • DDRSDRAM double data rate synchronous dynamic Random Access Memory
  • ESDRAM Enhanced Synchronous Dynamic Random Access Memory
  • SLDRAM Synchronous Linked Dynamic Random Access Memory
  • DR RAM Direct Memory Bus Random Access Memory
  • Embodiments of the present disclosure also provide a computer program product or computer program, which includes computer instructions stored in a computer-readable storage medium.
  • the processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the vehicle safety authentication method according to the embodiment of the present disclosure.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains at least one element for implementing the specified logical function. Executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown one after another may actually execute substantially in parallel, or they may sometimes execute in the reverse order, depending on the functionality involved.
  • each block of the block diagram and/or flowchart illustration, and combinations of blocks in the block diagram and/or flowchart illustration can be implemented by special purpose hardware-based systems that perform the specified functions or operations. , or can be implemented using a combination of specialized hardware and computer instructions.
  • the various example embodiments of the present disclosure may be implemented in hardware or special purpose circuits, software, firmware, logic, or any combination thereof. Some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software that may be executed by a controller, microprocessor, or other computing device. While aspects of embodiments of the present disclosure are illustrated or described as block diagrams, flowcharts, or using some other graphical representation, it will be understood that the blocks, devices, systems, techniques, or methods described herein may be used as non-limiting Examples are implemented in hardware, software, firmware, special purpose circuitry or logic, general purpose hardware or controllers, or other computing devices, or some combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mechanical Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Lock And Its Accessories (AREA)

Abstract

公开了一种车辆安全认证方法、及对应的车辆、移动终端、系统、计算机程序产品、和电子设备。所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于至少一个移动终端,所述方法包括:接收所述至少一个移动终端的连接请求;获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;以及在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作,其中,所述安全认证条件包括第一认证条件和第二认证条件。

Description

车辆安全认证方法 技术领域
本公开涉及车联网领域,更具体地,涉及数字车钥匙技术,例如本公开公开了一种车辆安全认证方法、及对应的车辆、移动终端、系统、计算机程序产品、和电子设备。
背景技术
目前,移动终端设备与相关技术在近几年迅速发展,其中承载了越来越多的与人衣食住行相关的功能,此时移动终端产品不仅能作为通信工具,还可作为银行卡、交通卡、智能家居控制终端等功能使用。移动终端设备作为车钥匙的功能是近几年出现的热门技术之一,该功能也叫数字车钥匙。与传统车钥匙不同,数字车钥匙无需额外的实体车钥匙,仅将车钥匙功能集成在移动终端设备中,基于安全元件(SE)、可信执行环境(TEE)等安全功能,使用近场通信(NFC)、蓝牙(BLE)、超宽带(UWB)等技术连接手机和车,实现车辆的开门、启动等功能。数字车钥匙是智能网联车的重要革新应用之一,已经有部分车辆制造企业、移动终端厂商和原始设备制造商(OEM)着手于开发数字车钥匙解决方案。
虽然数字车钥匙提供了安全认证的功能,但是数字车钥匙也具有一定的安全风险,例如,在移动终端设备丢失后,其他用户仍可以通过移动终端设备解锁车辆,这可能会造成数字车钥匙用户的财产损失。
因此,需要对目前数字车钥匙的安全认证解决方案进行改进,以提升数字车钥匙的安全性。
发明内容
为了解决上述问题,本公开通过在现有的数字车钥匙安全认证方案的基础上设计了对数字车钥匙的进一步安全认证方法,从而提高了数字车钥匙认证的安全性。
第一方面,本公开的实施例提供了一种车辆安全认证方法,所述 车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于至少一个移动终端,所述方法包括:接收所述至少一个移动终端的连接请求;获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;以及在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作。
第二方面,本公开的实施例提供了一种车辆,所述车辆被配置为执行上述的方法。
第三方面,本公开的实施例提供了一种移动终端,所述移动终端包括至少一个数字车钥匙,所述数字车钥匙被配置为与执行上述的方法的车辆进行交互。
第四方面,本公开的实施例提供了一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行上述方法,所述系统还被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;响应于至少两个数字车钥匙的认证信息在预定时间段内通过第一认证条件,并且所述至少两个数字车钥匙对应的移动终端之间的相对位置都满足第一预定条件,确定所述至少一个数字车钥匙的认证信息满足第二认证条件;响应于确定所述至少一个数字车钥匙的认证信息满足第二认证条件,执行所述至少一个数字车钥匙对应的操作。
第五方面,本公开的实施例提供了一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行上述方法,所述系统还被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;所述车辆基于所述至少一个数字车钥匙的认证信息确定所述至少一个数字车钥匙对应的移动终端的轨迹;响应于所述至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件,确定所述至少一个数字车钥匙的认证信息满足所述第二 认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
第六方面,本公开的实施例提供了一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行上述方法,所述系统还被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;所述车辆触发所述至少一个移动终端进行身份信息校验;所述至少一个移动终端进行身份信息校验,并向所述车辆返回身份信息校验结果;响应于所述身份信息校验结果通过,确定所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
第七方面,本公开的实施例提供了一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行上述方法,所述系统还被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;响应于所述至少一个移动终端执行预定操作,确定所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
第八方面,本公开的实施例提供了一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行上述方法,所述系统还被配置为:所述车辆从所述车辆的车辆服务器同步所述第二认证条件;所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一 个数字车钥匙的认证信息;在所述第二认证条件包括上述第二认证条件中的两项第二认证条件且所述两项第二认证条件的关系为与关系的情况下,响应于所述至少一个数字车钥匙的认证信息同时满足所述两项第二认证条件,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;在所述第二认证条件包括上述第二认证条件中的两项第二认证条件且所述两项第二认证条件的关系为或关系的情况下,响应于所述至少一个数字车钥匙的认证信息满足所述两项第二认证条件中的任一项,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
第九方面,本公开的实施例提供了一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行上述方法,所述系统还被配置为:所述车辆被设置有多个安全认证模型,其中每个安全认证模型对应于上述第二认证条件中的一项第二认证条件;所述车辆提取所述多个安全认证模型的对应参数;所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;所述车辆从所述至少一个数字车钥匙的认证信息中获取所述多个安全认证模型的对应参数的数值;所述车辆基于所述多个安全认证模型的对应参数的所述数值来确定所述至少一个数字车钥匙与所述多个安全认证模型的匹配度,并从所述多个安全认证模型中确定与所述至少一个数字车钥匙匹配度最高的安全认证模型;所述车辆将所述安全认证模型设置为用于所述至少一个数字车钥匙的安全认证模型。
第十方面,本公开的实施例提供了一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行上述方法,所述系统还被配置为:所述车辆获取预先设置的预定异常状态;所述车辆接收所述至少一个移动终端的连接请求;所 述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;在确定所述至少一个数字车钥匙的认证信息满足第一认证条件的情况下,所述车辆基于所述至少一个数字车钥匙的认证信息,确定所述至少一个数字车钥匙的当前状态;在确定所述至少一个数字车钥匙的当前状态为预定异常状态的情况下,所述车辆确定所述至少一个数字车钥匙的认证信息是否满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足所述第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
第十一方面,本公开的实施例提供了一种电子设备,包括:一个或多个处理器;以及一个或多个存储器,其中,所述一个或多个存储器中存储有计算机可执行程序,当由所述处理器执行所述计算机可执行程序时,执行如上所述的车辆安全认证方法。
第十二方面,本公开的实施例提供了一种计算机可读存储介质,其上存储有计算机可执行指令,所述指令在被处理器执行时用于实现如上所述的车辆安全认证方法。
第十三方面,本公开的实施例提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行根据本公开的实施例的车辆安全认证方法。
本公开的实施例所提供的方法通过获取移动终端在发起连接请求时的认证信息,并基于数字车钥匙的认证信息来执行对移动终端的数字车钥匙的双重安全认证,以在数字车钥匙的认证信息通过双重安全认证的情况下执行该移动终端对车辆的控制操作,使得移动终端的数字车钥匙能够获得更高的安全性,从而提升数字车钥匙用户的使用体验。
附图说明
为了更清楚地说明本公开的实施例的技术方案,下面将对实施例的描述中所需要使用的附图作简单的介绍。显而易见地,下面描述中 的附图仅仅是本公开的一些示例性实施例,对于本领域普通技术人员来说,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1A是示出根据本公开的实施例的数字车钥匙对应的示例框架的示意图;
图1B是示出根据本公开的实施例的基于TEE的蓝牙数字车钥匙系统架构的示意图;
图1C是示出根据本公开的实施例的数字车钥匙的使用流程图;
图1D是示出根据本公开的实施例的标准认证的流程图;
图1E是示出根据本公开的实施例的快速认证的流程图;
图2A是示出根据本公开的实施例的车辆安全认证方法的流程图;
图2B是示出根据本公开的实施例的车辆和数字车钥匙之间的关系的示意图;
图2C是示出根据本公开的实施例的车辆和数字车钥匙之间的关系的另一示意图;
图3A是示出根据本公开的实施例的存在至少两个移动终端连接至车辆的情况下的安全认证的示意性流程图;
图3B是示出根据本公开的实施例的存在至少两个移动终端连接至车辆的情况下的第二认证条件的可能设置的示意图;
图3C是示出根据本公开的实施例的两个移动终端与车辆之间的关系的示意图;
图4A是示出根据本公开的实施例的第二认证条件为至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件的情况下的安全认证的示意性流程图;
图4B是示出根据本公开的实施例的第二认证条件为至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件的情况下的第二认证条件的可能设置的示意图;
图4C是示出根据本公开的实施例的移动终端的第一示例轨迹的示意图;
图4D是示出根据本公开的实施例的移动终端的第二示例轨迹的 示意图;
图4E是示出根据本公开的实施例的移动终端的第三示例轨迹的示意图;
图5A是示出根据本公开的实施例的第二认证条件为身份信息校验的情况下的安全认证的示意性流程图;
图5B是示出根据本公开的实施例的第二认证条件为身份信息校验的情况下的第二认证条件的可能设置的示意图;
图5C是示出根据本公开的实施例的移动终端与车辆之间的关系的示意图;
图6A是示出根据本公开的实施例的第二认证条件包括组合的两个条件的情况下的安全认证的示意性流程图;
图6B是示出根据本公开的实施例的第二认证条件包括一个或多个可能条件的示例情况的示意图;
图7是示出根据本公开的实施例的利用安全认证模型进行安全认证的示意性流程图;
图8A是示出根据本公开的实施例的第一异常状态的示意图;
图8B是示出根据本公开的实施例的第二异常状态的示意图;
图8C是示出根据本公开的实施例的第三异常状态的示意图;
图8D是示出根据本公开的实施例的第四异常状态的示意图;
图8E是示出根据本公开的实施例的响应于数字车钥匙的当前状态为预定异常状态的操作的流程图;
图9是示出根据本公开的实施例的基于预定异常状态判断执行安全认证的流程图;
图10示出了根据本公开的实施例的电子设备的示意图;
图11示出了根据本公开的实施例的示例性计算设备的架构的示意图;以及
图12示出了根据本公开的实施例的存储介质的示意图。
具体实施方式
为了使得本公开的目的、技术方案和优点更为明显,下面将参考 附图详细描述根据本公开的示例实施例。显然,所描述的实施例仅仅是本公开的一部分实施例,而不是本公开的全部实施例,应理解,本公开不受这里描述的示例实施例的限制。
在本说明书和附图中,具有基本上相同或相似步骤和元素用相同或相似的附图标记来表示,且对这些步骤和元素的重复描述将被省略。同时,在本公开的描述中,术语“第一”、“第二”等仅用于区分描述,而不能理解为指示或暗示相对重要性或排序。
除非另有定义,本文所使用的所有的技术和科学术语与属于本公开的技术领域的技术人员通常理解的含义相同。本文中所使用的术语只是为了描述本发明实施例的目的,不是旨在限制本发明。
为便于描述本公开,以下介绍与本公开有关的概念。
移动终端(Mobile intelligent terminal):能够接入移动通信网,具有能够提供应用程序开发接口的开放操作系统,并能够安装和运行应用软件的移动终端。
数字车钥匙(Digital key,DK):将车钥匙功能集成在移动终端设备中,基于SE、TEE等安全能力,使用NFC、蓝牙、UWB等通信技术实现车辆的开门、启动等功能的技术。
数字车钥匙框架(Digital Key Framework,DKF):数字车钥匙框架应对数字车钥匙生命周期中与数字车钥匙TA相关的操作进行封装,以统一API的形式将车钥匙管理服务提供给车厂App和Native App调用,这些功能包括但不限于:设备配对,钥匙生命周期管理、钥匙解锁、闭锁、分享、车控等。数字车钥匙框架应保证认证流程中的终端侧钥匙功能的可用性,使数字车钥匙TA能及时接收并响应车辆发送的认证消息,具体方法由移动终端厂商自行实现。数字车钥匙框架应对钥匙服务API实行访问控制,并维护访问控制策略。数字车钥匙框架宜具备与车辆基于通用方式进行蓝牙配对、建立蓝牙连接、实现与车辆交互的蓝牙认证数据包的解析和封装能力。
可信执行环境(TEE):可信执行环境是存在于移动终端设备内,与REE相分离的安全区域,具体实现可以是主处理器的一种安全模式,也可以是与主处理器相隔离的协处理器。可信执行环境可提供基 本的安全功能,包括安全存储、安全启动、隔离机制等。
富执行环境(Rich Execution Environment):富可信执行环境是存在于移动终端设备内,运行Android、iOS、Linux等通用的操作系统,为上层App提供设备的所有功能并且与TEE相分离的非安全区域。
数字车钥匙可信应用程序(TA):数字车钥匙TA为在TEE中执行的可信应用程序,TA应调用TEE提供的底层安全能力,实现钥匙数据的构建和存储,为钥匙的配对、解锁、闭锁、分享、车控等业务功能提供数据的加密、解密和安全控制的能力。TA应具备验证用户身份的能力。
综上所述,本公开的实施例提供的方案涉及数字车钥匙技术等技术,下面将结合附图对本公开的实施例进行进一步地描述。
图1A是示出根据本公开的实施例的数字车钥匙对应的示例框架的示意图。
如图1A所示,根据本公开的实施例的数字车钥匙对应的示例框架包括移动终端(移动终端可选地包括拥有者(owner)设备、朋友(friend)设备等)、移动终端服务器(拥有者设备对应的原始设备制造商(OEM)服务器、朋友设备对应的OEM服务器等)、车辆和车辆服务器等等。移动终端和车辆之间可以通过近场通信(NFC)、蓝牙(BLE)、超宽带(UWB)协议进行交互,车辆端部署有NFC读卡器、BLE模块和UWB模块中的一项或多项。NFC和BLE均可以实现数字车钥匙的功能,包括实现数字车钥匙配对、数字车钥匙使用功能,UWB主要是用于辅助数字车钥匙进行定位。
在移动终端使用数字车钥匙前,首先需要完成数字车钥匙的开通,开通数字车钥匙后,移动终端可以通过NFC或BLE使用数字车钥匙。图1B是示出根据本公开的实施例的基于TEE的蓝牙数字车钥匙系统架构的示意图。
如图1B所示,基于TEE的蓝牙数字车钥匙系统架构中主要包括车辆、车辆服务器、移动终端设备、终端设备服务器和移动服务提供商。其中,在移动终端中,数字车钥匙框架(DKF)对数字车钥匙生命周期中与数字车钥匙TA相关的操作进行封装,以统一API的形 式将车钥匙管理服务提供给设备厂商应用软件和车辆厂商应用软件调用,这些功能包括但不限于:设备配对,钥匙生命周期管理、钥匙解锁、闭锁、分享、车控等。数字车钥匙框架还保证认证流程中的终端侧钥匙功能的可用性,使数字车钥匙TA能及时接收并响应车辆发送的认证消息。数字车钥匙框架可以与车辆基于通用方式进行蓝牙配对、建立蓝牙连接并实现与车辆的交互。车辆具有用于数字车钥匙认证的车辆DK认证系统,其中可以对从车辆服务器获取的移动终端的数字车钥匙认证信息进行鉴权并决定对车辆的控制。
图1C是示出根据本公开的实施例的数字车钥匙的使用流程图,该数字车钥匙位于移动终端上,用于与车辆的交互。在移动终端的数字车钥匙与车辆配对完成后,后续可以使用数字车钥匙完成车辆的控制操作(例如车辆启动操作)。
具体地,参考图1C,搭载数字车钥匙的移动终端可以以以下步骤A1至步骤A7与车辆进行交互,该车辆和移动终端可以分别具有如图1B所示的基于TEE的蓝牙数字车钥匙系统架构中的车辆和移动终端的结构,其中,在根据移动终端的指示进行车辆控制之前,对于移动终端及其数字车钥匙的验证可以由例如车辆中的车辆DK认证系统执行。
A1.车辆通知移动终端成功建立蓝牙通信连接(蓝牙配对流程结束),蓝牙数字车钥匙可以正常使用。
A2.车辆和移动终端之间优先选择进行快速认证。如快速认证成功则建立安全通道并跳转到步骤A5,如快速认证失败则转为标准认证。
A3.车辆和移动终端之间执行标准认证。如标准认证成功则保存快速认证密钥,同时建立安全通道跳转到步骤A5,如标准认证失败,则判断失败类型,其中,如果不是找不到数字车钥匙ID(KeyID)的错误,则认为是安全认证失败,流程结束,如果是找不到KeyID的错误,则认为是朋友钥匙的第一次标准认证,后续执行步骤A4获取朋友钥匙认证信息流程。
A4.车辆从移动终端获取朋友钥匙认证信息,并用车主的数字车 钥匙公钥验证签名,如验证通过,则保存数字车钥匙公钥,并用此公钥验证移动终端传输的签名,完成朋友钥匙的第一次标准认证流程。
A5.安全认证通过后,车辆和移动终端已经建立了安全通道,车辆可调用loadData接口读取数字车钥匙业务数据。
A6.移动终端和车辆之间进行蓝牙测距定位操作。
A7.根据车厂的功能设置和用户后续的主动操作,车辆和移动终端之间可进行无感认证流程或遥控认证流程,用户可通过移动终端调用车控指令完成车控操作。
如上所述,数字车钥匙的使用需要先经过安全认证操作,现有的安全认证可以包括上述标准认证和快速认证,下面参考图1D和图1E来分别对标准认证和快速认证的流程进行说明。
图1D是示出根据本公开的实施例的标准认证的流程图。图1E是示出根据本公开的实施例的快速认证的流程图。
具体地,参考图1D,搭载数字车钥匙的移动终端可以以以下步骤B1至步骤B15与车辆进行交互,该车辆和移动终端可以分别具有如图1B所示的基于TEE的蓝牙数字车钥匙系统架构中的车辆和移动终端的结构,其中,图1D所示的标准认证可以由例如车辆中的车辆DK认证系统执行。
标准认证流程描述如下:
B1.车辆生成车辆临时公私钥对。
B2.车辆向移动终端发送公钥交换请求,传输车辆临时公钥和车辆ID。
B3.移动终端生成数字车钥匙临时公私钥对。
B4.移动终端向车辆发送公钥交换请求响应,返回数字车钥匙临时公钥和数字车钥匙ID。
B5.车辆生成车辆认证信息,包括数字车钥匙临时公钥、车辆临时公钥和数字车钥匙ID相关信息,并使用车辆私钥对车辆认证信息进行签名,以用于移动终端验证车辆的身份,防止假冒车辆获取移动终端信息。
B6.车辆向移动终端发送标准认证请求,向移动终端传输车辆认 证信息签名。
B7.移动终端使用车辆公钥验证车辆认证信息签名,车辆公钥证书由钥匙开通流程已经下发到移动终端。
B8.如车辆认证信息签名验证通过,移动终端生成数字车钥匙认证信息,包括数字车钥匙临时公钥、车辆临时公钥和车辆ID相关信息,然后B8.使用数字车钥匙私钥对数字车钥匙认证信息进行签名。
B9.移动终端向车辆发送标准认证请求响应,向车辆传输数字车钥匙认证信息签名。
B10.移动终端与车辆使用临时密钥对协商对称密钥。根据协商的对称密钥,使用密钥派生函数(KDF)算法生成安全通道密钥和快速认证密钥(B10.1),同时,移动终端使用相同的密钥协商算法和KDF算法生成安全通道密钥和快速认证密钥(B10.2),基于相同的安全通道密钥,双方建立安全通道。
B11.根据移动终端传输的数字车钥匙ID,车辆内部查询数字车钥匙ID以获取对应的数字车钥匙公钥,如能找到,则直接执行步骤B15;如果车辆找不到数字车钥匙ID和对应的数字车钥匙公钥,则基于已建立的安全通道执行步骤B12-B14,车辆通过步骤B12-B14获取朋友钥匙的数字车钥匙公钥。
B12.车辆向移动终端发送数字车钥匙数据请求,以获取朋友钥匙认证信息。
B13.移动终端向车辆发送数字车钥匙数据请求响应,返回朋友钥匙认证信息。
B14.车辆使用安全通道密钥解密朋友钥匙认证信息后,使用车主数字车钥匙公钥验证朋友钥匙认证信息的签名,如验证成功,则保存朋友钥匙认证信息中的朋友数字车钥匙公钥。
B15.使用数字车钥匙ID对应的数字车钥匙公钥对移动终端传输的数字车钥匙认证信息签名进行验证,如验证成功,则标准认证通过。在标准认证通过后,车辆和移动终端将同步保存本次生成的快速认证密钥用于后续的快速认证。
接下来,参考图1E描述快速认证流程,搭载数字车钥匙的移动 终端可以以以下步骤C1至步骤C12与车辆进行交互,该车辆和移动终端可以分别具有如图1B所示的基于TEE的蓝牙数字车钥匙系统架构中的车辆和移动终端的结构,其中,图1E所示的快速认证可以由例如车辆中的车辆DK认证系统执行。
快速认证流程描述如下:
C1.车辆生成车辆临时公私钥对。
C2.车辆向移动终端发送公钥交换请求,传输车辆临时公钥和车辆ID。
C3.移动终端生成数字车钥匙临时公私钥对。
C4.移动终端使用快速认证密钥和KDF算法生成第一密钥(KCmac)和安全通道密钥。
C5.移动终端使用KCmac生成数字车钥匙快速认证信息。
C6.移动终端向车辆发送公钥交换请求响应,返回数字车钥匙快速认证信息、数字车钥匙临时公钥和数字车钥匙ID。
C7.如果车辆没有找到数字车钥匙ID对应的快速认证密钥,则进行标准认证流程。如果找到快速认证密钥,则使用快速认证密钥和KDF算法生成KCmac和安全通道密钥。
C8.车辆使用KCmac对数字车钥匙快速认证信息进行验证,完成车辆对移动终端的认证。
C9.车辆使用KCmac生成车辆快速认证信息。
C10.车辆向移动终端发送快速认证请求,传输车辆快速认证信息。
C11.移动终端使用KCmac对车辆快速认证信息进行验证,完成移动终端对车辆的认证。
C12.移动终端向车辆发送快速认证请求响应,如认证均成功,则快速认证通过,移动终端和车辆将基于已经生成的安全通道密钥同步建立安全通道,后续操作将使用此安全通道。
如上所述,数字车钥匙提供了安全认证的功能,包括如参考图1D和图1E所描述的标准认证和快速认证,但是,数字车钥匙仍具有一定的安全风险,例如,在移动终端丢失后,其他用户仍可以通过移动终端解锁车辆,这可能会造成数字车钥匙的用户的财产损失。
数字车钥匙是未来的发展趋势,可以通过NFC、BLE、UWB中的一个或多个实现数字车钥匙的功能,当NFC、BLE、UWB同时使用时,NFC/BLE实现数字车钥匙功能,UWB主要实现数字车钥匙定位功能。虽然在现有的车辆安全认证方法中,通过在数字车钥匙的基础上添加指纹识别/人脸识别的功能可以提升数字车钥匙的安全性,但是实现指纹和人脸功能所需要的附加模块将增加汽车的成本,尤其是对于中低端车的影响较大,这显然不利于大面积推广使用。因此,如何在不增加附加硬件设备的基础上提升数字车钥匙的安全性是急需解决的问题。
本公开基于此,提供了一种车辆安全认证方法,其通过在现有的数字车钥匙安全认证方案的基础上设计了对数字车钥匙的进一步安全认证方法,从而提高了数字车钥匙认证的安全性。
本公开的实施例所提供的方法通过获取移动终端在发起连接请求时的认证信息,并基于数字车钥匙的认证信息来执行对移动终端的数字车钥匙的双重安全认证,以在数字车钥匙的认证信息通过双重安全认证的情况下执行该移动终端对车辆的控制操作,使得移动终端的数字车钥匙能够获得更高的安全性,从而提升数字车钥匙用户的使用体验。
图2A是示出根据本公开的实施例的车辆安全认证方法200的流程图。图2B是示出根据本公开的实施例的车辆20和数字车钥匙(21,22)之间的关系的示意图。图2C是示出根据本公开的实施例的车辆20和数字车钥匙(23,24)之间的关系的另一示意图。
根据本公开的实施例的车辆安全认证方法200可以包括如图2A所示的步骤201-203。如图2A所示,方法20包括步骤201至步骤203之一或全部,也可以包括更多的步骤。步骤201至步骤203的执行主体可以是位于车辆20上的各个组件(例如,如图2B所示的车辆20上的中央处理器、BLE节点、UWB节点或NFC节点等等),也可以是位于车辆20外部的各种组件。本公开并不对步骤201至步骤203的执行主体进行限制。
在步骤201中,可以接收至少一个移动终端的连接请求。
如图2B所示,根据本公开的实施例的车辆20可选地具备可信环境并支持数字车钥匙的功能。作为一个示例,车辆20可与图2B中的各种设备配合完成或独立完成以下操作中的一项或多项:①配合移动终端的蓝牙连接、配对请求;②与移动终端进行身份和钥匙认证,同时对钥匙相关业务数据进行认证;③定位移动终端相对车辆的位置;④接收数字车钥匙控制车辆操作请求,处理并控制车辆完成相关操作(如车辆解锁、升降车窗、开关空调、启动点火权限等);⑤支持数字车钥匙应用在线升级;⑥DK认证系统功能,其可在移动终端的配合下实现防中继攻击。
根据本公开的实施例的移动终端上可搭载有车辆厂商应用软件、设备厂商应用软件、数字车钥匙执行环境与通信模块等,以共同构建数字车钥匙基本功能。通过使用终端设备中的一个或多个数字车钥匙,可以实现解锁(或上锁)车门、启动(或停止)车辆发动机、开关后备箱等功能。其中,车辆厂商应用软件(又称为车厂APP)用于向用户提供数字车钥匙的相关功能UI。设备厂商应用软件(又称为“Native App”),用于向用户提供数字车钥匙的相关功能UI,执行开通、更新、分享、撤销等业务流程。设备厂商应用软件能在执行完成钥匙生命周期状态变化的操作后,触发与车端状态同步,并可选地通过双方服务器间的交互方式进行同步。
根据本公开的实施例,所述车辆可以对应于至少一个数字车钥匙,所述至少一个数字车钥匙可以位于至少一个移动终端。如图2B所示,在车辆20附近存在两个移动终端(移动终端1和2),其上可以分别搭载有数字车钥匙21和22(图中未示出)。这两个移动终端中的任意一个移动终端均可以与车辆建立通信连接。值得注意的是,一个移动终端可以搭载有多个数字车钥匙。例如,一个移动终端上可以搭载使用BLE通信连接的数字车钥匙A、使用UWB通信连接的数字车钥匙B和使用NFC通信连接的数字车钥匙C。本公开并不以此为限。
根据本公开的实施例,所述车辆可以包括多个通信节点,所述多个通信节点可以包括蓝牙BLE节点、近场通信NFC节点、和超宽带UWB节点中的一个或多个。
作为一个示例,例如,参考图2B,车辆20可以可选地安装BLE节点,在BLE连接有效范围内,与分别搭载有数字车钥匙21和22的移动终端1和2建立蓝牙通信连接。其中BLE节点可选地包括蓝牙主节点和蓝牙辅节点。蓝牙主节点在数字车钥匙系统中用于车辆与移动终端设备间建立蓝牙通信链路,负责双方间的数据传输,同时,蓝牙主节点还可用于配合定位功能的实现。蓝牙辅节点在数字车钥匙系统中主要用于辅助实现定位功能,以便车辆系统能够获知数字车钥匙的位置状态。
作为一个示例,在BLE节点连接有效范围(以灰色圆形示出)内时,车辆可以感应到数字车钥匙21和22。分别搭载有数字车钥匙21和22的移动终端1和2可以与车辆间通过蓝牙进行数据传输。可选地,车辆20与分别搭载有数字车钥匙21和22的移动终端1和2建立蓝牙通信连接的过程包括在保证安全性的前提下的蓝牙连接操作、蓝牙配对操作及钥匙认证操作等等。蓝牙连接操作及蓝牙配对操作可以提供基础的蓝牙安全通信链路,钥匙认证操作则在业务层保障数据传输的安全性从而保障蓝牙数字车钥匙的功能安全。本公开在此不对建立蓝牙通信连接的过程进行限制,只要其能实现车辆20与搭载有数字车钥匙21的移动终端的通信连接的建立即可。
本公开不限定蓝牙辅节点是否需要以及节点的数量,本领域技术人员可从功能需求和定位精度要求等方面来设计蓝牙辅节点的数量。例如,如图2C所示,车辆20可选地可以安装4个蓝牙/NFC节点(BLE/NFC节点1至BLE/NFC节点4,例如,优选地分别部署在四个门的把手/门柱上),每个蓝牙/NFC节点覆盖范围不重合。由此,BLE/NFC节点1仅能感测到图2C中搭载有数字车钥匙23的移动终端,而BLE/NFC节点3仅能感测搭载有数字车钥匙24的移动终端。
例如,参考图2B,车辆20还可以可选地安装NFC节点和UWB节点等以分别建立NFC通信连接和UWB通信连接。例如,在车辆20与分别搭载有数字车钥匙21和22的移动终端1和2建立通信连接之后,车辆20可以触发UWB节点,搜索更大范围内(以斜线圆环示出)的数字车钥匙。由于UWB的探测范围较大且精确度较高, 可以比较精确的定位其他支持UWB协议的移动终端的距离和方向。
因此,在本公开的实施例中,车辆上所部署的多个通信节点可用于接收来自其覆盖范围(连接有效范围)内的一个或多个移动终端的连接请求。
可选地,该连接请求可以由移动终端向车辆发送以用于与车辆建立通信连接,从而对移动终端所搭载的数字车钥匙进行安全认证,以利用该数字车钥匙控制车辆执行期望的操作。例如,图2C中的数字车钥匙24所对应的移动终端可以通过其上设置的蓝牙模块向车辆20发送连接请求,由于该移动终端处于BLE/NFC节点3的覆盖范围内,其连接请求可以由该BLE/NFC节点3获取。
可选地,至少一个移动终端的连接请求可以是在该至少一个移动终端已与车辆建立过蓝牙连接并完成数字车钥匙配对之后发送的(例如,在移动终端希望再次与车辆建立蓝牙连接时)。如图2B和2C所示,BLE/NFC/UWB节点可以与中央处理器建立连接,车辆可以与其车辆服务器建立连接,该车辆服务器可以连接至数字车钥匙服务器,移动终端可以在通过BLE/NFC/UWB节点与车辆建立通信连接后,可以在TEE环境中保存该车辆的数字车钥匙,同时该数字车钥匙可以在数字车钥匙服务器进行备份(例如,数字车钥匙21-24被备份在数字车钥匙服务器中)。也就是说,该至少一个移动终端所搭载的用于车辆的数字车钥匙可以已在该车辆的车辆服务器中存在备份,在该至少一个移动终端希望再次通过数字车钥匙对车辆进行控制时,该数字车钥匙在车辆服务器中的备份可以用于对该数字车钥匙进行安全认证。
在本公开的实施例中,基于对数字车钥匙的安全性认证的思考,创造性地将移动终端在向车辆发送连接请求时的状态信息应用于对其上所搭载的数字车钥匙的安全性认证操作,以结合除了数字车钥匙证书信息之外的更多可用状态信息来判断是否选择信任该数字车钥匙。
因此,在步骤202中,可以获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息。
可选地,所获取的至少一个数字车钥匙的认证信息可以包括上述移动终端在向车辆发送连接请求时的状态信息以及移动终端所搭载的数字车钥匙的证书信息等,以用于对该至少一个移动终端的数字车钥匙的安全认证。
例如,该至少一个数字车钥匙的认证信息可以包括对应的移动终端在向车辆发送连接请求时的位置信息、对应的移动终端在向车辆发送连接请求时的运动信息、对应的移动终端在向车辆发送连接请求时其用户的生理体征信息等,这些信息可以用于对实际应用场景中可能出现的各种可疑(或异常)状态进行判断,从而为对是否信任数字车钥匙的选择提供更多的参考信息。下面将参考步骤203和图3A-图9进行更详细的描述。当然,应当理解,前述各种认证信息在本公开的实施例中仅用作示例而非限制,其他可用于可疑(或异常)状态判断的信息同样可以适用于本公开的方法。
基于所获取的至少一个数字车钥匙的认证信息,在步骤203中,可以在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作。根据本公开的实施例,所述安全认证条件可以包括第一认证条件和第二认证条件。可选地,所述第一认证条件和所述第二认证条件可以用于对所述至少一个数字车钥匙执行双重安全认证。
根据本公开的实施例,所述在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作可以包括:在所述至少一个数字车钥匙的认证信息满足所述第一认证条件和所述第二认证条件的情况下,执行所述至少一个数字车钥匙对应的操作。
可选地,在本公开的实施例中,对于移动终端中的数字车钥匙的安全认证可以包括分别基于第一认证条件和第二认证条件的双重安全认证操作。作为示例,基于第一认证条件的安全认证操作可以用于对数字车钥匙的证书信息认证,而基于第二认证条件的安全认证操作可以用于针对实际应用场景的各种可疑(或异常)状态的安全认证。其中,应当理解,除非特别指明,否则在基于第一认证条件和第二认 证条件对至少一个移动终端中的至少一个数字车钥匙的安全认证过程中,对于两种认证条件的认证顺序并不作任何限制,而是可以根据实际需要具体设置。
可选地,由于第二认证条件用于针对实际应用场景的各种可疑(或异常)状态的安全认证,其中各种可疑(或异常)状态所对应的场景可以根据用户的期望或需求而调整,因此第二认证条件可以由用户(例如,车辆所有者)通过其移动终端进行设置。作为示例,用户可以根据需求在车辆服务器上设置特定的第二认证条件,以供车辆从其车辆服务器同步用户所设置的第二认证条件并由此进行安全认证。当然,除此之外,用户还可以直接在车辆上设置该第二认证条件,本公开对此不作限制。因此,根据本公开的实施例,在执行上述步骤203之前,车辆安全认证方法200还可以包括:从所述车辆的车辆服务器同步所述第二认证条件,所述第二认证条件可以由移动终端设置于所述车辆服务器。
在本公开的实施例中,第二认证条件可以根据连接至车辆的移动终端的数量而区别设置。这是因为,在仅存在单个移动终端连接至车辆时,仅需考虑该移动终端的数字车钥匙的安全性,因此可以单单针对该移动终端的个体状态信息设置第二认证条件,而在存在多个移动终端连接到车辆时,除了每个移动终端的个体状态信息之外,这些移动终端之间的相对状态信息也同样需要作为安全性考虑因素加入数字车钥匙的安全认证。
根据本公开的实施例,所述第二认证条件可以包括以下中的至少一个:
①至少两个数字车钥匙的认证信息通过所述第一认证条件;
②在至少两个数字车钥匙通过所述第一认证条件,并且所述至少两个数字车钥匙对应的移动终端之间的相对位置都满足第一预定条件;
③所述至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件;
④所述至少一个数字车钥匙对应的移动终端通过身份信息校验; 或者
⑤所述至少一个数字车钥匙对应的移动终端执行特定操作。
如上所述,第二认证条件可以根据连接至车辆的移动终端的数量而分为情况1(条件①和②)和情况2(条件③、④和⑤)进行设置,下面将参考图3A-图9对第二认证条件的这些可能设置分别进行具体描述。
首先,对于上述情况1,存在至少两个移动终端向车辆发送了连接请求,因此需要考虑这些移动终端的个体状态信息和/或其间的相对状态信息。图3A-3C对应于存在至少两个移动终端连接至车辆的情况下的安全认证。其中,图3A是示出根据本公开的实施例的存在至少两个移动终端连接至车辆的情况下的安全认证的示意性流程图。图3B是示出根据本公开的实施例的存在至少两个移动终端连接至车辆的情况下的第二认证条件的可能设置的示意图。图3C是示出根据本公开的实施例的两个移动终端与车辆之间的关系的示意图。
如图3A所示,移动终端1和2可以分别对应于车辆的车辆所有者移动设备和朋友设备,因此,可选地,车辆所有者可以通过移动终端1与车辆完成配对,以获得车辆对应的数字车钥匙1,并且车辆所有者还可以通过移动终端1为移动终端2分配数字车钥匙2。在此步骤所分配的数字车钥匙1和2可以在车辆服务器进行备份。
接下来,移动终端1可以通过车辆服务器设置第二认证条件,以供车辆从其车辆服务器同步获取该第二认证条件。因此,通过同步第二认证条件,车辆可以确定当前要应用于数字车钥匙的安全认证条件,例如,上述条件①和②。
通过上述操作,完成了车辆的安全认证条件的设置,该车辆由此可以对后续请求通信连接的移动终端及其数字车钥匙应用所设置的安全认证条件。
可选地,在第二认证条件为上述条件①的情况下,该第二认证条件可以对应于该至少一个数字车钥匙中的至少两个数字车钥匙通过基于第一认证条件的安全认证。此外,可选地,还可以对该至少两个数字车钥匙通过基于第一认证条件的安全认证的时间进行限制,例如, 第二认证条件还可以要求该至少两个数字车钥匙通过基于第一认证条件的安全认证的时间位于预定时间窗内。也就是说,在本公开的一个实施例中,响应于至少两个数字车钥匙的认证信息在预定时间段内通过第一认证条件,可以确定该至少一个数字车钥匙的认证信息满足第二认证条件。
更进一步地,如上所述,车辆可以包括多种通信节点,其中每种通信节点对于移动终端的信息获取方式以及所获取的信息不同,并且该至少一个移动终端可以分别通过不同的通信节点与车辆建立通信连接,因此,在此情况下,对第二认证条件的设置可以进一步基于获取数字车钥匙的通信节点的类型进行区分。例如,如图3B所示,可以根据获取数字车钥匙的通信节点的类型相同或不同来设置第二认证条件,包括用于至少两个节点(例如,同为NFC节点或BLE节点,或者是NFC节点和BLE节点)获取的数字车钥匙的第二认证条件和用于至少两类节点(两个不同类型节点(例如,NFC节点和BLE节点))获取的数字车钥匙的第二认证条件。
如上所述,在移动终端都通过基于第一认证条件的安全认证的基础上,还可以考虑各个移动终端之间的相对状态信息(例如,上述条件②)。根据本公开的实施例,移动终端之间的相对位置可以是通过所述多个通信节点确定的,其中,所述至少两个数字车钥匙对应的移动终端之间的相对位置可以包括所述至少两个数字车钥匙对应的移动终端之间的距离和角度中的一个或多个。因此,由于不同通信节点获取各个数字车钥匙对应的移动终端的信息的方式不同,可以基于上述设置进一步区别设置第二认证条件,如图3B所示。
根据本公开的实施例,所述第一预定条件可以包括以下中的一个或多个:所述至少两个数字车钥匙对应的移动终端之间的距离满足预定距离条件;或者所述至少两个数字车钥匙对应的移动终端之间的角度满足预定角度条件。
也就是说,在存在两个以上的移动终端连接到车辆时,可以对其之间的相对位置进行约束,例如,两个移动终端之间的距离需要满足一定阈值,或者两个移动终端之间的角度需要满足一定阈值。如图3C 所示,示出了两个移动终端(图中示为BLE数字车钥匙1和2)之间的可能相对位置关系,其中,BLE数字车钥匙2(a)-(d)表示BLE数字车钥匙2的几种可能位置。在要求两个移动终端之间的距离需要满足一定阈值的情况下,距离小于该阈值的情况(例如为BLE数字车钥匙1和2(a)的情况)可能无法通过安全认证,这是考虑到在两个距离过小或角度异常的移动终端同时连接到车辆的情况在实际应用场景中可能存在安全隐患,因此通过判断数字钥匙之间的距离和角度,可判断可能存在的安全风险,提升数字车钥匙的安全性。
在车辆基于所同步的第二认证条件对该至少一个数字车钥匙进行认证后,如果确定该至少一个数字车钥匙的认证信息满足第二认证条件,则可以执行对应的控制操作,并向该至少一个移动终端返回安全认证事件和控制结果。此外,可选地,如果该安全认证未通过,车辆还可以选择执行其他进一步认证操作或警告操作,诸如向报警服务器发送通知消息,本公开对此不作限制。
如上参考图3A-3C所述,本公开的系统可以包括车辆和至少一个移动终端,所述车辆可以对应于至少一个数字车钥匙,所述至少一个数字车钥匙可以位于所述至少一个移动终端,其中,所述车辆可以被配置为执行权利要求1对应的方法,所述系统可以被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;响应于至少两个数字车钥匙的认证信息在预定时间段内通过第一认证条件,并且所述至少两个数字车钥匙对应的移动终端之间的相对位置都满足第一预定条件,确定所述至少一个数字车钥匙的认证信息满足第二认证条件;响应于确定所述至少一个数字车钥匙的认证信息满足第二认证条件,执行所述至少一个数字车钥匙对应的操作。
接下来,对于上述情况2,存在至少一个移动终端向车辆发送了连接请求,因此需要考虑该至少一个移动终端的个体状态信息。图4A-5C对应于存在至少一个移动终端连接至车辆的情况下的安全认证。其中,图4A-4E对应于第二认证条件为上述条件③的情况下的安全认证,图5A-5C对应于第二认证条件为上述条件④的情况下的安全 认证。
图4A是示出根据本公开的实施例的第二认证条件为至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件的情况下的安全认证的示意性流程图。图4B是示出根据本公开的实施例的第二认证条件为至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件的情况下的第二认证条件的可能设置的示意图。图4C是示出根据本公开的实施例的移动终端的第一示例轨迹的示意图。图4D是示出根据本公开的实施例的移动终端的第二示例轨迹的示意图。图4E是示出根据本公开的实施例的移动终端的第三示例轨迹的示意图。
可选地,在存在至少一个移动终端连接至车辆时,可以针对该移动终端的个体状态信息进行安全认证。例如,该个体状态信息可以是该移动终端相对于各个通信节点的轨迹,这对应于第二认证条件为条件③的情况。
如图4A所示,在移动终端1通过与车辆配对获取车辆的数字车钥匙后,移动终端1可以通过车辆服务器设置第二认证条件,以供车辆从其车辆服务器同步获取该第二认证条件。因此,通过同步第二认证条件,车辆可以确定当前要应用于数字车钥匙的安全认证条件,例如,上述条件③。
通过上述操作,完成了车辆的安全认证条件的设置,该车辆由此可以对后续请求通信连接的移动终端及其数字车钥匙应用所设置的安全认证条件。
可选地,在第二认证条件为上述条件③的情况下,车辆可以触发位置感知功能继而获取移动终端1的位置信息(例如,被包括在该数字车钥匙的认证信息中)。
在车辆基于所同步的第二认证条件对该至少一个数字车钥匙对应的移动终端的轨迹进行认证后,如果确定该至少一个数字车钥匙对应的移动终端的轨迹满足第二认证条件,则可以执行对应的控制操作,并向该至少一个移动终端返回安全认证事件和控制结果。
根据本公开的实施例,所述至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件可以包括:对于所述至少一个数字车钥匙对 应的移动终端中的每一个,所述移动终端相对于所述多个通信节点中的一个通信节点的位置满足预定位置条件;或者对于所述至少一个数字车钥匙对应的移动终端中的每一个,所述移动终端相对于所述多个通信节点中的至少两个通信节点的轨迹满足预定轨迹条件。
可选地,根据移动终端在发送连接请求时的运动状态以及移动终端在发送连接请求时经过的通信节点的个数(例如,在发送连接请求前后的预定时间段内),可以将移动终端的轨迹分为单个节点轨迹和多个节点轨迹(分别对应于在发送连接请求时经过单个通信节点或多个通信节点),如图4B所示。其中,对于这两种情况,移动终端的轨迹需要满足的第二认证条件可以区别设置,例如对于单个节点轨迹的情况,移动终端的轨迹需要满足预定位置条件,即对其相对于特定节点的位置的约束,而对于多个节点轨迹的情况,移动终端的轨迹需要满足预定轨迹条件,该预定轨迹条件可以由车辆使用者预先设置。
具体地,对于单个节点轨迹的情况,根据本公开的实施例,所述移动终端相对于所述多个通信节点中的一个通信节点的位置可以包括所述移动终端相对于所述多个通信节点中的一个通信节点的距离和角度中的一个或多个。
可选地,由于移动终端的该位置信息是由单个特定节点获取的,而该单个特定节点可以是车辆所具有的多种通信节点中的任何一个,因此,移动终端的位置信息的获取方式可以根据通信节点的类型而区别设置。
根据本公开的实施例,所述移动终端相对于所述多个通信节点中的一个通信节点的位置可以是通过以下方式确定的:在所述通信节点为NFC节点的情况下,通过所述NFC节点获取所述位置;在所述通信节点为BLE节点的情况下,判断所述多个通信节点中的各个BLE节点与所述移动终端的信号强度,并通过所述信号强度获取移动终端的位置;或者在所述通信节点为BLE节点的情况下,通过UWB节点获取所述移动终端的位置,以确定所述移动终端的位置。
可选地,针对上述单个特定节点,如果该特定节点是NFC节点,则可以获取该特定NFC节点的数字车钥匙的位置信息;如果该特定 节点是BLE节点,则可以判断各个蓝牙节点与该移动终端的数字车钥匙的信号强度(例如,通过RSSI(Received Signal Strength Indication)和/或AOA(angle of arrive)计算),获取数字车钥匙的位置信息。此外,在该特定节点是BLE节点的情况下,还可以可选地通过UWB节点感知数字车钥匙的位置(例如,通过TOF(time of flight)计算),从而判断该数字车钥匙的位置,其中,所确定的位置信息可以包括数字车钥匙的轨迹(包括距离和角度信息)、和/或数字车钥匙的坐标。
对于多个节点轨迹的情况,根据本公开的实施例,所述预定轨迹条件可以为所述移动终端按照预定轨迹通过所述至少两个通信节点的覆盖区域,所述预定轨迹可以包括通过所述至少两个通信节点的覆盖区域的预定顺序、进入所述至少两个通信节点的覆盖区域的预定角度、和距所述至少两个通信节点的距离中的至少一个。
由于车辆可以包括多种通信节点,下面可以根据其所包括的通信节点的类型来参考图4C-图4E分情况说明可能的几种预定轨迹条件。当然,所示的这些轨迹条件在本公开中仅用作示例而非限制。
图4C对应于多个节点轨迹仅涉及多个NFC节点的情况。如图4C所示,在仅包括NFC节点的车辆20中,NFC数字车钥匙1需要按照预定轨迹在多个NFC节点的覆盖范围内活动。例如,NFC数字车钥匙1可以按照轨迹1运动,即由节点NFC-1到达节点NFC-3,或者按照轨迹2运动,即由节点NFC-1出发,依次通过节点NFC-2和节点NFC-4,最后到达节点NFC-3。可选地,由于NFC节点的覆盖范围较小,移动终端可以按照预定顺序依次与相应NFC节点进行接触。
图4D对应于多个节点轨迹仅涉及多个BLE节点的情况。如图4D所示,在仅包括BLE节点的车辆20中,BLE数字车钥匙2需要按照预定轨迹在多个BLE节点的覆盖范围内活动。例如,BLE数字车钥匙2可以按照轨迹1运动,即由节点BLE-1到达节点BLE-3,或者按照轨迹2运动,即由节点BLE-1出发,依次通过节点BLE-2和节点BLE-4,最后到达节点BLE-3。可选地,由于BLE节点的覆盖范围较大,移动终端可以按照预定顺序通过相应BLE节点的覆盖 范围。此外,如轨迹3所示,移动终端还可以按照预定角度进入相应BLE节点BLE-4的覆盖范围,另外移动终端还可以按照预定的距离进入相应BLE节点BLE-4和BLE-3的覆盖范围。
接下来,图4E示出了多个节点轨迹涉及多个BLE节点和NFC节点的情况,其中,四个BLE节点设置在车辆的四个门的把手/门柱上,而NFC节点被设置在车尾部。如图4E所示,在包括BLE节点和NFC节点的车辆20中,BLE数字车钥匙3可以根据如图4D所示的预定轨迹1和2按照预定顺序通过相应BLE节点的覆盖范围。此外,通过NFC节点NFC-1的加入,还可以设置结合NFC节点和BLE节点的预定轨迹条件,例如在将移动终端与NFC-1节点接触后,按照预定角度和/或距离进入BLE节点BLE-4和BLE-3的覆盖范围,如轨迹3所示,该移动终端上可以具有BLE数字车钥匙3和NFC数字车钥匙1。
由于数字车钥匙的用户习惯轨迹不同,因此可以通过是数字车钥匙的轨迹区分数字车钥匙的用户是否是合法的授权用户,因此可以对可能存在的安全风险进行判断,提升数字车钥匙的安全性。
如上参考图4A-4E所述,本公开的系统可以包括车辆和至少一个移动终端,所述车辆可以对应于至少一个数字车钥匙,所述至少一个数字车钥匙可以位于所述至少一个移动终端,其中,所述车辆可以被配置为执行上述方法,所述系统可以被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;所述车辆基于所述至少一个数字车钥匙的认证信息确定所述至少一个数字车钥匙对应的移动终端的轨迹;响应于所述至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
图5A是示出根据本公开的实施例的第二认证条件为身份信息校验的情况下的安全认证的示意性流程图。图5B是示出根据本公开的 实施例的第二认证条件为身份信息校验的情况下的第二认证条件的可能设置的示意图。图5C是示出根据本公开的实施例的移动终端与车辆之间的关系的示意图。
可选地,在存在至少一个移动终端连接至车辆时,可以针对该移动终端的个体状态信息进行安全认证。例如,该个体状态信息可以是该移动终端的用户的身份信息,这对应于第二认证条件为条件④的情况。
如图5A所示,在移动终端2通过与车辆配对获取车辆的数字车钥匙后,移动终端2可以通过车辆服务器设置第二认证条件,以供车辆从其车辆服务器同步获取该第二认证条件。因此,通过同步第二认证条件,车辆可以确定当前要应用于数字车钥匙的安全认证条件,例如,上述条件④。
通过上述操作,完成了车辆的安全认证条件的设置,该车辆由此可以对后续请求通信连接的移动终端及其数字车钥匙应用所设置的安全认证条件。
可选地,在第二认证条件为上述条件④的情况下,车辆可以响应于移动终端2通过第一认证条件而触发安全认证功能,继而触发移动终端2处的设备校验(例如,触发移动终端执行解锁操作)。在车辆基于移动终端2返回的移动终端设备校验结果确定设备校验通过的情况下,可以执行对应的控制操作,并向该至少一个移动终端返回安全认证事件和控制结果。
根据本公开的实施例,所述身份信息校验可以包括针对移动终端的生物特征校验和非生物特征校验中的至少一个;其中,所述生物特征校验可以与所述移动终端的面部特征、指纹特征、呼吸特征或心跳特征中的一个或多个相关;所述非生物特征校验可以与所述移动终端的物理操作校验相关,所述物理操作校验可以包括认证密码信息校验。
可选地,移动终端处的身份信息校验可以包括生物特征校验和非生物特征校验,其分别对应于对移动终端的用户的生物特征认证和物理操作认证。如图5B所示,根据身份信息校验的类型,第二认证条件可以被细分用于多种身份认证。例如,生物特征认证可以用于辨别 移动终端的当前使用者是否为本人,诸如基于面部特征和指纹特征。此外,生物特征认证还可以用于辨别移动终端的当前使用者的心理状态,诸如通过呼吸监测或心跳检测获取其呼吸特征或心跳特征,当确定当前使用者的心理状态异常(例如,心跳过快或呼吸过于急促等),可以认为当前移动终端的安全性不高,不允许该移动终端对车辆进行控制。此外,还可以基于对移动终端的物理认证操作来执行安全认证,诸如通过密码信息或滑动信息(例如,滑动手势信息)等。如图5C所示,移动终端1可以在这些BLE节点中的任一个的覆盖范围内进行上述安全认证,以通过该BLE节点利用其数字车钥匙1对车辆20进行控制。
如上参考图5A-5C所述,本公开的系统可以包括车辆和至少一个移动终端,所述车辆可以对应于至少一个数字车钥匙,所述至少一个数字车钥匙可以位于所述至少一个移动终端,其中,所述车辆可以被配置为执行上述方法,所述系统可以被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;所述车辆触发所述至少一个移动终端进行身份信息校验;所述至少一个移动终端进行身份信息校验,并向所述车辆返回身份信息校验结果;响应于所述身份信息校验结果通过,确定所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
可选地,在存在至少一个移动终端连接至车辆时,可以针对该移动终端的个体状态信息进行安全认证。例如,该个体状态信息可以是该移动终端所执行的特定操作,这对应于第二认证条件为条件⑤的情况。
根据本公开的实施例,所述特定操作可以包括所述移动终端的可操作部件执行预定动作。其中,所述可操作部件可以包括可折叠屏幕、柔性屏幕或卷轴屏幕。
考虑到未来数字车钥匙的移动终端可能很多将具有可操作部件, 诸如可操作的屏幕(例如,折叠屏、柔性屏或卷轴屏等),在本公开的实施例中,可以基于对移动终端的可操作部件的特定操作来实现安全认证,包括控制可操作部件执行预定动作。
例如,对于具有折叠屏的移动终端,可以基于折叠屏的特定折叠方式实现安全认证,例如具有二折屏的移动终端可以通过“打开折叠屏-关闭折叠屏”操作完成数字车钥匙的安全认证,而具有三折屏的移动终端可以通过“打开左折叠屏-关闭右折叠屏”操作完成数字车钥匙的安全认证。
再例如,对于具有柔性屏的移动终端,可以通过将柔性屏折叠到一定角度(例如“将柔性屏的左上角折叠90度”)完成数字车钥匙的安全认证。
此外,对于具有卷轴屏的移动终端,可以通过将屏幕伸展到一定长度来数字车钥匙认证,如“将卷轴屏伸长10cm完成数字车钥匙认证”,或“将卷轴屏伸长到整个屏幕长度的50%完成数字车钥匙认证”。
通过验证数字车钥匙所在的移动终端执行特定操作的信息,可以快速判断当前数字车钥匙所在的移动终端的用户是否为合法用户,提升数字车钥匙的安全性,而且移动终端执行特定操作相对过程简易,可以在保证数字车钥匙安全性的同时,提升数字车钥匙用户的使用体验。
如上所述,本公开的系统可以包括车辆和至少一个移动终端,所述车辆可以对应于至少一个数字车钥匙,所述至少一个数字车钥匙可以位于所述至少一个移动终端,其中,所述车辆可以被配置为执行上述方法,所述系统可以被配置为:所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;响应于所述至少一个移动终端执行预定操作,确定所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
图6A是示出根据本公开的实施例的第二认证条件包括组合的两 个条件的情况下的安全认证的示意性流程图。图6B是示出根据本公开的实施例的第二认证条件包括一个或多个可能条件的示例情况的示意图。
可选地,上述条件①至⑤可以单独用于安全认证,还可以组合用于安全认证。例如,上述条件①至⑤中的任何一个或多个可以以“与”或者“或”的方式进行组合以用于安全认证,图6B针对这两种情况以条件①和条件③为例分别示出了流程图。例如,图6A中示出了利用两个条件的“或”组合实现安全认证。其中,与上述参考图3A的流程类似地,车辆所有者可以通过移动终端1与车辆完成配对,以获得车辆对应的数字车钥匙1,并且车辆所有者还可以通过移动终端1为移动终端2分配数字车钥匙2。在此步骤所分配的数字车钥匙1和2可以在车辆服务器进行备份。
接下来,移动终端1可以通过车辆服务器设置第二认证条件,以供车辆从其车辆服务器同步获取该第二认证条件,其中,该第二认证条件包括上述条件①至⑤中的任何两个条件的组合(例如,图6A中示为条件①与其他任一条件(以“条件2”表示)的“或”组合)。因此,通过同步第二认证条件,车辆可以确定当前要应用于数字车钥匙的安全认证条件。
通过上述操作,完成了车辆的安全认证条件的设置,该车辆由此可以对后续请求通信连接的移动终端及其数字车钥匙应用所设置的安全认证条件。
接下来,车辆可以基于条件①与条件2的“或”组合对移动终端1和2的认证信息进行安全认证,如图6A所示,在条件①与条件2中的任何一个条件满足的情况下,车辆都可以认为该至少一个数字车钥匙的认证信息满足第二认证条件,继而执行对应的控制操作,并向该至少一个移动终端返回安全认证事件和控制结果。此外,作为示例(未示出),如果所设置的第二认证条件包括两个条件的“与”组合,则在此阶段需要在同时满足这两个条件的情况下才能确定该至少一个数字车钥匙的认证信息满足第二认证条件,继而执行后续操作。
如上参考图6A-6B所述,本公开的系统可以包括车辆和至少一 个移动终端,所述车辆可以对应于至少一个数字车钥匙,所述至少一个数字车钥匙可以位于所述至少一个移动终端,其中,所述车辆可以被配置为执行上述方法,所述系统可以被配置为:所述车辆从所述车辆的车辆服务器同步所述第二认证条件;所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;在所述第二认证条件包括上述第二认证条件中的两项第二认证条件且所述两项第二认证条件的关系为与关系的情况下,响应于所述至少一个数字车钥匙的认证信息同时满足所述两项第二认证条件,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;在所述第二认证条件包括上述第二认证条件中的两项第二认证条件且所述两项第二认证条件的关系为或关系的情况下,响应于所述至少一个数字车钥匙的认证信息满足所述两项第二认证条件中的任一项,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
在如上所述的各个实施例中,对于第二认证条件的设置主要是由车辆使用者设置于车辆或车辆服务器以供车辆获取的,但是,在本公开的实施例中,车辆确定第二认证条件的方式并不仅限于此,其还可以是由车辆基于数字车钥匙的认证信息而自动确定的,例如,通过预先训练的安全认证模型。
根据本公开的实施例,在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作可以包括:基于所述至少一个数字车钥匙的认证信息,确定用于所述至少一个数字车钥匙的第二认证条件;其中,所述基于所述至少一个数字车钥匙的认证信息确定用于所述至少一个数字车钥匙的第二认证条件是通过预先训练的安全认证模型执行的,其中,所述安全认证模型基于所述至少一个数字车钥匙的认证信息选择用于所述至少一个数字车钥匙的第二认证条件。
图7是示出根据本公开的实施例的利用安全认证模型进行安全 认证的示意性流程图。如图7所示,车辆拥有者可以在车辆或车辆服务器处设置多个安全认证模型,每个安全认证模型可以对应于前述多种第二认证条件中的一种第二认证条件,并且车辆或车辆服务器还可以提取安全认证模型的对应参数,包括各个第二认证条件判断所需的所有参数,例如,移动终端的相对位置、运动信息、移动终端用户的生理特征等等。接下来,车辆可以从数字车钥匙的认证信息中获取这些参数所对应的数值,其中,可选地,车辆可以将所获取的这些参数对应的数值发送到车辆服务器。因此,车辆或车辆服务器可以基于这些参数对应的数值来匹配安全认证模型,以从这些安全认证模型中获取与用户匹配度最高的安全认证模型,并将该安全认证模型应用于该移动终端的安全认证,例如,车辆或车辆服务器可以设置与用户匹配度最高的安全认证模型为激活安全认证模型。
如上参考图7所述,本公开的系统可以包括车辆和至少一个移动终端,所述车辆可以对应于至少一个数字车钥匙,所述至少一个数字车钥匙可以位于所述至少一个移动终端,其中,所述车辆可以被配置为执行上述方法,所述系统可以被配置为:所述车辆被设置有多个安全认证模型,其中每个安全认证模型对应于上述第二认证条件中的一项第二认证条件;所述车辆提取所述多个安全认证模型的对应参数;所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;所述车辆从所述至少一个数字车钥匙的认证信息中获取所述多个安全认证模型的对应参数的数值;所述车辆基于所述多个安全认证模型的对应参数的所述数值来确定所述至少一个数字车钥匙与所述多个安全认证模型的匹配度,并从所述多个安全认证模型中确定与所述至少一个数字车钥匙匹配度最高的安全认证模型;所述车辆将所述安全认证模型设置为用于所述至少一个数字车钥匙的安全认证模型。
如上所述,至少一个数字车钥匙的认证信息可以用于对实际应用场景中可能出现的各种可疑(或异常)状态进行判断,从而为对是否信任数字车钥匙的选择提供更多的参考信息。具体地,在本公开的实施例中,可以基于至少一个数字车钥匙的认证信息判断该至少一个移 动终端是否处于异常状态,并基于该判断来确定是否对数字车钥匙应用双重安全认证。根据本公开的实施例,在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作还可以包括:在所述至少一个数字车钥匙的认证信息满足第一认证条件的情况下,基于所述至少一个数字车钥匙的认证信息,确定所述至少一个数字车钥匙的当前状态;以及在确定所述至少一个数字车钥匙的当前状态为预定异常状态的情况下,确定所述至少一个数字车钥匙的认证信息是否满足所述第二认证条件。
可选地,在对移动终端的数字车钥匙执行安全认证时,可以首先对该数字车钥匙进行基于第一认证条件的安全认证,以该第一认证条件为安全认证的基础,在第一认证条件满足的情况下再判断是否执行进一步的安全认证。其中,该判断可以是基于异常状态判断进行的,即,在确定移动终端的数字车钥匙的当前状态属于预定异常状态时,再选择对该数字车钥匙执行基于第二认证条件的安全认证。
根据本公开的实施例,所述预定异常状态可以包括以下中的至少一个:至少两个数字车钥匙对应的移动终端之间的距离小于预定阈值;所述至少一个数字车钥匙对应的移动终端的轨迹满足预定异常轨迹条件;所述至少一个数字车钥匙对应的移动终端的速度满足预定异常速度条件;或者所述至少一个数字车钥匙对应的移动终端的用户的生理特征满足预定异常生理条件。
图8A-图8D示出了可能的异常状态示例。其中,图8A是示出根据本公开的实施例的第一异常状态的示意图,图8B是示出根据本公开的实施例的第二异常状态的示意图,图8C是示出根据本公开的实施例的第三异常状态的示意图,图8D是示出根据本公开的实施例的第四异常状态的示意图。图8E是示出根据本公开的实施例的响应于数字车钥匙的当前状态为预定异常状态的操作的流程图。
图8A示出了在两个数字车钥匙(示为BLE数字车钥匙1和2)连接至车辆的情况下,这两个数字车钥匙之间的距离小于预定阈值的异常情况。可选地,在存在两个以上的移动终端连接到车辆时,当两个移动终端之间的距离小于预定阈值,考虑到在两个距离过小的移动 终端同时连接到车辆的情况在实际应用场景中较为少见,可能存在安全隐患,需要将其作为异常状态进行考虑,以进行进一步的安全认证。
图8B示出了在单个数字车钥匙(示为BLE数字车钥匙1)连接至车辆的情况下,该数字车钥匙的运动轨迹出现异常的情况。例如,在图8B所示的示例中,数字车钥匙围绕车辆重复运动,这在实际应用场景中较为少见,可能存在安全隐患(例如,移动终端的用户被追赶),需要将其作为异常状态进行考虑,以进行进一步的安全认证。
图8C示出了在单个数字车钥匙(示为BLE数字车钥匙1)连接至车辆的情况下,该数字车钥匙的运动状态出现异常的情况。例如,在图8C所示的示例中,数字车钥匙首先快速从远处冲向车辆,又立即以更快的速度逃离车辆至更远处,这在实际应用场景中较为少见,可能存在安全隐患(例如,移动终端的用户发现车辆异常并逃离),需要将其作为异常状态进行考虑,以进行进一步的安全认证。
图8D示出了在单个数字车钥匙(示为BLE数字车钥匙1)连接至车辆的情况下,该数字车钥匙的用户的生理特征出现异常的情况。例如,在图8D所示的示例中,数字车钥匙的用户以极高的心率靠近车辆(例如,心率为140),或者在另一移动终端设备的伴随下以很高的心率靠近车辆(例如,心率为130),这两种情况在实际应用场景中都较为少见,可能存在安全隐患(例如,移动终端的用户被挟持),需要将其作为异常状态进行考虑,以进行进一步的安全认证。
图8A至图8D仅为示例,本公开并不以此为限。可选地,在基于预定异常状态对移动终端的当前状态进行检测后,如果基于检测结果可以确定移动终端的当前状态属于预定异常状态,则可以对该移动终端进行进一步的安全认证,即基于第二认证条件的安全认证,如图8E所示。在图8E中,响应于确定移动终端的数字车钥匙的当前状态属于预定异常状态,可以启动双重安全认证,以执行基于第二认证条件的安全认证,并在确定数字车钥匙通过双重安全认证的情况下执行数字车钥匙对车辆的控制操作。
如上参考图8A-8D所述,本公开的系统可以包括车辆和至少一个移动终端,所述车辆可以对应于至少一个数字车钥匙,所述至少一 个数字车钥匙可以位于所述至少一个移动终端,其中,所述车辆可以被配置为执行上述方法,所述系统可以被配置为:所述车辆获取预先设置的预定异常状态;所述车辆接收所述至少一个移动终端的连接请求;所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;在确定所述至少一个数字车钥匙的认证信息满足第一认证条件的情况下,所述车辆基于所述至少一个数字车钥匙的认证信息,确定所述至少一个数字车钥匙的当前状态;在确定所述至少一个数字车钥匙的当前状态为预定异常状态的情况下,所述车辆确定所述至少一个数字车钥匙的认证信息是否满足所述第二认证条件;响应于所述至少一个数字车钥匙的认证信息满足所述第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
图9是示出根据本公开的实施例的基于预定异常状态判断执行安全认证的流程图。
具体地,图9示出了上述异常状态判断与安全认证执行过程相结合的整体流程,该整体流程可以包括如下所示的操作。
(1)车辆/车辆服务器接收用户设置的数字车钥匙的预定异常状态,该预定异常状态可以包括如上所述的多种异常状态中的一个或多个,这些异常状态之间可以是“和”或者“或”的关系;
(2)车辆接收用户设置的第二认证条件,或者车辆预置第二认证条件,其中,该第二认证条件可以包括上述条件①至⑤中的一个或多个,这些条件之间可以是“和”或者“或”的关系;
(3)车辆接收一个或多个移动终端的连接请求;
(4)车辆判断移动终端的数字车钥匙的当前状态是否属于数字车钥匙的预定异常状态,如果属于预定异常状态,则启动双重安全认证;
(5)当数字车钥匙的双重安全认证通过时,执行数字车钥匙对车辆的控制操作。
根据本公开的又一方面,还提供了一种电子设备。图10示出了根据本公开的实施例的电子设备2000的示意图。
如图10所示,所述电子设备2000可以包括一个或多个处理器 2010,和一个或多个存储器2020。其中,所述存储器2020中存储有计算机可读代码,所述计算机可读代码当由所述一个或多个处理器2010运行时,可以执行如上所述的车辆安全认证方法。
本公开的实施例中的处理器可以是一种集成电路芯片,具有信号的处理能力。上述处理器可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等,可以是X86架构或ARM架构的。
一般而言,本公开的各种示例实施例可以在硬件或专用电路、软件、固件、逻辑,或其任何组合中实施。某些方面可以在硬件中实施,而其他方面可以在可以由控制器、微处理器或其他计算设备执行的固件或软件中实施。当本公开的实施例的各方面被图示或描述为框图、流程图或使用某些其他图形表示时,将理解此处描述的方框、装置、系统、技术或方法可以作为非限制性的示例在硬件、软件、固件、专用电路或逻辑、通用硬件或控制器或其他计算设备,或其某些组合中实施。
例如,根据本公开的实施例的方法或装置也可以借助于图11所示的计算设备3000的架构来实现。如图11所示,计算设备3000可以包括总线3010、一个或多个CPU 3020、只读存储器(ROM)3030、随机存取存储器(RAM)3040、连接到网络的通信端口3050、输入/输出组件3060、硬盘3070等。计算设备3000中的存储设备,例如ROM 3030或硬盘3070可以存储本公开提供的车辆安全认证方法的处理和/或通信使用的各种数据或文件以及CPU所执行的程序指令。计算设备3000还可以包括用户界面3080。当然,图11所示的架构只是示例性的,在实现不同的设备时,根据实际需要,可以省略图11示出的计算设备中的一个或多个组件。
根据本公开的又一方面,还提供了一种计算机可读存储介质。图12示出了根据本公开的存储介质的示意图4000。
如图12所示,所述计算机存储介质4020上存储有计算机可读指令4010。当所述计算机可读指令4010由处理器运行时,可以执行参照以上附图描述的根据本公开的实施例的车辆安全认证方法。本公开的实施例中的计算机可读存储介质可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。非易失性存储器可以是只读存储器(ROM)、可编程只读存储器(PROM)、可擦除可编程只读存储器(EPROM)、电可擦除可编程只读存储器(EEPROM)或闪存。易失性存储器可以是随机存取存储器(RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、同步动态随机存取存储器(SDRAM)、双倍数据速率同步动态随机存取存储器(DDRSDRAM)、增强型同步动态随机存取存储器(ESDRAM)、同步连接动态随机存取存储器(SLDRAM)和直接内存总线随机存取存储器(DR RAM)。应注意,本文描述的方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。应注意,本文描述的方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本公开的实施例还提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行根据本公开的实施例的车辆安全认证方法。
需要说明的是,附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,所述模块、程序段、或代码的一部分包含至少一个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。 也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
一般而言,本公开的各种示例实施例可以在硬件或专用电路、软件、固件、逻辑,或其任何组合中实施。某些方面可以在硬件中实施,而其他方面可以在可以由控制器、微处理器或其他计算设备执行的固件或软件中实施。当本公开的实施例的各方面被图示或描述为框图、流程图或使用某些其他图形表示时,将理解此处描述的方框、装置、系统、技术或方法可以作为非限制性的示例在硬件、软件、固件、专用电路或逻辑、通用硬件或控制器或其他计算设备,或其某些组合中实施。
在上面详细描述的本公开的示例实施例仅仅是说明性的,而不是限制性的。本领域技术人员应该理解,在不脱离本公开的原理和精神的情况下,可对这些实施例或其特征进行各种修改和组合,这样的修改应落入本公开的范围内。

Claims (28)

  1. 一种车辆安全认证方法,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于至少一个移动终端,包括:
    接收所述至少一个移动终端的连接请求;
    获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;以及
    在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作,其中,所述安全认证条件包括第一认证条件和第二认证条件。
  2. 根据权利要求1所述的方法,其中,所述在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作包括:
    在所述至少一个数字车钥匙的认证信息满足所述第一认证条件和所述第二认证条件的情况下,执行所述至少一个数字车钥匙对应的操作。
  3. 如权利要求2所述的方法,其中,所述第二认证条件包括以下中的至少一个:
    至少两个数字车钥匙的认证信息通过所述第一认证条件;
    至少两个数字车钥匙通过所述第一认证条件,并且所述至少两个数字车钥匙对应的移动终端之间的相对位置都满足第一预定条件;
    所述至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件;
    所述至少一个数字车钥匙对应的移动终端通过身份信息校验;或者
    所述至少一个数字车钥匙对应的移动终端执行特定操作。
  4. 如权利要求3所述的方法,其中,所述车辆包括多个通信节点,所述多个通信节点包括蓝牙BLE节点、近场通信NFC节点、 和超宽带UWB节点中的一个或多个;
    所述相对位置是通过所述多个通信节点确定的,其中,所述至少两个数字车钥匙对应的移动终端之间的相对位置包括所述至少两个数字车钥匙对应的移动终端之间的距离和角度中的一个或多个;
    所述第一预定条件包括以下中的一个或多个:
    所述至少两个数字车钥匙对应的移动终端之间的距离满足预定距离条件;或者
    所述至少两个数字车钥匙对应的移动终端之间的角度满足预定角度条件。
  5. 如权利要求3所述的方法,其中,所述至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件包括:
    对于所述至少一个数字车钥匙对应的移动终端中的每一个,所述移动终端相对于所述多个通信节点中的一个通信节点的位置满足预定位置条件;或者
    对于所述至少一个数字车钥匙对应的移动终端中的每一个,所述移动终端相对于所述多个通信节点中的至少两个通信节点的轨迹满足预定轨迹条件。
  6. 如权利要求5所述的方法,其中,所述移动终端相对于所述多个通信节点中的一个通信节点的位置包括所述移动终端相对于所述多个通信节点中的一个通信节点的距离和角度中的一个或多个;
    其中,所述移动终端相对于所述多个通信节点中的一个通信节点的位置是通过以下方式确定的:
    在所述通信节点为NFC节点的情况下,通过所述NFC节点获取所述位置;
    在所述通信节点为BLE节点的情况下,判断所述多个通信节点中的各个BLE节点与所述移动终端的信号强度,并通过具有与所述移动终端的最大信号强度的BLE节点获取所述位置;或者
    在所述通信节点为BLE节点的情况下,通过UWB节点获取所 述移动终端的位置,以确定所述移动终端相对于所述BLE节点的位置。
  7. 如权利要求5所述的方法,其中,所述预定轨迹条件为所述移动终端按照预定轨迹通过所述至少两个通信节点的覆盖区域,所述预定轨迹包括通过所述至少两个通信节点的覆盖区域的预定顺序和进入所述至少两个通信节点的覆盖区域的预定角度中的至少一个。
  8. 如权利要求3所述的方法,其中,所述身份信息校验包括针对移动终端的生物特征校验和非生物特征校验中的至少一个;
    其中,所述生物特征校验与所述移动终端的面部特征、指纹特征、呼吸特征或心跳特征中的一个或多个相关;
    所述非生物特征校验与所述移动终端的物理操作校验相关,所述物理操作校验包括认证密码信息校验。
  9. 如权利要求3所述的方法,其中,所述特定操作包括所述移动终端的可操作部件执行预定动作。
  10. 如权利要求9所述的方法,其中,所述可操作部件包括可折叠屏幕、柔性屏幕或卷轴屏幕。
  11. 如权利要求2所述的方法,其中,在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作包括:
    基于所述至少一个数字车钥匙的认证信息,确定用于所述至少一个数字车钥匙的第二认证条件;
    其中,所述基于所述至少一个数字车钥匙的认证信息确定用于所述至少一个数字车钥匙的第二认证条件是通过预先训练的安全认证模型执行的,其中,所述安全认证模型基于所述至少一个数字车钥匙的认证信息选择用于所述至少一个数字车钥匙的第二认证条件。
  12. 如权利要求2所述的方法,其中,在所述至少一个数字车钥匙的认证信息满足安全认证条件的情况下,执行所述至少一个数字车钥匙对应的操作还包括:
    在所述至少一个数字车钥匙的认证信息满足第一认证条件的情况下,基于所述至少一个数字车钥匙的认证信息,确定所述至少一个数字车钥匙的当前状态;以及
    在确定所述至少一个数字车钥匙的当前状态为预定异常状态的情况下,确定所述至少一个数字车钥匙的认证信息是否满足所述第二认证条件。
  13. 如权利要求12所述的方法,其中,所述预定异常状态包括以下中的至少一个:
    至少两个数字车钥匙对应的移动终端之间的距离小于预定阈值;
    所述至少一个数字车钥匙对应的移动终端的轨迹满足预定异常轨迹条件;
    所述至少一个数字车钥匙对应的移动终端的速度满足预定异常速度条件;或者
    所述至少一个数字车钥匙对应的移动终端的用户的生理特征满足预定异常生理条件。
  14. 如权利要求2所述的方法,其中,所述方法还包括:
    从所述车辆的车辆服务器同步所述第二认证条件,所述第二认证条件由移动终端设置于所述车辆服务器。
  15. 如权利要求2所述的方法,其中,所述在所述至少一个数字车钥匙的认证信息满足所述第一认证条件和所述第二认证条件的情况下,执行所述至少一个数字车钥匙对应的操作还包括:
    确定所述至少一个数字车钥匙的认证信息是否满足所述第一认证条件;
    其中,所述确定所述至少一个数字车钥匙的认证信息是否满足所述第一认证条件包括:
    所述至少一个移动终端与所述车辆建立蓝牙通信连接;
    所述车辆通知所述至少一个移动终端成功建立蓝牙通信连接并且所述至少一个数字车钥匙的使用状态正常;
    所述车辆与所述至少一个移动终端进行快速认证;
    响应于快速认证失败,所述车辆与所述至少一个移动终端进行标准认证;
    响应于标准认证失败且错误原因是所述至少一个数字车钥匙的标识符未知,所述车辆从所述至少一个移动终端获取朋友钥匙认证信息,并用所述车辆的主数字车钥匙公钥验证所述朋友钥匙认证信息中的签名,响应于所述签名的验证通过,所述车辆保存所述朋友钥匙认证信息中的至少一个数字车钥匙的公钥,并用所述至少一个数字车钥匙的公钥验证所述至少一个移动终端传输的签名;
    响应于标准认证失败且错误原因不是所述至少一个数字车钥匙的标识符未知,确定所述至少一个移动终端与所述车辆之间的认证失败,并确定所述至少一个数字车钥匙的认证信息不满足所述第一认证条件;
    响应于快速认证成功或标准认证成功或所述至少一个移动终端的签名通过,所述车辆与所述至少一个移动终端建立安全信息通道并获取所述至少一个数字车钥匙的业务数据,并且确定所述至少一个数字车钥匙的认证信息满足所述第一认证条件。
  16. 如权利要求15所述的方法,其中,所述车辆与所述至少一个移动终端进行标准认证包括:
    所述车辆生成车辆临时公私钥对;
    所述车辆向所述至少一个移动终端发送公钥交换请求,传输车辆临时公钥和车辆标识符;
    所述至少一个移动终端生成数字车钥匙临时公私钥对;
    所述至少一个移动终端向所述车辆发送公钥交换请求响应,并返 回数字车钥匙临时公钥和数字车钥匙标识符;
    所述车辆生成车辆认证信息,所述车辆认证信息包括数字车钥匙临时公钥、车辆临时公钥和数字车钥匙标识符相关信息,并使用车辆私钥对车辆认证信息进行签名,以用于所述至少一个移动终端验证所述车辆的身份;
    所述车辆向所述至少一个移动终端发送标准认证请求,并向所述至少一个移动终端传输车辆认证信息签名;
    所述至少一个移动终端使用车辆公钥验证所述车辆认证信息签名;
    在所述车辆认证信息签名验证通过的情况下,所述至少一个移动终端生成数字车钥匙认证信息,所述数字车钥匙认证信息包括数字车钥匙临时公钥、车辆临时公钥和车辆ID相关信息,并使用数字车钥匙私钥对所述数字车钥匙认证信息进行签名;
    所述至少一个移动终端向所述车辆发送标准认证请求响应,并向所述车辆传输数字车钥匙认证信息签名;
    所述至少一个移动终端与所述车辆使用临时密钥对协商对称密钥,并根据所协商的对称密钥,使用密钥派生函数算法生成安全通道密钥和快速认证密钥,并且所述至少一个移动终端使用相同的密钥协商算法和密钥派生函数算法生成安全通道密钥和快速认证密钥,基于相同的安全通道密钥,所述至少一个移动终端与所述车辆建立安全通道;
    根据所述至少一个移动终端传输的数字车钥匙标识符,所述车辆内部查询数字车钥匙标识符以获取对应的数字车钥匙公钥,在所述车辆无法查询到所述数字车钥匙标识符及其对应的数字车钥匙公钥的情况下,获取朋友钥匙的数字车钥匙公钥;
    在所述车辆内部查询到所述数字车钥匙标识符对应的数字车钥匙公钥的情况下或获取到所述朋友钥匙的数字车钥匙公钥的情况下,使用所述数字车钥匙标识符对应的数字车钥匙公钥对所述至少一个移动终端传输的数字车钥匙认证信息签名进行验证;
    在所述验证成功的情况下,确定所述标准认证成功。
  17. 如权利要求15所述的方法,其中,所述车辆与所述至少一个移动终端进行快速认证包括:
    所述车辆生成车辆临时公私钥对;
    所述车辆向所述至少一个移动终端发送公钥交换请求,并传输车辆临时公钥和车辆标识符;
    所述至少一个移动终端生成数字车钥匙临时公私钥对;
    所述至少一个移动终端使用快速认证密钥和密钥派生函数算法生成第一密钥和安全通道密钥;
    所述至少一个移动终端使用第一密钥生成数字车钥匙快速认证信息;
    所述至少一个移动终端向所述车辆发送公钥交换请求响应,并返回数字车钥匙快速认证信息、数字车钥匙临时公钥和数字车钥匙标识符;
    在所述车辆没有找到所述数字车钥匙标识符对应的快速认证密钥的情况下,所述车辆与所述至少一个移动终端进行快速认证,并且在所述车辆找到所述数字车钥匙标识符对应的快速认证密钥的情况下,使用所述快速认证密钥和密钥派生函数算法生成第一密钥和安全通道密钥;
    所述车辆使用第一密钥对数字车钥匙快速认证信息进行验证,完成所述车辆对所述至少一个移动终端的认证;
    所述车辆使用第一密钥生成车辆快速认证信息;
    所述车辆向所述至少一个移动终端发送所述快速认证请求,并传输车辆快速认证信息;
    所述至少一个移动终端使用第一密钥对所述车辆快速认证信息进行验证,完成所述至少一个移动终端对所述车辆的认证;
    所述至少一个移动终端向所述车辆发送快速认证请求响应,在所述车辆对所述至少一个移动终端的认证和所述至少一个移动终端对所述车辆的认证均成功的情况下,确定快速认证成功。
  18. 一种车辆,所述车辆被配置为执行权利要求1至17中任一项所述的方法。
  19. 一种移动终端,所述移动终端包括至少一个数字车钥匙,所述数字车钥匙被配置为与执行权利要求1至17中任一项所述的方法的车辆进行交互。
  20. 一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行权利要求1对应的方法,所述系统被配置为:
    所述车辆接收所述至少一个移动终端的连接请求;
    所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;
    响应于至少两个数字车钥匙的认证信息在预定时间段内通过第一认证条件,并且所述至少两个数字车钥匙对应的移动终端之间的相对位置都满足第一预定条件,确定所述至少一个数字车钥匙的认证信息满足第二认证条件;
    响应于确定所述至少一个数字车钥匙的认证信息满足第二认证条件,执行所述至少一个数字车钥匙对应的操作。
  21. 一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行权利要求1对应的方法,所述系统被配置为:
    所述车辆接收所述至少一个移动终端的连接请求;
    所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;
    所述车辆基于所述至少一个数字车钥匙的认证信息确定所述至少一个数字车钥匙对应的移动终端的轨迹;
    响应于所述至少一个数字车钥匙对应的移动终端的轨迹满足第二预定条件,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;
    响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
  22. 一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行权利要求1对应的方法,所述系统被配置为:
    所述车辆接收所述至少一个移动终端的连接请求;
    所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;
    所述车辆触发所述至少一个移动终端进行身份信息校验;
    所述至少一个移动终端进行身份信息校验,并向所述车辆返回身份信息校验结果;
    响应于所述身份信息校验结果通过,确定所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息满足所述第二认证条件;
    响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
  23. 一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行权利要求1对应的方法,所述系统被配置为:
    所述车辆接收所述至少一个移动终端的连接请求;
    所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;
    响应于所述至少一个移动终端执行预定操作,确定所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息满足所述第二认 证条件;
    响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
  24. 一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行权利要求3对应的方法,所述系统被配置为:
    所述车辆从所述车辆的车辆服务器同步所述第二认证条件;
    所述车辆接收所述至少一个移动终端的连接请求;
    所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;
    在所述第二认证条件包括权利要求3所述的第二认证条件中的两项第二认证条件且所述两项第二认证条件的关系为与关系的情况下,响应于所述至少一个数字车钥匙的认证信息同时满足所述两项第二认证条件,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;
    在所述第二认证条件包括权利要求3所述的第二认证条件中的两项第二认证条件且所述两项第二认证条件的关系为或关系的情况下,响应于所述至少一个数字车钥匙的认证信息满足所述两项第二认证条件中的任一项,确定所述至少一个数字车钥匙的认证信息满足所述第二认证条件;
    响应于所述至少一个数字车钥匙的认证信息满足第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操作。
  25. 一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行权利要求3对应的方法,所述系统被配置为:
    所述车辆被设置有多个安全认证模型,其中每个安全认证模型对 应于权利要求3所述的第二认证条件中的一项第二认证条件;
    所述车辆提取所述多个安全认证模型的对应参数;
    所述车辆接收所述至少一个移动终端的连接请求;
    所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;
    所述车辆从所述至少一个数字车钥匙的认证信息中获取所述多个安全认证模型的对应参数的数值;
    所述车辆基于所述多个安全认证模型的对应参数的所述数值来确定所述至少一个数字车钥匙与所述多个安全认证模型的匹配度,并从所述多个安全认证模型中确定与所述至少一个数字车钥匙匹配度最高的安全认证模型;
    所述车辆将所述安全认证模型设置为用于所述至少一个数字车钥匙的安全认证模型。
  26. 一种系统,所述系统包括车辆和至少一个移动终端,所述车辆对应于至少一个数字车钥匙,所述至少一个数字车钥匙位于所述至少一个移动终端,其中,所述车辆被配置为执行权利要求1对应的方法,所述系统被配置为:
    所述车辆获取预先设置的预定异常状态;
    所述车辆接收所述至少一个移动终端的连接请求;
    所述车辆获取所述至少一个移动终端上的所述至少一个数字车钥匙的认证信息;
    在确定所述至少一个数字车钥匙的认证信息满足第一认证条件的情况下,所述车辆基于所述至少一个数字车钥匙的认证信息,确定所述至少一个数字车钥匙的当前状态;
    在确定所述至少一个数字车钥匙的当前状态为预定异常状态的情况下,所述车辆确定所述至少一个数字车钥匙的认证信息是否满足所述第二认证条件;
    响应于所述至少一个数字车钥匙的认证信息满足所述第一认证条件和所述第二认证条件,执行所述至少一个数字车钥匙对应的操 作。
  27. 一种计算机程序产品,所述计算机程序产品存储在计算机可读存储介质上,并且包括计算机指令,所述计算机指令在由处理器运行时使得计算机设备执行权利要求1至17中任一项所述的方法。
  28. 一种电子设备,所述的包括:一个或多个处理器;以及一个或多个存储器,其中,所述一个或多个存储器中存储有计算机可执行程序,当由所述处理器执行所述计算机可执行程序时,执行权利要求1至17中任一项所述的方法。
PCT/CN2023/114924 2022-08-26 2023-08-25 车辆安全认证方法 WO2024041635A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211038023.2A CN117676468A (zh) 2022-08-26 2022-08-26 车辆安全认证方法
CN202211038023.2 2022-08-26

Publications (1)

Publication Number Publication Date
WO2024041635A1 true WO2024041635A1 (zh) 2024-02-29

Family

ID=90012559

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/114924 WO2024041635A1 (zh) 2022-08-26 2023-08-25 车辆安全认证方法

Country Status (2)

Country Link
CN (1) CN117676468A (zh)
WO (1) WO2024041635A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310389A (zh) * 2018-08-30 2019-10-08 林德(中国)叉车有限公司 一种基于叉车钥匙的身份认证和信息存储系统及叉车钥匙
CN111835689A (zh) * 2019-04-22 2020-10-27 华为技术有限公司 数字钥匙的身份认证方法、终端设备及介质
CN112995948A (zh) * 2021-02-03 2021-06-18 北京小米移动软件有限公司 车辆功能控制方法、车辆功能控制装置及存储介质
CN113920616A (zh) * 2020-06-24 2022-01-11 广州汽车集团股份有限公司 车辆与蓝牙钥匙安全连接的方法、蓝牙模块、蓝牙钥匙

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310389A (zh) * 2018-08-30 2019-10-08 林德(中国)叉车有限公司 一种基于叉车钥匙的身份认证和信息存储系统及叉车钥匙
CN111835689A (zh) * 2019-04-22 2020-10-27 华为技术有限公司 数字钥匙的身份认证方法、终端设备及介质
CN113920616A (zh) * 2020-06-24 2022-01-11 广州汽车集团股份有限公司 车辆与蓝牙钥匙安全连接的方法、蓝牙模块、蓝牙钥匙
CN112995948A (zh) * 2021-02-03 2021-06-18 北京小米移动软件有限公司 车辆功能控制方法、车辆功能控制装置及存储介质

Also Published As

Publication number Publication date
CN117676468A (zh) 2024-03-08

Similar Documents

Publication Publication Date Title
US20220109561A1 (en) Smart lock unlocking method and related device
EP3215973B1 (en) Distributing biometric authentication between devices in an ad hoc network
CN107067563B (zh) 车辆共享附件设备和系统
US9701280B2 (en) Revocation of mobile device communication control privileges
KR101586228B1 (ko) 얼굴인식과 동작인식을 이용한 자동차 제어 장치 및 방법
CN111835689B (zh) 数字钥匙的身份认证方法、终端设备及介质
US8229358B2 (en) Identification, authentication and coverage control method
JP2018506663A (ja) 自動車両の少なくとも1つの機能へのアクセスを制御する方法
TW202031028A (zh) 包含電子鎖之物聯網裝置的驗證
EP3469852B1 (en) Authorized control of an embedded system using end-to-end secure element communication
US11245523B2 (en) Method for implementing client side credential control to authorize access to a protected device
JP6898139B2 (ja) ユーザ認証システム及びユーザ認証方法
CN105196971B (zh) 车辆控制方法、装置、系统及车辆
WO2024041635A1 (zh) 车辆安全认证方法
JP7057944B2 (ja) 認証システム及び認証方法
WO2024041630A1 (zh) 用于操作车辆的方法
KR20220098656A (ko) Ble 및 지문 방식에 기반한 차량 인증 시스템 및 방법
TWI739086B (zh) 可攜式認證裝置與裝置內自行登錄認證資料的方法
CN111369716A (zh) 解锁方法、门锁及计算机可读存储介质
US20240056306A1 (en) Intelligent arrangement of unlock notifications
US20230242076A1 (en) Fingerprint Data Reset System and Fingerprint Data Reset Method
WO2020158860A1 (ja) 認証システム及び認証方法
US11991174B2 (en) Authentication system with an automatic authentication mechanism and automatic authentication method
TWI699987B (zh) 車載聯網電子系統的控制方法
JP2023044276A (ja) 情報処理装置、及び情報処理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23856721

Country of ref document: EP

Kind code of ref document: A1