CN109285252A - Lock control method and device - Google Patents

Lock control method and device Download PDF

Info

Publication number
CN109285252A
CN109285252A CN201811147047.5A CN201811147047A CN109285252A CN 109285252 A CN109285252 A CN 109285252A CN 201811147047 A CN201811147047 A CN 201811147047A CN 109285252 A CN109285252 A CN 109285252A
Authority
CN
China
Prior art keywords
vehicle
activation
terminal
activation code
car owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811147047.5A
Other languages
Chinese (zh)
Other versions
CN109285252B (en
Inventor
云朋
韩宇
陈洪银
牛凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apollo Intelligent Connectivity Beijing Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202110950556.7A priority Critical patent/CN113554787B/en
Priority to CN201811147047.5A priority patent/CN109285252B/en
Publication of CN109285252A publication Critical patent/CN109285252A/en
Application granted granted Critical
Publication of CN109285252B publication Critical patent/CN109285252B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the present invention proposes a kind of lock control method and device.Wherein, this method comprises: receiving and saving the activation code set from car owner's terminal, the activation code set is to be obtained by car owner's terminal from server end, and the activation code set includes multiple activation codes that the server end is car owner's terminal distribution;The first activation request from car owner's terminal is received, includes the first activation code in the first activation request;Car owner's terminal is activated using the activation code set and first activation code;Lock described in car owner's terminal control is determined whether using first activation code.The embodiment of the present invention is communicated by car owner's terminal with server end, activation code book and activation code are obtained from server end, in activation, do not require vehicle end that there is the function connecting with server end, the activation of car key can be realized in communication mode between car owner's terminal and vehicle end using short distance, and applicable scene is more extensive.

Description

Lock control method and device
Technical field
The present invention relates to technical field of vehicle control more particularly to a kind of lock control method and devices.
Background technique
Currently, realizing that vehicle unlock scheme includes: by wireless communication
The first kind: in the key of the preset fixation of vehicle, the key agreement of each car.The program is used, once a vehicle quilt It breaks through, all vehicles face security risk, and security risk is big.
Second class: a vehicle one is close, is authorized based on cloud.Vehicle is needed when initializing and sharing authorization using the program End has mobile network, can connect cloud.Compared with the first kind, security risk is small.But if vehicle is in underground garage Or when mountain area, movable signal is often bad, function limitation.
Third class: a vehicle one is close, the preset different fixed keys of each car.Using the program, need to carry out for every each vehicle Offline configuration or personalized production.The disadvantages of accordingly, there exist process is tedious, at high cost.In addition, being adopted specific to a certain vehicle Same set of key is also used when sharing key with the program, the security risk in shared usage scenario is big.
Summary of the invention
The embodiment of the present invention provides a kind of lock control method and device, to solve one or more skills in the prior art Art problem.
In a first aspect, the embodiment of the invention provides a kind of lock control methods, comprising:
Receive and save the activation code set from car owner's terminal, the activation code set is by car owner's terminal from clothes It is engaged in what device end obtained, the activation code set includes multiple activation codes that the server end is car owner's terminal distribution;
The first activation request from car owner's terminal is received, includes the first activation code in the first activation request;
Car owner's terminal is activated using the activation code set and first activation code;
Lock described in car owner's terminal control is determined whether using first activation code.
Second aspect, the embodiment of the invention provides a kind of lock control methods, comprising:
Activation code set and the first activation code from server end are received, the activation code set includes the server End is multiple activation codes of car owner's terminal distribution;
The activation code set is sent to vehicle end, to save the activation code set at the vehicle end;
The first activation request is sent to the vehicle end, includes first activation code in the first activation request, so that It obtains the vehicle end and activates car owner's terminal using the activation code set and first activation code.
The third aspect, the embodiment of the invention provides a kind of lock control methods, comprising:
The first activation code is chosen from the activation code set of car owner's terminal, the activation code set includes the server end For multiple activation codes of car owner's terminal distribution;
The activation code set and first activation code are sent to car owner's terminal, by car owner's terminal to vehicle End sends the activation code set and first activation code, so that the vehicle end utilizes the activation code set and described the One activation code activates car owner's terminal.
Fourth aspect, the embodiment of the invention provides a kind of lock control devices, comprising:
First receiving module, for receiving and saving the activation code set from car owner's terminal, the activation code set is It is obtained by car owner's terminal from server end, the activation code set includes that the server end divides for car owner's terminal The multiple activation codes matched;
Second receiving module, for receiving the first activation request from car owner's terminal, the first activation request In include the first activation code;
First active module, for activating car owner's terminal using the activation code set and first activation code;
First control module, for determining whether vehicle described in car owner's terminal control using first activation code Lock.
5th aspect, the embodiment of the invention provides a kind of lock control devices, comprising:
6th aspect, the embodiment of the invention provides a kind of lock control devices, comprising:
Third receiving module, for receiving activation code set and the first activation code from server end, the activation code Set includes multiple activation codes that the server end is car owner's terminal distribution;
First sending module, for sending the activation code set to vehicle end, to save the activation code at the vehicle end Set;
Second sending module includes institute in the first activation request for sending the first activation request to the vehicle end The first activation code is stated, so that the vehicle end activates the car owner whole using the activation code set and first activation code End.
7th aspect, the embodiment of the invention provides a kind of lock control device, the function of described device can be by hard Part is realized, corresponding software realization can also be executed by hardware.The hardware or software include one or more and above-mentioned function It can corresponding module.
It include processor and memory in the structure of described device in a possible design, the memory is used for Storage supports described device to execute the program of above-mentioned lock control method, the processor is configured to for executing the storage The program stored in device.Described device can also include communication interface, be used for and other equipment or communication.
Eighth aspect, the embodiment of the invention provides a kind of computer readable storage mediums, for storing lock control dress Set computer software instructions used comprising for executing program involved in above-mentioned lock control method.
A technical solution in above-mentioned technical proposal has the following advantages that or the utility model has the advantages that by car owner's terminal and service The communication of device end obtains activation code book and activation code from server end, in activation, vehicle end is not required to have and server end The function of connection, the communication mode between car owner's terminal and vehicle end using short distance can be realized the activation of car key, can apply Scene it is more extensive.
Another technical solution in above-mentioned technical proposal has the following advantages that or the utility model has the advantages that due to that can be each vehicle Master terminal and vehicle end distribute a set of activation code set and nor affect on the safety of other vehicles even if a vehicle is cracked.
It is possible to further realize burn-after-reading, stolen hidden danger is eliminated, can carry out key safely authorizes sharing.
Further, the new key for based on activation code, constantly changing and exchanging is used to carry out switch lock operation, so that Switch lock process is safer.
Above-mentioned general introduction is merely to illustrate that the purpose of book, it is not intended to be limited in any way.Except foregoing description Schematical aspect, except embodiment and feature, by reference to attached drawing and the following detailed description, the present invention is further Aspect, embodiment and feature, which will be, to be readily apparent that.
Detailed description of the invention
In the accompanying drawings, unless specified otherwise herein, otherwise indicate the same or similar through the identical appended drawing reference of multiple attached drawings Component or element.What these attached drawings were not necessarily to scale.It should be understood that these attached drawings depict only according to the present invention Disclosed some embodiments, and should not serve to limit the scope of the present invention.
Fig. 1 shows the flow chart of lock control method according to an embodiment of the present invention.
Fig. 2 shows the flow charts initialized in lock control method according to an embodiment of the present invention.
Fig. 3 shows the flow chart that key is activated in lock control method according to an embodiment of the present invention.
Fig. 4 shows the flow chart of lock switch control in lock control method according to an embodiment of the present invention.
Fig. 5 shows the flow chart of lock switch control in lock control method according to an embodiment of the present invention.
Fig. 6 shows the flow chart of lock control method according to an embodiment of the present invention.
Fig. 7 shows the flow chart that user terminal is replaced in lock control method according to an embodiment of the present invention.
Fig. 8 shows the flow chart that car owner is replaced in lock control method according to an embodiment of the present invention.
Fig. 9 shows the flow chart that vehicle is borrowed in lock control method according to an embodiment of the present invention.
Figure 10 shows the flow chart that vehicle is borrowed in revocation in lock control method according to an embodiment of the present invention.
Figure 11 shows the flow chart of lock control method according to an embodiment of the present invention.
Figure 12 shows the flow chart that user terminal is replaced in lock control method according to an embodiment of the present invention.
Figure 13 shows the flow chart that car owner is replaced in lock control method according to an embodiment of the present invention.
Figure 14 shows the flow chart that vehicle is borrowed in lock control method according to an embodiment of the present invention.
Figure 15 shows the flow chart that vehicle is borrowed in revocation in lock control method according to an embodiment of the present invention.
Figure 16 show lock control method according to an embodiment of the present invention using the flow chart initialized in example.
Figure 17 shows the flow chart using activation key in example of lock control method according to an embodiment of the present invention.
Figure 18 shows the flow chart using switch lock in example of lock control method according to an embodiment of the present invention.
Figure 19 shows the flow chart of lock control method according to an embodiment of the present invention given for change using key in example.
Figure 20 shows the flow chart of lock control method according to an embodiment of the present invention sold using used car in example.
What the controller using vehicle end in example that Figure 21 shows lock control method according to an embodiment of the present invention was replaced Flow chart.
Figure 22 show lock control method according to an embodiment of the present invention using in example borrow vehicle flow chart.
Figure 23 shows the flow chart that vehicle is borrowed using revocation in example of lock control device according to an embodiment of the present invention.
Figure 24 shows the structural block diagram of lock control device according to an embodiment of the present invention.
Figure 25 shows the structural block diagram of lock control device according to an embodiment of the present invention.
Figure 26 shows the structural block diagram of lock control device according to an embodiment of the present invention.
Figure 27 shows the structural block diagram of lock control device according to an embodiment of the present invention.
Figure 28 shows the structural block diagram of lock control device according to an embodiment of the present invention.
Figure 29 shows the structural block diagram of lock control device according to an embodiment of the present invention.
Specific embodiment
Hereinafter, certain exemplary embodiments are simply just described.As one skilled in the art will recognize that Like that, without departing from the spirit or scope of the present invention, described embodiment can be modified by various different modes. Therefore, attached drawing and description are considered essentially illustrative rather than restrictive.
Fig. 1 shows the flow chart of lock control method according to an embodiment of the present invention.As shown in Figure 1, this method can answer In controller for vehicle end such as vehicle, method includes the following steps:
S11, the activation code set from car owner's terminal is received and saved, the activation code set is by car owner's terminal It is obtained from server end, the activation code set includes multiple activation that the server end is car owner's terminal distribution Code.
S12, the first activation request from car owner's terminal is received, includes the first activation in the first activation request Code.
S13, car owner's terminal is activated using the activation code set and first activation code.
S14, lock described in car owner's terminal control is determined whether using first activation code.
In the present embodiment, user can be by terminal devices such as mobile phone, palm PC, wearable devices to server end Register car owner's account.After succeeding in registration, user can log in car owner's account on the terminal device, pass through the terminal device and service Device end is communicated.In this case, the terminal device for having logged in car owner's account is properly termed as car owner's terminal.
In one implementation, the binding relationship of car owner's account and terminal device can be set, also to improve safety. For example, if car owner's account A can be used as car owner's terminal when terminal device A1 is logged in.But if car owner's account A is at end When end equipment B1 is logged in, then need to verify owner identity again.
Car owner's terminal in registration, can also be uploaded onto the server end by the information at vehicle end.Server end for car owner end Behind end and vehicle end distribution activation code set, activation code set, car owner's terminal, the binding relationship between vehicle end can establish.
Car owner's terminal can be connect by the telecommunications mode such as mobile network with server end, be obtained from server end With the activation code set of itself binding.This activation code set can be dealt into the preservation of vehicle end by car owner's terminal.Also, car owner's terminal The first activation code can also be obtained from the activation code set that server end saves.And itself vehicle is activated using the first activation code Function of key.It resets in order to prevent and random collision after sending the first activation code to car owner's terminal, can incite somebody to action oneself beyond the clouds The first activation code in activation code set that body saves is deleted.
In the present embodiment, it can be communicated by car owner's terminal with server end, obtain activation code book from server end and (swash Code collection living is closed) and activation code can pass through the activation for interacting completion car key at vehicle end with car owner's terminal in activation. In activation, do not require vehicle end that there is the function connecting with server end, i.e. vehicle end can be offline.Therefore, in underground garage etc. In the scene of movable signal difference, swashing for car key is can be realized in the communication mode between car owner's terminal and vehicle end using short distance Living, applicable scene is more extensive.
Further, due to that can be that a set of activation code set is distributed at each car owner's terminal and vehicle end, even if a vehicle quilt It cracks, nor affects on the safety of other vehicles.
In one implementation, in initialization process, as shown in Fig. 2, step S11 may include:
Step S21, the initialization requests from car owner's terminal are received, the initialization requests include using private key signature The activation code set.
Step S22, the private key signature of activation code set is verified using the public key for being preset at vehicle end, and logical in verifying Later the activation code set is saved.
In order to guarantee that safety, activation code set can use private key signature.It, can be with out after vehicle end receives activation code set Preset public key when factory, verifies the private key signature.After being verified, the activation code set is saved at vehicle end.
In one implementation, as shown in figure 3, the activation process of the car key of car owner's terminal may include step S12 May include: with step S13, step S13
If step S31, described first activation code belongs to the activation code set, it is determined that the vehicle key of car owner's terminal Spoon function activation success.
Step S32, used first activation code is deleted from the activation code set.
After vehicle end receives the first activation request, the first activation has been searched whether in the activation code set locally saved Code.If so, indicating that car owner's terminal is legal, the car key function of car owner's terminal can be activated.Then, at vehicle end, from swashing Code collection living deletes the first activation code in closing, and after preventing the first activation code to be cracked, is activated again using the first activation code, improves peace Quan Xing.
In one implementation, car owner's terminal further includes that the first dynamic is secret into the first activation request that vehicle end is sent Key.As shown in figure 4, in lock switch control process, step S14 includes:
Step S41, it receives the first lock from car owner's terminal and controls request, first lock controls request packet Include the first ciphertext, the second ciphertext and dbjective state.Wherein, dbjective state can for unlocking condition, shut state etc..
If step S42, vehicle end is temporarily stored with first activation code and the first dynamic code key, described in First ciphertext is decrypted in first activation code.
If the code key that step S43, decryption obtains is identical as the first dynamic code key, controls the lock and be in the mesh Mark state, and be decrypted using the second ciphertext described in the first dynamic secret key pair, obtain the second dynamic code key.
Step S44, it deletes the first activation code and temporarily stores the second dynamic code key.
In lock switch control process, one group of verification information can be temporarily saved on vehicle end and car owner's terminal.Initially When, the first activation code and the first dynamic code key can be temporarily saved on vehicle end and car owner's terminal.When needing to control lock, in car owner Terminal generates new dynamic code key, i.e. the second dynamic code key at random.The first dynamic code key is encrypted using the first activation code, Obtain the first ciphertext.It is encrypted using first dynamic secret key pair the second dynamic code key, obtains the second ciphertext.Then, car owner is whole The first ciphertext and the second ciphertext are sent vehicle end by end.
The first activation code and the decryption of the first dynamic code key that vehicle end then utilizes itself to save.If utilizing the first activation code pair First ciphertext is decrypted, and the code key after decryption is identical as the first dynamic code key that vehicle end saves, and can permit and executes this train Lock control request, sets dbjective state for lock and for example opens.Otherwise, the control request of this lock can be refused.If control System failure, can terminate this process.If controlled successfully, first the second ciphertext of dynamic secret key pair can be continued with and solved It is close.Code key, i.e. the second dynamic code key that decryption obtains is stored in vehicle end, and deletes the first activation code, is realized to verification information Update.
In one implementation, after controlling lock switch state for the first time, subsequent to can use the dynamic temporarily stored secret Key determines whether lock described in car owner's terminal control.As shown in figure 5, this method further include:
Step S51, it receives the second lock from car owner's terminal and controls request, the second lock control request includes the Three ciphertexts, the 4th ciphertext and dbjective state.
It is dynamic using the third if step S52, vehicle end is temporarily stored with third dynamic code key and the 4th dynamic code key Third ciphertext described in state secret key pair is decrypted.
If the code key that step S53, decryption obtains is identical as the 4th dynamic code key, controls the lock and be in institute Dbjective state is stated, and is decrypted using the 4th ciphertext described in the 4th dynamic secret key pair, the 5th dynamic code key is obtained.
Step S54, it deletes third dynamic code key and temporarily stores the 5th dynamic code key.
After unlocking successfully for the first time, the verification information temporarily saved in vehicle end and car owner's terminal is had updated.It is subsequent, it opens every time When lock, a new dynamic code key is can be generated in car owner's terminal.Using in verification information two dynamic code keys and this is new Dynamic code key generate two ciphertexts, be sent to vehicle end.At vehicle end, then using the verification information temporarily saved, to two received A ciphertext is decoded.If successfully controlling lock, then update this group of verification information with new dynamic code key after decoding.
In the present embodiment, the new key for based on activation code, constantly changing and exchanging is used to carry out switch lock operation, Lock control is safer.During switch lock, do not require vehicle end that there is the function connecting with server end, car owner's terminal and vehicle The communication mode of short distance is used between end, i.e. vehicle end can be offline, and the scene of adaptation is more.
Fig. 6 shows the flow chart of lock control method according to an embodiment of the present invention.As shown in fig. 6, this method can answer For user terminal such as car owner's terminal, method includes the following steps:
Step S61, activation code set and the first activation code from server end are received, the activation code set includes institute State multiple activation codes that server end is car owner's terminal distribution.
Step S62, the activation code set is sent to vehicle end, to save the activation code set at the vehicle end.
Step S63, the first activation request is sent to the vehicle end, includes first activation in the first activation request Code, so that car owner's terminal is activated using the activation code set and first activation code in the vehicle end.In this way, can be with Lock described in car owner's terminal control is determined whether at vehicle end.
Wherein, vehicle end may refer to using the process of the activation code set and first activation code activation car owner's terminal Fig. 3 and its associated description, this will not be repeated here.
In one implementation, step S62 includes: to send initialization requests, the initialization requests to the vehicle end Including the activation code set using private key signature, the initialization requests are used for so that the vehicle end utilizes preset public key The private key signature of the activation code set is verified and saves the activation code set after being verified.Initialization Process may refer to Fig. 2 and its associated description, and this will not be repeated here.
It in one implementation, further include the first dynamic code key in the first activation request, the method also includes: The control request of the first lock is sent to the vehicle end, the first lock control request includes the first ciphertext, the second ciphertext and mesh Mark state includes in second ciphertext including the use of the first dynamic code key of the first activation code encryption in first ciphertext The the second dynamic code key encrypted using the first dynamic code key.
Wherein, vehicle end receive the first lock control request after decryption and control lock process, may refer to Fig. 4 and its Associated description, this will not be repeated here.
In one implementation, after controlling lock switch state for the first time, subsequent to can use the dynamic temporarily stored secret Key determines whether lock described in car owner's terminal control.Therefore, this method further include: send the second vehicle to the vehicle end Lock control request, second lock control request include third ciphertext, the 4th ciphertext and dbjective state, in the third ciphertext Including the use of the 4th dynamic code key that third dynamic code key encrypts, encrypted in the 4th ciphertext including the use of the 4th dynamic code key The 5th dynamic code key.
Wherein, vehicle end receive the second lock control request after decryption and control lock process, may refer to Fig. 5 and its Associated description, this will not be repeated here.
Fig. 7 shows the flow chart of lock control method according to an embodiment of the present invention.Lock control method shown in Fig. 6 On the basis of, this method can be applied to the scene that key such as gives for change at the replacement user terminal.In this scene, if necessary to use Car owner terminal of the new user terminal of former car owner as re-authentication, needs re-authentication owner identity.Therefore, as shown in fig. 7, This method is applied to the new user terminal of former car owner, this method further include:
Step S71, re-authentication request is sent to the server end, includes requesting again in the re-authentication request The identity information of car owner's terminal of certification.
Step S72, receive the authentication result response that the server end returns, if to identity information certification at Function includes then the second activation code in the authentication result response.Second activation code is logical from certification by the server end It is chosen in activation code set bound in the car owner's terminal crossed.
The second activation code chosen can be deleted in the activation code set of server end, thus prevent reset and Random collision, security performance are higher.
Step S73, the second activation request including the second activation code, the second activation request use are sent to the vehicle end In the car owner's terminal for making the vehicle end utilize second activation code activation re-authentication.
In the present embodiment, the principle of vehicle terminal is borrowed at vehicle end using the activation of the second activation code, may refer to Fig. 3 and its correlation Description, needs for the first activation code therein to be substituted for the second activation code, and car owner's terminal is substituted for car owner's terminal of re-authentication, This will not be repeated here.
In addition, vehicle end can use the temporarily stored after vehicle terminal is borrowed using second activation code activation in vehicle end Two activation codes, dynamic code key etc. come determine whether borrow vehicle terminal control lock.Concrete principle may refer to Fig. 4,5 and its phase Description is closed, needs for the first activation code therein to be substituted for the second activation code, the car owner that car owner's terminal is substituted for re-authentication is whole End, this will not be repeated here.
Fig. 8 shows the flow chart of lock control method according to an embodiment of the present invention.Lock control method shown in Fig. 6 On the basis of, this method can be applied to the scene of the replacement car owner such as used car sale.In this scene, usually both need replacing User terminal, it is also desirable to replace owner identity.Therefore, if it is desirable to using the new user terminal of new car owner as request change Car owner's terminal needs to change owner identity.Therefore, as shown in figure 8, this method is applied to the new user terminal of new car owner, the party Method further include:
Step S81, car owner being sent to the server end and changing request, it includes request change that the car owner, which changes in request, Car owner's terminal identity information.
Step S82, it receives the server end and returns to car owner's change response, if changed successfully, car owner's change It include third activation code in response.Third activation code is chosen from activation code set bound in car owner's terminal as server end 's.In addition, the third activation code chosen can be deleted in the activation code set of server end, thus prevent from resetting and Random collision, security performance are higher.
Wherein, after receiving former car owner's terminal or car owner's replacement request of new car master terminal transmission, server end can be released The binding relationship of former car owner's terminal and activation code set, establishes the binding relationship of new car master terminal Yu the activation code set.New car Master terminal is exactly car owner's terminal after change.
Step S83, the third including the third activation code being sent to the vehicle end and activating request, the third activation is asked It asks for making the vehicle end using car owner's terminal after third activation code activation change.
In the present embodiment, the principle of vehicle terminal is borrowed at vehicle end using the activation of third activation code, may refer to Fig. 3 and its correlation Description needs for the first activation code therein to be substituted for third activation code, and car owner's terminal is substituted for car owner's terminal of request change, This will not be repeated here.
In addition, vehicle end can use the temporarily stored after vehicle terminal is borrowed using third activation code activation in vehicle end Three activation codes, dynamic code key etc. come determine whether borrow vehicle terminal control lock.Concrete principle may refer to Fig. 4,5 and its phase Description is closed, needs for the first activation code therein to be substituted for third activation code, the car owner that car owner's terminal is substituted for request change is whole End, this will not be repeated here.
Fig. 9 shows the flow chart of lock control method according to an embodiment of the present invention.Lock control method shown in Fig. 6 On the basis of, this method can be applied to the scene for borrowing the vehicles such as vehicle shared.In this scene, it usually needs car owner's terminal be by means of Vehicle authorization terminal.Therefore, as shown in figure 9, this method is applied to car owner's terminal, this method further include:
Step S91, it receives and borrows vehicle to request from the server end, described borrow in vehicle request includes that borrowing for vehicle is borrowed in request The identity information of vehicle terminal and authority application.
Step S92, being sent according to the identity information by means of vehicle terminal and authority application to the server end borrows vehicle to ring It answers, the authority information by means of in vehicle response including using the vehicle end described in authorization by means of vehicle terminal.
Wherein, it is described borrow vehicle response be used for so that the server end to it is described borrow vehicle terminal transmission allow borrow vehicle message, Described to allow to borrow including the 4th activation code and the authority information in vehicle message, the 4th activation code is by the server end It is chosen from the activation code set of car owner's terminal.The chose the 4th can be swashed in the activation code set of server end Code living is deleted, to prevent playback and random collision, security performance higher.
It is described to allow that vehicle information is borrowed to be used for so that described send by means of vehicle terminal to the vehicle end includes the of the 4th activation code Four activation requests.The 4th activation request is used for so that the vehicle end borrows vehicle whole using the 4th activation code activation is described End.
In the present embodiment, the principle of vehicle terminal is borrowed at vehicle end using the activation of the 4th activation code, may refer to Fig. 3 and its correlation Description, needs the first activation code therein being substituted for the 4th activation code, car owner's terminal is substituted for by means of vehicle terminal, does not go to live in the household of one's in-laws on getting married herein It states.
In addition, vehicle end can use the temporarily stored after vehicle terminal is borrowed using the 4th activation code activation in vehicle end Four activation codes, dynamic code key etc. come determine whether borrow vehicle terminal control lock.Concrete principle may refer to Fig. 4,5 and its phase Description is closed, needs the first activation code therein being substituted for the 4th activation code, car owner's terminal is substituted for by means of vehicle terminal, does not go to live in the household of one's in-laws on getting married herein It states.
In one implementation, as shown in Figure 10, vehicle, this method are borrowed if necessary to revocation further include:
Step S101, sending revocation to the server end borrows vehicle to request, and the revocation borrows vehicle request described for requesting Server end sends revocation to the vehicle end and borrows vehicle message, and vehicle message is borrowed to be used for for the revocation so that described borrow is forbidden at the vehicle end Lock described in vehicle terminal control.
Step S102, it receives the revocation that the server end returns to respond by means of vehicle, it includes being that the revocation, which is borrowed in vehicle response, The state of vehicle is borrowed in no successfully revocation.
Figure 11 shows the flow chart of lock control method according to an embodiment of the present invention.As shown in figure 11, this method can be with Applied to server end, method includes the following steps:
Step S111, the initialization requests from car owner's terminal are received.
It step S112, is the multiple activation codes of car owner's terminal distribution, this multiple activation code can be formed to be had with car owner's terminal There is the activation code set of binding relationship.
Step S113, the first activation code is chosen from the activation code set of car owner's terminal, the activation code set includes institute State multiple activation codes that server end is car owner's terminal distribution.It, can be in the activation code set of server end after selection It is middle to delete the first activation code, to prevent playback and random collision, security performance higher.
Step S114, activation code set and the first activation code are sent to car owner's terminal, by car owner's terminal to Vehicle end sends the activation code set and first activation code, so that the vehicle end utilizes the activation code set and described First activation code activates car owner's terminal.Lock switch control process after activation process and activation may refer to aforementioned implementation The associated description of example.
Figure 12 shows the flow chart of lock control method according to an embodiment of the present invention.The lock controlling party shown in Figure 11 On the basis of method, this method can be applied to the scene that key such as gives for change at the replacement user terminal.In this scene, adopt if necessary The new user terminal of former car owner is used to need re-authentication owner identity as car owner's terminal of re-authentication.Therefore, such as Figure 12 institute Show, this method is applied to server end, this method further include:
Step S121, the re-authentication for receiving car owner's terminal from re-authentication is requested, in the re-authentication request Identity information including requesting car owner's terminal of re-authentication.
If step S122, authenticated successfully to the identity information, the second activation is chosen from the activation code set Code.
After authenticating successfully, server end can find activation code set bound in car owner's terminal, therefrom choose second Activation code.In addition, the second activation code chosen can be deleted in the activation code set of server end, to prevent from resetting And random collision, security performance are higher.
Step S123, the authentication result including the second activation code is returned to car owner's terminal of re-authentication to respond, it is described to recognize Card result response is used for so that car owner's terminal of re-authentication sends the second activation including the second activation code to the vehicle end and asks It asks.The second activation request is used for so that car owner's terminal of re-authentication is activated at the vehicle end using second activation code. Lock switch control process after activation process and activation may refer to the associated description of previous embodiment.
Figure 13 shows the flow chart of lock control method according to an embodiment of the present invention.The lock controlling party shown in Figure 11 On the basis of method, this method can be applied to the scene of the replacement car owner such as used car sale.In this scene, usually both needed more Change user terminal, it is also desirable to replace owner identity.Therefore, if it is desirable to using the new user terminal of new car owner as request change Car owner's terminal, need to change owner identity.Therefore, as shown in figure 13, this method is applied to server end, and this method is also wrapped It includes:
Step S131, it receives the car owner from new car master terminal and changes request, it includes request in request that the car owner, which changes, The identity information of car owner's terminal of change.
If step S132, changed successfully, third activation code is chosen from the activation code set.
Wherein, it is closed in the binding that server end can release former car owner's terminal and the activation code set for vehicle end distribution System, establishes the binding relationship of new car master terminal Yu the activation code set.Server end can be to choose in this activation code set Three activation codes.In addition, the third activation code chosen can be deleted in the activation code set of server end, to prevent weight It puts and random collision, security performance is higher.
Step S133, the car owner including third activation code is returned to car owner's terminal after change change response, the car owner Change response is used for so that car owner's terminal after change is activated to the third that vehicle end transmission includes the third activation code Request.The third activation request is used for so that the vehicle end utilizes car owner's terminal after third activation code activation change. Lock switch control process after activation process and activation may refer to the associated description of previous embodiment.
Figure 14 shows the flow chart of lock control method according to an embodiment of the present invention.The lock controlling party shown in Figure 11 On the basis of method, this method can be applied to the scene for borrowing the vehicles such as vehicle shared.In this scene, it usually needs car owner's terminal is By means of vehicle authorization terminal.Therefore, as shown in figure 14, this method is applied to server end, this method further include:
Step S141, receive from borrow vehicle terminal borrow vehicle request, it is described by means of vehicle request in include request borrow vehicle borrow vehicle The identity information of terminal.By means of vehicle request in can also include authority application, such as application with several days, how much etc. of paying daily.
Step S142, it is sent to car owner's terminal and borrows vehicle message, described borrow in vehicle message includes described by means of vehicle terminal Identity information.By means of can also include authority application by means of vehicle terminal in vehicle request.
Step S143, the authorization response from car owner's terminal is received, includes being borrowed described in authorization in the authorization response Vehicle terminal uses the authority information at the vehicle end.
Step S144, the 4th activation code is chosen from the activation code set.
After server end is authorized, activation code set bound in car owner's terminal can be searched, therefrom chooses the 4th Activation code.In addition, the 4th activation code chosen can be deleted in the activation code set of server end, to prevent from resetting And random collision, security performance are higher.
Step S145, send to described by means of vehicle terminal includes that the 4th activation code and the authority information allow to disappear by means of vehicle It ceases, it is described to allow that vehicle message is borrowed to be used for so that described send the 4th activation including the 4th activation code to the vehicle end by means of vehicle terminal It requests, the 4th activation request is used for so that vehicle terminal is borrowed using the 4th activation code activation is described in the vehicle end.Activation Lock switch control process after process and activation may refer to the associated description of previous embodiment.
In one implementation, as shown in figure 15, vehicle, this method are borrowed if necessary to revocation further include:
Step S151, the revocation for receiving car owner's terminal is requested by means of vehicle.
Step S152, revocation being sent to the vehicle end and borrowing vehicle message, the revocation borrows vehicle message to be used for so that the vehicle end Forbid described by means of lock described in vehicle terminal control.
Step S153, it receives the revocation that the vehicle end returns and borrows vehicle results messages, the revocation is borrowed wraps in vehicle results messages Include the state whether successfully revocation borrows vehicle.
Step S154, vehicle terminal is borrowed to send revocation by means of vehicle notice to described, the revocation is borrowed to be included whether into vehicle notice The state of vehicle is borrowed in function revocation.
In one implementation, vehicle can be borrowed to notify when vehicle success is borrowed in revocation, then to borrowing vehicle terminal to send revocation, with Notice borrows vehicle terminal revocation.When vehicle failure is borrowed in revocation, it can not notify to borrow vehicle terminal.
In another implementation, no matter vehicle success or failure are borrowed in revocation, revocation can be sent to by means of vehicle terminal It is notified by means of vehicle.
Step S155, sending revocation to car owner's terminal borrows vehicle to respond, and the revocation is borrowed to be included whether into vehicle response The state of vehicle is borrowed in function revocation.
In application example, user terminal is mobile phone, server end be cloud, vehicle controller be vehicle end.User's example The mobile phone of such as car owner can be communicated by the remote communication of mobile network with cloud.Mobile phone can short distance Communication is communicated with the controller of vehicle.For example, the controller of vehicle has Bluetooth function.The control of mobile phone and vehicle Device is communicated by Bluetooth function.
It is illustrated below as each stage of the different application scenarios to the lock control method.
In factory configuration phase, controller bluetooth-capable can be installed in the car.It, can be preset when producer supplies Unified safe soft development kit (SDK, Software Development Kit) and public key.It is offline in vehicle production When, do not need the offline configuration for being additionally carried out bluetooth car key.User buys vehicle, after registered vehicle account, can pass through Mobile phone initializes vehicle to cloud, and the bluetooth car key in Activating Phone, and then controls the lock state of the vehicle.
Scene one: key initialization.
As shown in figure 16, key initialization process may comprise steps of:
Step S161, user, which is applied for the registration of by mobile phone to cloud, becomes the car owner of some vehicle.After succeeding in registration, pass through Mobile phone requests the bluetooth car key in initialization mobile phone to cloud.Wherein, mobile phone can send registration request, initialization to cloud Request etc., completes the registration and initialization process.In registration, user is each needed for needing to upload registration to cloud by mobile phone Kind identity information, such as: user name, name, address, the essential information at vehicle end, various documentary evidences etc..
Step S162, after car owner's registration, cloud can be bound car owner and vehicle end.Also, cloud can be the car owner An activation code book is distributed with the vehicle end.It include the activation code set of multiple activation codes in the activation code book.In addition, cloud may be used also To be one activation code of the handset allocation of the main vehicle from the activation code book.Cloud initializes and successfully rings to mobile phone return It at once, can in the response include the activation code book and the activation code etc..
Also, in activation code book beyond the clouds, this activation code that can will be handed down to the mobile phone of the car owner is deleted, and is prevented Only repetitive endowment.
In addition, the activation code book can use private key signature in order to guarantee safety.
Step S163, user sends the initialization requests of key by mobile phone to vehicle end, includes using private in the request The activation code book of key signature.Wherein, both private key signature can be carried out to activation code book in the case where single channel encryption;It can also Further to encrypt to activation code book, the complexity of encryption can be according to the demand flexible choice of practical application scene.
Step S164, vehicle end can use the private key signature of the preset public key verifications activation code book, protect after being proved to be successful Deposit the activation code book.For example, signature can be verified under the Physical key unlocking condition of vehicle.
Step S165, vehicle end returns to initialization success response to mobile phone.
Step S166, after mobile phone receives the initialization success response at vehicle end, the activation code book in mobile phone can be deleted, in this way It can prevent from cracking activation code book from mobile phone.
In this scene, mobile phone and vehicle end can be using short-range wireless communication modes such as bluetooths.In this way, vehicle end is not required to Mobile network's linkage function can be not provided with cloud direct communication.That is, in initialization process, Che Duanke from Line.
Scene two: key activation.
As shown in figure 17, key activation process may comprise steps of:
Step S171, user sends activation request to vehicle end by mobile phone, can be with activation code, dynamic in activation request The attribute informations such as code key (key0) and permission.128 data that key0 can be generated at random for the key of mobile phone activation.
Step S172, the activation code received is compared with activation code book at vehicle end.It should if existed in the activation code book Activation code, then it represents that activate successfully.At this moment, this activation code can be deleted from activation code book.Further, it is also possible to temporarily save The activation code and the dynamic code key (key0).
If step S173, activated successfully, vehicle end can return to activation success response to the mobile phone.
In activation process, Che Duanke is offline.Every time after activation, used activation code is deleted from activation code book, it can be with Prevent playback and random collision.
Scene three: switch lock.
As shown in figure 18, switch lock process may comprise steps of:
Step S181, user sends lock control request to vehicle end for the first time by mobile phone.
After key activation, activation code and key0 are temporarily preserved in mobile phone.It is secret to generate 128 dynamics at random in mobile phone Key key1.Key1 is encrypted using key0 and generates key1 ciphertext, key0 is encrypted using activation code and generates key0 ciphertext.In lock It may include key1 ciphertext and key0 ciphertext in control request.In addition, can also include that request is unlocked also in lock control request It is the Status Flag shut.
Step S182, after vehicle end receives lock control request for the first time, it can use the activation code itself temporarily saved and move The ciphertext in the request is decrypted in state code key key0.Decryption and successful match after, vehicle end can to mobile phone return open for the first time/ Shut successful response.
Specifically, key0 is obtained with activation code decryption key0 ciphertext.Compare what the key0 that decoding obtains was received with previous step Whether dynamic code key key0.If the same, successful match is indicated, can permit the unlocking that lock is arranged to this request State shuts state.After successful match, key1 is being obtained using key0 decryption key1 ciphertext.Activation code is deleted at vehicle end, is faced Shi Baocun key0 and key1.
Step S183, user sends lock control request to vehicle end again by mobile phone.
Key0 and key1 are temporarily preserved in mobile phone.Generate 128 dynamic code key key2 at random in mobile phone.It utilizes Key1 encrypts key2 and generates key2 ciphertext, is encrypted using key0 to key1 and generates key1 ciphertext.It can in lock control request To include key2 ciphertext and key1 ciphertext.In addition, can also include the state that request unlocking is still shut in lock control request Mark.
Step S184, after vehicle end is received again by lock control request, it can use the dynamic code key itself temporarily saved The ciphertext in the request is decrypted in key0 and key1.Decryption and successful match after, vehicle end can to mobile phone return open again/ Shut successful response.
Specifically, key1 is obtained with key0 decryption key1 ciphertext.The key1 that decoding obtains is compared to move with what previous step received Whether state code key key1.If the same, successful match is indicated, can permit the unlocking shape that lock is arranged to this request State shuts state.After successful match, key2 is being obtained using key1 decryption key2 ciphertext.Activation code is deleted at vehicle end, temporarily Save key1 and key2.
Step S185, user sends lock control request to vehicle end again by mobile phone.
Key1 and key2 are temporarily preserved in mobile phone.Generate 128 dynamic code key key3 at random in mobile phone.It utilizes Key2 encrypts key3 and generates key3 ciphertext, is encrypted using key1 to key2 and generates key2 ciphertext.It can in lock control request To include key3 ciphertext and key2 ciphertext.In addition, can also include the state that request unlocking is still shut in lock control request Mark.
Step S186, after vehicle end is received again by lock control request, can use the activation code that itself temporarily saves and The ciphertext in the request is decrypted in key0.After decryption and successful match, vehicle end can return to mobile phone and lock on/off into again The response of function.
Specifically, key2 is obtained with key1 decryption key2 ciphertext.The key2 that decoding obtains is compared to move with what previous step received Whether state code key key2.If the same, successful match is indicated, can permit the unlocking shape that lock is arranged to this request State shuts state.After successful match, key3 is being obtained using key2 decryption key3 ciphertext.Activation code is deleted at vehicle end, temporarily Save key2 and key3.
Similar with step S185, step S186 in subsequent switch lock process, vehicle end utilizes the one group of dynamic temporarily stored The ciphertext in lock control request that secret key pair is received again by is decrypted and matches, and updates the code key temporarily stored after success.
In this scene, Che Duanke is offline.The controller at vehicle end is by temporarily saving one group of code key and newly obtaining from mobile phone The code key obtained, these three values are compared, and can put playback, and security performance is high.
Scene four: key is given for change.
As shown in figure 19, key is given process for change and be may comprise steps of:
Step S191, cloud can send the message for forbidding authorization, the authorization before cancelling to former mobile phone.The step can To be initiated by cloud, can also decide whether to initiate by terminal.
For example, losing or replacing if it is former mobile phone, it is desirable to which the authorization before cancelling, then cloud receives car owner's new cell-phone Send report the loss request after to former mobile phone send forbid authorization message.Certainly, report the loss mode also there are many, such as pass through phone It reports the loss, by reporting the loss after website log car owner's account, being reported the loss by mobile phone.
Step S192, user sends re-authentication to cloud using new cell-phone and requests.May include in re-authentication request The various identity informations of user, such as: account, some documentary evidences of Additional Verification of registration etc..
Step S193, it after cloud authenticates successfully, can be responded to new cell-phone return authentication result.If it is success response, It wherein can be with new activation code.If it is failure response, then new cell-phone needs continue to authenticate, and can just receive until by certification New activation code.
Wherein, cloud can choose the new activation code from the corresponding activation code book of the user and the end Che.In order to choose it Afterwards, which can be deleted from the activation code book in cloud.
Step S194, after new cell-phone receives new activation code, activation process can be re-executed, is retouched referring to the correlation of scene two It states.After activating successfully, new cell-phone can control the lock state at the vehicle end.Control flow may refer to the correlation of scene three Description.
Scene five: used car sale.
As shown in figure 20, the key replacement process in used car sale scene may comprise steps of:
Step S201, user sends car owner to cloud by mobile phone and changes request.
In this step, either former car owner, which sends car owner to cloud by mobile phone, changes request, it is also possible to new car It is main that car owner's change request is sent to cloud by mobile phone.
It for former car owner, is changed and is requested by car owner, can requested to release former car owner and the vehicle end, activate code book Binding relationship.It for new car owner, is changed and is requested by car owner, the functions such as new user's registration, new user complaint may be implemented. In the case where former car owner's not actively unbinding relationship, the binding relationship that new car owner can request cloud compulsory commutation original, Establish oneself account and the binding relationship at the vehicle end and its activation code book.In order to guarantee the safety of transaction, new car owner is also required to The account information of itself, various documentary evidences such as used car purchase vehicle contract etc. are uploaded to cloud to verify.
Step S202, after cloud successfully resets binding relationship, an activation code can be taken from activation code book, be sent to The mobile phone of new car owner.
Step S203, after the mobile phone of new car owner receives activation code, activation process can be re-executed, referring to the phase of scene two Close description.After activating successfully, the mobile phone of new car owner can control the lock state at the vehicle end.Control flow may refer to field The associated description of scape three.
In this scene, Che Duanke is offline.When original car owner mismatches in time, new car owner can also force to unbind by cloud It is fixed, so that the mobile phone key failure of former car owner.
Scene six: the controller replacement at vehicle end.
As shown in figure 21, if the controller at vehicle end needs more for some reason such as damaging, functional lability It changes.After replacement, mobile phone and vehicle end need to re-execute initialization and activation process, can specifically include following steps:
Step S211, user is sent to cloud by mobile phone and reinitializes request, by the identity information of user such as account Number information and some documentary evidences of Additional Verification etc. upload to cloud, to reinitialize the bluetooth key in mobile phone.
Step S212, after cloud certification passes through, the new controller at the car owner and vehicle end can be bound, resets the vehicle end Activation code information.Cloud can redistribute an activation code book for the new controller at the car owner and the end Che, also available to be somebody's turn to do The original activation code book of car owner.And an activation code is taken out from activation code book and distributes to the car owner.Such as pass through success response The activation code book and activation code are issued into mobile phone.
Step S213, user re-executes initialization and activation process by mobile phone.Specifically, user by mobile phone to Vehicle end retransmits the activation code book.The activation code book is saved in the new controller at vehicle end, referring to scene one.Then, mobile phone It is reactivated using the activation code received, referring to scene two.After activating successfully, user can be with the vehicle end by the mobile phone New controller interaction, controls the lock state at the vehicle end.Control flow may refer to the associated description of scene three.
In this scene, Che Duanke is offline.
Scene seven: vehicle is borrowed.
As shown in figure 22, it may comprise steps of by means of wagon flow journey:
Step S221, car borrowing people's mobile phone sends registration request to cloud.
If step S222, succeeded in registration, cloud sends success response to car borrowing people's mobile phone.
Step S223, car borrowing people's mobile phone is sent to cloud borrows vehicle to request, including car borrowing people's information.In addition, being asked by means of vehicle It also may include authority application in asking, for example, it is desired to borrow several days etc..
Step S224, cloud sends to car owner's mobile phone and borrows vehicle message, including car borrowing people's information.
Step S225, car owner's mobile phone can check car borrowing people's information, to decide whether that vehicle, and the power by means of vehicle are borrowed in authorization Limit information.For example, the duration etc. for allowing car borrowing people to use.Car owner's mobile phone can be returned to cloud borrows vehicle to respond.If car owner is same Meaning borrows vehicle, by means of may include confirmation permission, the authorization attributes such as time in vehicle response.
Step S226, after cloud receives authorization response, an activation code can be taken out from the activation code book at the vehicle end, it will Activation code, permission and private key signature etc. are sent to car borrowing people's mobile phone.Also, cloud can by the activation code of taking-up from activation code book Middle deletion.
Step S227, car borrowing people's mobile phone can re-execute key activation process, referring to scene two.After activating successfully, use Family can control the lock state at the vehicle end by car borrowing people's mobile phone.The correlation that control flow may refer to scene three is retouched It states.
In this scene, Che Duanke is offline.
Scene eight: vehicle is borrowed in revocation.
As shown in figure 23, revocation borrows wagon flow journey may comprise steps of:
Step S231, car owner's mobile phone sends revocation to cloud and borrows vehicle request, and vehicle authorization is borrowed in the revocation of request cloud.
Step S232, cloud sends revocation to vehicle end and borrows vehicle message, and instruction vehicle end is cancelled the authorization to the car borrowing people, forbidden Car borrowing people's mobile phone controls lock.
Step S233, vehicle end to cloud feedback cancellation borrow vehicle as a result, such as cancel successfully or cancel unsuccessfully.
If step S234, vehicle success is borrowed in revocation, cloud sends the notification message for cancelling authorization to car borrowing people's mobile phone, with Notify car borrowing people's mobile phone vehicle end borrows vehicle permission to be cancelled.Car borrowing people's mobile phone can be prompted with display suppression.
Step S235, cloud sends revocation to car owner's mobile phone and borrows vehicle response, to feed back the state cancelled at present to car owner.Example It such as cancels successfully or cancels unsuccessfully.
In this scene, Che Duanke is offline.But if the mobile phone of car owner or car borrowing people can not network, cancellation is awarded by means of vehicle Power possibly can not come into force in real time.
The embodiment of the present invention has following advantages from lock control method:
1, when dispatching from the factory, in the bluetooth controller at vehicle end, preset unified safe transmission SDK and public key, therefore, in automobile Production link, it is no longer necessary to carry out offline configuration.
2, user car owner succeeds in registration, and by car owner authenticate after, carry out key initialization.Cloud is that the vehicle generates activation Code book, and car owner, vehicle and activation code book are bound.
3, cloud carries out generation, management and the distribution of activation code book (intensifying code collection conjunction), guarantees the activation of each vehicle all Code book does not repeat, and realizes that a vehicle one is close.Since each car has a set of activation code book of oneself, a vehicle is cracked, does not influence The safety of other vehicles.
4, when activating car key, the activation code of one key is transparent to vehicle end using mobile phone, key is verified at vehicle end This in activation code book is noted down and is deleted after activating code book range by activation code.It is thereby achieved that burn-after-reading, is eliminated stolen Hidden danger, can carry out key safely authorizes sharing.In addition, indigo plant can be passed through in local handset and vehicle end in activation Tooth interacts, and not needing vehicle has movable signal.
5, vehicle is initialized when can use for the first time with key, activates key.It does not need before: when such as vehicle is offline The individual cultivation for carrying out vehicle key simplifies process, saves cost.
6, activation code and cipher key separation undertake the role of different phase, and after car key activates successfully, use is with activation code Based on, constantly change and exchange new key carry out switch lock operation, be the algorithm of a type rolling code.Using this unique Dynamic key algorithm protects business function, so that switch lock process is safer.During switch lock, mobile phone A pp and vehicle end By local bluetooth interaction, movable signal is not needed.
Figure 24 shows the structural block diagram of lock control device according to an embodiment of the present invention.The device can be set in vehicle end Such as in controller.As shown in figure 24, the apparatus may include:
First receiving module 241, for receiving and saving the activation code set from car owner's terminal, the activation code set It is to be obtained by car owner's terminal from server end, the activation code set includes that the server end is car owner's terminal Multiple activation codes of distribution;
Second receiving module 242, for receiving the first activation request from car owner's terminal, first activation is asked It include the first activation code in asking;
First active module 243, for activating the car owner whole using the activation code set and first activation code End;
First control module 244, for determining whether car owner's terminal control institute using first activation code State lock.
In one implementation, first receiving module 241 is also used to receive from the initial of car owner's terminal Change request, the initialization requests include the activation code set using private key signature;Utilize the public key pair for being preset at vehicle end The private key signature of the activation code set is verified, and the activation code set is saved after being verified.
In one implementation, if first active module 243 be also used to first activation code belong to it is described Activation code set, it is determined that the car key function activation success of car owner's terminal;It is deleted from the activation code set Used first activation code.
It in one implementation, further include the first dynamic code key in the first activation request, the first control mould Block 244 is also used to:
It receives the first lock from car owner's terminal and controls request, the first lock control request includes first close Text, the second ciphertext and dbjective state;
If vehicle end is temporarily stored with first activation code and the first dynamic code key, first activation is utilized First ciphertext is decrypted in code;
If it is identical as the first dynamic code key to decrypt obtained code key, controls the lock and is in the dbjective state, And be decrypted using the second ciphertext described in the first dynamic secret key pair, obtain the second dynamic code key;
It deletes the first activation code and temporarily stores the second dynamic code key.
In one implementation, first control module 244 is also used to:
Receive the second lock from car owner's terminal and control request, the second lock control request include third ciphertext, 4th ciphertext and dbjective state;
If vehicle end is temporarily stored with third dynamic code key and the 4th dynamic code key, the third dynamic secret key pair is utilized The third ciphertext is decrypted;
If it is identical as the 4th dynamic code key to decrypt obtained code key, controls the lock and be in the target-like State, and be decrypted using the 4th ciphertext described in the 4th dynamic secret key pair, obtain the 5th dynamic code key;
It deletes third dynamic code key and temporarily stores the 5th dynamic code key.
Figure 25 shows the structural block diagram of lock control device according to an embodiment of the present invention.As shown in figure 25, which can To include:
Third receiving module 250, for receiving activation code set and the first activation code from server end, the activation Code collection closes the multiple activation codes for including the server end for car owner's terminal distribution;
First sending module 251, for sending the activation code set to vehicle end, to save the activation at the vehicle end Code collection is closed;
Second sending module 252 is requested for sending the first activation to the vehicle end, includes in the first activation request First activation code, so that the vehicle end activates the car owner whole using the activation code set and first activation code End.
In one implementation, first sending module 251 is also used to send initialization requests, institute to the vehicle end Stating initialization requests includes the activation code set using private key signature, and the initialization requests are used for so that the vehicle end is sharp It is verified with private key signature of the preset public key to the activation code set and saves the activation code collection after being verified It closes.
It in one implementation, further include the first dynamic code key, as shown in figure 26, the dress in the first activation request It sets further include:
Third sending module 253 is also used to send the control request of the first lock, the first lock control to the vehicle end Request includes the first ciphertext, the second ciphertext and dbjective state, including the use of the of the first activation code encryption in first ciphertext One dynamic code key, the second dynamic code key encrypted including the use of the first dynamic code key in second ciphertext.
In one implementation, the device further include:
4th sending module 254 is also used to send the control request of the second lock, the second lock control to the vehicle end Request includes third ciphertext, the 4th ciphertext and dbjective state, is encrypted in the third ciphertext including the use of third dynamic code key 4th dynamic code key, the 5th dynamic code key encrypted including the use of the 4th dynamic code key in the 4th ciphertext.
In one implementation, which further includes the first re-authentication module 261.The first re-authentication module 261 are used for:
Re-authentication request is sent to the server end, includes the vehicle of request re-authentication in the re-authentication request The identity information of master terminal;
The authentication result response that the server end returns is received, it is described if authenticated successfully to the identity information Authentication result response in include the second activation code, second activation code be by the server end from the activation code set It chooses;
The second activation request including the second activation code is sent to the vehicle end, the second activation request is used for so that institute Vehicle end is stated using car owner's terminal of second activation code activation re-authentication.
In one implementation, which further includes that the first car owner changes module 262.First car owner changes module 262 are used for:
Car owner is sent to the server end and changes request, includes car owner's end of request change in car owner's change request The identity information at end;
It receives the server end and returns to car owner's change response, if changed successfully, the car owner changes to wrap in response Third activation code is included, the third activation code is chosen from the activation code set by the server end;
The third including the third activation code is sent to the vehicle end and activates request, and the third activation request is for making The vehicle end is obtained using car owner's terminal after third activation code activation change.
In one implementation, which further includes first by means of vehicle module 263.Described first borrows vehicle module 263 to be used for:
Receive and borrow vehicle to request from the server end, it is described by means of include in vehicle request request borrow vehicle borrow vehicle terminal Identity information;
Being sent according to the identity information by means of vehicle terminal and authority application to the server end borrows vehicle to respond, described to borrow It include the authorization authority information that the vehicle end is used by means of vehicle terminal in vehicle response;
Wherein, it is described borrow vehicle response be used for so that the server end to it is described borrow vehicle terminal transmission allow borrow vehicle message, Described to allow to borrow including the 4th activation code and the authority information in vehicle message, the 4th activation code is by the server end It is chosen from the activation code set;
It is described to allow that vehicle information is borrowed to be used for so that described send by means of vehicle terminal to the vehicle end includes the of the 4th activation code Four activation are requested, and the 4th activation request is used for so that the vehicle end borrows vehicle whole using the 4th activation code activation is described End.
In one implementation, which further includes that vehicle module 264 is borrowed in the first revocation.Vehicle module is borrowed in first revocation 264 are used for:
To the server end send revocation borrow vehicle request, it is described revocation borrow vehicle request for request the server end to The vehicle end sends revocation and borrows vehicle message, and vehicle message is borrowed to be used for for the revocation so that the vehicle end forbids described borrowing vehicle terminal control The lock;
It receives the revocation that the server end returns to respond by means of vehicle, the revocation is borrowed to be included whether successfully to cancel in vehicle response By means of the state of vehicle.
Figure 27 shows the structural block diagram of lock control device according to an embodiment of the present invention.As shown in figure 27, which can To include:
First chooses module 271, for choosing the first activation code, the activation code from the activation code set of car owner's terminal Set includes multiple activation codes that the server end is car owner's terminal distribution;
5th sending module 272, for sending the activation code set and first activation code to car owner's terminal, The activation code set and first activation code are sent to vehicle end by car owner's terminal, so that the vehicle end utilizes institute It states activation code set and first activation code activates car owner's terminal.
In one implementation, as shown in figure 28, which further includes the second re-authentication module 281.Described second Re-authentication module 281 is used for:
The re-authentication request of car owner's terminal from re-authentication is received, includes request weight in the re-authentication request The identity information of the car owner's terminal newly authenticated;
If authenticated successfully to the identity information, the second activation code is chosen from the activation code set;
It returns to the authentication result including second activation code to car owner's terminal of re-authentication to respond, the authentication result Response be used for so that re-authentication car owner's terminal to the vehicle end send include the second activation code second activation request, it is described Second activation request is used for so that car owner's terminal of re-authentication is activated at the vehicle end using second activation code.
In one implementation, which further includes that the second car owner changes module 282.Second car owner changes module 282 are used for:
It receives the car owner from new car master terminal and changes request, include the car owner of request change in car owner's change request The identity information of terminal;
If changed successfully, third activation code is chosen from the activation code set;
The car owner including the third activation code is returned to car owner's terminal after change and changes response, and the car owner, which changes, to ring Applied to so that car owner's terminal after change sends the third including the third activation code to the vehicle end and activates request, institute Third activation request is stated to be used for so that the vehicle end utilizes car owner's terminal after third activation code activation change.
In one implementation, which further includes second by means of vehicle module 283.Described second borrows vehicle module 283 to be used for:
It receives from requesting by means of vehicle for vehicle terminal is borrowed, described borrow includes the identity by means of vehicle terminal for requesting to borrow vehicle in vehicle request Information and authority application;
It is sent to car owner's terminal and borrows vehicle message, it is described by means of the identity information for borrowing vehicle terminal in vehicle message including described in;
The authorization response from car owner's terminal is received, including that authorization is described in the authorization response borrows vehicle terminal to use The authority information at the vehicle end;
The 4th activation code is chosen from the activation code set;
It include that the 4th activation code and the authority information allow to borrow vehicle message to described send by means of vehicle terminal;
Wherein, described to allow that vehicle message is borrowed to be used for so that described borrow vehicle terminal to send to the vehicle end including the 4th activation code The 4th activation request, the 4th activation request is used for so that the vehicle end is activated using the 4th activation code described borrows vehicle Terminal.
In one implementation, which further includes that vehicle module 284 is borrowed in the second revocation.Vehicle module is borrowed in second revocation 284 are used for:
The revocation for receiving car owner's terminal is requested by means of vehicle;
Revocation is sent to the vehicle end and borrows vehicle message, and vehicle message is borrowed to be used for for the revocation so that described borrow is forbidden at the vehicle end Lock described in vehicle terminal control;
It receives the revocation that the vehicle end returns and borrows vehicle results messages, the revocation, which is borrowed in vehicle results messages, includes whether success The state of vehicle is borrowed in revocation;
Vehicle terminal is borrowed to send revocation by means of vehicle notice to described, the revocation is borrowed to be included whether successfully to cancel by means of vehicle in vehicle notice State;
Sending revocation to car owner's terminal borrows vehicle to respond, and the revocation is borrowed to be included whether successfully to cancel by means of vehicle in vehicle response State.
The function of each module in each device of the embodiment of the present invention may refer to the corresponding description in the above method, herein not It repeats again.
Figure 29 shows the structural block diagram of lock control device according to an embodiment of the present invention.As shown in figure 29, the device packet Include: memory 910 and processor 920 are stored with the computer program that can be run on processor 920 in memory 910.It is described Processor 920 realizes the lock control method in above-described embodiment when executing the computer program.The memory 910 and place The quantity for managing device 920 can be one or more.
The device further include:
Communication interface 930 carries out data interaction for being communicated with external device.
Memory 910 may include high speed RAM memory, it is also possible to further include nonvolatile memory (non- Volatile memory), a for example, at least magnetic disk storage.
If memory 910, processor 920 and the independent realization of communication interface 930, memory 910,920 and of processor Communication interface 930 can be connected with each other by bus and complete mutual communication.The bus can be Industry Standard Architecture Structure (ISA, Industry Standard Architecture) bus, external equipment interconnection (PCI, Peripheral Component) bus or extended industry-standard architecture (EISA, Extended Industry Standard Component) bus etc..The bus can be divided into address bus, data/address bus, control bus etc..For convenient for expression, Figure 29 In only indicated with a thick line, it is not intended that an only bus or a type of bus.
Optionally, in specific implementation, if memory 910, processor 920 and communication interface 930 are integrated in one piece of core On piece, then memory 910, processor 920 and communication interface 930 can complete mutual communication by internal interface.
The embodiment of the invention provides a kind of computer readable storage mediums, are stored with computer program, the program quilt Processor realizes any method in above-described embodiment when executing.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.Moreover, particular features, structures, materials, or characteristics described It may be combined in any suitable manner in any one or more of the embodiments or examples.In addition, without conflicting with each other, this The technical staff in field can be by the spy of different embodiments or examples described in this specification and different embodiments or examples Sign is combined.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic." first " is defined as a result, the feature of " second " can be expressed or hidden It include at least one this feature containing ground.In the description of the present invention, the meaning of " plurality " is two or more, unless otherwise Clear specific restriction.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable read-only memory (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable Jie Matter, because can then be edited, be interpreted or when necessary with other for example by carrying out optical scanner to paper or other media Suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete with through-flow program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In readable storage medium storing program for executing.The storage medium can be read-only memory, disk or CD etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in its various change or replacement, These should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the guarantor of the claim It protects subject to range.

Claims (35)

1. a kind of lock control method characterized by comprising
Receive and save the activation code set from car owner's terminal, the activation code set is by car owner's terminal from server What end obtained, the activation code set includes multiple activation codes that the server end is car owner's terminal distribution;
The first activation request from car owner's terminal is received, includes the first activation code in the first activation request;
Car owner's terminal is activated using the activation code set and first activation code;
Lock described in car owner's terminal control is determined whether using first activation code.
2. the method according to claim 1, wherein receive and save the activation code set from car owner's terminal, Include:
The initialization requests from car owner's terminal are received, the initialization requests include the activation using private key signature Code collection is closed;
The private key signature of the activation code set is verified using the public key for being preset at vehicle end, and is saved after being verified The activation code set.
3. the method according to claim 1, wherein being swashed using the activation code set and first activation code Car owner's terminal living, comprising:
If first activation code belongs to the activation code set, it is determined that the car key function activation of car owner's terminal at Function;
Used first activation code is deleted from the activation code set.
4. the method according to claim 1, wherein further including that the first dynamic is secret in the first activation request Key determines whether car owner's terminal control lock using first activation code, comprising:
Receive the first lock from car owner's terminal and control request, the first lock control request include the first ciphertext, Second ciphertext and dbjective state;
If vehicle end is temporarily stored with first activation code and the first dynamic code key, first activation code pair is utilized First ciphertext is decrypted;
If it is identical as the first dynamic code key to decrypt obtained code key, controls the lock and be in the dbjective state, and benefit The second ciphertext described in the first dynamic secret key pair is decrypted, and obtains the second dynamic code key;
It deletes the first activation code and temporarily stores the second dynamic code key.
5. method according to claim 1 to 4, which is characterized in that further include:
It receives the second lock from car owner's terminal and controls request, the second lock control request includes third ciphertext, the 4th Ciphertext and dbjective state;
If vehicle end is temporarily stored with third dynamic code key and the 4th dynamic code key, using described in the third dynamic secret key pair Third ciphertext is decrypted;
If it is identical as the 4th dynamic code key to decrypt obtained code key, controls the lock and is in the dbjective state, And be decrypted using the 4th ciphertext described in the 4th dynamic secret key pair, obtain the 5th dynamic code key;
It deletes third dynamic code key and temporarily stores the 5th dynamic code key.
6. a kind of lock control method characterized by comprising
Activation code set and the first activation code from server end are received, the activation code set includes that the server end is Multiple activation codes of car owner's terminal distribution;
The activation code set is sent to vehicle end, to save the activation code set at the vehicle end;
The first activation request is sent to the vehicle end, includes first activation code in the first activation request, so that institute It states vehicle end and activates car owner's terminal using the activation code set and first activation code.
7. according to the method described in claim 6, it is characterized in that, sending the activation code set to vehicle end, comprising:
Initialization requests are sent to the vehicle end, the initialization requests include the activation code set using private key signature, The initialization requests are used for so that the vehicle end is tested using private key signature of the preset public key to the activation code set It demonstrate,proves and saves the activation code set after being verified.
8. according to the method described in claim 6, it is characterized in that, further including that the first dynamic is secret in the first activation request Key, the method also includes:
The control request of the first lock is sent to the vehicle end, the first lock control request includes the first ciphertext, the second ciphertext And dbjective state, including the use of the first dynamic code key of the first activation code encryption in first ciphertext, in second ciphertext The the second dynamic code key encrypted including the use of the first dynamic code key.
9. according to the method described in claim 6, it is characterized by further comprising:
The control request of the second lock is sent to the vehicle end, the second lock control request includes third ciphertext, the 4th ciphertext And dbjective state, the 4th dynamic code key encrypted including the use of third dynamic code key in the third ciphertext, the 4th ciphertext In including the use of the 4th dynamic code key encrypt the 5th dynamic code key.
10. method according to any one of claims 6 to 9, which is characterized in that further include:
Re-authentication request is sent to the server end, includes requesting the car owner of re-authentication whole in the re-authentication request The identity information at end;
The authentication result response that the server end returns is received, if authenticated successfully to the identity information, the certification It as a result include the second activation code in response, second activation code is chosen from the activation code set by the server end 's;
The second activation request including the second activation code is sent to the vehicle end, the second activation request is used for so that the vehicle Car owner's terminal of re-authentication is activated using second activation code in end.
11. method according to any one of claims 6 to 9, which is characterized in that further include:
Car owner is sent to the server end and changes request, includes car owner's terminal of request change in car owner's change request Identity information;
Receive the server end and return to car owner and change response, if change successfully, car owner's change respond in including the Three activation codes, the third activation code are chosen from the activation code set by the server end;
The third including the third activation code is sent to the vehicle end and activates request, and the third activation request is used for so that institute Vehicle end is stated using car owner's terminal after third activation code activation change.
12. method according to any one of claims 6 to 9, which is characterized in that further include:
It receives and borrows vehicle request from the server end, described borrow includes identity by means of vehicle terminal of the request by means of vehicle in vehicle request Information;
Being sent according to the identity information by means of vehicle terminal and authority application to the server end borrows vehicle to respond, described that vehicle is borrowed to ring It include the authorization authority information that the vehicle end is used by means of vehicle terminal in answering;
Wherein, it is described borrow vehicle response be used for so that the server end to it is described borrow vehicle terminal transmission allow borrow vehicle message, it is described Allowing to borrow includes the 4th activation code and the authority information in vehicle message, and the 4th activation code is by the server end from institute It states and chooses in activation code set;
It is described to allow that vehicle information is borrowed to be used for so that the 4th by means of vehicle terminal to vehicle end transmission including the 4th activation code swashs Living to request, the 4th activation request is used for so that vehicle terminal is borrowed using the 4th activation code activation is described in the vehicle end.
13. according to the method for claim 12, which is characterized in that further include:
Sending revocation to the server end borrows vehicle to request, and the revocation borrows vehicle request for requesting the server end to described Vehicle end sends revocation and borrows vehicle message, and vehicle message is borrowed to be used for for the revocation so that described borrow described in vehicle terminal control is forbidden at the vehicle end Lock;
It receives the revocation that the server end returns to respond by means of vehicle, the revocation is borrowed to be included whether successfully to cancel by means of vehicle in vehicle response State.
14. a kind of lock control method characterized by comprising
The first activation code is chosen from the activation code set of car owner's terminal, the activation code set includes that server end is the vehicle Multiple activation codes of master terminal distribution;
The activation code set and first activation code are sent to car owner's terminal, is sent out by car owner's terminal to vehicle end The activation code set and first activation code are sent, so that the vehicle end is swashed using the activation code set and described first Code living activates car owner's terminal.
15. according to the method for claim 14, which is characterized in that further include:
The re-authentication request of car owner's terminal from re-authentication is received, includes that request is recognized again in the re-authentication request The identity information of car owner's terminal of card;
If authenticated successfully to the identity information, the second activation code is chosen from the activation code set;
It returns to the authentication result including second activation code to car owner's terminal of re-authentication to respond, the authentication result response It is requested for making car owner's terminal of re-authentication send the second activation including the second activation code to the vehicle end, described second Activation request is used for so that car owner's terminal of re-authentication is activated at the vehicle end using second activation code.
16. according to the method for claim 15, which is characterized in that further include:
It receives the car owner from new car master terminal and changes request, include car owner's terminal of request change in car owner's change request Identity information;
If changed successfully, third activation code is chosen from the activation code set;
The car owner including the third activation code is returned to car owner's terminal after change and changes response, and the car owner changes response use In so that it includes that the third of the third activation code activates request that car owner's terminal after change, which is sent to the vehicle end, described the Three activation requests are used for so that the vehicle end utilizes car owner's terminal after third activation code activation change.
17. according to the method for claim 16, which is characterized in that further include:
It receives from requesting by means of vehicle for vehicle terminal is borrowed, described borrow includes the identity information by means of vehicle terminal for requesting to borrow vehicle in vehicle request And authority application;
It is sent to car owner's terminal and borrows vehicle message, it is described by means of the identity information for borrowing vehicle terminal in vehicle message including described in;
The authorization response from car owner's terminal is received, including that authorization is described in the authorization response borrows described in the use of vehicle terminal The authority information at vehicle end;
The 4th activation code is chosen from the activation code set;
It include that the 4th activation code and the authority information allow to borrow vehicle message to described send by means of vehicle terminal;
Wherein, described to allow that vehicle message is borrowed to be used for so that described send by means of vehicle terminal to the vehicle end includes the of the 4th activation code Four activation are requested, and the 4th activation request is used for so that the vehicle end borrows vehicle whole using the 4th activation code activation is described End.
18. according to the method for claim 17, which is characterized in that further include:
The revocation for receiving car owner's terminal is requested by means of vehicle;
Revocation is sent to the vehicle end and borrows vehicle message, and vehicle message is borrowed to be used for for the revocation so that the vehicle end forbids described borrowing vehicle whole End controls the lock;
It receives the revocation that the vehicle end returns and borrows vehicle results messages, the revocation is borrowed to be included whether successfully to cancel in vehicle results messages By means of the state of vehicle;
Vehicle terminal is borrowed to send revocation by means of vehicle notice to described, the revocation is borrowed to be included whether successfully to cancel the shape by means of vehicle in vehicle notice State;
Sending revocation to car owner's terminal borrows vehicle to respond, and the revocation is borrowed to be included whether successfully to cancel the shape by means of vehicle in vehicle response State.
19. a kind of lock control device characterized by comprising
First receiving module, for receiving and saving the activation code set from car owner's terminal, the activation code set is by institute State what car owner's terminal was obtained from server end, the activation code set includes that the server end is car owner's terminal distribution Multiple activation codes;
Second receiving module wraps in the first activation request for receiving the first activation request from car owner's terminal Include the first activation code;
First active module, for activating car owner's terminal using the activation code set and first activation code;
First control module, for determining whether lock described in car owner's terminal control using first activation code.
20. device according to claim 19, which is characterized in that further include that the first dynamic is secret in the first activation request Key, first control module are also used to:
Receive the first lock from car owner's terminal and control request, the first lock control request include the first ciphertext, Second ciphertext and dbjective state;
If vehicle end is temporarily stored with first activation code and the first dynamic code key, first activation code pair is utilized First ciphertext is decrypted;
If it is identical as the first dynamic code key to decrypt obtained code key, controls the lock and be in the dbjective state, and benefit The second ciphertext described in the first dynamic secret key pair is decrypted, and obtains the second dynamic code key;
It deletes the first activation code and temporarily stores the second dynamic code key.
21. device described in 9 or 20 according to claim 1, which is characterized in that first control module is also used to:
It receives the second lock from car owner's terminal and controls request, the second lock control request includes third ciphertext, the 4th Ciphertext and dbjective state;
If vehicle end is temporarily stored with third dynamic code key and the 4th dynamic code key, using described in the third dynamic secret key pair Third ciphertext is decrypted;
If it is identical as the 4th dynamic code key to decrypt obtained code key, controls the lock and is in the dbjective state, And be decrypted using the 4th ciphertext described in the 4th dynamic secret key pair, obtain the 5th dynamic code key;
It deletes third dynamic code key and temporarily stores the 5th dynamic code key.
22. a kind of lock control device characterized by comprising
Third receiving module, for receiving activation code set and the first activation code from server end, the activation code set It is multiple activation codes of car owner's terminal distribution including the server end;
First sending module, for sending the activation code set to vehicle end, to save the activation code set at the vehicle end;
Second sending module includes described the in the first activation request for sending the first activation request to the vehicle end One activation code, so that car owner's terminal is activated using the activation code set and first activation code in the vehicle end.
23. device according to claim 22, which is characterized in that further include that the first dynamic is secret in the first activation request Key, described device further include:
Third sending module is also used to send the control request of the first lock to the vehicle end, and first lock controls request packet Include the first ciphertext, the second ciphertext and dbjective state, the first dynamic for activating code encryption including the use of first in first ciphertext Code key, the second dynamic code key encrypted including the use of the first dynamic code key in second ciphertext.
24. device according to claim 23, which is characterized in that further include:
4th sending module is also used to send the control request of the second lock to the vehicle end, and second lock controls request packet Third ciphertext, the 4th ciphertext and dbjective state are included, is moved in the third ciphertext including the use of the 4th of the encryption of third dynamic code key State code key, the 5th dynamic code key encrypted including the use of the 4th dynamic code key in the 4th ciphertext.
25. the device according to any one of claim 22 to 24, which is characterized in that further include the first re-authentication mould Block, the first re-authentication module are used for:
Re-authentication request is sent to the server end, includes requesting the car owner of re-authentication whole in the re-authentication request The identity information at end;
The authentication result response that the server end returns is received, if authenticated successfully to the identity information, the certification It as a result include the second activation code in response, second activation code is chosen from the activation code set by the server end 's;
The second activation request including the second activation code is sent to the vehicle end, the second activation request is used for so that the vehicle Car owner's terminal of re-authentication is activated using second activation code in end.
26. the device according to any one of claim 22 to 24, which is characterized in that further include that the first car owner changes mould Block, first car owner change module and are used for:
Car owner is sent to the server end and changes request, includes car owner's terminal of request change in car owner's change request Identity information;
Receive the server end and return to car owner and change response, if change successfully, car owner's change respond in including the Three activation codes, the third activation code are chosen from the activation code set by the server end;
The third including the third activation code is sent to the vehicle end and activates request, and the third activation request is used for so that institute Vehicle end is stated using car owner's terminal after third activation code activation change.
27. the device according to any one of claim 22 to 24, which is characterized in that further include first by means of vehicle module, institute Stating first borrows vehicle module to be used for:
It receives and borrows vehicle request from the server end, described borrow includes identity by means of vehicle terminal of the request by means of vehicle in vehicle request Information;
Being sent according to the identity information by means of vehicle terminal and authority application to the server end borrows vehicle to respond, described that vehicle is borrowed to ring It include the authorization authority information that the vehicle end is used by means of vehicle terminal in answering;
Wherein, it is described borrow vehicle response be used for so that the server end to it is described borrow vehicle terminal transmission allow borrow vehicle message, it is described Allowing to borrow includes the 4th activation code and the authority information in vehicle message, and the 4th activation code is by the server end from institute It states and chooses in activation code set;
It is described to allow that vehicle information is borrowed to be used for so that the 4th by means of vehicle terminal to vehicle end transmission including the 4th activation code swashs Living to request, the 4th activation request is used for so that vehicle terminal is borrowed using the 4th activation code activation is described in the vehicle end.
28. device according to claim 27, which is characterized in that further include that vehicle module is borrowed in the first revocation, described first removes Pin borrows vehicle module to be used for:
Sending revocation to the server end borrows vehicle to request, and the revocation borrows vehicle request for requesting the server end to described Vehicle end sends revocation and borrows vehicle message, and vehicle message is borrowed to be used for for the revocation so that described borrow described in vehicle terminal control is forbidden at the vehicle end Lock;
It receives the revocation that the server end returns to respond by means of vehicle, the revocation is borrowed to be included whether successfully to cancel by means of vehicle in vehicle response State.
29. a kind of lock control device characterized by comprising
First chooses module, for choosing the first activation code, the activation code set packet from the activation code set of car owner's terminal Include multiple activation codes that server end is car owner's terminal distribution;
5th sending module passes through institute for sending the activation code set and first activation code to car owner's terminal It states car owner's terminal and sends the activation code set and first activation code to vehicle end, so that the vehicle end utilizes the activation Code collection is closed and first activation code activates car owner's terminal.
30. device according to claim 29, which is characterized in that further include the second re-authentication module, second weight New authentication module is used for:
The re-authentication request of car owner's terminal from re-authentication is received, includes that request is recognized again in the re-authentication request The identity information of car owner's terminal of card;
If authenticated successfully to the identity information, the second activation code is chosen from the activation code set;
It returns to the authentication result including second activation code to car owner's terminal of re-authentication to respond, the authentication result response It is requested for making car owner's terminal of re-authentication send the second activation including the second activation code to the vehicle end, described second Activation request is used for so that car owner's terminal of re-authentication is activated at the vehicle end using second activation code.
31. device according to claim 29, which is characterized in that further include that the second car owner changes module, second vehicle Main transformer more module is used for:
It receives the car owner from new car master terminal and changes request, include car owner's terminal of request change in car owner's change request Identity information;
If changed successfully, third activation code is chosen from the activation code set;
The car owner including the third activation code is returned to car owner's terminal after change and changes response, and the car owner changes response use In so that it includes that the third of the third activation code activates request that car owner's terminal after change, which is sent to the vehicle end, described the Three activation requests are used for so that the vehicle end utilizes car owner's terminal after third activation code activation change.
32. device according to claim 29, which is characterized in that further include second by means of vehicle module, described second by means of vehicle mould Block is used for:
It receives from requesting by means of vehicle for vehicle terminal is borrowed, described borrow includes the identity information by means of vehicle terminal for requesting to borrow vehicle in vehicle request And authority application;
It is sent to car owner's terminal and borrows vehicle message, it is described by means of the identity information for borrowing vehicle terminal in vehicle message including described in;
The authorization response from car owner's terminal is received, including that authorization is described in the authorization response borrows described in the use of vehicle terminal The authority information at vehicle end;
The 4th activation code is chosen from the activation code set;
It include that the 4th activation code and the authority information allow to borrow vehicle message to described send by means of vehicle terminal;
Wherein, described to allow that vehicle message is borrowed to be used for so that described send by means of vehicle terminal to the vehicle end includes the of the 4th activation code Four activation are requested, and the 4th activation request is used for so that the vehicle end borrows vehicle whole using the 4th activation code activation is described End.
33. device according to claim 32, which is characterized in that further include that vehicle module is borrowed in the second revocation, described second removes Pin borrows vehicle module to be used for:
The revocation for receiving car owner's terminal is requested by means of vehicle;
Revocation is sent to the vehicle end and borrows vehicle message, and vehicle message is borrowed to be used for for the revocation so that the vehicle end forbids described borrowing vehicle whole End controls the lock;
It receives the revocation that the vehicle end returns and borrows vehicle results messages, the revocation is borrowed to be included whether successfully to cancel in vehicle results messages By means of the state of vehicle;
Vehicle terminal is borrowed to send revocation by means of vehicle notice to described, the revocation is borrowed to be included whether successfully to cancel the shape by means of vehicle in vehicle notice State;
Sending revocation to car owner's terminal borrows vehicle to respond, and the revocation is borrowed to be included whether successfully to cancel the shape by means of vehicle in vehicle response State.
34. a kind of lock control device characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors Realize the method as described in any one of claims 1 to 18.
35. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the program is held by processor The method as described in any one of claims 1 to 18 is realized when row.
CN201811147047.5A 2018-09-29 2018-09-29 Vehicle lock control method and device Active CN109285252B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110950556.7A CN113554787B (en) 2018-09-29 2018-09-29 Vehicle lock control method and device
CN201811147047.5A CN109285252B (en) 2018-09-29 2018-09-29 Vehicle lock control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811147047.5A CN109285252B (en) 2018-09-29 2018-09-29 Vehicle lock control method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110950556.7A Division CN113554787B (en) 2018-09-29 2018-09-29 Vehicle lock control method and device

Publications (2)

Publication Number Publication Date
CN109285252A true CN109285252A (en) 2019-01-29
CN109285252B CN109285252B (en) 2021-08-10

Family

ID=65182652

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110950556.7A Active CN113554787B (en) 2018-09-29 2018-09-29 Vehicle lock control method and device
CN201811147047.5A Active CN109285252B (en) 2018-09-29 2018-09-29 Vehicle lock control method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110950556.7A Active CN113554787B (en) 2018-09-29 2018-09-29 Vehicle lock control method and device

Country Status (1)

Country Link
CN (2) CN113554787B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key
CN109859362A (en) * 2019-03-13 2019-06-07 江苏金致新能源车业有限公司 A kind of electric motor intelligent key controller method
CN112492547A (en) * 2020-12-11 2021-03-12 芜湖雄狮汽车科技有限公司 Vehicle binding method and system, server and mobile terminal
CN112541990A (en) * 2020-12-07 2021-03-23 深圳市智莱科技股份有限公司 Door lock opening method and system of intelligent cabinet
CN112751803A (en) * 2019-10-30 2021-05-04 上海博泰悦臻电子设备制造有限公司 Method, apparatus, and computer-readable storage medium for managing objects
CN113554786A (en) * 2021-08-02 2021-10-26 南马实业(深圳)有限公司 Vehicle control method and system of Bluetooth vehicle key
WO2023274550A1 (en) * 2021-07-01 2023-01-05 Volvo Construction Equipment Ab An on-board control unit, an off-board control station and methods therein for enabling a safe operation of a vehicle

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120131541A (en) * 2011-05-25 2012-12-05 주식회사 슈프리마 Method for smart phone registration when accessing security authentication device and method for access authentication of registered smart phone
CN104424679A (en) * 2013-08-30 2015-03-18 比亚迪股份有限公司 Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN105721541A (en) * 2016-01-13 2016-06-29 大连楼兰科技股份有限公司 Method and system for remotely controlling vehicle
CN105844744A (en) * 2016-03-21 2016-08-10 成都艾德沃传感技术有限公司 Password authentication method and password lock
CN105848092A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Vehicle control method and device without keys
CN105976466A (en) * 2016-05-03 2016-09-28 科世达(上海)管理有限公司 Car access control opening method
CN106302510A (en) * 2016-08-31 2017-01-04 长城汽车股份有限公司 The authorization method of virtual key, system, mobile terminal and server
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system
CN107516364A (en) * 2017-08-30 2017-12-26 上海若禅信息科技有限公司 Method for unlocking, bluetooth lock and the unlocking terminal of bluetooth lock
CN108447154A (en) * 2018-03-02 2018-08-24 中国水利水电科学研究院 Safe unlocking method and device, encryption and decryption method and device, lock and server

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1241971A (en) * 1996-10-18 2000-01-19 定向电子公司 Learn mode for remote transmitters
FR2965434B1 (en) * 2010-09-28 2015-12-11 Valeo Securite Habitacle METHOD OF PAIRING A MOBILE TELEPHONE WITH A MOTOR VEHICLE AND LOCKING / UNLOCKING ASSEMBLY
CN103029648B (en) * 2011-09-30 2017-02-08 上海博泰悦臻网络技术服务有限公司 Activation method and activation system for vehicle-mounted equipment
US9600949B2 (en) * 2014-07-30 2017-03-21 Master Lock Company Llc Wireless key management for authentication
CN104700479B (en) * 2015-03-10 2017-06-13 上海金融云服务集团安全技术有限公司 Guard method based on band authentication
US9865110B2 (en) * 2015-05-22 2018-01-09 M2MD Technologies, Inc. Method and system for securely and automatically obtaining services from a machine device services server
CN105245580A (en) * 2015-09-15 2016-01-13 奇瑞汽车股份有限公司 Vehicle control method and device
CN106658493B (en) * 2016-10-17 2019-12-06 东软集团股份有限公司 Key management method, device and system
CN107685714B (en) * 2017-08-30 2022-05-31 博泰车联网科技(上海)股份有限公司 Intelligent vehicle key system and control method thereof
CN107864124B (en) * 2017-10-26 2020-07-17 北京深思数盾科技股份有限公司 Terminal information security protection method, terminal and Bluetooth lock
CN107945336A (en) * 2017-11-24 2018-04-20 广东菲柯特电子科技有限公司 Intelligent vehicle lock control method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120131541A (en) * 2011-05-25 2012-12-05 주식회사 슈프리마 Method for smart phone registration when accessing security authentication device and method for access authentication of registered smart phone
CN104424679A (en) * 2013-08-30 2015-03-18 比亚迪股份有限公司 Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN105721541A (en) * 2016-01-13 2016-06-29 大连楼兰科技股份有限公司 Method and system for remotely controlling vehicle
CN105844744A (en) * 2016-03-21 2016-08-10 成都艾德沃传感技术有限公司 Password authentication method and password lock
CN105848092A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Vehicle control method and device without keys
CN105976466A (en) * 2016-05-03 2016-09-28 科世达(上海)管理有限公司 Car access control opening method
CN106302510A (en) * 2016-08-31 2017-01-04 长城汽车股份有限公司 The authorization method of virtual key, system, mobile terminal and server
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system
CN107516364A (en) * 2017-08-30 2017-12-26 上海若禅信息科技有限公司 Method for unlocking, bluetooth lock and the unlocking terminal of bluetooth lock
CN108447154A (en) * 2018-03-02 2018-08-24 中国水利水电科学研究院 Safe unlocking method and device, encryption and decryption method and device, lock and server

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key
CN109727358B (en) * 2019-02-21 2021-02-23 深圳四海万联科技有限公司 Vehicle sharing system based on Bluetooth key
CN109859362A (en) * 2019-03-13 2019-06-07 江苏金致新能源车业有限公司 A kind of electric motor intelligent key controller method
CN109859362B (en) * 2019-03-13 2021-04-27 江苏金致新能源车业有限公司 Intelligent key control method for electric vehicle
CN112751803A (en) * 2019-10-30 2021-05-04 上海博泰悦臻电子设备制造有限公司 Method, apparatus, and computer-readable storage medium for managing objects
CN112751803B (en) * 2019-10-30 2022-11-22 博泰车联网科技(上海)股份有限公司 Method, apparatus, and computer-readable storage medium for managing objects
CN112541990A (en) * 2020-12-07 2021-03-23 深圳市智莱科技股份有限公司 Door lock opening method and system of intelligent cabinet
CN112492547A (en) * 2020-12-11 2021-03-12 芜湖雄狮汽车科技有限公司 Vehicle binding method and system, server and mobile terminal
CN112492547B (en) * 2020-12-11 2024-05-10 芜湖雄狮汽车科技有限公司 Binding method and system of vehicle, server and mobile terminal
WO2023274550A1 (en) * 2021-07-01 2023-01-05 Volvo Construction Equipment Ab An on-board control unit, an off-board control station and methods therein for enabling a safe operation of a vehicle
CN113554786A (en) * 2021-08-02 2021-10-26 南马实业(深圳)有限公司 Vehicle control method and system of Bluetooth vehicle key

Also Published As

Publication number Publication date
CN113554787B (en) 2023-01-24
CN109285252B (en) 2021-08-10
CN113554787A (en) 2021-10-26

Similar Documents

Publication Publication Date Title
CN109285252A (en) Lock control method and device
CN110535833B (en) Data sharing control method based on block chain
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
US20190164137A1 (en) Blockchain-implemented method and system
CN110086804A (en) A kind of internet of things data method for secret protection based on block chain and reliable hardware
CN108898389A (en) Based on the content verification method and device of block chain, electronic equipment
CN108737348A (en) A kind of internet of things equipment access control method of the intelligent contract based on block chain
CN107395567B (en) Equipment use permission obtaining method and system based on Internet of things
CN109379369A (en) Single-point logging method, device, server and storage medium
CN108256858A (en) The establishment of the mandate of the decentralization of the object of connection and the system and method for management
CN110061846A (en) Identity authentication method and relevant device are carried out to user node in block chain
US20130007465A1 (en) Apparatus, Systems and Method for Virtual Desktop Access and Management
US20190080299A1 (en) Cyber ownership transfer
CN105516110A (en) Mobile equipment secure data transmission method
CN108650220B (en) Method and equipment for issuing and acquiring mobile terminal certificate and automobile end chip certificate
KR20200138059A (en) Method for managing digital key of mobile device for vehicle-sharing and key server using the same
CN109728903B (en) Block chain weak center password authorization method using attribute password
EP3684005A1 (en) Method and system for recovering cryptographic keys of a blockchain network
CN109587146A (en) Method for managing object and system based on block chain
CN106341234A (en) Authorization method and device
CN105450750A (en) Secure interaction method for intelligent terminal
CN115296838B (en) Block chain-based data sharing method, system and storage medium
CN106027475A (en) Secret key obtaining method and identity card information transmission method and system
CN113343286B (en) Data encryption and decryption method, data uploading end, data receiving end and system
CN107563869B (en) Data right confirming method and system based on encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211013

Address after: 100176 Room 101, 1st floor, building 1, yard 7, Ruihe West 2nd Road, economic and Technological Development Zone, Daxing District, Beijing

Patentee after: Apollo Intelligent Connectivity (Beijing) Technology Co., Ltd.

Address before: 100085 Baidu Building, 10 Shangdi Tenth Street, Haidian District, Beijing

Patentee before: BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) Co.,Ltd.

TR01 Transfer of patent right