CN109727354A - A kind of control method and system of vehicle - Google Patents
A kind of control method and system of vehicle Download PDFInfo
- Publication number
- CN109727354A CN109727354A CN201811615317.0A CN201811615317A CN109727354A CN 109727354 A CN109727354 A CN 109727354A CN 201811615317 A CN201811615317 A CN 201811615317A CN 109727354 A CN109727354 A CN 109727354A
- Authority
- CN
- China
- Prior art keywords
- target vehicle
- vehicle
- information
- authority
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000006854 communication Effects 0.000 claims abstract description 77
- 238000004891 communication Methods 0.000 claims abstract description 72
- 238000013475 authorization Methods 0.000 claims abstract description 44
- 230000009471 action Effects 0.000 claims description 25
- 230000001960 triggered effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 5
- 239000004973 liquid crystal related substance Substances 0.000 description 3
- 239000000835 fiber Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of control method of vehicle and systems, this method comprises: server generates the authorization message of target vehicle, the authorization message of target vehicle includes the identity information and the first authority information of target vehicle, first authority information is to be obtained by server using the second authority information of management key pair encryption of target vehicle, and the second authority information is used for designated vehicle control authority;The authorization message of target vehicle is sent to terminal by server, and the first authority information is sent to target vehicle by close range wireless communication modes according to the identity information of target vehicle by terminal;Target vehicle is decrypted using the first authority information of management key pair of target vehicle, to obtain the second authority information.
Description
Technical Field
The invention relates to the technical field of vehicles, in particular to a vehicle control method and system.
Background
Shared vehicles (e.g., shared bicycles, shared electric vehicles, and shared automobiles) are increasingly used in daily life due to their convenience of use.
When a user wants to use the shared vehicle, the terminal of the user needs to establish a remote wireless communication connection with the server, and the shared vehicle and the server also need to establish the remote wireless communication connection, so that the user can obtain the control authority of the shared vehicle. Taking the unlocking process of the shared bicycle as an example, the user terminal reads the two-dimensional code or the serial number of the shared bicycle in a scanning mode and the like, and requests the server to unlock the shared bicycle; the server sends an unlocking instruction to the shared bicycle when receiving the request; and when the shared bicycle receives the unlocking instruction, unlocking is performed.
However, when the shared vehicle is parked in a non-traffic area, such as a basement or the interior of a building, communication connections cannot be established between the terminal and the server and between the shared vehicle and the server. In this case, the user cannot obtain the control authority for the shared vehicle, for example, the unlocking authority described above, so that the user cannot control the vehicle.
Therefore, there is a need for a new vehicle control method that can ensure that the user can normally control the vehicle even in the area without signal.
Disclosure of Invention
It is an object of embodiments of the present invention to provide a new vehicle control solution.
According to a first aspect of the present invention, there is provided a control method of a vehicle, comprising:
the method comprises the steps that a server generates authorization information of a target vehicle, wherein the authorization information of the target vehicle comprises identity information of the target vehicle and first authority information, the first authority information is obtained by encrypting second authority information by the server through a management key of the target vehicle, and the second authority information is used for appointing vehicle control authority;
the server sends the authorization information of the target vehicle to a terminal, and the terminal sends the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle;
the target vehicle decrypts the first right information using the management key of the target vehicle to obtain the second right information.
Optionally, when the terminal sends the first permission information to the target vehicle in a short-range wireless communication manner according to the identity information of the target vehicle, the target vehicle is in a state where the communication with the server is unavailable, and the terminal is in a state where the communication with the server is available or unavailable.
Optionally, the vehicle control authority specified by the second authority information includes an unlocking control authority;
and after the target vehicle obtains the second authority information, controlling the target vehicle to execute an unlocking action.
Optionally, the vehicle control authority specified by the second authority information includes any one or a combination of the following:
lock control authority, window control authority, car light control authority, control authority of whistling.
Optionally, after obtaining the second permission information, the target vehicle sends the second permission information to the terminal;
after the terminal receives the second authority information from the target vehicle, buttons corresponding to the vehicle control authorities specified by the second authority information one by one are provided on an interface of the terminal;
the terminal sends a vehicle control command corresponding to the triggered button to the target vehicle according to the triggering operation of the button by the user;
and after the target vehicle receives the vehicle control command, controlling the target vehicle to execute an action corresponding to the vehicle control command.
Optionally, after receiving the vehicle control command, the target vehicle is controlled to execute an action corresponding to the vehicle control command, where the action includes:
after receiving the vehicle control command, the target vehicle determines whether the vehicle control command is within the vehicle control authority specified by the second authority information;
and if the vehicle control command is in the vehicle control authority specified by the second authority information, controlling the target vehicle to execute an action corresponding to the vehicle control command.
Optionally, the second authority information is further used for specifying an effective time of the vehicle control authority;
after the target vehicle receives the vehicle control command, the target vehicle is controlled to execute an action corresponding to the vehicle control command, and the action comprises the following steps:
after receiving the vehicle control command, the target vehicle determines whether the vehicle control command is within the vehicle control authority specified by the second authority information;
if the vehicle control command is within the vehicle control authority specified by the second authority information, determining whether the current time is within the valid time of the vehicle control authority corresponding to the control command;
and if the current time is within the valid time of the vehicle control authority corresponding to the control command, controlling the target vehicle to execute the action corresponding to the vehicle control command.
Optionally, the authorization information of the target vehicle further includes a first session key and a second session key, where the first session key is obtained by encrypting, by the server, the second session key using a management key of the target vehicle;
the method further comprises the following steps:
the terminal forwards the first session key to the target vehicle in a near field wireless communication mode;
the target vehicle decrypts the first session key using a management key of the target vehicle to obtain the second session key;
and in the subsequent short-distance wireless communication process of the terminal and the target vehicle, the sender uses the second session key to encrypt the sent information, and the receiver uses the second session key to decrypt the received information.
Optionally, the method further includes:
the target vehicle generates a vehicle usage report and encrypts the vehicle usage report by using a management key of the target vehicle to obtain an encrypted vehicle usage report;
the target vehicle sends the encrypted vehicle use report to the terminal in a short-distance wireless communication mode, and the terminal sends the encrypted vehicle use report to the server;
the server decrypts the encrypted vehicle usage report information using the vehicle management key of the target vehicle to acquire the vehicle usage report.
Optionally, when the target vehicle sends the encrypted vehicle use report to the terminal in a short-range wireless communication manner, the target vehicle is in a state where communication with the server is impossible, and the terminal is in a state where communication with the server is possible or impossible.
According to a second aspect of the present invention, there is also provided a control system of a vehicle, including a server, a target vehicle, and a terminal; wherein,
the server is used for generating authorization information of a target vehicle, wherein the authorization information of the target vehicle comprises identity information of the target vehicle and first authority information, the first authority information is obtained by encrypting second authority information by using a management key of the target vehicle through the server, and the second authority information is used for appointing vehicle control authority;
the server is further used for sending the authorization information of the target vehicle to a terminal, and the terminal forwards the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle;
the target vehicle is further configured to decrypt the first permission information using a management key of the target vehicle to obtain the second permission information.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments will be briefly described below. It is appreciated that the following drawings depict only certain embodiments of the invention and are therefore not to be considered limiting of its scope. For a person skilled in the art, it is possible to derive other relevant figures from these figures without inventive effort.
FIG. 1 illustrates a schematic block diagram of a shared vehicle system provided by an embodiment of the present disclosure;
FIG. 2 illustrates a flow chart of a vehicle control method provided by an embodiment of the present disclosure;
fig. 3 shows a schematic flow chart of another vehicle control method provided by the embodiment of the disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
< shared vehicle System >
FIG. 1 is a block diagram of a hardware configuration of a shared vehicle train 100 that may be used to implement the present disclosure.
As shown in fig. 1, the shared vehicle system 100 includes a server 1000, a terminal 2000, and a vehicle 3000.
The server 1000 provides a service point for processes, databases, and communications facilities. The server 1000 may be a unitary server or a distributed server across multiple computers or computer data centers. The server may be of various types, such as, but not limited to, a web server, a news server, a mail server, a message server, an advertisement server, a file server, an application server, an interaction server, a database server, or a proxy server. In some embodiments, each server may include hardware, software, or embedded logic components or a combination of two or more such components for performing the appropriate functions supported or implemented by the server. For example, a server, such as a blade server, a cloud server, etc., or may be a server group consisting of a plurality of servers, which may include one or more of the above types of servers, etc.
In one embodiment, the server 1000 may be as shown in fig. 1, including a processor 1100, a memory 1200, an interface device 1300, a communication device 1400, a display device 1500, an input device 1600.
In other embodiments, the server 1000 may further include a speaker, a microphone, and the like, which are not limited herein.
The processor 1100 may be a dedicated server processor, or may be a desktop processor, a mobile version processor, or the like that meets performance requirements, and is not limited herein. The memory 1200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 1300 includes, for example, various bus interfaces such as a serial bus interface (including a USB interface), a parallel bus interface, and the like. Communication device 1400 is capable of wired or wireless communication, for example. The display device 1500 is, for example, a liquid crystal display, an LED display touch panel, or the like. The input device 1600 may include, for example, a touch screen, a keyboard, and the like.
Although a plurality of devices of the server 1000 are illustrated in fig. 1, the present invention may relate to only some of the devices, for example, the server 1000 relates to only the memory 1200 and the processor 1100.
In this embodiment, the terminal 2000 is, for example, a mobile phone, a portable computer, a tablet computer, a palm computer, a wearable device, or the like.
As shown in fig. 1, the terminal 2000 may include a processor 2100, a memory 2200, an interface device 2300, a communication device 2400, a display device 2500, an input device 2600, a speaker 2700, a microphone 2800, and the like.
The processor 2100 may be a mobile version processor. The memory 2200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface device 2300 includes, for example, a USB interface, a headphone interface, and the like. The communication device 2400 can perform wired or wireless communication, for example, the communication device 2400 may include a short-range communication device, such as any device that performs short-range wireless communication based on a short-range wireless communication protocol, such as a Hilink protocol, WiFi (IEEE 802.11 protocol), Mesh, bluetooth, ZigBee, Thread, Z-Wave, NFC, UWB, LiFi, and the like, and the communication device 2400 may also include a remote communication device, such as any device that performs WLAN, GPRS, 2G/3G/4G/5G remote communication. The display device 2500 is, for example, a liquid crystal display panel, a touch panel, or the like. The input device 2600 may include, for example, a touch screen, a keyboard, and the like. A user can input/output voice information through the speaker 2700 and the microphone 2800.
Although a plurality of devices of the terminal 2000 are illustrated in fig. 1, the present invention may relate only to some of the devices, for example, the terminal 2000 relates only to the memory 2200 and the processor 2100, the communication device 2400, and the display device 2500.
The vehicle 3000 is any vehicle that can give the right to share the use by different users in time or separately, for example, a shared bicycle, a shared moped, a shared electric vehicle, a shared vehicle, and the like. The vehicle 3000 may be a bicycle shown in fig. 1, and may be of various forms such as a tricycle, an electric scooter, a motorcycle, and a four-wheeled passenger vehicle.
As shown in fig. 1, a vehicle 3000 may have a vehicle management device provided on its body, and the vehicle management device includes, for example, a processor 3100, a memory 3200, an interface device 3300, a communication device 3400, a display device 3500, an input device 3600, a speaker 3700, a microphone 3800, a battery, and the like. Wherein the battery powers other components or devices of the vehicle management device. The processor 3100 may be a microprocessor MCU or the like. The memory 3200 includes, for example, a ROM (read only memory), a RAM (random access memory), a nonvolatile memory such as a hard disk, and the like. The interface 3300 includes, for example, a USB interface, a headphone interface, and the like. The communication device 3400 is capable of wired or wireless communication, for example, and also capable of short-range and long-range communication, for example. The output device 3500 may be, for example, a device that outputs a signal, may be a display device such as a liquid crystal display panel or a touch panel, or may be a speaker or the like that outputs voice information or the like. The input device 3600 may include, for example, a touch panel, a keyboard, or the like, and may input voice information through a microphone.
Although a plurality of devices of the vehicle 3000 are shown in fig. 1, the present invention may relate only to some of the devices, for example, the vehicle 3000 relates only to the communication device 3400, the memory 3200, and the processor 3100. Alternatively, a lock mechanism, not shown in fig. 1, controlled by the processor 3100, and a sensor device for detecting a state of the lock mechanism, etc. may also be included.
The network 4000 may be a wireless communication network or a wired communication network, may be a local area network or a wide area network, and may be short-range communication or long-range communication. In the shared vehicle system 100 shown in fig. 1, a vehicle 3000 and a server 1000, and a terminal 2000 and the server 1000 can communicate with each other through a network 4000. The vehicle 3000 may be the same as the server 1000, and the network 4000 through which the terminal 2000 communicates with the server 1000 may be different from each other.
It should be understood that although fig. 1 shows only one server 1000, terminal 2000, vehicle 3000, there is no intention to limit the number of each, and multiple servers 1000, multiple terminals 2000, multiple vehicles 3000 may be included in the shared vehicle system 100.
In the above description, the skilled person can design the instructions according to the solutions provided in the present disclosure. How the instructions control the operation of the processor is well known in the art and will not be described in detail herein.
< general concept >
The general concept of the present embodiment is to provide a new vehicle control method:
the server generates authorization information of the target vehicle, wherein the authorization information of the target vehicle comprises identity information of the target vehicle and first authority information, the first authority information is obtained by encrypting second authority information by the server through a management key of the target vehicle, and the second authority information is used for appointing vehicle control authority.
The server sends the authorization information of the target vehicle to the terminal, and the terminal sends the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle.
The target vehicle decrypts the first right information using the management key of the target vehicle to obtain the second right information.
The vehicle management device is arranged on the body of the target vehicle and is powered by a battery, when the battery power is too low, the long-distance wireless communication function of the vehicle management device cannot work normally, and the short-distance wireless communication module of the vehicle management device can still be used normally.
Or, the target vehicle is parked in a no-signal area, the target vehicle cannot communicate with the server, and the short-range wireless function of the target vehicle is normal.
Therefore, when the terminal is in the signal area, the terminal can perform long-distance wireless communication with the server, and acquire the authorization information of the target vehicle from the server in advance. And then, in the vicinity of the target vehicle, the authorization information is forwarded to the target vehicle based on the short-range wireless communication mode. The target vehicle decrypts the authorization information of the target vehicle through the vehicle management key stored in advance so as to obtain the second authority information, so that the user can still control the vehicle.
In addition, the vehicle control authority is encrypted by the server using the management key of the target vehicle, and only the server and the target vehicle know the management key of the target vehicle, and the terminal does not know the management key of the target vehicle. The terminal plays a forwarding role in the vehicle control method provided by the application so as to forward the first authority information of the target vehicle to the target vehicle, and when the target vehicle acquires the first authority information, the first authority information is decrypted according to a management key of the target vehicle stored by the terminal, so that the vehicle control authority information is acquired. Since the terminal does not know the management key of the target vehicle all the time, the safety of the whole control process is ensured.
< example >
The vehicle control method provided by the embodiment of the disclosure, as shown in fig. 1, includes the following steps S101 to S103:
s101, the server generates authorization information of the target vehicle, wherein the authorization information of the target vehicle comprises identity information of the target vehicle and first authority information, the first authority information is obtained by encrypting second authority information by the server through a management key of the target vehicle, and the second authority information is used for appointing vehicle control authority.
Specifically, when the server is in long-distance wireless connection with the terminal equipment, the terminal sends a vehicle application request to the server. The above request for applying for a vehicle includes, for example: location information of the terminal and a terminal identification. Of course, other information may be included, such as the type of usable vehicle that the request is intended to use.
And when receiving a vehicle application request sent by the terminal, the server reads the position information and the terminal identification of the terminal from the vehicle application request and selects a target vehicle for the terminal based on the position information and the terminal identification. Optionally, the server selects a vehicle closest to the terminal as the target vehicle according to the position information of the terminal. Optionally, in order to meet the personalized requirements of the user, the server may also recommend a plurality of vehicles for the user based on a vehicle application request sent by the terminal, and the user specifies a target vehicle.
And after the server selects the target vehicle, generating the authorization information of the target vehicle based on the identity information of the target vehicle and the second authority information. The identification information of the target vehicle may be a MAC address, an ID, or a serial number of the target vehicle. Optionally, the vehicle control authority specified by the second authority information includes an unlocking control authority. Further optionally, the vehicle control authority specified by the second authority information includes any one of a lock control authority, a window control authority, a vehicle lamp control authority, and a whistle control authority, or any combination thereof. Further, the vehicle control authority specified by the second authority information may also be a vehicle control authority requested by the terminal.
S102, the server sends the authorization information of the target vehicle to the terminal, and the terminal sends the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle.
When the terminal in S102 transmits the first authority information to the target vehicle by the short-range wireless communication method based on the identification information of the target vehicle, the target vehicle is in a state of being unable to communicate with the server, and the terminal is in a state of being able to or unable to communicate with the server.
Specifically, when the server is in remote wireless connection with the terminal device, the server sends the authorization information of the target vehicle to the terminal. And the terminal reads the identity information of the target vehicle in the target vehicle authorization information. When the terminal is near the target vehicle, the terminal identifies the target vehicle based on the identity information of the target vehicle, establishes connection with the identified target vehicle in a short-distance wireless communication mode, and sends the first authority information to the target vehicle. At this time, the target vehicle is in a state of being unable to communicate with the server, and the terminal process is in a state of being able to or unable to communicate with the server.
The terminal establishes connection with the identified target vehicle in a near field communication mode, and sends the first authority information to the target vehicle. For example, it may be: and the Bluetooth module of the terminal searches for the Bluetooth module with the same MAC address according to the MAC address of the target vehicle and performs pairing connection with the Bluetooth module. After the terminal is connected with the target vehicle, the terminal sends first authority information in the authorization information of the target vehicle to the target vehicle.
Optionally, the short-range wireless communication mode may be bluetooth, WIFI, or NFC.
It should be noted that, since the first authority information is encrypted by the server using the management key of the target vehicle, and only the server and the target vehicle hold the management key of the target vehicle, the terminal cannot read the second authority information for specifying the vehicle control authority included in the first authority information, which can prevent the user from maliciously tampering with the control authority of the target vehicle. Meanwhile, even if the first authority information sent to the target vehicle by the terminal is intercepted maliciously, the control authority of the target vehicle cannot be revealed.
S103, the target vehicle decrypts the first authority information by using the management key of the target vehicle to obtain second authority information.
Specifically, since the vehicle stores the management key of the target vehicle in advance, after the target vehicle receives the first authorization information, the target vehicle can decrypt the first authorization information according to the management key of the target vehicle, so as to obtain the second authorization information.
In the vehicle control method provided by the present disclosure, the terminal and the server acquire the authorization information of the target vehicle in advance when the remote wireless communication is possible. If the electric quantity of the target vehicle is too low to support the target vehicle to carry out long-distance wireless communication with the server, when the user carries the terminal to reach the vicinity of the target vehicle, the target vehicle is in a state of being incapable of communicating with the server. Or the target vehicle is parked in a no-signal area, and when the user carries the terminal to reach the vicinity of the target vehicle, the terminal and the target vehicle cannot communicate with the server. At this time, the terminal forwards the authorization information of the target vehicle acquired in advance to the target vehicle in a short-distance wireless communication mode. The target vehicle decrypts the authorization information of the target vehicle through the pre-stored management key so as to obtain the second authority information, so that the user can still use the vehicle.
In addition, the vehicle control authority is encrypted by the server using the management key of the target vehicle, and only the server and the target vehicle know the management key of the target vehicle, and the terminal does not know the management key of the target vehicle. The terminal plays a forwarding role in the vehicle control method provided by the application so as to forward the first authority information of the target vehicle to the target vehicle, and when the target vehicle acquires the first authority information, the first authority information is decrypted according to a management key of the target vehicle stored by the terminal, so that the vehicle control authority information is acquired. Since the terminal does not know the management key of the target vehicle all the time, the safety of the whole control process is ensured.
In a first optional embodiment, when the vehicle control authority specified by the second authority information only includes one control authority, such as an unlocking control authority, after the target vehicle executes the above S103 to obtain the second authority information, the target vehicle may directly control the target vehicle to execute an unlocking action. Therefore, when the shared vehicle is parked in the no-signal area, by using the vehicle control method provided by the embodiment, when the vehicle is parked in the no-signal area, or the electric quantity of the vehicle is too low to support the target vehicle to perform long-distance wireless connection with the server, the terminal device can still unlock the target vehicle.
In a second alternative embodiment, in order to meet the user's personalized needs, whether the target vehicle executes the vehicle control authority may be controlled by the user. Based on this, on the basis of any one of the above embodiments, the vehicle control method provided by the present disclosure further includes the following S104-S107:
and S104, after the target vehicle obtains the second authority information, sending the second authority information to the terminal.
When the target vehicle transmits the second authority information to the terminal, the second authority information is still transmitted by the near-field communication method.
And S105, after the terminal receives the second authority information from the target vehicle, providing buttons corresponding to the vehicle control authorities specified by the second authority information one by one on an interface of the terminal.
And S106, the terminal sends a vehicle control command corresponding to the triggered button to the target vehicle according to the operation triggered by the user on the button.
And S107, after the target vehicle receives the vehicle control command, operating the target vehicle to execute the action corresponding to the vehicle control command.
Illustratively, when the user clicks the whistle control button, the terminal sends a whistle command to the target vehicle. When the target vehicle receives the command, a whistle operation is performed. It should be noted that when the user clicks the whistle control button, the target vehicle whistle can help the user to find the target vehicle faster.
In a third optional embodiment, based on the second embodiment, in order to further avoid malicious tampering of the control authority of the target vehicle by an illegal user, after the target vehicle receives the vehicle control command sent by the terminal, it needs to verify whether the vehicle control command is within the control authority specified by the second authority information. Based on this, S107 specifically includes the following S1071 and S1072:
s1071, after the target vehicle receives the vehicle control command, determining whether the vehicle control command is in the vehicle control authority specified by the second authority information.
S1072, if the vehicle control command is in the vehicle control authority specified by the second authority information, the operation target vehicle executes the action corresponding to the vehicle control command.
Specifically, after receiving the vehicle control command, the target vehicle verifies the control command with the vehicle control authority specified by the second authority information. If the vehicle control command is within the vehicle control authority specified by the second authority information, the verification is successful. And after the verification is successful, the target vehicle executes the action corresponding to the vehicle control command.
In a fourth alternative embodiment, the situation that the target vehicle is occupied but not utilized due to the fact that the user does not send the vehicle control command to the target vehicle for a long time after obtaining the vehicle control authority of the target vehicle is avoided. Or, when the target vehicle sends the second authority information to the user terminal and the second authority information is intercepted by the illegal user terminal, the risk that the illegal user terminal controls the target vehicle is reduced. The second authority information is also used to specify the effective time of the vehicle control authority.
Based on this, S107 specifically includes the following S1073 to S1075:
s1073, after the target vehicle receives the vehicle control command, determining whether the vehicle control command is in the vehicle control authority specified by the second authority information.
S1074, if the vehicle control command is in the vehicle control authority specified by the second authority information, determining whether the current time is in the valid time of the vehicle control authority corresponding to the control command.
S1075, if the current time is within the valid time of the vehicle control authority corresponding to the control command, the control target vehicle executes the action corresponding to the vehicle control command.
For example, when the vehicle control command received by the target vehicle is an unlocking command, the target vehicle determines whether the vehicle control authority specified by the previously acquired second authority information includes an unlocking control authority, and if not, the target vehicle does not execute an unlocking action. If yes, further judging and determining whether the current time is within the valid time of the unlocking control authority corresponding to the unlocking command.
For example, when the target vehicle sends the unlocking control authority to the terminal, the current time of the target vehicle is 12:10, and the effective time of the unlocking control authority is 20 minutes. Then when the target vehicle is at 12: and 30, when an unlocking command sent by the terminal is received before, the target vehicle executes the vehicle unlocking action. At 12: after 30 hours, the target vehicle does not perform the unlocking operation even if it receives the unlocking command transmitted from the terminal.
For another example, when the target vehicle sends the unlocking control authority to the terminal, the effective time of the unlocking control authority is 12:10-12:30 in 12 months and 1 day in 2018. The target vehicle executes the vehicle unlocking action when the target vehicle receives the unlocking command sent by the terminal in 12:10-12: 30. When the target vehicle receives the unlocking command sent by the terminal, the unlocking command is not within 12:10-12:30, and the unlocking action cannot be executed even if the unlocking command sent by the terminal is received.
It should be noted that different vehicle control authorities may correspond to different valid times.
Based on the embodiment, the situation that the target vehicle is occupied but not utilized due to the fact that the user does not send the vehicle control command to the target vehicle for a long time after obtaining the vehicle control authority of the target vehicle can be avoided, and therefore the utilization rate of the vehicle can be improved. In addition, even if the second authority information of the target vehicle is intercepted by the illegal user terminal, the illegal user terminal can only control the target vehicle within the effective time of the vehicle control authority, so that the safety of the whole control process can be improved.
In a fifth optional embodiment, in order to ensure the security of information interaction between the terminal and the target vehicle, on the basis of any one of the above embodiments, the authorization information of the target vehicle further includes a first session key and a second session key, and the first session key is obtained by the server by encrypting the second session key using the management key of the target vehicle. Based on this, the vehicle control method provided by the present disclosure further includes the following S108-S110:
and S108, the terminal forwards the first session key to the target vehicle in a short-distance wireless communication mode.
S109, the target vehicle decrypts the first session key by using the management key of the target vehicle to obtain a second session key.
And S110, in the subsequent short-distance wireless communication process of the terminal and the target vehicle, the sender uses the second session key to encrypt the sent information, and the receiver uses the second session key to decrypt the received information.
For example, the example that the target vehicle sends the second permission information to the terminal and the terminal sends the vehicle control command to the target vehicle is taken as an example, the above S108 to S110:
when the terminal acquires the authorization information of the target vehicle from the server, the identity information of the target vehicle and the second session key which are not encrypted can be directly read from the authorization information.
And the terminal directly forwards the first session key and the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle.
And the target vehicle receives the first session key and the first authority information, decrypts the first session key and the first authority information by using the vehicle management key stored by the target vehicle, and obtains a second session key and second authority information.
In the subsequent short-distance wireless communication process, the sender uses the second session key to encrypt the sent information, and the receiver uses the second session key to decrypt the received information. For example, the target vehicle serves as a sender, and the second right information is encrypted using the second session key when the second right information is sent to the terminal. And then, the target vehicle sends the encrypted second authority information to the terminal. And the terminal is used as a receiver and decrypts by using the second session key after receiving the encrypted second authority information to obtain the second authority information.
Exemplarily, as shown in fig. 3, the vehicle control method provided by the present disclosure is described in conjunction with the fifth alternative embodiment, the embodiment shown in fig. 1, and the second alternative embodiment. Specifically, the method comprises the following steps:
when the terminal is in long-distance wireless communication with the server, the terminal applies for a vehicle request to the server, and when the server receives the vehicle application request sent by the terminal, the server generates authorization information of a target vehicle and sends the authorization information of the target vehicle to the terminal.
When the terminal and the vehicle cannot be in remote wireless communication with the server or the vehicle cannot be in remote wireless communication with the server, the terminal reads the second session key and sends the first authority information and the first session key to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle; the target vehicle decrypts the first authority information and the first session key by using the management key of the target vehicle to obtain second authority information and a second session key; the target vehicle encrypts the second authority information according to the second session key and sends the second authority information to the terminal; after the terminal obtains the encrypted second authority information, the terminal decrypts the encrypted second authority information according to the second session key to obtain second authority information; after the terminal obtains the second authority information, providing buttons corresponding to the vehicle control authorities specified by the second authority information one by one on an interface of the terminal; the terminal receives a vehicle control command generated by the triggering operation of the user on the button, utilizes the vehicle control command encrypted by the second session key, and finally sends the encrypted vehicle control command to the target vehicle; and after receiving the encrypted vehicle control command, the target vehicle decrypts the encrypted vehicle control command by using the second session key to obtain the vehicle control command, so that the target vehicle is controlled to execute the action corresponding to the vehicle control command.
In a sixth alternative embodiment, after the target vehicle is used, the server needs to obtain a vehicle usage report, so as to monitor the usage of the vehicle, for example, perform a fee-ending operation according to the vehicle usage report. With respect to the vehicle control method provided in any of the above embodiments, the present disclosure enables the server to obtain the usage report of the vehicle through the following steps S111 to S113:
and S111, generating a vehicle use report by the target vehicle and encrypting the vehicle use report by using the management key of the target vehicle to obtain the encrypted vehicle use report.
For example, the target vehicle generates a vehicle usage report upon detecting a deadbolt closure. The vehicle use report may include the time of opening the lock tongue, the time of closing the lock tongue, the vehicle driving route, and the like.
And S112, the target vehicle transmits the encrypted vehicle use report to the terminal through the short-distance wireless communication mode, and the terminal transmits the encrypted vehicle use report to the server.
When the target vehicle transmits the encrypted vehicle use report to the terminal by the short-range wireless communication method, the target vehicle is in a state where communication with the server is impossible, and the terminal is in a state where communication with the server is possible or impossible.
The server decrypts the encrypted vehicle usage report information using the vehicle management key of the target vehicle to acquire a vehicle usage report S113.
The target vehicle encrypts the vehicle usage report according to the management key of the target vehicle, so that the terminal can be prevented from tampering the vehicle usage report when receiving the vehicle usage report. In addition, when the user uses up the target vehicle, the target vehicle is parked in a no-signal area again, namely the target vehicle and the terminal cannot communicate with the server, or the electric quantity of the target vehicle is too low to support the target vehicle to remotely wirelessly communicate with the server, namely the target vehicle cannot communicate with the server, and the terminal can communicate with the server.
Of course, when the target vehicle is parked in the signal area, the target vehicle may perform remote wireless communication with the server, and directly transmit the vehicle use report generated by the remote wireless communication to the server. The server can quickly acquire the vehicle use report of the target vehicle.
In a seventh alternative embodiment, after the terminal establishes the short-range wireless communication connection with the target vehicle, during the communication process between the terminal and the target vehicle, the following operations are executed:
the target vehicle generates a random sequence m, for example a random number, and transmits the random sequence m to the terminal together when the target vehicle transmits the first information to the terminal.
In the subsequent process, the terminal appends the sequence p to the transmission information each time the terminal transmits information to the target vehicle; the sequence P is a random sequence m + n, the initial value of n is 1, and n is automatically added with 1 after the terminal sends information to the target vehicle once.
For example, in the subsequent process, when the terminal transmits information to the target vehicle for the first time, the sequence P is added to the transmission information as the random sequence m +1, when the terminal transmits information to the target vehicle for the second time, the sequence P is added to the transmission information as the random sequence m +2, when the terminal transmits information to the target vehicle for the third time, the sequence P is added to the transmission information as the random sequence m +3, and so on.
When the target vehicle receives the information sent by the terminal, the legality of the information can be judged according to the received sequence P and the random sequence m stored in the target vehicle, and illegal equipment is prevented from pretending to be the terminal. For example:
the sequence P of information received this time-the sequence P of information received last time is 1,
the number of times of the sequence P-message of the received information is m.
< control System of vehicle >
The vehicle control system provided by the embodiment of the disclosure comprises a server, a target vehicle and a terminal; wherein,
the server is used for generating authorization information of the target vehicle, the authorization information of the target vehicle comprises identity information of the target vehicle and first authority information, the first authority information is obtained by encrypting second authority information by the server through a management key of the target vehicle, and the second authority information is used for appointing vehicle control authority.
The server is further used for sending the authorization information of the target vehicle to the terminal, and the terminal forwards the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle.
The target vehicle is further configured to decrypt the first right information using the management key of the target vehicle to obtain the second right information.
It should be noted that, the structural diagram of the vehicle control system provided in the embodiment of the present disclosure may refer to the block diagram of the hardware configuration of the shared vehicle system 100 shown in fig. 1.
The present invention may be a system, method and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied therewith for causing a processor to implement various aspects of the present invention.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present invention may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present invention are implemented by personalizing an electronic circuit, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA), with state information of computer-readable program instructions, which can execute the computer-readable program instructions.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, by software, and by a combination of software and hardware are equivalent.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the invention is defined by the appended claims.
Claims (11)
1. A control method of a vehicle, comprising:
the method comprises the steps that a server generates authorization information of a target vehicle, wherein the authorization information of the target vehicle comprises identity information of the target vehicle and first authority information, the first authority information is obtained by encrypting second authority information by the server through a management key of the target vehicle, and the second authority information is used for appointing vehicle control authority;
the server sends the authorization information of the target vehicle to a terminal, and the terminal sends the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle;
the target vehicle decrypts the first right information using the management key of the target vehicle to obtain the second right information.
2. The method according to claim 1, wherein when the terminal sends the first permission information to the target vehicle in a short-range wireless communication mode according to the identity information of the target vehicle, the target vehicle is in a state of being unable to communicate with the server, and the terminal is in a state of being able to or unable to communicate with the server.
3. The method according to claim 1 or 2, wherein the vehicle control authority specified by the second authority information includes an unlock control authority;
and after the target vehicle obtains the second authority information, controlling the target vehicle to execute an unlocking action.
4. The method according to claim 1 or 2, the vehicle control authority specified by the second authority information, including any one or a combination of:
lock control authority, window control authority, car light control authority, control authority of whistling.
5. The method according to any one of claims 1-4, wherein the target vehicle sends the second authority information to the terminal after obtaining the second authority information;
after the terminal receives the second authority information from the target vehicle, buttons corresponding to the vehicle control authorities specified by the second authority information one by one are provided on an interface of the terminal;
the terminal sends a vehicle control command corresponding to the triggered button to the target vehicle according to the triggering operation of the button by the user;
and after the target vehicle receives the vehicle control command, controlling the target vehicle to execute an action corresponding to the vehicle control command.
6. The method of claim 5, wherein the target vehicle is manipulated to perform an action corresponding to the vehicle control command after receiving the vehicle control command, comprising:
after receiving the vehicle control command, the target vehicle determines whether the vehicle control command is within the vehicle control authority specified by the second authority information;
and if the vehicle control command is in the vehicle control authority specified by the second authority information, controlling the target vehicle to execute an action corresponding to the vehicle control command.
7. The method of claim 5, the second authority information further specifying a valid time of the vehicle control authority;
after the target vehicle receives the vehicle control command, the target vehicle is controlled to execute an action corresponding to the vehicle control command, and the action comprises the following steps:
after receiving the vehicle control command, the target vehicle determines whether the vehicle control command is within the vehicle control authority specified by the second authority information;
if the vehicle control command is within the vehicle control authority specified by the second authority information, determining whether the current time is within the valid time of the vehicle control authority corresponding to the control command;
and if the current time is within the valid time of the vehicle control authority corresponding to the control command, controlling the target vehicle to execute the action corresponding to the vehicle control command.
8. The method of any of claims 1-7, the authorization information for the target vehicle further comprising a first session key and a second session key, the first session key being obtained by the server encrypting the second session key using a management key of the target vehicle;
the method further comprises the following steps:
the terminal forwards the first session key to the target vehicle in a near field wireless communication mode;
the target vehicle decrypts the first session key using a management key of the target vehicle to obtain the second session key;
and in the subsequent short-distance wireless communication process of the terminal and the target vehicle, the sender uses the second session key to encrypt the sent information, and the receiver uses the second session key to decrypt the received information.
9. The method according to any one of claims 1-8, further comprising:
the target vehicle generates a vehicle usage report and encrypts the vehicle usage report by using a management key of the target vehicle to obtain an encrypted vehicle usage report;
the target vehicle sends the encrypted vehicle use report to the terminal in a short-distance wireless communication mode, and the terminal sends the encrypted vehicle use report to the server;
the server decrypts the encrypted vehicle usage report information using the vehicle management key of the target vehicle to acquire the vehicle usage report.
10. The method of claim 9, wherein when the target vehicle sends the encrypted vehicle usage report to the terminal via short-range wireless communication, the target vehicle is in a state of being unable to communicate with the server, and the terminal is in a state of being able to or unable to communicate with the server.
11. A control system of a vehicle includes a server, a target vehicle, and a terminal; wherein,
the server is used for generating authorization information of a target vehicle, wherein the authorization information of the target vehicle comprises identity information of the target vehicle and first authority information, the first authority information is obtained by encrypting second authority information by using a management key of the target vehicle through the server, and the second authority information is used for appointing vehicle control authority;
the server is further used for sending the authorization information of the target vehicle to a terminal, and the terminal forwards the first authority information to the target vehicle in a short-distance wireless communication mode according to the identity information of the target vehicle;
the target vehicle is further configured to decrypt the first permission information using a management key of the target vehicle to obtain the second permission information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811615317.0A CN109727354A (en) | 2018-12-27 | 2018-12-27 | A kind of control method and system of vehicle |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811615317.0A CN109727354A (en) | 2018-12-27 | 2018-12-27 | A kind of control method and system of vehicle |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109727354A true CN109727354A (en) | 2019-05-07 |
Family
ID=66296503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811615317.0A Pending CN109727354A (en) | 2018-12-27 | 2018-12-27 | A kind of control method and system of vehicle |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109727354A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782564A (en) * | 2019-11-06 | 2020-02-11 | 北京牛电信息技术有限责任公司 | Unlocking method, device and system and storage medium |
CN110992538A (en) * | 2019-12-16 | 2020-04-10 | 上海钧正网络科技有限公司 | Vehicle voice unlocking method, device and medium |
CN111325917A (en) * | 2020-02-27 | 2020-06-23 | 上海钧正网络科技有限公司 | Using method and device of sharing equipment, storage medium and equipment |
CN112214753A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Authentication method and device, electronic equipment and storage medium |
CN112214779A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Control method and device, electronic equipment and storage medium |
CN112215992A (en) * | 2020-10-14 | 2021-01-12 | 上海银基信息安全技术股份有限公司 | Digital key cleaning method and computer equipment |
CN112466014A (en) * | 2020-12-15 | 2021-03-09 | 歌尔光学科技有限公司 | Shared vehicle offline unlocking and authorization method, wearable device, terminal and system |
CN112822630A (en) * | 2021-01-12 | 2021-05-18 | 上海钧正网络科技有限公司 | Data processing method of device and computer-readable storage medium |
CN112905981A (en) * | 2019-12-04 | 2021-06-04 | 上海博泰悦臻电子设备制造有限公司 | Method, electronic device and computer-readable storage medium for information sharing |
CN113438264A (en) * | 2020-03-23 | 2021-09-24 | 未来穿戴技术有限公司 | Wearable massage instrument connection method and device, computer equipment and storage medium |
CN114070836A (en) * | 2021-11-12 | 2022-02-18 | 上汽通用五菱汽车股份有限公司 | Vehicle remote control method, system, device and computer readable storage medium |
CN115246372A (en) * | 2021-04-26 | 2022-10-28 | 上海博泰悦臻网络技术服务有限公司 | Vehicle information processing method and related device |
CN115567555A (en) * | 2022-09-07 | 2023-01-03 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104853050A (en) * | 2015-06-01 | 2015-08-19 | 北京润东方科技有限公司 | System and method for bicycle management |
CN105261091A (en) * | 2015-09-23 | 2016-01-20 | 奇瑞汽车股份有限公司 | Method and device used for vehicle one-key start |
CN205610679U (en) * | 2016-01-20 | 2016-09-28 | 安徽大学 | Car communication network equipment with signature and encryption function |
CN105976223A (en) * | 2016-04-29 | 2016-09-28 | 乐视控股(北京)有限公司 | Vehicle rental method and system, and server |
CN107650863A (en) * | 2017-09-19 | 2018-02-02 | 大陆汽车投资(上海)有限公司 | Vehicle sharing method and system |
CN108111998A (en) * | 2017-12-18 | 2018-06-01 | 北京博创联动科技有限公司 | A kind of wireless method for unlocking and system |
CN108154587A (en) * | 2017-12-28 | 2018-06-12 | 深圳市小快联科技有限公司 | A kind of method and system for switching bicycle lock |
CN108206996A (en) * | 2017-12-08 | 2018-06-26 | 中兴通讯股份有限公司 | Auth method and device |
US20180309760A1 (en) * | 2013-11-08 | 2018-10-25 | At&T Mobility Ii Llc | Mobile device enabled tiered data exchange via a vehicle |
CN208092725U (en) * | 2017-12-15 | 2018-11-13 | 蔚来汽车有限公司 | Vehicle authentication management system |
WO2018208062A1 (en) * | 2017-05-08 | 2018-11-15 | 엘지전자(주) | Method for securing connection identifier of user equipment in wireless communication system and apparatus therefor |
CN109003361A (en) * | 2018-07-02 | 2018-12-14 | 郑州云海信息技术有限公司 | A kind of control method and system of the shared bicycle switch lock based on cloud computing |
-
2018
- 2018-12-27 CN CN201811615317.0A patent/CN109727354A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180309760A1 (en) * | 2013-11-08 | 2018-10-25 | At&T Mobility Ii Llc | Mobile device enabled tiered data exchange via a vehicle |
CN104853050A (en) * | 2015-06-01 | 2015-08-19 | 北京润东方科技有限公司 | System and method for bicycle management |
CN105261091A (en) * | 2015-09-23 | 2016-01-20 | 奇瑞汽车股份有限公司 | Method and device used for vehicle one-key start |
CN205610679U (en) * | 2016-01-20 | 2016-09-28 | 安徽大学 | Car communication network equipment with signature and encryption function |
CN105976223A (en) * | 2016-04-29 | 2016-09-28 | 乐视控股(北京)有限公司 | Vehicle rental method and system, and server |
WO2018208062A1 (en) * | 2017-05-08 | 2018-11-15 | 엘지전자(주) | Method for securing connection identifier of user equipment in wireless communication system and apparatus therefor |
CN107650863A (en) * | 2017-09-19 | 2018-02-02 | 大陆汽车投资(上海)有限公司 | Vehicle sharing method and system |
CN108206996A (en) * | 2017-12-08 | 2018-06-26 | 中兴通讯股份有限公司 | Auth method and device |
CN208092725U (en) * | 2017-12-15 | 2018-11-13 | 蔚来汽车有限公司 | Vehicle authentication management system |
CN108111998A (en) * | 2017-12-18 | 2018-06-01 | 北京博创联动科技有限公司 | A kind of wireless method for unlocking and system |
CN108154587A (en) * | 2017-12-28 | 2018-06-12 | 深圳市小快联科技有限公司 | A kind of method and system for switching bicycle lock |
CN109003361A (en) * | 2018-07-02 | 2018-12-14 | 郑州云海信息技术有限公司 | A kind of control method and system of the shared bicycle switch lock based on cloud computing |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782564A (en) * | 2019-11-06 | 2020-02-11 | 北京牛电信息技术有限责任公司 | Unlocking method, device and system and storage medium |
CN112905981A (en) * | 2019-12-04 | 2021-06-04 | 上海博泰悦臻电子设备制造有限公司 | Method, electronic device and computer-readable storage medium for information sharing |
CN110992538B (en) * | 2019-12-16 | 2022-05-27 | 上海钧正网络科技有限公司 | Vehicle voice unlocking method, device and medium |
CN110992538A (en) * | 2019-12-16 | 2020-04-10 | 上海钧正网络科技有限公司 | Vehicle voice unlocking method, device and medium |
CN111325917A (en) * | 2020-02-27 | 2020-06-23 | 上海钧正网络科技有限公司 | Using method and device of sharing equipment, storage medium and equipment |
CN111325917B (en) * | 2020-02-27 | 2022-04-22 | 上海钧正网络科技有限公司 | Using method and device of sharing equipment, storage medium and equipment |
CN113438264A (en) * | 2020-03-23 | 2021-09-24 | 未来穿戴技术有限公司 | Wearable massage instrument connection method and device, computer equipment and storage medium |
CN112215992A (en) * | 2020-10-14 | 2021-01-12 | 上海银基信息安全技术股份有限公司 | Digital key cleaning method and computer equipment |
CN112214753A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Authentication method and device, electronic equipment and storage medium |
CN112214779A (en) * | 2020-10-28 | 2021-01-12 | 纳恩博(北京)科技有限公司 | Control method and device, electronic equipment and storage medium |
CN112466014A (en) * | 2020-12-15 | 2021-03-09 | 歌尔光学科技有限公司 | Shared vehicle offline unlocking and authorization method, wearable device, terminal and system |
CN112822630A (en) * | 2021-01-12 | 2021-05-18 | 上海钧正网络科技有限公司 | Data processing method of device and computer-readable storage medium |
CN112822630B (en) * | 2021-01-12 | 2022-12-23 | 上海钧正网络科技有限公司 | Data processing method of device and computer-readable storage medium |
CN115246372A (en) * | 2021-04-26 | 2022-10-28 | 上海博泰悦臻网络技术服务有限公司 | Vehicle information processing method and related device |
CN114070836A (en) * | 2021-11-12 | 2022-02-18 | 上汽通用五菱汽车股份有限公司 | Vehicle remote control method, system, device and computer readable storage medium |
CN115567555A (en) * | 2022-09-07 | 2023-01-03 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109727354A (en) | A kind of control method and system of vehicle | |
US11985238B2 (en) | Vehicle-mounted device upgrade method and related device | |
EP3883212B1 (en) | Device upgrade method and related device | |
CN105635245B (en) | Method and system for vehicle computing system to communicate with device | |
EP3403246B1 (en) | A device and method for collecting user-based insurance data in vehicles | |
US20170180330A1 (en) | Method and electronic device for vehicle remote control and a non-transitory computer readable storage medium | |
CN106375091B (en) | Establishing a communication link to a user equipment via an access control device | |
EP2768202B1 (en) | Secure electronic device application connection to an application server | |
CN108605034B (en) | Wireless firmware update | |
CN113794734A (en) | Vehicle-mounted CAN bus encryption communication method, control device and readable storage medium | |
CN113242224B (en) | Authorization method and device, electronic equipment and storage medium | |
EP4050838B1 (en) | Device sharing method and electronic device | |
JP2008060809A (en) | Vehicle-to-vehicle communication method, vehicle-to-vehicle communication system and on-vehicle communication equipment | |
US20150143486A1 (en) | Simplified Wi-Fi Setup | |
CN115442063A (en) | Charging data sending and receiving method and device, charging pile and vehicle terminal | |
US20210144132A1 (en) | Distributed encryption | |
JP2017092696A (en) | Communication system | |
EP3429158A1 (en) | Secure communication method and apparatus for vehicle, vehicle multimedia system, and vehicle | |
KR20190051500A (en) | Vehicle network access control method and infotainment apparatus thereof | |
US11582611B1 (en) | Prompt and secure data communication pairing | |
CN111247770B (en) | Method and related system for protecting vehicle external communication by using IBC | |
CN112751803B (en) | Method, apparatus, and computer-readable storage medium for managing objects | |
US20230071702A1 (en) | Managing communications between a vehicle and a user device | |
CN114039771B (en) | Data processing method, device and system, electronic equipment and storage medium | |
US20180262488A1 (en) | Method and system for providing secure communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201216 Address after: Room 168, building 6, 741 Hangzhou Road, Yangpu District, Shanghai 200090 Applicant after: HANHAI INFORMATION TECHNOLOGY SHANGHAI Co.,Ltd. Address before: Room Bnan 1231, 2 bungalows, No. 5 Road, College, Haidian District, Beijing, 100191 Applicant before: BEIJING MOBIKE TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190507 |